Diploma in Basic Cyber Security

Diploma in Cyber Security Training in Kolkata

Diploma in Cyber Security Training in Kolkata has designed by our experienced professional penetration testers. They had been working in this domain for last 15 years. This is the best certificate which will definitely help you to secure a good job in the space of cyber security. A diploma indicates that a student has applied his or herself to gain a deeper understanding of their chosen field. Thousands of schools around the world offer diplomas in a variety of different subjects, including technology. Indian Cyber Security Solutions provide the most comprehensive Diploma in Cyber Security Certification in Kolkata frame work. After that you will be able to secure a job as a penetration tester or cyber security expert. Kolkata, more popularly known as the City of Joy, is the third-most productive metropolitan city of India. If you are looking for Diploma in Cyber Security Course in Kolkata, then you should join Indian Cyber Security Solutions.

This training focuses on the core issues of cloud & network security. Starting from the basic and then core security problem faced by industry experts while working as a cyber security professional. Cyber Security process of protection of the access to files and directories in a computer network. Against hacking, misuse and unauthorized changes to the system. With employment of information security analysts projected to grow by 18 percent from 2016 to 2024. You will learn by Diploma in Cyber Security Training in Kolkata is the process about used to protection of the access to files. It is directories in a computer network against hacking, misuse and unauthorized changes to the system. Join us for the course and after that you can build your career in this domain. ICSS’s Diploma in Cyber Security Training in Kolkata is in-demand as they build awareness of best practices against various attacks.

 

 

[sg_popup id=8677]
[course-shortcode]

 

ENROLL NOW

 

 

Cyber Security Diploma in Kolkata

 

Diploma in Cyber Security Course in Kolkata

Diploma in Cyber Security Course in Kolkata by Indian Cyber Security Solutions is in very high demand. It is a comprehensive cybersecurity course to learn the most effective steps to prevent attacks and detect adversaries with actionable techniques. ICSS provides course from cybersecurity professionals with foundational, intermediate, and advanced security skills through industry-leading certification courses. The program begins with introductory-level cybersecurity skills training. Then progresses to advanced cybersecurity technologies such as reverse engineering, penetration testing techniques, and much more. Diploma in Cyber Security Course in Kolkata has always been an important process. For every team in every business.

If you want to try your hand at cybersecurity, then you must know that it is a vast industry with numerous domains such as application security, network security, and digital forensics which is sometimes further classified into other branches. So, you should be aware of your interest before you take your first step toward the industry. But if you have already made up your mind to become an ethical hacker, then join ICSS to gain depth knowledge in this field. Diploma in Cyber Security Training in Kolkata has always been an important process. For every team in every business. In recent years, cybersecurity has become vital in all organizations. This course will allow you to get practical experience in tools and techniques. This Diploma in Cyber Security Course in Kolkata teaches professionals to spot vulnerabilities, fend off attacks, and immediately respond to emergencies.

 

 

Diploma in Cyber Security Training & Certification

 

 

Eligibility Criteria for the course

Students from any background can apply for this course. We provide Hands-on training from Industry experts. They are real-time hackers and currently working in this domain. Diploma in Cyber Security Training in Kolkata will help you to develop your necessary skills required in the industry. You will able to secure a job as a penetration tester after that. This is the process used for the protection of access to files. Directories in a computer network against hacking, misuse, and unauthorized changes to the system. It uses the same knowledge and tools as a malicious hacker but in a lawful and legitimate manner. It can assess the security posture of a target system. Securing a network requires a complex combination of hardware devices, such as routers, firewalls, and anti-malware software applications. Grow your knowledge in this field by the course.

 

 

Classroom

 

Course Details:

In our diploma courses we will be covering:

Networking

Certified Ethical Hacker Training Module (CEHv10) / Ethical Hacking Professional Training Module (CEHP)

Network Penetration Testing 

WAPT

Basic Python

 

Course Fee for Cyber Security Diploma in Kolkata:

Online with globalINR 81,300/– + 18% GST

Classroom with global INR 83,300/- + 18% GST

 

Online without globalINR 60,300/- + 18% GST

Classroom without global INR 62,300/- + 18% GST

 

Course Duration:

15 months training program (2 hours per class)

 

Check out the jobs opportunity after that course:

 

Syllabus for Cyber Security Diploma in Kolkata

 

CCNA:

Chapter-1 Introduction

Lecture 1: What is Computer network?

Lecture 2: What is LAN?

Lecture 3: What is MAN?

Lecture 4: What is WAN?

Lecture 5: Parts of the network?

 

Chapter-2 Internet

Lecture 6: How the internet works?

Lecture 7: What is webserver?

Lecture 8: What is Server?

Lecture 9: What are client and host?

Lecture 10: What is NIC?

Lecture11: What is Protocol?

EXAM

 

Chapter-3 Topology

Lecture 12: Bus topology

Lecture 13: Ring topology

Lecture 14: Star topology

Lecture 15: Mesh topology

 

Chapter-4 Network Components

Lecture 16: OSI model

Lecture 17: What is Modem?

Lecture 18: What is a Router?

Lecture 19: What is Switch?

Lecture 20: What is Repeater?

EXAM

 

Chapter- 5 INTERNET PROTOCOL IV (IPV4)

Lecture 21: How binary code works?

Lecture 22: What is Network ID?

Lecture 23: What is Host ID?

Lecture 24: Subnetting

Lecture 25: CIDR notation

Verifying and troubleshooting in IP address

 

Chapter-6 Protocol

Lecture 26: What is TCP?

Lecture 27: What is UPD?

Lecture 28: What is HTTP?

Lecture 29: What is FTP?

Lecture 30: What is TFTP?

Lecture 31: What is SMTP?

Lecture 32: What is POP?

Lecture 33: What is ICMP?

Ethernet

 

Chapter-7 Routing and switching

Lecture 34: Cisco hardware components

Lecture 35: Cisco software

Lecture 36: Router categories

Lecture 37: Routers ports

Lecture 38: Router functions

Ideal network

 

Chapter-8 Routing basic

Lecture39: How it decides the best route?

Lecture 40: Static routing

Lecture41: Dynamic routing

 

Chapter-9 switch network overview

Lecture 42: VLAN configuration

Basic switch configuration

 

9.1 Chapter-9.1 inter-VLAN routing

Inter VLAN routing

Inter VLAN routing lab

 

Chapter-10 NAT

Lecture-43: Static NAT configuration

Lecture-44: Dynamic NAT configuration

Lecture-45: NAT overload configuration (PAT)

10.1. Access-list control

Access-list configuration

10.2 .scaling

Lab vtp configuration

Lan rendunce

STP – Spanning-Tree Configuration

 

Chapter-11 DHCP

Lecture-46: DHCP methods

Lecture-47: DHCP scope

Lecture-48: DHCP leased period

Lecture-49: DHCP configuration parameters

 

Chapter-12 DHCP configuration & DHCP CONFIGURATION SERVER

Lecture-50: DHCP configuration

EXAM TOPIC NAT & VLAN

 

Chapter-13 CISCO ISO & IOS Images & Licensing

IOS

IOS Images & Licensing

 

Chapter-14 OSPF V3

Lecture-52: OSPF configuration

Single area

OSPF v3 configuration

Muti-area OSPF

EXAM

 

Chapter-15

OSPF configuration

Troubleshooting

Troubleshooting Networking

 

Chapter-16 EIGRP

Lecture-53: EIGRP configuration

Advance eigrp configuration & Troubleshooting Networking

 

Chapter-17 IPv6

Lecture-54: Understanding IPv6

DISCUSS PROJECT TOPIC

 

