• Phone +91 8511 338 833
  • E-mail Address inquiry@cybersecurityindia.in

AICEH & PT

inspire cyber security India

INSPIRE CERTIFIED ETHICAL HACKER & PENETRATION TESTER

AICEH & PT

Mode Fees Duration
Regular mode 22,200/-INR 3 Months
Fastrack mode 22,200/-INR 26 days
  • ADVANCED CERTIFIED COMPUTER & DATA SECURITY EXPERT

  • (A) INTRODUCTION OF CYBER CRIME & ETHICAL HACKING

  • (1) WHAT IS CYBER CRIME
  • (2) WHAT IS ETHICAL HACKING
  • (3) TYPES OF CYBER CRIME
  • (4) TYPES OF HACKER
  • (5) HACKER VS. CRACKER
  • (6) PROCESS & TERMS OF HACKING
  • (7) INTRODUCTION OF INTERNET
  • (B) INTRODUCTION OF INTERNET

  • (1) HOW DOES INTERNET WORK
  • (2) STAYING SAFE IN THE INTERNET
  • (3) ANTIVIRUS PRIVACY
  • (4) SEARCHING BASE SAFETY
  • (5) WHAT IS ISP
  • (6) WHAT IS DNS, CCTLS
  • (7) WEB SERVER & INTERNET SERVER
  • (8) INTERNET BROWSER SECURITY
  • (9) SECURE YOUR FINANCIAL TRANSACTION
  • (C) SECURITY-AUDITING-BACKUP

  • (1) G MAIL SECURITY
  • (2) G MAIL BACKUP
  • (3) FACE BOOK SECURITY
  • (4) FACE BOOK BACKUP
  • (5) YAHOO SECURITY
  • (6) YAHOO BACKUP
  • (7) GMAIL AUDITING
  • (8) FACE BOOK AUDITING
  • (9) STRONG UNBREAKABLE PASSWORD
  • (10) DROPBOX,GOOGLE DRIVE
  • (D) MONITORING

  • (1) GMAIL MONITORING
  • (2) FOLDER MONITORING
  • (3) SYSTEM MONITORING
  • (4) CONTROL MONITOR
  • (5) RECORDING OF SCREEN
  • (6) SET VIDEO AS DESKTOP
  • (E) COMPUTER SECURITY

  • (1) RESTRICT CUT COPY PASTE
  • (2) PREVENT ACCESS OF USB
  • (3) LOCK PC WITH USB
  • (4) LOCK PC USING PATTEN LOCK
  • (5) WITHOUT SETUP INSTALLED SOFTWARE
  • (6) CONTROL REGISTRY BY ADMIN
  • (7) CLEAN UP REGISTRY
  • (8) LOCK FOLDER
  • (9) COMPUTER DRIVE SECURITY WITHOUT SW
  • (10) SYSTEM BACKUP, SYSTEM RESTORE
  • (11) FOLDER SECURITY WITHOUT SOFTWARE
  • (12) HIDE USER ACCOUNT SOFTWARE
  • (F) WINDOWS TIPS TRICKS

  • (1) TYPES OF WINDOWS
  • (2) MAKE BOOTABLE USB
  • (3) BOOST SYSTEM SPEED WITH USB
  • (4) WINDOWS TIPS
  • (5) INSTALLED SOFTWARE INFORMATION UPDATES
  • (6) REMOVE PROGRAM WITH RIGHT CLICKS
  • (7) HOW TO MAKE WINDOWS GENUINE
  • (8) RECOVER WINDOWS CORRUPTED FILE
  • (9) MAKE YOUR COMPUTER BROWSER
  • (10) MORE WINDOWS FASTER OPERATE
  • (11) INCREASE COPY SPEED
  • (12) DOS COMMANDS
  • (13) CHANGE DRIVE LETTER
  • (14) SEND SELECTED FOLDER
  • (15) ADD CONTROL PANEL IN MY COMPUTER
  • (G) VIRUS

