Overview

us-council Certified Ethical Hacking and Prevention

(Pre-Requisite Knowledge of Cybersecurity Associate - SOC Analyst)

This course is meant for those professionals who are looking for comprehensive and total knowledge in the network security domain. This is the only course which teaches both hacking and prevention techniques. And in keeping with Zoom's standards, this course is entirely hands on and real time oriented. And need we say, the instructors are network security and intrusion specialists with several years of experience.

Curriculum

Ethical Hacking and Prevention

2 Week

Module 1: Security Risk Assessment

  • Introduction to Ethical Hacking  
    • What is Hacking
    • Skills of a hacker
    • Types of Hackers 
    • Network Security Challenges
    • What is Ethical Hacking 
  • Bypassing Android lock screen
  • Information Security
  • Information Assurance
  • Elements of Information Assurance
  • Stages of Hacking 

Module 2: Vulnerability Based Hacking

  • Footprinting   
    • What is Footprinting
    • Footprinting Techniques Scanning
  • Scanning 
    • What is Scanning
    • What is Enumeration
    • Scanning methodology
    • Continuous Automated Red Teaming (CART)
    • AI Fuzzing
    • Vulnerability Assessment 
    • Penetration Testing


Module 3: Hacking Web Applications

  • What is a Web Application  
  • Web Application Attacks  
    • Code Injection 
    • Web site defacement
    • SQL Injection
    • XSS


Module 4: Cryptography

  • What is Cryptography 
  • Types of Cryptography 
  • Cryptographic Hash 


Module 5: Password Hacking Attacks

  • Password guessing
  • Shoulder Surfing
  • Social Engineering
  • System hacking
  • Brute force attack
  • Dictionary attack
  • Rainbow tables 


Module 6: Sniffers

  • What is a sniffer
  • How does a sniffer function
  • Sniffing techniques 


Module 7: Phishing

  • What is Phishing 
  • Phishing techniques 
    • Spear Phishing
    • Whaling 
    • Pharming
    • Vishing


Module 8: Wireless Hacking

  • What is a Wireless Network
  • Types of Wireless Networks
  • Different WiFi standards
  • WiFi attacks 


Module 9: Malware

  • What is Malware
  • Types of Malwares
  • Privilege Escalation
  • Unauthorized Application Execution 


Module 10: IoT Attacks

  • What is IoT
  • IoT communication methods
  • IoT communication protocols
  • IoT Operating Systems
  • Security Challenges in IoT
  • IoT Attacks 


Module 11: Cloud Computing

  • What is Cloud Computing
  • Types of Cloud Computing
  • Cloud Computing Services
  • Cloud Computing Attacks 


Module 12: Blockchain Attacks

  • What is Blockchain
  • Blockchain Attacks
  • Denial of Service (DoS) 
    • What is DoS
    • What is DDoS 
    • Botnets
    • DoS/ DDoS attack techniques


Module 13: Anonymizers

  • What is an anonymizer
  • Why are anonymizers used
  • Types of anonymizers 
    • Proxy
    • VPN Proxy 
    • TOR Browser 


Module 14: DarkWeb

  • What is DarkWeb 
  • Different DarkWeb technologies
  • Freenet
  • I2P
  • TOR 


Module 15: Covering Tracks

  •  How hackers cover their tracks 


Module 16: Securing the Network

  • Hardware encryption
  • Software encryption
  • PKI 


Module 17: Cybersecurity Frameworks, Standards & Cyber Resilience

  • Cyber Kill Chain 
  • Introduction to MITRE ATT&CK Framework 
  • Introduction to Security Compliance Standards
  • Cyber Resilience
  • Cyber Fusion Center 


Course Schedule

Course Schedule

Ethical Hacking and Prevention

16 Mar 2026

08:00 PM to 10:00 PM

(IST - GMT +05:30)

2 Weeks

2 Hrs/Day

Sunday off

Online

15 Apr 2026

08:00 AM to 10:00 AM

(IST - GMT +05:30)

2 Weeks

2 Hrs/Day

Sunday off

Online

30 Apr 2026

11:00 AM to 01:00 PM

(IST - GMT +05:30)

2 Weeks

2 Hrs/Day

Sunday off

Online

For Online Training Students

  • Instructions will be Provided to do Lab Practicals with your PC at Home
  • You will receive link to your email from Webex in an hour after the class to Download the Recorded Videos.
  • All the study materials will be provided FREE through our  Study Material and Videos


Imp. Note

  • Fees once paid will not be refunded or adjusted against other courses / batches / students under any circumstances whatsoever.
  • Organization reserves the right to expel any student during the training period.
  • In case, a student fails to attend the given batch the amount given will be forfeited against his / her name.


Sample Certificate

sample certificate for us-council Ethical Hacking & Prevention

Study Material

FAQ'S

What is US-Council Certification and how does it differ from other cybersecurity certification?

US-Council Certification is a set of comprehensive programs aiming to create cybersecurity experts capable of defending against cyber threats. Unlike other cybersecurity certification, which focuses on ethical hacking, US-Council provides a broader approach towards cybersecurity education and awareness, including proactive defense strategies and security testing services.

Why should I choose US-Council for my cybersecurity certifications?

Choosing US-Council for your cybersecurity certification ensures that you receive thorough education and awareness about the latest security measures and cyber threats. With certifications from US-Council, you gain access to free white papers, the opportunity to become an authorized partner, and insights from informative live webinars, all tailored to help you secure or perish in the face of cybercrime.
Ethical Hacking and Prevention slider promoting cybersecurity Preview this course
Duration : 2 Weeks
Mode Of Training : Online
Placement Assistance : Yes
Certificate : Yes
Price: 9,900

All prices are subject to an 18% Goods and Service Tax (GST) Charge. Rate quoted in U.S. dollars subject to change according to Foreign Exchange rates.

Once you make the payment, kindly contact our course counsellor at priya@zoomgroup.com to schedule the course as per your convenience from the available slots.