Chapter- 18 BGP

Lecture- 55: What is BGP

Lecture- 56: What is IBGP

Lecture- 57: What is EBGP

Lecture- 58: How to Configure BGP

 

Chapter- 19 Link Aggregation

Ether Channel Configuration

Wireless LAN

Cisco Wireless Architecture

 

Chapter-20 HSRP (Hot Standby Router Protocol)

Lecture 68: priority

Lecture 69: pre-emption

Lecture 70: version

Lecture 71: Configuration HSRP

First Hop Redundancy Protocols –VRRP

First Hop Redundancy Protocols – GLBP

 

Chapter- 21 Configures and verifies device management

Lecture – 77: Time zones

Lecture- 78: Loopback 

21.1. Quality of Services

CONFIGURATION

21.2. Cloud & Network Programming

 

Chapter- 22 Use Cisco IOS tools to troubleshoot and resolve

Problems:

Lecture – 79: Terminal monitors

Lecture – 80: Ping and traceroute with extended option

Lecture – 81: Log events

 

Chapter- 23 Infrastructure Security

Lecture – 82: Local authentications

Lecture – 83: Secure passwords

Lecture – 84: Access to a device

Lecture – 85: Source address

Lecture – 86: Telnet/SSH

 

Chapter-24 WAN Technologies

Lecture-88: Configure and verify PPP and MLPPP on WAN interfaces using local authentication.

Lecture-89: Describe WAN topology options

1.Point –to-point

Single vs dual-homed

Lecture 90:-Describe WAN access connectivity options

Wide area network

Point to point network

2. MPLS

Metro Ethernet & Broadband PPPoE

Internet VPN (DMVPN, site-to-site VPN, client VPN)

 

Chapter-25 SECURITY FUNDAMENTALS

Key Security Concepts

Password Policies Elements and

Password Alternatives

Next-Generation Firewall and IPS

Wireless Security Protocols

 

Chapter-26 NETWORK AUTOMATION AND PROGRAMMABILITY

Why We Need Network Automation

Traditional Networks vs Controller

Based Networks

Control Plane and Data Plane

Network Controllers (Cisco DNA and Wireless Controllers)

Cisco Software-Defined Access

Northbound and Southbound APIs

REST APIs

Configuration Management

Mechanisms (Ansible, Chef, and Pupp)

Interpret JSON Encoded Data

 

 

 

C|EH V10-Certified Ethical Hacker Training Module

 

Chapter 1 – Introduction to Ethical Hacking

    • What is Hacking
    • What is Ethical Hacking
    • Types of Hackers
    • White Hat Hacker
    • Black Hat Hackers
    • Gray Hat Hackers
    • Script Kiddies
    • Hacktivists
    • Spy Hackers
    • Cyber Terrorists
    • Vulnerability
    • Exploit
    • Remote Exploit
    • Local Exploit
    • Zero-day
    • 0-day vulnerability
    • Zero-day Exploit
    • Brute force attack
    • Phishing
    • Remote access
    • Payload

100 Marks Internal Exam ( Practical or article submission )

 

Chapter 2 – Steps of Ethical Hacking Information Gathering

  • Active Information Gathering
  • Passive Information Gathering
  • Scanning
  • Gaining Access
  • Maintaining Access
  • Covering Tracks

100 Marks Internal Exam ( Practical or article submission )

 

Chapter 3 – Types of Malicious files

  • Viruses
  • Worms
  • Trojan Horse
  • Spyware
  • Adware
  • Backdoor
  • Rootkits
  • Ransomware

100 Marks Internal Exam ( Practical or article submission )

 

Chapter 4 –  Penetration Testing

  • What is Penetration Testing
  • Types of Penetration Testing
  • What is white box Penetration Testing
  • What is Black Box Penetration testing
  • Introduction to Linux OS
  • Social Engineering

