The Certificate course for you!
Hands-on labs: Reconnaissance, scanning, enumeration, and reporting.
Use real tools: Nmap, Wireshark, Burp Suite Community, and Metasploit (demo).
Defender focus: Patching, hardening, and a secure-by-default mindset.
What Will You Learn?
Ethical hacking basics: Scope, rules of engagement, legality, and lab setup (VM/Kali).
Recon & scanning: OSINT, DNS enumeration, and Nmap port and service discovery.
Web security overview: Common vulnerabilities (OWASP Top 10) and safe testing workflows.
Defensive actions: Patching, hardening checklists, and effective vulnerability reports.
Course Curriculum
- Overview of Ethical Hacking 0:05 Min
- Importance of Vulnerability Assessment and Penetration Testing (VAPT) 0:06 Min
- Legal and Ethical Aspects of Ethical Hacking and VAPT 0:05 Min
- Roles and Responsibilities of an Ethical Hacker and VAPT Specialist 0:05 Min
- Introduction to Ethical Hacking and VAPT 0:15 Min
- Basics of Networking: OSI Model and TCP/IP 0:05 Min
- Network Protocols: HTTP, FTP, DNS, SNMP 0:05 Min
- Network Security Essentials: Firewalls, IDS/IPS, and VPNs 0:05 Min
- Networking Fundamentals 0:15 Min
- Active vs Passive Reconnaissance 0:04 Min
- Footprinting Techniques 0:04 Min
- Tools for Reconnaissance: Nmap, Shodan, Maltego 0:05 Min
- Social Engineering in Reconnaissance 0:05 Min
- Reconnaissance and Information Gathering 0:15 Min
- Basics of Vulnerability Assessment 0:05 Min
- OWASP Top 10 Vulnerabilities 0:05 Min
- Tools for Vulnerability Scanning: Nessus, OpenVAS, Qualys 0:03 Min
- Identifying, Prioritizing, and Categorizing Vulnerabilities 0:05 Min
- Vulnerability Assessment 0:15 Min
Learn With GreyLearn
-
Perform legal recon: OSINT, Nmap and Wireshark scans, and service enumeration.
-
Practice common web and app flaws in labs: OWASP Top 10 with tools like Burp and Metasploit.
-
Document and Fix: Clear reports, privilege escalation notes, and practical hardening steps.
What Learners Say
Umesh Puri
I learned to separate testing identities from my personal accounts the method avoids noise and shows focused ways to learn
VAISHNAVI DEVATKAR
Checklists kept my tests repeatable and responsible defense notes helped me suggest practical next actions i review legal and policy basics before any engagement
Akash Nishad
I use notes and screenshots to keep evidence tidy secure defaults and patch cadence now make sense to me the threat model guides which tests
Yash Jaiswal
The course showed how to request permission and log activity the lessons built confidence without encouraging reckless actions
Anjali Jadhav
Vulnerability triage helps teams fix the right issues first the content showed how attackers chain small oversights practice rounds felt close to real engagements
Omkar Gawali
I built a starter kit with safe configs and baseline scripts the method avoids noise and shows focused ways to learn the threat model guides
Frequently Asked Questions
Have something to know? Check here if you have any questions about us.