+880961-333-7448 / 01799-446655, 01762-002444 [email protected]
Graphic Design

Online Training on IT Security & Ethical Hacking Professional

Do you want to grow your career as an ethical hacker? PeopleNTech Institute of IT can be the best choice for you. Our professional “IT Security & Ethical Hacking” Course training from PeopleNTech will provide you with all the essential skills that will help you to be a Professional or Freelance ethical hacker. As IT security & ethical Hacking is a global & worldwide growing sector, it can be your best to build up a prestigious as well as Global career. Many national companies & sensitive institutions in Bangladesh are still unaware of the risks of being hacked. After finishing this IT Security & Ethical Hacking course, you will be able to get a job in both local and international companies. Our experienced mentors & job placement department will prepare you to begin your career. After completing the course, you can work as Professional Ethical Hacker.

Course Features

icons

Total 40 Hours

icons

Tools, templates and book suggestions

icons

Online and Offline Support

icons

Recorded video

icons

Assessment and Certificate

icons

Job Placement Support

icons

Course duration is 3 months

icons

24+ Live Classes

৳ 4999 ৳ 15000

For details about the course

Call Now (0179-944-6655)

Course Features

Online Training on IT Security & Ethical Hacking Professional course is professionally designed with detailed discussions on web design and development, on-hand practice and income guidelines.

icons

Total 40 Hours

icons

Tools, templates and book suggestions

icons

Online and Offline Support

icons

Recorded video

icons

Assessment and Certificate

icons

Job Placement Support

icons

Course duration is 3 months

icons

24+ Live Classes

Course Modules

Information security basics

  • Understanding ethical hacking concepts
  • Concept of policy, procedure and awareness

Lab preparation

  • Installing Kali linux as attacker machine
  • Installing metasploitable as victim machine

Footprinting & Reconnaissance

  • Understanding footprinting concept
  • Footprint using advance google hacking techniques
  • Footprinting uisng recon-ng

Scanning & Enumeration

  • Scanning techniques using nmap
  • Enumeration using Nmap Scripting Engine (NSE)

Vulnerability Assessment

  • Vulnerability Assessment using ZAP
  • Analyzing ZAP Result
  • Vulnerability Assessment using Nikto
  • Analyzing Nikto Result

Gaining Access – Server-Side Attack

  • Basic enumeration and exploitation
  • Hacking remote server using basic Metasploit Exploit
  • Hacking remote server using code execution vulnerabilities
  • VNC/IRCd exploitation to hack into remote server
  • Exploiting Samba Vulenrability to hack remote server

Gaining Access – Client-Side Attack

  • Generating undetectable backdoor using VEIL framework
  • Listening for incoming connections
  • Basic delivery method to test and hack windows

Gaining Access – client-side attack – Social Engineering

  • Backdooring any file types (images/pdfs etc)
  • Compiling and changing trojan’s icon
  • Spoofing .exe extension to any extension (pdf/jpg etc)

Post exploitation

  • Maintaining access – basic method
  • Maintaining access – using reliable and undetectable method

Exam - 1

  • Putting knowledge all together to Hack a real life like Machine

Website hacking – Reconnaissance

  • Shodan for recon
  • DNS Enumeration
  • CMS Identification
  • Fuzzing – Introduction/Importance
  • Fuzzing – process, for sensitive files
  • Fuzzing – use of Wfuzz, FFUF
  • Github Recon – Manual & Automated way
  • Advance Subdomain Recon (https://www.youtube.com/watch?v=9mSLSC7aUcY)

Network hacking – Pre-connection attack - WPA/WPA2 cracking

  • Hacking WPA/WPA2 without wordlist
  • Cracking WPA/WPA2 using wordlist attack

Network hacking – Post connection attack – MITM attack

  • ARP poisoning using Kali
  • Bettercap basics and sniffing
  • Bypassing HTTPS
  • Bypassing HSTS
  • Wireshark basics
  • Stealing password using Wireshark

Exam – 2

  • Hack a real life like machine

What you will learn

icons

Network Hacking

icons

Website Hacking

icons

Networking Fundamentals

icons

Security Fundamentals:

Details about the course

A Professional Ethical Hacker is a skilled and trained professional who understands and knows how to look for weaknesses and vulnerabilities in a system. Then they use their knowledge and tools to act as a malicious hacker. But all these happen in a lawful and legitimate manner to assess the security posture of a system(s). The ethical hacking individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. PeopleNTech provides the best Ethical Hacking Training in Dhaka.

