// Ethical Hacking & Penetration Testing

Certified Ethical Hacking & Penetration Testing

Master ethical hacking, penetration testing, vulnerability assessment, exploitation techniques, privilege escalation, malware analysis, network attacks, cryptography, and advanced offensive security methodologies using Kali Linux and real-world cybersecurity labs.

Duration

10 Months / 40 Weeks / 300 Hours

Level

Beginner to Advanced

Modules

16 Modules

Format

Hands-on Labs

// Course Overview

What You'll Learn

The Advanced Ethical Hacking & Penetration Testing course is designed for aspiring ethical hackers, penetration testers, cybersecurity professionals, SOC analysts, red teamers, and security researchers who want practical offensive security skills. This course covers Kali Linux fundamentals, ethical hacking methodologies, footprinting, network scanning, enumeration, vulnerability assessment, exploitation, privilege escalation, buffer overflows, malware analysis, sniffing, social engineering, DoS attacks, cryptography, IDS/firewall evasion, and Metasploit framework mastery.

// Prerequisites

  • - Basic networking knowledge (TCP/IP, DNS, HTTP)
  • - Familiarity with Linux and Windows operating systems
  • - Understanding of basic computer security concepts
  • - Laptop with 8GB+ RAM for lab environments
ceh-pt--syllabus

$ armour --training ceh-pt --info

[*] Course: Certified Ethical Hacking & Penetration Testing

[*] Duration: 10 Months / 40 Weeks / 300 Hours

[*] Level: Beginner to Advanced

[!] 16 modules | 150 topics

[+] Lab environment: READY

[+] Certification prep: INCLUDED

$ _

// Syllabus

Complete Course Modules

01

Kali Linux Fundamentals

  • > Kali Linux History and Introduction
  • > Installing Kali Linux
  • > Kali Linux GUI Desktops
  • > Kali Linux Commands
  • > Package Management
  • > Managing Repositories
  • > User Account Management
  • > File Permissions
  • > Network Configuration
02

Introduction to Penetration Testing & Ethical Hacking

  • > Hacking Concepts
  • > Ethical Hacking Principles
  • > Hacker Classes (White/Grey/Black Hat)
  • > Hacking Phases
  • > CIA Triad
  • > Defense in Depth
  • > Vulnerability Assessment
  • > Penetration Testing Methodology (PTES)
  • > Risk Management
  • > Red Team vs Blue Team vs Purple Team
03

Footprinting & Reconnaissance

  • > Search Engine Footprinting
  • > Website Footprinting
  • > Email Footprinting
  • > Google Hacking (Dorking)
  • > WHOIS Footprinting
  • > DNS Footprinting
  • > Social Engineering Recon
  • > Shodan
  • > GitHub Recon
  • > OSINT Framework
  • > Maltego
04

Scanning Networks

  • > Network Scanning Methodology
  • > Live Host Discovery
  • > Banner Grabbing
  • > Port Scanning Techniques
  • > Nmap Scanning Techniques
  • > NSE Scripts
  • > IDS Evasion During Scanning
  • > Vulnerability Scanning
  • > OpenVAS
  • > Nessus
  • > Nuclei
05

Proxies, VPNs & Tor

  • > Proxy Servers
  • > VPNs and VPN Protocols
  • > Jump Boxes
  • > SOCKS Proxies
  • > Proxy Chaining
  • > Tor Network
  • > Anonymous Browsing
  • > Operational Security for Pentesters
06

Tunneling Techniques

  • > HTTP Tunneling
  • > SSH Tunneling (Local, Remote, Dynamic)
  • > TCP/UDP Tunneling
  • > VPN Tunneling
  • > OpenVPN Configuration
  • > DNS Tunneling
  • > Pivoting Through Compromised Hosts
07

Enumeration

  • > DNS Enumeration
  • > SMB Enumeration
  • > FTP Enumeration
  • > SSH Enumeration
  • > SNMP Enumeration
  • > SMTP Enumeration
  • > NFS Enumeration
  • > MSSQL Enumeration
  • > MySQL Enumeration
  • > VNC Enumeration
  • > RDP Enumeration
08

System Hacking & Malware Threats

  • > Windows Security Architecture
  • > Password Cracking (Hashcat, Hydra, John the Ripper)
  • > Keyloggers
  • > Steganography
  • > Trojans and Backdoors
  • > Virus and Worm Concepts
  • > Malware Analysis Fundamentals
  • > Authentication Mechanisms
  • > Hashing Algorithms
09

Privilege Escalation

  • > Linux Privilege Escalation
  • > Windows Privilege Escalation
  • > SUID and SGID Exploitation
  • > Kernel Exploits
  • > Password Mining
  • > PATH Variable Abusing
  • > Cron Job Exploitation
  • > Service Exploitation
  • > Registry Exploits
  • > Startup Application Abuse
10

