Lucideus Certified Ethical Hacker Grade 2 (LCEH)
This course giving a next level to enterprise professionals to stay ahead by understanding the latest web and network attacks
Course Description
This is a one month long, 40-hour course at the expertise level designed to provide intensive knowledge of hacking, penetration and security. It is a highly technical training module which provides a unique perspective into the intricate world of cyber security. It is suitable for those who are looking to join the field of web space penetration testing and ethical hacking as a profession. This is the most intensive course offered by Lucideus Training which covers all aspects of defense as well as attacks in the Digital World. As the lens helps the eye to focus, we at Lucideus Tech will help to focus on your training needs and help you grow your passion into a concentrated effort to mature into a profession. Organized knowledge is a source of discipline and a key to success. Become a cyber Ninja! See how hackers 'play god mode' in the cyber dimension.
Our certified ethical hacking courses in Delhi cover an extensive course on ethical hacking by using the most advanced security domains, helping you to upgrade your knowledge on ethical hacking methodologies. Only students who possess equivalent knowledge of LCEH Grade-1 are eligible to attend this course. Our course is designed specifically for information security professionals, who wish to become network or web-based penetrators.
Course Content
Module | Duration |
Introduction to Cryptography and Hashes | 2 Hours |
Router Penetration Testing | 2 Hours |
Reverse Engineering Part 1 - Windows Memory Management | 2 Hours |
Reverse Engineering Part 2 - Algorithm Reversing | 2 Hours |
Reverse Engineering Part 3 - File Manipulation | 2 Hours |
Malware Illustrations - Part 2 | 2 Hours |
Network Security Auditing | 2 Hours |
Metasploit Framework - Part 1 | 2 Hours |
Metasploit Framework - Part 2 | 2 Hours |
Metasploit Framework - Part 3 | 2 Hours |
Module | Duration |
Network Exploitation Frameworks | 2 Hours |
Introduction to Buffer Overflows - Part 1 | 2 Hours |
Buffer Overflows - Part 2 | 2 Hours |
Network Scanning VA Tools | 2 Hours |
CMS Exploitation and Database Pentesting | 2 Hours |
Wireless Sniffing | 2 Hours |
Network IDS IPS Implementation | 2 Hours |
System Hardening | Windows | Linux | Mac | 2 Hours |
Penetration Testing Report Generartion | 2 Hours |
Physical Security and Complaince | 2 Hours |
Pre-Requisite
Candidate should have equivelant knowledge of LCEH Grade-1.
To know more Click Here
Batch Options

Weekday Classes
- Monday to Friday
- Duration : 2 Hours.
- Number of classes: 20
(20 x 2hours = 40 Hours) - 7:3 Practical Theory Ratio
- For Indian Citizens Fee: INR 25000 + GST
(Includes : Training + Certification + Exam Fee) - For Others Fee: $800 (Includes : Training + Certification + Exam Fee + Taxes)

Weekend Classes
- Class every sunday.
- Duration : 8 Hours.
- Number of classes : 5
(5 x 8hours = 40 Hours) - 7:3 Practical Theory Ratio
- For Indian Citizens Fee: INR 31000 + GST
(Includes : Training + Certification + Exam Fee) - For Others Fee: $800 (Includes : Training + Certification + Exam Fee + Taxes)
Who should Attend?
Information Security professionals, CIO, CISO, CRO, Information Technology & Risk Management Team.
Take Away
Certification
Participants clearing final exam with more than 70% marks will be awarded with LCEH (Lucideus Certified Ethical Hacker) Grade2 Certificate.
Toolkit
Each participant will get a toolkit containing tools used during the training, white papers, videos and
other support software.
E-CookBook
Candidates will be provided with a Lucideus Information Security Cook Book containing tutorials of the contents of the training.
Get trained from World's Highest rated Cyber Security Training
2500+ Reviews with an average of 4.8/5 stars on Google Reviews
Why Lucideus?
Practical Training

Crafted for Pentesters
Lucideus Certified Ethical Hacker Grade 2 is designed especially for infosec working professionals , who want to be a web based or network penetration testers.
Most Advance Content
From Exploitation methods from Metasploit Framework to detailed insight use of Kali Linux. You will be learn the most advance topic from web application security to network and mobile security.