Ethical Hacking and Cyber Security training centre in Bangladesh

New
EMI EASY PAY

Ethical Hacking and Cyber Security

Introduction

CYBER THREAT IS...One Of The Most Dangerous Threats Surpassing Terrorism To The World.Develop Your Knowledge Base By Getting The Right Training With Respect To Security Fundamentals.Why Ethical Hacking & Cyber Security?

With increasing use of the internet and concerns about its security, especially when it comes to things like consumer information or private details, there is considerable need for computer experts to workin ethical hacking field. Organizations today recognize the strong need for information security; hence an ethical hacker or security expert is usually employed by companies to penetrate into networks and/or computer systems, using the same methods as a hacker, for the purpose of finding and fixing network and computer security vulnerabilities.

Designed by ethical hackers and security experts, this workshop covers all aspects of Ethical Hacking andInformation Security which will help students to understand and gain knowledge about Information Security thereby bridging the gap between students and the market demands.

In this workshop, we will be conducting training session (If possible hands-on training) and a competition on “Ethical Hacking and Information Security”. This immensive 2-day workshop will groom the students with the fundamentals of Ethical Hacking. A competition will be conducted at the end of the workshop. Topper of this competition will be getting a chance of internship to work with our professional team of ethical hackers and security experts or a full fledge course of “Certified Information Security and Ethical Hacker (CISEH)”

Methodology

Interactive, Case Study, PowerPoint Presentation

Contents of Training:

Computer Security – Basics
Introduction
Hacker & Cracker
Attacker & Victims
Most Common Attacks
Committing a Computer Crime
ASCII Code - making a folder invisible

Network Security
IANA, Allotment of IP Address
IPv4 & Ipv6
IP Address – Basic, Detecting
Ping & Ping Sweep
Tools (Ping Sweeping)
Foot-Printing Techniques
Tracing Target Location
Tools to trace
Detecting Victim's OS
Detecting Firewall
Countermeasures

Email Security
Email Threats
Hacking Mailing Clients (Outlook)
Email Forging (Sending Fake mails)
Spamming - live task
Bulk Mailing - live task
419 Scam
Email Headers
Finding details of recipient
Countermeasures

Chatting Messenger
Introduction
Instant Messenger threats
Hacking using Gtalk, Google Hangout & Yahoo
Messenger
Case studies
Countermeasures

Port Scanning
Type of Ports
Virtual Port numbers
Detecting Open Ports
Tools to carry out Port Scanning
Countermeasures

Intellectual Property Theft
Introduction
Types of Malware
Trojan attack & countermeasure
Case Study
Keylogger working & countermeasure
Steganography and Steganalysis

Password Cracking & Prevention
Introduction
Password Cracking Techniques
Dictionary Based Attack
Brute force Attack
Task – Crack password on site: Live
Countermeasures for users
Countermeasure for System Administrators

Identity Attacks
Introduction
Proxy Servers
Proxy Bouncing
IP Proxy, Tor browser

Mobile Phone & online Apps Hacking
Hacking chatting apps (WeChat & Whatsapp)
Hacking online database portals (YellowPages & JustDial)
Spying through cell phone
Call Spoofing

Other types of Attack
Input Validation
Buffer Overflow
DOS & DDOS Attacks
HoneyPots, 0day
Social Engineering Attacks

Cyber Law and Consulting
What is Cyber Law
Types of Crimes
ICT Act, 2006
Blogs & Blogger's rights & limitation
Uniform Domain Dispute Resolution Policy
Trademark & Copyright Infringement
Central Acts & State Acts

Website Hacking
Hacking & finding Loop holes using Google
Finding Control panel of Websites
Breaking Cpanel
Defacing Website
Database Hacking, SQL Injection Attack
Web Jacking

Basic Hacking
Opening blocked website
Phishing Technique
Social networking account hacking (Facebook, LinkedIn)
Bank Account hacking / illegal Money Transfer
Hacking Email accounts
Recording activities on computer
Making own Virus

Related Courses

Price 12,000 Tk + VAT
Nusrat Jahan
  • 19 Sep - 22 Oct 2018

UX design is not just a fascinating field to get into, ...

IT
Ashim Kumar Sikder
  • 20 Sep - 4 Oct 2018

Apex technology focus on developed single application that ...

IT
Muhammad Rabiul
  • 20 Sep - 2 Oct 2018

This course focuses on motion graphics and animation from a ...

IT
Samiul Huq
  • 21 - 22 Sep 2018 (Day Long)

Participants will experience a first look of the latest ...

IT
Anyone having basic knowledge regarding the use of Computer and Internet willing to enter or switch their career to Cyber Security Domain or interested in learning Ethical Hacking and Cyber Security as a skill can attend.
Arrangement for Certificate, lunch and two tea-break would be made by the Organizer during the workshop.