{"id":5949,"date":"2023-09-16T19:42:14","date_gmt":"2023-09-16T19:42:14","guid":{"rendered":"https:\/\/bastakiyatech.fi\/?page_id=5949"},"modified":"2023-10-09T18:29:11","modified_gmt":"2023-10-09T18:29:11","slug":"cyber-security-ethical-hacking","status":"publish","type":"page","link":"https:\/\/bastakiyatech.fi\/index.php\/cyber-security-ethical-hacking\/","title":{"rendered":"Cyber Security &#038; Ethical Hacking"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"5949\" class=\"elementor elementor-5949\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cc3db0b elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"cc3db0b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-80b4ee1 ot-flex-column-vertical\" data-id=\"80b4ee1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2cffd4c elementor-widget elementor-widget-spacer\" data-id=\"2cffd4c\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.17.0 - 25-10-2023 *\/\n.elementor-column .elementor-spacer-inner{height:var(--spacer-size)}.e-con{--container-widget-width:100%}.e-con-inner>.elementor-widget-spacer,.e-con>.elementor-widget-spacer{width:var(--container-widget-width,var(--spacer-size));--align-self:var(--container-widget-align-self,initial);--flex-shrink:0}.e-con-inner>.elementor-widget-spacer>.elementor-widget-container,.e-con>.elementor-widget-spacer>.elementor-widget-container{height:100%;width:100%}.e-con-inner>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer,.e-con>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer{height:100%}.e-con-inner>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer>.elementor-spacer-inner,.e-con>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer>.elementor-spacer-inner{height:var(--container-widget-height,var(--spacer-size))}.e-con-inner>.elementor-widget-spacer.elementor-widget-empty,.e-con>.elementor-widget-spacer.elementor-widget-empty{position:relative;min-height:22px;min-width:22px}.e-con-inner>.elementor-widget-spacer.elementor-widget-empty .elementor-widget-empty-icon,.e-con>.elementor-widget-spacer.elementor-widget-empty .elementor-widget-empty-icon{position:absolute;top:0;bottom:0;left:0;right:0;margin:auto;padding:0;width:22px;height:22px}<\/style>\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-21c1e85 elementor-section-full_width elementor-section-stretched elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"21c1e85\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7e4910f ot-flex-column-vertical\" data-id=\"7e4910f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6f7e286 elementor-widget elementor-widget-image\" data-id=\"6f7e286\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.17.0 - 25-10-2023 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" width=\"8001\" height=\"2416\" src=\"https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/09\/Cyber-Security-Ethical-Hacking-01.png\" class=\"attachment-full size-full wp-image-9343\" alt=\"\" srcset=\"https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/09\/Cyber-Security-Ethical-Hacking-01.png 8001w, https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/09\/Cyber-Security-Ethical-Hacking-01-300x91.png 300w, https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/09\/Cyber-Security-Ethical-Hacking-01-1024x309.png 1024w, https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/09\/Cyber-Security-Ethical-Hacking-01-768x232.png 768w, https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/09\/Cyber-Security-Ethical-Hacking-01-1536x464.png 1536w, https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/09\/Cyber-Security-Ethical-Hacking-01-2048x618.png 2048w\" sizes=\"(max-width: 8001px) 100vw, 8001px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-883ff94 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"883ff94\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ded54b4 ot-flex-column-vertical\" data-id=\"ded54b4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-37a8693 elementor-widget elementor-widget-spacer\" data-id=\"37a8693\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dcc761f elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"dcc761f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-e05a1ac ot-flex-column-vertical\" data-id=\"e05a1ac\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-240ebc3 elementor-widget elementor-widget-heading\" data-id=\"240ebc3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.17.0 - 25-10-2023 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h1 class=\"elementor-heading-title elementor-size-default\">Overview<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2674e51 elementor-widget elementor-widget-spacer\" data-id=\"2674e51\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad0e6ad elementor-widget elementor-widget-text-editor\" data-id=\"ad0e6ad\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.17.0 - 25-10-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<div style=\"text-align: left;\"><strong>Bastakiya Tech presents complete training on Cybersecurity &amp; Ethical Hacking.