Certified Ethical Hacker

HB Education & Consulting Pvt Ltd
In Chennai

Rs 28,000
You can also call the Study Centre
98849... More

Important information

Typology Training
Level Beginner
Location Chennai
Class hours 40h
Duration 5 Days
Start Different dates available
  • Training
  • Beginner
  • Chennai
  • 40h
  • Duration:
    5 Days
  • Start:
    Different dates available

A Certified Ethical Hacker V8 is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker


Where and when

Starts Location
Different dates available
39/40, 1st Main Road, Gandhi Nagar, Adyar, Ch-20. , 600020, Tamil Nadu, India
See map
Starts Different dates available
39/40, 1st Main Road, Gandhi Nagar, Adyar, Ch-20. , 600020, Tamil Nadu, India
See map

Frequent Asked Questions

· What are the objectives of this course?

This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defences work and then be lead into scanning and attacking their own networks, no realnetworks is harmed. Students then learn how intruders escalate privilegesand what steps can be taken to secure a system.

What you'll learn on the course

Ethical Hacking
Hacking Security
Ec council
Information Security
Security Analysis

Teachers and trainers (1)

Revathy Dilli babu
Revathy Dilli babu
Technical Trainer

Course programme

Training Content
  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
  • Sniffers
  • Social Engineering
  • Denial of Services
  • Session Hijacking
  • Hacking Webservers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Evading IDS
  • Firewalls and Honeypots
  • Buffer Overflows
  • Mobile Application Platforms
  • Cryptography
  • Penetration Testing

Students that were interested in this course also looked at...
See all