Home » Programs » Certification » Certified Ethical Hacker

About Certified Ethical Hacker
Learn Ethical Hacking with live hands-on that covers many foundational topics such as a day in the life on an ethical hacker, what does an ethical hacker do on a day to day basis? How much can he or she earn? What type of assessments might an ethical hacker perform? Global cyber security industry need for ethical hackers and penetration testers. By doing this Ethical Hacking course the candidates will delve deep into cyber security issues and challenges, understanding vulnerabilities and performing penetration strategies and finding the flaws and suggest proactive measures, defense mechanisms, compliances and management.
Key Features of Certified Ethical HackerCourse

300 Hrs of online training

40 Hrs of LIVE mentoring and doubt clarification sessions

100+ lab assignments

20 Hrs of aptitude and logical reasoning class

Interview preparation & Placement assistance

100% Money Back Guarantee
Unique & Specialised Course
This is the one of a unique and specialised course where-in we offer live and real time hands-on in live test bed production networks that we have created with the latest hardware and softwares including the operating systems and applications unlike any simulated environments. The participants get to work on live networks and face some of the latest cyber security challenges !!!!!
Training Options
Live-Online
Duration: 300 Hrs
Limited Time - Hurry up!
- Live-Online Instructor Led Training
- 100+ lab assignments & Quizzes
- 24/7 Lab access on Rooman Cloud Lab
- Labs Designed & Mentorship support by Industry Experts
- 5 capstone projects
- Live-Online sessions with Industry Experts & Subject Matter Expert from Rooman
- Access to Recorded Session of Live-Online Classes available 24/7
- Industry Recognized Course Completion Certificate
- Interview Preparation & Placement Support
Classroom Based
Duration: 300 Hrs
Limited Time - Hurry up!
- In-Person Classroom based Training conducted by Subject Matter Expert & Facilitated by Technical Mentors
- Flexibility to attend classes at any of our 50+ Centers PAN India
- Hands-on experience at our state-of-the-art Lab
- 100+ lab assignments & Quizzes
- 24/7 Lab access on Rooman Cloud Lab
- Labs Designed & Mentorship support by Industry Experts
- 5 Capstone & 1 real-world project
- Exclusive sessions with Industry & Subject Matter Expert
- Access to Recorded Session of Live-Online Classes available 24/7
- Industry Recognized Course Completion Certificate
- Interview Preparation & Placement Support
- Access to Campus Placement drives
- 1 year access to our LMS
Benefits of Certified Ethical Hacker Course


