Diploma in Cyber Security Course in Bhubaneswar
- Chance to work with Secret Agencies
- Unlimited Potential For Growth
- A Variety Of Industries to choose from
- Financially lucrative and a job that is never boring
grade grade grade grade grade
5.0 Google Review (2500+)
people
3700+ Students Enrolled
verified
100% Job Placement
account_box
Faculty are working professionals from industry. Best in the Cyber Security.
settings
ICS, SCADA, PLC; HMI based attacks, Side-Channel attacks.
devices
While you study, you work in our LIVE projects to get hands on industry experience.
engineering
Internship at a Security Audit firm.
badge
Opportunities in Multinational Companies. Job Ready Program With 100% placement assistance.
payments
Get a Chance to Earn Good Salary – upto 6 lakhs.
book
The most advance Syllabus made by industry experts. Immersive Learning with100% Practical.
12 months - 4 days in a week.
The prerequisite of the course is 10+2.
Download Syllabusaccount_circle
12 months of in-depth training by the best Cyber Security Experts.
library_books
Lifetime Access to resources (50+ pdf, 100+ videos).
record_voice_over
7 days doubt clearing session.
switch_account
On-Campus Placement Opportunities in Multinational Companies.
workspace_premium
Diploma in Cyber Security Certificate of Completion after examination and alumni status.
Paper code | Title | Lecture | Internal | Theory | Lab | Marks |
---|---|---|---|---|---|---|
Paper code: DCS 01 | Title: C Programming | Lecture: 40 | Internal: 20 | Theory: 40 | Lab: 40 | Marks: 100 |
Paper code: DCS 02 | Title: RDBMS | Lecture: 40 | Internal: 20 | Theory: 40 | Lab: 40 | Marks: 100 |
Paper code: DCS 03 | Title: CCNA | Lecture: 40 | Internal: 20 | Theory: 40 | Lab: 40 | Marks: 100 |
Paper code: DCS 04 | Title: Python Programming | Lecture: 40 | Internal: 20 | Theory: 40 | Lab: 40 | Marks: 100 |
Paper code: DCS 05 | Title: Web Application Fundaments | Lecture: 40 | Internal: 20 | Theory: 40 | Lab: 40 | Marks: 100 |
Paper code: DCS 06 | Title: English Communication & Soft-Skill - Module 1 | Lecture: 40 | Internal: 20 | Theory: 40 | Lab: 40 | Marks: 100 |
Paper code | Title | Lecture | Internal | Theory | Lab | Marks |
---|---|---|---|---|---|---|
Paper code: DCS 07 | Title: Linux | Lecture: 40 | Internal: 20 | Theory: 40 | Lab: 40 | Marks: 100 |
Paper code: DCS 08 | Title: Ethical Hacking | Lecture: 40 | Internal: 20 | Theory: 40 | Lab: 40 | Marks: 100 |
Paper code: DCS 09 | Title: Network Penetration Testing | Lecture: 40 | Internal: 20 | Theory: 40 | Lab: 40 | Marks: 100 |
Paper code: DCS 10 | Title: Web Application Penetration Testing | Lecture: 40 | Internal: 20 | Theory: 40 | Lab: 40 | Marks: 100 |
Paper code: DCS 11 | Title: English Communication & Soft-Skill - Module 2 | Lecture: 40 | Internal: 20 | Theory: 40 | Lab: 40 | Marks: 100 |
Paper code: DCS 12 | Title: Project | Lecture: 40 | Internal: 20 | Theory: 40 | Lab: 40 | Marks: 100 |
check_box
They analyze and assess vulnerabilities in the infrastructure, detect vulnerabilities, and recommend solutions and best practices.
check_box
These professionals perform security monitoring and investigations and utilize new technologies and processes to.
check_box
They use encryption to secure information or build security software. They can also develop stronger encryption algorithms.
check_box
Designs a security system or major components of a security system, and heads a security design team building in a new security system.
check_box
These professionals Install and manage organization-wide security systems.
check_box
They develop security software and integrate or implement security into applications software.
