Professional Cybersecurity Engineer

Certification Training

We provide Online Instructor And Classroom Instructor led Live virtual classroom by certified trainers/ industry professionals

About Course

Professional Cybersecurity Engineer

Integrated Cyber Security Professional Course

(CompTIA Network+ | CompTIA Linux+ | CCNA Cybersecurity (CyberOps) | CEH)
Offered by CloudNet India, Kolkata

Course Description

The Integrated Cyber Security Professional Course at CloudNet India, Kolkata is a comprehensive, industry-focused training program designed to build strong foundational, administrative, and advanced cybersecurity skills. This program combines four globally recognized certifications to create a complete cybersecurity career pathway—from networking and Linux fundamentals to security operations and ethical hacking.

Students gain hands-on experience in networking, Linux system administration, security operations (SOC), threat detection, vulnerability assessment, penetration testing, and incident response. The course is structured to prepare learners for international certification exams while ensuring job-ready skills through real-world labs, live scenarios, and guided projects.

Certifications Covered

  • CompTIA Network+ – Networking fundamentals & infrastructure security
  • CompTIA Linux+ – Linux administration & server security
  • CCNA Cybersecurity (CyberOps) – Security operations & SOC analyst skills
  • Certified Ethical Hacker (CEH) – Ethical hacking & penetration testing

Who Can Join This Course

This course is ideal for:

  • IT / Computer Science / Electronics students
  • Fresh graduates aspiring for cybersecurity careers
  • Working professionals in IT support, networking, or system administration
  • Network engineers & system administrators upskilling to security roles
  • Cloud, DevOps, and SOC analyst aspirants
  • Career switchers with basic computer knowledge

No prior cybersecurity experience is mandatory. Networking basics will be covered from scratch.

Key Skills You Will Gain

  • Network design, configuration, and security
  • Linux system administration and hardening
  • Security monitoring & incident response (SOC)
  • Threat analysis & vulnerability management
  • Ethical hacking & penetration testing techniques
  • Cloud and enterprise security fundamentals

Job Roles After Course Completion

After completing this program, learners can apply for roles such as:

  • Cyber Security Analyst
  • SOC Analyst (Level 1 / Level 2)
  • Network Security Engineer
  • Ethical Hacker / Penetration Tester
  • Linux Security Administrator
  • Cloud Security Associate
  • IT Security Support Engineer

Placement & Career Support – CloudNet India

CloudNet India, Kolkata offers strong placement and career assistance, including:

  • Career counseling and skill assessment
  • Professional resume & LinkedIn profile creation
  • Hands-on security projects and lab-based experience
  • Technical & HR interview preparation
  • Mock interviews with industry experts
  • Job referrals through hiring partners
  • Internship & live project guidance

Placement support is provided to all eligible students. Final placement depends on individual performance, skills, and interview outcomes.

Why Choose CloudNet India, Kolkata

  • One program covering 4 globally recognized certifications
  • Industry-experienced cybersecurity trainers
  • Practical, lab-focused learning approach
  • Real-time attack & defense scenarios
  • Flexible batch timings
  • Affordable fee structure
  • Dedicated placement and career guidance

     

Career Pathway After This Course

This integrated program prepares students for advanced certifications and roles such as:

  • Advanced SOC Analyst
  • Red Team / Blue Team Specialist
  • Cloud Security Engineer
  • Cyber Forensics Analyst
  • Security Architect (with experience)

     

Key Features

You will get 100% job Assurance and life time e-placement support

classed taken by globally certified trainers

You will get 3 year Dedicated placement support

Courses are globally recognized & accredited

Cybersecurity Engineer Full Syllabus

MODULE - I

CompTIA Network+ 

Offered by CloudNet India, Kolkata

Course Description

The CompTIA Network+ course at CloudNet India, Kolkata is a comprehensive, job-oriented training program designed to build strong foundational and practical networking skills. This course covers essential networking concepts including network architecture, protocols, IP addressing, routing & switching, wireless technologies, network security, troubleshooting, and emerging technologies.

