+91-8800955639, +91-9871700866, +91-8368840052
ec-council certification
ec-council certification
ec-council certification
+918800955639, +919871700866, +918368840052

Need Help? call us free


Ethical Hacking Institute in Kolkata

Ethical Hacking Institute in Kolkata

Rating on Ethical Hacking Institute in Kolkata 4.9 out of 5 based on 4132 Students ratings.

Ethical Hacking Institute in Kolkata

With the increase in the use of the internet and concerns related to its security, especially when it comes to things like private data or information, there is a mandatory need of security experts to work in ethical hacking profile. In today’s scenario, organizations have a high need for information security; hence an ethical hacker or security expert is generally required by companies to penetrate into networks and/or computer systems, using the same technology and tricks as a hacker, for the purpose of finding and fixing network and computer security vulnerabilities.

Ethical Hacking and Information Security training program at GICSEH, the best Ethical Hacking Institute in Kolkata focus on latest security threats, latest Hacking Techniques and security measures required to meet the standards of highly skilled security professionals.

We offer the most advanced Ethical Hacking and Information Security certification course which is a highly technical training module which covers all aspects of defence as well as attacks in the Cyber World. The Ethical Hacking course at the Global Institute of Cyber Security and Ethical Hacking focuses on the latest hacking attacks and covers countermeasures to secure entire IT infrastructure.

The course content of GICSEH meets the rigorous requirements of several government and industry standards for infosec education and training. This training is designed in a way to engage students in interactive live module sessions with hands-on hacking projects and securing the cyber space so that they can gain experience on Ethical Hacking and Information Security to deal with the rapidly increasing range of threats to the corporate networks.

Ethical Hacking Institute in Kolkata

Prerequisites for Ethical Hacking course in Kolkata
This course is meant for anyone fascinated by learning all the concepts of Ethical Hacking from scratch. This course is aimed toward beginners, thus no previous expertise needed to master this course. Just a sound knowledge of computers is required.

Course Outline

Day1 - Explaining the Certification, Introducing Security
Day2 - Introducing Hacking, Introduction to Ethical Hacking

Day3 - Defining Foot printing, Information Gathering Methodology
Day4 - Locate the Network Range, Hacking Tools

Day5 - Definition, Types, Objectives, Classification of Scanning
Day6 - Scanning Methodology, Hacking Tool, Countermeasures

Day7 - What is Enumeration? NetBios Null Lessons
Day8 - Hacking Tools, Enumerating User Accounts
Day9 - Active Directory Enumeration and Countermeasures

Day10 - Administrator Password Guessing
Day11 - Manual Password Cracking Algorithm
Day12 - Automated Password Cracking, Password Types
Day13 - Types of Password Attacks, Hacking Tools

Day 14 - Effect on Business, What is a Trojan?
Day15 - Overt and Covert Channels
Day16 - Indications of a Trojan Attack
Day17 - Reverse Engineering Trojans, Backdoor Countermeasures

Day18 - Definition of sniffing
Day19 - How a Sniffer works? Passive Sniffing
Day20 - Active Sniffing, Hacking Tools, Sniffing Countermeasures

Day1 - What is Denial of Service?
Day2 - Goal of DoS (Denial of Service)
Day3 - Impact and Modes of Attack, DoS Attack Classification
Day4 - Hacking Tools, Countermeasures for Reflected DoS
Day5 - Tools for Detecting DDOS Attacks

Day6 - What is Social Engineering? Art of Manipulation
Day7 - Human Weakness, Common Types of Social Engineering
Day8 - Human Based Impersonation

Day9 - Understanding Lesson Hijacking, Spoofing vs Hijacking
Day10 - Steps in Lesson Hijacking, Types of Lesson Hijacking
Day11 - Hacking Tools, Protection against Lesson Hijacking
Day12 - Countermeasures: IP Security

