Certified Ethical Hacking

Bangladesh is reaching towards the highest peak of digitalization and issues like server and network security are getting more and more importance. To secure our network systems from any kind of trouble or hacking, people are depending on Certified Ethical Hackers. At present, certified ethical hacking program has gained the most importance among the desired information security training program and it has achieved its captivating status among security professionals.

Batch Duration

Starting Date : 7th April, 2018

Last Date of Registration :7th April, 2018

Class Schedule : 2 Months (40 Hours) Saturday; Time: 9:00 AM - 1:00 PM

Total Hours : 40

Course Curriculum

Day 1 – Ethical Hacking Fundamentals

  •  Effects of Hacking
    • Reviewing the elements of information security
    • Security, functionality & usability triangle
  • Methods of Hacking
    • Reconnaissance
    • Scanning
    • Gaining access
    • Covering tracks
    • Identifying attack types
  • Functions of Ethical Hacker
    • Conducting vulnerability research
    • Identifying elements of information warfare

Day 2 – Applying Covert Techniques to Scan & Attack a Network

  • Footprinting & Reconnaissance
    • Objectives and methods of footprinting
    • Searching for information with Google Hacking
    • Employing footprinting countermeasures
  • Scanning Networks
    • Objectives and methods of footprinting
    • Searching for information with Google Hacking
    • Employing footprinting countermeasures
  • Examining enumeration techniques
    • Enumerating user accounts using default passwords
    • Simple Network Management Protocol (SNMP) enumeration

Day 3 – Analyzing System Risks & Weaknesses to Apply Countermeasures

  • System Hacking
    • CEH Hacking Methodology (CHM)
    • Cracking passwords and escalating privileges
    • Defending against password cracking and key loggers
    • Hiding information with steganography
  • Uncovering Trojans and backdoors
    •  Injecting a Trojan into a host
    •  Analyzing Trojan activity
  • Dissecting viruses, worms and sniffers
    • Distributing malware on the web
    • Recognizing key indicators of a virus attack
    • Analyzing worms and malware
  • Social Engineering and Denial-of-Service (DoS)
    • Targets, intrusion tactics and strategies for prevention
    • Mitigating the risks of social networking to networks
    • Recognizing symptoms and techniques of DoS attack
    • Implementing tools to defend against DoS attacks

Day 4 – Assessing & Preventing Gaps in a Network Infrastructure

  • Hacking web applications and wireless networks
    • Cross-Site Scripting (XSS) and web application DoS attacks
    • Defending against SQL Injection
    • Implementing a man-in-the-middle attack
  • Hijacking sessions and web servers
    • Spoofing a site to steal credentials
    • Preventing hijacking by implementing countermeasures
    • Leveraging Metasploit in an attack
  • Buffer overflow and cryptography
    • Exploiting input validation failures
    • Defending against memory corruption attacks

Day 5 – Performing Penetration Testing

  • Performing security and vulnerability assessments
  • Determining security and vulnerability assessments
  • Announced vs. unannounced testing
Md. Mushfiqur Rahman

Course Instructor

Md. Mushfiqur Rahman

Faculty

Admission Open

25% OFF

Course Fee : ৳ 20000
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech