loading......

coming soon

Coming Soon

We are in process of building the inventory of good professionals in this category

Got it!

Where do you need ?

location

Please select a Location.

Enquire

Submit your enquiry for Learn Ethical hacking

Please enter valid question or comment

Please enter your name.

Please enter valid email

Please enter valid Phone Number

Please enter the Pin Code.

By submitting, you agree to our Terms of use and Privacy Policy

Connect With Illuminativeworks

You have reached a limit!

We only allow 20 Tutor contacts under a category. Please send us an email at support@urbanpro.com for contacting more Tutors.

You Already have an UrbanPro Account

Please Login to continue

Please Enter valid Email or Phone Number

Please Enter your Password

Please Enter valid Password or OTP

Forgot Password? Resend OTP OTP Sent

Sorry, we were not able to find a user with that username and password.

We have sent you an OTP to your register email address and registered number. Please enter OTP as Password to continue

Further Information Received

Thank you for providing more information about your requirement. You will hear back soon from the trainer

Share

Learn Ethical hacking

Learn Ethical hacking

Ellisbridge, Ahmedabad

10,000

No Feedback Yet

No Reviews Yet
0 Interested

About the Course


Technical Education should have practical approach.

India has vast number of college and universities providing technical education, but major students are lacking on having a proper practical approach to their subjects which leads to failure or struggle in fieldwork. We bridge the gap between theoretical knowledge and practical implementation by workshops and give a complete industrial training by our industrial training.

Topics Covered


221, Devnadan Mall , Nr. Town Hall , Ashram road , Ahmedabad.

Certified Cyber security Expert

Basic Level Ethical Hacking
Introduction
Introduction to Hacking
• Hackers & hacking methodologies
• Types of hackers
• Steps to conduct Hacking

Information Gathering & Scanning Methodologies
• Method of gathering information
• Information gathering of websites &networks
• Scanning & Structuring of websites
• Finding Admin Panel of websites
CASE STUDY and TASK
- Who Uploaded this Video

Google Hacking
• What is Google Hacking
• Advanced operators of Google
• Finding Vulnerable websites using Google
• Finding Target networks using Google

CASE STUDY
- How My Website Got Hacked?
TASK
- What is happening at USA?
- Avast Key is

Basic Network Terminologies
1. TCP/IP protocols
2. IP protocols
3. Classes of IP address
4. NAT
5. VPN , Proxies , SSH ,PUTTY

Scanning & Enumeration
1. Scanning
2. Types
3. Tools
4. NMAP , ZenMap

Trojans,
Backdoors

1. How to control victim’s computer using Trojans
2. Binding Trojans
3. Undetected Trojans
4. Removal of Trojans from computer
5. Analysis of Trojans/ Virus


Virus & Worms
1. Introduction to viruses and worms
2. How they work?
3. Method used to hide them
Facebook and Email Hacking

1. Using Techniques
• Phishing
• Desktop phishing
• Tabnabbing
• Various Other techniques
2. Spoofing E-mails
3. Tracing E-mails
4. Finding vulnerability in facebook
5. Reporting vulnerability in Facebook
Wireless Hacking & Security 1. Wireless Protocols
2. Wireless Routers-Working
3. Attacks on Wireless Routers
4. Cracking Wireless routers password(WEP) and (WPA)
5. Securing routers from Hackers
6. Countermeasures
Website Hacking & Security

1. Vulnerability Research
2. SQL Injection 1
3. SQL Injection 2
4. XSS Attacks & Countermeasures
5. LFI/ RFI Attacks & Countermeasures
6. Information Disclosure Vulnerabilities
7. Buffer Overflow Attacks 1
8. Buffer Overflow Attacks 2
9. Session Hijacking Attcks
10. Hacking Web Servers
11. Vulnerability Assessment & Penetration Testing
12. Exploit Writing
13. Secure Coding Practice


