A computer network is a digital telecommunications network which allows nodes to share resources. In computer networks, computing devices exchange data with each other using connections (data links) between nodes. These data links are established over cable media such as twisted pair or fiber-optic cables, and wireless media such as Wi-Fi. Network computer devices that originate, route and terminate the data are called network nodes. Nodes are generally identified by network addresses, and can include hosts such as personal computers, phones, and servers, as well as networking hardware such as routers and switches. Two such devices can be said to be networked together when one device is able to exchange information with the other device, whether or not they have a direct connection to each other. In most cases, application-specific communications protocols are layered (i.e. carried as payload) over other more general communications protocols. This formidable collection of information technology requires skilled network management to keep it all running reliably.
12 months - 4 days in a week
The prerequisite of the course is 10+2.
Rs.72,000/- (Paid one time)
Rs.80,000/- (Paid in installments)
Inclusive of all taxes
Inclusive of all taxes
of in depth training by the best cyber security experts
Diploma in Networking
Certificate of Completion after examination and alumni status
|Paper code: DN-01||Title: Computer Hardware||Lecture: 40||Marks: 100||Internal: 20||Theory: 40||Lab: 40|
|Paper code: DN-02||Title: C Programing||Lecture: 40||Marks: 100||Internal: 20||Theory: 40||Lab: 40|
|Paper code: DN-03||Title: Basic Networking||Lecture: 40||Marks: 100||Internal: 20||Theory: 40||Lab: 40|
|Paper code: DN-04||Title: Python Programing||Lecture: 40||Marks: 100||Internal: 20||Theory: 40||Lab: 40|
|Paper code: DN-05||Title: Project||Lecture: 8 Weeks||Marks: 100|
|Paper code: DN-06||Title: RDBMS||Lecture: 40||Marks: 100||Internal: 20||Theory: 20||Lab: 60|
|Paper code: DN-07||Title: Advance Networking||Lecture: 40||Marks: 100||Internal: 20||Theory: 20||Lab: 60|
|Paper code: DN-08||Title: Linux 8.0||Lecture: 40||Marks: 100||Internal: 20||Theory: 20||Lab: 60|
|Paper code: DN-09||Title: Firewall Administration||Lecture: 40||Marks: 100||Internal: 20||Theory: 20||Lab: 60|
|Paper code: DN-10||Title: Project||Lecture: 8 Weeks||Marks: 100|
21 years of experience working in India, New Zealand & Singapore; in Information Security domain as Ethical Hacker, ISO 27001 Lead Auditor / Tutor, BS 10012 Privacy Lead Auditor, Mr. Sandeep Sengupupta has conducted security audit in companies like ONGC, KPMG, PWC, Airtel, Vodafone, Accenture, Capgemini, Vedanta, PayU, Bandhan Bank, ABP, etc.
He has been invited as a speaker at FICCI, VIT (Vellore), Nasscom, CII, BCCI, ICAI, ISACA, FICCI, CeBIT, US High Commission (Kolkata), etc. He has taken part in several Television shows on ABP, ETV, NDTV, AajTak, Times Now, etc. In 2005, Sandeep founded the online community "Hackers Library"; which had 80,000+ members, making it the largest Indian online forum for cyber-security professionals at its time. Mr. Sengupta is the committee member at Nasscom (East) & CII ICT-East.
A Penetration Tester with 6 years of experience, Kirit has the expertise in Mobile Application Pentesting Network, IoT Penetration Testing, Source-code review, Fuzzing, Red teaming, Social Engineering, Digital Forensics and Incident Response, Dev(Sec)Ops, Malware Analysis as well as SOC analysis. He has been acknowledged for reporting critical vulnerabilities to Uber, Apple, Flipkart, and MIT. Mr. Kirit Sankar Gupta is the member of Data Security Council of India (Kolkata).
With 7 years of experience in Information Security audit and Forensic Investigation, Mr. Sanchayan Bhaumik is working as Information Security Analyst at ISOEH and has successfully conducted various Vulnerability Assessment and Penetration Testing / audit, as well as Forensic Investigation for leading corporate houses and Government entities.
