Guaranteed Add to cart

SECO Institute Ethical Hacking Foundation distant course with exam in English from 14 October 2022 lasting 3 days provided by iLEARN Innovative Learning

SECO Institute Ethical Hacking Foundation offers an intensive hands-on introduction to ethical hacking. The course has been specifically designed for beginners with little or no programming experience. In Ethical Hacking Foundation, you will learn to hack by doing it in a risk-free virtual lab environment.

You will understand how hackers think and work, and you will try your hand at various hacking techniques, including Wi-Fi hacking, web vulnerability scanning, SQL injection, password cracking and file inclusion. At the end of the course, you will use your newly acquired hacking skills to perform a basic black-box penetration test.

Ethical Hacking Foundation Virtual course details:

  • Course provided in Virtual (Distant) mode: this method allows the candidate to participate actively interacting with the teacher and with the other students in the course, thanks to the use of an advanced web-conferencing solution that allows the candidate to follow the course videos, presentation slides and speak or use a chat with the teacher and the other students.
  • Course schedule: 1pm – 5.30pm CEST
  • Course dates: October 14th, 21st and 28th 2022

Material included in the Ethical Hacking Foundation Virtual course:

  • Official SECO-Institute course materials
  • Training from passionate instructors with exceptional skills
  • Access to the SECO lab environment
  • Access to the SECO member portal
  • Practice exam
  • Exam voucher
  • Membership to SECO’s Alumni Network after passing the exam


Distant courses are confirmed approximately three weeks before the actual start of the course, reaching the minimum number of participants required. For this reason, please, contact us before making any payments.





Individual price

Select Country

Course start date


Course end date



3 days




  • Hack a WEP-protected Wi-Fi network;
  • Use basic network sniffing and port scanning techniques;
  • Use web application vulnerability scanners (Dirb, Nikto and Vega) to find potential vulnerabilities;
  • Interpret the results of a basic vulnerability scan;
  • Run an automated SQL injection attack using SQLmap;
  • Crack a password hash with John the Ripper;
  • Brute-force a web-based login form;
  • Bypass client-side validation;
  • Use basic local file inclusion and remote file inclusion techniques to gain shell access and be able to execute commands on the system;
  • Perform a basic black-box penetration test

Who it is aimed at

This course ideally suits those new to the field of ethical hacking. Managers who want to gain insight into the possibilities and dangers of hacking are also welcome.


Introduction to Ethical Hacking

  • Definition of ethical hacking
  • The hacking cycle
  • Kali Linux

Network Hacking

  • Wireless networking including BSSID and ESSID, open and closed networks and WPA/WEP security
  • Find information about a wireless network adapter and configure it to be used in WiFi hacking
  • Packet capturing using airodump and injection in order to capture and crack a WEP key
  • Using nmap and the zenmap GUI for network discovery scanning

Penetration I

  • Introduction to dirb and nikto and how to interpret the initial results of a dirb and nikto scan
  • Launch a vulnerability scan with Vega and analyse / interpret results
  • Basic SQL commands and know some more special SQL commands
  • How to find a SQL Injection vulnerability
  • How to execute an automated SQL Injection with SQLmap
  • Crack a password hash with John The Ripper
  • Using hydra to brute-force a web-based login form

Penetration II

  • Manipulating parameters in web-pages including GET and POST parameters
  • Students become familiar with client and server-side validation
  • OWASP ZAP and Burpsuite ar
  • Using ZAP/BURP to bypass client-side validation
  • Using ZAP/BURP with cookies
  • Understanding file inclusion
  • Working of local file inclusion
  • Working of remote file inclusion
  • Using these techniques to gain shell access

Capture the Flag

Using the techniques learned in the previous 3 modules, you’ll break into the wireless network of Bicsma (the fictional company that Security Academy has created and uses in its trainings). You’ll discover interesting hosts and identify what services run on them. Lastly you will access and eventually exploit these services to gain access to the systems


There are no formal prerequisites for this SECO Institute Ethical Hacking Foundation exam.

Teacher language


Material course language


Exam type



S-EHF official certificate

Certificate type


Exam language


logo footer

iCONS - Innovative Consulting S.r.l.
Galleria J.F. Kennedy 10/A
20831 Seregno (MB) - Italy

0039 0362 330107

ISO 9001

Logo CSQ

2020 © iCONS - Innovative Consulting S.r.l.

iLEARN is a business unit of iCONS - Innovative Consulting Srl - VAT number 03334560962
iCONS - Innovative Consulting srl is certified ISO 9001 for training and consulting services.