Saumitra Biswas is M.Tech in computer science from Netaji Subhash Engineering College, GATE qualified in computer science and a MSC in statistics from Kalyani University. His technical interests include Machine Learning, Neural Networks, Genetic Algorithms and Object Oriented Programming. He is skilled in C, C++, C#, Dotnet, Java, Python, Matlab, Unix, MS Windows XP, Windows 7, My SQL, Oracle, MS Access, HTML, XML, CSS and PHP. He take classes on AI & ML in ISOAH, as well as act as mentors to interns & project trainees.
Pankaj Kuamr Roy is a CCNA (Switch/Router) certified whose expertise in Cisco switch and router. He is also CCNA Global Certified Number 415114188268BKYF. Previously he worked as a Linux Administrator on ISP Dreamlink Technologies Pvt. Ltd and also 7 years’ experience in Windows, Linux, and Network areas. He has experience in DevOps tools and AWS cloud Architecture. He is working as an Information Security Analyst in the Indian School of Ethical Hacking.
He is a Certified Ethical Hacker (CEH), whose expertise lies in Digital Forensics, OSINT, Vulnerability Assessment, Network Penetration Testing and Web Application Penetration Testing. Previously he worked as a Network Administrator. Currently, he is working as an Information Security Analyst in the Indian School of Ethical Hacking.
Average Salary
Hiring Partners
Average Salary Hike
Our students are placed at CID, Kolkata Police, Siliguri Police, Sales Tax Dept. Furthermore, we have working CA & Lawyers taking up our course. With rise in cybercrime, Cyber Security professionals will be the most in demand experts in the industry.
They will find good opportunity as "Penetration Tester, ISO 27001 Auditor / Implementer, System Administrator, Web/Mobile Application Penetration Tester, Software Developer, Malware Analyst, Information Security Researcher (ML & AI), etc".
Salary index in this field has risen by 25 to 35% in the last few years. Governmental initiative for digital India is a further impetus for increased demand for Cyber Security jobs.
Financial services institutions including banks, payment gateways and ecommerce organisations are the biggest employers in digital Forensic, according to Sunil Goel, managing director at Global Hunt. In certain cases, digital Forensic experts are reporting to the company boards directly.
Upcoming Batch
starting from
June 2023
grade grade grade grade grade
"Experience was great, have learned many things basically the actual required topics. Our trainer was great, he has great knowledge about the topics, I have my concepts cleared."
grade grade grade grade grade
"I enjoyed all the classes under the guidance of faculty in ISOEH and the best part was our basics got cleared first."
grade grade grade grade grade
"Trainers are very friendly and co-operative. Environment is healthy and the course is project based so it is very interesting to learn. Topics covered are relevant to our works."
The course duration is 12 months.
The course is administered in equal measures of practical and theory.
The prerequisite of the course is 10+2.
India is confronted with a scarcity of cyber security professionals, especially at the top corporate levels. Hence the field has seen increased salaries offered for such roles by 25-35% over the past year.
Hacking and cyber attacks are forcing firms to hire security practitioners at high premium. Compensation packages for top roles are at Rs 2 crore, and in some cases close to Rs 4 crores inclusive of variables. Demonetization and Digital India have escalated demand for cyber security talent further.
ISO 27001 & ISO 9001
Certified by BSI
Accredited
Training Center
Authorized
Test Center
Authorized
Partner
Govt. Empanelled
Security Audit Firm
By accessing the website at https://www.isoeh.com/, you are agreeing to be bound by these terms of service, all applicable laws and regulations, and agree that you are responsible for compliance with any applicable local laws. If you do not agree with any of these terms, you are prohibited from using or accessing this site. The materials contained in this website are protected by applicable copyright and trademark law.
