Background
Background

1700 Students enrolled in the course

384 Reviews

Cyber Security & Ethical Hacking

As more of our lives move online, cyber threats are rising fast. By 2025, cybercrime is expected to cost the world around USD 10.5 trillion every year. Hackers are using smarter tools like AI-driven scams, ransomware, and stolen logins and industries such as healthcare, finance, and manufacturing are being hit the hardest. But this growing problem also means huge opportunities. Companies everywhere are investing in stronger security, from cloud protection to zero-trust systems, and they need people who can step in and defend them. Roles in ethical hacking, security analysis, and threat hunting are in high demand, with more jobs opening every year. That’s where our course comes in. We give you practical, hands-on skills to break into cybersecurity, protect organizations, and build a stable, rewarding career in one of today’s fastest-growing fields.


4 Month

Course Duration

2+

Industrial Project

36

Classes

16

Bonus Track

Exclusive Solutions That Set Us Apart :

Online Live Batch

Review Class

Lifetime Support

Practice Lab Support

Class Videos

Job Placement Support

Course Key Highlighted:
  • 7 Days One to one Mentor Support

  • Practice Lab

  • Backup Class

  • Job Preparation Support

  • Extra Class

  • Career Placement Support

  • Corporate Access Program (CAP)

  • Marketplace Account Open Support

Job Opportunities:

Ethical Hacker / Penetration Tester

Security Analyst

Security Engineer

System Engineers

IT Security Consults

Application Security Engineer

Governance, Risk, And Compliance (GRC) Officer

Banking & Finance

Telecommunications

Class Structure & Distribution of Total 52 Classes:

(For Offline Course)

Offline Class - Onsite in Campus: 36 Class


On Campus (Theory)

12 Classes - Per Class 2 Hrs

On Campus (Lab)

24 Classes - Per Class 2 Hrs

Extra Online & Recorded Class: 16 Class


Online Extra Live Class

4 Classes - Per Class 1+ Hrs

Required Recorded Videos

12 Classes - Duration Variable

Course Prerequisite:

Basic Knowledge of Using Computer

Desktop / Laptop

Internet Connection

This Course is Designed for

(Everyone)

Students

Anyone interested to learn Cyber Security

Job seekers

Entrepreneurs

Software You'll Learn:

(AI Driven)

Kali Linux

Kali Linux

VMware

VMware

Ettercap

Ettercap

Hydra

Hydra

Burp Suite

Burp Suite

Metasploit

Metasploit

Nessus

Nessus

Nmap

Nmap

Snort

Snort

Wireshark

Wireshark

ZAP

ZAP

Accuntix

Accuntix

Course Outline Structure

Provide required PDF + Class Recordings to ensure the best learning for our students.

1 Module

51 Classes

2 Projects

49 Topics

42 Resources

Duration: 51 Classes

Focus:

CEH Exam

Class Type Breakdown:

  • Offline (Theory): 8 Classes
  • Recorded Video: 12 Classes
  • Lab (Practical): 23 Classes
  • Online Theory: 4 Classes
  • Lab (Exam): 4 Classes

Projects Included: 2 Projects

Career Path:   Cyber Security Analyst | Penetration Tester | Ethical Hacker | SOC Analyst | Security Consultant | Vulnerability Assessor

Prerequisites:   N/A


Key Highlights:

  •   Ethical Hacking Methodologies & Frameworks
  •   Linux for Ethical Hackers
  •   Network Scanning, Enumeration, and Exploitation
  •   Malware Analysis, Social Engineering, and DoS Attack Simulation
  •   Web Application Hacking (SQLi, XSS, Burp Suite, OWASP)
  •   CTF Practice, Career Guidance, and Freelancing Preparation

Projects:

