top of page

1,999

Ethical-Hacker

Valid for 9 months

*Typical completion, beginning to end: 6-9 months, when studying regularly

Ethical Hacker Bundle

Intro-to-Cyber, Network Research,  Penetration Testing and Network Security

Progress from cybersecurity basics to advanced penetration testing and network security.

Series

NX Defense & ZX Offense

Program Codes

XE101 / NX201 / ZX301 / ZX305

Duration

Self-Pace*

*Typical completion, beginning to end: 6-9 months, when studying regularly

What Our Clients Say

John Bryce.jpg
“Over 1000 of our students have been trained using ThinkCyber's Products and Services. The hands-on experience they gain from using the Cyberium Arena Simulator and Specto is invaluable and has been instrumental in their career progression”

— John Bryce Training Center, Israel

HLS Testomonial.jpg
“The training was crucial, providing my team with a wealth of knowledge through hands-on experiences. This is why, throughout June 2023, we will be welcoming SOC analysts from across the nation to participate in the CACC (CERT-IL Advanced Cyber Training). This training, facilitated by ThinkCyber and utilizing the Cyberium simulator, will provide invaluable experience and knowledge upgrades.”

— Homeland Security

James CFC Testimonial.jpg
“Our students are getting excellent positions such as SOC Analysts, Network Security Engineers, Forensics and Penetration Testers thanks to the applicable and relevant hands-on cybersecurity skills they've acquired through ThinkCyber's solutions.”

— James Lim, CEO of Centre for Cybersecurity Institute, Singapore

Army Testimonial.jpg
“Exceptional course! I've attended numerous programs, but this outshines them all in every conceivable way: the comprehensive content, the expert guidance, the practical exercises, and the seamless organization of the entire course.”

— Defense Forces

Program Recognition & Impact

Our ethical hacking methodology builds comprehensive offensive security capabilities from the ground up:

  • Built on military-grade penetration testing approaches

  • Develops systematic security assessment expertise

  • Masters advanced exploitation techniques

  • Builds real-world attack capabilities

  • Delivers professional offensive security skills

Real-World Training Environment

Execute comprehensive offensive security assessments from basic networking to advanced exploitation:   

  • Progress through systematic penetration testing steps

  • Work with professional security testing tools

  • Practice controlled exploitation techniques

  • Perform advanced network attacks

  • Apply enterprise penetration testing methods

Description

Build a complete ethical hacking skillset - from understanding basic cyber concepts to mastering advanced network attacks. Progress through network fundamentals, security testing, exploitation techniques, and advanced network security. Perfect for those aiming to become professional penetration testers.

What You Will Learn

The Ethical Hacking bundle provides a comprehensive, hands-on approach to digital forensics across Windows, Network, and Linux environments. This powerful combination of training programs equips cybersecurity professionals with the essential skills needed to investigate, analyze, and secure modern computing systems.

NX212  – WINDOWS FORENSICS
  • This module explores file and disk handling, encoding, and number systems, delving into digital sizes and SSD features. It includes hands-on training with a Hex Editor and teaches disk and file viewing techniques. The section proceeds to cover automatic carving, and methods to examine system files and metadata in Windows.

    • Files and Disks

    • Encoding

    • Number Systems

    • Digital Sizes

    • Solid State Drive (SSD) Features

    • Hex Editor

    • Working with Offsets

    • Viewing Files

    • Viewing Disks

    • Automatic Carving

    • Carving Methods

    • Automatic Carvers

    • Windows System Files

    • Metadata

    • Viewing Metadata

    • Modified Accessed Created

    • Editing Exif Data
       

  • This module delves into steganography, teaching how to identify, extract, and create hidden files. It transitions into hard disk analysis, focusing on system files and Master File Table (MFT) analysis. It also imparts hands-on experience with Forensic Toolkit (FTK), a crucial tool for digital forensics. This module equips learners with vital skills in data hiding and disk analysis.

    • Steganography

    • Identify Hidden Files

    • Extracting Hidden Files

    • Creating Hidden Files

    • Hard Disk Analysis

    • System Files

    • MFT Analysis

    • Working with FTK

  • This module delves into the analysis of digital artifacts. It focuses on registry analysis, including data extraction and examination of NTUSER.DAT files. The module concludes with techniques for conducting a general search and the use of registry viewers, thereby enhancing learners' understanding of digital artifact investigation.

    • Artifacts

    • Artifact Directories

    • Browsers

    • Shadow Copies

    • Registry Analysis

    • Extracting Data

    • NTUSER.DAT Analysis

    • General Search

    • Registry Viewers
       

  • This module delves into the complex realms of memory, event, network, and malware analysis. It imparts key skills for inspecting computer memory, investigating system events, analyzing network interactions, and examining malicious software, thereby equipping learners with critical abilities for cyber forensics investigations.

    • Memory Analysis

    • Creating an Image

    • Working with Volatility

    • Carving Data from RAM

    • Events Analysis

    • Event Viewers

    • Setting Audit Policy

    • Custom Search

    • Network Analysis

    • Service Protocol Analysis

    • Identifying Darknet Connections

    • Malware Analysis

    • Basic Static Analysis

    • Basic Dynamic Analysis
       

NX213 – Network Forensics
  • Delve into the core of networking with an in-depth exploration of network protocols and packet structures. Master advanced tools and techniques, from Wireshark and TShark analysis to GeoIP integration and Scapy module applications. Enhance your skills in intrusion detection, packet crafting, and working with IPv6.

    • Networking

    • Network Protocols

    • Packet Structure

    • Netstat and ProcMon

    • SysInternal

    • Intrusion Detection Methods

    • Wireshark Advanced: Network Attacks

    • TShark Analysis

    • GeoIP Integration

    • Using the Scapy Module

    • Crafting and Analyzing Packets

    • Working with IPv6
       

  • Dive into the world of Zeek, a dynamic network analysis framework. Master the art of automating processes, monitoring data into logs, and utilizing Zeek-Cut parsing. Enhance investigative skills by replaying packets and crafting detailed timelines.

    • Zeek

    • Output Logs

    • Automating Process

    • Monitoring Data into Logs

    • Zeek-Cut Parsing

    • Replaying Packets for Investigating

    • Creating a Timeline
       

  • Embark on a comprehensive journey through network investigations, from understanding the MiTM attack and identifying network anomalies to mastering flow analysis. Delve into tools like NetworkMiner and file carvers, and navigate the intricacies of Wi-Fi, from capturing wireless traffic to managing network access modes.

    • Investigation Process

    • MiTM Attack

    • Find Network Anomalies 

    • Flow Analysis 

    • Network File Carving

    • NetworkMiner

    • File Carvers

    • Capturing Wireless Traffic

    • Gaining Access Through Wi-Fi

    • HTTPS Traffic 
       

  • Deepen your understanding of network security with IPS and IDS systems, focusing on their operation and configuration. Dive into the world of Sysmon, from installation to capturing network events. Enhance your expertise with tools like Snort, a cornerstone in intrusion detection.

    • IPS and IDS

    • Sysmon

    • Installing and Configuration Sysmon

    • Network Events

    • IDS/IPS Operation Process

    • IDS/IPS Configuration

    • Snort
       

NX215 – Linux Forensics
  • This module provides a comprehensive introduction to Linux fundamentals, then delves into the details of Linux services, including how they are managed and configured. Finally, it equips learners with scripting skills, vital for automation and advanced tasks in Linux environments.

    • Intro to Linux

    • Virtualization

    • Basic Commands

    • System Files

    • Services

    • Installation

    • Configuration Files

    • Logs Files

    • Scripting

    • File Permissions

    • Linux Automation
       

  • Log Analysis, it details how to inspect Linux logs for vital clues during an investigation. The File Analysis section teaches methods to dissect Linux file systems and extract meaningful data. Finally, Network Analysis imparts techniques for inspecting network traffic and identifying suspicious patterns or anomalies, essential for cyber investigations.

    • Log Analysis

    • Text Manipulation

    • Built-in Logs

    • Logs Best Practice

    • File Analysis

    • Metadata

    • Carving

    • Steganography

    • Calls

    • Network Analysis

    • Wireshark

    • General Network Tools

    • TShark Automation
       

  • The Artifact section instructs how to locate and interpret Linux system artifacts, invaluable in post-breach investigations. Live Analysis imparts skills to scrutinize active systems, identifying ongoing threats. The Analyzing Images portion discusses methods to inspect and interpret disk images, revealing concealed data or evidence.

    • Artifacts

    • Hashes and Encodings

    • User Files

    • Understanding Shells

    • System Files

    • Suspicious User-Info

    • Live Analysis

    • Mounting Partitions

    • Dumping Memory

    • Cloning HDD

    • Log File Advance Search

    • Captured Images

    • Working with FTK

    • Detecting Hidden Files and Directories
       

  • This module covers essential Network Protocols, providing an understanding of their operations and potential vulnerabilities. It then explores Network Attacks, discussing various attack vectors and strategies. Lastly, the module introduces the concept of hardening, teaching learners how to strengthen a Linux system against possible threats.

    • Netcat

    • Different Uses

    • Network Protocols

    • MiTM

    • Analyzing Traffic

    • Network Attacks

    • SSH

    • FTP

    • Hardening
       

bottom of page