100 Marks Internal Exam ( Practical or article submission )

Chapter 5 – Google Hacking Using Dorks Demo

Lab Setup

  • What is Virtual Machine
  • What’s VMware
  • What is Virtual Box
  • Installing VMware
  • Install Kali Linux
  • Installing Windows XP
  • Install Windows 7
  • Install Add on in Mozilla
  • Tamper Data
  • Burp Suite
  • No-Redirect
  • Install Nessus

 

Chapter 6 – System Hacking

  • System Hacking using Kon-Boot
  • Network Scanning
  • Port Scanning
  • Service Scanning
  • What is Nmap
  • Scanning With Nmap
  • Nmap Various Command

 

Chapter 7 – Scanning With Nessus Hacking With Metasploit

  • What is Metasploit?
  • Xp Remote Exploit using Metasploit
  • Msfvenom
  • Windows7 UAC Bypass

 

Chapter 8 – What is SE-Toolkit

  • SE-Toolkit Usages
  • Create Phishing page with SE-Toolkit
  • Hacking Facebook & Gmail password

 

Chapter 9 – What is Remote Administration Tool

  • What is RAT
  • Exploit With RAT
  • Protect System from RAT

 

Chapter 10 – What is Sniffing

  • Types of Sniffing
  • Network Sniffing with Wireshark
  • Get FTP Login Details Using Wireshark

 

Chapter 11 – What is DOS

  • Details of DOS
  • What is DDOS

 

Chapter 12 – Wireless Network Hacking

  • Wireless Encryption
  • Hacking WPA 2

 

Chapter 13 – Web Application Pen-testing

  • How Web Application Works
  • Request and Response
  • Installing Scanner (Acunetix, Netsparker)
  • Scanning Website

 

Chapter 14 – OWASP Top 10

  • What is SQL-Injection?
  • Types of SQL-Injection
  • Live Demo on SQL-Injection

 

Chapter 15 – What is XSS

  • Types of XSS
  • Live Demo on XSS All types

 

Chapter 16 – What is CSRF

  • Live Demo On CSRF What is HTML Injection
  • Live Demo on HTML Injection

 

Chapter 17 – What is Directory Listing

  • Live Demo on Directory Listing What is Broken Auth
  • Demonstration on Broken Auth What is Tamper data?
  • Live Demo on Tamper Data on Ecommerce site
  • Session Hijacking

 

Chapter 18 – What is Phishing?

  • Create a Phishing Page What is Web Shell
  • Hack Web-Server Using Web-Shell

 

Chapter 19 – Hacking Android Phone using Metasploit Question and Answer Class

 

Chapter 20 – Project

 

Ethical Hacker Professional (CEHP) Training Module:

 

Chapter 1 – Introduction to Ethical Hacking

    • What is Hacking
    • What is Ethical Hacking
    • Types of Hackers
    • White Hat Hacker
    • Black Hat Hackers
    • Gray Hat Hackers
    • Script Kiddies
    • Hacktivists
    • Spy Hackers
    • Cyber Terrorists
    • Vulnerability
    • Exploit
    • Remote Exploit
    • Local Exploit
    • Zero-day
    • Zero-day vulnerability
    • Zero-day Exploit
    • Brute force attack
    • Phishing
    • Remote access
    • Payload

100 Marks Internal Exam ( Practical or article submission )

 

Chapter 2 – Steps of Ethical Hacking Information Gathering

  • Active Information Gathering
  • Passive Information Gathering
  • Scanning
  • Gaining Access
  • Maintaining Access
  • Covering Tracks

100 Marks Internal Exam ( Practical or article submission )

 

Chapter 3 – Types of Malicious files

  • Viruses
  • Worms
  • Trojan Horse
  • Spyware
  • Adware
  • Backdoor
  • Rootkits
  • Ransomware

100 Marks Internal Exam ( Practical or article submission )

 

Chapter 4 –  Penetration Testing

  • What is Penetration Testing
  • Types of Penetration Testing
  • What is white box Penetration Testing
  • What is Black Box Penetration testing
  • Introduction to Linux OS
  • Social Engineering

