Diploma in Basic Cyber Security

Diploma in Cyber Security Training in Kolkata

Diploma in Cyber Security Training in Kolkata has designed by our experienced professional penetration testers. They had been working in this domain for last 15 years. This is the best certificate which will definitely help you to secure a good job in the space of cyber security. A diploma indicates that a student has applied his or herself to gain a deeper understanding of their chosen field. Thousands of schools around the world offer diplomas in a variety of different subjects, including technology. Indian Cyber Security Solutions provide the most comprehensive Diploma in Cyber Security Certification in Kolkata frame work. After that you will be able to secure a job as a penetration tester or cyber security expert. Kolkata, more popularly known as the City of Joy, is the third-most productive metropolitan city of India. If you are looking for Diploma in Cyber Security Course in Kolkata, then you should join Indian Cyber Security Solutions.

This training focuses on the core issues of cloud & network security. Starting from the basic and then core security problem faced by industry experts while working as a cyber security professional. Cyber Security process of protection of the access to files and directories in a computer network. Against hacking, misuse and unauthorized changes to the system. With employment of information security analysts projected to grow by 18 percent from 2016 to 2024. You will learn by Diploma in Cyber Security Training in Kolkata is the process about used to protection of the access to files. It is directories in a computer network against hacking, misuse and unauthorized changes to the system. Join us for the course and after that you can build your career in this domain. ICSS’s Diploma in Cyber Security Training in Kolkata is in-demand as they build awareness of best practices against various attacks.

 

 


Duration

15 months - 2 classes per week

Course Fee

Online with global - 77,300/- & Classroom with global - 79,300/- : Online without global - 56,300/- & Classroom without global - 58,300/-

 

ENROLL NOW

 

 

Cyber Security Diploma in Kolkata

 

Diploma in Cyber Security Course in Kolkata

Diploma in Cyber Security Course in Kolkata by Indian Cyber Security Solutions is in very high demand. It is a comprehensive cybersecurity course to learn the most effective steps to prevent attacks and detect adversaries with actionable techniques. ICSS provides course from cybersecurity professionals with foundational, intermediate, and advanced security skills through industry-leading certification courses. The program begins with introductory-level cybersecurity skills training. Then progresses to advanced cybersecurity technologies such as reverse engineering, penetration testing techniques, and much more. Diploma in Cyber Security Course in Kolkata has always been an important process. For every team in every business.

If you want to try your hand at cybersecurity, then you must know that it is a vast industry with numerous domains such as application security, network security, and digital forensics which is sometimes further classified into other branches. So, you should be aware of your interest before you take your first step toward the industry. But if you have already made up your mind to become an ethical hacker, then join ICSS to gain depth knowledge in this field. Diploma in Cyber Security Training in Kolkata has always been an important process. For every team in every business. In recent years, cybersecurity has become vital in all organizations. This course will allow you to get practical experience of tools and techniques. This Diploma in Cyber Security Course in Kolkata teach professionals to spot vulnerabilities, fend off attacks, and immediately respond to emergencies.

 

 

Diploma in Cyber Security Training & Certification

 

 

Eligibility Criteria for the course

Students from any background can apply for this course. We provide Hands-on training by Industry experts. They are real time hackers and currently working in this domain. Diploma in Cyber Security Training in Kolkata will help you to develop your necessary skills required in the industry. You will able to secure a job as a penetration tester after that. This is the process about used to protection of the access to files. Directories in a computer network against hacking, misuse and unauthorized changes to the system. It is uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner. It can be assess the security posture of a target system. Securing a network requires a complex combination of hardware devices, such as routers, firewalls and anti-malware software applications. Grow your knowledge in this field by the course.