Course Curriculum for Certified Ethical Hacker
The Ethical Hacker qualification is obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems, using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system.
This Ethical Hacking course focuses on the latest malware attacks, the latest hacking tools, and the new emerging attack vectors in the cyberspace. This ethical hacking course puts you in the driver’s seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems.
Table of Content for Ethical Hacking Certification Course
- Ethical Hacking Overviews
1. Hacking concept, what is hacking?
2. Terms we use in hacking.
3. Need of Ethical hacking.
4. Cases of Hacking in India & across the globe - Principles of Ethical hacking
1. Basic Principle
2. Commandments of Ethical Hacking - Hacking Methodologies
1. Types of Hacking.
2. Building the foundation for Ethical hacking
3. Hacking Phases - Role of Ethical Hacker
1. Types of Hackers
2. Roles and Responsibilities - Scope & limitations of hacking
1. Advantages & scope for hacking
2. Drawbacks & Limitation of hacking Cyber Threats and Attacks Vectors
3. Threats & categories
4. Attack Vectors and Exploitation - Hacking tools and techniques
1. Common Hacking Tools
2. Hacking Techniques & Approaches - Policies and Controls
1. Information Security policies
1.a. Risk Management & Incident Management
2.b. Information Security controls
3.c. Data Management - Overview of PT / VA
1. Concept of Penetration testing
2. Types of Penetration testing
3. Phases of Penetration testing
4. Vulnerability Assessment by Penetration testing
- Malware Overviews
1. Introduction to Malware.
2. Different Ways a Malware can Get into a System.
3. Common Techniques Attackers Use to Distribute Malware on the Web
4. Components of Malware - Virus Worm & Trojan Concepts
1. Introduction to Viruses, Worms & Trojan
2. Types of Virus, Worms &Trojan
3. Fake Antiviruses
4. How Did Antivirus Works. - Malware Analysis
1. Introduction to Malware Analysis
2. Malware Analysis Procedure
3. Malware Detection Method.
- Footprinting through Search Engines, Web Services
1. Information Gathering Using Google Advanced Search and Image Search.
2. VoIP and VPN Footprinting through Google Hacking Database - Footprinting through Web Services
1. Finding Company’s Top-level Domains (TLDs) andSub-domains
2. Finding Location, People search, Professional search. - Enumeration
1. Techniques for Enumeration, Services and Ports toEnumerate
2. NetBIOS, SNMP, LDAP Enumeration
3. Information Gathering Using Groups, Forums, and Blogs. - Scanning targets
1. Network Scanning Concepts.
2. Scanning Tools andTechniques
3. Scanning Pen Testing
4. Port Scanning & Countermeasures - Sniffing Network
1. Sniffing Concepts & Techniques
2. WireShark installing & concept
3. Sniffing Detection Techniques - Social Engineering
1. Social Engineering Concepts
2. Social Engineering Techniques
3. Insider Threat / Insider Attack.
4. Social Engineering Countermeasures
- SQL Injection
1. Basics to the SQL queries
2. How Injection Can be done
3. Cross Site Scripting Attacks - DOS Attacks
1. DoS/DDoS Attack Techniques.
2. DDoS Case Study
3. DoS/DDoS Attack Tools - Session Hijacking
1. Session Hijacking Concepts,
2. Network Level Session Hijacking
3. Client side Hijacking. - System Hacking
1. System Hacking Concepts
2. Cracking Passwords
3. Escalating Privileges
4. Hiding Files and Covering tracks
- Basics to Web application & threats
1. Basics of Web Application and Technology stack.
2. OWASP Top 10 Application Security Risks – 2017 - OWASP Top 10 Application Security Risks – 2017
1. Injection Flaws
2. File Injection Attack
3. Broken Authentication
4. Sensitive Data Exposure
5. XML External Entity (XXE)
6. Broken Access Control
7. Security Misconfiguration
8. Cross-Site Scripting (XSS) Attacks
9. Insecure Deserialization
10. Using Components with Known Vulnerabilities - Web Hacking methodology and tools
1. Web App Hacking Methodology and its foot printing.
2. Password Attacks:
3. Password Functionality Exploits
4. Password Guessing and Brute-forcing - Introduction to Web Server
1. Web Server Concepts
2. Web server attacks
3. Web Server Attack Methodology
4. Web Server Attack Tools - Counter measures
1. Detecting Web Server Hacking Attempts
2. Patch Management
3. Web Server Security Tools
- IOT Concept and Attacks
1. Basic of IOT, Architecture, Technology andProtocols
2. Challenges, Opportunity in IOT
3. OWASP Top 10 IOT Vulnerabilities and Obstacles
4. Hacking IOT Devices
4.a. DDos Attack
4.b. Jamming Attack
4.c. Botnets
4.d. Man In middle concept
4.e. Data & Identity Theft - Cloud Computing Overview
1. Introduction to Cloud & Virtualization
2. Cloud Deployment and responsibilities - Threats and attack in Cloud
1. Topic 1 : Service Hijacking
1.a. Social Engineering
1.b. Network sniff
