Cyber Security & Ethical Hacking Training

 

CSL Training providing Cyber Security & Ethical Hacking training (CEH) course. In 18 comprehensive modules, the course covers 270 attack technologies, commonly used by hackers. Throughout the course, you will be immersed in a hacker’s mindset, evaluating not just logical, but physical security.

Cyber Security & Ethical Hacking - Course Objectives

After completing this course, students will be able to

  • Introduction to Ethical Hacking
  • Footprinting, Scanning, and Enumeration
  • Hacking Web servers and Web applications
  • DoS, SQL injection, Buffer overflow attacks
  • Cryptography
  • Wireless hacking
  • Linux Hacking
  • Phishing
  • Countermeasures

Target Audience

Course Pre-Requisites

  • An ethical hacker must have excellent computer networking and programming skills.
  • An ethical hacker must be cautious, vigilant, and diligent in seeking to search and wait for the required results.
  • An ethical hacker should always be wise enough to consider the scenario and certain users’ mindset, to utilize social engineering exploitations. A good ethical hacker still requires excellent problem-solving skills.
  • Ethical hackers do require street smarts, people’s talents, and also manipulation skills.
  • You need to keep up to date with new technologies, vulnerabilities, and exploitation techniques.

Course Duration

Fee15000/=
TypeOffline/Online
Module20
Duration40 Hours
Session20
Per Class2.00 Hours

 

Cyber Security & Ethical Hacking Training in dhaka

Cyber Security & Ethical Hacking Training - Details Course Outlines

Module-01

Introduction to Ethical Hacking

Module-02

Foot printing and Reconnaissance

Module-03

Scanning Networks

Module-04

Enumeration

Module-05

Vulnerability Analysis

Module-06

System Hacking

Module-07

Malware Threats

Module-08

Sniffing

Module-09

Social Engineering

Module-10

Denial-of-Service

Module-11

Session Hijacking

Module-12

Evading IDS, Firewalls, and Honeypots

Module-13

Hacking Web Servers

Module-14

Hacking Web Applications

Module-15

SQL Injection

Module-16

Hacking Wireless Networks

Module-17

Hacking Mobile Platforms

Module-18

IoT Hacking

Module-19

Cloud Computing

Module-20

Cryptography