Course Overview:

Considering the importance of Cyber Security in the digital era, hackerSlash has introduced “
Diploma in Cyber Security Professional” course for someone who wish to deep dive into the dynamic and promising course which help them landing into Cyber Security Domain.

The course focus on how to indulge in the basics and help in getting expertise by implementing various practices thus tuning the mindset and also build confidence. Hands on training helps the student in improving the performance and also in developing the skillset to face tough challenges.

Cyber Security team plays a very crucial role in an organization which rely on internet usage and whose digital assets are at stake. Considering the new challenges like malwares, social engineering attacks and ransomware targeted attacks, best practices in cybersecurity has become the utmost priority for such organizations. Cyber Security Professional course will help you understand the role to play when you get an entry level opportunity in any organization.

Many aspirants who wish to choose Cyber Security as their career or wish to change their domain to Cyber Security have many queries in their mind. Considering few are as follows,

    # Where/How to start?
    # What do I need to know?
    # Where can I get the understanding of core concepts thoroughly?

Considering the above-mentioned queries, our team of skilled professional trainers have designed this course which will help the students in understanding and delivering the concepts to the core.



How to start a career in Cyber Security Domain?

To develop the mindset of a hacker and to evolve as a Pen Tester, you need to be skilled in the below listed,

    # Having an open mindset to learn new things
    # Doing research at your end for covered topics (A lot!)

For most successful penetration testers or white hat professionals in an organization, before shifting to the Cyber Security role, you will notice that for a major part of the career they were into a System Administration stuff or Networking role or if you consider the context of developers who turned into Pen Testers, the most important point is they have a thorough understanding of how things work before looking at them from security perspective.

It can be very intimidating for a new candidate to grasp familiarity with these roles, understand how they are important and that is where our training comes in. We have a motto of “Keeping the foundation or core strong” to build a proper understanding of the concepts. With our flexible online training program for candidates, we provide email support, help with technical support for labs, and at the conclusion of the course prepare the candidate for mock interviews.

The best part of the course is there is no age criteria, the most appropriate candidates can be undergraduate students, students currently pursuing their graduation or graduates who are looking for landing their first job as an Information Security role. The course is a mix of theoretical and practical training and focuses majorly on the following areas:

    # Understanding of Cyber Security fundamentals
    # Learning and understanding Ethical Hacking and Pen Testing techniques
    # Learn Threat Analysis with Security Operations Fundamentals (with IBM QRadar)
    # Learning usage of tools/ techniques in respective contexts
    # Learning Python Scripting
    # Providing mock interviews after course commencement



Job Role

After the successful completion of this course, candidates will be eligible for applying the following job roles.

     # Information Security Analyst
     # Network Security Professional
     # Security Operations Analyst (SOC)
     # Security Analyst - VA
     # Security Engineer
     # VAPT Analyst
     # Application Security Analyst
     # Security Consultant
     # Information Security Consultant





# Basic Computer knowledge 



Course Modules:

1. Linux Essentials For PenTesting

   - History and Features of Linux

   - Architecture of Linux OS

   - Linux Distributions

   - Linux Commands ( System & Networking)

   - File Systems and its Types

   - Software Package Management

   - Users and Groups Administration

   - File/Folder Permissions

   - Special Permissions

   - Service and Process Management

   - Linux Security( PAM, SSH & SSH Security, IPTABLES and SELinux)

   - Shell Scripting Basics

2. Networking Essentials for Pentesting

  - Computer Networks and Types of Networks  

  - Network Devices  

  - Network Topologies  

  - IP and MAC Address  

  - OSI Model and TCP/IP Model  

  - Addressing and Subnetting  

  - IPv4 Packet Structure  

  - Network Protocols( TCP, UDP, ICMP, ARP, RARP..)  

  - IPv6 Packet Structure  

  - Network Services( DNS, DHCP, SNMP, FTP, etc..)  

  - Packet Analysis With Wireshark  

3. Introduction to Cyber Security

  - What is Cyber Security?  

