তিন মাসের ইন্টার্নশিপ সহ || মোট ক্লাস ৭২ টি || ৪ মাসের প্রোগ্রাম || লাইভ ক্লাস ৩৬ || সাপোর্ট ক্লাস ৩৬ || লাইভ প্রজেক্ট ১০ টি || জব প্লেসমেন্ট Opportunity|| ব্যাচ ০৯ || ক্লাস শুরুঃ মার্চ ০৯ || রাত ৯ টা
Thesis paper Writing for Cyber Security & Ethical hacking
Think Like a Hacker. Hack Like a Professional. Get Job-Ready.
আপনি কি সত্যিকারের Ethical Hacker হতে চান—শুধু টুল চালানো নয়, বরং আসল হ্যাকিং মাইন্ডসেট শিখতে চান?এই প্রোগ্রামটি তৈরি করা হয়েছে তাদের জন্য, যারা Real-World Hacking Skill দিয়ে ক্যারিয়ার বানাতে চায়।এখানে আপনি শিখবেন হ্যাকাররা যেভাবে সিস্টেম ভাঙে, ঠিক সেভাবেই—কিন্তু 100% Ethical ও Legal পদ্ধতিতে।
Demo Class
Curriculum
- 40 Sections
- 256 Lessons
- 18 Weeks
Expand all sectionsCollapse all sections
- Module 01:Foundation of Cyber Security & Ethical Hacking12
- 1.1Information Security Overview & Understanding Cyber Security
- 1.2Hacking Methodologies and Frameworks
- 1.3Hacking Concepts
- 1.4Ethical Hacking Concepts
- 1.5Information Security Controls
- 1.6CIA Triad
- 1.7AAA Model
- 1.8TCP 3-Way Handshake Process
- 1.9Threat, Vulnerability, Risk
- 1.10Types of Attack (Malware, Phishing, DoS)
- 1.11Quiz for Foundation of Cyber Security & Ethical Hacking0 Questions
- 1.12Project / Assignment for Foundation of Cyber Security & Ethical Hacking
- Module 02: Foundation of Networking14
- 2.1What is networking? Types of Networking
- 2.2OSI Layer and OSI Attack
- 2.3IP Class, IP Types
- 2.4PAN, LAN, MAN, WAN
- 2.5Components of Networking
- 2.6Architecture of Networking
- 2.7Network Topology
- 2.8Network Media
- 2.9Overall Computer System
- 2.10Network Devices (Router, Switch, Firewall)
- 2.11TCP, UDP, DNS, DHCP, ARP
- 2.12Network Ports and Protocols
- 2.13Quiz for Foundation of Networking
- 2.14Project / Assignment for Foundation of Networking
- Module 03: Ethical Hacking Lab Setup & Virtualization14
- 3.1Virtualization overviewCopy
- 3.2How to create a Virtual MachineCopy
- 3.3Overview of Lab setupCopy
- 3.4Requirements of Lab SetupCopy
- 3.5Download VMware Workstation & Oracle Virtual BoxCopy
- 3.6Download Kali Linux, Nessus, Acunetix & BurpsuiteCopy
- 3.7Download Mobexler for Mobile Application Testing
- 3.8Complete Cyber Security lab Setup
- 3.9Install and Setup Nessus
- 3.10Install and Setup Acunetix
- 3.11Install and Setup Burp Suite
- 3.12Quiz for Ethical Hacking Lab Setup & Virtualization0 Questions
- 3.13Install and Setup Mobexler and MobSF
- 3.14Project / Assignment for Ethical Hacking Lab Setup & Virtualization
- Module 04: Kali Linux for Cyber Security & Hacking9
- 4.1Overview of Kali Linux
- 4.2Commands of kali Linux
- 4.3Practicing of kali Linux
- 4.4Linux File System & Commands
- 4.5User & Permission Management
- 4.6Linux Update & Upgradations
- 4.7How to Download & Install Cyber Security tools in Kali Linux
- 4.8Quiz for Kali Linux for Cyber Security0 Questions
- 4.9Project / Assignment for Kali Linux for Cyber Security
- Module 05 : Information Gathering, Footprinting & ReconnaissancePart 01: Active & Passive Information Gathering10
- Module 06 : Information Gathering, Footprinting & ReconnaissancePart 2: Active & Passive Information Gathering7
- Module 07: Network Enumeration9
- 7.1Service Enumeration
- 7.2Port & Protocols Enumeration
- 7.3Software Version Enumeration
- 7.4Operating System Enumeration
- 7.5Enumeartion through nmap
- 7.6Enumeartion through Nikto
- 7.7Enumeartion through NmapAutomator (Advanced Technology)
- 7.8Quiz for Network Enumeration0 Questions
- 7.9Project / Assignment for Network Enumeration
- Module 08: Vulnerability Assessment9
- 8.1Vulnerability Assessments Concepts
- 8.2Vulnerability Assessments on Server by Nessus
- 8.3Vulnerability Assessments on Web Application by Acunetix
