i3indya™ Technologies presents Practical Training on Ethical Hacking & VAPT.

The rapid and dramatic advances in information technology (IT) in recent years have without question generated tremendous benefits. However, they have created significant and unprecedented risks to operations. Computer security has, in turn, become much more important as all levels of an organization to utilize information systems security measures to avoid data tampering, fraud, disruptions in critical operations, and inappropriate of sensitive information.

After the boom in Networking and Software jobs, the past two year have seen a sharp rise in the field of information security. Information Security and Ethical Hacking is the latest buzzword in the industry. In the past five years, the percentage of hacking crimes, data thefts, data losses, viruses and other cyber crimes have increased exponentially.

If you want to know how hackers are attacking your websites, emails, servers & computer remotely or how you can protect yourself or your organization from all these attacks then this is the right course for you.

Course Highlights

  • Ethical Hacking & VAPT

  • Certificate of Completion by i3indya™ Technologies

  • E-Book & Softwares Free to each participant

  • 20 Topics Covered in 30 Days

  • Click Here

  • Click Here

Do This Course at Your Home

  • Yes! You can Do This Course at Your Home by purchasing our distance learning kit. Click Here

Training Modules

Module Topics Duration


Ethical Hacking and Cyber Security and overview

Cybercrime scenario in India and worldwide

Short description about hacking vs Ethical hacking

Types of Hackers

Skill Profile of a Hacker

Some Famous Hackers and Groups

Cyber World

Advantage and Disadvantage of Cyber world

Cyber World as a Home of hackers

3 Hours


Overview of Cyber Law

Introduction To Cyber Law

Cyber Laws Indian

Technical Aspect Of Indian Cyber Law

IT ACT 2000 & 2008

Internet Crimes And Frauds

Cyber Law Cases In India

Organization Under Cyber Laws

Advantages Of Cyber Laws

Limitation of cyber laws

3 Hours


Computer Virtualization technology & LAB setup

Concept of virtualization technology

Need & Advantage Of Virtualization

Requirements for virtualization

Creating virtual machines and optimization performance

Installing OS (Windows and Linux) On Virtual Machines

System Cloning

Virtual networking what and why?

4 Hours


Information Gathering

What Is Information Gathering & Why Hackers Need This?

Types Of Information Gathering

Information Gathering Using Websites

Information Gathering Using Software

Information Gathering Using Add-Ons

Search Engines- Smart Way Of Information Gathering

Scanning And Enumeration

Tracing - E-Mail, Mobile Phone, Intruder

3 Hours


Scanning and Enumeration

DNS Enumeration and Zone Transfer

Dnsenum, dig, host

SMB Enumeration

SMTP Enumeration

SNMP Enumeration

Port Scanning

  • >>Introduction
  • >>Detecting Live Host
  • >>Ping Scaning
  • >>Ping Sweep Scanning
  • >>Tools
  • >>Ping
  • >>FPing
  • >>Detecting Open Ports
  • >>Mechanism of Stablish Connection
  • >>Analyzing Packets of three way Handshake
  • >>TCP/IP Communication Flags
  • >>Nmap Scanning Tool
  • >>Familiar with Zenmap Scannning tools
  • >>Types of Port Scanning
  • >>TCP Connect Scan / Full Open Scan
  • >>Half Open Scan
  • >>Xmas Scan
  • >>FIN Scan
  • >>Null Scan
  • >>IDLE Scan
  • >>List Scan
  • >>UDP Scan
  • >>ACK Scan
  • >>Firewall/IDS evasion Technique
  • >>Fragmentation
  • >>Decoys
  • >>Timing
  • >>Using Source Port
  • >>Detecting Active Service
  • >>Banner Grabbing
  • >>Fingerprinting
  • >>OS Detection

4 Hours


Windows Hacking & Security (Win 7, 8, 8.1 and 10)

