Ethical Hacking Foundation

Penetration tests are employed by organizations that hire certified ethical hackers to penetrate networks and computer systems with the purpose of finding and fixing security vulnerabilities.

Image description

The purpose of ethical hacking is to evaluate the security of a computer system or network through the discovery and exploitation of vulnerabilities in a legal manner. Candidates are expected to be very aware of the difference between legal and illegal hacking, and the consequences of misuse.

Summary


Today’s technology is moving fast and changing the way we do business. Companies digitize all information by default, store their data in the cloud and use open source software. This raises information security issues related to network and system infrastructure. The purpose of ethical hacking is to evaluate the security of a computer system or network through the discovery and exploitation of vulnerabilities in a legal manner.

The EXIN Ethical Hacking Foundation module covers the basic steps of ethical hacking: intelligence gathering, scanning computer network/systems, and penetrating systems.

In more detail the candidate will develop an understanding of the following topics:


* Network sniffing (gathering information from network traffic)
* Cracking a WEP and WPA(2) key from a wireless network
* Network vulnerability scanning
* Basic penetration of computer systems
* Password cracking
* Web-based hacking, containing SQL Injections (SQLi), Cross-Site Scripting (XSS), Remote File Inclusions (RFI)

The EXIN Ethical Hacking Foundation exam tests the knowledge of the candidate on:


* the basics of Ethical Hacking and
* the practice of Ethical Hacking

Target group


This certificate is meant for security officers, network architects, network administrators, security auditors, security professionals, computer programmers and networking experts, managers working in the field of ethical hacking and anyone who is interested in improving and/or testing the security of an IT infrastructure. The module is also meant for (beginning) ethical hackers who want to get certified and verify their knowledge.

Prerequisite(s)
None. However, a training Ethical Hacking Foundation and knowledge of Linux is highly recommended.

Examination details

* Exam duration: 60 minutes
* Number of questions: 40
* Pass mark: 65% (26 points)
* Open book/notes: no
* Electronic equipment/aides permitted: no

Contact hours
The recommended minimum number of contact hours for this training course is 16. This includes group assignments, exam preparation and short breaks. This number of hours does not include homework, logistics for exam preparation and lunch breaks.

Indicative study effort
60 hours, depending on prior knowledge