Securigence Certified Ethical Hacker

Learn More

Course Description


This is an introductory course that is developed with the objective of laying the foundation stone which can potentially transform into a career in the cyber security space. In this training which start with the fundamentals of computer science where we make a student understand and write programmes in different computer languages, popularly used in corporate setup. At the end you can expect a hands-on training experience which can act as a Launchpad for future specialized courses in cyber security.

By using various latest tools and real-time hacking techniques, our ethical hacking course provides you with a simulation-based environment. This helps students to test cyber-attacks and assess the vulnerabilities. Be it an undergraduate, graduate or post-graduate student or someone who is passionate about information security, anyone can join our certified ethical hacker training course.

Course Content


In this module student will be introduced current cyber security challenges faced by enterprises by sharing cyber attacks case studies in the past year, along with career options available in the field of information security.
In this module we will teach basics of networking concepts and different web technologies required by an information security consultant to understand working architecture of a network and web application layer.
In this module students will be getting hand-on experience of information gathering and digital footprint collection through various available open source tools and methods to collect information available on WorldWideWeb.
In this module we will talk about basic architecture of email along with various attacks associated with email security and security guidlines which will help an organisation to make an effective email security policy.
In this module students will learn how information security professionals can use google search engine as a default tool of finding unsecured data crawled by google's page rank algorithm and how they can refine their traditional searching method.
In this module student will be learning how to setup IDS and IPS on a network and also deploying web application firewall to protect website from various kind of network and web application attacks. To monitor incoming attacks on the network we will learn how to use production honeypots.
In this module we will be talking about web application auditing global standards like OWASP Top 10 attacks.
In this module we will be talking about all three popular operating system's security architecture and attacks, which are possible on these operating systems via various kind of Malwares.
In this module student will learn how to use world's most advance penetration testing operating system by installing and using it for the same.
This module is purely concentrated on demonstrating various attacks related to a network, along with attack demonstrations student will learn how to defend these network attacks through various network security countermeasures.
In this module student will learn different wireless attacks like WEP, WPA, WPA2 & WPA2 Enterprise cracking and security. In the end students will learn how to make an effective wireless network security policy for their respective enterprise.
Over 80% of smartphones on planet are running on android, Around 13% smartphones are running with iOS operating system. Hence, in this module is purely concentrated on making student understand these operating system's security architecture, we will be also talking about VOIP security.

Why us?


Practical Training

Over 90% of the training is hands on practice sessions for providing first hand experience.

Small Batch Size

We believe that cyber security education has to be delivered in a personalised manner for maintaining efficiency hence we keep our small batch sizes.

No More Trainers

We do not have any full time trainers, because the faculty who will be teaching you during the course will be someone from our enterprise customer services team.

Certification

Participants clearing final exam with more than 70% marks will be awarded with Securigence Level One Certified Ethical Hacker.

Toolkit

Each participant will get a toolkit containing tools used during the training, white papers,videos and other support software.

E-Book

Candidates will be provided E-Book and presentation slides containing tutorials of the contents of the training.

WHO SHOULD ATTEND?

Undergraduate, Graduate and Post-graduate students, Faculties and information security lovers who have passion to enter into Information security field.

Contact Us


Contact info

Durg, IN 491001

contact@securigenceindia.com

+91 756 669 8985

Message on Whatsapp

Leave us a message