Ethical Hacking

The purpose of this course is to introduce students to the intriguing and interesting world of ethical hacking. With the ever...


Content Provider

40 hrs



Mode Of Delivery

Valid for 6 months post activation

Course Validity




Certification By

This is a paid course.

Course Fee

  • 1,800/-/- 599/-/-


The purpose of this course is to introduce students to the intriguing and interesting world of ethical hacking. With the ever-growing scope of Information Systems and the intricacies in the way different types of systems are interconnected, the world is waking up to challenges to keep information secure. Because of the tremendous implications this has on an organisation’s credibility and performance, companies are being pushed to implement a dedicated team of information security personnel, who are experts in studying the vulnerabilities present within and outside the system that may attract hackers. In order for them to do this with utmost perfection, it becomes important for them to learn how hackers work and be able to hack into the system, but ethically.


Module 1: Introduction to Ethical Hacking

Hacking Methodology, Process of Malicious Hacking, Footprinting and Scanning: Footprinting, Scanning. Enumeration: Enumeration. System Hacking and Trojans: System Hacking, Trojans and Black Box Vs White Box Techniques.

Module 2: Hacking Methodology

Denial of Service, Sniffers, Session Hijacking and Hacking Web Servers: Session Hijacking, Hacking Web Servers. Web Application Vulnerabilities and Web Techniques Based Password Cracking: Web Application Vulnerabilities, Web Based Password Cracking Techniques.

Module 3: Web And Network Hacking

SQL Injection, Hacking Wireless Networking, Viruses, Worms and Physical Security: Viruses and Worms, Physical Security. Linux Hacking: Linux Hacking. Evading IDS and Firewalls: Evading IDS and Firewalls.

Module 4: Report Writing and Mitigation

Introduction to Report Writing & Mitigation, requirements for low level reporting & high level reporting of Penetration testing results, Demonstration of vulnerabilities and Mitigation of issues identified including tracking.

Learning Outcomes

  • Define ethical hacking
  • Apply the most appropriate type of penetration testing to a system, in order to gather information
  • List four methods that can be used for Windows enumeration
  • Interpret the result of running NBTSTAT (NetBIOS over TCP/IP)on a machine in a local network
  • Describe the role of sniffers in hacking
  • Explain how DoS attacks work with examples
  • Identify sniffing tools and their features 

Who Should Attend?

  • Engineering and IT students
  • Graduates with a programming background

Job Prospects

  • Information Security Analyst
  • Technical Support Engineer
  • Network Engineer
  • System Analyst
  • UI Developer


After completing this course and successfully passing the certification examination, the student will be awarded the “Ethical Hacking” certification.

If a learner chooses not to take up the examination, they will still get a 'Participation Certificate'.