Contact : +91 90210 97004
Email: enquiry@skills-factory.com
Certificate in Digital Ethical Hacking

Our Certificate Course in Ethical Hacking takes you inside a malicious hacker’s mind. You are trained to beat them in their own game. Learn the five phases of ethical hacking – Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks by applying right tools and techniques.

43 + Hours Course Duration
20 Hours Theory Sessions
23 hours Practicals

Skills Factory’s CDEH course uncovers every aspect of a Hacker’s world to you. The book details the dark world of Malwares, Trojans, Backdoors and Ransomwares; the various types of attacks; the countermeasures for such attacks; detection of vulnerabilities through a systematic process; and most importantly the preparedness to confront the onslaught of new cyber-attacks.
With the rise in cyber-attack, the industry is in dire need of ‘Good Guys.’ Industry prediction of reaching a workforce demand of 1.8 million in cyber security by 2022 gives you a chance to be ahead in the game. Learn today to reap tomorrow.

What you will learn?

  • Acquiring professional skills in penetration testing and malware analysis by thinking like a pro-hacker and securing the digital frontier.
  • Detecting and identifying cyber threats and delivering strong security posture.
  • Vulnerability assessment and patch management.
  • Securing computer, mobile and network perimeters from critical cyber threats and attacks.

Who should take this course?

  • Students joining IT sector
  • Professionals working on critical projects in IT/Non-IT sectors
  • Individuals interested in pursuing careers in digital security
  • Security professionals keen on upgrading their hacking skills
  • Introduction To Hacking
  • Essential Terminology
  • Confidentiality Integrity Availability (C.I.A)
  • Types of Hacker
  • Types of System Attack
  • Impact of Hacking
  • Footprinting Concepts
    Labs: Footprinting and Enumeration
  • Footprinting Methodology
    Labs: Network Scanning
  • Footprinting through Social Networking Sites
    Labs: Vulnerability Assesment
  • Email Footprinting
    Labs: Network Vulnerability Scanning
  • WHOIS Footprinting
    Labs: Vulnerability Scanning for Mobile
  • Network Scanning
  • Scanning Techniques
  • Scan for Vulnerability
  • Vulnerability Assessment
  • Network Vulnerability Scanning
  • Vulnerability Scanning for Mobile
  • Introduction to Malware
  • Concepts of Virus,Worm,Trojan
  • Types of Trojans
  • Types of Virus and Worms
  • Malware Reverse Engineering
  • Penetration Testing
  • System Hacking Goals
  • Methodology
  • Password Cracking
  • Key loggers
  • Spyware
  • Covering Tracks
  • What is Sniffing
  • Types of Sniffing
  • MAC Spoofing
  • DHCP Hijacking
  • ARP Poising
  • DNS Poising
  • Network Sniffing
  • Online credential sniffing and countermeasures
  • Sniffing Detection
  • Web Sniffing and patching
  • Webserver Attacks
  • Attack Methodology
  • Webserver Footprinting Tools
  • Enumerating Webserver Information
  • Webserver Attack
  • Metasploit
  • Webserver  Security
  • Web Server Security Scanner
  • SQL Injection Attacks
  • Cross-Site Scripting (XSS) Attacks
  • Cross-Site Request Forgery (CSRF) Attack
  • Session Fixation Attack
  • Cookie/Session Poisoning
  • Buffer Overflow Attacks
  • CAPTCHA Attacks
  • Improper Error Handling
  • Web Services XML Poisoning
  • Web App Hacking Methodology
  • Attacking Web Servers
  • Analyze Web Applications
  • Attack Authentication Mechanism
  • Authorization Attack Schemes
  • Attack Session Management Mechanism
  • Perform Injection Attacks
  • Web Application Hacking Tools
  • SQL Injection
  • Types of SQL Injection
  • SQL Injection Attacks
  • Advanced SQL Injection
  • SQL Injection Counter-measures
  • Cross-Site Scripting (XSS) Attacks
  • Cross-Site Scripting Attack Scenario
  • Advanced XSS Attack
  • Cross-Site Request Forgery (CSRF) Attack
  • Buffer Overflows: Attacks and Defences for the Vulnerability of the Decade
  • Basic Integer Overflows
  • Exploiting Format String Vulnerabilities
  • Stack based Buffer overflow
  • Heap Based Buffer Overflow
  • Hacking Methodology
  • Exploiting Bugs in Linux / Windows
  • Stress testing of Operating system
  • Fuzzing
  • Network Hacking
  • Bypassing Authentication
  • Exploiting Operating system level vulnerabilities
  • Exploit identification and Payload Management
  • Hacking Android OS
  • Android Trojan
  • Securing Android Devices
  • Hacking iOS
  • Jailbreaking iOS
  • Securing iOS Devices
  • Mobile Device Management (MDM)
  • Bring Your Own Device (BYOD)
  • Mobile Penetration Testing
  • DoS/DDoS Attack
  • Botnets, Zombies
  • DoS/DDoS Attack Tools
  • Attack Forensics
  • Enabling  TCP Intercept
  • DoS/DDoS Protection Tools
  • DoS/DDoS Attack Penetration Testing
  • Mitigate Attacks
  • Deflect Attacks
  • Application Level Flood Attacks
  • Cryptography
  • Encryption Algorithms
  • Cryptography Advantages
  • Ciphers
  • Data Encryption Standard (DES)
  • Advanced Encryption Standard (AES)
  • RC4, RC5, RC6 Algorithms
  • RSA
  • Public Key Infrastructure(PKI)
  • Disk Encryption
  • Penetration Testing Methodology
  • Network Penetration testing
  • Application Penetration Testing
  • Report Generation

