1700 Students enrolled in the course
384 Reviews
Cyber Security & Ethical Hacking
As more of our lives move online, cyber threats are rising fast. By 2025, cybercrime is expected to cost the world around USD 10.5 trillion every year. Hackers are using smarter tools like AI-driven scams, ransomware, and stolen logins and industries such as healthcare, finance, and manufacturing are being hit the hardest. But this growing problem also means huge opportunities. Companies everywhere are investing in stronger security, from cloud protection to zero-trust systems, and they need people who can step in and defend them. Roles in ethical hacking, security analysis, and threat hunting are in high demand, with more jobs opening every year. That’s where our course comes in. We give you practical, hands-on skills to break into cybersecurity, protect organizations, and build a stable, rewarding career in one of today’s fastest-growing fields.
4 Month
Course Duration
2+
Industrial Project
36
Classes
16
Bonus Track
Exclusive Solutions That Set Us Apart :
Course Key Highlighted:
-
•
7 Days One to one Mentor Support
-
•
Practice Lab
-
•
Backup Class
-
•
Job Preparation Support
-
•
Extra Class
-
•
Career Placement Support
-
•
Corporate Access Program (CAP)
-
•
Marketplace Account Open Support
Job Opportunities:
Ethical Hacker / Penetration Tester
Security Analyst
Security Engineer
System Engineers
IT Security Consults
Application Security Engineer
Governance, Risk, And Compliance (GRC) Officer
Banking & Finance
Telecommunications
Class Structure & Distribution of Total 52 Classes:
(For Offline Course)
Offline Class - Onsite in Campus: 36 Class
On Campus (Theory)
12 Classes - Per Class 2 Hrs
On Campus (Lab)
24 Classes - Per Class 2 Hrs
Extra Online & Recorded Class: 16 Class
Online Extra Live Class
4 Classes - Per Class 1+ Hrs
Required Recorded Videos
12 Classes - Duration Variable
Course Prerequisite:
Basic Knowledge of Using Computer
Desktop / Laptop
Internet Connection
This Course is Designed for
(Everyone)
Software You'll Learn:
(AI Driven)
Course Outline Structure
Provide required PDF + Class Recordings to ensure the best learning for our students.
1 Module
51 Classes
2 Projects
49 Topics
42 Resources
Duration: 51 Classes
Focus:
CEH Exam
Class Type Breakdown:
- Offline (Theory): 8 Classes
- Recorded Video: 12 Classes
- Lab (Practical): 23 Classes
- Online Theory: 4 Classes
- Lab (Exam): 4 Classes
Projects Included: 2 Projects
Career Path: Cyber Security Analyst | Penetration Tester | Ethical Hacker | SOC Analyst | Security Consultant | Vulnerability Assessor
Prerequisites: N/A
Key Highlights:
- • Ethical Hacking Methodologies & Frameworks
- • Linux for Ethical Hackers
- • Network Scanning, Enumeration, and Exploitation
- • Malware Analysis, Social Engineering, and DoS Attack Simulation
- • Web Application Hacking (SQLi, XSS, Burp Suite, OWASP)
- • CTF Practice, Career Guidance, and Freelancing Preparation
Projects:
- • 1) Server Site Exploitation
- • 2) Web Site Exploitation
| Class No. | Class Type | Topic/Lesson | Resource Type |
|---|---|---|---|
| Class 1 | Offline (Theory) | Introduction to Ethical Hacking |
PDF
|
| Class 2 | Recorded Video | Linux File Hierarchy |
Recorded Video
|
| Class 3 | Lab (Practical) | Getting Familiar with Linux 1 (File Folder Management) |
PDF
|
| Class 4 | Lab (Practical) | Getting Familiar with Linux 2 (User and Package Management) |
PDF
