CSCU (Certified Secure Computer User)

Course Description

The program gives security awareness to the basic computer user and helps them in securely connecting to another system over a network. The course helps them to leverage on their basic system knowledge and get a deeper understanding on using computing resources by educating them on practicality of security and networking. This certification empowers you with the practical knowledge required to compute securely, network efficiently and be in control of the computing environment on your own.

The CSCU program is primarily for those individuals who use computer and internet at home, office, or school. The program involves the students into an interactive environment where they get a basic understanding of various computer and network security threats such as virus and backdoors, identity theft, online banking phishing scams, credit card fraud, online sex-offenders, e-mail hoaxes, loss of confidential information, social engineering, hacking attacks etc.

Domain Areas
  • Social Engineering
  • Identity Theft
  • Physical Security
  • Online Transactions Security
  • Digital Signature & Certificates
  • Credit Card Frauds
  • Monitoring Kids Online
  • Compliance
  • E-mail Security
  • Safe Browsing
  • Data Protection
  • Encryption
  • Wireless & Home Network Security
  • Bluetooth Security
  • Smartphone Security
  • Mobile Device Security
  • Windows OS& Mac OSX Security

Anyone above 18 years can apply for the course. Those who use the internet extensively for work, study and play and want to gain a working knowledge of computer and network security can opt for our course.


14 Hrs

Exam Code:

CSCU (112-12), 2 Hrs

Course Outline
  • Module 1: Foundations of Security
  • Module 2: Securing Operating Systems
  • Module 3: Protecting Systems using Antiviruses
  • Module 4: Data Encryption
  • Module 5: Data Backup and Disaster Recovery
  • Module 6: Internet Security
  • Module 7: Securing Network Connections
  • Module 8: Securing Online Transactions
  • Module 9: Securing Email communications
  • Module 10: Social Engineering and Identity Theft
  • Module 11: Security on Social Networking Sites
  • Module 12: Information Security and Legal Compliance
  • Module 13: Hacking Web Applications
  • Module 14: Securing Mobile Device

New! CEHv10 (Certified Ethical Hacker)

EC Council brings the latest version of CEH with enhancements like updated core content, better systematic content flow, illustrative account of concepts and attacks,latest hacking techniques, exclusive ilabs, videos on popular hacking and security tools etc. Keeping in tune with the latest updates on operating systems and mobile and web technologies CEH v8 will also focus on:

Besides the 19 modules of CEH v7, CEH v8 has added one more module on Hacking Mobile Platforms.

Course Description

The Ethical Hacker certification by EC Council gives the students a real-time environment where they get to scan, test, hack and secure their own systems. All students get in-depth knowledge and practical experience with the current essential security systems in our lab intensive environment. How intruders escalate privileges and what steps can be taken to secure a system are some of the basic tactics that the students get trained in. Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation are some of the topics that the students get to learn about in this program.

Candidate Profile

The CEH certification is for those candidates who are keen to build a career in information security, or to fortify the professional skills of those who are already in this field.

It is an added advantage for security officers, auditors, security professionals, site administrators, and those who are concerned about the integrity of the network infrastructure.


CEH certification opens up new doors it IT Security industry, enhances one’s professional skills and ensures clients trust in one’s expertise.

Inter-Networkz is one of the best ethical hacking training centers in Bangalore and India. Its rigorous CEH training equips equips you to be more than a troubleshooter, being on guard always, and in the lookout for vulnerabilities in the clients systems and prevent them, thereby providing a higher quality of service.


5 Days, 8hrs/day or 10 Days, 4hrs/day

Exam Code:

312-50 v8

The new CEH v8 exam consists of 125 questions of Multiple Choice and has a duration of 4 hrs. Passing score is 70%.

Course Outline
  • Module 1: Introduction to Ethical Hacking
  • Module 2: Foot printing and Reconnaissance
  • Module 3: Scanning Networks
  • Module 4: Enumeration
  • Module 5: System Hacking
  • Module 6: Trojans and Backdoors
  • Module 7: Viruses and Worms
  • Module 8: Sniffers
  • Module 9: Social Engineering
  • Module 10: Denial of Service
  • Module 11: Session Hijacking
  • Module 12: Hacking Web servers
  • Module 13: Hacking Web Applications
  • Module 14: SQL Injection
  • Module 15: Hacking Wireless Networks
  • Module 16: Hacking Mobile Platforms
  • Module 17: Evading IDS, Firewalls, and Honeypots
  • Module 18: Buffer Overflow
  • Module 19: Cryptography
  • Module 20: Penetration Testing

EDRPv3 (EC Council Disaster Recovery Professional) Training & Certification

Course Description

EC Council Certified Security Analyst is an advanced ethical hacking training certification that is complementary to the CEH (Certified Ethical Hacker) course. While CEH certification gives the learner knowledge on hacking tools and technologies, ECSA takes it a step further by exposing the candidates on how to analyze the outcome from these tools and technologies.

This open testing computer security certification applies groundbreaking network penetration testing methods and techniques, thereby helping the students to perform intensive assessments. The ECSA certification arms the candidates to effectively identify and cut down possible risks to the information security of the infrastructure.

Candidate Profile

ECSA is for experienced hands in the industry and is designed for Network server administrators, Firewall Administrators, Information Security Testers, System Administrators and Risk Assessment professionals.

ECSA certification is a value add-on to experienced Information security professionals as well, as they provide computer securitytraining that enable them to analyze the outcomes of their Vulnerability Assessments.

  • ECSA is backed by a curriculum designed by the best in the field.
  • Greater  acceptance as seasoned security professionals across the industry.
  • Helps the candidates to analyze the outcomes from using security tools and security testing techniques.
  • Is a Requirement for the LPT certification.

80 hrs or 5 days (8 hrs/day for experienced candidates)

Exam Code:


ECIHv1(EC-Council Certified Incident Handler) Training & Certification

Course Description

The Computer Hacking Forensic Investigation program we offer enables the student to detect hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attack.

This program is an application of computer investigation and analysis techniques to determine potential legal evidence. The CHFI investigators are accomplished in an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information known as computer data recovery.

The students are prepared to conduct computer investigations using intricate digital forensic technologies with the help of the tools and techniques covered in EC-Council CHFI program.


We recommend the CEH certification as an added advantage.

Candidate Profile
  • e-Business Security professionals
  • Systems Administrators
  • Legal professionals
  • Banking, Insurance and other professionals
  • Government agencies
  • Police and other law enforcement personnel
  • Defense and Military personnel

80 hrs or 5 days (8 hrs/day for experienced candidates)

Exam Code:

EC0- 312-49