Join Law Firm certified online courses at 50 percent discounted fees - Enrol Now in Batch 63

Get Certified by Law Firms during this extended summer break - Study as per your convenience - No Deadlines

Offer 1: Enrol in our law firm certified Certificate courses @1999 and one certificate course free; Offer 2: Enrol in our law firm certified Diploma courses @3999 and get two certificate courses free 

Offer 3:  Enrol in our Master Courses and Get a chance to join several courses together @INR 5999

Last Date: 6th July 2020 - 100 seats remaining

If you have any questions please email us at info@enhelion.com

Certificate in Introduction to Advanced Level of Ethical Hacking

Veda Vivek Raj Kakollu | Certified By Obsidian Cyber Security

3250 2250

Cyber-attacks occur almost everyday, which impact critical infrastructure of target organisations. These organisations get targeted as they have weak security controls in place, which invites cyber-criminals to attack the organisations. Advanced training is required for a professional to become an Ethical Hacker. According to the law firm and our policy, the course fees will not be refunded. This unique Certificate in Introduction to Advanced Level of Ethical Hacking provides an understanding on the tools and techniques used for performing hacking in an ethical manner, by means of video lectures by Obsidian in association with Enhelion.

 

WHAT WILL SET YOU APART?

Enrolling for the certificate programme will enable you to:

  • Get a better understanding of the topics by being mentored by various practicing people
  • Get lifetime access to the recorded lectures which are stored in Enhelion’s database for any future reference
  • Interact with the Enhelion team on one-to-one basis at various intervals

Get assessed on the basis of online submission of assignment

  • Fees 3250     2250
  • Registration Open
  • Timing Self Paced

The curriculum introduces various cconcepts such as Port Scanning and vulnerability assessment. It further addresses the relationship between Intellectual property and the different types of attacks.

 

The following are the modules which are covered under the course-

  • Module 1: IP Spoofing and Proxy Bouncing
  • Module 2: Port Scanning
  • Module 3: IP Theft and Types of Attacks
  • Module 4: Vulnerability Assessment
  • Fees 3250     2250
  • Registration Open
  • Timing Self Paced

Veda Vivek Raj Kakollu

Veda Vivek began his career  in cyber security by training the Mumbai Police force and working with them to solve cases. He then went on to create awareness about cyber security through college seminars and training sessions. He completed his Post Graduate Education in Cyber Security from the UK and has over 4 years of experience in the field of cyber security specialising in Social Engineering.

  • Fees 3250     2250
  • Registration Open
  • Timing Self Paced

In every walk of life, the process of evaluation takes place in one form or the other. If the evaluation process is eliminated from human life then perhaps the aim of life may be lost. Being in the same line, Enhelion is committed to evaluate the process of learning through its courses.

The enrollee will be evaluated based on a Project Assignment, which would test the analytical understanding of the topics covered in the video lecture. 

The most intriguing aspect of the evaluation process is the time flexibility it affords. You can choose to undergo the evaluation process as and when you are ready for the same.

To be eligible to receive a certificate after successful completion of the course, one is required to secure a minimum of 40 percent in the Project Assignment.

  • Fees 3250     2250
  • Registration Open
  • Timing Self Paced

Obsidian Cyber Security

Obsidian has been in the Cyber Security Industry since 2014 and has provided a varied range of virtual services to numerous industries. Initially, we worked with the Mumbai police crime branch to solve cyber-crime cases and provided fundamental training for Law Enforcement personnel. Now, we provide a diversified list of services tailored to suit the needs of individuals and companies, enabling them to secure their IT Infrastructure from potential threats.

  • Fees 3250     2250
  • Registration Open
  • Timing Self Paced

NOTE:  This is a video lecture course. There will be no written modules as part of the course content. The enrolled student will only have access to video lectures.