Ethical Hacker



Return to Store

Program Highlights

  • eLearning through LMS
  • Online Exam & Certification
  • 40 Hours Virtual Classes

Course Duration : 1 Month

Who Can Pursue this  :  Any 10+2 or Equivalent

Course Overview

Hacking has gone from an obscure term to something that appears in the daily news. In this course we’ll get started with what is hacking and understand some of the differences between “white” hat hackers and “black” or “grey” hat hackers. Ethical hackers work as an information security expert. They try to break the security of a computer system, network, or applications.

Fees : INR 20,000 +GST

This Ethical Hacking program will cover at a high level what are some of the essential tools a hacker needs to know about and be proficient with as well as the credentials of a hacker and what you can expect when becoming a Certified Ethical Hacker (CEH). We’ll dig deeper into the primary operating systems used for hacking: linux and windows. Automating tasks is critical to your job as a hacker and knowledge of shell scripts is key. Learn how to identify threats both external and internal. Perhaps one of the employees of the business uses a very weak password and this is a security threat that a dictionary attack tool can rapidly find. It then covers how to gain information or “footprinting” on a target of ethical hacking. It shows how to scan and also to mitigate scans to acquire information about weak points and then explains diagramming your system from a hacking perspective. There are many different types of Malware from trojans and worms to viruses and backdoors. Learning about how each threat is different is key and about how to mitigate it. Examples will be shown with Wireshark and how to interact with Packets. Also the human element of Ethical Hacking will be covered. Perhaps a company is very good in network security but lacking in physical security. This is an area that social engineering can come into play. How do you case an establishment and look for week points in the human element? And also how can you attempt to mitigate these threats.

Module 01 Module 02
1. Introduction 1. App Level Session Hijacking 31. Wireless Bluetooth Hacking
2. Hacker Credentials 2. Network Level Hijacking 32. Wireless Countermeasures
3. Hacker Credentials Part 2 3. Session Hijacking Tools 33. IDS, Firewalls, and Honeypots
4. Being a Hacker 4. Session Hijack Countermeasures 34. Evading IDS
5. Terminology 5. Session Hijack Pentest 35. Evading Firewalls
6. Tools 6. Web Server Concepts 36. Evading Firewall Tools
7. Footprinting 7. Web Server Attacks 37. Detecting Honeypots
8. Footprint Tools and CM 8. Web Server Attack Methodology 38. IDS Evasion Countermeasures
9. Intro to Linux 9. Web Server Attack Tools 39. IDS Penetration Testing
10. Intro to Linux 2 10. Web Server Countermeasures 40. Intro to Cloud Computing
11. Intro to Linux 3 11. Web Server Patch Management 41. Cloud Computing Threats
12. Intro to Windows 12. Web Server Security Tools 42. Cloud Computing Attacks
13. Threats 13. Web Server Penetration Testing 43. Cloud Security
14. Scanning 14. Web Application Concepts 44. Cloud Security Tools
15. Scanning Demo 15. Web Application Threats 45. Cloud Penetration Testing
16. Enumeration 16. Web App Hacking Methodology 46. 2014: The Year of Encryption
17. Enumeration Demo 17. Web Application Hacking Tools 47. Case Study: Heartbleed
18. System Hacking 18. Web App Countermeasures 48. Case Study: POODLEbleed
19. System Hacking Demos 19. Web App Security Tools 49. Cryptography Concepts
20. Trojans and Backdoors 20. Web Application Pen Testing 50. Encryption Algorithms
21. Trojans and Backdoors Demo 21. SQL Injection Concepts 51. Security Tools
22. Viruses 22. SQL Injection Types 52. Public Key Infrastructure
23. Viruses Demo 23. SQLi Attack Methodology 53. Email Encryption
24. Worms 24. SQLi Tools 54. Disk Encryption
25. Worms Demo 25. SQLi Evasion Techniques 55. Cryptography Attacks
26. Sniffing 26. SQLi Countermeasures 56.Cryptography Tools
27. Social Engineering 27. Wireless Networking Concepts
28. Social Engineering Techniques 28. Wireless Encryption
29. Tech Attacks Countermeasures 29. Wireless Threats
30. DOS Attacks 30. Wireless Hacking Methodology


eLearning + Virtual class (Instructor-led) + Certification.


40 Hours of Virtual class.


  • Exam Title
    Certified Ethical Hacking (Assessment)
  • Exam Code
    108-01 (JA+ Exam)
  • Number of Questions
  • Duration
    1 Hour
  • Test Format
    Multiple Choice

       Key Features

  1. Instructor led Training
  2. Guaranteed Guest Lecture sessions by Industry Experts
  3. One to One Individual Care through Video Conferencing
  4. 9 to 7 Student helpdesk support system
  5. Login facility through Web & Mobile
  6. Complementary – Spoken English & Personality Development Modules
  7. 6 Months access to the course ONLINE

Certificate Preview

EH Sample Certificate

Frequently Asked Questions (FAQs)

Who should join the Course?

10+2 or equivalent

What certificates will I receive for this course?

Jobs Academy Certification will be provided

Will there be sessions on Soft Skills and Communication?

Obviously! There will be fruitful sessions on Soft Skills and communication including body language.

Is there any option to get enough opportunities to interact with Industry Experts?

Absolutely, there will be ample sessions conducted by Industry Experts at regular intervals

If I get stuck during the course how should I contact?

In that case you can always contact the expert who will be available to satisfy your query. There will be a calling window.

Helpline Number is : +91-8585858746