Preloader
  • Follow Us On :
Request Demo Class Join Free Seminar
img
Course includes:
  • img Level Advanced
  • img Hours 272
  • img Total Class 136
  • img Certifications Yes
Share this course:

Diploma in Cyber Security Engineers Job Guaranteed Training

  • 13 Jan 2026
  • ___ Students

COURSE OVERVIEW

Prepare for a successful career in cybersecurity with our 1-Year Cyber Security Engineer Diploma. This program provides comprehensive training in networking, Linux, ethical hacking, penetration testing, and firewall security, equipping you with the practical and theoretical knowledge needed to secure enterprise and ISP networks. It combines CCNA, CCNP Enterprise (ENCOR & ENARSI), Linux fundamentals, network security foundations, ethical hacking, and hands-on penetration testing labs.

Course Curriculum

  • Aspiring Network Security Engineers
  • Aspiring Cyber Security Engineers
  • IT Professionals
  • Recent Graduates
  • Career Switchers
  • Cisco Certification Seekers
  • Networking Enthusiasts
  • Job Seekers
  • IT Support Professionals

  • Basic computer literacy
  • Basic PC operating system navigation skills
  • Basic Internet usage skills
  • Basic IP address knowledge
  • Motivation to Learn
  • Strong Communication skills

  • Cybersecurity Engineer
  • Network Security Analyst
  • Ethical Hacker / Penetration Tester 
  • SOC Analyst 
  • Security Operations Specialist 
  • NOC Technician 
  • Firewall Engineer 
  • IT Security Consultant

Modules Covered In This Diploma Course

  • MODULE 1 : CCNA 200-301 
  • MODULE 2 : Cisco CCNP Enterprise Network Core Technologies (ENCOR) 
  • MODULE 3 : Cisco CCNP Enterprise Advanced Routing and Services (ENARSI) 
  • MODULE 4 : Linux Essentials 
  • MODULE 5 : Network Security Foundation (Cisco ASA, VPN, Checkpoint, Fortigate) 
  • MODULE 6 : Ethical Hacking & Cyber Security 
  • MODULE 7 : Penetration Testing Foundation 
  • MODULE 8 : Interview Preparation & Grooming Sessions

Details Of Every Course

MODULE 1-3 : Networking & Cisco (CCNA, CCNP ENCOR, CCNP ENARSI)

  • Networking Fundamentals: OSI & TCP/IP models, encapsulation, and data flow
  • IPv4 & IPv6 addressing, subnetting, and design principles
  • Switching Concepts: VLANs, trunking, spanning tree, redundancy
  • Routing Principles: static vs dynamic, administrative distance, convergence
  • OSPF Fundamentals and advanced design concepts (multi-area, authentication)
  • EIGRP Concepts: metrics, DUAL algorithm, advanced filtering
  • BGP Fundamentals: attributes, path selection, iBGP vs eBGP
  • MPLS Concepts: labels, LSR/LSER, VPN overview
  • WAN Technologies: DMVPN, FlexVPN, GRE, and IPSec concepts
  • Quality of Service (QoS) models and enterprise use cases
  • Virtualization and VRF fundamentals for enterprise networks
  • Network Automation & Programmability (Ansible, Python, APIs)
  • Monitoring & Telemetry: Syslog, SNMP, NetFlow, model-driven telemetry

MODULE 4 : Linux System Administration

  • Linux architecture, boot process, and file system hierarchy
  • File permissions, ownership, and access control concepts
  • Process management and system services overview
  • Linux networking fundamentals: interfaces, routing, DNS concepts
  • Package management and software repositories
  • Shell scripting basics and automation principles
  • Linux security essentials: firewall concepts, SELinux/AppArmor

MODULE 5 : Network Security (Multi-Vendor)

  • Firewall technologies: stateful inspection, next-generation firewalls (NGFW)
  • VPN Fundamentals: site-to-site, remote access, SSL/IPSec principles
  • Security policies and access control concepts
  • Threat prevention technologies: IDS, IPS, Antivirus, Web Filtering
  • High Availability and clustering concepts in firewalls
  • Identity management: RADIUS, LDAP, multifactor authentication