 

 

Classroom

 

Course Details:

In our diploma courses we will be covering:

CCNA

Certified Ethical Hacker Training Module (CEHv10) / Ethical Hacking Professional Training Module (CEHP)

Network Penetration Testing 

WAPT

Basic Python

 

Course Fee for Cyber Security Diploma in Kolkata:

Online with globalINR 77,300/– + 18% GST

Classroom with global INR 79,300/– + 18% GST

 

Online without globalINR 56,300/– + 18% GST

Classroom without global INR 58,300/– + 18% GST

 

Course Duration:

15 months training program (2 Hours per class)

 

Check out the jobs opportunity after that course:

 

Syllabus for Cyber Security Diploma in Kolkata

CCNA:

Chapter-1 Introduction

  • What is a Computer network?
  •  LAN
  •  MAN
  • WAN?
  •  Parts of network

 

Chapter-2 Internet

  • How does the internet work?
  • Webserver
  • Server
  • Client and host
  •  NIC
  • Protocol

 

Chapter-3 Topology

  • Bus topology
  • Ring topology
  • Star topology
  • Mesh topology

 

Chapter-4 Network Components

  •  OSI model
  • What is Modem?
  •  Router
  • What is a Switch?
  • What is Repeater?

 

Chapter-5 IPv4

  •  How binary code works?
  •  What is Network ID?
  •  What is Host ID?
  •  Subnetting
  •  CIDR notation

 

Chapter-6 Protocol

  • TCP
  •  UPD
  •  What is HTTP?
  • FTP
  • What is TFTP?
  •  SMTP
  • What is POP?
  •  What is ICMP?

 

Chapter-7 Routing and switching

  •  Cisco hardware components
  •  Cisco software
  •  Router categories
  •  Routers ports
  • Router functions

 

Chapter-8 Routing

  •  How does it decide best route?
  •  Static routing
  • Dynamic routing

 

Chapter-9 VLAN

  •  VLAN configuration

 

Chapter-10 NAT

  •  Static NAT configuration
  •  Dynamic NAT configuration
  • NAT overload configuration (PAT)

 

Chapter-11DHCP

  •  Methods
  •  DHCP scope
  •  DHCP leased period
  •  Configuration parameters

 

Chapter-12 DHCP

  •  DHCP configuration

 

Chapter-13 RIP

  •  RIP configuration

 

Chapter-14 OSPF

  •  OSPF configuration

 

Chapter-15 EIGRP

  • EIGRP configuration

 

Chapter-16 IPv6

  •  Understanding IPv6

 

Chapter- 17 BGP

  •   What is BGP
  •   IBGP
  •  What is EBGP
  •  How to configure BGP?

 

C|EH V10-Certified Ethical Hacker Training Module

 

Chapter 1 – Introduction to Ethical Hacking

    • What is Hacking
    • What is Ethical Hacking
    • Types of Hackers
    • White Hat Hacker
    • Black Hat Hackers
    • Gray Hat Hackers
    • Script Kiddies
    • Hacktivists
    • Spy Hackers
    • Cyber Terrorists
    • Vulnerability
    • Exploit
    • Remote Exploit
    • Local Exploit
    • Zero-day
    • 0-day vulnerability
    • Zero-day Exploit
    • Brute force attack
    • Phishing
    • Remote access
    • Payload

100 Marks Internal Exam ( Practical or article submission )

 

Chapter 2 – Steps of Ethical Hacking Information Gathering

  • Active Information Gathering
  • Passive Information Gathering
  • Scanning
  • Gaining Access
  • Maintaining Access
  • Covering Tracks

100 Marks Internal Exam ( Practical or article submission )

 

Chapter 3 – Types of Malicious files

  • Viruses
  • Worms
  • Trojan Horse
  • Spyware
  • Adware
  • Backdoor
  • Rootkits
  • Ransomware

100 Marks Internal Exam ( Practical or article submission )

 

Chapter 4 –  Penetration Testing

  • What is Penetration Testing
  • Types of Penetration Testing
  • What is white box Penetration Testing
  • What is Black Box Penetration testing
  • Introduction to Linux OS
  • Social Engineering

