Ethical Hackers are also known as White Hat hackers (the guys on the legal side of hacking). Everything is digitalized nowadays- your bank account, heaps of personal data and nearly half your life. All of this makes malicious people (hackers) to try gaining access to this data by exploiting any weakness they can find in the security systems. This has made Cyber Security a very substantial part of any corporation. White hat hackers are employed by big companies to assess any security issue or weakness using penetration testing techniques and to solve them.


From this course, you will get an idea of the thought process of a hacker and use it to check the system for any vulnerability and implement highly secure systems.


You will learn about Intrusion Detection, Policy creation, Social Engineering, DDoS attacks, Buffer Overflows and virus creation. There will be great focus on you to practically implement the theory in the lab and experience the various security risks a system can face.


This course is ideal for anyone who is wishing to have a career in IT security or even technology enthusiasts who want to safeguard their systems.


This course will also prepare you for EC-Council Certified Ethical Hacker v8 exam 312-50.



No batch is available

What you'll learn?

Introduction to Ethical Hacking (safeguarding systems and networks)

This module covers the fundamentals hack terminologies.
  • Information security overview
  • Information security threats and attack vectors
  • Hacking concepts
  • Hacking phases
  • Types of attacks
  • Information security controls

Foot printing and Reconnaissance

This section will teach you to collect information about the target system.
  • Footprinting concepts
  • Footprinting threats
  • Footprinting methodology
  • Footprinting tools
  • Footprinting countermeasures

Enumeration & Scanning Networks

From this section, you will learn how to gather more technical insights of the target system such as user names, machine names, network resources and services.
  • Overview of network scanning
  • Scanning techniques
  • Vulnerability scanning
  • Anonymizers
  • Scanning countermeaures
  • What is Enumeration?
  • Techniques for Enumeration
  • Services and ports to enumerate
  • Enumeration countermeasures

System Hacking (Linux and Windows platform)

You will be able to hack into others machine like Linux and windows OS, after this section.
  • System hacking Goals
  • Hacking Methodology
  • Password cracking
  • Privilege escalation
  • Stealing passwords using key loggers
  • Anti key loggers and Anti-spywares
  • Steganography
  • Covering tracks

Malicious Codes

Learn to create and deploy malicious code over the network.
  • What is a Trojan
  • Indication of Trojan attacks
  • Common ports used for Trojans
  • How to deploy a Trojan
  • Trojan countermeasures
  • Introduction to viruses
  • Working of viruses
  • Virus maker
  • Computer worms
  • Worm maker
  • Viruses and worms countermeasures


You will be able to capture and read data transmitting over wired and wireless channels after this section.
  • Packet Sniffing
  • Sniffing threats
  • Mac flooding
  • Rogue DHCP server attack
  • ARP spoofing techniques
  • ARP poisoning tools
  • Defense against ARP spoofing
  • Sniffing tools
  • DNS spoofind and defense

Social Engineering

Learn modern day techniques used to trap potential victims.
  • What is social engineering?
  • Factors that make companies vulnerable to attacks
  • Phases in social engineering attacks
  • Human based social engineering
  • Computer based social engineering
  • Identity theft
  • Phishing and Pharming attacks
  • Social engineering countermeasures

Denial of Service

You will learn how to disrupt the availability of services over the network.
  • What is denial of service attack?
  • What are distributed denial of service attacks
  • Botnet
  • DoS/DDoS attack tools
  • DoS/DDoS countermeaures

Session Hijacking

Impersonating the target and taking control of his dialogue will be dealt with in this section.
  • What is session hijacking?
  • Key session hijacking techniques
  • Man-in-the-Middle Attack
  • Cross-site Script Attacks
  • Protecting against session hijacking

SQL Injection

Exploiting the flaws in database systems will be taught in this section.
  • SQL Injection attacks
  • Types of SQL injection
  • Bypass website logins using sql injection
  • Password grabbing
  • Network reconnaissance using SQL injection
  • SQL injection tools
  • How to defend against SQL injection

Hacking Wireless Networks

Exploiting the flaws in wireless networks will be covered in this section.
  • Types of wireless networks
  • Wireless terminologies
  • How to break WEP encryption
  • Footprint wireless networks
  • How to defend against wireless attacks

Hacking Mobile Platforms

You will learn the hacking and taking control of android devices.
  • Mobile attack vectors
  • Mobile platform vulnerabilities and risk
  • Android vulnerabilities
  • Hacking android phones
  • Mobile device protection tools

Evading IDS, Firewalls and Honeypots

This section will teach implementing security solutions to help overcome the vulnerabilities in a system.
  • Types of intrusion detection system
  • Firewall architecture
  • Linux IP tables
  • How to setup a honeypot
  • How snort works
  • Countermeasures

Digital Forensic

Learn how to collect evidences from the post attack scenarios.
  • Disk imaging
  • Disk forensic
  • Ram forensic
  • Network forensic