Date : Fri, 19 Aug 2016 - Fri, 23 Sep 2016 Last Date of Registration : Thu, 18 Aug 2016
No. of Classes/ Sessions : 5 Class, 8 Hours Each. Total Hours : 40 Hours
Duration : 5 Days, 40 Hours. 5 Week. Time : Friday - 09:30AM - 05:30PM
Resource Person
Md. Mushfiqur Rahman

View Profile
Course Details

Start Date: Fri, 19 Aug 2016
Last Date of Registration: Thu, 18 Aug 2016
Course Fee: 20000.00
Vanue:, (Compuer Lab), H #2B, Mirpur Road, Dhaka-1209, Bangladesh.

Who Can Attend?

• Individuals who require a fundamental and Advance level understanding and practical experience and training for Information Security. • This course is intended for Ethical hacking, System testing and Countermeasures. • All other staff involved in delivering IT services • Professionals who work for legitimate Organization


Lecture,Practical exercise and evaluation, Evaluation: Classroom attendance, regular participation in the class, practical exercise,

Cyber Security & Ethical Hacking
Objective of this Training


The need for more effective information security practices is increasingly evident with each security breach reported in the media.The major challenge for businesses is the complexity of security requirements due to changing hacking tactics, myriad security vulnerabilities, evolving business practices, new business technologies, and emerging security technologies. Those numerou organization specific security challenges are best solved by professionals with Ensuring effectiveness of the enterprise security architecture should be verified on a regular basis. This represents a great challenge for increasingly sophisticated organizations due to complex IT environments which include security solutions, end-user awareness, policies, and new technologies.

Training Overview & Outline

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. This Training will give each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. This course mission is to educate, introduce and demonstrate Security tools for penetration testing purposes only. Prior to attending this course, you will need to sign an agreement stating that you will not use the newly acquired skills for illegal or malicious attacks and you will not use such tools in an attempt to compromise any computer system.

Course Contents:

  • Introduction to Ethical Hacking
  • Foot Printing and Reconnaissance
  • Network Scanning
  • Enumeration
  • System Hacking
  • Trojan and Backdoors
  • Viruses and Worm
  • Sniffing
  • Social Engineering
  • Denial of Service Attack
  • Session Hijacking
  • Web servers Hijacking
  • Web Applications Hijacking
  • SQL Injection
  • Wireless Networks Hijacking
  • Evading IDS, Firewall and Honey pots
  • Buffer Overflows
  • Cryptography
  • Introduction to Penetration Testing