Ethical Hacking Course in Kolkata

Penetrating into the System or Network to Discover Threats

  • Knowing the Hacking Psychology
  • Regulatory compliance in Terms of Corporate Data Breaches
  • Professional Development
  • Job advancement and Specialization
Download Syllabus
Get Your Dream Job…

By providing your contact details, you agree to our Terms of Use & Privacy Policy

grade grade grade grade grade

5.0 Google Review (2500+)

people

2500+ Students Enrolled

verified

100% Job Placement

Only Science & Commerce students are eligible. The reason behind this is our potential recruiters are mostly asking for students from science / commerce background.

We do give admissions to Arts students with only following exceptions:

  1. if you have prior work experience in technical field (network, software, etc)
  2. you already have good knowledge of foundation subjects of network or programming. In that case our CEO would like to talk with you and take a call.

What Will You Get

account_box

Expert Trainers

Faculty are working professionals from industry. Best in the Ethical Hacking.

settings

Advance Lab

ICS, SCADA, PLC; HMI based attacks, Side-Channel attacks.

devices

LIVE Projects

While you study, you work in our LIVE projects to get hands on industry experience.

engineering

Internship

Internship at a Security Audit firm.

badge

On Campus Placement

Opportunities in Multinational Companies. Job Ready Program With 100% placement assistance.

payments

Good Salary

Get a Chance to Earn Good Salary – upto 3 lakhs.

book

Advance Syllabus

The most advance Syllabus made by industry experts. Immersive Learning with 100% Practical.

Duration

40 hours - 2 classes per week.

Eligibility

  • Basic Knowledge of Database, Server-side Programming (PHP or JSP or ASP.net) and Basic knowledge of Networking.
  • If you do not have the above knowledge, please complete our "INDUSTRY READY" Course to be eligible.
Download Syllabus

account_circle

40 hours of in-depth training by the best Ethical Hacking Experts.

library_books

Lifetime Access to resources (50+ pdf, 100+ videos).

record_voice_over

7 days doubt clearing session.

switch_account

On-Campus Placement Opportunities in Multinational Companies.

workspace_premium

Ethical Hacking Certificate of Completion after examination and alumni status.

Program Overview

Course Details

  • Course: Ethical Hacking.
  • Certification: Ethical Hacking Certificate from ISOEH.
  • Duration: 40 hours.
  • Mode: 2 classes per week. The course consists of both practical and theory training. Class Room & Online - Live, interactive training with small batches. 100% practical and Virtual Lab based.
  • Fee: ₹ 14,500/- Inclusive of all taxes

Our Ethical Hacking Lab

ISOEH Cyber Lab

Course Structure

Module 1: Introduction 2 Hours - 4 Topics
  • What is Ethical Hacking (Day 1)
  • What are the different types of hackers (Day 1)
  • Five phases of hacking (Day 1)
  • Scope of Ethical Hacking (Day 1)
  • Passive Information Gathering (Day 2)
  • Active Information Gathering (Day 2)
  • Foot-Printing (Day 2)
  • OSINT (Day 2)
  • Port Scanning (Day 3)
  • Network Sweeping (Day 3)
  • Vulnerability Scanning (Day 3)
  • Service Version Detection (Day 3)
  • OS Fingerprinting (Day 3)
  • Introduction to Metasploit Framework (Day 4)
  • Introduction to Exploits & Payloads (Day 4)
  • Type of Connections (Day 4)
  • Exploit MS17-010 Vulnerability (Day 4)
  • Introduction to Privilege Escalation (Day 5)
  • Types of Privilege Escalation (Day 5)
  • Bypassuac and getsystem (Day 5)
  • Android Hacking (Day 6)
  • Software based vulnerabilities (Day 6)
  • Introduction to Active Directory Components (Day 7)
  • LDAP in Active Directory (Day 7)
  • Active Directory Functionality (Day 7)
  • Service Principal Name (SPN) (Day 7)
  • Kerberos Basics and Overview (Day 8)
  • Components of Kerberos (KDC, Ticket Granting Ticket, etc.) (Day 8)
  • Kerberos Authentication Process (Day 8)
  • Kerberos Tickets and Encryption (Day 8)
  • Introduction to Kerberos Attacks (Day 8)
  • Introduction to Malware (Day 9)
  • Types of Malwares (Viruses, Worms, Trojans, etc.) (Day 9)
  • Malware Analysis Techniques (Day 9)
  • Common Malware Distribution Methods (Day 9)
  • Malware Detection and Prevention (Day 9)
  • Introduction to Network Sniffing (Day 10)
  • Passive vs. Active Sniffing (Day 10)
  • Common Network Sniffing Tools (Day 10)
  • Man-in-the-Middle (MITM) Attacks and Techniques (Day 10)
  • Introduction to Cryptography (Day 11)
  • Symmetric vs. Asymmetric Encryption (Day 11)
  • Common Cryptographic Algorithms (e.g., AES, RSA) (Day 11)
  • Steganography Techniques and Applications (Day 11)
  • Introduction to Wireless Networks (Day 12)
  • Types of Wireless Security Protocols (e.g., WEP, WPA, WPA2) (Day 12)
  • Wireless Network Scanning and Enumeration (Day 12)
  • Exploiting Wireless Vulnerabilities (Day 12)
  • Introduction to Website Attacks (Day 13)
  • How Website Attacks Work (Day 13)
  • Types of Vulnerabilities Exploited (Day 13)
  • Enumeration Techniques (Day 13)
  • Introduction to Cross-Site Scripting (XSS) (Day 14)
  • Understanding How XSS Works (Day 14)
  • Types of XSS Attacks (Reflected XSS, Stored XSS, DOM-based XSS) (Day 14)
  • Techniques for Detecting and Exploiting XSS Vulnerabilities (Day 14)
  • Introduction to SQL Injection (SQLi) (Day 15)
  • Mechanism of SQL Injection (Day 15)
  • Common Types of SQL Injection Attacks (Union-Based, Blind SQLi, Error-Based) (Day 15)
  • Techniques for Exploiting SQL Injection Vulnerabilities (Day 15)
  • Introduction to Cross-Site Request Forgery (CSRF) (Day 16)
  • How CSRF Attacks Work (Day 16)
  • Examples of CSRF Exploitation (Day 16)
  • Prevention and Mitigation Strategies (Day 16)
  • Understanding Cookie Stealing and Session Hijacking (Day 17)
  • Techniques for Cookie Stealing and Session Hijacking (Day 17)
  • Data Tampering Attacks on Websites (Day 17)
  • Phishing Attacks: Methods and Impacts (Day 17)
  • File Upload Vulnerabilities: Risks and Exploitation (Day 17)
  • Introduction to IoT Security (Day 18)
  • IoT Device Identification and Enumeration (Day 18)
  • Exploiting IoT Communication Protocols (Day 18)
  • Webcam Attacks on IoT Devices (Day 18)
  • Introduction to DDoS Attacks (Day 19)
  • Types of DDoS Attacks (Day 19)
  • DDoS Attack Techniques (Day 19)
  • Cloud Security Fundamentals (Day 19)
  • Introduction to IDS/IPS (Day 20)
  • Types of IDS (Network-based, Host-based) (Day 20)
  • Types of IPS (Network-based, Host-based) (Day 20)
  • Honeypots (Day 20)

