About SMTI-INDIA Courses

The Course is designed to make you learn the professional way of ethical hacking by best in the industry. In this Ethical Hacking Course we will train you on the advanced step-by-step methodologies that hackers actually use, such as writing virus codes, penetration testing, system exploitations & security, web exploitations and reverse engineering, so you can better protect corporate infrastructure from data breaches. You’ll master advanced network packet analysis, securing web servers, malware threats, and advanced system penetration testing techniques to build your network security skillset and beat hackers at their own game.

SMTIIndia's Ethical Hacking certification training program provides you with the latest hands-on training required to master the techniques hackers use to penetrate network systems, helping you fortify your system against it. SMTIIndia's ethical hacking course is aligned with the latest version of CEH (v11) by the EC-Council and adequately prepares you to increase your blue team.

What This Course Includes 
The course is divided into 22 modules for a duration of 60 hours, where you will be trained by the established experts in the industry.

Module 01 - Introduction to ethical hacking
In this module, you will learn about the basics of ethical hacking, from what it is to how it's used in the real world to support business systems. Students will learn about administrative controls, technical controls, and physical controls. This module will also cover the confidentiality, integrity, and availability of data. 

Module 02 - foot-printing and reconnaissance
In this module, Reconnaissance, students will learn about data reconnaissance, the first step in the hacking life cycle. This module will cover what information hackers gather and several of the means by which they gather information. Students will learn about passive vs active reconnaissance, the difference between whether the hacker has any direct interaction with the target or not.

Module 03 - Scanning networks
“Knowing your enemy is winning half the war..” 
Similarly, when you know about your target, half the task of Hacking is done. There are different ways to gather information about your target. We will be teaching you how ethical hackers gather specific details of their target using Network Scanning for Ethical Hacking. 

Module 04 - Enumeration
Enumeration belongs to the first phase of Ethical Hacking, i.e., “Information Gathering”. This is a process where the attacker establishes an active connection with the victim and try to discover as much attack vectors as possible, which can be used to exploit the systems further.

Module 05 - Vulnerability Analysis
Certified ethical hackers perform a vulnerability analysis using various tools and scanners to discover grey areas and risks in a system. The key types of vulnerabilities in cybersecurity are: Human Vulnerabilities: Lack of information can disrupt systems or networks and provide access to malicious actors.

Module 06 - System Hacking
System hacking is the way ethical hackers get access to individual computers on a network. Ethical hackers learn system hacking to detect, prevent, and counter these types of attacks.

Module 07 - Malware Threats

Malware is malicious software which when enters the target host, gives an attacker full or limited control over the target. They can either damage or modify the functionalities of target host helping an attacker to steal or destroy information.

Various types of malware:







Module 08 - Sniffing

Sniffing is the process of monitoring and capturing all data packets that are passing through a computer network using packet sniffers. Packet Sniffers are used by network administrators to keep track of data traffic passing through their network. These are called network protocol analyzers. In the same way, malicious attackers employ the use of these packet sniffing tools to capture data packets in a network. Data packets captured from a network are used to extract and steal sensitive information such as passwords, usernames, credit card information, etc. Attackers install these sniffers in the system in the form of software or hardware. There are different types of sniffing tools used and they include Wireshark, Ettercap, BetterCAP, Tcpdump, WinDump, etc. 

Module 09- Social Engineering

Social engineering is the art of manipulating users of a computing system into revealing confidential information that can be used to gain unauthorized access to a computer system. The term can also include activities such as exploiting human kindness, greed, and curiosity to gain access to restricted access buildings or getting the users to installing backdoor software.Knowing the tricks used by hackers to trick users into releasing vital login information among others is fundamental in protecting computer systemsIn this tutorial, we will introduce you to the common social engineering techniques and how you can come up with security measures to counter them.

Module 10- Denial of service

Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash. In both instances, the DoS attack deprives legitimate users (i.e. employees, members, or account holders) of the service or resource they expected.Victims of DoS attacks often target web servers of high-profile organizations such as banking, commerce, and media companies, or government and trade organizations. Though DoS attacks do not typically result in the theft or loss of significant information or other assets, they can cost the victim a great deal of time and money to handle.

