It's all to do with the training: you can do a lot if you're properly trained.
An Institution That Can Change The Way of Your Life
It's all to do with the training: you can do a lot if you're properly trained.
An Institution That Can Change The Way of Your Life
It's all to do with the training: you can do a lot if you're properly trained.
An Institution That Can Change The Way of Your Life
It's all to do with the training: you can do a lot if you're properly trained.
An Institution That Can Change The Way of Your Life
It's all to do with the training: you can do a lot if you're properly trained.
An Institution That Can Change The Way of Your Life
It's all to do with the training: you can do a lot if you're properly trained.
An Institution That Can Change the Way of Your Life
It's all to do with the training: you can do a lot if you're properly trained.
An Institution That Can Change the Way of Your Life
It's all to do with the training: you can do a lot if you're properly trained.
An Institution That Can Change the Way of Your Life
It's all to do with the training: you can do a lot if you're properly trained.
An Institution That Can Change the Way of Your Life

Certified Ethical Hacker

This training is jointly organized by LEADS Technology Limited & BASIS Institute of Technology & Management(BITM)

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.

 

Training will be held in LEADS Technology Limited premises.

FEE - Tk 15000

Prerequisite

The prerequisites for the class will depend on where you take it, there are a few things you will have to have. You will need to have a working knowledge of TCP/IP, a background in either security or information systems as well as at least a year of experience working with networking technologies.

Project Oriented Course

Not necessary

Course Outline

01. Introduction to Ethical Hacking

02. Footprinting and Reconnaissance

03. Scanning Networks

04. Enumeration

05. System Hacking

06. Malware Threats

07. Sniffing

08. Social Engineering

09. Denial-of-Service

10. Session Hijacking

11. Hacking Web Servers

12. Hacking Web Applications

13. SQL Injection

14. Hacking Wireless Networks

15. Hacking Mobile Platforms

16. Evading IDS, Firewalls, and Honeypots

17. Cloud Computing

18. Cryptography

Used Tools

n/a

COURSE SUMMARY

Course Duration : 60 Days
Total Hour : 40 Hours
Number of Batch : 1 Batch

Application Last Date : 02 November, 2016

Class Schedule

Day & Time : Friday 3:30 pm - 9:30 pm
Duration : 6 hours per class

Project:

n/a


Certificate:

Certificate will be given after the course completion.