100 Marks Internal Exam ( Practical or article submission )

Chapter 5 – Google Hacking Using Dorks Demo

Lab Setup

  • What is Virtual Machine
  • What’s VMware
  • What is Virtual Box
  • Installing VMware
  • Install Kali Linux
  • Installing Windows XP
  • Install Windows 7
  • Install Add on in Mozila
  • Tamper Data
  • Burp Suite
  • No-Redirect
  • Install Nessus

 

Chapter 6 – System Hacking

  • System Hacking using Kon-Boot
  • Network Scanning
  • Port Scanning
  • Service Scanning
  • What is Nmap
  • Scanning With Nmap
  • Nmap Various Command

 

Chapter 7 – Scanning With Nessus Hacking With Metasploit

  • What is Metasploit?
  • Xp Remote Exploit using Metasploit
  • Msfvenom
  • Windows7 UAC Bypass

 

Chapter 8 – What is SE-Toolkit

  • SE-Toolkit Usages
  • Create Phishing page with SE-Toolkit
  • Hacking Facebook & Gmail password

 

Chapter 9 – What is Remote Administration Tool

  • What is RAT
  • Exploit With RAT
  • Protect System from RAT

 

Chapter 10 – What is Sniffing

  • Types of Sniffing
  • Network Sniffing with Wireshark
  • Get FTP Login Details Using Wireshark

 

Chapter 11 – What is DOS

  • Details of DOS
  • What is DDOS

 

Chapter 12 – Wireless Network Hacking

  • Wireless Encryption
  • Hacking WPA 2

 

Chapter 13 – Web Application Pen-testing

  • How Web Application Works
  • Request and Response
  • Installing Scanner (Acunetix,Netsparker)
  • Scanning Website

 

Chapter 14 – OWASP Top 10

  • What is SQL-Injection?
  • Types of SQL-Injection
  • Live Demo on SQL-Injection

 

Chapter 15 – What is XSS

  • Types of XSS
  • Live Demo on XSS All types

 

Chapter 16 – What is CSRF

  • Live Demo On CSRF What is HTML Injection
  • Live Demo on HTML Injection

 

Chapter 17 – What is Directory Listing

  • Live Demo on Directory Listing What is Broken Auth
  • Demonstration on Broken Auth What is Tamper data?
  • Live Demo on Tamper Data on Ecommerce site
  • Session Hijacking

 

Chapter 18 – What is Phishing?

  • Create a Phishing Page What is Web Shell
  • Hack Web-Server Using Web-Shell

 

Chapter 19 – Hacking Android Phone using Metasploit Question and Answer Class

 

Chapter 20 – Project

 

Ethical Hacker Professional (CEHP) Training Module:

 

Chapter 1 – Introduction to Ethical Hacking

    • What is Hacking
    • What is Ethical Hacking
    • Types of Hackers
    • White Hat Hacker
    • Black Hat Hackers
    • Gray Hat Hackers
    • Script Kiddies
    • Hacktivists
    • Spy Hackers
    • Cyber Terrorists
    • Vulnerability
    • Exploit
    • Remote Exploit
    • Local Exploit
    • Zero-day
    • Zero-day vulnerability
    • Zero-day Exploit
    • Brute force attack
    • Phishing
    • Remote access
    • Payload

100 Marks Internal Exam ( Practical or article submission )

 

Chapter 2 – Steps of Ethical Hacking Information Gathering

  • Active Information Gathering
  • Passive Information Gathering
  • Scanning
  • Gaining Access
  • Maintaining Access
  • Covering Tracks

100 Marks Internal Exam ( Practical or article submission )

 

Chapter 3 – Types of Malicious files

  • Viruses
  • Worms
  • Trojan Horse
  • Spyware
  • Adware
  • Backdoor
  • Rootkits
  • Ransomware

100 Marks Internal Exam ( Practical or article submission )

 

