+880961-333-7448 / 01799-446655, 01762-002444 [email protected]
Graphic Design

IT Security & Ethical Hacking

Do you want to grow your career as a certified ethical Hacker? Then PeopleNTech can be the best choice for you. Our professional ethical hacking training course will provide you with all the essential skills that will help you become a certified ethical hacker. Ethical Hacking is a worldwide growing sector. The cybersecurity job market in Bangladesh is projected to grow by 30% in 2024, driven by sectors like banking, finance, and government. Many national companies in Bangladesh are still unaware of the risks of being hacked. After completing this professional training on cyber security, you can get a job in both local and international companies. Our experienced mentors & job placement department will prepare you to begin your as a certified ethical hacker.

Course Features

icons

Total 40 Hours

icons

Tools, templates and book suggestions

icons

Online and Offline Support

icons

Recorded video

icons

Assessment and Certificate

icons

Job Placement Support

icons

Course duration is 3 months

icons

24+ Live Classes

৳ 7500 ৳ 15000

For details about the course

Call Now (0179-944-6655)

Course Features

IT Security & Ethical Hacking course is professionally designed with detailed discussions on web design and development, on-hand practice and income guidelines.

icons

Total 40 Hours

icons

Tools, templates and book suggestions

icons

Online and Offline Support

icons

Recorded video

icons

Assessment and Certificate

icons

Job Placement Support

icons

Course duration is 3 months

icons

24+ Live Classes

Course Modules

Information security basics

  • Understanding ethical hacking concepts
  • Concept of policy, procedure and awareness

Lab preparation

Installing Kali linux as attacker machine

Installing metasploitable as victim machine

Footprinting & Reconnaissance

  • Understanding footprinting concept
  • Footprint using advance google hacking techniques
  • Footprinting uisng recon-ng

Scanning & Enumeration

  • Scanning techniques using nmap
  • Enumeration using Nmap Scripting Engine (NSE)

Vulnerability Assessment

  • Vulnerability Assessment using ZAP
  • Analyzing ZAP Result
  • Vulnerability Assessment using Nikto
  • Analyzing Nikto Result


Gaining Access – Server-Side Attack

  • Basic enumeration and exploitation
  • Hacking remote server using basic Metasploit Exploit
  • Hacking remote server using code execution vulnerabilities
  • VNC/IRCd exploitation to hack into remote server
  • Exploiting Samba Vulenrability to hack remote server

Gaining Access – Client-Side Attack

  • Generating undetectable backdoor using VEIL framework
  • Listening for incoming connections
  • Basic delivery method to test and hack windows

Gaining Access – client-side attack – Social Engineering

  •  Backdooring any file types (images/pdfs etc)
  • Compiling and changing trojan’s icon
  • Spoofing .exe extension to any extension (pdf/jpg etc)

Post exploitation

  • Maintaining access – basic method
  • Maintaining access – using reliable and undetectable method

Exam - 1

  • Putting knowledge all together to Hack a real life like Machine

Website hacking – Reconnaissance

  • Shodan for recon
  • DNS Enumeration
  • CMS Identification
  • Fuzzing – Introduction/Importance
  • Fuzzing – process, for sensitive files
  • Fuzzing – use of Wfuzz, FFUF
  • Github Recon – Manual & Automated way
  • Advance Subdomain Recon (https://www.youtube.com/watch?v=9mSLSC7aUcY)

Website hacking – SQL Injection

  • What is SQL injection
  • UNION based attack
  • Reading database information, login bypass
  • Blind SQL injection attack

Website hacking – XSS

  • Introduction to Burpsuite – configuring with firefox
  • Introduction to Burpsuite – Reaper, Intruder
  • Background concept of XSS
  • Manual building XSS vector
  • Basic XSS on Lab
  • Hunting XSS using Burpsuite
  • Advance method for hunting XSS-1
  • Advance method for hunting XSS-2

Website hacking – Authentication

  • Username enumeration using different responses/processes
  • 2FA simple bypass
  • 2FA brute forcing
  • 2 FA broken logic
  • Password reset poisoning/broken logic
  • Password brute forcing via password change

Website hacking – Server-Side Request Forgery (SSRF)

  • Basic SSRF
  • SSRF with blacklisted/whitelisted input filter
  • SSRF filter bypass

