Craw Security Provides Best Ethical Hacking Summer Internship|Diploma Course In Delhi.Ethical Hacking has been a part of computing for almost five decades and it is a very broad discipline, which covers a wide range of topics. The first known event of hacking had taken place in 1960 at MIT and at the same time, the term “Hacker” was originated. In this tutorial, we will take you through the various concepts of Ethical Hacking and explain how you can use them in a real-time environment. Students can attend this course in there Summer Training. Courses provided in summer training’s 2018 are ethical hacking, penetration Testing, Cyber Forensics, computer Forensics, Robotics, Web Development Courses, web Designing, Cyber Security Diploma, CEH – Certified Ethical Hacker,Penetration Testing Course,Web application security Training’s, Summer training, Ethical hacking course.


Hacking is usually legal as long as it is being done to find weaknesses in a computer or network system for testing purpose. This sort of hacking is what we call Ethical Hacking.

White Hat hackers are also known as Ethical Hackers. They never intent to harm a system, rather they try to find out weaknesses in a computer or a network system as a part of penetration testing and vulnerability assessments.


  • Ethical Hacking v10 Summer Training

    •  Hacking History- How It All Began
    •  Need For Ethical Hacking
    •  Why We Require Ethical Hackers
    • Types Of Hackers
    •  Steps In Ethical Hacking
    •   Scopes In Hacking

Windows Hacking

  •   To exploit the vulnerabilities of windows using live devices and Universal Serial Bus (USB).


  • What is Stenography?
  • Hiding data behind Images, PDFs, Audio and Videos files

Basics Of Internet, Networking And Hacking

  •  What is a Network?
  •  Types of network – LANs, WANs & WLANs
  • What is Internet?
  • Basic Structure
  • What is a Server?
  •  What is an IP Address?
  •  What is a domain name?
  •  IP-Domain Relation
  •  Client-Server Relationship Model
  •  Internet networking11.  Set up Ad-hoc networks
  •  Basic explanation of exploitation of loopholes

SQL Injection Using DVWA

  •  Introduction of SQL
  •  What are SQL INJECTION and DVWA?
  •  Checking SQL injection vulnerability (Demo)
  • Live demonstration of the attack (Demo)
  • How to protect your system from attacks

Man In The Middle Attack(MITM)

  • What is Backtrack Linux?
  • What is Kali Linux?
  • What is Man-in-the-middle attack?
  •  Preparation for Man-in-the-middle attack (Demo)
  • Setting Ettercap tool for the attack (Demo)


  • What is phishing?
  • Preparation for phishing
  • Phishing using Local server

Trojan, Worms And Viruses

  •  Introduction to the concepts of Trojans, worms and viruses
  • How to use Virtual Machine (Live Demo)
  • How to use Backtrack (Live Demo)
  • Fake Mail

Ethical Hacker Training

A Good Ethical Hackers is a One who Understands about Latest Vulnerabilities and Understand How his tools are working(internal working of Penetration Testing Framework).

  • CEH Training by CRAW Security- What is Enumeration?


Ethical Hacking Internship Duration

6 Months

6 Weeks



Benefits of Ethical Hacker

  1. Testing Security Measures
  2. Finding Vulnerable Areas
  3. Understanding Hacker Techniques
  4. Preparing for a Hacker Attack

Benefits of Ethical Hacker

  1. Course-ware
  2. Certification & Training
  3. Important Software
  4. Improve your Skills
  5. Meet Experts

What you will get in Summer Training ?

  1. Certification
  2. Training
  3. International Eccouncil Certification
  4. Certified Ethical Hacker Toolkit
  5. Official Eccouncil Kit
  6. Software’s and Toolkit for hacker


                                                                  FOR MORE DETAILS

                                                                                           Call Us & Mail Us

                                                   011-40394315 | +91-9650202445 | +91-9650677445

                                                                                      [email protected]



1st Floor, Plot no. 4, Lane no. 2, Kehar Singh Estate, Westend Marg Behind

                                                                                Saket metro station, New Delhi 110030

Leave A Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.