Ethical Hacking Training in Chandigarh – Cyber Defence Intelligence




6 Months Ethical Hacking Training

Cyber Defence Intelligence is offering 6 Months Ethical Hacking Training to students and IT professionals. The name of the course is Certified Information Security Expert (CISE). This course has 6 different parts. The attendees will learn all the topics related to these specified course parts. The candidates will experience a detailed study of cyber security. The details are as given below:


1.Network Security

  • Basics of Linux
  • Basics of Network and Protocols
  • OS and Services Detection By Mastering Nmap Scanner
  • Scapy, Hping2, Hping 3 (Packet Crafting)
  • Network Firewall (Installation, Vulnerability Exploitation, Rule Sets, Security)
  • Metasploit
  • Network Vulnerability Scanning
  • Exploiting Network Vulnerabilities (Hacking into a network)
  • Taking Down a Server (Server Hacking)
  • Wi-Fi Hacking and Security
  • Possible Network Attacks and Countermeasures
  • Best Practices To Design a Secure Network



2.OS and Database Security

  • File System of Linux and Windows OS
  • Possible Cyber Threats to Linux and Windows OS
  • Security Techniques to Prevent Windows and Linux OS From Cyber Attacks
  • Remote OS Hacking
  • Best Practices to Design a Secure Windows Architecture
  • Windows Server Hardening
  • Linux Server Hardening



3.Web Application Security

  • Basic of Web Architecture
  • Data Tempering and Data Interception (BurpSuite)
  • OWASP Top 10 Attacks
  • SQL Injection Attack and Best Security Practices
  • XSS (Cross Site Scripting) Attack and Best Security Practices
  • Session Hijacking and Cookies Theft
  • Security Mis-configuration Vulnerabilities
  • CSRF Attack (Cross Site Request Forgery)
  • DOS Attack and Protection
  • Remote File Inclusion and Local File Inclusion Attack
  • Best Practices to Design a Secure Website and Database
  • Live Projects



4.Cyber Forensics

  • 6 A’s of Forensics & Chain of Custody
  • Collecting Digital Evidences of a Particular Case
  • USB and Browser Forensics
  • Disk Based Forensics
  • Memory Forensics
  • OS Forensics
  • Network Forensics
  • Digital Forensics
  • Disk Imaging (Encase & Volatility)




  • Basic Principles of Assessment & Auditing
  • IT Laws and ACTS
  • ISO 27001:2005 
  • Risk Assessment



6.Final Exam and Report Making

  • 3 Hours Final Exam
  • VAPT Report


For More Details Write US: Contact

Join Social Network of Ethical Hackers and Cyber Security Experts: Click Here