Signup as a Tutor

As a tutor you can connect with more than a million students and grow your network.

"Certified Ethical Hacker V9 - ECCOUNCIL" is no longer available

5 Reviews

Madhapur, Hyderabad

Course ID: 37449

Madhapur, Hyderabad

5 Reviews

About the Course


Course Content: Ethical Hacking Training.

Course Duration: 5 days. 

“Certified Ethical Hacker v9 Course”

 Learn ethical hacking tools and techniques to enhance your network defence.

Program Overview

This course will teach you the ethical hacking tools and techniques needed to enhance your network's defences. You'll begin by learning how perimeter defences work. By scanning and attacking your own network (no real networks will be harmed), you'll also learn how intruders operate and the steps to secure a system.


Who Should Attend?

This course is best suited for:

1.    Security officers

2.    Auditors

3.    Security professionals

4.    Site administrators

5.    Individuals concerned about the integrity of the network infrastructure


Learning Objectives

By the end of the program, participants will be able to do:


A.   Foot printing

B.    Network scanning

C.    Enumeration

D.   Packet sniffing

E.    Social Engineering

F.    DoS / DDoS

G.   Session hijacking

H.   Webserver and web application attacks and countermeasures

I.     SQL injection attacks

J.     Wireless encryption

K.    Cloud computing threats

L.    Cryptography ciphers

M.   Penetration testing


Medium of Instruction



Training Methodology

The Training methodology consists of face-to-face interactions, presentations, case studies and work groups, Individual and Group experiential learning activities, Audio/Video presentations and Questionnaire, role plays are the forms in which the training will be delivered.

Like all of our courses, it follows our Do-Review-Learn-Apply Model.



FIVE Days (40 Hours)

 ** Cost includes ECCOUNCIL - CEH V9 EXAM VOUCHER. 

Date and Time

Not decided yet.

About the Trainer

5 Avg Rating

5 Reviews

6 Students

1 Courses

Vinod Babu

Certified ECCOUNCIL Trainer, Microsoft Certified Trainer, Certified Ethical Hacker, Certified Hacking Forensics Investigator

Key Skills:
Network & System Security.
Risk Management.
Vulnerability Assessments.
Authentication & Access Control
System Monitoring.
Regulatory Compliance.
System Integration Planning.
Multitier Network Architectures.


Cyber Security/ InfoSec specialist with qualifications include Master’s degree in computer science; CEH, CHFI, MCSA, MCP, CCNA and CEI certifications and detailed knowledge of security tools, technologies and best practices. Sixteen (16) years of experience in the creation and deployment of solutions protecting networks, systems and information assets for diverse companies and organizations.

Certified Ethical Hacker –CEH.
Certified Hacking Forensic Investigator – CHFI.
Certified EC-Council Instructor – CEI.
Microsoft - MCSA
Microsoft – MCP
Cisco – CCNA

Offensive InfoSec Technologies:

Security Technologies: Ethical Hacking, Forensic Investigation, Cloud Computing Threats, Advanced Persistent Attack, Virus and Worms Attack, Mobile Threats, Botnet, Insider Attack. Network/Host/Applications Threats, Mis-configuration attacks, Shrink Wrap Codes, Black box and White box testing.

Network Defense, IDS and IPS, Content Filtering, Anti-spyware, SSH, SSL, Digital Certificates, Anti-Virus/Malware/Adware tools.

Operating Systems: Ubuntu, Centos, OpenSuse, Redhat Linux, Windows Server 2012, Messaging, Window 10,8,7, MAC OSX Sierra.

Networking: Managed switches & Routers configuration of Cisco, HP, Siemens, Ericsson, Dell and Cajun deployed for LANs, WANs, VPNs, TCP/IP configurations and routing protocols. Sonic wall / Fortigate / Watch guard Firewalls configurations. Network security: traffic/protocol analysis, firewalls, IDS /IPS, routers, switches, wireless (802.11), and host hardening.

Secure network engineering, management, and monitoring, including 802.11 networks.

Pen testing & Security Tools:
Kali Linux, Windows Forensic Investigation Tools, Nmap, Burp Suite, Fluxion, Megaspoilt, Wireshark and Packetyzer.

IT Experience

Technoprenuer - IT Security Consultant and InfoSec Trainer. – 2010 to Till date.

From 2004 to 2010 worked with various companies as consultant and SME Technocrat at various levels in companies Globalcom , iGate Global Solutions, Tanla Solutions Ltd, Brigade Technologies Pvt Ltd, Taksheel Solutions Ltd.

Summary Of Experience :

More than 15 years of experience in IT Network, System, Security and communication engineering, project management and working IT experience in complex public- and private-sector environments. Outstanding knowledge in the industry, Committed to staying abreast of and advancing leading-edge technology. Strengths include know-how to build effective redundancies into systems. Driven problem-solver with demonstrated ability to successfully lead network and systems engineering projects.

