Cyber Security & Ethical Hacking

Cyber Security & Ethical Hacking

Course Fee: 12000 Tk

Class Start: 03/01/2017

Overview: Learn the various hacking Essential TerminologiesUnderstand the basic elements of Information SecurityUnderstand the security functionality and usability triangleKnow the top information Security Attack vectorsLearn the different types of information Security TheatsUnderstand the Hacking & Ethical hacking

Details:

  • Learn the various hacking Essential Terminologies
  • Understand the basic elements of Information Security
  • Understand the security functionality and  usability triangle
  • Know the top information Security Attack vectors
  • Learn the different types of information Security Theats
  • Understand the Hacking & Ethical hacking
  • Understand who is a Hacker & the effects of hacking on Business
  • Understand Hacktivism & the classification of hackers
  • Learn the different types of hacking phases
  • Understand the different types of attacks on a system
  • Understand necessary, scope & Limitations of ethical hacking
  • Learn the skills, Defense in depth of an Ethical hacker
  • Know the Incident management process,
  • Information security Policies, classification & types
  • Know vulnerability research & the various vulnerability research tools
  • Understand penetration testing & various mythologies

 

Cyber Security & Ethical Hacking

This training is jointly organized by Nanotech Limited BITM.

  • Learn the various hacking Essential Terminologies
  • Understand the basic elements of Information Security
  • Understand the security functionality and  usability triangle
  • Know the top information Security Attack vectors
  • Learn the different types of information Security Theats
  • Understand the Hacking & Ethical hacking
  • Understand who is a Hacker & the effects of hacking on Business
  • Understand Hacktivism & the classification of hackers
  • Learn the different types of hacking phases
  • Understand the different types of attacks on a system
  • Understand necessary, scope & Limitations of ethical hacking
  • Learn the skills, Defense in depth of an Ethical hacker
  • Know the Incident management process,
  • Information security Policies, classification & types
  • Know vulnerability research & the various vulnerability research tools
  • Understand penetration testing & various mythologies

 

Training will be held on NanoTech Limited's Premises.

 

 

FEE - Tk 18000

 

Prerequisite

Any one with a sound IT knowledge can apply

Project Oriented Course

Experiment of One Project

 

 

Course Outline

 Module

  • Introduction to Ethical Hacking
  • Footprinting & Reconnaissance
  • Scanning Networks
  • System Hacking
  • Malware threats
  • Sniffing
  • Hacking Wireless Networks
  • Evading IDS, Firewalls and Honey pots
  • Hacking Web Applications
  • SQL Injection
  • Social Engineering
  • Cryptography
  • Denial of Service
  • Session Hijacking
  • Hacking Web servers
  • Cloud Computing
  • Enumeration

Class Schedule

CEH V9 312-50 LAB MODULE
· CEH v8 Labs Module 02 Footprinting and
Reconnaissance
· CEH v8 Labs Module 03 Scanning
Networks
· CEH v8 Labs Module 04 Enumeration
· CEH v8 Labs Module 05 System Hacking
· CEH v8 Labs Module
06 Cloud computing
· CEH v8 Labs Module 08 Sniffing
· CEH v8 Labs Module 09 Social
Engineering
· CEH v8 Labs Module 10 Denial of Service
· Installation & Configuration of Backtrack
& Kali Linux
· CEH v8 Labs Module 13 Hacking Web
Applications
· CEH v8 Labs Module 14 SQL Injection
· CEH v8 Labs Module 15 Hacking Wireless
Networks
· CEH v8 Labs Module 17 Evading IDS,
Firewalls and Honeypots
· CEH v8 Labs Module 19 Cryptography
· CEH v8 Labs Module 12 Hacking
WebServers
· CEH v8 Labs Module 11 Session
Hijacking
· CEH v8 Labs Module 07 M