SlideShare a Scribd company logo
1 of 1
Download to read offline
Looking for a new career?
Land a job that pays $60,000 or more.
Become an Informational Technologist Professional for many cyber security employment
opportunities. This is a tech program that is fast-tracked to cyber security jobs. Courses cover
Cyber security, Ethical hacking, Penetration testing, and Digital Forensics Investigation.
Course Outline.
# Introduction to hacking and security
# Information & network reconnaissance
# IP and Network scanning
# Digital systems hacking
# Web applications hacking
# Smartphone hacking and tracking
# Satellite tracking and signal hacking
# Deep-Fake technology
# Wi-Fi hacking and jamming
# Radio frequency hacking
# GSM Network hacking and jamming
# Aircraft system hacking
# Cloud system hacking
# Crypto-currency and cryptography
# Vulnerability assessment and analysis
# Malware attacks and analysis
# Smart card hacking
# Man-in-the middle attack
# Concepts of digital forensics
# Exploit development with python
REQUIREMENTS
• Internet connection
• High school/diploma
• Ages17-24
• Must live in the Dhaka / Gazipur, Bangladesh.
• Candidate must have laptop or PC
• A work readiness development exercises
will be required to attend.
Cyber Security and Ethical Hacking
CONTACT
 Paradise Computer Academy
 Email: logikeyebd@gmail.com
 Call or Text: +8801766442199
 https://logikeyeforensics.com
Technology advances daily and “Cyber Security” jobs are on the rise.
GET PAID WHILE YOU LEARN
 Take. 35000/- incl. all other charges
 6-9 hours a week over 24 weeks
 Friday and Saturday from 9:00 am - 6:00 pm
 Get a Certificate that can land you a job Market

More Related Content

Similar to Cyber security and Ethical Hacking flyer.pdf

Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024Skillogic Solutions
 
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...Edureka!
 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Skillogic Solutions
 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Skillogic Solutions
 
Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024Skillogic Solutions
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxSkillogic Solutions
 
Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024Skillogic Solutions
 
Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024Skillogic Solutions
 
Cyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptxCyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptxSkillogic Solutions
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxSkillogic Solutions
 
Cyber Security Course in Chennai March 2024
Cyber Security Course in Chennai March 2024Cyber Security Course in Chennai March 2024
Cyber Security Course in Chennai March 2024Skillogic Solutions
 
Cyber Security Course in Chennai April 2024
Cyber Security Course in Chennai April 2024Cyber Security Course in Chennai April 2024
Cyber Security Course in Chennai April 2024Skillogic Solutions
 
Cyber Security Course in Pune March 2024.pptx
Cyber Security Course in Pune March 2024.pptxCyber Security Course in Pune March 2024.pptx
Cyber Security Course in Pune March 2024.pptxSkillogic Solutions
 
Cyber Security Course in Bangalore January
Cyber Security Course in Bangalore JanuaryCyber Security Course in Bangalore January
Cyber Security Course in Bangalore JanuarySkillogic Solutions
 
Cyber Security Course in Bangalore February
Cyber Security Course in Bangalore FebruaryCyber Security Course in Bangalore February
Cyber Security Course in Bangalore FebruarySkillogic Solutions
 
Cyber Security Course in Bangalore February 2024.pptx
Cyber Security Course in Bangalore February 2024.pptxCyber Security Course in Bangalore February 2024.pptx
Cyber Security Course in Bangalore February 2024.pptxSkillogic Solutions
 
Cyber Security Course in Bangalore February 2024
Cyber Security Course in Bangalore February 2024Cyber Security Course in Bangalore February 2024
Cyber Security Course in Bangalore February 2024Skillogic Solutions
 
Cyber Security Course in Bangalore March 2024
Cyber Security Course in Bangalore March 2024Cyber Security Course in Bangalore March 2024
Cyber Security Course in Bangalore March 2024Skillogic Solutions
 
Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024Skillogic Solutions
 
Cyber Law and Security
Cyber Law and SecurityCyber Law and Security
Cyber Law and SecurityIMT CDL
 