100 Marks Internal Exam ( Practical or article submission )

Chapter 5 – Google Hacking Using Dorks Demo

Lab Setup

  • What is Virtual Machine
  • What is VMware
  • What is Virtual Box
  • Install VMware
  • Install Kali Linux
  • Install Windows XP
  • Install Windows 7
  • Install Add on in Mozilla
  • Tamper Data
  • Burp Suite
  • No-Redirect
  • Install Nessus

 

Chapter 6 – System Hacking

  • System Hacking using Kon-Boot
  • Network Scanning
  • Port Scanning
  • Service Scanning
  • What is Nmap
  • Scanning With Nmap
  • Nmap Various Command

 

Chapter 7 – Scanning With Nessus Hacking With Metasploit

  • What is Metasploit?
  • XP Remote Exploit using Metasploit
  • Msfvenom
  • Windows7 UAC Bypass

 

Chapter 8 – What is SE-Toolkit

  • SE-Toolkit Usages
  • Create Phishing page with SE-Toolkit
  • Hacking Facebook & Gmail password

 

Chapter 9 – What is Remote Administration Tool

  • What is RAT
  • Exploit With RAT
  • Protect System from RAT

 

Chapter 10 – What is Sniffing

  • Types of Sniffing
  • Network Sniffing with Wireshark
  • Get FTP Login Details Using Wireshark

 

Chapter 11 – What is DOS

  • Details of DOS
  • What is DDOS

 

Chapter 12 – Wireless Network Hacking

  • Wireless Encryption
  • Hacking WPA 2

 

Chapter 13 – Web Application Pen-testing

  • How Web Application Works
  • Request and Response
  • Installing Scanner (Acunetix, Netsparker)
  • Scanning Website

 

Chapter 14 – OWASP Top 10

  • What is SQL-Injection?
  • Types of SQL-Injection
  • Live Demo on SQL-Injection

 

Chapter 15 – What is XSS

  • Types of XSS
  • Live Demo on XSS All types

 

Chapter 16 – What is CSRF

  • Live Demo On CSRF What is HTML Injection
  • Live Demo on HTML Injection

 

Chapter 17 – What is Directory Listing

  • Live Demo on Directory Listing What is Broken Auth
  • Live Demo on Broken Auth What is Tamper data?
  • Live Demo on Tamper Data on Ecommerce site
  • Session Hijacking

 

Chapter 18 – What is Phishing?

  • Create a Phishing Page What is Web Shell
  • Hack Web-Server Using Web-Shell

 

Chapter 19 – Hacking Android Phone using Metasploit Question and Answer Class

 

Chapter 20 – Project

 

 

Web Application Penetration Testing Training Module:

 

Lesson 1: HTTP Basics

The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web.

 

Lesson 2: OWASP (Open Web Application Security Project)

The Open Web Application Security Project is an online community which creates freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security.

 

Lesson 3: SQL Injection

SQL injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements (also commonly referred to as a malicious payload) that control a web application’s database server (also commonly referred to as a Relational Database Management System – RDBMS). Since an SQL injection vulnerability could possibly affect any website or web application that makes use of an SQL-based database, the vulnerability is one of the oldest, most prevalent, and most dangerous of web application vulnerabilities.

 

Lesson 4: Cross-Site Request Forgery (CSRF)

Cross-Site Request Forgery (CSRF) is an attack outlined in the OWASP Top 10 whereby a malicious website will send a request to a web application that a user is already authenticated against from a different website. This way an attacker can access functionality in a target web application via the victim’s already authenticated browser. Targets include web applications like social media, in-browser email clients, online banking and web interfaces for network devices.

