• About WordPress
    • WordPress.org
    • Documentation
    • Learn WordPress
    • Support
    • Feedback
  • Log In
  • Courses
    • Workforce Development (CSRP)
      • CSRP | Introduction To Cybersecurity
    • Cyber School for Children & Youth
      • Cyber Kids
      • Programming Through Games
      • Ai Explorer
      • Cyber Rangers
      • Python Security
      • Cyber Battle Royale
    • Certification Exam Prep
  • Application
  • About Us
  • Courses
    • Workforce Development (CSRP)
    • Children & Youth
      • Cyber Kids
      • Ai Explorer
      • Programming Through Games
      • Cyber Rangers
      • Python Security
      • Cyber Battle Royale
    • Certification Exam Prep
  • About Us
    Sign in
    Cyber School
    Cyber School
    • Courses
      • Workforce Development (CSRP)
        • CSRP | Introduction To Cybersecurity
      • Cyber School for Children & Youth
        • Cyber Kids
        • Programming Through Games
        • Ai Explorer
        • Cyber Rangers
        • Python Security
        • Cyber Battle Royale
      • Certification Exam Prep
    • Application
    • About Us
    Back to Course

    CSRP | Ethical Hacking

    0% Complete
    0/0 Steps
    1. course overview

      Course Syllabus | Ethical Hacking
    2. Module 1: Introduction to Ethical Hacking
      The Ethics of Hacking – White Hat vs. Black Hat
    3. The Penetration Testing Process
    4. Self-Study: Famous Hacks & Lessons Learned
    5. Module 2: Information Gathering & Reconnaissance
      Passive Reconnaissance Techniques
    6. Active Scanning & Network Mapping
    7. Self-Study: OSINT & Network Recon
    8. Module 3: Exploitation Techniques
      Exploiting Network Vulnerabilities
    9. Web Application Hacking (OWASP Top 10)
    10. Self-Study: Web Hacking Techniques
    11. Module 4: Wireless, Social Engineering, and Physical Security
      Wireless Network Hacking
    12. Social Engineering & Physical Security
    13. Self-Study: Human Hacking Techniques
    14. Module 5: Post-Exploitation & Maintaining Access
      Privilege Escalation & Lateral Movement
    15. Covering Tracks & Persistence Techniques
    16. Self-Study: Real-World Malware & Persistence Tactics
    17. Module 6: Final Assessment & Capstone Project
      Penetration Test Planning & Reporting
    18. Capstone Project – Full-Scale Penetration Test
    19. Self-Study: Final Exam & Project Submission
    CSRP | Ethical Hacking Course Syllabus | Ethical Hacking
    Lesson 1 of 19
    In Progress
    Next→

    Course Syllabus | Ethical Hacking

    omri sagron 15/06/2025
    Facebook Instagram Linkedin
    Explore
    • About Us
    • Contact
    • Help Center
    • Testimonials
    • Cybersecurity Career Pathways
    Programs
    • Children & Youth
    • Workforce Development (CSRP)
    • Certification Courses
    Support
    • FAQs
    • Pricing Plans
    • Partnerships
    • Instructor-Led Training
    Office Headquarters

    Cyber School Ltd

    Tzahal Square, Kiryat Shmona, Israel, 1101901, P.O. Box: 1060

    • info@cyber-school.co.il
    • +972-77-7781383

    © 2025 Cyber School. All rights reserved.

    • Privacy Policy
    • Our Terms

    Report

    There was a problem reporting this post.

    Harassment or bullying behavior
    Contains mature or sensitive content
    Contains misleading or false information
    Contains abusive or derogatory content
    Contains spam, fake content or potential malware

    Block Member?

    Please confirm you want to block this member.

    You will no longer be able to:

    • See blocked member's posts
    • Mention this member in posts
    • Invite this member to groups
    • Message this member
    • Add this member as a connection

    Please note: This action will also remove this member from your connections and send a report to the site admin. Please allow a few minutes for this process to complete.

    Report

    You have already reported this .