In no event shall Indian School of Ethical Hacking or its suppliers be liable for any damages (including, without limitation, damages for loss of data or profit, or due to business interruption) arising out of the use or inability to use the materials on Indian School of Ethical Hacking's website, even if Indian School of Ethical Hacking or a Indian School of Ethical Hacking authorized representative has been notified orally or in writing of the possibility of such damage. Because some jurisdictions do not allow limitations on implied warranties, or limitations of liability for consequential or incidental damages, these limitations may not apply to you.
The materials appearing on Indian School of Ethical Hacking's website could include technical, typographical, or photographic errors. Indian School of Ethical Hacking does not warrant that any of the materials on its website are accurate, complete or current. Indian School of Ethical Hacking may make changes to the materials contained on its website at any time without notice. However Indian School of Ethical Hacking does not make any commitment to update the materials.
Indian School of Ethical Hacking has not reviewed all of the sites linked to its website and is not responsible for the contents of any such linked site. The inclusion of any link does not imply endorsement by Indian School of Ethical Hacking of the site. Use of any such linked website is at the user's own risk.
Indian School of Ethical Hacking may revise these terms of service for its website at any time without notice. By using this website you are agreeing to be bound by the then current version of these terms of service.
These terms and conditions are governed by and construed in accordance with the laws of Kolkata and you irrevocably submit to the exclusive jurisdiction of the courts in that State or location.
Thank you for choosing to be part of our community at Indian School of Anti Hacking, doing business as ISOAH (“ISOAH”, “we”, “us”, or “our”). We are committed to protecting your personal information and your right to privacy. If you have any questions or concerns about this privacy notice, or our practices with regards to your personal information, please contact us at [email protected].
When you visit our website https://www.isoeh.com/ (the "Website"), and more generally, use any of our services (the "Services", which include the Website), we appreciate that you are trusting us with your personal information. We take your privacy very seriously. In this privacy notice, we seek to explain to you in the clearest way possible what information we collect, how we use it and what rights you have in relation to it. We hope you take some time to read through it carefully, as it is important. If there are any terms in this privacy notice that you do not agree with, please discontinue use of our Services immediately.
This privacy notice applies to all information collected through our Services (which, as described above, includes our Website), as well as any related services, sales, marketing or events.
Please read this privacy notice carefully as it will help you understand what we do with the information that we collect.
Information collected from other sources
In Short: We may collect limited data from public databases, marketing partners, and other outside sources.
In order to enhance our ability to provide relevant marketing, offers and services to you and update our records, we may obtain information about you from other sources, such as public databases, joint marketing partners, affiliate programs, data providers, as well as from other third parties. This information includes mailing addresses, job titles, email addresses, phone numbers, intent data (or user behavior data), Internet Protocol (IP) addresses, social media profiles, social media URLs and custom profiles, for purposes of targeted advertising and event promotion.
In Short: We process your information for purposes based on legitimate business interests, the fulfillment of our contract with you, compliance with our legal obligations, and/or your consent.
We use personal information collected via our Website for a variety of business purposes described below. We process your personal information for these purposes in reliance on our legitimate business interests, in order to enter into or perform a contract with you, with your consent, and/or for compliance with our legal obligations. We indicate the specific processing grounds we rely on next to each purpose listed below.
We use the information we collect or receive:
In Short: We only share nformation with your consent, to comply with laws, to provide you with services, to protect your rights, or to fulfill business obligations.
We may process or share your data that we hold based on the following legal basis:
More specifically, we may need to process your data or share your personal information in the following situations:
In Short: We may use cookies and other tracking technologies to collect and store your information.
We may use cookies and similar tracking technologies (like web beacons and pixels) to access or store information. Specific information about how we use such technologies and how you can refuse certain cookies is set out in our Cookie Notice.
In Short: Yes, we use Google Maps for the purpose of providing better service.
This Website uses Google Maps APIs which is subject to Google's Terms of Service. You may find the Google Maps APIs Terms of Service here. To find out more about Google’s Privacy Policy, please refer to this link.
