SlideShare a Scribd company logo
PARADISE COMPUTER ACADEMY
(Under Logik Eye Forensics, Logik Tech Service and Paradise Computer
Academy, of Bangladesh)
īƒ˜
Cyber Security and Ethical Hacking
Objective
This course introduces the concepts of Cyber security and Ethical Hacking,
providing learners with the
techniques in Ethical Hacking and Security. It enables them to identify and
analyze the stages necessary for an ethical hacker to compromise a target
system, while also instructing them on the application of prevent
corrective, and protective measures to safeguard the system. Upon
completion of this course, candidates will be proficient in identifying tools
and techniques for conducting penetration testing, critically evaluating
security methods for protecting sy
systematic understanding of security concepts at the policy and strategy
levels within a computer system
B.E*/B.Tech.* / B.Sc. - M.Sc. / Graduate / Diploma in any
Basic Knowledge of Programming or B.C.A*.
or NIELIT O-Level / NIELIT A-Level Qualified or 10+2 qualifie
Prerequisites
īƒŧ Candidate
preferably 8
īƒŧ Internet
(preferably
Rs. 3500
Certificate
Hard Copy of Certificate will be provided to the participants, based on
minimum 75% attendance and on performance (minimum 50%
marks) in the online test, conducted at the end of the course.
īƒŧ Instructor-led live classes.
īƒŧ Instructor-led hands
Lab.
īƒŧ Tools will be shared through the portal for practice.
īƒŧ Assessment and Certification
How to Apply
Step-1: Read
Step-2: Collect a
Step-4: Use a
submit your
Credit Card / Internet Banking / Mobile bangking / Cash
Cyber Security and Ethical Hacking
PARADISE COMPUTER ACADEMY
Logik Eye Forensics, Logik Tech Service and Paradise Computer
Bangladesh) Karamtola Bazar, Tong-Kaligonj highwar,
Gazipur https://logikeyeforensics.com
Cyber Security and Ethical Hacking 15 Weeks.
Medium of Instruction: Bilingual
This course introduces the concepts of Cyber security and Ethical Hacking,
providing learners with the opportunity to explore various tools and
techniques in Ethical Hacking and Security. It enables them to identify and
analyze the stages necessary for an ethical hacker to compromise a target
system, while also instructing them on the application of prevent
corrective, and protective measures to safeguard the system. Upon
completion of this course, candidates will be proficient in identifying tools
and techniques for conducting penetration testing, critically evaluating
security methods for protecting system and user data, and demonstrating a
systematic understanding of security concepts at the policy and strategy
levels within a computer system.
M.Sc. / Graduate / Diploma in any stream with
B.C.A*. / M.C.A. pursuing or qualified
Level Qualified or 10+2 qualifie
Candidate must have latest computer/laptop with
preferably 8 GB RAM or higher
Internet connection with good speed
(preferably 2 Mbps or higher).
000/- incl. all other charges.
Hard Copy of Certificate will be provided to the participants, based on
minimum 75% attendance and on performance (minimum 50%
marks) in the online test, conducted at the end of the course.
classes.
hands-on lab sessions using Virtual
Tools will be shared through the portal for practice..
Certification
Read the course structure & course requirements
Collect a registration form and submit after filling up
Use a mobile number for verification or email
submit your documents, and Pay the Fees using ATM
rd / Internet Banking / Mobile bangking / Cash
Cyber Security and Ethical Hacking
PARADISE COMPUTER ACADEMY
Weeks. (4 Hrs. per day)
Bilingual (English& Bangla)
This course introduces the concepts of Cyber security and Ethical Hacking,
opportunity to explore various tools and
techniques in Ethical Hacking and Security. It enables them to identify and
analyze the stages necessary for an ethical hacker to compromise a target
system, while also instructing them on the application of preventive,
corrective, and protective measures to safeguard the system. Upon
completion of this course, candidates will be proficient in identifying tools
and techniques for conducting penetration testing, critically evaluating
stem and user data, and demonstrating a
systematic understanding of security concepts at the policy and strategy
Eligibility
Course Fees
Hard Copy of Certificate will be provided to the participants, based on
minimum 75% attendance and on performance (minimum 50%
marks) in the online test, conducted at the end of the course.
Methodology
requirements carefully.
submit after filling up.
email ID and then
using ATM-Debit Card /
rd / Internet Banking / Mobile bangking / Cash etc.
Cyber Security and Ethical Hacking
PARADISE COMPUTER ACADEMY
(Under Logik Eye Forensics, Logik Tech Service and Paradise Computer
Academy, of Bangladesh)
Day Topic Day
Day
#01
Introduction to Hacking
and security
Day
#02
Day
#04
Digital Systems
hacking
Day
#05
Day
#07
Smartphone
hacking
Day
#08
Day
#10
WiFi network hacking
Day
#11
Day
#13
Aircraft System
hacking
Day
#14
Day
#16
Setup Lab and
introduction with Linux
Day
#17
Day
#19
Malware attacks
analysis
Day
#20
Day
#22
Man-in-the middle
attack
Day
#23
Day
#25
Cyber Crime & Law
Day
#26
Course
Mehedi Hasan
Founder Owner
LOGIK EYE FORENSICS,
PARADISE COMPUTER
ACADEMY,
LOGIK TECH SERVICE
Email: mehedi0001@yahoo.com
Mobile Number:
+8801766442199
CLICK
PARADISE COMPUTER ACADEMY
Logik Eye Forensics, Logik Tech Service and Paradise Computer
Bangladesh) Karamtola Bazar, Tong-Kaligonj highwar,
Gazipur https://logikeyeforensics.com
Course Content
Topic Day
Information & Network
Reconnaissance
Day
#03
IP and Network Scanning
Web Applications hacking
Day
#06
Social Engineering
Satellite data signal hacking Day
#09
Deep-Fake technology
Radio frequency hacking Day
#12
GSM Network hacking
Signal jamming Day
#15
Cloud system hacking
Crypto-currency and
Cryptography
Day
#18
Vulnerability assessment
and Analysis
Phishing attack
Day
#21
Smart Card Hacking
Concepts of Digital Forensics
Day
#24
Hacking Exploit
development with python
Project and Paper writing
Course Coordinator
Founder Owner,
LOGIK EYE FORENSICS,
PARADISE COMPUTER
LOGIK TECH SERVICE
mehedi0001@yahoo.com
Number: +8801601019511,
+8801766442199
CLICK HERE TO
REGISTER
PARADISE COMPUTER ACADEMY
Topic
IP and Network Scanning
Social Engineering
Fake technology
GSM Network hacking
Cloud system hacking
Vulnerability assessment
and Analysis
Smart Card Hacking
Hacking Exploit
development with python
PARADISE COMPUTER ACADEMY
(Under Logik Eye Forensics, Logik Tech Service and Paradise Computer
Academy, of Bangladesh) Karamtola Bazar, Tong-Kaligonj highwar,
Gazipur https://logikeyeforensics.com
Course Syllabus
Day Detailed Conceptual Topic Hands On lab
Day1
Introduction to Hacking and security
ī‚ˇ Understanding Ethical Hacking
ī‚ˇ Hacking vs. Ethical Hacking
ī‚ˇ VPN and IP changer
ī‚ˇ Location changer
ī‚ˇ MAC/IMEI Changer
ī‚ˇ Virtual Machine setup
ī‚ˇ OS Setup on VMware Machine
ī‚ˇ Dark Web with Tor browser
ī‚ˇ Ensure security and be confirm you are an anonymous user
ī‚ˇ IP Address Scanning
ī‚ˇ Find real IP
Study of ethical hacking,
Information security, IP
Address, virtual machine,
MAC/IMEI.
Practice on VPN
installation, IP address
changing, MAC changer,
virtual machine setup,
Install tor browser, access
in dark wave.
Day2
Information & Network Reconnaissance
ī‚ˇ Introduction to Information Gathering, Phases of I.G
ī‚ˇ Information Gathering Techniques
ī‚ˇ Foot printing
ī‚ˇ Steps of hacking
ī‚ˇ Popular hacking tools
ī‚ˇ IP hacking with link
ī‚ˇ IP hacking with Email
Practice on information
gathering; install hacking
tools, creating a https link
to capture remote
locations IP address.
Creating an account to
get someone’s IP
address by email
sending.
Day3
IP and Network Scanning
ī‚ˇ Scanning Tools and Techniques
ī‚ˇ Concept of Email Spoofing,
ī‚ˇ E-mail Security
ī‚ˇ Port Scanning and Service Enumeration
ī‚ˇ IP Tracking System
ī‚ˇ Remote IP hacking technique
ī‚ˇ IP Address Analysis
Hands-on lab on
Information Gathering
and its