 

Lesson 5: Cross-site Scripting (XSS)

Cross-site Scripting (XSS) refers to a client-side code injection attack wherein an attacker can execute malicious scripts (also commonly referred to as a malicious payload) into a legitimate website or web application. XSS is amongst the most rampant of web application vulnerabilities and occurs when a web application makes use of unvalidated or unencoded user input within the output it generates.

 

Lesson 6: Command Injection

Command injections are prevalent to any application independently of its operating system that hosts the application or the programming language that the application itself is developed. The impact of command injection attacks ranges from loss of data confidentiality and integrity to unauthorized remote access to the system that hosts the vulnerable application.

 

Lesson 7: Directory traversal

The web server is configured to display the list of files contained in this directory. This is not recommended because the directory may contain files that are not normally exposed through links on the web site.

 

Lesson 8: Input Validation

Input Validation is the outer defensive perimeter for your web application. This perimeter protects the core business logic, processing, and output generation. Beyond the perimeter is everything considered potential enemy territory which is…literally everything other than the literal code executed by the current request.

 

Lesson 9: Information leakage

Information Leakage is an application weakness where an application reveals sensitive data, such as technical details of the web application, environment, or user-specific data. Sensitive data may be used by an attacker to exploit the target web application, its hosting network, or its users.

 

Lesson 10: Click-Jacking

Clickjacking attacks are an emerging threat on the web. In this paper, we design new clickjacking attack variants using existing techniques and demonstrate that existing clickjacking defenses are insufficient. Our attacks show that clickjacking can cause severe damages, including compromising a user’s private webcam, email or other private data, and web surfing anonymity.

 

Lesson 11: Web Application Security Controls

  • Application Security – Overview
  • Threat Modeling
  • Hacker’s Approach
  • Practical Considerations
  • Case Study

 

Lesson 12: Exploitation and Information Gathering Tools

  • Burp Suite
  •  Sqlmap
  • Acunetix
  • Archini
  • W3af
  • Browser Exploitation Framework (BeEF)

 

Network  Penetration Testing

 

Lesson 1:  Introduction to Network Security
Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

 

Lesson 2:  Penetration Testing Lab Setup
According to the configuration of Laptop, 32/64 bit, provide VMware, and any Penetration testing OS like Kali/Backbox, Windows XP SP2, Windows 7 Install VMware, OSs on it using Bridge Connection

 

Lesson 3: Deep Information Gathering
Active Information Gathering in-depth.

  • Passive Information Gathering in-depth.
  • Scanning target using Nmap advanced features.
  • Vulnerability Scanning.

 

Lesson 4: Getting into System

  • Exploiting Windows and Linux System
  • Application of Metasploit
  • Creating malicious files (standalone binaries) using MSF venom
  • Attack through browser
  • Evading Antivirus
  • Bruteforcing on Ports
  • Exploiting using different File Format
  • Social-Engineer Toolkit (SET)

 

Lesson 5: Sniffing & MITM

Studying ARP, how it works and how it can be manipulated to mount sophisticated attacks is made extremely easy to understand. Sniffing is a technique that you will be able to fully grasp in its most practical aspects. We will make sure you have enough basics of network theory before we cover actual attack scenarios using the best tools available. Man in the middle attacks are one of the most used penetration testing techniques today; you will be able to mount a man in the middle attacks within local networks and over the Internet.

 

Lesson 6: Post Exploitation

ICSS experienced instructors have come up with a proven methodology to conduct thorough Exploitation of remote internal networks through advanced Post exploitation techniques. Once the student is comfortable with the most recent exploitation techniques, he will be exposed to the cyclic steps of a successful Post exploitation phase. This is the phase where criminals ensure stable high privileged access to the remote network in order to steal and ex-filtrate documents and credentials from the organization. Penetration testers must possess the same skill-set and tools in order to test not only the perimeter security but also any kind of internal weakness that affects the organization’s security.

 

Lesson 7: Anonymity

Penetration testers rarely need to cover their tracks. However, there are times when testing the efficiency of the target organization incident response team is within the scope of a Penetration tester’s engagement.

