Signup as a Tutor

As a tutor you can connect with more than a million students and grow your network.

"Learn Ethical hacking" is no longer available

No Reviews Yet

Ellisbridge, Ahmedabad

Course ID: 9016

Ellisbridge, Ahmedabad

No Reviews Yet

About the Course

Technical Education should have practical approach.

India has vast number of college and universities providing technical education, but major students are lacking on having a proper practical approach to their subjects which leads to failure or struggle in fieldwork. We bridge the gap between theoretical knowledge and practical implementation by workshops and give a complete industrial training by our industrial training.

Topics Covered

221, Devnadan Mall , Nr. Town Hall , Ashram road , Ahmedabad.

Certified Cyber security Expert

Basic Level Ethical Hacking
Introduction to Hacking
• Hackers & hacking methodologies
• Types of hackers
• Steps to conduct Hacking

Information Gathering & Scanning Methodologies
• Method of gathering information
• Information gathering of websites &networks
• Scanning & Structuring of websites
• Finding Admin Panel of websites
- Who Uploaded this Video

Google Hacking
• What is Google Hacking
• Advanced operators of Google
• Finding Vulnerable websites using Google
• Finding Target networks using Google

- How My Website Got Hacked?
- What is happening at USA?
- Avast Key is

Basic Network Terminologies
1. TCP/IP protocols
2. IP protocols
3. Classes of IP address
4. NAT
5. VPN , Proxies , SSH ,PUTTY

Scanning & Enumeration
1. Scanning
2. Types
3. Tools
4. NMAP , ZenMap


1. How to control victim’s computer using Trojans
2. Binding Trojans
3. Undetected Trojans
4. Removal of Trojans from computer
5. Analysis of Trojans/ Virus

Virus & Worms
1. Introduction to viruses and worms
2. How they work?
3. Method used to hide them
Facebook and Email Hacking

1. Using Techniques
• Phishing
• Desktop phishing
• Tabnabbing
• Various Other techniques
2. Spoofing E-mails
3. Tracing E-mails
4. Finding vulnerability in facebook
5. Reporting vulnerability in Facebook
Wireless Hacking & Security 1. Wireless Protocols
2. Wireless Routers-Working
3. Attacks on Wireless Routers
4. Cracking Wireless routers password(WEP) and (WPA)
5. Securing routers from Hackers
6. Countermeasures
Website Hacking & Security

1. Vulnerability Research
2. SQL Injection 1
3. SQL Injection 2
4. XSS Attacks & Countermeasures
5. LFI/ RFI Attacks & Countermeasures
6. Information Disclosure Vulnerabilities
7. Buffer Overflow Attacks 1
8. Buffer Overflow Attacks 2
9. Session Hijacking Attcks
10. Hacking Web Servers
11. Vulnerability Assessment & Penetration Testing
12. Exploit Writing
13. Secure Coding Practice

Advanced Level Ethical Hacking
Mobile Security
1. SMS Forging & Countermeasures
2. VoIP Hacking & Countermeasures
• Introduction
• Protocols
• Types of attacks
• Bluejacking
• Tools for bluejack
• BlueSpam
• Blue snarfing
• BlueBug attack
• Shortpair code attack
• Man in Middle attack
• Tools that aid bluetooh hacking
• Countermesurement
Introduction to Cyber Crime Investigation & IT ACT 2000
1. Types of crime
2. Introduction Of IT acts
3. Case Studies of Reported
DO IT yourself
1. Google Dork
2. Hacking a website
3. Torjan Making
4. Phishing Page
5. Email Spoofing and Tracing
6. Cracking a Wifi Password
7. Create your Virus
8. Solve Dummy Cases
9. Make a incident Report
10. Explaining The risk of the Hacking

Mock Interview Session

Interview preparation guidance
Resume preparation
Machine Test

Program Benefits & Highlights:
• Hands on Demonstrations
• Hands on Practice Everyday
• PowerPoint Presentation, Live Demos, Interactive Question & Answer sessions
• Reading Materials and Tools will be given

• 10,000 INR

Course Material & CDs:
• Comprehensive course material will be provided to participants.
• Tools and tutorials will be Provided /

• Certificate of “Certified Cyber Security Expert” will be given to participants from Illuminative Works.
• Certificate of Completion Of Task and training will be given
• Certificate Of Completion Of Training will be given

Who should attend

Any graduate.


only know Basic internet.

What you need to bring


Key Takeaways

Program Benefits & Highlights:
• Hands on Demonstrations
• Hands on Practice Everyday
• PowerPoint Presentation, Live Demos, Interactive Question & Answer sessions
• Reading Materials and Tools will be given

Date and Time

Not decided yet.

About the Trainer

Avg Rating






I have been taking classes" from past 1years.


No reviews currently
Post your requirement and let us connect you with best possible matches for Computer Software Classes Post your requirement now is India's largest network of most trusted tutors and institutes. Over 25 lakh students rely on, to fulfill their learning requirements across 1,000+ categories. Using, parents, and students can compare multiple Tutors and Institutes and choose the one that best suits their requirements. More than 6.5 lakh verified Tutors and Institutes are helping millions of students every day and growing their tutoring business on Whether you are looking for a tutor to learn mathematics, a German language trainer to brush up your German language skills or an institute to upgrade your IT skills, we have got the best selection of Tutors and Training Institutes for you. Read more