Syllabus For Cybersecurity and Ethical Hacking Course
Syllabus For Cybersecurity and Ethical Hacking Course
(Under Logik Eye Forensics, Logik Tech Service and Paradise Computer
Academy, of Bangladesh) Karamtola Bazar, Tong-Kaligonj highwar,
Gazipur https://logikeyeforensics.com
This course introduces the concepts of Cyber security and Ethical Hacking,
providing learners with the opportunity to explore various tools and
techniques in Ethical Hacking and Security. It enables them to identify and
Objective analyze the stages necessary for an ethical hacker to compromise a target
system, while also instructing them on the application of preventive,
prevent
corrective, and protective measures to safeguard the system. Upon
completion of this course, candidates will be proficient in identifying tools
and techniques for conducting penetration testing, critically evaluating
security methods for protecting sy
system
stem and user data, and demonstrating a
systematic understanding of security concepts at the policy and strategy
levels within a computer system.
system
Rs. 3500
000/- incl. all other charges. Course Fees
Hard Copy of Certificate will be provided to the participants, based on
Certificate minimum 75% attendance and on performance (minimum 50%
marks) in the online test, conducted at the end of the course.
Course Content
Course Coordinator
Mehedi Hasan
Founder Owner
Owner,
LOGIK EYE FORENSICS,
PARADISE COMPUTER
ACADEMY,
LOGIK TECH SERVICE
Email: [email protected]
Mobile Number: +8801601019511,
+8801766442199
CLICK HERE TO
REGISTER
PARADISE COMPUTER ACADEMY
(Under Logik Eye Forensics, Logik Tech Service and Paradise Computer
Academy, of Bangladesh) Karamtola Bazar, Tong-Kaligonj highwar,
Gazipur https://logikeyeforensics.com
Course Syllabus
Day Detailed Conceptual Topic Hands On lab
Introduction to Hacking and security Study of ethical hacking,
Information security, IP
Address, virtual machine,
Understanding Ethical Hacking MAC/IMEI.
Day1 Hacking vs. Ethical Hacking
Practice on VPN
VPN and IP changer installation, IP address
changing, MAC changer,
Location changer virtual machine setup,
MAC/IMEI Changer Install tor browser, access
in dark wave.
Virtual Machine setup
OS Setup on VMware Machine
Dark Web with Tor browser
Ensure security and be confirm you are an anonymous user
IP Address Scanning
Find real IP
Appendix
THE END