Experts Webinar On Ethical Hacking

Grasp this opportunity by registering to the webinar. Questions, conceptual doubts, career path, streamline are some of the common doubts of aspiring hackers. Join this rare opportunity to get these roadblocks cleared and explored.

About Ethical Hacking Webinar 2020

Organizations across the globe are going through a never experienced transformation, which is drastically changing the polarity of skills and hence, the learning requirement.
Academic institutions in India are currently under locked down phase and thus the students are finding difficult to cope up with changed learning priorities.
Alpine Technologies in Association with the Industry partners in launching a new initiative exclusive for the students "Ethical Hacking Webinar 2020" which will help the students to build the Skills online.

Who will be Host ?

Shashank Gupta

Member of Alpine Technologies .  He is a Technical public speaker and a Cyber security researcher . Having more than 4 years of experience in the domain of cyber security.

Area of expertise:

  • Metasploit Framework expert
  • Wi-Fi Hacking and Security
  • Penetration Testing(System,Network,Web)

Areas of interest include: Ethical Hacking, Hardware hacking/Mobile security, Network Security and Forensic and much more

Professional Experience:

  • CEH – Certified Ethical Hacker
  • CCNA – Cisco Certified Network(Trained)
  • Certified Information System Security Expert

His previous workshops were delivered in prestigious institutions like : IIT Kanpur ,IIT Madras, IIT Kharagpur, IIT Hyderabad,IIT Bhuvaneshwar and many more upper tier colleges.

Webinar Content

Day 1

Google Hacking

Google hacking, also named Google dorking, is a computer hacking technique that uses Google Search and other Google applications to find security holes in the configuration and computer code that websites use.

Email Hacking

Email hacking is the unauthorized access to, or manipulation of, an email account or email correspondence.

Windows Hacking & Security

The user password of Windows OS, which appears after the Windows starts logging in lets users to protect the computer from getting unauthorized access.


Footprinting is the technique used for gathering information about computer systems and the entities they belong to. To get this information, a hacker might use various tools and technologies.

Day 2

Denial of Service (DOS)

In computing, a denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

SQL Injection

SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution.


Cryptography or cryptology is the practice and study of techniques for secure communication in the presence of third parties called adversaries.

Special Queries Session

Ask Your Queries To The Instructor

Who Can Apply?

Ethical Hacking Webinar 2020


Students from all educational background interested in this field can enroll.

Software Professionals

IT industry professionals irrespective of their field of work, interested in this webinar can apply


Trainers who want to enhance their knowledge in this domain.. And increase their expertise can join

Hacking Enthusiasts

Experienced professionals can also apply. To improve their perspective on their domain


Certificate To All Participants

Training Partner In Red Hat

Free Access To Ethical Hacking Courses For Lifetime (100 GB)

Important Dates

Online Registration Open
26 May 2020

Online Registration Close
20 June 2020

Webinar Date
20 & 21 June 2020

Our Partners

Got a question?