Cyber Security & Ethical Hacking

Cyber Security & Ethical Hacking

Learning Outcome


The Cyber Security & Ethical Hacking course is the best way for you to gain deep insight and knowledge of this topic. You will learn from industry experts and obtain an endorsed certificate after completing the course. Enrol now for a limited-time discounted price.

Like all the courses of One Education, this Cyber Security & Ethical Hacking is designed with the utmost attention and thorough research. All the topics are broken down into easy to understand bite-sized modules that help our learners to understand each lesson very easily.

We don’t just provide courses at One Education; we provide a rich learning experience. After purchasing a course from One Education, you get complete 1-year access with tutor support. 

Our expert instructors are always available to answer all your questions and make your learning experience exquisite.

After completing the Cyber Security & Ethical Hacking, you will instantly get an e-certificate that will help you get jobs in the relevant field and will enrich your CV.

If you want to learn about this topic and achieve a certificate, you should consider this Cyber Security & Ethical Hacking from One Education.

We are very upfront and clear about all the costs of the course. 

Course design

The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace.

You are taught through a combination of

  • Video lessons
  • Online study materials

Certificate of Achievement

Endorsed Certificate of Achievement from the Quality Licence Scheme

After successfully completing the course, learners will be able to order an endorsed certificate as proof of their new achievement. Endorsed certificates can be ordered and get delivered to your home by post for only £129. There is an additional £10 postage charge for international students.

CPD Certification from One Education

After successfully completing the assessment of this course, you will qualify for the CPD Certificate from One Education as proof of your continued skill development. Certification is available in PDF format, at the cost of £9, or a hard copy can be sent to you via post, at the cost of £15.


This course has been endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. This course is not regulated by Ofqual. One Education will be able to advise you on any further recognition, for example, progression routes into further and/or higher education. For further information, please visit the Learner FAQs on the Quality Licence Scheme website.

Method of Assessment

To assess your learning, you have to complete the assignment questions provided at the end of the course. You have to score at least 60% to pass the exam and to qualify for Quality Licence Scheme endorsed, and CPD endorsed certificates. 

After submitting the assignment, our expert tutor will assess your assignment and will give you feedback on your performance.

After passing the assignment exam, you will be able to apply for a certificate.

Why study this course

Whether you’re an existing practitioner or aspiring expert, this course will enhance your expertise and boost your CV with key skills and an endorsed lesson attesting to your knowledge.

The Cyber Security & Ethical Hacking course is open to all, with no formal entry requirements. All you need is a passion for learning, a good understanding of the English language, numeracy and IT, and to be over the age of 16.

