Certified Ethical Hacker

Master ethical hacking techniques to secure computer systems

100% Placement Assistance | 1000+ Hiring Partners

Start Date

February 13, 2026

Course Duration

100 Hrs

Offline Mode

₹ 25000

Online Mode

₹ 15000

Start
Date

10 June 2024

Course Duration

6 Months

Instructors

Prakash, Srinivas + 2 more

About Program

Ethical Hacking is a crucial skill set in the realm of cybersecurity, involving the identification and rectification of vulnerabilities in systems to prevent malicious attacks. Pursuing an Ethical Hacking course at Rooman offers extensive training with real-world applications, taught by cybersecurity experts. The course covers modules such as Policies and Controls, OS Level Attacks, Social Engineering, Web Application Security, IoT, Cloud Attacks, Mobile Hacking, Firewalls, Cryptology, Vulnerability Analysis, and Capture the Flag (CTF). Graduates can pursue roles such as Ethical Hacker, Penetration Tester, Cybersecurity Analyst, Security Consultant, and Network Security Engineer. Rooman provides robust career support and placement opportunities, making it an ideal choice for those aiming to advance their careers in cybersecurity.

Key Features

Why choose us?

LIVE mentoring & Doubt clarification sessions
100+ Lab Assignments
25 Hrs aptitude and logical reasoning
Interview preparation & Placement assistance

Training Option

Timings: Weekends

Timings: Monday - Friday (9.00 AM - 6.00 PM)