MODULE 6 : Ethical Hacking & Cybersecurity

  • Cyber kill chain and penetration testing methodology
  • Footprinting and reconnaissance techniques
  • Vulnerability management: scanning, assessment, remediation cycle
  • Exploitation concepts: privilege escalation, lateral movement
  • Post-exploitation concepts: maintaining persistence, covering tracks
  • Web application security fundamentals (OWASP Top 10)
  • Wireless security concepts and vulnerabilities (WEP/WPA/WPA3)
  • IDS/IPS evasion and firewall bypass strategies

MODULE 7 : Penetration Testing Foundation

  • Setting up a penetration testing environment and lab
  • Attack phases: planning, exploitation, post-exploitation, reporting
  • Exploit development basics and payloads
  • Password attacks: brute force, dictionary, rainbow tables
  • Advanced reporting and professional documentation for pentesting

MODULE 8 : Interview Preparation and Grooming Sessions 

  • Resume Writing and LinkedIn Profile Optimization
  • Conduct Mock HR and Technical Interview Sessions
  • Practice Scenario-Based Cybersecurity Troubleshooting
  • Develop Professional Communication and Workplace Etiquette
  • Participate in Group Discussions and Team Collaboration
  • Hands-On Resume Building and LinkedIn Workshop
  • Mock Interview Simulations for Job Readiness
  • Case Study-Based Problem-Solving Exercises

  • Network Engineer
  • Network Administrator
  • Systems Administrator
  • Network Analyst
  • Security Engineer
  • Cybersecurity Analyst
  • Data Center L1 Engineer
  • Network Operations Center (NOC) Technician
  • Network Support Engineer
  • L1 Security Engineer
  • Security Operations Center (SOC) Technician
  • Technical Support Specialist
  • Firewall Engineer
  • Network Monitoring Engineer
  • Mid-Level Information Security Auditor
  • Cybersecurity Auditor
  • Security Administrator
  • IT Security Administrator
  • Cyber Defense Analyst
  • Vulnerability Assessment Analyst
  • Warning Analyst
  • Information Security Analyst 1
  • Security Analyst L1
  • Infosec Security Administrator
  • Cybersecurity Analyst Level 1, Level 2, & Level 3
  • Network Security Engineer
  • SOC Security Analyst
  • Security Analyst
  • Network Engineer
  • Senior Security Consultant
  • Information Security Manager
  • Senior SOC Analyst
  • Solution Architect
  • Cybersecurity Consultant

MODULE 1 : CCNA Labs

  • Configure Cisco router and switch initial setup (hostname, console/SSH, passwords).
  • Create VLANs, assign switch ports, and configure trunking.
  • Implement Inter-VLAN Routing using Router-on-a-Stick.
  • Configure IPv4 and IPv6 addressing on routers and hosts.
  • Set up and verify static routes and default routes.
  • Implement single-area OSPF with router IDs and passive interfaces.
  • Configure DHCP server on a router and test client assignments.
  • Configure NAT, Dynamic NAT, and PAT with real testing.
  • Apply standard and extended ACLs for traffic filtering.
  • Configure STP, EtherChannel, and redundancy for loop prevention.
  • Set up Wireless LAN Controller (WLC), create SSIDs, and secure WLAN.
  • Monitor network traffic and troubleshoot connectivity issues.

MODULE 2 : CCNP ENCOR Labs

  • Configure advanced VLANs, VTP, and DTP on enterprise switches.
  • Implement multi-area OSPF with authentication and route summarization.
  • Configure advanced EIGRP with stub routing and route filtering.
  • Implement BGP for enterprise with iBGP, eBGP, and route maps.
  • Configure VRF and route leaking for multi-tenant simulation.
  • Apply advanced QoS (classification, marking, shaping, policing).
  • Set up enterprise wireless roaming with multiple APs & WLC.
  • Automate configuration using Ansible and Python scripts.
  • Implement Syslog, SNMP, and NetFlow for network monitoring.
  • Secure enterprise infrastructure with control plane policing.

MODULE 3 : CCNP ENARSI Labs

  • Configure advanced EIGRP (authentication, summarization, offset lists).
  • Implement OSPFv2/v3 with redistribution and filtering.
  • Deploy advanced BGP with route reflectors, communities, and policies.
  • Perform route redistribution between EIGRP, OSPF, and BGP.
  • Configure MPLS Layer 3 VPNs with PE-CE routers.
  • Deploy DMVPN Phase 1, Phase 2, and Phase 3.
  • Configure FlexVPN for secure remote site connectivity.
  • Implement advanced security (uRPF, DHCP snooping, IP Source Guard).
  • Troubleshoot complex routing scenarios using debug & traceroute.
  • Perform VPN troubleshooting with broken tunnels and misconfigurations.

