<div style="margin:20px 0 0 200px"> To view the site, enable JavaScript by changing your browser options, then <a href="">Try Again</a>.</div>

Get Taught By Professional Hackers

CHFI 9.0 (Global Certification) CEH 10.0 (Global Certification) Ethical Hacking (Advance Level) Computer Forensic (Advance Level) CLIP - Certified Lead Implementer Professional - ISO 27001 Network Penetration With Kali Linux Web Application Penetration Testing summer-training summer-training INFOCOM - Hackstar Python Programming Machine Learning Using Python Secure Coding in Java Network Administration Firewall Administration Linux Administration Android App Development Leadership in Education 2015 & 2016 -  Award from DNA (Mumbai) Workshop on Ethical Hacking Workshop on Advanced Networking with Router and Switch Workshop on Digital Marketing in Depth (SEO, SEM, SMO) Workshop on Android Programming

Member of:

NASSCOM
Data Security Council of India
CII - Confederation Of Indian Industry
Monthly Hacking Competition
Attend 2-Day Workshop
Courses
Courses
Duration
Duration
Fees
Fees
I am interested in Software Development
 
 
 
C
Level I
40 hours
(2 classes / week)
Rs. 6,750/-
Inclusive of all taxes
Database
Level II
40 hours
(2 classes / week)
Rs. 6,000/-
Inclusive of all taxes
Core Java
Level III
40 hours
(2 classes / week)
Rs. 7,250/-
Inclusive of all taxes
Advanced Java
Level IV
40 hours
(2 classes / week)
Rs. 7,750/-
Inclusive of all taxes
CEH 10.0 (Certified Ethical Hacking - EC Council - Global Certification)
or
40 hours
(2 classes / week)
Rs. 37,000/-
Inclusive of all taxes
Ethical Hacking (Advance Level)
Level V
40 hours
(2 classes / week)
Rs. 14,750/-
Inclusive of all taxes
WAPT (Web Application Penetration Testing)
Level VI
40 hours
(2 classes / week)
Rs. 14,750/-
Inclusive of all taxes
WAPT Advanced (Web Application Penetration Testing)
Level VII
40 hours
(2 classes / week)
Rs. 14,750/-
Inclusive of all taxes
I wish to become a Network Engineer
 
 
 
CCNA (Cisco Certified Network Associate)
Level I
40 hours
(2 classes / week)
Rs. 8,750/-
Inclusive of all taxes
CEH 10.0 (Certified Ethical Hacking - EC Council - Global Certification)
or
40 hours
(2 classes / week)
Rs. 37,000/-
Inclusive of all taxes
Ethical Hacking (Advance Level)
Level II
40 hours
(2 classes / week)
Rs. 14,750/-
Inclusive of all taxes
NPT (Network Penetration Testing - Using Kali Linux)
Level III
40 hours
(2 classes / week)
Rs. 14,750/-
Inclusive of all taxes
I want to get an overview on Hacking & Security
 
 
 
Ethical Hacking Workshop
Level I
1 day
(Once in a month)
 
I want Short-term Training / Internship
 
 
 
Summer Training / Winter Training
1 month
Rs. 5,000/-
+ 18% GST
Internship
40 hours
(2 classes / week)
Rs. 7,500/-
+ 18% GST
I want to do Final Year Project
 
 
 
Project
40 hours
(2 classes / week)
Rs. 7,500/-
+ 18% GST
Courses
Courses
Duration
Duration
Fees
Fees
I want to know how to protect my data
 
 
 
A-Z Defense in Comp Security - For Beginners
40 hours
(2 classes / week)
Rs. 6,500/-
+ 18% GST
I want to get an overview on Hacking & Security
 
 
 
Ethical Hacking Workshop
Level I
1 day
(Once in a month)
 
Courses
Courses
Duration
Duration
Fees
Fees
I am interested in Software Development
 
 
 
Linux Administration (RHCE)
Level I
40 hours
(2 classes / week)
Rs. 17,000/-
Inclusive of all taxes
CEH 10.0 (Certified Ethical Hacking - EC Council - Global Certification)
Level II
40 hours
(2 classes / week)
Rs. 37,000/-
Inclusive of all taxes
ECSA (Certified Security Analyst - EC-Council)
Level III
 
