<div style="margin:20px 0 0 200px"> To view the site, enable JavaScript by changing your browser options, then <a href="">Try Again</a>.</div>
EC-Council Accredited Training Center

A Certified Ethical Hacker is a skilled professional with a global certification from EC-Council, who understands and knows how to look for weaknesses and vulnerabilities in target systems (firewall, server, network, software, mobile app, etc); and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). Being accredited to the International Council of Electronic Commerce Consultants, popularly known as the EC Council, which is the owner and creator of the Certified Ethical Hacker or the CEH along with many cyber security credentials, it is one of the most sought after GLOBAL certification among security professionals all over the world. The CEH certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral point of view.

5.0
Course Rating

View All Reviews »

2000+
Students Enrolled and Counting…

Full List of Alumni »

Why Become A Certified Ethical Hacker (CEH)?

The EC-Council Certified Ethical Hacker (CEH) course helps you to earn
Advanced Security
Skill-sets

in the worldwide information security domain.

Course Syllabus »

The CEH training & certification course is one of the
Most Trusted &
Popular

ethical hacking training program.

Nowadays IT departments have made
CEH Certification
a compulsory qualification for security-related posts.

CEH-certified professionals typically earn
Higher Salaries
than their non-certified colleagues.

Jobs »
Why CEH - Hear expert's view and analysis
Duration

Duration

40 hours - 2 classes per week

Eligibility

Eligibility

  1. Basic Knowledge of Software, Database and Networking
  2. If you do not have the above knowledge, please complete our "INDUSTRY READY" Courses to be eligible -
    Industry Ready C Programming
    Industry Ready Data Structure
    Industry Ready RDBMS
Course Fees

Course Fees

Class Room Training

Rs.37,000/-
Inclusive of all taxes

Online Training

Rs.47,000/-
Inclusive of all taxes

What You Will Get?

40 Hours
in-depth training by best faculties from cyber security industry

Study Materials
and examination voucher

CEH Certificate
of completetion after examination and alumni status

Course Benefits:

  1. The certification is provided by EC-Council, one of leading certification authorities in the field of cyber security. The certificate is valid in India and abroad as well.
  2. This course introduces you to all the techniques and different kind of attacks as well as how to defend these attacks to make your website/network more secure.
  3. Compared to other courses in cyber security EC-Council’s CEH is a course which provides vast in-depth understanding of how things are happening with numerous labs and is mainly focused on practical knowledge rather than just being theoretical. To know more about the course please click www.eccouncil.org/programs/certified-ethical-hacker-ceh/
  4. After completing this course, you will be able to successfully identify, stop and prevent latest cyber attacks.

