Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.



Press esc to close

close close

Back to course information

Thank you for your enquiry!

One of our training experts will be in touch shortly to go overy your training requirements.

close close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

Ethical Hacking Training

Online Instructor-led (2 days)

Online Self-paced (16 hours)

Ethical Hacking Professional Course Outline

  • Introduction to Ethical Hacking
    • What is Ethical Hacking
    • Who is an Ethical Hacker?
    • Purpose of Hacking
    • Different Tools and Techniques
  • Hacking Concepts and Principles
    • Types of Attack
    • Malware and Malware Analysis
    • Viruses, Worms, Trojans
  • Phases of Hacking
    • Reconnaissance
    • Footprinting
    • Fingerprinting
    • Enumeration
      • SMTP Enumeration
      • Counteractions
      • LDAP Enumeration
      • SNMP Enumeration
    • Scanning Types
      • Technologies and Tools
      • Firewalls
      • Pen Testing
      • Files and Privileges
    • Damage Limitation
    • Network Protection
    • Solutions
    • Reporting
    • Pen Testing
  • Vulnerability Assessment
    • Concepts
    • Problem Solving
    • Mechanisms
    • Scoring
    • Assessment
    • Recording assessments
  • Ethical Hacking Methodologies:
  • Hacking Web Applications
  • Hacking Web Servers
  • Hacking Mobile Devices
    • Spyware
  • Wireless Hacking
  • Buffer Overflow
  • Social Engineering
  • SQL Injection
    • Concepts
    • Methodology
    • Evasion Techniques
  • Incident Response and Management
  • Cryptography and Encryption

Show moredown

Ethical Hacking Prerequisites

No prerequisites are required for attending this training course.

Who should attend this Ethical Hacking Training Course?

  • Security Officers
  • Security Professionals
  • Auditors, Site Administrators

Ethical Hacking Professional Course Overview

This Ethical Hacking Professional course is an introduction to the concepts, tools, and techniques involved in ethical hacking. Businesses have an ever-growing dependency on IT security, due to the increasing complexity of systems and networks, and particularly the usage of mobile and wireless devices. Security professionals warn us of the growing rate of hackers and their in-depth knowledge of how to overcome firewalls and standard security protocols, such as anti-malware. This 2-day training course will develop your awareness of common IT security problems on which hackers rely on for access, to be better able to avoid and prevent attacks.

Our training delivers a comprehensive overview of the types of attacks and methodologies used by hackers, helping you understand and gain experience in recognising, defeating, and preventing threats to your systems. You will receive exposure to technologies and software tools and show how they can be used in real-life scenarios.

Over the duration of the course, you will increase your knowledge of risks and vulnerabilities, the methods used to exploit them, as well as gain a wider understanding of cybersecurity, from penetration testing to writing assessment reports. Through instructor-led training and hands-on lab-based exercises, you will gain the skills to enter the industry or enhance your career as an ethical hacker. However, this course can be taken by anyone in an IT security-based role who wishes to understand the mindset of cyber attackers, to better assess their system vulnerabilities and protect your information, despite the constantly evolving cybersecurity environment.

Show moredown

What's included in this Ethical Hacking Training Course?

  • Delegate pack consisting of course notes and exercises
  • Manual
  • Experienced Instructor
  • Refreshments

Show moredown

Online Instructor-led (1 days)

Online Self-paced (8 hours)

Mastering Metasploit Framework Course Outline

The following course content has been built to help you build a strong foundation in penetration testing.

Introduction to Metasploit Framework

  • Define the Metasploit Framework
  • Metasploit Implementation
  • Metasploit Pro Components
  • Basic Concepts and Terms
  • Metasploit Pro Workflow
  • Access Metasploit Pro from the Web Interface

Using Metasploit Web Interface

  • Supported Browsers
  • Navigational Menus and Features
  • Touring the Projects Page

Getting Started with Metasploit Framework

  • Creating a Project
  • Getting Target Data
  • View and Manage Host Data
  • Running a Vulnerability Scan
  • Exploiting Known Vulnerabilities
  • Post-Exploitation and Collecting Evidence
  • Cleaning Up Sessions
  • Generating a Report

Setting Up a Vulnerable Target

  • Downloading and Setting Up Metasploit
  • Services
  • Weak Passwords
  • Vulnerable Web Services

Managing Projects

  • Create and Manage Projects
  • Export Project Data
  • Adding Users to Project
  • Removing Users from Project
  • Assigning Project to User
  • Host Comments

Managing and Updating Metasploit

  • Managing User Accounts
  • Managing License Keys
  • Verifying Downloads
  • Verifying Downloads with SHA-1 Hashes
  • Accessing Logs
  • Backing Up and Restoring Metasploit Data
  • Notification Center
  • Updating Metasploit
  • Restarting Metasploit Services

