Call us Today! 01613943972 | info@xitechbd.com

Login

 

Objective: This Course will immerse the participants into an interactive environment where
they will be shown how to scan, test, hack and secure their own systems. This course gives
each participant’s in-depth knowledge and practical experience with the current essential
security systems. Participants will begin by understanding how perimeter defenses work and
then be lead into scanning and attacking their own networks, no real network is harmed.
Participant’s then learned how intruders escalate privileges and what steps can be taken to
secure a system. Participants will also learn about Intrusion Detection, Policy Creation,
Social Engineering, DDoS Attacks, Buffer Overflows, and Virus Creation.

Course Curriculum

Introduction to Ethical Hacking
Footprinting and Reconnaissance
Scanning Networks
Enumeration
Vulnerability Analysis
System Hacking
Malware Threats
Social Engineering
Denial-of-Service
Session Hijacking
Evading IDS, Firewalls, and Honeypots
Hacking Web Servers
Hacking Web Applications
SQL Injection
Hacking Wireless Networks
Hacking Mobile Platforms
IoT Hacking
Cloud Computing
Cryptography.
Kali Linux Basic Review & demonstration with Vulnerability Assessment and Penetration Testing in practical life using free tools available on Kali Linux.
TAKE THIS COURSE15 SEATS LEFT
  • ৳ 15,000.00
  • 30 Hours
  • 15 SEATS
15 STUDENTS ENROLLED

    Office Address

    H:32/1 R:03 Shamoly, Dhaka, Bangladesh 1207

    +88 01677-035329 (mobile phone)

    +88 01613943972(mobile phone)

    info@xitechbd.com
    top
    xitechbd.com ©. All rights reserved.