European IT inst

Cyber Security

 

Overview:

Cyber Security – Computer security, cybersecurity, or information technology security is the protection of computer systems and networks from information disclosure, theft of, or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

Modules

Cybersecurity Fundamentals:

  • What is Cyberspace?
  • What is Cybersecurity?
  • Why is Cybersecurity Important?
  • What is a Hacker?
  • What is Malware?

Software Applications:

  • Desktop Applications
  • Web Applications

System Hacking & Security:

  • Introduction To Hacking
  • Hacking vs. Ethical hacking
  • Skill Profile of a Hacker
  • Types of Hackers
  • Some Famous Hackers and Groups
  • Introduction to Operating Systems
  • Windows & Linux Operating Systems
  • Windows Security Issues
  • Hacking Windows 10
  • System Hacking – Counter Measures, Services, Ports, Protocols
  • Firewall Configuration Monitoring System

Malware Analysis:

  • Introduction To Malware Analysis Types Of Malware
  • Virus, Worms, Backdoors, Spyware, Adware Introduction to Trojans
  • Trojans Attack Famous Cases
  • Ways a Trojan Can Get Into A System
  • Analysis Of Trojans/Virus
  • How we remove Trojans Manually
  • Security Against Malware
  • Immediate response against malware

Types of Cyber Attacks and Prevention Tips:

  • Password Attacks
  • Craft a Strong Password
  • Denial of Service Attacks
  • Two‐Step Verification
  • Passive Attack
  • Download Attachments with Care
  • Penetration Testing

Network Security & Hacking:

  • Introduction To Networks ( LAN /WAN )
  • Understanding Communication Protocols
  • Sniffing Attacks
  • DOS & DDOS Attack
  • Mis-configuration
  • Man – In – Middle – Attacks
  • RIP attacks, IP spoofing, Mac Spoofing
  • Firewall Configuration & Maintenance
  • Network Monitoring & Analysis
  • ISP Attacks
  • Logs Maintenance

Data Security and Recovery:

  • What Is Steganography
  • Alternate data stream in NTFS
  • How Attacker Hides His Data in Images and Other Formats
  • How to Find Data Which Are Hidden
  • What Is Cryptography
  • Securing Data by Using EFS and BitLocker
  • Advanced Cryptography Tools
  • Vera crypt and Trucrypt

Web Application Penetration Testing:

  • Types of Penetration Testing
  • White Box Penetration Testing
  • Black Box Penetration Testing
  • Grey Box Penetration Testing
  • Setting up Browser Proxies
  • Introduction To Burpsuite
  • Introduction To OWASP
  • Introduction of Websites & Database
  • Authentication Process Of Web Application
  • Attack on Website & Web Application
  • Get and Post Parameters
  • SQL Injection Attacks
  • Cross-site scripting
  • Session hijacking

৳ 23,000.00৳ 25,000.00

Offline Course Fee

Regular Fee : BDT 40,000

Discount Fee : BDT 25,000

Online Course Fee

Regular Fee : BDT 38,000

Discount Fee : BDT 23,000

Working Hours

Monday 10:00 am – 9.00 pm
Tuesday 10:00 am – 9.00 pm
Wednesday 10:00 am – 9.00 pm
Thursday 10:00 am – 9.00 pm
Friday 10:00 am – 9.00pm
Saturday 10:00 am – 9.00 pm
Sunday 10:00 am – 9.00 pm