CCNA or Cisco Certified Network Associate is an Information Technology certification from CISCO, the American multinational and leader in IT, networking and cyber security solutions. CCNA certification is an associate level Cisco Career Certification.
The content of the exams is propriety.
The CCNA certification is valid for a period of 3 years. Renewal of the certification requires the present holders to register and pass the same or higher level Cisco re certification exam every 3 years.
The topics include connecting to a WAN, implementing network security, network types, network media, routing and switching fundamentals, the TCP/IP and OSI models, IP addressing, WAN technologies, operating and configuring IOS devices, extending switched networks with VLANs, determining IP routes, managing IP traffic with access lists, and establishing point-to-point connections.
Ethical Hacking
Ethical Hacking is also called Penetration Testing. It is an act of intruding/ penetrating into the system or network to discover threats and vulnerabilities which a hacker may find and exploit leading to loss of data, money etc. The purpose of ethical hacking is to tighten the security in the system by solving the vulnerabilities found. Ethical hacker’s modus operandi is the same as the criminal hackers but with the permission of the authorities.
CISA, Certified Ethical Hacker, ISO 27001 Lead Auditor, Lead Privacy auditor, GDPR Implementer
With over 27 years of experience in Information Technology and Cyber Security, Mr. Sandeep Sengupta has made significant contributions to the field, providing solutions across India and internationally, including Singapore (2009-2010) and New Zealand (2002-2003). He is a certified lead auditor for standards such as ISO 27001 (Information Security), ISO 22301 (Business Continuity), ISO 9001 (Quality Management), and ISO 27701 (Data Protection & Privacy/GDPR). Additionally, he holds certifications as a Certified Ethical Hacker (CEH) and a Certified Information Systems Auditor (CISA).
Mr. Sengupta has conducted audits for organizations such as PwC, KPMG, Tata Steel, SAIL, Capgemini, Genpact, ITC, Airtel, Vodafone, ONGC, National Power Grid, Bandhan Bank, PayU, Vedanta, and Accenture, among others. He collaborates with law enforcement agencies, including the CID and Lal Bazar Police Cyber Cell, on cybercrime investigations.
Mr. Kirit Sankar Gupta
B. Tech (IT), OSCP, CEH 10.0, CHFI 9.0, ISO Certified Lead Security Incident Manager (ISO/IEC 27035), ISO Certified Lead Forensic Examiner (CLFE), CCNA, CCNP
A Penetration Tester with 6 years of experience, Kirit has the expertise in Mobile Application Pentesting Network, IoT Penetration Testing, Source-code review, Fuzzing, Red teaming, Social Engineering, Digital Forensic and Incident Response, Dev(Sec)Ops, Malware Analysis as well as SOC analysis. He has been acknowledged for reporting critical vulnerabilities to Uber, Apple, Flipkart, and MIT. Mr. Kirit Sankar Gupta is the member of Data Security Council of India (Kolkata).
Mr. Saumitra Biswas
M Tech - Computer Science, MSc (Statistics), GATE qualified
Mr. Saumitra Biswas is M.Tech in computer science from Netaji Subhash Engineering College, GATE qualified in computer science and a MSC in statistics from Kalyani University. He has 20 years of experience. His technical interests include Machine Learning, Neural Networks, Genetic Algorithms and Object Oriented Programming. He is skilled in C, C++, C#, Dotnet, Java, Python, Matlab, Unix, MS Windows XP, Windows 7, My SQL, Oracle, MS Access, HTML, XML, CSS and PHP. He take classes on AI & ML in ISOAH, as well as act as mentors to interns & project trainees.
Ms. Amrita Acharya
M Tech in CSE, ISO 27001 Lead Auditor (IRCA/BSI)
After completion of her Master degree, she has worked with ISOAH as an intern for few years before joining full time as security analyst. She has been involved in internal audit, policy design, ISMS consultancy for more than 2 years. She is well versed in Kali Linux, Nmap, Metasploit, ITGC, ISO 27001 & COBIT framework. ISOAH clients she has provided active consultancy are CESC, Diadem, Lexplosion, Diamond Beverages, etc. As part of her hobby, she has been a professional model in her free time.
I have done CCNP under shubendu Sir and CCNA under sagar sir..... I have so glad to have such a personality in our faculty....I have a nice experience in this institute
I have joined ISOEH for CCNA 3.0 and CCNP. My trainer is Subhendu sir, He is one of the best faculties.. He is well versed with the course, and he helped me to go through the entire syllabus theoretically and practically in detail. My overall experience was very Very good Thank you subhendu Sir & ISOEH...
Excellent Place to learn CCNA and Ethical Hacking. Best institute to learn on networking and Hacking. Lucky to be a part of this Institution.. Teachers and Faculties are very helpful and always ready to help. They got huge knowledge on every subject and every topic. I was under Subhendu Sir from very 1st day, he is too good and has good expertise and knowledge in his domain of Networking and also completed the course under him. For EH I was under Sanchayan Sir and Anubhav Sir they were also too good in teaching Hacking and its tools and how it works and cleared all my doubt. On other hand Kundan Sir also helped me with all my problems which I was facing and also help me to get rid from all my problems so i will be thankful to ISOEH for life. It was a good journey for me in learning and gathering knowledge and looking forward to do more courses from here and will also suggest my friend about this Institution. Thank You.
