Certified Ethical Hacker

MIEL Academy
In New Delhi

Price on request
You can also call the Study Centre
09310... More

Important information

Typology Certificate
Location New delhi
Duration 5 Days
  • Certificate
  • New delhi
  • Duration:
    5 Days

Well organized DVD-ROM content; a repository of approximately 20GB of latest hacking and security tools and more than 1000 minutes of videos demonstrating hacking techniques. Exclusive section for countermeasures against different attacks with detailed explanation of how to implement these countermeasures in real time environment. The new version has complete section dedicated for penetration testing. It illustrates how to implement learned concepts to test network system security.
Suitable for: security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.


Where and when

Starts Location
On request
New Delhi
110119, Delhi, India
See map
Starts On request
New Delhi
110119, Delhi, India
See map


Anonymus xyz
What I would highlight I attended the session conducted by MIEL in the month of January 2011in Gurgaon. I am a B Tech final year student and at that time, Mr. Ghanshyam Bhagtani was the instructor. I amazed with the over all knowledge of the trainer as well as the service in terms of co-ordination provided by MIEL. Now I am planning to go ahead with ECSA LPT because MIEL agve me a new way towards Information Security. Thanks MIEL

Would you recommend this course? Yes.

Teachers and trainers (2)

MIEL Instructor MIEL Instructor
MIEL Instructor MIEL Instructor
MIEL Instructor

Mr. Ghanshyam Bhagtani
Mr. Ghanshyam Bhagtani

The Global Award for BEST Authorised Training Centre (MIEL) The BEST INSTRUCTOR (Mr. Ghanshyam Bhagtani)

Course programme

1. Introduction to Ethical Hacking 2. Footprinting and Reconnaissance 3. Scanning Networks 4. Enumeration 5. System Hacking 6. Trojans and Backdoors 7. Viruses and Worms 8. Sniffers 9. Social Engineering 10. Denial of Service 11. Session Hijacking 12. Hacking Webservers 13. Hacking Web Applications 14. SQL Injection 15. Hacking Wireless Networks 16. Evading IDS, Firewalls and Honeypots 17. Buffer Overflows 18. Cryptography 19. Penetration Testing

Students that were interested in this course also looked at...
See all