Website hacking - Directory Traversal

  • File path traversal/absolute path bypass/URL encode/null byte bypass

Website hacking - Information Disclosure

  • Information disclosure in error message/debug page/backup files

Website hacking – Cross Site Request Forgery (CSRF)
Website hacking - Cross Origin Resource Sharing (CORS)
Website hacking – HTTP Host Header Attack
Website hacking – Server-Side template Injection

Network hacking – Pre-connection attack - WPA/WPA2 cracking

  • Hacking WPA/WPA2 without wordlist
  • Cracking WPA/WPA2 using wordlist attack

Network hacking – Post connection attack – MITM attack

  • ARP poisoning using Kali
  • Bettercap basics and sniffing
  • Bypassing HTTPS
  • Bypassing HSTS
  • Wireshark basics
  • Stealing password using Wireshark

Exam – 2

  • Hack a real life like machine

What you will learn

icons

Network Hacking

icons

Website Hacking

icons

Cybersecurity and Ethical Hacking

icons

System Hacking

icons

Malware Threats and Analysis

icons

Ethical Hacking Methodology

Details about the course

Cyber Security is essential for the IT Industry & IT sectors. PeopleNTech is offers the best ethical hacking training course in Bangladesh. After completing the course, you can start your career as a certified cyber security & ethical hacker.

In this certified training in ethical hacking, we will cover

  • Fundamentals of Cyber Security
  • Fundamentals of Ethical Hacking
  • All Tools & Software Used for Ethical Hacking
  • Essential Programming Languages for Ethical Hacking

What is Ethical Hacking?

Ethical hacking is the practice of legally and ethically testing computer systems, networks, and applications to identify vulnerabilities that malicious hackers could exploit. Totally web security is dependent on doing Cyber Security activities.

Job Market Demand: Ethical Hacker

After doing this ethical hacking training, you can start your career as a Cyber Security Specialist in various companies of the IT Sector, the Banking Sector, and government and non-government companies. The demand for cyber security specialists is increasing by about 5% every year.

Also, you can be a freelancer as an ethical hacking specialist from reputed freelance marketplaces

Course Certificate

Get Course Completion and Assessment Certificate at the end of the course

On successful completion of the course you will receive a certificate which will enable you to-

  • Can add to your CV
  • You can share directly on your LinkedIn profile
  • You can share on Facebook with one click

Frequently Asked Questions

এটা তো আসলে ব্যক্তিবিশেষে আলাদা – কারো কম সময় লাগবে, কারো বেশি সময় লাগবে! তবে আশা করা যায়ঃ প্রতি সপ্তাহে গড়ে ১০-১৫ ঘণ্টা করে সময় দিলে আপনি পুরো সিলেবাস শিখে ফেলতে পারবেন।

হ্যাঁ, অবশ্যই। কোর্স শেষে সার্টিফিকেট তো থাকছেই। তবে এজন্য ৬ মাসের ভেতর কোর্স শেষ করতে হবে। কারণ প্রজেক্ট রিভিউর মতো ব্যাপারগুলো এ ৬ মাস পর থাকবে না।

আমাদের প্রতিটা কোর্সের আপকামিং সিডিউল দেওয়া আছে। আপকামিং সিডিউল দেখে আপনি ভর্তি কনফার্ম করতে পারেন অথবা আপনার ফ্লেক্সিবিলিটি অনুযায়ী কোর্স করতে পারবেন।

নির্দিষ্ট কোনো ডিগ্রি রিকোয়্যারমেন্ট নেই। তবে কমপক্ষে এইচএসসি বা সমমানের যোগ্যতা থাকা উচিত। এছাড়া, STEM (Science, Technology, Engineering, Mathematics) ব্যাকগ্রাউন্ডের শিক্ষার্থীদের জন্য এ কোর্স তুলনামূলকভাবে সহজ হবে। অবশ্য নন-টেকনিক্যাল (যেমন, কমার্স কিংবা আর্টস) ব্যাকগ্রাউন্ডের মানুষরাও এ কোর্স করতে পারবে। পাশাপাশি কয়েকটি বেসিক বিষয় জানতে হবে। যেমন, Basic Algebra সম্পর্কে ভাল ধারণা থাকা। আবার কম্পিউটার চালানো এবং ইন্টারনেট ব্রাউজার ব্যবহারে কমফোর্টেবল হতে হবে। এছাড়া, গুগলে সার্চ করে কোনো টপিক ঘেঁটে দেখার মতো অভ্যাস থাকা উচিত।

Any more query?

Call For Any Information Regarding The Course +880179-944-6655 (09 AM to 09 PM)

Beta Version