<\/strong><\/div><div style=\"text-align: left;\">\u00a0<\/div><div style=\"text-align: left;\"><p>The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers.\u00a0<\/p><p>Since the introduction of CEH in 2003, it is recognized as a standard within the information security community. CEH v11 continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today. The Five Phases of Ethical Hacking and the original core mission of CEH remain valid and relevant today: \u201cTo beat a hacker, you need to think like a hacker.\u201d<\/p><\/div><div style=\"text-align: left;\">\u00a0<\/div><div style=\"text-align: left;\">\u00a070% Hands-on<\/div><div style=\"text-align: left;\">\u00a030% Theory<\/div><div style=\"text-align: left;\">\u00a0Training Completion Certificate*<\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8c0955e elementor-widget elementor-widget-spacer\" data-id=\"8c0955e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aacd7a4 elementor-widget elementor-widget-heading\" data-id=\"aacd7a4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Tools Covered<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cdf42d9 elementor-widget elementor-widget-spacer\" data-id=\"cdf42d9\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-658d280 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"658d280\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-14 elementor-inner-column elementor-element elementor-element-3273eb3 ot-flex-column-vertical\" data-id=\"3273eb3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c55390a elementor-widget elementor-widget-image\" data-id=\"c55390a\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" width=\"215\" height=\"215\" src=\"https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/09\/BurpSuite.jpg\" class=\"attachment-large size-large wp-image-6083\" alt=\"\" srcset=\"https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/09\/BurpSuite.jpg 215w, https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/09\/BurpSuite-150x150.jpg 150w\" sizes=\"(max-width: 215px) 100vw, 215px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-14 elementor-inner-column elementor-element elementor-element-62746bf ot-flex-column-vertical\" data-id=\"62746bf\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fcdf241 elementor-widget elementor-widget-image\" data-id=\"fcdf241\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" width=\"215\" height=\"215\" src=\"https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/09\/Invicti.jpg\" class=\"attachment-large size-large wp-image-6082\" alt=\"\" srcset=\"https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/09\/Invicti.jpg 215w, https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/09\/Invicti-150x150.jpg 150w\" sizes=\"(max-width: 215px) 100vw, 215px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-14 elementor-inner-column elementor-element elementor-element-48c83c0 ot-flex-column-vertical\" data-id=\"48c83c0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1dc7310 elementor-widget elementor-widget-image\" data-id=\"1dc7310\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" width=\"215\" height=\"215\" src=\"https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/09\/Nessus.jpg\" class=\"attachment-large size-large wp-image-6081\" alt=\"\" srcset=\"https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/09\/Nessus.jpg 215w, https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/09\/Nessus-150x150.jpg 150w\" sizes=\"(max-width: 215px) 100vw, 215px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-14 elementor-inner-column elementor-element elementor-element-7eb26dc ot-flex-column-vertical\" data-id=\"7eb26dc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-431df40 elementor-widget elementor-widget-image\" data-id=\"431df40\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" width=\"215\" height=\"215\" src=\"https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/09\/NMAP.jpg\" class=\"attachment-large size-large wp-image-6080\" alt=\"\" srcset=\"https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/09\/NMAP.jpg 