countermeasures.
Day4
Digital Systems hacking
ī‚ˇ Exploiting System Vulnerabilities
ī‚ˇ Introduction to Virus/Trojan/Spyware/Keylogger
ī‚ˇ Windows OS hacking
ī‚ˇ Password Cracking types
ī‚ˇ Brute Force Attacks
ī‚ˇ IoT Hacking tools ( With Raspberry pi )
ī‚ˇ IoT system hacking
Hands-on lab on
vulnerability
assessment with kali
linux, windows system
hacking with
keylogger.
PARADISE COMPUTER ACADEMY
(Under Logik Eye Forensics, Logik Tech Service and Paradise Computer
Academy, of Bangladesh) Karamtola Bazar, Tong-Kaligonj highwar,
Gazipur https://logikeyeforensics.com
Day5
Web Applications hacking
ī‚ˇ Common Web Application Vulnerabilities,
ī‚ˇ Denial of Service (DoS),
ī‚ˇ SQL Injection, XSS, CSRF, and more
ī‚ˇ Web Application Scanners
ī‚ˇ Email Hacking
ī‚ˇ Email Header collection, Email header analysis
ī‚ˇ Password Cracking
ī‚ˇ Brute Force Attack in Web Application
Hands on Lab on Trojan
Virus & its
Countermeasures, email
hacking, email header
collection, header
analysis,
Day6
Social Engineering
ī‚ˇ Psychology of Social Engineering
ī‚ˇ Phishing with java script, SET and Web
ī‚ˇ Stereography
ī‚ˇ Information Hiding
ī‚ˇ Stego Analysis
ī‚ˇ SMS and Call spoofing
ī‚ˇ Social Engineering Countermeasures
Hands on lab on
Steganography, SMSspoofing,
Callspoofing,
Day7
Smartphone hacking
ī‚ˇ Mobile Device Security
ī‚ˇ Android and iOS Exploits
ī‚ˇ APK exploit
ī‚ˇ Termux and basic application
ī‚ˇ Android Device hacking
ī‚ˇ Android Spy
ī‚ˇ Android Exploit
Hands on lab on Android
spy, Operation ou Termux,
android device hacking and
countermeasures
Day8
Satellite data signal hacking
ī‚ˇ Satellite Communication Overview
ī‚ˇ Introduction with NOAA, ROSMOSCOS and others satellite
ī‚ˇ Intercepting and Decoding Weather Satellite Signals
ī‚ˇ Introducing with GNU Radio
ī‚ˇ Capturing and decoding satellite signals
ī‚ˇ Security Implications
Hands on lab on satellite
data receiving and
decoding, GNU Radio
setup, find a target
satellite and capture
signal.
Day9
Deep-Fake technology
ī‚ˇ Understanding Deep-Fakes Technology
ī‚ˇ Making Deep-Fakes video or image
ī‚ˇ Creating Deep-fake movie with python script
ī‚ˇ Deep-face detection and Action
Hands on lab on Deep-
fake, Creating Deep-
fake video and image.
PARADISE COMPUTER ACADEMY
(Under Logik Eye Forensics, Logik Tech Service and Paradise Computer
Academy, of Bangladesh) Karamtola Bazar, Tong-Kaligonj highwar,
Gazipur https://logikeyeforensics.com
Day10
WiFi network hacking
ī‚ˇ Wireless Network Security
ī‚ˇ WEP, WPA, and WPA2 Cracking
ī‚ˇ WiFi hacking with Kali Linux
Hands on lab wifi
hacking
Day11
Radio frequency hacking
ī‚ˇ Basic Concept RF Communication
ī‚ˇ Intercepting RF Signals
ī‚ˇ Software define radio setup
ī‚ˇ Receive and Decrypt different types of RF signals.
ī‚ˇ RF Security Measures
ī‚ˇ Basic operation of Antenna
ī‚ˇ Basic concept of Wireshartk
Hands on lab on radio
signal receiving tools
install, recording and
decoding,
Day12
GSM Network hacking
ī‚ˇ GSM Architecture and Vulnerabilities
ī‚ˇ Intercepting BTS Traffic
ī‚ˇ Mobile Network Security
ī‚ˇ Detect Fake BTS open BTS etc.
ī‚ˇ Basic concept of 2G Interceptor
ī‚ˇ Capturing SMS and 1G GSM Data with Wireshark
Hands on lab on
sniffing bts, base
station, collect IMSI
number, LAC, CELL
ID, Find fake BTS,
SMS capturing system
with wireshark and its
Countermeasures.
Day13
Aircraft LD System hacking
ī‚ˇ Introduction with Aircraft Landing System
ī‚ˇ ADS-B signal decoding
ī‚ˇ ADS-B Airplane Tracking
ī‚ˇ Basic concept of Global Civil Aviation System
ī‚ˇ Case Studies and Mitigation
Hands on lab on ADS-
B setup, Civil aviation
tracking, Source and
target Location
tracking,
Day14
Signal jamming
ī‚ˇ Jamming Techniques and Equipment
ī‚ˇ FM signal jamming (short range)
ī‚ˇ WiFi Jamming (short range)
ī‚ˇ MW signal jamming (short range)
ī‚ˇ GSM signal jamming (short range)
ī‚ˇ Jamming Detection and Prevention
Hands on lab on FM,
WiFi, MW, GSM
jamming and its
Countermeasures.
Day15
Cloud system hacking
ī‚ˇ Cloud Security Models
ī‚ˇ Google Drive
Hands-on lab on cloud
based systems
information capturing.
Day16
Setup Lab and introduction with Linux
ī‚ˇ Lab Environment Setup
ī‚ˇ Introduction to Kali Linux, Arch Linux, Ubuntu etc.
Hands-on lab on
Installing and
configuring
PARADISE COMPUTER ACADEMY
(Under Logik Eye Forensics, Logik Tech Service and Paradise Computer
Academy, of Bangladesh) Karamtola Bazar, Tong-Kaligonj highwar,
Gazipur https://logikeyeforensics.com
Day17
Crypto-currency and Cryptography
ī‚ˇ Crypto currency Fundamentals
ī‚ˇ Cryptographic Techniques
Hands-on lab on crypt
currency account
opening.
Day18
Vulnerability assessment and Analysis
ī‚ˇ Introduction with Assessment
ī‚ˇ Web based Vulnerability Assessment
ī‚ˇ System based Vulnerability Assessment
ī‚ˇ Metasploit framework
ī‚ˇ Nessus Professional
ī‚ˇ Nicto, OpenVAS
ī‚ˇ Introducing with Acunetix web vulnerability scanner
Hands-on lab on
Penetration Testing
using Metasploit
Day19 Malware attacks analysis
ī‚ˇ Malware Types and Analysis
ī‚ˇ Basic of Static and Dynamic Analysis
ī‚ˇ Malware Defense Strategies
Hands-on lab malware
analysis
Day20
Phishing attack
ī‚ˇ Phishing Techniques
ī‚ˇ Phishing with Metasploit and SET
ī‚ˇ Phishing and Vesting
ī‚ˇ Email and Website Spoofing
ī‚ˇ Anti-Phishing Measures
Hands-on lab on SET,
Gmail phishing,
facebook fishing,
phishing with java script.
Day21
Smart Card Hacking
ī‚ˇ RFID Hacking
ī‚ˇ Basic concept of microchip
ī‚ˇ Credit card cloning
ī‚ˇ NID cloning
Hands-on lab microcio
hex file extraction,
Credit card number
generating, NID and
RFID cloning technique.
Day22 Man-in-the middle attack
ī‚ˇ MITM Concepts and Techniques
ī‚ˇ ARP Poisoning and SSL Stripping
ī‚ˇ MITM Detection and Prevention
ī‚ˇ GSM Sniffing
ī‚ˇ RF Poisoning
ī‚ˇ IMSI Catcher
ī‚ˇ LTE Interceptor
Hands-on lab on GSM
sniffing
Day23 Concepts of Digital Forensics
ī‚ˇ Digital Forensics Fundamentals
ī‚ˇ Evidence Handling and Preservation
ī‚ˇ USB Forensics
ī‚ˇ Windows Forensics
ī‚ˇ Gmail Forensics
Hands-on lab on
windows forensics, USB
forensics, imaging, etc.
PARADISE COMPUTER ACADEMY
(Under Logik Eye Forensics, Logik Tech Service and Paradise Computer
Academy, of Bangladesh) Karamtola Bazar, Tong-Kaligonj highwar,
Gazipur https://logikeyeforensics.com
ī‚ˇ Digital Forensic Tools
ī‚ˇ Digital Forensics Report
ī‚ˇ Lost Data Recovery
ī‚ˇ Partition Recovery
Day24 Hacking Exploit development with python
ī‚ˇ Python for Hacking
ī‚ˇ Exploit Development Basics
ī‚ˇ Modifying Custom Exploits
Hands-on lab on exploit
development
Day25 Cyber Crime & Law
ī‚ˇ Cybercrime Laws and Regulations
ī‚ˇ Legal and Ethical Aspects of Hacking
ī‚ˇ Ethical Hacking Codes of Conduct
Open discussion
Day26
Penetration testing using Metasploit Framework
ī‚ˇ Introduction to Penetration Testing,
ī‚ˇ Penetration testing methodology and types,
ī‚ˇ Popular penetration testing tools
Hands-on lab on
penetration testing with
metasploit framework.
Assessment
ī‚ˇ Final Project Presentation
ī‚ˇ Research Paper Writing
ī‚ˇ Quizzes and Assignments
ī‚ˇ Hands-On Labs and Projects
ī‚ˇ Final Exam
ī‚ˇ Research Paper
Prerequisites: Basic understanding of computer networking and
operating systems.
Note: Ethical hacking should always be conducted within legal and
ethical boundaries. The course will emphasize responsible and
legal hacking practices.
PARADISE COMPUTER ACADEMY
(Under Logik Eye Forensics, Logik Tech Service and Paradise Computer
Academy, of Bangladesh) Karamtola Bazar, Tong-Kaligonj highwar,
Gazipur https://logikeyeforensics.com
Appendix
Few International Hacking Certifications include
ī‚ˇ CEH
ī‚ˇ GIAC
ī‚ˇ OSCP
ī‚ˇ CREST
ī‚ˇ
Useful Websites to Learn Ethical Hacking
ī‚ˇ Hack this Site Link: https://www.hackthissite.org
ī‚ˇ Hack a day Link : https://hackaday.com
ī‚ˇ Hacker 101 Link : https://www.hacker101.com
ī‚ˇ EC-Council Link : https://www.eccouncil.org
ī‚ˇ Cybrary Link : https://www.cybrary.it
ī‚ˇ Hack This Site Link: https://www.hackthissite.org
ī‚ˇ Hacking Tutorial Link http://www.hacking-tutorial.com
ī‚ˇ Break the security Link: https://breakthesecurity.cysecurity.org
THE END

