Certification Prep

Penetration Testing & Ethical Hacking

Certification Prep

The Penetration Testing and Ethical Hacking certification prep path prepares you to pass industry-leading penetration testing certifications, like Certified Ethical Hacker (CEH) from EC-Council.

Path Releasing Q2 2025
Full access included with 
Cybrary Insider Pro
 and 
Teams

30

H

56

M
Time

Intermediate

i
Designed for learners with a solid grasp of foundational IT and cybersecurity concepts who are interested in pursuing an entry-level security role.
Experience Level

29

i

Earn qualifying credits for certification renewal with completion certificates provided for submission.
CEU's

Enrollees

Learners at 96% of Fortune 1000 companies trust Cybrary

About this Path

Our Penetration Testing and Ethical Hacking certification course will introduce you to a variety of attack types, including password cracking, DDoS, SQL injection, session hijacking, social engineering, and other hacking techniques. 

The course also covers an introduction to ethical hacking concepts, as well as web server and web application hacking. There are optional labs for this ethical hacking course that help students gain the hands-on hacking skills necessary to be successful on the job.

Our Penetration Testing and Ethical Hacking certification course prepares you with the knowledge and skills to earn industry-leading penetration testing certifications and the experience needed to excel in your career as a penetration tester or defensive (Blue Team) analyst.

Read More

Skills you'll gain

Path Outline

Collection Outline

Coming Soon

The Leadership and Management Career Path is expected to release in Q2 of 2025. Sign up now to explore our other leadership courses and content.

Start Learning for Free
1

Learn

Learn core concepts and get hands-on with key skills.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
Ethical Hacking: Introduction to Ethical Hacking
1
H
M

To assess the strength of your organization’s cybersecurity posture, you need to gather information, perform scanning and enumeration, and show how an adversary could hack into your systems. This breif course introduces the skills needed to prepare for related certification exams so you can prove your capabilities.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
Ethical Hacking: Reconnaissance Techniques
1
H
18
M

This Penetration Testing and Ethical Hacking course covers Reconnaissance Techniques including footprinting and reconnaissance, scanning networks and enumeration.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
Ethical Hacking: System Hacking Phases and Attack Techniques
1
H
31
M

This Penetration Testing and Ethical Hacking course covers System Hacking Phases and Attack Techniques which includes vulnerability analysis, system hacking, and malware threats.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
Ethical Hacking: Network and Perimeter Hacking
1
H
14
M

This Penetration Testing and Ethical Hacking course covers Network and Perimeter Hacking which includes sniffing, social engineering, denial-of-service, session hijacking, and evading IDS, firewalls, and honeypots.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
Ethical Hacking: Web Application Hacking
H
25
M

This Penetration Testing and Ethical Hacking course covers Web Application Hacking which includes hacking web servers, hacking web applications, and SQL injection.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
Ethical Hacking: Wireless Network Hacking
H
9
M

This Penetration Testing and Ethical Hacking course covers Wireless Network Hacking.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
Ethical Hacking: Mobile Platform, IoT, and OT Hacking
H
23
M

This Penetration Testing and Ethical Hacking course covers Mobile Platform, IoT, and OT Hacking.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
Ethical Hacking: Cloud Computing
H
9
M

This Penetration Testing and Ethical Hacking course covers Cloud Computing.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
Ethical Hacking: Cryptography
H
23
M

This Penetration Testing and Ethical Hacking course covers Cryptography.

2

Practice

Exercise your problem-solving and creative thinking skills with security-centric puzzles

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
OSINT
1
H
15
M

In this hands-on lab, you will learn the basics of Open-Source Intelligence (OSINT). You will practice gathering publicly available information about a target organization's assets and people from a number of sources.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Nmap Basics
1
H
10
M

In this hands-on lab, you will learn the basics of Nmap, including basic functionality and practical applications. You will practice scanning and enumeration using a range of different Nmap options.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Network Reconnaissance
1
H
20
M

In this lab, you will learn the basics of performing reconnaissance and enumeration on a target network. You will practice using Masscan and Nmap to scan and enumerate a network.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Local Host Enumeration
1
H
0
M

