+91- 99535 35779
+91-11-4569 5102


Ethical Hacking Training

What is Ethical Hacking ?

APSMIND is one of the most reputed institutes offering ethical hacking training and enhance you with the in-depth knowledge of hacking techniques and information security. In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, challenge or enjoyment. The subculture that has evolved around hackers is often referred to as the computer underground and is now a known community.

While other uses of the word hacker exist that are not related to computer security, such as referring to someone with an advanced understanding of computers and computer networks, they are rarely used in mainstream context. They are subject to the longstanding hacker definition controversy about the term's true meaning. In this controversy, the term hacker is reclaimed by computer programmers who argue that someone who breaks into computers,

whether computer criminal (black hats) or computer security expert (white hats), is more appropriately called a cracker instead. In ethical hacking training Some white hat hackers claim that they also deserve the title hacker, and that only black hats should be called "crackers". according to current Market Demand. Our SpecialistTrainer conduct the class and explore new ideas and experience in detail. APSMIND Technology Pvt. Ltd. one of leadinginstitute in the field of Ethical-Hacking-Training in delhi.


Hacking Introduction

What is a Hacker?

Type of Hackers

Hacker social scale

What does it take to become a hacker?


Network Basics and Terminologies


Network topologies


Network layers


Website Penetration


Information gathering

  • Info Gathering using WHOIS information
  • Info Gathering using Tools and Search Engines
  • Info Gathering using Meta tags & Words
  • Info Gathering using non-technically
  • Info Gathering using technical
  • Info Gathering using domain
  • Info Gathering using mx, ns


People Search

Web Archive

Identifying and Tracing the Fake Emails

Email attack and gathering info

  • Sending Fake Mails
  • Creating Fake Pages


  • Website Scanner
  • E-Spiders
  • N Map
  • Zen map

Google hacking databases

  • Advance keywords search
  • Find vulnerable Webpages

Information disclosure vulnerabilities

Web Application Vulnerabilities

  • Authentication Bypass SQL Injection
  • Advanced SQL Injection
  • Website application firewall bypass
  • String Base Injection
  • Website application firewall bypass.
  • Error Based Injection
  • Website application firewall bypass.

Cross Site Scripting Vulnerability

  • Xss 1
  • Xss 2

Uploading Control Panel

  • Tech 1
  • web backdoors
  • php,asp,jsp backdoors

Removing Footprint

What is a logs ?

s/w logs

Server logs

Os logs

How we remove logs

Local File Inclusion (LFI)

Remote File Inclusion (RFI)

Vulnerability assessment and penetration testing (VAPT)

Malware Analysis and Backdoors


  • Virus
  • Worm
  • Trojan
  • Keyloggers


  • Phishing 1
  • Phishing 2

Social Engineering Techniques and Honey Pots

Botnets and Introduction DDOS Attack

Proxy Server and VPN Server


  • Introduction
  • Type of cryptography
  • Introduction to encryption
  • Introduction to decryption

Reverse Engineering

  • Introduction
  • Engineering
  • Reverse engineering
  • Introduction to Registers
  • Assembly language
  • Introduction to debugging
  • Debugging software
  • Software 1

Exploit Writing

  • Introduction
  • Assembly language for exploit writing

Buffer overflow Attack

Metasploit Framework Training

  • Introduction to the Metasploit Framework
  • Architecture of Metasploit Framework
  • Basic Terminologies
  • Exploitation Techniques
  • Identifying Vulnerability and Exploits
  • Exploitation on different platforms
  • Usage of different exploits
  • Exploitation tech 1

Wireless Penetration Testing

  • Introduction
  • About the Wifi Cards
  • WEP attack
  • WEP crack

Mobile Penetration Testing

  • Introduction
  • Symbain
  • Android
  • Ios
  • Window
  • Blackberry
  • Nokia android

VOIP Call Attack

  • Introduction
  • Call forgery
  • Crime investigation for call forgery
  • Sms forgery
  • Crime investigation for sms forgery

Bluetooth Hacking

    Cyber Crime Investigation and IT ACT 2000

    Cyber Forensics Tools

  • Computer Forensics Investigation Process
  • Computer Forensics Lab
  • Understanding Hard Disks and File Systems
  • Windows Forensics
  • Recovering Deleted Files and Deleted Partitions
  • Image Files Forensics
  • Audio file forensics

Semi-final and Final Examination

take admission and get job