Ethical Hacking Training in Dhaka, Bangladesh

The Purpose of the Ethical Hacking Training in Dhaka is to:

  • Establish and govern minimum standards of a system
  • Inform the authority that credentialed individuals meet or exceed the minimum standards
  • Establish ethical hacking as a unique and self-regulating profession.

During this best Cyber Security course,we will cover

  • Fundamentals of IT Security
  • Fundamentals of Ethical Hacking
  • All Tools & Software Used for Ethical Hacking
  • Essential Programming Languages for Ethical Hacking

What is an Ethical Hacker? 

To beat a hacker, you need to think like a hacker too! Ethical Hacking is often referred to as determining if vulnerabilities exist and undertaking preventive, corrective, and protective countermeasures or notifying the authority.

What is Ethical Hacking?

IT Security & Ethical Hacking is the practice of legally and ethically testing computer systems, networks, and applications to identify vulnerabilities that malicious hackers could exploit. Totally web security is dependent on doing Cyber Security activities.

Professional Training Target Audience: 

The Professional Ethical Hacker training program from the course will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure & system.

Course Certificate

Get Course Completion and Assessment Certificate at the end of the course

On successful completion of the course you will receive a certificate which will enable you to-

  • Can add to your CV
  • You can share directly on your LinkedIn profile
  • You can share on Facebook with one click

Frequently Asked Questions

এটা তো আসলে ব্যক্তিবিশেষে আলাদা – কারো কম সময় লাগবে, কারো বেশি সময় লাগবে! তবে আশা করা যায়ঃ প্রতি সপ্তাহে গড়ে ১০-১৫ ঘণ্টা করে সময় দিলে আপনি পুরো সিলেবাস শিখে ফেলতে পারবেন।

হ্যাঁ, অবশ্যই। কোর্স শেষে সার্টিফিকেট তো থাকছেই। তবে এজন্য ৬ মাসের ভেতর কোর্স শেষ করতে হবে। কারণ প্রজেক্ট রিভিউর মতো ব্যাপারগুলো এ ৬ মাস পর থাকবে না।

আমাদের প্রতিটা কোর্সের আপকামিং সিডিউল দেওয়া আছে। আপকামিং সিডিউল দেখে আপনি ভর্তি কনফার্ম করতে পারেন অথবা আপনার ফ্লেক্সিবিলিটি অনুযায়ী কোর্স করতে পারবেন।

নির্দিষ্ট কোনো ডিগ্রি রিকোয়্যারমেন্ট নেই। তবে কমপক্ষে এইচএসসি বা সমমানের যোগ্যতা থাকা উচিত। এছাড়া, STEM (Science, Technology, Engineering, Mathematics) ব্যাকগ্রাউন্ডের শিক্ষার্থীদের জন্য এ কোর্স তুলনামূলকভাবে সহজ হবে। অবশ্য নন-টেকনিক্যাল (যেমন, কমার্স কিংবা আর্টস) ব্যাকগ্রাউন্ডের মানুষরাও এ কোর্স করতে পারবে। পাশাপাশি কয়েকটি বেসিক বিষয় জানতে হবে। যেমন, Basic Algebra সম্পর্কে ভাল ধারণা থাকা। আবার কম্পিউটার চালানো এবং ইন্টারনেট ব্রাউজার ব্যবহারে কমফোর্টেবল হতে হবে। এছাড়া, গুগলে সার্চ করে কোনো টপিক ঘেঁটে দেখার মতো অভ্যাস থাকা উচিত।

Any more query?

Call For Any Information Regarding The Course +880179-944-6655 (09 AM to 09 PM)

Beta Version