Loading...
Verify Certificate +27 21 1097 366 +27 70 5422 373 +27 69 2719 901 apply@softkingsacademy.co.za
Background
SK Academy

Certified Ethical Hacker

Duration

10 Weeks

Level

Not Specified

Total Credits

N/A

SAQA ID

Pending

Delivery Mode

Online

Qualification Details

Introduction

To catch a sophisticated hacker, you must first learn to think exactly like one. Our Certified Ethical Hacker (CEH) programme is an aggressive, high-stakes immersion into the mindset, tools, and methodology of the modern cyber-adversary. This course is for the 'Frontline Warriors' who want to physically test and strengthen the security of enterprise networks using the exact same tools as malicious actors—but strictly for the force of good.

Learners will master the five critical phases of ethical hacking: reconnaissance, scanning, gaining access, maintaining access, and clearing tracks. The curriculum heavily emphasizes 'Offensive Security,' teaching you how to bypass firewalls, crack complex encryption, and exploit zero-day vulnerabilities in web applications and mobile devices before they can be weaponized. You will explore the dark intricacies of social engineering and wireless hacking, ensuring no part of your organization is undefended.


Rules & Curriculum

Purpose of the Learning Programme

To produce the elite 'Guardians of Infrastructure' and offensive-security experts. The primary purpose of this track is to equip professionals with the rare, highly-sought-after capability to identify and patch security vulnerabilities in real-time.

To master the complex art of 'Mindset Conversion.' We aim to train professionals who can move beyond passive defense to think exactly like a sophisticated adversary, ensuring that every organizational defense is physically tested for resilience.


Curriculum Breakdown

00

Orientation & Student Portal Onboarding

Mandatory setup: Email, Portal, Labs & PoE guidelines.

01

Legal Frameworks & Ethics (POPIA)

Comprehensive mastery and practical application of legal frameworks & ethics (po...

02

Reconnaissance & Footprinting

Comprehensive mastery and practical application of reconnaissance & footprinting...

03

Scanning & Enumeration

Comprehensive mastery and practical application of scanning & enumeration aligni...

04

System Hacking & Malware

Comprehensive mastery and practical application of system hacking & malware alig...

05

Web App & Wireless Hacking

Comprehensive mastery and practical application of web app & wireless hacking al...

06

WIL: Penetration Test Report & Remediation

Comprehensive mastery and practical application of wil: penetration test report...

Total Investment

R 10,000
Deposit: R 799
  • Next Intake Anytime
  • Facilitator SKA AI Tutor
Apply Now Download Prospectus

Career Fields

  • Ethical Hacker/Penetration Tester

    Advance your career as a Ethical Hacker/Penetration Tester in the industry.

  • Security Analyst

    Advance your career as a Security Analyst in the industry.

  • Vulnerability Assessor

    Advance your career as a Vulnerability Assessor in the industry.

  • Cybersecurity Consultant

    Advance your career as a Cybersecurity Consultant in the industry.

  • Red Team Operator

    Advance your career as a Red Team Operator in the industry.

  • Security Audit Specialist

    Advance your career as a Security Audit Specialist in the industry.

  • Threat Intelligence Analyst

    Advance your career as a Threat Intelligence Analyst in the industry.

Practical Labs

Lab 1: Reconnaissance with Nmap & Shodan

Scan targets and enumerate services. Deliverable: Scan report + service inventory.

Lab 2: Vulnerability Scanning Lab

Use Nessus/OpenVAS to identify weaknesses. Deliverable: Vulnerability report + CVSS scores.

Lab 3: Exploitation Simulation (Metasploit)

Gain controlled access to test system. Deliverable: Exploit log + post-exploitation notes.

Lab 4: Penetration Test Report Writing

Document findings and remediation steps. Deliverable: Professional pentest report excerpt.