215w, https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/09\/NMAP-150x150.jpg 150w\" sizes=\"(max-width: 215px) 100vw, 215px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-14 elementor-inner-column elementor-element elementor-element-15e4cc5 ot-flex-column-vertical\" data-id=\"15e4cc5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5e70637 elementor-widget elementor-widget-image\" data-id=\"5e70637\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" width=\"215\" height=\"215\" src=\"https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/09\/Metasploit.jpg\" class=\"attachment-large size-large wp-image-6077\" alt=\"\" srcset=\"https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/09\/Metasploit.jpg 215w, https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/09\/Metasploit-150x150.jpg 150w\" sizes=\"(max-width: 215px) 100vw, 215px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-14 elementor-inner-column elementor-element elementor-element-f5c9280 ot-flex-column-vertical\" data-id=\"f5c9280\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c10176d elementor-widget elementor-widget-image\" data-id=\"c10176d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" width=\"215\" height=\"215\" src=\"https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/09\/sqlmap.jpg\" class=\"attachment-large size-large wp-image-6079\" alt=\"\" srcset=\"https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/09\/sqlmap.jpg 215w, https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/09\/sqlmap-150x150.jpg 150w\" sizes=\"(max-width: 215px) 100vw, 215px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-14 elementor-inner-column elementor-element elementor-element-2badbe7 ot-flex-column-vertical\" data-id=\"2badbe7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-31bfe6f elementor-widget elementor-widget-image\" data-id=\"31bfe6f\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" width=\"215\" height=\"215\" src=\"https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/09\/OWASP-ZAP.jpg\" class=\"attachment-large size-large wp-image-6078\" alt=\"\" srcset=\"https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/09\/OWASP-ZAP.jpg 215w, https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/09\/OWASP-ZAP-150x150.jpg 150w\" sizes=\"(max-width: 215px) 100vw, 215px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-0f50df4 ot-flex-column-vertical\" data-id=\"0f50df4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-215f76a elementor-widget elementor-widget-iaccordions\" data-id=\"215f76a\" data-element_type=\"widget\" data-widget_type=\"iaccordions.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\r\n\t\t<div class=\"ot-accordions\">\r\n\t\t\t\t\t\t<div class=\"acc-item\">\r\n\t\t\t\t<span class=\"acc-toggle\" data-default=\"yes\">What are the Pre-Requisites? <i class=\"down flaticon-arrow-pointing-to-down\"><\/i><i class=\"up flaticon-arrow-pointing-to-up\"><\/i><\/span>\r\n\t\t\t\t<div class=\"acc-content\">\r\n\t\t\t\t\t<ul class=\"timeline ms-50 mtop-20\"><li class=\"timeline-item\"><div class=\"timeline-event\">Degree Levels<b>:\u00a0<\/b>Bachelors,Masters<\/div><\/li><li class=\"timeline-item\"><div class=\"timeline-event\">Field of Studies<b>:\u00a0<\/b>Information Technology<\/div><\/li><li class=\"timeline-item\"><div class=\"timeline-event\">Prior Job Experience<b>:\u00a0<\/b>NA<\/div><\/li><li class=\"timeline-item\"><div class=\"timeline-event\">Other Programs<b>:<\/b><\/div><\/li><\/ul>\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\t\t\t<div class=\"acc-item\">\r\n\t\t\t\t<span class=\"acc-toggle\" data-default=\"\">Who Should Attend? <i class=\"down flaticon-arrow-pointing-to-down\"><\/i><i class=\"up flaticon-arrow-pointing-to-up\"><\/i><\/span>\r\n\t\t\t\t<div class=\"acc-content\">\r\n\t\t\t\t\t<ul class=\"timeline ms-50 mtop-20\"><li class=\"timeline-item mb-1\"><div class=\"timeline-event\">Business\/Marketing Heads &amp; Executives<\/div><\/li><li class=\"timeline-item mb-1\"><div class=\"timeline-event\">C-Suite Employees responsible for determining and achieving Revenue Targets<\/div><\/li><li class=\"timeline-item mb-1\"><div class=\"timeline-event\">Sales Heads &amp; Executives<\/div><\/li><li class=\"timeline-item mb-1\"><div class=\"timeline-event\">IT employees assigned for assisting Sales, Marketing and Business Analytics Departments<\/div><\/li><li class=\"timeline-item mb-1\"><div class=\"timeline-event\">Students\/graduates with business, commerce, marketing background<\/div><\/li><\/ul>\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\t\t\t<div class=\"acc-item\">\r\n\t\t\t\t<span