Ethical Hacking and Cyber Security training centre in Bangladesh


Ethical Hacking and Cyber Security


CYBER THREAT IS...One Of The Most Dangerous Threats Surpassing Terrorism To The World.Develop Your Knowledge Base By Getting The Right Training With Respect To Security Fundamentals.Why Ethical Hacking & Cyber Security?

With increasing use of the internet and concerns about its security, especially when it comes to things like consumer information or private details, there is considerable need for computer experts to workin ethical hacking field. Organizations today recognize the strong need for information security; hence an ethical hacker or security expert is usually employed by companies to penetrate into networks and/or computer systems, using the same methods as a hacker, for the purpose of finding and fixing network and computer security vulnerabilities.

Designed by ethical hackers and security experts, this workshop covers all aspects of Ethical Hacking andInformation Security which will help students to understand and gain knowledge about Information Security thereby bridging the gap between students and the market demands.

In this workshop, we will be conducting training session (If possible hands-on training) and a competition on “Ethical Hacking and Information Security”. This immensive 2-day workshop will groom the students with the fundamentals of Ethical Hacking. A competition will be conducted at the end of the workshop. Topper of this competition will be getting a chance of internship to work with our professional team of ethical hackers and security experts or a full fledge course of “Certified Information Security and Ethical Hacker (CISEH)”


Interactive, Case Study, PowerPoint Presentation

Contents of Training:

Computer Security – Basics
Hacker & Cracker
Attacker & Victims
Most Common Attacks
Committing a Computer Crime
ASCII Code - making a folder invisible

Network Security
IANA, Allotment of IP Address
IPv4 & Ipv6
IP Address – Basic, Detecting
Ping & Ping Sweep
Tools (Ping Sweeping)
Foot-Printing Techniques
Tracing Target Location
Tools to trace
Detecting Victim's OS
Detecting Firewall

Email Security
Email Threats
Hacking Mailing Clients (Outlook)
Email Forging (Sending Fake mails)
Spamming - live task
Bulk Mailing - live task
419 Scam
Email Headers
Finding details of recipient

Chatting Messenger
Instant Messenger threats
Hacking using Gtalk, Google Hangout & Yahoo
Case studies

Port Scanning
Type of Ports
Virtual Port numbers
Detecting Open Ports
Tools to carry out Port Scanning

Intellectual Property Theft
Types of Malware
Trojan attack & countermeasure
Case Study
Keylogger working & countermeasure
Steganography and Steganalysis

Password Cracking & Prevention
Password Cracking Techniques
Dictionary Based Attack
Brute force Attack
Task – Crack password on site: Live
Countermeasures for users
Countermeasure for System Administrators

Identity Attacks
Proxy Servers
Proxy Bouncing
IP Proxy, Tor browser

Mobile Phone & online Apps Hacking
Hacking chatting apps (WeChat & Whatsapp)
Hacking online database portals (YellowPages & JustDial)
Spying through cell phone
Call Spoofing

Other types of Attack
Input Validation
Buffer Overflow
DOS & DDOS Attacks
HoneyPots, 0day
Social Engineering Attacks

Cyber Law and Consulting
What is Cyber Law
Types of Crimes
ICT Act, 2006
Blogs & Blogger's rights & limitation
Uniform Domain Dispute Resolution Policy
Trademark & Copyright Infringement
Central Acts & State Acts

Website Hacking
Hacking & finding Loop holes using Google
Finding Control panel of Websites
Breaking Cpanel
Defacing Website
Database Hacking, SQL Injection Attack
Web Jacking

Basic Hacking
Opening blocked website
Phishing Technique
Social networking account hacking (Facebook, LinkedIn)
Bank Account hacking / illegal Money Transfer
Hacking Email accounts
Recording activities on computer
Making own Virus

Related Courses

Price 6,000 Tk + VAT
Muhammad Rabiul
  • 26 Feb - 17 Mar 2019

The course has designed to become familiar with an ...

Md. Feroz Kibria
  • Friday, March 1, 2019

Organizations use Microsoft Office Excel to track sales ...

Md. Rabiul Islam
  • 5 Mar - 7 Apr 2019

Data Science is one of the lucrative job of the 21st ...

Mostofa Monower
  • 5 Mar - 7 Apr 2019

Upon successfully completion of this training, participants ...

Anyone having basic knowledge regarding the use of Computer and Internet willing to enter or switch their career to Cyber Security Domain or interested in learning Ethical Hacking and Cyber Security as a skill can attend.
Arrangement for Certificate, lunch and two tea-break would be made by the Organizer during the workshop.