Skip to content
Browse Courses
Android App Development
AR-VR
ArcGIS
AUTOCAD
BCS
Big Data and Machine Learning
Case Solving
Complete Career Path
Content Marketing
CV Writing
Cyber Security
Data Analytics
Data Structure & Algorithm
Django
English Grammar
Entrepreneurship
Free Course
Graphic Design
GRE
IBA-MBA
Home
Courses
Career Paths
Learning Paths
Fundraising in Singapore
IELTS Live Course
Special Features
Hire Best Talents
Live Support Session
Career
Business
Blogs
Affiliation
Live Chat
0
Login
Sign Up
Home
Category
Search
Cart
Menu
Find your desired course
Home
Courses
Career Paths
Learning Paths
Fundraising in Singapore
IELTS Live Course
Special Features
Hire Best Talents
Live Support Session
Career
Business
Blogs
Affiliation
Live Chat
Sign In
Select Your Favourite
Category
And Start Learning.
Android App Development
AR-VR
ArcGIS
AUTOCAD
BCS
Big Data and Machine Learning
Case Solving
Complete Career Path
Content Marketing
CV Writing
Cyber Security
Data Analytics
Data Structure & Algorithm
Django
English Grammar
Entrepreneurship
Free Course
Graphic Design
GRE
IBA-MBA
Lesson List
Introduction to Cyber Security & Ethical Hacking
Career Path Course Outline
Introduction
00:16:27
Elements of information security
00:12:17
System security concept
00:10:43
Network security concept
00:11:50
Types of cyber attack
00:21:33
Security testing methodology
00:13:09
VPN & secure communication_1
00:12:18
Secure communication protocols
00:18:01
Web applications basics & architecture
00:12:49
SOC
00:27:04
Tools
00:17:46
Types of password cracking
00:20:04
Session hijacking
00:21:17
Vulnerability classification
00:15:23
Hacking web servers
00:26:59
Evading ids & firewalls
00:25:55
Live Class 01: Foot Printing and Enumeration
Live Class 02: Operating System for Security testing (Kali Linux, BackBox, ParrotSec)
Live Class 03: Introduction to Vulnerability Assessment and Scanning
Live Class 04: System Scanning techniques and reporting
Live Class 05: Network and Database/Compliance Scanning techniques and reporting
Live Class 06: Web application scanning techniques and reporting
Live Class 07: Cryptography in security testing
Live Class 08: Penetration Testing Tools and methods
Live Class 09: System Hacking/Exploitation techniques
Live Class 10: Exploitation of Metasploitable 2 using Metasploit Framework
Live Class 11: Understanding Web application Penetration Testing
Live Class 12: Broken access control/Broken authentication
Live Class 13: Cross-site scripting (XSS) and HTML Injection
Live Class 14: Cross-site request forgery (CSRF) and Server-side request forgery (SSRF)
Live Class 15: SQL injection – Basic
Live Class 16: SQL injection – Advanced
Live Class 17: Introduction to webshell, backdoor and shelling techniques
Live Class 18: Remote code execution (RCE)
Live Class 19: Insecure direct object reference (IDOR)
Live Class 20: Network penetration testing
Live Class 21: Mobile Application Scanning and Penetration Testing
Live Class 22: Python in Cyber Security
Live Class 23: Security audit, compliances and security hardening
Live Class 24: Ethics and Cyber Law of Bangladesh
Go to Course Home
Career Path Course Outline
Attachments
Final-course-outline-Interactive-Cares-3-Months (2) (2).pdf
188.65 KB
Next →
Enhance Your Learning
Privacy Policy
Terms of use
Navigate
Courses
FAQ
Document
Support
Resources
Join Our Newsletter List
Name*
Email*
Login
Remember Me
Forgot Password?
Create a new account
First Name
Last Name
Email
Phone Number
Subject
Message
Upload Your Query Screenshot ( jpg, png, pdf, doc, docx and File Size 2MB)
Submit Your Query
Insert/edit link
Close
Enter the destination URL
URL
Link Text
Open link in a new tab
Or link to existing content
Search
No search term specified. Showing recent items.
Search or use up and down arrow keys to select an item.
Cancel