Cyber Security & Ethical Hacking Training

"Our best in class faculties and award winning certification courses (CISEH, CPTE, CCEI, CAAD) emphasis on practical learning and collaborative sessions ensuring a holistic learning environment for our students"

Our Certification Training Courses

CISEH

Certified Information Security and Ethical Hacker

Duration: 50 Hours

35000 BDT

CPTE

Certified Penetration Testing Expert

Duration: 100 Hours

70000 BDT

CCEI

Certified Cyber Expert and Investigator

Duration:

N/A

CAAD

Certified Android Application Developer

Duration:

N/A

Course Content of CISEH

  • Introduction.
  • Computer Security Basics.
  • Most Common Attacks.
  • ASCII Code.
  • Networking Basics and Security.
  • IANA, Allotment of IP Address.
  • Ping and Ping Sweep.
  • Foot-Printing Techniques.
  • Detecting Victim's OS.
  • Detecting Firewall.
  • Domain Name and DNS.
  • ICANN.
  • Top Level Domains.
  • DNS Delegation.
  • Email Security.
  • Hacking Mailing Clients.
  • Instant Messengers Hacking (gtalk, yahoo, etc).
  • Port Scanning.
  • Detecting Open Ports.
  • Intellectual Property Theft.
  • Trojan attack and countermeasure.
  • Hacking by Key loggers.
  • Steganography and Steganalysis.
  • Identity Attacks.
  • Proxy Server Attacks.
  • Password Cracking.
  • Sniffer and Wireless Hacking.
  • Call Spoofing.
  • Google Hacking.
  • Buffer Overflow.
  • DOS and DDOS Attacks.
  • HoneyPots.
  • 0-day Attacks.
  • XSS Attacks.
  • Windows and System Hacking.
  • SQL Injection.
  • Social Engineering Attacks.
  • Defacing Website and Security Standards.
  • Web Jacking.
  • Finding Loopholes.
  • Phishing Techniques.
  • Cyber Law and Consulting.
  • Cyber Forensics and Investigations.
  • IT Act, 2000.
  • CERT-IND and AO.
  • Case Studies.
  • Earning Money Online.
  • Adsense and Adwords.

Course Content of CPTE

  • IP and Malware.
  • IP Analysis.
  • Types of Malwares.
  • Foot-Printing Techniques.
  • Information Gathering.
  • ICANN Guidelines.
  • Hosting Servers.
  • Registrant and Hosting Panels.
  • Static and Dynamic Websites.
  • Pre-Penetration Steps.
  • Information Scanning.
  • Hacking using Google.
  • Finding Control Panel of Websites.
  • Breaking Cpanels.
  • Attacking Systems.
  • Windows Hacking.
  • Phishing.
  • Session Hijacking.
  • Password Cracking Penetration Testing.
  • Web Foot-Printing.
  • DNS Hijacking.
  • Sub-Domains Scanner.
  • Information about target on Web App.
  • Webserver Hacking.
  • Metasploit.
  • Privilege Escalation Attack.
  • Rooting.
  • Shellcoding.
  • Encryption / Decryption.
  • Web Application Penetration Testing.
  • Social Engineering Penetration Testing.
  • XSS Attacks.
  • Persistent and Non-Persistent Attacks.
  • CSRF.
  • Securing XSS Attacks.
  • SQL Penetration Testing.
  • Blind SQLi.
  • Attacks on SQL Server.
  • Securing SQLi.
  • Database Penetration Testing.
  • Different types of CMS identifications.
  • Attacks on CMS.
  • Joomla Exploits.
  • Wordpress Exploits.
  • Vbulletin Exploits.
  • Wireless Penetration Testing.
  • WEP and WPA Attacks.
  • Security Measures.
  • LAN Penetration Testing.
  • Client Side Exploits.
  • MITM Attacks.
  • Sniffing Attacks (http, https).
  • Trojans, Virus and Backdoors Detection.
  • Vulnerability Assessments.
  • Assessment tools (acunetix, dvwa).
  • Testing Reports and Post Testing Actions.
  • Standards and Compliance.
  • Cyber Law and Acts.
  • CERT-IND and AO.
  • Cyber Forensics and Investigations.

* Note: The price is inclusive with the vendor examination fee for 1st siting, certificate will be provided by our partner Pristine Info Solutions.

For more informations please visit our partner website Pristine Info Solutions