Chapter 4 –  Penetration Testing

  • What is Penetration Testing
  • Types of Penetration Testing
  • What is white box Penetration Testing
  • What is Black Box Penetration testing
  • Introduction to Linux OS
  • Social Engineering

100 Marks Internal Exam ( Practical or article submission )

Chapter 5 – Google Hacking Using Dorks Demo

Lab Setup

  • What is Virtual Machine
  • What is VMware
  • What is Virtual Box
  • Install VMware
  • Install Kali Linux
  • Install Windows XP
  • Install Windows 7
  • Install Add on in Mozila
  • Tamper Data
  • Burp Suite
  • No-Redirect
  • Install Nessus

 

Chapter 6 – System Hacking

  • System Hacking using Kon-Boot
  • Network Scanning
  • Port Scanning
  • Service Scanning
  • What is Nmap
  • Scanning With Nmap
  • Nmap Various Command

 

Chapter 7 – Scanning With Nessus Hacking With Metasploit

  • What is Metasploit?
  • Xp Remote Exploit using Metasploit
  • Msfvenom
  • Windows7 UAC Bypass

 

Chapter 8 – What is SE-Toolkit

  • SE-Toolkit Usages
  • Create Phishing page with SE-Toolkit
  • Hacking Facebook & Gmail password

 

Chapter 9 – What is Remote Administration Tool

  • What is RAT
  • Exploit With RAT
  • Protect System from RAT

 

Chapter 10 – What is Sniffing

  • Types of Sniffing
  • Network Sniffing with Wireshark
  • Get FTP Login Details Using Wireshark

 

Chapter 11 – What is DOS

  • Details of DOS
  • What is DDOS

 

Chapter 12 – Wireless Network Hacking

  • Wireless Encryption
  • Hacking WPA 2

 

Chapter 13 – Web Application Pen-testing

  • How Web Application Works
  • Request and Response
  • Installing Scanner (Acunetix,Netsparker)
  • Scanning Website

 

Chapter 14 – OWASP Top 10

  • What is SQL-Injection?
  • Types of SQL-Injection
  • Live Demo on SQL-Injection

 

Chapter 15 – What is XSS

  • Types of XSS
  • Live Demo on XSS All types

 

Chapter 16 – What is CSRF

  • Live Demo On CSRF What is HTML Injection
  • Live Demo on HTML Injection

 

Chapter 17 – What is Directory Listing

  • Live Demo on Directory Listing What is Broken Auth
  • Live Demo on Broken Auth What is Tamper data?
  • Live Demo on Tamper Data on Ecommerce site
  • Session Hijacking

 

Chapter 18 – What is Phishing?

  • Create a Phishing Page What is Web Shell
  • Hack Web-Server Using Web-Shell

 

Chapter 19 – Hacking Android Phone using Metasploit Question and Answer Class

 

Chapter 20 – Project

 

 

Web Application Penetration Testing Training Module:

 

Lesson 1: HTTP Basics

The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web.

 

Lesson 2: OWASP (Open Web Application Security Project)

The Open Web Application Security Project is an online community which creates freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security.

 

Lesson 3: Sql Injection

SQL injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements (also commonly referred to as a malicious payload) that control a web application’s database server (also commonly referred to as a Relational Database Management System – RDBMS). Since an SQL injection vulnerability could possibly affect any website or web application that makes use of an SQL-based database, the vulnerability is one of the oldest, most prevalent and most dangerous of web application vulnerabilities.

 

Lesson 4: Cross Site Request Forgery (CSRF)

Cross-Site Request Forgery (CSRF) is an attack outlined in the OWASP Top 10 whereby a malicious website will send a request to a web application that a user is already authenticated against from a different website. This way an attacker can access functionality in a target web application via the victim’s already authenticated browser. Targets include web applications like social media, in-browser email clients, online banking and web interfaces for network devices.

