i3indya™ Technologies presents Practical Training on Ethical Hacking & Cyber Security.

The rapid and dramatic advances in information technology (IT) in recent years have without question generated tremendous benefits. However, they have created significant and unprecedented risks to operations. Computer security has, in turn, become much more important as all levels of an organization to utilize information systems security measures to avoid data tampering, fraud, disruptions in critical operations, and inappropriate of sensitive information.

After the boom in Networking and Software jobs, the past two year have seen a sharp rise in the field of information security. Information Security and Ethical Hacking is the latest buzzword in the industry. In the past five years, the percentage of hacking crimes, data thefts, data losses, viruses and other cyber crimes have increased exponentially.

If you want to know how hackers are attacking your websites, emails, servers & computer remotely or how you can protect yourself or your organization from all these attacks then this is the right course for you.

iEHCS Training

Course Highlights

  • iEHCS (i3indya Ethical Hacking & Cyber Security)

  • Certificate of Completion by i3indya™ Technologies

  • Books & CD Free to each participant

  • 31 Topics Covered in 40 Days

Do This Course at Your Home

  • Yes! You can Do This Course at Your Home by purchasing our distance learning kit. Click Here

Training Modules

Module Topics Duration


Fundamental of Ethical Hacking

Hacking Vs. Ethical Hacking

Types of Hackers

Skill Profile of a Hacker

Some Famous Hackers and Groups

Cyber World

Advantage and Disadvantage of Cyber world

Cyber World as a Home of hackers

3 Hours


Overview of Cyber Law

Introduction To Cyber Law

Cyber Laws Indian

Technical Aspect Of Indian Cyber Law

IT ACT 2000 & 2008

Internet Crimes And Frauds

Cyber Law Cases In India

Organization Under Cyber Laws

Advantages Of Cyber Laws

2 Hours


Information Gathering

What Is Information Gathering & Why Hackers Need This?

Types Of Information Gathering

Information Gathering Using Websites

Information Gathering Using Software

Information Gathering Using Add-Ons

Search Engines- Smart Way Of Information Gathering

Scanning And Enumeration

Tracing - E-Mail, Mobile Phone, Intruder

5 Hours


Virtualization & System Cloning

Introduction Of Virtualization

Need & Use Of Virtualization


Installing OS On Virtual Machines

Networking In Virtual Machines

System Cloning


Other Tools For Virtualization

3 Hours


Windows Hacking & Security (Win 8 & Win 7)

Windows OS & Securit

Hacking Into System By Changing Passwords

Getting Access To System By Elevating Privileges

Finding Out The Passwords Of Windows

Bypassing The Windows Security

Hack from Guest to Admin

Password in Plain Text Directly

Hacking By USB Devices

Mitigation Of System Attacks

Setting Up A Secure System

5 Hours


Password Cracking Techniques

What is Password Cracking

Types of Password Cracking Techniques

How Different Password Crackers Work

Windows Password Cracking

FTP / Network Password Cracking

Zip/ RAR Password Cracking

Doc & PDF Password Cracking

Using GPU For Password Cracking

Password Security

3 Hours


Data Hiding Techniques

What Is Steganography

How Attacker Hides His Data In Images And Other Formats

How To Find Data Which Are Hidden

What Is Cryptography

Advanced Cryptography Tools

How Are Programs And Data Wrapped

Secure Measures To Protect Our Data

3 Hours


Hacking By Batch Programming & Scripting

Basics Of Scripting

Languages Used In Scripting

Writing Your First Program

Malacious Program Scripting

  • >>Process Killer
  • >>Firewall Killer
  • >>Antivirus Killer
  • >>System Killer

Session Hijacking Using Batch Scripting

Data Theft Using Batch Script

Automation Using Scripting

Designing Tools Using Scripting

Developing Security Tools Using Scripting.

3 Hours


Hacking by Viruses, Trojans, Keyloggers & Spywares

What is Trojan?

Trojans Attack Big Famous Cases

Types Of Trojans

Different way a Trojan Can Get Into A System

How We Create A Trojan and Control System

How Attacker Bypass Your Antivirus By Trojans

Analysis Of Trojans/Virus

How we remove Trojans Manually

Security Against Trojans

4 Hours


Malware Analysis & Fake Antivirus Detections

Introduction of Malware

Types of Malware

Common Malwares In Cyber

Types of Malware Analysis

  • >>Behavior Analysis
  • >>Code Analysis

Manual Malware Analysis

Tools for Malware Analysis


3 Hours


IDS, IPS and Honeypots

Overview of IDS, IPS & Honeypot

Use of IDS & IPSAssignment & Revision

Installation of IDS & IPS

Prevention & Detection

Honeypot & its Types

Implementation - Honeypots

Honeypot Tools

3 Hours


Proxy Server & Virtual Private Network (VPN) Technology

Proxy And Types Of Proxies

Why Hackers Use Proxy?