Introduction Windows Security

User Accounts Security, Attacks and countermeasure

Hacking Into System by Changing Passwords

Getting Access to System By Elevating Privileges

Finding Out the Passwords Of Windows

Bypassing the Windows Security

Password in Plain Text Directly

Services, Port and Protocol Security and configuration

Setting Up A Secure System

4 Hours


Linux Systems Security and attacks

Booting process of Linux

Roll of the Password to Access the control

Editing grub boot loader file

Crack Linux password by single User mode

Protect Grub boot loader

Remove Grub boot loader password – Local System

Remove Grub boot loader password – Offline

Description of Password containing files

Linux Hashes (Encryption Type)

Dump Linux hashes – Local System

Dump Linux Hashes – Remotely

Cracking Linux password hashes using John The Ripper

4 Hours


Password Cracking Techniques

What is Password Cracking

Types of Password Cracking Techniques

How Different Password Crackers Work

Windows Password Cracking

FTP / Network Password Cracking

Zip/ RAR Password Cracking

Doc & PDF Password Cracking

Using GPU For Password Cracking

Password Security

4 Hours


Data Security and Recovery

Data hiding with Steganography

  • >>What Is Steganography
  • >>Alternate data stream in NTFS
  • >>How Attacker Hides His Data in Images and Other Formats
  • >>How to Find Data Which Are Hidden

Data Security with Cryptography

  • >>What Is Cryptography
  • >>Securing Data by Using EFS and BitLocker
  • >>Advanced Cryptography Tools
  • >>Vera crypt and Trucrypt

3 Hours


Hacking by Viruses, Trojans, Keyloggers & Spywares

What is Trojan?

Trojans Attack Big Famous Cases

Types Of Trojans

Different way a Trojan Can Get Into A System

How Attacker Bypass Your Antivirus By Trojans

Analysis Of Trojans/Virus

How we remove Trojans Manually

Security Against Trojans

3 Hours


IDS, IPS and Honeypots

Overview of IDS, IPS & Honeypot

Use of IDS & IPSAssignment & Revision

Installation of IDS & IPS

Prevention & Detection

Honeypot & its Types

Implementation - Honeypots

Honeypot Tools

3 Hours


Proxy Server & Virtual Private Network (VPN) Technology

Proxy And Types Of Proxies

Why Hackers Use Proxy?

How To Hide IP Address While Chatting

How To Open Block Website In College/Companies

Convert Your Machine As Proxy Server With HTTPS Proxy

Advantage And Disadvantage Of Proxy

Analyzing Proxy Bug

How Proxy Hack Your Passwords Etc

What Is Better Than Proxy

What Is VPN?

Why We Use VPN

Advantage & Disadvantage Of VPN

Free VPN


4 Hours


Network Security & Hacking

Introduction To Networks ( LAN /WAN )

Understanding Communication Protocols

Sniffing Attacks

DOS & DDOS Attack


Firewall Configuration & Maintenance

Network Monitoring & Analysis

Logs Maintenance

4 Hours


Google Hacking and Google Hacking Database

Introduction and Working of Search Engines

List of Common Search Engines on Web

Comparing and Choosing Best Search Engine

Dorks For Hacking Search Engines

Tools for Search Engines Hacking

Finding Admin Pages and Weakness In Site

Security against Search Engine Hacking

3 Hours


Email/Social Sites Hacking & Security Issues

World Famous Big Email Hacking Cases

IIT Bombay Alumni, Anil Ambani, Rahul, Gandhi, Facebook CEO Mark Zuckerberg (Case Study)

Analysis Email Attacks (Live Demo) Manually & Automatic

Cookies Stealing (Session Hijacking) of All Big Mail Servers

Phishing Attacks ( Normal & Advanced )

Tab Nabbing Attack

Social Engineering Attack

Analyzing Fake & Real Profiles & Email Accounts

Fake Mailing Attack

Email & Fake Profile Tracing

Email Password Stealing By Plugins, Extensions Etc.

