Security Audit

Our Web Application Pentest ( WAP) attempts to address the Owasp top 10 & SANS top 20 web application vulnerabilities and other exploitable loopholes of your web application . Along with it our WAP team also test web applications for Business logic flaws that can directly or indirectly effect the functioning of application.


We are here to help you solve your biggest query- where and how to start? CDI has brought various courses in Ethical Hacking in Chandigarh where all you technology lovers will be given the much needed push to move forward and create a niche for yourself in the field. From Beginner to Expert level we have many kinds of training patterns.

Call Us : +91-771045-0011 | +91-771045-0022

Certified Ethical Hacking Expert (CDI-CEHE )  is a 3 months ethical hacking training course provided by Cyber Defence Intelligence (CDI) in Punjab, Mohali ,Chandigarh, Haryana . This Ethical Hacking Course is provided by the professionals of CDI. It is framed by the expert professionals of CDI having hands-on experience in Cyber Security. 


About Ethical Hacking Course

  • Full-fledged course designed by CDI covering all domains of hacking.
  • Framed in a manner such that it covers all aspects of Ethical Hacking.
  • Complete Ethical Hacking toolkit will be provided.
  • Along with the toolkit complete study material and guidance will be provided.
  • Live Hacking demonstrations will be provided.
  • Complete Industry exposure with hands-on experience on penetration testing projects.
  • Tests will be scheduled at regular intervals.


Why CDI?

CDI is an emerging Information Security Company providing Information Security Solutions to clients. Key factors which play role that why CDI is best for Ethical Hacking training are:  Quality, affordability, regular exams, professional environment, guidance by experts, worth time utilization.

This ethical hacking course is designed keeping in mind hacker’s enthusiasm and hacking spirit. At the end of 3 months course, candidate will be provided with complete career assistance after clearing the final exam being conducted.

Course Detail: Overview of Topics

Part 1: Introduction

  • Introduction to Hacking
  • All about Cyber World
  • Introduction to Cyber Laws
  • Study of various IT acts
  • Hackers Psychology
  • Learning Linux from hacking point of view

Part 2: Network Security

  • Introduction to Networking
  • Wi-Fi Hacking
  • Intercepting packets: Man in the Middle attack
  • DoS and DDoS attacks
  • Vulnerability Assessment by mastering nmap
  • Nessus vulnerabilities scanning
  • Hacking with metasploit
  • Hacking Networks by evading firewalls
  • Packet crafting with hping3 and scapy
  • Taking down Networks
  • Study of popular vulnerabilities  and their exploitation
  • Countermeasures

Part 3: Playing with Passwords

  • Windows Password cracking
  • Various techniques of password cracking
  • Encrypted documents password cracking
  • Hacking psychology of users
  • Various password storing techniques

Part 4: Windows hacking and Security

  • Windows hacking by changing
  • Cracking passwords
  • Playing with User accounts
  • Remote hijacking with RATs
  • Getting into system by escalating privileges
  • Encrypting File System
  • Windows Firewall with Advanced Security
  • At last staying safe: Setting up a secure system


Part 5: Web Application Hacking

  • Introduction to web technologies
  • Information Gathering techniques
  • Intercepting requests, responses and playing with them
  • Hacking live Website
  • Mastering Web attacks
  • Database dump with SQL Injection
  • Exploiting users with Cross-Site Scripting(XSS)
  • Session Hijacking
  • Shell Upload, take everything down
  • User accounts hacking
  • Clickjacking  Attack
  • Security Misconfiguration
  • Remote Code execution vulnerability
  • File Inclusion Vulnerability
  • Hands-on Live Website
  • Securing own Website

Part 6: Abstract

  • Email Hacking
  • Email Spoofing
  • Hacking by Phishing
  • Rootkits
  • Spywares
  • Keyloggers
  • Webcam hacking
  • Social Engineering Techniques
  • Steganography: Hiding and Detection
  • Ciphers and Cryptography
  • Hacking by Scripting
  • Playing with malwares
  • Deleted data recovery
  • Working on Digital Forensics
  • Image Forensics
  • Case investigation
  • Evidence recovery
  • Securing Windows
  • Server Hardening

    We understand your aspirations to learn hacking course and we believe in delivering the promise. Call us on +91-9888555182 or just fill contact us form here : CONTACT US

See more of Cyber Intelligence by logging in.
Connect with cyber security experts,Discover job opportunities,Online Training, Information Security Advisory and lot more.