  •   1) Server Site Exploitation
  •   2) Web Site Exploitation

Class No. Class Type Topic/Lesson Resource Type
Class 1 Offline (Theory) Introduction to Ethical Hacking
PDF
Class 2 Recorded Video Linux File Hierarchy
Recorded Video
Class 3 Lab (Practical) Getting Familiar with Linux 1 (File Folder Management)
PDF
Class 4 Lab (Practical) Getting Familiar with Linux 2 (User and Package Management)
PDF
Class 5 Recorded Video Job and Process Management, File Compression
Recorded Video
Class 6 Lab (Practical) Getting Familiar with Linux 3 (File Permission Management)
PDF
Class 7 Offline (Theory) Networking Concept 1
PDF
Class 8 Recorded Video OSI and TCP/IP Model
Recorded Video
Class 9 Lab (Practical) Networking Concept 2
PDF
Class 10 Offline (Theory) Networking Concept 3
PDF
Class 11 Offline (Theory) Web Technology
PDF
Class 12 Recorded Video Web Application Architecture
Recorded Video
Class 13 Online Theory Online Practice
N/A
Class 14 Lab (Exam) Skill Test 1 - Class test 1
N/A
Class 15 Recorded Video Penetration Testing Methods
Recorded Video
Class 16 Lab (Practical) Footprinting and Reconnaissance 1
Class Video
Class 17 Lab (Practical) Footprinting and Reconnaissance 2
Class Video
Class 18 Recorded Video Deep and Dark Web
Recorded Video
Class 19 Lab (Practical) Scanning Networks
Class Video
Class 20 Lab (Practical) Networks Enumeration
Class Video
Class 21 Offline (Theory) Vulnerability Analysis
PDF
Class 22 Recorded Video Nessus and Acquinitix
Recorded Video
Class 23 Lab (Practical) System Hacking 1
Class Video
Class 24 Lab (Practical) System Hacking 2
Class Video
Class 25 Recorded Video Metasploit Framework Overview
Recorded Video
Class 26 Online Theory Online Practice
N/A
Class 27 Lab (Practical) System Hacking 3 (Escalate Privileges)
Class Video
Class 28 Lab (Exam) Skill Test 2 - Mid exam
N/A
Class 29 Recorded Video Malware Types
Recorded Video
Class 30 Lab (Practical) Malware Threats (Linux and Windows)
Class Video
Class 31 Offline (Theory) Social Engineering 1
PDF
Class 32 Lab (Practical) Social Engineering 2
Class Video
Class 33 Lab (Practical) Denial-of-Service
Class Video
Class 34 Lab (Practical) Sniffing and Session Hijacking
Class Video
Class 35 Online Theory Online Practice
N/A
Class 36 Lab (Exam) Skill Test 3 - Class test 2
N/A
Class 37 Recorded Video Web Lab Setup and Site Mapping
Recorded Video
Class 38 Lab (Practical) Hacking Web Applications 1
Class Video
Class 39 Lab (Practical) Hacking Web Applications 2
Class Video
Class 40 Lab (Practical) Hacking Web Applications 3
Class Video
Class 41 Lab (Practical) Hacking Web Applications 4
Class Video
Class 42 Lab (Practical) SQL Injection (manual)
Class Video
Class 43 Recorded Video Additional SQL Injectional
Recorded Video
Class 44 Lab (Practical) SQL Injection (automated)
Class Video
Class 45 Lab (Practical) CTF Overview Platform 1
Class Video
Class 46 Lab (Practical) CTF Overview Platform 2
Class Video
Class 47 Recorded Video Wifi Hacking
Recorded Video
Class 48 Offline (Theory) Career Discussion and Advance Guideline
N/A
Class 49 Online Theory Marketplace Overview
N/A
Class 50 Offline (Theory) Portfolio Making
Class Video
Class 51 Lab (Exam) Skill Test 4 - Final
N/A

Admission Is Going On

Enroll now to any of our Offline Courses (On- Campus)

Background Pattern

Course Fee Offline

BDT. 30,000

Get Admission
Get Discount

Online (Live Class) courses as per your suitable time.

Background Pattern

Course Fee Online

BDT. 15,000

Get Admission
Get Discount

Some of the Creative Projects Done by Our Students


Students Shared Their Feedback

Course Related FAQ

Answer : Cybersecurity is protecting computers, networks, and data from hackers and online attacks. It’s important now because businesses, banks, and even our daily lives depend on digital systems. Without proper security, sensitive data can be stolen, causing financial loss, privacy risks, and major damage.