Module 11- Session Hijacking & Click Hijacking 

Session hijacking is an attack where a user session is taken over by an attacker. A session starts when you log into a service, for example your banking application, and ends when you log out. The attack relies on the attacker’s knowledge of your session cookie, so it is also called cookie hijacking or cookie side-jacking. Although any computer session could be hijacked, session hijacking most commonly applies to browser sessions and web applications.

Module 12 - Evading IDs, Firewalls and Honeypots

An Intrusion Detection System (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system.

Evading IDS, Firewalls and Honeypots contains the following Exercises:

  • Detecting Intrusions using Snort
  • Detecting Intruders and Worms using KFSensor Honeypot IDS

Module 13- Hacking web services

The vulnerabilities in the web service protocols like SOAP, WSDL, UDDI can be exploited to do various kinds of attacks like SQL injection, XML poisoning, etc.

Module 14- Hacking web applications

Web application provides an interface between the web server and the client to communicate. Web pages are generated at the server, and browsers present them at the client side. The data is passed between client and server in the form of HTML pages through HTTP protocol.There are client-side vulnerabilities and server-side vulnerabilities which lead to a web application attack.


1.Parameter Tampering

2.Unvalidated inputs

3.Directory traversal Attack

Module 15- SQL Injection

SQL injection is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might include data belonging to other users, or any other data that the application itself is able to access. In many cases, an attacker can modify or delete this data, causing persistent changes to the application's content or behavior.In some situations, an attacker can escalate an SQL injection attack to compromise the underlying server or other back-end infrastructure, or perform a denial-of-service attack.

Module 16- Hacking wireless networks

Cracking a wireless network is defeating the security of a wireless local-area network (back-jack wireless LAN). A commonly used wireless LAN is a Wi-Fi network. Wireless LANs have inherent security weaknesses from which wired networks are exempt.Wireless cracking is an information network attack similar to a direct intrusion. Two frequent types of vulnerabilities in wireless LANs are those caused by poor configuration, and those caused by weak or flawed security protocols.

Module 17- Reverse engineering

With the help of Reverse Engineering we can modify a software at own way… Like we can change the name of Software, We can editing a software, We can convert Trial Software to License software… n many more.Reverse-engineering can also expose security flaws and questionable privacy practice.So Reverse Engineering is a hacker friendly tool…. Use it n Enjoy..!!


Steganography is the process of hiding data in other types of data such as images or text files. ... Attackers can embed any information in a graphic file using steganography. The hacker can hide directions on making a bomb, a secret bank account number, or answers to a test. Any text imaginable can be hidden in an image.


It works by converting plain text into cipher text using some encryption algorithm at the sender's side and converting ciphertext into plain text at the receiver's. Cryptography is used to provide confidentiality, integrity, authenticity and non-repudiation.

Module 20- Hacking mobile platforms

The mobile device has become an inseparable part of life today. The attackers are easily able to compromise the mobile network because of various vulnerabilities, the majority of the attacks are because of the untrusted apps. SMS is another way the attackers are gaining access to the mobile devices by sending phishing messages/spam messages to users. The main operating systems used are:

  • Android

  • IOS

  • Windows

  • Blackberry

Module 21- SIM Cloning

Well There are many things to do when you clone a SIM Card, You can secretly spy on the victims calls and data transfers, make him mobile bill go crazy, send messages and make calls from his number by using sim cloning, All without touching the victims Cell Phone.

Module 22- Convert a pendrive into an Ethical hacking device

I am taking about a pendrive which can hack your system and steal your passwords just by injecting it. It is also know as “USB Password stealer”



