<div style="margin:20px 0 0 200px"> To view the site, enable JavaScript by changing your browser options, then <a href="">Try Again</a>.</div>

Ethical Hacking is also called Penetration Testing. It is the best practice to penetrate the system or network to discover threats and vulnerabilities that a hacker may find and exploit leading to loss of data, money etc. The activity of an Ethical Hacker is the same as that of criminal hackers but with the authorities' permission. In simple language, "Ethical hacking involves an authorised attempt to gain unauthorised access to a computer system, application, or data."

What is the purpose of Ethical hacking?

  1. Secure digital assets: Ethical hacking protects data from cyber threats
  2. Identify vulnerabilities: It helps find and fix system weaknesses
  3. Compliance: Ensures adherence to industry standards and regulations
  4. Enhance security posture: Strengthens overall cybersecurity defences
  5. Career opportunities: Offers lucrative job prospects and growth potential

Course Rating

View All Reviews »

Students Enrolled and Counting…

Full List of Alumni »

Why learn Ethical Hacking?

Knowing the
Hacking Psychology

Course Syllabus »

Regulatory compliance in terms of
Corporate Data Breaches


Job advancement and

Jobs »


40 hours - 2 classes per week



  1. Basic Knowledge of Database, Server-side Programming (PHP or JSP or ASP.net) and Basic knowledge of Networking.
  2. If you do not have the above knowledge, please complete our "INDUSTRY READY" Course to be eligible.
Course Fees

Course Fees

Class Room Training

Inclusive of all taxes

Online Training

Inclusive of all taxes

What You Will Get?

40 Hours
of in depth training by the best cyber security experts

Study Materials

Ethical Hacking
Certificate of Completion after examination and alumni status

Course Benefits:

  • Comprehensive knowledge of cybersecurity threats
  • Hands-on experience from Industry experts with cutting-edge tools
  • Use the High-end Lab of the audit firm
  • Certification enhancing job prospects and credibility
  • Contribution to global cybersecurity defence
  • Lucrative career opportunities with high-paying jobs

