It's all to do with the training: you can do a lot if you're properly trained.
An Institution That Can Change The Way of Your Life
It's all to do with the training: you can do a lot if you're properly trained.
An Institution That Can Change The Way of Your Life
It's all to do with the training: you can do a lot if you're properly trained.
An Institution That Can Change The Way of Your Life
It's all to do with the training: you can do a lot if you're properly trained.
An Institution That Can Change The Way of Your Life
It's all to do with the training: you can do a lot if you're properly trained.
An Institution That Can Change The Way of Your Life
It's all to do with the training: you can do a lot if you're properly trained.
An Institution That Can Change the Way of Your Life
It's all to do with the training: you can do a lot if you're properly trained.
An Institution That Can Change the Way of Your Life
It's all to do with the training: you can do a lot if you're properly trained.
An Institution That Can Change the Way of Your Life
It's all to do with the training: you can do a lot if you're properly trained.
An Institution That Can Change the Way of Your Life

Cyber Security & Ethical Hacking

This training is jointly organized by Nanotech Limited & BITM.

  • Learn the various hacking Essential Terminologies
  • Understand the basic elements of Information Security
  • Understand the security functionality and  usability triangle
  • Know the top information Security Attack vectors
  • Learn the different types of information Security Theats
  • Understand the Hacking & Ethical hacking
  • Understand who is a Hacker & the effects of hacking on Business
  • Understand Hacktivism & the classification of hackers
  • Learn the different types of hacking phases
  • Understand the different types of attacks on a system
  • Understand necessary, scope & Limitations of ethical hacking
  • Learn the skills, Defense in depth of an Ethical hacker
  • Know the Incident management process,
  • Information security Policies, classification & types
  • Know vulnerability research & the various vulnerability research tools
  • Understand penetration testing & various mythologies

 

Training will be held on NanoTech Limited's Premises.

FEE - Tk 15000

Prerequisite

Any one with a sound IT knowledge can apply.

Project Oriented Course

Experiment of One Project

Course Outline

 Module

  • Introduction to Ethical Hacking
  • Footprinting & Reconnaissance
  • Scanning Networks
  • System Hacking
  • Malware threats
  • Sniffing
  • Hacking Wireless Networks
  • Evading IDS, Firewalls and Honey pots
  • Hacking Web Applications
  • SQL Injection
  • Social Engineering
  • Cryptography
  • Denial of Service
  • Session Hijacking
  • Hacking Web servers
  • Cloud Computing
  • Enumeration

Class Schedule

CEH V9 312-50 LAB MODULE
· CEH v8 Labs Module 02 Footprinting and
Reconnaissance
· CEH v8 Labs Module 03 Scanning
Networks
· CEH v8 Labs Module 04 Enumeration
· CEH v8 Labs Module 05 System Hacking
· CEH v8 Labs Module
06 Cloud computing
· CEH v8 Labs Module 08 Sniffing
· CEH v8 Labs Module 09 Social
Engineering
· CEH v8 Labs Module 10 Denial of Service
· Installation & Configuration of Backtrack
& Kali Linux
· CEH v8 Labs Module 13 Hacking Web
Applications
· CEH v8 Labs Module 14 SQL Injection
· CEH v8 Labs Module 15 Hacking Wireless
Networks
· CEH v8 Labs Module 17 Evading IDS,
Firewalls and Honeypots
· CEH v8 Labs Module 19 Cryptography
· CEH v8 Labs Module 12 Hacking
WebServers
· CEH v8 Labs Module 11 Session
Hijacking
· CEH v8 Labs Module 07 M

Used Tools

n/a

COURSE SUMMARY

Course Duration : 10 Days
Total Hour : 40 Hours
Number of Batch : 1 Batch

Application Last Date : 10 December, 2016

Class Schedule

Day & Time : Saturday 10:00 am - 2:00 pm
Duration : 4 hours per class

Project:

This will be discuss during the session


Certificate:

Certificate will be given after the course completion.