Advanced Level Ethical Hacking
Mobile Security
1. SMS Forging & Countermeasures
2. VoIP Hacking & Countermeasures
• INSTALLING
• FORGING VOIP CALLS
3. BLUETOOH HACKING
• Introduction
• Protocols
• Types of attacks
• Bluejacking
• Tools for bluejack
• BlueSpam
• Blue snarfing
• BlueBug attack
• Shortpair code attack
• Man in Middle attack
• Tools that aid bluetooh hacking
• Countermesurement
Introduction to Cyber Crime Investigation & IT ACT 2000
1. Types of crime
2. Introduction Of IT acts
3. Case Studies of Reported
DO IT yourself
1. Google Dork
2. Hacking a website
3. Torjan Making
4. Phishing Page
5. Email Spoofing and Tracing
6. Cracking a Wifi Password
7. Create your Virus
8. Solve Dummy Cases
9. Make a incident Report
10. Explaining The risk of the Hacking


Mock Interview Session

Interview preparation guidance
Resume preparation
Machine Test

Program Benefits & Highlights:
• Hands on Demonstrations
• Hands on Practice Everyday
• PowerPoint Presentation, Live Demos, Interactive Question & Answer sessions
• Reading Materials and Tools will be given


Duration:
• 2 MONTHS
FEES:
• 10,000 INR


Course Material & CDs:
• Comprehensive course material will be provided to participants.
• Tools and tutorials will be Provided /

Certification:
• Certificate of “Certified Cyber Security Expert” will be given to participants from Illuminative Works.
• Certificate of Completion Of Task and training will be given
• Certificate Of Completion Of Training will be given

Who should attend

12TH PASS.
Any graduate.

Pre-requisites

only know Basic internet.

What you need to bring

nothing

Key Takeaways

Program Benefits & Highlights:
• Hands on Demonstrations
• Hands on Practice Everyday
• PowerPoint Presentation, Live Demos, Interactive Question & Answer sessions
• Reading Materials and Tools will be given
Reviews
There are no Reviews yet.
Questions and Comments

Thousands of experts Tutors, Trainers & other Professionals are available to answer your questions

Comment ?

Questions Guidelines

  • Start your question with simple statements like "what", "when", "where", or "how".
  • Ensure your question or answer is not offensive or insensitive - it may be voted down or banned.
  • Please provide as much detail as possible as this will allow our members to better understand and respond to your question.
  • Take some time to categorize your question. This will greatly help other users find the question.


You can add upto 6 Images

Ask

Showing 1 to 10 of 10
M

Milan 17/12/2015

Hello sir i am interested in this course...
so give me details of fees and duration of this course

0 0

Answer

You can add upto 6 Images

V

Vishal 26/06/2015

Respected sir/mam;
I'm Vishal Patel. I would like to know only whatsapp hacking, so can you give me some information about whatsapp account hacking,
So is it possible or not??

0 0

Answer

You can add upto 6 Images

U

Hiren 30/12/2013

hello sir,
I have interested for this course.
pleases fees strucher send in my Email id and Browsers and templeted..........

0 0

Answer

You can add upto 6 Images

U

harsh 20/12/2013

sir ,i have to join crime branch (cyber cell) which type i course select?

0 0

Answer

You can add upto 6 Images

U

HITEHSH 13/12/2013

Hello Student,

0 0

Answer

You can add upto 6 Images

U

Nitin Patel 13/12/2013

Hi
I am interested for this course and would like to start early basis. Please write me details with fees structure ASAP

0 0

Answer

You can add upto 6 Images

U

ketal 10/12/2013

I would like to join the course please contact me with all contact details and address so I can visit n collect all information

thnks

0 0

Answer

You can add upto 6 Images

U

suraj 25/11/2013

Thanks for this information.

0 0

Answer

You can add upto 6 Images

U

niki patel 23/11/2013

Respected sir/mam;
I am niki patel and i completed my B.E in this year.I would like to training from your company.Let me know about course details and fees structure.Thank-you..!!

0 0

Answer

You can add upto 6 Images

U

rahul panchal 24/08/2013

hello sir

0 0

Answer

You can add upto 6 Images


There are no Reviews yet.

Date and Time

Not decided yet.

About the Trainer

NITISH MEHTA

B.TECH IN CS


I have been taking classes" from past 1years.
Seats Left-

Students Interested 0

Course Id: 9016