Download for free
CEH Checklist: Ethical Hacker Methodology
The 5 phases of ethical pentesting detailed with tools and techniques to master.
Presentation
Complete training in ethical hacking and penetration testing with EC-Council CEH certification
Objectives
- Master the 5 phases of ethical pentesting (Reconnaissance → Exploitation)
- Use standard tools: Nmap, Metasploit, Burp Suite, Wireshark
- Identify and exploit web vulnerabilities (OWASP Top 10)
- Conduct network and system penetration tests
- Prepare for and pass the EC-Council CEH exam
Target Audience
- →IT professionals wanting to become pentesters
- →Security analysts and SOC analysts
- →Network and system administrators
- →Offensive security consultants
- →Developers interested in application security
Prerequisites
Strong TCP/IP networking and systems (Windows/Linux) knowledge. System administration or development experience. Security+ or equivalent recommended.
Detailed Program
- •Ethics, legality and pentesting methodology
- •Hacking phases: reconnaissance, scanning, exploitation, post-exploitation
- •Lab environments: Kali Linux, Metasploitable, DVWA
- •Attack surface and threat modeling
Frequently Asked Questions
Prerequisites
Strong TCP/IP networking and systems (Windows/Linux) knowledge. System administration or development experience. Security+ or equivalent recommended.
Target Audience
- →IT professionals wanting to become pentesters
- →Security analysts and SOC analysts
- →Network and system administrators
- →Offensive security consultants
- →Developers interested in application security
Detailed Curriculum
Module 1: Ethical Hacking Fundamentals
- →Ethics, legality and pentesting methodology
- →Hacking phases: reconnaissance, scanning, exploitation, post-exploitation
- →Lab environments: Kali Linux, Metasploitable, DVWA
- →Attack surface and threat modeling
Module 2: Reconnaissance and Scanning
- →OSINT: footprinting, Google dorks, Shodan, theHarvester
- →Network scanning with Nmap: techniques and NSE scripts
- →Enumeration: DNS, SMTP, SNMP, SMB, LDAP
- →Vulnerability scanning: Nessus, OpenVAS
Module 3: System Exploitation
- →Metasploit Framework: modules, payloads, meterpreter
- →Windows attacks: pass-the-hash, Mimikatz, BloodHound
- →Linux attacks: privilege escalation, kernel exploits
- →Antivirus evasion and obfuscation techniques
Module 4: Web and Application Hacking
- →OWASP Top 10: SQL injection, XSS, CSRF, SSRF
- →Burp Suite: interception, scanning, intruder
- →REST and GraphQL API attacks
- →Session security and authentication
Module 5: Advanced Attacks
- →Network attacks: MITM, ARP spoofing, DNS poisoning
- →Wireless attacks: WPA2 cracking, Evil Twin
- →Social engineering and phishing
- →Cryptanalysis and password cracking
Expected Outcomes
Master the 5 phases of ethical pentesting (Reconnaissance → Exploitation)
Use standard tools: Nmap, Metasploit, Burp Suite, Wireshark
Identify and exploit web vulnerabilities (OWASP Top 10)
Conduct network and system penetration tests
Prepare for and pass the EC-Council CEH exam
Companies in Austin using this training
- Dell Technologies - Awareness training for 500+ employees
- IBM - Ongoing certification program
- Oracle - Security audit and custom training
- Capital Factory startups - Monthly group training sessions
Regulatory Compliance
Texas Privacy Protection Act, HIPAA (healthcare), SOX (public companies), GLBA (financial services), CMMC (defense), SEC cybersecurity disclosure rules, SOC 2 and ISO 27001 for tech sector
FAQs
Ready to get started?
Next session in Austin
March 3, 2026