Certified Ethical Hacking Training in Dhaka
CSL Training providing Cyber Security & Ethical Hacking training (CEH) course. In 18 comprehensive modules, the course covers 270 attack technologies, commonly used by hackers. Throughout the course, you will be immersed in a hacker’s mindset, evaluating not just logical, but physical security.
Ethical Hacking Training - Course Objectives
After completing this course, students will be able to
- Introduction to Ethical Hacking
- Footprinting, Scanning, and Enumeration
- Hacking Web servers and Web applications
- DoS, SQL injection, Buffer overflow attacks
- Cryptography
- Wireless hacking
- Linux Hacking
- Phishing
- Countermeasures
Target Audience
- IT Professional
- Network Professional
- Network Admin
- System Engineer
Course Pre-Requisites
- An ethical hacker must have excellent computer networking and programming skills.
- An ethical hacker must be cautious, vigilant, and diligent in seeking to search and wait for the required results.
- An ethical hacker should always be wise enough to consider the scenario and certain users’ mindset, to utilize social engineering exploitations. A good ethical hacker still requires excellent problem-solving skills.
- Ethical hackers do require street smarts, people’s talents, and also manipulation skills.
- You need to keep up to date with new technologies, vulnerabilities, and exploitation techniques.
Course Duration
- 40 Hours
- 20 Classes
- 2.00 Hours per Class
Fee | 15000/= |
Type | Offline/Online |
Module | 20 |
Duration | 40 Hours |
Session | 20 |
Per Class | 2.00 Hours |
Ethical Hacking Training - Details Course Outlines
Module-01
Introduction to Ethical Hacking
- What is Hacking & Hacker
- Types of Hackers
- Reasons for Hacking
- Who are at the risk of Hacking attacks
- Effects of Computer Hacking on an organization
- Network Security Challenges
- Elements of Information Security
- The Security, Functionality & Usability Triangle
- What is Ethical Hacking
- Why Ethical Hacking is Necessary
- Scope & Limitations of Ethical Hacking
- What is Penetration Testing
- What is Vulnerability Auditing
Module-02
Foot Printing
- What is Foot Printing
- Objectives of Foot Printing
- Finding a company’s details
- Finding a company’s domain name
- Finding a company’s Internal URLs
- Finding a company’s Public and Restricted URLs
- Finding a company’s Server details
- Finding the details of domain registration
- Finding the range of IP Address
- Finding the DNS information
- Finding the services running on the server
- Finding the location of servers
- Traceroute analysis
- Tracking e-mail communications
Module-03
Scanning
- What is network scanning & Objectives of network scanning
- Finding the live hosts in a network
- SMTP , SNMP & DNS Enumeration
- Finding open ports on a server
- OS fingerprinting
- Server Banner grabbing tools
- What is a Vulnerability Scanning
- Vulnerability Scanner tools
- Finding more details about a vulnerability
- What is a proxy server
- How does proxy server work
- Types of proxy servers
- How to find proxy servers
- Why do hackers use proxy servers
- What is a TOR network
- Why hackers prefer to use TOR networks
Module-04
Hacking Web Servers & Web Application
- What is a web server
- Different webserver applications in use
- Why are webservers hacked & its consequences
- Directory traversal attacks
- Website defacement
- Website password brute forcing
- How to defend against web server hacking
Module-05
Session Hijacking
- What is session hijacking
- Dangers of session hijacking attacks
- Session hijacking techniques
- Cross-Site scripting attack
- Session hijacking tools
- How to defend against session hijacking
Module-06
SQL Injection
- What is SQL Injection
- Effects of SQL Injection attacks
- Types of SQL Injection attacks
- SQL Injection detection tools
Module-07
Evading Firewalls, IDS & Honeypots
- What is a Firewall
- What are the functions of a Firewall
- What is an IDS
- How does an IDS work
- SPAN & IDS tools
- What is a honeypot
- Types of honeypots
- Honeypot tools
- Honeypot detection tools
Module-08
Buffer OverFlow
- What is a buffer
- Understanding usage of buffers in applications
- What is buffer overflow
- Simple buffer overflow in C programming