Email Hacking By Keylogger, Spywares & Malicious Softwares


Cookies Stealing of Facebook Accounts

Facebook Phishing Attacks

Facebook Tab Nabbing Attack

Facebook Social Engineering Attack

Facebook Password Stealing By Plugins, Extensions Etc

Facebook Account security with Email & SMS Notifications

What Is Clickjacking

How Does A Clickjacking Work

Facebook Likejacking

How Hacker Use Clickjacking

Possibilities Of Clickjacking

Clickjacking Killer - The IFRAME Buster

How Protect From Being Clickjacked

4 Hours


Advanced Methodology for Privacy on Internet

Staying Safe in the Internet

Browser Settings

Using Add-ons & Plug-ins

Email Privacy

Malicious Link Security

Behavior Based

Code Based

Website Visit Privacy

Block Malicious Contents On Web

Antivirus Privacy

Automatic analyzing of Malicious Links

Internet Privacy

4 Hours


Tools Social Engineering

Introduction to Social Engineering

Types of Social Engineering

Tools Based


World's Biggest Social Engineering Cases

Web based Social Engineering

Vulnerability in Social Engineering

Analyzing a Social Engineering Attack

3 Hours


Security against Social Engineering Web application Penetration testing

Introduction of Penetration Testing

Legal and Ethical Implications

Types of Penetration Testing

White Box Penetration Testing

Black Box Penetration Testing

Grey Box Penetration Testing

Setting Up Web Application Penetration Testing Lab

Collecting and Installing PenTest Tools

Flexible Browser with Security Add-ons

Setting up Browser Proxies

Introduction of Websites & Database

Authentication Process Of Web Application

Attack on Website & Web Application

Get and Post Parameters

SQL Injection Attacks

Cross site scripting

Session hijacking

RFI & LFI Attacks

Data tampering


4 Hours


Metasploit Framework for Exploitation

Introduction of Metasploit

Differnce Interfaces of Metasploit

  • >>Armitage
  • >>Components of Metasploit
  • >>Exploit, Payloads, Auxiliaries, Encoder, Nops

Hack SSH Server by Misconfiguration of NFS Server

Exploit Services netbios-nss

rmi registary



Understand Shellcode creation

  • >>Create a simple Shellcode
  • >>Understand opcodes and hex conersions of biary file

Buffer Over Flow

Reverse Engineering

4 Hours


Wireless Hacking & Countermeasures

Wireless Standards

Common Vulnerabilities in Wireless Devices

Encryption Standards Used in Wi-Fi

WEP Cracking

WPA/WPA2 Cracking

WPS Cracking

Projects: Hardening security of Windows OS

Harding Linux OS with IP tables

Policy development for Securing Network.

Solve Security challenges

Developing a Home based penetration testing lab

4 Hours

Summer Training Highlights

Why Ethical Hacking & VAPT ?

  • Latest and Updated Topics are covered

  • New Topics like Hacking & Securing Linux, Android, Mac, Web Servers are taught

  • We concentrate not only on Hacking but also on Security of all Topics

  • Forensics on almost all platforms and devices are taught

  • Hands on training with live demonstrations

  • Well experienced Trainers

  • Tied up with several Government Organizations for Training and Consultancy

  • Trained more than 30,000 professionals from all over India

  • Providing training to CBI, NIA and State Police across India

  • We limit our tool usage from third-party and we provide manual approach for each Technique

  • We also design our own tools

Pre Requisite

  • Basics of Computer

  • Knowledge of how to use internet

  • Basics of Networking


  • It is strongly recommended to bring your own LAPTOP during the training so that you can easily practice the exercises at home.

Who Could Attend ?

  • College students seeking career in Cyber Security Industry.

  • Person having interest in Hacking & Security.

  • Education Faculty & Staff.

  • IT Professionals, Web Developers, Network Engineers.

  • Students from any branch can join the training.

Who Attended Ethical Hacking & VAPT?

For More Information

  • +91 - 95 6060 5666 (Extension : 2)

Select your Training Program

To know about Batch, Training Center and Fees

Training Images

Call Us Register Here