Ethical Hacking

Content Provider


Course Level


Mode Of Delivery



40 hrs

Certification By


Course Validity

Valid for 6 months post activation

Learning Resources

Videos , PPTs, Self Learning Modules & Practice Quizzes


Information Technology
  • 1,800/- 1599/-
Speak with our Expert Team Today Ask Now


With the ever-growing scope of Information Systems and the intricacies in the way different types of systems are interconnected, the world is waking up to challenges to keep information secure. Because of the tremendous implications this has on an organization’s credibility and performance, companies are being pushed to implement a dedicated team of information security personnel, who are experts in studying the vulnerabilities present within and outside the system that may attract hackers. In order for them to do this with utmost perfection, it becomes important for them to learn how hackers work and be able to hack into the system, but ethically with the required authorizations.

This course

This course will introduce you to the concepts of Ethical Hacking and related terminology, provide insights on the process and techniques of Ethical Hacking and related terminology using relevant examples.

Learning Outcomes

  • Define ethical hacking

  • Apply the most appropriate type of penetration testing to a system, in order to gather information

  • List four methods that can be used for Windows enumeration

  • Interpret the result of running NBTSTAT (NetBIOS over TCP/IP)on a machine in a local network

  • Describe the role of sniffers in hacking

  • Explain how DoS attacks work with examples

  • Identify sniffing tools and their features


Module 1: Introduction to Ethical Hacking

  • Hacking Methodology

  • Process of Malicious Hacking

  • Footprinting and Scanning: Footprinting, Scanning, Enumeration

  • System Hacking and Trojans: System Hacking

  • Trojans and Black Box Vs White Box Techniques

Module 2: Hacking Methodology

  • Denial of Service, Sniffers 

  • Session Hijacking and Hacking Web Servers: Session Hijacking, Hacking Web Servers. Web Application Vulnerabilities and Web Techniques Based

  • Password Cracking: Web Application Vulnerabilities, Web Based Password Cracking Techniques

Module 3: Web And Network Hacking

  • SQL Injection

  • Hacking Wireless Networking 

  • Viruses, Worms and Physical Security: Viruses and Worms, Physical Security 

  • Linux Hacking

  • Evading IDS and Firewalls: Evading IDS and Firewalls

Module 4: Report Writing and Mitigation

  • Introduction to Report Writing & Mitigation 

  • Requirements for low level reporting & high level reporting of Penetration testing results 

  • Demonstration of vulnerabilities and Mitigation of issues identified including tracking

Key Features

  • 10 Instructive Videos 

  • 4 Self Learning Modules

  • 4 PPTs

  • 4 Practice Quizzes

  • Certification

Career Opportunities

  • Information Security Analyst

  • Technical Support Engineer

  • Network Engineer

  • System Analyst

  • UI Developer


After completing this course and successfully passing the certification examination, the student will be awarded the “Ethical Hacking” certification.

If a learner chooses not to take up the examination, they will still get a 'Participation Certificate'.

Who Should Attend

  • Computer Science Engineers

  • Engineering and IT students

  • Graduates and Post Graduates with a programming background

Frequently Asked Questions

Where can I find courses on the Platform?

After login to KRACKiN(, you can find courses on the dashboard which are segregated as skill courses, career tracks and also Annual Membership.consisting of 75000 + courses. You can enrol to any of the courses available by selecting the ‘Buy Now’ button.
Can I search courses domain wise on the platform?

Yes, Skill courses and Annual Membership plans are segregated domain wise. You can enter your domain and search for the desired courses.
Is online classes available for all the courses on KRACKiN?

No, online classes are not available for all courses on KRACKiN. Courses are designed as self- paced learning courses supported by videos, PPTs and practice quizzes etc. are provided for easy understanding of the students.
Are the course certificates valid?

Yes, the certificates are valid across all the sectors in the Industry.
Can I access your courses on Mobile device?

Yes, you can access the courses on your mobile browser.
Can my course access be extended?

We recommend you complete your assigned courses within the stipulated time as we do not have the provision to extend the course validity.
How to get my certificate after completing the course?

After the completion of all the given modules, the certificate will be auto generated by the system.

Content & Certification Partners