Post Graduate Program in Cybersecurity & Ethical Hacking

Duration: 6 Months / 24 Weeks / 110 hrs

Industry Acceptance

Ethical hacking and penetration testing are two methods of assessing the security of a system or network by simulating cyberattacks. Ethical hackers use various hacking techniques to find and exploit vulnerabilities, while penetration testers focus on a specific scope and goal defined by the client. By learning ethical hacking and penetration testing, you can gain the skills and knowledge to protect your system or network from malicious hackers and improve your security posture.

Ethical hacking and penetration testing are highly demanded skills in the cybersecurity industry, as they help organizations identify and fix their security weaknesses before malicious hackers exploit them. By taking this course, you will learn how to use various hacking techniques and tools to assess the security of different systems and networks, and how to report your findings and recommendations.

Accredited by

Request an Inquiry for Admission


Registration Fees

₹ 1500

non-refundable

Course Fees

₹ 85,000

Flexible EMI options available.

Batch Start

Aug, 2025

Duration

6 Months / 24 Weeks / 110 hrs

Program Structure

Eligibility: Graduate/Diploma in any discipline

Duration: 6 Months / 24 Weeks / 110 hrs

Batch Start Date: Aug, 2025

Batch Size: 25-30

Courses and Certification Conduct Policy:

Program Structure:

Module 1:Introduction to Ethical Hacking (4 hours)
  • Understanding the role of ethical hackers
  • Legal and ethical considerations
  • Setting up a lab environment for practice
Module 2:Footprinting and Reconnaissance (4 hours)
  • Passive and active information gathering
  • OSINT (Open Source Intelligence) techniques
  • Tools like Nmap, Shodan, and theHarvester
Module 3:Scanning and Enumeration (4 hours)
  • Port scanning and service enumeration
  • Identifying vulnerabilities using tools like Nessus and Nikto
  • Enumerating users and shares
Module 4:Vulnerability Assessment and Exploitation (3 hours)
  • Vulnerability scanning and assessment
  • Exploiting common vulnerabilities (e.g., SQL injection, XSS)
  • Metasploit framework basics
Module 5:Wireless Network Hacking (3 hours)
  • Cracking WEP/WPA/WPA2 keys
  • Rogue access points
  • Securing wireless networks
Module 6:Web Application Security (4 hours)
  • OWASP Top Ten vulnerabilities
  • Manual and automated web app testing
  • Secure coding practices
Module 7:Social Engineering and Phishing (3 hours)
  • Psychological manipulation techniques
  • Crafting effective phishing emails
  • Protecting against social engineering attacks
Module 8:Network Penetration Testing (4 hours)
  • Active directory attacks
  • Privilege escalation
  • Post-exploitation techniques
Module 9:Mobile Application Security (3 hours)
  • Assessing Android and iOS apps
  • Reverse engineering mobile apps
  • Mitigating mobile security risks
Module 10:Report Development and Remediation (5 hours)
  • Writing effective penetration test reports
  • Prioritizing vulnerabilities
  • Collaborating with stakeholders for remediation

By the end of this course, participants will have practical skills in ethical hacking, penetration testing, and securing systems. They’ll be well-prepared to take on real-world challenges in the cybersecurity field.

Copyrights © 2021-2025 NIRA. All rights reserved.