Certified Professional Hacker +
A unique programme in professional hacking which teaches real skills & deep dives into ethical hacking tools and techniques that are most relevant today.
This Certified Professional Hacker + course stands out in the market as one of its kind. It goes beyond the commonly-covered concepts of port scanning and vulnerability assessments and delves deep into networking, systems, web applications and actual exploitation. If you complete this course, you are sure to emerge as an expert in the really high-demand and high-paying space of ethical hacking. You will also tremendously boost your capabilities as a cybersecurity analyst.
Benefits of choosing this course
Benefits of choosing the Certified Professional Hacker + course
Get access to the most updated and relevant lab setup where you actually get to launch attacks, see the packet flows, analyse them, tweak your attacks, and get to break into systems.
Be trained by real-world ethical hacking experts & become job-ready.
Master key concepts & practical application through case studies and real-world examples.
Highlights of the Certified Professional Hacker + course
Training executed completely by practitioners and led by a well-renowned information security expert.
Coverage of the latest trends in information security such as Advanced Persistent Threats, SCADA Hacking (analysis of Stuxnet), and Mobile Hacking.
Heavy focus on practical aspects and usage of tools and toolkits such as Backtrack, Metasploit, Burp Suite, Kismet, Air-crack Ng.
- Key Learning Objectives
Key Learning Objectives
After completing the Certified Professional Hacker + course, you will be able to:
- Gain an advanced understanding of the latest trends in information security, information security controls, information security policies and information security laws and standards.
- Master Ethical hacking concepts and hacking phases.
- Comprehend and work on Penetration Testing and Vulnerability Assessment.
- Explain what Social Engineering and Reconnaissance is.
- Work with Enumeration and its tools.
- Articulate the importance and concepts of Exploitation and Post-Exploitation.
- Comprehend the concept of Backdooring Host including Trojan, Virus, Malware.
- Enhance your knowledge of OWASP, OWASP Top 10, Significant OWASP Projects.
- Understand and explain the fundamentals of Web Application Scanners, Profiling the Scans, Interpreting Scanner Reports & Open source Tools and Testing Methodologies.
- Develop sound knowledge of the key concepts of Wireless Security and Wireless Security Tools.
- Prepare to work with Cryptography, Steganography, Malware Threats and do Malware Analysis.
- Gear up to work on IoT Attacks in Different Sectors, IoT Security Problems, IoT Hacking Methodology, IoT Pentesting Methodology and Countermeasures.
- Understand the basics of Mobile Security and Cloud Computing and work on Threats, Attacks, Tools and Penetration Testing.
Directly download the full Learning Objectives of the course here
Templates. Worksheets & Mind-maps
When you enrol in this course you will have access to several worksheets & templates that you can use immediately. Take a look at the course curriculum, below, to see whats included in this course.
The image immediately below is a gallery view of some of the templates and collateral available to students.
Continuing Professional Development
CPD points can be claimed for this course at the rate of 1 point per hour of training for this NCSC-certified and CIISec-approved course (8 points for one-day public course and 15 points for the two-day internal workshop - for when organisations host this course internally).
CIPR Student-Only Incident Response Plan Template
As a student you get access to unique content including our highly acclaimed Cyber Incident Response Plan Template. If you want, you can download the FREE version of the Incident Response Plan template here.
