ETHICAL HACKING
Mastering Offensive Security Techniques to Strengthen Cyber Defenses
Course Schedule
| Date | Venue | Fees (Face-to-Face) |
|---|---|---|
| 23 – 25 Jun 2026 | Doha, Qatar | USD 2495 per delegate |
Course Introduction
As cyber threats continue to escalate in scale and sophistication, organizations must move beyond reactive defenses and adopt proactive cybersecurity measures. Ethical hacking—also known as penetration testing—equips professionals with the skills to think like attackers and uncover vulnerabilities before malicious actors can exploit them.
This 3-day course provides a hands-on introduction to ethical hacking techniques, tools, and best practices. Participants will simulate real-world cyberattacks, conduct penetration tests, and learn how to ethically assess networks, systems, and applications. The training is aligned with global standards and frameworks including CEH, NIST, and OWASP.
Course Objectives
By the end of this course, participants will be able to:
• Understand the principles and legal frameworks of ethical hacking
• Perform reconnaissance and footprinting using open-source intelligence (OSINT)
• Conduct vulnerability scanning and exploit common weaknesses
• Simulate attacks on web applications, networks, and wireless systems
• Generate penetration test reports with actionable recommendations
Key Benefits of Attending
• Enhance your cybersecurity readiness with offensive security techniques
• Identify and fix vulnerabilities before attackers do
• Gain hands-on experience with ethical hacking tools and environments
• Learn to conduct professional penetration testing exercises
• Support compliance with cybersecurity standards and policies
Intended Audience
This program is designed for:
• IT security and network administrators
• Cybersecurity analysts and SOC team members
• IT auditors and risk managers
• Compliance officers and governance professionals
• Anyone preparing for CEH or related ethical hacking certifications
Individual Benefits
Key competencies that will be developed include:
• Vulnerability identification and risk assessment
• Ethical hacking tools and scripting basics
• Knowledge of attack vectors and countermeasures
• Technical reporting and mitigation planning
• Understanding attacker behavior and methodology
Organization Benefits
Upon completing the training course, participants will demonstrate:
• Improved ability to assess and secure IT infrastructure
• Enhanced incident response preparation and testing
• Compliance with cybersecurity frameworks and policies
• Reduced risk of data breaches and system compromise
• Stronger internal capability for penetration testing
Instructional Methdology
The course follows a blended learning approach combining theory with practice:
• Expert Briefings – Penetration testing methodology and frameworks
• Live Demonstrations – Exploits, tools, and real-time simulations
• Hands-On Labs – Kali Linux, Metasploit, Nmap, Burp Suite, Wireshark
• Group Exercises – Attack surface mapping and vulnerability ranking
• Reporting Templates – Pen test findings and remediation planning
Course Outline
Training Hours: 7:30 AM – 3:30 PM
Daily Format: 3–4 Learning Modules | Coffee Breaks: 09:30 & 11:15 | Lunch Buffet: 01:00 – 02:00
Day 1: Foundations of Ethical Hacking
- Module 1: Introduction to Ethical Hacking and Legal Considerations (07:30 – 09:30)
• Types of hackers, white-hat vs black-hat ethics
• Legal boundaries and responsible disclosure - Module 2: Reconnaissance and Information Gathering (09:45 – 11:15)
• OSINT, DNS enumeration, WHOIS, social engineering
• Target profiling and network footprinting - Module 3: Scanning and Vulnerability Assessment (11:30 – 01:00)
• Port scanning with Nmap
• Vulnerability detection tools: Nessus, OpenVAS - Module 4: Workshop – Perform Target Recon and Scan (02:00 – 03:30)
• Hands-on scan using Kali Linux environment
Day 2: Exploitation Techniques and System Hacking
- Module 5: Network and Service Exploitation (07:30 – 09:30)
• TCP/IP stack, sniffing, MITM, spoofing
• Metasploit framework basics - Module 6: Password Cracking and Privilege Escalation (09:45 – 11:15)
• Hash dumping, rainbow tables, brute-force tools
• Linux and Windows privilege escalation - Module 7: Web Application and Wireless Attacks (11:30 – 01:00)
• SQL injection, XSS, CSRF, session hijacking
• Wi-Fi sniffing, cracking WPA2, rogue APs - Module 8: Workshop – Simulate an Attack and Escalate Access (02:00 – 03:30)
• Group exercise using vulnerable lab machines
Day 3: Reporting, Defense, and Best Practices
- Module 9: Covering Tracks and Maintaining Access (07:30 – 09:30)
• Log manipulation, rootkits, backdoors
• Detection avoidance and evasion techniques - Module 10: Defensive Strategies and Countermeasures (09:45 – 11:15)
• Patching, segmentation, IDS/IPS, endpoint hardening
• Defense-in-depth architecture - Module 11: Writing a Penetration Test Report (11:30 – 01:00)
• Structuring findings, impact assessment, and recommendations
• Executive summaries vs technical details - Module 12: Final Lab – Conduct a Full Ethical Hack & Present Report (02:00 – 03:30)
• Group capstone project and feedback session
Certification
Participants will receive a Certificate of Completion in Ethical Hacking, validating their ability to assess vulnerabilities, perform ethical hacking activities, and support organizational cybersecurity resilience in line with global standards.