Certified Ethical Hacking & Penetration Testing
Master ethical hacking, penetration testing, vulnerability assessment, exploitation techniques, privilege escalation, malware analysis, network attacks, cryptography, and advanced offensive security methodologies using Kali Linux and real-world cybersecurity labs.
Duration
10 Months / 40 Weeks / 300 Hours
Level
Beginner to Advanced
Modules
16 Modules
Format
Hands-on Labs
What You'll Learn
The Advanced Ethical Hacking & Penetration Testing course is designed for aspiring ethical hackers, penetration testers, cybersecurity professionals, SOC analysts, red teamers, and security researchers who want practical offensive security skills. This course covers Kali Linux fundamentals, ethical hacking methodologies, footprinting, network scanning, enumeration, vulnerability assessment, exploitation, privilege escalation, buffer overflows, malware analysis, sniffing, social engineering, DoS attacks, cryptography, IDS/firewall evasion, and Metasploit framework mastery.
// Prerequisites
- - Basic networking knowledge (TCP/IP, DNS, HTTP)
- - Familiarity with Linux and Windows operating systems
- - Understanding of basic computer security concepts
- - Laptop with 8GB+ RAM for lab environments
$ armour --training ceh-pt --info
[*] Course: Certified Ethical Hacking & Penetration Testing
[*] Duration: 10 Months / 40 Weeks / 300 Hours
[*] Level: Beginner to Advanced
[!] 16 modules | 150 topics
[+] Lab environment: READY
[+] Certification prep: INCLUDED
$ _
Complete Course Modules
Kali Linux Fundamentals
- > Kali Linux History and Introduction
- > Installing Kali Linux
- > Kali Linux GUI Desktops
- > Kali Linux Commands
- > Package Management
- > Managing Repositories
- > User Account Management
- > File Permissions
- > Network Configuration
Introduction to Penetration Testing & Ethical Hacking
- > Hacking Concepts
- > Ethical Hacking Principles
- > Hacker Classes (White/Grey/Black Hat)
- > Hacking Phases
- > CIA Triad
- > Defense in Depth
- > Vulnerability Assessment
- > Penetration Testing Methodology (PTES)
- > Risk Management
- > Red Team vs Blue Team vs Purple Team
Footprinting & Reconnaissance
- > Search Engine Footprinting
- > Website Footprinting
- > Email Footprinting
- > Google Hacking (Dorking)
- > WHOIS Footprinting
- > DNS Footprinting
- > Social Engineering Recon
- > Shodan
- > GitHub Recon
- > OSINT Framework
- > Maltego
Scanning Networks
- > Network Scanning Methodology
- > Live Host Discovery
- > Banner Grabbing
- > Port Scanning Techniques
- > Nmap Scanning Techniques
- > NSE Scripts
- > IDS Evasion During Scanning
- > Vulnerability Scanning
- > OpenVAS
- > Nessus
- > Nuclei
Proxies, VPNs & Tor
- > Proxy Servers
- > VPNs and VPN Protocols
- > Jump Boxes
- > SOCKS Proxies
- > Proxy Chaining
- > Tor Network
- > Anonymous Browsing
- > Operational Security for Pentesters
Tunneling Techniques
- > HTTP Tunneling
- > SSH Tunneling (Local, Remote, Dynamic)
- > TCP/UDP Tunneling
- > VPN Tunneling
- > OpenVPN Configuration
- > DNS Tunneling
- > Pivoting Through Compromised Hosts
Enumeration
- > DNS Enumeration
- > SMB Enumeration
- > FTP Enumeration
- > SSH Enumeration
- > SNMP Enumeration
- > SMTP Enumeration
- > NFS Enumeration
- > MSSQL Enumeration
- > MySQL Enumeration
- > VNC Enumeration
- > RDP Enumeration
System Hacking & Malware Threats
- > Windows Security Architecture
- > Password Cracking (Hashcat, Hydra, John the Ripper)
- > Keyloggers
- > Steganography
- > Trojans and Backdoors
- > Virus and Worm Concepts
- > Malware Analysis Fundamentals
- > Authentication Mechanisms
- > Hashing Algorithms
Privilege Escalation
- > Linux Privilege Escalation
- > Windows Privilege Escalation
- > SUID and SGID Exploitation
- > Kernel Exploits
- > Password Mining
- > PATH Variable Abusing
- > Cron Job Exploitation
- > Service Exploitation
- > Registry Exploits
- > Startup Application Abuse
Buffer Overflow
- > Stack Overflow Concepts
- > Heap Overflow
- > Format String Vulnerabilities
- > Integer Overflow
- > Exploitation Techniques