Our training is aligned with the latest CompTIA Network+ exam objectives and focuses on real-world scenarios, hands-on labs, and industry best practices. Whether you are starting your IT career or looking to upskill, this course prepares you for both certification success and entry-level to mid-level networking roles.

Who Can Join This Course

This course is suitable for:

  • Students from IT / Computer Science / Electronics background
  • Fresh graduates looking to start a career in networking or IT infrastructure
  • Working professionals seeking career growth or role transition
  • System Administrators / IT Support Engineers
  • Cloud & Cybersecurity aspirants who need strong networking fundamentals
  • Anyone with basic computer knowledge and interest in networking

No prior networking experience is mandatory.

Job Roles You Can Apply For

After completing the course, learners can apply for roles such as:

  • Network Support Engineer
  • Network Technician
  • IT Support Engineer
  • System Administrator (Junior Level)
  • NOC Engineer
  • Technical Support Executive
  • Infrastructure Support Engineer

Placement & Career Support – CloudNet India

CloudNet India, Kolkata provides dedicated career and placement assistance, including:

  • Resume & LinkedIn profile building
  • Interview preparation (technical + HR rounds)
  • Mock interviews with industry experts
  • Job referrals and interview opportunities with hiring partners
  • Guidance for entry-level and lateral IT job roles
  • Internship & project support (where applicable)

Placement support is provided to all eligible students. Job placement depends on individual performance, skills, and interview outcomes.

Detailed CompTIA Network+ Syllabus

Module 1: Networking Fundamentals

  • Introduction to Networking
  • Types of Networks (LAN, WAN, MAN, PAN)
  • Network Topologies
  • OSI & TCP/IP Models
  • Network Devices (Hub, Switch, Router, Firewall)

Module 2: Network Cabling & Hardware

  • Copper & Fiber Optic Cables
  • Ethernet Standards
  • Connectors & Transceivers
  • Network Interface Cards (NICs)
  • Tools and Safety Practices

Module 3: IP Addressing & Subnetting

  • IPv4 & IPv6 Addressing
  • Binary & Decimal Conversion
  • Subnetting & CIDR
  • Public vs Private IP
  • DHCP & DNS Concepts

Module 4: Routing & Switching

  • Switching Concepts
  • VLANs & Trunking
  • Inter-VLAN Routing
  • Static & Dynamic Routing
  • Routing Protocols (Overview)

Module 5: Wireless Networking

  • Wireless Standards (802.11 a/b/g/n/ac/ax)
  • Wireless Security (WEP, WPA, WPA2, WPA3)
  • Wireless Configuration & Troubleshooting
  • Site Survey Basics

Module 6: Network Security

  • Security Concepts & Threats
  • Firewalls & IDS/IPS
  • Network Hardening
  • VPN & Remote Access
  • Authentication & Authorization
  • Best Security Practices

Module 7: Network Operations

  • Network Monitoring Tools
  • Performance Metrics
  • Change Management
  • Disaster Recovery & Business Continuity
  • Documentation & SOPs

Module 8: Network Troubleshooting

  • Troubleshooting Methodology
  • Common Network Issues
  • Cable & Connectivity Problems
  • Wireless & Performance Issues
  • Command-Line Tools (ping, tracert, ipconfig, netstat)

Module 9: Cloud & Virtualization Concepts

  • Virtual Networking
  • Cloud Networking Basics
  • Network Function Virtualization (NFV)
  • SDN Overview

Module 10: Exam Preparation & Practical Labs

  • Hands-on Lab Practice
  • Real-world Scenarios
  • Mock Tests
  • Exam Tips & Strategies
  • Final Revision

Why Choose CloudNet India, Kolkata

  • Industry-experienced trainers
  • Practical, hands-on learning approach
  • Updated syllabus aligned with industry needs
  • Flexible batch timings
  • Affordable fees with quality training
  • Strong career & placement guidance

CompTIA Linux+ 

Offered by CloudNet India, Kolkata

Course Description

The CompTIA Linux+ course at CloudNet India, Kolkata is a comprehensive, hands-on training program designed to build strong Linux administration and system management skills. This course focuses on real-world Linux environments used in enterprise IT, cloud computing, DevOps, and cybersecurity domains.