  - Importance of Cyber Security  

  - Cyber Security Domains  

  - CIA Triad

  - Vulnerability, Threat and Risk

  - Risk Governance & Risk Management

  - Cyber Crime & Classification of Cyber Crimes

  - NIST Cybersecurity Framework

  - Cyber Security Compliance (GDPR,HIPAA, FISMA,SOC-1 & 2 and SOX)

  - ISO IEC 27001/ISO 27002


  - Industry Best Penetration Testing Standards (OWASP,WASC,SANS25, PTES, OSSTMM)

  - Case Studies

4. Network Security

  - Internet, Intranet, and Extranet  

  - DMZ  

  - DNSSEC  

  - Firewalls  

  - IDS and IDPS  

  - VPN and tunneling  

  - Network Address Translation (NAT) and PAT  

  - Honeypots & Deception Technology

5. Vulnerability Assessment and Management

  - Fundamentals of Vulnerability Assessment and Management  

  - Vulnerability Assessment Tool Deployment Strategy (Nessus, Qualys & Nexpose)  

  - Scanning Methodologies  

  - Authenticated vs Non-Authenticated Scanning  

  - Planning and Performing Infrastructure Security Assessment  

  - Web Application Vulnerability Assessment  

  - Interpreting and Calculating CVSS Score  

  - Risk Identification and Categorization  

  - Reporting  

  - Patches and Updates  

6. Penetration Testing

  - Introduction to Penetration Testing  

  - Types of Penetration Testing  

  - Pentesting Services  

  - Best Linux Distributions for Hacking and Penetration Testing  

  - Penetration Testing Phases  

  - Pre-Engagement Actions  

  - OSINT  

  - Threat Modeling & Vulnerability Identification  

  - Exploitation (Using Metasploit & Manual, Password Cracking, Buffer Overflows, etc..)  

  - Post-Exploitation ( Privilege Escalation of Linux & Windows and Pivoting, etc... )  

  - Reporting  

  - Resolution & Re-Testing 

7. Active Directory Attacking and Defending

  - Introduction Active Directory  

  - Active Directory Setup  

  - Active Directory Enumeration  

  - Active Directory Attack Vectors  

  - Active Directory Post Enumeration  

  - Active Directory Post Attacks  

  - AD Defense- Detection  

  - AD Remediation  

  - Kerberos Authentication      

8. Cryptography

  - Introduction to Cryptography  

  - Symmetric Ciphers  

  - Asymmetric Ciphers  

  - Pseudo-Random Number Generation  

  - Steganography  

  - Building SSL certificates  

  - Digital Certificates and Digital Signatures  

  - Hashes  

  - Encoding      

9. Application Penetration Testing

  - Web application Architecture and Technologies.  

  - Web application offensive & Defensive  

  - Information Gathering  

  - Authentication & Authorization  

  - Session Management  

  - File Security  

  - Database Security  

  - Other Attacks  

  - OWASP Top 10 

  - OWASP Penetration Testing Check List  

  - Secure Development Methodologies and Threat Modeling  

  - WAF  

  - Automated tools (Burpsuite, Owasp-zap, Paros Proxy, Netsparker, Charles Proxy, Webscarab)  

10. Mobile Application & Wifi Penetration Testing

  - Android OS structure  

  - IOS structure  

  - Android app structure  

  - Rooting Concept

 - Compromising Android os with malware  

  - Communication channel Penetration Testing  

  - Android app reverse engineering  

  - Android app penetration testing  

  - Core Concepts of Wifi and Checking Wifi adapter Compatibility  

  - WIFI (WEP,WPA,WPA2) password cracking   

11.Cloud Security

  - Architectural Concept and Design Requirements  

  - Cloud Data Security  

  - Cloud Platform and Infrastructure Security  

  - Cloud Application Security  

  - Operations  

  - Legal and Compliance  

12. Security Operations

  - Understanding Events, Incidents and log mechanisms  

  - Security Information & Event Management (SIEM) Basics  

  - Introduction to QRADAR SIEM  

  - Explore the user interface  

  - Components and Architecture of QRADAR SIEM  

  - Event collector & Flow Processor  

  - Flow collector & Flow Processor  

  - Magistrate & Aerial Database  

  - Understanding LogActivity in QRADAR SIEM  

  - Real-Time streaming and Searching  

  - Quick Filters  

  - AQL  

  - Network Activity  

  - Rules configuration in QRADAR SIEM  

  - Locate Rules and Building Blocks  

  - Inspect actions and responses of rules  

13. Python For Pentesting  

  - Introduction and Environment Setup  

  - Basics of Python Programming  

  - Building Tools With Python(N/W Scanner, Port Scanner, Password Cracker)  

  - Building Tools With Python(Web Crawler, Packet Sniffer)  

  - Building Tools With Python(Simple Malware, Python Backdoor)




12 Months




# 30,000 Taka for Bangladeshi Students

# $500 USD for International Students



Contact us:

Need Technical Assistance? Speak with a support representative by Mailing -