Certified Cyber Security Expert

In Ahmedabad

Rs 12,000
You can also call the Study Centre
97233... More

Important information

Typology Certificate
Location Ahmedabad
Class hours 80h
  • Certificate
  • Ahmedabad
  • 80h

Hands on Demonstration of Latest Hacking Techniques & tools. Hands on investigation Demonstration of various cases solved by Sunny Vaghela. Personal Interaction with highly experienced faculty. Hands on Practice Sessions. 100% Placement Assistance from TechDefence.
Suitable for: The course will significantly benefit Students, IT Professionals, Web Developers, Network engineers, System Administrators, Law Professionals, Banking & finance Sector Professionals.


Where and when

Starts Location
On request
A-805 Wallstreet 2,Opp Orient Club,Near Gujarat College, 380007, Gujarat, India
See map
Starts On request
A-805 Wallstreet 2,Opp Orient Club,Near Gujarat College, 380007, Gujarat, India
See map

Frequent Asked Questions

· Requirements


Course programme

Session 1: Cyber Ethics – Hacking introduction.
Session 2: Basic Networking Terminologies
Session 3: Information Gathering and foot-printing
Session 4: Scanning and Enumeration
Session 5: Trojans and Backdoors
Session 6: Virus and Worms
Session 7: Sniffers and keyloggers
Session 8: Phishing and its preventions
Session 9: System Hacking and Security
Session 10: Social Engineering and Honey pots
Session 11: Bots, Botnets and DoS
Session 12: Cryptography
Session 13: Google Hacking Databases
Session 14: SQL injection 1
Session 15: SQL injection 2
Session 16: Proxy servers and VPN’s
Session 17: Cross site Scripting ( XSS )
Session 18: Local File Inclusion / Remote File Inclusion ( LFI / RFI )
Session 19: Secure Coding practises
Session 20: Information Disclosure vulnerabilities

Session 21: Session Hijacking ( Side jacking )
Session 22: Hacking web servers
Session 23: Vulnerability Assessment and Penetration Testing ( VAPT )
Session 24: Assembly language basics
Session 25: Buffer Overflow attacks 1
Session 26: Buffer Overflow attacks 2
Session 27: Exploit writing
Session 28: Metasploit framework
Session 29: Reverse Engineering
Session 30: Firewalls, IDS and Evading IDS

Students that were interested in this course also looked at...
See all