Online

Cybersecurity (Ethical Hacking)

Our Ethical Hacker course is mapped to the Certified Ethical Hacker (CEH) credential/ certification exam syllabus which is the most trusted ethical hacking certification and accomplishments recommended by employers globally. It is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers.

Download the Syllabus

DOWNLOAD SYLLABUS - ONLINE

We are delighted to give you a peep into our packages. Kindly provide your details below after which you’ll be able to download our syllabus.

Applications are currently Open!

Duration

10 WeeksSat & Sun

Start Date

13th April, 2024

Level

Beginner

Training Structure

  • 8 weeks of Learning
  • 1 week for mock examination
  • 1 week for Final presentation

Projects

1 Project

Cost

₦300,000 ₦200,000

Our ethical hacking bootcamp will provide individuals with the skills and knowledge needed to perform ethical hacking assessments on computer systems and networks. This bootcamp typically covers a range of topics, including network and vulnerability scanning, vulnerability assessment, vulnerability analysis, social engineering and more.

The goal of ethical hacking is to identify and possibly exploit potential security vulnerabilities in computer systems and networks for defensive rather than malicious purposes.

Ethical hackers typically work for organizations to help improve their security posture and prevent cyber attacks. With our experienced professionals in the field, the online bootcamp will afford all students a practical hands-on training to horn their skills in a controlled environment.

This bootcamp would prepare individuals for a career in ethical hacking or related fields, such as cybersecurity, penetration testing, security audit and information security. Additionally, obtaining certifications such as the Certified Ethical Hacker (CEH) certification and others can demonstrate proficiency in ethical hacking and improve job students Job prospects.

In this bootcamp, you will learn the following:

  • Introduction to Ethical Hacking: Understanding the fundamentals of ethical hacking and the different types of attacks that can be conducted.
  • Reconnaissance Techniques: Gathering information about the target system or network through various reconnaissance techniques, such as footprinting, scanning, and enumeration.
  • Vulnerability Assessment: Identifying and analyzing vulnerabilities in the target system or network, including web application vulnerabilities, network vulnerabilities, and operating system vulnerabilities.
  • Exploitation Techniques: Exploiting identified vulnerabilities in a controlled manner to gain access to the target system or network.
  • Social Engineering: Using social engineering techniques to manipulate individuals into providing sensitive information or performing actions that compromise the security of the target system or network.
  • Penetration Testing: Conducting a comprehensive penetration test on the target system or network to simulate a real-world attack scenario.
  • Post-Exploitation Techniques: Maintaining access to the target system or network after a successful exploitation, and performing actions such as privilege escalation and lateral movement.
  • Throughout the bootcamp, you will also learn about the legal and ethical considerations of ethical hacking, including the importance of obtaining proper authorization and complying with relevant laws and regulations.

To ensure a successful learning experience and hands-on practice in our Ethical Hacking course, students are required to meet the following prerequisites:

  • Basic Computer Skills: A basic understanding of computer systems, including knowledge of operating systems, file systems, and basic computer terminology.
  • Eagerness/Zeal (Passion) to Learn: A strong desire to learn and explore new concepts and technologies.
  • No Prior Programming skills need
  • Access to a computer system or device with the capability to download and store a minimum of 200 gigabytes (GB) worth of files for their lab exercises. These files are important resources for online students to work on remotely.
  • Reliable Internet connection

Laptop Specifications:

  • RAM: 12GB (minimum)
  • ROM: 500GB – 1TB
  • External Drive: 500GB – 1TB
WEEK 1

Class 1: Introduction to Ethical Hacking

  • What is Ethical Hacking?
  • Objectives of Ethical Hacking
  • Types of Ethical Hacking
  • Legal and Ethical Considerations

Class 2: Information Gathering (Footprinting, & Reconnaissance)

  • Understanding Footprinting
  • Types of Footprinting
  • Information Gathering
  • Techniques for Footprinting and Reconnaissance
WEEK 2

Module 3: Scanning, Enumeration, Vulnerability Analysis

  • Introduction to Network Scanning
  • Types of Network Scanning
  • Port Scanning
  • Vulnerability Scanning
  • Network Mapping
  • Introduction to Enumeration
  • Types of Enumeration
  • Enumerating User Accounts
  • Enumerating System Information
  • Enumerating Network Resources

Module 4: Scanning, Enumeration, Vulnerability Analysis

  • Introduction to Network Scanning
  • Types of Network Scanning
  • Port Scanning
  • Vulnerability Scanning
  • Network Mapping
  • Introduction to Enumeration
  • Types of Enumeration
  • Enumerating User Accounts
  • Enumerating System Information
  • Enumerating Network Resources
WEEK 3

Module 5: Scanning, Enumeration, Vulnerability Analysis

  • Introduction to Network Scanning
  • Types of Network Scanning
  • Port Scanning
  • Vulnerability Scanning
  • Network Mapping
  • Introduction to Enumeration
  • Types of Enumeration
  • Enumerating User Accounts
  • Enumerating System Information
  • Enumerating Network Resources

Module 6: System Hacking

  • Introduction to System Hacking
  • Password Cracking
  • Privilege Escalation
  • Backdoor Creation
  • Trojans and Malware
WEEK 4

Module 7: Social Engineering

  • Introduction to Social Engineering
  • Types of Social Engineering
  • Social Engineering Techniques
  • Detection and Prevention of Social Engineering

Module 8: Hacking Web Servers & Hacking Web Applications & SQL Injection

  • Introduction to Web Server Hacking
  • Types of Web Server/Application Vulnerabilities
  • Techniques for Web Server/Application Hacking
  • Detection and Prevention of Web Server/ Application Hacking
WEEK 5