1.c. XSS attack
2. DNS (Domain Name system attack) - Cloud Security and tools
1. Control Layers and Responsibilities
2. Cloud Computing Security Consideration
- Mobile Hacking
1. Introduction to the Mobile architecture
2. Working principle for mobile OS
3. Security of the application used in Mobiles
4. Hacking Methodology for mobile with Metasploit - Wireless Overview
1. Introduction to Terminology, Networks, Standards
2. Types of Wireless Authentication and Encryption
2.a. WEP (Wired Equivalent Privacy) Encryption
2.b. WPA (Wi-Fi Protected Access)Encryption
3. WPA2 (Wi-Fi Protected Access 2) Encryption - Wireless Hacking Methodology
1. Wi-Fi Discovery
2. GPS Mapping
3. Traffic canalizing
4. Launch Wireless attacks
5. Crack Wi-Fi Encryption
- Basics of Firewalls, IDS, Honeypots
1. What is Firewall & Examples
2. What is IDS & examples
3. What is Honeypots & examples
4. Case study of Bypassing Firewall ,IDS, Firewall - IDS/Firewall/Honeypot Evasion Techniques
1. Packet Fragmentation and Source Routing
2. Working with SNORT [Detection Tool]
3. IP address Decoy and Spoofing
3.a. IP Spoofing Detection Techniques: Direct TTL Probes
3.b. IP Spoofing Detection Techniques: IP Identification Number
3.c. IP Spoofing Detection Techniques: TCP Flow Control Method
3.d. IP Spoofing Countermeasures
- Introduction to Cryptography Concepts
1. Types of Cryptography
2. Government Access to Keys (GAK) - Encryption Algorithms
1. Ciphers
2. Data Encryption Standard
3. Advanced Encryption Standard
4. RC4, RC5, and RC6 Algorithms - Email, Disk Encryption and Cryptanalysis
1.Digital Signature, SSL, TLS
2. Cryptography Toolkit & Disk Encryption
3. Cryptography Attacks
3.a. Brute-Force Attack
3.b. Meet-in-the-Middle Attack on Digital Signature Schemes
3.c. Side Channel Attack
3.d. Hash Collision Attack
3.e. DUHK Attack
3.f. Rainbow Table Attack - Vulnerability Analysis
1. Vulnerability Assessment Concept & Solutions
2. Vulnerability Assessment Tools & Reports
3. Comparing Security Audit, Vulnerability Assessment, and Penetration Testing
- Bandit Overthewire [ WarGame]
1. Understanding of Kali Linux commands.
2. Using commands situation based. - Natas Overthewire [ WarGame]
1. Understanding of web application.
2. Web application tricks to get data.
3. Doing pentesting Situation based. - Mr. Robot
1. Installing and working on Kali Linux.
2. Vulnerability Assessment Concept & Solutions.
3. Vulnerability Assessment Tools & Reports.
Ethical Hacking
- Hacking concept, what is hacking?
- Terms we use in hacking.
- Need for Ethical hacking.
- Cases of Hacking in India & across the globe
- Types of Hacking
- Building the foundation for
- Ethical hacking
- Hacking Phases
- Types of Hackers
- Roles and Responsibilities
- Advantages & scope for hacking
- Drawbacks & Limitations of hacking
- Threats & categories
- Attack Vectors and Exploitation
- Common Hacking Tools
- Hacking Techniques & Approaches
- Hacking concept, what is hacking?
- Terms we use in hacking.
- Need of Ethical hacking.
- Cases of Hacking in India & across the globe
- Types of Hacking
- Building the foundation for Ethical hacking
- Hacking Phases
- Types of Hackers
- Roles and Responsibilities
- Advantages & scope for hacking
- Drawbacks & Limitation of hacking
- Threats & categories
- Attack Vectors and Exploitation
- Common Hacking Tools
- Hacking Techniques & Approaches
- Risk Management & Incident Management
- Information Security controls
- Data Management
- Concept of Penetration testing
- Types of Penetration testing
- Phases of Penetration testing
- Vulnerability Assessment by Penetration testing
- Introduction to Malware
- Different Ways a Malware can Get into a System
- Common Techniques Attackers Use to Distribute Malware on the Web
- Components of Malware
- Introduction to Viruses, Worms & Trojan
- Types of Virus, Worms &Trojan
- Fake Antiviruses
- How Did Antivirus Works
- Introduction to Malware Analysis
- Malware Analysis Procedure
- Malware Detection Method
- Information Gathering Using Google Advanced Search and Image Search
- VoIP and VPN Footprinting through Google Hacking Database
- Finding Company’s Top-level Domains (TLDs) andSub-domains
- Finding Location, People search, Professional search
- Techniques for Enumeration, Services and Ports to Enumerate
- NetBIOS, SNMP, LDAP Enumeration
- Information Gathering Using Groups, Forums, and Blogs
- Network Scanning Concepts
- Scanning Tools and Techniques
- Scanning Pen Testing
- Port Scanning & Countermeasures
- Sniffing Concepts & Techniques
- WireShark installing & concept
- Sniffing Detection Techniques
- Social Engineering Concepts
- Social Engineering Techniques
- Insider Threat / Insider Attack
- Basics to the SQL queries
- How Injection Can be done
- Cross Site ScrIPting Attacks
- DoS/DDoS Attack Techniques
- DDoS Case Study
- DoS/DDoS Attack Tools
- Session Hijacking Concepts
- Network Level Session Hijacking
- System Hacking Concepts
- Cracking Passwords
- Escalating Privileges
- Hiding Files and Covering tracks
- Client side Hijacking
- Basics of Web Application and Technology stack.
- OWASP Top 10 Application Security Risks – 2017
- Injection Flaws
- File Injection Attack
- Broken Authentication
- Sensitive Data Exposure
- XML External Entity (XXE)
- Broken Access Control
- Security Misconfiguration
- Cross-Site ScrIPting (XSS) Attacks
- Insecure Deserialization
- Using Components with Known Vulnerabilities
- Web App Hacking Methodology and its foot printing
- Password Attacks
- Password Functionality Exploits
- Password Guessing and Brute-forcing
- Web Server Concepts
- Web server attacks
- Web Server Attack Methodology
- Web Server Attack Tools
- Detecting Web Server Hacking Attempts
- Patch Management
- Web Server Security Tools
- Basic of IOT, Architecture, Technology and Protocols
- Challenges, Opportunity in IOT
- OWASP Top 10 IOT Vulnerabilities and Obstacles
- DDos Attack
- Jamming Attack
Botnets - Man In middle concept
- Data & Identity Theft
- Introduction to Cloud & Virtualization
- Cloud Deployment and responsibilities
- Service Hijacking
- Social Engineering
- Network sniff
- XSS attack
- DNS (Domain Name system attack)
- Control Layers and Responsibilities
- Cloud Computing Security Consideration
- Introduction to the Mobile architecture
- Working principle for mobile OS
- Security of the application used in Mobiles
- Hacking Methodology for mobile with Metasploit
- Introduction to Terminology, Networks, Standards
- Types of Wireless Authentication and Encryption
- WEP (Wired Equivalent Privacy) Encryption
- WPA (Wi-Fi Protected Access)Encryption
- WPA2 (Wi-Fi Protected Access 2) Encryptio
- Wi-Fi Discovery
- GPS Mapping
- Traffic canalizing
- Launch Wireless attacks
- Crack Wi-Fi Encryption
- What is Firewall & Example
- What is IDS & example
- What is Honeypots & examples
- Case study of Bypassing Firewall ,IDS, Firewall
- What is Firewall & Examples
- What is IDS & example
- What is Honeypots & examples
- Case study of Bypassing Firewall ,IDS, Firewall
- Packet Fragmentation and Source Routing
- Working with SNORT [Detection Tool]
- IP address Decoy and Spoofing
- IP Spoofing Detection Techniques: Direct TTL Probes
- IP Spoofing Detection Techniques: IP Identification Number
- IP Spoofing Detection Techniques: TCP Flow Control Method
- IP Spoofing Countermeasures
- Types of Cryptography
- Government Access to Keys (GAK)
- CIPhers
- Data Encryption Standard
- Advanced Encryption Standard
- RC4, RC5, and RC6 Algorithms
- Digital Signature, SSL, TLS
- Cryptography Toolkit & Disk Encryption
- Brute-Force Attack
- Meet-in-the-Middle Attack on Digital Signature Scheme
- Side Channel Attack
- Hash Collision Attack
- DUHK Attack
- Rainbow Table Attack
- Vulnerability Assessment Concept & Solutions
- Vulnerability Assessment Tools & Reports
- Comparing Security Audit, Vulnerability Assessment, and Penetration Testing
- Understanding of Kali Linux commands
- Using commands situation based
- Understanding of web application
- Web application tricks to get data
- Doing pretesting Situation based
- Installing and working on Kali Linux
- Vulnerability Assessment Concept & Solutions
- Vulnerability Assessment Tools & Reports
Download Syllabus for Ethical Hacking Certification Course
Request more information?

Please fill out your enquiry form.
Form fields marked with a red asterisk * are required.
Request more information?

What students say about Cyber Security & Ethical Hacking Course





Supporting Enterprises Around the Globe
Our programs are designed to give you the skills you need to be successful in your career.

GET IN TOUCH WITH OUR EXPERTS
Let us know your areas of interest so that we can serve you better.
*Refund Policy For Online Courses
At Rooman, we value the trust of our students immensely. If you feel that a course does not meet your expectations, we offer a 7-day money-back guarantee. Just send us a refund request via email within 7 days of purchase and we will refund 100% of your payment, no questions asked!
To claim a refund, kindly follow the below procedure:
- Drop an email on refund@rooman.net with a subject “Online course refund | Course name”. (Please do not forget to send it from the registered email id)
- Give a valid reason for the refund. [for our internal purpose only]
- Ensure that the email is received within seven days of batch start date. [Example: if batch starts on 28 th Oct’20, you should send the refund email on or before 04th Nov’20 midnight]
- Refund amount calculation: 100% refund of what you have paid.
- Refund will be processed within 10 working days of receiving the refund email.