Certified Ethical Hacker Certification – C | EH v9 from EC council

Certified Ethical Hacker Certification 

C | EH v9 from EC council 

ENROLL NOW

Certified Ethical Hacker certification is a global certification which is valid in more than 160 countries including US government recognizes it. We are an authorized training partner of EC Council from last 10 years. We have a pool of professional certified ethical hackers who are working as security annalist in different organizations. Certified ethical hacker certification from EC council provides the gateway to enter the cyber security domain. MNCs have made certified ethical hacker (CEH) certification compulsory for security related job opportunities making this certification highly important for security professionals.

Certified Ethical Hacker

Eligibility Criteria –

  1. Student with graduation in ( Btech – IT / CSE / EC, BCA , MCA ) should start with Python Programming Course and then can go for CEHv9 course and then can go for a specialization on Web Application Security / penetration testing.
  2. Student with graduation in ( Commerce, Arts etc other than science) should start with Networking (CCNA) course and will be eligible for CEHv9 course and then go for a Network security / Penetration testing.

 

Jobs for Ethical Hackers in India

 

Jobs for ethical hackers are highly in demand. According to NASSCOM research more than 77000 ethical hackers are demanded in India. An average salary of INR 65,000/- for ethical hackers with certified ethical hacker certification is available in the market.

Certified Ethical Hacker

Check out the current job for Ethical Hackers and salary packages:

Cyber Security Professional
Network Security Professional
Web Penetration Tester
Application Penetration Tester – Jobs in US

 

Course Details:

Chapter – I : Introduction To Ethical Hacking

Lecture 1:      What is hacking? And what is Ethical about it?
Lecture 2:      Types of Hackers
Lecture 3:      Terminology of Hacking
Lecture 4:      What is Vulnerability
Lecture 5:      What is Exploit
Lecture 6:      What is Zero- Day
Lecture 7:      Steps of Hacking
Lecture 8:      Discussing about Information Gathering
Lecture 9:      Types of Information Gathering
Lecture 10:     Information Gathering Demo
Lecture 11:     What is Scanning
Lecture 12:     Scanning Demo using Nmap
Lecture 13:     What is Gaining Access
Lecture 14:     what is Maintaining Access
Lecture 15:     What is Covering Tracks
Lecture 16:     Google Hacking
Lecture 17:     Google Hacking Live Demo
Lecture 18:     Types of malicious files
Lecture 19:     Details of virus
Lecture 20:     Details of Worms
Lecture 21:     Details of Rootkit
Lecture 22:     Social Engineering

100 Marks Internal Exam ( Practical or article submission )

Chapter II – Build your hacking environment

Lecture 23:    Introduction to Linux OS
Lecture 24:    Introduction to Kali Linux OS
Lecture 25:    Introduction to Virtual Machine
Lecture 26:    Installing VMWARE station or Oracle virtual Box
Lecture 27:    Network Setup in Virtual Machine
Lecture 28:    Install Kali Linux in Virtual Machine

100 Marks Internal Exam ( Practical or article submission )

Chapter III – System Hacking

Lecture 29:     System Hacking using Kon-Boot, Linux Live CD
Lecture 30:     Prevention of System Hacking
Lecture 31:     What is MAC
Lecture 32:     Spoof your MAC
Lecture 33:     What is Tor / Proxy Server
Lecture 34:     Spoof your IP
100 Marks Internal Exam ( Practical or article submission )

Chapter IV – Password Cracking

Lecture 35:    Types of Passwords Encryption
Lecture 36:    Password Cracking Methods
Lecture 37:    Dictionary Attack
Lecture 38:    Brute force Attack
Lecture 39:    Rule Based Attack
Lecture 40:    Password Cracking Live Demo using Hydra, John-the-ripper

100 Marks Internal Exam ( Practical or article submission )

Chapter V – Protect Your Network

Lecture 41:    What is NMAP
Lecture 42:    Network Scanning With NMAP
Lecture 43:    What is Vulnerability Scanning
Lecture 44:    Vulnerability Scanning using Nessus/Qualys Free Scan/ GFI Lan Guard
Lecture 45:    What is Metasploit
Lecture 46:    Using Metaspolit Hack Windows System
Lecture 47:     What is Set-toolkit
Lecture 48:    Using Set-toolkit hack Facebook , Gmail Password
Lecture 49:    What is Remote Administration Tool [RAT]
Lecture 50:    Using RAT Exploit Windows OS
Lecture 51:     Protect Your System from RAT
Lecture 52:    What is Malware and preventation from Malware