Rs. 38,000/-
+ 18% GST
LPT (Licensed Penetration Tester - EC-Council)
Level IV
 
Rs. 36,000/-
+ 18% GST
I am a Network Professional
 
 
 
Linux Administration (RHCE)
Level I
40 hours
(2 classes / week)
Rs. 17,000/-
Inclusive of all taxes
CCNA (Cisco Certified Network Associate)
Level II
40 hours
(2 classes / week)
Rs. 8,750/-
Inclusive of all taxes
CCNP - Switch (Cisco Certified Network Professional - Switch)
Level III
40 hours
(2 classes / week)
Rs. 10,250/-
Inclusive of all taxes
CCNP - Router (Cisco Certified Network Professional - Router)
Level IV
40 hours
(2 classes / week)
Rs. 10,250/-
Inclusive of all taxes
CEH 10.0 (Certified Ethical Hacking - EC Council - Global Certification)
Level V
40 hours
(2 classes / week)
Rs. 37,000/-
Inclusive of all taxes
ECSA (Certified Security Analyst - EC-Council)
Level VI
 
Rs. 38,000/-
+ 18% GST
LPT (Licensed Penetration Tester - EC-Council)
Level VII
 
Rs. 36,000/-
+ 18% GST
I am a Security Professional
 
 
 
CISA (Certified Information Systems Auditor)
 
 
CISSP (Certified Information Systems Security Professional)
 
 
CEH 10.0 (Certified Ethical Hacking - EC Council - Global Certification)
40 hours
(2 classes / week)
Rs. 37,000/-
Inclusive of all taxes
ECSA (Certified Security Analyst - EC-Council)
 
Rs. 38,000/-
+ 18% GST
LPT (Licensed Penetration Tester - EC-Council)
 
Rs. 36,000/-
+ 18% GST
I am a Police/Lawer/Detective/Forensic Expert
 
 
 
Linux Administration (RHCE)
40 hours
(2 classes / week)
Rs. 17,000/-
Inclusive of all taxes
CEH 10.0 (Certified Ethical Hacking - EC Council - Global Certification)
40 hours
(2 classes / week)
Rs. 37,000/-
Inclusive of all taxes
CHFI 9.0 (Computer Hacking Forensic Investigator - EC Council - Global Certification)
40 hours
(2 classes / week)
Rs. 34,000/-
Inclusive of all taxes
I want to manage IT services / policy
 
 
 
ITIL (Information Technology Infrastructure Library)
 
 
I want to get an overview in IT Security
 
 
 
Information Security Workshop
1 day
(Once in a month)
 
I want to test my Hacking Skill
 
 
 
Penetration Testing Lab
Monday to Friday
(11 am to 7 pm)
Rs. 100/- /day
Rs. 2,000/- /month
Courses
Courses
Duration
Duration
Fees
Fees
CCNA (Cisco Certified Network Associate)
Level I
40 hours
(2 classes / week)
Rs. 8,500/-
+ 18% GST
CCNP - Switch (Cisco Certified Network Professional - Switch)
Level II
40 hours
(2 classes / week)
Rs. 10,000/-
+ 18% GST
CCNP - Router (Cisco Certified Network Professional - Router)
Level III
40 hours
(2 classes / week)
Rs. 10,000/-
+ 18% GST
CEH 10.0 (Certified Ethical Hacking - EC Council - Global Certification)
or
40 hours
(2 classes / week)
Rs. 36,900/-
+ 18% GST
Ethical Hacking (Advance Level)
Level IV
40 hours
(2 classes / week)
Rs. 14,500/-
+ 18% GST
Firewall Administration
Level V
40 hours
(2 classes / week)
Rs. 9,500/-
+ 18% GST
Linux Administration (RHCE)
Level VI
40 hours
(2 classes / week)
Rs. 14,500/-
+ 18% GST
NPT (Network Penetration Testing)
Level VII
40 hours
(2 classes / week)
Rs. 14,500/-
+ 18% GST
I want to get an overview on Hacking & Security
 
 
 
Ethical Hacking Workshop
Level I
1 day
(Once in a month)
 
Know Your Faculty
Mr. Sandeep Sengupta
Mr. Sandeep Sengupta
CISA, Certified Ethical Hacker, ISO 27001:2013 Lead Auditor, Lead Privacy auditor, GDPR Implementer

19 years of experience working in India, New Zealand & Singapore; in Information Security domain as Ethical Hacker, ISO 27001 Lead Auditor / Tutor, BS 10012 Privacy Lead Auditor, Mr. Sandeep Sengupupta has conducted security audit in companies like ONGC, KPMG, PWC, Airtel, Vodafone, Accenture, Capgemini, Vedanta, PayU, Bandhan Bank, ABP, etc.

