01 - 453 7574

EC-Council Courses


Information Security: Certified Ethical Hacker (CEH)

Students will learn how to scan, test, hack and secure target systems. The course covers the Five Phases of Ethical Hacking, diving into Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

Register Now


  • Weekdays – 1 1/2 Months
  • Weekends – 2 Months

Course Description

At the completion of the training, students will learn the following:

  • Key issues plaguing the information security world, incident management process, and
  • penetration testing.
  • Various types of foot printing, foot printing tools, and countermeasures.
  • Network scanning techniques and scanning countermeasures.
  • Enumeration techniques and enumeration countermeasures.
  • System hacking methodology, steganography, steganalysis attacks, and covering tracks.
  • Different types of Trojans, Trojan analysis, and Trojan countermeasures.
  • Working of viruses, virus analysis, computer worms, malware analysis procedure, and
  • Packet sniffing techniques and how to defend against sniffing.
  • Social Engineering techniques, identify theft, and social engineering countermeasures.
  • DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures.
  • Session hijacking techniques and countermeasures. etc.


  • Certification: EC-Council Certified Ethical Hacker (CEH)

Career Prospects

  • Security Specialist, Information Security Professional, Ethical Hacker

Course Outline

1 – Introduction To Ethical Hacking

2 – Footprinting And Reconnaissance

3 – Scanning Networks

4 – Enumeration

5 – Vulnerability Analysis

6 – System Hacking

7 – Malware Threats

8 – Sniffing

9 – Social Engineering

10 – Denial-Of-Service

11 – Session Hijacking

12 – Evading Ids, Firewalls, And Honeypots

13 – Hacking Web Servers

14 – Hacking Web Applications

15 – Sql Injection

16 – Hacking Wireless Networks

17 – Hacking Mobile Platforms

18 – Iot Hacking

19 – Cloud Computing

20 – Cryptography


E-Business Customer Relationship Management (CRM)

Companies e-business prospects are often derailed by poor customer support because companies don’t understand the frantic pace of Internet time. Procurement, fulfilment, and post-sale support can be severely crippled by poor communication channels. Customer Relationship Management explains the circular relationship between suppliers, technology, and customers, which together provide the infrastructure for customer support in an e-business environment.

Register Now


  • Weekdays – 1 Month
  • Weekends – 2 Months

Course Description

Managing relationships with customers has become a critical organizational competency. Get winning strategies for acquiring and retaining customers by leveraging the latest advanced technologies. This course will teach you how to select the right tools for your business– so it can grow today–and on into the future. Lagging means lost customers, which means damage to the bottom line. But how do you not lag when customers are moving lightning fast to demand constant changes in the speed to complete their transactions? How do you keep your customers when the move to another company is nothing more than a mouse click and a minute away? CRM is the answer. Customer Relationship Management, a strategy that leverages very advanced technologies is the way to cut to the 21st Century business chase.

Certificate Earned

Certified e-Business Professional

Course Outline

Module I – Overview of CRM

  • CRM Concepts
  • CRM – More definitions
  • CRM Drivers
  • Constituents of a Good CRM Strategy
  • CRM and Technology
  • CRM Solutions Map
  • The Concept of e-CRM
  • e-CRM and CRM
  • Implementation Challenges

Module II – Developing a Customer Strategy

Section 1: Fundamentals of Customer Strategy

  • Customer Strategy Basics
  • Customer Loyalty
  • Customer Satisfaction
  • Customer profiling and Modeling

Section 2: Evolution of a Customer Centric Enterprise

  • Customer Centric Enterprise – Background
  • Customer Centricity – Concepts
  • Product Centricity Vs. Customer Centricity
  • Customer Centric Strategy
  • Evolution of Customer Centric Enterprise (CCE)
  • Specific Adaptations of a CCE

Section 3: Discussing the core of successful CRM initiatives

  • Core of any successful CRM initiative
  • Seven Habits of a successful CCE

Section 4: Mapping People, Processes and Technology

  • Revisiting the basic precepts
  • Discussing People, Processes and Technology
  • Transitioning from product centricity -Processes
  • Transitioning from product centricity -People
  • Transitioning from product centricity -Technology

Module III – Customer Lifecycle Management and Lifetime Value

  • Concept of Customer lifecycle
  • Customer Life Cycle stages – Illustrated
  • Customer Life Cycle Management
  • Managing the Customer Life Cycle in a CCE
  • Concept of Customer Lifetime Value
  • Customer Lifetime value assessment

Module IV – CRM Technology

  • CRM Ecosystem
  • Customer Interaction and CRM
  • Three Pillars of CRM
  • Operational CRM
  • Analytical cycle of CRM
  • Analytical CRM
  • Collaborative CRM

Module V – Operational CRM

  • Sales Force Automation
  • Account Management – Illustrated
  • Opportunity Management -Illustrated
  • Sales Forecasting
  • Sales Funnel management
  • Sales Pipeline Management
  • Marketing Automation
  • Campaign Management
  • Analyzing, Learning, Listening and Responding
  • Workflow Management
  • Marketing Communications – Illustrated
  • Contact Management
  • Contact Management – Illustrated
  • Ticket Management

Module VI – Analytical CRM

  • Critical components of Customer Centric Strategies
  • Analytical CRM defined
  • CRM Intelligence Management Cycle
  • Analytics and Customer Life Cycle Management
  • CRM Data warehouse
  • Analytical CRM Components
  • Benefits from CRM Analytics
  • Customer Centric Data Mining
  • Analytical CRM application areas
  • Teradata Industry CRM
  • Requirements from an Analytical CRM application
  • Data Extraction – Illustrated
  • Data Enhancement – Illustrated
  • Clustering and profiling
  • Model building and Analysis
  • Scoring
  • CRM Analytics – Sample vendor options
  • Common Implementation Problems

Module VII – Collaborative CRM

  • Collaborative CRM
  • Customer Centricity revisited
  • Channel evolution
  • Multi-channel Strategy
  • Multi-Enterprise Value Networks
  • Mapping Customer interactions into Life Cycle stages
  • Customer Interaction Centers
  • Avaya Communications architecture -Illustrated
  • Customer Interaction Center – Detailed
  • Avaya Unified Communication model -Illustrated
  • Call Center – Explained
  • Evolution of Contact Centers
  • Contact Centers -Evolution Phases
  • Technology Transformation and Migration
  • Customer interaction -illustrated
  • What do portals address?
  • Integrating Customer Information through portals
  • Employee Portal
  • Customer Portal
  • Partner Portal

Module VIII – CRM Project Management

  • CRM Initiative- Phases
  • Planning the CRM initiative
  • Preparatory Phase
  • Preparatory Phase – Activities
  • Defining the CRM vision
  • Assessing CRM readiness (Organizational perspective)
  • Analyzing business processes
  • Auditing the IS/IT infrastructure
  • Establishing CRM project objectives
  • Building a business case for CRM
  • Building the team
  • Ensuring involvement of key people
  • Prioritizing the requirements
  • Establishing the budget
  • Establishing tentative timelines
  • Short listing prospective CRM solution vendors
  • Selecting the CRM solution
  • Selecting the solution partner
  • Implementation Phase
  • CRM implementation project methodology
  • Definition Stage
  • Analysis Stage
  • Design & prototyping Stage
  • Configuration & Testing
  • Deployment Stage
  • Managing Change
  • Training is key to implementing change
  • Post Implementation Phase
  • Post Implementation Support
  • Problem areas to look out for

Module IX – Building a Business Case for CRM

  • Need for a Business Case
  • Elements of a good Business Case
  • Challenges in quantifying CRM Benefits
  • Categorization of CRM Benefits
  • CRM Metrics Framework
  • CRM Benefits -Customer?s perspective
  • A methodology for ROI Estimation
  • Presenting the benefits – Illustration
  • Identifying and mitigating risks