Ethical Hacking & Cyber Security 

Learning Digital Marketing is not enough, one should know the various risks to which your business is exposed. Join this two days course to get an introduction to the ethical hacking and cybersecurity practices. More than 21 essentials modules will be covered. Visit the ' Upcoming Batch' tab to check the next batch. 

Image by vipul uthaiah

Introduction to 

Ethical Hacking

Image by Jordan Harrison

Concepts of TCP/IP, Basic networking concepts

Image by Taylor Vick

Network scanning

Image by Markus Spiske

Cryptography & Steganography

Image by Nathan Dumlao

Denial of Service

Image by Moritz Kindler

IDS & Honeypots

Image by Liam Tucker

Website & web

application security

Image by vipul uthaiah

Basics of Cyber Crime investigations

Image by Fotis Fotopoulos

VAPT Methods

Image by Glenn Carstens-Peters

Foot printing, Surveying & Gathering Data

Image by Markus Spiske

Network Scanning & Penetration testing

Image by Caspar Camille Rubin

SQL Injections

Image by George Pagan III

Hacking through Social Engineering

Image by Markus Spiske

Cross-site scripting (XSS)

Image by Taskin Ashiq

Firewalls configurations

Image by Caspar Camille Rubin

IT security 

(for Home & Office)

Image by Frederick Tubiermont


ISO 27001 Standards

Image by Shahadat Rahman

Guidelines for filing cyber complains & Incident handling

Image by Clément H

Understanding IP & MAC addresses

Image by Michael Geiger

Viruses, worms

& Trojans

Image by Kelly Sikkema

Passwords Cracking

Image by Dlanor S

Ethical hacking Methods (Key loggers, phishing) 

Image by Jon Tyson


Image by Umberto

Mastering Kali Linux

Image by Austin Distel


Hacking & Security

Image by Mikhail Pavstyuk


IT act