Module 9: Hacking Web Servers & Hacking Web Applications & SQL Injection

  • Introduction to Web Server Hacking
  • Types of Web Server/Application Vulnerabilities
  • Techniques for Web Server/Application Hacking
  • Detection and Prevention of Web Server/ Application Hacking

Module 10: Hacking Web Servers & Hacking Web Applications & SQL Injection

  • Introduction to Web Server Hacking
  • Types of Web Server/Application Vulnerabilities
  • Techniques for Web Server/Application Hacking
  • Detection and Prevention of Web Server/ Application Hacking
WEEK 6

Module 11: Denial-of-Service

  • Introduction to DoS & DDoS Attacks
  • Types of DoS & DDoS Attacks
  • Techniques for DoS & DDoS Attacks
  • Detection and Prevention of DoS & DDoS Attacks

Module 12: Evading IDS, Firewalls, and Honeypots

  • Introduction to Sniffing
  • Introduction to IDS, IPS, firewall and honeypot concepts and their types
  • Demonstrates various IDS, IPS, firewall and honeypot solutions
  • Describes various IDS and firewall evasion techniques
  • Explains various techniques to detect and defeat honeypots Lists various
  • IDS/firewall evasion tools and honeypot detection tools
  • Discusses the countermeasures to defend against IDS/firewall evasion
WEEK 7

Module 13: Malware Threats & Session Hijacking & Sniffing

  • Introduction & definition of malware and APT and Sniffing
  • Discusses Trojan, viruses, and worm concepts (their types, and how they infect files/systems)
  • Explain fileless malware concepts
  • Explain the static and dynamic malware analysis process
  • Discusses various countermeasures to defend against malware attacks
  • Briefs about the basic concepts of sniffing network and various types of sniffing
  • Discusses various sniffing techniques such as MAC attack, DHCP attack,
  • ARP poisoning, spoofing, DNS poisoning, etc.
  • Discusses on how to defend against various sniffing attacks & Explain various sniffing detection methods and tools

Module 14: Introduction to Cloud Computing, IoT and OT Hacking

  • Briefs about the basic concepts of cloud computing
  • Explain the importance of container technology and serverless computing in cloud environment
  • Lists and Explain various cloud computing threats and attacks
  • Introduction to IoT concepts Explain various IoT challenges and security problems
  • List and explain various IoT threats and attack surface areas
  • Discuss about IoT attacks in different sectors and Explain the IoT hacking methodology
WEEK 8

Module 15: Cryptography & Hacking Wireless Networks

  • Introduction to cryptography concepts
  • Explain various encryption algorithms and hashing algorithms with examples
  • Lists and features various cryptography tools
  • Explain Public Key Infrastructure (PKI) and its components
  • Explain wireless concepts
  • Discusses the types of wireless encryption and their working
  • Lists and Explain various wireless threats
  • Describes wireless hacking methodology

Module 16: Hacking Mobile Platforms

  • Introduction to mobile security
  • Discusses Android OS concepts briefly and demonstrates hacking
  • Android OS using various tools
  • Discusses iOS concepts briefly and demonstrates jailbreaking and hacking iOS using various tools
  • Explain about mobile device management and solutions for mobile device management
  • Provides brief knowledge on mobile security guidelines and lists various mobile security tools
  • Explain various mobile platform risks and anatomy of a mobile attack
  • Discuss various mobile platform attack vectors and vulnerabilities
  • Discuss security issues arising from App stores
WEEK 9

Mock CEH Exam

WEEK 10

Capstone Project Presentation, Review and Feedback

Ajuyah Tosan Omatsola

Process Engineer
Prima Corporation Limited

Speak To a Learning Advisor
Speak To a Learning Advisor Form - Online

Come with expectations

100% Live Online Classes

You’ll be taught and mentored by some of the best teachers in the industry.

100% Instructor-Led classes

You will be taught & mentored by Industry expert.

Certificate

Get your very own physical certificate to prove your participation

Support System

Become part of an ever-growing, supportive community of like minds

Hands on Assignment

Grow with individual assignment feedback from your instructor.

Community Discussion

In app forum to collaborate with your peers.

Project Based Training

An hands-on approach to horn the skill you have learnt.

Success Stories

FAQs

Our program is 100% online, Live training program within the comfort of your home. However, if you are interested in our physical program click here.

A typical program at Univelcity runs for 3 Months, while our Fullstack program runs for 6 Months.

We are at No. 42 Montgomery Road, Yaba, Lagos (Adepate House).

Yes, we have evening classes. This class is structured best to suit individuals who have busy weekends.

The online classes are held every Saturday of the week 10 AM – 1 PM and Sunday 2PM – 5PM or 5PM – 8PM. We recommend this program if you are unavailable during the weekdays but would love to still learn an IT skill

Yes, you can. To join the waiting list, kindly apply for your desired course and get to let us know which cohort you intend to enroll for. We will get in touch with you.

You will see the dates for our next cohorts on your desired course of interest page. Feel free to reach out to us should you require clarifications. We will be happy to answer any questions and get in touch with you as soon as applications are open for another cohort.

Yes, you will be requiring a laptop. All our classes are hands-on and very practical.

Visit our FAQ Page for more help

Cybersecurity (Ethical Hacking)

Learn the basics of Cybersecurity and how you can protect networks and yourself online today. Start your training for a career in Cybersecurity today.

Download the Syllabus

DOWNLOAD SYLLABUS - ONLINE

We are delighted to give you a peep into our packages. Kindly provide your details below after which you’ll be able to download our syllabus.