Ethical Hacking Professional (EHP)

ADDRESSED TO

This course is aimed at students, auditors, security analysts, consultants, IT professionals, and anyone interested in cybersecurity. It is also ideal for those involved in internal control, risk management, or anyone seeking to understand and apply ethical hacking techniques to protect digital assets and prevent security breaches.

PURPOSE​

The purpose of this certification is to equip participants to conduct professional and ethical penetration tests (Pentests) by applying structured methodologies to:

  • Understand the key concepts, types, and phases of ethical hacking.
  • Identify and exploit system vulnerabilities in controlled environments.
  • Use professional tools and frameworks (e.g., Nmap, Metasploit, Nessus).
  • Analyze the impact of social engineering and implement prevention strategies.
  • Produce executive and technical reports with clear findings and mitigation recommendations.
  • Become a high-value professional in one of the most in-demand cybersecurity roles.

MAIN TOPICS

The course is structured into eight core units covering all critical areas of ethical hacking:

1. Fundamentals of Pentesting and Ethical Hacking

  • What is a hacker? Types and classifications.
  • Hacking vs. ethical hacking.
  • Introduction to Pentesting: phases, methodologies, and testing types.
  • Frameworks: PETS, OWASP, MITRE ATT&CK.
  • Security tools: IDS, VPN, firewalls, honeypots, SIEM, backup, and recovery.

2. Social Engineering

  • History and fundamentals of social engineering.
  • Types: phishing, spear phishing, vishing, smishing, whaling, baiting, scareware, pretexting.
  • Common channels and attack methods.
  • Prevention and control measures: awareness, training, phishing campaigns.

3. Passive and Active Reconnaissance

  • Passive reconnaissance: OSINT, Google Hacking, DNS collection, Whois, Shodan.
  • Active reconnaissance: network scanning and enumeration, open ports, service detection.

4. Network Scanning and Analysis

  • Network analysis tools: Ping, Traceroute, ICMP, TCP flags, and handshakes.
  • Lab setup: installing VMware, Kali Linux, Metasploitable 2 and 3.
  • Using Nmap: basic and advanced scans, OS detection, firewall evasion, performance tuning.

5. Vulnerability Analysis

  • Understanding vulnerabilities and CVSS scoring.
  • Automated scanning with Nessus and ZAP.
  • Manual scanning using Nmap scripts.

 6. Exploitation

  • Using Metasploit: basic commands, exploit search, executing meterpreter sessions.

7. Attack Techniques

  • Types of attacks: malware, spoofing, man-in-the-middle, DDoS, SQL injection, phishing, etc.

8. Reporting and Findings

  • How to write professional executive and technical reports.
  • Communicating findings with actionable mitigation recommendations.

Details​

Duration:

60 min

Number of questions:

40 Preguntas

Minimum passing:

80%

Available languages:

English, Spanish, Portuguese

Pre Requirements:

No

Third chance (free):​

SI
Take your exam online.

$150.00

en_US

Do you want to log out?

Verification

   This course is NOT 15081 verified


   Issued by


This user is NOT verified


   VERIFIED