Skip to content

Ethical Hacker

Nanodegree Program

Meet the growing demand for cybersecurity professionals by gaining the offensive security skills to protect an organization’s computer networks and systems.

Enroll Now

05Days06Hrs13Min50Sec

  • Estimated time
    2 Months

    At 5-10 hrs/week

  • Enroll by
    July 6, 2022

    Get access to the classroom immediately upon enrollment

  • Prerequisites
    Linux, Networking, Programming & Windows OS

What you will learn

  1. Ethical Hacker

    Estimated 2 months to complete

    You’ll master the skills necessary to become a successful Ethical Hacker. Learn how to find and exploit vulnerabilities and weaknesses in various systems, design and execute a penetration testing plan, and report on test findings using valid evidence.

    Prerequisite knowledge

    Linux, Networking, Programming and Windows OS.

    1. Intro to Ethical Hacking

      The purpose of this course is to introduce students to the broad set of techniques and job responsibilities associated with the role of an Ethical Hacker. Ethical Hackers leverage their knowledge of business’ processes to evaluate risks while protecting core operations. The results of an Ethical Hacker’s efforts are improvements to business policies, procedures and standards of conduct on its computer systems.

    2. Penetration Testing & Red Teaming Operations

      The purpose of this course is to take a deep dive into the specific technique of penetration testing and how it can be used to perform a cyber security assessment on a specific system and conducted as a part of a specific penetration testing project within an organization to identify vulnerabilities, flaws and risks.

All our programs include:

  • Real-world projects from industry experts

    With real world projects and immersive content built in partnership with top tier companies, you’ll master the tech skills companies want.

  • Technical mentor support

    Our knowledgeable mentors guide your learning and are focused on answering your questions, motivating you and keeping you on track.

  • Career services

    You’ll have access to Github portfolio review and LinkedIn profile optimization to help you advance your career and land a high-paying role.

  • Flexible learning program

    Tailor a learning plan that fits your busy life. Learn at your own pace and reach your personal goals on the schedule that works best for you.

Program offerings

  • Class content

    • Real-world projects
    • Project reviews
    • Project feedback from experienced reviewers
  • Student services

    • Technical mentor support
    • Student community
  • Career services

    • Github review
    • LinkedIn profile optimization

Succeed with personalized services.

We provide services customized for your needs at every step of your learning journey to ensure your success.

Get timely feedback on your projects.

  • Personalized feedback
  • Unlimited submissions and feedback loops
  • Practical tips and industry best practices
  • Additional suggested resources to improve
  • 1,400+

    project reviewers

  • 2.7M

    projects reviewed

  • 88/100

    reviewer rating

  • 1.1 hours

    avg project review turnaround time

Mentors available to answer your questions.

  • Support for all your technical questions
  • Questions answered quickly by our team of technical mentors
  • 1,400+

    technical mentors

  • 0.85 hours

    median response time

Learn with the best.

Learn with the best.

  • Sagar Bansal

    Chairman at Bansal X

    Sagar Bansal is a consultant, speaker, and author in the information security industry. He helps large enterprises, governments and intelligence agencies reduce the cost of security by creating reliable and proactive security workflows.

  • Paul Oyelakin

    Founder of PJ Pros

    Paul Oyelakin is the founder of PJ Professional IT Services. He has experience in security compliance, penetration testing, and architecting network security solutions for business and government. He has an MBA, MS in Cybersecurity, and is a Certified Ethical Hacker & Information System Security Professional.

Ethical Hacker

Get started today

  • Monthly access

    Pay as you go


    per

    /

    /

    Enroll now
    • Maximum flexibility to learn at your own pace.
    • Cancel anytime.
  • - access

    Pay upfront and save an extra 0%


    for - access

    Enroll now
    • Save an extra 0% vs. pay as you go.
    • 2 months is the average time to complete this course.
    • Switch to monthly price after if more time is needed.
    • Cancel anytime.
    Best Value
  • Learn

    Learn to manage the vulnerability lifecycle, perform security audits of internal systems, produce meaningful reports and more.
  • Average Time

    On average, successful students take 2 months to complete this program.
  • Benefits include

    • Real-world projects from industry experts
    • Technical mentor support
    • Career services

Program details

Program overview: Why should I take this program?
  • Why should I enroll?
    The global cybersecurity market is currently worth $173B in 2020, growing to $270B by 2026. This program was designed to help you take advantage of the growing need for skilled ethical hackers. Prepare to meet the demand for cybersecurity professionals who are trained to play a critical role in protecting an organization’s computer networks and systems.
  • What jobs will this program prepare me for?
    The need for a strong computer security culture in an enterprise organization is greater than ever. The skills you will gain from this Nanodegree program will qualify you for jobs in several industries as countless companies are boosting security protocol.
  • How do I know if this program is right for me?
    The course is for individuals who are looking to advance their cybersecurity careers with the cutting-edge skills to manage a security team and set themselves apart at work while wearing a white hat.
Enrollment and admission
  • Do I need to apply? What are the admission criteria?
    No. This Nanodegree program accepts all applicants regardless of experience and specific background.
  • What are the prerequisites for enrollment?

    A well-prepared learner will already have knowledge of:

    • Basic Linux file structure and commands
    • Networking basics (ports, IP addresses, subnetting)
    • Three-way handshake, encryption and hashing
    • One programming language - Python is preferred
    • Familiarity with Windows OS
  • If I do not meet the requirements to enroll, what should I do?
    Students who do not feel comfortable in the above may consider taking Udacity’s Introduction to Cybersecurity course to obtain prerequisite skills.
Tuition and term of program
  • How is this Nanodegree program structured?
    The Ethical Hacker Nanodegree Program is comprised of content and curriculum to support two projects. We estimate that students can complete the program in two months, working 5-10 hours per week.

    Each project will be reviewed by the Udacity reviewer network and platform. Feedback will be provided and if you do not pass the project, you will be asked to resubmit the project until it passes
  • How long is this Nanodegree program?
    Access to this Nanodegree program runs for the length of time specified in the payment card above. If you do not graduate within that time period, you will continue learning with month to month payments. See the Terms of Use and FAQs for other policies regarding the terms of access to our Nanodegree programs.
  • Can I switch my start date? Can I get a refund?
    Please see the Udacity Program Terms of Use and FAQs for policies on enrollment in our programs.
Software and hardware: What do I need for this program?
  • What software and versions will I need in this program?

    Software and Hardware Requirements:

    • Operating System - Windows, OSX, or Linux
    • Processor - Minimum 2 GHz Speed with Virtualization and x64 support
    • RAM - 8 GB DDR3 or Higher (16 GB DDR4 RAM is preferred)
    • Storage - 100 GB Free Space (SSD is preferred over HDD)
    • This program uses the Oracle VM VirtualBox hypervisor tool that is incompatible with Apple’s new M1 chip computers

Ethical Hacker

Enroll Now