Ethical Hacking Foundation

Learn to think like a hacker to defend like a security expert. Master penetration testing methodologies, vulnerability assessment, and ethical hacking techniques to identify and fix security weaknesses before malicious actors can exploit them.

Choose Your Learning Path

Select the program format that fits your schedule and learning preferences

Part-time Program

Online | Evening Sessions

Duration: 6 Months
Schedule: Mon-Fri, 6PM-9PM
Learning Mode: 100% Remote
Tuition Fee: KES 110,000
Enrollment: Ongoing - Open Now
Apply Now

Full-time Online

Online | Day Sessions

Duration: 4 Months
Schedule: Mon-Fri, 8AM-5PM
Learning Mode: 100% Online
Tuition Fee: KES 95,000
Enrollment: Ongoing - Open Now
Apply Now

Full-time Hybrid

In-person/Hybrid

Duration: 4 Months
Schedule: Mon-Thur, 9AM-2PM
Learning Mode: Flexible Hybrid
Tuition Fee: KES 110,000
Enrollment: Ongoing - Open Now
Apply Now

Why Choose Ethical Hacking?

In an era of increasing cyber threats, organizations need professionals who can proactively identify security vulnerabilities before attackers do. Ethical hacking provides the skills to legally and ethically test systems for weaknesses.

This hands-on program teaches you the tools and techniques used by both attackers and defenders. You'll learn penetration testing methodologies, network reconnaissance, vulnerability scanning, and exploitation in controlled lab environments.

With cyber attacks becoming more sophisticated, the demand for ethical hackers continues to grow across industries including finance, healthcare, government, and technology.

Ethical Hacking Concept

Course Details

Everything you need to know about the program

This program is ideal for:

  • IT professionals seeking cybersecurity expertise
  • Network administrators wanting security skills
  • System administrators responsible for security
  • Career changers interested in cybersecurity
  • Developers wanting to build more secure applications
  • Penetration testing methodologies
  • Network reconnaissance and scanning
  • Vulnerability assessment techniques
  • Exploitation frameworks (Metasploit)
  • Web application security testing
  • Wireless network security assessment
  • Social engineering techniques
  • Basic understanding of networking concepts
  • Familiarity with operating systems (Windows/Linux)
  • Logical and analytical thinking skills
  • Laptop with virtualization capability (16GB RAM recommended)
  • Strong ethical foundation and responsibility
  • Interest in cybersecurity and technology
  • Controlled lab environments for safe practice
  • Industry-experienced ethical hackers as instructors
  • Preparation for CEH (Certified Ethical Hacker) exam
  • Capture The Flag (CTF) competitions
  • Access to security tools and virtual machines
  • Career guidance for penetration testing roles

Curriculum Overview

Comprehensive modules designed for practical mastery

1

Footprinting & Reconnaissance

  • Information gathering techniques
  • DNS enumeration and analysis
  • Network scanning with Nmap
  • Social engineering reconnaissance
2

Vulnerability Analysis

  • Vulnerability scanning tools
  • CVSS scoring and prioritization
  • False positive analysis
  • Remediation planning
3

System Hacking

  • Password attacks and cracking
  • Privilege escalation techniques
  • Maintaining access (backdoors)
  • Covering tracks and logs
4

Web Application Security

  • OWASP Top 10 vulnerabilities
  • SQL injection attacks
  • Cross-site scripting (XSS)
  • Cross-site request forgery (CSRF)
5

Network Attacks

  • Man-in-the-middle attacks
  • Denial of Service (DoS) techniques
  • Wireless network attacks
  • IDS/IPS evasion methods
6

Capstone Project

  • Full penetration test engagement
  • Comprehensive security assessment
  • Professional report writing
  • Client presentation and debrief

Career Opportunities

Roles you can pursue after completing the bootcamp

Penetration Tester

Conduct authorized simulated attacks on computer systems to evaluate security and identify vulnerabilities.

Security Consultant

Advise organizations on security best practices, conduct assessments, and recommend improvements.

Vulnerability Analyst

Identify, assess, and prioritize vulnerabilities in systems and applications for remediation.

Red Team Specialist

Simulate real-world attacks as part of a team to test an organization's detection and response capabilities.

Ready to Become a Guardian of Digital Security?

Join our Ethical Hacking Foundation program and develop the skills to protect organizations from cyber threats. With our practical, hands-on approach, you'll learn to think like an attacker to better defend digital assets and launch a rewarding career in cybersecurity.

Choose Your Program Now