Certified Ethical Hacking

Bangladesh is reaching towards the highest peak of digitalization and issues like server and network security are getting more and more importance. To secure our network systems from any kind of trouble or hacking, people are depending on Certified Ethical Hackers. At present, certified ethical hacking program has gained the most importance among the desired information security training program and it has achieved its captivating status among security professionals.

Batch Duration

Starting Date : 23rd September, 2019

Last Date of Registration :22nd September, 2019

Class Schedule : 2 Months (40 Hours) Monday & Wednesday: Time: 7:00 PM - 9:00 PM

Total Hours : 40

Course Curriculum

Day 1 – Ethical Hacking Fundamentals

  •  Effects of Hacking
    • Reviewing the elements of information security
    • Security, functionality & usability triangle
  • Methods of Hacking
    • Reconnaissance
    • Scanning
    • Gaining access
    • Covering tracks
    • Identifying attack types
  • Functions of Ethical Hacker
    • Conducting vulnerability research
    • Identifying elements of information warfare

Day 2 – Applying Covert Techniques to Scan & Attack a Network

  • Footprinting & Reconnaissance
    • Objectives and methods of footprinting
    • Searching for information with Google Hacking
    • Employing footprinting countermeasures
  • Scanning Networks
    • Objectives and methods of footprinting
    • Searching for information with Google Hacking
    • Employing footprinting countermeasures
  • Examining enumeration techniques
    • Enumerating user accounts using default passwords
    • Simple Network Management Protocol (SNMP) enumeration

Day 3 – Analyzing System Risks & Weaknesses to Apply Countermeasures

  • System Hacking
    • CEH Hacking Methodology (CHM)
    • Cracking passwords and escalating privileges
    • Defending against password cracking and key loggers
    • Hiding information with steganography
  • Uncovering Trojans and backdoors
    •  Injecting a Trojan into a host
    •  Analyzing Trojan activity
  • Dissecting viruses, worms and sniffers
    • Distributing malware on the web
    • Recognizing key indicators of a virus attack
    • Analyzing worms and malware
  • Social Engineering and Denial-of-Service (DoS)
    • Targets, intrusion tactics and strategies for prevention
    • Mitigating the risks of social networking to networks
    • Recognizing symptoms and techniques of DoS attack
    • Implementing tools to defend against DoS attacks

Day 4 – Assessing & Preventing Gaps in a Network Infrastructure

  • Hacking web applications and wireless networks
    • Cross-Site Scripting (XSS) and web application DoS attacks
    • Defending against SQL Injection
    • Implementing a man-in-the-middle attack
  • Hijacking sessions and web servers
    • Spoofing a site to steal credentials
    • Preventing hijacking by implementing countermeasures
    • Leveraging Metasploit in an attack
  • Buffer overflow and cryptography
    • Exploiting input validation failures
    • Defending against memory corruption attacks

Day 5 – Performing Penetration Testing

  • Performing security and vulnerability assessments
  • Determining security and vulnerability assessments
  • Announced vs. unannounced testing
Md. Al Imran

Course Instructor

Md. Al Imran

Sr. Faculty

Admission Open

70% OFF

Course Fee : ৳ 15000
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech