EC - Council Global Certification | Ethical Hacking Training - ICSS

Become a Certified Ethical Hacker by attaining the EC Council Global Certification and training from Industry Experts

New Session Starts on 18th September, 2021. 10:00 AM -12:00 PM Batch... Book your seats now!!!

18th Sept - 28th Nov, 2021

Classroom Session

2 Hours Session for 3 Months

10 AM - 12 PM


INR 37,000/-


Toll FREE: 1800-123-500014

+91 8972107846 | 9831318312

Who is this Course for?

Students who are interested in Cyber Security

Networking (CCNA) Professionals

Technical and Non-Technical Students

Python Programmers

C|EH v11 - Course Module


  • Module 1: Introduction To Ethical Hacking
  • Module 2: Steps Of Ethical Hacking & Information Gathering
  • Module 3: Types Of Malicious Files
  • Module 4: Penetration Testing
  • Module 5: Google Hacking using Dorks
  • Module 6: Lab Setup
  • Module 7: System Hacking
  • Module 8: Scanning with Nessus & Hacking with Metasploit
  • Module 9: SE-Toolkit
  • Module 10: What is Remote Administration Tool
  • Module 11: What Is Sniffing
  • Module 12: What Is DOS
  • Module 13: Web Application Pen-testing
  • Module 14: OWASP Top 10
  • Module 15: XSS (Cross site Scripting)
  • Module 16: CSRF Attack Simulation 
  • Module 19: Directory Listing
  • Module 20: Phishing Attack
  • Module 21: Hacking Android Phone using Metasploit
  • Module 22: Concept Of IOT and OT Pen Testing
  • Module 23: Concepts Of Cloud Computing
  • Module 24:Concept Of Cryptography 
  • Module 25: Project
Module 1: Introduction To Ethical Hacking
  • What is Hacking
  • What is Ethical Hacking
  • Types of Hackers
  • White Hat Hacker
  • Black Hat Hackers
  • Gray Hat Hackers
  • Script Kiddies
  • Hacktivists
  • Spy Hackers
  • Cyber Terrorists
  • Vulnerability
  • Exploit
  • Remote Exploit
  • Local Exploit
  • Zero-day
  • Zero-day vulnerability
  • Zero-day Exploit
  • Brute force attack
  • Phishing
  • Remote access
  • Payload
Module 2: Steps Of Ethical Hacking & Information Gathering
  • Active Information Gathering
  • Passive Information Gathering
  • Scanning
  • Gaining Access
  • Maintaining Access
  • Covering Tracks
Module 3: Types Of Malicious Files
  • Viruses
  • Worms
  • Trojan Horse
  • Spyware
  • Adware
  • Backdoor
  • Rootkits
  • Ransomware
Module 4: Penetration Testing
  • What is Penetration Testing
  • Types of Penetration Testing
  • What is white box Penetration Testing
  • What is Black Box Penetration testing
  • Introduction to Linux OS
  • Social Engineering
Module 5: Google Hacking using Dorks

Module 6: Lab Setup
  • What is Virtual Machine
  • What is VMware
  • What is Virtual Box
  • Install VMware
  • Install Kali Linux
  • Install Windows XP
  • Install Windows 7
  • Install Windows 10
  • Install Add on in Mozilla
  • Tamper Data
  • Burp Suite
  • No-Redirect
  • Install Nessus     
  • QUESTION ANSWER & DISCUSSION + EXAM
Module 7: System Hacking
  • System Hacking
  • using Kon-Boot
  • EFI and Secure Boot feature
  • Network Scanning   
  • Port Scanning   
  • Service Scanning      
  • What is Nmap
  • Scanning With Nmap
  • Nmap Various Command  
  • QUESTION ANSWER & DISCUSSION + EXAM
Module 8: Scanning with Nessus & Hacking with Metasploit
  • What is Metasploit?
  • Xp Remote Exploit using Metasploit
  • Msfvenom
  • Windows 7 UAC Bypass
  • QUESTION ANSWER & DISCUSSION + EXAM
Module 9: SE-Toolkit
  • SE-Toolkit Usages
  • Exploit With SE-Toolkit
Module 10: What is Remote Administration Tool
  • What is RAT
  • Exploit With RAT
  • Protect System from RAT
Module 11: What Is Sniffing
  • Types of Sniffing
  • Network Sniffing with Wireshark
  • Get FTP Login Details Using Wireshark
  • QUESTION ANSWER & DISCUSSION + EXAM
Module 12: What Is DOS



