Certified Ethical Hacker

Certified Ethical Hacker

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

course at a glance

  • Date : 22 Dec - 23 Feb 2018
  • No. of Classes/ Sessions : 14
  • Total Hours : 40
  • Last Date of Registration : 22 Dec 2017
  • Class Schedule :
    • Friday - 6.30PM - 9.30PM
  • venue : Rupayan Trade Center, 16th Floor, 114, Kazi Nazrul Islam Avenue, Banglamotors, Dhaka 1000

Price: TK. 15,000

This training is jointly organized by BITM & Leads Training & Consulting Ltd

Training will be held in Leads Training & Consulting Ltd

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.

 

Course Outline

01. Introduction to Ethical Hacking

02. Footprinting and Reconnaissance

03. Scanning Networks

04. Enumeration

05. System Hacking

06. Malware Threats

07. Sniffing

08. Social Engineering

09. Denial-of-Service

10. Session Hijacking

11. Hacking Web Servers

12. Hacking Web Applications

13. SQL Injection

14. Hacking Wireless Networks

15. Hacking Mobile Platforms

16. Evading IDS, Firewalls, and Honeypots

17. Cloud Computing

18. Cryptography

Used Tools

N/A

 

Curriculum

Ethical Hacking Ethical Hacking 40 Hrs

Tentative Class Start

22nd December, 2017

Available Seat

10 / 12

who can join

The prerequisites for the class will depend on where you take it, there are a few things you will have to have. You will need to have a working knowledge of TCP/IP, a background in either security or information systems as well as at least a year of experience working with networking technologies.
 

Meet the Instructor