How to Hack - The Ethical Way

How to Hack - The Ethical Way


  • Two Day Entry Pass

    One person allowed with this ticket. Course Kit Included.

    Sale Date Ended

    INR 5000
    Sold Out
  • One Day Entry Pass

    Single Day Entry One Person. Course kit Not included.

    Sale Date Ended

    INR 2000
    Sold Out
  • Group Entry Two Day

    Three people allowed with this ticket.

    Sale Date Ended

    INR 13500
    Sold Out

Invite friends

Contact Us

Page Views : 776

About The Event

A Hands-on Workshop on hacking methodology from basic to Advanced level. Simplified concepts with practical demonstration would be the key approach.  This workshop covers all the majour modules for ethical hacking. 


Duration: 16 hrs

Instructor Led Offline Training 


Registrants can bring down their Laptops for Practical Use.


Freebies with the Course
- Course document
- Tools kit
- Course Videos
- Certificate


Targeted Learners
Students and Professionals who are willing to learn and passionate about Hacking and Security. Security professionals or beginners looking to enrich their skillset from a career perspective. 



TrainerSpeaker Background

Jose Vincent

Conducted more than 30+ different training sessions on various topics related to Cyber Security, Ethical Hacking, Linux and Network Security to an audience comprising Students, Corporate Executives, Entrepreneurs and Technical Specialists. He possesses an in-depth knowledge and insight into today's security risks and tomorrow’s potential threats.


Real Time Experience from last 16 years:
Consultant for Karbonn Mobiles, Saipem SPA - Dubai, Ultra Drytech Engineers-Mumbai,Telesys IT Solutions, Dubai.,Satyam Infoway ltd (Sify) ,Embee Software Pvt ltd.


Check out his Video


The Ethical Hacker Training introduces you to to the techniques used by malicious, black hat hackers with attention getting lectures and hands-on lab exercises. While these hacking skills can be used for malicious purposes, this class teaches you how to use the same hacking techniques to perform a white-hat, ethical hack, on your organization. You leave with the ability to quantitatively assess and measure threats to information assets; and discover where your organization is most vulnerable to hacking in this network security training course.

Course Outline

1.Introduction to Ethical Hacking
   Types of hackers, Need to Know Cyber Laws


2.Scanning Networks
   Network scanning techniques and scanning countermeasures


3.System Hacking
   System hacking methodology, steganography,steganalysis attacks, and covering tracks


4.Trojans and Backdoors
   Different types of Trojans, Trojan analysis, and Trojan countermeasures


5.Social Engineering
   Social Engineering techniques, identify theft,and social engineering countermeasures


6.Denial of Service
   DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures


7.Session Hijacking
   Session hijacking techniques and countermeasures


8.Hacking Webservers & Applications
   Different types of webserver attacks, Different types of web application attacks, web application hacking methodology and countermeasures


9.SQL Injection
   Attacks and injection detection tools


10.Hacking Wireless Networks
    Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi-fi security tools


11.Hacking Mobile Platforms
     Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines and tools


12.Evading IDS, Firewalls, and Honeypots
     Firewall, IDS and honeypot evasion techniques,evasion tools, and countermeasures


     Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools


14.Penetration Testing
     Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap



• 2014 US State of Cybercrime survey says that hackers are now more technologically advanced than those trying to stop them.
• India needs 4.7 lakh Cyber security professionals by 2015 for protection of IT Infrastructure in the country as well as to serve the export market.
• Information Security is today the top paying certification for 2014.

Please write to if you have questions.
Visit our Page:
Give us a Call: +91-810-500-0116/9035565475

Note: All entries are accepted with online payments. On spot entries will not be entertained.



Venue Map