Answer : You need basic computer knowledge, understanding of networking, problem-solving skills, and curiosity to learn how systems work. Later, you can build technical skills in ethical hacking, cloud security, and digital forensics. Soft skills like critical thinking and communication are also very important in this field.

Answer : No, a computer science degree is not mandatory. Many professionals come from non-IT backgrounds. What matters most are your skills, certifications, and practical knowledge. Employers value people who can solve problems and protect systems, even if they don’t have a formal IT or computer science degree.

Answer : Yes, cybersecurity is a fast-growing career in Bangladesh. Banks, telecom companies, IT firms, and government sectors need skilled professionals. With rising cybercrime, the demand for ethical hackers, analysts, and security engineers is increasing. It offers good job opportunities, career growth, and international freelancing options.

Answer : You should learn how operating systems (Windows, Linux) work, basic networking (IP, DNS, firewalls), and using command line tools. Knowledge of Microsoft Office, email safety, and internet security practices is also helpful. These basics will prepare you to move into ethical hacking and advanced security topics.

Answer : It usually takes 6 to12 months of focused learning with certifications and practice to reach entry-level jobs. The timeline depends on your dedication and practice. Joining Capture The Flag (CTF) challenges, labs, and hands-on training can speed up the process even without a strong IT background.

Answer : For beginners, CompTIA Security+ is a great starting point because it covers basics. If you have some networking knowledge, CCNA Security is helpful. CEH (Certified Ethical Hacker) is good for those aiming at penetration testing. Start small, build your skills step by step, then move to advanced certifications.

Answer : It depends on your learning pace and background. For many beginners, it takes 1 to 2 years plus to build solid skills and get a good job. Some start working earlier with entry-level certifications, then grow into specialized roles like ethical hacking, forensics, or cloud security over time.

Answer : Yes, you can start without strong programming skills. Basic knowledge of Python, Bash, or JavaScript helps, but it’s not mandatory at the beginning. Many areas like network security, SOC analysis, and GRC need less coding. As you grow, learning programming will open more advanced career opportunities.

Answer : Networking is usually the better starting point because it builds your foundation. If you understand how networks, IPs, and protocols work, ethical hacking becomes much easier. So, start with CCNA or basic networking knowledge, then move to ethical hacking, penetration testing, or advanced cybersecurity areas.

Answer : Entry-level cybersecurity professionals in Bangladesh usually earn between BDT 25,000–45,000 per month. With experience and certifications, salaries can quickly rise above BDT 80,000–1,50,000. Freelancers and remote workers often earn more by working with international clients. Salaries grow as your skills and experience improve.

Answer : In Bangladesh, cybersecurity experts are in demand in banks, financial institutions, telecoms, IT companies, government agencies, healthcare, and startups. Many outsourcing companies and multinational firms also hire local professionals for global projects. Demand is growing fast as more businesses go digital and face cyber risks.

Answer : Yes, freelancing opportunities are huge. Platforms like Upwork and Fiverr have projects for penetration testing, vulnerability assessment, and security audits. Many international companies also hire remote SOC analysts and ethical hackers. With the right skills and certifications, Bangladeshi professionals can work globally from home.

Answer : No, AI will not reduce jobs, it will create new ones. AI helps automate simple tasks, but attackers are also using AI. This increases the need for skilled people who can analyze, defend, and build smarter systems. Human expertise in critical thinking and decision-making is still essential.

Answer : Once you have the basics, you can choose a path: Red Team (ethical hacking, penetration testing), Blue Team (defense, SOC analyst), Cloud Security (AWS, Azure, GCP protection), or Digital Forensics (investigation and evidence recovery). Pick an area based on your interest and career goals.

Answer : A laptop or desktop with the following minimum specifications is recommended: Processor: Intel Core i3 (12th Generation or higher), Memory (RAM): 8 GB or more, Storage: 256 GB SSD or higher.

Join Free Seminar
- GET DISCOUNT