The student will be trained by field professionals who have been working as Ethical Hackers/Cyber Security Analysts for the past 8 – 10 years. In the last few years, the security of a software product has increased by almost ten-fold. Being an Ethical Hacker/Cyber Security Analyst, the student can get jobs in many prestigious MNCs and his responsibility would be to identify all the vulnerabilities in the network infrastructure and to resolve them.

Why IEMLabs?

We at IEMLabs aim towards providing quality training and hands-on practical experience to our students for them to be able to grasp the concepts and become ready to face the challenges which they might face in their career. We aim at imparting knowledge to the students and help them build a career in their field of interest.

  • Quality Training accompanied with Live Practical Session
  • 100% Money back if you are not satisfied (T&C Apply)
  • Assistance for job placement

Module List

Introduction To Ethical Hacking

Footprinting And Reconnaissance

Scanning Networks


Penetration Testing & Vulnerability Analysis

System Hacking

Malware Threats


Social Engineering


Session Hijacking

Evading IDS, Firewalls, And Honeypots

Hacking Web Servers

Hacking Web Applications

SQL Injection

Hacking Wireless Networks

Hacking Mobile Platforms

IoT And IoT Hacking

Cloud Computing


  • Module – 1: Introduction To Ethical Hacking
  • Module – 2: Footprinting And Reconnaissance
  • Module – 3: Scanning Networks
  • Module – 4: Enumeration
  • Module – 5: Penetration Testing & Vulnerability Analysis
  • Module – 6: System Hacking
  • Module – 7: Malware Threats
  • Module – 8: Sniffing
  • Module – 9: Social Engineering
  • Module – 10: Denial-Of-Service
  • Module – 11: Session Hijacking
  • Module – 12: Evading IDS, Firewalls, And Honeypots
  • Module – 13: Hacking Web Servers
  • Module – 14: Hacking Web Applications
  • Module – 15: SQL Injection
  • Module – 16: Hacking Wireless Networks
  • Module – 17: Hacking Mobile Platforms
  • Module – 18: IoT And IoT Hacking
  • Module – 19: Cloud Computing
  • Module – 20: Cryptography
  • Module – 21: Exam

Jobs Available

Information Security Analyst


Penetration Tester

Click Here to View Jobs


Cyber Security Analyst

Click Here to View Jobs


Certified Ethical Hacker (CEH)

Click Here to View Jobs


Frequently Asked Questions

There is no minimum age requirement for doing this course.

There is no minimum qualification required if the student meets the Eligibility Criteria.

Yes, all materials are available on our online virtual lab, you can access them fully up to 1 year from the date of admission.

Yes, certificate (hardcopy/softcopy) will be provided after the course which will consist of a grade provided by the assigned trainer as per the final project submitted.

Classes will be conducted mainly on English, Hindi & Bengali, mainly it will depend on majority criteria.

This course is both for Professionals and Students.

Yes, there will be 3 exams through the whole course duration and 1 project to be done after the course completion based on which Grade for certificate will be provided.

It is recommended that the student carry his/her own system because it makes their self-practise easier. In case of emergency laptop/desktop can be provided by us.

You can apply for any job roles related to Course Genre.

After completion of minimum 2 courses you can apply for an internship. There will be a technical interview, based on the reports from Faculty and Technical Interview selection will be granted.

Yes, the Internships are “Paid Internships”.

Feel free to get in touch with us at: -

  • Level
  • Lectures
  • Duration
    40 hrs
  • Lessons
  • Category
    EC Council Courses
  • Language
    english, hindi, bengali
  • Lab Access
  • Certificate
  • Project