Signup as a Tutor

As a tutor you can connect with more than a million students and grow your network.

Ethical Hacking and Penetration Testing | CEH |

No Reviews Yet

Course type: Online Instructor led Course

Platform: Skype | Webex | gotomeeting

Course ID: 36360

Course type: Online Instructor led Course

Platform: Skype | Webex | gotomeeting

Students Interested 0 (Seats Left 0)

₹ 40,000

No Reviews Yet

Date and Time

Not decided yet.

Abhishek Sharma

Masters in cyber security

About Abhishek Sharma

Having 8+ years of experience in cyber security training.
Certifications: CEH | CHFI | OSCP | LPT
Conferences: Defcon, Hatcon, Nullcon
Bug Bounty: Google Hall of fame, Facebook hall of fame, and much more.
No reviews currently Be the First to Review

About the Course

This is a penetration Testing & Information Security Training Program. The training provides you an intensive session which will empower you’re with knowledge in a simplified and easily graspable manner. In the training, we teach our students how hackers break into the systems, network, mobiles and website s as t make them aware f the possible loopholes and therefore, making them proficient in reverse-penetrating. By ding s, they are able to create a virtual wall between their data and the hackers. This training will enable you to carry up attacking as well as defensive methodologies which will help you and your organization to not only protect but also assess the safety and vulnerability rate.


Course objectives:

 At the end of this curse, participants will be able to:

  • Understand and perform Information Gathering Digital Foot Prints

  • Understand Email attacks and will be able to protect their email accounts as well as social networking accounts from these attacks

  • Analyse Malwares from a computer system and remove them manually

  • Understand Web Application Attacks and will be able to patch them to produce a secure web application.

  • Understand windows memory management and assembly language to perform basic Reverse Engineering

  • Understand Enterprise Network Security Architecture

  • Understand Exploitation

  • Understand Wireless Security

  • Understand Security Architecture of mobile Platforms.


No reviews currently Be the First to Review


Students Interested 0 (Seats Left 0)

₹ 40,000

Post your requirement and let us connect you with best possible matches for ECIH Certified Incidident Handler Training Post your requirement now
₹ 40,000 Enquire


Submit your enquiry for Ethical Hacking and Penetration Testing | CEH |

Please enter valid question or comment

Please enter your name.

Please enter valid Phone Number

Please enter the Pin Code.

By submitting, you agree to our Terms of use and Privacy Policy

Connect With Additive Innovations

You have reached a limit!

We only allow 20 Tutor contacts under a category. Please send us an email at for contacting more Tutors.

You Already have an UrbanPro Account

Please Login to continue

Please Enter valid Email or Phone Number

Please Enter your Password

Please Enter valid Password or OTP

Forgot Password? Resend OTP OTP Sent

Sorry, we were not able to find a user with that username and password.

We have sent you an OTP to your register email address and registered number. Please enter OTP as Password to continue

Further Information Received

Thank you for providing more information about your requirement. You will hear back soon from the trainer