- 8.4Vulnerability Assessment Methodology
- 8.5Vulnerability Scanning Techniques
- 8.6Types of Vulnerabilities
- 8.7Vulnerability Assessment Tools
- 8.8Quiz for Vulnerability Assessment0 Questions
- 8.9Project / Assignment for Vulnerability Assessment
- Module 09: Vulnerability Assessments Reporting12
- 9.1Vulnerability Assessments Report Generate
- 9.2Vulnerability Assessments Report Analysis
- 9.3Introduction to VA Reporting
- 9.4Report Structure & Documentation Standards
- 9.5Vulnerability Classification & Severity Rating
- 9.6Scope, Methodology & Assumptions
- 9.7Remediation & Recommendation Writing
- 9.8Report Presentation & Communication
- 9.9Writing Technical Findings
- 9.10Make a Professional Vulnerability Assessments Report for Client
- 9.11Quiz for Vulnerability Assessments Report0 Questions
- 9.12Project / Assignment for Vulnerability Assessments Report
- Module 10: Web Application Overview & Directory Traversal Attacks15
- 10.1HTTP vs HTTPS
- 10.2TCP and UDP
- 10.3Web Server and Application Concept
- 10.4How to Secure Web Application
- 10.5Web Application Hacking Methodology
- 10.6Web Application Threat
- 10.7Discussion on Directory Traversal
- 10.8Directory Traversal Attack by Dirsearch
- 10.9Directory Traversal Attack by Dirbuster
- 10.10Directory Traversal Attack by Gobuster
- 10.11Directory Traversal Attack by FFuf
- 10.12Wordlist for Directory Traversal Attacks
- 10.13Perform Nikto Attack
- 10.14Quiz for Web Application Overview & Directory Traversal Attacks0 Questions
- 10.15Project / Assignment for Web Application Overview & Directory Traversal Attacks
- Module 11: Brute force Attack, Dictionary, Wordlist, Intruder Attack7
- 11.1Discussion on Brute force Attack, Dictionary, Wordlist, Intruder Attack
- 11.2How create a password wordlist
- 11.3How to create a user wordlist
- 11.4Perform Brute force attack and Intruder attack
- 11.5Password and User Cracking through Hydra Attack
- 11.6Quiz for Brute force Attack, Dictionary, Wordlist, Intruder Attack0 Questions
- 11.7Project / Assignment for Brute force Attack, Dictionary, Wordlist, Intruder Attack
- Module 112: SQL Injection AttackAutomated SQLi Attack7
- Module 13: SQL Injection Attack (Manual Testing)6
- Module 14: XSS (Cross-Site Scripting) Attack3
- Module 15: DOS/DDOS Attack7
- Module 16: Mobile Application Security Testing9
- 16.1Mobile Platform Attack Vectors
- 16.2Mobile Security Guidelines
- 16.3Mobile Security tools
- 16.4Mobile Application Security Testing through Mobexler
- 16.5Mobile Application Security Testing through MobSF
- 16.6How to protect Mobile Application from Hacking
- 16.7Mobile Application Security Testing Report Analysis
- 16.8Quiz for Mobile Application Security Testing0 Questions
- 16.9Project / Assignment for Mobile Application Security Testing
- Module 17: CSRF (Cross-Site Request Forgery)0
- Module 18: Perform FTP, Telnet & SSH Attack on Server10
- 18.1Discussion on Metasploit Framework
- 18.2Hacking Methodology
- 18.3Perform FTP Attack
- 18.4Perform SSH Attack
- 18.5Perform Telnet Attack
- 18.6How to Protect from FTP Attack
- 18.7How to Protect from SSH Attack
- 18.8How to Protect from Telnet Attack
- 18.9Quiz for Metasploit framework and Perform FTP, Telnet & SSH Attack0 Questions
- 18.10Project / Assignment for Metasploit framework and Perform FTP, Telnet & SSH Attack
- Module 19: Perform Samba, HTTP Attack on Server6
- Module 20: Malware Analysis10
- Module 21: Familiar with Top Cyber Security Tools9
- 21.1Installing & Configuration Burp Suite tools
- 21.2How to use Burpsuite
- 21.3Setup Proxy with Burpsuite
- 21.4How to use Metasploit framework
- 21.5Nessus, Acunetix, Nmap, Nmap Automator
- 21.6Mobexler & MobSF
- 21.7Kali Linux, Merasploit etc.
