Ethical Hacking

SevenMentor Training Pvt. Ltd.
In Pune

Rs 12,000
You can also call the Study Centre
77980... More

Important information

Typology Training
Level Beginner
Location Pune
Class hours 2h
Duration 45 Days
Start Different dates available
Internship Yes
  • Training
  • Beginner
  • Pune
  • 2h
  • Duration:
    45 Days
  • Start:
    Different dates available
  • Internship

The Certified Ethical Hacker program is the pinnacle of the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”. This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment.


Where and when

Starts Location Timetable
Different dates available
SevenMentor Training 21/A,1st floor,Shreenath Plaza,Dnyaneshwar Paduka Chowk,FC Road,Shivajinagar,Pune, 411 004, Maharashtra, India
See map
Monday to Friday 2pm-4pm
Starts Different dates available
SevenMentor Training 21/A,1st floor,Shreenath Plaza,Dnyaneshwar Paduka Chowk,FC Road,Shivajinagar,Pune, 411 004, Maharashtra, India
See map
Timetable Monday to Friday 2pm-4pm

Frequent Asked Questions

· What are the objectives of this course?

This is the worlds most advanced ethical hacking course with 18 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization. In 18 comprehensive modules, the course covers 270 attack technologies, commonly used by hackers.

What you'll learn on the course

Basic grammer
Basic Internet

Teachers and trainers (1)

Nisha Mandot
Nisha Mandot
Networking Trainer

Course programme

Introduction to Ethical Hacking
Footprinting, Scanning, and Enumeration
Hacking Web servers and Web applications
DoS, SQL injection, Buffer overflow attacks
Wireless hacking
Linux Hacking
Information Intelligence.
Organize Your Information
Google/Bing Hacking.
Hunting And Profiling People.
Gathering Email Accounts Sub domains/host.
Whois Lookup.
OS Info Hunting.
Uptime Info Hunting.
Webserver Info Hunting.
Traceroute Target IP Address.
TCP Port Scanning.
TCP SYN Port Scanning.
TCP ACK Firewall Scanning.
Finding Live Hosts.
UDP Sweeping And Probing.
Database Enumerating.
MySQL Server Enumerating.
DNS Enumerating.
SNMP Enumerating.
Password Attacks.
Advanced Web Server Fingerprinting.
Advanced Web Application Fingerprinting.
Advanced Web Application Firewall Fingerprinting.
Advanced OS Fingerprinting.
Attacking DHCP Servers.
Writing Virus Codes.
Writing Advance Backdoors for Windows.
Attacking Network Switches.
Attacking FTP Servers.
Advanced Social Engineering Attacks.
Advanced Cross Site Scripting attacks.
From Reflected XSS To Reverse Shell.
From Stored XSS To Reverse Shell.
Advanced File Handling Attacks.
From File Upload To Reverse Shell.
From Remote File Inclusion To Reverse Shell.
From Local File Inclusion To Reverse Shell.
From SQL Injection To Reverse Shell.
Advanced CSRF Attacks.
Session Hijacking Attacks.
What is a CAM Table.
What is a Botnet.
Advanced System Command Injection Attack.
Sniffing Network Passwords.
Sniffing HTTP Passwords.
Sniffing Ftp And Telnet Passwords.
Active sniffing.
Passive Sniffing.
Advanced Sniffing.
Sniffing Facebook Cookies.
Advanced SSL Sniffing.
Advanced Network Attacks.
From Man In The Middle Attack To Full Network.
Advanced Mobile Hacking Tactics.
Cryptography attacks
Attacking WEP Protected 802.11 Networks.
Attacking WPA/WPA2 Protected 802.11 Networks.
Attacking Apache Web Server.
Attacking IIS Web Server.
Buffer Overflow Attacks.
Advanced Stateful Packet Inspection Firewall Evasion And Bypassing.
Advanced Antivirus Detection Evasion And Bypassing.
Advanced Firewall Outbound/Inbound Rules Evasion And Bypassing.
Advanced Windows User Access Control (UAC) Evasion And Bypassing.
Vulnerability Vs Penteration Testing.
Introduction to CCNA Security

Students that were interested in this course also looked at...
See all