MODULE 4 : Linux Labs

  • Install Ubuntu/CentOS Linux in a VM.
  • Navigate file system and manage directories/files.
  • Create, manage, and secure users, groups, and permissions.
  • Configure and manage services and processes.
  • Set up static and dynamic IP networking on Linux.
  • Configure DNS resolution and test connectivity.
  • Manage packages using apt, yum, and rpm.
  • Write and execute basic Bash shell scripts.
  • Configure firewall with iptables and ufw.
  • Troubleshoot Linux boot, services, and network issues.

MODULE 5 : Network Security Labs

  • Configure Cisco ASA firewall with ACLs and NAT.
  • Deploy site-to-site VPN on Cisco ASA and FortiGate.
  • Configure SSL VPN for remote clients on FortiGate.
  • Install and configure Check Point firewall with security policies.
  • Apply threat prevention (IPS, IDS, Antivirus, Web Filter).
  • Set up firewall High Availability (HA) cluster.
  • Configure VPN user authentication with RADIUS/LDAP.
  • Monitor logs and analyze threats using FortiAnalyzer / SmartConsole.
  • Troubleshoot firewall rules and VPN connectivity issues.

MODULE 6 : Ethical Hacking Labs

  • Perform reconnaissance with Nmap, Recon-ng, and Whois.
  • Scan networks for vulnerabilities using Nessus/OpenVAS.
  • Exploit systems using Metasploit framework.
  • Capture packets with Wireshark and analyze network traffic.
  • Perform ARP spoofing and sniffing attacks.
  • Crack passwords using Hydra and John the Ripper.
  • Exploit web applications (SQL Injection, XSS, CSRF).
  • Conduct DoS/DDoS simulation in lab.
  • Attack wireless networks using Aircrack-ng.
  • Evade IDS/IPS and test firewall bypass techniques.

MODULE 7 : Penetration Testing Labs

  • Build penetration testing lab with Kali Linux and vulnerable VMs.
  • Perform footprinting and vulnerability scanning.
  • Exploit Windows/Linux targets and escalate privileges.
  • Maintain persistence and create backdoors.
  • Post-exploitation with Meterpreter sessions.
  • Conduct web application penetration testing with Burp Suite.
  • Test wireless networks with advanced WPA2/WPA3 cracking.
  • Crack password hashes using rainbow tables and wordlists.
  • Perform full penetration test (end-to-end attack simulation).
  • Write penetration testing report and remediation plan.

Upon completion, students are prepared for vendor and professional certification:

  • CCNA 200-301 -Cisco Certified Network Associate
  • CCNP ENCOR 350-401 -Cisco Certified Network Professional Enterprise Core
  • CCNP ENARSI 300-410 -Cisco Certified Network Professional Enterprise Advanced Routing and Services
  • CCNP Security (SCORE) 300 -208-Cisco Certified Network Professional Security Core
  • Cisco Certified Specialist -Network Security VPN 300-730 SNCF
  • Fortinet NSE 4 -FortiGate Security
  • Fortinet NSE 5 -FortiManager & FortiAnalyzer (optional)
  • Check Point CCSA -Check Point Certified Security Administrator
  • Check Point CCSE -Check Point Certified Security Expert
  • Palo Alto PCNSA -Palo Alto Networks Certified Network Security Administrator
  • Palo Alto PCNSE -Palo Alto Networks Certified Network Security Engineer
  • EX200 -Red Hat Certified System Administrator (RHCSA)
  • EX294 -Red Hat Certified Engineer (RHCE, optional)
img

Mark Jukarberg

UX Design Lead

(4.8 Ratings)

Dorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua Quis ipsum suspendisse ultrices gravida. Risus commodo viverra maecenas accumsan.

Reviews

4.8
12 Ratings
5
2
4
1
3
0
2
0
1
0
img
Jura Hujaor 2 Days ago

The best LMS Design System

Maximus ligula eleifend id nisl quis interdum. Sed malesuada tortor non turpis semper bibendum nisi porta, malesuada risus nonerviverra dolor. Vestibulum ante ipsum primis in faucibus.