Live Class

Professional In Cyber Security & Ethical Hacking

Which is the best Cyber Security & Ethical Hacking course in Bangladesh?

HaxyGenCorporation and Academy in Dhaka offers a 5-month professional program designed for beginners and IT professionals. Learn ethical hacking, penetration testing, red & blue team operations, malware analysis, digital forensics, bug bounty, and cyber defense through hands-on labs. Our curriculum aligns with CEH, CompTIA Security+, and OSCP, preparing students for freelancing, remote jobs, and corporate IT careers. Affordable and flexible batches, trusted by hundreds of learners. Enroll today at HaxyGen Academy, Bangladesh’s leading cyber security institute, to build skills, earn certifications, and launch a high-paying career (সাইবার সিকিউরিটি কোর্স বাংলাদেশে).

PICSEH professional in cyber security and ethical hacking badge

Fee BDT 12,000 Only with 3 installments

Weekly 2 Live Classess

1-1 consultaion

Total Seat: 55

Career Support

Starts From: October 15, 2025

Duration: 5 Months

Total Module: 25

Money Back Challenge

Students can review our classes for two weeks after admission. If within this period they feel the classes are not suitable, they may cancel their admission and receive a full refund.

Information

General Information

Course TitleProfessional In Cyber Security & Ethical Hacking
SpecializationRed & Blue Team Operation
Course TypeOnline Live Class
PlatformGoogle Meet / Zoom
LanguageBengali
Duration05 Months
Module23+
Assesments26+
Project Submission4-5
Practice Hours400
Final ExamOffline
Written, Practical, Viva
Career SupportFreelancing & Job Preperation
Completion AssetsCertificate and PICSEH Badge
InternshipCorporate Internship
Course FeeBDT 12,000
Installments3

Kazi Siam Alam

Director & C.E.O.

Master's in Business Administration
IBA, Dhaka University


Experience: +8 Years
Field of Expertise:
Management, Client Relationship, Market Research and analysis, Job Application and Interview, Self Branding

Sajid Ahmed Khan

Chief Instructor

M.Sc. In Cyber Security
Member of IEB

Experience: +8 Years
Field of Expertise:
Linux, Ethical Hacking, Cyber Secuirty, Operating System, OSINT, Forensic, VAPT, Cloud Security, Malware Generation, Server Security, Network Security, etc.

S.K.M. AL RAFI TONOY

Managing Director & Instructor

Bachelor's In Computer Science
University of The People, Pasadena, California, USA

Experience in Cyber Security: +5 Years
Field of Expertise:
Linux, Ethical Hacking, Cyber Secuirty, OSINT, System Hacking, Exploitation Operating System, Computer Programming, and Research

Kazi Al Aminul Islam

Teaching Assistnat

Experience in Cyber Security: +2 Years
Field of Expertise:
Linux, Ethical Hacking, Cyber Secuirty, OSINT

Modules

Course Modules

Overview:

  1. Understanding Information and Information Security
  2. Core Components of Information Security
  3. The CIA Triad (Confidentiality, Integrity, Availability)
  4. AAA Mechanisms (Authentication, Authorization, Accounting)
  5. Elements Involved in a Cyber Attack
  6. Types and Classifications of Hacking
  7. Hacking Methodologies and Security Frameworks
  8. The Five Phases of Hacking
    1. Reconnaissance
    2. Scanning
    3. Gaining Access
    4. Maintaining Access
    5. Covering Tracks
  9. Cyber Kill Chain Model
  10. TTPs
  11. Defining Hacking
  12. Who Are Hackers?
  13. Categories of Hackers (White Hat, Black Hat, Grey Hat)
  14. Concept of Ethical Hacking
  15. Essential Skills of an Ethical Hacker

Overview:

  1. Introduction to Linux
  2. Interface Comparison (Kali Linux vs Windows)
  3. Virtualization & Hypervisor Overview
  4. Lab Environment Setup (Kali Linux, Metasploitable2, Beebox, Windows 10)
  5. Linux File-system Hierarchy & FHS Standard
  6. Basic Linux Utilities (ls, cd, cp, mv, rm, etc.)
  7. Absolute vs Relative Paths, Package Management in Debian-Based Systems (apt, dpkg)
  8. Using vi/vim Editor & Operation Modes
  9. User Management Fundamentals
  10. Managing File and Directory Permissions (chmod, chown, umask)
  11. File Archiving and Compression (tar, gzip, zip)
  12. Process Management (ps, top, kill, etc.)
  13. Log Files and Log Monitoring (/var/log/, tail, grep)
  14. Basic Network Utilities (ping, ip, netstat, ss, traceroute)
  1. Introduction to Computer Networks
  2. Importance of Computer Networks in Cybersecurity
  3. Communication Components (Sender, Receiver, Message, Medium, Protocol)
  4. Types of Networks (PAN, LAN, MAN, WAN)
  5. Network Devices Overview (End Devices, Intermediary Devices)
  6. Hub vs Switch vs Router
  7. Network Topologies (Wired, Wireless)
  8. OSI Model (Seven Layers Explained)
  9. TCP/IP Model (Comparison with OSI)
  10. MAC Address Fundamentals
  11. IP Addressing (IPv4 & IPv6 Overview)
  12. IP Address Classes & Categories (Private vs Public)
  13. Sub-net & NAT (Network Address Translation)
  14. Protocols Overview (TCP, UDP, ICMP, etc.)
  15. TCP vs UDP: Key Differences
    1. TCP 3-Way Handshake Explained
    2. Ports & Common Port Numbers
    3. DNS & How It Works
    4. Fully Qualified Domain Names (FQDN)
    5. Common DNS Records (A, MX, CNAME, TXT, etc.)
    6. ICMP Protocol.

Overview:

  1. Introduction to Web Technologies
  2. Understanding the Internet and Its Components
  3. Fundamentals of the World Wide Web (WWW)
  4. Key Components of the WWW
  5. How the Web Works
  6. DNS Resolution Process and IP Mapping
  7. Differences Between the Internet and WWW
  8. Understanding HTTP Protocol
  9. Core Components of HTTP
  10. Structure of HTTP Messages (including HTTP Request and Response Analysis)
  11. Common HTTP Methods (GET, POST, etc.)
  12. HTTP Status Codes and Their Meanings
  13. HTTP Communication Workflow
  14. Cache vs Cookies
  15. Introduction to Secure Sockets Layer (SSL)
  16. Fundamentals of HTTPS (HTTP Secure)
  17. HTTP vs HTTPS Comparison
  18. Overview of Web Development (Frontend vs Backend)
  19. Understanding Websites and Web Applications

Overview:

  1. Introduction to reconnaissance and foot-printing
  2. Objectives and types (passive and active)
  3. Information collected during pre-attack phases
  4. Passive reconnaissance techniques including:
    1. Search engine methods
    2. Google Dorking
    3. Google Image Search
    4. Meta Search Engines
    5. Search Engine Cache
  5. Public data sources and domain intelligence:
    1. WHOIS Lookup
    2. DNS Enumeration
    3. Subdomain discovery using Subfinder and Amass
    4. public data breach search
  6. Website intelligence and mirror analysis:
    1. Wayback Machine
    2. Website mirroring with HTTrack
    3. Site mapping tools such as:
      1. web-check.xyz and Netcraft
      2. Technology fingerprinting using WhatWeb and Wappalyzer
    4. Content profiling and metadata extraction:
      1. Company website structure analysis
      2. Document metadata extraction
      3. Job portal profiling
    5. Social and identity reconnaissance:
      1. Social media profiling
      2. Username enumeration with Sherlock Project
    6. OSINT tools and frameworks:
      1. OSINTFramework overview
      2. Maltego CE for link analysis
      3. SpiderFoot for automated OSINT collection)
    7. Active reconnaissance techniques including network enumeration:
      1. Ping sweep
      2. Port scanning with Nmap and Masscan
      3. Traceroute
    8. Target profiling and service discovery:
      1. Banner grabbing
      2. Operating system fingerprinting
      3. Web server fingerprinting
    9. Email enumeration and harvesting through web sources and manual/automated methods.

