Ethical Hacking Workshop copy

Ethical Hacking Workshop copy


Invite friends

Contact Us

Page Views : 13

About The Event

Ethical Hacking Workshop

Ethical Hacking: Do You Think That Your Facebook Password's Are Safe? How Do You Know If The Transactions That You Do Are Safe Or Not? What If Someone Is Monitoring Your Gmail Accounts? What Are You Going To Do Then? Have You Ever Thought About It? Well No Need To Worry!!!

Enter Into The World Of Hacking As Ethical Hackers.

Workshop Highlights

Be White Hat Hacker

Learn from the basics of Ethical Hacking

Learn to use Backtrack (Linux based Penetration Testing OS)

Live demonstrations of Various hacking tricks

Authorized Ethical Hacking Certification

We are successfully organized more than 500 workshops across India



Session 1

 Ethics and Hacking

Hacking History- How It All Began

Need For Ethical Hacking

Why We Require Ethical Hackers

Types Of Hackers

Steps In Ethical Hacking

Scopes In Hacking


Windows Hacking


  • To exploit the vulnerabilities of windows using live devices and Universal Serial Bus (USB).
  • What is Steganography?
  • Hiding data behind Images, PDFs, Audio and Videos files

Session 2

 Basics Of Internet, Networking And Hacking
  • What is a Network?
  • Types of network – LANs, WANs & WLANs
  • What is Internet?
  • Basic Structure
  • What is a Server?
  • What is an IP Address?
  • What is a domain name?
  • IP-Domain Relation
  • Client-Server Relationship Model
  • Internet networking
  • Set up Ad-hoc networks
  • Basic explanation of exploitation of loopholes

Ethical Hacking Workshop mainly focuses on the students eager to be a White Hat Hacker. It features a brief introduction to the world of hacking starting with the importance of ethical hackers and their need in today's world scenario, including to the basics that will help you have a deep understanding of the working of internet.

Later, windows hacking using various methods will be introduced and in the module of steganography you will learn how to hide files in other files in order to protect sensitive data. After the end of the aforementioned module you will be learning phishing in which you will be taught How to hack Facebook Accounts and Gmail Accounts and thus how to avoid it.

In the end you will gain knowledge about the basics of Backtrack 5 and the concept of man in the middle attack (MITM ATTACK).


Venue Map