Ethical Hacking Training Institute in Delhi

A DOISS Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems
Foto


DOISS Certified Ethical Hacker (DCEH )

Duration 20 Days - Regular

Target Audience – Students, Job Seekers

Prerequisites – Desire to explore and learn new things with basic computer knowledge


About DCEH Certification

A DOISS Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). Of all the ethical hacking institutes and courses in Delhi NCR and Lakshmi Nagar as well, DOISS has proven to give remarkable success rate in this domain. The DCEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

The Purpose of the DCEH

This course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out of the door with ethical hacking skills that are highly in demand, as well as hardcore practical knowledge and hands on experience.

Note: Having a laptop is an additional advantage for you to practice maximum time.


Course Description

Module I

Introduction
  • Introduction to Computer
  • Introduction to Networking
  • Introduction to OS
  • Introduction to Registry
  • Introduction to Memory Execution
  • Introduction to Command Line Interface
  • Introduction to Client & Server Side Technology

Module II

Network Basics
  • Topologies
  • Types of Networks
  • Networking Devices
  • OSI & TCP/IP Models
  • Protocols Concepts
  • System Ports
  • Firewalls, IDS & IPS
  • Networking Lab Session

Module III

Basics of Hacking
  • History of Hacking
  • Types of Hackers
  • Qualities of a Hacker
  • Terminology
  • What is Virus-Trojan-Worm
  • Basic Tricks & Hacks of Windows
  • New Trends of Hacking
  • What is Deep Web
  • Written Examination

Module IV

Enter the Cyber Warfare with Kali Linux 2.0
  • Why Kali Linux
  • Understanding Kali Linux
  • Various Installation Techniques
  • Being friendly with Kali Linux
  • Getting Started
  • Digging Deeper
  • Troubleshooting
  • Useful tips and tricks

Module V

Hacking Concepts
  • Hacking Methodology
  • CIA Model
  • Security Life Cycle
  • Anonymity
  • Information Gathering
    • 1. Social Engineering
    • 2. Network Mapping
    • 3. Network Asset Discovery
  • Assessment
    • 1. Application Security Scanning
    • 2. Network Security Scanning
    • 3. Mobile Application Security Scanning
  • Exploitation
    • 1. Hacking Network Devices
    • 2. Hacking Web Application
  • Post Exploitation
  • WIFI Cracking - Phishing - Sniffing - Password Cracking - Malware Making
  • Capture The Flag Challenges
  • Examination - Duration: 2 Hours
  • Interview

We Provide Security Services That Matches Your Needs & Your Budget !

Protecting your peace of mind.

contact us for a competitive price