Managing Hosts

  • Host Management Interfaces
  • Adding and Deleting Hosts
  • Viewing and Editing Host Metadata
  • Add, Edit, and Delete Service
  • Add, Edit, and Delete Vulnerabilities
  • View and Access File Shares

Exploring Vulnerabilities

  • Discovery Scan
  • Vulnerability Scanning with Nexpose
  • Importing Data
  • Validating a Vulnerability
  • Working with the Vulnerability Validation Wizard
  • Validating Vulnerabilities Discovered by Nexpose
  • Sharing Validation Results with Nexpose
  • Tracking Real-Time Statistics and Events


  • Using Exploits
  • Skipping Fragile Devices

Working with Payloads

  • Single and Staged Payloads
  • Viewing Payloads
  • Manually Selecting a Payload
  • Auto Selecting a Payload
  • Payload Generator

Introduction to Credentials

  • Understanding Credentials
  • Managing Credentials
  • Reusing Credentials
  • Searching Credentials
  • Bruteforce Attacks

Overview of Metamodules

  • Credentials Domino MetaModule
  • Single Credential Testing MetaModule
  • SSH Key Testing MetaModule
  • Known Credentials Intrusion MetaModule
  • Segmentation and Firewall Testing MetaModule

Social Engineering

  • Define Social Engineering
  • Managing Campaigns and Target Lists
  • Upload Custom SSL Certificates
  • Modify SSL Cipher for Web Servers
  • Best Practices for Social Engineering

Automating Tasks

  • Working with Task Chains
  • Manage and Edit Task Chains
  • Scheduling Task Chains
  • Resource Scripts

Introduction to Reporting

  • Audit Reports
  • Credentials Report
  • FISMA and PCI Compliance Report
  • Social Engineering Campaign Details Report
  • Customising Standard Reports
  • Custom Templates
  • MetaModule Reports

Metasploit Framework

  • Accessing MSFconsole
  • Managing Database and Workspaces
  • Modules
  • Run Metasploit Remotely
  • Tag Hosts in msfconsole

Working with Pro Console

  • About Pro Console
  • Auto-Exploitation
  • Export and Import Data
  • Manage Credentials
  • Manage Database from Pro Console
  • Managing Notes, Tasks, and Vulnerabilities
  • Manual Exploitation
  • Managing Metasploit
  • Pro Console Reports
  • Scanning and Managing Hosts

Show moredown


No prerequisites to attend this course. However, a basic understanding of network and Linux would be beneficial.


Anyone who wishes to understand and enhance their knowledge of Metasploit can attend this course. This course is ideal for:

  • Penetration Testers
  • Network Administrators
  • Cybersecurity Engineers
  • Security Enthusiasts and Professionals

Mastering Metasploit Framework ​Course Overview

A Metasploit framework is a powerful tool used by cybercriminals and ethical hackers to probe systematic vulnerabilities on servers and networks. It is an open-source project providing the content, infrastructure, and tools for performing penetration tests and extensive security auditing. It is a Ruby-based, modular penetration testing platform enabling you to write, test, and execute code.

The Knowledge Academy’s 2-day course will equip delegates with comprehensive knowledge about the working of Metasploit. This course will make delegates dive into the world’s leading open-source exploitation framework and will exhibit how to use it in every aspect of the penetration test. Delegates will learn how to manage user accounts and license keys. In addition, they will develop their knowledge and skillset whilst working with the vulnerability validation wizard.

During this course, delegates will learn how to manage and reuse credentials. Delegates will get to learn about the concept of metamodules and social engineering. Furthermore, delegates will acquire in-depth knowledge of how to manage database and workspace as well as how to run Metasploit remotely. Post completion of this training, delegates will be able to manage notes, tasks, and vulnerabilities. So, learn the significant techniques in Metasploit by attending our comprehensive course from scratch.

Show moredown

  • Delegate pack consisting of course notes and exercises
  • Manual
  • Experienced Instructor
  • Refreshments

Show moredown

Not sure which course to choose?

Speak to a training expert for advice if you are unsure of what course is right for you. Give us a call on +1 7204454674 or Inquire.

Ethical Hacking Training FAQs


Please arrive at the venue at 8:45am.
The Knowledge Academy is the Leading global training provider for Ethical Hacking Training.
The price for Ethical Hacking Training certification in the United States starts from $.

Why we're the go to training provider for you


Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.


Trusted & Approved

We are accredited by PeopleCert on behalf of AXELOS


Many delivery methods

Flexible delivery methods are available depending on your learning style.


High quality resources

Resources are included for a comprehensive learning experience.

barclays Logo
deloitte Logo
Thames Water Logo

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

santander logo
bmw Logo
Google Logo

Looking for more information on Ethical Hacking Training