
Synchronizing Systems
Please wait while we initialize your environment

Please wait while we initialize your environment
Essential cyber security training for modern professionals. Learn to identify threats, implement defense strategies, and protect digital assets in an increasingly complex threat landscape.
Created By
LSIT Global Faculty
Last Updated
April 2026
Language
English / Bengali
Module 01 → Introduction to Ethical Hacking
1.1 Information Security Overview
1.2 Information Security Threats and Attack Vectors
1.3 Hacking Concepts
1.4 Ethical Hacking Concepts
1.5 Penetration Testing Concepts
1.7 Information Security Laws and Standards
1.8 Summary
Module 02 → Footprinting and Reconnaissance
2.1 Footprinting Concepts
2.2 Footprinting Methodology
2.3 Footprinting Tools
2.4 Footprinting Countermeasures
2.5 Footprinting Penetration Testing
2.6 Summary
Module 03 → Scanning Networks
3.1 Network Scanning Concepts
3.2 Scanning Tools
3.3 Scanning Techniques
3.4 Scanning Beyond IDS and Firewalls
3.5 Banner Grabbing
3.6 Draw Network Diagrams
3.7 Scanning Pen Testing
3.8 Summary
Module 04 → Enumeration
4.1 Enumeration Concepts
4.2 NetBIOS Enumeration
4.3 SNMP Enumeration
4.4 LDAP Enumeration
4.5 NTP Enumeration
4.6 SMTP and DNS Enumeration
4.7 Enumeration Pen Testing
4.8 Summary
Module 05 → Vulnerability Analysis
5.1 Vulnerability Assessment Concepts
5.2 Vulnerability Assessment Solutions
5.3 Vulnerability Scoring Systems
5.4 Vulnerability Assessment Tools
5.5 Vulnerability Assessment Reports
5.6 Summary
Module 06 → System Hacking
6.1 System Hacking Concepts
6.2 Cracking Passwords
6.3 Escalating Privileges
6.4 Executing Applications
6.5 Hiding Files (Steganography)
6.6 Covering Tracks
6.7 Penetration Testing
6.8 Summary
Module 07 → Malware Threats
7.1 Malware Concepts
7.2 Trojan Concepts
7.3 Virus and Worm Concepts
7.4 Malware Analysis
7.5 Countermeasures
7.6 Anti-Malware Software
7.7 Malware Penetration Testing
7.8 Summary
Module 08 → Sniffing
8.1 Sniffing Concepts
8.2 Sniffing Techniques
8.3 Sniffing Tools
8.4 Countermeasures
8.5 Sniffing Detection Techniques
8.6 Sniffing Pen Testing
8.7 Summary
Module 09 → Social Engineering
9.1 Social Engineering Concepts
9.2 Social Engineering Techniques
9.3 Insider Threats
9.4 Impersonation on Social Networks
9.5 Identity Theft
9.6 Countermeasures
9.7 Social Engineering Pen Testing
9.8 Summary
Module 10 → Denial-of-Service
10.1 DoS/DDoS Concepts
10.2 DoS/DDoS Attack Techniques
10.3 Botnets
10.4 DDoS Case Study
10.5 DoS/DDoS Pen Testing
10.6 DoS/DDoS Protection Tools
10.7 Countermeasures
10.8 DoS/DDoS Attack Tools
10.9 Summary
Module 11 → Session Hijacking
11.1 Session Hijacking Concepts
11.2 Application-Level Session Hijacking
11.3 Network-Level Session Hijacking
11.4 Session Hijacking Tools
11.5 Countermeasures
11.6 Penetration Testing
11.7 Summary
Module 12 → Evading IDS, Firewalls, and Honeypots
12.1 IDS, Firewall, and Honeypot Concepts
12.2 IDS, Firewall, and Honeypot Solutions
12.3 Evading IDS
12.4 Evading Firewalls
12.5 IDS/Firewall Evading Tools
12.6 Detecting Honeypots
12.7 Evasion Countermeasures
12.8 Penetration Testing
12.9 Summary
Module 13 → Hacking Web Servers
13.1 Web Server Concepts
13.2 Web Server Attacks
13.3 Methodology
13.4 Attack Tools
13.5 Countermeasures
13.6 Patch Management
13.7 Security Tools
13.8 Pen Testing
13.9 Summary
Module 14 → Hacking Web Applications
14.1 Web App Concepts
14.2 Web App Threats
14.3 Hacking Methodology
14.4 Tools
14.5 Countermeasures
14.6 Security Testing Tools
14.7 Pen Testing
14.8 Summary
Module 15 → SQL Injection
15.1 SQL Injection Concepts
15.2 Types of SQL Injection
15.3 Methodology
15.4 Tools
15.5 Evasion Techniques
15.6 Countermeasures
15.7 Summary
Module 16 → Hacking Wireless Networks
16.1 Wireless Concepts
16.2 Encryption
16.3 Threats
16.4 Hacking Methodology
16.5 Tools
16.6 Bluetooth Hacking
16.7 Countermeasures
16.8 Security Tools
16.9 Hacking Methodology (repeated, possibly review)
16.10 Summary
Module 17 → Hacking Mobile Platforms
17.1 Attack Vectors
17.2 Hacking Android OS
17.3 Hacking iOS
17.4 Hacking Spyware
17.5 Mobile Device Management
17.6 Security Management
17.7 Guidelines and Tools
17.8 Pen Testing
17.9 Summary
Module 18 → IoT Hacking
18.1 IoT Concepts
18.2 Attacks
18.3 Hacking Methodology
18.4 Tools
18.5 Countermeasures
18.6 Pen Testing
18.7 Summary
Module 19 → Cloud Computing
19.1 Concepts
19.2 Threats
19.3 Attacks
19.4 Security
19.5 Tools
19.6 Pen Testing
19.7 Summary
Module 20 → Cryptography
20.1 Concepts
20.2 Encryption Algorithms
20.3 Tools
20.4 Public Key Infrastructure (PKI)
20.5 Email Encryption
20.6 Disk Encryption
20.7 Cryptanalysis
20.8 Countermeasures
20.9 Summary
Share your thoughts and help others choose the right course.
"let me know more about the cyber security training. will they be fully practical-oriented or theory only/"
"Cyber security Courses, durations, class schedule, any age limitation?"
"Cyber security Courses, durations, class schedule, any age limitation?"
"I am interested to learn cybersecurity training"

Secured via CyberSource & Stripe
Global Authorization Protocols
Encrypted Transmission
Global Standards Validated