Networking and Collaboration Opportunities

Winter training in Kolkata by Indian Cyber Security Solutions provides best technical courses for winter training. Winter Internship programs is an optional training program for technical graduate and postgraduate students to impart some more technical skills apart from the regular syllabus of the university. Winter Internship in Kolkata programs are of 1 month of duration on some latest technology which helps students to gain in-depth knowledge and be placement ready.
Each of our Winter training course contents has been specially designed according to the current Industrial needs. We have kept our course fee reasonable so that anyone can easily afford it.

In this Winter Internship in Kolkata course the engineering students will get to pursue an Android Development course or Machine Learning, Ethical Hacking, Networking, Data Analysis with Python, Python. This Winter Internship in Kolkata is designed keeping in view the latest industry trends and needs – making it a one-of its-kind ‘industry readiness’ program.
Our Achievement

Indian Cyber Security Solutions encourages engineering students to utilize their winter vacations by Winter Internship in Kolkata learning and developing their IT skills, gearing them for their future IT careers.
- Training faculty accredited by global IT giants like IBM, CapGemini, CTS, Siemens, TCS, Tech-Mahindra etc.
- In-depth hands on training to build up developmental competency.
- Participation and Training certificate for all successful candidates
- Projects similar to real-life applications
- Formal Project Evaluation by Technical panel
- Pursue a whole gamut of new-gen courses like Ethical Hacking, CCNA, Android Development, Machine Learning, Python etc.
Winter Training in Kolkata with hands-on training in the lab from the professional hackers who are themselves CEHv10 certified, OSCP Certified & industry professionals. Cyber Security training is in huge demand as organizations are going online with more than 170 Billion Dollar investment in the cyber security domain worldwide.
Indian Cyber Security Solutions have 130+ trainers who are professional Ethical Hackers working in different MNCs like Infosys, Cognizant, Wipro, ATOS, Intel and are also members of our research & development team. All the trainers are geographically located in different areas provide online training on Ethical Hacking. All the training classes are held through an application where the faculty and the students are LIVE interacting with each other over the internet. Winter Internship in Kolkata.
Ethical Hacking
- Module 1: Introduction To Ethical Hacking
- • What is Hacking
- • What is Ethical Hacking
- • Types of Hackers
- • White Hat Hacker
- • Black Hat Hackers
- • Gray Hat Hackers
- • Script Kiddies
- • Hacktivists
- • Spy Hackers
- • Cyber Terrorists
- • Vulnerability
- • Exploit
- • Remote Exploit
- • Local Exploit
- • Zero-day
- • Zero-day vulnerability
- • Zero-day Exploit
- • Brute force attack
- • Phishing
- • Remote access
- • Payload
- Module 2:Linux Fundamentals
- ⚫ Overview of Information Security
- ⚫ Command on Linux
- Module 3: Steps Of Ethical Hacking & Information Gathering
- • Active Information Gathering
- • Passive Information Gathering
- • Scanning • Gaining Access
- • Maintaining Access
- • Covering Tracks
- Module 4: Types Of Malicious Files
- • Viruses
- • Worms
- • Trojan Horse
- • Spyware
- • Adware
- • Backdoor
- • Rootkits
- • Ransomware
- Module 5: Penetration Testing
- • What is Penetration Testing
- • Types of Penetration Testing
- • What is white box Penetration Testing
- • What is Black Box Penetration testing
- • Introduction to Linux OS
- • Social Engineering
- Module 6: Lab Setup
- • What is Virtual Machine
- • What is VMware
- • What is Virtual Box
- • Install VMware
- • Install Kali Linux
- • Install Parrot OS
- • Metaspolitable 2
- • Install Windows XP
- • Install Windows 7
- • Install XAMMP
- • Netsparker
- • Burp Suite
- • Install Nessus
- Module 7: What Is DOS
- • Details of DOS
- • What is DDOS
- • What is Botnet
- Module 8: Directory Listing
- · What is · Directory Listing
- · Live Demo on · Directory Listing
- · What is
- · Broken Auth
- · Live Demo on
- · Broken Auth What is
- · Tamper data?
- · Live Demo on
- · Tamper Data on Ecommerce site
- · Session Hijacking
- Module 9:Manual Testing
- ⚫ Scanning with N-Map
- Module 10 :Automation Testing
- ⚫ Scanning with Nessus and Netsparker
