Cyber Security & Ethical Hacking

Training on “Cyber Security & Ethical Hacking” Duration: 4 Months Course Outline   Lesson Topic in Details Ethical Hacking – Introduction What is meant by Hacking? Who can be a Hacker? What should be the skills of a Hacker Hackers are their intention Why Hacking Who & Why – At Risk of Hacking? Effects of […]

অনলাইন ফী 7000 BDT

অফলাইন ফী 12000 BDT

ব্যাচ শুরু

Online: 23-05-25
offline: 24-06-25

লাইভ ক্লাস

Online 10:00 am
3: 00pm Offline

সিট বাকি

11

ভর্তি চলছে

21 তম ব্যাচে

Cyber Security & Ethical Hacking Free Seminar

রাত ৯:০০- ১০:৩০ (বৃহ,শনি)

কারিকুলাম

Training on “Cyber Security & Ethical Hacking”

Duration: 4 Months

Course Outline

 

LessonTopic in Details
Ethical Hacking – IntroductionWhat is meant by Hacking? Who can be a Hacker? What should be the skills of a Hacker Hackers are their intention Why Hacking Who & Why – At Risk of Hacking? Effects of Computer Hacking What is Ethical about Hacking? Ethical Hacking career Assignment
Networking Foundation for HackerIntroduction Google dorks Internet protocol IP Addresses MAC Addresses TCP, UDP, and the Three-Way Handshake Common Ports and Protocols The OSI Model What are Networks and what is Networking Network Topology Subnetting Assignment
Login Page Injection  SQL Injection Concepts Types of SQL Injection SQL Injection Methodology Evasion Techniques SQL Injection Countermeasures WAF Bypass (Live practice) Assignment
OSINTOpen-Source Intelligence Live OSINT project Tracking of a target person Subdomain Collecting Information from Email Header Email Tracking Tools Assignment
Building an Ethical Hacking LabWhat is Virtual Machine Virtual Machine Install And Setup How To Setup Kali Linux On Virtual Machine How To Setup Metasploitable On VM Kali Linux vs. Other Linux distributions Assignment
Kali LinuxExploring Kali Linux Benefits of Kali Linux Navigating the File System Sudo Overview Users and Privileges Common Network Commands Viewing, Creating, and Editing Files Starting and Stopping Services Installing and Updating Tools Scripting with Bash Tools for Footprinting, Tools for Scanning Tools for Sniffing What is meant by Metasploit framework A Metasploit framework to outbreak Windows machines A Metasploit framework to outbreak Android devices NMAP Assignment
Foot printing/ Reconnaissance /Information gatheringFoot Printing- Definition Importance and purpose of Foot Printing Identifying Our Target E-Mail Address Gathering with Hunter.io Utilizing theharvester Range of IP Address Details of domain registration DNS information Subdomains of the domains services running on the server Traceroute analysis Identifying Website Technologies Assignment
Content Management SystemWebsite Development (Live Project) WordPress Wp Exploit (Live) Install WordPress In cPanal Using Softaculous App Instal XAMPP on Local Server(PC) Install Wordpross On The Local Server Introducing To WordPress Admin panal Instal A Powerfull Plugin For Security Detect Malware Manually and Clean them Assignment
LFI/RFI/RCEWhat is LFI/RFI/RCE Website Security, Measuring website quality Web Server security, cPanel Assignment
Cross site request forgeryCross Site Scripting (XSS) Social Engineering Phishing Social Media account recovery process. Fb / Gmail Account Security and Disable concept. Assignment
Malware Threats  Malware and APT Concepts Fileless Malware Concepts Al-based Malware Concepts Malware Analysis Malware Countermeasures Assignment
Denial-of-ServiceDenial-of-Service What is a Denial-of-Service Attack? What Is Distributed Denial of Service Attacks?  DoS/DDoS Concepts DoS/DDoS Attack Techniques DoS/DDoS Attack Countermeasures What is a Trojan? File Extension Viruses Pen Testing for Trojans and Backdoors Penetration Testing for Virus All Possible Passwords Cracking Method  Password Guessing Default Password Session Hijacking Assignment
Hacking Wireless NetworkWireless Concepts Wireless Encryption Wireless Threats Different kinds of wireless networks Finding a Wi-Fi network Using local authentication Kinds of Wi-Fi authentications Different methods of Wi-Fi encryption Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools software and hardware tools and techniques essential to crack Wi-Fi networks WEP WPA WPAT Assignment
Firewalls, HoneypotsIntrusion Detection System(IDS) and Honeypots What is meant by Firewall? What are the various operations of a Firewall? What is meant by IDS Operation of IDS SPAN Intrusion Detection tools What is meant by a Honeypot Various Honeypot tools Different Honeypot detection tools Types of Honeypots Assignment
CryptographyCryptography Concepts Encryption Algorithms  Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Cypher Language Assignment
Report Writing & Career AdviceCommon Legal Documents Pentest Report Writing Reviewing a Real Pentest Report  Career Advice Assignment
Outsourcing in Fiverr / Upwork:What is Fiverr & Upwork? What type of work would suit you? How create a GIG and Sell it? Fiverr freelancing support. Order and Payment Dollar payout process Assignment
Outsourcing in Hackerone and Bugcroud  Outsourcing in Hackerone and Bugcroud How to Hackerone and Bugcroud First Bug Report in Hackerone and Bugcroud Assignment
ExamMid Exam & Final Exam
ThesisCompulsory
VivaAttend Compulsory
Internship24 Days

Mark distribution (Full Marks 200)

Assignment: 20

Obedient to teachers: 10

Supportive to course mate: 20

Mid exam: 30

Viva : 20

Thesis: 50

Attendance: 20

Final written exam : 30

Minimum 50% Number along with Thesis, Internship & Final Exam have completed to avail the Certificate.

কোর্সে আপনি পাচ্ছেন

ইন্সট্রাক্টর

Lead Instructor

Lead Instructor

Lead Instructor

Support Instructor

Support Instructor

Support Instructor

ফিডব্যাক

আমাদের লার্নারদের কাছে শুনুন

প্রফেশনাল গাইডলাইন

সার্টিফিকেট

কোর্স শেষে পেয়ে যান শেয়ারেবল কোর্স কমপ্লিশন এবং এসেসমেন্ট সার্টিফিকেট