Ethical hacking

| /


Do you want to take this course remotely or in person?

Contact us by email: , phone: +34 91 031 66 78, WhatsApp: +34 685 60 05 91 , or contact Our Offices


Course Description: Ethical Hacking

This course is taught in online mode and consists of 13 units. The duration of the course is distributes between content and collaboration tools. Upon completion, the student will receive an accrediting diploma.

Training is done through our Virtual Campus , with this modality you will have all the didactic content on the course platform and it will be accessible, from the start day of the course, 24 hours a day, every day of the week. The student will also have participation forums , as well as a continuous tutoring .

The course is taught in teletraining modality (100% bonus option) and face-to-face and tele-face-to-face training actions can also be carried out on demand.


    Would you like to learn how to protect your computer systems from cyber attacks ? Do you want to know the techniques and tools that hackers use to violate the security of networks, web applications and Wi-Fi devices ? Are you interested in cryptography and cloud computing as key elements for cyber defense and attack?

    In this course you will learn the fundamentals of ethical hacking, a discipline that deals with evaluating the security of computer systems for legitimate purposes and in accordance with a professional code of conduct.

    At the end of the course, you will be able to perform penetration tests (pentesting) in real environments, applying denial of service techniques, evasion of perimeter protection systems, pentesting in web environments, wifi hacking, cryptography and cloud computing. Additionally, you will learn best practices and the legal and ethical aspects of ethical hacking. 

    Addressed to

    The course is aimed at all those people who want to get started in the world of ethical hacking, whether they are students, professionals or computer security enthusiasts. No prior programming or networking knowledge is required, although some basic computer knowledge is recommended.

    Course content

    1. Introduction to Ethical Hacking

    2. Recognition and analysis stage

    3. Network scanning and enumeration

    4. Vulnerability scan

    5. Exploitation and access

    6. Sniffing in local network environments

    7. Social engineering techniques

    8. Denial of service techniques

    9. Evasion of perimeter protection systems

    10. Pentesting techniques in web environments

    11. wifi hacking techniques

    12. Key concepts of cryptography

    13. Cloud computing fundamentals

    Previous requirements

    No prior technical requirements are necessary to take this course. However, basic computer skills and knowledge of environments related to Information Technology are recommended.


    If you are interested in taking this course in any training modality, please contact us.

    Information related to training

    Soporte siempre a tu lado

    Training support: Always by your side

    Formación presencial y telepresencial

    Do you need another training modality?


    Bonuses for companies