Overview:

  1. Understanding network scanning and its key steps
  2. TCP 3-way handshake process explained
  3. TCP flags and their roles:
    1. SYN
    2. FIN
  • ACK
  1. RST
  2. PSH
  3. URG
  1. Overview of popular scanning tools including Nmap and Masscan
  2. Hands-on Nmap scanning techniques covering target specification
    1. Host discovery
    2. Port scanning
  • service version detection
  1. TCP connect (full) scan
  2. stealth (half-open) scans such as FIN, NULL, and XMAS
  3. UDP scan
  4. Timing and performance tuning
  5. OS fingerprinting
  6. Aggressive scan
  7. Output formats
  8. Report handling
  9. Hands-on Wireshark analysis for deep packet inspection and understanding scan behaviors
  10. Emphasis on ethical and legal responsibilities in network scanning to ensure compliance and responsible use

Overview:

  1. Introduction to network enumeration and its key steps
  2. Overview of popular network enumeration tools and techniques
  3. User and group enumeration using tools like Nmap and Netcat
  4. Network share enumeration
  5. Banner grabbing with Netcat and other tools
  6. SNMP protocol overview and enumeration using SNMPwalk
  7. DNS enumeration techniques
  8. Best practices for secure and effective network enumeration
  9. Ethical and legal considerations to ensure responsible conduct

Overview:

  1. Introduction to system hacking
  2. Key stages
    1. Gaining access
    2. Privilege escalation
    3. Maintaining access
    4. Clearing logs
  3. Approaches to gaining access
    1. Stolen credentials
    2. Password cracking
    3. Vulnerability exploitation
  4. Password cracking techniques
    1. Crunch and Hydra for SSH/FTP/HTTP
    2. John the Ripper
    3. CUPP
    4. SecLists
  5. Hash functions and encryption
  6. Vulnerability exploitation
    1. Metasploit Framework
    2. FTP vsftpd
    3. DistCC exploitation
  7. Privilege escalation techniques
    1. Udevd
    2. Netlink vulnerabilities
    3. Searchsploit
    4. Exploit-DB
    5. Exploit code compilation
  8. Maintaining access
    1. persistence techniques
    2. backdoor management with Meterpreter
  9. Clearing logs and covering tracks
  10. Ethical and legal considerations

Overview:

  1. Introduction to vulnerabilities
  2. Difference between vulnerability assessment and penetration testing
  3. Vulnerability assessment lifecycle
  4. Manual vulnerability research techniques
  5. Understanding CVE, CVSS, and NVD
  6. Automated vulnerability assessment using tools like Nmap, Nikto, OpenVAS, and Nessus.

Overview:

  1. Introduction to malware
  2. Types of malware
  3. Backdoors
  4. Botnets and command and control (C2)
  5. Networking foundations for malware communication
    1. TCP 3-way handshake
    2. Reverse shell vs bind shell
    3. Understanding reverse shell communication
  6. Understanding vulnerabilities exploits and payloads
  7. Malware generation
    1. Linux reverse shell malware
    2. Windows Trojan with Meterpreter shell
    3. Simulating port forwarding with Meterpreter
    4. Monitoring infections using netstat, simulated malware deliveries and executions
  8. Evasion and obfuscation techniques
  9. Malware delivery techniques
  10. Malware prevention and detection

Overview:

  1. Introduction to session hijacking
  2. Session hijacking classification
  3. Techniques for network-level session hijacking
  4. Techniques for application-level session hijacking
  5. TCP reset attack to disrupt sessions
  6. Hijacking Telnet sessions
  7. Session ID-based login bypass
 

Overview:

  1. Introduction to network sniffing
  2. Common protocols vulnerable to sniffing
  3. Passive vs Active sniffing
  4. ARP and ARP spoofing
  5. What is MITM
  6. Types of MITM attacks including:
    1. ARP spoofing
    2. DNS spoofing
    3. SSL stripping
  7. MITM vs sniffing,
  8. Relationship between sniffing and MITM
  9. Practical demonstrations of sniffing:
    1. Telnet
    2. HTTP
    3. FTP credentials
    4. File transfers (txt, jpg, zip, etc)

(Understanding and mitigating these attacks are critical for securing sensitive data and maintaining network integrity.)

