Indian Cyber Security Solutions

Green Fellow IT Security Solutions PVT. LTD.

1800-123-500014 , +91-9831318312,


ISO 27001 & 9001 Certified Company

Member of NASSCOM & DSCI

ATC of EC-Council

CEH Training in Kolkata -

C|EH v10 (Certified Ethical Hacker) Course

CEH Training in Kolkata is a global certification that is valid in more than 160 countries. We are an authorized training partner of the EC Council for the last 10 years. We have a pool of professional certified ethical hackers who are working as a security analyst in different organizations. CEH Training in Kolkata from the EC council provides the gateway to enter the cybersecurity domain. MNCs have made CEH certification compulsory for the security-related jobs. There is numerous CEH training institute in Kolkata providing training but ICSS is proud to be highest rated EC council training partner and CEH training institute in Kolkata which is highly popular because of our practical in-depth offensive hacking classes from penetration testers. Demand for CEH Course in Kolkata is at an all-time high.

This certification is highly important for security professionals. Someone may attack your system with malicious intentions, therefore your data fell prey to it. To save your organization from such intruders, skill yourself with CEH training in Kolkata.

CEH Training in Kolkata

4.8 ( 21,123 ratings )

1,09,233 Students Enrolled

C|EH - Certified Ethical Hacker

A Certified Ethical Hacker holds the reins of network and system security tightly in his hands. CEH v10 is the latest addition to this certification. The extensive practical training provided by CEH training in Kolkata equips live projects and simulations. CEH course in Kolkata by ICSS is among the best in India with around 1298+ students acquiring CEH certification from ICSS are placed in different companies across the globe.

Class Room Training on CEH in Kolkata

Ceh training in Kolkata with hands-on training in the lab from the professional hackers who are themselves CEHv10 certified, OSCP Certified. Cyber Security training is in huge demand as organizations are going online with more than 170 Billion Doller investment in the cyber security domain worldwide. At Indian Cyber Security Solutions, you will learn in-depth on an attacker can hack an organization and also how the defend the intellectual property of the organization from being hacked. CEH Training in Kolkata is designed is such a way that you get the maximum practical knowledge. At our training center, we bring in guest faculties from the industry so they can share their practical experience with you. At the end of the course, we aim to make your placement ready.

Online LIVE Training on CEH in India

Indian Cyber Security Solutions have 130+ trainers who are professional Ethical Hackers working in different MNCs like Infosys, Cognizant, Wipro, ATOS, Intel and are also members of our research & development team. All the trainers are geographically located in different areas provide online training on Ethical Hacking. All the ethical hacking training classes are held through an application where the faculty and the students are LIVE interacting with each other over the internet. All the classes are recorded and uploaded in our online portal “ HACKERS LAB “ where all students have lifetime access. We guarantee your satisfaction or we pay back your course fee. There will be 3 instructors dedicated to individual batch which will carry on for 3 months.

Eligibility Criteria to become a Certified Ethical Hacker

The prime objective of this course is to make you ready for the industry where you can use your skills to protect the organization. After completion of this course, you will be able to successfully document the Vulnerability Assessment report for the organization.

Technical Educational Background

If you had completed your graduation in science (Btech in CSE / IT / EC or BCA ) you will need to start with Certified Python Programmer to have a good base of programming and where you can develop hacking tools using it.

After completion of python programming certification, you will be eligible for this ethical hacking course and then complete it with Certified Web Application Penetration testing which focuses on actually exploiting vulnerabilities in web-based applications which is in huge demand all around the globe. 

Non-Technical Educational Background

If you had your graduation in arts, commerce or any other stream other than science you will need to start with Certified Network Professional

Which follows the CCNA global course module to be eligible for this course and complete it with Certified Network Penetration Tester course which is a high-end specialization course. After completion of all the courses, you can apply for network penetration tester jobs.

Why you should choose ICSS ?

Industry professions from Amazon, Cognizant & Intel will share their practical experience in the class

100% practical and lab-based classes (available online & offline)

25% Scholarship program for merited students with a minimum of 90% marks in their board exams

LIFETIME access to video tutorials, case studies

EMI option is available if you go for 2 or more courses.