Day13 - Popular Web Servers and Common Security Threats
Day14 - Apache Vulnerability, Attack against IIS Console
Day15 - Hacking Tools, Countermeasures
Day16 - Increasing Web Server Security

Day17 - Web Application Hacking, Anatomy of an Attack
Day18 - Web Application Threats, Carnivore, Google Hacking
Day19 - Countermeasures

Day20 - Authentication- Definition, Authentication Mechanisms
Day1 - Password Guessing, Query String, Cookies
Day2 - Password Crackers Available
Day3 - Hacking Tools, Countermeasures

Day4 - Attacking SQL Servers, SQL Server Resolution Service
Day5 - Osql-L Probing, Port Scanning, SQL Server Talks
Day6 - Preventive Measures

Day7 - Wireless Basics, Components of Wireless Network
Day8 - Access Point Positioning, Rogue Access Points
Day9 - Tools to Generate Rogue Access Points
Day10 - Scanning Tools, Sniffing Tools
Day11 - Securing Wireless Networks

Day12 - Virus Characteristics, Symptoms of 'virus-like' attack
Day13 - Indications of a Virus Attack
Day14 - Virus / Worms found in the wild
Day15 - Virus writing tools, Virus Checkers, Virus Analyzers

Day16 - Understanding & Factors Affecting Physical Security
Day17 - Wiretapping, Lock Picking Techniques
Day18 - Spying Technologies

Day19 - Linux Basics, Linux Vulnerabilities, Scanning Networks
Day20 - Scanning & Linux Security Tools
Day1 - Adv. Intrusion Detection System
Day2 - Linux Security Auditing Tool
Day3 - Linux Security Countermeasures

Day4 - Intrusion Detection Systems, Ways to Detect Intrusion
Day5 - Types of Intrusion Detection System
Day6 - Intrusion Detection Tools
Day7 - Honeypot Project, Tools to Detect Honeypot

Day8 - Buffer Overflows, How a Buffer Overflow Occurs
Day9 - Shellcode, NOPS, Countermeasures

Day10 - Introduction to Penetration Testing (PT)
Day11 - Categories of security assessments
Day12 - Vulnerability Assessment
Day13 - Limitations of Vulnerability Assessment, Testing
Day14 - Penetration Testing Tools, Threat
Day15 - Other Tools Useful in Pen-Test
Day16 - Phases of Penetration Testing
Day17 - Post Attack Phase and Activities
Day18 - Penetration Testing Deliverables Templates

Day19 - Insider Attacks, What is Covert Channel?
Day20 - Security Breach
Day1 - Why Do You Want to Use Covert Channel?
Day2 - Motivation of a Firewall Bypass, Covert Channels Scope
Day3 - Covert Channel: Attack Techniques
Day4 - Simple Covert Attacks
Day5 - Advanced Covert Attacks, Standard Direct Connection
Day6 - Reverse Shell (Reverse Telnet)

Day7 - Introduction of Virus, Types of Viruses
Day8 - Symptoms of a Virus Attack
Day9 - Prerequisites for Writing Viruses
Day10 - Required Tools and Utilities, Virus Infection Flow Chart
Day11 - Components of Viruses, Testing Virus Codes
Day12 - Tips for Better Virus Writing