  • (1) WHAT IS VIRUS
  • (2) DIFFERENT TYPE OF VIRUS
  • (3) VIRUS
  • (4) RESTRICT VIRUS
  • (5) ADVANCED ANTIVIRUS SETUP
  • (6) PROTECT BROWSER FROM SPYWARE
  • (7) WINDOWS FIREWALL THROUGH PROTECTION
  • (8) AUTO RUN SOFTWARE
  • (9) AUTO RUN STOP
  • (H) SYSTEM CONTROL

  • (1) HOW TO HIDE FOLDER
  • (2) HOW TO RESET REGEDIT
  • (3) HOW TO STOP SHUTDOWN MANU
  • (4) HOW TO USE GPEDIT.MSC
  • (I) REGISTRY TRICKS

  • (1) DISABLE OPEN WITH MANU
  • (2) HOW TO ADD LEGAL NOTICE
  • (3) HOW TO DISABLE RIGHT CLICK ON DESKTOP
  • (4) REMOVE CLOCK FROME NOTIFICATION AREA.TXT
  • (5) REMOVE CONTROL PANEL FROME THE SYSTEM NOTIFICATION ARE
  • (6) REMOVE RUN FROME THE SYSTEM
  • (7) REMOVE SEARCH FROME THE SYSTEM
  • (8) SOME COOL REGISTRY EDITING TRICKS
  • (J) EXTRA TRICKS TIPS

  • (1) FIND SERIAL KEY OF ANY SOFTWARE
  • (2) MAKE YOUR COMPUTER SPEAK
  • (3) CREATE UNDELETABLE FOLDER
  • (4) WI-FI SECURITY
  • (5) BLUE TOOTH SECURITY
  • (6) WINDOWS SECURITY
  • (7) SMART PHONE SECURITY
  • (8) NETWORK SECURITY
  • (9) SOME COOL KEYBOARD TRICKS
  • (10) EXTRA SOFTWARE
  • ADVANCED CERTIFIED COMPUTER FORENSIC & INVESTIGATOR

  • (A) OVERVIEW OF CYBER LAW & CYBER CRIME

  • (1) INTRODUCTION OF CYBER CRIMES
  • (2) INTRODUCTION OF CYBER LAW
  • (3) PROCESS OF CYBER CRIME INVESTIGATION
  • (4) INTRODUCTION OF CYBER LAW
  • (5) INTRODUCTION OF DIGITAL FORENSIC
  • (6) INTERNET CRIMES
  • (7) HOW TO INVESTIGATE OF CYBER CRIMES
  • (8) TYPES OF INVESTIGATION
  • (B) COMPUTER FORENSICS

  • (1) WHAT IS COMPUTER FORENSICS
  • (2) REASONS FOR EVIDENCE
  • (3) TYPES OF EVIDENCE
  • (4) WHO USES COMPUTER FORENSICS
  • (5) PROCESS OF COMPUTER FORENSIC
  • (6) HANDLING EVIDENCE
  • (7) COMPUTER FORENSIC REQUIREMENTS
  • (8) EVIDENCE PROCESSING GUIDELINES
  • (C) FOOT PRINTING

  • (1) WHAT IS DOMAIN
  • (2) HOW TO GET DOMAIN
  • (3) DOMAIN PRIVACY
  • (4) DOMAIN INVESTIGATION WITH TOOLS
  • (5) DOMAIN INVESTIGATION WITHOUT TOOLS
  • (6) DOMAIN REPORTING
  • (7) INTRODUCTION OF HOSTING
  • (8) HOW TO SELECT HOSTING
  • (9) HOSTING SECURITY
  • (10) HOSTING SERVER INVESTIGATION
  • (11) WEBSITE BACKUP
  • (12) DOMAIN HISTORY
  • (13) GHDB
  • (14) GOOGLE SEARCH
  • (D) SYSTEMS FORENSIC

