Ethical Hacker

$1000 $1000 $1000 $1000 $1000


This Ethical Hacking program is designed to empower students for a successful career in the field of cybersecurity. This comprehensive course is tailored to equip individuals with the necessary skills to excel as ethical hackers or penetration testers.  

Throughout the program, students will acquire expertise in identifying and exploiting vulnerabilities and weaknesses across diverse systems. They will learn the art of designing and executing effective penetration testing plans while mastering the art of presenting well-structured reports supported by concrete evidence from their project.  


After completing an RMIT Future Skills course, you will earn an RMIT credential which can be validated, recognised and shared on social media platforms.


By the end of this course, you’ll be able to: 

  • Manage the vulnerability lifecycle including scanning, analysing, prioritising, and managing risk. 
  • Perform security audits of internal systems, web applications, and information leakage. 
  • Manage security awareness programs and emulate attacks to demonstrate risk. 
  • Produce meaningful reports that detail findings, prioritise risk or criticality, and suggest mitigations. 
  • Perform stealthy reconnaissance against organisations to avoid potential tripwires. 
  • Scan systems and identify common security risks and oversights in best practices that can allow compromise. 
  • Investigate and research vulnerabilities in specific packages of software, identify applicable exploits, and “stand up” appropriate attack platforms (Python environment, web intercepting proxy, etc.). 
  • Perform exploitation using common tools and exploit code of identified vulnerabilities in open services. 

How does it work ?

During this course, you will use your newly acquired Ethical Hacking Skills to complete 2 projects.

In the first project, you'll manage a full-fledged security audit of a fictitious company and in the second you will utilise and implement modern penetration tester and red teamer methodologies on PJBank CISO's virtual operations. 

At the end of the course, you will receive an RMIT credential which can be validated, recognised, and shared on social media platforms.

When can I do it ?