Where do you need ?


Please select a Location.


Submit your enquiry for Learn Ethical hacking

Please enter valid question or comment

Please select a category

Please enter your name.

Please enter valid Phone Number

Please enter the Pin Code.

By submitting, you agree to our Terms of use and Privacy Policy

Connect With Illuminativeworks

You have reached a limit!

We only allow 20 Tutor contacts under a category. Please send us an email at support@urbanpro.com for contacting more Tutors.

You Already have an UrbanPro Account

Please Login to continue

Please Enter valid Email or Phone Number

Please Enter your Password

Please Enter valid Password or OTP

Forgot Password? Resend OTP OTP Sent

Sorry, we were not able to find a user with that username and password.

We have sent you an OTP to your register email address and registered number. Please enter OTP as Password to continue

Further Information Received

Thank you for providing more information about your requirement. You will hear back soon from the trainer


Learn Ethical hacking

Learn Ethical hacking

Ellisbridge, Ahmedabad


No Feedback Yet

No Reviews Yet
0 Interested

About the Course

Technical Education should have practical approach.

India has vast number of college and universities providing technical education, but major students are lacking on having a proper practical approach to their subjects which leads to failure or struggle in fieldwork. We bridge the gap between theoretical knowledge and practical implementation by workshops and give a complete industrial training by our industrial training.

Topics Covered

221, Devnadan Mall , Nr. Town Hall , Ashram road , Ahmedabad.

Certified Cyber security Expert

Basic Level Ethical Hacking
Introduction to Hacking
• Hackers & hacking methodologies
• Types of hackers
• Steps to conduct Hacking

Information Gathering & Scanning Methodologies
• Method of gathering information
• Information gathering of websites &networks
• Scanning & Structuring of websites
• Finding Admin Panel of websites
- Who Uploaded this Video

Google Hacking
• What is Google Hacking
• Advanced operators of Google
• Finding Vulnerable websites using Google
• Finding Target networks using Google

- How My Website Got Hacked?
- What is happening at USA?
- Avast Key is

Basic Network Terminologies
1. TCP/IP protocols
2. IP protocols
3. Classes of IP address
4. NAT
5. VPN , Proxies , SSH ,PUTTY

Scanning & Enumeration
1. Scanning
2. Types
3. Tools
4. NMAP , ZenMap


1. How to control victim’s computer using Trojans
2. Binding Trojans
3. Undetected Trojans
4. Removal of Trojans from computer
5. Analysis of Trojans/ Virus

Virus & Worms
1. Introduction to viruses and worms
2. How they work?
3. Method used to hide them
Facebook and Email Hacking

1. Using Techniques
• Phishing
• Desktop phishing
• Tabnabbing
• Various Other techniques
2. Spoofing E-mails
3. Tracing E-mails
4. Finding vulnerability in facebook
5. Reporting vulnerability in Facebook
Wireless Hacking & Security 1. Wireless Protocols
2. Wireless Routers-Working
3. Attacks on Wireless Routers
4. Cracking Wireless routers password(WEP) and (WPA)
5. Securing routers from Hackers
6. Countermeasures
Website Hacking & Security

1. Vulnerability Research
2. SQL Injection 1
3. SQL Injection 2
4. XSS Attacks & Countermeasures
5. LFI/ RFI Attacks & Countermeasures
6. Information Disclosure Vulnerabilities
7. Buffer Overflow Attacks 1
8. Buffer Overflow Attacks 2
9. Session Hijacking Attcks
10. Hacking Web Servers
11. Vulnerability Assessment & Penetration Testing
12. Exploit Writing
13. Secure Coding Practice

Advanced Level Ethical Hacking
Mobile Security
1. SMS Forging & Countermeasures
2. VoIP Hacking & Countermeasures
• Introduction
• Protocols
• Types of attacks
• Bluejacking
• Tools for bluejack
• BlueSpam
• Blue snarfing
• BlueBug attack
• Shortpair code attack
• Man in Middle attack
• Tools that aid bluetooh hacking
• Countermesurement
Introduction to Cyber Crime Investigation & IT ACT 2000
1. Types of crime
2. Introduction Of IT acts
3. Case Studies of Reported
DO IT yourself
1. Google Dork
2. Hacking a website
3. Torjan Making
4. Phishing Page
5. Email Spoofing and Tracing
6. Cracking a Wifi Password
7. Create your Virus
8. Solve Dummy Cases
9. Make a incident Report
10. Explaining The risk of the Hacking

Mock Interview Session

Interview preparation guidance
Resume preparation
Machine Test

Program Benefits & Highlights:
• Hands on Demonstrations
• Hands on Practice Everyday
• PowerPoint Presentation, Live Demos, Interactive Question & Answer sessions
• Reading Materials and Tools will be given

• 10,000 INR

Course Material & CDs:
• Comprehensive course material will be provided to participants.
• Tools and tutorials will be Provided /

• Certificate of “Certified Cyber Security Expert” will be given to participants from Illuminative Works.
• Certificate of Completion Of Task and training will be given
• Certificate Of Completion Of Training will be given

Who should attend

Any graduate.


only know Basic internet.

What you need to bring


Key Takeaways

Program Benefits & Highlights:
• Hands on Demonstrations
• Hands on Practice Everyday
• PowerPoint Presentation, Live Demos, Interactive Question & Answer sessions
• Reading Materials and Tools will be given
There are no Reviews yet.
Questions and Comments

Thousands of experts Tutors, Trainers & other Professionals are available to answer your questions

Comment ?

Questions Guidelines

  • Start your question with simple statements like "what", "when", "where", or "how".
  • Ensure your question or answer is not offensive or insensitive - it may be voted down or banned.
  • Please provide as much detail as possible as this will allow our members to better understand and respond to your question.
  • Take some time to categorize your question. This will greatly help other users find the question.

You can add upto 6 Images


Showing 1 to 10 of 10

Milan 17/12/2015

Hello sir i am interested in this course...
so give me details of fees and duration of this course

0 0


You can add upto 6 Images


Vishal 26/06/2015

Respected sir/mam;
I'm Vishal Patel. I would like to know only whatsapp hacking, so can you give me some information about whatsapp account hacking,
So is it possible or not??

0 0


You can add upto 6 Images


Hiren 30/12/2013

hello sir,
I have interested for this course.
pleases fees strucher send in my Email id and Browsers and templeted..........

0 0


You can add upto 6 Images


harsh 20/12/2013

sir ,i have to join crime branch (cyber cell) which type i course select?

0 0


You can add upto 6 Images


HITEHSH 13/12/2013

Hello Student,

0 0


You can add upto 6 Images


Nitin Patel 13/12/2013

I am interested for this course and would like to start early basis. Please write me details with fees structure ASAP

0 0


You can add upto 6 Images


ketal 10/12/2013

I would like to join the course please contact me with all contact details and address so I can visit n collect all information


0 0


You can add upto 6 Images


suraj 25/11/2013

Thanks for this information.

0 0


You can add upto 6 Images


niki patel 23/11/2013

Respected sir/mam;
I am niki patel and i completed my B.E in this year.I would like to training from your company.Let me know about course details and fees structure.Thank-you..!!

0 0


You can add upto 6 Images


rahul panchal 24/08/2013

hello sir

0 0


You can add upto 6 Images

There are no Reviews yet.

Date and Time

Not decided yet.

cash back100% Money Back Guarentee

About the Trainer



I have been taking classes" from past 1years.
Seats Left-

Students Interested 0

Course Id: 9016