Free course
US$0.00
Premium course
US$30.90
Cyber Security Ethical Hacking Course
Become a master of ethical hacking with our Cyber Security Ethical Hacking Course, tailored for Kenyan tech professionals looking to sharpen their skills. Dig deep into network scanning, checking for weaknesses, and how to use those weaknesses (ethically, of course!). Learn how to spot active computers, find out what services they're running, and do port scanning. Explore what to do *after* you've gained access, including securely getting data out and writing up detailed reports about the weaknesses you found. Gain serious skills in making proper reports, figuring out risks, and understanding the ethical side of things, so you've got a well-rounded knowledge of cybersecurity.
- Get proper good at network scanning: Spot active computers and find services running on them, sharp sharp.
- Conduct vulnerability assessments: Use tools to scan networks and put risks in order of importance.
- Execute exploitation techniques: Use frameworks and get higher-level access, all above board.
- Develop post-exploitation strategies: Explore networks and safely extract data (with permission, of course!).
- Craft effective reports: Explain what you found clearly and suggest actions to take.

from 4 to 360h flexible workload
certificate recognized by the MEC
What will I learn?
Become a master of ethical hacking with our Cyber Security Ethical Hacking Course, tailored for Kenyan tech professionals looking to sharpen their skills. Dig deep into network scanning, checking for weaknesses, and how to use those weaknesses (ethically, of course!). Learn how to spot active computers, find out what services they're running, and do port scanning. Explore what to do *after* you've gained access, including securely getting data out and writing up detailed reports about the weaknesses you found. Gain serious skills in making proper reports, figuring out risks, and understanding the ethical side of things, so you've got a well-rounded knowledge of cybersecurity.
Elevify advantages
Develop skills
- Get proper good at network scanning: Spot active computers and find services running on them, sharp sharp.
- Conduct vulnerability assessments: Use tools to scan networks and put risks in order of importance.
- Execute exploitation techniques: Use frameworks and get higher-level access, all above board.
- Develop post-exploitation strategies: Explore networks and safely extract data (with permission, of course!).
- Craft effective reports: Explain what you found clearly and suggest actions to take.
Suggested summary
Before starting, you can change the chapters and workload. Choose which chapter to start with. Add or remove chapters. Increase or decrease the course workload.What our students say
FAQs
Who is Elevify? How does it work?
Do the courses have certificates?
Are the courses free?
What is the course workload?
What are the courses like?
How do the courses work?
What is the duration of the courses?
What is the cost or price of the courses?
What is an EAD or online course and how does it work?
PDF Course