Skip to content
Play overlay
Preview this course

Certificate in Ethical Hacking & Cyber Security - CPD Certified

Linux | Python | Bash | Powershell Basics | Networking | Ethical Hacking | Cyber Security


Skill Arts

Summary

Price
Save 14%
£12 inc VAT (was £14)
Offer ends 31 May 2024
Study method
Online, On Demand What's this?
Duration
12 hours · Self-paced
Qualification
No formal qualification
Certificates
  • CPDQE Certificate on Ethical Hacking & Cyber Security - Free
  • Reed Courses Certificate of Completion - Free
Additional info
  • Tutor is available to students

28 students purchased this course

Add to basket or enquire

Overview

Why Study This Ethical Hacking & Cyber Security Diploma?

  • 12% increase in ethical hacking job vacancies in the UK in the past year.
  • Average salary for an ethical hacker in the UK is £60,000.
  • Ethical hacking is ranked as one of the top 10 in-demand cybersecurity skills in the UK.
  • The global ethical hacking market is expected to reach $5 billion by 2031.

Learning Outcomes:

  • Acquire mastery in Networking Basics essential for Ethical Hacking.
  • Set up an Ethical Hacking Lab compliant with cyber security norms.
  • Understand Linux, Python, Bash, and Powershell within the context of Ethical Hacking.
  • Gain expertise in remaining anonymous on the web for Ethical Hacking purposes.
  • Be proficient in Website and Web Application Hacking, broadening their cybersecurity and Ethical Hacking capabilities.

CPDQE Accreditation

This Ethical Hacking & Cyber Security Diploma is CPDQE accredited. CPD is a globally recognised parameter for continuous professional development acknowledged by thousands of professional bodies, employers and academic institutions in the UK and around the world.

Dual Certificates

After completing this Ethical Hacking & Cyber Security Diploma, you will receive a course completion certificate from Reed. Also, you will receive a CPDQE-accredited signed certificate from SkillArts.

Student Testimonials on Our Ethical Hacking & Cyber Security Diploma!

★★★★★ Reviewed by Matthew Bishop
★★★★☆ Reviewed by Shahid Kassim
★★★★☆ Reviewed by Alex Elliott
★★★★ Reviewed by OAGENG THULAGANYO

Curriculum

16
sections
107
lectures
12h 1m
total
    • 2: Ethical Hacking: Course Overview 08:23
    • 3: Ethical Hacking: About Your Instructors 02:31
    • 4: Ethical Hacking: Section Overview 03:20
    • 5: Ethical Hacking: Current Cybersecurity Market 08:39
    • 6: Ethical Hacking: The 3 Types of Hackers 04:50
    • 7: Ethical Hacking: The 4 Elements of Security 04:06
    • 8: Ethical Hacking: Ethical Hacking Terminology 03:45
    • 9: Ethical Hacking: Common Methods of Hacking 07:52
    • 10: Ethical Hacking: Cyber Security 02:31
    • 11: Ethical Hacking: Ethical Hacking vs Pentration Testing 05:57
    • 12: Ethical Hacking: Jobs Opportunities in Cybersecurity 01:25
    • 13: Ethical Hacking: Who's This Course For 01:15
    • 14: Ethical Hacking: Networking Section Overview 11:57
    • 15: Ethical Hacking: How Data Travels Across The Internet 01:39
    • 16: Ethical Hacking: Understanding Ports and Protocols 08:23
    • 17: Ethical Hacking: Public _ Private IP_s Overview 02:14
    • 18: Ethical Hacking: What Are Subnets 02:58
    • 19: Ethical Hacking: The Average Network vs Remote Based 05:33
    • 20: Care for a feedback? 01:00 PDF
    • 21: Ethical Hacking: Hacking Lab Section Overview 08:43
    • 22: Ethical Hacking: Understanding Virtual Machines 03:22
    • 23: Ethical Hacking: Setup Your Kali Linux Machine 09:33
    • 24: Ethical Hacking: VN Setup _ Testing Vulnerable Systems 23:09
    • 25: Ethical Hacking: Linux+Python+Bash+Powershell Basics Overview 05:38
    • 26: Ethical Hacking: Linux Basics 10:34
    • 27: Ethical Hacking: Working With Directories _ Moving Files 02:46
    • 28: Ethical Hacking: Installing _ Updating App Files 02:03
    • 29: Ethical Hacking: Linux Text Editors 04:28
    • 30: Ethical Hacking: Searching For Files 02:17
    • 31: Ethical Hacking: Bash Scripting 09:02
    • 32: Ethical Hacking: Python Basics 10:38
    • 33: Ethical Hacking: Remaining Anonymous Section Overview 06:02
    • 34: Ethical Hacking: TOR Browser Overview 05:31
    • 35: Ethical Hacking: Anonsurf Overview 03:15
    • 36: Ethical Hacking: Changing Mac Addresses 02:42
    • 37: Ethical Hacking: Using a Virtual Private Network _ Server (VPN, VPS) 04:19
    • 38: Ethical Hacking: WiFi Hacking Section Overview 05:39
    • 39: Ethical Hacking: Wifi Hacking System Setup 09:28
    • 40: Ethical Hacking: WEP Hacking Attack #1 08:31
    • 41: Ethical Hacking: WEP Hacking Attack #2 04:26
    • 42: Ethical Hacking: WPA _ WPA2 Hacking 10:20
    • 43: Ethical Hacking: Reconnaissance Section Overview 03:58
    • 44: Ethical Hacking: Passive + Active Recon 01:11
    • 45: Ethical Hacking: Recon-ng Overview 14:51
    • 46: Ethical Hacking: Whois Enum 01:59
    • 47: Ethical Hacking: DNS Enumeration Overview 02:07
    • 48: Ethical Hacking: Netcraft DNS Information 02:30
    • 49: Ethical Hacking: Google Hacking Overview 04:48
    • 50: Ethical Hacking: Shodan.io Overview 02:12
    • 51: Ethical Hacking: Securityheaders.com (Analyze HTTPS Headers of website) 01:45
    • 52: Ethical Hacking: Ssllabs.comssltest (Look for SSL issues on website) 02:05
    • 53: Ethical Hacking: Pastebin.com (Sensitive Information) 00:58
    • 54: Ethical Hacking: NMAP Port Scanning (Discover open ports, OS, Services, 15:06
    • 55: Ethical Hacking: Netcat Overview + SMB _ NFS Enumeration 14:06
    • 56: Ethical Hacking: Nikto _ Sparta Web Application Scanner 05:29
    • 57: Ethical Hacking: SMPT Enumeration + Nessus +Openvas Scanners 04:30
    • 58: Ethical Hacking: Launching Attacks Overview 10:18
    • 59: Ethical Hacking: Analyzing Information Gathered 03:30
    • 60: Ethical Hacking: Taking Advantage of Telenet 06:01
    • 61: Ethical Hacking: Searching _ Understanding Exploits 05:46
    • 62: Ethical Hacking: Copy Exploits From Searchsploit 02:51
    • 63: Ethical Hacking: Understanding Exploits 04:25
    • 64: Ethical Hacking: Launching Exploits 24:26
    • 65: Ethical Hacking: Brute Force Attacks 06:53
    • 66: Ethical Hacking: How To Crack Passwords 04:12
    • 67: Ethical Hacking: ARP Spoofing Overview 21:26
    • 68: Ethical Hacking: Introduction To Cryptography 13:30
    • 69: Ethical Hacking: Post Exploitation Section Overview 03:07
    • 70: Ethical Hacking: Privledge Escalation 29:00
    • 71: Ethical Hacking: Transferring Files Within Victim 27:23
    • 72: Ethical Hacking: Installing a Keylogger 02:33
    • 73: Ethical Hacking: Installing a Backdoor 06:30
    • 74: Ethical Hacking: Website _ Web App Hacking Overview 06:08
    • 75: Ethical Hacking: Web Application Scanning 07:51
    • 76: Ethical Hacking: Directory Buster Hacking Tool 02:49
    • 77: Ethical Hacking: Nikto Web App Hacking Tool 03:26
    • 78: Ethical Hacking: SQLmap and SQL Ninja Overview 00:46
    • 79: Ethical Hacking: How To Execute Brute Force Attacks 13:20
    • 80: Ethical Hacking: Using Command Injection 03:21
    • 81: Ethical Hacking: Malicious File Uploads 10:27
    • 82: Ethical Hacking: Local _ Remote File Inclusion 10:12
    • 83: Ethical Hacking: SQL Injection 18:32
    • 84: Ethical Hacking: Using Cross Site Forgery 10:58
    • 85: Ethical Hacking: Cross Site Scripting Overview 12:25
    • 86: Ethical Hacking: Mobile Phone Hacking Section Overview 10:31
    • 87: Ethical Hacking: Mobile Attack Vectors 01:57
    • 88: Ethical Hacking: Mobile Hacking with URL_s 02:02
    • 89: Ethical Hacking: Jail Breaking and Rooting Considerations 00:55
    • 90: Ethical Hacking: Privacy Issues (Geo Location) 00:54
    • 91: Ethical Hacking: Mobile Phone Data Security 02:29
    • 92: Ethical Hacking: Getting Your Name Out There Section Overview 02:09
    • 93: Ethical Hacking: Building A Brand 09:13
    • 94: Ethical Hacking: Personal Branding 13:18
    • 95: Ethical Hacking: Setup Your Website and Blog 11:26
    • 96: Ethical Hacking: Writing a Book 09:52
    • 97: Ethical Hacking: Starting a Podcast 08:14
    • 98: Ethical Hacking: Networking Overview 06:21
    • 99: Ethical Hacking: Making Money Section Overview 01:50
    • 100: Ethical Hacking: Bug Bounty Programs 04:22
    • 101: Ethical Hacking: How To Start Freelancing 10:43
    • 102: Ethical Hacking: How To Start Client Consulting 09:07
    • 103: Ethical Hacking: Potential Salary _ Cybersecurity Roadmap 10:25
    • 104: Ethical Hacking: Book Recomendations 02:32
    • 105: Ethical Hacking: Places to Practice Hacking for Free 03:14
    • 106: Thank You ! 01:00 PDF
    • 107: Ethical Hacking: Final Exam 03:00