Day13 - Base 10 System, Base 2 System
Day14 - Decimal 0 to 15 in Binary
Day15 - Binary Addition (C stands for Canary)
Day16 - Hexadecimal Number, Hex Example, Hex Conversion
Day17 - Nibble, Computer memory, Characters Coding
Day18 - ASCII & UNICODE, CPU, Machine Language
Day19 - Compilers, Clock Cycle, Original Registers
Day20 - Instruction Pointer
Day1 - Pentium Processor, Interrupts, Interrupt handler
Day2 - External interrupts and Internal interrupts, Handlers
Day3 - Machine & Assembly Language, Assembler
Day4 - Assembly Language Vs High-level Language
Day5 - Assembly Language Compilers, Instruction operands
Day6 - MOV instruction, ADD instruction, SUB instruction
Day7 - INC and DEC instructions, Directive, Preprocessor
Day8 - equ directive, %define directive, Data directives
Day9 - Labels, Input and output, C Interface, Call
Day10 - Creating a Program
Day11 - Assembling & Compiling the C code
Day12 - Linking the object files
Day13 - Understanding an assembly listing file
Day14 - Big and Little Endian Representation, Skeleton File
Day15 - Working with Integers, Signed integers
Day16 - Signed Magnitude, Two’s Compliment
Day17- If statements, Do while loops
Day18 - Indirect addressing, Subprogram
Day19 - The Stack, The SS WEEK
Day20 - ESP, The Stack Usage, The CALL and RET Instructions
Day1 - General subprogram form, Local variables on the stack
Day2 - General subprogram form with local variables
Day3 - Multi-WEEK program, Saving registers
Day4 - Labels of functions
Day5 - Calculating addresses of local variables

Day1 - Exploits Overview, Purpose of Exploit Writing
Day2 - Prerequisites for Writing Exploits and Shellcodes
Day3 - Types of Exploits, Stack Overflow, Heap Corruption
Day4 - The Proof-of-Concept and Commercial Grade Exploit
Day5 - Converting a Proof of Concept Exploit to Commercial Grade
Day6 - Attack Methodologies, Socket Binding Exploits
Day7 - Tools for Exploit Writing, Steps for Writing an Exploit
Day8 -Difference Between Windows & Linux Exploit, Shellcode
Day9 - NULL Byte, Types of Shellcodes
Day10 - Steps for Writing a Shellcode
Day11 - Tools Used for Shellcode Development
Day12 -Issues Involved With Shellcode Writing

Day1 - What is a Buffer? Static Vs Dynamic Variables
Day2 - Stack Buffers, Data Region, Memory Process Regions
Day3 - What Is A Stack? Why Do We Use A Stack?
Day4 - The Stack Region, Stack frame, Stack pointer
Day5 - Procedure Call, Compiling the code to assembly
Day6 - Call Statement, Return Address (RET), Word Size, Stack
Day7 - Buffer Overflows
Day8 - Why do we get a WEEKation violation?
Day9 - WEEKation Error, Instruction Jump
Day10 - Guess Key Parameters, Calculation, Shell Code

Day1 - Buffer & Stack overflow
Day2 - Writing Windows Based Exploits
Day3 - Exploiting stack based buffer overflow
Day4 - OpenDataSource Buffer Overflow Vulnerability Details
Day5 - Simple Proof of Concept, Windbg.exe
Day6 - Analysis, EIP Register
Day7 - Execution Flow, But where can we jump to?
Day8 - Offset Address, The Query, Finding jmp esp
Day9 - Debug.exe, listdlls.exe, Msvcrt.dll, Out.sql, The payload
Day10 - ESP, Limited Space, Memory Address
Day11 - Getting Windows API/function absolute address
Day12 - Other Addresses, Compile the program, Final Code

Day13 - Positive Applications of Reverse Engineering
Day14 - Ethical Reverse Engineering, World War Case Study
Day15 - DMCA Act, What is Disassembler?
Day16 - Why do you need to decompile?
Day17 - Professional Disassembler Tools, Decompilers
Day18 - Program Obfuscation
Day19 - Convert Assembly Code to C++ code
Day20 - Machine Decompilers

Day1 - Network Devices, Identifying a Router
Day2 - HTTP Configuration Arbitrary Administrative Access Vulnerability, ADMsnmp, Solarwinds MIB Browser
Day3 - Brute-Forcing Login Services, Hydra
Day4 - Analyzing the Router Config
Day5 - Cracking the Enable Password
Day6 - Tool: Cain and Abel, Implications of a Router Attack
Day7 - Types of Router Attacks, Router Attack Topology
Day8 - Denial of Service (DoS) Attacks
Day9 - Packet “Mistreating” Attacks
Day10 - Cisco Router, Eigrp-tool, Tool: Zebra
Day11 - Tool: Yersinia for HSRP, CDP, and other layer 2 attacks
Day12 - Tool: Cisco Torch, Monitoring SMTP (port25) Using SLcheck
Day13 - Monitoring HTTP(port 80) Cable Modem Hacking