Lesson 01 - Information Security Overview

Lesson 02 - Information Security Threats and Attack Vectors

Lesson 03 - Penetration Testing Concepts

Lesson 04 - Hacking Concepts

Lesson 05 - Ethical Hacking Concepts

Lesson 06 - Information Security Controls

Lesson 07 - Information Security Laws and Standards

Lesson 08 - Footprinting Concepts

Lesson 09 - Footprinting through Search Engines

Lesson 10 - Footprinting through Web Services

Lesson 11 - Footprinting through Social Networking Sites

Lesson 12 - Website Footprinting

Lesson 13 - Email Footprinting

Lesson 14 - Competitive Intelligence

Lesson 15 - Whois Footprinting

Lesson 16 - DNS Footprinting

Lesson 17- Network Footprinting

Lesson 18- Footprinting through Social Engineering

Lesson 19 - Footprinting Tools

Lesson 20 - Countermeasures

Lesson 21 - Footprinting Pen Testing

Lesson 22 - Scanning Networks

Lesson 23 - Network Scanning Concepts

Lesson 24 - Scanning Tools

Lesson 25 - Scanning Techniques

Lesson 26 - Scanning Beyond IDS and Firewall

Lesson 27 - Banner Grabbing

Lesson 28 - Draw Network Diagrams

Lesson 29 - Scanning Pen Testing

Lesson 30 - Enumeration

Lesson 31 - Enumeration Concepts

Lesson 32 - NetBIOS Enumeration

Lesson 33 - SNMP Enumeration

Lesson 34 - LDAP Enumeration

Lesson 35 - NTP Enumeration

Lesson 36 - SMTP Enumeration and DNS Enumeration

Lesson 37 - Enumeration Countermeasures

Lesson 38 - Other Enumeration Techniques

Lesson 39 - Enumeration Pen Testing

Lesson 40 - Vulnerability Analysis

Lesson 41 - Vulnerability Assessment Concepts

Lesson 42 - Vulnerability Assessment Solutions

Lesson 43 - Vulnerability Scoring Systems

Lesson 44 - Vulnerability Assessment Tools

Lesson 45 - Vulnerability Assessment Reports

Lesson 46 - System Hacking

Lesson 47 - System Hacking Concepts

Lesson 48 - Cracking Passwords

Lesson 49 - Escalating Privileges

Lesson 50 - Executing Applications

Lesson 51 - Hiding Files

Lesson 52 - Covering Tracks

Lesson 53 - Penetration Testing

Lesson 54 - Malware Threats

Lesson 55 - Malware Concepts

Lesson 56 - Trojan Concepts

Lesson 57 - Virus and Worm Concepts

Lesson 58 - Malware Analysis

Lesson 59 - Countermeasures

Lesson 60 - Anti-Malware Software

Lesson 61 - Malware Penetration Testing

Lesson 62 - Sniffing

Lesson 63 - Sniffing Concepts

Lesson 64 - Sniffing Technique: MAC Attacks

Lesson 65 - Sniffing Technique: DHCP Attacks

Lesson 66 - Sniffing Technique: ARP Poisoning

Lesson 67 - Sniffing Technique: Spoofing Attacks

Lesson 68 - Sniffing Technique: DNS Poisoning

Lesson 69 - Sniffing Tools

Lesson 70 - Countermeasures

Lesson 71 - Sniffing Detection Techniques

Lesson 72 - Sniffing Pen Testing

Lesson 73 - Social Engineering

Lesson 74 - Social Engineering Concepts

Lesson 75 - Social Engineering Techniques

Lesson 76 - Insider Threats

Lesson 77 - Impersonation on Social Networking Sites

Lesson 78 - Identity Theft

Lesson 79 - Countermeasures

Lesson 80 - Social Engineering Penetration Testing

Lesson 81 - Denial-of-Service

Lesson 81 - DoS/DDoS Concepts

Lesson 82 - DoS/DDoS Attack Techniques

Lesson 83 - Botnets

Lesson 84 - DDoS Case Study

Lesson 85 - DoS/DDoS Attack Tools

Lesson 86 - Countermeasures

Lesson 87 - DoS/DDoS Protection Tools

Lesson 88 - DoS/DDoS Attack Penetration Testing

Lesson 89 - Session Hijacking

Lesson 90 - Session Hijacking Concepts

Lesson 91 - Application Level Session Hijacking

Lesson 92 - Network Level Session Hijacking

Lesson 93 - Session Hijacking Tools

Lesson 94 - Countermeasures

Lesson 95 - Penetration Testing

Lesson 96 - Evading IDS, Firewalls, and Honeypots

Lesson 97 - IDS, Firewall, and Honeypot Concepts

Lesson 98 - IDS, Firewall, and Honeypot Solutions

Lesson 99 - Evading IDS

Lesson 100 - Evading Firewalls

Lesson 101 - IDS/Firewall Evading Tools

Lesson 102 - Detecting Honeypots

Lesson 103 - IDS/Firewall Evasion Countermeasures

Lesson 104 - Penetration Testing

Lesson 105 - Hacking Web Servers

Lesson 106 - Web Server Concepts

Lesson 107 - Web Server Attacks