The training covers Linux installation, command-line operations, system configuration, user and group management, file systems, networking, security, scripting, troubleshooting, and automation. The curriculum is aligned with the latest CompTIA Linux+ exam objectives, ensuring students gain both practical job skills and certification readiness.

Who Can Join This Course

This course is ideal for:

  • IT / Computer Science / Electronics students
  • Fresh graduates seeking Linux or system administration roles
  • Working professionals in IT support or system administration
  • Network engineers wanting to expand into Linux environments
  • Cloud, DevOps, and Cybersecurity aspirants
  • Professionals migrating from Windows administration to Linux
  • Anyone with basic computer knowledge and interest in Linux

Prior Linux experience is helpful but not mandatory.

Job Roles You Can Apply For

After completing the CompTIA Linux+ course, learners can apply for roles such as:

  • Linux System Administrator (Junior Level)
  • Linux Support Engineer
  • Technical Support Engineer
  • DevOps Support Engineer
  • Cloud Support Engineer
  • Infrastructure Engineer
  • IT Operations Engineer

Placement & Career Support – CloudNet India

CloudNet India, Kolkata provides end-to-end career and placement support, including:

  • Resume & LinkedIn profile preparation
  • Linux-based project guidance
  • Interview preparation (Linux commands & scenario-based questions)
  • Mock interviews with industry professionals
  • Job referrals through hiring partners
  • Internship and real-time lab exposure (where applicable)

Placement assistance is provided to all eligible students. Final placement depends on individual performance, skill level, and interview success.

Detailed CompTIA Linux+ Syllabus

Module 1: Linux Fundamentals

  • Introduction to Linux & Open-Source Concepts
  • Linux Distributions & Use Cases
  • Linux Architecture
  • Installation & Boot Process
  • GUI vs CLI

Module 2: Command-Line Operations

  • Linux Shell & Terminal Usage
  • File & Directory Management Commands
  • File Viewing & Editing (vi, nano)
  • Input/Output Redirection
  • File Permissions & Ownership

Module 3: Linux File Systems

  • Linux File System Hierarchy
  • Disk Partitioning & Mounting
  • File System Types (ext4, xfs, swap)
  • Disk Management Tools
  • Backup & Restore Basics

Module 4: User & Group Administration

  • User & Group Management
  • Password Policies
  • sudo Configuration
  • Environment Variables
  • Account Security

Module 5: Package Management

  • Package Managers (yum, dnf, apt, rpm)
  • Software Installation & Updates
  • Repository Management
  • Source Code Installation

Module 6: Process & Service Management

  • Process Monitoring & Control
  • systemd & Service Management
  • Scheduling Jobs (cron & at)
  • Resource Management

Module 7: Networking in Linux

  • Network Configuration
  • TCP/IP Basics
  • DNS & Hostname Configuration
  • Network Troubleshooting Tools
  • Firewall Basics (iptables / firewalld)

Module 8: Linux Security

  • File & Directory Security
  • SELinux & AppArmor Basics
  • SSH Configuration & Hardening
  • Firewall & Access Control
  • Security Best Practices

Module 9: Shell Scripting & Automation

  • Bash Shell Scripting Basics
  • Variables & Control Structures
  • Scripts for Automation Tasks
  • Log Monitoring & Management
  • Task Automation

Module 10: Virtualization, Containers & Cloud Basics

  • Virtual Machines in Linux
  • Containers Overview (Docker Basics)
  • Linux in Cloud Environments
  • Storage & Network Concepts in Cloud

Module 11: Troubleshooting & Maintenance

  • System Boot & Recovery
  • Log File Analysis
  • Hardware & Software Troubleshooting
  • Performance Tuning\
  • Disaster Recovery Concepts

Module 12: Exam Preparation & Practical Labs

  • Hands-on Lab Sessions
  • Real-world Linux Scenarios
  • Mock Tests & Assessments
  • Exam Tips & Certification Guidance
  • Final Revision