- M.1.1.1 Introduction to Information Security and CIA Triad (8:56)
- M.1.1.2 Types of hacker (2:33)
- M.1.1.3 Essential Terms (6:52)
- M.1.1.4 Penetration Testing Vs Ethical Hacking (2:30)
- M.1.1.5 Different Types of Testing (5:05)
- M.1.1.6 Careers_in_Information_Security (4:16)
- M.1.1.7 Legislation_and_Regulations (11:49)
- M.1.2.1 OSI Model (18:47)
- M.1.2.2 TCP IP Model (6:46)
- M.1.2.3 Transmission Control Protocol (TCP) (12:18)
- M.1.2.4 User Datagram Protocol (UDP) (12:18)
- M.1.2.5 IP Fragmentation and Reassembly (3:53)
- M.1.2.6 IPv4 (15:16)
- M.1.2.7 IPv6 (13:46)
- M.1.2.8 Understanding ICMP (5:09)
- M.1.2.9 Understanding ICMP Ping Message (1:38)
- M.1.3.1 Routing (6:50)
- M.1.4.1 Windows NT Architecture and Windows 10 Architecture (24:53)
- M.1.4.2 File System (7:11)
- M.1.4.3 SAM File and System Files (5:38)
- M.1.4.4 Windows Registry (3:23)
- M.1.4.5 Windows Registry (4:19)
- M.1.4.6 Windows Commands (4:37)
- M.1.4.7 Windows Basic Commands (7:54)
- M.1.4.8 Windows Server 2016 Architecture (9:15)
- M.1.4.9 Active Directory (21:48)
- M.1.5.1 Introduction to Unix and Linux (10:46)
- M.1.5.2 File System (13:31)
- M.1.5.3 Linux Commands (7:04)
- M.1.5.4 File Permissions (9:14)
- M.1.5.5 Kali Linux Introduction (1:44)
- M.1.5.6 Kali and Various Linux Commands (8:37)
- M.1.5.7 Kali and Various Linux Commands (2:24)
- M.1 Introduction to Information Security (PDF)
- M.3.1.1 Packet Crafting (3:31)
- M.3.1.1.A Packet Crafting (Lab) (2:04)
- M.3.1.1.B Packet Crafting (Lab) (3:40)
- M.3.1.1.C Packet Crafting (Lab) (2:00)
- M.3.1.1.D Packet Crafting (Lab) (1:00)
- M.3.1.2 Network Mapper Nmap (12:17)
- M.3.1.2.A Network Mapper(Nmap) (Lab) (4:42)
- M.3.1.2.B Network Mapper(Nmap) (Lab) (4:03)
- M.3.1.2.C Network Mapper(Nmap) (Lab) (0:55)
- M.3.1.2.D Network Mapper(Nmap) (Lab) (2:34)
- M.3 Network Scanning (PDF)
- M.5.1.1 Hacking System password Cracking (46:55)
- M.5.1.1.A Password Cracking Lab (Lab) (1:55)
- M.5.1.1.B Password Cracking Lab (Lab) (1:10)
- M.5.1.1.C Password Cracking Lab (Lab) (3:10)
- M.5.1.1.D Password Cracking Lab (Lab) (2:02)
- M.5.1.2 Metasploit Framework (10:36)
- M.5.1.3 Linux Service Exploit (1:25)
- M.5.1.4 Windows Service Exploitation (1:47)
- M.5.1.5 Windows Msfvenom (1:33)
- M.5 Exploitation (PDF)
- M.6.1.1 Introduction to Web Applications (2:28)
- M.6.1.2 Case Studies (17:26)
- M.6.1.3 Web Applications brief (7:41)
- M.6.2.1 Introduction to OWASP TOP 10 (3:25)
- M.6.2.2 Injection and Error based Injection (9:10)
- M.6.2.2.A Injection and Error based Injection (Lab) (6:14)
- M.6.2.3 Authentication Bypass using SQL Injection (1:39)
- M.6.2.3.A Authentication_Bypass_using_SQL_Injection (Lab) (3:20)
- M.6.2.4 Blind Injection using SQLMap (5:05)
- M.6.2.4.A Blind_Injection_using_SQLMap. (Lab) (2:45)
- M.6.2.5 SQL Injection Mitigations Page (10:25)
- M.6.2.6 Command Injection (7:02)
- M.6.2.6.A Command Injection (Lab) (2:08)
- M.6.2.7 Broken Authentication (5:52)
- M.6.2.7.A Brute Force (Lab) (2:53)
- M.6.2.7.B Brute Force (Lab) (3:22)
- M.6.2.8 Session Management (8:39)
- M.6.2.8.A Session Management (2:23)
- M.6.2.9 A3 Sensitive Data Exposure (3:53)
