Certified Information Security & Ethical Hacking Course

Course Overview

Certified Information Security and Ethical Hacking(CISEH) certification is one of the most demanded certification by corporates worldwide. Designed by ethical hackers and security experts, the program covers all aspects of Ethical Hacking and Information Security which makes you an expert in the field of Information Security thereby bridging the gap between you and the market demands.

With increasing use of the internet and concerns about its security, especially when it comes to things like consumer information or private details, there is considerable need for computer experts to work in ethical hacking field. Organizations today recognize the strong need for information security; hence an ethical hacker or security expert is usually employed by companies to penetrate into networks and/or computer systems, using the same methods as a hacker, for the purpose of finding and fixing network and computer security vulnerabilities.

Whether you are an amateur or professional, our Ethical Hacking and Information Security training will help you reach your ultimate goal to become most demanded IT Professional. Delivered by dynamic instructors, our Ethical Hacking training encompasses an interactive environment, various security tools and hands-on experience which ensures that each of the candidates is well prepared to deal with the ever-increasing range of threats to the corporate networks.

Course Content

  • Introduction
  • Computer Security Basics
  • Most Common Attacks
  • ASCII Code
  • Networking Basics and Security
  • IANA, Allotment of IP Address
  • Ping and Ping Sweep
  • Foot-Printing Techniques
  • Detecting Victim’s OS
  • Detecting Firewall
  • Domain Name and DNS
  • ICANN
  • Top Level Domains
  • DNS Delegation
  • Email Security
  • Hacking Mailing Clients
  • Instant Messengers Hacking (gtalk, yahoo)
  • Port Scanning
  • Detecting Open Ports
  • Intellectual Property Theft
  • Trojan attack and countermeasure
  • Hacking by Key loggers
  • Steganography and Steganalysis
  • Identity Attacks
  • Proxy Server Attacks
  • Password Cracking
  • Sniffer and Wireless Hacking
  • Call Spoofing
  • Google Hacking
  • Buffer Overflow
  • DOS and DDOS Attacks
  • HoneyPots
  • 0-day Attacks
  • XSS Attacks
  • Windows and System Hacking
  • SQL Injection
  • Social Engineering Attacks
  • Defacing Website and Security Standards
  • Web Jacking
  • Finding Loopholes
  • Phishing Techniques
  • Cyber Law and Consulting
  • Cyber Forensics and Investigations
  • IT Act, 2000
  • CERT-IND and AO
  • Case Studies
  • Earning Money Online
  • Adsense and Adwords

Inquire Now