Why Choose CloudNet India, Kolkata

  • Experienced Linux & industry trainers
  • Practical lab-focused training
  • Updated syllabus as per industry needs
  • Flexible class timings
  • Affordable fees
  • Strong placement & career support

 

CCNA Cybersecurity 

Eligibility: 10+2/Graduate with Networking Basics

Level: Associate
Duration:  3 Months
Mode: Lecture + Hands-on Labs + Capstone Project

CCNA Cybersecurity Course – CloudNet India, Kolkata

The CCNA Cybersecurity Course at CloudNet India, Kolkata is designed to prepare learners for entry-level to intermediate roles in the rapidly growing field of network and cybersecurity. This program provides in-depth knowledge of network security fundamentals, threat detection, security operations, and incident response, aligned with Cisco’s latest CCNA Cybersecurity curriculum.

Through a combination of theory, hands-on labs, and real-world scenarios, students gain practical skills to identify vulnerabilities, monitor security events, and protect enterprise networks against modern cyber threats.

Key Learning Outcomes

  • Understanding of network security concepts and architectures
  • Monitoring and analysis of security alerts and logs
  • Identification and mitigation of cyber threats, malware, and attacks
  • Knowledge of firewalls, VPNs, IDS/IPS, and endpoint security
  • Fundamentals of SOC (Security Operations Center) operations
  • Hands-on experience with Cisco security tools and technologies

Job Roles After Completion

Successful candidates can pursue roles such as:

  • Cybersecurity Analyst
  • SOC Analyst (Level 1)
  • Network Security Engineer (Junior)
  • IT Security Support Executive
  • Cybersecurity Operations Technician
  • Network Administrator with Security Focus

These roles are in demand across IT services companies, telecom firms, cloud service providers, and enterprise IT departments.

Placement Support by CloudNet India

At CloudNet India, Kolkata, we are committed to helping our students transition from learning to employment. Our dedicated placement support includes:

  • Resume and LinkedIn profile preparation
  • Mock interviews and technical interview training
  • Career guidance and job-role mapping
  • Placement assistance with our hiring partners
  • Internship and entry-level job opportunity referrals

Our goal is to ensure students are job-ready and confident to succeed in cybersecurity roles.

Who Can Enroll

  • IT students and fresh graduates
  • Network engineers looking to move into cybersecurity
  • Working professionals seeking career advancement
  • Anyone interested in starting a career in cybersecurity

Course Objectives

  • Explain how a SOC operates and describe the different types of services that are performed from a Tier 1 SOC analyst’s perspective
  • Explain the use of SOC metrics to measure the effectiveness of the SOC
  • Explain the use of a workflow management system and automation to improve the effectiveness of the SOC
  • Describe the Windows operating system features and functionality
  • Provide an overview of the Linux operating system
  • Understand common endpoint security technologies
  • Explain the network security monitoring (NSM) tools that are available to the network security analyst
  • Describe security flaws in the TCP/IP protocol and how they can be used to attack networks and hosts
  • Explain the data that is available to the network security analyst
  • Describe the basic concepts and uses of cryptography
  • Understand the foundational cloud security practices, including deployment and service models, shared responsibilities, compliance frameworks, and identity and access management, to effectively secure cloud environments against cyberthreats
  • Understand and implement advanced network security, data protection, secure application deployment, continuous monitoring, and effective disaster recovery strategies to secure cloud deployments
  • Understand the kill chain and the diamond models for incident investigations, and the use of exploit kits by threat actors
  • Identify the common attack vectors
  • Identify malicious activities
  • Identify patterns of suspicious behaviors
  • Identify resources for hunting cyber threats
  • Explain the need for event data normalization and event correlation
  • Conduct security incident investigations
  • Explain the use of a typical playbook in the SOC
  • Describe a typical incident response plan and the functions of a typical computer security incident response team (CSIRT)