 

Lesson 5: Cross-site Scripting (XSS)

Cross-site Scripting (XSS) refers to client-side code injection attack wherein an attacker can execute malicious scripts (also commonly referred to as a malicious payload) into a legitimate website or web application. XSS is amongst the most rampant of web application vulnerabilities and occurs when a web application makes use of unvalidated or unencoded user input within the output it generates.

 

Lesson 6: Command Injection

Command injections are prevalent to any application independently of its operating system that hosts the application or the programming language that the application itself is developed. The impact of command injection attacks ranges from loss of data confidentiality and integrity to unauthorized remote access to the system that hosts the vulnerable application.

 

Lesson 7: Directory traversal

The web server is configured to display the list of files contained in this directory. This is not recommended because the directory may contain files that are not normally exposed through links on the web site.

 

Lesson 8: Input Validation

Input Validation is the outer defensive perimeter for your web application. This perimeter protects the core business logic, processing and output generation. Beyond the perimeter is everything considered potential enemy territory which is…literally everything other than the literal code executed by the current request.

 

Lesson 9: Information leakage

Information Leakage is an application weakness where an application reveals sensitive data, such as technical details of the web application, environment, or user-specific data. Sensitive data may be used by an attacker to exploit the target web application, its hosting network, or its users.

 

Lesson 10: Click-Jacking

Clickjacking attacks are an emerging threat on the web. In this paper, we design new clickjacking attack variants using existing techniques and demonstrate that existing clickjacking defenses are insufficient. Our attacks show that clickjacking can cause severe damages, including compromising a user’s private webcam, email or other private data, and web surfing anonymity.

 

Lesson 11: Web Application Security Controls

  • Application Security – Overview
  • Treat Modeling
  • Hacker’s Approach
  • Practical Considerations
  • Case Study

 

Lesson 12: Exploitation and Information Gathering Tools

  • Burp Suite
  •  Sqlmap
  • Acunetix
  • Archini
  • W3af
  • Browser Exploitation Framework (BeEF)

 

Network  Penetration Testing

 

Lesson 1:  Introduction to Network Security
Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

 

Lesson 2:  Pentration Testing Lab Setup
According to the configuration of Laptop, 32/64 bit, provide VMware, and any Penetration testing OS like Kali/Backbox, Windows XP SP2, Windows 7 Install VMware, OSs on it using Bridge Connection

 

Lesson 3: Deep Information Gathering
Active Information Gathering in-depth.

  • Passive Information Gathering in-depth.
  • Scanning target using Nmap advanced features.
  • Vulnerability Scanning.

 

Lesson 4: Getting into System

  • Exploiting Windows and Linux System
  • Application of Metasploit
  • Creating malicious files (standalone binaries) using msfvenom
  • Attack through browser
  • Evading Antivirus
  • Bruteforcing on Ports
  • Exploiting using different File Format
  • Social-Engineer Toolkit (SET)

 

Lesson 5: Sniffing & MITM

Studying ARP, how it works and how it can be manipulated to mount sophisticated attacks is made extremely easy to understand. Sniffing is a technique that you will be able to fully grasp in its most practical aspects. We will make sure you have enough basics of network theory before we cover actual attack scenarios using the best tools available. Man in the middle attacks are one of the most used penetration testing techniques today; you will be able to mount a man in the middle attacks within local networks and over the Internet.

 

Lesson 6: Post Exploitation

ICSS experienced instructors have come up with a proven methodology to conduct thorough Exploitation of remote internal networks through advanced Post exploitation techniques. Once the student is comfortable with the most recent exploitation techniques, he will be exposed to the cyclic steps of a successful Post exploitation phase. This is the phase where criminals ensure stable high privileged access to the remote network in order to steal and ex-filtrate documents and credentials from the organization. Penetration testers must possess the same skill-set and tools in order to test not only the perimeter security but also any kind of internal weakness that affects the organization’s security.

 

Lesson 7: Anonymity

Penetration testers rarely need to cover their tracks. However, there are times when testing the efficiency of the target organization incident response team is within the scope of a Penetration tester’s engagement.

