winter-training

i3indya™ Technologies presents Practical Training on Ethical Hacking & Cyber Security via VIDEO LECTURE's.

If you want to know how hackers are attacking your websites, emails, servers & computer remotely or how you can protect yourself or your organization from all these attacks then this is the right course for you.

Course Highlights

  • Ethical Hacking (Video Lectures)

  • 45 Hrs

  • INR 6999/-

  • Certificate of Completion by i3indya™ Technologies

  • 20 Topics | Learn 100+ Secrets of Ethical Hacking

Do This Course at Your Home

  • Yes! You can Do This Course at Your Home by purchasing our distance learning kit. Click Here

Training Modules

Module Topics Duration
(HH:MM:SS)

1

Introduction

        1.1

00:06:00

        1.2

        Types of Hackers

00:05:00

        1.3

        Phases of Hacking

00:09:00

        1.4

        Career Opportunities

00:05:00

2

Creating Your Virtual Lab

        2.1

        Installing Kali & Metasploitable

00:11:00

        2.2

        Linux Basics

00:14:00

        2.3

        Linux File Permissions

00:05:00

3

Networking

        3.1

00:13:00

        3.2

        IPv6

00:07:00

        3.3

        NAT (Network Address Translation)

00:02:00

        3.4

        OSI Layer

00:14:00

        3.5

        Other Networking Terms & Devices

00:07:00

4

Information Gathering & Scanning

        4.1

        Information Gathering (Part-1)

00:05:00

        4.2

        Information Gathering (Part-2)

00:08:00

        4.3

        Information Gathering (Part-3)

00:04:00

        4.4

        Information Gathering (Part-4)

00:04:00

        4.5

        Scanning

00:10:00

5

Google Hacking

        5.1

        Understanding Google Hacking

00:07:00

        5.2

        Google Dorks

00:13:00

6

Metasploit Framework

        6.1

        Introduction to Metasploit Framework

00:06:00

        6.2

        System Hacking (WIndows XP)

00:09:00

        6.3

        Hacking Linux with Metasploit

00:06:00

        6.4

        introduction to Armitage

00:05:00

7

Malwares

        7.1

        Malwares (Part-1)

00:06:00

        7.2

        Malwares (Part-2)

00:05:00

8

WiFi Hacking

        8.1

        Wi-Fi Terms (Part-1)

00:05:00

        8.2

        Wi-Fi Terms (Part 2)

00:00:00

        8.3

        Understanding 802.11x

00:08:00

        8.4

        WPA2 Cracking

00:12:00

9

Web App Security

        9.1

        Introduction to Web Applications

00:10:00

        9.2

00:16:00

        9.3

        Arbitrary Code Execution

00:08:00

        9.4

        CSRF

00:07:00

        9.5

        SQL Injection

00:10:00

        9.6

        XSS

00:15:00

        9.7

        Shell Exploits

00:06:00

10

Denial of Service

        10.1

        Introduction to DoS

00:02:00

        10.2

        Types of DoS attack

00:09:00

        10.3

        Introduction to DDoS

00:08:00

        10.4

        Prevention of DoS Attacks

00:06:00

11

Cryptography

        11.1

        Introduction to Cryptography

00:08:00

        11.2

        Basic Cryptography Techniques

00:09:00

        11.3

        CryptoSystem

00:08:00

        11.4

        Various Type of Encryption

00:12:00

        11.5

        Enigma and other Cryptography Service

00:06:00

12

Firewall,IDS &IPS

        12.1

        Firewall

00:09:00

        12.2

        Various types of Firewalls (Part-1)

00:08:00

        12.3

        Various types of Firewalls (Part-2)

00:11:00

        12.4

        IDS

00:08:00

        12.5

        IPS

00:04:00

13

Final Exam

        13.1

        Ethical Hacking Exam

00:30:00

Why Ethical Hacking & Cyber Security from i3indya ?

  • Latest and Updated Topics are covered

  • We concentrate not only on Hacking but also on Security of all Topics

  • Forensics on almost all platforms and devices are taught

  • Hands on training with live demonstrations

  • Well experienced Trainers

  • Tied up with several Government Organizations for Training and Consultancy

  • Trained more than 30,000 professionals from all over India

  • Providing training to CBI, NIA and State Police across India

  • We limit our tool usage from third-party and we provide manual approach for each Technique

  • We also design our own tools

Pre Requisite

  • Basics of Computer

  • Knowledge of how to use internet

  • Basics of Networking

Who Could Attend ?

  • College students seeking career in Cyber Security Industry.

  • Person having interest in Hacking & Security.

  • Education Faculty & Staff.

  • IT Professionals, Web Developers, Network Engineers.

  • Students from any branch can join the training.

Who Attended Ethical Hacking & Cyber Security?

Register Here