Date: On Demand
Duration: 3 Days
Course Overview
With our increasingly digitalised world, cyberthreats and cyberattacks are also alarmingly on the rise. Ethical hacking helps security professionals systematically footprint, enumerate, scan, and test-exploit their own systems. Based on the identified system weaknesses, the professionals can subsequently secure their systems by hardening the systems against future attacks.
This practice-oriented module demonstrates how cyberattacks can target hosts, networks, and web servers. It also demonstrates how the target systems can subsequently be hardened. With its hands-on approach, the module puts cybersecurity knowledge and concepts into practice by employing various offensive and defensive tools in attacking and defending systems, respectively. The participants will learn practical skills in conducting ethical hacking based on an attack methodology so as to discover weaknesses of target systems. For possible attacks, countermeasures are explained and hardening mechanisms can be applied. Topics covered include systematic attack methodology, system attacks, network attacks, and web attacks.
The module is targeted at those who need to plan and conduct vulnerability assessment and penetration testing. Upon completing this module, they are able to plan and conduct tests and checks in order to determine if infrastructure components, systems, and application meet security requirements.
This module is part of Professional Certificate in Cybersecurity Fundamentals and Ethical Hacking.
Course Objectives
This course aims to provide participants with a foundation in:
- Overview of ethical hacking and systematic attack framework
- How to use cybersecurity tools for footprinting and enumerating target systems
- How to use cybersecurity tools for scanning for and exploiting vulnerabilities in target systems
- How to perform post-exploitation steps on exploited systems, such as password cracking and backdoor-access planting
- How to possible apply counter measures against attacks
At the end of the course, participants will be able to:
- Explain ethical hacking’s objectives, stages, and available tools
- Utilize cybersecurity tools for footprinting and enumerating target systems
- Utilize cybersecurity tools for scanning for and exploiting vulnerabilities in target systems
- Utilize cybersecurity tools for performing post-exploitation steps on exploited systems
- Explain and apply possible counter measures against attacks
Who Should Attend
Penetration Tester, Cyber Incident Investigator
Prerequisites
Basic cybersecurity, Linux Operating System, basic networking
Course Convener
(Click their photos to view their short biographies)
Assoc Prof Liang Zhenkai

Assoc Prof Liang Zhenkai
Assoc Prof Liang Zhenkai is an Associate Professor in the Department of Computer Science at National University of Singapore. He received his Ph.D. degree in Computer Science from Stony Brook University in 2006, and B.S. degrees in Computer Science and Economics from Peking University in 1999.
His research area is in system and software security, and security in emerging platforms, such as Web, mobile, and Internet-of-things (IoT). He has been publishing high-impact papers in top security and software engineering conferences, and has won several best paper awards, namely, the Outstanding Paper Award at the Annual Computer Security Applications Conference (ACSAC) in 2003, the Best Paper Award at the USENIX Security Symposium in 2007, the ACM SIGSOFT Distinguished Paper at the ESEC and ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC-FSE) in 2009, and the Best Paper Award at the Web 2.0 Security & Privacy (W2SP) Workshop in 2014. He has been actively served as technical committee members and editorial board members of top security conferences and journals, including ACM Conference on Computer and Communications Security (CCS), USENIX Security Symposium, Network and Distributed System Security Symposium (NDSS), and IEEE Transactions on Dependable and Secure Computing (TSDC).
He has taught various undergraduate-level and graduate-level modules (courses). He has won the Annual Teaching Excellence Award of NUS in 2014 and 2015, and has been publishing his teaching techniques and philosophy.
Course Fees
Total Nett Programme Fee Payable, Including GST, after additional funding from the various funding schemes
Participants must fulfill at least 75% attendance and pass all assessment components to be eligible for SSG funding.
To enquire, email soc-ace@nus.edu.sg
To register, click Register
Course Code:
TGS-2022012263 (Classroom Learning)
TGS-2022012319 (Synchronous e-learning)
For members of public and NUS Alumnus (without R&G Voucher), please follow the steps below:
Select Short Course / Modular Course -> Apply for Myself -> Browse Academic Modules / Short Courses-> Module/Course Category -> Short Courses -> Browse Courses-> Strategic Tech Mgt Institute (Faculty/Department / Unit)
Please download the user guide for NUS Online Application Portal after you click ‘Apply for Myself’ if you need assistance.
Course Fee Breakdown
Singapore Citizens
39 years old or youngerSingapore Citizen
40 years old or olderCatalogue of Programmes for Individuals
- Course Category
- Artificial Intelligence & Machine Learning
- Business Analytics & Data Science
- Cloud Computing & Internet of Things
- Cybersecurity & Data Governance
- Digital Business
- Digital Health & Nursing Informatics
- Digital Technology & Innovation Management
- Digital Transformation & Change Leadership
- Education Technology
- Emerging & Disruptive Technologies
- FinTech & Blockchain
- Interactive Media Design & Development
- Software Programming & Networking
- UX/UI Design & Digital Product Management