He has worked as an Assistant Professor at Sikkim Manipal University & Guest Faculty at National Institute of Pharmaceutical Education and Research. His research domain is AI, Machine Learning and Cryptography. He has presented several research papers in international conferences. At ISOEH his job profile includes VAPT, Forensic Assignments & Teaching advance courses on penetration testing, creating hacking tools using python, AI & ML.
Mr. Saumitra Biswas is M.Tech in computer science from Netaji Subhash Engineering College, GATE qualified in computer science and a MSC in statistics from Kalyani University. He has 20 years of experience. His technical interests include Machine Learning, Neural Networks, Genetic Algorithms and Object Oriented Programming. He is skilled in C, C++, C#, Dotnet, Java, Python, Matlab, Unix, MS Windows XP, Windows 7, My SQL, Oracle, MS Access, HTML, XML, CSS and PHP. He take classes on AI & ML in ISOAH, as well as act as mentors to interns & project trainees.
After completion of her Master degree, she has worked with ISOAH as an intern for few years before joining full time as secuity analyst. She has been involved in internal audit, policy design, ISMS consultancy for more than 2 years. She is well versed in Kali Linux, Nmap, Metasploit, ITGC, ISO 27001 & COBIT framework. ISOAH clients she has provided active consultancy are CESC, Diadem, Lexplosion, Diamond Beverages, etc. As part of her hobby, she has been a professional model in her free time.
A Certified Ethical Hacker & CCNA, Mr. Subhendu Bhadra has expertise in exploit writing using Python, Ruby and Bash and is working as a Information Security Analyst and Faculty at ISOEH. Passionate about gadgets and technology, he has created several projects using Arduino. Well versed with networking and various programming languages, Suvendu is developing new hacking tools using Python.
Anubhav Khettry is a Certified Ethical Hacker. His area of interest includes Network Penetration Testing (NPT), Web Application Penetration Testing (WAPT) & RDBMS concepts. He is currently a part of ISOEH as Information Security Analyst and faculty.
Saugata Sil is a Certified Ethical Hacker (CEH). His area of interest is Python, Networking, Ethical Hacking, Front-end Development, Vulnerability Assessment, Web Application Pentesting, Android Application Pentesting and API Pentesting. Previously he worked as a Front-end developer and Software developer. As well as he also bug hunting and he has been acknowledged for reporting critical vulnerabilities to Dell, TripAdvisor, HealthifyMe, Spacex and many more. He has a passion for teaching & likes to guide students to apply cyber security knowledge in real-life scenarios. He is currently a part of ISOAH as a faculty member & Security Researcher Analyst.
Sagar Neogi is a Certified Ethical Hacker (CEH). His area of interest is Python, Reverse Engineering, Vulnerability Assessment and Penetration Testing. He is proficient in network design & hardening. He has a passion for teaching & likes to guide students to apply cyber security knowledge in the real-life scenario. He is currently a part of ISOEH as a faculty member & research analyst.
Somdeb Chakraborty is a Certified Ethical Hacker (CEH), whose expertise lies in penetration testing. His areas of interest are Networking, Python, Vulnerability Assessment and Penetration Testing. He is also CCNA Global Certified (CISCO ID# CSCO13549504). Previously he worked as a software and web development trainer at The EDGE College in tie up with Vinayaka mission Sikkim University. He is working as an Information Security Analyst in the Indian School of Ethical Hacking.
Mr. Soummya Mukhopadhyay is a Certified Ethical Hacker (CEH). He has an interest in Network Penetration Testing, Web Application Penetration Testing and in 802.11 attacks and mitigation, as well as Advanced Persistent Threat mitigation. Previously worked as a Web Application Back end developer using PHP. Over the last one year he has been active as a bug bounty hunter. For ISOAH he has taken an active role in Developing CTF Challenges.
Debraj Basak is a Certified Ethical Hacker (CEH). His area of interest is Advance Python, C Programming, Networking, Ethical Hacking, Hacking Tools Development, Vulnerability Assessment, Web Application Pentesting and Network Pentesting. He is also skilled in HTML, CSS, PHP & DBMS. Currently he is doing research on Malware Analysis and Reverse Engineering. He has a passion for teaching & likes to guide students to apply cyber security knowledge in real-life scenarios. He writes technical content as a hobby.