It's all to do with the training: you can do a lot if you're properly trained.
An Institution That Can Change The Way of Your Life
It's all to do with the training: you can do a lot if you're properly trained.
An Institution That Can Change The Way of Your Life
It's all to do with the training: you can do a lot if you're properly trained.
An Institution That Can Change The Way of Your Life
It's all to do with the training: you can do a lot if you're properly trained.
An Institution That Can Change The Way of Your Life
It's all to do with the training: you can do a lot if you're properly trained.
An Institution That Can Change The Way of Your Life
It's all to do with the training: you can do a lot if you're properly trained.
An Institution That Can Change the Way of Your Life
It's all to do with the training: you can do a lot if you're properly trained.
An Institution That Can Change the Way of Your Life
It's all to do with the training: you can do a lot if you're properly trained.
An Institution That Can Change the Way of Your Life
It's all to do with the training: you can do a lot if you're properly trained.
An Institution That Can Change the Way of Your Life

Introduction to IT Forensics & Vulnerability Assessment

     

   Who can attend?

  • All with an interest to know about Computer Forensics, audit & security
  • All who wants to know and work in IT vulnerability & security
  • Existing network, web & server administrators
  • All who wants to keep updated with recent IT security and vulnerability
  • All newcomers who wants to build up their career in security administration

 

 

FEE - Tk 3000

Prerequisite

  • Basic operating skill of network & server administration
  • Basic knowledge on Windows and Linux command & tools

Project Oriented Course

One will practically learn all mentioned tools and techniques by completing a workshop.

Course Outline

  • Introduction to Digital Forensics
    • Definition of Computer Forensics
    • Forensic Origins
    • Cyber Crime
  • Investigating Emails and Steganography
    • Email Crimes
    • Steganography
  • Introduction to Hacking, Vulnerability Assessment & Penetration Testing
    • Terminologies
    • History of Hacking
    • Phases of an Attack
    • Type of Attack
    • VA Vs PT
    • Internal Network Vs External Network
  • Infrastructure Vulnerability Assessment & Penetration Testing
    • Foot Printing & Reconnaissance
    • Enumeration
    • Sniffing & Social Engineering
    • Scanning Network
  • Web Application Assessment & Penetration Testing
    • Attacking Web Servers & Web Applications
    • Web Protocol
    • Web Proxy
    • SQL Injection
    • Command Injection
    • Code Injection
    • Session management
  • Offensive Technologies
    • Malware and Antivirus
    • Denial of Service
  • Wireless Network Infrastructure Assessment
    • Security Standard – WEP & WPA
    • WiFi and Type of Attack
    • Securing Wireless Network
  • Minimum Baseline Security Standards

 

 

Used Tools

  • VMware Workstation
  • Vulnerability assessment tools

COURSE SUMMARY

Course Duration : 2 Days
Total Hour : 10 Hours
Number of Batch : 1 Batch

Application Last Date : 13 June, 2016

Class Schedule

Day & Time : Friday 10:00 am - 3:00 pm
: Friday 10:00 am - 3:00 pm
Duration : 5 hrs per class

Project:

IT Forensics & Vulnerability Assessment related Project


Certificate:

Certificate will be provided after the completion of workshop