He has been invited as a speaker at FICCI, VIT (Vellore), Nasscom, CII, BCCI, ICAI, ISACA, FICCI, CeBIT, US High Commission (Kolkata), etc. He has taken part in several Television shows on ABP, ETV, NDTV, AajTak, Times Now, etc. In 2005, Sandeep founded the online community "Hackers Library"; which had 80,000+ members, making it the largest Indian online forum for cyber-security professionals at its time. Mr. Sengupta is the committee member at Nasscom (East) & CII ICT-East.

Mr. Kirit Sankar Gupta
Mr. Kirit Sankar Gupta
B. Tech (IT), CEH 10.0, OSCP, CHFI 9.0, ISO Certified Lead Security Incident Manager (ISO/IEC 27035), ISO Certified Lead Forensic Examiner (CLFE), CCNA, CCNP

A Penetration Tester with 6 years of experience, Kirit has the expertise in Mobile Application Pentesting Network, IoT Penetration Testing, Source-code review, Fuzzing, Red teaming, Social Engineering, Digital Forensics and Incident Response, Dev(Sec)Ops, Malware Analysis as well as SOC analysis. He has been acknowledged for reporting critical vulnerabilities to Uber, Apple, Flipkart, and MIT. Mr. Kirit Sankar Gupta is the member of Data Security Council of India (Kolkata).

Mr. Anjan Biswas
Mr. Anjan Biswas
RHCE, CCNA, Microsoft Certified System Administrator

Mr. Anjan Biswas is a Cisco Certified Network Professional (CCNA, CCNP), Red Hat Certified Engineer (RHCE) with 16 years of experience as a corporate trainer; system Administrator.

His expertise includes routing, switching, Microsoft server Administration, Red Hat Linux, VMWare, Citrix XenServer, HyperV Virtualization, SCCM, ASA Firewall, cloud infrastructure, etc.

Mr. Sanchayan Bhaumik
Mr. Sanchayan Bhaumik
MTech (Jadavpur University), MCA (WBUT), CEH, CEI

With 4 years of experience in Information Security audit and Forensic Investigation, Mr. Sanchayan Bhaumik is working as Information Security Analyst at ISOEH and has successfully conducted various Vulnerability Assessment and Penetration Testing / audit, as well as Forensic Investigation for leading corporate houses and Government entities.

He has worked as an Assistant Professor at Sikkim Manipal University & Guest Faculty at National Institute of Pharmaceutical Education and Research. His research domain is AI, Machine Learning and Cryptography. He has presented several research papers in international conferences. At ISOEH his job profile includes VAPT, Forensic Assignments & Teaching advance courses on penetration testing, creating hacking tools using python, AI & ML.

Mr. Bikash Sharma
Mr. Bikash Sharma
BTech (WBUT), JAVA Developer, ANDROID App Developer

Experienced Software Developer and Trainer working as Corporate Android Trainer at ISOEH as well as developing Mobile apps for clients and helping students in their final year projects & internships. Have experience in Client-Server based and Enterprise application development in Advance Java (JDBC, Servlet, JSP) Technologies. He had earlier worked as a Software Developer at Progenitor Technology.

Mr. Avirup Ukil
Mr. Avirup Ukil
CEH

Information Security Analyst & Faculty. His research domain is python (Network programming and hacking toolkits), privilege escalation attack & mitigation, advance penetration testing.

Mr. Subhendu Bhadra
Mr. Subhendu Bhadra
CEH

A Certified Ethical Hacker & CCNA, Mr. Subhendu Bhadra has expertise in exploit writing using Python, Ruby and Bash and is working as a Information Security Analyst and Faculty at ISOEH. Passionate about gadgets and technology, he has created several projects using Arduino. Well versed with networking and various programming languages, Suvendu is developing new hacking tools using Python.

