Categories: Cyber Security
Wishlist Share
Share Course
Page Link
Share On Social Media
Popup Form Example

Add Suggestion

About Course

See Full Course Details

Schedule: MON – FRI 4 hours (Time: 9 AM to 1 PM & 2 PM to 6 PM ) |SAT/SUN 8 hours (9 AM to 6 PM)

What Will You Learn?

  • 1. **Introduction to Ethical Hacking**: Understand the principles, ethics, and legal considerations of ethical hacking.
  • 2. **Footprinting and Reconnaissance**: Gather information about target systems and networks using passive and active reconnaissance techniques.
  • 3. **Scanning and Enumeration**: Identify open ports, services, and vulnerabilities on target systems and enumerate system resources and users.
  • 4. **Vulnerability Assessment**: Assess vulnerabilities in systems and applications, prioritize them based on severity and impact.
  • 5. **Exploitation Techniques**: Exploit common security vulnerabilities to gain unauthorized access to target systems.
  • 6. **Password Cracking and Brute Forcing**: Crack passwords and bypass authentication mechanisms to gain access to systems and accounts.
  • 7. **Privilege Escalation**: Escalate privileges on target systems to gain higher levels of access.
  • 8. **Post-Exploitation Techniques**: Perform post-exploitation activities to maintain access and evade detection.
  • 9. **Wireless Hacking**: Exploit vulnerabilities in wireless networks to gain unauthorized access.
  • 10. **Web Application Hacking**: Identify and exploit vulnerabilities in web applications to gain access or extract sensitive information.
  • 11. **Social Engineering Attacks**: Conduct social engineering attacks to manipulate human behavior and bypass security controls.
  • 12. **Reporting and Documentation**: Document findings, vulnerabilities, and recommendations in comprehensive penetration test reports.

Course Modules


  • Understanding the elements of Information Security.
  • Understanding Information Security Attacks and Information warfare.
  • Overview of Cyber Kill Chain Methodology, TTP’s and IoC’s.
  • Overview Of Hacking Concepts, Types and Phases.
  • Understanding Ethical Hacking Concepts and its Scope
  • Overview of Information Security Control
  • Overview of Information Security Acts and Laws

Foot Printing



Vulnerability Analysis

DCEH Quiz-1

System Hacking

Malware Threats


Social Engineering

DCEH Quiz-2

Denial Of Service

Session Hijacking

Evading IDS, Firewalls, and Honeypots

Hacking Web Server

DCEH Quiz-3

Hacking Web Application

SQL Injection

Hacking Wireless Network

Hacking Mobile Platforms

DCEH Quiz-4

IoT and OT Hacking

Cloud Computing


DCEH Quiz-5

Final Quiz DCEH

Student Ratings & Reviews

No Review Yet
No Review Yet