More Related Content

What's hot

Cyber Threat Simulation Training
Cyber Threat Simulation TrainingCyber Threat Simulation Training
Cyber Threat Simulation Training
Bryan Len
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
Jason Murray
 
Automating security hardening
Automating security hardeningAutomating security hardening
Automating security hardening
Ugljesa Novak, CISSP
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
Dave Monahan
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Critical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatCritical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber Threat
Motorola Solutions
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniques
waqasahmad1995
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
PECB
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
Priyanka Aash
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
LearningwithRayYT
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical Systems
Alan Tatourian
 
OWASP Top 10 Web Application Vulnerabilities
OWASP Top 10 Web Application VulnerabilitiesOWASP Top 10 Web Application Vulnerabilities
OWASP Top 10 Web Application VulnerabilitiesSoftware Guru
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Security risk management
Security risk managementSecurity risk management
Security risk management
G Prachi
 
Ceh v5 module 04 enumeration
Ceh v5 module 04 enumerationCeh v5 module 04 enumeration
Ceh v5 module 04 enumeration
Vi Tính Hoàng Nam
 
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE - ATT&CKcon
 
Chapter 6Network Security Devices, Design, and Technology
Chapter 6Network Security Devices, Design, and TechnologyChapter 6Network Security Devices, Design, and Technology
Chapter 6Network Security Devices, Design, and Technology
Dr. Ahmed Al Zaidy
 