oggle Content

  • 43 + Hours Course Duration
  • 20 Hours Theory Sessions
  • 23 Hours Practicals
  • CLASSROOM TRAINING
  • ONLINE LEARNING
  • BLENDED TRAINING
  • Repeated course in any batch till one year.
  • A life time support to students through email & off-line chats
  • MOC Interviews
  • Softskill & Lifeskill
  • Job assistance

Examination is conducted by Skills Factory Learning Pvt.Ltd. and Certificate is also provided by Skills Factory Learning Pvt. Ltd.


As this is a vendor specific course, for Global certification student has to register in “Pearson VUE” or “Prometric” Online examination center to attempt online examination and receive Global certificate from Vendor.

Yes, you can retake the test any time after the declaration of your previous test results.

Once you have completed your course and passed the test, you will receive your certificate by email, in pdf format.

GoI is providing incentives on FutureSkills Prime platform to eligible Indian citizen. The purpose of this incentive is to encourage citizens to upskill themselves. The incentive is provided on course, assessment and competency diagnostic fee. For further details, please refer to General Terms & Conditions.

All training sessions are conducted by our in-house subject matter experts.

It will depend upon which mode of learning you have opted for. In case, you have selected Live-online training mode, your training sessions will be conducted live by one of our trainers. If you have opted for distance learning option, you will learn through pre-recorded videos.

You need to have the following:

  • Windows: Windows 7 or higher
  • Mac: OSX 10.6 or higher
  • Internet speed: Preferably 512 Kbps or higher
  • Headset, speakers and microphone: You’ll need headphones or speakers to hear instruction clearly, as well as a microphone to talk to others. You can use a headset with a built-in microphone, or separate speakers and microphone.

To Claim the GoI Incentive, learners need to follow the 4 steps as below:

  • Step 1: Register on the platform
  • Step 2: Complete eligible courses offered on the platform
  • Step 3: Get Successfully certified in industry approved SSC assessments
  • Step 4: Apply for Govt. Of India Incentive through your learner ledger from September 4 onwards

For more details, refer to the General Terms & Conditions

GoI incentive can be claimed immediately after successfully completing a course and getting certified in industry approved SSC assessment.

A learner can claim for the GoI incentive from the Learner Ledger. Login > Profile > My Ledger

No time limit, but learners are advised to apply immediately after successfully completing a course and getting certified in industry approved SSC assessment. For more details, refer to the General Terms & Conditions

The incentive amount will typically be transferred to your account within 30 days of applying for the incentive, subject to accurate information being shared. For more details, please refer to the General Terms & Conditions.

The maximum incentive an eligible learner can avail is up to INR 12,000/- only. Further there are limits across the following content categories.

  1. 1. Deep Skilling – Subscription Based Pathways
  2. 2. Deep Skilling – Free Pathway
  3. 3. Bridge Courses
  4. 4. Foundation Courses


The learner can also avail only 1 GoI funded ‘Competency Diagnostic’ and 1 assessment on reimbursement basis in each of the 4 categories of courses. For more details, please refer to the General Terms & Conditions

All learners who wish to avail GoI incentive need to be 18 years or above.

Enquiry Form