Compare with 1 courses
Ethical Hacking & Penetration Testing

Ethical Hacking & Penetration Testing

Learn ethical hacking and penetration testing to strengthen your organization's cybersecurity defenses. Master authorized security testing techniques using industry-standard tools in controlled environments with our hands-on SET methodology.

₱4500

₱5000
Learn more
Has discount
Expiry period Lifetime
Made in English
Last updated at Tue Jul 2025
Level
Beginner
Total lectures 1
Total quizzes 0
Total duration 00:07:19 Hours
Total enrolment 1
Number of reviews 0
Avg rating
Short description Learn ethical hacking and penetration testing to strengthen your organization's cybersecurity defenses. Master authorized security testing techniques using industry-standard tools in controlled environments with our hands-on SET methodology.
Outcomes
  • Conduct authorized penetration testing following legal and ethical frameworks
  • Perform comprehensive vulnerability assessments using industry-standard scanning tools
  • Execute network reconnaissance and information gathering within authorized scope
  • Identify and safely exploit common web application vulnerabilities in controlled environments
  • Analyze network security controls and identify potential weaknesses
  • Document security findings and provide actionable remediation recommendations
  • Design and implement security awareness programs to counter social engineering attacks
  • Apply defensive security strategies based on understanding of attack methodologies
  • Use penetration testing tools safely and effectively in authorized environments only
  • Understand legal requirements and professional ethics for cybersecurity testing in the Philippines
Requirements
  • Strong understanding of networking fundamentals (TCP/IP, DNS, HTTP/HTTPS protocols)
  • Basic familiarity with Windows and Linux operating systems
  • Computer with at least 16GB RAM and ability to run virtual machines (for lab environment)
  • Signed ethical hacking agreement acknowledging legal boundaries and authorized use only
  • Commitment to using knowledge only for defensive security purposes and authorized testing
  • Basic understanding of cybersecurity concepts (firewalls, antivirus, encryption basics)