Syllabus For Cybersecurity and Ethical Hacking Course

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

PARADISE COMPUTER ACADEMY

(Under Logik Eye Forensics, Logik Tech Service and Paradise Computer
Academy, of Bangladesh) Karamtola Bazar, Tong-Kaligonj highwar,
Gazipur https://logikeyeforensics.com

Cyber Security and Ethical Hacking


Cyber Security and Ethical Hacking 15 Weeks. (4 Hrs. per day)


Medium of Instruction: Bilingual (English& Bangla)

This course introduces the concepts of Cyber security and Ethical Hacking,
providing learners with the opportunity to explore various tools and
techniques in Ethical Hacking and Security. It enables them to identify and
Objective analyze the stages necessary for an ethical hacker to compromise a target
system, while also instructing them on the application of preventive,
prevent
corrective, and protective measures to safeguard the system. Upon
completion of this course, candidates will be proficient in identifying tools
and techniques for conducting penetration testing, critically evaluating
security methods for protecting sy
system
stem and user data, and demonstrating a
systematic understanding of security concepts at the policy and strategy
levels within a computer system.
system

B.E*/B.Tech.* / B.Sc. - M.Sc. / Graduate / Diploma in any stream with


Basic Knowledge of Programming or B.C.A*. / M.C.A. pursuing or qualified Eligibility
or NIELIT O-Level / NIELIT A-Level
Level Qualified or 10+2 qualifie

 Candidate must have latest computer/laptop with


preferably 8 GB RAM or higher
Prerequisites  Internet connection with good speed
(preferably 2 Mbps or higher).

Rs. 3500
000/- incl. all other charges. Course Fees
Hard Copy of Certificate will be provided to the participants, based on
Certificate minimum 75% attendance and on performance (minimum 50%
marks) in the online test, conducted at the end of the course.

 Instructor-led live classes.


 Instructor-led hands
hands-on lab sessions using Virtual
Lab.
Methodology
 Tools will be shared through the portal for practice.
practice..
 Assessment and Certification

Step-1: Read the course structure & course requirements carefully.


Step-2: Collect a registration form and submit after filling up.
up
Step-4: Use a mobile number for verification or email ID and then
How to Apply
submit your documents, and Pay the Fees using ATM-DebitATM Card /
Credit Card
rd / Internet Banking / Mobile bangking / Cash etc.
PARADISE COMPUTER ACADEMY
(Under Logik Eye Forensics, Logik Tech Service and Paradise Computer
Academy, of Bangladesh) Karamtola Bazar, Tong-Kaligonj highwar,
Gazipur https://logikeyeforensics.com

Course Content

Day Topic Day Topic Day Topic


Day Introduction to Hacking Day Information & Network Day IP and Network Scanning
#01 and security #02 Reconnaissance #03
Web Applications hacking Social Engineering
Day Digital Systems Day Day
#04 hacking #05 #06
Day Smartphone Day Satellite data signal hacking Day
Deep-Fake
Fake technology
#07 hacking #08 #09
Day Day Radio frequency hacking Day GSM Network hacking
WiFi network hacking
#10 #11 #12
Day Aircraft System Day Signal jamming Day Cloud system hacking
#13 hacking #14 #15
Day Setup Lab and Day Day
Crypto-currency and Vulnerability assessment
#16 introduction with Linux #17 #18
Cryptography and Analysis
Day Malware attacks Day Day
Phishing attack Smart Card Hacking
#19 analysis #20 #21
Day Man-in-the middle Day Day
Concepts of Digital Forensics Hacking Exploit
#22 attack #23 #24
development with python
Cyber Crime & Law
Day Day
Project and Paper writing
#25 #26

Course Coordinator

Mehedi Hasan
Founder Owner
Owner,
LOGIK EYE FORENSICS,
PARADISE COMPUTER
ACADEMY,
LOGIK TECH SERVICE
Email: mehedi0001@yahoo.com
Mobile Number: +8801601019511,
+8801766442199

CLICK HERE TO
REGISTER
PARADISE COMPUTER ACADEMY
(Under Logik Eye Forensics, Logik Tech Service and Paradise Computer
Academy, of Bangladesh) Karamtola Bazar, Tong-Kaligonj highwar,
Gazipur https://logikeyeforensics.com
Course Syllabus
Day Detailed Conceptual Topic Hands On lab
Introduction to Hacking and security Study of ethical hacking,
Information security, IP
Address, virtual machine,
 Understanding Ethical Hacking MAC/IMEI.
Day1  Hacking vs. Ethical Hacking
Practice on VPN
 VPN and IP changer installation, IP address
changing, MAC changer,
 Location changer virtual machine setup,
 MAC/IMEI Changer Install tor browser, access
in dark wave.
 Virtual Machine setup
 OS Setup on VMware Machine
 Dark Web with Tor browser
 Ensure security and be confirm you are an anonymous user
 IP Address Scanning
 Find real IP

