Certificate Program in Ethical Hacking

Blended Learning | 6 Months (Inclusive of Project - 1 Month) | INR 47,200/-

Certificate Program in Ethical Hacking | Category : IT

Why Join Certificate Program in Ethical Hacking

  • Possess leadership & management skill with the best professional ethical hacking practices for social concern
  • Able to understand impact of Ethical hackingsolution in the context of society and environment with evidences and also demonstrate the need for developing sustainability


1) Autopsy 2) Encrypted Disk Detector 3) Wireshark 4) Magnet RAM Capture 5) Network Miner 6) NMAP 7) Dumpzilla 8) Forensic Investigator 9) FAW

  • Overview
  • Program Structure
  • Certificate
  • Curriculum & Learning Outcomes
  • Admission & Fee Details
  • Contact Us & FAQs
  • Download Brochure


This Program is designed to train you with Penetration Testing as an act of intruding / penetrating into system or networks to find out threats and vulnerabilities in those systems which a malicious attacker may find and exploit leading to loss of data, finances or other major damages. The purpose of this program is to improve the security of the network or systems by fixing the vulnerabilities found during testing. You will get the conceptual understanding of using the same methods and tools used by malicious hackers but with the permission of the authorized person for the purpose of improving the security and defending the systems with the help of live case-studies.

Program Duration

6 Months (Inclusive of Project - 1 Month)

Mode Of Delivery

Blended Learning



6 Months certification in Ethical hacking
Introduction to cyber crime

- Introduction
- Cybercrime
- Cybercrime and information security
- Cybercriminals
- Classification of cyber crimes
- Cybercrime the legal perspective
- Cybercrime an Indian perspective

Cyber offences: How criminals plan them

- Introduction
- How criminals plan the attack
- Social Engineering
- Cyber stalking
- Cybercafé and cybercrimes
- Botnets: The fuel for cybercrime
- Cloud computing

Tools and methods used in Cybercrime

- Introduction
- Proxy servers and anonymizers
- Phishing
- Password checking
- Key loggers and spy waves
- Viruses and worms
- Trojan horses and balk doors
- Steganography
- DoS and DDoS attacks
- SQL injection
- Buffer overflow

Hacking Windows

- BIOS password
- Windows Login Password
- Changing windows Visuals
- Cleaning your tracks
- Internet Explorer Users
- Cookies
- Netscape Communicator
- The Registry
- Baby sitter programs
- Editing your Operating System by Editing Explorer.exe
- Description of .reg file
- Other system files

Network Hacking

- Telnet
- How do I connect to Remote Computers using Telnet?
- What exactly is an IP Address?
- Domain Name Systems or DNS
- Nslook Up
- Ports
- Port Scanning and Port Surfing
- Sockets and Ports
- Using Sockets
- Tracert
- Netstate
- Getting Information about a Domain
- Port 23
- FTP Port
- How to use the windows FTP Client?
- Different FTP Commands
- Common FTP Hacks

Web Hacking

- HTTP Torn Apart (Port 80)
- The Get Method
- The Post Method
- The Head Method
- Hacking from your Web Browser
- Post Dial Up Screen Hacking
- Making your Own Browser (HTML Applications)
- Removing Banners from Free ISPs
- Creating Your Own ‘Difficult To Detect’ Port Scanner
- How to make your own Key Logger
- Removing Banners from Free Web page Hosting Services
- Removing pap up banners
- Device drivers

Password Hacking

- Password: An Introduction
- Password cracking
- Cracking the Windows Login Password
- The Glide code
- Windows Screen Server password
- Internet Connection Password
- Windows NT Password
- Cracking Unix Password Files
- HTTP Basic Authentication
- BIOS Password
- Cracking other Passwords
- Remote Access Sharing Password Decoding Tutorial
- Breaking The DES algorithm
- Cracking Wingate password
- Cracking the ICQ password
- Cracking the Netzero Free ISP Dial up Password
- So how to crack the Netzero Dial up password?
- Cracking Cisco Router passwords
- Default Password
- Bypassing the dial up Server Password


- What is a Virus?
- Boot sector Viruses
- File or program Viruses
- Stealth Viruses
- Polymorphic Viruses
- Macro Viruses
- Blocking Direct Disc access
- Recognising Master Boot Record (MBR) Modifications
- Identifying unknown device drivers
- How do I make my virus?
- Macro viruses?
- Using assembly to create your own Virus
- How to modify virus so scan won’t catch it
- Simple Encryption Methods
- WIN-BUGSFIX.exe Explained
- The Love Bug Reference Section



  • Graduates in Science Technology
  • Graduates in Engineering and Mathematics
  • Also those pursuing PhD in the field of Science & Technology


INR 47,200/-

Please consult your Admission Counselor for flexi-EMI options


Please reach out to the admission office if you have any queries
100% Placement Assistance with Leading Corporates

Our placement assistance program offers students one-on-one career counselling, and the chance to work with our corporate partners.

What if I am unable to complete the course?

In case you drop out of the course due to a genuine reason, you will have 6 months’ time to return to it. If you fail to return to your course within this period, you will have to start afresh.

How will I pay for this course?

You can pay for the course of your interest on the website by clicking on the Fees tab via e-wallets, net banking, credit cards, debit cards as well as NEFT/Bank Transfer

What is the refund policy?

Refund must be claimed before the commencement of your batch. The Application form fees are non-refundable. Skillville will deduct 20% of the program fees paid till date of application for refund towards administrative charges and 80% will be refundable within 1 month from the approval of refund by a Skillville Authorized representative

What if you miss a class?

You will have an opportunity to catch up with a simultaneous batch in session or you can reach the respective Faculty to cover the missed class.

Whom should I contact in case of any purchase related query?

Please contact your Admission Counselor or drop an email regarding your querry to admissions@skillville.in.

Do I get a certificate of participation at the end of the training program?

Yes, you will get a certificate after completing your program after you meet the attendance and evaluation criteria set for your respective program.