<div style="margin:20px 0 0 200px"> To view the site, enable JavaScript by changing your browser options, then <a href="">Try Again</a>.</div>
100% practical with live demo

Enroll & Book Your Seat Now

Fields marked with * are mandatory.

Select the workshop topic you want to apply to*
Course Details:
  • Introduction to Ethical Hacking
  • What are the threats and how to stay safe?
  • Social, mobile, cloud - threats and mitigation
  • Lab Setup
  • System Hacking and protection
  • Password Security and hacking
  • Hacking Windows password
  • Website hacking (OWASP top 10)
  • Using Google as hacking tool
  • Gmail, Facebook Hacking & protection
  • How to do Web Application Penetration Testing
  • How Hackers Hide their identity while performing the attack
  • Network Penetration Testing
  • Kali Linux & Metasploit (live demo)
  • Vulnerability Assessment & penetration testing - Tools
  • Encryption and steganography (tools &techniques)
  • Hiding messages behind images
  • Scanning and structuring of network
  • Port scanning and countermeasure
  • Tools used by professionals for Ethical Hacking / VAPT
  • Report Writing
  • Future Scope
Rs.500/- Inclusive of all taxes per participant
Course Details:
  • History of Bug bounties
  • Difference between Penetration Test and Bug Bounties
  • How a Pentester turns into a bug bounty hunter?
  • Platforms, ways to participate
  • Bug Hunter Methodology Android
  • Bug Hunter Methodology Web
    • The tricks and tips
    • Practicals of approaching a target
    • Creating the best possible of the scope
    • Where to look and what to look for
    • XSS, CSRF, SQLi, IDOR…
    • How much important is the report?
    • Best tools to use
  • Bug Hunter Methodology IOS
  • Let's do it right now…
  • Legal issues and being safe
  • Best of the submissions - Hackerone
  • How to Learn and improvise
Rs.500/- Inclusive of all taxes per participant
Course Details:
  • Introduction
  • Investigation Process
  • Searching and Seizing Computers
  • Digital Evidence
  • First Responder Procedure
  • Computer Forensics Lab
  • Understanding Hard Disk and File System
  • Windows Forensics
  • Data Acquisition and Duplication
  • Deleted File and Partition Recovery
  • Steganography and image file forensic
  • Application Password Cracker
  • Log capturing and Event correlation
  • Network Forensic and Investigating Network Log
  • Investigating Wireless attack
  • Investigating Web Attack
  • Tracking Emails and investigating Email crime
  • Mobile Forensics
  • Investigative Report
  • Becoming an Expert Witness
Rs.500/- Inclusive of all taxes per participant
Personal Details
You are not a Robot*

Your seat shall be reserved once we receive the booking fees. Please pay online.