Cyber Security Threat Modeling
Cyber Security Threat ModelingCyber Security Threat Modeling
Cyber Security Threat Modeling
Dr. Anish Cheriyan (PhD)
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
Radar Cyber Security
 

What's hot (20)

Cyber Threat Simulation Training
Cyber Threat Simulation TrainingCyber Threat Simulation Training
Cyber Threat Simulation Training
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Automating security hardening
Automating security hardeningAutomating security hardening
Automating security hardening
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Cyber security
Cyber securityCyber security
Cyber security
 
Critical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatCritical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber Threat
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniques
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical Systems
 
OWASP Top 10 Web Application Vulnerabilities
OWASP Top 10 Web Application VulnerabilitiesOWASP Top 10 Web Application Vulnerabilities
OWASP Top 10 Web Application Vulnerabilities
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
Ceh v5 module 04 enumeration
Ceh v5 module 04 enumerationCeh v5 module 04 enumeration
Ceh v5 module 04 enumeration
 
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
 
Chapter 6Network Security Devices, Design, and Technology
Chapter 6Network Security Devices, Design, and TechnologyChapter 6Network Security Devices, Design, and Technology
Chapter 6Network Security Devices, Design, and Technology
 
Cyber Security Threat Modeling
Cyber Security Threat ModelingCyber Security Threat Modeling
Cyber Security Threat Modeling
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 

Similar to Syllabus for Cyber security and Ethical Hacking

Course overview Cybersecurity and its applications
Course overview Cybersecurity and its applicationsCourse overview Cybersecurity and its applications
Course overview Cybersecurity and its applications
Sanket Shikhar
 
Skillogic Ethical Hacking course Chennai
Skillogic Ethical Hacking course ChennaiSkillogic Ethical Hacking course Chennai
Skillogic Ethical Hacking course Chennai
Skillogic Solutions
 
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
CRAW CYBER SECURITY PVT LTD
 
Prerequisites for Enrolling in an Ethical Hacking Course in Jaipur.pdf
Prerequisites for Enrolling in an Ethical Hacking Course in Jaipur.pdfPrerequisites for Enrolling in an Ethical Hacking Course in Jaipur.pdf
Prerequisites for Enrolling in an Ethical Hacking Course in Jaipur.pdf
CCASTraining
 
Know All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) CourseKnow All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) Course
Mercury Solutions Limited
 
Ethical Hacking Course in Bangalore February
Ethical Hacking Course in Bangalore FebruaryEthical Hacking Course in Bangalore February
Ethical Hacking Course in Bangalore February
Skillogic Solutions
 
Ethical Hacking Certification Course in Delhi.pdf
Ethical Hacking Certification Course in Delhi.pdfEthical Hacking Certification Course in Delhi.pdf
Ethical Hacking Certification Course in Delhi.pdf
isha bajpai
 
Ethical Hacking Course in Pune February 2024
Ethical Hacking Course in Pune February 2024Ethical Hacking Course in Pune February 2024
Ethical Hacking Course in Pune February 2024
Skillogic Solutions
 
Ethical Hacking Course in Pune January 2024
Ethical Hacking Course in Pune January 2024Ethical Hacking Course in Pune January 2024
Ethical Hacking Course in Pune January 2024
Skillogic Solutions
 
Ethical Hacking Course in Pune March 2024
Ethical Hacking Course in Pune March 2024Ethical Hacking Course in Pune March 2024
Ethical Hacking Course in Pune March 2024
Skillogic Solutions
 
Ethical Hacking Course in Bangalore February 2024
Ethical Hacking Course in Bangalore February 2024Ethical Hacking Course in Bangalore February 2024
Ethical Hacking Course in Bangalore February 2024
Skillogic Solutions
 
Ethical Hacking Course in Bangalore January
Ethical Hacking Course in Bangalore JanuaryEthical Hacking Course in Bangalore January
Ethical Hacking Course in Bangalore January
Skillogic Solutions
 
Ethical Hacking Course in Bangalore February
Ethical Hacking Course in Bangalore FebruaryEthical Hacking Course in Bangalore February
Ethical Hacking Course in Bangalore February
Skillogic Solutions
 
Brochure of ICSS
Brochure of ICSS Brochure of ICSS
Ethical Hacking Course in Hyderabad February
Ethical Hacking Course in Hyderabad FebruaryEthical Hacking Course in Hyderabad February
Ethical Hacking Course in Hyderabad February
Skillogic Solutions
 
Ethical Hacking Course in Hyderabad January
Ethical Hacking Course in Hyderabad JanuaryEthical Hacking Course in Hyderabad January
Ethical Hacking Course in Hyderabad January
Skillogic Solutions
 
Ethical Hacking Course in Hyderabad February
Ethical Hacking Course in Hyderabad FebruaryEthical Hacking Course in Hyderabad February
Ethical Hacking Course in Hyderabad February
Skillogic Solutions
 
Ethical Hacking Course in Hyderabad March.pptx
Ethical Hacking Course in Hyderabad March.pptxEthical Hacking Course in Hyderabad March.pptx
Ethical Hacking Course in Hyderabad March.pptx
Skillogic Solutions
 
3.Seminar Report Ashar Shaikh Final.docx
3.Seminar Report Ashar Shaikh Final.docx3.Seminar Report Ashar Shaikh Final.docx
3.Seminar Report Ashar Shaikh Final.docx
asharshaikh8
 
Ethical Hacking Course in Bangalore March 2024
Ethical Hacking Course in Bangalore March 2024Ethical Hacking Course in Bangalore March 2024
Ethical Hacking Course in Bangalore March 2024
Skillogic Solutions
 

Similar to Syllabus for Cyber security and Ethical Hacking (20)

Course overview Cybersecurity and its applications
Course overview Cybersecurity and its applicationsCourse overview Cybersecurity and its applications
Course overview Cybersecurity and its applications
 
Skillogic Ethical Hacking course Chennai
Skillogic Ethical Hacking course ChennaiSkillogic Ethical Hacking course Chennai
Skillogic Ethical Hacking course Chennai
 
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
Computer Hacking Forensic Investigator Course Details and Course Brochure | E...
 