  • Details of DOS
  • What is DDOS
  • Encryption Hacking  Wireless Network
  • QUESTION ANSWER & DISCUSSION + EXAM
Module 13: Web Application Pen-testing

  • How Web Application Works  
  • Request and Response
  • Installing Scanner (Acuntix,Netsparker)      
  • Scanning Website     
  • QUESTION ANSWER & DISCUSSION + EXAM
Module 14: OWASP Top 10

  • Types of Sql-Injection
  • Live Demo on Sql-Injection
  • QUESTION ANSWER & DISCUSSION + EXAM
Module 15: XSS (Cross site Scripting)

  • Types of XSS
  • Live Demo
  • on XSS All types
  • QUESTION ANSWER & DISCUSSION + EXAM
Module 16: CSRF Attack Simulation 

  • What is CSRF
  • LiveDemo On CSRF
  • What is HTML Injection
  • Live Demo on
  • HTML Injection
  • QUESTION ANSWER & DISCUSSION + EXAM
Module 19: Directory Listing

  • What is
  • Directory Listing
  • Live Demo on
  • Directory Listing
  • What is
  • Broken Auth
  • Live Demo on
  • Broken Auth What is
  • Tamper data?
  • Live Demo on
  • Tamper Data on Ecommerce site
  • Session Hijacking
  • QUESTION ANSWER & DISCUSSION + EXAM
Module 20: Phishing Attack

  • What is
  • Phishing?
  • Create a Phishing Page
  • What is Web
  • Shell
  • Hack Web-Server
  • Using Web-Shell
  • QUESTION ANSWER & DISCUSSION + EXAM
Module 21: Hacking Android Phone using Metasploit

  • Hacking Android Phone using Metasploit
  • QUESTION ANSWER & DISCUSSION + EXAM
Module 22: Concept Of IOT and OT Pen Testing

  • IOT & OT concepts
  • IOT & OT Attacks
  • IOT & OT Hacking Methodology
  • Countermeasure
  • IOT & OT Pentesting
Module 23: Concepts Of Cloud Computing

  • Cloud Computing Concepts
  • Cloud Computing Threats
  • Cloud Computing Attacks
  • Cloud Security
  • Cloud Security Tools
  • Cloud Penetration Testing
Module 24:Concept Of Cryptography 

  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools
  • Public Key Infrastructure
  • Email Encryption
  • Disk Encryption
  • Cryptanalysis
  • Countermeasures
Module 25: Project


Class Room Training

Students Enrolled83%

Course Fee

INR 37,000 / - + 18% GST

Course Duration - 40 Hours

3 Months Training

2 Classes Per Week X 2 Hours Each Day

Batch Timing

Week End Classes | Week Days Classes

Online Self Paced LIVE Training

Students Enrolled92%

Course Fee

INR 37,000 / - + 18% GST

Course Duration - 40 Hours

3 Months Training

2 Classes Per Week X 2 Hours Each Day

Batch Timing

Week End Classes | Week Days Classes

TIME IS RUNNING OUT.

GRAB YOUR SEAT FAST!!!

00
days
00
hours
00
minutes
00
seconds

DISCLAIMER: Register before midnight of September 18th, 2021, to unlock the bonus.

GET CERTIFIED

Official and Verified

Receive an officially signed and verified certificate from our CEO & Chief of Staff after completion of the Course

Easily Shareable

Make your official colleagues know more about your knowledge in Ethical Hacking by sharing it on sites like LinkedIn and various other social media platform.

Improves your Resume Status

Add this certificate to your resume/CV to improve the chance of standing out from your competition.

Still Not Convinced

Check the reviews of our students who had attended some of our Courses and Bootcamp.

Still not convinced if you should attend this Bootcamp from us or not?

Click the below button to see the Google reviews

Rating

4.8 ( 21,123 ratings )

1,09,233 Students Enrolled

Web Security Services - ICSS
Web Security Services - ICSS