- Module 11 : Metasploit Frame work
- ⚫ Windows Hacking On same network
- ⚫ Window Hacking On Different Network using Ngrog
- ⚫ Android Hacking
- ⚫ NG RAT
- Module 12 :Sniffing
- ⚫ Using Wireshark
- Module 13:Phishing
- ⚫ Using Zed phisher from Github
- Module 14 :XSS (Cross site Scripting)
- ⚫ Stored
- ⚫ Reflected
- ⚫ DOM
- ⚫ Using DVWA and Xampp
- Module 15:SQL Injection
- ⚫ Blind SQL
- ⚫ SQL Map
- Module 16:Evading IDS, Firewalls and Honeypots • Concepts on IDS Concepts on IPS Concepts on Firewalls Concepts on Honeypots
- Module 17:Cloud Computing
- •Brief concepts of Cloud Computing
- Module 18:IOT •Brief concepts of IOT
- Module 19:Cryptography
- ⚫ Concepts of Hashing
- ⚫ Concepts of Encoding
- ⚫ Concepts of Encryption
- ⚫ Types of Encryption
- Module 20:Examination
- ⚫ Theory 100
- ⚫ Practical 100
- ⚫ Project 70
- ⚫ Viva 30
Cisco Certified Network Associate
- Chapter 1 : Network Fundamentals
- Chapter 2 : OSI Model and Network Components
- Chapter 3 : IPV4 and Sub netting
- Chapter 4 : Protocol
- Chapter 5 : Routing and Switching
- Chapter 6 : Routing Basic
- Chapter 7 : DHCP
- Chapter 8 : NAT
- Chapter 9 : SNMP ( Simple Network Management Protocol)
- Chapter 10 : Routing
- Chapter 11 : Static Routing ipv4
- Chapter 12 : OSPF (Open Shortest Path First)
- Chapter 13 : HSRP (Hot Standby Router Protocol)
- Chapter 14 : VLANs and Trunks
- Chapter 15 : Spanning Tree
- Chapter 16 : Wireless
- Chapter 17: Quality Of Service
- Chapter 18: IPV6
- Chapter 19: Access Lists
- Chapter 20: Misc
- Chapter 21: Network Management
- Chapter 22:Automation and Programmability
- Chapter 23:Cloud ComputingIP ConnectivityHow binary code works?What is Network ID?What is Host ID?Sub nettingCIDR notationVariable Length Subnet Mask (VLSM)Verifying and troubleshooting in ip addressSub netting in BinaryCreate a Sub netting Cheat Sheet
Python Programming
- Module 1: Introduction of Python, Installation of Python, PVM, Basics of Python
- Module 2: “print” statement, Input from Keyboard, Python Strings
- Module 3: Python Collections : List, Tuple, Set ,Dictionary
- Module 4: Control statements : if else, nested-if, break, continue and pass Statements
- Module 5: loops : For, While
- Module 6: Global and Local Variables, Python Functions
- Module 7: OOPs Concept, Classes and Objects in Python, Constructor
- Module 8: Inheritance in Python, Inheritance types with example
- Module 9: Exceptions Handling
- Module 10: Creating server in Python, Creating client in Python, Port scanner in Python
Java Programming
- Module 1: Introduction of Java, JDK, JVM, JRE, Setting up the environment for Writing code in Eclipse, DataTypes and Operators, Type Casting
- Module 2: Control statements : if-else, Switch
- Module 3: loops: for, while , do-while
- Module 4: Arrays in java, input and output streams
- Module 5: Static keywords, Global and Local variables, Methods in Java
- Module 6: OOPs Concept, Classes and Objects in Java
- Module 7: Inheritance in Java, Inheritance types with example, Interfaces
- Module 8: Access Modifiers, Data hiding
- Module 9: Exceptions Handling
- Module 10: Multithreading
Android Development
- Module 1: Introduction to Android Development
- Module 2: Android UI Layout
- Module 3: Android UI Contro
- lModule 4: Android Activity & Intents & Service
- Module 5: Fragment
- Module 6: Database
- Module 7: List View & Recycler View
- Module 8: Multimedia Audio & Video and Camera
- Module 9: Content Providers
- Module 10: Location & Google Map
- Module 11: Rest API Integration (JSON)
- Module 12: Generate APK File
Amazon Web Services (AWS)
- Module 1: Introduction to Cloud Computing
- Module 2: Introduction to AWS
- Module 3: Amazon Elastic Compute Cloud (EC2)
- Module 4: Elastic Block Store (EBS)
- Module 5: Amazon Machine Image (AMI)
- Module 6: Elastic Load balancer
- Module 7: Auto Scaling
- Module 8: Amazon Virtual Private Cloud
- Module 9: Identify Access Management
- Module 10: Cloud watch
- Module 11: Simple Notification Service (SNS)
- Module 12: Simple Storage Service
- Module 13: Lambda
- Module 14: Relational Database Service (RDS)
- Module 15: AWS Command Line Interface (CLI)
- Module 16: Cloud Formation (CFN)
Many of our students have founded Zero-Day Vulnerabilities and also their CVE has published on Exploit-DB. Check their CVE and also read their Blog on Exploit DB.
Rabsun Sarkar one of our students has found zero-day vulnerabilities in Google and in the Security Talent Website and also reported for the same.