Lesson 108 - Web Server Attack Methodology

Lesson 109 - Web Server Attack Tools

Lesson 110 - Countermeasures

Lesson 111 - Patch Management

Lesson 112 - Web Server Security Tools

Lesson 113 - Web Server Pen Testing

Lesson 114- Hacking Web Applications

Lesson 115 - Web App Concepts

Lesson 116 - Web App Threats

Lesson 117 - Hacking Methodology

Lesson 118 - Web Application Hacking Tools

Lesson 119 - Countermeasures

Lesson 120 - Web App Security Testing Tools

Lesson 121 - Web App Pen Testing

Lesson 122 - SQL Injection

Lesson 123 - SQL Injection Concepts

Lesson 124 - Types of SQL Injection

Lesson 125 - SQL Injection Methodology

Lesson 126 - SQL Injection Tools

Lesson 127 - Evasion Techniques

Lesson 128 - Countermeasures

Module 129 - Hacking Wireless Networks

Lesson 130 - Wireless Concepts

Lesson 131 - Wireless Encryption

Lesson 132 - Wireless Threats

Lesson 133 - Wireless Hacking Methodology

Lesson 134 - Wireless Hacking Tools

Lesson 135 - Bluetooth Hacking

Lesson 136 - Countermeasures

Lesson 137 - Wireless Security Tools

Lesson 138 - Wi-Fi Pen Testing

Lesson 139 - Reverse Engineering

Lesson 140 - How to crack or bypass paid applications

Lesson 141 - Steganography

Lesson 142 - Steganography Concepts

Lesson 143 - Algorithm

Lesson 144 - Steganography Tools

Lesson 145 - How to hide message in photo

Lesson 146 - Countermeasures

Lesson 147 - Cryptography

Lesson 148 - Cryptography Concepts

Lesson 149 - Encryption Algorithms

Lesson 150 - Cryptography Tools

Lesson 151 - Public Key Infrastructure (PKI)

Lesson 152 - Email Encryption

Lesson 153 - Disk Encryption

Lesson 154 - Cryptanalysis

Lesson 155 - Countermeasures

Lesson 156 - Hacking Mobile Platforms

Lesson 157 - Mobile Platform Attack Vectors

Lesson 158 - Hacking Android OS

Lesson 159 - Hacking iOS

Lesson 160 - Mobile Spyware

Lesson 161 - Mobile Device Management

Lesson 162 - Mobile Security Guidelines and Tools

Lesson 163 - Mobile Pen Testing

Lesson 164 - Sim cloning

Lesson 165 - Convert a pendrive into an Ethical Hacking Device


Six months free access to CEH v11 course.

6 Weeks Intense Live Classes.

Classes in Flexible Timings after working hours.

Even if you miss a class you will get the recording.

You can repeat the course up-to 6 months.

Access to Premium Paid Ethical Hacking and Data Recovery Tools(lifetime access).

6 Months LIVE Support.

Very active Discussion forum for SMTI's Ethical Hacking Course Members.

Suitable foe all those Who are students or working professionals.


Network security officers & practitioners.

IS/IT specialist, analyst, or manager.

IT operations manager.

IT security officer, auditor, or engineer.

Technical support engineer.

Systems analyst or administrator.

NOTE:- we will provide you some paid software for lifetime access and it work perfectly with 100% accuracy and the cost of these softwares is around 60 thousand.

Course For Beginners

By Stock Pro Institute

( Inclusive of GST )
Duration : - 6 Month
Certification : - Yes
Share VIA
Give a look to our user review

Suchita Goswami
Suchita Goswami

" Online All in One Trading Course" helped me to shine a light into the dark corners of my knowledge gaps. I can now trade more confidently with the knowledge of WHY markets moves.

Sunil Kumar
Sunil Kumar

" Online All in One Trading Course" helped me to shine a light into the dark corners of my knowledge gaps. I can now trade more confidently with the knowledge of WHY markets move.


vegas slots online vegas slots online online casino real money http://onlinecasinouse.com/#

Client Testimonials

"Live Webinars helped me to shine a light into the dark corners of my knowledge gaps. I can now develop apps more confidently with the new knowledge I gained here."

Seema Mehta

" This Webinars offers in person training with ample online support and continuing educational tools. The instructors are very seasoned with a lot of depth of knowledge and experience. "

Praveen Sinha
software developer