Certified Information Security and Ethical Hacker (CISEH)



Certified Information Security and Ethical Hacker (CISEH) certification is one of the most demanded certification by corporates worldwide. Designed by ethical hackers and security experts, the program covers all aspects of Ethical Hacking and Information Security which makes you an expert in the field of Information Security thereby bridging the gap between you and the market demands.

CISEH, the most sought-after information security certification is designed to reinforce the skills of the new generation of cyber sleuths!

With increasing use of the internet and concerns about its security, especially when it comes to things like consumer information or private details, there is considerable need for computer experts to work in ethical hacking field. Organizations today recognize the strong need for information security; hence an ethical hacker or security expert is usually employed by companies to penetrate into networks and/or computer systems, using the same methods as a hacker, for the purpose of finding and fixing network and computer security vulnerabilities.

Whether you are an amateur or professional, our Ethical Hacking and Information Security training will help you reach your ultimate goal to become most demanded IT Professional. Delivered by dynamic instructors, our Ethical Hacking training encompasses an interactive environment, various security tools and hands-on experience which ensures that each of the candidates is well prepared to deal with the ever-increasing range of threats to the corporate networks.

Anyone who wants to learn CISEH course should have the basic computer and internet knowledge. This CISEH training course covers all the 4 pillars of IT Security, which are as follows - Network Security, Email Security, Web Security and the most important Cyber Law.

CISEH is targeted towards those who are looking to build career in IT Security, IT Security Officers, IT Auditors, Network Security Administrators, System Administrators or anyone who wants ethical hacking as a profession.

It will be of 50 hours training sessions where trainer will be physically present in class or online to take sessions. Every session consist combination of both theoretical and practical stuffs with live demonstrations on realtime portals.

This training program will immerse the student into an interactive environment where they will be trained on how to use ethical hacking techniques to perform a white-hack activity and secure an organization.

This official CISEH course provides each participant with an in-depth knowledge to deploy latest tools and techniques needed to protect organization's networks and systems.

  • Implement real–world IT security techniques- Find vulnerabilities in an IT network
  • Identify and analyze organization's IT risks
  • Penetrate networks and computer systems
  • Apply IT security countermeasures
  • Investigate and mitigate security exposure
  • Develop an ongoing security strategy

The Certified Information Security and Ethical Hacker exam will be conducted after completion of the training which will assess and evaluate practical skills of a student. This CISEH certification will provide testament of your practical hacking skills in a real world environment. Students need to pass the online exam to receive CISEH certification.

In-house lab sessions with highly reputed and experienced professionals from IT security industry where learners can interact with the instructor face to face for optimal learning experience.

Online classes are conducted through LIVE video streaming, where learners can interact with the instructor by speaking, chatting and sharing screen, on a specific day and time and with a set duration.


  • Training      
  • Premier International Certification
  • Study Material
  • Course Resource Links
  • Basic Placement Assistance
1. Introduction To Ethical Hacking
  • Hacking v/s Ethical Hacking
  • Types of Hackers
  • Common Keywords
  • Ethical Hacking Phases
  • Virtualization
  • Installing and using Kali Linux on a Virtual Environment
  • Basic Linux Commands
2. Ethics Of Ethical Hackers
  • Security Policies
  • Consultancy
  • Transparency
  • Information Sensitivity
  • Anonymity
  • Reporting
  • Career in Ethical Hacking
3. Reconnaissance
  • Introduction
  • Goals of Footprinting
  • Types of Footprinting
  • Methods & Techniques
  • Google Dorks
  • Shodan Dorks
  • DNS Enumeration
  • Reverse IP lookup
4. Network Security
  • Overview
  • Domain Bifurcation
  • IPv4 & Ipv6
  • Protocols (TCP/UDP)
  • Types of Ports
  • Port Scanning
  • Ping Sweeping Resources
  • Nmap-Zenmap
  • Firewall Detection using Nmap
  • Nessus Introduction
  • Countermeasures