Learn from Industry Experts & Get Real Hands-On Experience and get job ready

Get Started with FREE Demo Class:
* We don’t share your personal info with anyone. Check out our Privacy Policy for more info.
Industry professions from Amazon, Cognizant & Intel will share their practical experience in the class
100% practical and lab-based classes (available online & offline)
25% Scholarship program for merited students with a minimum of 95% & above marks in their 12th board exams.
LIFETIME access to video tutorials, case studies
EMI option is available if you go for 2 or more courses.
Get educational loan @ O% interest
TRAINING METHODOLOGY of ICSS

THEORY

PRACTICALS

ASSIGNMENT

CERTIFICATION

RESUME PREPARATION

ASSIGNMENT
With our full Training Methodology you will get job


True Reviews by Real Students
4.8/5 Ratings
FEW STUDENT’S REVIEWS




INR 4,500 / – + 18% GST
Class Duration: 20 Hours
3-4 Classes Per Week
Batch Timing
Week End Classes | Week Days Classes
Recruiters are looking for you!
All you need to Learn Basic to Advance of Hacking with ICSS, Become Certified Professional and Get JOB with our Free Placement Assistance Program
Winter Internship in Kolkata
Winter Internship in Kolkata program is provided by Indian Cyber Security Solutions. With ever-changing technologies & methodologies, the competition today is much greater than ever before. Winter training in Kolkata programs provides a great opportunity for engineering students to utilize their vacation after a semester in the right way. Winter Internship in Kolkata You can develop hands-on training experience by building several projects as part of these programs. The winter internship in Kolkata is designed to give you a very good practical learning experience and develop skills that will be very useful for your career. The winter internship in Kolkata is the best way through which a student can enhance their skills in recent and updated technologies like Java, Android, Ethical Hacking, Python, CCNA. The industrial scenario needs constant technical enhancements to the rapid demands. This training is important because it is the best way to acquire and clear your concepts about your respective fields.
The winter internship in Kolkata is conducted in December & January. If you are looking for quality training then you must visit Indian Cyber Security Solutions. Projects are developed by Students during this winter internship program. Many times just theoretical knowledge is not of great use. To go out on the ground and work to bring changes, you need to have practical knowledge. That’s why the entire course of winter training in Kolkata is designed in a beautiful way to give you the real feel of affecting the masses through technology. With high skills and practical knowledge, we will make you the level where there is a pull from the industry side to hire you. Certification is important in Winter Internship in Kolkata because once you are applying for a job. So you need to have good certification of your knowledge. You will exactly get that at Indian Cyber Security Solution’s Winter Training in Kolkata program.
Organizations are recruiting young trained graduates who possess skilled training which can reduce the training cost of the company. Our winter training in Kolkata, program empowers you with skills that separate you from the crowd and make it easy for organizations to make you their definite choice. Get training on some of the most demanded programming languages and highly demanded technologies in your winter training in Kolkata before your college placement starts.
Need to Work on real-time projects in Winter Internship in Kolkata and complete assignments to get Professional Certification from Indian Cyber Security Solutions
ICSS provides the course completion certificate once you successfully complete the winter training program.