Similar to Cyber security and Ethical Hacking flyer.pdf (20)

Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024Cyber Security Course in Hyderabad March 2024
Cyber Security Course in Hyderabad March 2024
 
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024
 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024
 
Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptx
 
Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024
 
Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024
 
Cyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptxCyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptx
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptx
 
Cyber Security Course in Chennai March 2024
Cyber Security Course in Chennai March 2024Cyber Security Course in Chennai March 2024
Cyber Security Course in Chennai March 2024
 
Cyber Security Course in Chennai April 2024
Cyber Security Course in Chennai April 2024Cyber Security Course in Chennai April 2024
Cyber Security Course in Chennai April 2024
 
Cyber Security Course in Pune March 2024.pptx
Cyber Security Course in Pune March 2024.pptxCyber Security Course in Pune March 2024.pptx
Cyber Security Course in Pune March 2024.pptx
 
Cyber Security Course in Bangalore January
Cyber Security Course in Bangalore JanuaryCyber Security Course in Bangalore January
Cyber Security Course in Bangalore January
 
Cyber Security Course in Bangalore February
Cyber Security Course in Bangalore FebruaryCyber Security Course in Bangalore February
Cyber Security Course in Bangalore February
 
Cyber Security Course in Bangalore February 2024.pptx
Cyber Security Course in Bangalore February 2024.pptxCyber Security Course in Bangalore February 2024.pptx
Cyber Security Course in Bangalore February 2024.pptx
 
Cyber Security Course in Bangalore February 2024
Cyber Security Course in Bangalore February 2024Cyber Security Course in Bangalore February 2024
Cyber Security Course in Bangalore February 2024
 
Cyber Security Course in Bangalore March 2024
Cyber Security Course in Bangalore March 2024Cyber Security Course in Bangalore March 2024
Cyber Security Course in Bangalore March 2024
 
Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024
 
Cyber Law and Security
Cyber Law and SecurityCyber Law and Security
Cyber Law and Security
 

More from Mehedi Hasan

Company profile logikeye.pdf
Company profile logikeye.pdfCompany profile logikeye.pdf
Company profile logikeye.pdfMehedi Hasan
 
Hackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptxHackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptxMehedi Hasan
 
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...Mehedi Hasan
 
Cyber security and Ethical Hacking Course.pdf
Cyber security and Ethical Hacking Course.pdfCyber security and Ethical Hacking Course.pdf
Cyber security and Ethical Hacking Course.pdfMehedi Hasan
 
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdfCYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdfMehedi Hasan
 
Wall Listening Devices.pdf
Wall Listening Devices.pdfWall Listening Devices.pdf
Wall Listening Devices.pdfMehedi Hasan
 
Smart voice security system
Smart voice security systemSmart voice security system
Smart voice security systemMehedi Hasan
 
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICESONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICESMehedi Hasan
 
Nuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docxNuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docxMehedi Hasan
 
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptxInformation Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptxMehedi Hasan
 
Cyber Crime Awareness.pptx
Cyber Crime Awareness.pptxCyber Crime Awareness.pptx
Cyber Crime Awareness.pptxMehedi Hasan
 
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...Mehedi Hasan
 
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...Mehedi Hasan
 
Cyber crime and investigation training
Cyber crime and investigation trainingCyber crime and investigation training
Cyber crime and investigation trainingMehedi Hasan
 
সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ
সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ
সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ Mehedi Hasan
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigationMehedi Hasan
 
Remote control system (rcs)
Remote control system (rcs)Remote control system (rcs)
Remote control system (rcs)Mehedi Hasan
 
Live memory forensics
Live memory forensicsLive memory forensics
Live memory forensicsMehedi Hasan
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security Mehedi Hasan
 
Cyber security & ethical hacking 10
Cyber security & ethical hacking 10Cyber security & ethical hacking 10
Cyber security & ethical hacking 10Mehedi Hasan
 

More from Mehedi Hasan (20)

Company profile logikeye.pdf
Company profile logikeye.pdfCompany profile logikeye.pdf
Company profile logikeye.pdf
 
Hackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptxHackng CPU Code through Security Fuse.pptx
Hackng CPU Code through Security Fuse.pptx
 
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
Unlocking the Secrets Revolutionizing Rom Cloning Technology with a Creative ...
 
