CEH v7(Certified Ethical Hacking v7-Latest Version)

MIEL Academy
In New Delhi

Rs 35,000
You can also call the Study Centre
09310... More

Important information

Typology Certificate
Location New delhi
Class hours 40h
  • Certificate
  • New delhi
  • 40h

CEHv7 provides a comprehensive ethical hacking and network security-training program to meet the standards of highly skilled security professionals. Hundreds of SMEs and authors have contributed towards the content presented in the CEHv7 course ware. Latest tools and exploits uncovered from the underground community are featured in the new package. Begin by understanding how perimeter defenses work and then be lead into scanning and attacking own networks, no real network is harmed. Later learn how intruders escalate privileges and what steps can be taken to secure a system. Also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.
Suitable for: This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.


Where and when

Starts Location
On request
New Delhi
110119, Delhi, India
See map
Starts On request
New Delhi
110119, Delhi, India
See map

Frequent Asked Questions

· Requirements

MIEL is pleased to offer a comprehensive 5 day Certified Ethical Hacker Version 7 (CEH) training program. Course includes how to scan, test, hack and secure own systems. The lab intensive environment gives in-depth knowledge and practical experience with the current essential security systems.


There are no opinions on this course yet

Teachers and trainers (1)

Mr. Ghanshyam Bhagtani
Mr. Ghanshyam Bhagtani

The Global Award for BEST Authorised Training Centre (MIEL) The BEST INSTRUCTOR (Mr. Ghanshyam Bhagtani)

Course programme


    1. Introduction to Ethical Hacking
    2. Footprinting and Reconnaissance
    3. Scanning Networks
    4. Enumeration
    5. System Hacking
    6. Trojans and Backdoors
    7. Viruses and Worms
    8. Sniffers
    9. Social Engineering
    10. Denial of Service
    11. Session Hijacking
    12. Hacking Webservers
    13. Hacking Web Applications
    14. SQL Injection
    15. Hacking Wireless Networks
    16. Evading IDS, Firewalls and Honeypots
    17. Buffer Overflows
    18. Cryptography

    Penetration Testing

    Additional information

    Contact person: Megha Goyal

    Students that were interested in this course also looked at...
    See all