Ethical Hacking and Countermeasures Version 8


Defend your corporate network against cyber-criminals by learning the tools and techniques they use to bypass security. Students undertaking the Ethical Hacking and Countermeasures course will learn about the ethics involved with ‘white hat’ hacking, along with the tools and techniques used by cyber-criminals to breach network security.


Defend your corporate network against cyber-criminals by learning the tools and techniques they use to bypass security. Students undertaking the Ethical Hacking and Countermeasures course will learn about the ethics involved with ‘white hat’ hacking, along with the tools and techniques used by cyber-criminals to breach network security. This knowledge can then be used to harden defences and reduce the risk of compromise, saving time and money that would otherwise be spent on recovering form a security breach.

The advanced security techniques covered in the Ethical Hacking and Countermeasures course are best suited to:

  • Network engineers and IT security professionals who need to understand hacking techniques so that they can better protect resources.
  • Network security consultants who want to offer ethical hacking services to clients.
  • Network security professionals tasked with testing defences and identifying potential vulnerabilities.
  • IT professionals who would like to cross-train for a career in IT and network security.
  • Individuals who would like to learn the skills and techniques required to make a career change into IT security.

Using instructor-led videos and 20 in-depth modules, the Ethical Hacking and Countermeasures course is delivered online, making contents available anyplace anytime, so that students can study whenever and wherever is most convenient for them. Participants can test their knowledge and understanding of the content using flash cards and educational games, whilst end of unit tests ensure they have fully grasped the concepts being taught before moving on to the next module.

Social networking tools built into the course platform allow students to share their real world knowledge and experience, so that participants learn from the successes and failures of their peers. Upon completion of the course students will not only have mastered the theories behind ethical hacking and prevention.

Key Learning Points

Over the course of 19 modules students are introduced to the techniques and tools used by hackers to gain access to protected system resources. Participants will then learn how to identify and block hacking attempts, so that corporate data remains safe from theft.

The 19 modules cover issues like:

  • Understanding the ethics involved in white hat hacking.
  • How cybercriminals test network protection measures and how these reconnaissance activities can be spotted and blocked early.
  • How to scan networks to identify potential vulnerabilities.
  • Using enumeration to catalogue system resources and potential routes to breach.
  • Automated tools for breaching security including Trojans, backdoors, viruses, worms and Denial of Service (DOS) attacks.
  • The role of social engineering to steal confidential information directly from employees.
  • Using sniffers and session hijacking to mask illegal access to system resources.
  • Web-based attacks that can take online systems down.
  • How wireless network security can be breached.
  • How hackers avoid protective measures like IDS, firewalls and honeypots.
  • Applying network forensic techniques to identify and catch hackers.
  • Using cryptography and steganography to protect data.
  • How to use the Metasploit toolkit to assess network protection measures and apply fixes where appropriate.

Advantages of this course

Students are taken through the necessary concepts and techniques to ensure they have a complete understanding of modern hacking techniques and how best to protect against them.

Among the benefits of taking the Ethical Hacking and Countermeasures course are:

  • Hands-on skills to identify potential security issues and correct them before cybercriminals can exploit them.
  • Educating users to play their part in network security, raising standards in the process.
  • Protecting against Trojans, viruses, worms and DDoS attacks that could cause costly downtime.
  • Improved knowledge and experience leading to greater efficiencies in their security roles.
  • New opportunities for promotion within the IT security team.
  • Improved employment and earning opportunities within the ethical hacking and IT security sector.
  • gaining an ethical hacking certification.

With ethical hackers earning an average of $100,000 (£65,000) each year, the investment in Ethical Hacking and Countermeasures course will quickly be repaid. For any security professional who wants to stay ahead of the criminals and earn a highly respected industry accreditation, this course is a must-have.

  • Intro to Course
  • Foot printing and Reconnaissance
  • Scanning Networks
  • Enumeration Module
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
  • Denial of Service
  • Social Engineering
  • Sniffers
  • Session Hijacking
  • Hacking Webservers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Evading IDS Firewalls and Honeypots
  • Buffer Overflow
  • Cryptography
  • Penetration Testing

Additional information

Exams Included


Course Type

Online Course

Expiry Date After Purchase

1 year

Device Processor

1 gigahertz (GHz)

RAM Required

1 GB

Operating System

iOS, Windows 10, Windows 7, Windows 8


Google Chrome, Internet Explorer 8 or above, Mozilla Firefox, Safari 6 or above


Android, iPad, iPhone, Mac, Windows


There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

We want you to be satisfied, so all eligible courses purchased on Vogate can be refunded within 14 days. For whatever reason, if you are unhappy with a course, you can request a refund, provided the request meets the guidelines in our refund policy.

Certain restrictions may apply and some purchases may only be eligible for credit refunds. For more information regarding our refund policy, please see below.

How to submit a refund request

If you’re looking for instructions on how to submit a refund request, please visit our support and help section

Our 14-day policy

While our 14-day refund policy is to allow customers to learn risk free, we must also protect our vendors from fraud and provide them a reasonable payment schedule. Payments are sent to vendor after 30 days, so we will not process refund requests received after 14 days of purchase.

Additional reasons for denied refunds

We reserve the right, in our sole discretion, to limit or deny refund requests in cases where we believe there is refund abuse, including but not limited to the following:

  • A significant portion of the course has been consumed or downloaded by a customer before the refund was requested.
  • Multiple refunds have been requested by a customer for the same course or other courses
  • Excessive refunds have been requested by a customer.
  • Users who have their account reported, banned or course access disabled due to a violation of our Terms or Trust & Safety Guidelines. 
  • We do not grant refunds for any subscription services.

These refund restrictions will be enforced to the extent permitted by applicable law. 

You may also like…