 

Lesson 8: Social Engineering

The social engineering module will guide you through the most modern social engineering attack techniques. Real-world attacks will be illustrated by exploiting the potential of social networks such as Facebook, Spokeo or Twitter. Almost one hour of video lessons will teach you everything you need to know to master the most important tool in the field: Social Engineering Toolkit.

 

Lesson 9: Pentesting With Metasploit

In this module, the student will study the Metasploit architecture and the framework, and will learn how to create, add or edit custom Metasploit modules. Thanks to our virtual labs, the student will also have the chance to practice against real vulnerable machines.

 

Lesson 10: Traffic Analysis

After the target network has been identified, the next step is to configure our tools in order to sniff and intercept the traffic. This is a very important step for all the attacks that come here after.

 

Lesson 11: Attacking Wi-Fi Network

The following module focuses on the attacks that can be executed on Wi-Fi networks. The student will learn how to attack and access remote Wi-Fi networks, obtain keys, password and much more, according to their configuration and security mechanism. We will first start exploring the attacks against WEP and then focus our tests on more secure networks: WPA, WPA2, and WPS.

 

Lesson 12: Wi-Fi as an Attack Vector

In the last module, of the Wi-Fi section, the student will learn how to use Wi-Fi as an attack vector. This means that we will not attack Wi-Fi networks, instead, we will use Wi-Fi in order to create fake networks, obtain credentials, run MitM attacks and much more.

 

Basic Python Module:

Chapter I – Python Introduction

Lecture:1 What is Python
Lecture:2 Python History
Lecture:3 Python 2.x vs 3.x
Lecture:4 Features of python
Lecture:5 About Python Versions
Lecture:6 Applications of python

Chapter II – Installation of Python

Lecture:7 How to install Python
Lecture:8 Python Script mode
Lecture:9 Python GUI mode
Lecture:10 Python Interactive Mode
Lecture:11 Python In linux
Lecture:12 Linux Script mode
Lecture:13 Linux GUI mode
Lecture:14 How to Install IDLE in Linux
Lecture:15 How to set Path

Chapter III – Basics of Python

Lecture:16 Python “Hello World”
Lecture:17 How to Execute Python
Lecture:18 Variables in python
Lecture:19 Keywords in python
Lecture:20 Identifiers in python
Lecture:21 Literals in python
Lecture:22 Operators in python
Lecture:23 Comments in python

Chapter IV – Python Strings

Lecture:24 Accessing Strings
Lecture:25 Strings Operators
Lecture:26 Basic Operators.
Lecture:27 Membership Operators.
Lecture:28 Relational Operators.
Lecture:29 Slice Notation
Lecture:30 String Functions and Methods

Chapter V – Python Lists

Lecture:31 How to define list
Lecture:32 Accessing list
Lecture:33 Elements in a Lists
Lecture:34 List Operations
Lecture:35 Adding Lists
Lecture:36 Replicating lists
Lecture:37 List slicing
Lecture:38 Updating elements in a List
Lecture:39 Appending elements to a List
Lecture:40 Deleting Elements from a List
Lecture:41 Functions and Methods of Lists

Chapter VI – Python Tuples

Lecture:42 How to define tuple
Lecture:43 Accessing tuple
Lecture:44 Elements in a tuple
Lecture:45 tuple Operations
Lecture:46 tuple slicing
Lecture:47 Deleting tuple
Lecture:48 Functions and Methods of tuple

Chapter VII – Python Dictionary

Lecture:49 How to define dictionary
Lecture:50 Accessing Dictionary
Lecture:51 Updation
Lecture:52 Deletion
Lecture:53 Functions and Methods

Chapter VIII – Python Control Statement

Lecture:54 “If” in python
Lecture:55 “If else” in python
Lecture:56 “else if” in python
Lecture:57 “nested if” in python
Lecture:58 “for loop” in python
Lecture:59 “while loop” in python
Lecture:60 “break” in python
Lecture:61 “continue” in python
Lecture:62 “pass” in python