|
| Class 5 | Recorded Video | Job and Process Management, File Compression |
Recorded Video
|
| Class 6 | Lab (Practical) | Getting Familiar with Linux 3 (File Permission Management) |
PDF
|
| Class 7 | Offline (Theory) | Networking Concept 1 |
PDF
|
| Class 8 | Recorded Video | OSI and TCP/IP Model |
Recorded Video
|
| Class 9 | Lab (Practical) | Networking Concept 2 |
PDF
|
| Class 10 | Offline (Theory) | Networking Concept 3 |
PDF
|
| Class 11 | Offline (Theory) | Web Technology |
PDF
|
| Class 12 | Recorded Video | Web Application Architecture |
Recorded Video
|
| Class 13 | Online Theory | Online Practice |
N/A
|
| Class 14 | Lab (Exam) | Skill Test 1 - Class test 1 |
N/A
|
| Class 15 | Recorded Video | Penetration Testing Methods |
Recorded Video
|
| Class 16 | Lab (Practical) | Footprinting and Reconnaissance 1 |
Class Video
|
| Class 17 | Lab (Practical) | Footprinting and Reconnaissance 2 |
Class Video
|
| Class 18 | Recorded Video | Deep and Dark Web |
Recorded Video
|
| Class 19 | Lab (Practical) | Scanning Networks |
Class Video
|
| Class 20 | Lab (Practical) | Networks Enumeration |
Class Video
|
| Class 21 | Offline (Theory) | Vulnerability Analysis |
PDF
|
| Class 22 | Recorded Video | Nessus and Acquinitix |
Recorded Video
|
| Class 23 | Lab (Practical) | System Hacking 1 |
Class Video
|
| Class 24 | Lab (Practical) | System Hacking 2 |
Class Video
|
| Class 25 | Recorded Video | Metasploit Framework Overview |
Recorded Video
|
| Class 26 | Online Theory | Online Practice |
N/A
|
| Class 27 | Lab (Practical) | System Hacking 3 (Escalate Privileges) |
Class Video
|
| Class 28 | Lab (Exam) | Skill Test 2 - Mid exam |
N/A
|
| Class 29 | Recorded Video | Malware Types |
Recorded Video
|
| Class 30 | Lab (Practical) | Malware Threats (Linux and Windows) |
Class Video
|
| Class 31 | Offline (Theory) | Social Engineering 1 |
PDF
|
| Class 32 | Lab (Practical) | Social Engineering 2 |
Class Video
|
| Class 33 | Lab (Practical) | Denial-of-Service |
Class Video
|
| Class 34 | Lab (Practical) | Sniffing and Session Hijacking |
Class Video
|
| Class 35 | Online Theory | Online Practice |
N/A
|
| Class 36 | Lab (Exam) | Skill Test 3 - Class test 2 |
N/A
|
| Class 37 | Recorded Video | Web Lab Setup and Site Mapping |
Recorded Video
|
| Class 38 | Lab (Practical) | Hacking Web Applications 1 |
Class Video
|
| Class 39 | Lab (Practical) | Hacking Web Applications 2 |
Class Video
|
| Class 40 | Lab (Practical) | Hacking Web Applications 3 |
Class Video
|
| Class 41 | Lab (Practical) | Hacking Web Applications 4 |
Class Video
|
| Class 42 | Lab (Practical) | SQL Injection (manual) |
Class Video
|
| Class 43 | Recorded Video | Additional SQL Injectional |
Recorded Video
|
| Class 44 | Lab (Practical) | SQL Injection (automated) |
Class Video
|
| Class 45 | Lab (Practical) | CTF Overview Platform 1 |
Class Video
|
| Class 46 | Lab (Practical) | CTF Overview Platform 2 |
Class Video
|
| Class 47 | Recorded Video | Wifi Hacking |
Recorded Video
|
| Class 48 | Offline (Theory) | Career Discussion and Advance Guideline |
N/A
|
| Class 49 | Online Theory | Marketplace Overview |
N/A
|
| Class 50 | Offline (Theory) | Portfolio Making |
Class Video
|
| Class 51 | Lab (Exam) | Skill Test 4 - Final |
N/A
|
Admission Is Going On
Enroll now to any of our Offline Courses (On- Campus)
Course Fee Offline
BDT. 30,000
Online (Live Class) courses as per your suitable time.