- How to detect a buffer overflow
- How to defend against buffer overflow attacks
Module-09
Denial of Service
- What is a DoS attack
- What is a DDoS attack
- Symptoms of a Dos attack
- DoS attack techniques
- What is a Botnet
- Defending DoS attacks
Module-10
Cryptography
- What is Cryptography
- Types of cryptography
- Cipher algorithms
- Public key infrastructure
- What is a Hash
- Cryptography attacks
Module-11
System Hacking
- What is system Hacking
- Goals of System Hacking
- Password Cracking & Password complexity
- Finding the default passwords of network devices and softwares
- Password cracking methods
- Online password cracking
- Man-in-the-middle attack
- Password guessing & Brute force cracking
- Dictionary based cracking
- USB password stealers
- Hybrid attack
- Elcomsoft Distributed password recovery tools
- Active password changer
- What is a keylogger
- Deploy a keylogger to a remote pc & Defend against a keylogger
Module-12
Sniffers
- What is a sniffer
- How sniffer works
- Types of sniffing
- What is promiscuous mode
- How to put a PC into promiscuous mode
- What is ARP & ARP poison attack
- Threats of ARP poison attack
- How MAC spoofing works
- MAC Flooding
- What is a CAM Table
- How to defend against MAC Spoofing attacks
- How to defend against Sniffers in network
Module-13
Phishing
- What is Phishing
- How Phishing website is hosted
- How victims are tricked to access Phishing websites
- How to differentiate a Phishing webpage from the original webpage
- How to defend against Phishing attacks
Module-14
Malware
- What is malware & Types of malware
- Virus & What is a virus program
- What are the properties of a virus program
- How does a computer get infected by virus
- Types of virus
- Virus making tools
- How to defend against virus attacks
- What is a worm program
- How worms are different from virus
- Trojan
- What is a Trojan horse
- How does a Trojan operate
- Types of Trojans
- Spyware
Module-15
Kali Linux
- What is Kali Linux
- How Kali Linux is different from other Linux distributions
- What are the uses of Kali Linux
- Tools for Footprinting, Scanning & Sniffing
- What is Metasploit framework
- Using Metasploit framework to attack Wiindows machines
- Using Metasploit
Module-16
Wireless Hacking
- Types of wireless networks & Wi-Fi usage statistics
- Finding a Wi-Fi network
- Types of Wi-Fi authentications
- Using a centralized authentication server
- Using local authentication
- Types of Wi-Fi encryption methods
- How does WEP work & Weakness of WEP encryption
- How does WPA work & WPA2 work
- Hardware and software required to crack Wi-Fi networks
- How to crack WEP encryption & WPA encryption
- How to crack WPA2 encryption
- How to defend against Wi-Fi cracking attacks
Module-17
Penetration Testing
- What is Penetration Testing
- Types of Penetration Testing
- What is to be tested
- Testing the network devices for mis-configuration
- Testing the servers and hosting applications for mis-configuration
- Testing the servers and hosting applications for vulnerabilities
- Testing wireless networks
- Testing for Denial of Service attacks
Module-18
Counter Measure Techniques for Network level attacks
- Types of Firewall & Packet Filtering Firewall
- Circuit-Level Gateway Firewall
- Application-Level Firewall
- Stateful Multilayer Inspection Firewall
- Limitations of a Firewall
- IDS / IPS Details
- Difference between IDS & IPS
- Placement of IDS in the Network
- Configuring an IDS in the Network
- Placement of IPS in the Network
- Configuring an IPS in the Network
Module-19
Counter Measure Techniques for Local Systems
- Identifying the Vulnerabilities of a system
- Understanding the Vulnerabilities of a system
- Patch Management
- Identifying the patch for a Vulnerability
- Downloading the Patch
- Testing the patch for stability in test environment
- Deploying the patch to Live Network
- Finding the missing updates in an Operating System
- Microsoft Baseline Security Analyzer
- Belarc Advisor
Module-20
Counter Measure Techniques for Malware attacks
- Scanning systems for Malware infections
- Types of anti-malwares
- Anti-Virus
- Anti-Worm
- Anti-Trojan
- Anti-Rootkit
- Internet Security Suites
- HIDS & HIPS