Ethical Hacking is also called Penetration Testing. It is an act of intruding/ penetrating into the system or network to discover threats and vulnerabilities which a hacker may find and exploit leading to loss of data, money etc. The purpose of ethical hacking is to tighten the security in the system by solving the vulnerabilities found. Ethical hacker’s modus operandi is the same as the criminal hackers but with the permission of the authorities.

Course Rating

View All Reviews »

Students Enrolled and Counting…

Full List of Alumni »

Why learn Ethical Hacking?

Knowing the
Hacking Psychology

Course Syllabus »

Regulatory compliance in terms of
Corporate Data Breaches


Job advancement and

Jobs »


40 hours - 2 classes per week



  1. Basic Knowledge of Database, Server-side Programming (PHP or JSP or and Basic knowledge of Networking.
  2. If you do not have the above knowledge, please complete our "INDUSTRY READY" Course to be eligible.
Course Fees

Course Fees

Class Room Training

Inclusive of all taxes

Online Training

Inclusive of all taxes

What You Will Get?

40 Hours
of in depth training by the best cyber security experts

Study Materials

Ethical Hacking
Certificate of Completion after examination and alumni status

Course Benefits:

  1. Development and quality assurance in terms of software functioning, cyber security management etc in an organization

Your Course Path

Ethical Hacking Course Path

Course Details

  1. The duration of the course is 40 hours at 2 hours per week
  2. The course fee is Rs.14,500/- for classroom and Rs.24,500/- Rs.14,500/- for online
  3. The curriculum is taught combining theory and practice
Module 1: 2 Hours - 3 Topics
  • Introduction: (Day 1)
    • What is Ethical Hacking
    • What are the different types of hackers
    • Five phases of hacking
    • Scope of Ethical Hacking
  • Brush up Linux (Optional) (Day 1)
  • Brush up networking (Optional) (Day 1)
  • Information Gathering: (Day 2)
    • Passive Information Gathering
    • Active Information Gathering
    • Five phases of hacking
    • Scope of Ethical Hacking
  • Brush up Linux (Optional) (Day 2)
  • Brush up networking (Optional) (Day 2)
  • Scanning (Day 3)
  • System Hacking: (Day 4)
    • Introduction to Metasploit Framework
    • Exploit MS17-010 Vulnerability
    • Reverse TCP Connection
  • System Hacking (Cont.): (Day 5)
    • Privilege Escalation using post exploit bypassuac and getsystem
    • Reverse connection in different network using port forwarding
    • Android hacking using reverse TCP connection
  • System Hacking (Cont) (Day 6)
    • Show software based vulnerabilities (Badblue/iceblaster)
  • System Hacking (cont) (Day 7)
    • Introduction to Active Directory
    • Explain OU, DC, TREE, FOREST
    • Explain LDAP
    • Explain how AD works
    • Explain smb share
    • Explain SPN
  • System Hacking (cont) (Day 8)
    • Introduction to Kerberos
    • Explain how Kerberos works (Authentication Server, Ticket Granting Server, TGT etc)
    • Explain Kerberoasting attack
    • Mention
    • Golden Ticket
  • System Hacking (Cont.): (Day 9)
    • Malware (Different types of Malware, Virus and Trojan)
    • AV bypass
  • Sniffing using Wireshark (Day 10)
  • Man In the Middle Attack using the concept of ARP poisoning (Day 10)
  • Cryptography (Day 11)
    • Symmetric Encryption Algorithm
    • Asymmetric Encryption Algorithm
    • Hash Algorithm
  • Steganography (Day 11)
  • Wireless Attacks (Day 12)
    • Explain WiFi attacks (Deauth packets)
    • Explain WiFi 4 way handshake
    • Explain the attack scenario and procedure
    • Explain fake access point attacks
  • Website Attacks (Day 13)
  • Website Attacks(cont) (Day 14)
    • Explain XSS attacks
    • Explain different types of XSS attacks
    • Prevention
  • Website Attacks(cont) (Day 15)
    • Explain sql injection attacks
    • Explain different kinds of sql injection attacks
      • error based
      • boolean based
      • union based
      • Mention: blind/time based
    • Prevention
  • Website Attacks (cont) (Day 16)
    • Explain CSRF attacks and prevention
    • Explain cookie stealing, session hijacking
    • Show a login brute force example
    • Talk about how to prevent such attacks
  • Website Attacks (cont) (Day 17)
    • Show data tampering attacks
    • Phishing Attack
    • File upload vulnerability
  • IOT Hacking (cont) (Day 18)
    • Explain various attack vectors in IOT hacking
  • DOS and DDOS attacks (Day 19)
  • Cloud based attacks: (Day 19)
    • Explain cloud based attacks vectors
  • IDS (Day 20)
  • IPS (Day 20)

Hacking Tutorials

Read All Tutorials »
Building a career in Digital Forensics - How promising is the future? A thorough career guide
Building a career in Digital Forensics - How promising is the future? A thorough career guide
Read Details »

Hacking Videos

Explore All Videos »
How to Hiding Your Secret File using Steganography?
View On Youtube »

Related Course

Enroll Now »

Enroll Now

Fields marked with * are mandatory.

Know Your Faculty
Mr. Sandeep Sengupta
Mr. Sandeep Sengupta
CISA, Certified Ethical Hacker, ISO 27001:2013 Lead Auditor, Lead Privacy auditor, GDPR Implementer

21 years of experience working in India, New Zealand & Singapore; in Information Security domain as Ethical Hacker, ISO 27001 Lead Auditor / Tutor, BS 10012 Privacy Lead Auditor, Mr. Sandeep Sengupta has conducted security audit in companies like ONGC, KPMG, PWC, Airtel, Vodafone, Accenture, Capgemini, Vedanta, PayU, Bandhan Bank, ABP, etc.

He has been invited as a speaker at FICCI, VIT (Vellore), Nasscom, CII, BCCI, ICAI, ISACA, FICCI, CeBIT, US High Commission (Kolkata), etc. He has taken part in several Television shows on ABP, ETV, NDTV, AajTak, Times Now, etc. In 2005, Sandeep founded the online community "Hackers Library"; which had 80,000+ members, making it the largest Indian online forum for cyber-security professionals at its time. Mr. Sengupta is the committee member at Nasscom (East) & CII ICT-East.

Mr. Kirit Sankar Gupta
Mr. Kirit Sankar Gupta
B. Tech (IT), OSCP, CEH 10.0, CHFI 9.0, ISO Certified Lead Security Incident Manager (ISO/IEC 27035), ISO Certified Lead Forensic Examiner (CLFE), CCNA, CCNP

A Penetration Tester with 6 years of experience, Kirit has the expertise in Mobile Application Pentesting Network, IoT Penetration Testing, Source-code review, Fuzzing, Red teaming, Social Engineering, Digital Forensics and Incident Response, Dev(Sec)Ops, Malware Analysis as well as SOC analysis. He has been acknowledged for reporting critical vulnerabilities to Uber, Apple, Flipkart, and MIT. Mr. Kirit Sankar Gupta is the member of Data Security Council of India (Kolkata).

Mr. Saumitra Biswas
Mr. Saumitra Biswas
M Tech - Computer Science, MSc (Statistics), GATE qualified

Mr. Saumitra Biswas is M.Tech in computer science from Netaji Subhash Engineering College, GATE qualified in computer science and a MSC in statistics from Kalyani University. He has 20 years of experience. His technical interests include Machine Learning, Neural Networks, Genetic Algorithms and Object Oriented Programming. He is skilled in C, C++, C#, Dotnet, Java, Python, Matlab, Unix, MS Windows XP, Windows 7, My SQL, Oracle, MS Access, HTML, XML, CSS and PHP. He take classes on AI & ML in ISOAH, as well as act as mentors to interns & project trainees.

Ms. Amrita Acharya
Ms. Amrita Acharya
M Tech in CSE, ISO 27001 Lead Auditor (IRCA/BSI)

After completion of her Master degree, she has worked with ISOAH as an intern for few years before joining full time as security analyst. She has been involved in internal audit, policy design, ISMS consultancy for more than 2 years. She is well versed in Kali Linux, Nmap, Metasploit, ITGC, ISO 27001 & COBIT framework. ISOAH clients she has provided active consultancy are CESC, Diadem, Lexplosion, Diamond Beverages, etc. As part of her hobby, she has been a professional model in her free time.


Ratings & Reviews

Ethical Hacking

Course Rating
Based On
5800 Students Rating

Faraja Obadia
Date: 18.10.2023
Course: CCNA & Ethical Hacking

I joined ISOEH for CCNA and an Ethical hacking course while continuing with my B.Sc in Computer Science at KIIT UNIVERSITY. The training at ISOEH was hands-on practical learning based. And the mentoring I received from their faculty members was a light to accomplish my goals. The Indian School of Ethical hacking is the golden treasure of knowledge, a weapon to face your tomorrow.

Date: 17.01.2020
Course: Ethical Hacking (Non Global)

Isoeh is the good institute I have learn knowledge about ethical hacking. This institute very good to learn and practise about hacking. Sir Sombed has given very good knowledge about ethical hacking.

Date: 17.01.2020
Course: Ethical Hacking (Non Global)

It's a good institute I had gained lots of knowledge I had an experience in ethical hacking and it's institute faculty is good they are frankly with students I am a lucky that I have training in this institute.