class=\"acc-toggle\" data-default=\"\">Certification Included <i class=\"down flaticon-arrow-pointing-to-down\"><\/i><i class=\"up flaticon-arrow-pointing-to-up\"><\/i><\/span>\r\n\t\t\t\t<div class=\"acc-content\">\r\n\t\t\t\t\t<ul><li>Exam 77-420:Microsft Excel 2013<\/li><li>SQL Relational Databases 101<\/li><\/ul>\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\t    <\/div>\r\n\r\n\t    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-aaffee4 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"aaffee4\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-96c9072 ot-flex-column-vertical\" data-id=\"96c9072\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f16eb79 elementor-widget elementor-widget-spacer\" data-id=\"f16eb79\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e6d2b50 elementor-widget elementor-widget-heading\" data-id=\"e6d2b50\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Course Outline<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-483bf6b elementor-widget elementor-widget-spacer\" data-id=\"483bf6b\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-0c52d54 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"0c52d54\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6434564 ot-flex-column-vertical\" data-id=\"6434564\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6175201 elementor-widget elementor-widget-itabs\" data-id=\"6175201\" data-element_type=\"widget\" data-widget_type=\"itabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\r\n\t\t<div class=\"ot-tabs\">\r\n\t\t\t\t\t\t<ul class=\"tabs-heading unstyle\">\r\n\t\t\t\t\t\t\t\t<li class=\"tab-link octf-btn\" data-tab=\"tab-1101\">Week 1<\/li>\r\n\t\t\t\t\t\t\t\t<li class=\"tab-link octf-btn\" data-tab=\"tab-2101\">Week 2<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<div id=\"tab-1101\" class=\"tab-content\">\r\n\t\t\t\t<ul><li>Introduction to Course<\/li><li>Networking for Hackers<\/li><li>Linux for Hackers (Administration)<\/li><li>Introduction to Ethical Hacking<\/li><li>Understanding the Elements of Information Security<\/li><li>Understanding Information Security Attacks &amp; Warfare<\/li><li>Overview of Cyber Kill Chain Methodology, TTPs, and IoCs<\/li><li>Overview of Hacking Concepts, Types &amp; Phases<\/li><li>Understanding Ethical Hacking Concepts and its scope<\/li><li>Overview of Information Security Controls Overview of Pakistan Cybersecurity Law's<\/li><li>Linux Administration<\/li><li>Installing Linux<br \/><div class=\"col-md-4 col-xs-12 col-sm-12 pt-0 mt-0\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><\/li><\/ul>\t\t\t<\/div>\r\n\t\t\t\t\t\t<div id=\"tab-2101\" class=\"tab-content\">\r\n\t\t\t\t<ul><li>Understanding Network Scanning Concepts<\/li><li>Understanding various Scanning Tools<\/li><li>Understanding Various Host Discovery and Port Scanning Techniques<\/li><li>Understanding OS Discovery<\/li><li>Understanding various Techniques to Scan Beyond IDS and Firewall<\/li><li>Drawing Network Diagrams<\/li><li>Understanding Footprinting Concepts<\/li><li>Understanding Footprinting through Search Engines and Advanced Google Hacking Techniques<\/li><li>Understanding Footprinting through Web Services and Social Networking Sites<\/li><li>Understanding Website Footprinting and Email Footprinting<\/li><li>Understanding WHOIS, DNS and Network Footprinting<\/li><li>Understanding Footprinting through Social Engineering<\/li><li>Understanding different Footprinting tools and Countermeasures<br \/><div class=\"col-md-4 col-xs-12 col-sm-12 pt-0 mt-0\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><\/li><\/ul>\t\t\t<\/div>\r\n\t\t\t\t    <\/div>\r\n\r\n\t    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-667ceac ot-flex-column-vertical\" data-id=\"667ceac\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a3d28f4 elementor-widget elementor-widget-itabs\" data-id=\"a3d28f4\" data-element_type=\"widget\" data-widget_type=\"itabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\r\n\t\t<div class=\"ot-tabs\">\r\n\t\t\t\t\t\t<ul class=\"tabs-heading unstyle\">\r\n\t\t\t\t\t\t\t\t<li class=\"tab-link octf-btn\" data-tab=\"tab-1374\">Week 3<\/li>\r\n\t\t\t\t\t\t\t\t<li class=\"tab-link octf-btn\" data-tab=\"tab-2374\">Week 4<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<div id=\"tab-1374\" class=\"tab-content\">\r\n\t\t\t\t<ul><li>Overview of Vulnerability Research, Vulnerability Assessment and Vulnerability Scoring System<\/li><li>Overview of Vulnerability Management Life Cycle ( Vulnerability Assessment Phases)<\/li><li>Understanding various types of Vulnerabilities and Vulnerability