In this hands-on lab, you will learn the basics of local host enumeration. You will practice enumerating a Linux system using built-in commands and a Windows system using the WinPEAS script.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Vulnerability Scanner Basics
1
H
5
M

In this hands-on lab, you will learn the basics of vulnerability scanners, including basic functionality and practical applications. You will practice configuring and analyzing scans using the OpenVAS vulnerability scanner.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Password Cracking
1
H
10
M

In this hands-on lab, you will learn the basics of password cracking. You will practice using Hashcat to crack passwords using both brute force and dictionary-based techniques.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Network Sniffing
1
H
20
M

In this hands-on lab, you will learn the basics of network sniffing, including passive and active sniffing techniques. You will practice using Wireshark to sniff network traffic, and retrieve and apply actionable information from a target network.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Social Engineering Basics
1
H
30
M

In this hands-on lab, you will learn the basics of Social Engineering. You will practice using the Social Engineering Toolkit to simulate a pharming attack and create a malicious payload to be delivered via a spearphishing email.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Identifying Ingress and Egress Rules
1
H
25
M

In this hands-on lab, you will learn the basics of identifying ingress and egress rules on a firewall. You will practice using Nmap to probe a live firewall in a simulated network environment and gather information about its rule configuration.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Burp Suite Basics
1
H
20
M

In this hands-on lab, you will learn the basics of Burp Suite, a popular web application penetration testing tool. You will practice using some core features of Burp Suite to identify and exploit vulnerabilities in a web application.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
SSRF Attacks
1
H
20
M

In this hands-on lab, you will learn the basics of Server-Side Request Forgery (SSRF) Attacks. You will practice performing live SSRF attacks against a vulnerable web application.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
API Attacks
1
H
30
M

In this hands-on lab, you will learn the basics of API Attacks. You will practice exploiting some common API vulnerabilities in a REST-based web application.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Deserialization Attacks
1
H
20
M

In this hands-on lab, you will learn the basics of deserialization attacks. You will practice performing deserialization attacks using Python scripts and Burp Suite.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Injection Attacks
1
H
25
M

In this hands-on lab, you will learn the basics of injection attacks. You will practice performing SQL injection, command injection, and XSS attacks against a vulnerable web application.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Cryptography Basics
0
H
30
M

In this hands-on lab, you will learn about the basics of cryptography and the cryptographic process. You will practice encrypting and decrypting messages using a simple simple ciphe

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Symmetric Cryptography
0
H
55
M

In this hands-on lab, you will learn about the basics of symmetric cryptography. You will practice encrypting and decrypting messages using symmetric cryptography.

3

Prove

Assess your knowledge and skills to identify areas for improvement and measure your growth

CyberVista Practice Test
CyberVista Practice Test
CyberVista Practice Test
CyberVista Practice Test
CyberVista Practice Test
CyberVista Practice Test
Ethical Hacking (CEH Preparation)
1
H
30
M

Master the core techniques and technologies of penetration testing and ethical hacking and assess the security posture of systems in a lawful manner. The Ethical Hacking (CEH Preparation) Practice Test will help you learn the critical topics covered on the CEH exam.

4

Train Your Team

Cybrary’s expert-led cybersecurity courses help your team remediate skill gaps and get up-to-date on certifications. Utilize Cybrary to stay ahead of emerging threats and provide team members with clarity on how to learn, grow, and advance their careers within your organization.

Instructors

Joseph White
Lab Architect
Read Full Bio
Garret Donaldson
Lab Architect
Read Full Bio
Tyler Boykin
Principle Penetration Tester
Read Full Bio
Bill Price
Read Full Bio

Get Hands-on Learning

Put your skills to the test in virtual labs, challenges, and simulated environments.

Measure Your Progress

Track your skills development from lesson to lesson using the Cybrary Skills Tracker.

Connect with the Community

Connect with peers and mentors through our supportive community of cybersecurity professionals.

