Certificate Program in Ethical Hacking

Program Structure

Certificate Program in Ethical Hacking

Blended Learning | 6 Months (Inclusive of Project – 1 Month) | INR 47,200/-

Why Join Certificate Program in Ethical Hacking

Possess leadership & management skill with the best professional ethical hacking practices for social concern

Able to understand impact of Ethical hackingsolution in the context of society and environment with evidences and also demonstrate the need for developing sustainability

Skills To Be Mastered

Autopsy / Encrypted Disk Detector / Wireshark / Magnet RAM Capture / Network Miner / NMAP / Dumpzilla / Forensic Investigator / FAW

Program Structure

This Program is designed to train you with Penetration Testing as an act of intruding / penetrating into system or networks to find out threats and vulnerabilities in those systems which a malicious attacker may find and exploit leading to loss of data, finances or other major damages. The purpose of this program is to improve the security of the network or systems by fixing the vulnerabilities found during testing. You will get the conceptual understanding of using the same methods and tools used by malicious hackers but with the permission of the authorized person for the purpose of improving the security and defending the systems with the help of live case-studies.

Program Duration

6 Months (Inclusive of Project - 1 Month)

Mode Of Delivery

Blended Learning

Skillville Certificate

Certifications:

Vidyalankar and Skillville

Placements:

100% Placement assistance
Create profile, showcasing relevant skillsets
Aptitude, GD and Interview Training

Curriculum

6 Months certification in Ethical hacking

– Introduction
– Cybercrime
– Cybercrime and information security
– Cybercriminals
– Classification of cyber crimes
– Cybercrime the legal perspective
– Cybercrime an Indian perspective

– Introduction
– How criminals plan the attack
– Social Engineering
– Cyber stalking
– Cybercafé and cybercrimes
– Botnets: The fuel for cybercrime
– Cloud computing

– Introduction
– Proxy servers and anonymizers
– Phishing
– Password checking
– Key loggers and spy waves
– Viruses and worms
– Trojan horses and balk doors
– Steganography
– DoS and DDoS attacks
– SQL injection
– Buffer overflow

– BIOS password
– Windows Login Password
– Changing windows Visuals
– Cleaning your tracks
– Internet Explorer Users
– Cookies
– Netscape Communicator
– The Registry
– Baby sitter programs
– Editing your Operating System by Editing Explorer.exe
– Description of .reg file
– Other system files

– Telnet
– How do I connect to Remote Computers using Telnet?
– What exactly is an IP Address?
– Domain Name Systems or DNS
– Nslook Up
– Ports
– Port Scanning and Port Surfing
– Sockets and Ports
– Using Sockets
– PING
– Tracert
– Netstate
– Getting Information about a Domain
– Port 23
– FTP Port
– How to use the windows FTP Client?
– Different FTP Commands
– Common FTP Hacks

– HTTP Torn Apart (Port 80)
– The Get Method
– The Post Method
– The Head Method
– Hacking from your Web Browser
– Post Dial Up Screen Hacking
– Making your Own Browser (HTML Applications)
– Removing Banners from Free ISPs
– Creating Your Own ‘Difficult To Detect’ Port Scanner
– How to make your own Key Logger
– Removing Banners from Free Web page Hosting Services
– Removing pap up banners
– Device drivers

– Password: An Introduction
– Password cracking
– Cracking the Windows Login Password
– The Glide code
– Windows Screen Server password
– XOR
– Internet Connection Password
– Windows NT Password
– Cracking Unix Password Files
– HTTP Basic Authentication
– BIOS Password
– Cracking other Passwords
– Remote Access Sharing Password Decoding Tutorial
– Breaking The DES algorithm
– Cracking Wingate password
– Cracking the ICQ password
– Cracking the Netzero Free ISP Dial up Password
– So how to crack the Netzero Dial up password?
– Cracking Cisco Router passwords
– Default Password
– Bypassing the dial up Server Password

– What is a Virus?
– Boot sector Viruses
– File or program Viruses
– Stealth Viruses
– Polymorphic Viruses
– Macro Viruses
– Blocking Direct Disc access
– Recognising Master Boot Record (MBR) Modifications
– Identifying unknown device drivers
– How do I make my virus?
– Macro viruses?
– Using assembly to create your own Virus
– How to modify virus so scan won’t catch it
– Simple Encryption Methods
– WIN-BUGSFIX.exe Explained
– The Love Bug Reference Section

Admission Details

Eligibility

Graduates in Science Technology
Graduates in Engineering and Mathematics
Also those pursuing PhD in the field of Science & Technology

Fees Details: INR 47,200/-

Please consult your Admission Counselor for flexi-EMI options

Contact Us

Please reach out to the admission office if you have any queries

knowmore@skillville.in

Our placement assistance program offers students one-on-one career counselling, and the chance to work with our corporate partners.

In case you drop out of the course due to a genuine reason, you will have 6 months’ time to return to it. If you fail to return to your course within this period, you will have to start afresh.

You can pay for the course of your interest on the website by clicking on the Fees tab via e-wallets, net banking, credit cards, debit cards as well as NEFT/Bank Transfer.

Refund must be claimed before the commencement of your batch. The Application form fees are non-refundable. Skillville will deduct 20% of the program fees paid till date of application for refund towards administrative charges and 80% will be refundable within 1 month from the approval of refund by a Skillville Authorized representative.

You will have an opportunity to catch up with a simultaneous batch in session or you can reach the respective Faculty to cover the missed class.

Please contact your Admission Counselor or drop an email regarding your querry to admissions@skillville.in.

Yes, Certificate will comprise following certification bodies AIMA, AICTE, SAS.Learnt tools and technologies will be enlisted on the certificate of completion along with secured grade.

Layer 1
Login Categories