Buffer Overflow

  • > Stack Overflow Concepts
  • > Heap Overflow
  • > Format String Vulnerabilities
  • > Integer Overflow
  • > Exploitation Techniques
  • > ASLR (Address Space Layout Randomization)
  • > Stack Canaries
  • > Shellcode Development
  • > Mitigation Strategies
11

Advanced Exploitation & Metasploit Framework

  • > Metasploit Fundamentals
  • > Payloads and Exploits
  • > Meterpreter Sessions
  • > Msfvenom Payload Generation
  • > Exploit Writing Basics
  • > Vulnerability Scanning with Metasploit
  • > Persistence Mechanisms
  • > Session Hijacking
  • > Keylogging via Meterpreter
  • > Post-Exploitation Techniques
12

Evading IDS, Firewalls & Honeypots

  • > Firewall Evasion Techniques
  • > IDS Evasion Methods
  • > Honeypot Detection
  • > Fragmentation Attacks
  • > Obfuscation Techniques
  • > Session Splicing
  • > Snort IDS/IPS
  • > Detection and Countermeasures
13

Sniffing & MITM Attacks

  • > Packet Sniffing Concepts
  • > MAC Flooding
  • > ARP Poisoning
  • > DHCP Attacks
  • > DNS Poisoning and Spoofing
  • > Wireshark Packet Analysis
  • > Tcpdump Usage
  • > Network Packet Analysis
  • > MITM Attack Techniques
  • > SSL Stripping
14

Social Engineering

  • > Phishing Attacks
  • > Spear Phishing
  • > Shoulder Surfing
  • > Dumpster Diving
  • > Insider Threats
  • > Fake Security Applications
  • > Identity Theft
  • > Anti-Phishing Techniques
  • > Social Engineering Toolkit (SET)
15

Denial of Service (DoS/DDoS)

  • > DoS Attack Concepts
  • > DDoS Attack Types
  • > SYN Flooding
  • > ICMP Flooding
  • > Botnets
  • > Application-Layer Attacks
  • > Amplification Attacks
  • > Detection Techniques
  • > DDoS Protection and Mitigation
16

Cryptography

  • > Symmetric Encryption (AES, DES)
  • > Asymmetric Encryption (RSA, DSA)
  • > Hash Functions (MD5, SHA)
  • > SSL/TLS Protocols
  • > SSH Encryption
  • > PKI (Public Key Infrastructure)
  • > Digital Certificates
  • > Cryptographic Attacks
  • > Steganography Techniques
// Outcomes

Learning Outcomes

  • Conduct comprehensive penetration tests following industry methodologies
  • Perform OSINT and reconnaissance using professional tools
  • Scan and enumerate networks, services, and vulnerabilities
  • Exploit vulnerabilities in networks, systems, and applications
  • Conduct privilege escalation on Linux and Windows systems
  • Develop and deploy buffer overflow exploits
  • Master the Metasploit framework for exploitation and post-exploitation
  • Evade security controls including IDS, firewalls, and honeypots
  • Analyze malware and understand threat behavior
  • Write professional penetration testing reports with remediation guidance
  • Prepare for OSCP+, CEH, and CompTIA PenTest+ certifications
// Lab Environment

Hands-On Labs

  • Dedicated Kali Linux attack machine
  • Vulnerable target machines (Windows & Linux)
  • Active Directory lab environment
  • Network simulation with multiple subnets
  • Buffer overflow practice targets
  • Metasploit exploitation lab
  • Packet capture and analysis environment
  • 24/7 lab access during course duration

Certification Preparation

  • + CEH (Certified Ethical Hacker)
  • + OSCP+ (Offensive Security Certified Professional+)
  • + CompTIA PenTest+
  • + eJPT (eLearnSecurity Junior Penetration Tester)
  • + GPEN (GIAC Penetration Tester)
// Instructor

Meet Your Instructor

Armour Infosec Security Team

Lead Penetration Testing Instructor

Our instructors are active penetration testers with extensive experience in enterprise security assessments, vulnerability research, and red team operations. They bring real-world attack scenarios and methodologies directly into the classroom with hands-on exploitation labs.

OSCP+CEH MasterGPENCISSPCRTP
// Testimonials

What Students Say

The buffer overflow and privilege escalation modules were exceptional. Passed my CEH on the first attempt after completing this course.

Rahul M.

Security Analyst

Excellent hands-on approach. The lab environment is production-grade and the instructors explain complex exploitation concepts clearly.

Priya S.

IT Professional

Best ethical hacking course in Indore. The Metasploit and advanced exploitation modules gave me skills I use in every engagement.

Vikram K.

Penetration Tester

// FAQ

Frequently Asked Questions

Common questions about the course, enrollment, and certification.

Ready to Enroll?

Secure your spot in the next batch. Limited seats available for hands-on lab access.