Success from Our Learners

"Cybrary really helped me get up to speed and acquire a baseline level of technical knowledge. It offers a far more comprehensive approach than just learning from a book. It actually shows you how to apply cybersecurity processes in a hands-on way"

Don Gates

Principal Systems Engineer/SAIC

"Cybrary’s SOC Analyst career path was the difference maker, and was instrumental in me landing my new job. I was able to show the employer that I had the right knowledge and the hands-on skills to execute the role."

Cory

Cybersecurity analyst/

"I was able to earn my CISSP certification within 60 days of signing up for Cybrary Insider Pro and got hired as a Security Analyst conducting security assessments and penetration testing within 120 days. This certainly wouldn’t have been possible without the support of the Cybrary mentor community."

Mike

Security Engineer and Pentester/

"Cybrary really helped me get up to speed and acquire a baseline level of technical knowledge. It offers a far more comprehensive approach than just learning from a book. It actually shows you how to apply cybersecurity processes in a hands-on way"

Don Gates

Principal Systems Engineer/SAIC

"Cybrary’s SOC Analyst career path was the difference maker, and was instrumental in me landing my new job. I was able to show the employer that I had the right knowledge and the hands-on skills to execute the role."

Cory

Cybersecurity analyst/

"I was able to earn my CISSP certification within 60 days of signing up for Cybrary Insider Pro and got hired as a Security Analyst conducting security assessments and penetration testing within 120 days. This certainly wouldn’t have been possible without the support of the Cybrary mentor community."

Mike

Security Engineer and Pentester/

"Becoming a Cybrary Insider Pro was a total game changer. Cybrary was instrumental in helping me break into cybersecurity, despite having no prior IT experience or security-related degree. Their career paths gave me clear direction, the instructors had real-world experience, and the virtual labs let me gain hands-on skills I could confidently put on my resume and speak to in interviews."

Cassandra

Information Security Analyst/Cisco Systems

"I was able to earn both my Security+ and CySA+ in two months. I give all the credit to Cybrary. I’m also proud to announce I recently accepted a job as a Cyber Systems Engineer at BDO... I always try to debunk the idea that you can't get a job without experience or a degree."

Casey

Cyber Systems Engineer/BDO

"Cybrary has helped me improve my hands-on skills and pass my toughest certification exams, enabling me to achieve 13 advanced certifications and successfully launch my own business. I love the practice tests for certification exams, especially, and appreciate the wide-ranging training options that let me find the best fit for my goals"

Angel

Founder,/ IntellChromatics.

Frequently Asked Questions

Who is this for?

This certification prep path is designed for mid-career practitioners who are interested in ethical hacking.

Which versions of the exam are supported?

This certification prep path is aligned with the topics and skills covered in the CEH v4 exam.

Is ethical hacking legal?

Yes! Ethical hacking, also known as “white hat” hacking, helps organizations identify and fix security vulnerabilities before malicious hackers can exploit them. While ethical hackers do use the same techniques as cybercriminals, they operate with proper authorization and follow legal and professional guidelines. For them, hacking is performed for defensive purposes — to help companies, government entities, and other organizations strengthen their cybersecurity posture.

What do ethical hackers do?

Ethical hackers are able to help private businesses, public organizations, and government agencies by infiltrating their secure systems to identify flaws and weaknesses. They determine which system areas are secure and which need additional protections to prevent threats like malware attacks.

Why take an ethical hacking course?

Building and expanding your skill set with ethical hacking courses can introduce new career opportunities and prepare you for a specialized offensive security role. With Cybrary's online penetration testing and ethical hacking course, you will learn how to protect networks from malicious hackers by learning to exploit networks yourself.

What jobs are available for ethical hackers?

Some common titles for professional hacking experts include penetration tester, ethical hacker, security consultant, red team member, and vulnerability analyst. An understanding of ethical hacking is also helpful for cybersecurity professionals in other roles, such as information security analyst, security engineer, information security manager, and network security specialist.

Do I have to have certifications to get an ethical hacking job?

While not all ethical hacking and penetration testing positions require that you have certifications, it is a valuable credential to present to new or potential employers. Industry-recognized credentials validate your fundamental knowledge of how to protect systems using ethical hacking and penetration testing techniques.