Certified Ethical Hacking Expert (CDI-CEHE ) is a 3 months ethical hacking training course provided by Cyber Defence Intelligence (CDI) in Punjab, Mohali ,Chandigarh, Haryana . This Ethical Hacking Course is provided by the professionals of CDI. It is framed by the expert professionals of CDI having hands-on experience in Cyber Security.
About Ethical Hacking Course
- Full-fledged course designed by CDI covering all domains of hacking.
- Framed in a manner such that it covers all aspects of Ethical Hacking.
- Complete Ethical Hacking toolkit will be provided.
- Along with the toolkit complete study material and guidance will be provided.
- Live Hacking demonstrations will be provided.
- Complete Industry exposure with hands-on experience on penetration testing projects.
- Tests will be scheduled at regular intervals.
Why CDI?
CDI is an emerging Information Security Company providing Information Security Solutions to clients. Key factors which play role that why CDI is best for Ethical Hacking training are: Quality, affordability, regular exams, professional environment, guidance by experts, worth time utilization.
This ethical hacking course is designed keeping in mind hacker’s enthusiasm and hacking spirit. At the end of 3 months course, candidate will be provided with complete career assistance after clearing the final exam being conducted.
Course Detail: Overview of Topics
Part 1: Introduction
- Introduction to Hacking
- All about Cyber World
- Introduction to Cyber Laws
- Study of various IT acts
- Hackers Psychology
- Learning Linux from hacking point of view
Part 2: Network Security
- Introduction to Networking
- Wi-Fi Hacking
- Intercepting packets: Man in the Middle attack
- DoS and DDoS attacks
- Vulnerability Assessment by mastering nmap
- Nessus vulnerabilities scanning
- Hacking with metasploit
- Hacking Networks by evading firewalls
- Packet crafting with hping3 and scapy
- Taking down Networks
- Study of popular vulnerabilities and their exploitation
- Countermeasures
Part 3: Playing with Passwords
- Windows Password cracking
- Various techniques of password cracking
- Encrypted documents password cracking
- Hacking psychology of users
- Various password storing techniques
Part 4: Windows hacking and Security
- Windows hacking by changing
- Cracking passwords
- Playing with User accounts
- Remote hijacking with RATs
- Getting into system by escalating privileges
- Encrypting File System
- Windows Firewall with Advanced Security
- At last staying safe: Setting up a secure system
Part 5: Web Application Hacking
- Introduction to web technologies
- Information Gathering techniques
- Intercepting requests, responses and playing with them
- Hacking live Website
- Mastering Web attacks
- Database dump with SQL Injection
- Exploiting users with Cross-Site Scripting(XSS)
- Session Hijacking
- Shell Upload, take everything down
- User accounts hacking
- Clickjacking Attack
- Security Misconfiguration
- Remote Code execution vulnerability
- File Inclusion Vulnerability
- Hands-on Live Website
- Securing own Website
Part 6: Abstract
- Email Hacking
- Email Spoofing
- Hacking by Phishing
- Rootkits
- Spywares
- Keyloggers
- Webcam hacking
- Social Engineering Techniques
- Steganography: Hiding and Detection
- Ciphers and Cryptography
- Hacking by Scripting
- Playing with malwares
- Deleted data recovery
- Working on Digital Forensics
- Image Forensics
- Case investigation
- Evidence recovery
- Securing Windows
- Server Hardening
We understand your aspirations to learn hacking course and we believe in delivering the promise. Call us on +91-9888555182 or just fill contact us form here : CONTACT US