Day14 - Different OS in Mobile Phone
Day15 - Different OS Structure in Mobile Phone
Day16 - Evolution of Mobile Threat, What Can A Hacker Do
Day17 - Vulnerabilities in Different Mobile Phones, Malware
Day18 - Spyware, Blackberry, PDA, iPod, Viruses, Antivirus
Day19 - Mobile: Is It a Breach to Enterprise Security?
Day20 - Security Tools, Defending Cell Phones and PDAs Against Attack, Mobile Phone Security Tips

Day1 - Bluetooth Introduction, Security Issues in Bluetooth
Day2 - Security Attacks in Bluetooth Devices
Day3 - Bluetooth hacking tools, Bluetooth Viruses and Worms
Day4 - Bluetooth Security tools, Countermeasures

Day5 - What is VoIP, VoIP Hacking Step, Footprinting
Day6 - Scanning, Enumeration, Steps to Exploit the Network
Day7 - Covering Tracks

Day8 - Techniques used by Spammers
Day9 - How Spamming is performed
Day10 - Ways of Spamming, Statistics, Worsen ISP: Statistics
Day11 - Top Spam Effected Countries: Statistics
Day12 - Type of Spam Attacks, Spamming Tool
Day13 - Anti-Spam Techniques, Anti- Spamming Tool
Day14 - Countermeasures

Day15 - What is Google hacking
Day16 - What a hacker can do with vulnerable site
Day17 - Anonymity with Caches, Using Google as a Proxy Server
Day18 - Traversal Techniques, Extension Walking, Site Operator
Day19 - Locating Public Exploit Sites
Day20 - Locating Vulnerable Targets
Day21 - Directory Listings, Web Server Software Error Messages
Day22 - Application Software Error Messages, Default Pages
Day23 - Searching for Passwords

Day1 - Ways of Getting Email Account Information
Day2 - Vulnerabilities
Day3 - Email Hacking Tools, Securing Email Accounts

Day4 - Public-key Cryptography, Working of Encryption
Day5 - Digital Signature, RSA (Rivest Shamir Adleman)
Day6 - RC4, RC5, RC6, Blowfish, Algorithms and Security
Day7 - Brute-Force Attack, RSA Attacks
Day8 - Message Digest Functions
Day9 - SHA (Secure Hash Algorithm) SSL (Secure Sockets Layer)
Day10 - What is SSH, Government Access to Keys (GAK) RSA Challenge, Distributed.net, Code Breaking: Methodologies
Day11 - Cryptography Attacks, Disk Encryption, Magic Lantern
Day12 - WEPCrack, Cracking S/MIME Encryption Using Idle CPU Time

Day13 - Components of RFID Systems, RFID Collision, RFID Risks

Day14 - Electrical, Software, USB Attack on Windows
Day15 - Viruses & Worm
Day16 - Hacking Tools, USB Security Tools, Countermeasures

Day17 - Hacking Oracle Database Server & SQL Server
Day18 - Security Tools
Day19 - SQL Server Security Best Practices: Administrator and Developer Checklists

Day1 - Introduction to Internet Filter
Day2 - Key Features of Internet Filters
Day3 - Pros & Cons of Internet Filters
Day4 - Internet Content Filtering Tool
Day5 - Internet Safety Guidelines for Children