Get educational loan @  O% interest

C|EH v10 - Course Module

  • Introduction to Ethical Hacking
  • Steps of Ethical Hacking & Information Gathering 
  • Types of Malicious Files
  • Penetration Testing
  • Google Hacking using Dorks
  • Penetration Testing Lab - Setup & Installation 
  • System Hacking
  • Scanning with Nessus & Hacking with Metasploit 
  • SE-Toolkit 
  • Sniffing 
  • Remote Administration Tool - RAT 
  • D-DOS  Attack 
  • Wireless Network Hacking  
  • Web Application Pen-Testing  
  • OWASP Top 10 Vulnerability list   
  • SQL - Injection   
  • Cross Site Scripting    
  • HTML Injection    
  • CSRF Attack Simulation     
  • Directory Listing Vulnerability   
  • Phishing Attack Simulation    
  • Web Server Hacking by using Web Shell    
  • Broken Authentication   
  • Parameter Tampering   
  • Session Hijacking   
  • Android Phone Hacking Simulation    
  • VA & PT Report Creation / Documentation     
Introduction to Ethical Hacking
  • What is Hacking
  • What is Ethical Hacking
  • Types of Hackers
  • White Hat Hacker
  • Black Hat Hackers
  • Gray Hat Hackers
  • Script Kiddies
  • Hacktivists
  • Spy Hackers
  • Cyber Terrorists
  • Vulnerability
  • Exploit
  • Remote Exploit
  • Local Exploit
  • Zero-day
  • Zero-day vulnerability
  • Zero-day Exploit
  • Brute force attack
  • Phishing
  • Remote access
  • Payload

Steps of Ethical Hacking & Information Gathering 
  • Active Information Gathering
  • Passive Information Gathering
  • Scanning
  • Gaining Access
  • Maintaining Access
  • Covering Tracks
Types of Malicious Files
  • Viruses
  • Worms
  • Trojan Horse
  • Spyware
  • Adware
  • Backdoor
  • Rootkits
  • Ransomware
Penetration Testing
  • What is Penetration Testing
  • Types of Penetration Testing
  • What is white box Penetration Testing
  • What is Black Box Penetration testing
  • Introduction to Linux OS
  • Social Engineering
Google Hacking using Dorks
  • Google Hacking Database
  • Social Engineering the art of Human Hacking
  • Gaining Target information using Google Dorks
Penetration Testing Lab - Setup & Installation 
  • What is Virtual Machine
  • What is VMware
  • What is Virtual Box
  • Install VMware
  • Install Kali Linux
  • Install Windows XP
  • Install Windows 7
  • Install Windows 10
  • Install Add on in Mozilla
  • Tamper Data
  • Burp Suite
  • No-Redirect
  • Install Nessus
System Hacking
  • System Hacking using Kon-Boot
  • Network Scanning
  • Port Scanning
  • Service Scanning
  • What is Nmap
  • Scanning With Nmap
  • Nmap Commands
Scanning with Nessus & Hacking with Metasploit 
  • What is Metasploit?
  • Xp Remote Exploit using Metasploit
  • Msfvenom
  • Windows 7 UAC Bypass
  • SE-Toolkit Usages
  • Create Phishing page with SE-Toolkit
  • Hacking Facebook & Gmail password

  • Types of Sniffing
  • Network Sniffing with Wireshark
  • Get FTP Login Details Using Wireshark
Remote Administration Tool - RAT 
  • What is RAT ?
  • Exploit With RAT
  • Protect System from RAT
D-DOS  Attack 
  • Details of DOS
  • What is D-DOS
  • D-DOS Attack
Wireless Network Hacking  
  • Wireless Encryption
  • Hacking WPA 2
  • Wireless Spoofing Attack
Web Application Pen-Testing  
  • How Web Application Works
  • Request and Response
  • Installing Scanner (Acunetix, Netsparker)
  • Scanning Website
OWASP Top 10 Vulnerability list   

OWASP Top 10 Vulnerability List

SQL - Injection   
  • What is SQL-Injection ?
  • Types of SQL-Injection
  • Live Demo on SQL-Injection

Cross Site Scripting    
  • Types of XSS
  • Live Demo on XSS All types
HTML Injection    
  • What is HTML Injection
  • Live Demo on HTML Injection
CSRF Attack Simulation     
  • What is CSRF?
  • Live Demo On CSRF
Directory Listing Vulnerability   

Live Demo on Directory Listing

Phishing Attack Simulation    
  • Create a Phishing Page

Web Server Hacking by using Web Shell    
  • What is Web Shell
  • LIVE Demo on Web Server Hacking
Broken Authentication   
  • What is Broken Authentication?
  • LIVE Demo on Broken Authentication
Parameter Tampering   
  • What is Parameter Tampering?
  • LIVE Demo on Parameter Tampering
Session Hijacking   

What is Session Hijacking?