Chapter IX – Python Functions

Lecture:63 Defining a Function
Lecture:64 Invoking a Function
Lecture:65 return Statement
Lecture:66 Argument and Parameter
Lecture:67 Passing Parameters
Lecture:68 Default Arguments
Lecture:69 Keyword Arguments
Lecture:70 Anonymous Function
Lecture:71 Difference between Normal Functions and Anonymous Function
Lecture:72 Scope of Variable

Chapter X – Python Files I/O

Lecture:73 “print” statement
Lecture:74 Input from Keyboard

Chapter XI – File Handling

Lecture:75 Operations on Files
Lecture:76 Opening file
Lecture:77 closing file
Lecture:78 reading file
Lecture:79 writing file
Lecture:80 Modes of files
Lecture:81 Methods in files

Chapter XII – Python OOPs Concept

Lecture:82 Python OOPs Concepts
Lecture:83 Python Object Class
Lecture:84 Python Constructors
Lecture:85 Python Inheritance
Lecture:86 Multilevel Inheritance
Lecture:87 Multiple Inheritance

Chapter XIII – Python Modules

Lecture:88 Importing a Module
Lecture:89 Example of importing multiple modules
Lecture:90 How to use “from” import statement
Lecture:91 import whole module
Lecture:92 Built in Modules in Python
Lecture:93 Package

Chapter XIV – Python Exceptions

Lecture:94 What is Exception handling
Lecture:95 Declaring Multiple Exception
Lecture:96 Finally Block
Lecture:97 Raise an Exception
Lecture:98 Custom Exception

Chapter XV – Python Date

Lecture:99 Retrieve Time
Lecture:100 Formatted Time
Lecture:101 time module
Lecture:102 Calendar
Lecture:103 Calendar module

Chapter XVI – Python Network programming

Lecture:118 Basics of networking
Lecture:119 What is socket?
Lecture:120 How to make socket?
Lecture:121 socket methods
Lecture:122 creating server
Lecture:123 creating client
Lecture:124 creating echo server
Lecture:125 Python Internet modules
Lecture:126 Port scanner in python
Lecture:127 Creating Webserver

 

 

Gradation System: (on total marks obtained)

E Excellent Performer (90% – 100% marks)
A+ (80% – 89% marks)
A (70% – 79% marks)
B+ (60% – 69% marks)
B (50% – 59% marks)
C (not qualified – reappear all the modules)

 


Duration

15 months - 2 classes per week

Course Fee

Online with global - 77,300/- & Classroom with global - 79,300/- : Online without global - 56,300/- & Classroom without global - 58,300/-

 

Diploma in Cyber Security Certification in Kolkata

 

Get a Call from us

 

Why Choose Indian Cyber Security Solutions ?

 

  • Get trained from IT experts & Ethical Hackers with 10 years of experience.
  • Certificate recognized by government and private organizations in more than 160 countries.
  • 100 % placement assistance
  • Life time access to our online library “ HACKERS LAB ” containing case studies, video tutorials, interview questions.

 

 

Highest Selling Technical Courses of Indian Cyber Security Solutions:

Certified Ethical Hacker Training in Bhubaneswar

Ethical Hacking Training in Bhubaneswar

Certified Ethical Hacker Training in Bangalore

Ethical Hacking Training in Bangalore

Certified Ethical Hacker Training in Hyderabad

Ethical Hacking Training in Hyderabad

Ethical Hacking Training in Dhanbad

Certified Ethical Hacker Training in Dubai

Ethical Hacking Training in Dubai

Placement

Python Programming Training in Bangalore

C|PP Training in Hyderabad

Python Training in Bhubaneswar

Azure Training in Hyderabad

Microsoft Azure Training in Bangalore


×

Hello!

Click one of our representatives below to chat on WhatsApp or send us an email to hello@quadlayers.com

× Hi How can we help you