What roles can a Ethical Hacker play?

check_box

Security Engineer
7500+ Jobs

check_box

Security Analyst
800+ Jobs

check_box

Information Security Analyst
100+ Jobs

check_box

Ethical Hacker
600+ Jobs

check_box

Security Consultant
600+ Jobs

check_box

Information Security Manager
5000+ Jobs

Our Instructors

Saumitra Biswas
Saumitra Biswas
M Tech - Computer Science, MSc (Statistics), GATE qualified

Saumitra Biswas is M.Tech in computer science from Netaji Subhash Engineering College, GATE qualified in computer science and a MSC in statistics from Kalyani University. His technical interests include Machine Learning, Neural Networks, Genetic Algorithms and Object Oriented Programming. He is skilled in C, C++, C#, Dotnet, Java, Python, Matlab, Unix, MS Windows XP, Windows 7, My SQL, Oracle, MS Access, HTML, XML, CSS and PHP. He take classes on AI & ML in ISOAH, as well as act as mentors to interns & project trainees.

Pankaj Kumar Roy
Pankaj Kumar Roy
CCNA (Certified) | CEH v12

Pankaj Kuamr Roy is a CCNA (Switch/Router) certified whose expertise in Cisco switch and router. He is also CCNA Global Certified Number 415114188268BKYF. Previously he worked as a Linux Administrator on ISP Dreamlink Technologies Pvt. Ltd and also 7 years’ experience in Windows, Linux, and Network areas. He has experience in DevOps tools and AWS cloud Architecture. He is working as an Information Security Analyst in the Indian School of Ethical Hacking.

>
<

Why Should You Choose ISOEH?

7 lacs

Average Salary

20+

Hiring Partners

50%

Average Salary Hike

Our students are placed at CID, Kolkata Police, Siliguri Police, Sales Tax Dept. Furthermore, we have working CA & Lawyers taking up our course. With rise in cybercrime, Cyber Security professionals will be the most in demand experts in the industry.

They will find good opportunity as "Penetration Tester, ISO 27001 Auditor / Implementer, System Administrator, Web/Mobile Application Penetration Tester, Software Developer, Malware Analyst, Information Security Researcher (ML & AI), etc".

Salary index in this field has risen by 25 to 35% in the last few years. Governmental initiative for digital India is a further impetus for increased demand for Cyber Security jobs.

Financial services institutions including banks, payment gateways and ecommerce organisations are the biggest employers in digital Forensic, according to Sunil Goel, managing director at Global Hunt. In certain cases, digital Forensic experts are reporting to the company boards directly.

Upcoming Batch
starting from
January 2026

Apply Now

Our Alumni Work At

What Our Students Say About Us

Sarman Rai
Ethical Hacking

grade grade grade grade grade

"Isoeh is the good institute I have learn knowledge about ethical hacking. This institute very good to learn and practise about hacking. Sir Sombed has given very good knowledge about ethical hacking."

Zening Biswakarma
Ethical Hacking

grade grade grade grade grade

"It's a good institute I had gained lots of knowledge I had an experience in ethical hacking and it's institute faculty is good they are frankly with students I am a lucky that I have training in this institute."

Rikesh Thapa
Ethical Hacking

grade grade grade grade grade

"Somdeb sir was good and gave me very good knowledge about ethical hacking.....if I am going to do advance in ethical hacking I will be looking for him..."

>
<

FAQs

The course duration is 40 hours.

The course is administered in equal measures of practical and theory.

The pre requisites of the course are Basic knowledge of Database, Server side Programming (PHP or JSP or ASP.net) and basic knowledge of Networking.

The top organizations like such as Infosys, Wipro, TCS, Tech Mahindra, IBM etc. are seeking good ethical hackers. The profiles that are on offer include Security Executive, Web Security Manager/Administrator, Network Security Administrator, Network Security Systems Manager and much more.

For All Queries:
Call / Whatsapp: +91 9147408381
Any Day: 8am - 7pm