- M.6.2.9.A A3 Sensitive Data Exposure (Lab) (1:45)
- M.6.2.10 A3 Insufficient Transport Layer Security (6:27)
- M.6.2.10.A A3 Insufficient Transport Layer Security (1:12)
- M.6.2.11 A4_XXE (9:30)
- M.6.2.11.A A4_XXE (Lab) (2:10)
- M.6.2.12 A5 Broken Access Control IDOR (5:45)
- M.6.2.12.A A5 Broken Access Control IDOR (Lab) (1:08)
- M.6.2.13 A5 Broken Access Control MFLAC (6:05)
- M.6.2.13.A A5 Broken Access Control MFLAC (Lab) (0:52)
- M.6.2.13.B A5 Broken Access Control MFLAC (Lab) (1:00)
- M.6.2.13.C A5 Broken Access Control MFLAC (Lab) (2:36)
- M.6.2.14 A6 Security Misconfiguration (6:42)
- M.6.2.14.A A6 Security Misconfiguration (Lab) (1:55)
- M.6.2.14.B A6 Security Misconfiguration (Lab) (1:00)
- M.6.2.14.C A6 Security Misconfiguration (Lab) (1:35)
- M.6.2.15 A7 Cross Site Scripting(XSS) (18:42)
- M.6.2.15.A A7 Cross Site Scripting(XSS) (Lab) (3:24)
- M.6.2.16 A8 Insecure Deserialization (4:56)
- M.6.2.17 A9 Using components with Known Vulnerabilities (5:11)
- M.6.2.17.A A9 Using components with Known Vulnerabilities (Lab) (2:03)
- M.6.2.18 A10 Insufficient Logging and Monitoring (4:30)
- M.6.3.1 Browser Based Vulnerabilties (2:58)
- M.6.3.2 Clickjacking (3:01)
- M.6.3.2.A Clickjacking (Lab) (2:16)
- M.6.3.3 POODLE (3:57)
- M.6.3.4 WebDav (3:58)
- M.6.3.5 WASC (3:37)
- M.6.3.6 Security Frameworks (15:05)
- M.6.3.7 SDLC (22:04)
- M.6.3.8 WAF (7:53)
- M.6.3.9 Case Study Penetrating a Bank (3:27)
- M.6.3.10 Content Spoofing (4:37)
- M.6.3.11 Fingerprinting (1:46)
- M.6.3.12 Advance Recon (0:51)
- M.6 WebAppSecurity (PDF)
- M.7.1.1 Introduction and Terminologies (11:58)
- M.7.1.2 WiFi Frames (5:26)
- M.7.1.3 Wireless Hacking Methodology (2:28)
- M.7.1.4 Authentication Methods and Types of WLAN Attacks (2:52)
- M.7.1.5 WEP (4:40)
- M.7.1.6 WPA_WPA-2 (4:38)
- M.7.1.7 Differences in WEP WPA and WPA-2 (7:19)
- M.7.1.8 Bypassing WPA2 using Aircrack-ng (4:29)
- M.7.1.8.A Aircrack-ng Setup (Lab) (1:12)
- M.7.1.8.B WPA2 Bypass Aircrack-ng (Lab) (2:43)
- M.7.1.9 Evil Twin (1:31)
- M.7.1.9.A Evil Twin (Lab) (3:15)
- M.7.1.10 WPA3 and Wi-Fi Guideline (2:02)
- M.7 Wireless Exploitation (PDF)
- M.8.1.1 Introduction to Cryptography (4:22)
- M.8.1.2 Types of Cryptography and Ciphers (7:47)
- M.8.1.3 Public Key Infrastructure (8:16)
- M.8.1.4 Disk Encryption (4:18)
- M.8.1.5 Crypt Analysis (3:39)
- M.8.1.6 Steganography (4:00)
- M.8.1.7 Malware (8:34)
- M.8.1.8 Malware Analysis (2:57)
- M.8 Cryptography Stegnography Malware (PDF)
- M.9.1.1 Android Application Basics (1:03)
- M.9.1.2 Android Application Components (4:34)
- M.9.1.3 Setting Up Android Testing Environment (1:00)
- M.9.1.4 ADB and its Commands (1:46)
- M.9.1.4.A ADB and its Commands (Lab) (1:38)
- M.9.1.4.B ADB and its Commands (Lab) (1:30)
- M.9.1.4.C ADB and its Commands (Lab) (1:40)
- M.9.1.4.D ADB and its Commands (Lab) (1:50)
- M.9.1.5 Application Signing in Android (2:39)
- M.9.1.5.A Application Signing in Android (1:56)
- M.9.1.6 APK File Basics (1:47)
- M.9.1.6.A APK File Basics (Lab) (1:20)
- M.9.1.6.B APK File Basics (Lab) (2:37)
- M.9.1.7 Mobile-OWASP Top 10 Improper Platform Usage (0:31)
- M.9.1.7.A Mobile-OWASP Top 10 Improper Platform Usage (Lab) (3:35)
