Ethical Hacking and Cyber Security training centre in Bangladesh

Get 20% discount

Ethical Hacking and Cyber Security

  • Date : 16 - 17 March 2018
  • Duration : Day(9.30 AM-5.30 PM)
  • No. of Classes/ Sessions : 2 Days Long
  • Last Date of Registration : 13 March, 2018
  • Venue : Bdjobs Training, BDBL Building (Level 19), 12 Kawran Bazar C/A, Dhaka 1215.
  • 20% Discount at bKash or Online Payment, Seats are Limited

Introduction

CYBER THREAT IS...One Of The Most Dangerous Threats Surpassing Terrorism To The World.Develop Your Knowledge Base By Getting The Right Training With Respect To Security Fundamentals.Why Ethical Hacking & Cyber Security?

With increasing use of the internet and concerns about its security, especially when it comes to things like consumer information or private details, there is considerable need for computer experts to workin ethical hacking field. Organizations today recognize the strong need for information security; hence an ethical hacker or security expert is usually employed by companies to penetrate into networks and/or computer systems, using the same methods as a hacker, for the purpose of finding and fixing network and computer security vulnerabilities.

Designed by ethical hackers and security experts, this workshop covers all aspects of Ethical Hacking andInformation Security which will help students to understand and gain knowledge about Information Security thereby bridging the gap between students and the market demands.

In this workshop, we will be conducting training session (If possible hands-on training) and a competition on “Ethical Hacking and Information Security”. This immensive 2-day workshop will groom the students with the fundamentals of Ethical Hacking. A competition will be conducted at the end of the workshop. Topper of this competition will be getting a chance of internship to work with our professional team of ethical hackers and security experts or a full fledge course of “Certified Information Security and Ethical Hacker (CISEH)”

Methodology

Interactive, Case Study, PowerPoint Presentation

Contents of Training:

Computer Security – Basics
Introduction
Hacker & Cracker
Attacker & Victims
Most Common Attacks
Committing a Computer Crime
ASCII Code - making a folder invisible

Network Security
IANA, Allotment of IP Address
IPv4 & Ipv6
IP Address – Basic, Detecting
Ping & Ping Sweep
Tools (Ping Sweeping)
Foot-Printing Techniques
Tracing Target Location
Tools to trace
Detecting Victim's OS
Detecting Firewall
Countermeasures

Email Security
Email Threats
Hacking Mailing Clients (Outlook)
Email Forging (Sending Fake mails)
Spamming - live task
Bulk Mailing - live task
419 Scam
Email Headers
Finding details of recipient
Countermeasures

Chatting Messenger
Introduction
Instant Messenger threats
Hacking using Gtalk, Google Hangout & Yahoo
Messenger
Case studies
Countermeasures

Port Scanning
Type of Ports
Virtual Port numbers
Detecting Open Ports
Tools to carry out Port Scanning
Countermeasures

Intellectual Property Theft
Introduction
Types of Malware
Trojan attack & countermeasure
Case Study
Keylogger working & countermeasure
Steganography and Steganalysis

Password Cracking & Prevention
Introduction
Password Cracking Techniques
Dictionary Based Attack
Brute force Attack
Task – Crack password on site: Live
Countermeasures for users
Countermeasure for System Administrators

Identity Attacks
Introduction
Proxy Servers
Proxy Bouncing
IP Proxy, Tor browser

Mobile Phone & online Apps Hacking
Hacking chatting apps (WeChat & Whatsapp)
Hacking online database portals (YellowPages & JustDial)
Spying through cell phone
Call Spoofing

Other types of Attack
Input Validation
Buffer Overflow
DOS & DDOS Attacks
HoneyPots, 0day
Social Engineering Attacks

Cyber Law and Consulting
What is Cyber Law
Types of Crimes
ICT Act, 2006
Blogs & Blogger's rights & limitation
Uniform Domain Dispute Resolution Policy
Trademark & Copyright Infringement
Central Acts & State Acts

Website Hacking
Hacking & finding Loop holes using Google
Finding Control panel of Websites
Breaking Cpanel
Defacing Website
Database Hacking, SQL Injection Attack
Web Jacking

Basic Hacking
Opening blocked website
Phishing Technique
Social networking account hacking (Facebook, LinkedIn)
Bank Account hacking / illegal Money Transfer
Hacking Email accounts
Recording activities on computer
Making own Virus

Related Courses

Dr. Md. Abdur Rouf
  • 19 Feb - 21 Mar 2018

The purpose of this course is to provide the participants ...

Accounts
Enamul Haque Sujon
  • 21 Feb - 7 Mar 2018

The 5 Basic Functions of QuickBooks. by creating the ...

Accounts
Abu Shams Mahmood Arif
  • Friday, February 23, 2018

Finance and Accounting professionals do their financial ...

Accounts
Dr. Md. Abdur Rouf
  • Saturday, February 24, 2018

The purpose of this program is to provide the participants ...

Accounts
Anyone having basic knowledge regarding the use of Computer and Internet willing to enter or switch their career to Cyber Security Domain or interested in learning Ethical Hacking and Cyber Security as a skill can attend.
Arrangement for Certificate, lunch and two tea-break would be made by the Organizer during the workshop.

Resource Person

Rizwan Shaikh

Ethical Hacker, Information Security Researcher, Cyber Law Consultant

Rizwan Shaikh is one of the India's renowned Ethical Hacker, Information Security Researcher and Cyber Crime Consultant actively involved in providing Ethical Hacking and Information Security training & services.
At Present, Rizwan Shaikh is the Founder of Pristine InfoSolutions, a Cyber Security company headquartered in Mumbai, India specializing in providing training and services for Cyber Crime Investigations, Cyber Law Consulting,Ethical Hacking and Information Security.
He is the Founder, CTO and principal consultant of Pristine InfoSolutions and is responsible for setting company’s strategic direction and overseeing the business operations. With an aim to secure the Cyber World from unethical Hackers, Rizwan has been imparting practical knowledge of Ethical Hacking, Information Security and Cyber Forensics to the budding technical workforce of the country. Rizwan has delivered numerous workshops, seminars, talks and conferences at various colleges, institutions and has been assisting corporates in creating awareness about Information Security and Cyber Crimes.
Rizwan Shaikh is regularly invited by Engineering Colleges, Organizations, Corporates and Government agencies to speak and distribute knowledge about Cyber Security.
He is a well recognized name in the Cyber World and with an experience of more than 7 years, he has been conducting Ethical Hacking training and providing Information Security services across the globe. He is widely sought after Speaker on Cyber Security and Cyber Law and has been invited by many corporates and leading institutions of India including IIT's and NIT's for conducting workshops, seminars, bootcamps and trainings on Ethical Hacking and Information Security. He has trained more than 20000 individuals in Colleges, Corporates and Government Departments.
He has trained employees of some of the most prestigious clients like Accenture, Wipro, Capgemini, Trend Micro, TCS, HCL and many others. His area of expertise includes Vulnerability Assessment, Information Security Audits, Penetration Testing, Source Code Reviews, Computer Forensics, Ethical Hacking, Cyber Law, etc.
Rizwan started his career journey at the Age of 17. His firrst accomplishment was finding a Loophole in SMS Gateway which allowed Spoofing numbers to send SMS (es). He came into limelight at the age of 18, when he protected many Indian websites from getting defaced by Pakistan Cyber Army where he played a major role in finding out the plan with pseudo name (using fake identity).


Interactive, Case Study, PowerPoint Presentation