Roadmap to be an Ethical Hacker

Ethical Hacking Course Path

Course Details

  1. The duration of the course is 40 hours at 2 hours per week
  2. The course fee is Rs.14,500/- for classroom and Rs.24,500/- Rs.14,500/- for online
  3. The curriculum is taught combining theory and practice
Module 1: Introduction 2 Hours - 4 Topics
  • What is Ethical Hacking (Day 1)
  • What are the different types of hackers (Day 1)
  • Five phases of hacking (Day 1)
  • Scope of Ethical Hacking (Day 1)
  • Passive Information Gathering (Day 2)
  • Active Information Gathering (Day 2)
  • Foot-Printing (Day 2)
  • OSINT (Day 2)
  • Port Scanning (Day 3)
  • Network Sweeping (Day 3)
  • Vulnerability Scanning (Day 3)
  • Service Version Detection (Day 3)
  • OS Fingerprinting (Day 3)
  • Introduction to Metasploit Framework (Day 4)
  • Introduction to Exploits & Payloads (Day 4)
  • Type of Connections (Day 4)
  • Exploit MS17-010 Vulnerability (Day 4)
  • Introduction to Privilege Escalation (Day 5)
  • Types of Privilege Escalation (Day 5)
  • Bypassuac and getsystem (Day 5)
  • Android Hacking (Day 6)
  • Software based vulnerabilities (Day 6)
  • Introduction to Active Directory Components (Day 7)
  • LDAP in Active Directory (Day 7)
  • Active Directory Functionality (Day 7)
  • Service Principal Name (SPN) (Day 7)
  • Kerberos Basics and Overview (Day 8)
  • Components of Kerberos (KDC, Ticket Granting Ticket, etc.) (Day 8)
  • Kerberos Authentication Process (Day 8)
  • Kerberos Tickets and Encryption (Day 8)
  • Introduction to Kerberos Attacks (Day 8)
  • Introduction to Malware (Day 9)
  • Types of Malwares (Viruses, Worms, Trojans, etc.) (Day 9)
  • Malware Analysis Techniques (Day 9)
  • Common Malware Distribution Methods (Day 9)
  • Malware Detection and Prevention (Day 9)
  • Introduction to Network Sniffing (Day 10)
  • Passive vs. Active Sniffing (Day 10)
  • Common Network Sniffing Tools (Day 10)
  • Man-in-the-Middle (MITM) Attacks and Techniques (Day 10)
  • Introduction to Cryptography (Day 11)
  • Symmetric vs. Asymmetric Encryption (Day 11)
  • Common Cryptographic Algorithms (e.g., AES, RSA) (Day 11)
  • Steganography Techniques and Applications (Day 11)
  • Introduction to Wireless Networks (Day 12)
  • Types of Wireless Security Protocols (e.g., WEP, WPA, WPA2) (Day 12)
  • Wireless Network Scanning and Enumeration (Day 12)
  • Exploiting Wireless Vulnerabilities (Day 12)
  • Introduction to Website Attacks (Day 13)
  • How Website Attacks Work (Day 13)
  • Types of Vulnerabilities Exploited (Day 13)
  • Enumeration Techniques (Day 13)
  • Introduction to Cross-Site Scripting (XSS) (Day 14)
  • Understanding How XSS Works (Day 14)
  • Types of XSS Attacks (Reflected XSS, Stored XSS, DOM-based XSS) (Day 14)
  • Techniques for Detecting and Exploiting XSS Vulnerabilities (Day 14)
  • Introduction to SQL Injection (SQLi) (Day 15)
  • Mechanism of SQL Injection (Day 15)
  • Common Types of SQL Injection Attacks (Union-Based, Blind SQLi, Error-Based) (Day 15)
  • Techniques for Exploiting SQL Injection Vulnerabilities (Day 15)
  • Introduction to Cross-Site Request Forgery (CSRF) (Day 16)
  • How CSRF Attacks Work (Day 16)
  • Examples of CSRF Exploitation (Day 16)
  • Prevention and Mitigation Strategies (Day 16)
  • Understanding Cookie Stealing and Session Hijacking (Day 17)
  • Techniques for Cookie Stealing and Session Hijacking (Day 17)
  • Data Tampering Attacks on Websites (Day 17)
  • Phishing Attacks: Methods and Impacts (Day 17)
  • File Upload Vulnerabilities: Risks and Exploitation (Day 17)
  • Introduction to IoT Security (Day 18)
  • IoT Device Identification and Enumeration (Day 18)
  • Exploiting IoT Communication Protocols (Day 18)
  • Webcam Attacks on IoT Devices (Day 18)
  • Introduction to DDoS Attacks (Day 19)
  • Types of DDoS Attacks (Day 19)
  • DDoS Attack Techniques (Day 19)
  • Cloud Security Fundamentals (Day 19)
  • Introduction to IDS/IPS (Day 20)
  • Types of IDS (Network-based, Host-based) (Day 20)
  • Types of IPS (Network-based, Host-based) (Day 20)
  • Honeypots (Day 20)

Hacking Tutorials

Read All Tutorials »
Building a career in Digital Forensics - How promising is the future? A thorough career guide
Building a career in Digital Forensics - How promising is the future? A thorough career guide
Read Details »

Hacking Videos

Explore All Videos »
How to Hiding Your Secret File using Steganography?
View On Youtube »

Related Course

Enroll Now »

Enroll Now

Fields marked with * are mandatory.

Know Your Faculty
Mr. Sandeep Sengupta
Mr. Sandeep Sengupta
CISA, Certified Ethical Hacker, ISO 27001:2013 Lead Auditor, Lead Privacy auditor, GDPR Implementer

21 years of experience working in India, New Zealand & Singapore; in Information Security domain as Ethical Hacker, ISO 27001 Lead Auditor / Tutor, BS 10012 Privacy Lead Auditor, Mr. Sandeep Sengupta has conducted security audit in companies like ONGC, KPMG, PWC, Airtel, Vodafone, Accenture, Capgemini, Vedanta, PayU, Bandhan Bank, ABP, etc.

He has been invited as a speaker at FICCI, VIT (Vellore), Nasscom, CII, BCCI, ICAI, ISACA, FICCI, CeBIT, US High Commission (Kolkata), etc. He has taken part in several Television shows on ABP, ETV, NDTV, AajTak, Times Now, etc. In 2005, Sandeep founded the online community "Hackers Library"; which had 80,000+ members, making it the largest Indian online forum for cyber-security professionals at its time. Mr. Sengupta is the committee member at Nasscom (East) & CII ICT-East.

