CEH Certified Ethical Hacking:PeopleNTech

CEH Certified Ethical Hacking

A Certified Ethical Hacker is a skilled & trained professional who understands and knows how to look for weaknesses and vulnerabilities in a system. Then they use their knowledge and tools to act as a malicious hacker. But all these happen in a lawful and legitimate manner to assess the security posture of a system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. PeopleNTech provides the best Ethical Hacking Training in Dhaka.

Ethical Hacking Training in Dhaka Ethical Hacking Training in Dhaka

The Purpose of the Ethical Hacking Training in Dhaka is to: 

●     Establish and govern minimum standards of a system

●     Inform the authority that credentialed individuals meet or exceed the minimum standards

.●     Establish ethical hacking as a unique and self-regulating profession.

What is an Ethical Hacker

To beat a hacker, you need to think like a hacker too!Ethical Hacking is often referred to as the process of determining if vulnerabilities exist and to undertake preventive, corrective, and protective countermeasures or notify the authority.

Certification Target Audience: 

The Certified Ethical Hacker certification from the course Ethical Hacking Training in Dhaka, will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure & system.

Course Module: 

Ethical Hacking Training in Dhaka covers all the skills needed to work as a certified professional or freelance ethical hacker. The working opportunity is immense here. Because most of the national companies are not even aware about the risk of being hacked. They often lose their website and sometimes pay ransom to recover that. After completing the course, you will be able to work as CEH certified Ethical Hacker.

●     Introduction to Cyber Security & Ethical Hacking

●     Facebook Security Techniques

●     Gmail Security Techniques

●     Social Engineering Manipulation

●     Google Hacking

●     Introduction to Kali Linux and Hacking Tools

●     Information Gathering, Footprinting and Reconnaissance

●     Data Hiding and Forensic Techniques

●     Scanning and Enumeration Techniques

●     All Kinds of Malware Threats Analysis

●     Dos & Ddos Attack

●     Web Application Hacking & Sql Injection

●     Wireless, Mobile Device Hacking and Securit

●     Introduction to Cloud Computing Cloud Security

●     Intrusion Detection & Prevention Systems, Firewall

●     Cryptography

Day 1 – Ethical Hacking Fundamentals

  •  Effects of Hacking
    • Reviewing the elements of information security
    • Security, functionality & usability triangle
  • Methods of Hacking
    • Reconnaissance
    • Scanning
    • Gaining access
    • Covering tracks
    • Identifying attack types
  • Functions of Ethical Hacker
    • Conducting vulnerability research
    • Identifying elements of information warfare

Day 2 – Applying Covert Techniques to Scan & Attack a Network

  • Footprinting & Reconnaissance
    • Objectives and methods of footprinting
    • Searching for information with Google Hacking
    • Employing footprinting countermeasures
  • Scanning Networks
    • Objectives and methods of footprinting
    • Searching for information with Google Hacking
    • Employing footprinting countermeasures
  • Examining enumeration techniques
    • Enumerating user accounts using default passwords
    • Simple Network Management Protocol (SNMP) enumeration

Day 3 – Analyzing System Risks & Weaknesses to Apply Countermeasures

  • System Hacking
    • CEH Hacking Methodology (CHM)
    • Cracking passwords and escalating privileges
    • Defending against password cracking and key loggers
    • Hiding information with steganography
  • Uncovering Trojans and backdoors
    •  Injecting a Trojan into a host
    •  Analyzing Trojan activity
  • Dissecting viruses, worms and sniffers
    • Distributing malware on the web
    • Recognizing key indicators of a virus attack
    • Analyzing worms and malware
  • Social Engineering and Denial-of-Service (DoS)
    • Targets, intrusion tactics and strategies for prevention
    • Mitigating the risks of social networking to networks
    • Recognizing symptoms and techniques of DoS attack
    • Implementing tools to defend against DoS attacks

Day 4 – Assessing & Preventing Gaps in a Network Infrastructure

  • Hacking web applications and wireless networks
    • Cross-Site Scripting (XSS) and web application DoS attacks
    • Defending against SQL Injection
    • Implementing a man-in-the-middle attack
  • Hijacking sessions and web servers
    • Spoofing a site to steal credentials
    • Preventing hijacking by implementing countermeasures
    • Leveraging Metasploit in an attack
  • Buffer overflow and cryptography
    • Exploiting input validation failures
    • Defending against memory corruption attacks

Day 5 – Performing Penetration Testing

  • Performing security and vulnerability assessments
  • Determining security and vulnerability assessments
  • Announced vs. unannounced testing
Md. Mushfiqur Rahman

Md. Mushfiqur Rahman

Sr. Faculty

Md. Al Imran

Md. Al Imran

Sr. Faculty

Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech
Clients PeopleNTech