Course media

Description

Ethical Hacking & Cyber Security Course Syllabus

  • Cyber Security Fundamentals: Introduction
  • Ethical Hacking: Networking Basics
  • Cyber Security: Data Transmission and Internet Security
  • Ethical Hacking: Ports and Protocols Mastery
  • Cyber Security: IP Addressing Insights
  • Ethical Hacking: Subnetting Techniques
  • Cyber Security: Network Types and Configurations
  • Ethical Hacking: Setting Up a Hacking Lab
  • Cyber Security: Virtual Machine Utilization
  • Ethical Hacking: Kali Linux Mastery
  • Cyber Security: Vulnerability Testing Strategies
  • Ethical Hacking: Linux and Scripting Skills
  • Cyber Security: Linux Command Line Proficiency
  • Ethical Hacking: Bash Scripting Essentials
  • Cyber Security: Python for Ethical Hackers
  • Ethical Hacking: Anonymity and Web Security
  • Cyber Security: TOR and VPN Usage
  • Ethical Hacking: WiFi Security and Penetration Testing
  • Cyber Security: Advanced WiFi Hacking Techniques
  • Ethical Hacking: Reconnaissance Methods
  • Cyber Security: Passive and Active Information Gathering
  • Ethical Hacking: DNS and WHOIS Enumeration
  • Cyber Security: Web Application Penetration Testing
  • Ethical Hacking: SQL Injection and Exploit Techniques
  • Cyber Security: Mobile Hacking and Security Measures

Who is this course for?

  • Ethical Hacker
  • Penetration Tester
  • Cyber security Analyst
  • Cybers ecurity Consultant

This course will pave the way for higher study in the field of Ethical Hacking. You can enrol on higher level Ethical Hacking courses, such as:

  • Level 2 Diploma in Cyber Security (Ethical Hacking)
  • Level 3 Diploma in Cyber Security (Ethical Hacking)
  • Level 4 Diploma in Ethical Hacking and Cyber Security
  • Level 5 Diploma in Ethical Hacking and Cyber Security
  • Level 6 Diploma in Ethical Hacking and Cyber Security
  • Level 7 Diploma in Ethical Hacking and Cyber Security

Questions and answers


No questions or answers found containing ''.


aa asked:

Is this course for beginners?

Answer:

This Certificate in Ethical Hacking & Cyber Security course starts with the basics and then gradually covers more advanced topics. So, you can enrol as we will start from the core.

This was helpful. Thank you for your feedback.

Certificates

CPDQE Certificate on Ethical Hacking & Cyber Security

Digital certificate - Included

Reed Courses Certificate of Completion

Digital certificate - Included

Will be downloadable when all lectures have been completed.

Reviews

4.6
Course rating
91%
Service
91%
Content
96%
Value

FAQs

Study method describes the format in which the course will be delivered. At Reed Courses, courses are delivered in a number of ways, including online courses, where the course content can be accessed online remotely, and classroom courses, where courses are delivered in person at a classroom venue.

CPD stands for Continuing Professional Development. If you work in certain professions or for certain companies, your employer may require you to complete a number of CPD hours or points, per year. You can find a range of CPD courses on Reed Courses, many of which can be completed online.

A regulated qualification is delivered by a learning institution which is regulated by a government body. In England, the government body which regulates courses is Ofqual. Ofqual regulated qualifications sit on the Regulated Qualifications Framework (RQF), which can help students understand how different qualifications in different fields compare to each other. The framework also helps students to understand what qualifications they need to progress towards a higher learning goal, such as a university degree or equivalent higher education award.

An endorsed course is a skills based course which has been checked over and approved by an independent awarding body. Endorsed courses are not regulated so do not result in a qualification - however, the student can usually purchase a certificate showing the awarding body's logo if they wish. Certain awarding bodies - such as Quality Licence Scheme and TQUK - have developed endorsement schemes as a way to help students select the best skills based courses for them.