Mr. Anubhav Kettry
Mr. Anubhav Kettry
CEH

Anubhav Khettry is a Certified Ethical Hacker. His area of interest includes Network Penetration Testing (NPT), Web Application Penetration Testing (WAPT) & RDBMS concepts. He is currently a part of ISOEH as Information Security Analyst and faculty.

>
<
All courses Available Online with LAB
(Uses Skype & TeamViewer)
Enroll Now!
FAQ
Have questions?
We have the
Answers
Take part in a
Quiz
To find out if you have it in you to
secure a place in this hacking world.
Crack Now
Exclusive Blog
Exclusive Blog
Cyber Security Blog
A severe vulnerability in Signal desktop app allowing hackers to steal chats in plaintext without any user interaction
21
May 2018
A severe vulnerability in Signal desktop app allowing hackers to steal chats in plaintext without any user interaction

A team of white hat hackers has revealed a code injection vulnerability that could have been exploited by remote attackers… read more…

Cambridge Analytica and Facebook Controversy: What happened so far?
16
Apr 2018
Cambridge Analytica and Facebook Controversy: What happened so far?

The Facebook controversy seems to be a never ending one. Facebook has been facing a tough time for the alleged data leak controversy with Cambridge Analytica from past few weeks now. read more…

Equifax identifies an additional 2.4 million U.S. consumers affected by the massive data breach of 2017
06
Mar 2018
Equifax identifies an additional 2.4 million U.S. consumers affected by the massive data breach of 2017

The credit reporting firm Equifax Inc. suffered a massive data breach in 2017 that exposed the identities of about 146 million US consumers. It is still considered as one of the worst data breaches of 2017. read more…

Severe flaw in µTorrent can let hackers to control your PC remotely
28
Feb 2018
Severe flaw in µTorrent can let hackers to control your PC remotely

World's most popular torrent download software µTorrent has been detected with multiple security flaws. If you have this software installed on your computer, it's time to download its latest version for windows as soon as possible. read more…

>
<
View All
Our
Alumni
View All
Magrabur Alam Sofily Magrabur Alam Sofily
TCS
Pramita Gupta Pramita Gupta
Cognizant
Ahana Bose Ahana Bose
B.P. Poddar Institute of Management and Technology
Amalendu Sen Amalendu Sen
MD - Indo Nabin Projects Limited
Jeetendra Pande Jeetendra Pande
Assistant Professor, School of Computer Science (Uttarakhand Open University, Haldwani)
Sourajyoti Bose Sourajyoti Bose
Jadavpur University / ORACLE
Jaskaran Singh Narula Jaskaran Singh Narula
Truba College of Engg. & IT, Bhopal
Nduuviteko Anna Mushimba Nduuviteko Anna Mushimba
Foreign Student from Namibia
Promit Konar Promit Konar
BHEL
Mishra Dhiraj Mishra Dhiraj
Student - Mumbai
Ganesh Bhate Ganesh Bhate
ARMY
K. N. Abhisikha K. N. Abhisikha
SRM
Tathagata Dutta Tathagata Dutta
KIIT
Shivacharan Raj Shivacharan Raj
Student - KPT, Mangalore
Bharath Bhushan Bharath Bhushan
Student - KPT, Mangalore
>
<
Breaking News
Breaking News
Be the first to know
Consider changing your Twitter password immediately - bug exposes passwords in plain text
08
May 2018
Consider changing your Twitter password immediately - bug exposes passwords in plain text

Twitter is asking users to change their account password immediately. read more…

Cryptocurrency Mining Virus Spreading Through Facebook
07
May 2018
Cryptocurrency Mining Virus Spreading Through Facebook

A virus that hijacks users devices and uses them to mine cryptocurrencies is spreading fast through Facebook. read more…

3 Unexpected Ways Blockchain Will Change The World
06
May 2018
3 Unexpected Ways Blockchain Will Change The World

Now, it seems as though everyone wants to build on the blockchain or is at least interested in learning more about how to harness… read more…

The personal and professional details of about 2.7 crore people exposed to data theft
03
May 2018
The personal and professional details of about 2.7 crore people exposed to data theft

In a letter to the Ministry of Electronics and Information Technology, the Central Provident Fund Commissioner has written that hackers have stolen data… read more…

