0

Loading ...

Course / Course Details

Cyber Security – Ethical Hacking

  • Md Parvej Khan image

    By - Md Parvej Khan

  • 802 students
  • 120 Hours
  • (5)

Course Requirements

  1. Basic computer knowledge
  2. Internet browsing skills
  3. Familiarity with Windows/Linux basic commands

Course Description

🎓 Course Name: Cyber Security & Ethical Hacking


Course Type: Online (Hybrid)

Level: Beginner to Advanced

Language: Bangla + English

Duration: 18 Weeks (2 Classes per Week)

Mode: Live classes + recorded sessions + lab support

Certificate: Professional certificate provided

Freelancing Guidance: Fiverr, Upwork, HackerOne outsourcing training



---


🗓️ Course Syllabus (18 Weeks, 2 Classes per Week)


Week 1


Class 1: Introduction to Ethical Hacking, Why learn Ethical Hacking?, Ethical Hacking Career Guide


Class 2: Login Page Injection, SQL Injection Basics



Week 2


Class 3: Open Source Intelligence (OSINT), Deleted File Recovery & Target Tracking, Basics of Cryptography


Class 4: Social Media Information Gathering, Web Server Whois & Subdomain Enumeration, Email Header Analysis & Tracking Tools



Week 3


Class 5: Evading IDS, Firewalls & Honeypots, Malware Threats: Virus & Trojans


Class 6: Denial-of-Service (DoS) & Distributed DoS (DDoS) Attacks, Trojan & Batch Programming, File Extension Viruses



Week 4


Class 7: Penetration Testing for Trojans & Backdoors, Password Cracking Techniques


Class 8: Session Hijacking & Session ID Prediction, SQL Injection Techniques (POST-based, Error-based, XPath)



Week 5


Class 9: PHP & MySQL Basics, WAF Bypass Techniques


Class 10: Server Shell Scripting, Web Backdoors & Shell Upload, Target IP Exploitation Lab



Week 6


Class 11: Content Management Systems (CMS) Overview, Website Development Basics


Class 12: WordPress Exploitation Techniques, CMS Vulnerability Assessment



Week 7


Class 13: Local File Inclusion (LFI), Remote File Inclusion (RFI), Remote Code Execution (RCE)


Class 14: Website Security & Web Server Security, Cpanel Security



Week 8


Class 15: Cross-Site Request Forgery (CSRF), Cross-Site Scripting (XSS)


Class 16: Social Engineering Techniques, Phishing Attacks, Social Media Account Recovery, Facebook & Gmail Account Security



Week 9


Class 17: Kali Linux Introduction, Burp Suite Basics, Hacking Lab Setup


Class 18: Kali Linux Tools Overview, System Hacking Techniques



Week 10


Class 19: Advanced Cross-Site Scripting (XSS), Authentication Bypass Techniques


Class 20: PortSwigger Lab Solutions, Footprinting & Information Gathering Techniques



Week 11


Class 21: Social Media Data Collection, Web Server Whois, Subdomain Enumeration


Class 22: Ping & Server Details Identification, Nmap Basics



Week 12


Class 23: Network Penetration Testing Techniques, FIN Scan, XMAS Scan


Class 24: TCP Scan, UDP Scan, IDLE Scan



Week 13


Class 25: Website Penetration Testing Overview, Penetration Testing Tools


Class 26: Vulnerability Assessment Techniques, Web Application Testing Scope



Week 14


Class 27: Fiverr & Upwork Outsourcing Guide, Gig Creation & Selling Techniques


Class 28: Order & Payment Process, Dollar Payout Process



Week 15


Class 29: HackerOne & Bugcrowd Outsourcing Guide


Class 30: First Bug Report Submission Techniques, HackerOne & Bugcrowd Overview



Week 16


Class 31: Bonus Topics: Deep Web, Dark Web, Tor Network


Class 32: HTML & CSS Injection Techniques, Mobile Platform Hacking Basics, Proxy Tools Overview, Free Proxy Servers



Week 17


Class 33: Website Cookies & History Analysis, Bonus Project: Android Keylogger Development


Class 34: CCNA Basics Overview, Final Project Preparation



Week 18


Class 35: Final Project Submission, Course Review


Class 36: Certification Distribution




---


📌 Additional Information


Course Fee: 9,000 BDT (Discounted 7,000 BDT)


Live Classes: Zoom / Google Meet


Lab Support: Virtual Labs included


Certificate: Professional certificate awarded upon completion


Freelancing Guidance: Steps to get work on Fiverr, Upwork,

Course Outcomes

  1. Understand core concepts of Cyber Security and Ethical Hacking.
  2. Identify and analyze common vulnerabilities in networks, systems, and web applications.
  3. Apply penetration testing methodologies in real-world environments.
  4. Use industry-standard tools such as Nmap, Metasploit, Burp Suite, Wireshark, Hydra, and others.
  5. Perform reconnaissance, scanning, exploitation, and post-exploitation tasks effectively.
  6. Secure operating systems, networks, and applications against cyber threats.
  7. Develop hands-on skills with practical labs and simulated attack scenarios.
  8. Gain the foundation needed for Bug Bounty Hunting, CTF competitions, and professional penetration testing jobs.
  9. Build a strong portfolio and confidence to pursue a career in Cyber Security and Ethical Hacking.

Course Curriculum

  • 0 chapters
  • 0 lectures
  • 0 quizzes
  • 120 Hours total length
Toggle all chapters

Instructor

Md Parvej Khan

As the Super Admin of our platform, I bring over a decade of experience in managing and leading digital transformation initiatives. My journey began in the tech industry as a developer, and I have since evolved into a strategic leader with a focus on innovation and operational excellence. I am passionate about leveraging technology to solve complex problems and drive organizational growth. Outside of work, I enjoy mentoring aspiring tech professionals and staying updated with the latest industry trends.

4.8 Rating
17 Reviews
956 Students
2 Courses

Course Full Rating

5

Course Rating
(14)
(2)
(1)
(0)
(0)

Sign In or Sign Up as student to post a review

Student Feedback

Course you might like

Advance
Social Media Security, Verification & Monetization Mastery
0 (0 Rating)
Course Breakdown (8 Weeks – 16 Classes) Week 1: Introduction & Security Basics Class 1: Course Introduction, Importance...
Advance
Cyber Crime Investigation & OSINT Training
5 (1 Rating)
🚨 Become a Certified Cyber Crime Investigator⏳ Program Details:Course Name: Cyber Crime Investigation & OSINT Training...

You must be enrolled to ask a question

Students also bought

More Courses by Author

Discover Additional Learning Opportunities