  • (1) LAST ACTIVITY FORENSIC
  • (2) DATABASE VIEW
  • (3) TURNS ON, OFF VIEW
  • (4) CONTROL REGISTRY BY ADMIN
  • (5) HANG PROGRAM VIEW
  • (6) ANTI-FORENSIC SYSTEM
  • (7) ALL UNINSTALLED PROGRAM VIEW
  • (9) PROCESS ACTIVITY VIEW
  • (10) ADVANCED SYSTEM FORENSIC WITH WIN HEX
  • (11) SYSTEM FORENSIC WITHOUT SOFTWARE
  • (12) HIDDEN DATA FORENSIC
  • (13) FOLDER CHANGES VIEW
  • (14) PRODUCT KEY VIEW
  • (15) USB DRIVE VIEW
  • (16) CRASH REPORT VIEW
  • (17) FILE TYPES MANAGEMENT VIEW
  • (18) OPENED FILE VIEW
  • (19) SYSTEM’S FOLDER ACTIVITY TRACING
  • (E) DATA ANALYSIS & RECOVERY

  • (1) INTRODUCTION OF DIGITAL FILE FORENSIC
  • (2) INTRODUCTION OF DATA RECOVERY
  • (3) TYPE OF DATA RECOVERY
  • (4) USB DATA RECOVERY
  • (5) HARD DISK DATA RECOVERY
  • (6) HARD DISK PARTITION BACKUP
  • (7) HARD DISK PARTITION CLONING
  • (9) ANTI FILE RECOVERY TOOL
  • (10) CD,DVDFILE RECOVERY
  • (F) FORENSICS USING WIN HEX TOOL

  • (1)WHAT IS WIN HEX
  • (2) WHY USING WIN HEX
  • (3) CALCULATE HASH DIGEST FOR USININGMD5
  • (4) FORENSIC DISK IMAGING USING WIN HEX
  • (5) CALCULATE HASH DIGEST FOR THE IMAGE FORENSIC
  • (6) DATA ACQUISITION ON A SYSTEM
  • (7) SEARCHING EVIDENCE
  • (9) RECOVERING DELETE EVIDENCE USING WIN HEX
  • (10) FILE RECOVERY BY TYPE
  • (11) RAM MEMORY EVIDENCE USING WIN HEX
  • (12) RAM MEMORY INVESTIGATION USING WIN HEX
  • (G) IMAGE FILE FORENSIC

  • (1) WHAT IS IMAGE FILE FORENSIC
  • (2) TYPES OF PHOTOS
  • (3) IMAGE FORENSIC ONLINE TOOLS
  • (4) IMAGE FORENSIC TOOL
  • (5) IMAGE FILE RECOVER
  • (6) ANTIFORENSIC OF IMAGE FILE
  • (7) EDITED IMAGE FOR ANTI FORENSIC
  • (H) FACE BOOK INVESTIGATION & SECURITY

  • (1) INTRODUCTION OF FACE BOOK CRIMES
  • (2) FACE BOOK CRIME REPORTING
  • (3) FACE BOOK FAKE ID INVESTIGATION
  • (4) LAST VISITED USER ON FACEBOOK
  • (5) FACE BOOK DATA RECOVERY
  • (6) SOCIAL REPORTING
  • (7) VIDIO,IMAGES REPORTING
  • (8) LAW ENFORCEMENT ONLINE REQUESTS
  • (9) FACEBOOK AWESOME TRICKS
  • (I) EMAIL INVESTIGATION & SECURITY

  • (1) HOW TO WORK OF EMAIL
  • (2) EMAIL SPOOFING
  • (3) SPAMMING MAILS
  • (4) EMAIL SECURITY
  • (5) EMAIL BACKUP
  • (6) MAIL BLOCKING
  • (7) EMAIL INVESTIGATION
  • (8) EMAIL FILE ANALYST
  • (9) EMAIL ACTIVITY TRACKING
  • (10) EMAIL TRACKING
  • (11) IP TRACING
  • (12) EMAIL LOCKING
  • (J) CRYPTOGRAPHY

  • (1) INTRODUCTION OF CRYPTOGRAPHY
  • (2) USES OF CRYPTOGRAPHY
  • (3) ONLINE CRYPTOGRAPHY TOOLS
  • (4) OFFLINE CRYPTOGRAPHY TOOLS
  • (5) TRUE CRYPT ENCRYPTION
  • (6) TRUE CRYPT DECRYPTION
  • (7) BIT LOCKER ENCRYPTION
  • (8) BIT LOCKER DECRYPTION
  • (9) HASH CALCULATOR
  • (10) DETECTOR TRUE,BIT,HASH
  • (K) STEGANOGRAPHY

