About OSAcad

OSAcad

Ethical Hacking

Current Security Trends, Elements of Info Security, Info Security Threats and Attack Vector, Overview of Hacking concepts, Types & Phases, Ethical Hacking concepts & scope, and Overview of Info Sec controls, Penetration Testing and Info Sec Acts / Laws

Our Training Partners

Training Partners Training Partners Training Partners Training Partners

Key Features

  • Flexible Timings | Certified & Industry Experts Trainers
  • Experience the quality of our training
  • 24/7 Support | Hands-On Experience
  • Real-Time Use Cases | Q&A with Trainers
  • Customize Course Modules | Multiple Training Delivery Models
  • Small Batches | One to One training model
  • Job Support | Placement Assistance

Course Curriculum

CEH - Foundation Course
Current Security Trends, Elements of Info Security, Info Security Threats and Attack Vector, Overview of Hacking concepts, Types & Phases, Ethical Hacking concepts & scope, and Overview of Info Sec controls, Penetration Testing and Info Sec Acts / Laws
Information Gathering concepts, Foot printing through Search Engine, Web Services, Google Hacking Techniques & Social Networking Sites, and Understanding Website Foot printing, Email Foot printing, WHOIS, DNS, Network Foot printing, Foot printing Pen Testing and Understanding Different Foot printing Tools and counter measures
Network Scanning Concepts, Scanning Tools and Techniques, Banner Grabbing, Understanding Network Design, and Scanning Pen Testing
Enumeration Concepts, NetBIOS Enumeration, SNMP Enumeration, LDAP & NTP Enumeration, SMTP & DNS Enumeration, Other Enumerations like IPsec, VoIP, RPC & Linux/Unix and Enumeration Countermeasures
Vulnerability Management Life Cycle, Vulnerability Research & Classification, Types of Vulnerability assessment tools, Vulnerability Scoring System and Assessment Reports
System Hacking Methodology, Privilege Escalation Techniques, Techniques to create & maintain Remote Access to the System, Types of Rootkits, Techniques to Hide the Evidence of Compromise and Steganography & Steganalysis Techniques
Understanding Active Directory environment, Exploitation and Post Exploitation activities, Privilege Escalation and Understanding attacks like Kerberos attack, Dumping credentials, Pass the Hash, Pass the Token, DCShadow, Getting Golden Ticket, Dumping LSASS memory, SPN Discovery and etc.
Duration : 13 weeks
Price : Rs 25000 + 18% GST = 29,500
CEH - Intermediate
Social Engineering concepts & various techniques, Insider Threats, Identify Theft, Impersonation on Social Networking sites, Different Social Engineering countermeasures and Different Insider threats and Identify Theft countermeasures
Sniffing concepts, Understanding various Sniffing techniques & tools, How to defend against Sniffing techniques, Different techniques to detect sniffing and Sniffing countermeasures
Session Hijacking concepts, Application level Session Hijacking, Network level Session Hijacking, Session Hijacking Tools, and Different Session Hijacking countermeasures
DoS and DDoS Attacks, Understanding different DoS/DDoS Attack Techniques & tools, Techniques to detect DoS / DDoS Attacks, and Different Dos / DDoS countermeasures
Understanding Malware & Malware propagation techniques, Overview of Trojans, their types, & How it infect systems, Overview Computer Worms, Overview of Viruses, their types, & How it infect files, Malware analysis process, Techniques to detect malware and Different malware countermeasures
Understanding Web Server concepts, Attack methods, Attack Methodologies, Different types of attack tools & Security tools, Patch Management concepts, and Different Web Server attack countermeasures
Web App concepts, different types of threats, hacking methodologies, Web App hacking tools & Security tools, and Web App attack’s countermeasures
Duration : 13 weeks
Price : Rs 25000 + 18% GST = 29,500
CEH - Advance + Certification
SQL Injection concepts, types of attacks, types of injection methodologies, tools & techniques, Different IDS evasion techniques and SQL Injection countermeasures
Understanding IDS, Firewall & Honeypots concepts & solutions, techniques to bypass IDS & Firewalls, IDS / Firewall evading tools, techniques to detect Honeypots and IDS / Firewall evasion countermeasures
Wireless concepts, Wireless encryption algorithms, Understanding Wireless threats and hacking methodologies, Hacking tools & techniques and Wireless hacking countermeasures & Security tools
Understanding Mobile Platform attack vectors, Android threats & attacks, iOS threat & attacks, Mobile spyware, MDM, and Mobile Security Guidelines and tools
Understanding Cloud Computing concepts, threats, & attacks and Available Cloud Computing Security tools
Cryptography concepts, Encryption algorithms, Understanding PKI, Email encryption, Disk encryption & Cryptography attacks and Understanding tools of Cryptography & Cryptanalysis
IoT concepts, threats & attacks, IoT hacking methodologies, IoT Security tools and IoT Hacking tools & countermeasures
Duration : 13 weeks
Price : Rs 40000 + 18% GST = 47200

Tools Covered

Tools Covered Tools Covered Tools Covered Tools Covered Tools Covered Tools Covered Tools Covered Tools Covered

Certification

Our Cyber Security course covers all the topics that are required to clear Cyber Security certification. Trainer will share Cyber Security certification guide, Cyber Security certification sample questions, Cyber Security certification practice questions.

Certification

Our Hiring Partners

Hiring Partner Hiring Partner Hiring Partner Hiring Partner Hiring Partner Hiring Partner Hiring Partner Hiring Partner Hiring Partner

Testimonials

FAQ's

A Certified Ethical Hacker is a skilled professional who understands and knows how to look for vulnerabilities in target systems. A CEH certified individual uses the same tools as a malicious hacker, but in a lawful and legitimate manner.

Digital certificate will be available to download within 7-10 days of certification.

Currently, the Certified Ethical hacker (CEH) course is considered to be the best for individuals who wish to gain expertise in hacking technologies and information security laws and standards, and an in-depth understanding of vulnerabilities, malware and viruses. The course offers a number of career choices with lucrative salaries. Examples include Penetration Tester, Security Officers, Auditors and Site Administrators, among many others.

Cyber security is having multiple specialties, ideally one should start with Security+, CEH, ECSA, LPT, OSCP, and end up with CISSP, CISA, and CISM training in the same area. The Certification track will depend on areas of cybersecurity, such as Web Application, System and Network Security.

As a skill training one can do Cyber Security without a degree, but it is recommended to have one if one wants to make a professional career in this field.

Yes, one can do Cyber Security after 12th if he is 18+ years of age.

Programs

Kick start your Career In Ethical Hacking

Up-skilling to emerging technologies has become the need of the hour, with technological changes shaping the career landscape. We @OSACAD (Optimized Solutions Academy) offers programs in cyber security courses with industry experts to help you up-skill, stay relevant & get noticed.

Join Now
Call Us