In Short: We may transfer, store, and process your information in countries other than your own.
Our servers are located in. If you are accessing our Website from outside, please be aware that your information may be transferred to, stored, and processed by us in our facilities and by those third parties with whom we may share your personal information (see "WILL YOUR INFORMATION BE SHARED WITH ANYONE?" above), in and other countries.
If you are a resident in the European Economic Area, then these countries may not necessarily have data protection laws or other similar laws as comprehensive as those in your country. We will however take all necessary measures to protect your personal information in accordance with this privacy notice and applicable law.
In Short: We keep your information for as long as necessary to fulfill the purposes outlined in this privacy notice unless otherwise required by law.
We will only keep your personal information for as long as it is necessary for the purposes set out in this privacy notice, unless a longer retention period is required or permitted by law (such as tax, accounting or other legal requirements). No purpose in this notice will require us keeping your personal information for longer than 1 year.
When we have no ongoing legitimate business need to process your personal information, we will either delete or anonymize such information, or, if this is not possible (for example, because your personal information has been stored in backup archives), then we will securely store your personal information and isolate it from any further processing until deletion is possible.
In Short: We aim to protect your personal information through a system of organizational and technical security measures.
We have implemented appropriate technical and organizational security measures designed to protect the security of any personal information we process. However, despite our safeguards and efforts to secure your information, no electronic transmission over the Internet or information storage technology can be guaranteed to be 100% secure, so we cannot promise or guarantee that hackers, cybercriminals, or other unauthorized third parties will not be able to defeat our security, and improperly collect, access, steal, or modify your information. Although we will do our best to protect your personal information, transmission of personal information to and from our Website is at your own risk. You should only access the Website within a secure environment.
In Short: You may review, change, or terminate your account at any time.
If you are resident in the European Economic Area and you believe we are unlawfully processing your personal information, you also have the right to complain to your local data protection supervisory authority. You can find their contact details here: http://ec.europa.eu/justice/data-protection/bodies/authorities/index_en.htm.
If you are resident in Switzerland, the contact details for the data protection authorities are available here: https://www.edoeb.admin.ch/edoeb/en/home.html.
Cookies and similar technologies: Most Web browsers are set to accept cookies by default. If you prefer, you can usually choose to set your browser to remove cookies and to reject cookies. If you choose to remove cookies or reject cookies, this could affect certain features or services of our Website. To opt-out of interest-based advertising by advertisers on our Website visit http://www.aboutads.info/choices/.
Most web browsers and some mobile operating systems and mobile applications include a Do-Not-Track (“DNT”) feature or setting you can activate to signal your privacy preference not to have data about your online browsing activities monitored and collected. At this stage, no uniform technology standard for recognizing and implementing DNT signals has been finalized. As such, we do not currently respond to DNT browser signals or any other mechanism that automatically communicates your choice not to be tracked online. If a standard for online tracking is adopted that we must follow in the future, we will inform you about that practice in a revised version of this privacy notice.
In Short: Yes, we will update this notice as necessary to stay compliant with relevant laws.
We may update this privacy notice from time to time. The updated version will be indicated by an updated "Revised" date and the updated version will be effective as soon as it is accessible. If we make material changes to this privacy notice, we may notify you either by prominently posting a notice of such changes or by directly sending you a notification. We encourage you to review this privacy notice frequently to be informed of how we are protecting your information.
If you have questions or comments about this notice, you may email us at
[email protected] or by post to:
Indian School of Anti Hacking
ISOAH, Kariwala Towers, 4th Floor, Plot J/1-5, Block EP,
Sector V, Saltlake City
Kolkata, West Bengal 700091
India
HOW CAN YOU REVIEW, UPDATE, OR DELETE THE DATA WE COLLECT FROM YOU?
Based on the applicable laws of your country, you may have the right to request access to the personal information we collect from you, change that information, or delete it in some circumstances. To request to review, update, or delete your personal information, please submit a request form by clicking here. We will respond to your request within 30 days.