Ethical Hacking & Penetration testing
By the end of this intensive, hands-on Ethical Hacking and Penetration Testing training program, learners will possess globally recognized technical and analytical competencies required to work in professional cybersecurity environments. The course is designed to empower participants with both foundational knowledge and advanced tactical skills, including the application of AI in modern ethical hacking. Graduates will be fully prepared to enter technical roles in Security Operations Centers (SOCs), penetration testing teams, freelance security consulting, and global bug bounty programs.
SAT & SUN
Time – Virtual
2 Months
Duration
₦125,000/month
Nigeria
₦250,000
One time Payment
£200/month
International
£390 – international
One time Payment
£700/One time
One on One Class & Mentorship
Curriculum Breakdown
The programme curriculum covers all areas of Ethical Hacking and Penetration Testing.
1
Cybersecurity & Hacking Fundamentals
- Ethics, legality, and global standards (e.g., GDPR, NIST, ISO)
- Types of hackers: white hat, black hat, gray hat
- Hacking phases: Recon → Scanning → Gaining Access → Maintaining → Covering Tracks
- AI Add-on: Use ChatGPT to summarize ethical concerns or attack chain
2
Kali Linux & Hacking Lab Setup
- Installing & navigating Kali Linux
- Terminal essentials & custom scripts
- Introduction to Hack The Box, TryHackMe, and CyberRange environments
- Lab: Configure your Kali environment and successfully exploit your first lab machine
3
Footprinting and Reconnaissance
- Passive vs. active recon
- DNS enumeration, WHOIS lookups, Shodan use
- Google dorking, OSINT tools, social engineering basics
- AI Add-on: Use ChatGPT to automate footprinting reports
4
Scanning Networks & Vulnerability Assessment
- Port scanning with Nmap, Masscan
- Service detection, OS fingerprinting
- Vulnerability scanning with Nessus, OpenVAS, Nikto
- Lab: Scan a live machine, analyze results, and create a risk report
5
Exploitation Techniques
- Exploiting Windows, Linux, and Web applications
- Working with Metasploit Framework
- Brute-force attacks, buffer overflows (Intro level)
- Tools: Metasploit, SQLmap, Hydra, John the Ripper
6
Web Application Hacking
- OWASP Top 10
- SQLi, XSS, CSRF, IDOR, File upload attacks
- Webshells and privilege escalation
- AI Add-on: Use AI to generate payload examples and automated attack templates
- Tools: Burp Suite, OWASP ZAP, Nikto
7
Wireless & Bluetooth Hacking
- Wi-Fi encryption standards (WEP, WPA2)
- Packet sniffing and injection (Aircrack-ng, Wireshark)
- Rogue AP & MITM attacks
- Lab: Crack a WPA2 handshake in a sandbox
8
Privilege Escalation & Post-Exploitation
- Linux/Windows privilege escalation
- Credential harvesting, backdoors, persistence
- File transfers, pivoting techniques
9
Malware, Trojans, & Social Engineering
- Malware types: keyloggers, rootkits, RATs
- Phishing simulations & payload crafting
- Intro to obfuscation & evasion techniques
- AI Add-on: Use AI to generate phishing content, analyze social engineering risks
10
Bypassing Security Controls
- Antivirus, EDR & firewall evasion techniques
- Obfuscating payloads with msfvenom
- Encoding and AV evasion tools (Veil, Shellter)
11
Reporting & Documentation
- Writing professional penetration testing reports
- Risk scoring (CVSS), executive vs. technical summaries
- Incident evidence preservation & chain of custody
- Tools: CherryTree, Dradis, Markdown, ChatGPT
12
Capstone Project & Job Readiness
- Simulate an end-to-end ethical hacking engagement
- Perform recon, exploit, escalate, document & present findings
- Build resume, portfolio, and GitHub with scripts & reports
- Bonus: Prepare for CEH, PenTest+, and OSCP-style questions
Certifications & Career Paths
- CEH (Certified Ethical Hacker)
- OSCP (Offensive Security Certified Professional)
- CompTIA PenTest+
Job Opportunities
With our Ethical hacking and penetration testing Certificate, you get to work as any of the following:
- Ethical Hacker
- Penetration Tester
- Vulnerability Analyst
- Red Team Specialist
- Security Researcher
- Freelance Bug Bounty Hunter
Contact Evolve HQ
Enroll for Ethical Hacking by Evolve HQ
Explore Other Courses from Evolve HQ
All programs are designed to prepare you for the future in the tech world

Excel Mastery for Human Resources
Unlock the power of Excel to streamline HR tasks and make data driven decisions. This course covers essential to advanced Excel functions tailored for HR professionals such as employee data management, payroll analysis, reporting, and dashboards.

Ethical Hacking & Penetration testing
Gain hands-on skills in identifying and exploiting vulnerabilities ethically. This course teaches the tools and techniques used by ethical hackers to test and strengthen system security through real-world penetration testing scenarios.

Governance, Risk & Compliance (GRC)
Explore the essential pillars of organizational security through Governance, Risk, and Compliance (GRC). This course covers how businesses establish policies, manage risks, and ensure compliance with legal and regulatory standards.

Security Operations Centre (SOC)
Learn the fundamentals of SOC, the heart of an organization’s cybersecurity defense. This course introduces you to how SOC teams monitor, detect, respond to threats using real-time data, tools, and processes to protect digital assets and infrastructure.

Artificial Intelligence Automation
Discover how AI is transforming industries through smart automation. This course introduces key AI concepts and tools used to automate tasks, optimize workflows, and drive innovation. Ideal for professionals and tech enthusiasts

Virtual Assistant & AI
Elevate your virtual workforce with our comprehensive Virtual Assistant Training Program. This intensive course equips participants with essential skills in digital communication, task management, and client relations