Ethical Hacking
Ethical Hacking

Ethical hacking and ethical hacker are terms used to describe hacking performed by a company or individual to help identify potential threats on a computer or network. An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers. This information is then used by the organization to improve the system security, in an effort to minimize or eliminate any potential attacks.

Ethical Hacking Course Is Covered In Two Parts
Saisoftlabs Certified Ethical Hacker

Course Duration : 40 Hours
Timings : 4 Hours Every Sunday
Course Fees : Rs. 12,000/-

Course Syllabus
  • 1. Introduction to Ethical Hacking
  • 2. Basics of Network & Web Technology
  • 3. Foot printing and Reconnaissance
  • 4. Email attacks & Security
  • 5. Scanning Networks
  • 6. Enumeration
  • 7. System Hacking
  • 8. Malware Threats
  • 9. Evading IDS, Firewalls and Honeypots
  • 10. Sniffing
  • 11. Social Engineering
  • 12. Denial of Service
  • 13. Session Hijacking
  • 14. Hacking Web servers
  • 15. Hacking Web Applications
  • 16. SQL Injection
  • 17. Hacking Wireless Networks
  • 18. Hacking Mobile Platforms
  • 19. Cloud Computing
  • 20. Cryptography
Saisoftlabs Certified Proffesional Hacker and Security Analyst

Course Duration : 40 Hours
Timings : 4 Hours Every Saturday
Course Fees : Rs. 15,000/-

Course Syllabus
  • 1. Security Analysis and Penetration Testing     Methodologies
  • 2. TCP IP Packet Analysi

  • 3. Pre-penetration Testing Steps
  • 4. Information Gathering Methodology

  • 5. Vulnerability Analysis

  • 6. External Network Penetration Testing
        Methodology
  • 7. Internal Network Penetration Testing
        Methodology
  • 8. Firewall Penetration Testing Methodology
  • 9. IDS Penetration Testing Methodology

  • 10. Web Application Penetration Testing       Methodology
  • 11. SQL Penetration Testing Methodology
  • 12. Database Penetration Testing
          Methodology
  • 13. Wireless Network Penetration Testing
          Methodology
  • 14. Mobile Devices Penetration Testing
          Methodology
  • 15. Cloud Penetration Testing
          Methodology
  • 16. Report Writing and Post Test Actions