CEH
Service Times: 9am and 10:30am
6399 North Wells Road, Bigtownville, CO 32748
Latest
  • Loading
f

Certified Ethical Hacker (CEH)

Email Print Export to ical format

Venue:

Academy of Management & Science (AMS)
House # 89/E, Road # 13/C, Block # E, Banani, Dhaka 1213, Bangladesh
Telephone: +880 (2) 9891190, +880 (2) 8836875, Cell No: (88) 01680878839, (88) 01193070284

Resource Person

Mohammad Shahadat Hossain is an Information Technology & Security Professional with M.Sc. in Computer Science & over 15+ years of IT experience in Telecom, Bank, IT Service & Infrastructure Integration Support company, Multinational & local enterprises. Presently he is working as "National IT Consultant" for Cowater International Inc, which is the implementation partner of SCOPE Project under OCAG, Bangladesh part funded by CIDA. Before joining to Cowater Int Inc he was the Deputy Manager, IT Operation & Information Security at TM International, Bangladesh (AKTEL). He also worked at Islami bank Bangladesh Ltd as Network Administrator and at Spectrum Engineering Consortium Ltd as Sr. System Engineer.

A few of his major global professional accreditation are:

  • Certified Information System Auditor (CISA)
  • Certified Information System Security Professional (CISSP)
  • Certified Information Security Manager (CISM)
  • Certified Information Technology Manager (CITM)
  • Certified Payment Card Industries Security Implementer (CPISI)
  • IRCA Certified Provisional Auditor (ISO27001)
  • Certified Ethical Hacker (CEH)
  • Computer Hacking Forensic Investigator (CHFI)
  • ITIL Foundation Certification
  • Certified Data Center Professional (CDCP)
  • Sun Certified System Administrator (SCSA)
  • Cisco Certified Network Associates (CCNA)
  • Microsoft Certified Professional (MCP)

Workshop Details

CEH training/course in Bangladesh
Venue:
Academy of Management & Science (AMS)
House # 89/E, Road # 13/C, Block # E, Banani, Dhaka-1213, Bangladesh

Telephone:+880-2-9891190 or +880 (2) 8836875
Cell No: (88) 01193070284

Who Can Attend

ICT Professional, Network Engineers, System Analysts, Students.

Certification

Course Participation Certificate will be awarded

Methodology

Power Point Presentation, Interactive Lecture, Case Study, Classroom exercise, Question and Answer session. Well organized DVD-ROM content; a repository of approximately 20GB of latest hacking and security tools and more than 1000 minutes of videos demonstrating hacking techniques.

  • Well organized content for a better understanding and learning experience
  • Concepts are well-illustrated to create self-explanatory slides.
  • Diagrammatic representation of concepts and attacks
  • Industry standard key tools are featured in detail and other tools are presented as a list for students to try
  • Exclusive section for countermeasures against different attacks with detailed explanation of how to implement these countermeasures in real time environment
  • The new version has complete section dedicated for penetration testing. It illustrates how to implement learned concepts to test network system security.
  • A result oriented, descriptive and analytical lab manual; the labs showcased in the courseware are tested against latest Operating Systems with all the patches and hot fixes applied
Download

Certified Ethical Hacker (CEH)

Course Code:

01-ITS-CEH-0001

Overview:

CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker. Learn from Experts in the field of Information Security We don't just have great instructors, our instructors have years of industry experience and are recognized as experts. The instructor is from the direct Security industry and has a vast experience in this field.

Why is this training so important in this Industry?

  • The most advanced course in the world that covers cutting edge of hacking technology. IT security researchers go deep underground covertly to extract advanced attacks and exploits and work to analyze how hackers operate and present them to defense community .The researches report and update advanced hacking tools every day on the member's portal and on www.hackerjournals.com
  • The CEH class deals with real life scenario and real threats by real life experts in the field.
  • Learn real life ethical hacking methodology beyond automated vulnerability scans and simple information security tests.
  • Gain global recognition as being a certified member of a globally recognized institution and attain the skills of a professional ethical hacker/ penetration tester.
  • Play with real life tools that are used by the hacking underground. The courseware is over 4,410 pages, covering 63 modules with over 60 GB of real life underground tools that are not found in any other training course anywhere in the world plus evaluation copies for Core Impact and Immunity in classes and security software that can be taken home!!!
  • Get your hands dirty with actual hands on labs under the guidance of some of the best information security professionals in this space.
  • Unlike other classes that provide courseware that is tightly coupled with the presentation and somewhat useless outside of that environment.

Prerequisite:

ENSA Certified or At 2+ years working experience in IT infrastructure management, IT operation, IT security management field. orCCNA, MCSE certified

Duration:

5 Days / 40 Hours

Course Objectives:

On successful completion of the course delegates will be able to understand:

Course Details:

Module 01: Introduction to Ethical Hacking
Module 02: Foot printing and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: System Hacking
Module 06: Trojans and Backdoors
Module 07: Viruses and Worms
Module 08: Snifers
Module 09: Social Engineering
Module 10: Denial of Service
Module 11: Session Hijacking
Module 12: Hacking Web servers
Module 13: Hacking Web Applications
Module 14: SQL Injection
Module 15: Hacking Wireless Networks
Module 16:Hacking Mobile Platforms
Module 17:Evading IDS, Firewalls, and Honey pots
Module 18: Buffer Overflow
Module 19: Cryptography
Module 20: Penetration Testing

Training Calendar

<<  October  2017  >>
 S  M  T  W  T  F  S 
  1  2  3  4  5  6  7
  8  91011121314
15161718192021
22232425262728
293031    

Newsletter

AMS Campus Facilities

  • Two Air conditioned seminar halls with projector & audio system [Maximum Capacity up to 50 persons] including video recording capacity.
  • Two different PC Labs (Air conditioned)
  • Centralized server
  • Internet / WIFI facilities
  • Practice facilities in LABS
  • Online Exam Centre
  • Cafeteria & Own cook facility
  • Large lobby with natural surroundings
  • Huge Parking Space
  • Waiting Lounge
  • Distance education facilities
  • Printer, Scanner etc logistics facilities
  • Special Guest Room
  • Registration Booth Arrangement Space
  • 3 Star Accommodation arrangements for foreign guests on demand in walking distance from the center.
    ………and many more

Contact AMS

Academy of Management & Science (AMS)
House #450, Road # 31, New DOHS,Mohakhali, Dhaka-1206, Bangladesh
Cell No: (88) 01616004108
Email: This email address is being protected from spambots. You need JavaScript enabled to view it.

Academy Location

Testimonials

Show