best training in delhi

Ethical Hacking in Delhi

Ethical Hacking in Delhi

Ethical Hacking Training Course has been created keeping in mind the future of Craw Security. This Training will help students to understand the basic fundamentals of Ethical Hacking. This Uniquely designed Info-sec Certification Training Course will provide you the basic understanding  of the advanced tools and methodologies of Information Security Industry. These Techniques and Programs will help you enrich the Cyber Security Domain  knowledge for Corporate Environments and Intelligence agencies. It  provides the pure Hands-On hardcore Practical exercises which helps them to be a Pro in Ethical Hacking and Penetration testing.

After Successful Completion of the Ethical Hacking Internship, students have to pursue a test which is designed by industry cyber experts to best of basic and advance core concepts of Cyber Security Domains. Hardcore hands on training will help them to complete penetration testing projects to the best of their capabilities.

Craw Security Provides Training for College Students. Students can attend this course in there  Internship. Courses provided in training’s 2019 are ethical hackingpenetration Testing, Cyber Forensics, computer Forensics, Robotics, Web Development Coursesweb Designing, Cyber Security Diploma, CEH – Certified Ethical Hacker,Penetration Testing Course,Web application security Training’s, Summer trainingEthical hacking course.


Module 01: Introduction to Basics of Ethical Hacking
 Module 02: Foot-printing Active (Tool Based   Practical)
 Module 03: Foot-printing Passive (Passive   Approach)
 Module 04: In-depth Network Scanning
 Module 05: Enumeration User Identification
 Module 06: System Hacking Password Cracking     &Bypassing
 Module 07: Viruses and Worms
 Module 08: Trojans and Backdoor
 Module 09: Bots and Botnets
 Module 10: Sniffers MITM with Kali
 Module 11: Sniffers MITM with Windows
 Module 12: Social Engineering Techniques Theoretical Approach
 Module 13: Social Engineering Toolkit Practical Based Approach
 Module 14: Denial of Service DOS & DDOS Attacks
Module 15: Web Session Hijacking
 Module 16: SQL Injection Manual Testing
 Module 17: SQL Injection Automated Tool Based Testing
 Module 18: Basics of Web App Security
 Module 19: Hacking Web servers Server Rooting
 Module 20: Hacking Wireless Networks Manual CLI Based
 Module 21: Hacking Wireless Network: Automated Tool Based
 Module 22: Evading IDS, Firewalls
 Module 23: Honey pots
 Module 24: Buffer Overflow
 Module 25: Cryptography
 Module 26: Penetration Testing: Basics
 Module 27: Mobile Hacking
 Module 28: Cloud Security and many more…

About the Program Certified Ethical Hacking CEH V(10)

About the CEH V(10) Exam

  • Number of Questions: 125
  • Test Duration: 4 Hours
  • Test Format: Multiple Choice
  • Test Delivery: ECC EXAM, VUE
  • Exam Prefix: 312-50



  • Every Sunday and Saturday
  • Duration : 4 to 8 hours.
  • Number of classes : (60-80 Hours)
  • 8:2 Practical Theory Ratio



  • Monday to Friday
  • Duration : 2-3 Hours
  • Number of classes: 60-80 Hours(Instructor-Led Training))
  • 8:2 Practical Theory Ratio


Passing Score of Certified Ethical Hacker Certification

In order to maintain the high integrity of our certifications exams, EC-Council Exams are provided in multiple forms (I.e. different question banks). Each form is carefully analyzed through beta testing with an appropriate sample group under the purview of a committee of subject matter experts that ensure that each of our exams not only has academic rigor but also has “real world” applicability. We also have a process to determine the difficulty rating of each question. The individual rating then contributes to an overall “Cut Score” for each exam form. To ensure each form has equal assessment standards, cut scores are set on a “per exam form” basis. Depending on which exam form is challenged, cut scores can range from 60% to 85%.

The Purpose of the CEH credential is to:

  • Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
  • Inform the public that credentialed individuals meet or exceed the minimum standards.
  • Reinforce ethical hacking as a unique and self-regulating profession.
  • “Hacker” didn’t start out as a bad word, but it’s evolved into one, thanks to hackers of the malicious kind. Despite how oxymoronic the term “ethical hacker” may seem, the Certified Ethical Hacker credential is no joke

Certified Ethical Hacking Training Program :

The Certified Ethical Hacker program is the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”





  • Classroom Training
  • Online Training
  • Free Demo Class
  • Language English/Hindi



Contact Us

1st Floor, Plot no. 4, Lane no. 2,Kehar Singh Estate,Westend Marg,Behind Saket Metro Station, New Delhi – 110030

Call Us : 011-40394315 | +91-9650202445 | +91-9650677445

Mails Us :
Visit Us : |

Best Cyber Security Training In Delhi

Best Cyber Security Training In Delhi

Craw Security Delhi offers an inclusive Cyber Security training in delhi. The extensive practical training provided by Cyber Security training institute in delhi equips live projects and simulations. Such detailed Cyber Security course has helped our students secure job in various MNCs. The trainers at Craw Security Delhi are subject specialist corporate professionals providing in-depth study in Cyber Security course in delhi. Participants completing the Cyber Security certification have plethora of job opportunities in the industry.

Further, we have kept the Cyber Security course in delhi duration flexible. From online classroom to fast-track & one-to-one classroom Cyber Security training is provided during weekdays and weekends to the attendees. Our modern lab is equipped with latest technologies helping students avail a successful Cyber Security training and certification from the institute.

