Ethical Hacking

Penetrating into the System or Network to Discover Threats

  • Knowing the Hacking Psychology
  • Regulatory compliance in Terms of Corporate Data Breaches
  • Professional Development
  • Job advancement and Specialization
Download Syllabus
Get Your Dream Job…

By providing your contact details, you agree to our Terms of Use & Privacy Policy

grade grade grade grade grade

5.0 Google Review (2500+)

people

2500+ Students Enrolled

verified

100% Job Placement

What Will You Get

account_box

Expert Trainers

Faculty are working professionals from industry. Best in the Ethical Hacking.

settings

Advance Lab

ICS, SCADA, PLC; HMI based attacks, Side-Channel attacks.

devices

LIVE Projects

While you study, you work in our LIVE projects to get hands on industry experience.

engineering

Internship

Internship at a Security Audit firm.

badge

On Campus Placement

Opportunities in Multinational Companies. Job Ready Program With 100% placement assistance.

payments

Good Salary

Get a Chance to Earn Good Salary – upto 3 lakhs.

book

Advance Syllabus

The most advance Syllabus made by industry experts. Immersive Learning with 100% Practical.

Duration

40 hours - 2 classes per week.

Eligibility

  • Basic Knowledge of Database, Server-side Programming (PHP or JSP or ASP.net) and Basic knowledge of Networking.
  • If you do not have the above knowledge, please complete our "INDUSTRY READY" Course to be eligible.
Download Syllabus

account_circle

40 hours of in-depth training by the best Ethical Hacking Experts.

library_books

Lifetime Access to resources (50+ pdf, 100+ videos).

record_voice_over

7 days doubt clearing session.

switch_account

On-Campus Placement Opportunities in Multinational Companies.

workspace_premium

Ethical Hacking Certificate of Completion after examination and alumni status.

Program Overview

Course Details

  • Course: Ethical Hacking.
  • Certification: Ethical Hacking Certificate from ISOEH.
  • Duration: 40 hours.
  • Mode: 2 classes per week. The course consists of both practical and theory training. Class Room & Online - Live, interactive training with small batches. 100% practical and Virtual Lab based.
  • Fee: Rs.14,500/- Inclusive of all taxes

Our Ethical Hacking Lab

ISOEH Cyber Lab

Course Structure

Module 1: 2 Hours - 3 Topics
  • Introduction: (Day 1)
    • What is Ethical Hacking
    • What are the different types of hackers
    • Five phases of hacking
    • Scope of Ethical Hacking
  • Brush up Linux (Optional) (Day 1)
  • Brush up networking (Optional) (Day 1)
  • Information Gathering: (Day 2)
    • Passive Information Gathering
    • Active Information Gathering
    • Five phases of hacking
    • Scope of Ethical Hacking
  • Brush up Linux (Optional) (Day 2)
  • Brush up networking (Optional) (Day 2)
  • Scanning (Day 3)
  • System Hacking: (Day 4)
    • Introduction to Metasploit Framework
    • Exploit MS17-010 Vulnerability
    • Reverse TCP Connection
  • System Hacking (Cont.): (Day 5)
    • Privilege Escalation using post exploit bypassuac and getsystem
    • Reverse connection in different network using port forwarding
    • Android hacking using reverse TCP connection
  • System Hacking (Cont) (Day 6)
    • Show software based vulnerabilities (Badblue/iceblaster)
  • System Hacking (cont) (Day 7)
    • Introduction to Active Directory
    • Explain OU, DC, TREE, FOREST
    • Explain LDAP
    • Explain how AD works
    • Explain smb share
    • Explain SPN
  • System Hacking (cont) (Day 8)
    • Introduction to Kerberos
    • Explain how Kerberos works (Authentication Server, Ticket Granting Server, TGT etc)
    • Explain Kerberoasting attack
    • Mention
    • ASREPROASTING
    • Golden Ticket
  • System Hacking (Cont.): (Day 9)
    • Malware (Different types of Malware, Virus and Trojan)
    • AV bypass
  • Sniffing using Wireshark (Day 10)
  • Man In the Middle Attack using the concept of ARP poisoning (Day 10)
  • Cryptography (Day 11)
    • Symmetric Encryption Algorithm
    • Asymmetric Encryption Algorithm
    • Hash Algorithm
  • Steganography (Day 11)
  • Wireless Attacks (Day 12)
    • Explain WiFi attacks (Deauth packets)
    • Explain WiFi 4 way handshake
    • Explain the attack scenario and procedure
    • Explain fake access point attacks
  • Website Attacks (Day 13)
  • Website Attacks(cont) (Day 14)
    • Explain XSS attacks
    • Explain different types of XSS attacks
    • Prevention
  • Website Attacks(cont) (Day 15)
    • Explain sql injection attacks
    • Explain different kinds of sql injection attacks
      • error based
      • boolean based
      • union based
      • Mention: blind/time based
    • Prevention
  • Website Attacks (cont) (Day 16)
    • Explain CSRF attacks and prevention
    • Explain cookie stealing, session hijacking
    • Show a login brute force example
    • Talk about how to prevent such attacks
  • Website Attacks (cont) (Day 17)
    • Show data tampering attacks
    • Phishing Attack
    • File upload vulnerability
  • IOT Hacking (cont) (Day 18)
    • Explain various attack vectors in IOT hacking
  • DOS and DDOS attacks (Day 19)
  • Cloud based attacks: (Day 19)
    • Explain cloud based attacks vectors
  • IDS (Day 20)
  • IPS (Day 20)