>
<
Read All
Tools
Tools
Your one stop place for best hacking tools on the web
Autopwn v2.0 : Metasploit Automation Tool
Autopwn v2.0 : Metasploit Automation Tool

In nowadays due to firewall restrictions and patch management policies exploitation of systems has become much more difficult. However one of the most efficient way… read more…

GPON - Python Exploit For Remote Code Executuion On GPON Home Routers (CVE-2018-10562)
GPON - Python Exploit For Remote Code Executuion On GPON Home Routers (CVE-2018-10562)

Many routers today use GPON internet, and a way to bypass all authentication on the devices (CVE-2018-10561) was found by VPNMentor. With this authentication bypass… read more…

Mimic - A Tool For Covert Execution In Linux
Mimic - A Tool For Covert Execution In Linux

Covert execution is the art of hiding a process. In this case, mimic hides the process in plain sight. mimic can launch any program and make it look like any other program. read more…

Aircrack - the password cracking tool
Aircrack - the password cracking tool

Aircrack-ng is a network hacking tool that consists of a packet sniffer, detector, WPA/WPA2-PSK cracker, WEP and an analysis tool for for 802.11 wireless LANs. read more…

>
<
Explore All
Tutorials
Tutorials
Learn it yourself
What is crypto-jacking? How to protect yourself from it?
18
Jun 2018
What is crypto-jacking? How to protect yourself from it?

Crypto-jacking is the unauthorized use of computing resources to mine cryptocurrencies. The trickiest aspect of cryptomining is it occurs in the background and shows no sign of it except overheating of the computer or slowing down. If you want to stop hackers from crypto-jacking your computer or avoid cryptomining altogether, here find a couple of options. read more…

Artificial Intelligence & Machine Learning – What's the difference between them?
28
May 2018
Artificial Intelligence & Machine Learning – What's the difference between them?

Artificial Intelligence and Machine Learning - both the terms have become an integral part of many businesses but are often used interchangeably. To avoid the confusion, here is a guide to differentiate them. read more…

Learn Machine Learning Using Python »
Machine Learning, the booming career option shaping the job market
24
Apr 2018
Machine Learning, the booming career option shaping the job market

Jobs related to Machine Learning are growing rapidly as companies try to get the most out of emerging technologies. read more…

Learn Machine Learning Using Python »
Tips to Become an Ethical Hacker with CEH v9 Bootcamp!
01
Jan 2018
Tips to Become an Ethical Hacker with CEH v9 Bootcamp!

A certified ethical hacker is appointed to handle the security issues of any network. To become one, candidates can take the CEH v9 bootcamp. read more…

Know more about CEH »
>
<
Explore All
Original Articles & Findings
Original Findings
Original articles straight from our R&D Lab
Apple acknowledges ISOEH for reporting its website encryption vulnerability
Apple acknowledges ISOEH for reporting its website encryption vulnerability

The Apple website was not secure. While surfing the Apple site http://www.apple.com/, we have found several encryption related vulnerabilities. read more…

Forbes website flaw revealed by ISOEH
Forbes website flaw revealed by ISOEH

Forbes is a popular American business magazine which features original articles on finance, industry, investing, and marketing topics. It also reports on related subjects such as technology, communications, science, politics, and law. read more…

ISRO site vulnerability exposed by ISOEH
ISRO site vulnerability exposed by ISOEH

Indian Space Research Organization (http://www.isro.org) was vulnerable to session hijack. This vulnerability was exposed by ISOEH team member, Abir Atarthy. read more…

Sikkim Manipal University login breach discovered & reported to SMU
Sikkim Manipal University login breach discovered & reported to SMU

Sikkim Manipal University portal was vulnerable to SQL Injection attack. read more…

>
<
View All
Press
Press
We're acknowledged by leading magazines & news papers
View All
Secure your career on Ethical Hacking on Linux Forum
Where you can learn ethical hacking on Career Graph
Apple acknowledges ISOEH for reporting its website encryption vulnerability
Workshop at South Point School: Cyber Threats & How to stay protected
>
<
On television
On television
Explore All
Awards
We Received
Details
  • ITPV Business Leader 2016 - ITPV PARTNER LEADERSHIP AWARD, Eastern Edition 2016
  • Award from DNA (Mumbai)
Our Clients