100 Marks Internal Exam ( Practical or article submission )

Chapter VI – Sniff your Network
Lecture 53:    What is Sniffing and mechanism of Sniffing
Lecture 54:    How to use Wireshark
Lecture 55:    Cain and Able as a sniffer
Lecture 56:    What is netscan and how it works? Real time practical
Lecture 57:    Session Hijacking

100 Marks Internal Exam ( Practical or article submission )

Chapter VII – Dos Attack

Lecture 58:    What is Denial Of Service/ Distributed Denial Of Service
Lecture 59:    Type of Dos Attack
Lecture 60:    Live Demo of Dos Attack

Chapter VIII – Hacking Wireless Network / WIFI

Lecture 61:     What is WAP2 Encyption
Lecture 62:     Crack WAP2 Password using airmon

Chapter IX – Hack Web Application

Lecture 63:    Web Application and its basics (Understanding HTML and its response)
Lecture 64:    OWASP Top 10 Vulnerability
Lecture 65:    What is Sql-Injection
Lecture 66:    Live Demo of Sql-Injection
Lecture 67:    Sql-Injection Exploit Using Havij and Sqlmap
Lecture 68:    Prevention of Sql-Injection
Lecture 69:    What is Cross Site Scripting and Its effect
Lecture 70:    Prevention of Cross-site scripting
Lecture 71:    Data-tampering on E-commerce Sites
Lecture 72:    Prevention of Data-tampering
Lecture 73:    Website Defacement and Prevention
Lecture 74:    E-mail hacking using phishing
Lecture 75:    Hacking Web Server

Chapter X – Protect Your Data

Lecture 76:     What is cryptography
Lecture 77:      MD5 , Hash Calculator , Cryp, Advance Encryption Tools
Lecture 78:     What is Steganography

Chapter XI – Hack Android Mobile Phone

Lecture 79:       Hack Android Phone using Metasploit

Course Duration:

3 Months Training Program

 

Course Fee:

INR – 34,000/- | $ 511/- [ Class Room Hands on Training ]

INR – 36,000/- | $ 541/- [ Online Training LIVE | Get all your LIVE classes recorded and uploaded in our YouTube Chanel]

Get a Call from us – ENROLL  NOW

Your Name (required)

Your Email (required)

Phone Number (required)

Course Applied (required)

Your Message

 

 

Why Choose Indian Cyber Security Solutions ?

  • 100 % Money Refund Guarantee if not satisfied* 
  • Get trained from IT experts & Ethical Hackers with 10 years of experience.
  • Certificate recognized by government and private organizations in more than 160 countries.
  • 100 % placement assistance
  • Life time access to our online library “ HACKERS LAB ” containing case studies, video tutorials, interview questions.

 

 

Ethical Hacking Training institute in Kolkata – CEHv9

 

20 + certified ethical hackers will be your trainer for 2 months. Apart from a certification exam conducted by EC- council at the end of the course we make sure you be well prepared. You have to appear for 12 practical exams after each module conducted internally by Indian Cyber Security Solutions. Cyber security professionals will guide you with the best practical knowledge to be a successful CEH v9 certified ethical hacker.  We provide class room training at our Kolkata center and have online training facility for outstation and international students.  Our training institute is located in the city of joy Kolkata famous for its food and IT industry located in Salt Lake. Indian Cyber Security Solutions is located in salt lake sector 2 Kolkata in between the IT hub Kolkata Sector V and Sector I surrounded by MNC’s like wipro, cognizant, TCS.

Download EC-Council Certification Track 

ENROLL NOW

 

Highest Selling Technical Courses of Indian Cyber Security Solutions:

Summer Training for CSE, IT, BCA & MCA Students 

Network Penetration Testing training

Ethical Hacking  training

Python Programming training

Diploma in Network Security Training

Secured Coding in Java

Certified Network Penetration Tester 

Certified Web Application Penetration Tester 

Certified Android Penetration Tester 

Certified Python Programming 

Advance Python Training 

Reverse Engineering Training  

Amazon Web Services Training  

VMware Training 

Summary
Review Date
Reviewed Item
CEH v9 Training from ICSS is great. Really helpful
Author Rating
51star1star1star1star1star

Show Buttons
Hide Buttons