coming soon

Coming Soon

We are in process of building the inventory of good professionals in this category

Got it!

Where do you need ?


Please select a Location.


Submit your enquiry for Ethical Hacking and Information Security

Please enter valid question or comment

Please enter your name.

Please enter valid email

Please enter valid Phone Number

Please enter the Pin Code.

By submitting, you agree to our Terms of use and Privacy Policy

Connect With Jitendra

You have reached a limit!

We only allow 20 Tutor contacts under a category. Please send us an email at support@urbanpro.com for contacting more Tutors.

You Already have an UrbanPro Account

Please Login to continue

Please Enter valid Email or Phone Number

Please Enter your Password

Please Enter valid Password or OTP

Forgot Password? Resend OTP OTP Sent

Sorry, we were not able to find a user with that username and password.

We have sent you an OTP to your register email address and registered number. Please enter OTP as Password to continue

Further Information Received

Thank you for providing more information about your requirement. You will hear back soon from the trainer


Ethical Hacking and Information Security

Ethical Hacking and Information Security

Electronic City, Bangalore


No Reviews Yet
8 Interested

About the Course

This course provides valuable insight into how hackers circumvent and defeat security controls in networked environments, applications and operating systems - even within a seemingly secure environment. Moreover, this field has lot of
opportunities regarding Placements as well, wherein an individual can earn from Rs.30, 000/- and it goes up to Rs.1.2 lacs/- per month and much more.

This technology helps those individuals who have the passion to work for Cyber Security and the Designations that would be eligible for are as follows:

• Ethical Hacker.
• Security Auditor.
• Cyber Crime Investigator
• Security Administrator
• Security Consultant.
• Penetration Tester

Topics Covered


Session: 1 – Introduction to Hacking and security.
Session: 2 - Networking & its Basics.
Session: 3 – Information gathering (Foot printing).
Session: 4 – Hacking using Google.
Session: 5 – Scanning.
Session: 6 – Hacking Windows.
Session: 7 - Linux Hacking.
Session: 8 - Trojans & Backdoors.
Session: 9 - Virus & Worms.
Session: 10 - Proxy & Packet Filtering.
Session: 11 – Doubt Clearance.
Session: 12 - Denial of Service.
Session: 13 – Sniffer.
Session: 14 - Social Engineering.
Session: 15 - Physical Security.
Session: 16 – Steganography.
Session: 17 – Cryptography.
Session: 18 - Wireless Hacking (The basics).
Session: 19 - Firewall & Honey pots.
Session: 20 - IDS & IPS.
Session: 21 - Doubt Clearance.
Session: 22 – Vulnerability Assessment.
Session: 23 - Penetration Testing.
Session: 24 - Session Hijacking.
Session: 25 - Hacking Web Servers.
Session: 26 - SQL Injection.
Session: 27 - Cross Site Scripting.
Session: 28 - Exploit Writing.
Session: 29 - Buffer Overflow.
Session: 30 - Reverse Engineering.
Session: 31 - Doubt Clearance.
Session: 32 - Email Hacking.
Session: 33 - Incident Handling & Response.
Session: 34 - Bluetooth Hacking.
Session: 35 - Attacking Live FTP Server.
Session: 36 - Advanced Metasploit (I)
Session: 37 - Advanced Metasploit part (II).
Session: 38 - Advanced Metasploit (III).
Session: 39- Advanced Wireless Hacking.
Session: 40 - Career prospectus in Ethical Hacking.

Who should attend

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

IT Managers
Information Security Managers
Security Consultants
Security Architects
Security Specialists
Network Specialists
Network Engineers
System Administrators
IS Auditors

Anyone aspiring for a career in Information Security would benefit from this course.


Basics of computer and internet although not compulsory.

What you need to bring

A Laptop will do but not compulsory."

Key Takeaways

Training Package Includes:
• Ethical Hacking toolkit.
• Free Hacking toolkit DVD.
• Handouts and e-books.
• Pad with a pen.
There are no Reviews yet. Be the First to Review
Questions and Comments

Thousands of experts Tutors, Trainers & other Professionals are available to answer your questions

Comment ?

Questions Guidelines

  • Start your question with simple statements like "what", "when", "where", or "how".
  • Ensure your question or answer is not offensive or insensitive - it may be voted down or banned.
  • Please provide as much detail as possible as this will allow our members to better understand and respond to your question.
  • Take some time to categorize your question. This will greatly help other users find the question.

You can add upto 6 Images


There are no Reviews yet. Be the First to Review

Date and Time

Not decided yet.

About the Trainer

I am an Engineer By Education and a HACKER by choice.

I have completed my Engineering from C.S.E. Branch.

I do have a teaching experiences of more than 3 years in teaching adults.

I know basics and advances of computer HACKING and in Depth knowledge of computer applications and associated subjects of Engineering ,BCA and MCA courses.

I also hold a NCFM-OTSM (Options Trading Strategies Module) Certificate and Innobuzz's Certified Technical Analyst certificate
Seats Left-

Students Interested 8

Course Id: 17218