Skip to main content

Core 140: Ethical Hacking

  • Duration: 40 hours
  • Delivery Options: Online, In-person, Hybrid

Core 140 builds a foundation for ethical hacking through videos, readings, and labs. You will learn about the basics of ethical hacking, network and systems enumeration, vulnerability scanning, system attacks, sniffing, and social engineering.

Who should take this course

Core 140 is designed for those interested in learning about cyber and information security. It is recommended that participants complete the previous courses in the Core series or have at least one year of cybersecurity experience.

How can you take this course


Available online as either self-paced or live with an instructor


Available in-person either at Purdue or at your location.


Available as a combination of online and in-person

What tools you will use

This course introduces you to hacking tools such as Wireshark, John the Ripper, Nmap, Metasploit, and others.

What you can expect from Core 140: Ethical Hacking

A strong offense is the best defense. Core 140 teaches you the basics and understanding of ethical hacking and penetration testing. The course covers ethical hackers' roles in the industry, network scanning and enumerations, system hacking, sniffing, and social engineering. 

Key Takeaways

For Organizations:

  • Upskill current workforce  
  • Get hands-on with industry tools in virtual labs.
  • Perfect for I.T. professionals transitioning to cyber

For Individuals

  • Gain an understanding of fundamental cyber concepts.
  • Get hands-on with industry tools in virtual labs.
  • Learn at your own pace online


You can take Core 140 in various ways: self-paced online to in-person with a cyberTAP instructor. The course is divided into six primary sections: each consisting of lectures, readings, quizzes, self-assessments, and virtual labs. Core 140 is 40 credit hours, and you will earn a badge upon passing. 

Course Topics

Disclaimer and Basics: Introduce the role of ethical hackers, tool identification, and performing reconnaissance.  

Network Scanning: Understand the foundations of basic network scanning techniques, packer crafting, and evasion techniques. 

Enumeration: Learn the principles of enumeration, such as record keeping, and differentiating between exploits and compromises.

System Hacking: Understand basic system hacking techniques like acquiring exploits and then post-exploitation techniques.

Sniffing: Gain an understanding of an unknown network through frame capture port mirroring and common spoofing attack techniques.

Social Engineering: Introduce the concept of social engineering, its purpose, and its principles, along with common attack methods. 

Tech Requirements

It is recommended that all of cyberTAP courses be taken on a laptop or PC that runs either Windows or Linux as an operating system. We also recommended to have a fast and reliable internet access.

Are you interested in learning more?

cyberTAP's comprehensive approach to teaching cyber fundamentals and building practical skills through applied technical training is perfect for those interested in starting a new career, learning a new skill, experiencing a cyberattack firsthand, or making a team around cybersecurity. Our programs are fully customizable to offer a tailored solution for individual and corporate needs. Let's get in touch and see just how cyberTAP can partner with you and develop a training program just for you and your team. 

Get Started

Return to main content

Purdue University, 610 Purdue Mall, West Lafayette, IN 47907, (765) 494-4600

© 2021 Purdue University | An equal access/equal opportunity university | Copyright Complaints | Maintained by Technical Assistance Program

Trouble with this page? Disability-related accessibility issue? Please contact Technical Assistance Program at