Assessment Techniques<\/li><li>Understanding Different Approaches of Vulnerability Assessment Solutions<\/li><li>Understanding various types of Vulnerabilities Assessment Tools and Criteria for Choosing Them<\/li><li>Vulnerability Assessment Tools<\/li><li>Generating and Analyzing Vulnerability Assessment Reports<\/li><li>Understanding Enumeration Concepts<\/li><li>understanding Different Techniques for NetBIOS Enumeration<\/li><li>Understanding Different Techniques for SNMP and LDAP Enumeration<\/li><li>Understanding Different Techniques for NTP and NFS Enumeration<\/li><li>Understanding Different Techniques for SMTP and DNS Enumeration<\/li><li>Understanding Other Enumerations such as IPsec, VoIP, RPC, Linux\/Unix, Telnet, FTP, TFTP, SMB, IPv6 and BGP Enumeration<\/li><li>Understanding Different Enumeration Countermeasures<div class=\"col-md-4 col-xs-12 col-sm-12 pt-0 mt-0\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><\/li><\/ul>\t\t\t<\/div>\r\n\t\t\t\t\t\t<div id=\"tab-2374\" class=\"tab-content\">\r\n\t\t\t\t<ul><li>Understanding Malware and Malware propagation Techniques<\/li><li>Understanding Advanced Persistent Threats(APTs) and their Lifecycle<\/li><li>Overview of Trojans, their Types and how they infect Systems<\/li><li>Overview of Viruses, their Types and how they infect Systems<\/li><li>Overview of Computer Worms and Fileless Malware<\/li><li>Understanding the Malware Analysis Process<\/li><li>Understanding Different Techniques to Detect Malware<\/li><li>Understanding different Malware Countermeasures<\/li><li>Overview of CEH Hacking Methodology<\/li><li>Understanding Techniques to Gain Access to the System<\/li><li>Understanding Privilege Escalation Techniques<\/li><li>Understanding Techniques to create and Maintain Remote Access to the System<\/li><li>Overview of Different types of Rootkits<\/li><li>Overview of Steganography and Steganalysis Techniques<\/li><li>Understanding Techniques to hide the evidence of compromise<\/li><li>Understanding Different System Hacking Countermeasures<div class=\"col-md-4 col-xs-12 col-sm-12 pt-0 mt-0\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><\/li><\/ul>\t\t\t<\/div>\r\n\t\t\t\t    <\/div>\r\n\r\n\t    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-983512b elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"983512b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0f82f86 ot-flex-column-vertical\" data-id=\"0f82f86\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2f04917 elementor-widget elementor-widget-itabs\" data-id=\"2f04917\" data-element_type=\"widget\" data-widget_type=\"itabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\r\n\t\t<div class=\"ot-tabs\">\r\n\t\t\t\t\t\t<ul class=\"tabs-heading unstyle\">\r\n\t\t\t\t\t\t\t\t<li class=\"tab-link octf-btn\" data-tab=\"tab-1339\">Week 5<\/li>\r\n\t\t\t\t\t\t\t\t<li class=\"tab-link octf-btn\" data-tab=\"tab-2339\">Week 6<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<div id=\"tab-1339\" class=\"tab-content\">\r\n\t\t\t\t<ul><li>Understanding Social Engineering Concepts<\/li><li>Understanding Various Social Engineering Techniques<\/li><li>Understanding Insiders Threats<\/li><li>Understanding Impersonation on Social Networking Sites<\/li><li>Understanding Identity Theft<\/li><li>Understanding Different Social Engineering Countermeasures<\/li><li>Understanding Different DOS\/DDos Attack Tools<\/li><li>Understanding Different Insiders threats and Identity Theft Countermeasures<\/li><li>Overview of Denial-of-Service(DOS) and Distributed Denial-of-service(DDoS) Attacks<\/li><li>Understanding Different DoS\/DDoS Countermeasures<\/li><li>Overview of Sniffing Concepts and Techniques<\/li><li>Overview of Various Sniffing Tools<\/li><li>Understanding different Sniffing Countermeasures<div class=\"col-md-4 col-xs-12 col-sm-12 pt-0 mt-0\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><\/li><\/ul>\t\t\t<\/div>\r\n\t\t\t\t\t\t<div id=\"tab-2339\" class=\"tab-content\">\r\n\t\t\t\t<ul><li>Understanding Web Application Concepts<\/li><li>Understanding Web Application Threats<\/li><li>Understanding Web Application Hacking Methodology<\/li><li>Overview of Web Application Hacking Tools<\/li><li>Overview of Web APIs, Webhooks and Web Shell Concepts<\/li><li>Overview of Web Application Security Testing Tools<\/li><li>Understanding SQL Injection With its types of Attacks<\/li><li>Understanding of SQL Injection Methodologies<\/li><li>Understanding of Web Server Concepts and its Attacks<\/li><li>Understanding Web Server Attack Methodology And Attack Tools<\/li><li>Understanding Patch Management Concepts<\/li><li>Overview