Official Certification · Version 2.0

Cyber Ethical Hacking CertQA 2.0

Professional training in ethical hacking, cybersecurity and artificial intelligence. A practical 60-hour path with live instruction, hands-on labs, cloud-native security, offensive and defensive AI, Red Team, Purple Team, incident response and digital forensics.

60 hours 15 live sessions 20 labs 100% free tools Spanish · LATAM
Market opportunity

The cybersecurity talent gap is a career opportunity.

Cybersecurity continues to show one of the largest talent gaps in the technology industry. This program positions learners for high-demand roles by combining offensive security, defensive operations, AI security, cloud, DevSecOps, incident response, and executive communication.

The commercial brochure positions the program around the market gap, with references to global unfilled cybersecurity roles, the LATAM deficit, breach cost, and attack detection time.

Core message

Not a generic ethical hacking course. This is a modern CertQA 2.0 certification path focused on 2026 demand: AI, cloud-native security, Zero Trust, DevSecOps, supply chain, OT/ICS, threat hunting and forensics.

Why this program is different

A complete cybersecurity experience, not just classes.

Cyber Ethical Hacking CertQA 2.0 combines live instruction, a controlled lab environment, updated tools, certification assessment, and a practical career path.

AI integrated throughout

Dedicated module on offensive and defensive AI, including OWASP LLM Top 10, prompt injection, deepfakes, anomaly detection, and MITRE ATLAS.

Cloud-native & Zero Trust

AWS, Azure, GCP, Docker, Kubernetes, DevSecOps, CI/CD, IaC security, CSPM, and Zero Trust architecture under NIST SP 800-207.

Hands-on labs

Practical labs using tools such as Kali Linux, Nmap, Nuclei, Metasploit, BloodHound, Pacu, Burp Suite, Volatility 3, Ollama and more.

CertQA v2.0 exam

Official certification exam with 120 multiple-choice questions, 3-hour duration, passing score above 70%, and biometric proctoring.

LATAM legal framework

Ethics, authorization, documentation, responsible disclosure, and regional legal context for cybersecurity practice in Latin America.

C-Suite communication

Includes executive reporting, FAIR framework, risk communication, and translating technical vulnerabilities into business impact.

EUD Academy lab platform

Your cybersecurity lab, directly in the browser.

The lab access documentation shows a dedicated environment at lab.eud.academy, where each student connects through the browser to an assigned Kali Linux machine and uses a controlled target machine for course practices.

This platform approach reduces installation friction, standardizes the environment, protects the learning process, and reinforces responsible use of tools only inside authorized labs.

Browser-based access Assigned Kali Linux Controlled target machines No local installation required
EUD Academy customized Kali Linux lab desktop
Curriculum

9 modules updated for 2026 cybersecurity demand.

The program is structured as 60 hours across 15 live sessions, with a dense and practical format supported by autonomous student work between sessions.

M0

Ethics, Legal Framework & Compliance

Professional ethics, LATAM legal context, SOW/NDA/ROE, chain of custody, responsible disclosure and Bug Bounty.

3h
M1

Reconnaissance & Intelligence with AI

Passive and active OSINT, Shodan, MITRE ATT&CK, Cyber Kill Chain, SpiderFoot and AI-assisted correlation.

6h
M2

Scanning, Vulnerabilities & Threat Intelligence

Nmap NSE, Nuclei, CVSS v4.0, EPSS, MISP, OpenCTI, Wireshark and JA3 fingerprinting.

6h
M3

Advanced Pentesting & Red Teaming

Metasploit, Active Directory, OWASP Top 10 2025, API Security, C2 frameworks and Purple Team.

12h
M4

Cloud-Native, DevSecOps & Zero Trust

AWS, Azure, GCP, Docker, Kubernetes, CI/CD security, IaC, CSPM and NIST Zero Trust Architecture.

9h
M5

Offensive & Defensive AI

OWASP LLM Top 10, prompt injection, deepfakes, ML anomaly detection, UEBA, and MITRE ATLAS.

9h
M6

IoT, OT/ICS & Supply Chain Security

OWASP IoT Top 10, Binwalk, Modbus, DNP3, OPC UA, SBOM, Syft, Grype, SolarWinds and XZ Utils.

6h
M7

Incident Response, Threat Hunting & Forensics

NIST SP 800-61 r3, ransomware response, tabletop exercises, ELK, Volatility 3 and cloud forensics.

6h
M8

Professional Growth & Leadership

Certification roadmap, LATAM market, C-Suite communication, FAIR framework and CertQA exam preparation.

3h
What is included?

A complete certification package.

  • 60 hours of live instructor-led training.
  • Access to virtual classroom and digital materials.
  • Student manual and module presentations.
  • 15 guided lab sessions plus practice resources.
  • Two exam simulators.
  • CertQA Certified Ethical Hacking Expert v2.0 exam voucher.
  • One included retake if the first attempt is not approved.
  • Academic scholarship for Lead Cybersecurity Manager ISO/IEC 27032 without certification exam.
Modality
Online live training through Microsoft Teams
Virtual classroom
virtual.eud.academy
Lab platform
lab.eud.academy
Certification platform
proctor.certqa.com
Attendance
Minimum 80% required
Language
Spanish
Tools
100% free/open-source tools or included resources
CertQA certification

Certified Ethical Hacking Expert v2.0 – CertQA

The CertQA v2.0 certification evaluates eight domains across ethical hacking fundamentals, OSINT, vulnerability analysis, pentesting, cloud, DevSecOps, AI security, OT/ICS, supply chain, incident response, threat hunting, forensics, tools and best practices.

The exam includes biometric identity control and proctoring through the CertQA platform.

Exam
CertQA Certified Ethical Hacking Expert v2.0
Questions
120 multiple-choice questions
Duration
3 hours
Passing score
Above 70%
Domains
8 evaluated domains
Proctoring
Biometric identity control and proctored exam
Validity
3 years from approval date
Graduate profile

Prepared for offensive, defensive and leadership cybersecurity roles.

Graduates develop competencies across ethical hacking, Red Team, Purple Team, cloud security, AI security, DevSecOps, IR, forensics, OT/ICS and supply chain.

Pentester / Ethical Hacker

Plan and execute authorized security testing under professional ethical and legal frameworks.

Cloud Security Analyst

Identify misconfigurations and security weaknesses in modern cloud-native environments.

SOC / Threat Hunter

Support detection, incident response, threat hunting and forensic analysis processes.

Ethical use statement

This program must be positioned strictly as ethical and authorized cybersecurity training. All tools and techniques are for controlled lab environments, authorized assessments, compliance, defense, and professional security improvement.

Call to action

Train, practice, certify.

Cyber Ethical Hacking CertQA 2.0 offers a complete pathway: live training, hands-on labs, exam simulation, official certification and a professional roadmap for cybersecurity careers.