6 Level of the Cyber Security-

Level 1- Ethical Hacking

  • Module 1-Intriduction to Basics of Ethical Hacking
  • Module 2-Foot-Printing Active(Tool Based Practical)
  • Module 3-Foot-Printing Passive(Passive Approach)
  • Module 4-In-depth Networking Scanning
  • Module 5-Enumeration User Identification
  • Module 6-System Hacking Password
  • Module 7-Viruses and Worms
  • Module 8-Trojans and Backdoor
  • Module 9-Snidders MITM with Kali
  • Module 10-Bots and Botnets
  • Module 11-Sniffers MITM with Window
  • Module 12-Social Engineering Techniques
  • Module 13-Social Engineering Toolkit Practical Based
  • Module 14-Denial of Service DOS DDOS Attacks
  • Module 15-Web Session Hijiacking
  • Module 16- SQL Injection Manual Testing
  • Module 17-SQL Injection Automated Tool Based Testing
  • Module 18-Basic of web App Security
  • Module 19- Hacking Web Servers Server Rooting
  • Module 20-Hacking Wireless Network:Manual CLI Based
  • Module 21-Hacking Wireless Network:Automated Tool based
  • Module 22-Evading IDS,Firewalls
  • Module 23-Honey pots
  • Module 24-Buffer Overflow
  • Module 25-Cryphotography
  • Module 26-penetration Testing:Basic
  • Module 27-Mobile Hacking
  • Module 28-Cloud Security and many more


Level 2-Penetration Testing


  • Module1-How to Plan Your Penetration Testing
  • Module2-Scoping Your Penetration Testing
  • Module3-Network And Web-Application
  • Module4-Post Exploitation Phase
  • Module5-In Depth Password Attacks
  • Module6-Web Application Penetration Testing
  • Module7-Penetration Test Reporting


Level 3-Cyber Forensics


  • Module1-What is a computer Forensics
  • Module2-Methods by Which Computer gets Hacked
  • Module3-Computer Forensics Investigation Process
  • Module4-Digital Evidence Gathering
  • Module5-Computer Forensics Lab
  • Module6-Setting Up Forensics Lab
  • Module7-Understanding Hard Disks
  • Module8-File System Analysis:Linux/Window/Mac
  • Module9-Window Filesystem Forensics
  • Module10-Data Acquisition and Techniques
  • Module11-Data Imaging Techniques and Tool
  • Module12-Recovering Deleted File and Folder
  • Module13-Deleted Partition Recovery Techniques
  • Module14-Forensics Investigation Using Forensics Tool Kit(FTK)
  • Module15- Forensics Investigation Using Forensics Tool Kit(Oxygen)
  • Module16- Forensics Investigation Using Encase Tool
  • Module17-Stenography and Image File Forensics
  • Module18-Application Password Crackers
  • Module19-Log Capturing and Events Correlation
  • Module20-Network Forensics Tool and Techniques
  • Module21-Mobile Forensics Tool-Cellebrite Tool
  • Module22- Investigating Logs
  • Module23- Investigating Network Traffic:Wireshark
  • Module24- Investigating Wireless Attacks
  • Module25-Investigation Web Application Attacks via Logs
  • Module26-Tracking Investigation Various Email Crimes
  • Module27-Detailed Investigation Reporting


Level 4-Indepth Networking


  • Module1-Operation of Protocols
  • Module2-OSI Layer
  • Module3-TCP/IP Module
  • Module4-Installing
  • Module5-Configuring
  • Module6-Concept of Layers
  • Module7-STP ,VLANs ,CAM
  • Module8-IPV4 and IPV6
  • Module9-OSPF(single and multi area)
  • Module10-Load Balancing
  • Module11-EIGRP
  • Module12-Introduction to WAN
  • Module13-WAP Protocols
  • Module14-HDLC, PPP,NAT
  • Module15-Introduction to WAN
  • Module16-DHCP,SNMP,Netflow
  • Module17-SSH
  • Module18-Secret Password


Level 5-Web Application Security


  • Module1-SQL Injection Flaws
  • Module2-Cross Site Scripting Flaw
  • Module3-Source Code Disclosure Flaw
  • Module4-OS Command Injection Flaw
  • Module5-Broken Authentication
  • Module6-File Upload Vulnerability
  • Module7-Cross Sites Request Forgery
  • Module8-Sensitive Data Exposure
  • Module9-Remote File Inclusion
  • Module10-Directory Traversal Attacks
  • Module11-Invalid Redirection Flaw
  • Module12-Security Mis-Configuration
  • Module13-Missing Authorization
  • Module14-Session Fixation
  • Module15-Weak Data Encryption
  • Module16-Information Leakage
  • Module17-Dangerous File Upload
  • Module18-Transport Level Communication
  • Module19-Invalid URL Redirection Flaw
  • Module20-Security Mis -Configuration
  • Module21-Insecure Direct Object Reference


Level 6-Mobile Application Security

Course Information

  • Duration-45 Days
  • Lecture- 2hrs/3hrs
  • Skill Level-All Level
  • Assessment-Yes

Extra Features-

  • Weekends and weekdays Training
  • Classroom and Online Training
  • 80% Practical and 20% Theortical
  • Internship Opportunity
  • Video Tutorials
  • Audio Tutorials
  • Practice Labs
  • Ebooks
  • Extra Classes /Backup Classes

Contact Info

Welcome to our CRAW Security. We are glad to have you around.


011-40394315 | +91-9650202445 | +91-9650677445


Head Office

1st Floor, Plot no. 4, Lane no. 2, Kehar Singh Estate, Westend Marg, Behind Saket Metro Station, New Delhi – 110030