How To Hide IP Address While Chatting

How To Open Block Website In College/Companies

Convert Your Machine As Proxy Server With HTTPS Proxy

Advantage And Disadvantage Of Proxy

Analyzing Proxy Bug

How Proxy Hack Your Passwords Etc

What Is Better Than Proxy

What Is VPN?

Why We Use VPN

Advantage & Disadvantage Of VPN

Free VPN


3 Hours


Google Database Hacking

Introduction And Working Of Search Engines

List Of Common Search Engines On Web

Comparing And Choosing Best Search Engine

Dorks For Hacking Search Engines

Tools For Search Engines Hacking

Web Ripping

Finding Admin Pages And Weakness In Site

Security Against Search Engine Hacking

3 Hours

Module Topics Duration


Covered in iEHCS Advance Module 1.1

45 Hours


Email Hacking & Security Issues

World Famous Big Email Hacking Cases

IIT Bombay Alumni, Anil Ambani, Rahul, Gandhi, Facebook CEO Mark Zuckerberg (Case Study)

Analysis Email Attacks (Live Demo) Manually & Automatic

Cookies Stealing (Session Hijacking) of All Big Mail Servers

Phishing Attacks ( Normal & Advanced )

Tab Nabbing Attack

Social Engineering Attack

Analyzing the Vulnerabilities of Email Servers

Analyzing Fake & Real Profiles & Email Accounts

Fake Mailing Attack

Email & Fake Profile Tracing

Hacker Email Backdoor Installing Technique For Future Access

Email Password Stealing By Plugins, Extensions Etc.

Email Hacking By Keylogger, Spywares & Malicious Softwares


6 Hours


Facebook Hacking, Security & Forensic

World Famous Big Facebook Hacking Cases

Cookies Stealing of Facebook Accounts

Facebook Phishing Attacks

Facebook Tab Nabbing Attack

Facebook Social Engineering Attack

Analyzing Fake & Real Profile of Facebook

Delete Spam Messages on Facebook

Facebook Fake Messaging Attack

Facebook Tracing Method Techniques (Basic & Advanced)

Facebook Backdoor Installing Technique For Future Access

Facebook Password Stealing By Plugins, Extensions Etc.

How to find if your Facebook Account has been hacked or not

Facebook Account security with Email & SMS Notifications

How to Hack Password using Facebook Hacker

Hack Facebook account password with key logger

Facebook Security & Forensics

6 Hours


Clickjacking & Tabnabbing Attacks

What Is Clickjacking

How Does A Clickjacking Work

Facebook Likejacking

How Hacker Use Clickjacking

Execution Of Malicious Code Into Machine

Possibilities Of Clickjacking

Clickjacking Killer - The IFRAME Buster

How Protect From Being Clickjacked

3 Hours


Advanced Methodology for Privacy on Internet

Staying Safe in the Internet

  • >>Browser Settings
  • >>Using Add-ons & Plug-ins

Email Privacy

Malicious Link Security

  • >>Behavior Based
  • >>Code Based

Website Visit Privacy

Block Malicious Contents On Web

Antivirus Privacy

Automatic analyzing of Malicious Links

Internet Privacy Tools

3 Hours


Social Engineering

Introduction to Social Engineering

Types of Social Engineering

  • >>Tools Based
  • >>Manually

World's Biggest Social Engineering Cases

Web based Social Engineering

Vulnerability in Social Engineering

Analyzing a Social Engineering Attack

Security against Social Engineering

3 Hours


Android Hacking, Security & Forensics

Introduction to Android

Android OS Structure

Overview of Android Apps

Android Rooting

Application Cracking of Android

Cracking PIN of Android Devices

Pattern Unlock Cracking

Android Security

Android Forensics


5 Hours


Credit Card Frauds & Cases

Introduction of Plastic Money

Some Big Credit Card Cases Solved by i3indya Team

Type of Credit Card

Hacker's Credit card Theft Techniques

Online & Offline Credit Card Generators

Vulnerability In Credit Card & Payment Gateway

Big Credit Card Fraud Website on Internet

Detection of Credit Card Fraud

Security Against Credit Card Fraud


3 Hours


Website & Database Hacking Attacks

Introduction of Websites & Database

Authentication Process Of Web Application

Attack on Website & Web Application

SQL Injection Attacks

PHP Injection Attacks

Java Script Injection

Scripting Attacks

RFI & LFI Attacks


6 Hours


Web Server Hacking & Security

Introduction of Webserver

Types of Webserver

Setting up a Webserver

  • >>Locally
  • >>Remotely
  • >>Hosting C-Panel & Other Panels
  • >>Database Configuration

