Amazing April SALE! 🤩 25% off Certs & Diplomas - now on!Ends in  : : :

Claim your Discount!
Explore
en
LMS
en
Site language

Your Learner Verification

This is to verify that Michel Beeckmans has completed the course Diploma in Ethical Hacking on Alison.

Michel Beeckmans

Alison ID: 53573001

Course Completed: Diploma in Ethical Hacking

Date of Completion: 26th November 2025

Email: [email protected]

Total Study Time: 58h 31m

Final Assessment Score:

Alison courses requires at least
80% to pass the final assessment

90%
CPD Hours Completed:

CPD approved learning hours
completed through this course

57-59h

Course Information

Learn about ethical hacking network vulnerabilities, and network security in this free online course.

This course will begin by introducing you to ethical hacking and basic concepts of networking. You will learn about the roles of an ethical hacker, penetration testing methodologies like tiger box and white box models.  You will learn about the TCP/IP stack, types of computer network, IP addressing, TCP, UDP and IP subnetting. It takes knowledge of network and computer technology to be a security tester otherwise known as an ethical hacker.

The course then explains the different routing protocols like Routing Information Protocol (RIP) and Open Shortest Path First (OSPF). You will learn about IP version 4 and IP version 6, which happens to be the latest IP version. Next, you will see a live demonstration of how a lab is set up for ethical hacking and also how to install and use Nessus for vulnerability scanning. You will gain an understanding of how real hackers think and attack innocent victims' computer systems.

Finally, you will learn about social engineering attack, man in the middle attack, basic concepts of cryptography, cryptographic hash functions, digital certificate and digital signature. You will also learn some security attacks on systems through malwares, phishing, password cracking, DDoS and Dos. You will then move on to learn about the measures taken to secure information from attackers or hackers through the use of biometrics and steganography and also perform network analysis using Wireshark. Start this course today, and learn valuable skills in ethical hacking.

Modules Completed

Module 1: Ethical Hacking and Basic Concepts of Networking
Module 2: IP Addressing and Routing
Module 3: Routing Protocols
Module 4: Nessus Installation
Module 5: Using Metasploit for Penetration Testing
Module 6: Diploma in Ethical Hacking - First Assessment
Module 7: Cryptography
Module 8: Cryptographic Hash Functions
Module 9: Information Security
Module 10: Information Security Attacks
Module 11: Hardware Security
Module 12: Vulnerability Scanning
Module 13: Network Analysis Tools
Module 14: Diploma in Ethical Hacking - Second Assessment
Module 15: Course assessment

Tell us why you need your learner verification?



professional/learner-record.learner_verification.Save