Mr. Kirit Sankar Gupta
Mr. Kirit Sankar Gupta
B. Tech (IT), OSCP, CEH 10.0, CHFI 9.0, ISO Certified Lead Security Incident Manager (ISO/IEC 27035), ISO Certified Lead Forensic Examiner (CLFE), CCNA, CCNP

A Penetration Tester with 6 years of experience, Kirit has the expertise in Mobile Application Pentesting Network, IoT Penetration Testing, Source-code review, Fuzzing, Red teaming, Social Engineering, Digital Forensics and Incident Response, Dev(Sec)Ops, Malware Analysis as well as SOC analysis. He has been acknowledged for reporting critical vulnerabilities to Uber, Apple, Flipkart, and MIT. Mr. Kirit Sankar Gupta is the member of Data Security Council of India (Kolkata).

Mr. Saumitra Biswas
Mr. Saumitra Biswas
M Tech - Computer Science, MSc (Statistics), GATE qualified

Mr. Saumitra Biswas is M.Tech in computer science from Netaji Subhash Engineering College, GATE qualified in computer science and a MSC in statistics from Kalyani University. He has 20 years of experience. His technical interests include Machine Learning, Neural Networks, Genetic Algorithms and Object Oriented Programming. He is skilled in C, C++, C#, Dotnet, Java, Python, Matlab, Unix, MS Windows XP, Windows 7, My SQL, Oracle, MS Access, HTML, XML, CSS and PHP. He take classes on AI & ML in ISOAH, as well as act as mentors to interns & project trainees.

Ms. Amrita Acharya
Ms. Amrita Acharya
M Tech in CSE, ISO 27001 Lead Auditor (IRCA/BSI)

After completion of her Master degree, she has worked with ISOAH as an intern for few years before joining full time as security analyst. She has been involved in internal audit, policy design, ISMS consultancy for more than 2 years. She is well versed in Kali Linux, Nmap, Metasploit, ITGC, ISO 27001 & COBIT framework. ISOAH clients she has provided active consultancy are CESC, Diadem, Lexplosion, Diamond Beverages, etc. As part of her hobby, she has been a professional model in her free time.


Ratings & Reviews

Ethical Hacking

Course Rating
Based On
5800 Students Rating

Saikat Mainan
Date: 26.04.2024
Course: Python Programming & Ethical Hacking

I have started my journey as a student of ISOAH since 2021! In my opinion, if someone wants to start his or her career in cybersecurity then ISOAH is one of the best places. This institute not only provides courses to students rather they also helps to make a proper career for every student in the field of Cyber Security with proper direction and guidance. The mentors and faculties are very helpful and they are always there for help! I feel proud to be a student of ISOAH.

Golam Kibriya
Date: 12.02.2024
Course: Ethical Hacking

It is quite true to say that I was a student of English (Hons) before when I came to know about this course which made me feel so interested and alluring. Throughout the journey of CEH (Ethical Hacking) at the Indian School of Ethical Hacking, I would like to say that my respected mentors and fellow mates at this institute helped me a lot in chasing my goal and provided me a widespread information about technology which was the sole reason of cracked such a very tough and hard global CEH exam. Thank you very much to ISOEH for all of my endeavours.

Debajyoti Maity
Date: 13.12.2023
Course: CCNA & Ethical Hacking

ISOEH has ignited my passion for cybersecurity with its fascinating courses. The dynamic curriculum, led by industry experts, offers a perfect blend of theory and hands-on experience. The engaging classes and real-world simulations have made learning cybersecurity not just educational but enjoyable. ISOEH's commitment to ethical hacking adds a valuable dimension to the training, ensuring graduates are not only skilled but also responsible professionals. In just a short time, ISOEH has opened my eyes to the captivating world of cybersecurity.

Faraja Obadia
Date: 18.10.2023
Course: CCNA & Ethical Hacking

I joined ISOEH for CCNA and an Ethical hacking course while continuing with my B.Sc in Computer Science at KIIT UNIVERSITY. The training at ISOEH was hands-on practical learning based. And the mentoring I received from their faculty members was a light to accomplish my goals. The Indian School of Ethical hacking is the golden treasure of knowledge, a weapon to face your tomorrow.

Date: 17.01.2020
Course: Ethical Hacking (Non Global)

Isoeh is the good institute I have learn knowledge about ethical hacking. This institute very good to learn and practise about hacking. Sir Sombed has given very good knowledge about ethical hacking.

Date: 17.01.2020
Course: Ethical Hacking (Non Global)

It's a good institute I had gained lots of knowledge I had an experience in ethical hacking and it's institute faculty is good they are frankly with students I am a lucky that I have training in this institute.

Date: 07.01.2020
Course: Ethical Hacking (Non Global)

Somdeb sir was good and gave me very good knowledge about ethical hacking.....if I am going to do advance in ethical hacking I will be looking for him...