Course Details

  1. This course is designed as per latest EC-Council’s CEH exam syllabus (CEH v10).
  2. The code for the CEH exam is 312-50.
  3. It is a multiple choice examination at the end of the course.
  4. Course duration is 40 hours.
  5. Main focus will be on both theoretical and practical parts, with hands on experience of most of the attacks.
  6. Cut off percentage of pass for CEH is 70.
Module 01: Introduction to Ethical Hacking2 Hours - 7 Topics
  • Information Security Overview (Day 1)
  • Information Security Threats and Attack Vectors (Day 1)
  • Hacking Concepts (Day 1)
  • Ethical Hacking Concepts (Day 1)
  • Information Security Controls (Day 1)
  • Penetration Testing Concepts (Day 1)
  • Information Security Laws and Standards (Day 1)
  • Footprinting Concepts (Day 2)
  • Footprinting through Search Engines (Day 2)
  • Footprinting through Web Services (Day 2)
  • Footprinting through Social Networking Sites (Day 2)
  • Website Footprinting (Day 2)
  • Email Footprinting (Day 2)
  • Competitive Intelligence (Day 2)
  • Whois Footprinting (Day 2)
  • DNS Footprinting (Day 2)
  • Network Footprinting (Day 2)
  • Footprinting Through Social Engineering (Day 2)
  • Footprinting Tools (Day 2)
  • Footprinting Countermeasures (Day 2)
  • Footprinting Penetration Testing (Day 2)
  • Network Scanning Concepts (Day 3)
  • Scanning Tools (Day 3)
  • Scanning Techniques (Day 3)
  • Scanning Beyond IDS and Firewall (Day 3)
  • Banner Grabbing (Day 3)
  • Draw Network Diagrams (Day 3)
  • Scanning Pen Testing (Day 3)
  • Enumeration Concepts (Day 4)
  • NetBIOS Enumeration (Day 4)
  • SANP Enumeration (Day 4)
  • LDP Enumeration (Day 4)
  • SMTP and DNS Enumeration (Day 4)
  • Other Enumeration Techniques (Day 4)
  • Enumeration Countermeasures (Day 4)
  • Enumeration Pen Testing (Day 4)
  • Vulnerability Assessment Concepts (Day 5)
  • Vulnerability Assessment Solutions (Day 5)
  • Vulnerability Scoring Systems (Day 5)
  • Vulnerability Assessment Tools (Day 5)
  • Vulnerability Assessment Reports (Day 5)
  • System Hacking Concepts (Day 6)
  • Cracking Passwords (Day 6)
  • Escalating Privileges (Day 6)
  • Executing Applications (Day 6)
  • Hiding Files (Day 6)
  • Covering Tracks (Day 6)
  • Penetration Testing (Day 6)
  • Malware Concepts (Day 7)
  • Trojan Concepts (Day 7)
  • Virus and Worm Concepts (Day 7)
  • Malware Analysis (Day 7)
  • Countermeasures (Day 7)
  • Anti-Malware Software (Day 7)
  • Malware Penetration testing (Day 7)
  • Sniffing Concepts (Day 8)
  • Sniffing Technique: MAC Attacks (Day 8)
  • Sniffing Technique: DHCP Attacks (Day 8)
  • Sniffing Technique: ARP Poisoning (Day 8)
  • Sniffing Technique: Spoofing Attacks (Day 8)
  • Sniffing Technique: DNS Poisoning (Day 8)
  • Sniffing Tools (Day 8)
  • Countermeasures (Day 8)
  • Sniffing Detection Techniques (Day 8)
  • Sniffing Pen Testing (Day 8)
  • Social Engineering Concepts (Day 9)
  • Social Engineering Techniques (Day 9)
  • Insider Threats (Day 9)
  • Impersonation on Social Networking Sites (Day 9)
  • Identity Theft (Day 9)
  • Countermeasures (Day 9)
  • Social Engineering Pen Testing (Day 9)
  • DoS/DDos Concepts (Day 10)
  • DoS/DDos Attack Techniques (Day 10)
  • Botnets (Day 10)
  • DDoS Case Study (Day 10)
  • DoS/DDos Attack Tools (Day 10)
  • Countermeasures (Day 10)
  • DoS/DDos Protection Tools (Day 10)
  • DoS/DDos Penetration Testing (Day 10)
  • Session Hijacking Concepts (Day 11)
  • Application Level Session Hijacking (Day 11)
  • Network Level Session Hijacking (Day 11)
  • Session Hijacking Tools (Day 11)
  • Countermeasures (Day 11)
  • Penetration Testing (Day 11)
  • IDS, Firewall and Honeypot Concepts (Day 12)
  • IDS, Firewall and Honeypot Solutions (Day 12)
  • Evading IDS (Day 12)
  • Evading Firewalls (Day 12)
  • IDS/Firewall Evading Tools (Day 12)
  • Detecting Honeypots (Day 12)
  • IDS/Firewall Evasion Countermeasures (Day 12)
  • Penetration Testing (Day 12)
  • Web Server Concepts (Day 13)
  • Web Server Attacks (Day 13)
  • Web Server Attacks Methodology (Day 13)
  • Web Server Attack Tools (Day 13)
  • Countermeasures (Day 13)
  • Patch Management (Day 13)
  • Web Server Security Tools (Day 13)
  • Web Server Pen Testing (Day 13)
  • Web App Concepts (Day 14)
  • Web App Threats (Day 14)
  • Hacking Methodology (Day 14)
  • Web App Hacking Tools (Day 14)
  • Countermeasures (Day 14)
  • Web App Security Testing Tools (Day 14)
  • Web App Pen Testing (Day 14)
  • SQL Injection Concepts (Day 15)
  • Types of SQL Injection (Day 15)
  • SQL Injection Methodology (Day 15)
  • SQL Injection Tools (Day 15)
  • Evasion Techniques (Day 15)
  • Countermeasures (Day 15)
  • Wireless Concepts (Day 16)
  • Wireless Encryption (Day 16)
  • Wireless Threats (Day 16)
  • Wireless Hacking Methodology (Day 16)
  • Wireless Hacking Tools (Day 16)
  • Bluetooth Hacking (Day 16)
  • Countermeasures (Day 16)
  • Wireless Security Tools (Day 16)
  • Wireless Pen Testing (Day 16)
  • Mobile Platform Attack Vectors (Day 17)
  • Hacking Android OS (Day 17)
  • Hacking iOS (Day 17)
  • Mobile Spyware (Day 17)
  • Mobile Device Management (Day 17)
  • Mobile Security Guidelines and Tools (Day 17)
  • Mobile Pen Testing (Day 17)
  • IoT Concepts (Day 18)
  • IoT Attacks (Day 18)
  • IoT Hacking Methodology (Day 18)
  • IoT Hacking Tools (Day 18)
  • Countermeasures (Day 18)
  • IoT Pen Testing (Day 18)
  • Cloud Computing Concepts (Day 19)
  • Cloud Computing Threats (Day 19)
  • Cloud Computing Attacks (Day 19)
  • Cloud Security (Day 19)
  • Cloud Security Tools (Day 19)
  • Cloud Penetration Testing (Day 19)
  • Cryptography Concepts (Day 20)
  • Encryption Algorithms (Day 20)
  • Cryptography Tools (Day 20)
  • Public Key Infrastructure (PKI) (Day 20)
  • Email Encryption (Day 20)
  • Disk Encryption (Day 20)
  • Cryptanalysis (Day 20)
  • Countermeasures (Day 20)