Information & Network Reconnaissance Practice on information


gathering; install hacking
Day2
 Introduction to Information Gathering, Phases of I.G
tools, creating a https link
to capture remote
 Information Gathering Techniques locations IP address.
 Foot printing Creating an account to
get someone’s IP
 Steps of hacking address by email
 Popular hacking tools sending.
 IP hacking with link
 IP hacking with Email
IP and Network Scanning Hands-on lab on
Information Gathering
 Scanning Tools and Techniques and its
Day3  Concept of Email Spoofing, countermeasures.
 E-mail Security
 Port Scanning and Service Enumeration
 IP Tracking System
 Remote IP hacking technique
 IP Address Analysis
Digital Systems hacking Hands-on lab on
vulnerability
 Exploiting System Vulnerabilities assessment with kali
 Introduction to Virus/Trojan/Spyware/Keylogger linux, windows system
Day4  Windows OS hacking hacking with
keylogger.
 Password Cracking types
 Brute Force Attacks
 IoT Hacking tools ( With Raspberry pi )
 IoT system hacking
PARADISE COMPUTER ACADEMY
(Under Logik Eye Forensics, Logik Tech Service and Paradise Computer
Academy, of Bangladesh) Karamtola Bazar, Tong-Kaligonj highwar,
Gazipur https://logikeyeforensics.com
Web Applications hacking Hands on Lab on Trojan
Day5 Virus & its
 Common Web Application Vulnerabilities, Countermeasures, email
 Denial of Service (DoS), hacking, email header
collection, header
 SQL Injection, XSS, CSRF, and more
analysis,
 Web Application Scanners
 Email Hacking
 Email Header collection, Email header analysis
 Password Cracking
 Brute Force Attack in Web Application
Social Engineering Hands on lab on
Steganography, SMS spoofing,
Call spoofing,
Day6  Psychology of Social Engineering
 Phishing with java script, SET and Web
 Stereography
 Information Hiding
 Stego Analysis
 SMS and Call spoofing
 Social Engineering Countermeasures
Smartphone hacking Hands on lab on Android
spy, Operation ou Termux,
Day7 android device hacking and
 Mobile Device Security countermeasures