Date: 07.01.2020
Course: Ethical Hacking (Non Global)

Somdeb sir was good and gave me very good knowledge about ethical hacking.....if I am going to do advance in ethical hacking I will be looking for him...

Date: 25.12.2019
Course: Ethical Hacking (Non Global)

Excellent Place to learn CCNA and Ethical Hacking. Best institute to learn on networking and Hacking. Lucky to be a part of this Institution.. Teachers and Faculties are very helpful and always ready to help. They got huge knowledge on every subject and every topic. I was under Subhendu Sir from very 1st day, he is too good and has good expertise and knowledge in his domain of Networking and also completed the course under him. For EH I was under Sanchayan Sir and Anubhav Sir they were also too good in teaching Hacking and its tools and how it works and cleared all my doubt. On other hand Kundan Sir also helped me with all my problems which I was facing and also help me to get rid from all my problems so I will be thankful to ISOEH for life. It was a good journey for me in learning and gathering knowledge and looking forward to do more courses from here and will also suggest my friend about this Institution. Thank You.


Job Prospects & Job Sources

Internet security and networking are the two sunshine industries where ethical hackers are employed. They can join government and private organizations as cyber-security experts. IT firms are the real recruiters of ethical hackers additionally needed by financial service providers, airlines, retail chains and hotels also. Government agencies such as various wings of the military and law enforcement, defence organisations, forensic laboratories, detective companies and investigative services also have interesting careers for ethical hackers. Some skilled hackers work for investigative agencies like the Central Bureau of Investigation, the National Security Agency and the Federal Bureau of Information. Some large organizations employ security testers and others use contractors to audit their systems.

A fresher may work as an intern for some time before finally starting job with 2.5 lakh per annum. With one year of experience, one can expect up to 4.5 lakh per annum. Those with work experience five years or more can rake in anything between 10-12 lakh per annum.


What is the course content?
  • Introduction to Ethical Hacking
  • Legality and Ethics
  • Networking & Basics
  • Foot Printing
  • Google Hacking
  • Scanning
  • Enumeration
  • System Hacking
  • Windows Hacking
  • Trojans & Backdoors
  • Virus & Worms
  • Sniffers
  • Social Engineering
  • Proxy Server & Packet Filtering
  • Denial of Service Attack
  • Phishing
  • Session Hijacking
  • Penetration Testing
  • Vulnerability Assessment
  • Linux Hacking
  • Physical Security
  • Hacking Web servers
  • Web Application Vulnerabilities
  • Web Based password Cracking Techniques
  • SQL Injection Vulnerabilities
  • Cryptography
  • Wireless Network Hacking and Countermeasures
  • Evading IDS, Firewalls and Detecting Honey Pots
  • Buffer Overflows
  • Reverse Engineering
  • Hacking Database Servers
  • Steganography
  • Spying Technologies
  • Hacking Routers and Firewalls
  • Computer Forensics and Incident Handling
  • Botnets
  • Hacking emails
  • Privacy on the Internet
  • Creating Security Policies
  • Exploit Writing
  • Patch Management
  • Covering Tracks
What is the course Duration?

The duration of the course is 40 hours at 2 classes per week.

What is the course Methodology?

The course is administered in theory as well as practice.

What is the course Prerequisites?

The pre requisites of the course are Basic knowledge of Database, Server side Programming (PHP or JSP or and basic knowledge of Networking.

What is the career path after doing this course?

The top organizations like such as Infosys, Wipro, TCS, Tech Mahindra, IBM etc. are seeking good ethical hackers. The profiles that are on offer include Security Executive, Web Security Manager/Administrator, Network Security Administrator, Network Security Systems Manager and much more.

What is the next step after Ethical Hacking?

The courses are NPT, WAPT, AAPT, IOS Application Penetration Testing etc which can be followed after this course.

Offline/Online Interactive Classroom with dedicated Faculty

Course Fees

Inclusive of all taxes

Weekday Batches For Siliguri Center:
Reg. Date
Start Date
End Date
Nov, 2023
Nov, 2023
Feb, 2024
Weekend Batches for Bhubaneswar Center:
Reg. Date
Start Date
End Date
Dec, 2023
Dec, 2023
Feb, 2024
Weekend Batches for Durgapu Center:
Reg. Date
Start Date
End Date
Dec, 2023
Dec, 2023
Mar, 2024
Weekend Batches for Kolkata Center:
Reg. Date
Start Date
End Date
Dec, 2023
Dec, 2023
Feb, 2024
Weekend Batches for Siliguri Center:
Reg. Date
Start Date
End Date
Dec, 2023
Dec, 2023
Feb, 2024
Pay Now

Member of:

Data Security Council of India