Hacking Tutorials

Read All Tutorials »
Building a career in Digital Forensics - How promising is the future? A thorough career guide
Building a career in Digital Forensics - How promising is the future? A thorough career guide
Read Details »

Hacking Videos

Explore All Videos »
How to Hiding Your Secret File using Steganography?
View On Youtube »

Get In Touch



Captcha

Related Course


Enroll Now »
Know Your Faculty
Mr. Sandeep Sengupta
Mr. Sandeep Sengupta
CISA, Certified Ethical Hacker, ISO 27001:2013 Lead Auditor, Lead Privacy auditor, GDPR Implementer

19 years of experience working in India, New Zealand & Singapore; in Information Security domain as Ethical Hacker, ISO 27001 Lead Auditor / Tutor, BS 10012 Privacy Lead Auditor, Mr. Sandeep Sengupupta has conducted security audit in companies like ONGC, KPMG, PWC, Airtel, Vodafone, Accenture, Capgemini, Vedanta, PayU, Bandhan Bank, ABP, etc.

He has been invited as a speaker at FICCI, VIT (Vellore), Nasscom, CII, BCCI, ICAI, ISACA, FICCI, CeBIT, US High Commission (Kolkata), etc. He has taken part in several Television shows on ABP, ETV, NDTV, AajTak, Times Now, etc. In 2005, Sandeep founded the online community "Hackers Library"; which had 80,000+ members, making it the largest Indian online forum for cyber-security professionals at its time. Mr. Sengupta is the committee member at Nasscom (East) & CII ICT-East.

Mr. Kirit Sankar Gupta
Mr. Kirit Sankar Gupta
B. Tech (IT), CEH 10.0, CHFI 9.0, ISO Certified Lead Security Incident Manager (ISO/IEC 27035), ISO Certified Lead Forensic Examiner (CLFE), CCNA, CCNP

A Penetration Tester with 6 years of experience, Kirit has the expertise in Mobile Application Pentesting Network, IoT Penetration Testing, Source-code review, Fuzzing, Red teaming, Social Engineering, Digital Forensics and Incident Response, Dev(Sec)Ops, Malware Analysis as well as SOC analysis. He has been acknowledged for reporting critical vulnerabilities to Uber, Apple, Flipkart, and MIT. Mr. Kirit Sankar Gupta is the member of Data Security Council of India (Kolkata).

Mr. Kundan Kumar
Mr. Kundan Kumar
CCNA, CCNP, CCSI, MCSA, MCSE, RHCSA, RHCE, A+, N+

12 Years of Experience, working in India, Kabul, Dubai & World Bank Project. In Information Technology Domain he has worked as a Network Manager, Server Manager, Security Expert, Corporate Trainer, Training Consultant. Mr. Kundan has completed several projects with IT Companies in India & Abroad (IBM, Wipro, HP, Lenovo, Ministry of Afghanistan, World Bank, Etisalat, Roshan, AIB Bank, etc). He has conducted several training at Delhi & NCR, Mumbai, Chennai, Kolkata, etc.