    Practice Session / Quiz 1

5. Email Security
  • Types of Email Ids
  • Email Protocols
  • Email Spoofing
  • Analyzing Email Headers
  • Whitelisting & Blacklisting of Email
  • Countermeasures
6. Anonymity
  • Introduction
  • Staying Anonymous
  • Proxy Introduction
  • Web Proxy
  • IP Proxy
  • Browser Extensions & Add-ons
  • Virtual Private Network (VPN)
  • Proxy Bouncing
  • Internet Classification
  • MAC Spoofing
  • DarkNet / Dark Web & Deep Web
  • TOR
7. Password Security
  • Introduction
  • Password Cracking Techniques
  • Dictionary Based Attacks
  • Brute Force Attack
  • Countermeasures
8. Malware Threats
  • Introduction
  • Types of Malware
  • Common Malware Distribution Methodologies
  • Exploit Kits
  • FUD Testing
  • VIRUS Designing using BATCH Script
  • Trojan Hunters
  • Impacts of RAT on System
  • Countermeasures

    Practice Session / Quiz 2

9. Sniffing
  • Concept
  • Types
  • Vulnerable Protocols
  • Sniffing Toolkit
  • Sniffing Detection
  • Countermeasures
10. Wireless Security
  • Concept
  • Wireless Encryption Techniques
  • Wireless Networks Threats
  • Methodologies
  • Resources to Penetrate Wireless Networks
  • Resources for Wireless Security
  • WiFiSlax OS
  • Countermeasures
11. Website Security
  • Introduction to Web APP
  • Finding Information using Google Dorks
  • Introduction to OWASP TOP 10
  • Ways to Penetrate a Website
  • SQL Injection Attacks
  • HTML Injection Basics

    Lab Setup & Quiz 3

12. Social Engineering
  • Concepts of Social Engineering
  • Methodologies for Social Engineering
  • Impersonating on Social Media
  • Identity Theft
  • Securing your Facebook/Gmail Account
  • Countermeasures
13. Phishing Security
  • Introduction
  • Types of Phishing
  • Anti-Phishing & Reporting Methods
  • Countermeasures
14. Common Types Of Cyber Attacks
  • DOS and DDOS Attacks
  • Zero-day Attacks
  • Windows User Authentication Bypass
  • Linux User Authentication Bypass
  • Countermeasures
15. Deception Technology
  • Honeypot & Decoy
  • IDS & IPS
  • Firewalls
  • Network Level Access
  • Port Management
16. Mobile Phone Security
  • Introduction
  • Android Malware
  • Android Device Tracking Resources
  • Android Malware Analysis
  • Mobile Security Guidelines and Resources
  • Countermeasures


17. Cryptography
  • Concepts
  • Encryption Algorithms
  • Resources
  • Attacks
  • Cryptanalysis Resources
  • Steganography
  • Steganalysis
18. Basics Of Iot
  • Benefits and Applications
  • Issues with IoT
  • IoT Attack Surface
  • OWASP Top 10
19. Cyber Crime Cases & Reporting
  • Phishing
  • Financial Crime
  • Social Media Crime
  • Sale of Illegal Article
  • Online Gambling
  • Malware Websites
  • Intellectual Property Theft
  • Cyber Pornography
  • Data Diddling
  • Website Attacks
20. Cyber Law & International Standards
  • Cyber law and Cyber Space
  • IT Act 2000 and its Amendments
  • IPC Sections for CyberCrimes
  • CERT-In and DOT
  • Trademark and Copyright Infringement
  • Introduction to CSIRT
  • ISO/IEC 27001
  • Introduction to ISMS
  • GDPR
  • DMCA

Capture the Flag & Quiz 4

Bonus Lecture: Being the Right Fit

  • Placement Assistance
  • Interview Guidelines
  • Know your Mindset
  • Boosting your profile on LinkedIn
  • Self-care at Work










₹ 18000

inclusive taxes*

Get In Touch

Get In Touch