Ethical Hacking Course

Ethical Hacking Course (Information Security)

Wanted To Make Your Career in Information Security or Become a penetration TesterJoin ethical hacking Course @ DICC Call 8287996284, 9210640422, 9899127357 Now For Free Demo Session.

Ethical hacking or information security course specially designed to protect your digital assets from getting hacked by the hackers. This course deals with how you can apply security to your digital assets like websites, Email id, Networks, Server, Operating systems, Wifi Networks, smart phones or more. DICC is a ethical hacking training institute based in delhi offer ethical hacking and information security course in Delhi, NCR. After Completing Ethical hacking course students can make their career as a Penetration tester and finding and fixing computer security vulnerabilities. So if you wanted to learn Ethical hacking course in Delhi, Join Delhi Institute of Computer Courses...

Latest Modules

This course covers 24 latest and updated modules of ethcal hacking and information secrity.

Practical Training

At DICC, we give you the exposure of practical training on the latest and updated softwares.

Detailed Module Ethical Hacking Course

Fundamental Analysis course delhi

Ethical Hacking Overview

Ethical Hacking or Information security deals with how you can secure your digital assents being hacked by the hackers. This module will cover the basic concepts of Hacking.

Derivative Analysis course delhi

Networking Concepts

Knowledge of Networking concepts is very essential to learn information security.this module will cover the basic concepts of Networking.

Technical Analysis course delhi


This module cover the concept of virtualization.How you can make your systm a virtual machine and install multiple OS.

pption Analysis course delhi


Footprinting is way to gather information about the target.

Commodity Analysis


scanning is used to scan the ports to find out which ports are open and can be used in hacking process.

forex analysis

Windows Hacking

This chapter deals how you can protect your system or Windows. This will cover how to break the login password and Keyloggers others methods to hacking the windows.

pption Analysis course delhi

Linux Hacking

Linux is supposed to be the most secure OS.but this is a myth. Linux can also be hacked in a easiest way.

Commodity Analysis

Virus & Worms

Virus and worms are quite troublesome. This module cover how you can make a virus or create worm. .

forex analysis

Trojan & Rats

Trojan & Rats

pption Analysis course delhi


Stagnography is used to bind virus or trojan with any files such as video, images or song. .

Commodity Analysis

Email Hacking

In This module .

forex analysis


Sniffing a the way to seek the passwords on LAN via software like Wireshark or Backtrcak when you login into and account..

option Analysis course delhi


Phising create fake or duplicate pages mirrors of any social sites or mail sites & allow you to get the username and password of the victim.

Commodity Analysis

SQL Injections

SQL Injections is a way to get into any dynamic website with using thier username and password..

forex analysis

XSS Attack

Cross site scripting or XSS is another way of attack.

pption Analysis course delhi

Iframe Attacks

this ca

Commodity Analysis

DOS / DDOS Attack

Dos is known as Denial of services, when your website get unusauall traffic from different location and get slow or down. DDos is the distributed form of DOS Attack .

forex analysis

Wi-fi Hacking


pption Analysis course delhi

Reverse Engineering

Reverse Engineering allow you to hack any software and make it full version

Commodity Analysis

Penetration Testing

Penetration testing covers the process to find out the vulnerbalities in website, server or network and patch it. so that it can be secured..

forex analysis

Firewall & Honeypots

Firewall & Honeypots.

pption Analysis course delhi



Commodity Analysis

Mobile Hacking

In This module Mobile Hacking.

forex analysis

Cyber Laws

Cyber Laws.

Get In Touch With Us

Your Name

After Completing Ethical Hacking from DICC, our students will get successfuly placed in various company in delhi and NCR. There are lots of sector like Penetration testing, Network Administrator, secrity analyst etc. where one seek the job oppurtunities.

  • Security Analyst
  • Information security Analyst
  • Network Administrator
  • Web Application Analyst
  • Network Security
  • Penetration Tester
  • security consultants
  • Trainer

DICC is one of the famous stock market Institute in Delhi providing Ethical Hacking Courses for those who wanted to make career in Information secuirty. The Best thing about DICC is that we teach in practical trainng.

  • BCA / MCA / B.Tech/ M.Tech Students
  • Businessmen
  • Students
  • Housewives
  • Retired Person

  • Address:201, II Floor, Chabra Complex, Building No.8, Veer Savarkar Block, Shakarpur, Delhi- 110092
  • Phone: (91) 8287996284
  • Email:
  • Monday - Friday 10am to 7pm
  • Saturday -Sunday 10am to 6pm

About The Trainer

nasir mirza

Nasir Mirza is a finance professional with a total of 12+ years of experience covering various aspects of financial markets including Technical Analyis, Equity, Derivatives, Options, Commodity, Forex and many more. He has a degree in CS. He is a perfect blend of industry professionals, practitioners and academicians. He has started the trend of teaching the stock market courses in Live Market Hours. His way of teaching is so simple impressive and easy to learn. Apart from trading, investing and portfolio mangament, he also offer professional training on all the aspects of Financial Analysis. He has been associated with some of the reputed name in the trading industry including Angle Broking, Sharekhan, SMC Global, Elitewelth, Reliance Money and few more & also provide corporate training for thier employess. He has delivered Workshops and Seminars at various colleges including NIIT JALANDHAR, IIT GUWAHATI, VIGNAN UNIVERSITY, VIJAYWARA , SASTRA UNIVERSITY, THANJAVUR, TAMIL NADU, Reliance Money Capital,Punjab Technical University etc.