of Web sever Security Tools<\/li><li>Understanding Different Wen Server Attack Countermeasures<div class=\"col-md-4 col-xs-12 col-sm-12 pt-0 mt-0\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><\/li><\/ul>\t\t\t<\/div>\r\n\t\t\t\t    <\/div>\r\n\r\n\t    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-af8df71 ot-flex-column-vertical\" data-id=\"af8df71\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ebbea6d elementor-widget elementor-widget-itabs\" data-id=\"ebbea6d\" data-element_type=\"widget\" data-widget_type=\"itabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\r\n\t\t<div class=\"ot-tabs\">\r\n\t\t\t\t\t\t<ul class=\"tabs-heading unstyle\">\r\n\t\t\t\t\t\t\t\t<li class=\"tab-link octf-btn\" data-tab=\"tab-1132\">Week 7<\/li>\r\n\t\t\t\t\t\t\t\t<li class=\"tab-link octf-btn\" data-tab=\"tab-2132\">Week 8<\/li>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<div id=\"tab-1132\" class=\"tab-content\">\r\n\t\t\t\t<ul><li>Understanding Mobile Platform Attack Vectors<\/li><li>Understanding Hacking Android OS<\/li><li>Understanding Cryptography Concepts<\/li><li>Overview of Encryption Algorithms and Cryptography tools<\/li><li>Understanding Email and Disk Encryption<\/li><li>Understanding Cryptography Attacks along with Cryptoanalysis Tools<\/li><li>Overview Of Wireless Concepts and Encryption Algorithms<\/li><li>Understanding Wireless Hacking And Wireless Hacking Methodology<\/li><li>Understanding Bluetooth Hacking Techniques<\/li><li>Overview of Wireless Hacking Countermeasures and Security Tools<div class=\"col-md-4 col-xs-12 col-sm-12 pt-0 mt-0\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><\/li><\/ul>\t\t\t<\/div>\r\n\t\t\t\t\t\t<div id=\"tab-2132\" class=\"tab-content\">\r\n\t\t\t\t<ul><li>CTF (VulnHub, TryHackMe, HackTheBox)<\/li><li>Bug Bounty<\/li><li>Security Operation Center (SOC)<\/li><li>SIEM Solutions Overview (Wazuh, Splunk, IMB Qradar)<\/li><li>Final Project<div class=\"col-md-4 col-xs-12 col-sm-12 pt-0 mt-0\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><div class=\"col-md-4 col-xs-12 col-sm-12\">\u00a0<\/div><\/li><\/ul>\t\t\t<\/div>\r\n\t\t\t\t    <\/div>\r\n\r\n\t    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-42fa6eb elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"42fa6eb\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3460c10 ot-flex-column-vertical\" data-id=\"3460c10\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4b30407 elementor-widget elementor-widget-heading\" data-id=\"4b30407\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Our Methodology<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9f826cd elementor-widget elementor-widget-spacer\" data-id=\"9f826cd\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-eac2fff elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"eac2fff\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-6869623 ot-flex-column-vertical\" data-id=\"6869623\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-82f3a20 elementor-widget elementor-widget-iiconbox\" data-id=\"82f3a20\" data-element_type=\"widget\" data-widget_type=\"iiconbox.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"icon-box s2 box-gradient box-hover-gradient\">\r\n\t\t\t<div class=\"bg-s3\"><\/div>\r\n\t\t\t<div class=\"bg-before\"><\/div>\r\n\t\t\t<div class=\"bg-after\"><\/div>\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t        \t<i aria-hidden=\"true\" class=\"fas fa-briefcase\"><\/i>\t\t        \t\t\t    \r\n\t\t\t    \t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h6 class=\"box-title\">Industry Usecases<\/h6>\r\n\t            <p>With real world projects and immersive content built in partnership with top tier companies, you\u2019ll master the tech skills companies want.<\/p>\r\n\t        <\/div>\r\n\t        \t\r\n\t    <\/div>\r\n\t    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-06b5e1d ot-flex-column-vertical\" data-id=\"06b5e1d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-2920e95 ot-flex-column-vertical\" data-id=\"2920e95\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-46652ed elementor-widget elementor-widget-iiconbox\" data-id=\"46652ed\" data-element_type=\"widget\" data-widget_type=\"iiconbox.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"icon-box s2 box-gradient box-hover-gradient\">\r\n\t\t\t<div class=\"bg-s3\"><\/div>\r\n\t\t\t<div class=\"bg-before\"><\/div>\r\n\t\t\t<div class=\"bg-after\"><\/div>\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t        \t<i aria-hidden=\"true\" class=\"fas fa-headphones-alt\"><\/i>\t\t        \t\t\t    \r\n\t\t\t    \t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h6 class=\"box-title\">Technical Support<\/h6>\r\n\t            <p>Our knowledgeable mentors guide your learning and are focused on answering your questions, motivating you and keeping you on track.