Download for free
CEH Checklist: Ethical Hacker Methodology
The 5 phases of ethical pentesting detailed with tools and techniques to master.
Presentation
Complete training in ethical hacking and penetration testing with EC-Council CEH certification
Objectives
- Master the 5 phases of ethical pentesting (Reconnaissance → Exploitation)
- Use standard tools: Nmap, Metasploit, Burp Suite, Wireshark
- Identify and exploit web vulnerabilities (OWASP Top 10)
- Conduct network and system penetration tests
- Prepare for and pass the EC-Council CEH exam
Target Audience
- →IT professionals wanting to become pentesters
- →Security analysts and SOC analysts
- →Network and system administrators
- →Offensive security consultants
- →Developers interested in application security
Prerequisites
Strong TCP/IP networking and systems (Windows/Linux) knowledge. System administration or development experience. Security+ or equivalent recommended.
Detailed Program
- •Ethics, legality and pentesting methodology
- •Hacking phases: reconnaissance, scanning, exploitation, post-exploitation
- •Lab environments: Kali Linux, Metasploitable, DVWA
- •Attack surface and threat modeling
Frequently Asked Questions
Prerequisites
Strong TCP/IP networking and systems (Windows/Linux) knowledge. System administration or development experience. Security+ or equivalent recommended.
Target Audience
- →IT professionals wanting to become pentesters
- →Security analysts and SOC analysts
- →Network and system administrators
- →Offensive security consultants
- →Developers interested in application security
Detailed Curriculum
Module 1: Ethical Hacking Fundamentals
- →Ethics, legality and pentesting methodology
- →Hacking phases: reconnaissance, scanning, exploitation, post-exploitation
- →Lab environments: Kali Linux, Metasploitable, DVWA
- →Attack surface and threat modeling
Module 2: Reconnaissance and Scanning
- →OSINT: footprinting, Google dorks, Shodan, theHarvester
- →Network scanning with Nmap: techniques and NSE scripts
- →Enumeration: DNS, SMTP, SNMP, SMB, LDAP
- →Vulnerability scanning: Nessus, OpenVAS
Module 3: System Exploitation
- →Metasploit Framework: modules, payloads, meterpreter
- →Windows attacks: pass-the-hash, Mimikatz, BloodHound
- →Linux attacks: privilege escalation, kernel exploits
- →Antivirus evasion and obfuscation techniques
Module 4: Web and Application Hacking
- →OWASP Top 10: SQL injection, XSS, CSRF, SSRF
- →Burp Suite: interception, scanning, intruder
- →REST and GraphQL API attacks
- →Session security and authentication
Module 5: Advanced Attacks
- →Network attacks: MITM, ARP spoofing, DNS poisoning
- →Wireless attacks: WPA2 cracking, Evil Twin
- →Social engineering and phishing
- →Cryptanalysis and password cracking
Expected Outcomes
Master the 5 phases of ethical pentesting (Reconnaissance → Exploitation)
Use standard tools: Nmap, Metasploit, Burp Suite, Wireshark
Identify and exploit web vulnerabilities (OWASP Top 10)
Conduct network and system penetration tests
Prepare for and pass the EC-Council CEH exam
Companies in Dakar using this training
- Sonatel (Orange) - Awareness training for 500+ employees
- CBAO Attijariwafa Bank Group - Ongoing certification program
- Société Générale Senegal - Security audit and custom training
- CTIC Dakar startups - Monthly group training sessions
Regulatory Compliance
Law 2008-12 on personal data protection, CDP (Data Protection Commission), Senegal National Cybersecurity Strategy, APDP (Personal Data Protection Authority), UEMOA cybersecurity directive
FAQs
Ready to get started?
Next session in Dakar
February 26, 2026