 

Lesson 8: Social Engineering

The social engineering module will guide you through the most modern social engineering attack techniques. Real-world attacks will be illustrated by exploiting the potential of social networks such as Facebook, Spokeo or Twitter. Almost one hour of video lessons will teach you everything you need to know to master the most important tool in the field: Social Engineering Toolkit.

 

Lesson 9: Pentesting With Metasploit

In this module, the student will study the Metasploit architecture and the framework and will learn how to create, add or edit custom Metasploit modules. Thanks to our virtual labs, the student will also have the chance to practice against real vulnerable machines.

 

Lesson 10: Traffic Analysis

After the target network has been identified, the next step is to configure our tools in order to sniff and intercept the traffic. This is a very important step for all the attacks that come hereafter.

 

Lesson 11: Attacking Wi-Fi Network

The following module focuses on the attacks that can be executed on Wi-Fi networks. The student will learn how to attack and access remote Wi-Fi networks, obtain keys, password and much more, according to their configuration and security mechanism. We will first start exploring the attacks against WEP and then focus our tests on more secure networks: WPA, WPA2, and WPS.

 

Lesson 12: Wi-Fi as an Attack Vector

In the last module, of the Wi-Fi section, the student will learn how to use Wi-Fi as an attack vector. This means that we will not attack Wi-Fi networks, instead, we will use Wi-Fi in order to create fake networks, obtain credentials, run MitM attacks, and much more.

 

Basic Python Module:

Chapter I – Python Introduction

Lecture:1 What is Python
Lecture:2 Python History
Lecture:3 Python 2.x vs 3.x
Lecture:4 Features of python
Lecture:5 About Python Versions
Lecture:6 Applications of python

Chapter II – Installation of Python

Lecture:7 How to install Python
Lecture:8 Python Script mode
Lecture:9 Python GUI mode
Lecture:10 Python Interactive Mode
Lecture:11 Python In Linux
Lecture:12 Linux Script mode
Lecture:13 Linux GUI mode
Lecture:14 How to Install IDLE in Linux
Lecture:15 How to set Path

Chapter III – Basics of Python

Lecture:16 Python “Hello World”
Lecture:17 How to Execute Python
Lecture:18 Variables in python
Lecture:19 Keywords in python
Lecture:20 Identifiers in python
Lecture:21 Literals in python
Lecture:22 Operators in python
Lecture:23 Comments in python

Chapter IV – Python Strings

Lecture:24 Accessing Strings
Lecture:25 Strings Operators
Lecture:26 Basic Operators.
Lecture:27 Membership Operators.
Lecture:28 Relational Operators.
Lecture:29 Slice Notation
Lecture:30 String Functions and Methods

Chapter V – Python Lists

Lecture:31 How to define list
Lecture:32 Accessing list
Lecture:33 Elements in a Lists
Lecture:34 List Operations
Lecture:35 Adding Lists
Lecture:36 Replicating lists
Lecture:37 List slicing
Lecture:38 Updating elements in a List
Lecture:39 Appending elements to a List
Lecture:40 Deleting Elements from a List
Lecture:41 Functions and Methods of Lists

Chapter VI – Python Tuples

Lecture:42 How to define a tuple
Lecture:43 Accessing tuple
Lecture:44 Elements in a tuple
Lecture:45 tuple Operations
Lecture:46 tuple slicing
Lecture:47 Deleting tuple
Lecture:48 Functions and Methods of tuple

Chapter VII – Python Dictionary

Lecture:49 How to define dictionary
Lecture:50 Accessing Dictionary
Lecture:51 Updation
Lecture:52 Deletion
Lecture:53 Functions and Methods

Chapter VIII – Python Control Statement

Lecture:54 “If” in python
Lecture:55 “If else” in python
Lecture:56 “else if” in python
Lecture:57 “nested if” in python
Lecture:58 “for loop” in python
Lecture:59 “while loop” in python
Lecture:60 “break” in python
Lecture:61 “continue” in python
Lecture:62 “pass” in python