Prerequisites for Enrolling in an Ethical Hacking Course in Jaipur.pdf
Prerequisites for Enrolling in an Ethical Hacking Course in Jaipur.pdfPrerequisites for Enrolling in an Ethical Hacking Course in Jaipur.pdf
Prerequisites for Enrolling in an Ethical Hacking Course in Jaipur.pdf
 
Know All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) CourseKnow All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) Course
 
Ethical Hacking Course in Bangalore February
Ethical Hacking Course in Bangalore FebruaryEthical Hacking Course in Bangalore February
Ethical Hacking Course in Bangalore February
 
Ethical Hacking Certification Course in Delhi.pdf
Ethical Hacking Certification Course in Delhi.pdfEthical Hacking Certification Course in Delhi.pdf
Ethical Hacking Certification Course in Delhi.pdf
 
Ethical Hacking Course in Pune February 2024
Ethical Hacking Course in Pune February 2024Ethical Hacking Course in Pune February 2024
Ethical Hacking Course in Pune February 2024
 
Ethical Hacking Course in Pune January 2024
Ethical Hacking Course in Pune January 2024Ethical Hacking Course in Pune January 2024
Ethical Hacking Course in Pune January 2024
 
Ethical Hacking Course in Pune March 2024
Ethical Hacking Course in Pune March 2024Ethical Hacking Course in Pune March 2024
Ethical Hacking Course in Pune March 2024
 
Ethical Hacking Course in Bangalore February 2024
Ethical Hacking Course in Bangalore February 2024Ethical Hacking Course in Bangalore February 2024
Ethical Hacking Course in Bangalore February 2024
 
Ethical Hacking Course in Bangalore January
Ethical Hacking Course in Bangalore JanuaryEthical Hacking Course in Bangalore January
Ethical Hacking Course in Bangalore January
 
Ethical Hacking Course in Bangalore February
Ethical Hacking Course in Bangalore FebruaryEthical Hacking Course in Bangalore February
Ethical Hacking Course in Bangalore February
 
Brochure of ICSS
Brochure of ICSS Brochure of ICSS
Brochure of ICSS
 
Ethical Hacking Course in Hyderabad February
Ethical Hacking Course in Hyderabad FebruaryEthical Hacking Course in Hyderabad February
Ethical Hacking Course in Hyderabad February
 
Ethical Hacking Course in Hyderabad January
Ethical Hacking Course in Hyderabad JanuaryEthical Hacking Course in Hyderabad January
Ethical Hacking Course in Hyderabad January
 
Ethical Hacking Course in Hyderabad February
Ethical Hacking Course in Hyderabad FebruaryEthical Hacking Course in Hyderabad February
Ethical Hacking Course in Hyderabad February
 
Ethical Hacking Course in Hyderabad March.pptx
Ethical Hacking Course in Hyderabad March.pptxEthical Hacking Course in Hyderabad March.pptx
Ethical Hacking Course in Hyderabad March.pptx
 
3.Seminar Report Ashar Shaikh Final.docx
3.Seminar Report Ashar Shaikh Final.docx3.Seminar Report Ashar Shaikh Final.docx
3.Seminar Report Ashar Shaikh Final.docx
 
Ethical Hacking Course in Bangalore March 2024
Ethical Hacking Course in Bangalore March 2024Ethical Hacking Course in Bangalore March 2024
Ethical Hacking Course in Bangalore March 2024
 

More from Mehedi Hasan

Company profile logikeye.pdf
Company profile logikeye.pdfCompany profile logikeye.pdf
Company profile logikeye.pdf
Mehedi Hasan
 
Cyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdfCyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdf
Mehedi Hasan
 
Hackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptxHackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptx
Mehedi Hasan
 
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
Mehedi Hasan
 
Cyber security and Ethical Hacking Course.pdf
Cyber security and Ethical Hacking Course.pdfCyber security and Ethical Hacking Course.pdf
Cyber security and Ethical Hacking Course.pdf
Mehedi Hasan
 
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdfCYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
Mehedi Hasan
 
Wall Listening Devices.pdf
Wall Listening Devices.pdfWall Listening Devices.pdf
Wall Listening Devices.pdf
Mehedi Hasan
 
Smart voice security system
Smart voice security systemSmart voice security system
Smart voice security system
Mehedi Hasan
 
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICESONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
Mehedi Hasan
 
Nuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docxNuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docx
Mehedi Hasan
 
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptxInformation Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Mehedi Hasan
 
Cyber Crime Awareness.pptx
Cyber Crime Awareness.pptxCyber Crime Awareness.pptx
Cyber Crime Awareness.pptx
Mehedi Hasan
 
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
Mehedi Hasan
 
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
Mehedi Hasan
 
Cyber crime and investigation training
Cyber crime and investigation trainingCyber crime and investigation training
Cyber crime and investigation training
Mehedi Hasan
 
āĻ¸āĻžāĻ‡āĻŦāĻžāĻ° āĻ¨āĻŋāĻ°āĻžāĻĒāĻ¤ā§āĻ¤āĻž āĻŦāĻŋāĻˇāĻ¯āĻŧāĻ• āĻ“ā§ŸāĻžāĻ°ā§āĻ•āĻļāĻĒ
āĻ¸āĻžāĻ‡āĻŦāĻžāĻ° āĻ¨āĻŋāĻ°āĻžāĻĒāĻ¤ā§āĻ¤āĻž āĻŦāĻŋāĻˇāĻ¯āĻŧāĻ• āĻ“ā§ŸāĻžāĻ°ā§āĻ•āĻļāĻĒ āĻ¸āĻžāĻ‡āĻŦāĻžāĻ° āĻ¨āĻŋāĻ°āĻžāĻĒāĻ¤ā§āĻ¤āĻž āĻŦāĻŋāĻˇāĻ¯āĻŧāĻ• āĻ“ā§ŸāĻžāĻ°ā§āĻ•āĻļāĻĒ
āĻ¸āĻžāĻ‡āĻŦāĻžāĻ° āĻ¨āĻŋāĻ°āĻžāĻĒāĻ¤ā§āĻ¤āĻž āĻŦāĻŋāĻˇāĻ¯āĻŧāĻ• āĻ“ā§ŸāĻžāĻ°ā§āĻ•āĻļāĻĒ
Mehedi Hasan
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
Mehedi Hasan
 
Remote control system (rcs)
Remote control system (rcs)Remote control system (rcs)
Remote control system (rcs)
Mehedi Hasan
 
Live memory forensics
Live memory forensicsLive memory forensics
Live memory forensics
Mehedi Hasan
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
Mehedi Hasan
 

More from Mehedi Hasan (20)

Company profile logikeye.pdf
Company profile logikeye.pdfCompany profile logikeye.pdf
Company profile logikeye.pdf
 
Cyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdfCyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdf
 
Hackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptxHackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptx
 
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
 
Cyber security and Ethical Hacking Course.pdf
Cyber security and Ethical Hacking Course.pdfCyber security and Ethical Hacking Course.pdf
Cyber security and Ethical Hacking Course.pdf
 
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdfCYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
 
Wall Listening Devices.pdf
Wall Listening Devices.pdfWall Listening Devices.pdf
Wall Listening Devices.pdf
 
Smart voice security system
Smart voice security systemSmart voice security system
Smart voice security system
 
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICESONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
 
Nuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docxNuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docx
 
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptxInformation Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptx
 
Cyber Crime Awareness.pptx
Cyber Crime Awareness.pptxCyber Crime Awareness.pptx
Cyber Crime Awareness.pptx
 
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
 
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
 
Cyber crime and investigation training
Cyber crime and investigation trainingCyber crime and investigation training
Cyber crime and investigation training
 
āĻ¸āĻžāĻ‡āĻŦāĻžāĻ° āĻ¨āĻŋāĻ°āĻžāĻĒāĻ¤ā§āĻ¤āĻž āĻŦāĻŋāĻˇāĻ¯āĻŧāĻ• āĻ“ā§ŸāĻžāĻ°ā§āĻ•āĻļāĻĒ
āĻ¸āĻžāĻ‡āĻŦāĻžāĻ° āĻ¨āĻŋāĻ°āĻžāĻĒāĻ¤ā§āĻ¤āĻž āĻŦāĻŋāĻˇāĻ¯āĻŧāĻ• āĻ“ā§ŸāĻžāĻ°ā§āĻ•āĻļāĻĒ āĻ¸āĻžāĻ‡āĻŦāĻžāĻ° āĻ¨āĻŋāĻ°āĻžāĻĒāĻ¤ā§āĻ¤āĻž āĻŦāĻŋāĻˇāĻ¯āĻŧāĻ• āĻ“ā§ŸāĻžāĻ°ā§āĻ•āĻļāĻĒ
āĻ¸āĻžāĻ‡āĻŦāĻžāĻ° āĻ¨āĻŋāĻ°āĻžāĻĒāĻ¤ā§āĻ¤āĻž āĻŦāĻŋāĻˇāĻ¯āĻŧāĻ• āĻ“ā§ŸāĻžāĻ°ā§āĻ•āĻļāĻĒ
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
 
Remote control system (rcs)
Remote control system (rcs)Remote control system (rcs)
Remote control system (rcs)
 
Live memory forensics
Live memory forensicsLive memory forensics
Live memory forensics
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
 

Recently uploaded

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
BÀI TáēŦP Báģ” TRáģĸ TIáēžNG ANH GLOBAL SUCCESS LáģšP 3 - Cáēĸ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TáēŦP Báģ” TRáģĸ TIáēžNG ANH GLOBAL SUCCESS LáģšP 3 - Cáēĸ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TáēŦP Báģ” TRáģĸ TIáēžNG ANH GLOBAL SUCCESS LáģšP 3 - Cáēĸ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TáēŦP Báģ” TRáģĸ TIáēžNG ANH GLOBAL SUCCESS LáģšP 3 - Cáēĸ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 

Recently uploaded (20)

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
BÀI TáēŦP Báģ” TRáģĸ TIáēžNG ANH GLOBAL SUCCESS LáģšP 3 - Cáēĸ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TáēŦP Báģ” TRáģĸ TIáēžNG ANH GLOBAL SUCCESS LáģšP 3 - Cáēĸ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TáēŦP Báģ” TRáģĸ TIáēžNG ANH GLOBAL SUCCESS LáģšP 3 - Cáēĸ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TáēŦP Báģ” TRáģĸ TIáēžNG ANH GLOBAL SUCCESS LáģšP 3 - Cáēĸ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 

Syllabus for Cyber security and Ethical Hacking

  • 1. PARADISE COMPUTER ACADEMY (Under Logik Eye Forensics, Logik Tech Service and Paradise Computer Academy, of Bangladesh) īƒ˜ Cyber Security and Ethical Hacking Objective This course introduces the concepts of Cyber security and Ethical Hacking, providing learners with the techniques in Ethical Hacking and Security. It enables them to identify and analyze the stages necessary for an ethical hacker to compromise a target system, while also instructing them on the application of prevent corrective, and protective measures to safeguard the system. Upon completion of this course, candidates will be proficient in identifying tools and techniques for conducting penetration testing, critically evaluating security methods for protecting sy systematic understanding of security concepts at the policy and strategy levels within a computer system B.E*/B.Tech.* / B.Sc. - M.Sc. / Graduate / Diploma in any Basic Knowledge of Programming or B.C.A*. or NIELIT O-Level / NIELIT A-Level Qualified or 10+2 qualifie Prerequisites īƒŧ Candidate preferably 8 īƒŧ Internet (preferably Rs. 3500 Certificate Hard Copy of Certificate will be provided to the participants, based on minimum 75% attendance and on performance (minimum 50% marks) in the online test, conducted at the end of the course. īƒŧ Instructor-led live classes. īƒŧ Instructor-led hands Lab. īƒŧ Tools will be shared through the portal for practice. īƒŧ Assessment and Certification How to Apply Step-1: Read Step-2: Collect a Step-4: Use a submit your Credit Card / Internet Banking / Mobile bangking / Cash Cyber Security and Ethical Hacking PARADISE COMPUTER ACADEMY Logik Eye Forensics, Logik Tech Service and Paradise Computer Bangladesh) Karamtola Bazar, Tong-Kaligonj highwar, Gazipur https://logikeyeforensics.com Cyber Security and Ethical Hacking 15 Weeks. Medium of Instruction: Bilingual This course introduces the concepts of Cyber security and Ethical Hacking, providing learners with the opportunity to explore various tools and techniques in Ethical Hacking and Security. It enables them to identify and analyze the stages necessary for an ethical hacker to compromise a target system, while also instructing them on the application of prevent corrective, and protective measures to safeguard the system. Upon completion of this course, candidates will be proficient in identifying tools and techniques for conducting penetration testing, critically evaluating security methods for protecting system and user data, and demonstrating a systematic understanding of security concepts at the policy and strategy levels within a computer system. M.Sc. / Graduate / Diploma in any stream with B.C.A*. / M.C.A. pursuing or qualified Level Qualified or 10+2 qualifie Candidate must have latest computer/laptop with preferably 8 GB RAM or higher Internet connection with good speed (preferably 2 Mbps or higher). 000/- incl. all other charges. Hard Copy of Certificate will be provided to the participants, based on minimum 75% attendance and on performance (minimum 50% marks) in the online test, conducted at the end of the course. classes. hands-on lab sessions using Virtual Tools will be shared through the portal for practice.. Certification Read the course structure & course requirements Collect a registration form and submit after filling up Use a mobile number for verification or email submit your documents, and Pay the Fees using ATM rd / Internet Banking / Mobile bangking / Cash Cyber Security and Ethical Hacking PARADISE COMPUTER ACADEMY Weeks. (4 Hrs. per day) Bilingual (English& Bangla) This course introduces the concepts of Cyber security and Ethical Hacking, opportunity to explore various tools and techniques in Ethical Hacking and Security. It enables them to identify and analyze the stages necessary for an ethical hacker to compromise a target system, while also instructing them on the application of preventive, corrective, and protective measures to safeguard the system. Upon completion of this course, candidates will be proficient in identifying tools and techniques for conducting penetration testing, critically evaluating stem and user data, and demonstrating a systematic understanding of security concepts at the policy and strategy Eligibility Course Fees Hard Copy of Certificate will be provided to the participants, based on minimum 75% attendance and on performance (minimum 50% marks) in the online test, conducted at the end of the course. Methodology requirements carefully. submit after filling up. email ID and then using ATM-Debit Card / rd / Internet Banking / Mobile bangking / Cash etc. Cyber Security and Ethical Hacking
  • 2. PARADISE COMPUTER ACADEMY (Under Logik Eye Forensics, Logik Tech Service and Paradise Computer Academy, of Bangladesh) Day Topic Day Day #01 Introduction to Hacking and security Day #02 Day #04 Digital Systems hacking Day #05 Day #07 Smartphone hacking Day #08 Day #10 WiFi network hacking Day #11 Day #13 Aircraft System hacking Day #14 Day #16 Setup Lab and introduction with Linux Day #17 Day #19 Malware attacks analysis Day #20 Day #22 Man-in-the middle attack Day #23 Day #25 Cyber Crime & Law Day #26 Course Mehedi Hasan Founder Owner LOGIK EYE FORENSICS, PARADISE COMPUTER ACADEMY, LOGIK TECH SERVICE Email: mehedi0001@yahoo.com Mobile Number: +8801766442199 CLICK PARADISE COMPUTER ACADEMY Logik Eye Forensics, Logik Tech Service and Paradise Computer Bangladesh) Karamtola Bazar, Tong-Kaligonj highwar, Gazipur https://logikeyeforensics.com Course Content Topic Day Information & Network Reconnaissance Day #03 IP and Network Scanning Web Applications hacking Day #06 Social Engineering Satellite data signal hacking Day #09 Deep-Fake technology Radio frequency hacking Day #12 GSM Network hacking Signal jamming Day #15 Cloud system hacking Crypto-currency and Cryptography Day #18 Vulnerability assessment and Analysis Phishing attack Day #21 Smart Card Hacking Concepts of Digital Forensics Day #24 Hacking Exploit development with python Project and Paper writing Course Coordinator Founder Owner, LOGIK EYE FORENSICS, PARADISE COMPUTER LOGIK TECH SERVICE mehedi0001@yahoo.com Number: +8801601019511, +8801766442199 CLICK HERE TO REGISTER PARADISE COMPUTER ACADEMY Topic IP and Network Scanning Social Engineering Fake technology GSM Network hacking Cloud system hacking Vulnerability assessment and Analysis Smart Card Hacking Hacking Exploit development with python
  • 3. PARADISE COMPUTER ACADEMY (Under Logik Eye Forensics, Logik Tech Service and Paradise Computer Academy, of Bangladesh) Karamtola Bazar, Tong-Kaligonj highwar, Gazipur https://logikeyeforensics.com Course Syllabus Day Detailed Conceptual Topic Hands On lab Day1 Introduction to Hacking and security ī‚ˇ Understanding Ethical Hacking ī‚ˇ Hacking vs. Ethical Hacking ī‚ˇ VPN and IP changer ī‚ˇ Location changer ī‚ˇ MAC/IMEI Changer ī‚ˇ Virtual Machine setup ī‚ˇ OS Setup on VMware Machine ī‚ˇ Dark Web with Tor browser ī‚ˇ Ensure security and be confirm you are an anonymous user ī‚ˇ IP Address Scanning ī‚ˇ Find real IP Study of ethical hacking, Information security, IP Address, virtual machine, MAC/IMEI. Practice on VPN installation, IP address changing, MAC changer, virtual machine setup, Install tor browser, access in dark wave. Day2 Information & Network Reconnaissance ī‚ˇ Introduction to Information Gathering, Phases of I.G ī‚ˇ Information Gathering Techniques ī‚ˇ Foot printing ī‚ˇ Steps of hacking ī‚ˇ Popular hacking tools ī‚ˇ IP hacking with link ī‚ˇ IP hacking with Email Practice on information gathering; install hacking tools, creating a https link to capture remote locations IP address. Creating an account to get someone’s IP address by email sending. Day3 IP and Network Scanning ī‚ˇ Scanning Tools and Techniques ī‚ˇ Concept of Email Spoofing, ī‚ˇ E-mail Security ī‚ˇ Port Scanning and Service Enumeration ī‚ˇ IP Tracking System ī‚ˇ Remote IP hacking technique ī‚ˇ IP Address Analysis Hands-on lab on Information Gathering and its countermeasures. Day4 Digital Systems hacking ī‚ˇ Exploiting System Vulnerabilities ī‚ˇ Introduction to Virus/Trojan/Spyware/Keylogger ī‚ˇ Windows OS hacking ī‚ˇ Password Cracking types ī‚ˇ Brute Force Attacks ī‚ˇ IoT Hacking tools ( With Raspberry pi ) ī‚ˇ IoT system hacking Hands-on lab on vulnerability assessment with kali linux, windows system hacking with keylogger.