  • (1) INTRODUCTION OF STEGANOGRAPHY
  • (2) USES OF STEGANOGRAPHY
  • (3) STEGANOGRAPHY TECHNIQUES WITH SOFTWARE
  • (4) STEGANOGRAPHY WITHOUT SOFTWARE
  • (5) STEGANOGRAPHY IMAGE BEHIND IMAGE
  • (L) PASSWORD SECURITY & RECOVERY

  • (1) WORD, EXCEL PASSWORD SECURITY
  • (2) WORD, EXCEL PASSWORD RECOVERY
  • (3) PDF PASSWORD SECURITY
  • (4) PDF PASSWORD RECOVERY
  • (5) RAR PASSWORD SECURITY
  • (6) RAR PASSWORD RECOVERY
  • (7) FILE & FOLDER SECURITY
  • (8) ZIP PASSWORD SECURITY
  • (9) MEMARYCARD PASSWORD RECOVERY
  • (10) ALL IN ONE
  • (11) ZIP PASSWORD RECOVERY
  • (12) DICTIONARY WORDLIST
  • (M) PHISHING PAGE INVESTIGATION

  • (1) WHAT IS PHISHING
  • (2) PHISHING PAGE DETECTION
  • (3) PHISHING PAGE REPORTING
  • (4) MAKE SECURITY AGAINST PHISHING PAGE
  • (5) SOCIAL ENGINEERING ATTACKS
  • (6) TAB NABBING ATTACK
  • (N) NETWORK FORENSIC

  • (1) WHAT IS NETWORK FORENSIC
  • (2) ROLE OF NETWORK FORENSIC
  • (3) USE OF NETWORK FORENSIC
  • (4) NETWORK FORENSIC TOOLS
  • (5) NETWORK TOPOLOGY
  • (6) NETWORK FIREWALL SECURITY
  • (7) ARP POISONING
  • (O) REGISTRY FORENSIC

  • (1) WHAT IS REGEDIT FORENSIC
  • (2) TOOLS OF REGEDIT FORENSIC
  • (3) WITHOUT SOFTWARE
  • (P) BROWSER FORENSIC

  • (1) WHAT IS BROWSER
  • (2) BROWSER MODIFY
  • (3) BROWSER FORENSIC
  • (4) BROWSER FAKE LOCATION
  • (5) BROWSER MONITORY
  • (6) ANTI-MONITOR BROWSER
  • (7) BROWSER PROTECTION
  • (Q) MOBILE FORENSIC

  • (R) MORPHING DETECTION

  • (1) WHAT IS MORPHING
  • (2) HOW TO DETECT MORPHING
  • (3) ANTI DETECTION MORPHING
  • (S) CONTENT FORENSIC

  • (T) CHILD ACTIVITY MONITORING

  • (U) NET BANKING SECURITY

  • (1) INTRODUCTION OF NET BANKING
  • (2) NET BANKING FRAUD
  • (3) CREDIT CARD PASSWORD SECURITY POLICY
  • (4) CREDTCARD HACKING INVESTIGATION
  • (5) NET BANKING SECURITY
  • (V) FORENSICS INVESTIGATIONS USING HIREN BOOT CD

  • (1) WHAT IS HIREN BOOT CD
  • (2) HOW TO INSTALL HIREN BOOT CD
  • (3) HOW TO PERFOME WITH ANTIVIRUS
  • (4) FAST COPY
  • (5) MAKE DISK IMAGE
  • (6) SPEED SEARCH
  • (7) JUNK FILE CLEAN UP
  • (8) DUPLICATE FILE FINDER
  • (9) DRIVER BACK UP
  • (10) SYSTEM PROCESS MONITOR
  • (11) SYSTEM PROCESS ACTIVITY
  • (12) PARTITION RECOVERY
  • (13) HOW TO AUTO RUN FINDER
  • (14) CPU INFORMATION
  • (15) FULL INFORMATION OF COMPUTER SYSTEM
  • (16) INTERNAL EXTERNAL HARD DISK INFORMATION
  • (17) WINDOWS XP ANTI SPY
  • (W) PROCESS FORENSIC

  • (1) PROCESS CHECKOUT
  • (2) PROCESS SECURITY CHECKOUT
  • (3) PROCESS VIEWER
  • (4) PROCESS MONITOR
  • (X) MULTI ENGINE ANTIVIRUS SCANNER

  • (Y) INVESTIGATION PORNOGRAPHY

  • (1) WHAT IS PORNOGRAPHY
  • (2) HOW TO DETECT PORNOGRAPHY
  • (3) REPORTING PORNOGRAPHY
  • (Z) CASE REPORTING

  • ADVANCED CERTIFIED NETWORK & SYSTEM SECURITY EXPERT

  • (A) ADVANCED GOOGLE & SECURITY

  • (1) ADVANCED GOOGLE
  • (2) UNBREAKABLE PASSWORD
  • (3) PERFECT SEARCH
  • (4) TRACE STOLEN LAPTOP
  • (5) PROXY
  • (6) BLACK BROWSER
  • (B) LAB SETUP

  • (1) INTRODUCTION OF VMWARE WORKSTATION
  • (2) HOW TO INSTALLED VMWARE WORKSTATION
  • (3) RESTORE & SECURE YOUR SYSTEM
  • (4) SETUP YOUR WINDOWS SECURITY
  • (5) ALL PLUG-IN VMWARE WORKSTATION SOFTWARE
  • (6) HOW TO NETWORK SET & RESET
  • (7) INTRODUCTION OF VPN
  • (8) VPN SECURITY
  • (9) WHAT IS FIREWALL
  • (10) FIREWALL SECURITY
  • (C) SYSTEM SECURITY & HACKING

  • (1) INTRODUCTION OF OS
  • (2) TYPES OF OS
  • (3) SETUP SYSTEM SECURITY
  • (4) SET SECURITY OF BIOS
  • (5) HACK SECURITY OF BIOS
  • (6) SET WINDOWS PASSWORD
  • (7) HACK WINDOWS PASSWORD
  • (8) RETRIEVE WINDOWS PASSWORD
  • (9) WINDOWS SECURITY THROUGH USB
  • (10) ADVANCE WINDOWS HACKING
  • (11) WINDOWS MODIFICATION
  • (12) WINDOWS GENUINE
  • (13) MAC SPOOFING
  • (14) USB SECURITY
  • (15) CONTROL PANEL SECURITY AND HACKING
  • (D) ANDROID FORENSIC

  • (1) INTRODUCTION OF ANDROID
  • (2) ANDROID FORENSIC TOOLS
  • (3) ANDROID DATA RECOVERY
  • (4) ANDROID IP SPOOFING
  • (5) ANDROID THROUGH CALL SPOOFING
  • (6) ANDROID THROUGH SMS TEXT SPOOFING
  • (7) ANDROID ADVANCED TRICKS
  • (8) SYSTEM MONITORING THOUGH ANDROID
  • (9) ANDROID FORENSIC USING WIN HEX AND FTK
  • (10) ANDROID CONTROL
  • (11) ANDROID ROOTING
  • (12) WHATSAPP
  • (13) ANDROID KEY LOGGER
  • (14) CREATE FB ACCOUNT WITHOUT EMAIL ADDRESS OR YOUR OWN NUMBER
  • (15) DOS ATTACK BY ANDROID DEVICE
  • (16) SPY
  • (17) HIKE,VIBER,SKYPE,WHATSAPP WITHOUT NUMBER
  • (18) SMS BOMBER
  • (19) TRACE STOLEN ANDROID PHONE
  • (20) FIVE WHATSAPP IN ONE PHONE
  • (21) TWO HIKE IN ONE ANDROID DEVICE
  • (22) ANDROID WEBCAM
  • (23) ANDROID ADVANCED BACKUP
  • (24) FAKE CALL, SMS RECEIVER
  • (25) SESSION HIJACKING
  • (E) TROJAN ATTACK & SECURITY