Webserver Exploits

  • >>Public Exploits
  • >>Private Exploits

Shell ( Control Panel ) Designing & Uploading

Web Server Routing

Backdoor Installation on Server

Server Passwords Hacking

Web Server Security Against Attacks

3 Hours


Vulnerability Assessment & Penetration Testing Tools & Methodologies

What is VA & PT

Difference between VA & PT

Need of VA & PT

Penetration Testing Methodology

Types of Penetration Testing

Scope of Pen-testing

Why Penetration Testing

Manual VA-PT

Tool Based VA-PT

Reporting a VA-PT

Available VA-PT Platforms

Closed Source Platform

Open Source Platforms

Benefits of Open Source Over Closed Source

Backtrack - VA-PT

Bugtraq - VA-PT

Some Other Recommended VA-PT Tools

5 Hours


Wireless Hacking & Countermeasures

Wireless Standards

Common Vulnerabilities in Wireless Devices

Encryption Standards Used in Wi-Fi

WEP Cracking

WPA/WPA2 Cracking

WPS Cracking


4 Hours

Exam – Theory & Practical

Module Topics Duration


Covered in iEHCS Advance Module 1.1 + 1.2

90 Hours


Linux Hacking & Security

Introduction To Linux OS

Installation, Configuration & Maintenance

Resetting Your Linux Password

Grub Password Hacking

FTP & SSH Password Cracking

Security Against Files

Security Against Linux Systems

IP Table Configuration ( Advanced )

OS Hardening


6 Hours


Macintosh Hacking & Forensic

Introduction of Mac

Architecture of Mac

Mac Password Cracking without any tool.

Mac Password cracking with tool.

Installing Backdoor in Mac

Data Recovery in Mac

Securing Mac System

5 Hours


Switch & Router Devices Hacking

Introduction to Switch & Router

Vulnerabilities in Switch & Router

Exploiting Switch & Router Vulnerability

Switch & Router Password Cracking With & Without Tool

Backdoor Installation

Securing Switch & Router

3 Hours


Network Security & Hacking

Introduction To Networks ( LAN /WAN )

Understanding Communication Protocols

Sniffing Attacks

DOS & DDOS Attack


Firewall Configuration & Maintenance

Network Monitoring & Analysis.

Logs Maintenance

3 Hours


Cyber Forensics Investigations & Evidence Recovery

Introduction to Forensics

Incidence Response and Computer Forensic

Windows Live Response

Linux Live Response

Web Browser Forensics

Network Forensic

Disk Imagingv

Data Recovery Using Tools

Forensic Analysis & Chain of Custody Form

6 Hours


Audio, Video & Image Forensics

Introduction to File formats

Analyzing Files

Detecting Modified Files

Extract Hidden Data from Files

Audio & Video Enhancement

Integrity Checking

2 Hours


Cyber Crime Investigation

Introduction of Cyber Crime

Need of Cyber Crime Investigation in Cyber World

Types of Cyber Crime

»Online Crime investigation

»Offline Crime Investigation

Solving Different Cyber Cases

»Email Hacking Case

»System Hacking Cases

»Credit Card Cases

»Privacy & Data Theft Cases

»Fake Profile Cases

»Software Piracy Cases

»Pornography Cases

»Identity Theft Cases Etc.

4 Hours


Case Study ( Live Demo By i3indya Team )

Exam – Theory & Practical

3 Hours

Why iEHCS ?

  • Latest and Updated Topics are covered

  • New Topics like Hacking & Securing Linux, Android, Mac, Web Servers are taught

  • We concentrate not only on Hacking but also on Security of all Topics

  • Forensics on almost all platforms and devices are taught

  • Hands on training with live demonstrations

  • Well experienced Trainers

  • Tied up with several Government Organizations for Training and Consultancy

  • Trained more than 30,000 professionals from all over India

  • Providing training to CBI, NIA and State Police across India

  • We limit our tool usage from third-party and we provide manual approach for each Technique

  • We also design our own tools

Pre Requisite

  • Basics of Computer

  • Knowledge of how to use internet

  • Basics of Networking


  • It is strongly recommended to bring your own LAPTOP during the training so that you can easily practice the exercises at home.

Who Could Attend ?

  • College students seeking career in Cyber Security Industry.

  • Person having interest in Hacking & Security.

  • Education Faculty & Staff.

  • IT Professionals, Web Developers, Network Engineers.

  • Students from any branch can join the training.

Who Attended iEHCS ?

For More Information

  • +91 - 956060 5666 (Extension : 2)

Select your Training Program

Call Us Send Enquiry