What roles can a Ethical Hacker play?

check_box

Security Engineer
7500+ Jobs

check_box

Security Analyst
800+ Jobs

check_box

Information Security Analyst
100+ Jobs

check_box

Ethical Hacker
600+ Jobs

check_box

Security Consultant
600+ Jobs

check_box

Information Security Manager
5000+ Jobs

Our Instructors

Mr. Saumitra Biswas
Mr. Saumitra Biswas
M Tech - Computer Science, MSc (Statistics), GATE qualified

Mr. Saumitra Biswas is M.Tech in computer science from Netaji Subhash Engineering College, GATE qualified in computer science and a MSC in statistics from Kalyani University. His technical interests include Machine Learning, Neural Networks, Genetic Algorithms and Object Oriented Programming. He is skilled in C, C++, C#, Dotnet, Java, Python, Matlab, Unix, MS Windows XP, Windows 7, My SQL, Oracle, MS Access, HTML, XML, CSS and PHP. He take classes on AI & ML in ISOAH, as well as act as mentors to interns & project trainees.

>
<

Why Should You Choose ISOEH?

7 lacs

Average Salary

20+

Hiring Partners

50%

Average Salary Hike

Our students are placed at CID, Kolkata Police, Siliguri Police, Sales Tax Dept. Furthermore, we have working CA & Lawyers taking up our course. With rise in cybercrime, Cyber Security professionals will be the most in demand experts in the industry.

They will find good opportunity as "Penetration Tester, ISO 27001 Auditor / Implementer, System Administrator, Web/Mobile Application Penetration Tester, Software Developer, Malware Analyst, Information Security Researcher (ML & AI), etc".

Salary index in this field has risen by 25 to 35% in the last few years. Governmental initiative for digital India is a further impetus for increased demand for Cyber Security jobs.

Financial services institutions including banks, payment gateways and ecommerce organisations are the biggest employers in digital Forensic, according to Sunil Goel, managing director at Global Hunt. In certain cases, digital Forensic experts are reporting to the company boards directly.

Upcoming Batch
starting from
March 2023

Apply Now

Our Alumni Work At

What Our Students Say About Us

Sarman Rai
Ethical Hacking

grade grade grade grade grade

"Isoeh is the good institute I have learn knowledge about ethical hacking. This institute very good to learn and practise about hacking. Sir Sombed has given very good knowledge about ethical hacking."

Zening Biswakarma
Ethical Hacking

grade grade grade grade grade

"It's a good institute I had gained lots of knowledge I had an experience in ethical hacking and it's institute faculty is good they are frankly with students I am a lucky that I have training in this institute."

Rikesh Thapa
Ethical Hacking

grade grade grade grade grade

"Somdeb sir was good and gave me very good knowledge about ethical hacking.....if I am going to do advance in ethical hacking I will be looking for him..."

>
<

FAQs

The course duration is 40 hours.

The course is administered in equal measures of practical and theory.

The pre requisites of the course are Basic knowledge of Database, Server side Programming (PHP or JSP or ASP.net) and basic knowledge of Networking.

The top organizations like such as Infosys, Wipro, TCS, Tech Mahindra, IBM etc. are seeking good ethical hackers. The profiles that are on offer include Security Executive, Web Security Manager/Administrator, Network Security Administrator, Network Security Systems Manager and much more.

For All Queries:
Call / Whatsapp: +91 9007392360, +91 8100103831
Any Day: 8am - 7pm