Ethical Hacking Foundation

The basics of ethical hacking to combat malicious hackers

Requirements:
  • General theoretical knowledge of IT

This program is intended for everyone involved in IT security. The course concludes with the internationally recognized Ethical Hacker Foundation certification.

The benefit for graduates is a stronger position on the labor market and better salary conditions. Take the first step with us into an ever-growing industry that is dynamically changing and requires the latest knowledge.

The most common graduates are:

  • IT, Security and Project Managers

  • Web application developers, developers

  • IT auditors, Security specialists, Testers

What will you learn

More information
  • Test Request Entry Process
  • Ethical Hacking Skills For Security
  • Prepare the environment for testing
  • You will gain awareness about System Penetration, Network Sniffing, Web-based Hacking

Terms

Currency
Term
Place
Length
Language
Price without VAT

No results match the specified filters

Loading...

Do you want this course individually?

Let us know!

This course can be customized - either as an individual training 1:1 or for your team. Just leave us your contact and we will contact you with options tailored to your needs.

Successfully sent

We will contact you.

Timeline

1st Day

09:00 – 10:30 Introduction
  • Types of Hackers
  • Legislation and hacking
10:30 – 10:45 Coffee Break
10:45 – 12:15
  • Types of testing
12:15 – 13:15 Lunch break
13:15 – 14:45 Hacking
  • The process of submitting a test request
14:45 – 15:00 Coffee Break
15:00 – 17:00 Hacking Lab
  • Preparing the environment for testing - lab

2nd Day

09:00 – 10:30 Network Sniffing I.
  • MITM attack
10:30 – 10:45 Coffee Break
10:45 – 12:15 Network Sniffing II.
  • Other attacks
12:15 – 13:15 Lunch Break
13:15 – 14:45 Wifi Network
  • WEP, WPA, WPA2
  • Hide wifi network
  • MAC address protection
14:45 – 15:00 Coffee Break
15:00 – 17:00 Wifi Hacking
  • A practical exercise on how to work around the above

3rd Day

09:00 – 10:30 System Penetration
  • Vulnerabilities
10:30 – 10:45 Coffee Break
10:45 – 12:15 System Penetration
  • Exploitation
12:15 – 13:15 Lunch Break
13:15 – 14:45 Web based hacking
  • OWASP TOP 10
14:45 – 15:00 Coffee Break
15:00 – 17:00 Exam
  • Certification
  • Block length 90
  • Teaching hours 24
  • Refreshments Yes
  • Exam Yes

We'll teach you to think like a hacker. You will try a simulated attempt to break into systems and applications under the guidance of experienced trainers and security specialists with 21 years of experience. You will be able to thoroughly test the security level of your network using a simulated ethical hacking attack method.

The certification exam takes place on the last day of the course. Candidates attending the course as a virtual classroom will also take the certification exam online.

Prestigious certification included

Ethical Hacking Foundation

The Ethical Hacking Foundation by ATO TAYLLORCOX certification provides IT professionals with a thorough understanding and technical knowledge of the principles behind ethical hacking.

The training program covers the basic steps of ethical hacking: intelligence gathering, scanning computer networks / systems and penetrating systems. Candidates are expected to be very aware of the difference between legal and illegal hacking and the consequences of misuse.

Certification instructions

Exam format

Formát zkoušky

The exam focuses on the various methods used to test and determine the security of an organization's IT infrastructure.

Time limit: 1 hour

Open Book Policy: No

Exam language: Czech

Number of questions: 40

Pass mark: 50% (20 points)

Frequently asked questions

All questions

Who is a white hacker?

A white hacker is a person who performs security testing, penetration testing, and other forms of security analysis to discover and fix vulnerabilities and weaknesses in systems, applications, and networks.

Unlike black hackers (hackers who focus on illegal activities such as data theft, malicious hacking, etc.), a white hacker works in accordance with laws and ethical standards.