I T - C O M P U T E R - C I T Y

Cyber Security & Ethical Hacking Course

About The Course

In today’s digital era, cyber threats are escalating at an unprecedented pace. From safeguarding personal data to protecting complex corporate infrastructures, robust cyber security is no longer optional—it’s essential.
This course equips you to think like an ethical hacker: identifying system vulnerabilities and fortifying defenses before malicious actors can exploit them.

img

Rahat Ahmd

Mentor

View Profile
Duration Date & Time Course Fee Discount
3.5 Month (40 Class) 2 Hours a day, 3 days a week 16000 50%

Course Over View

🔘Website Vulnerability Assessment & Protection

SQL Injection (SQLi), Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF)

Local File Inclusion (LFI), Remote Code Execution (RCE)

Session Hijacking and other common web vulnerabilities

Identify, assess, and fix website security flaws

 

🔘Remote Access & System Security

Remote Access Trojan (RAT) analysis and management

System hacking techniques and security bypass

Practical exercises for ethical security testing

 

🔘Networking & Traffic Analysis

Network scanning and mapping with Nmap

Packet analysis using Wireshark

Wireless network assessment with Aircrack-ng

 

🔘Penetration Testing & Bug Hunting

Ethical penetration testing methodologies

Finding, reporting, and mitigating vulnerabilities

Bug bounty preparation and practical exercises

 

🔘Website & CMS Security

WordPress site hardening

Malware detection and removal

Secure configuration practices

 

🔘OSINT & Cyber Reconnaissance

Open-source intelligence gathering

Online location tracking

Threat intelligence techniques

 

🔘Phishing & Social Engineering

Phishing attack simulations

Social media account recovery techniques

Account takeover prevention and disabling concepts

 

🔘Server & Cloud Security

Server security assessment

Vulnerability reporting and mitigation

Secure server configuration practices

 

🔘Digital Forensics & Case Studies

Forensic investigation techniques

Real-world case study analysis

 

Career Opportunity

Freelancing & Remote Work: Offer services like penetration testing, website malware removal, and OSINT on global freelancing platforms.

Penetration Tester / Ethical Hacker: Conduct vulnerability assessments, report findings, and help organizations secure their systems.

SOC Analyst / Security Operations: Monitor networks, detect threats, and respond to security incidents in real-time.

Bug Bounty Hunter: Identify vulnerabilities in websites, apps, or networks and earn rewards from global programs.

Website & CMS Security: Protect and harden WordPress and other CMS-based sites, remove malware, and secure web applications.

Digital Forensics Expert: Investigate cyber incidents, analyze evidence, and prepare forensic reports for organizations.

Phishing & Social Engineering Specialist: Simulate phishing attacks, recover compromised accounts, and educate users on cyber hygiene.

Server & Cloud Security Consultant: Secure servers, cloud infrastructure, and enterprise environments against attacks.