learning path

Introduction to Ethical Hacking Tools

Up to 13h 28m
Enhance your skill setDevelop essential skills for thriving in real-world scenarios.
Stay focused, stay committedBoost your learning journey by enrolling: stay focused, consistent and achieve your goals with ease.
Earn a certificate of completionShow your skills and build your credibility when you include them in your resume and LinkedIn profile.

This course has been designed to introduce you to a number of different ethical hacking tools, covering:

  • Nmap network scanner
  • Netcat network utility
  • Metasploit vulnerability exploitation tool
  • Nikto web app scanner
  • SQLmap SQL injection tool
  • Burpsuite web app proxy
  • Dirbuster vulnerability scanner
  • Droopescan vulnerability exploitation tool

You will be guided through this course with a variety of video tutorials, in addition to hands-on labs and PDF resources 

Intended Audience

If you are looking to become an ethical hacker, or have an interest in security and would like to gain an understanding on how to protect your environment through different ethical hacking methods and techniques, then this course is for you. 

Learning Objectives

To introduce you to the most popular ethical hacking tools including:

  • Various types of footprinting and reconnaissance tools 
  • Network scanning techniques and scanning tools 
  • Enumeration techniques and enumeration tools 
  • SQL injection attacks and injection detection tools 

Useful Tools for Independent learning

Here are two extra resources that will be useful for independent learning:

How to Install Virtual Box 

How to install Kali Linux on Virtual Box 


  • Basic familiarity with Windows and Linux systems e.g. how to view a system’s IP address, command-line utilities
  • Basic understanding of Network fundamentals e.g. IP addressing, knowledge of protocols such as ICMP, HTTP, and DNS
  • Basic understanding of HTTP fundamentals e.g. Structure of an HTTP request, HTTP method verbs, HTTP response codes 


We welcome all feedback and suggestions - please contact us at support@cloudacademy.com if you are unsure about where to start or if you would like help getting started.

Your certificate for this learning path
This content is developed in partnership with QA
Learn more

About the Author

Richard Beck, opens in a new tab
Director of Cyber Security at QA
Learning paths

Richard Beck is Director of Cyber Security at QA. He works with customers to build effective and successful security training solutions tailored for business needs. Richard has over 15 years' experience in senior Information Security roles. Prior to QA, Richard was Head of Information Security for an organization that underpins 20% of the UK's Critical National Infrastructure. Richard also held Security and Technical Management posts in the Defence, Financial Services, and HMG. Richard sits on a number of security advisory panels and previously chaired the Communication Industry Personnel Security Information Exchange (CPNI). Richard is also a STEM Ambassador working to engage and enthuse young people in the area of cybersecurity. Providing a unique perspective on the world of cybersecurity to teachers and encourage young people to consider a career in cybersecurity.

Covered Topics