Cyber security and Ethical Hacking Course.pdf
Cyber security and Ethical Hacking Course.pdfCyber security and Ethical Hacking Course.pdf
Cyber security and Ethical Hacking Course.pdf
 
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdfCYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
 
Wall Listening Devices.pdf
Wall Listening Devices.pdfWall Listening Devices.pdf
Wall Listening Devices.pdf
 
Smart voice security system
Smart voice security systemSmart voice security system
Smart voice security system
 
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICESONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
ONLINE SEFTY AND AWARNESS OF OPERATION AND SECURITY OF DIGITAL DEVICES
 
Nuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docxNuclear Powered Drones A Threat to Biodiversity.docx
Nuclear Powered Drones A Threat to Biodiversity.docx
 
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptxInformation Leakage The Impact on Smart Bangladesh Vision 2041.pptx
Information Leakage The Impact on Smart Bangladesh Vision 2041.pptx
 
Cyber Crime Awareness.pptx
Cyber Crime Awareness.pptxCyber Crime Awareness.pptx
Cyber Crime Awareness.pptx
 
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
UNVEILING THE DAR SIDE EXPLORING THE DEVASTATING CONSEQUENCES OF FINANCIAL FR...
 
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
The Digital Dilemma Unveiling the Impact of Social Media and the Menace of Cy...
 
Cyber crime and investigation training
Cyber crime and investigation trainingCyber crime and investigation training
Cyber crime and investigation training
 
সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ
সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ
সাইবার নিরাপত্তা বিষয়ক ওয়ার্কশপ
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
 
Remote control system (rcs)
Remote control system (rcs)Remote control system (rcs)
Remote control system (rcs)
 
Live memory forensics
Live memory forensicsLive memory forensics
Live memory forensics
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
 
Cyber security & ethical hacking 10
Cyber security & ethical hacking 10Cyber security & ethical hacking 10
Cyber security & ethical hacking 10
 

Recently uploaded

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 

Recently uploaded (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 

Cyber security and Ethical Hacking flyer.pdf

  • 1. Looking for a new career? Land a job that pays $60,000 or more. Become an Informational Technologist Professional for many cyber security employment opportunities. This is a tech program that is fast-tracked to cyber security jobs. Courses cover Cyber security, Ethical hacking, Penetration testing, and Digital Forensics Investigation. Course Outline. # Introduction to hacking and security # Information & network reconnaissance # IP and Network scanning # Digital systems hacking # Web applications hacking # Smartphone hacking and tracking # Satellite tracking and signal hacking # Deep-Fake technology # Wi-Fi hacking and jamming # Radio frequency hacking # GSM Network hacking and jamming # Aircraft system hacking # Cloud system hacking # Crypto-currency and cryptography # Vulnerability assessment and analysis # Malware attacks and analysis # Smart card hacking # Man-in-the middle attack # Concepts of digital forensics # Exploit development with python REQUIREMENTS • Internet connection • High school/diploma • Ages17-24 • Must live in the Dhaka / Gazipur, Bangladesh. • Candidate must have laptop or PC • A work readiness development exercises will be required to attend. Cyber Security and Ethical Hacking CONTACT  Paradise Computer Academy  Email: logikeyebd@gmail.com  Call or Text: +8801766442199  https://logikeyeforensics.com Technology advances daily and “Cyber Security” jobs are on the rise. GET PAID WHILE YOU LEARN  Take. 35000/- incl. all other charges  6-9 hours a week over 24 weeks  Friday and Saturday from 9:00 am - 6:00 pm  Get a Certificate that can land you a job Market