Course Curriculum

Introduction to Ethical Hacking
Hacking Terms 00:07:00
VA vs PT and Rule of Engagement 00:09:00
Methodologies 00:07:00
Type of Pen Testing 00:06:00
Phases of Penetration Test 00:04:00
10 Steps to Follow 00:04:00
Setting up a Penetration Testing Lab
What is Linux OS – Benefits 00:04:00
What is Kali Linux 00:03:00
Virtual Box Installation 00:06:00
Kali Linux Installation in VB 00:12:00
Install Metasploitable on Virtual Box 00:09:00
Install DVWA in Kali 00:18:00
Install TOR 00:09:00
Executing Basic Commands in Kali 00:12:00
Executing Advance Commands in Kali 00:14:00
Information Gathering
What is Information Gathering 00:08:00
Maltego Part 1 00:07:00
Maltego Part 2 00:06:00
HTTrack 00:05:00
The Harvester 00:02:00
NSLookup 00:03:00
RedHawk 00:05:00
SHODAN 00:09:00
OSNIT Framework 00:05:00
Scanning and Enumeration
What is Scanning 00:07:00
What is Nmap 00:05:00
Zenmap GUI 00:17:00
What is Enumeration 00:03:00
Types of Enumeration 00:03:00
Enumeration Using Hyena – 1 00:07:00
Enumeration Using Hyena – 2 00:06:00
What is Vulnerability Assessment 00:04:00
Phases of Vulnerability Assessment 00:08:00
Vulnerability Scoring Systems 00:09:00
Introduction to Nessus 00:05:00
Create and Configure Nessus Network Policy 00:08:00
Nessus Launch Scan and Analyse Result 00:08:00
What is IDS 00:11:00
What Are Firewalls 00:10:00
What is DMZ 00:06:00
IDS Evasion Techniques 00:08:00
Firewall Evasion Techniques 00:09:00
Firewall Pentesting 00:02:00
Introduction to Web Servers 00:05:00
Types of Web Server Attacks 00:05:00
Web Server Penetration Testing 00:04:00
Countermeasures of Web Servers? 00:05:00
OWASP Top 10 Attacks Part 1 00:05:00
OWASP Top 10 Attacks Part 2 00:07:00
Website Foot Printing Part 1 00:05:00
Website Foot Printing Part 2 00:03:00
Command Execution Low 00:06:00
Command Execution Medium 00:07:00
Configuring Burp Suite 00:16:00
File Upload Low 00:10:00
File Upload Medium 00:07:00
File Upload High 00:08:00
SQL Injection 00:04:00
SQL Injection II 00:05:00
Manual SQL 00:17:00
Automating SQL 00:09:00
Countermeasures of SQL Injection 00:03:00
What Is XSS 00:03:00
Types of XSS 00:06:00
XSS Low 00:11:00
XSS Medium 00:05:00
XSS High 00:11:00
Countermeasures of XSS 00:04:00
What is CSRF 00:06:00
CSRF Practical 00:07:00
What is a Brute Force Attack? 00:05:00
Brute Force Political 00:18:00
Web Application Penetration Testing? 00:09:00
Web Application Countermeasures 00:06:00
Denial of Service
What is Denial of Service (DOS)? 00:03:00
Types of DOS attack? 00:05:00
What is a BOTNET? 00:03:00
Malware Threats
Introduction to Malware 00:09:00
Trojan 00:08:00
Types of Trojans 00:08:00
Viruses and Worms 00:07:00
Types of Viruses 00:10:00
Countermeasures 00:07:00
Social Engineering
Introduction to Social Engineering 00:05:00
Social Engineering 00:06:00
Installing BeEF Framework 00:09:00
Getting User Credentials Using BeEF Framework 00:11:00
Introduction to Cryptography 00:05:00
Symmetric Encryption 00:03:00
DES and AES 00:06:00
Asymmetric Encryption 00:03:00
RSA and Diffie 00:07:00
Hashing 00:07:00
Public Key Infrastructure (PKI) and Certificate Authority (CA) 00:10:00
Digital Signatures 00:09:00
Transport Layer Security (TLS) 00:04:00
Calculating One Way Hashes Using HashCal 00:04:00
Basic Data Encryption Advance and Decryption Package 00:05:00
Report Writing
Introduction to Report Writing 00:08:00
Component of a Report 00:14:00
Bonus Section
Why we need to fix vulnerabilities 00:05:00
Hacker Sponsored Security 00:03:00
Key Terms in Bug Bounty Program 00:05:00
Bug Bounty Definition 00:03:00
Public or Private Bug Bounty Program 00:04:00
What is HackerOne 00:05:00
Why Organizations will hire you 00:08:00
Assignment – Cyber Security & Ethical Hacking 3 weeks, 3 days
Order Your Certificate
Order Your Certificate QLS 00:00:00

COPYRIGHT © 2022 One Education

Home Search Cart
    Your Cart
    Your cart is emptyBrowse Courses

    Upgrade to get UNLIMITED ACCESS to ALL COURSES for only £49/year

    Claim Offer & Upgrade

    Membership renews after 12 months. You can cancel anytime from your account.

    Other Students Also Buy
      Apply Coupon