Ethical Hacker Nanodegree Program Syllabus
Ethical Hacker Nanodegree Program Syllabus
SCHOOL OF CYBERSECURITY
Ethical Hacker
Nanodegree Program Syllabus
Overview
This program will equip students with the skills they need to advance in their security career and become an ethical hacker
or penetration tester. Offensive security professionals in these roles play a critical role in any organization. Students will learn
how to find and exploit vulnerabilities and weaknesses in various systems, design and execute a penetration testing plan, and
report on findings using evidence from the project.
Learning Objectives
• Manage the vulnerability lifecycle including scanning, analyzing, prioritizing, and managing risk.
• Perform security audits of internal systems, web applications, and information leakage.
• Produce meaningful reports that detail findings, prioritize risk or criticality, and suggest mitigations.
• Scan systems and identify common security risks and oversights in best practices that can allow
compromise.
• Investigate and research vulnerabilities in specific packages of software, identify applicable exploits, and
“stand up” appropriate attack platforms (Python environment, web intercepting proxy, etc.).
• Perform exploitation using common tools and exploit code of identified vulnerabilities in open services.
Ethical Hacker 2
Program information
Prerequisites
• Networking basics
Required Hardware/Software
Note: This program uses the Oracle VM VirtualBox hypervisor tool that is incompatible with Apple’s new M1 chip computers.
*The length of this program is an estimation of total hours the average student may take to complete all required
coursework, including lecture and project time. If you spend about 5-10 hours per week working through the program, you
should finish within the time provided. Actual hours may vary.
Ethical Hacker 3
Course 1
Course Project
Audit ExampleCorp
In this project, manage a full-fledged security audit of a fictitious company called ExampleCorp. This project
requires practical knowledge of all major elements of ethical hacking, including vulnerability management,
hacking systems and applications, social engineering, and open-source intelligence. Demonstrate
vulnerability chaining, modification of exploit code, using documentation to learn new tests, and effective
report writing.
Application Auditing • Describe the difference between the public testnet and regression testing.
Ethical Hacker 4
• Understand techniques attackers use to exploit employees.
Course 2
Course Project
Ethical Hacker 5
• Identify the appropriate tool for a given phase of reconnaissance.
• Use common tools for network service scanning to map open ports, network
services, and associated versions.
• Extend the basic web application scanning to grab banners and find
vulnerabilities in available services.
Lesson 2
• Capture command usage, explain the usage, and provide results with
Scanning & Research screenshots and findings.
• Use Python, SQL query, and other languages to run exploit code.
Ethical Hacker 6
• Learn techniques on covering tracks after exploitation.
Cover Tracks & Reporting • Assess digital footprints on the network and remove or hide them.
Ethical Hacker 7
Meet your instructors.
Sagar Bansal
Chairman at Bansal X
Sagar Bansal is a consultant, speaker, and author in the information security industry. He helps
large enterprises, governments, and intelligence agencies reduce the cost of security by creating
reliable and proactive security workflows.
Paul Oyelakin
Founder of PJ Pros
Ethical Hacker 8
Udacity’s learning
experience
Ethical Hacker 9
Our proven approach for building
job-ready digital skills.
Experienced Project Reviewers
• Project review cycle creates a feedback loop with multiple opportunities for
improvement—until the concept is mastered.
• Project reviewers leverage industry best practices and provide pro tips.
• Unlimited access to mentors means help arrives when it’s needed most.
• 2 hr or less average question response time assures that skills development stays on track.
Empower job-readiness.
• Access to a Github portfolio review that can give you an edge by highlighting your
strengths, and demonstrating your value to employers.*
• Get help optimizing your LinkedIn and establishing your personal brand so your profile
ranks higher in searches by recruiters and hiring managers.
Mentor Network
• Mentors work across more than 30 different industries and often complete a Nanodegree
program themselves.
Ethical Hacker 10
Learn more at
www.udacity.com/online-learning-for-individuals →
12.16.22 | V1.0