Mr. Sanchayan Bhaumik
Mr. Sanchayan Bhaumik
MTech (Jadavpur University), MCA (WBUT), CEH, CEI

With 4 years of experience in Information Security audit and Forensic Investigation, Mr. Sanchayan Bhaumik is working as Information Security Analyst at ISOEH and has successfully conducted various Vulnerability Assessment and Penetration Testing / audit, as well as Forensic Investigation for leading corporate houses and Government entities.

He has worked as an Assistant Professor at Sikkim Manipal University & Guest Faculty at National Institute of Pharmaceutical Education and Research. His research domain is AI, Machine Learning and Cryptography. He has presented several research papers in international conferences. At ISOEH his job profile includes VAPT, Forensic Assignments & Teaching advance courses on penetration testing, creating hacking tools using python, AI & ML.

Mr. Avirup Ukil
Mr. Avirup Ukil
CEH, CHFI

Information Security Analyst & Faculty. His research domain is python (Network programming and hacking toolkits), privilege escalation attack & mitigation, advance penetration testing.

Mr. Subhendu Bhadra
Mr. Subhendu Bhadra
CEH, CCNA

A Certified Ethical Hacker & CCNA, Mr. Subhendu Bhadra has expertise in exploit writing using Python, Ruby and Bash and is working as a Information Security Analyst and Faculty at ISOEH. Passionate about gadgets and technology, he has created several projects using Arduino. Well versed with networking and various programming languages, Suvendu is developing new hacking tools using Python.

Mr. Anubhav Kettry
Mr. Anubhav Khettry
CEH, CHFI

Anubhav Khettry is a Certified Ethical Hacker. His area of interest includes Network Penetration Testing (NPT), Web Application Penetration Testing (WAPT) & RDBMS concepts. He is currently a part of ISOEH as Information Security Analyst and faculty.

Mr. Sagar Neogi
Mr. Sagar Neogi
CEH

Sagar Neogi is a Certified Ethical Hacker (CEH). His area of interest is Python, Reverse Engineering, Vulnerability Assessment and Penetration Testing. He is proficient in network design & hardening. He has a passion for teaching & likes to guide students to apply cyber security knowledge in the real-life scenario. He is currently a part of ISOEH as a faculty member & research analyst.

Mr. Md. Imamul Haque
Mr. Md. Imamul Haque
MCA, JAVA Developer, ANDROID App Developer

Experienced Software Developer and Trainer working as Corporate Android Trainer at ISOEH as well as developing Mobile apps for clients and helping students in their final year projects & internships. Have experience in Client-Server based and Enterprise application development in Android. He had earlier worked as a Software Developer at Oaasa Technologies.<

Mr. Dipjyoti Biswas
Mr. Dipjyoti Biswas
CEH, NPT, WAPT, AAPT, Core JAVA, Python

Dipjyoti Biswas is a Certified Ethical Hacker (CEH). His areas of interest are Core JAVA, Python, Reverse Engineering, Vulnerability Assessment and Penetration Testing for mobile apps. He is a B.Tech in Computer Science & Engineering from the Kalyani Government Engineering College. He has a passion for teaching & likes to guide students in applying knowledge of cyber security in reality. He has stood first in the inter-college Hackathon (CTF) arranged by Techno Group. He is currently a part of ISOEH family as a faculty member & research analyst.

Mr. Somdeb Chakraborty
Mr. Somdeb Chakraborty
CEH

Somdeb Chakraborty is a Certified Ethical Hacker (CEH), whose expertise lies in penetration testing. His areas of interest are Python, Vulnerability Assessment and Penetration Testing. Previously he worked as a software and web development trainer at The EDGE College in tie up with Vinayaka mission Sikkim University. He is working as an Information Security Analyst in the Indian School of Ethical Hacking.

>
<

Ratings & Reviews

CEH v10.0

5.0
Course Rating
Based On
1749 Students Rating

Date: 25.10.2019
Course: CEH v10

One of the finest institutes for industrial training in Kolkata. Got an opportunity to learn Ethical Hacking from amazing teachers. Special thanks to Mr. Samyajit Mukherjee (Business Development Executive) for introducing and guiding me through this course.

