This course employs a hands-on training environment to provide a systematic ethical hacking process. You will learn creative techniques of achieving optimal information security posture in the target organization. You will practice the skills to scan, test, hack and secure target systems while covering the Five Phases of Ethical Hacking: Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

Prerequisite: Intro to Ethical Hacking

Learning Outcomes

At the end of this course the participant will be able to:
  • Describe different types and methods of malicious software, viruses, malware attacks, network attacks, physical security attacks and vulnerabilities.
  • Identify tools for foot printing, DNS zone transfers and current types of social engineering.
  • Select port scanning tools and produce port scanning reports.
  • Describe and demonstrate the enumeration of current operating systems.
  • Use basic programming concepts.
  • Describe vulnerabilities and techniques to harden current operating systems.
  • Identify embedded systems, where they are used, and vulnerabilities associated with them.
  • Describe web applications, their vulnerabilities and the tools used to attack them.
  • Identify type and uses of wireless technology and wireless standards.
  • Describe terms related to cryptography and cryptanalysis.
  • Identify and describe network protection systems


40 hours

View Schedule and Register

No content found

No content found

Trust an Unbiased Global View

This course is technology- and policy-agnostic. It is designed, structured, and delivered based on a blend of learning processes and real-world experiences. This ensures you get a truly unbiased world view of universally applicable information and cybersecurity principles and practices presented from a neutral, Canadian perspective.

Access a Continuum of Learning

By completing the Information and Cybersecurity Management Certificate program, you will have what you need to transition to additional learning in the field or bridge to other programs offered by PDI.

The Information and Cybersecurity Management Program is an integral part of a continuum of learning ecosystem in security, cybersecurity, and other disciplines offered by the University of Ottawa Professional Development Institute (uOttawa PDI). The knowledge, skills, and abilities you acquire through this program are complementary to other offerings in PDI’s security portfolio, including:

Financial Intelligence Specialist Program

National Security and Intelligence Advance Certificate

Coding for Veterans

Cyber Skills for Canadians

Subscribe to Our Cyber Newsletter

Explore Other Programs