<\/p>\r\n\t        <\/div>\r\n\t        \t\r\n\t    <\/div>\r\n\t    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-4e5c424 ot-flex-column-vertical\" data-id=\"4e5c424\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-498cc48 ot-flex-column-vertical\" data-id=\"498cc48\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8f9a8d1 elementor-widget elementor-widget-iiconbox\" data-id=\"8f9a8d1\" data-element_type=\"widget\" data-widget_type=\"iiconbox.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"icon-box s2 box-gradient box-hover-gradient\">\r\n\t\t\t<div class=\"bg-s3\"><\/div>\r\n\t\t\t<div class=\"bg-before\"><\/div>\r\n\t\t\t<div class=\"bg-after\"><\/div>\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t        \t<i aria-hidden=\"true\" class=\"fas fa-users\"><\/i>\t\t        \t\t\t    \r\n\t\t\t    \t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h6 class=\"box-title\">Career Mentorship<\/h6>\r\n\t            <p>You\u2019ll have access to resume support, portfolio review and optimization to help you advance your career and land a high-paying role.<\/p>\r\n\t        <\/div>\r\n\t        \t\r\n\t    <\/div>\r\n\t    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-3034b1e elementor-widget elementor-widget-image\" data-id=\"3034b1e\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"353\" src=\"https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/10\/live-training-process-2-1-1024x353.png\" class=\"attachment-large size-large wp-image-12737\" alt=\"\" srcset=\"https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/10\/live-training-process-2-1-1024x353.png 1024w, https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/10\/live-training-process-2-1-300x103.png 300w, https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/10\/live-training-process-2-1-768x265.png 768w, https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/10\/live-training-process-2-1.png 1450w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6fc392e elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"6fc392e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9d8ffc0 ot-flex-column-vertical\" data-id=\"9d8ffc0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d6fef2f elementor-widget elementor-widget-spacer\" data-id=\"d6fef2f\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7388e44 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"7388e44\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-19f3800 ot-flex-column-vertical\" data-id=\"19f3800\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5bf9e14 elementor-widget elementor-widget-heading\" data-id=\"5bf9e14\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Frequently Asked Questions<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4c45890 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"4c45890\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-14463b4 ot-flex-column-vertical\" data-id=\"14463b4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6307d8e elementor-widget elementor-widget-spacer\" data-id=\"6307d8e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0ad5a69 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"0ad5a69\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-8cde63e ot-flex-column-vertical\" data-id=\"8cde63e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c533d28 elementor-align-justify elementor-widget elementor-widget-button\" data-id=\"c533d28\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon elementor-align-icon-left\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-question-circle\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Support<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a08547d elementor-widget elementor-widget-spacer\" data-id=\"a08547d\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7063dde elementor-widget elementor-widget-image\" data-id=\"7063dde\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" width=\"709\" height=\"871\" src=\"https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/10\/faq-illustrations-01.png\" class=\"attachment-full size-full wp-image-12738\" alt=\"\" srcset=\"https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/10\/faq-illustrations-01.png 709w, https:\/\/bastakiyatech.fi\/wp-content\/uploads\/2023\/10\/faq-illustrations-01-244x300.png 244w\" sizes=\"(max-width: 709px) 100vw, 709px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-7bd8477 ot-flex-column-vertical\" data-id=\"7bd8477\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-89252f2 elementor-widget elementor-widget-iaccordions\" data-id=\"89252f2\" data-element_type=\"widget\" data-widget_type=\"iaccordions.