Winter Internship Programs
Winter Internship Programs is the best way for Engineering Students to develop practical skills during this winter break. The hands-on experience by doing projects helps students to improve their practical skills which are missing in their regular college curriculum & gives them a great experience of a Winter Internship. The certification with unique ID provided in the Winter Training Program helps students to showcase their skills in their resume to their prospective recruiters. Join us and improve your skills & career!
Indian Cyber Security Solutions is going to start Winter Training in Kolkata. The schedule is designed to match with the winter vacations in the respective areas so that students can utilize this opportunity and develop skills that will help them in their future careers.

Winter Training on Ethical Hacking
Winter Training on Ethical Hacking from Indian Cyber Security Solutions is the most demanding training in Kolkata. Ethical Hacking winter Internship Training Program from Indian Cyber Security Solutions provides a comprehensive ethical hacking and network security-training program by industry professionals. The latest tools and exploits uncovered from the underground community are featured in the new package. Our researchers have invested thousands of man-hours researching the latest trends and uncovering the covert techniques used by the underground community.
Hacking is usually legal as long as it is being done to find weaknesses in a computer or network system for testing purposes. This sort of hacking is what we call Ethical Hacking. White Hat hackers are also known as Ethical Hackers. They never intended to harm a system, rather they try to find out weaknesses in a computer or a network system as a part of penetration testing and vulnerability assessments. Join Indian Cyber Security Solutions for best Winter Training in Kolkata.
Indian Cyber Security Solutions conducts campus placement drive for students within few months after completion of the cyber security course. ICSS conducts soft skills classes for students to enhance their soft skills which are highly required to crack interviews. Check out our placement records where we have displayed emails and letters which have come to us for conducting job interviews. MNC’s like PWC , ITC and CTS had recruited ICSS students since 2018. We sincerely believe that after the intense practical lab based training on cyber security conducted by ICSS you as an individual will definitely be self sufficient to crack any job which requires cyber security skills. Winter Training course module is designed as per the industry demand which is evident from the job postings made by recruiting companies in different job portals.
Winter Training on Python Programming
Winter Training on Python Programming from Indian Cyber Security Solutions is the most demanding training in Kolkata. Python is a general-purpose language, which means it can be used to build just about anything, which will be made easy with the right tools/libraries. Professionally, Python is great for backend web development, data analysis, artificial intelligence, and scientific computing. While Python can be more user-friendly than Java. Winter Training in python programming from Indian Cyber Security Solutions Internship Program is a fast-paced internship and training program for engineering students to explore. This is the program where learning happens not by listening, but by doing! Each participant will develop different applications using different libraries in android. The program is going to be fast, exhaustive, challenging, and fun at the same time. Join Indian Cyber Security Solutions for best Winter Training in Kolkata.
If you want to be a CR there is a long list of benefits that you will be entitled too.
