Indian Institute of Ethical hacking is the best hacking University in India, located in Chandigarh .In India, there are multiple universities for hacking but the Indian Institute of Ethical hacking is the best hacking university in India. This great institution provides multiple modules in order to secure your privacy and data .
Major modules are as under :-
Module 1
Introduction to Ethical Hacking
• Information Security Overview
• Information Security Threats and Attack
• Hacking Concepts
• White Hat Hacker
• Grey Hat Hacker
• Black Hat Hacker
• Information Security Controls
• Penetration Testing Concepts
• Cyber Laws and Standards
Module 2
Footprinting and Reconnaissance
• Footprinting Concepts
• Footprinting through Automated Tools
• Footprinting through Web Services
• Footprinting through Social networking Sites
• Footprinting through Manual Tools
• Website Footprinting
• Email Footprinting
• Competitive Intelligence
• Footprinting through Whois
• DNS Footprinting
• Network Footprinting
• Footprinting through Social Engineering
• Footprinting Tools
• Footprinting Penetration Testing
Module 3
Scanning Networks
• Network Scanning Concepts
• Scanning Tools
• Scanning Techniques
• Scanning Beyond IDS and Firewall
• Draw Network Diagram
• Scanning Pen Testing
• Port Scanning
Module 4
Enumeration
• Enumeration Concepts
• NetBIOS Enumeration
• SNAP Enumeration
• LDP Enumeration
• SMTP and DNS Enumeration
• Enumeration Pen Testing
Module 5
Vulnerability Analysis
• Vulnerability Assessment Concepts
• Vulnerability Assessment Solutions
• Vulnerability Scoring System
• Vulnerability Tools
• Vulnerability Assessment Reports
Module 6
System Hacking
• System Hacking Concepts
• Cracking Passwords
• Escalating Privileges
• Executing Applications
• Hiding Files
• Converting Tracks
• Penetration Testing
Module 7
Sniffing
• Sniffing Concepts
• Sniffing Techniques :MAC Attacks
• Sniffing Techniques :DHCP Attacks
• Sniffing Techniques :ARP Attacks
• Sniffing Techniques :Spoffing Attacks
• Sniffing Techniques :DNS Poisoning
• Sniffing Tools
• Countermeasures
• Sniffing Detection Techniques
• Sniffing Pen Testing
Module 9
Social Engineering
• Social Engineering Concepts
• Social Engineering Techniques
• Insider Threats
• Impersonations on Social Networking Sites
• Identity Theft
• Countermeasure
• Social Engineering Pen Testing
Module 10
Denial-of-Services
• DoS/DDoS Concepts
• Dos/DDoS Attack Techniques
• Botnets
• DDos Case Study
• DoS/DDoS Attack Tools
• Countermeasures
• Dos/DDoS Protection Tools
• DoS/DDoS Penetration Testing
Module 11
Session Hijacking
• Session Hijacking Concepts
• Application Level Session Hijacking
• Network level Session Hijacking
• Session Hijacking Tools
• Countermeasures
• Penetration Testing
Module 12
Evading IDS, Firewall, and Honeypots
• IDS, Firewall and Honeypot Concepts
• IDS, Firewall and Honeypot Solutions
• Evading IDS
• IDS, Firewall Evading Tools
• Detecting Honeypots
• IDS, Firewall Evasion Countermeasures
• Penetration Testing
Module 13
Hacking Web Server
• Web Server Concept
• Web Server Attacks
• Web Server Attacks Methodology
• Web Server Attack Tools
• Countermeasures
• Patch Management
• Web Server Security Tools
• Web Server Penetration Testing
Module 14
Hacking Web Application
• Web Application Concepts
• Web Application Threats
• Hacking Methodology
• Web Application Hacking Tools
• Countermeasures
• Web Application Security Testing Tools
• Web Application Penetration Testing
Module 15
SQL Injection
• SQL Injection Concepts
• Types of SQL Injection Attack
• SQL Injection Methodology
• SQL Injection Tools
• Evasion Techniques
• Countermeasures
Module 16
Hacking Wireless Networking
• Wireless Concepts
• Wireless Encryption
• Wireless Threats
• Wireless Hacking Methodology
• Wireless Hacking Tools
• Bluetooth Hacking
• Wireless Security Tools
• Wireless Penetration Testing
Module 17
Hacking Mobile Platforms
• Mobile Platform Attack Vectors
• Hacking Android OS
• Hacking iOS
• Mobile Spyware
• Mobile Device Management
• Mobile Security Guidelines and Tools
• Mobile Pen Testing
Module 18
Auditing
• Introducing Auditing
• Types of Auditing
• ISO 9001
• ISO 27001
• PCIDSS
Module 19
Digital Forensics And Incident Response
• Introducing to Digital Forensics
• Criminal Digital Forensics
• Corporate Digital Forensics
• Understanding Registry Hives
• Forensics Tools
These 19 Modules + Practical labs can change your skills to master level. In these modules we learn basics of Linux, basics networking, Network Security, Web Security, Server Security, Auditing, Cyber Laws, and Digital Forensics. You are search a best hacking university in India our Indian institute of ethical hacking is the best institution over the India. We provide both options for classes offline and online. As per your convenience you can join online or offline.
So, are you interested to join our course?
Please do visit at the below mentioned address.
IIOEH
F5-015, TDI Business Centre, Sector-118, Mohali City
Chandigarh-140301
The topics which are being taught by them in the CEH (certified ethical hacker) covers web application security, network security and server security. These topics are taught by the highly qualified faculty, and there main focus is to practice it on live environment. CISE (certified information security expert) cover all the topics of CEH with the addition of OS security, Digital forensics and Compliance & Auditing. In one year diploma course Malware analysis, reverse engineering is also added to the CISE, or you can simply take the advanced courses if you have good knowledge about it. In advance training you can avail CWAP (certified web application penetration tester) to know how penetration testing of a web app is done or simply you can go for CMA (certified malware analyst) where you can deal with malware analysis in detail. They have online class facility for the distant students and working professionals.
For more details you can simply search for Indian Institute of Ethical Hacking or to know about the modules in deep then click here for a redirection to their website.