Certified Ethical Cracker Course MARCH 2016

Certified Ethical Cracker Course MARCH 2016


  • CEC01

    Certified Ethical Cracker Course Fee - 1 participant

    Sale Date Ended

    INR 15375
    Sold Out
  • CEC02

    Certified Ethical Cracker Course Fee - 2 participant

    Sale Date Ended

    INR 28700
    Sold Out
  • CEC03

    Certified Ethical Cracker Course Fee - 3 participant

    Sale Date Ended

    INR 39975
    Sold Out

Invite friends

Contact Us

Page Views : 52

About The Event


infySEC’s Certified Ethical Cracker Course is one of the most Advanced Ethical Hacking Course which delivers in-depth knowledge of real time attack vectors and defensive methods. This course has been designed by group of globally recognized Information Security Professionals to meet the participant and organization expectations. For easy understanding for the participants, LIVE practical demonstration has been added for all necessary topics.

This course delivers comprehensive deep understanding of how attacker’s works in dark and methodology they follow to deface a network. In other hand, how the Information Security Professionals working in an organization identifies these methodologies and deface attackers.

Benefits of CEC Course:

  • - LIVE practical demonstration on intense step by step attack vectors for all necessary topics.
  • - LIVE practical demonstration on identifying attacks and also defense.
  • - How to create code our own hacking and security tools.LIVE practical demonstration on effective usage of the tools.
  • - LIVE practical demonstration on Information Security Professional working in an organization identifies the attacks and how they respond.
  • - Live demonstration on how attacks, vulnerabilities and defensive method can be done Network layer to Application layer.
  • - LIVE Attack vectors demonstration covering various Operating system including Windows, etc.
  • - LIVE demonstration on how data can be recovered from the infected system and restore business systems.
  • - How Virus and worm works practically? and how to prevent them?
  • - Deep Dive sessions on how attacks happens and defensive methods in all the layers.
  • - How network packets can be sniffed and data can be changed on the fly in various networks.


Certified Ethical Cracker Topics:


1 Introduction to Ethical Cracking
2 Footprinting (Reconnaissance-Passive)
  • Types of Footprinting
  • Footprinting Tools and countermeasures
3 Enumeration (Reconnaissance - Active)
  • Enumeration Techniques
  • Enumeration Countermeasures
4 Network Scanning
  • Network Scanning Technique
  • Network Scanning Countermeasures
5 System Hacking Methodology
  • System Hacking Methodology
  • Steganography
  • Steganalysis Attacks
  • Covering Tracks
6 Malware Threats
  • Types of Trojans
  • Trojan Analysis
  • Trojan countermeasures
7 Virus and Worms
  • Working Of Viruses
  • Virus Analysis
  • Computer Worms
  • Malware
  • Analysis Procedure and Countermeasures
8 Sniffing
  • Packet Sniffing Techniques
  • How to defend against sniffing?
9 Denial of Service
  • DoS/DDoS Attack Techniques
  • Botnets
  • DDoS Attack Tools
  • DoS/DDoS Countermeasures
10 Session Hijacking Techniques
  • Session Hijacking Techniques
  • Session Hijacking Countermeasures
11 Servers Attacks - Web Server, File Server
  • Different Types of Webserver Attacks
  • Attack Methodology and Countermeasures
12 Cryptography
  • Different Types Of Web Application Attacks
  • Web Application
  • Hacking Methodology and Countermeasures
13 SQL Injection Attacks
  • SQL Injection Attacks
  • Injection Detection Tools
14 Wireless Networks Attacks
  • Wireless Encryption
  • Wireless Cracking Methodology
  • Wireless Cracking Tools
  • Wireless Security Tools
15 IDS, IPS, Firewalls and Honeypots
  • Firewall
  • Intrusion Detection System (IDS)
  • Honeypot Evasion Techniques
  • Evasion Tools
  • Countermeasures
16 Cloud Computing Techniques
  • Various Cloud Computing Concepts
  • Cloud Computing Threats
  • Cloud Computing Attacks
  • Security Techniques and Tools
17 Cryptography
  • Different Types Of Cryptography Ciphers
  • Public Key Infrastructure (PKI)
  • Cryptography Attacks
  • Cryptanalysis Tools
18 Social Engineering
  • Social Engineering Techniques
  • Identify Theft
  • Social Engineering Countermeasures
19 Vulnerability Assessment and Penetration Testing
  • Various types of penetration testing
  • Penetration Testing Roadmap
  • Security Audit
  • Vulnerability Assessment
20 Ethical Hacking As a Career In detailed discussion on Information Security Industry growth and its present career opportunities


LAB Access:

Certified Ethical Cracker LAB Access is an extreme Online Virtual Remote Lab provided to participants where they can work from any place at any point of time without restriction. CEC LAB was created in such a concept called “Learn with Fun” where each participant will face gaming-like structured online hacking program called 'CAPTURE THE FLAG' which contains many Levels relevant to the topics covered on the program. Each participant has to cross levels to face CEC exam, Hence CEC will only deliver equipped candidates. Participant have to cross multiple Levels starting with easy to toughest level. Each participant can track other participants activity live which helps each participants to get involved into Live Hacking Zone competition, Prepare to be SHOCKED, ENTERTAINED and EDUCATED all at the same time.


Upcoming Weekend Batch Dates:



Certified Ethical Cracker






4 Days



19th, 20th, 26th & 27th MARCH 2016



10:00 A.M to 5:00 P.M



Handbook, DVD, Online Exam & Certificate

LAB Access  


2 weeks Online Practical sessions  (Work from Home)


Note : Meraevent.com Online registration fee of 2.5% has been added in course fee.


For more details about CEC Certification Course, please contact:

Phone    : 044-42611142, 9840084496

Email Id : adhavan@infysec.com

Web Link : http://infysec.com/training/courses/certified-ethical-cracker

Venue Map