Lab Outline

  • Explore the Windows Operating System
  • Explore the Linux Operating System
  • Explore Endpoint Security
  • Explore TCP/IP Attacks
  • Use NSM Tools to Analyze Data Categories
  • Explore Cryptographic Technologies
  • Investigate Hacker Methodology
  • Investigate Browser-Based Attacks
  • Analyze Suspicious DNS Activity
  • Explore Security Data for Analysis
  • Investigate Suspicious Activity Using Security Onion
  • Hunt Malicious Traffic
  • Cisco XDR to Splunk Enterprise Integration Simulation
  • Correlate Event Logs, PCAPs, and Alerts of an Attack
  • Investigate Advanced Persistent Threats
  • Explore SOC Playbooks

Certified Ethical Hacker (CEHv13) 

By CloudNet India, Kolkata

The Certified Ethical Hacker (CEH) course at CloudNet India, Kolkata is a comprehensive, hands-on training program designed to prepare candidates for careers in cybersecurity and ethical hacking. The course focuses on the latest hacking techniques, tools, and methodologies used by malicious hackers, enabling learners to think like an attacker and defend against cyber threats effectively.

The curriculum combines theoretical concepts, practical labs, and real-time projects, covering network security, web application security, system penetration testing, malware analysis, social engineering, and cloud security. Participants gain the skills needed to identify vulnerabilities, perform security assessments, and implement preventive measures in real-world scenarios.

Job Roles After CEH Certification

After completing the CEH course, candidates are prepared for roles such as:

  • Ethical Hacker / Penetration Tester
  • Cybersecurity Analyst
  • Security Consultant
  • Network Security Engineer
  • Vulnerability Assessment Specialist
  • Security Operations Center (SOC) Analyst

Key Responsibilities Include:

  • Conducting penetration testing and vulnerability assessments
  • Analyzing network and application security weaknesses
  • Designing countermeasures against cyber attacks
  • Monitoring, detecting, and mitigating threats
  • Preparing detailed security reports and recommendations

Who Can Join This Course

This course is ideal for:

  • Fresh graduates in B.Tech, BCA, MCA, B.Sc IT, or related fields
  • IT professionals looking to move into cybersecurity
  • Network and system administrators
  • Security professionals seeking to advance in ethical hacking
  • Final-year students aspiring for a career in cybersecurity

Basic Requirements:

  • Understanding of networking and operating systems
  • Basic knowledge of programming or scripting is helpful but not mandatory

Key Topics Covered

  • Introduction to Ethical Hacking & Cybersecurity
  • Footprinting and Reconnaissance
  • Scanning Networks & Vulnerability Analysis
  • System Hacking Techniques
  • Malware Threats and Analysis
  • Social Engineering Attacks
  • Denial of Service (DoS/DDoS) Attacks
  • Sniffing & Session Hijacking
  • Web Application Hacking
  • Wireless Network Hacking
  • Cloud Security and IoT Security
  • Cryptography and Security Controls
  • Penetration Testing Methodology

Hands-On Labs & Projects

  • Real-world penetration testing simulations
  • Network scanning and vulnerability assessments
  • Web application hacking and exploitation
  • Wireless and cloud security exercises
  • Malware analysis and reverse engineering basics
  • Security report preparation

Placement Support by CloudNet India, Kolkata

CloudNet India provides end-to-end placement assistance, including:

  • Resume and CV preparation tailored for cybersecurity roles
  • Mock interviews with technical and HR rounds
  • Real-time project experience for portfolio development
  • Job referrals and interview scheduling support
  • Guidance until placement in leading IT & cybersecurity firms

Our mission is to provide not just training, but a successful career path in cybersecurity.

Why Choose CloudNet India, Kolkata?

  • Industry-expert trainers with real-world experience
  • Job-oriented, practical curriculum
  • Small batch sizes for personalized attention
  • Hands-on labs & real-time project work
  • Dedicated placement assistance
  • Located in the heart of Kolkata, with strong industry connections

If you want, I can also create a short, punchy version for social media and website banners, or a week-by-week training schedule with labs and projects for the CEH course.

