Introduction to Cyber Security
Contact us

Introduction to Cyber Security

Beginner Level Course

āĻŦāĻ°ā§āϤāĻŽāĻžāύ āĻŦāĻŋāĻļā§āĻŦ⧇ āĻ…āύāϞāĻžāχāύ āĻ­āĻŋāĻ¤ā§āϤāĻŋāĻ• āĻ•āĻžāĻ°ā§āϝāĻ•ā§āϰāĻŽā§‡ āύāĻŋāĻ°ā§āĻ­āϰāĻļā§€āϞāϤāĻž āĻŦ⧃āĻĻā§āϧāĻŋāϰ āϏāĻžāĻĨ⧇ āϏāĻžāĻĨ⧇ āϤāĻĨā§āϝ⧇āϰ āύāĻŋāϰāĻžāĻĒāĻ¤ā§āϤāĻž āύāĻŋā§Ÿā§‡ āωāĻĻā§āĻŦ⧇āĻ—āĻ“ āĻ•ā§āϰāĻŽāĻļ āĻŦāĻžā§œāϛ⧇āĨ¤ āϝ⧇āϕ⧋āύ⧋ āĻ•ā§āώ⧇āĻ¤ā§āϰ⧇āχ āĻāĻ–āύ Cyber Security āĻāϰ āĻĒā§āĻ°ā§Ÿā§‹āϜāύ āĻ…āύāĻ¸ā§āĻŦā§€āĻ•āĻžāĻ°ā§āϝ āϝāĻžāϰ āĻ•āĻžāϰāϪ⧇ āĻ āĻŦāĻŋāĻˇā§Ÿā§‡ āĻĻāĻ•ā§āώāϤāĻž āϚāĻžāĻšāĻŋāĻĻāĻž āĻŦā§‡ā§œā§‡āχ āϚāϞ⧇āϛ⧇āĨ¤ āφāϰ āĻāχ āϕ⧋āĻ°ā§āϏāϟāĻŋ āϏāĻžāϜāĻžāύ⧋ āĻšā§Ÿā§‡āϛ⧇ āϤāĻžāĻĻ⧇āϰ āϜāĻ¨ā§āϝ āϝāĻžāϰāĻž āĻŦāĻ°ā§āϤāĻŽāĻžāύ āϚāĻžāĻšāĻŋāĻĻāĻžāϕ⧇ āĻĒ⧁āρāϜāĻŋ āĻ•āϰ⧇ āĻĻāĻ•ā§āώāϤāĻž āĻ…āĻ°ā§āϜāύ⧇āϰ āĻŽāĻžāĻ§ā§āϝāĻŽā§‡ āĻ•ā§āϝāĻžāϰāĻŋ⧟āĻžāϰ⧇ āϏāĻĢāϞ āĻšāϤ⧇ āφāĻ—ā§āϰāĻšā§€āĨ¤

Instructor

Instructor Image

Md. Mudasser Hossain Hedaet

CISCO Certified Cybersecurity Essentials
4+ Years Cyber Security Training Experience in BongoDemy

img
āĻāχ āϕ⧋āĻ°ā§āϏāϟāĻŋ āĻ•āĻžāĻĻ⧇āϰ āϜāĻ¨ā§āϝ?

ā§§) āϝāĻžāϰāĻž āϏāĻžāχāĻŦāĻžāϰ āϏāĻŋāĻ•āĻŋāωāϰāĻŋāϟāĻŋ āϏāĻŽā§āĻĒāĻ°ā§āϕ⧇ āĻ•āĻŋāϛ⧁āχ āϜāĻžāύ⧇ āύāĻžāĨ¤
⧍) āϝāĻžāϰāĻž āϏāĻžāχāĻŦāĻžāϰ āϏāĻŋāĻ•āĻŋāωāϰāĻŋāϟāĻŋ āύāĻŋāĻœā§‡āϰ āĻŦā§āϝāĻ•ā§āϤāĻŋāĻ—āϤ āϞāĻžāχāĻĢ āĻ āĻŦā§āϝāĻŦāĻšāĻžāϰ āĻ•āϰāϤ⧇ āϚāĻžāύāĨ¤
ā§Š) āϝāĻžāϰāĻž CISCO Cyber Essentials āϏāĻžāĻ°ā§āϟāĻŋāĻĢāĻŋāϕ⧇āϟ āύāĻŋāϤ⧇ āϚāĻžā§ŸāĨ¤
ā§Ē) āϝāĻžāϰāĻž āĻ­āĻŦāĻŋāĻˇā§āϝāϤ⧇ āϏāĻžāχāĻŦāĻžāϰ āϏāĻŋāĻ•āĻŋāωāϰāĻŋāϟāĻŋ āϤ⧇ āĻ•ā§āϝāĻžāϰāĻŋ⧟āĻžāϰ āĻ•āϰāϤ⧇ āϚāĻžā§ŸāĨ¤
ā§Ģ) āϝāĻžāϰāĻž āχāĻĨāĻŋāĻ•ā§āϝāĻžāϞ āĻšā§āϝāĻžāĻ•āĻŋāĻ‚ āĻāϰ āĻŦā§āϝāĻžāϏāĻŋāĻ• āϜāĻžāύāϤ⧇ āϚāĻžā§ŸāĨ¤

courseImage

Total Video 78+

Video Time 15+ hours

4 Live

3 Quizes

3 Projects

1 Mock Interview

5 Assignments

Study Plan

Prerequisites

  • Linux fundamentals
  • Essential hacking terms
  • Essential networking terms

Skills Covered

  • System hacking using Metasploit
  • Maintaining and Updating Information Systems
  • Website penetration testing
  • Password Hacking Using Kali Linux

What will you learn

  • Secure Lab Setup and Essential Linux system commands.
  • Footprinting & Information Gathering.
  • Website penetration testing.
  • Man in the middle attacks & Social Engineering Attack.
  • System hacking using Metasploit & Password Hacking Using Kali Linux.
  • CISCO cyber secuity essential exams, Cryptography and Keylogger & Spyware.

SUPPORT FROM
EXPERT


Certification
Yes


Course Type
Recorded+
Support