Fundamentals of Ethical Hacking and Penetration Testing

12 units

Please select a city/session before registration.

About this program

As threat actors rapidly advance, organizations must respond with equally swift and thorough testing, analysis, and remediation efforts. This course delivers a hands-on, tool-driven approach to offensive security, enabling participants to identify, verify, and remediate actual vulnerabilities.
Spanning ten days, the program integrates lab exercises, case studies, and tabletop scenarios, allowing learners to conduct controlled attacks, analyze results, and convert insights into prioritized security enhancements. Offered by EuroQuest International Training, the curriculum strikes a balance between technical expertise and governance and risk management aspects.

Key outcomes

  • Comprehend ethical hacking methodologies and the associated legal and ethical frameworks
  • Develop plans and scopes for penetration tests aligned with business objectives
  • Carry out reconnaissance, scanning, and exploit verification activities
  • Apply secure testing methods for web applications, networks, and cloud environments
  • Evaluate exploits and design mitigation approaches for identified vulnerabilities
  • Create concise, risk-focused penetration test reports tailored for stakeholders
  • Incorporate test findings into ongoing vulnerability management processes
  • Utilize threat modeling to prioritize security budget allocations
  • Strengthen incident response strategies by understanding attacker tactics
  • Employ both automated and manual approaches to confirm remediation effectiveness
  • Advise on secure configurations and system hardening measures
  • Implement standardized testing programs to support continuous security improvements

Who should attend

  • Security engineers and penetration testers
  • SOC analysts and incident response teams
  • IT/network administrators and cloud infrastructure specialists
  • Application developers accountable for security aspects
  • Risk and compliance officers managing security assessments

Course outline

1

Unit 1: Principles of Ethical Hacking

  • Considerations of legality, ethics, and testing boundaries
  • Techniques for mapping attack surfaces and conducting reconnaissance
  • Understanding adversary frameworks and the kill chain model
  • Defining scope and establishing rules of engagement
2

Unit 2: Techniques for Reconnaissance and Information Collection

  • Methods for passive and active information discovery
  • Utilizing OSINT, footprinting, and enumeration tools
  • Identifying and mapping network assets and services
  • Determining priority targets for evaluation
3

Unit 3: Detection and Scanning for Vulnerabilities

  • Best practices for automated vulnerability scanning and optimization
  • Managing false positive and false negative results
  • Techniques for manual validation of findings
  • Risk-based prioritization approaches
4

Unit 4: Analyzing and Confirming Exploits

  • Fundamentals of manual exploit validation
  • Developing safe proof-of-concept exploits
  • Basics of post-exploitation activities and persistence threats
  • Documenting and reporting verified results
5

Unit 5: Penetration Testing of Web Applications

  • Exploring OWASP Top 10 and advanced web vulnerabilities
  • Assessing APIs, authentication mechanisms, and session controls
  • Identifying and exploiting logic and business logic flaws
  • Guidance on secure remediation practices
6

Unit 6: Attacks on Network and Infrastructure

  • Techniques for lateral movement, pivoting, and privilege escalation
  • Exploiting protocol weaknesses and misconfigurations
  • Considerations for wireless and perimeter testing
  • Network segmentation strategies and mitigation methods
7

Unit 7: Security Testing for Cloud and Containers

  • Evaluating cloud misconfigurations and IAM misuse
  • Identifying vulnerabilities in containers and orchestration platforms
  • Best practices for secure deployment and remediation
  • Validating cloud-native logging and detection mechanisms
8

Unit 8: Fundamentals of Endpoint and Malware Analysis

  • Understanding endpoint attack vectors and persistence techniques
  • Overview of static and dynamic malware analysis
  • Techniques to bypass EDR and test detection capabilities
  • Endpoint hardening and incident response procedures
9

Unit 9: Simulating Social Engineering and Phishing Attacks

  • Designing controlled social engineering assessments
  • Developing, executing, and measuring phishing campaigns
  • Examining human factors in security and awareness feedback
  • Implementing controls to mitigate social engineering risks
10

Unit 10: Collaboration Between Red and Blue Teams with Purple Teaming

  • Conducting coordinated exercises to validate security controls
  • Utilizing purple teaming for ongoing enhancements
  • Assessing detection and response capabilities maturity
  • Converting test results into actionable security metrics
11

Unit 11: Reporting, Metrics, and Planning for Remediation

  • Organizing executive summaries and detailed technical appendices
  • Methods for risk scoring and prioritizing remediation
  • Tracking remediation progress and validation
  • Effective communication with technical and executive audiences
12

Unit 12: Comprehensive Penetration Test Capstone Simulation

  • Executing a full-scope, collaborative penetration test
  • Simulating realistic attacks and generating evidence
  • Presenting findings alongside remediation strategies
  • Reviewing lessons learned and developing action plans