CompTIA Ethical Hacker Pro

Grow your cybersecurity skills with this CompTIA Ethical Hacker Pro course. 

Learn More

Docnito's 2 Month Course

Ready for a new start? This course includes 120 hours of training and is worth 6 credits. This training course is designed to equip you with the skills needed to begin your career in the cyber security field.

Why Take a Cyber security Course?

This program was built to help individuals learn how to apply cybersecurity practices to protect systems, data, and networks. As cyber threats evolve daily, it is more crucial than ever for organizations to successfully integrate strong security measures.

Why Choose Docnito?

- This is a transferable Pathway Course. Our partner college, the award winning CanScribe College accepts Docnito course credits allowing you to use this course as a transfer credit to CanScribe College.

- Docnito courses are also asynchronous allowing you to complete the course as fast as you would like and at whatever times you'd like.

- Our courses are 100% online, which means you never have to leave home to attend classes!

About This Course

Learn the Fundamentals in Just 2 Months!

WHAT YOU WILL LEARN

Upon successful completion of this course, the students will be able to gather information about systems and networks and perform reconnaissance using tools such as Nmap and Wireshark. They will identify open ports, services, and vulnerabilities, and conduct network scans to analyze results effectively. Students will learn to exploit vulnerabilities to test defenses, carry out ethical hacking and penetration testing, and assess web application security through SQL injection and cross-site scripting (XSS) tests. They will also evaluate wireless networks for weaknesses and implement secure configurations for access points. Finally, students will document their findings, create comprehensive penetration test reports, and develop actionable recommendations to enhance overall system security.

Check out our tuition page to see how our credits and tuition work.

This program follows an open admission policy and does not require specific academic prerequisites. Applicants are expected to possess basic literacy, numeracy, and computer skills sufficient to participate in course activities. Enrollment is finalized upon completion of the application process and payment of applicable fees.

Chapter 1: Introduction to Ethical Hacking

Chapter 2: Introduction to Penetration Testing

Chapter 3: Social Engineering and Physical Security

Chapter 4: Reconnaissance

Chapter 5: Scanning

Chapter 6: Enumeration

Chapter 7: Analyze Vulnerabilities

Chapter 8: System Hacking

Chapter 9: Malware

Chapter 10: Sniffers, Session Hijacking, and Denial of Service

Chapter 11: IDS, Firewalls, and Honeypots

Chapter 12: Web Servers, Web Applications, and SQL Injections

Chapter 13: Wi-Fi, Bluetooth, and Mobile Devices 

Chapter 14: Cloud Computing and Internet of Things

Chapter 15: Cryptography

Chapter 16: Final Exam

Start Your Training Today!