The Penetration Testing and Ethical Hacking certification prep path prepares you to pass industry-leading penetration testing certifications, like Certified Ethical Hacker (CEH) from EC-Council.
Learners at 96% of Fortune 1000 companies trust Cybrary
Our Penetration Testing and Ethical Hacking certification course will introduce you to a variety of attack types, including password cracking, DDoS, SQL injection, session hijacking, social engineering, and other hacking techniques.
The course also covers an introduction to ethical hacking concepts, as well as web server and web application hacking. There are optional labs for this ethical hacking course that help students gain the hands-on hacking skills necessary to be successful on the job.
Our Penetration Testing and Ethical Hacking certification course prepares you with the knowledge and skills to earn industry-leading penetration testing certifications and the experience needed to excel in your career as a penetration tester or defensive (Blue Team) analyst.
The Leadership and Management Career Path is expected to release in Q2 of 2025. Sign up now to explore our other leadership courses and content.
Start Learning for FreeLearn core concepts and get hands-on with key skills.
To assess the strength of your organization’s cybersecurity posture, you need to gather information, perform scanning and enumeration, and show how an adversary could hack into your systems. This breif course introduces the skills needed to prepare for related certification exams so you can prove your capabilities.
This Penetration Testing and Ethical Hacking course covers Reconnaissance Techniques including footprinting and reconnaissance, scanning networks and enumeration.
This Penetration Testing and Ethical Hacking course covers System Hacking Phases and Attack Techniques which includes vulnerability analysis, system hacking, and malware threats.
This Penetration Testing and Ethical Hacking course covers Network and Perimeter Hacking which includes sniffing, social engineering, denial-of-service, session hijacking, and evading IDS, firewalls, and honeypots.
This Penetration Testing and Ethical Hacking course covers Web Application Hacking which includes hacking web servers, hacking web applications, and SQL injection.
This Penetration Testing and Ethical Hacking course covers Wireless Network Hacking.
This Penetration Testing and Ethical Hacking course covers Mobile Platform, IoT, and OT Hacking.
This Penetration Testing and Ethical Hacking course covers Cloud Computing.
This Penetration Testing and Ethical Hacking course covers Cryptography.
Exercise your problem-solving and creative thinking skills with security-centric puzzles
In this hands-on lab, you will learn the basics of Open-Source Intelligence (OSINT). You will practice gathering publicly available information about a target organization's assets and people from a number of sources.
In this hands-on lab, you will learn the basics of Nmap, including basic functionality and practical applications. You will practice scanning and enumeration using a range of different Nmap options.
In this lab, you will learn the basics of performing reconnaissance and enumeration on a target network. You will practice using Masscan and Nmap to scan and enumerate a network.
In this hands-on lab, you will learn the basics of local host enumeration. You will practice enumerating a Linux system using built-in commands and a Windows system using the WinPEAS script.
In this hands-on lab, you will learn the basics of vulnerability scanners, including basic functionality and practical applications. You will practice configuring and analyzing scans using the OpenVAS vulnerability scanner.
In this hands-on lab, you will learn the basics of password cracking. You will practice using Hashcat to crack passwords using both brute force and dictionary-based techniques.
In this hands-on lab, you will learn the basics of network sniffing, including passive and active sniffing techniques. You will practice using Wireshark to sniff network traffic, and retrieve and apply actionable information from a target network.
In this hands-on lab, you will learn the basics of Social Engineering. You will practice using the Social Engineering Toolkit to simulate a pharming attack and create a malicious payload to be delivered via a spearphishing email.
In this hands-on lab, you will learn the basics of identifying ingress and egress rules on a firewall. You will practice using Nmap to probe a live firewall in a simulated network environment and gather information about its rule configuration.
In this hands-on lab, you will learn the basics of Burp Suite, a popular web application penetration testing tool. You will practice using some core features of Burp Suite to identify and exploit vulnerabilities in a web application.
In this hands-on lab, you will learn the basics of Server-Side Request Forgery (SSRF) Attacks. You will practice performing live SSRF attacks against a vulnerable web application.
In this hands-on lab, you will learn the basics of API Attacks. You will practice exploiting some common API vulnerabilities in a REST-based web application.
In this hands-on lab, you will learn the basics of deserialization attacks. You will practice performing deserialization attacks using Python scripts and Burp Suite.
In this hands-on lab, you will learn the basics of injection attacks. You will practice performing SQL injection, command injection, and XSS attacks against a vulnerable web application.
In this hands-on lab, you will learn about the basics of cryptography and the cryptographic process. You will practice encrypting and decrypting messages using a simple simple ciphe
In this hands-on lab, you will learn about the basics of symmetric cryptography. You will practice encrypting and decrypting messages using symmetric cryptography.
Assess your knowledge and skills to identify areas for improvement and measure your growth
Master the core techniques and technologies of penetration testing and ethical hacking and assess the security posture of systems in a lawful manner. The Ethical Hacking (CEH Preparation) Practice Test will help you learn the critical topics covered on the CEH exam.
Cybrary’s expert-led cybersecurity courses help your team remediate skill gaps and get up-to-date on certifications. Utilize Cybrary to stay ahead of emerging threats and provide team members with clarity on how to learn, grow, and advance their careers within your organization.
Put your skills to the test in virtual labs, challenges, and simulated environments.
Track your skills development from lesson to lesson using the Cybrary Skills Tracker.
Connect with peers and mentors through our supportive community of cybersecurity professionals.
This certification prep path is designed for mid-career practitioners who are interested in ethical hacking.
This certification prep path is aligned with the topics and skills covered in the CEH v4 exam.
Yes! Ethical hacking, also known as “white hat” hacking, helps organizations identify and fix security vulnerabilities before malicious hackers can exploit them. While ethical hackers do use the same techniques as cybercriminals, they operate with proper authorization and follow legal and professional guidelines. For them, hacking is performed for defensive purposes — to help companies, government entities, and other organizations strengthen their cybersecurity posture.
Ethical hackers are able to help private businesses, public organizations, and government agencies by infiltrating their secure systems to identify flaws and weaknesses. They determine which system areas are secure and which need additional protections to prevent threats like malware attacks.
Building and expanding your skill set with ethical hacking courses can introduce new career opportunities and prepare you for a specialized offensive security role. With Cybrary's online penetration testing and ethical hacking course, you will learn how to protect networks from malicious hackers by learning to exploit networks yourself.
Some common titles for professional hacking experts include penetration tester, ethical hacker, security consultant, red team member, and vulnerability analyst. An understanding of ethical hacking is also helpful for cybersecurity professionals in other roles, such as information security analyst, security engineer, information security manager, and network security specialist.
While not all ethical hacking and penetration testing positions require that you have certifications, it is a valuable credential to present to new or potential employers. Industry-recognized credentials validate your fundamental knowledge of how to protect systems using ethical hacking and penetration testing techniques.