Cyber Security
Overview:
Cyber Security – Computer security, cybersecurity, or information technology security is the protection of computer systems and networks from information disclosure, theft of, or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
Modules
Cybersecurity Fundamentals:
- What is Cyberspace?
- What is Cybersecurity?
- Why is Cybersecurity Important?
- What is a Hacker?
- What is Malware?
Software Applications:
- Desktop Applications
- Web Applications
System Hacking & Security:
- Introduction To Hacking
- Hacking vs. Ethical hacking
- Skill Profile of a Hacker
- Types of Hackers
- Some Famous Hackers and Groups
- Introduction to Operating Systems
- Windows & Linux Operating Systems
- Windows Security Issues
- Hacking Windows 10
- System Hacking – Counter Measures, Services, Ports, Protocols
- Firewall Configuration Monitoring System
Malware Analysis:
- Introduction To Malware Analysis Types Of Malware
- Virus, Worms, Backdoors, Spyware, Adware Introduction to Trojans
- Trojans Attack Famous Cases
- Ways a Trojan Can Get Into A System
- Analysis Of Trojans/Virus
- How we remove Trojans Manually
- Security Against Malware
- Immediate response against malware
Types of Cyber Attacks and Prevention Tips:
- Password Attacks
- Craft a Strong Password
- Denial of Service Attacks
- Two‐Step Verification
- Passive Attack
- Download Attachments with Care
- Penetration Testing
Network Security & Hacking:
- Introduction To Networks ( LAN /WAN )
- Understanding Communication Protocols
- Sniffing Attacks
- DOS & DDOS Attack
- Mis-configuration
- Man – In – Middle – Attacks
- RIP attacks, IP spoofing, Mac Spoofing
- Firewall Configuration & Maintenance
- Network Monitoring & Analysis
- ISP Attacks
- Logs Maintenance
Data Security and Recovery:
- What Is Steganography
- Alternate data stream in NTFS
- How Attacker Hides His Data in Images and Other Formats
- How to Find Data Which Are Hidden
- What Is Cryptography
- Securing Data by Using EFS and BitLocker
- Advanced Cryptography Tools
- Vera crypt and Trucrypt
Web Application Penetration Testing:
- Types of Penetration Testing
- White Box Penetration Testing
- Black Box Penetration Testing
- Grey Box Penetration Testing
- Setting up Browser Proxies
- Introduction To Burpsuite
- Introduction To OWASP
- Introduction of Websites & Database
- Authentication Process Of Web Application
- Attack on Website & Web Application
- Get and Post Parameters
- SQL Injection Attacks
- Cross-site scripting
- Session hijacking
৳ 23,000.00 – ৳ 25,000.00
Offline Course Fee
Regular Fee : BDT 40,000
Discount Fee : BDT 25,000
Online Course Fee
Regular Fee : BDT 38,000
Discount Fee : BDT 23,000
- Skill Level: Beginners
- Duration: 2 Hours
- Class Per Week: 2 Days
- Total: 24 Classes
- Language: Bangla & English
- Certificate: Yes
- Provide Class Video
Working Hours
Monday | 10:00 am – 9.00 pm |
Tuesday | 10:00 am – 9.00 pm |
Wednesday | 10:00 am – 9.00 pm |
Thursday | 10:00 am – 9.00 pm |
Friday | 10:00 am – 9.00pm |
Saturday | 10:00 am – 9.00 pm |
Sunday | 10:00 am – 9.00 pm |