Overview:

  1. Understanding DoS and DDoS attacks
  2. Business and technical impacts
  3. Volume-based flooding attacks (UDP flood, ICMP flood)
  4. Protocol exploitation
  5. Amplification attacks (SYN flood, Smurf attack, Fraggle attack)
  6. Layer 7 DoS attacks (HTTP flood, Slowloris)
  7. Botnets and the DDoS-as-a-Service ecosystem
  8. Practical demonstrations covering:
    1. Key flooding and protocol attacks
    2. IP spoofing simulation
    3. Packet analysis of DoS/DDoS traffic using Wireshark.

Overview:

  1. Understanding the purpose and benefits of penetration testing
  2. Identifying key roles and responsibilities within a penetration testing team
  3. Applying approaches based on knowledge scope (black-box, white-box, gray-box) and testing environment (internal vs external)
  4. Exploring common testing areas such as web applications, networks, and systems
  5. Following recognized penetration testing methodologies and standards (including PTES)
  6. Establishing and adhering to Rules of Engagement (ROE)
  7. Mastering the structure and language of VAPT report writing
  8. Practical demonstrations on analyzing findings and preparing professional penetration testing reports

Overview:

  1. Firewall fundamentals and use cases
  2. Demilitarized Zone (DMZ) network architecture
  3. Firewall types (hardware vs software)
  4. Firewall vs Antivirus comparison
  5. Firewall configuration including:
    1. Rule creation and policy management
    2. Introduction to Intrusion Detection Systems (IDS)
    3. IDS detection techniques
    4. Confusion matrix
  6. Network-based IDS (NIDS) vs Host-based IDS (HIDS)
  7. Intrusion Prevention Systems (IPS)
  8. Comparison with IDS and firewalls
  9. Snort IDS rule writing
  10. Honeypot concepts including:
    1. Types
    2. How honeypots work
    3. Honeynet overview and
    4. Honeypot vs HoneyNet differences
    5. Honeypot network architecture
  11. Hands-on demonstrations with KFSensor, Cowrie, and more.

Overview:

  1. Introduction to social engineering and the psychology behind human manipulation
  2. Common attack targets and motives
  3. Phases of a social engineering attack
  4. Classification of techniques
    1. Human-based
    2. Computer-based
    3. Mobile-based
  5. Phishing types including:
    1. Spear phishing (email)
    2. Vishing (voice)
    3. Smishing (SMS)
  6. Simulated phishing attack demonstrations using tools like the Social Engineering Toolkit (SET);
  7. Modern detection and awareness techniques to:
    1. Strengthen human defenses
    2. Prevent social engineering attacks

Overview:

  1. Introduction to cryptography and its importance in cybersecurity
  2. Encryption vs Decryption explained
    1. Demo: ROT13 cipher with hURL
  3. Symmetric encryption overview
  4. Common symmetric algorithms (AES, DES, RC4)
    1. Demo: file encryption using ZIP utility
  5. Aesar cipher & ASCII basics
  6. Introduction to OpenSSL tool
  7. AES encryption explained
    1. Demo: AES-256 encryption/decryption using OpenSSL
  8. Encoding vs Encryption concepts
  9. Asymmetric encryption overview
  10. RSA algorithm explained
    1. Demo: RSA encryption/decryption using OpenSSL
  11. Introduction to hash functions
    1. Demo: generating & cracking hashes with John the Ripper
  12. Disk encryption concepts
  13. BitLocker overview
    1. Demo: disk encryption with BitLocker
  14. VeraCrypt overview
    1. Demo: disk encryption with VeraCrypt.

Overview:

  1. Introduction to steganography and its historical background
  2. Basic data hiding using Linux cat utility
  3. Steghide overview
    1. Demo for embedding data within image/audio files
  4. Stegsnow overview
    1. Demo for text-based steganography using:
      1. Whitespace encoding
      2. DeepSound overview
  • Audio steganography demo
  1. OpenStego overview and demo for image-based data hiding
  2. SNOW tool overview with hands-on text steganography using whitespace encoding techniques.