- > ASLR (Address Space Layout Randomization)
- > Stack Canaries
- > Shellcode Development
- > Mitigation Strategies
Advanced Exploitation & Metasploit Framework
- > Metasploit Fundamentals
- > Payloads and Exploits
- > Meterpreter Sessions
- > Msfvenom Payload Generation
- > Exploit Writing Basics
- > Vulnerability Scanning with Metasploit
- > Persistence Mechanisms
- > Session Hijacking
- > Keylogging via Meterpreter
- > Post-Exploitation Techniques
Evading IDS, Firewalls & Honeypots
- > Firewall Evasion Techniques
- > IDS Evasion Methods
- > Honeypot Detection
- > Fragmentation Attacks
- > Obfuscation Techniques
- > Session Splicing
- > Snort IDS/IPS
- > Detection and Countermeasures
Sniffing & MITM Attacks
- > Packet Sniffing Concepts
- > MAC Flooding
- > ARP Poisoning
- > DHCP Attacks
- > DNS Poisoning and Spoofing
- > Wireshark Packet Analysis
- > Tcpdump Usage
- > Network Packet Analysis
- > MITM Attack Techniques
- > SSL Stripping
Social Engineering
- > Phishing Attacks
- > Spear Phishing
- > Shoulder Surfing
- > Dumpster Diving
- > Insider Threats
- > Fake Security Applications
- > Identity Theft
- > Anti-Phishing Techniques
- > Social Engineering Toolkit (SET)
Denial of Service (DoS/DDoS)
- > DoS Attack Concepts
- > DDoS Attack Types
- > SYN Flooding
- > ICMP Flooding
- > Botnets
- > Application-Layer Attacks
- > Amplification Attacks
- > Detection Techniques
- > DDoS Protection and Mitigation
Cryptography
- > Symmetric Encryption (AES, DES)
- > Asymmetric Encryption (RSA, DSA)
- > Hash Functions (MD5, SHA)
- > SSL/TLS Protocols
- > SSH Encryption
- > PKI (Public Key Infrastructure)
- > Digital Certificates
- > Cryptographic Attacks
- > Steganography Techniques
Learning Outcomes
- Conduct comprehensive penetration tests following industry methodologies
- Perform OSINT and reconnaissance using professional tools
- Scan and enumerate networks, services, and vulnerabilities
- Exploit vulnerabilities in networks, systems, and applications
- Conduct privilege escalation on Linux and Windows systems
- Develop and deploy buffer overflow exploits
- Master the Metasploit framework for exploitation and post-exploitation
- Evade security controls including IDS, firewalls, and honeypots
- Analyze malware and understand threat behavior
- Write professional penetration testing reports with remediation guidance
- Prepare for OSCP+, CEH, and CompTIA PenTest+ certifications
Hands-On Labs
- Dedicated Kali Linux attack machine
- Vulnerable target machines (Windows & Linux)
- Active Directory lab environment
- Network simulation with multiple subnets
- Buffer overflow practice targets
- Metasploit exploitation lab
- Packet capture and analysis environment
- 24/7 lab access during course duration
Certification Preparation
- + CEH (Certified Ethical Hacker)
- + OSCP+ (Offensive Security Certified Professional+)
- + CompTIA PenTest+
- + eJPT (eLearnSecurity Junior Penetration Tester)
- + GPEN (GIAC Penetration Tester)
Meet Your Instructor
Armour Infosec Security Team
Lead Penetration Testing Instructor
Our instructors are active penetration testers with extensive experience in enterprise security assessments, vulnerability research, and red team operations. They bring real-world attack scenarios and methodologies directly into the classroom with hands-on exploitation labs.
What Students Say
“The buffer overflow and privilege escalation modules were exceptional. Passed my CEH on the first attempt after completing this course.”
Rahul M.
Security Analyst
“Excellent hands-on approach. The lab environment is production-grade and the instructors explain complex exploitation concepts clearly.”
Priya S.
IT Professional
“Best ethical hacking course in Indore. The Metasploit and advanced exploitation modules gave me skills I use in every engagement.”
Vikram K.
Penetration Tester
Frequently Asked Questions
Common questions about the course, enrollment, and certification.
Ready to Enroll?
Secure your spot in the next batch. Limited seats available for hands-on lab access.