 Android and iOS Exploits


 APK exploit
 Termux and basic application
 Android Device hacking
 Android Spy
 Android Exploit
Satellite data signal hacking Hands on lab on satellite
Day8 data receiving and
 Satellite Communication Overview decoding, GNU Radio
 Introduction with NOAA, ROSMOSCOS and others satellite setup, find a target
 Intercepting and Decoding Weather Satellite Signals satellite and capture
 Introducing with GNU Radio signal.
 Capturing and decoding satellite signals
 Security Implications
Deep-Fake technology Hands on lab on Deep-
fake, Creating Deep-
 Understanding Deep-Fakes Technology fake video and image.
Day9
 Making Deep-Fakes video or image
 Creating Deep-fake movie with python script
 Deep-face detection and Action
PARADISE COMPUTER ACADEMY
(Under Logik Eye Forensics, Logik Tech Service and Paradise Computer
Academy, of Bangladesh) Karamtola Bazar, Tong-Kaligonj highwar,
Gazipur https://logikeyeforensics.com
WiFi network hacking Hands on lab wifi
hacking
Day10  Wireless Network Security
 WEP, WPA, and WPA2 Cracking
 WiFi hacking with Kali Linux
Radio frequency hacking Hands on lab on radio
Day11 signal receiving tools
 Basic Concept RF Communication install, recording and
 Intercepting RF Signals decoding,
 Software define radio setup
 Receive and Decrypt different types of RF signals.
 RF Security Measures
 Basic operation of Antenna
 Basic concept of Wireshartk
GSM Network hacking Hands on lab on
sniffing bts, base
Day12
 GSM Architecture and Vulnerabilities station, collect IMSI
 Intercepting BTS Traffic number, LAC, CELL
 Mobile Network Security ID, Find fake BTS,
SMS capturing system
 Detect Fake BTS open BTS etc. with wireshark and its
 Basic concept of 2G Interceptor Countermeasures.
 Capturing SMS and 1G GSM Data with Wireshark
Aircraft LD System hacking Hands on lab on ADS-
B setup, Civil aviation
 Introduction with Aircraft Landing System tracking, Source and
Day13
 ADS-B signal decoding target Location
 ADS-B Airplane Tracking tracking,
 Basic concept of Global Civil Aviation System
 Case Studies and Mitigation
Signal jamming Hands on lab on FM,
WiFi, MW, GSM
 Jamming Techniques and Equipment jamming and its
Day14
 FM signal jamming (short range) Countermeasures.
 WiFi Jamming (short range)
 MW signal jamming (short range)
 GSM signal jamming (short range)
 Jamming Detection and Prevention
Cloud system hacking Hands-on lab on cloud
based systems
Day15
 Cloud Security Models information capturing.
 Google Drive
Setup Lab and introduction with Linux Hands-on lab on
Installing and
Day16  Lab Environment Setup configuring
 Introduction to Kali Linux, Arch Linux, Ubuntu etc.
PARADISE COMPUTER ACADEMY
(Under Logik Eye Forensics, Logik Tech Service and Paradise Computer
Academy, of Bangladesh) Karamtola Bazar, Tong-Kaligonj highwar,
Gazipur https://logikeyeforensics.com
Crypto-currency and Cryptography Hands-on lab on crypt
currency account
Day17  Crypto currency Fundamentals opening.
 Cryptographic Techniques
Vulnerability assessment and Analysis Hands-on lab on
Penetration Testing
Day18  Introduction with Assessment using Metasploit
 Web based Vulnerability Assessment
 System based Vulnerability Assessment
 Metasploit framework
 Nessus Professional
 Nicto, OpenVAS
 Introducing with Acunetix web vulnerability scanner
Day19 Malware attacks analysis Hands-on lab malware
analysis
 Malware Types and Analysis
 Basic of Static and Dynamic Analysis
 Malware Defense Strategies
Phishing attack Hands-on lab on SET,
Day20 Gmail phishing,
 Phishing Techniques facebook fishing,
 Phishing with Metasploit and SET phishing with java script.
 Phishing and Vesting
 Email and Website Spoofing
 Anti-Phishing Measures
Smart Card Hacking Hands-on lab microcio
hex file extraction,
Day21  RFID Hacking Credit card number
 Basic concept of microchip generating, NID and
 Credit card cloning RFID cloning technique.
 NID cloning
Day22 Man-in-the middle attack Hands-on lab on GSM
 MITM Concepts and Techniques sniffing
 ARP Poisoning and SSL Stripping
 MITM Detection and Prevention
 GSM Sniffing
 RF Poisoning
 IMSI Catcher
 LTE Interceptor
Day23 Concepts of Digital Forensics Hands-on lab on
 Digital Forensics Fundamentals windows forensics, USB
 Evidence Handling and Preservation forensics, imaging, etc.
 USB Forensics
 Windows Forensics
 Gmail Forensics
PARADISE COMPUTER ACADEMY
(Under Logik Eye Forensics, Logik Tech Service and Paradise Computer
Academy, of Bangladesh) Karamtola Bazar, Tong-Kaligonj highwar,
Gazipur https://logikeyeforensics.com
 Digital Forensic Tools
 Digital Forensics Report
 Lost Data Recovery
 Partition Recovery
Day24 Hacking Exploit development with python Hands-on lab on exploit
 Python for Hacking development
 Exploit Development Basics
 Modifying Custom Exploits
Day25 Cyber Crime & Law Open discussion
 Cybercrime Laws and Regulations
 Legal and Ethical Aspects of Hacking
 Ethical Hacking Codes of Conduct
Penetration testing using Metasploit Framework
 Introduction to Penetration Testing,
Day26 Hands-on lab on
 Penetration testing methodology and types,
 Popular penetration testing tools penetration testing with
metasploit framework.
Assessment
 Final Project Presentation
 Research Paper Writing
 Quizzes and Assignments
 Hands-On Labs and Projects
 Final Exam
 Research Paper
Prerequisites: Basic understanding of computer networking and
operating systems.
Note: Ethical hacking should always be conducted within legal and
ethical boundaries. The course will emphasize responsible and
legal hacking practices.
PARADISE COMPUTER ACADEMY
(Under Logik Eye Forensics, Logik Tech Service and Paradise Computer
Academy, of Bangladesh) Karamtola Bazar, Tong-Kaligonj highwar,
Gazipur https://logikeyeforensics.com

Appendix

Few International Hacking Certifications include


1. CEH
1. GIAC
2. OSCP
3. CREST

Useful Websites to Learn Ethical Hacking

1. Hack this Site Link: https://www.hackthissite.org

2. Hack a day Link : https://hackaday.com

3. Hacker 101 Link : https://www.hacker101.com

4. EC-Council Link : https://www.eccouncil.org

5. Cybrary Link : https://www.cybrary.it

6. Hack This Site Link: https://www.hackthissite.org

7. Hacking Tutorial Link http://www.hacking-tutorial.com

8. Break the security Link: https://breakthesecurity.cysecurity.org

THE END

You might also like