Please fill your details

Full Name 

Email ID 

Phone Number 

Selected Campus 

Course 

Program 

Classroom 

Cyber Security and Ethical Hacking

CORE MODULE

Dive into the dynamic world of cyber security & ethical hacking, and embark on a transformative journey that will equip you with the skills and knowledge to safeguard digital assets, combat cyber threats, protect networks, and become a sought-after professional in this in-demand field.

Basic of Networking | Goals of Network Security | Network Flow | Networking Devices | Classification of Network | Topology | Hardware Internet Devices | Physical Layer | Data Link Layer | Network Layer | Transport Layer | Session Layer | Presentation Layer | Application Layer | TCP IP Mode 1 | OSI vs TCP IP | 3way Handshake | Network Class | Subnetting | VLAN | VPN | Packet Tracer | Advance Model | Wireshark | Nessus | Nmap | Introduction to Ethical Hacking | Types of Hacker | Types of Hacking | Phases of Ethical Hacking | Malware-Attacks on Cryptosystems | Types of Malware | Foot Printing | Common Network Threats/Attacks | Phishing Attack | Ransomware | Social Engineering | DOS and DDOS | Session Hijacking | System Hacking | Sniffing | SQL Injection | WiFi Hacking | Broken Object Level Authorization | Broken Authentication | Broken Object Property Level Authorization | Unrestricted Resource Consumption | Broken Function Level Authorization | Unrestricted Access to Sensitive Business Flows | Server-Side Request Forgery (SSRF) | Security Misconfiguration | Improper Inventory Management | Unsafe Consumption of APIs | Web Application Attacks & Architecture | Vulnerability Analysis | Practical on OWASP | Encoding and Decoding | Cryptography | Types of Cryptography | Firewall | Types of Firewall | Application of Firewall | Introduction to IDS and IPS | Types of IDS | Types of IPS | Difference Between IDS and IPS | Introduction to SOC | Importance of SOC | Introduction to SIEM Tools | Signature Finetuning and Analysis Practicals | Introduction to Application and Web Security | WAF | Application of WAF | Introduction to Proxy and EDR | Application of Proxy and EDR | IDAM (Identity and Access Management) | Password Protection & Identity Theft | Counter Measures and Patch Management | Vulnerability Assessments Report, Analysis, Lifecycle | Introduction Vulnerability Assessments | Types of Vulnerability Assessments | Difference between VA and PT | Building Secure Applications | How to Prepare for Interview | Guidance to Future Goal | Interview Sessions

CERTIFICATION

4 MONTHS
(100 HOURS WEEKEND COURSE)

Fees:

PKR 1,00,000

+ 18% GST

DIPLOMA

6 MONTHS
(100 HOURS WEEKEND COURSE) +
(2 MONTHS INTERNSHIP)

Fees:

PKR 2,00,000

+ 18% GST

DUAL CERTIFICATION

IN TWO MOST IN-DEMAND AND HIGHLY PAID SKILLS

Cyber
Security

+

Ethical
Hacking

SKILL-SETS COVERED

VULNERABILITY ANALYSIS

RECONNAISSANCE AND
INFORMATION GATHERING

WEB APPLICATION SECURITY

PENETRATION TESTING

NETWORK SECURITY

IDS, FIREWALLS, AND HONEYPOTS

TOOLS & TECHNOLOGIES

MODE OF LEARNING

Classroom Training

CLASSROOM

ONLINE

Online Training

CLASSROOM

+

ONLINE

BIA® has a CLASSROOM + ONLINE training pattern where students have the flexibility to attend the sessions IN CLASSROOM as well as ONLINE. BIA® Trainers conduct the training sessions live from BIA® Classrooms. All BIA® sessions are live streamed for students from that batch, thus enabling students to attend the same sessions ONLINE and interact with the Trainer as well as other students.

Global Leader in Advanced Technology Training

countries

bia ® campuses

global corporate partners


bia ® trained students

 Million

training hours completed

Industry Trainers

countries

bia ® campuses


global corporate partners

trained students


 Million

training hours completed

Industry Trainers

International Certification
Right Here In Pakistan!

KNOW YOUR FUTURE AS CYBER SECURITY ANALYST

Jobs You Can Apply For

CYBER SECURITY EXPERT
CYBER SECURITY ENGINEER
APPLICATION SECURITY ENGINEER
PENETRATION TESTER
ETHICAL HACKER
NETWORK SECURITY MANAGER
CYBER SECURITY ANALYST
CYBER SECURITY CONSULTANTS
WEB APPLICATION SECURITY TESTER
NETWORK SECURITY ANALYST
INCIDENT RESPONDER
SECURITY RESEARCHER
MOBILE APPLICATION SECURITY TESTER
INFORMATION SECURITY ANALYST
SECURITY ADMINISTRATOR
CLOUD SECURITY SPECIALIST
VULNERABILITY ASSESSOR
NETWORK SECURITY ENGINEER
SECURITY OPERATIONS CENTER (SOC) ANALYST
SECURITY COMPLIANCE ANALYST

BIA Success Stories

bia® in news

Tranding
Tranding
Tranding
Tranding
Tranding
Tranding
Tranding
Tranding
Tranding
Tranding
Tranding

BIA® ALUMNI WORKING WITH TOP GLOBAL COMPANIES