Certified Ethical Hacker
Duration
10 Weeks
Level
Not Specified
Total Credits
N/A
SAQA ID
Pending
Delivery Mode
Online
Qualification Details
Introduction
To catch a sophisticated hacker, you must first learn to think exactly like one. Our Certified Ethical Hacker (CEH) programme is an aggressive, high-stakes immersion into the mindset, tools, and methodology of the modern cyber-adversary. This course is for the 'Frontline Warriors' who want to physically test and strengthen the security of enterprise networks using the exact same tools as malicious actors—but strictly for the force of good.
Learners will master the five critical phases of ethical hacking: reconnaissance, scanning, gaining access, maintaining access, and clearing tracks. The curriculum heavily emphasizes 'Offensive Security,' teaching you how to bypass firewalls, crack complex encryption, and exploit zero-day vulnerabilities in web applications and mobile devices before they can be weaponized. You will explore the dark intricacies of social engineering and wireless hacking, ensuring no part of your organization is undefended.
Rules & Curriculum
Purpose of the Learning Programme
To produce the elite 'Guardians of Infrastructure' and offensive-security experts. The primary purpose of this track is to equip professionals with the rare, highly-sought-after capability to identify and patch security vulnerabilities in real-time.
To master the complex art of 'Mindset Conversion.' We aim to train professionals who can move beyond passive defense to think exactly like a sophisticated adversary, ensuring that every organizational defense is physically tested for resilience.
Curriculum Breakdown
Orientation & Student Portal Onboarding
Mandatory setup: Email, Portal, Labs & PoE guidelines.
Legal Frameworks & Ethics (POPIA)
Comprehensive mastery and practical application of legal frameworks & ethics (po...
Reconnaissance & Footprinting
Comprehensive mastery and practical application of reconnaissance & footprinting...
Scanning & Enumeration
Comprehensive mastery and practical application of scanning & enumeration aligni...
System Hacking & Malware
Comprehensive mastery and practical application of system hacking & malware alig...
Web App & Wireless Hacking
Comprehensive mastery and practical application of web app & wireless hacking al...
WIL: Penetration Test Report & Remediation
Comprehensive mastery and practical application of wil: penetration test report...
Total Investment
Career Fields
-
Ethical Hacker/Penetration Tester
Advance your career as a Ethical Hacker/Penetration Tester in the industry.
-
Security Analyst
Advance your career as a Security Analyst in the industry.
-
Vulnerability Assessor
Advance your career as a Vulnerability Assessor in the industry.
-
Cybersecurity Consultant
Advance your career as a Cybersecurity Consultant in the industry.
-
Red Team Operator
Advance your career as a Red Team Operator in the industry.
-
Security Audit Specialist
Advance your career as a Security Audit Specialist in the industry.
-
Threat Intelligence Analyst
Advance your career as a Threat Intelligence Analyst in the industry.
Practical Labs
Lab 1: Reconnaissance with Nmap & Shodan
Scan targets and enumerate services. Deliverable: Scan report + service inventory.
Lab 2: Vulnerability Scanning Lab
Use Nessus/OpenVAS to identify weaknesses. Deliverable: Vulnerability report + CVSS scores.
Lab 3: Exploitation Simulation (Metasploit)
Gain controlled access to test system. Deliverable: Exploit log + post-exploitation notes.
Lab 4: Penetration Test Report Writing
Document findings and remediation steps. Deliverable: Professional pentest report excerpt.