Visit us:
6B Bluewater Shopping City (5th Floor), Sylhet 3100Map
Back to Courses
Enrolling Now - Join Active Batch

Cyber Security & Ethical Hacking

Master the art of ethical hacking and cybersecurity. Learn penetration testing, vulnerability assessment, and bug bounty hunting with hands-on practice in real-world scenarios.

Duration

3 Months

Schedule

3 Days/Week

Students

25+ Enrolled

Level

Intermediate

Join This Batch

Enrollment open for current batch

Current Status

Batch Running

Course Fee

৳10,500

Full course with certification

⚠️ Enrollment open - join active batch

5th Floor, Lift-5
Bluewater Shopping City
Zindabazar, Sylhet

Complete Course Module

Security Fundamentals

  • Kali Linux: Installation, configuration, essential tools
  • Parrot Security OS: Alternative security distribution
  • Ubuntu: Linux command line and server basics
  • Networking: TCP/IP, protocols, network architecture

Information Gathering

  • Footprinting: Passive reconnaissance techniques
  • Scanning: Network discovery and enumeration
  • Nmap: Advanced port scanning and OS detection
  • Wireshark: Network traffic analysis and packet sniffing

Attack & Exploitation

  • System Hacking: Password cracking, privilege escalation
  • Malware Analysis: Virus, trojans, ransomware behavior
  • Phishing: Social engineering attacks and defenses
  • Sniffing: Man-in-the-middle attacks, ARP poisoning
  • DDoS Attacks: Denial of service techniques and mitigation

Web Application Security

  • SQL Injection: Database exploitation techniques
  • XSS Injection: Cross-site scripting attacks
  • CSRF & SSRF: Request forgery vulnerabilities
  • OWASP Top 10: Most critical web security risks

Advanced Skills

  • Penetration Testing: Full security assessment methodology
  • Bug Bounty: Finding and reporting vulnerabilities for rewards
  • IDS/IPS: Intrusion detection and prevention systems
  • Programming: Python scripting for security automation
  • Report Writing: Professional penetration testing reports

Hands-On Training

CTF Challenges

Capture The Flag exercises for skill building

Lab Environment

Safe, isolated testing environments

Real Scenarios

Practice on vulnerable applications

Bug Bounty Prep

Start earning from platforms like HackerOne

Who Should Enroll?

IT professionals & system admins
Web developers & programmers
Network engineers
Security enthusiasts
Bug bounty hunters

Prerequisites

Good computer knowledge
Basic networking concepts
Familiarity with Linux (helpful)
Basic programming knowledge (helpful)

Level: Intermediate - Some technical background recommended

Career Paths

Penetration Tester
Security Analyst
Bug Bounty Hunter
Security Consultant
SOC Analyst

⚠️ Ethical Use Only

All skills taught are for ethical and legal purposes only.

Students must follow responsible disclosure practices and never use these skills maliciously.

Questions?

Want to discuss prerequisites or late entry?

Become an Ethical Hacker

Master cybersecurity skills in just 3 months. Learn from experts, practice in safe environments, and start your career in one of the most in-demand fields.