Facebook Pixel
  • Home
  • Course
  • ASSET Project-Penetration Testing for Freelancing (NSDA)

ASSET Project-Penetration Testing for Freelancing (NSDA)

This training is organized by PeopleNTech under the ASSET Project. Participants who successfully complete the program will be awarded a government-recognized certification from the National Skills Development Authority (NSDA).

Class - 20
Duration - 2 months
Projects - 0
Joined - 1459
ASSET Project-Penetration Testing for Freelancing (NSDA)

500015000

500015000

Details About the course

The National Skills Development Authority (NSDA) aims to enhance an individual's employability by certifying completeness with skills. NSDA works to expand the skilling capacity of identified public and private training providers qualitatively and quantitatively. It also aims to establish and operationalize a responsive skill ecosystem and delivery mechanism through a combination of well-defined set of mechanisms and necessary technical supports.

Key priority economic growth sectors identified by the government have been targeted by NSDA to improve current job skills along with existing workforce to ensure required skills to industry standards. Training providers are encouraged and supported to work with industry to address identified skills and knowledge to enable industry growth and increased employment through the provision of market responsive inclusive skills training program Penetration Testing (Cyber Security) is selected as one of the priority occupations of Information and Communication Technology Sector. This standard is developed to adopt a demand driven approach to training with effective inputs from Industry Skills Council's (ISC's), employer associations and employers.

Course Modules

Module-1 : Apply Python Programming
Class - 5
Quiz - 0
Assignment - 0
1. Interpret python programming structure
  • Features of Python Language are stated
  • Structure of Python Program is explained
  • Variables of Python Language are identified
  • Application of Python in cyber security is interpreted
2. Practice with sequential structure
  • Sequential structured problems are identified
  • Algorithm for sequential structured programs is prepared
  • Flow chart of sequential structure programs are created
  • Code is written to implementing the sequential programs
3. Practice with decisions making structure
  • Selective structured problems are identified
  • Algorithm for selective structured programs is prepared
  • Flow chart of selective structured programs are created
  • Code is written to implementing the selective programs.
4. Practice with Loop structure
  • Repetitive structured problems are identified
  • Algorithm for repetitive structured programs is prepared
  • Flow chart of repetitive structured programs are created
  • Code is written to implementing the Repetitive programs
5. Apply Functions and script
  • Remote Management system is interpreted
  • Function program problems are identified
  • Code is written to implementing the function programs with various function activities
6. Maintain Error Handling
  • Standard Errors are interpreted
  • New bugs are identified
  • New bugs are fixup
  • New or changed requirements are implemented without breaking existing functionality.
  • Extensibility are provided flexibility;
  • Enables a high level of reusability is developed for code base.
  • Efficiently discovering bugs and untested code
Module-2 : Apply Mobile Application Security
Class - 3
Quiz - 0
Assignment - 0
1. Interpret Mobile Application Security
  • Mobile application security is interpreted;
  • Mobile OS is interpreted;
  • Mobile Application Security Best Practices is interpreted;
  • Mobile Apps threats are identified;
2. Perform Mobile application penetration testing
  • Penetration testing steps are interpreted;
  • Penetration testing is performed using tools;
  • Report is prepared;
3. Perform web application countermeasures
  • Start with thought like an attacker;
  • Mobile application security is performed using required Solutions;
  • Web application countermeasures are performed;

Module-3 : Apply Social Engineering
Class - 2
Quiz - 0
Assignment - 0
1. Interpret the social engineering concepts
  • Social Engineering in Cyber Security is identified
  • Social Engineering and Social networks are interpreted
  • Social Engineering in Law is identified
2. Identify the social engineering threats
  • Threats of Social Engineering are identified
  • Types of Social Engineering Threats are listed
  • Review Social Engineering case studies and methods of manipulation are apprehended
  • Prevention tricks against Social Engineering Threats are identified
3. Identify Social engineering tools
  • Social Engineering tools are identified as per requirement
  • Social Engineering tools are installed
  • Social Engineering tools are updated and upgraded
4. Analyze the social engineering attacks
  • Social Engineering tools are selected as per requirement
  • Social Engineering attacks are categorized for computer, mobile and physical entity
  • Social Engineering attacks are analyzed following SOP
  • Standard report is prepared as per requirement

Module-4 : Apply advance Web Application Security
Class - 4
Quiz - 0
Assignment - 0
1. Perform SQL injection
  • Down blow database is collected

  • Finding Vulnerable Website is identified

  • Vulnerable columns are displayed

  • Admin Panel is identified

  • Web application tools are identified

2. Interpret Misconfiguration and data expose
  • Misconfiguration concepts are interpreted
  • Risk of Security misconfiguration is limited
  • Application behavior to mitigate the risk of misconfiguration is performed
  • NIST 25 critical controls are interpreted
  • Software testing is interpreted
3. Perform advance web attack
  • Cross site scripting is performed

