Cyber Security & Ethical Hacking

Secure Payment Confirmation

Price is a subject for European Value Added Tax (VAT). If you live outside of EU, you won't have to pay VAT. If you do live in EU, we will automatically calculate correct amount of VAT based on your billing country.
Total:

Questions

For how long can I access this course?

You need to pay for the course only once in order to get full access. We guarantee you will have access to all course content for at least 1 year from purchase date, in most cases you will have access indefinitely.

From what devices I can access course materials?

You can access course materials from a Laptop, iPhone, iPad, Android, Windows Phone and virtually any device with modern Internet browser. Live tutoring is limited to PC, Mac and Linux only at the moment.

Can I get my money back?

If you purchased the course and for some reasons are not satisfied with it, please contact us at support@eliademy.com and we will resolve the problem.

How sales tax is calculated?

Price is a subject for European Value Added Tax (VAT). If you live outside of EU, you won't have to pay VAT. If you do live in EU, we will automatically calculate correct amount of VAT based on your billing country.

Instructor

Mehedi Hasan

Asst. Manager

I am working at Brother International. My area of interest is Information Security, Electronics, Digital Forensic and Embedded System as well as Industrial Automation & Security. Before that, I worked with some largest group of company. Also, I have a long term experience to work with Law enforcement and intelligence agencies. I became practically experienced with bellow topics. * Ethical Hacking Countermeasure and Information Security. * Industrial Automation and Electronics Circuit Repairing & Design. * Network Technology like LAN, MAN, WAN, WIFI. * PLC programming with Ladder Logic, DC & AC relay & timer, different types of sensors etc. * ATMEL, PIC and RENESAS Microcontrollar using C/C++. * Keylogger, Phishing method, Metasploit, Kali Linux, Core-impact & some forensic tools/OS. * Electronics & ICT based seminars & workshops. * Visited Indonesia, Malaysia, Singapore, Thailand, Nepal, Vietnam & India.

Reviews

Course reviews will be shown here

Overview

Lecture # 1 –Introduction to Cyber Security & Ethical Hacking
Lecture # 2 - Introduction to Hacking, IP Addresses, IP Enumeration, Finding out IP Addresses, Image Tracking, File Tracking, Tracing an IP Address and Tracing a Mobile Phone
Lecture # 3 -NAT, Internal VS External IP Addresses, IP Address Hiding, Perfect Cyber Crime, Proxy Server, Unblocking Websites, People Hacking, VPN and HTTP Tunneling
Lecture # 4 -Network Reconnaissance & Information Gathering Part 1
Lecture # 5 -Network Reconnaissance & Information Gathering Part 2
Lecture # 6 -Network Reconnaissance & Information Gathering Part 3 
Lecture # 7 - Trojans, Keyloggers and Spyware Attacks
Lecture # 8 -Password Cracking Attacks Part 1
Lecture # 9 -Password Cracking Attacks Part 2
Lecture # 10 -DOS Attacks, Distributed DOS Attacks, Data Encryption, Data Hiding and Steganography - Part 1
Lecture # 11 -Steganography -Part 2, Phishing Attacks, Link Manipulation Attacks & Open Redirection Attacks
Lecture # 12 -Cross Site Scripting Attacks, Cookie Stealing and Session Hijacking
Lecture # 13 - 25 Attacks with Backtrack
Lecture # 14 -Wi-Fi Hacking - Part 1
Lecture # 15 -Wi-Fi Hacking - Part 2
Lecture # 16 - Reverse & Bind Shell Attacks
Lecture # 17- Social Engineering Toolkit Attacks
Lecture # 18- Kali and POS Hacking
Lecture # 19- Honeypots & Computer Forensics
Lecture # 20- ARP Poisoning
Lecture # 21- SQL Injection and Q& A Session Hands on workshop & Q&A-LIVE

Course content

  • 1. Introduction to Cyber Security & Ethical Hacking

  • 2. IP Enumeration, Image Tracking,Tracing an IP Address and Tracing a Mobile Phone

  • 3. Internal VS External IP Addresses, IP Address Hiding, Perfect Cyber Crime, Proxy Server.

  • 4. Network Reconnaissance & Information Gathering Part i

  • 6. Network Reconnaissance & Information Gathering Part iii

  • 5. Network Reconnaissance & Information Gathering Part ii

  • 16. Reverse & Bind Shell Attacks

  • 9. Password Cracking Attacks Part ii

  • 7. Cyber Security & Ethical Hacking

  • 10. DOS Attacks, Distributed DOS Attacks, Data Encryption, Data Hiding and Steganography - Part i

Interested? Enroll to this course right now.

There is more to learn