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\r\n\t\t<div class=\"ot-accordions\">\r\n\t\t\t\t\t\t<div class=\"acc-item\">\r\n\t\t\t\t<span class=\"acc-toggle\" data-default=\"yes\">Will I get a certificate after this course ? <i class=\"down flaticon-arrow-pointing-to-down\"><\/i><i class=\"up flaticon-arrow-pointing-to-up\"><\/i><\/span>\r\n\t\t\t\t<div class=\"acc-content\">\r\n\t\t\t\t\t<p>Yes, You will be awarded a course completion certificate by Dice Analytics if you pass the course.<\/p>\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\t\t\t<div class=\"acc-item\">\r\n\t\t\t\t<span class=\"acc-toggle\" data-default=\"\">How much hands-on will be performed in this course? <i class=\"down flaticon-arrow-pointing-to-down\"><\/i><i class=\"up flaticon-arrow-pointing-to-up\"><\/i><\/span>\r\n\t\t\t\t<div class=\"acc-content\">\r\n\t\t\t\t\t<p>Since our trainings are led by Industry Experts so it is made sure that content covered in workshop is designed with hand on knowledge of more than 70-75 % along with supporting theory.<\/p>\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\t\t\t<div class=\"acc-item\">\r\n\t\t\t\t<span class=\"acc-toggle\" data-default=\"\">What are the PC requirements? <i class=\"down flaticon-arrow-pointing-to-down\"><\/i><i class=\"up flaticon-arrow-pointing-to-up\"><\/i><\/span>\r\n\t\t\t\t<div class=\"acc-content\">\r\n\t\t\t\t\t<p>For this professional workshop, you need to have a PC with minimum 4GB RAM and ideally 8GB RAM.<\/p>\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\t\t\t<div class=\"acc-item\">\r\n\t\t\t\t<span class=\"acc-toggle\" data-default=\"\">What If I miss any of the lectures? <i class=\"down flaticon-arrow-pointing-to-down\"><\/i><i class=\"up flaticon-arrow-pointing-to-up\"><\/i><\/span>\r\n\t\t\t\t<div class=\"acc-content\">\r\n\t\t\t\t\t<p>Don\u2019t worry! We have got you covered. You shall be shared recorded lectures after each session, in case you want to revise your concepts or miss the lecture due to some personal or professional commitments.<\/p>\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\t\t\t<div class=\"acc-item\">\r\n\t\t\t\t<span class=\"acc-toggle\" data-default=\"\">Can I rejoin this training\/workshop? <i class=\"down flaticon-arrow-pointing-to-down\"><\/i><i class=\"up flaticon-arrow-pointing-to-up\"><\/i><\/span>\r\n\t\t\t\t<div class=\"acc-content\">\r\n\t\t\t\t\t<p>Yes, you can rejoin the training within the span of an year of your registration. Please note following conditions in case you\u2019re rejoining.<br \/>1) There are only 5 seats specified for rejoiners in each iteration.<br \/>2) These seats will be served on first come first basis.<br \/>3) If you have not submitted your complete fee, you may not be able to rejoin. Your registration would be canceled<\/p>\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\t    <\/div>\r\n\r\n\t    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1089d06 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"1089d06\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4eb061d ot-flex-column-vertical\" data-id=\"4eb061d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0bfd0d0 elementor-widget elementor-widget-spacer\" data-id=\"0bfd0d0\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Overview Bastakiya Tech presents complete training on Cybersecurity &amp; Ethical Hacking.\u00a0 The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers.\u00a0 Since [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/bastakiyatech.fi\/index.php\/wp-json\/wp\/v2\/pages\/5949"}],"collection":[{"href":"https:\/\/bastakiyatech.fi\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/bastakiyatech.fi\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/bastakiyatech.fi\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bastakiyatech.fi\/index.php\/wp-json\/wp\/v2\/comments?post=5949"}],"version-history":[{"count":56,"href":"https:\/\/bastakiyatech.fi\/index.php\/wp-json\/wp\/v2\/pages\/5949\/revisions"}],"predecessor-version":[{"id":13393,"href":"https:\/\/bastakiyatech.fi\/index.php\/wp-json\/wp\/v2\/pages\/5949\/revisions\/13393"}],"wp:attachment":[{"href":"https:\/\/bastakiyatech.fi\/index.php\/wp-json\/wp\/v2\/media?parent=5949"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}