Android Phone Hacking Simulation    
  • Android RAT Creation
  • Android Hacking using Metasploit
  • Android Hacking using Droidjack
  • Android Hacking using L3mon
VA & PT Report Creation / Documentation     
  • Report Creation
  • Penetration Testing on Vulnerable Assets
  • Documentation
  • Using Penetration Testing Tools

Class Room Training

Students Enrolled73%

Course Fee

$ 465.45 / -

INR 35,000 / - + 18% GST

Course Duration - 40 Hours

3 Months Training

2 Classes Per Week X 2 Hours Each Day

Batch Timing

Week End Classes | Week Days Classes

Online Self Paced LIVE Training

Students Enrolled92%

Course Fee

$ 465.45 / -

INR 35,000 / - + 18% GST

Course Duration - 40 Hours

3 Months Training

2 Classes Per Week X 2 Hours Each Day

Batch Timing

Week End Classes | Week Days Classes

Registration Desk

Ceh certificate

Current Job Openings

Check job profile, salary scale of current jobs available in market

Cyber Security Professional | Cyber Security Engineer | Pen-Tester

Information Security Analyst | Security Consultant

Achievements of our Students

Many of our students have founded Zero-Day Vulnerabilities and also their CVE has published on Exploit-DB. Check their CVE and also read their Blog on Exploit DB.

CVE has published of Aniket Dinda on Exploit DB

CVE have published of Nainsi Gupta on Exploit DB

Rabsun Sarkar one of our students has found zero-day vulnerabilities in Google and in the Security Talent Website and also reported for the same.

Check the links and images below:

Know Your Faculties

Samiran Santra (CTO & Co-Founder)

He had been associated with some government cyber security projects. He is a bug bounty hunter, reported vulnerability to companies like Google, Instagram, Sastasundar , Foresee game, Indian School of Ethical Hacking, KFC India and TITAN India

He had developed many hacking tools in PYTHON Bug find out on facebook, instagram, gmail etc.

Zero day exploit found on HRM thread payroll web application.

He is an Exploit writer and had been mentioned in the international hacking community for finding vulnerabilities.

Pritam Mukherjee (Vice President)

He is a bug bounty hunter, reported vulnerability to companies like NOKIA, University of Victoria, Harvard University, Asus and many more.

Active member of Research & Development team

15+ Hall of Fame achieved on reporting vulnerabilities

Media Coverage of our CTO & Vice-President

Media Coverage of our CTO & Vice-President

CEH Course in Kolkata

CEH Course in Kolkata by ICSS is the top-rated course. Ethical hackers are employed by organizations to penetrate networks and computer systems for finding and fixing security vulnerabilities. If you are considering working in the cyber security industry, then this training will benefit you greatly. CEH course in Kolkata is provided by cyber security professionals who are penetration testers at Indian Cyber Security Solutions. In the CEH course in Kolkata, you will master objectives including Intrusion Detection, Policy Creation, reconnaissance with Social Engineering and Google, DDoS Attacks etc.

This extensive CEH course in Kolkata focuses on 20 of the most popular security domains to provide a practical approach to essential security systems. You will learn to assess computer system security by using penetration testing techniques. In addition, you will gain hands-on experience with sniffing, phishing, and exploitation tactics. This ethical hacking course will prepare you for the EC-Council Certified Ethical Hacker exam. MNCs like TCS, ITC, CTS are recruiting CEH certified professionals which have caused a huge demand for CEH training in Kolkata.

It is the topmost solicited information security training program. CEH course in Kolkata secures you against the weaknesses and susceptibility of illegal hacking. Nowadays there is a necessity to save your computer networks and servers from a hacker. This CEH training in Kolkata, certification provides you the knowledge to make your system hacker-proof.

This professional certification validates your hands-on understanding and experience in ethical hacking or penetration testing. Your programming skills could come in handy and make it easy for you to grasp the hacking techniques. This certification allows you to be entrusted with the responsibility 0f attempting to penetrate networks and computer systems using the same method as a hacker. The CEH course in Kolkata will provide an environment for students where they will be learning to know how to scan, test, and secure their own systems.

CEH Certification Course in Kolkata

is what students & working professionals are looking for career opportunity in the cyber security field

CEH Certification Course in Kolkata offers 100% placement assistance to our students for a corporate career. Today's digital era, one of the biggest threats comes from cybercriminals. Hackers were not taken seriously until a few years back. In addition, some big names in the Indian industry had to pay a large amount of money to hackers. So that they keep the information confidential. According to surveys guided by cybersecurity firms in the country, Indian firms lost more than $4 billion in 2013 alone because of hackers. Our trainers are not just trainers, they are Industry Experts. You will get hands-on training during CEH Certification Course in Kolkata. CEH Certification Course in Kolkata is a highly-valued certification. You will be able to get the desired job in this field. Ethical hackers work as information security professionals and are considered notable in all information technology zones. Certified Ethical Hackers keep a check on security issues related to Information Security. Ethical Hackers are hired by all organizations those who have critical business data online.

What does an organization expect from a Cyber Security Professional?