Day6 - Internet, Proxy, Spyware, Email privacy, Cookies
Day7 - Examining Information in Cookies
Day8 - How Internet Cookies Work
Day9 - How Google Stores Personal Information
Day10 - Google Privacy Policy, Web Browsers, Web Bugs
Day11 - Downloading Freeware, Internet Relay Chat
Day12 - Pros and Cons of Internet Relay Chat
Day13 - Electronic Commerce
Day14 - Internet Privacy Tools: Anonymizers, Firewall Tools
Day15 - Best Practices, Counter measures

Day16 - Statistics for Stolen & Recovered Laptops
Day17 - Statistics on Security
Day18 - Percentage of Organization Following the Security Measures, Laptop threats, Laptop Theft
Day19 - Fingerprint Reader
Day20 - Protecting Laptops Through Face Recognition
Day21 - Bluetooth in Laptops
Day22 - Securing from Physical Laptop Thefts
Day23 - Hardware Security for Laptops
Day24 - Protecting the Sensitive Data
Day25 - Preventing Laptop Communications from Wireless Threats, Security Tips
Day26 - Protecting the Stolen Laptops from Being Used

Day1 - Security policies, Key Elements of Security Policy
Day2 - Defining the Purpose and Goals of Security Policy
Day3 - Role of Security Policy, Classification of Security Policy
Day4 - Design of Security Policy, Contents of Security Policy
Day5 - Configurations & Implementing Security Policies
Day7 - Types of Security Policies, Policy Statements
Day8 - Basic Document Set of Information Security Policies
Day9 - E-mail, Software Security & Software License Policy
Day10 - Points to Remember While Writing a Security Policy

Day11 - Process of Software Activation, Piracy
Day12 - Software Copy Protection Backgrounders
Day13 - Warez, Tools

Day14 - How Web Browsers Work
Day15 - How Web Browsers Access HTML Documents
Day16 - Protocols for an URL, Hacking Firefox, Firefox Security
Day17 - Hacking Internet Explorer, Internet Explorer Security
Day18 - Hacking Opera, Security Features of Opera
Day19 - Hacking & Securing Safari, Hacking & Securing Netscape

Day20 - Working of Proxy Server, Types of Proxy Server
Day1 - Socks Proxy, Free Proxy Servers
Day2 - Use of Proxies for Attack, How Does MultiProxy Work
Day3 - TOR Proxy Chaining Software, AnalogX Proxy, NetProxy
Day4 - Proxy+, ProxySwitcher Lite, Tool: JAP, Proxomitron
Day5 - SSL Proxy Tool, How to Run SSL Proxy

Day6 - Causes of Data Loss, How to Prevent Data Loss
Day7 - Impact Assessment for Data Loss Prevention, Tools

Day8 - Computer Forensics, What is Computer Forensics
Day9 - Need for Computer Forensics
Day10 - Objectives of Computer Forensics
Day11 - Stages of Forensic Investigation in Tracking Cyber Criminals
Day12 - Key Steps in Forensic Investigations
Day13 - List of Computer Forensics Tools, Incident Handling

Day14 - Why don’t Organizations Report Computer Crimes
Day15 - Estimating Cost of an Incident
Day16 - Whom to Report an Incident, Incident Reporting
Day17 - Vulnerability Resources, CSIRT: Goals and Strategy

Day18 - Hardware and Software Firewalls
Day19 - Windows & Mac OS X Firewalls


1. Ethical Hacking training in Noida is based on networking module and web module.
2. We are providing best education delivery on behalf of practical and real scenario
3. Classes will be for weekdays, weekend or morning or early morning for the same.
4. We have a trainer who is having training experience as well as the industrial experience.
5. We are providing interview preparation, exam preparation, etc for all the retail and corporate candidates too
6. Students can access our lab like 24x7
7. 24x7 Lab Facilities, can access any time, any where to the cloud and practical lab too.


1. GLOBAL INSTITUTE OF CYBER SECURITY & ETHICAL HACKING is having certified trainer from the Cisco, Microsoft, Red Hat, EC Council, VMware, Amazon, Apple, etc.
2. Trainers are having 10+ years of experience in the technical field as a trainer as well as the security analyst, software developer, networking infrastructure manager, etc.


