
About the training
Why should you attend?
As the impact of security incidents in small and large organizations has increased significantly, so has the demand for ethical hacking. Ethical hacking is one of the most effective tools of safeguarding assets and protecting people and information. Ethical hacking certification is slowly becoming a standard requirement for professionals who want to work in the field of information security.
A PECB Certified Lead Ethical Hacker certification will help you demonstrate your ability to lawfully assess the security of systems and discover their vulnerabilities. The training course provides information on the latest ethical hacking methods and tools. It also provides a methodology for conducting penetration tests in accordance with standards and best practices, such as the Penetration Testing Execution Standard (PTES) and the Open Source Security Testing Methodology (OSSTMM).
Understanding hackers’ strategies helps solve security issues and challenges. After attending the training course, you will be able to plan, manage, and perform information security penetration tests.
The PECB Certified Lead Ethical Hacker training course is based on the concept of practicing what you learned. It includes lab sessions and practical examples to help you apply the theory into practice.
The training course is followed by an exam. If you pass, you can apply for a “PECB Certified Lead Ethical Hacker” credential. For more information about the examination process, please refer to the Examination, Certification, and General Information section below.
Why should you attend?
As the impact of security incidents in small and large organizations has increased significantly, so has the demand for ethical hacking. Ethical hacking is one of the most effective tools of safeguarding assets and protecting people and information. Ethical hacking certification is slowly becoming a standard requirement for professionals who want to work in the field of information security.
A PECB Certified Lead Ethical Hacker certification will help you demonstrate your ability to lawfully assess the security of systems and discover their vulnerabilities. The training course provides information on the latest ethical hacking methods and tools. It also provides a methodology for conducting penetration tests in accordance with standards and best practices, such as the Penetration Testing Execution Standard (PTES) and the Open Source Security Testing Methodology (OSSTMM).
Understanding hackers’ strategies helps solve security issues and challenges. After attending the training course, you will be able to plan, manage, and perform information security penetration tests.
The PECB Certified Lead Ethical Hacker training course is based on the concept of practicing what you learned. It includes lab sessions and practical examples to help you apply the theory into practice.
The training course is followed by an exam. If you pass, you can apply for a “PECB Certified Lead Ethical Hacker” credential. For more information about the examination process, please refer to the Examination, Certification, and General Information section below.
What you will learn
Course agenda
Duration: 5 days
Day 1
Introduction to ethical hacking
Training course objectives and structure
Penetration testing standards, methodologies, and frameworks
Lab overview
Fundamental concepts of ethical hacking
Network fundamentals
Understanding cryptography
Relevant trends and technologies
Kali Linux fundamentals
Initiation of the penetration test
Analysis of the penetration testing scope
Legal implications and contractual agreement
Day 2
Initiating the reconnaissance phase
Passive reconnaissance
Active reconnaissance
Identification of vulnerabilities
Day 3
Initiating the exploitation phase
Threat model and attack plan
Evading intrusion detection systems
Server-side attacks
Client-side attacks
Web application attacks
WIFI attacks
Privilege escalation
Pivoting
File Transfers
Maintaining access
Day 4
Post-exploitation and reporting
Cleaning up and destroying artifacts
Generating a findings report
Recommendations on mitigating the identified vulnerabilities
Closing the training course
Day 5
Certification exam
Course agenda
Duration: 5 days
Day 1
Introduction to ethical hacking
Training course objectives and structure
Penetration testing standards, methodologies, and frameworks
Lab overview
Fundamental concepts of ethical hacking
Network fundamentals
Understanding cryptography
Relevant trends and technologies
Kali Linux fundamentals
Initiation of the penetration test
Analysis of the penetration testing scope
Legal implications and contractual agreement
Day 2
Initiating the reconnaissance phase
Passive reconnaissance
Active reconnaissance
Identification of vulnerabilities
Day 3
Initiating the exploitation phase
Threat model and attack plan
Evading intrusion detection systems
Server-side attacks
Client-side attacks
Web application attacks
WIFI attacks
Privilege escalation
Pivoting
File Transfers
Maintaining access
Day 4
Post-exploitation and reporting
Cleaning up and destroying artifacts
Generating a findings report
Recommendations on mitigating the identified vulnerabilities
Closing the training course
Day 5
Certification exam
Training information
Who should attend?
This training course is intended for:
Individuals seeking to gain knowledge about the main techniques used to conduct penetration tests
Individuals involved in information security seeking to master ethical hacking and penetration testing techniques
Individuals responsible for the security of information systems, such as information security officers and cybersecurity professionals
Information security team members seeking to enhance their information security knowledge
Managers or expert advisors interested in learning how to manage ethical hacking activities
Technical experts interested in learning how to plan and perform a penetration test
Who should attend?
This training course is intended for:
Individuals seeking to gain knowledge about the main techniques used to conduct penetration tests
Individuals involved in information security seeking to master ethical hacking and penetration testing techniques
Individuals responsible for the security of information systems, such as information security officers and cybersecurity professionals
Information security team members seeking to enhance their information security knowledge
Managers or expert advisors interested in learning how to manage ethical hacking activities
Technical experts interested in learning how to plan and perform a penetration test

Certificate
Yes (based on specific standards, recognised by national/international organizations)

Price
500€ - 1000€

Level
All Levels

Teaching Method/s
Online

Duration
3 to 7 days

Discount
Yes

Type
Profesional certification
