Ethical Hacking Specialization (5 Days)

by Tertiary Courses Malaysia Claim Listing

Dive into the world of cybersecurity with our 5 days ethical hacking specialisation, a meticulously designed course to foster the next generation of ethical hackers. This program offers an immersive experience, ensuring that participants acquire critical skills in identifying vulnerabilities, securi

$5000

Contact the Institutes

Fill this form

Advertisement

Tertiary Courses Malaysia Logo

img Duration

5 Days

Course Details

Dive into the world of cybersecurity with our 5 days ethical hacking specialisation, a meticulously designed course to foster the next generation of ethical hackers. This program offers an immersive experience, ensuring that participants acquire critical skills in identifying vulnerabilities, securing networks, and defending against cyber threats. 

The curriculum is tailored to provide a comprehensive understanding of ethical hacking fundamentals, including the latest tools and techniques used in the industry. Whether you're a beginner or looking to upgrade your existing skills, this course is structured to cater to varying levels of expertise.

Throughout the duration of the course, learners will be engaged in practical, real-world scenarios, simulating the challenges faced by today’s cybersecurity professionals. Emphasis is placed on hands-on learning, with opportunities to apply theoretical knowledge to practical exercises. The course culminates with a project that allows participants to demonstrate their newfound skills in a controlled environment. 

Upon completion, graduates of the program will be equipped with the expertise needed to tackle contemporary cyber threats and will be prepared to take on roles as competent, ethical hackers in the rapidly evolving digital landscape.

Certificate

  • All participants will receive a Certificate of Completion from Tertiary Courses after achieved at least 75 percent attendance.

Day 1 - Topic 1 Introduction to Ethical Hacking

  • Topic 1.1: Overview of Ethical Hacking Overview
  • Topic 1.2: Footprinting and Reconnaissance
  • Topic 1.3: Scanning Network
  • Topic 1.4: Enumeration

Day 2 - Topic 2 Vulnerability Analysis

  • Topic 2.1: Vulnerability Analysis
  • Topic 2.2: System Hacking
  • Topic 2.3: Malware Analysis
  • Topic 2.4: Sniffers
  • Topic 2.5: Scanning Network

Day 3 - Topic 3 Ethical Hacking Techniques

  • Topic 3.1: Social Engineering
  • Topic 3.2: Denial of Service
  • Topic 3.3: Session Hijacking
  • Topic 3.4: Evading IDS, Firewalls, and Honeypots 

Day 4 - Topic 4 Ethical Hacking on Network and IoT Devices

  • Topic 4.1  Hacking Web Servers and Web Applications
  • Topic 4.2: Wireless Networks
  • Topic 4.3 Mobile Devices and Platforms
  • Topic 4.4 Hacking IoT Devices

Day 5  - Topic 5  Ethical,  Penetration, Cryptography

  • Topic 5.1 Crytography 
  • Topic 5.2: Cloud Computing
  • Topic 5.3: Penetrating Testing

Prerequisite
The learner must meet the minimum requirement below :

  • Read, write, speak and understand English

Target Audience

  • NSF
  • Full Time Students
  • Data Analysts

Software Requirement

  • This course will use Google Colab for training. Please ensure you have a Google account.

Job Rules

  • NSF or Full Time Students
  • Data Analysts
  • Machine Learning Engineers and Developers
  • Kuala Lumpur Branch

    G-3A-02, Corporate Office Suite, KL Gateway, No 2, Jalan kerinchi, Gerbang kernichi Lestari, Kuala Lumpur
  • Teacher's Name
  • Muhammed
  • Teacher's Experience
  • Muhammed Siraj is an IT executive, lecturer, trainer, security expert, developer, hardware technician, and entrepreneur with over 15 years of experience in the IT profession. He is an experienced IT instructor who has delivered several lecturers in the area of Cybersecurity, Computer Forensics, and Fraud detection to the military, police, CID, Financial Institutions, among others. In addition to training, he provides consultancy services to Educational and Governmental Institutions in the area of computer security and adoption of Open Source solutions. His experience and knowledge acquired from Ghana, Mali, Denmark, South Africa, and Malaysia, enables him to interact with people of different cultural backgrounds very well. Skillset: Degrees in IT, Economics, Psychology. Currently pursuing his PhD in Computer Science (Security in Computing field) Certified CEH, CHFI, Hardware repairs and maintenance. Data mining, Office automation, filemaker, Fraud detection, Blockchain, Hardware repairs, Google Power Searcher, Drupal/Laravel/CakePHP developer. Proficient in Python, Ruby, PHP, Java, Solidity, VBA, Google Apps Script, Javascript, HTML, CSS, SQL.
  • Gender
  • Male
  • Teacher's Nationality
  • N/A

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy