service image

Certified Ethical Hacker v10 (CEH)

Ethical Hacking, also known as penetration testing, intrusion testing, or red teaming, is the controversial act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers.
An Ethical Hacker, also known as a white hat hacker, or simply a white hat, is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems. Nowadays, certified ethical hackers are among the most sought-after information security employees in large organizations such as Wipro, Infosys, IBM, Airtel and Reliance among others.

Program Aims

  • To produce students with extensive and comparative knowledge and understanding of ethical hacking theory and practice across a range of execution platforms.
  • To enable students to apply their knowledge, understanding and skills in the systematic and critical assessment of a wide range of concepts, ideas, and data.
  • To produce students who show originality and creativity in formulating, evaluating and applying evidence-based solutions and arguments to diverse problem spaces in an ethical hacking context.
  • • To produce graduates who communicate the results of their study and other work accurately and reliably using the full repertoire of the principal concepts and constructs of the subject.
  • To develop in students a critical understanding of the established theories, principles and concepts associated with ethical hacking.


1st Month

• Module 01 - Introduction to Ethical Hacking
• Module 02 - Foot printing and Reconnaissance
• Module 03 - Scanning Networks

2nd Month

• Module 04 - Enumeration
• Module 05 - System Hacking
• Module 06 - Malware Threats

3rd Month

• Module 07 - Sniffing
• Module 08 - Social Engineering
• Module 09 - Denial of Service

4th Month

• Module 10 - Session Hijacking
• Module 11 - Hacking Webservers
• Module 12 - Hacking Web Applications

5th Month

• Module 13 - SQL Injection
• Module 14 - Hacking Wireless Networks
• Module 15 – Spamming

6th Month

• Module 16 – Intrusion Detection system, Firewalls and Honeypots
• Module 17 - Cryptography


Python is an open source interpreted high-level programming language for general-purpose programming. Created by Guido van Rossum and first released in 1991, Python has a design philosophy that emphasizes code readability, notably using significant whitespace. It provides constructs that enable clear programming on both small and large scales. Python features a dynamic type system and automatic memory management. It supports multiple programming paradigms, including object-oriented, imperative, functional and procedural, and has a large and comprehensive standard library. Python interpreters are available for many operating systems.


Linux is a Unix-like, open source and community-developed operating system for computers, servers, mainframes, mobile devices and embedded devices. It is supported on almost every major computer platform including x86, ARM and SPARC, making it one of the most widely supported operating systems. This is the system we will mostly use throughout the ethical hacking course at Dexter Cyberlab.