Overview:

  1. Web application overview
  2. Web application hacking approaches
  3. Penetration testing methodology
  4. Lab and necessary tools setup, including:
    1. bWAPP on VMware
    2. Kali Linux with Firefox and FoxyProxy (proxy management)
    3. Burp Suite
    4. ZAP, including:
      1. Proxy configuration
      2. Traffic interception
    5. Web application mapping and sitemap creation (ZAP, Dirb, Dirbuster)
    6. txt analysis
    7. Web application firewall (WAF) detection using Wafw00f
    8. Brute force attacks
    9. Directory enumeration
    10. OWASP Top 10 exploitation including:
      1. Improper input validation
      2. HTML injection (GET, POST, stored)
      3. Code injection (OS command, PHP)
      4. Cross-site scripting (XSS – reflected, stored)
      5. Broken authentication
      6. Insecure direct object references (IDOR)
      7. Sensitive data exposure (Base64, HTML5 web storage, cleartext HTTP)
      8. Directory traversal
      9. Unvalidated redirects and forwards,
    11. Database fundamentals
    12. SQL injection exploitation (manual and automated with SQLMap)
    13. Information schema overview
    14. Login bypass using SQL injection
    15. Hands-on demonstrations for each attack type.

Course Fee Roadmap

💰

Total Course Fee

BDT 12,000

📅

Installment Plan

Installment 1: BDT 4,000
Installment 2: BDT 4,000
Installment 3: BDT 4,000

Payment System

Bkash - Send Money

01717151255

Rocket - Send Money

01917269647

nagad - Send Money

01917269647

ইন্ডিয়া/অন্যান্য দেশ থেকে পেমেন্টের ক্ষেত্রে যোগাযোগ করুন।
হোয়াটসঅ্যাপঃ +8801917269647

Registration Fee: BDT 2,700 Only

Registration Form

কোর্স-এ এনরোল করতে আগে এডমিশন ফি পরিশোধের মাধ্যমে এনরোলমেন্ট সম্পন্ন করুন।

Cyber Security Registration
PICSEH professional in cyber security and ethical hacking badge

Verification Badge

Get You PICSEH Badge

Become a certified cyber security professional in Bangladesh with the Professional in Cyber Security & Ethical Hacking (PICSEH) program. Gain hands-on skills in: 🔸 Ethical hacking & penetration testing 🔸 Network defense & cybercrime prevention 🔸 Cyber security certification recognized in Bangladesh & globally PICSEH offers dual recognition: A physical badge to showcase your achievement and a verifiable digital credential to boost credibility for cyber security jobs in Bangladesh and worldwide. Join over 500+ professionals who have advanced their careers with this industry-recognized training. Limited seats available – enroll today to gain practical skills, verified credentials, and stand out in the growing information security sector.

Some of the Major Technologies​

Cyber Security Roadmap

1

Networking

TCP/IP, Ports, Protocols

2

Linux & Windows

CLI, OS Basics

3

Reconnaissance

Footprinting, Scanning

4

Exploitation

System Hacking

5

Web Security

OWASP Top 10

6

Bug Bounty

Real-world Pentesting

🎯

Cyber Security Engineer

Career Goal

What You’ll Learn in This Cyber Security Course​

This intensive, practical course covers essential cybersecurity skills, including:

  • Ethical hacking & penetration testing

  • Red team & blue team operations

  • Malware analysis & secure code review

  • Bug bounty training in Bangladesh

  • Risk assessment & vulnerability scanning

  • Comprehensive cyber defense training in BD

  • Security audits, compliance & forensic investigation techniques

  • Secure software development & zero-trust architecture implementation

  • Online cyber security training with certification

Our curriculum aligns with global cybersecurity standards and prepares you for internationally recognized certifications such as:

  • Certified Ethical Hacker (CEH)

  • CompTIA Security+

  • Offensive Security Certified Professional (OSCP)

  • Specialized penetration testing courses

This course is perfect for:

  • Students seeking a recognized cyber security specialist

  • Beginners searching for cyber security courses

  • Professionals preparing for remote cybersecurity jobs

  • Tech freelancers interested in a cyber security freelance course

  • Anyone wanting to learn ethical hacking in Bengali

HaxyGen Academy is more than just a cyber security institute in Bangladesh — we are a thriving community of industry experts, researchers, and mentors dedicated to your success. With our hands-on courses, personalized 1-on-1 mentorship, live lab sessions, and career support, you will be fully prepared to excel in the global cybersecurity marketplace.