Date: 22.10.2019
Course: CEH v10

One of the best institutions for learning ethical hacking in west bengal Saumyajit nody mukharjee a very helpful person, helps during the time of admission and during many times.

(Student of WBUT)
Date: 19.07.2019
Course: CEH v10

Trainers are very friendly and co-operative. Environment is healthy and the course is project based so it is very interesting to learn Topics covered are relevant to our works.

>
<

Job Prospects & Job Sources

The CEHV10 course opens up numerous career advancement opportunities, it helps to prepare you for different roles in infosec domain like computer network defence analyst, infrastructure support, infosec incident responder, infosec auditor, intrusion analyst, security manager, and other related high-profile roles.

The following are the career prospects of CEH enumerated.

Cyber security is a blooming field

Cyber security is a blooming field with excellent potential in the IT market, and is a very important aspect of any company.

The rising demands for cyber security

The demands for cyber security is rising exponentially both in Indian market as well as abroad.

United States faced a shortfall of cyber security professionals

According to Cyber Seek, an initiative funded by the National Initiative for Cyber Security Education (NICE), the United States faced a shortfall of almost 314,000 cyber security professionals as of January 2019. Same can be said for India as well.

Course designed for cybercrime department or any Government organization

This course is not only for IT sector but also for professionals who are in the cybercrime department or any Government organization dealing with cybercrimes, espionage or cyber security as a whole.

According to NASSCOM India requires 77,000 ethical hackers

As according to a study by NASSCOM India requires 77,000 ethical hackers every year out of which the job market can only provide 15000. The demand being way more than the supply Ethical Hacking is one of the most sought after and promising professions at the moment.

Average earning of a Certified Ethical Hacker

Financially also this profession is paying and secure enough. In India on an average a certified ethical hacker earns an average salary of Rs 367,249 per year which increases with experience cumulatively upto more than 15 lakh per year.

Designation Salary in Rs.
Security Analyst 3.7 lakhs
Information Security Analyst 4.3 lakhs
Certified Ethical Hacker (CEH) 3.5 lakhs
Security Consultant (Computing / Networking / Information Technology) 5.5 lakhs
Information Security Manager 12 lakhs
Experience Salary in Rs.
Less than 1 year 3 lakhs
1-4 years 3.8 lakhs
5-9 years 7.7 lakhs
10-19 years 5.5 lakhs
20 years and more 14.4 lakhs
Employers Salary in Rs.
Tata Consultancy Services Limited 1.5 to 9 lakhs
Wipro Technologies Limited 2.5 to 14.5 lakhs
International Business Machines (IBM) Corp. 3 to 6 lakhs
EY (Ernst & Young) 2.4 to 6 lakhs
HCL Technologies Ltd. 2 to 7 lakhs

FAQs

What is the course content?

The CEH course is the fundamental curriculum on cyber security. It is designed as per latest EC-Council’s CEH exam syllabus (CEH v10). The main focus is on both theoretical and practical parts, with hands on experience of most of the attacks.

What is the course Duration?

40 hours

What is the course Methodology?

The main focus of this course will be on both theoretical and practical parts, with hands on experience of most of the attacks, depending upon the particular student.

What is the course Prerequisites?

Complete 12th board exam and basic networking knowledge or CCNA.

What is the career path after doing this course?

After the course you are eligible to apply in the cyber security domain of any corporate house.

What is the next step after CEH?

After the course you can enroll yourself for customized advanced courses like NPT1, WAPT1, NPT2 and WAPT2 from ISOEH after fulfilling its prerequisites.

Enroll Now

Fields marked with * are mandatory.

Class Room Training

Course Fees

Rs.37,000/-
Inclusive of all taxes

Batches
Weekday Batches:
Start Date
End Date
Reg. Date
8
Dec, 2019
10
Dec, 2019
14
Feb, 2020
Online Training

Course Fees

Rs.47,000/-
Inclusive of all taxes

Batches
Weekday Batches:
Start Date
End Date
Reg. Date
8
Dec, 2019
10
Dec, 2019
14
Feb, 2020
Internal Assessment (Practical) : Catch the flag(CTF)

Member of:

NASSCOM
Data Security Council of India