<div style="margin:20px 0 0 200px"> To view the site, enable JavaScript by changing your browser options, then <a href="">Try Again</a>.</div>

Ethical Hacking and Countermeasures course mission is to educate, introduce and demonstrate hacking tools for penetration testing purposes only. Prior to attending this course, you will be asked to sign an agreement stating that you will not use the newly acquired skills for illegal or malicious attacks. If you use this skills you can not held us responsible.

Duration

Duration

40 hours - 2 classes per week

Eligibility

Eligibility

  1. Basic Knowledge of Database, Serverside Programming (PHP or JSP or ASP.net) and Basic knowledge of Networking.
  2. If you do not have the above knowledge, please complete our "INDUSTRY READY" Course (only Module - II & III) to be eligible - www.isoeh.com/industry-ready.html
Course Fees

Course Fees

Rs.14,750/-
Inclusive of all taxes

Internal Assessment (Practical) : Catch the flag(CTF)

Course Details

  • Introduction to Ethical Hacking (Day 1)
  • Legality and Ethics (Day 1)
  • Networking & Basics (Day 1)
  • Foot Printing (Day 2)
  • Google Hacking (Day 2)
  • Scanning (Day 3)
  • Enumeration (Day 3)
  • System Hacking (Day 4)
  • Windows Hacking (Day 4)
  • Trojans & Backdoors (Day 5)
  • Virus & Worms (Day 5)
  • Sniffers (Day 6)
  • Social Engineering (Day 6)
  • Proxy Server & Packet Filtering (Day 7)
  • Denial of Service Attack (Day 7)
  • Phishing (Day 8)
  • Session Hijacking (Day 8)
  • Penetration Testing (Day 9)
  • Vulnerability Assessment (Day 9)
  • Linux Hacking (Day 10)
  • Physical Security (Day 10)
  • Hacking Webservers (Day 11)
  • Web Application Vulnerabilities (Day 11)
  • Web Based password Cracking Techniques (Day 12)
  • SQL Injection Vulnerabilities (Day 12)
  • Cryptography (Day 13)
  • Wireless Network Hacking and Countermeasures (Day 13)
  • Evading IDS, Firewalls and Detecting Honey Pots (Day 14)
  • Buffer Overflows (Day 14)
  • Reverse Engineering (Day 14)
  • Hacking Database Servers (Day 15)
  • Steganography (Day 15)
  • Spying Technologies (Day 16)
  • Hacking Routers and Firewalls (Day 16)
  • Computer Forensics and Incident Handling (Day 17)
  • Botnets (Day 17)
  • Hacking emails (Day 18)
  • Privacy on the Internet (Day 18)
  • Creating Security Policies (Day 19)
  • Exploit Writing (Day 19)
  • Patch Management (Day 20)
  • Covering Tracks (Day 20)

Enroll Now

Fields marked with * are mandatory.