Certified Ethical Hacker (CEH) v13 – Full Syllabus

Module 01 — Introduction to Ethical Hacking

  • Fundamentals of ethical hacking and cybersecurity
  • Information security concepts & controls
  • Legal and compliance frameworks (GDPR, HIPAA, PCI DSS, SOX, etc.)
  • Ethical hacking methodology & phases
  • Cyber Kill Chain and MITRE ATT&CK frameworks
  • Risk management and threat intelligence basics

Module 02 — Footprinting and Reconnaissance

  • Information gathering techniques
  • OSINT tools and methods
  • DNS, WHOIS, and traceroute reconnaissance
  • Passive and active footprinting
  • Footprinting countermeasures

Module 03 — Scanning Networks

  • Network scanning fundamentals
  • Scanning tools and techniques (e.g., Nmap)
  • Port/service discovery
  • Operating system detection
  • Scanning countermeasures

Module 04 — Enumeration

  • Enumeration concepts and purpose
  • Techniques to enumerate users, shares, and services
  • Protocol-based exploits (SNMP, LDAP, SMB)
  • Countermeasures to enumeration attacks

Module 05 — Vulnerability Analysis

  • Identifying security weaknesses
  • Vulnerability assessment methods
  • Common scanning tools (Nessus, OpenVAS, etc.)
  • Prioritizing vulnerabilities

Module 06 — System Hacking

  • Gaining unauthorized access
  • Privilege escalation methods
  • Covering tracks & steganography
  • System hacking countermeasures

Module 07 — Malware Threats

  • Types of malware (Trojan, worm, ransomware, APT, fileless)
  • Malware behavior & attack vectors
  • Static and dynamic malware analysis basics
  • Countermeasures to malware threats

Module 08 — Sniffing

  • Packet sniffing fundamentals
  • Tools and techniques for traffic capture
  • ARP poisoning & VLAN hopping
  • Detection and prevention of sniffing attacks

Module 09 — Social Engineering

  • Social engineering tactics
  • Phishing, pretexting, baiting, and impersonation
  • Psychological manipulation techniques
  • Countermeasures and awareness training

Module 10 — Denial of Service (DoS/DDoS)

  • DoS and DDoS attack methods
  • Botnets and amplification attacks
  • Detection and mitigation strategies
  • Use of security services for protection

Module 11 — Session Hijacking

  • Session management vulnerabilities
  • Man-in-the-middle and sidejacking techniques
  • Tools used for session hijacking
  • Defending against session attacks

Module 12 — Evading IDS, Firewalls & Honeypots

  • IDS & IPS evasion techniques
  • Firewall bypass methods
  • Honeypot avoidance strategies
  • Countermeasures and defenses

Module 13 — Hacking Web Servers

  • Attacking web server infrastructure
  • Exploiting server misconfigurations
  • Web server attack tools
  • Security techniques for servers

Module 14 — Hacking Web Applications

  • Web application attack vectors (XSS, CSRF, RFI, etc.)
  • OWASP top threats
  • Application testing tools (e.g., Burp Suite)
  • Countermeasures for web attacks

Module 15 — SQL Injection

  • SQL injection techniques & examples
  • Bypassing filters and evasions
  • SQL attack tools
  • Protection strategies against SQLi

Module 16 — Hacking Wireless Networks

  • Wireless protocols and encryption types
  • Wi‑Fi cracking techniques
  • Wireless attack tools
  • Securing wireless networks

Module 17 — Hacking Mobile Platforms

  • Android & iOS security weaknesses
  • Mobile malware & threats
  • Security tools for mobile analysis
  • Mobile defense strategies

Module 18 — IoT & OT Hacking

  • Internet of Things (IoT) vulnerabilities
  • Operational technology (OT) security issues
  • Protocol-specific attacks (e.g., SCADA)
  • Countermeasures for IoT/OT security

Module 19 — Cloud Computing & Security

  • Cloud security fundamentals
  • Cloud attack vectors
  • Virtualization & container threats
  • Cloud security tools & mitigation

Module 20 — Cryptography

  • Encryption fundamentals & algorithms
  • Public Key Infrastructure (PKI)
  • Cryptanalysis attacks
  • Cryptographic tools and their use 

Sent Us a Message