• Host, System, Network, Application level penetration testing and incident response.
• Design and Teach Security courses internationally (e.g., Ethical Hacking, IPv6) with superior analytical and troubleshooting ability.
• Cyber exercise design and delivery, Networking/information security laboratories (face-to-face, virtual), Information systems architecture, integration, project management.
• Network Protocol/traffic analysis, Firewall (Cisco PIX/ASA, pfSense, IP-tables) engineering, implementation, and administration, Networking at Layers 2-4 and 7 (including all major TCP/IP protocols).
• Intrusion Detection/Prevention Systems (IDS/IPS) engineering, implementation, and administration, Networking hardware (routers and switches).

• Engineering, implementation, and administration of Windows/Linux/UNIX (OS X, Redhat/Ubuntu/centos) server platform including hardening and security fine-tuning.

Expertise in Cyber Security:

Define, maintain and enforce application security best practices and demonstrate vulnerabilities to application/system owners, and provide solutions for risk mitigation.
• Expert in Application Security testing for Web, client Server application to assess the vulnerabilities including manual and automated testing of Application
• Strong skills in conducting white, black , grey box testing
• Inspection and Certification ability on security controls as per Open Source Security Testing Methodology Manual (OSSTMM), OWASP, SANS
• All trainings shall be based on the real time Proof-of-concept (PoC) for better understanding.
• Review and identifying the flaws in source code of different applications through manual and automation process.
• Monitoring and track progress of vulnerabilities found and maintain the history of system.
• Providing detailed information in the form of reports on each and every issue that are important in suggested monitoring and scanning on applications and systems.
• Strong knowledge and complete understanding of potential attack vectors like XSS, injection, session hijacking, and social engineering.
• Sound knowledge on cryptographic primitives and its principles.
• Realtime knowledge and solid understanding on OSImodel and networking protocols, such as TCP/IP.
• Thorough understanding of HTTP and HTTPS, as well as their underlying implementations.
• Realtime experience in delivering security testing and ethical hacking modules like CEH, CHFI, ECSA, Penetration Testing, OWASP.
• Experience developing custom tools and/or scripts to accomplish desired goals. Proficiency with industry standard exploitation, forensic frameworks and the aptitude to research and stay up-to-date with current exploits.
• Successfully delivered trainings on various hacking attacks and threats to the cloud computing technology and also provided security remedies to counter cloud computing threats and attacks.
• In-depth knowledge on pen testing techniques to identify threats in cloud systems.
• Explore Heart bleed CVE-2014-0160, Shellshock CVE-2014-6271 and Poodle CVE-2014-3566
• Hacking and security threats to mobile phones and how a mobile phone can be attacked and its remedial measures.
• Keep upto date on recent, upcoming security and threats and its impact such as latest virus, Trojan and Back doors.
• Strong knowledge on IT security controls, laws and standards of India and Federal Laws of USA.

Training On Ethical Hacking :

“Learning the ideaology and approach behind any cyber crime is a vital part of defensive strategy ..BVB ”

To learn what and how to hack is equally important for information security professionals, this knowledge shall enable all possible security practices in finding and fixing security vulnerabilities such as methods used by blackhats “hackers” for penetration into networks and systems ,this shall enable the security professional to provide preemptive solutions. IT networks are fenced with tight security systems built on top of network and systems level security methods, but as evident many times “rat finds its way to cheese” similar to that blackhats improve and develop new methods for penetration into IT networks.

Learning ethical hacking is keeps abreast on checking for vulnerabilities in and around security fence to reinforce the weak areas and create a shield.

The training covers the important offensive methods, below image illustrates Phases and Steps of Ethical Hacking.

Student Feedback


Average Rating





Good ambiance, Good surrounding, Excellent co-workers friendly atmosphere in the office and they have well experienced faculty and has good sound knowledge on cyber security.



It was good and well experienced faculty where a student is trained in well known manner. The atmosphere is good and were students are given with real time work experience.



Authorised ECCOUCIL - CEH training centre. Good lab infrastructure and lab and well experienced trainer. Course curriculum at par with the industry standards.



Top and Best Cyber Security Training Institute. They giving a, extraordinary Training , by Mr.Vinod Babu certified expert in information technology and infosec. They teaching very well, Institute was very cool. Thank you so much.



I have taken 30 days training program on Ethical Hacking and Cyber Security from Ryna Technologies and I am 100% satisfied. With limited batch size they provide excellent training focusing more on practicals. I must say that Ryna is the best training institute for Cyber Security Training.


Post your requirement and let us connect you with best possible matches for Ethical Hacking Training Post your requirement now is India's largest network of most trusted tutors and institutes. Over 25 lakh students rely on, to fulfill their learning requirements across 1,000+ categories. Using, parents, and students can compare multiple Tutors and Institutes and choose the one that best suits their requirements. More than 6.5 lakh verified Tutors and Institutes are helping millions of students every day and growing their tutoring business on Whether you are looking for a tutor to learn mathematics, a German language trainer to brush up your German language skills or an institute to upgrade your IT skills, we have got the best selection of Tutors and Training Institutes for you. Read more