  • (1) WHAT IS TROJAN
  • (2) VIRUS
  • (3) TROJAN ATTACK
  • (4) TROJAN ATTACK DETECTION
  • (5) PROTECT SYSTEM AGAINST TROJAN
  • (6) WHAT IS RAT
  • (7) PROTECT AGAINST VIRUS & SPYWARE, ROOT KIT
  • (8) RESET COMPUTER SYSTEM
  • (9) MAKE SYSTEM SECURITY MORE POWERFUL
  • (F) KEY LOGGER

  • (1) KEY LOGGER
  • (2) TYPE OF KEY LOGGER
  • (3) HOW TO USE KEY LOGGER
  • (4) HOW TO USE ONLINE KEY LOGGER
  • (5) HOW TO USE OFFLINE KEY LOGGER
  • (6) SECURE PC AGAINST KEY LOGGER
  • (G) WEB SECURITY & ATTACK

  • (1) INTRODUCTION OF WEBSITE
  • (2) TYPES OF WEBSITE
  • (3) PROCESS OF MADE WEBSITE
  • (4) WEB VULNERABILITY SCANNING
  • (5) WEB ADMIN PAGE FINDING
  • (6) SQL INJECTION
  • (7) DOS ATTACK
  • (8) FAKE WEBSITE REPORTING
  • (9) DDOS ATTACK
  • (10) WEBSITE SECURITY AGAINST DOSDDOS ATTACKS
  • (11) C PANEL SECURITY
  • (12) DATABASE GATHERING
  • (13) WEBSITE REPUTATION HISTORY
  • (14) WEBSITE BLOCK WITHOUT SOFTWARE
  • (H) SNIFFERS

  • (I) WI-FI HACKING SECURITY (KILI LINUX BACK TRACK)

  • (1) INTRODUCTION OF WI-FI
  • (2) WI-FI TECHNOLOGY
  • (3) DATA POCKETS SNIFFING
  • (4) WI-FI PENETRATION TESTING
  • (5) APPLICATION FOR ROOTED ANDROID
  • (6) WI-FI FINDER
  • (7) WI-FI SCANNING
  • (J) NETWORK HACKING SECURITY

  • (1) NETWORK SCANNING
  • (2) LIVE SYSTEM CHECKING
  • (3) NETWORK PACKETS TRACING
  • (4) PORT PENETRATION TESTING
  • (5) IP SPOOFING
  • (6) MAC SPOOFING
  • (7) NETWORK PENTRATION TESTING
  • (8) NETWORK DISCOVERY PENETRATION TESTING
  • (9) NET WORK SECURITY
  • (10) NETWORK INTERNET CONTROL
  • (K) OLDER LOCK HACKING

  • (1) WITH SOFTWARE
  • (2) WITHOUT SOFTWARE
  • (L) PHISHING ATTACKS

  • (1) WHAT IS PHISHING ATTACKS
  • (2) SOCIAL ENGINEERING ATTACKS
  • (3) TAB NAPPING ATTACKS
  • (4) ONLINE LOTTERY WING ATTACKS
  • (5) CALL SPOOFING ATTACKS
  • (6) PROTECT YOUR SELF
  • (M) BLUE TOOTH SECURITY HACKING

  • (N) LIVE CAMERA HACKING

  • (O) SOFTWARE CRACKING

  • (P) HONEY PORT HONEY NET

  • (Q) INTRODUCTION TO REMOTE EXPLOITS

  • (R) KALI LINUX

  • (S) BACK TRACK

  • Course Training Package Includes:

    1. Course Material
    2. Examination fees
    3. 100 PDF BOOK
    4. Certification Fee
    5. Tool Kit fee( DVD Sets/ CD sets)
    6. 1 HARD BOOK

    Benefits

    1. Live Demonstration
    2. Hands on Practice Sessions
    3. Real world lab exercises
    4. 24×7×365 days supportive faculty
    5. Latest tools
    6. Unlimited time for Practice
Our courses stands to secure Indian population to safe guard from threats of virus, web hacking,android phone hacking, smart phone hacking, facebook account hacking, twitter account hacking, whatsapp account hacking, online bank account hacking, ATM hacking, website hacking, Wi-Fi hacking, blue tooth hacking, computer system hacking, electronic data hacking, network hacking. this courses or content is teaching inspire cyber security only for education purpose