Date: 25.12.2019
Course: Ethical Hacking (Non Global)

Excellent Place to learn CCNA and Ethical Hacking. Best institute to learn on networking and Hacking. Lucky to be a part of this Institution.. Teachers and Faculties are very helpful and always ready to help. They got huge knowledge on every subject and every topic. I was under Subhendu Sir from very 1st day, he is too good and has good expertise and knowledge in his domain of Networking and also completed the course under him. For EH I was under Sanchayan Sir and Anubhav Sir they were also too good in teaching Hacking and its tools and how it works and cleared all my doubt. On other hand Kundan Sir also helped me with all my problems which I was facing and also help me to get rid from all my problems so I will be thankful to ISOEH for life. It was a good journey for me in learning and gathering knowledge and looking forward to do more courses from here and will also suggest my friend about this Institution. Thank You.


Job Prospects & Job Sources

Internet security and networking are the two sunshine industries where ethical hackers are employed. They can join government and private organizations as cyber-security experts. IT firms are the real recruiters of ethical hackers additionally needed by financial service providers, airlines, retail chains and hotels also. Government agencies such as various wings of the military and law enforcement, defence organisations, forensic laboratories, detective companies and investigative services also have interesting careers for ethical hackers. Some skilled hackers work for investigative agencies like the Central Bureau of Investigation, the National Security Agency and the Federal Bureau of Information. Some large organizations employ security testers and others use contractors to audit their systems.

A fresher may work as an intern for some time before finally starting job with 2.5 lakh per annum. With one year of experience, one can expect up to 4.5 lakh per annum. Those with work experience five years or more can rake in anything between 10-12 lakh per annum.


What is the course content?
  • Introduction to Ethical Hacking
  • Legality and Ethics
  • Networking & Basics
  • Foot Printing
  • Google Hacking
  • Scanning
  • Enumeration
  • System Hacking
  • Windows Hacking
  • Trojans & Backdoors
  • Virus & Worms
  • Sniffers
  • Social Engineering
  • Proxy Server & Packet Filtering
  • Denial of Service Attack
  • Phishing
  • Session Hijacking
  • Penetration Testing
  • Vulnerability Assessment
  • Linux Hacking
  • Physical Security
  • Hacking Web servers
  • Web Application Vulnerabilities
  • Web Based password Cracking Techniques
  • SQL Injection Vulnerabilities
  • Cryptography
  • Wireless Network Hacking and Countermeasures
  • Evading IDS, Firewalls and Detecting Honey Pots
  • Buffer Overflows
  • Reverse Engineering
  • Hacking Database Servers
  • Steganography
  • Spying Technologies
  • Hacking Routers and Firewalls
  • Computer Forensics and Incident Handling
  • Botnets
  • Hacking emails
  • Privacy on the Internet
  • Creating Security Policies
  • Exploit Writing
  • Patch Management
  • Covering Tracks
What is the course Duration?

The duration of the course is 40 hours at 2 classes per week.

What is the course Methodology?

The course is administered in theory as well as practice.

What is the course Prerequisites?

The pre requisites of the course are Basic knowledge of Database, Server side Programming (PHP or JSP or ASP.net) and basic knowledge of Networking.

What is the career path after doing this course?

The top organizations like such as Infosys, Wipro, TCS, Tech Mahindra, IBM etc. are seeking good ethical hackers. The profiles that are on offer include Security Executive, Web Security Manager/Administrator, Network Security Administrator, Network Security Systems Manager and much more.

What is the next step after Ethical Hacking?

The courses are NPT, WAPT, AAPT, IOS Application Penetration Testing etc which can be followed after this course.

Offline/Online Interactive Classroom with dedicated Faculty

Course Fees

Inclusive of all taxes

Weekday Batches for Bhubaneswar Center:
Reg. Date
Start Date
End Date
Jul, 2024
Jul, 2024
Sep, 2024
Weekend Batches for Bhubaneswar Center:
Reg. Date
Start Date
End Date
Aug, 2024
Aug, 2024
Oct, 2024
Weekday Batches for Kolkata Center:
Reg. Date
Start Date
End Date
Jul, 2024
Jul, 2024
Sep, 2024
Weekend Batches for Kolkata Center:
Reg. Date
Start Date
End Date
Jul, 2024
Jul, 2024
Sep, 2024
Aug, 2024
Aug, 2024
Oct, 2024
Pay Now

Member of:

Data Security Council of India