  • 4. PARADISE COMPUTER ACADEMY (Under Logik Eye Forensics, Logik Tech Service and Paradise Computer Academy, of Bangladesh) Karamtola Bazar, Tong-Kaligonj highwar, Gazipur https://logikeyeforensics.com Day5 Web Applications hacking ī‚ˇ Common Web Application Vulnerabilities, ī‚ˇ Denial of Service (DoS), ī‚ˇ SQL Injection, XSS, CSRF, and more ī‚ˇ Web Application Scanners ī‚ˇ Email Hacking ī‚ˇ Email Header collection, Email header analysis ī‚ˇ Password Cracking ī‚ˇ Brute Force Attack in Web Application Hands on Lab on Trojan Virus & its Countermeasures, email hacking, email header collection, header analysis, Day6 Social Engineering ī‚ˇ Psychology of Social Engineering ī‚ˇ Phishing with java script, SET and Web ī‚ˇ Stereography ī‚ˇ Information Hiding ī‚ˇ Stego Analysis ī‚ˇ SMS and Call spoofing ī‚ˇ Social Engineering Countermeasures Hands on lab on Steganography, SMSspoofing, Callspoofing, Day7 Smartphone hacking ī‚ˇ Mobile Device Security ī‚ˇ Android and iOS Exploits ī‚ˇ APK exploit ī‚ˇ Termux and basic application ī‚ˇ Android Device hacking ī‚ˇ Android Spy ī‚ˇ Android Exploit Hands on lab on Android spy, Operation ou Termux, android device hacking and countermeasures Day8 Satellite data signal hacking ī‚ˇ Satellite Communication Overview ī‚ˇ Introduction with NOAA, ROSMOSCOS and others satellite ī‚ˇ Intercepting and Decoding Weather Satellite Signals ī‚ˇ Introducing with GNU Radio ī‚ˇ Capturing and decoding satellite signals ī‚ˇ Security Implications Hands on lab on satellite data receiving and decoding, GNU Radio setup, find a target satellite and capture signal. Day9 Deep-Fake technology ī‚ˇ Understanding Deep-Fakes Technology ī‚ˇ Making Deep-Fakes video or image ī‚ˇ Creating Deep-fake movie with python script ī‚ˇ Deep-face detection and Action Hands on lab on Deep- fake, Creating Deep- fake video and image.
  • 5. PARADISE COMPUTER ACADEMY (Under Logik Eye Forensics, Logik Tech Service and Paradise Computer Academy, of Bangladesh) Karamtola Bazar, Tong-Kaligonj highwar, Gazipur https://logikeyeforensics.com Day10 WiFi network hacking ī‚ˇ Wireless Network Security ī‚ˇ WEP, WPA, and WPA2 Cracking ī‚ˇ WiFi hacking with Kali Linux Hands on lab wifi hacking Day11 Radio frequency hacking ī‚ˇ Basic Concept RF Communication ī‚ˇ Intercepting RF Signals ī‚ˇ Software define radio setup ī‚ˇ Receive and Decrypt different types of RF signals. ī‚ˇ RF Security Measures ī‚ˇ Basic operation of Antenna ī‚ˇ Basic concept of Wireshartk Hands on lab on radio signal receiving tools install, recording and decoding, Day12 GSM Network hacking ī‚ˇ GSM Architecture and Vulnerabilities ī‚ˇ Intercepting BTS Traffic ī‚ˇ Mobile Network Security ī‚ˇ Detect Fake BTS open BTS etc. ī‚ˇ Basic concept of 2G Interceptor ī‚ˇ Capturing SMS and 1G GSM Data with Wireshark Hands on lab on sniffing bts, base station, collect IMSI number, LAC, CELL ID, Find fake BTS, SMS capturing system with wireshark and its Countermeasures. Day13 Aircraft LD System hacking ī‚ˇ Introduction with Aircraft Landing System ī‚ˇ ADS-B signal decoding ī‚ˇ ADS-B Airplane Tracking ī‚ˇ Basic concept of Global Civil Aviation System ī‚ˇ Case Studies and Mitigation Hands on lab on ADS- B setup, Civil aviation tracking, Source and target Location tracking, Day14 Signal jamming ī‚ˇ Jamming Techniques and Equipment ī‚ˇ FM signal jamming (short range) ī‚ˇ WiFi Jamming (short range) ī‚ˇ MW signal jamming (short range) ī‚ˇ GSM signal jamming (short range) ī‚ˇ Jamming Detection and Prevention Hands on lab on FM, WiFi, MW, GSM jamming and its Countermeasures. Day15 Cloud system hacking ī‚ˇ Cloud Security Models ī‚ˇ Google Drive Hands-on lab on cloud based systems information capturing. Day16 Setup Lab and introduction with Linux ī‚ˇ Lab Environment Setup ī‚ˇ Introduction to Kali Linux, Arch Linux, Ubuntu etc. Hands-on lab on Installing and configuring
  • 6. PARADISE COMPUTER ACADEMY (Under Logik Eye Forensics, Logik Tech Service and Paradise Computer Academy, of Bangladesh) Karamtola Bazar, Tong-Kaligonj highwar, Gazipur https://logikeyeforensics.com Day17 Crypto-currency and Cryptography ī‚ˇ Crypto currency Fundamentals ī‚ˇ Cryptographic Techniques Hands-on lab on crypt currency account opening. Day18 Vulnerability assessment and Analysis ī‚ˇ Introduction with Assessment ī‚ˇ Web based Vulnerability Assessment ī‚ˇ System based Vulnerability Assessment ī‚ˇ Metasploit framework ī‚ˇ Nessus Professional ī‚ˇ Nicto, OpenVAS ī‚ˇ Introducing with Acunetix web vulnerability scanner Hands-on lab on Penetration Testing using Metasploit Day19 Malware attacks analysis ī‚ˇ Malware Types and Analysis ī‚ˇ Basic of Static and Dynamic Analysis ī‚ˇ Malware Defense Strategies Hands-on lab malware analysis Day20 Phishing attack ī‚ˇ Phishing Techniques ī‚ˇ Phishing with Metasploit and SET ī‚ˇ Phishing and Vesting ī‚ˇ Email and Website Spoofing ī‚ˇ Anti-Phishing Measures Hands-on lab on SET, Gmail phishing, facebook fishing, phishing with java script. Day21 Smart Card Hacking ī‚ˇ RFID Hacking ī‚ˇ Basic concept of microchip ī‚ˇ Credit card cloning ī‚ˇ NID cloning Hands-on lab microcio hex file extraction, Credit card number generating, NID and RFID cloning technique. Day22 Man-in-the middle attack ī‚ˇ MITM Concepts and Techniques ī‚ˇ ARP Poisoning and SSL Stripping ī‚ˇ MITM Detection and Prevention ī‚ˇ GSM Sniffing ī‚ˇ RF Poisoning ī‚ˇ IMSI Catcher ī‚ˇ LTE Interceptor Hands-on lab on GSM sniffing Day23 Concepts of Digital Forensics ī‚ˇ Digital Forensics Fundamentals ī‚ˇ Evidence Handling and Preservation ī‚ˇ USB Forensics ī‚ˇ Windows Forensics ī‚ˇ Gmail Forensics Hands-on lab on windows forensics, USB forensics, imaging, etc.
  • 7. PARADISE COMPUTER ACADEMY (Under Logik Eye Forensics, Logik Tech Service and Paradise Computer Academy, of Bangladesh) Karamtola Bazar, Tong-Kaligonj highwar, Gazipur https://logikeyeforensics.com ī‚ˇ Digital Forensic Tools ī‚ˇ Digital Forensics Report ī‚ˇ Lost Data Recovery ī‚ˇ Partition Recovery Day24 Hacking Exploit development with python ī‚ˇ Python for Hacking ī‚ˇ Exploit Development Basics ī‚ˇ Modifying Custom Exploits Hands-on lab on exploit development Day25 Cyber Crime & Law ī‚ˇ Cybercrime Laws and Regulations ī‚ˇ Legal and Ethical Aspects of Hacking ī‚ˇ Ethical Hacking Codes of Conduct Open discussion Day26 Penetration testing using Metasploit Framework ī‚ˇ Introduction to Penetration Testing, ī‚ˇ Penetration testing methodology and types, ī‚ˇ Popular penetration testing tools Hands-on lab on penetration testing with metasploit framework. Assessment ī‚ˇ Final Project Presentation ī‚ˇ Research Paper Writing ī‚ˇ Quizzes and Assignments ī‚ˇ Hands-On Labs and Projects ī‚ˇ Final Exam ī‚ˇ Research Paper Prerequisites: Basic understanding of computer networking and operating systems. Note: Ethical hacking should always be conducted within legal and ethical boundaries. The course will emphasize responsible and legal hacking practices.
  • 8. PARADISE COMPUTER ACADEMY (Under Logik Eye Forensics, Logik Tech Service and Paradise Computer Academy, of Bangladesh) Karamtola Bazar, Tong-Kaligonj highwar, Gazipur https://logikeyeforensics.com Appendix Few International Hacking Certifications include ī‚ˇ CEH ī‚ˇ GIAC ī‚ˇ OSCP ī‚ˇ CREST ī‚ˇ Useful Websites to Learn Ethical Hacking ī‚ˇ Hack this Site Link: https://www.hackthissite.org ī‚ˇ Hack a day Link : https://hackaday.com ī‚ˇ Hacker 101 Link : https://www.hacker101.com ī‚ˇ EC-Council Link : https://www.eccouncil.org ī‚ˇ Cybrary Link : https://www.cybrary.it ī‚ˇ Hack This Site Link: https://www.hackthissite.org ī‚ˇ Hacking Tutorial Link http://www.hacking-tutorial.com ī‚ˇ Break the security Link: https://breakthesecurity.cysecurity.org THE END