Ethical Hacking

Learn to think like a hacker and defend like a pro. Master penetration testing, vulnerability assessment, network attacks, and web application hacking using industry-standard tools on Kali Linux.

6 Months Offline / Online Certificate Provided Hands-on Hacking Labs
6 MonthsCourse Duration
6 ModulesStructured Curriculum
Live Hacking LabsReal-world Practice
CEH PrepExam Guidance
CertificateOn Completion

Course Overview

The Ethical Hacking course at White Fortress Academy is a comprehensive, hands-on programme that trains you to identify, exploit, and fix security vulnerabilities in networks, systems, and web applications — legally and professionally.


You will learn how real attackers think and operate, so you can defend organisations against cyber threats. The course covers all the major domains of ethical hacking — reconnaissance, scanning, system hacking, network attacks, web app pentesting, wireless hacking, and social engineering.


All labs are performed in a controlled, legal environment using dedicated practice machines and virtual networks. This course also prepares you for the CEH (Certified Ethical Hacker) certification from EC-Council.

⚠️ Legal & Ethical Notice: All hacking techniques taught in this course are for educational purposes and ethical, legal security testing only. Students must not use these skills on systems without explicit written permission. White Fortress Academy strictly promotes responsible and ethical cyber security practice.

Course Curriculum

01

Networking & Linux Basics

Month 1
  • OSI & TCP/IP Model
  • IP Addressing, Subnetting & Protocols
  • Kali Linux Setup & Navigation
  • Linux Commands for Pentesters
  • Virtualisation — VMware & VirtualBox
  • Setting Up a Home Hacking Lab
02

Reconnaissance & Scanning

Month 1–2
  • Footprinting — WHOIS, DNS & OSINT
  • Google Hacking & Shodan Recon
  • Network Scanning with Nmap
  • Enumeration — SMB, SMTP, FTP, SNMP
  • Vulnerability Scanning — Nessus & OpenVAS
  • Recon-ng & Maltego for OSINT
03

System Hacking & Exploitation

Month 2–3
  • Password Cracking — Hashcat & John the Ripper
  • Metasploit Framework — Full Usage
  • Privilege Escalation Techniques
  • Maintaining Access & Backdoors
  • Anti-Virus Evasion Basics
  • Covering Tracks & Log Manipulation
04

Web Application Hacking

Month 3–4
  • OWASP Top 10 — Real Attack Demos
  • SQL Injection — Manual & Automated (SQLmap)
  • XSS, CSRF, IDOR & File Upload Attacks
  • Burp Suite — Intercepting & Fuzzing
  • Authentication Attacks & Session Hijacking
  • API Security Testing
05

Network & Wireless Attacks

Month 4–5
  • Man-in-the-Middle (MitM) Attacks
  • ARP Spoofing & DNS Poisoning
  • Wi-Fi Hacking — WPA2 Cracking with Aircrack-ng
  • Evil Twin & Rogue AP Attacks
  • Sniffing with Wireshark
  • DoS & DDoS Attack Simulation
06

Social Engineering & Final Labs

Month 5–6
  • Phishing — Email & Website Cloning
  • SET (Social Engineering Toolkit)
  • Malware Analysis Basics
  • Writing Professional Pentest Reports
  • Bug Bounty Introduction — HackerOne
  • Capstone: Full Pentest Lab Challenge

Tools You Will Master

Kali Linux Nmap Metasploit Burp Suite Wireshark SQLmap Hashcat John the Ripper Aircrack-ng Nikto Hydra SET Toolkit Gobuster Recon-ng OWASP ZAP

Career Opportunities

🔐

Penetration Tester

Conduct authorised security tests on organisations' systems and networks for vulnerabilities.

🛡️

SOC Analyst

Monitor security systems, detect threats, and respond to cyber incidents in real time.

🌐

Web Application Security

Assess and fix vulnerabilities in web applications for companies and as a bug bounty hunter.

🏆

Bug Bounty Hunter

Find and report security vulnerabilities on platforms like HackerOne and Bugcrowd for rewards.

🔒

Cyber Security Consultant

Advise companies on their security posture, policies and incident response strategies.

🔍

Digital Forensics

Investigate cyber crimes, collect evidence and produce forensic reports for legal proceedings.

Course Details

Duration: 6 Months


Mode: Offline (Delhi Centre) / Online Classes Available


Batch Timing: Morning & Evening Batches (Mon–Sat)


Eligibility: Basic networking and computer knowledge required. No prior hacking experience needed.


Certificate: Completion Certificate from White Fortress Academy provided on passing


Exam Prep: Guidance and preparation support for CEH (EC-Council) certification


Support: Pentest report writing + Bug bounty guidance + Resume & Placement support

Become a Certified Ethical Hacker!

Join the Ethical Hacking course and build the skills to protect organisations from cyber threats — and get paid for it.

Enroll Now Ask on WhatsApp