Learn the nuances of Ethical Hacking

Ethical Hacking is the process of breaking into an organization's IT networks and systems to test their weakness and vulnerabilities. There are five phases in hacking. They include reconnaissance, gaining access, enumeration, maintaining access, and covering tracks. Hackers use various hacking tools and techniques in each of these phases.

Ethical hackers conduct vulnerability assessment, risk assessment, penetration testing and system protection tests and fix security issues before they are exploited by hackers with malicious intent.



  • Introduction to Ethical Hacking, Information security threats and attack vectors, Hacking Terminologies, Concepts, Types and Phases, Ethical Hacking concepts and scope, Information Security controls

  • Footprinting  concepts  and  Objectives,  Footprinting  through  search  engines, Footprinting  through  social  networking  sites,  Website  footprinting,  Email footprinting

  • WHOIS  footprinting,  Network  footprinting,  DNS  footprinting,  Footprinting through social Engineering, Countermeasures

  • Overview of network scanning, Scanning Methodology, Check for live system

  • Check for open Ports, Banner Grabbing, Network diagrams, Countermeasures

  • Enumeration  concepts,  NetBIOS  Enumeration,  SNMP  Enumeration,  LDAP Enumeration

  • NTP Enumeration, SMTP and DNS Enumeration, Countermeasures

  • System Hacking Methodology, Gain Unauthorized Access, Escalating Privileges

  • Keylogger,   Executing   Applications,   Hiding   files,   Covering   Tracks, Countermeasures

  • Introduction to Malware, various malware and threat

  • Trojan Concepts, Virus, stages of virus and Worms, , Countermeasures

  • Sniffing Concepts, MAC Attacks, DHCP Attacks

  • Spoofing Attack, ARP poisoning, DNS Poisoning, Countermeasures

  • Social Engineering Concepts, Social Engineering Techniques

  • Impersonation on social Networking Sites, Identify Threat, Social engineering Countermeasures

  • DoS/DDoS Concepts, Dos/DDOs Attack Techniques, Botnets, Countermeasures

  • Session hijacking Concepts, Network Level Session Hijacking

  • Application Level Session Hijacking, Tools and Countermeasures

  • Web Server concepts, Attack Methodology, Web Server Attacks, Countermeasures

  • Web   Application   Concepts,   Web   App   Threat,   Hacking   Methodology, Countermeasures

  • SQL Injection concepts, SQL Injection Methodology, Types of SQL Injection

  • SQL Injection Tools, Evasion Techniques, Countermeasures

  • Wireless Concepts, Wireless Encryption, Wireless Threats

  • Wireless Hacking Methodology, Hacking Wireless Networks, Countermeasures

  • Mobile Platform Attack vectors, Hacking Mobile Platforms, Hacking Android OS

  • Mobile device Management, Mobile security guidelines, Countermeasures

  • IDS Firewall and Honeypot concepts, Evading IDS, Detecting Honeypots

  • Firewall and Honeypot solutions, Countermeasures

  • Introduction to cloud Computing, Cloud computing Threats

  • Cloud Computing Attacks, Cloud Security, Cloud Countermeasures

  • Cryptography concepts, Encryption Algorithms, Public Key Infrastructure (PKI), Disk Encryption, Cryptography Attacks, Countermeasures

  • Case study



    • Get trained through an ISO certified institute. Our course completion certificate and material are globally recognized. Skill based certification provided which will add value in resume


    • All our trainer are Certified in their Products. B2E certified Industry experienced faculty. They ensure students are benefited with in depth practical training.


    • LIVEWIRE is in association with 250+ corporates, who grab candidates from our centres when they match their job requirement. We offer all these opening to the students. They will be able to directly apply for the openings through our Student Portal.

  • Individual focus
  • Learn the required skill
  • We will guide you on one-mini project
  • Real time application training


  • Material for future reference

  • Internationally recognized Course Completion certificate

  • Skill based Certificate

  • Discounted price for future Upgrade trainings.

  • Best Guidance for your Career

Job opportunities

  • After the completion of this training one can aim at becoming

  • IT Security Specialist

  • IT Security Consultant

  • Penetration Tester

  • Computer Forensics Analyst

  • Intrusion Analyst

  • Infosec Analyst

  • Cyber Security Engineer

  • Computer Network Defense (CND) Analyst / Auditor

  • CND Infrastructure Support / Incident Responder

  • Businesses & Hiring Managers

  • Homeland Security Specialist

  • IT Auditor

  • Site Administrator

Ethical Hacking Pay Scale

Who can Enroll?
Graduates with basic computer skills and strong Knowledge in TCP/IP can benefit from the course and student/Professional concerned with secure programming and the integrity of the network infrastructure.

Request for Demo

Thanks! Message sent.