  • Cross-Site Forgery (CSRF) attacks are prevented

  • CSRF token are validated depends on request method

  • Buffer overflow is performed

  • Local File Inclusion (LFI) is performed

  • Remote file inclusion (RFI) is performed

  • Parameter Tampering is performed

  • OS command injection is performed

4. Apply access control
  • Access control is interpreted
  • Accesses are controlled following SOP

Module-5 : Apply Network security Assessment
Class - 3
Quiz - 0
Assignment - 0
1. Interpret Network security concepts
  • Management Security is interpreted
  • Network devices are interpreted
  • Basic network protocol is identified
  • Network Topologies and Architecture are interpreted
  • Secure Network implementation process is interpreted by packet tracer
2. Perform common network attack and vulnerabilities
  • Major network intrusion is identified

  • Network attacks tools are performed

3. Implement Network Security
  • Network Security Solutions and devices are identified
  • Network Security Solutions are implemented
  • Network Security Solutions and devices are selected as per job requirements
4. Assess Network security
  • Network Security vulnerabilities are identified

  • Network Security vulnerabilities are assessed

  • Network Security vulnerabilities are penetrated
  • Report is prepared following standard format

What you will learn

Kali Linux

Kali Linux

Parrot OS

Parrot OS

Wireshark

Wireshark

Course Instructor

Mehadi Hasan Foysal

Mehadi Hasan Foysal

Faculty, CEH & VAPT

Moinoddeen Quader Al Arabi

Moinoddeen Quader Al Arabi

Faculty - PeopleNTech

Bappe Sarker

Bappe Sarker

Faculty - Cyber Security, PeopleNTech Ltd

Student Feedback

"এই কোর্সের মাধ্যমে আমি প্রফেশনাল স্কিলগুলো গভীরভাবে শিখেছি এবং ইন্টারভিউর জন্য সম্পূর্ণ প্রস্তুত হয়েছি। লাইভ সেশন, প্র্যাকটিক্যাল ক্লাস এবং রিয়েল-লাইফ প্রজেক্টগুলো আমাকে বাস্তব অভিজ্ঞতা দিতে সাহায্য করেছে।"

Sumon Patowary

Sumon Patowary

Frequently Asked Questions

প্রশ্ন-1 : কোর্স কোন সময় করবো? নির্দিষ্ট কোনো সময়ে ক্লাস হবে কি না?
আমাদের প্রতিটা কোর্সের আপকামিং সিডিউল দেওয়া আছে। আপকামিং সিডিউল দেখে আপনি ভর্তি কনফার্ম করতে পারেন অথবা আপনার ফ্লেক্সিবিলিটি অনুযায়ী কোর্স করতে পারবেন।
প্রশ্ন-2 : এই কোর্সে কী কী টুল ব্যবহার শেখানো হয়?
Wireshark, Kali Linux, Metasploit, Burp Suite, Nmap, Splunk, Autopsy, Nessus, এবং আরও অনেক নিরাপত্তা ও ফরেনসিক টুল শেখানো হয়।
প্রশ্ন-3 : কোর্স শেষে কি কোন চাকরির সহযোগিতা পাওয়া যায়?
হ্যাঁ, PeopleNTech থেকে Job Placement ও Freelancing Support প্রদান করা হয়, যার মাধ্যমে দেশ-বিদেশে চাকরির সুযোগ পাওয়া যায়।
প্রশ্ন-4 : কোর্সে কি প্র্যাকটিক্যাল ল্যাব সেশন রয়েছে?
হ্যাঁ, কোর্সে প্র্যাকটিক্যাল ল্যাব সেশন রয়েছে, যেখানে শিক্ষার্থীরা বাস্তব অভিজ্ঞতা অর্জন করতে পারে।

Course Certificate

Get Course Completion and Assessment Certificate at the end of the course

Can add to your CV

You can share directly on your LinkedIn profile

You can share on Facebook with one click

Any more query?

Call For Any Information Regarding The Course. Our team is always ready to assist you with guidance, support, and detailed course information.

+880179-944-6655

09 AM to 09 PM

Course Features

20 Classes with Recorded Videos

20 Classes with Recorded Videos

২৪/৭ সাপোর্ট

২৪/৭ সাপোর্ট

Course duration is 2 months

Course duration is 2 months

CV & Portfolio Development

CV & Portfolio Development

Online and Offline Support

Online and Offline Support

Total 40 Hours

Total 40 Hours

image

আমাদের প্ল্যাটফর্মে রয়েছে বেশ কিছু ফ্রী কোর্স মডিউল!

image

Download the Guidelines for FREE!

কোর্সটি সম্পর্কে বিস্তারিত জানতে

ফোন করুন (0179-944-6655)

blur shape

Copyright © 2026 – PeopleNTech Institute of IT. All Rights Reserved

ASSET Project-Penetration Testing for Freelancing (NSDA)