Our training module is delicately balanced between practical lab based training and theoretical content. Organizations expect real time practical based solutions to the real world threat of cyber attack. Focusing on practical training conducted by Bug Bounty hunters and exploit writers. ICSS CEH Certification Course in Kolkata will surely give you the edge and help you to grab the job. Our ceh program also focuses on the most important aspect of “Documentation” / “VAPT Reporting”. Cyber security professionals will not only impart you with latest cyber security training but will also help you to prepare and report critical vulnerabilities to companies as a bug bounty hunter and also helps you in VAPT report writing. For an organization a cyber security professional who has technical and as well as reporting / documentation skill will always be the first choice. This reduces the investment of organizations on the newly recruited cyber security professional.

There is a huge demand for ethical hackers and the CEH Certification Course in Kolkata. So you take can help to brighten your job prospects in some of the biggest global companies in the world. The CEH Training in Kolkata is a new credential in the IT certification industry, but its importance and influence have grown quickly. Indian Cyber Security Solutions is proud to be the highest rated CEH certification training institute in Kolkata with around 1890+ students taking admission every year across the globe. CEH Certification Course in Kolkata is highly demanded as all companies whether big or small require cybersecurity professionals to prevent data breaches. Individual students who opt for CEH Certification Course in Kolkata could expect a minimum of 3.0 Lakh package salary as fresher’s around the globe.

Best CEH Training Institute in West Bengal

Best CEH Training Institute in West Bengal will build your knowledge of the tools and techniques used by hackers. As a result, you will learn how malicious hackers use various tools. This certification is highly demanded by top companies as a pre-requisite for information security-related job posts. So you should explore to advance your career to the top position in the security. Get ahead on your career with in-depth and intensive training for CEH certification in Kolkata.

How you will be benefited from Ceh Course of ICSS?

Indian Cyber Security Solutions offers the best CEH training as they are the Best CEH Training Institute in West Bengal. We focus on in-depth knowledge of the learners through our experts. Therefore, you will able to improve your knowledge of risks and vulnerabilities. At first, you have to think like a hacker to learn ethical hacking. Best CEH Training Institute in West Bengal delivers a 90% practical course by penetration testers who are themselves CEH certified and OSCP certified. Indian Cyber Security Solutions is located in salt lake sector 5 Kolkata. It is surrounded by MNC’s. Branches of renowned IT companies like Accenture, IBM, Tech Mahindra, Technologies, and Lexmark are located in salt lake sector V Kolkata, near our corporate office of sector V. The location is the best choice for professionals including business travelers.

Along with CEH Training in Kolkata, we provide placement assistance to the students as we are the Best CEH Training Institute in West Bengal. 20 + certified ethical hackers will be your trainer for 2 months. Apart from a certification exam conducted by EC- council at the end of the course we make sure you be well prepared at the Best CEH Training Institute in West Bengal. Cybersecurity professionals will guide you with the best practical knowledge to be a successful CEH v10 certified ethical hacker.

CEH Ethical Hacking Certification in Kolkata

conducted by Indian Cyber Security Solutions

CEH Ethical Hacking Certification in Kolkata, ICSS is a great opportunity for interested people to grow their careers in the Cyber Security industry. They can join immediately at Indian Cyber Security Solutions for CEH training in Kolkata. As the internet continues to advance, cybercrimes increasing as well. Criminals can commit crimes easily with a few clicks. Current technology has given us assess to huge amounts of information on the web and mobile devices. It has simplified tasks like shopping, paying bills, and banking services. It has also given rise to the need for ethical hackers to battle cyber criminals.

How you can get priority in Job Placement after doing the course from ICSS?

There is no better time than now to begin a career in the cybersecurity industry. In fact, candidates who will accomplish a CEH Ethical Hacking Certification in Kolkatacan get career opportunities with high pay scales. Indian Cyber Security Solutions had trained more than 1298+ students and is proud to be the best CEH Ethical Hacking Certification in Kolkata. With around 20+ penetration testers and ethical hackers working with Indian Cyber Security Solutions, it is quite easy to provide world-class practical training which is required for CEH certification.

CEH Ethical Hacking Certification in Kolkata. You will be able to improve your knowledge of risks and vulnerabilities and learn how to think like a hacker. After that course, it will boost your salary and advance your security career. You will learn to use the real hacking tool. Cybercriminals are innovators and will constantly discover new ways to attack IT infrastructure and exploit vulnerabilities. Without knowledge of the risks and vulnerabilities associated with your computer systems, you will have a difficult time keeping them secure. ICSS confirms by their course of CEH Ethical Hacking Certification in Kolkata the capacities of an ethical hacker to prepare for vulnerabilities of system foundation and prevent illegal hacking.

Do you want to be a Campus Representative?

If you want to be a CR there is a long list of benefits that you will be entitled to.

Campus Representative of ICSS

Collages where we have conducted cyber security & ethical hacking training session

Some Glimpses of our Workshop



Click one of our representatives below to chat on WhatsApp or send us an email to [email protected]

× Hi How can we help you