- M.9.1.8 Mobile OWASP Top 10 Insecure Data Storage (0:38)
- M.9.1.8.A Mobile OWASP Top 10 Insecure Data Storage (Lab) (2:28)
- M.9.1.9 Mobile OWASP Top 10 Insecure Communication (0:17)
- M.9.1.9.A Mobile OWASP Top 10 Insecure Communication (Lab) (1:56)
- M.9.1.10 Mobile OWASP Top 10 Insecure Authentication (0:18)
- M.9.1.10.A Mobile OWASP Top 10 Insecure Authentication (Lab) (1:44)
- M.9.1.11 Mobile OWASP Top 10 Insufficient Cryptography (0:22)
- M.9.1.11.A Mobile OWASP Top 10 Insufficient Cryptography (Lab) (4:31)
- M.9.1.12 Mobile OWASP Top 10 Insecure Authorization (0:19)
- M.9.1.12.A Mobile OWASP Top 10 Insecure Authorization (Lab) (1:28)
- M.9.1.13 Mobile OWASP Top 10 Poor Code Quality (0:18)
- M.9.1.13.A Mobile OWASP Top 10 Poor Code Quality (Lab) (1:44)
- M.9.1.14 Mobile OWASP Top 10 Code Tampering and Reverse Engineering (1:10)
- M.9.1.14.A Mobile OWASP Top 10 Code Tampering and Reverse Engineering (Lab) (5:16)
- M.9.1.15 Mobile OWASP Top 10 Extraneous Functionality (0:23)
- M.9.1.15.A Mobile OWASP Top 10 Extraneous Functionality (Lab) (1:44)
- M.9.1.16 Mobile Application Security Testing (8:21)
- M.9.1.16.A Mobile Application Security Testing (Lab) (3:03)
- M.9.1.16.B Mobile Application Security Testing (Lab) (2:05)
- M.9.1.16.C Mobile Application Security Testing (Lab) (4:20)
- M.9.1.17 Other Vulnerabilities Client Side Injections (1:04)
- M.9.1.17.A Other Vulnerabilities Client Side Injections (Lab) (2:36)
- M.9.1.18 Other Vulnerabilities Logging Based Vulnerabilities (0:54)
- M.9.1.19 Other Vulnerabilities Bypassing SSL Pinning (1:45)
- M.9.1.19.A Other Vulnerabilities Bypassing SSL Pinning (Lab) (3:10)
- M.9.1.20 Other Vulnerabilities Leaking Content Provider (1:07)
- M.9.1.20.A Other Vulnerabilities Leaking Content Provider (Lab) (4:30)
- M.9.1.21 Exploiting Android with Metasploit Framework (0:35)
- M.9 MobileSecurity (PDF)
- M.11.1.1 Introduction to IoT (3:00)
- M.11.1.2 Application and Benefits of IoT (6:15)
- M.11.1.3 Issues with IoT (1:26)
- M.11.1.4 Basic Architecture of IoT (3:19)
- M.11.1.5 Frameworks and Platform for IoT (3:17)
- M.11.1.6 IoT Attack Surface (8:23)
- M.11.1.7 IoT Attack Surface Hardware (2:51)
- M.11 Internet of Things
Sign up and Start Today
Pay-in-full in your local currency (where available)
We take all major forms of payment and we use secure checkout.
Our most popular courses and offers.
Cyber Incident Planning and Response Course
Government Certified, Accredited Course on Planning and Response Strategies to deal with Cyber-Attacks and Cyber Crises
NCSC-Certified CIPR and Playbooks eLearning Bundle
Access two NCSC-Certified Training courses for the price of one. Includes option for an online examination.
Acquiring professional hacking skills is a smart move given the rise in cyber-attacks and ransomware attacks. It is one of the surest ways to stop hackers and ransomware attackers in their tracks. Ransomware preparedness can play a key role in mitigating the damage to your business in case of an attack. Make sure that you also regularly test the effectiveness of your ransomware protection capabilities with a Ransomware Tabletop Exercise.