Online Training on IT Security & Ethical Hacking

Online Training on IT Security & Ethical Hacking

This is the world’s most advanced ethical hacking course with 20 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the info security.

course at a glance

  • Date : 30 Oct - 21 Nov 2020
  • No. of Classes/ Sessions : 8
  • Total Hours : 40
  • Last Date of Registration : 29 Oct 2020
  • Class Schedule :
    • Saturday - 7:00 PM - 9:00 PM
    • Friday - 7:00 PM - 9:00 PM
  • venue : PeopleNTech Limited (Online Platform)

Price: TK. 7,000
(including VAT & TAX)
Early Bird Registration Going on Valid Until 29th October, 2020 Taka @5000

This Training is jointly organized by BITM & PeopleNTech.

Course Outline:

Class- 1

Information security basics:

  • Understanding hacking/ethical hacking concepts and scope

  • Concepts of policies, procedures and awareness

Footprinting:

  • Footprint using advance google hacking techniques

  • Footprinting uisng recon-ng

  • Footprinting uisng Dmitry

Scanning:

  • Scanning techniques using hping3/nmap

  • Advance scanning using Nmap Scripting Engine (NSE)

Class- 2

Gaining access – server side attack:

  • Basic information gathering and exploitation

  • Code Execution vulnerabilities to hack into remote server

  • Steganography (image steganograpy/email steganograpy /space steganograpy /ADS)

Gaining access – client side attack:

  • Generating undetectable backdoor using VEIL framework

  • Listening for incoming connections

  • Basic delivery method to test and hack windows


Class- 3

Gaining access – client side attack – Social Engineering:

  • Backdooring any file types (images/pdfs etc)

  • Compiling and changing trojan’s icon

  • Spoofing .exe extension to any extension (pdf/jpg etc)

Post exploitation:

  • Maintaining access – basic method

  • Maintaining access – using reliable and undetectable method


Class- 4

Website hacking – information gathering:

  • whois lookup

  • Discovering technologies in website

  • Discovering websites in same server

  • Discovering sensitive files

  • Analysing sensitive files

Website hacking – file upload, code execution, LFI:

  • Discovering and exploiting file upload vulnerability to hack website

  • Discovering and exploiting code execution vulnerability to hack website

  • Discovering and exploiting local file inclusion vulnerability to hack website

     

Class- 5

Website hacking – XSS:

  • Discovering reflected XSS

  • Discovering stored XSS

  • Cookie catching using XSS vulnerability

  • Changing of another user password using XSS vulnerability

  • Taking control of another user’s session


Class- 6

Website hacking – SQL Injection:

  • Discovering SQL injection in POST

  • Bypassing login using SQL Injection

  • Discovering SQL Injection using GET

  • Reading Database information

  • Discovering Database tables

  • Discovering SQL Injections and Extracting data using SQL Map


Class – 7

Network hacking – Pre-connection attack- WPA/WPA2 cracking:

  • Hacking WPA/WPA2 without wordlist

  • Cracking WPA/WPA2 using wordlist attack

Network hacking – Post connection attack – MITM attack:

  • ARP poisoning using Kali

  • Bettercap basics and sniffing

  • Bypassing HTTPS

  • Bypassing HSTS

  • Session hijacking using ettercap, harmster and ferret

  • Wireshark basics

  • Stealing password using Wireshark


Class -8

Website hacking – Discovering vulnerabilities Automatically:

  • Automatically scan target website for vulnerabilities

  • Analyzing scan result

Hacking mobile platform:

  • Trace mobile location

  • Generating undetectable backdoor to hack mobile

  • Generating backdoor using different tools

  • Using backdoor outside of local network

Curriculum

Module Online Training on IT Security & Ethical Hacking 40 Hrs

Tentative Class Start

30th October, 2020

Available Seat

10 / 15

who can join

Ethical hacking training course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure

Meet the Instructor