About this course
This course provides a structured, hands-on introduction to offensive cybersecurity following the CEH
(Certified Ethical Hacker) framework. Students’ progress from foundational concepts through practical
exploitation techniques, building both theoretical knowledge and real-world skills.
Audience profile
People from different IT or programming backgrounds can learn can start a career in Cyber Security. Even a fresher with basic knowledge of Linux and one scripting language can start Cyber Security.
Learning Objectives
• Understand the ethical and legal framework of penetration testing
• Master foundational networking, Linux, and reconnaissance skills
• Perform vulnerability assessments and interpret CVE data
• Conduct web application security testing using industry tools (Burp Suite, Caido)
• Use Metasploit, Hydra, and John the Ripper for exploitation and password attacks
• Understand threat landscapes for wireless, mobile, IoT, and cloud environments
• Produce a professional penetration testing report
Required Lab Environment
• Kali Linux (VM recommended: VirtualBox or VMware)
• Intentionally vulnerable lab machines for exploitation practice
• OWASP Juice Shop (web application vulnerability lab)
• Minimum 8GB RAM, 60GB disk for host machine
Price
400 Euro / 40.000 ALL
Course Topics
1 Introduction to Ethical Hacking & Cryptography Basics Foundations
2 Networking Fundamentals Networking
3 Linux Fundamentals Linux
4 Reconnaissance and Foot printing Recon
5 Scanning and Enumeration Scanning
6 Vulnerability Assessment & Malware Threats Vuln Assessment
7 Web Application Security Basics Web Security
8 Exploitation and Password Attacks Exploitation
9 Specialized Attack Vectors (Theory Focus) Specialized (Theory)
10 Cloud Security Fundamentals Cloud Security
Për të filluar kursin e Cyber Security duhet të zotëroni bazat e IT-së.

