A computer network is a digital telecommunications network which allows nodes to share resources. In computer networks, computing devices exchange data with each other using connections (data links) between nodes. These data links are established over cable media such as twisted pair or fiber-optic cables, and wireless media such as Wi-Fi. Network computer devices that originate, route and terminate the data are called network nodes. Nodes are generally identified by network addresses, and can include hosts such as personal computers, phones, and servers, as well as networking hardware such as routers and switches. Two such devices can be said to be networked together when one device is able to exchange information with the other device, whether or not they have a direct connection to each other. In most cases, application-specific communications protocols are layered (i.e. carried as payload) over other more general communications protocols. This formidable collection of information technology requires skilled network management to keep it all running reliably.
12 months - 4 days in a week
The prerequisite of the course is 10+2.
Rs.72,000/- (Paid one time)
Rs.80,000/- (Paid in instalment)
Inclusive of all taxes
Inclusive of all taxes
of in depth training by the best cyber security experts
Diploma in Networking
Certificate of Completion after examination and alumni status
|Paper code: DN-01||Title: Computer Hardware||Lecture: 40||Marks: 100||Internal: 20||Theory: 40||Lab: 40|
|Paper code: DN-02||Title: C Programing||Lecture: 40||Marks: 100||Internal: 20||Theory: 40||Lab: 40|
|Paper code: DN-03||Title: Basic Networking||Lecture: 40||Marks: 100||Internal: 20||Theory: 40||Lab: 40|
|Paper code: DN-04||Title: Python Programing||Lecture: 40||Marks: 100||Internal: 20||Theory: 40||Lab: 40|
|Paper code: DN-05||Title: English Communication & Soft-Skill - Module 1||Lecture: 40||Marks: 100||Internal: 20||Theory: 40||Lab: 40|
|Paper code: DN-06||Title: Project||Lecture: 8 Weeks||Marks: 100|
|Paper code: DN-07||Title: RDBMS||Lecture: 40||Marks: 100||Internal: 20||Theory: 20||Lab: 60|
|Paper code: DN-08||Title: Advance Networking||Lecture: 40||Marks: 100||Internal: 20||Theory: 20||Lab: 60|
|Paper code: DN-09||Title: Linux 8.0||Lecture: 40||Marks: 100||Internal: 20||Theory: 20||Lab: 60|
|Paper code: DN-10||Title: Firewall Administration||Lecture: 40||Marks: 100||Internal: 20||Theory: 20||Lab: 60|
|Paper code: DN-11||Title: English Communication & Soft-Skill - Module 2||Lecture: 40||Marks: 100||Internal: 20||Theory: 20||Lab: 60|
|Paper code: DN-12||Title: Project||Lecture: 8 Weeks||Marks: 100|
21 years of experience working in India, New Zealand & Singapore; in Information Security domain as Ethical Hacker, ISO 27001 Lead Auditor / Tutor, BS 10012 Privacy Lead Auditor, Mr. Sandeep Sengupta has conducted security audit in companies like ONGC, KPMG, PWC, Airtel, Vodafone, Accenture, Capgemini, Vedanta, PayU, Bandhan Bank, ABP, etc.
He has been invited as a speaker at FICCI, VIT (Vellore), Nasscom, CII, BCCI, ICAI, ISACA, FICCI, CeBIT, US High Commission (Kolkata), etc. He has taken part in several Television shows on ABP, ETV, NDTV, AajTak, Times Now, etc. In 2005, Sandeep founded the online community "Hackers Library"; which had 80,000+ members, making it the largest Indian online forum for cyber-security professionals at its time. Mr. Sengupta is the committee member at Nasscom (East) & CII ICT-East.
A Penetration Tester with 6 years of experience, Kirit has the expertise in Mobile Application Pentesting Network, IoT Penetration Testing, Source-code review, Fuzzing, Red teaming, Social Engineering, Digital Forensics and Incident Response, Dev(Sec)Ops, Malware Analysis as well as SOC analysis. He has been acknowledged for reporting critical vulnerabilities to Uber, Apple, Flipkart, and MIT. Mr. Kirit Sankar Gupta is the member of Data Security Council of India (Kolkata).
Mr. Saumitra Biswas is M.Tech in computer science from Netaji Subhash Engineering College, GATE qualified in computer science and a MSC in statistics from Kalyani University. He has 20 years of experience. His technical interests include Machine Learning, Neural Networks, Genetic Algorithms and Object Oriented Programming. He is skilled in C, C++, C#, Dotnet, Java, Python, Matlab, Unix, MS Windows XP, Windows 7, My SQL, Oracle, MS Access, HTML, XML, CSS and PHP. He take classes on AI & ML in ISOAH, as well as act as mentors to interns & project trainees.
After completion of her Master degree, she has worked with ISOAH as an intern for few years before joining full time as security analyst. She has been involved in internal audit, policy design, ISMS consultancy for more than 2 years. She is well versed in Kali Linux, Nmap, Metasploit, ITGC, ISO 27001 & COBIT framework. ISOAH clients she has provided active consultancy are CESC, Diadem, Lexplosion, Diamond Beverages, etc. As part of her hobby, she has been a professional model in her free time.