>
<
Job Prospects & Job Sources
CCNA Jobs
In order to maintain ultimate cyber security for corporate networking component is the most important aspect of IT infrastructure. Thus the demand for trained CCNA practitioners is soaring highest in the market for IT jobs.
One of those industrial sectors where CCNA is the most sought after IT security service is the Medical. That is because it is important to secure the patient report and associated medical details from being seized by hackers. Cyber Security being a major threat in fields of human activities the demand for CCNA certified security professionals is the highest. However prospects of a CCNA professional depends mainly on two factors namely work experience and job title.
The various titles that a CCNA processional holds are as follows:
Network Engineer
Senior Network Engineer
Network Administrator
IT Manager
Systems Administrator
Mobile Lead Software Engineer
Mobile Developer
IT Director
System Engineer
Out of all the varied titles of CCNA the position which commands the highest financial compensation is the managerial one which CCNA is a confirmed catalyst to reach.
Two important specializations of CCNA is ‘routing’ and ‘switching’. Job opportunities for both are increasing manifold owing to growing network and infrastructural complexities which demand trained individuals who can maintain complicated and critical hardware required to support the same. But these two specializations are at present the most in demand and financially alluring areas of CCNA.
Here is a pictorial representation of a CCNA career in India.
Internet security and networking are the two sunshine industries where ethical hackers are employed. They can join government and private organizations as cyber-security experts. IT firms are the real recruiters of ethical hackers additionally needed by financial service providers, airlines, retail chains and hotels also. Government agencies such as various wings of the military and law enforcement, defence organisations, forensic laboratories, detective companies and investigative services also have interesting careers for ethical hackers. Some skilled hackers work for investigative agencies like the Central Bureau of Investigation, the National Security Agency and the Federal Bureau of Information. Some large organizations employ security testers and others use contractors to audit their systems.
A fresher may work as an intern for some time before finally starting job with 2.5 lakh per annum. With one year of experience, one can expect up to 4.5 lakh per annum. Those with work experience five years or more can rake in anything between 10-12 lakh per annum.
The topics include connecting to a WAN, implementing network security, network types, network media, routing and switching fundamentals, the TCP/IP and OSI models, IP addressing, WAN technologies, operating and configuring IOS devices, extending switched networks with VLANs, determining IP routes, managing IP traffic with access lists, and establishing point-to-point connections.
What is the course Duration?
The course lasts for 40 hours with 2 classes per week.
What is the course Methodology?
The course is primarily based on practical sessions with an apt degree of theoretical classes.
What is the course Prerequisites?
10+2 along with a basic aptitude and understanding of computer hardware knowledge.
What is the career path after doing this course?
In order to maintain ultimate cyber security for corporate networking component is the most important aspect of IT infrastructure. Thus the demand for trained CCNA practitioners is soaring highest in the market for IT jobs for data security. Hence plush security jobs in IT departments of corporate houses are the alluring future of CCNA aspirants.
What is the next step after doing CCNA Essentials?
You can upgrade yourself in CISCO approved security skill development courses like CCNP, CCIE etc.
What is the course content?
Introduction to Ethical Hacking
Legality and Ethics
Networking & Basics
Foot Printing
Google Hacking
Scanning
Enumeration
System Hacking
Windows Hacking
Trojans & Backdoors
Virus & Worms
Sniffers
Social Engineering
Proxy Server & Packet Filtering
Denial of Service Attack
Phishing
Session Hijacking
Penetration Testing
Vulnerability Assessment
Linux Hacking
Physical Security
Hacking Web servers
Web Application Vulnerabilities
Web Based password Cracking Techniques
SQL Injection Vulnerabilities
Cryptography
Wireless Network Hacking and Countermeasures
Evading IDS, Firewalls and Detecting Honey Pots
Buffer Overflows
Reverse Engineering
Hacking Database Servers
Steganography
Spying Technologies
Hacking Routers and Firewalls
Computer Forensics and Incident Handling
Botnets
Hacking emails
Privacy on the Internet
Creating Security Policies
Exploit Writing
Patch Management
Covering Tracks
What is the course Duration?
The duration of the course is 40 hours at 2 classes per week.
What is the course Methodology?
The course is administered in theory as well as practice.
What is the course Prerequisites?
The pre requisites of the course are Basic knowledge of Database, Server side Programming (PHP or JSP or ASP.net) and basic knowledge of Networking.
What is the career path after doing this course?
The top organizations like such as Infosys, Wipro, TCS, Tech Mahindra, IBM etc. are seeking good ethical hackers. The profiles that are on offer include Security Executive, Web Security Manager/Administrator, Network Security Administrator, Network Security Systems Manager and much more.
What is the next step after Ethical Hacking?
The courses are NPT, WAPT, AAPT, IOS Application Penetration Testing etc which can be followed after this course.