Certificate in Digital Ethical Hacking (CDEH)

About Course

Brochure

Our Certificate Course in Ethical Hacking takes you inside a malicious hacker’s mind. You are trained to beat them in their own game. Learn the five phases of ethical hacking – Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks by applying right tools and techniques.

Skills Factory’s CDEH course uncovers every aspect of a Hacker’s world to you. The book details the dark world of Malwares, Trojans, Backdoors and Ransomwares; the various types of attacks; the countermeasures for such attacks; detection of vulnerabilities through a systematic process; and most importantly the preparedness to confront the onslaught of new cyber-attacks. With the rise in cyber-attack, the industry is in dire need of ‘Good Guys.’ Industry prediction of reaching a workforce demand of 1.8 million in cyber security by 2022 gives you a chance to be ahead in the game. Learn today to reap tomorrow.

FAQ

  • Students joining IT sector
  • Professionals working on critical projects in IT/Non-IT sectors
  • Individuals interested in pursuing careers in digital security
  • Security professionals keen on upgrading their hacking skills

GoI is providing incentives on FutureSkills Prime platform to eligible Indian citizen. The purpose of this incentive is to encourage citizens to upskill themselves. The incentive is provided on course, assessment and competency diagnostic fee. For further details, please refer to General Terms & Conditions.

All training sessions are conducted by our in-house subject matter experts.

It will depend upon which mode of learning you have opted for. In case, you have selected Live-online training mode, your training sessions will be conducted live by one of our trainers. If you have opted for distance learning option, you will learn through pre-recorded videos.

You need to have the following:

  • Windows: Windows 7 or higher
  • Mac: OSX 10.6 or higher
  • Internet speed: Preferably 512 Kbps or higher
  • Headset, speakers and microphone: You’ll need headphones or speakers to hear instruction clearly, as well as a microphone to talk to others. You can use a headset with a built-in microphone, or separate speakers and microphone.

To Claim the GoI Incentive, learners need to follow the 4 steps as below:

  • Step 1: Register on the platform
  • Step 2: Complete eligible courses offered on the platform
  • Step 3: Get Successfully certified in industry approved SSC assessments
  • Step 4: Apply for Govt. Of India Incentive through your learner ledger from September 4 onwards

For more details, refer to the General Terms & Conditions

GoI incentive can be claimed immediately after successfully completing a course and getting certified in industry approved SSC assessment.

A learner can claim for the GoI incentive from the Learner Ledger. Login > Profile > My Ledger

No time limit, but learners are advised to apply immediately after successfully completing a course and getting certified in industry approved SSC assessment. For more details, refer to the General Terms & Conditions

The incentive amount will typically be transferred to your account within 30 days of applying for the incentive, subject to accurate information being shared. For more details, please refer to the General Terms & Conditions.

The maximum incentive an eligible learner can avail is up to INR 12,000/- only. Further there are limits across the following content categories.

  1. 1. Deep Skilling – Subscription Based Pathways
  2. 2. Deep Skilling – Free Pathway
  3. 3. Bridge Courses
  4. 4. Foundation Courses

The learner can also avail only 1 GoI funded ‘Competency Diagnostic’ and 1 assessment on reimbursement basis in each of the 4 categories of courses. For more details, please refer to the General Terms & Conditions

All learners who wish to avail GoI incentive need to be 18 years or above.

Show More

What Will You Learn?

  • Acquiring professional skills in penetration testing and malware analysis by thinking like a pro-hacker and securing the digital frontier.
  • Detecting and identifying cyber threats and delivering strong security posture.
  • Vulnerability assessment and patch management.
  • Securing computer, mobile and network perimeters from critical cyber threats and attacks.

Course Content

Book

  • Reference Material Book 
    00:00

Concise Guide

Video’s – Hindi

Video’s English

Student Ratings & Reviews

No Review Yet
No Review Yet