Ethical hacking course |Certified Ethical Cracker Course Training | Certification in Chennai | CHFI training

Certified Ethical Cracker (CEC)

  • About CEC Course
  • IS Lab Access
  • Prerequisites
  • Topics
  • Fee and Deliverables


CEC red logo3


Google Review

Write a Review

infySEC’s Certified Ethical Cracker Course is one of the most Advanced Ethical Hacking Course which delivers in-depth knowledge of real-time attack vectors and defensive methods. This course has been designed by the group of globally recognized Information Security Professionals to meet the participant and organization expectations. For easy understanding for the participants, LIVE practical demonstration has been added for all necessary topics.

This course delivers a comprehensive deep understanding of how attacker’s works in dark and methodology they follow to deface a network. In other hands, how the Information Security Professionals working in an organization identifies these methodologies and deface attackers. 

Benefits of CEC

  • LIVE practical demonstration on intense step by step attack vectors for all necessary topics.
  • LIVE practical demonstration on identifying attacks and also defense.
  • How to create code our own hacking and security tools.
  • LIVE practical demonstration on effective usage of the tools.
  • LIVE practical demonstration on Information Security Professional working in an organization identifies the attacks and how they respond.
  • Live demonstration on how attacks, vulnerabilities and defensive method can be done Network layer to Application layer.
  • LIVE Attack vectors demonstration covering various Operating system including Windows, LINUX, etc.
  • LIVE demonstration on how data can be recovered from the infected system and restore business systems.
  • How Virus and worm works practically? and how to prevent them?
  • Deep Dive sessions on how attacks happens and defensive methods in all the layers
  • How network packets can be sniffed and data can be changed on the fly in various networks.

For Query & Registration

For Queries, Contact - 044-4011 4040

Participant Feedback


Upcoming events

There are no up-coming events

About Trainer

All our consultants are senior professional with tremendous exposure to Information Security and Governance Risk & Compliance. With over a decade of experience in training & consulting, they help bring a lot of practical and industry relevant examples with case studies to the classroom which improves the overall learning experience. Our professional hold industry acclaimed accreditation such as : Phd , M.S , CISSP, CHFI, CISA, CISM, CEH, ISO 27001 LI / LA, CCNP, CWNA , MCSE & ITIL. 


Uninterrupted Dedicated Server
work from home
Work From Home
gaming mod threats
Learn With Fun

infySEC IS Lab is an extreme Online Virtual Remote Lab provided to participants where they can work from any place at any point of time without restriction. ISLab provides login privilege to Certified Ethical Cracker participants where they can work in our Virtual Remote Server and start doing their Labs.

Our ISLab was created in such a concept called “Learn with Fun” where each participant will face gaming-like structured online hacking program called 'Live Hacking Zone' which contains many Levels relevant to the topics covered on the program. Each participant has to cross levels to face CEC exam, Hence CEc will only deliver equipped candidates. Participant have to cross multiple Levels starting with easy to toughest level. Each participant can track other participants activity live which helps each participants to get involved into Live Hacking Zone competition, Prepare to be SHOCKED, ENTERTAINED and EDUCATED all at the same time.



  • Should know how to use Web Browsers
  • Basic HTML Familiarity
  • Basic networking will be helpful


Who Should Attend

  • Site Administrators
  • Systems Administrators
  • Network Administrators
  • Wireless Administrators
  • Blackberry Administrators
  • Webhosting Server Administrators
  • Web Developers and Designers
  • Research Analysts
  • IT professionals
  • Law professionas
  • Finance Sector Professionals
  • Banking Professionals
  • Students
  • Institution Professors & faculties
  • Auditors
  • Anyone who are anxious about the network infrastructure and data integrity
  • Anyone who is seeking a break through Career into information security

The content of infySEC syllabuses is regularly updated to ensure that it remains relevant and reflects the latest thinking in par with the scenario of current technology . However, as part of the latest review, the documents themselves have been given a fresh design.

certificate flow


Certified Ethical Cracker Topics:


1 Introduction to Ethical Cracking
2 Footprinting (Reconnaissance-Passive)
  • Types of Footprinting
  • Footprinting Tools and countermeasures
  • 3 Enumeration (Reconnaissance - Active)
  • Enumeration Techniques
  • Enumeration Countermeasures
  • 4 Network Scanning
  • Network Scanning Technique
  • Network Scanning Countermeasures
  • 5 System Hacking Methodology
  • System Hacking Methodology
  • Steganography
  • Steganalysis Attacks
  • Covering Tracks
  • 6 Malware Threats
  • Types of Trojans
  • Trojan Analysis
  • Trojan countermeasures
  • 7 Virus and Worms
  • Working Of Viruses
  • Virus Analysis
  • Computer Worms
  • Malware
  • Analysis Procedure and Countermeasures
  • 8 Sniffing
  • Packet Sniffing Techniques
  • How to defend against sniffing?
  • 9 Denial of Service
  • DoS/DDoS Attack Techniques
  • Botnets
  • DDoS Attack Tools
  • DoS/DDoS Countermeasures
  • 10 Session Hijacking Techniques
  • Session Hijacking Techniques
  • Session Hijacking Countermeasures
  • 11 Servers Attacks - Web Server, File Server
  • Different Types of Webserver Attacks
  • Attack Methodology and Countermeasures
  • 12 Cryptography
  • Different Types Of Web Application Attacks
  • Web Application
  • Hacking Methodology and Countermeasures
  • 13 SQL Injection Attacks
  • SQL Injection Attacks
  • Injection Detection Tools
  • 14 Wireless Networks Attacks
  • Wireless Encryption
  • Wireless Cracking Methodology
  • Wireless Cracking Tools
  • Wireless Security Tools
  • 15 IDS, IPS, Firewalls and Honeypots
  • Firewall
  • Intrusion Detection System (IDS)
  • Honeypot Evasion Techniques
  • Evasion Tools
  • Countermeasures
  • 16 Cloud Computing Techniques
  • Various Cloud Computing Concepts
  • Cloud Computing Threats
  • Cloud Computing Attacks
  • Security Techniques and Tools
  • 17 Cryptography
  • Different Types Of Cryptography Ciphers
  • Public Key Infrastructure (PKI)
  • Cryptography Attacks
  • Cryptanalysis Tools
  • 18 Social Engineering
  • Social Engineering Techniques
  • Identify Theft
  • Social Engineering Countermeasures
  • 19 Vulnerability Assessment and Penetration Testing
  • Various types of penetration testing
  • Penetration Testing Roadmap
  • Security Audit
  • Vulnerability Assessment
  • 20 Ethical Hacking As a Career In detailed discussion on Information Security Industry growth and its present career opportunities

    CEC Course fee

    Rs.15,000 Nett

    Deliverables includes

    • Course topics covering
    • IS Lab access
    • Handbook
    • DVDs with over 2000+ Softwares
    • infySEC CEC Online Exam
    • CEC Course Certificate

    CEC User Friendly DVDs

    We provide DVDs functional in both Windows based and LINUX based environment.
    It is mandatory that you get proper written permission from your organization before using our course software, tools and techniques on your company networks and systems for any sorts of testing or services you lend. If you are planning for any kind beneficiary security testing inside your organization, it is advised to intimate your network and computer operations teams in written form before you start any testing.If you are planning for any kind beneficiary security testing for your clients, it is advised to sign an Non Disclosure agreement from the respective stakeholders in written form before you start any testing.

    In Depth HandBook Guide

    Each page in course HandBook has been carefully designed with intense care and necessary relevant screenshots included for participant easy understanding.Also this handbook will not be available in local market or book publishing houses.

    Online Exam

    Participant will be facing CEC V2.0 Online Exam on completion of IS Lab , Live HACKING Zone.

    CEC Course Certificate

    You will receive a infySEC Certificate of Completion upon successful completion of our CEC training program.

    What Is needed To participate during Training Period ?

    • One passport size photo during registration
    • Photocopy of your ID card during registration
    • Participant have to bring their own WiFi enabled laptop,High Speed WiFi Internet facility will be provided


    Mode of registration.

    1. Online Payment

    2. Cash payment in training office.