Workshop
Ethical Hacking for Beginners
You will transition from simply understanding cyber threats to thinking like an ethical hacker — gaining insight into how attacks unfold, and how security professionals detect and prevent them.
Why Bakkah?
By the end of the course, you will be able to:
- Define the concept of ethical hacking and explain its purpose in strengthening cybersecurity defenses.
- Differentiate between ethical hackers, malicious hackers, and penetration testers, understanding the legal and ethical boundaries of each role.
- Describe the key phases of an ethical hacking or penetration testing process — including reconnaissance, scanning, exploitation, and reporting.
- Identify common system, network, and web application vulnerabilities targeted by attackers.
- Explain how ethical hacking supports risk management, compliance, and incident prevention within organizations.
- Apply basic principles of ethical hacking to assess potential weaknesses and recommend appropriate defensive measures.
- Demonstrate awareness of professional standards, responsible disclosure practices, and the importance of obtaining proper authorization before conducting any testing activities.
- Aspiring cybersecurity professionals seeking to build a foundation in ethical hacking and penetration testing techniques.
- IT administrators, network engineers, and system support staff who want to understand how attackers exploit technical weaknesses and how to defend against them.
- Students and learners interested in exploring the offensive side of cybersecurity in a controlled, legal, and educational context.
- Information security practitioners and risk managers aiming to enhance their understanding of how vulnerabilities are identified and mitigated.
- Anyone curious about ethical hacking concepts, who wishes to develop a proactive mindset toward protecting systems, networks, and data.
- Understanding ethical hacking principles and differentiating between authorized and malicious hacking activities.
- Applying the key phases of a penetration test, from reconnaissance and scanning to exploitation and reporting.
- Identifying and analyzing vulnerabilities in systems, networks, and web applications.
- Interpreting attacker behavior and tactics, helping anticipate and defend against real-world threats.
- Practicing responsible disclosure and legal compliance, ensuring all security testing is performed ethically and with authorization.
- Developing structured security reports, documenting findings, and recommending effective remediation measures.
- Adopting a hacker’s mindset for defense, using offensive knowledge to strengthen organizational resilience.
- Pre-Reading file
- Reading Learning Materials.
- Pre and Post Course Assessments.
- Modules Exercises.
- The material language will be English.
- Module 1: Introduction to Ethical Hacking
- Module 2: Reconnaissance and Information Gathering
- Module 3: Scanning and Enumeration
- Module 4: System Hacking Basics
- Module 5: Web Application Security Basics
- Module 6: Network Security and Defense
- Module 7: Reporting and Remediation