Tools & Softwares

Salary Scale

Maximum
10 LPA
Average
4 LPA
Minimum
2.5 LPA

Job Role

Our Alumni Work at

Course Curriculum

  • Risk Management & Incident Management
  • Information Security controls
  • Data Management
  • Concept of Penetration testing
  • Types of Penetration testing
  • Phases of Penetration testing
  • Vulnerability Assessment by Penetration testing
  • Introduction to Malware
  • Different Ways a Malware can Get into a System
  • Common Techniques Attackers Use to Distribute Malware on the Web
  • Components of Malware
  • Introduction to Viruses, Worms & Trojan
  • Types of Virus, Worms &Trojan
  • Fake Antiviruses
  • How Did Antivirus Works
  • Introduction to Malware Analysis
  • Malware Analysis Procedure
  • Malware Detection Method
  • Information Gathering Using Google Advanced Search and Image Search
  • VoIP and VPN Footprinting through Google Hacking Database
  • Finding Company’s Top-level Domains (TLDs) andSub-domains
  • Finding Location, People search, Professional search
  • Techniques for Enumeration, Services and Ports toEnumerate
  • NetBIOS, SNMP, LDAP Enumeration
  • Information Gathering Using Groups, Forums, and Blogs
  • Network Scanning Concepts
  • Scanning Tools and Techniques
  • Scanning Pen Testing
  • Port Scanning & Countermeasaures
  • Sniffing Concepts & Techniques
  • WireShark installing & concept
  • Sniffing Detection Techniques
  • Social Engineering Concepts
  • Social Engineering Techniques
  • Insider Threat / Insider Attack
  • Basics to the SQL queries
  • How Injection Can be done
  • Cross Site ScrIPting Attacks
  • DoS/DDoS Attack Techniques
  • DDoS Case Study
  • DoS/DDoS Attack Tools
  • Session Hijacking Concepts
  • Network Level Session Hijacking
  • System Hacking Concepts
  • Cracking Passwords
  • Escalating Privileges
  • Hiding Files and Covering tracks
  • Client side Hijacking
  • Basics of Web Application and Technology stack.
  • OWASP Top 10 Application Security Risks – 2017
  • Injection Flaws
  • File Injection Attack
  • Broken Authentication
  • Sensitive Data Exposure
  • XML External Entity (XXE)
  • Broken Access Control
  • Security Misconfiguration
  • Cross-Site ScrIPting (XSS) Attacks
  • Insecure Deserialization
  • Using Components with Known Vulnerabilities
  • Web App Hacking Methodology and its foot printing
  • Password Attacks
  • Password Functionality Exploits
  • Password Guessing and Brute-forcing
  • Web Server Concepts
  • Web server attacks
  • Web Server Attack Methodology
  • Web Server Attack Tools
  • Detecting Web Server Hacking Attempts
  • Patch Management
  • Web Server Security Tools
  • Basic of IOT, Architecture, Technology and Protocols
  • Challenges, Opportunity in IOT
  • OWASP Top 10 IOT Vulnerabilities and Obstacles
  • DDos Attack
  • Jamming Attack
  • Botnets
  • Man In middle concept
  • Data & Identity Theft
  • Introduction to Cloud & Virtualization
  • Cloud Deployment and responsibilities
  • Service Hijacking
  • Social Engineering
  • Network sniff
  • XSS attack
  • DNS (Domain Name system attack)
  • Control Layers and Responsibilities
  • Cloud Computing Security Consideration
  • Introduction to the Mobile architecture
  • Working principle for mobile OS
  • Security of the application used in Mobiles
  • Hacking Methodology for mobile with Metasploit
  • Introduction to Terminology, Networks,Standards
  • Types of Wireless Authentication and Encryption
  • WEP (Wired Equivalent Privacy) Encryption
  • WPA (Wi-Fi Protected Access)Encryption
  • WPA2 (Wi-Fi Protected Access 2) Encryption
  • Wi-Fi Discovery
  • GPS Mapping
  • Traffic canalizing
  • Launch Wireless attacks
  • Crack Wi-Fi Encryption
  • What is Firewall & Example
  • What is IDS & example
  • What is Honeypots & examples
  • Case study of Bypassing Firewall ,IDS, Firewall
  • Packet Fragmentation and Source Routing
  • Working with SNORT [DetectionTool]
  • IP address Decoy and Spoofing
  • IP Spoofing Detection Techniques: Direct TTL Probes
  • IP Spoofing Detection Techniques: IP Identification Number
  • IP Spoofing Detection Techniques: TCP Flow Control Method
  • IP Spoofing Countermeasures
  • Types of Cryptography
  • Government Access to Keys (GAK)
  • CIPhers
  • Data Encryption Standard
  • Advanced Encryption Standard
  • RC4, RC5, and RC6 Algorithms
  • Digital Signature, SSL, TLS
  • Cryptography Toolkit & Disk Encryption
  • Brute-Force Attack
  • Meet-in-the-Middle Attack on Digital Signature Scheme
  • Side Channel Attack
  • Hash Collision Attack
  • Rainbow Table Attack
  • Vulnerability Assessment Concept & Solutions
  • Vulnerability Assessment Tools & Reports
  • Comparing Security Audit, Vulnerability Assessment, and Penetration Testing
  • Understanding of Kali Linux commands
  • Using commands situation based
  • Understanding of web application
  • Web application tricks to get data
  • Doing pentesting Situation based
  • Installing and working on Kali Linux
  • Vulnerability Assessment Concept & Solutions
  • Vulnerability Assessment Tools & Reports

Certification

Testimonials

Frequently Asked Questions

The CEH program is a comprehensive training course designed to teach ethical hacking and network security skills. It covers various techniques and tools used by hackers and equips participants with the knowledge to protect systems against cyber threats.

The course is suitable for IT professionals, network security officers, auditors, security professionals, site administrators, and anyone interested in learning ethical hacking and securing systems.

Basic knowledge of networking concepts and operating systems is recommended, but there are no strict prerequisites. Prior experience in IT security or completion of an introductory course in cybersecurity can be beneficial.

The course covers a wide range of topics, including network scanning, enumeration, vulnerability analysis, system hacking, malware threats, sniffing, social engineering, denial-of-service attacks, session hijacking, and cryptography

The CEH course is delivered through live-online classes, in-person classroom training, and recorded sessions available 24/7. Students also have access to a cloud-based lab environment for hands-on practice

Yes, upon successful completion of the course and passing the exam, participants will receive an industry-recognized CEH certification from Rooman Technologies

Certified Ethical Hackers can pursue careers as penetration testers, security analysts, network security engineers, security consultants, and more. The certification is widely recognized and valued in the IT security industry

Yes, Rooman Technologies offers free demo sessions for prospective students to understand the course content and delivery method before making a commitment

Yes, Rooman Technologies provides job placement assistance, including access to campus placement drives and interview preparation sessions

The course includes multiple lab assignments, quizzes, and capstone projects that provide real-world scenarios to help students gain practical experience in ethical hacking

Need Help?