1. GLOBAL INSTITUTE OF CYBER SECURITY & ETHICAL HACKING is the world leader to provide networking training courses, cyber security training and certification, ethical hacking training and certification, etc.
2. GLOBAL INSTITUTE OF CYBER SECURITY & ETHICAL HACKING is also providing the interview preparation so that students will be able to crack the interview.
3. GLOBAL INSTITUTE OF CYBER SECURITY & ETHICAL HACKING providing Personality Development, Technical Prepare question for all the candidates.
4. GLOBAL INSTITUTE OF CYBER SECURITY & ETHICAL HACKING is helping to all the students to get the job with brand companies in India as well as some company in Abroad too.


1. Normal Regular Classes– 5/3/2/4 Days a WEEK (Morning, Day time & Evening)
2. Normal WEEKend Classes (SaturDay, SunDay & HoliDays)
3. Super Fast-track Classes
4. Fast-Track Class
5. Early Morning Batch
6. Late Evening Batch

Course Features

  • Duration : 40 Hours
  • Lectures : 20
  • Quiz : 10
  • Students : 15

You may like


Due to the continuous growth of the internet and networks, organizations are facing online security breaches and intrusion attacks on a regular basis. To prevent these hackers from causing damage to network systems and critical data; expert ethical hackers and information security specialist are there in huge demand these days. The main aim of this course is to help the students master the basics of Ethical Hacking.

The knowledge gained from this course can be used in any company. This course will add value to your career. Various job opportunities are available for the ethical hackers in different fields such as:
• government organizations
• banks
• financial institutions
• military establishments
• private companies etc.

Who Should Join Ethical Hacking Institute in Kolkata?
The Ethical Hacking Course at Global Institute of Cyber Security and Ethical Hacking is majorly pointing towards those who are looking to build career in profile such as:
• IT Security
• IT Security Officers
• IT Auditors
• Network Security Administrators

The people going for Ethical Hacking certification can be any of the following:
• Students,
• IT Managers,
• Professionals,
• Auditors,
• Security Professionals

How Ethical Hacking Course Beats Other Competitor’s Offerings?
Unlike the other programs, Ethical Hacking is the only comprehensive training program available in market that covers all major attack paths plaguing modern information system security to help you understand the correlation among various threats.
• Advanced hacking technologies
• Complete hands-on hacking and countermeasures
• Security auditing techniques and standard practices
• Utilities from underground hacking communities
• Real world lab exercises
• Live cyber-crime investigation projects
• Cyber Law Acts and practices
• Updated courseware, latest tools and techniques
• 24x7 lab availability to practice hacking concepts

Future Prospects and Salary
The CEH certification will help you earn more, and will take you to next heights in the IT security professional domain. The certification will make your resume different and special from others and preferable in the eyes of the recruiters. Below are some jobs they get, and all of these requiring CEH as the base qualification of the candidate.
• Information security analyst
• Security consultant (computing/IT/networking
• CEH or Certified Ethical Hacker
• Penetration tester
• Security engineer

Why to choose GICSEH ?
As we already mentioned, this course is meant for anyone fascinated by learning Android application development from scratch.
• We Have the Well-Planned course module, as Per The trends in the industry!
• We have World Class Lab having all the required equipment.
• Gicseh is partner to many international brands such as EC COUNCIL, ANDROID ATC etc.
• We provide Certificates that are valid to show in college and company as part of compulsory industrial training program.
• We offer Two Years Revision Membership on Selected Courses.
• Trainers at GICSEH are industrial professionals having real time experience with technology.
• Best placement track record in top MNC'S.

Join the ethical hacking course at GICSEH, the best Ethical Hacking Institute in Kolkata and excel your ethical hacking skills. We assure you a bright career with our basic to advanced level training by the industry experts! Get in touch with the experts.