Module 01: Introduction to Ethical Hacking
Module 02: Footprinting and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: Vulnerability Analysis
Module 06: System Hacking
Module 07: Malware Threats
Module 08: Sniffing
Module 09: Social Engineering
Module 10: Denial-of-Service
Module 11: Session Hijacking
Module 12: Evading IDS, Firewalls, and Honeypots
Module 13: Hacking Web Servers
Module 14: Hacking Web Applications
Module 15: SQL Injection
Module 16: Hacking Wireless Networks
Module 17: Hacking Mobile Platforms
Module 18: IoT and OT Hacking
Module 19: Cloud Computing
Module 20: Cryptography
1. Learn
- 20 modules
- 2500+ pages of student manual
- 2000 pages of lab manual
- Over 221 hands-on labs to practice attack vectors and hacking tools
- AI integrated skills in the 5 phases of the ethical hacking framework
- Hacking AI system, based on the
- Top 10 OWASP vulnerabilities
- Over 4000 hacking and security tools
- Learn how to hack multiple operating systems (Windows 11, Windows servers, Linux, Ubuntu, Android)
- More than 50% of training time is dedicated to labs
2. Certify
- Knowledge-Based Exam (ANAB ISO 17024 and US DoD 8140)
- 4 hours 125 multiple-choice questions Practical Exam (ANAB ISO 17024 and US DoD 8140)
- 6 hours 20 real scenario based questions
3. Engage
- 4000 hacking tools
- 550 attack techniques
- Conduct a real-world ethical hacking assignment
- Apply the 5 phases
- Reconnaissance
- Scanning
- Gaining access
- Maintaining access
- Covering your tracks
4. Compete
- New challenges every month
- 4-hour CTF competition
- Compete with your peers worldwide
- Hack your way to the top of the leaderboard
- Focus on new attack vectors
- Exploit emerging vulnerabilities
- Challenges include:
- Ransomware
- Web app hardening
- Unpatched software
- System hacking
- Service exploitation
- Incident response
- Forensic analysis
- Web app hacking and pen testing
- Reverse engineering
- Cryptography
- Encryption
- Hacking cloud networks
- ICS/SCADA
Hands-on Learning Labs
With 221 hands-on labs in our cutting-edge Cyber Range cyber range, you’ll practice every skill on live machines and real-world vulnerabilities.
Armed with over 4,000 powerful hacking tools and a range of operating systems, you’ll gain unrivaled, practical expertise with the most widely used security tools, current vulnerabilities, and industry-standard operating systems. This revolutionary environment brings the industry’s top security tools and the latest vulnerabilities to your fingertips, all in a web-accessible platform. No matter where you are, you can dive into the realworld experience and emerge as a force to be reckoned with in cybersecurity.
- 100% virtualization for a complete learning experience
- Full access to pre-configured targets, networks, and the attack tools necessary to exploit them
- Pre-configured vulnerable websites Vulnerable, unpatched operating systems
- Fully networked environments
- 4000+ hacking tools and so much more!
- Wide range of target platforms to hone your skills
- 550 attack techniques covered
- Objective-oriented flags for critical thinking and applied knowledge assessment
Central Bank of Turkmenistan
Rated the training 5 stars.