C|EHF Certified Ethical Hacking Foundation

Certified Ethical Hacking Foundation

Course C | EHF

INDIA’S LARGEST FOUNDATION COURSE

An Intensive 16 Hours of learning & development program to enable students with emerging

technology skills & engage them with Industry


We Provide OFFLINE Classes – KOLKATA | BANGALORE

We Provide ONLINE LIVE CLASSES – Access from anywhere


How Can This Be Beneficial For Me?

Hands-On Experience

16 Hours LIVE Training

Build a Project with us

BENEFITS OF THIS COURSE

Dedicated Mentor Support from Industry Experts

Get a Certificate

Project Completion Letter

*Last Date of Registration: SEPTEMBER 5, 2020*

*Choose a schedule according to your flexible time

COURSE FEES:

INR 4,000/-

BUG BOUNTY SUCCESS STORY

Hall of Fame

PRITAM MUKHERJEE

(Vice President and IT Security Analyst)

50+

BUG FOUND

25+

HALL OF FAME

SAMIRAN SANTRA

(CTO & CO-FOUNDER )

55+

BUG FOUND

35+

HALL OF FAME

PROCESS OF BUG BOUNTY

BUG BOUNTY PROGRAM

Is deal offered by many websites and software companies by which individuals can receive recognition and compensation in form of money and swags for reporting Bugs.

Basically,find bug in website ,software,and Report to companies and in reward they will give you money,swag and Hall of fame .

Fame+ Money

HOW TO START

After the bug bounty course,you can start doing bug bounty hunting.

Just you need to create account on Famous Bug Bounty Platform

1.Hacker one

2.Bug Crowd

WHY BUG BOUNTY?

  • Chances of finding bugs to put on your CV.
  • Possibility of getting Job.
  • Lots of Money in less time.
  • Cool t-shirt,Hoodies,Mugs and Many More Swag.
  • Person will learn to work hard because of competition.

POPULAR PROGRAM AND REWARDS

Google (Min 100$ & Max 2000$)

Yahoo(Min 50$ & Max 15000$)

Facebook Min 500$

Want to know more,book your seat know.

How many students enrolled in the course

70+

STUDENTS

ENROLLED

30+

COURSES

WE OFFER

40+

INDUSTRY

PROFESSIONALS

Dive deep into Ethical Hacking and become an expert and get certified from ICSS.

FLEXIBILITY TO CHOOSE

REAL- TIME PROJECTS

INTERNSHIP CERTIFICATE

INDUSTRY ORIENTED TRAINING

What we will learn in this Frame

1. Introduction To Ethical Hacking 

  • What is Hacking·        
  • What is Ethical Hacking·        
  • Types of Hackers·        
  • White Hat Hacker·        
  • Black Hat Hackers·        
  • Gray Hat Hackers·        
  • Script Kiddies·        
  • Hacktivists·        
  • Spy Hackers·        
  • Cyber Terrorists·        
  • Vulnerability·        
  • Exploit·        
  • Remote Exploit·        
  • Local Exploit·        
  • Zero-day·        
  • Zero-day vulnerability·        
  • Zero-day Exploit·        
  • Brute
  • force attack·        
  • Phishing·   
  • Remote access payload·       

2. Steps Of Ethical Hacking

  • Active
  • Information Gathering       
  • Passive
  • Information Gathering     
  • Scanning      
  • Gaining Access       
  • Maintaining Access
  • Covering Tracks       

3. Types Of Malicious Files

  • Viruses     
  • Worms        
  • Trojan Horse      
  • Spyware      
  • Adware       
  • Backdoor      
  • Rootkits
  • Ransomware    

4. Penetration Testing

  • What is Penetration Testing·        
  • Types of Penetration Testing·        
  • What is white box Penetration Testing·        
  • What is Black Box Penetration testing·        
  • Introduction to Linux OS·        
  • Social Engineering·     
  • Google Hacking using Dorks.

5. Lab Setup

  • What is Virtual Machine·        
  • What is VMware·        
  • What is Virtual Box·        
  • Installing VMware·
  • Installing Kali Linux·        

6. Web Application Pen-Testing

  • How Web Application Works·        
  • Request and Response·        
  • Installing Scanner (Acuntix,Netsparker)·
  • Scanning Website·        

7. OWASP Top 10

  • What is Sql-Injection?
  • Types of Sql-Injection
  • Live Demo on Sql-Injection
  • Types of XSS
  • Live Demo on XSS all types
  • What is CSRF
  • Live Demo On CSRF
  • What is HTML Injection
  • Live Demo on HTML Injection
  • What is Directory Listing
  • Live Demo on Directory Listing
  • What is Broken Auth
  • Live Demo on Broken Auth
  • What is Tamper data?
  • Live Demo on Tamper Data on Ecommerce site
  • Session Hijacking

8. Phishing

  • What is Phishing?
  • Create a Phishing Page

Course Price

INR 4,000/-

16 Hours Live Training

Project Support – 1

Mentor support (until course completion )

Training Certificate [E -Certificate]

GET IN TOUCH WITH US:

ICSS

Indian Cyber Security Solutions

CALL-US:

Toll-Free Number: 1800-123-500014

Mobile Number: +918972107846 / +916291980077

Email Us: [email protected]

ENROLL HERE FOR THE COURSE:

×

Hello!

Click one of our representatives below to chat on WhatsApp or send us an email to [email protected]

× Hi How can we help you