Course Fee Online
BDT. 15,000
Some of the Creative Projects Done by Our Students
Students Shared Their Feedback
Course Related FAQ
Answer : Cybersecurity is protecting computers, networks, and data from hackers and online attacks. It’s important now because businesses, banks, and even our daily lives depend on digital systems. Without proper security, sensitive data can be stolen, causing financial loss, privacy risks, and major damage.
Answer : You need basic computer knowledge, understanding of networking, problem-solving skills, and curiosity to learn how systems work. Later, you can build technical skills in ethical hacking, cloud security, and digital forensics. Soft skills like critical thinking and communication are also very important in this field.
Answer : No, a computer science degree is not mandatory. Many professionals come from non-IT backgrounds. What matters most are your skills, certifications, and practical knowledge. Employers value people who can solve problems and protect systems, even if they don’t have a formal IT or computer science degree.
Answer : Yes, cybersecurity is a fast-growing career in Bangladesh. Banks, telecom companies, IT firms, and government sectors need skilled professionals. With rising cybercrime, the demand for ethical hackers, analysts, and security engineers is increasing. It offers good job opportunities, career growth, and international freelancing options.
Answer : You should learn how operating systems (Windows, Linux) work, basic networking (IP, DNS, firewalls), and using command line tools. Knowledge of Microsoft Office, email safety, and internet security practices is also helpful. These basics will prepare you to move into ethical hacking and advanced security topics.
Answer : It usually takes 6 to12 months of focused learning with certifications and practice to reach entry-level jobs. The timeline depends on your dedication and practice. Joining Capture The Flag (CTF) challenges, labs, and hands-on training can speed up the process even without a strong IT background.
Answer : For beginners, CompTIA Security+ is a great starting point because it covers basics. If you have some networking knowledge, CCNA Security is helpful. CEH (Certified Ethical Hacker) is good for those aiming at penetration testing. Start small, build your skills step by step, then move to advanced certifications.
Answer : It depends on your learning pace and background. For many beginners, it takes 1 to 2 years plus to build solid skills and get a good job. Some start working earlier with entry-level certifications, then grow into specialized roles like ethical hacking, forensics, or cloud security over time.
Answer : Yes, you can start without strong programming skills. Basic knowledge of Python, Bash, or JavaScript helps, but it’s not mandatory at the beginning. Many areas like network security, SOC analysis, and GRC need less coding. As you grow, learning programming will open more advanced career opportunities.
Answer : Networking is usually the better starting point because it builds your foundation. If you understand how networks, IPs, and protocols work, ethical hacking becomes much easier. So, start with CCNA or basic networking knowledge, then move to ethical hacking, penetration testing, or advanced cybersecurity areas.
Answer : Entry-level cybersecurity professionals in Bangladesh usually earn between BDT 25,000–45,000 per month. With experience and certifications, salaries can quickly rise above BDT 80,000–1,50,000. Freelancers and remote workers often earn more by working with international clients. Salaries grow as your skills and experience improve.
Answer : In Bangladesh, cybersecurity experts are in demand in banks, financial institutions, telecoms, IT companies, government agencies, healthcare, and startups. Many outsourcing companies and multinational firms also hire local professionals for global projects. Demand is growing fast as more businesses go digital and face cyber risks.
Answer : Yes, freelancing opportunities are huge. Platforms like Upwork and Fiverr have projects for penetration testing, vulnerability assessment, and security audits. Many international companies also hire remote SOC analysts and ethical hackers. With the right skills and certifications, Bangladeshi professionals can work globally from home.
Answer : No, AI will not reduce jobs, it will create new ones. AI helps automate simple tasks, but attackers are also using AI. This increases the need for skilled people who can analyze, defend, and build smarter systems. Human expertise in critical thinking and decision-making is still essential.
Answer : Once you have the basics, you can choose a path: Red Team (ethical hacking, penetration testing), Blue Team (defense, SOC analyst), Cloud Security (AWS, Azure, GCP protection), or Digital Forensics (investigation and evidence recovery). Pick an area based on your interest and career goals.
Answer : A laptop or desktop with the following minimum specifications is recommended: Processor: Intel Core i3 (12th Generation or higher), Memory (RAM): 8 GB or more, Storage: 256 GB SSD or higher.


Browse Course