Chapter IX – Python Functions

Lecture:63 Defining a Function
Lecture:64 Invoking a Function
Lecture:65 return Statement
Lecture:66 Argument and Parameter
Lecture:67 Passing Parameters
Lecture:68 Default Arguments
Lecture:69 Keyword Arguments
Lecture:70 Anonymous Function
Lecture:71 Difference between Normal Functions and Anonymous Function
Lecture:72 Scope of Variable

Chapter X – Python Files I/O

Lecture:73 “print” statement
Lecture:74 Input from Keyboard

Chapter XI – File Handling

Lecture:75 Operations on Files
Lecture:76 Opening file
Lecture:77 closing file
Lecture:78 reading file
Lecture:79 writing file
Lecture:80 Modes of files
Lecture:81 Methods in files

Chapter XII – Python OOPs Concept

Lecture:82 Python OOPs Concepts
Lecture:83 Python Object Class
Lecture:84 Python Constructors
Lecture:85 Python Inheritance
Lecture:86 Multilevel Inheritance
Lecture:87 Multiple Inheritance

Chapter XIII – Python Modules

Lecture:88 Importing a Module
Lecture:89 Example of importing multiple modules
Lecture:90 How to use “from” import statement
Lecture:91 import whole module
Lecture:92 Built-in Modules in Python
Lecture:93 Package

Chapter XIV – Python Exceptions

Lecture:94 What is Exception handling
Lecture:95 Declaring Multiple Exception
Lecture:96 Finally Block
Lecture:97 Raise an Exception
Lecture:98 Custom Exception

Chapter XV – Python Date

Lecture:99 Retrieve Time
Lecture:100 Formatted Time
Lecture:101 time module
Lecture:102 Calendar
Lecture:103 Calendar module

Chapter XVI – Python Network programming

Lecture:118 Basics of networking
Lecture:119 What is socket?
Lecture:120 How to make socket?
Lecture:121 socket methods
Lecture:122 creating server
Lecture:123 creating client
Lecture:124 creating echo server
Lecture:125 Python Internet modules
Lecture:126 Port scanner in python
Lecture:127 Creating Webserver

 

 

Gradation System: (on total marks obtained)

E Excellent Performer (90% – 100% marks)
A+ (80% – 89% marks)
A (70% – 79% marks)
B+ (60% – 69% marks)
B (50% – 59% marks)
C (not qualified – reappear all the modules)

 

[sg_popup id=8677]
[course-shortcode]

 

 

Get a Call from us


 

Why Choose Indian Cyber Security Solutions?

 

  • Get trained from IT experts & Ethical Hackers with 10 years of experience.
  • Certificate recognized by the government and private organizations in more than 160 countries.
  • 100 % placement assistance
  • Lifetime access to our online library “ HACKERS LAB ” containing case studies, video tutorials, interview questions.

 

 

Highest Selling Technical Courses of Indian Cyber Security Solutions:

Certified Ethical Hacker Training in Bhubaneswar

Ethical Hacking Training in Bhubaneswar

Certified Ethical Hacker Training in Bangalore

Ethical Hacking Training in Bangalore

Certified Ethical Hacker Training in Hyderabad

Ethical Hacking Training in Hyderabad

Ethical Hacking Training in Dhanbad

Certified Ethical Hacker Training in Dubai

Ethical Hacking Training in Dubai

Placement

Python Programming Training in Bangalore

C|PP Training in Hyderabad

Python Training in Bhubaneswar

Azure Training in Hyderabad

Microsoft Azure Training in Bangalore

A unit of Green Fellow IT Security Solutions Pvt Ltd

×

Hello!

Click one of our representatives below to chat on WhatsApp or send us an email to [email protected]

× Hi How can we help you