- 21.8Quiz for Cyber Security Tools0 Questions
- 21.9Project / Assignment for Cyber Security Tools
- Module 22: Man-in-The Middle Attack6
- Module 23: Session Hijacking and SQL Login Bypass Attack6
- Module 24: LFI (Local File Inclusion)9
- Module 25: Liver Server Hacking5
- Module 26: Social Engineering Attack8
- Module 27: TryHackMe, Vulnhub, Hack the Box5
- Module 28: Cryptography10
- 28.1Cryptography Concepts
- 28.2Plaintext & Ciphertext
- 28.3Symmetric and Asymmetric Algorithm
- 28.4Digital Certificate & Digital Signature
- 28.5C-I-Authenticity
- 28.6Hardware Security Module (HSM)
- 28.7Public key & private Key
- 28.8Encryption & decryption process
- 28.9Quiz for Cryptography0 Questions
- 28.10Project / Assignment for Cryptography
- Module 29: Physical and Environmental Security of Data Center6
- Module 30: ICT Security Policy & IT Audit6
- Module 31: Incident Response & Cyber Laws7
- Module 32: Freelancing (Part 01)4
- Module 33: Prepare & Set Up Freelancing Profile & PortfolioFreelancing Part 025
- Module 34: Bug Bounty5
- Module 35: Freelancing and Bug Bounty Hunting: Finding Clients / Opportunities4
- Module 36: Internship, Job Preaparation and Placement5
- Final Exam3
- Thesis paper Writing for Cyber Security & Ethical hacking3
- Graduation Day0
- Call for Internship & Job Placement0
হ্যাঁ। একদম Beginner থেকেও এই কোর্স শুরু করা যাবে।
আমরা Zero থেকে ধাপে ধাপে শেখাই।
IT ব্যাকগ্রাউন্ড থাকলে সুবিধা হবে, তবে বাধ্যতামূলক নয়।
সব বেসিক আমরা কোর্সের মধ্যেই কভার করি।
Cyber Security Engineer
SOC Analyst
Ethical Hacking / Security Testing
Cyber Security Trainee
Freelancing & Bug Bounty
এই প্রোগ্রামটি Hands-On, Live Lab ও Real-World Scenario–ভিত্তিক।
নিজস্ব ল্যাপটপ/ডেস্কটপ
Minimum 8GB RAM (Recommended)
Stable Internet Connection
শেখার আগ্রহ ও সময় দেওয়ার মানসিকতা
কোর্স সফলভাবে সম্পন্ন করলে Certificate of Completion প্রদান করা হবে।
Job Placement & Internship Opportunity
Online
⭐ Zero to Job Ready Approach
⭐ Practical-Focused Learning
⭐ Beginner-Friendly Mentorship
⭐ Bangladesh Job Market Focus
Requirements
- বেসিক কম্পিউটার ও ইন্টারনেট ব্যবহারের ধারণা
- Windows OS ব্যবহারের প্রাথমিক জ্ঞান
- Networking-এর বেসিক ধারণা (IP, Port, DNS – থাকলে ভালো)
- Cyber Security ও Ethical Hacking শেখার আগ্রহ
- নিজস্ব ল্যাপটপ বা ডেস্কটপ
- Minimum: 8GB RAM (Recommended)
- স্টেবল ইন্টারনেট কানেকশন
- একদম Beginner হলেও সমস্যা নেই — আমরা Zero থেকে শুরু করে ধাপে ধাপে শেখাবো।
- আজ আপনি Beginner, কোর্স শেষে Job-Ready Cyber Security Professional
Features
- একদম বেসিক থেকে শুরু করে ইন্ডাস্ট্রি-রেডি স্কিল পর্যন্ত ধাপে ধাপে শেখানো হয়।
- থিওরি কম, বাস্তব কাজ বেশি—Live Lab ও Real-World Scenario ভিত্তিক ট্রেনিং।
- Industry-used tools ব্যবহার করে শেখানো হয় (Scanning, Testing, Defense)।
- Client ও corporate-level রিপোর্টিং শেখানো হয়।
- Job Placement & Internship Opportunity
- Job interview guideline, career roadmap ও practical tips দেওয়া হয়।
- Local + International job requirement অনুযায়ী কোর্স ডিজাইন।
Target audiences
- Computer Science / IT ব্যাকগ্রাউন্ডের শিক্ষার্থী
- Non-IT হলেও Cyber Security-তে আগ্রহী
- যারা Cyber Security / Ethical Hacking জব টার্গেট করছেন
- Freelancing / Bug Bounty / Ethical Hacking-এ আগ্রহী
- IT ব্যাকগ্রাউন্ড বাধ্যতামূলক নয় — আমরা Zero থেকে শুরু করি।
- যারা Bank, Remote / International Opportunity খুঁজছেন