Rated Online Education
Active Students
Classes Completed
Ongoing Completed
The CyberSecurity Essential Programme from DataSpace academy has been designed in a way to prepare you to make a remarkable entry into the field of Cybersecurity. This programme will prepare you for further advanced learning in the same.
Basic of computer network
Explain network & types of network
Understand & compare Broad network categories
Understand and Explain OSI Model
Describe 7 layers of OSI
Explain PDU in OSI model
Explain types of networking media
Understand and explain coaxial cables, Twisted pair cables, Fiber optic cables
Understand straight cable & crossover cable
Structured Cabling
Understand networking devices and its use
Understand and Explain Topology and it need
Explain different types of physical topologies used in networking
Understand about ip address
Explain about IP Version 4 classes and Subnet Mask
Configuring and verifying IP Address
Understand and explain about TCP/IP
Compare OSI Model and TCP/IP Model
Explain Layer in TCP/IP Model
Understanding Ports and Protocol
Details of Subnetting
Router Configuration & Firewall Rules
What is VPN and How it's Work
Understanding Web Application Structure
Detailed in Html Request And Response
Linux Basic Commands
Introduction To Cloud Computing
Cloud Computing Models
Benefits Of Cloud Computing
Private Cloud
Hybrid Cloud
Software As A Service (SAAS)
Platform As A Service(PAAS)
Infrastructure As A Service (IAAS)
Introduction to Ethical Hacking
Lab Setup
Steps of Ethical Hacking
Google Hacking Using Dorks Demo
What is Nmap
Port and Service Scanning with Nmap
Nmap Various Command
Network Scanning using Nmap
Network Vulnerability Scanning using Nessus
Making Report After Successful Scan
What is Metasploit
Exploit using Metasploit
Windows 7 Hacking using Zero-Day
Windows 10 Hacking using msfvenom
Android Hacking using msfvenom
Wireshark
How to intercept Login details from network using Wireshark
Denial of Service Attack
Wifi Password Hacking using aircrack-ng
How to secure Wifi Network
Web Application Testing Methodology
OWASP Top 10 -2022
What is Sql Injection vulnerability
Types of Sql Injection
Sql-Injection Exploit using Sqlmap
Business impact of Sql Injection vulnerability
How to Resolve the issue from application
What is XSS vulnerability
Types of Cross-site Scripting vulnerability
Demonstration of XSS
How to Resolve the issue from application
Directory Listing Vulnerability
Demonstration of Directory Listing vulnerability
What is Data Tampering vulnerability
Demonstration of Data Tampering
File Upload Vulnerbility
What is web shell hacking
Demonstration of this vulnerability
Cross Site Request Forgery
Demonstration of this vulnerability
Insecure Direct Object Reference
Report Making in Web Application VAPT
Social Engineering Attack
SE toolkit Tutorial
RAT Tutorial
Mobile Device Architecture and common mobile threats
Android Architecture
Reverse Engineering and Static Application Analysis
Best practices and security guidelines for the mobile applications
Intro to PowerShell Scripting
Powershell commends for Pentester
PowerShell with Metasploit Meterpreter
Get one on one demo class with our industry expert trainers.
Metaspolit
Nitko
Hashcat
NMAP
Incident Responder, Cloud Security Engineer, Desktop Security Analyst, Security Consultant Security Auditor Firewall Engineer, Ethical Hacker, Storage Security Engineer, Security Test Engineer, Cyber Security Engineer, Cloud Security Engineer.
Soumya Jas is a Web Application Penetration Tester, Bug Bounty Hunter, Blockchain and Python Enthusiast. Additionally, he has an experience in playing CTF games on platforms like Portswigger and HackTheBox. While auditing and securing websites like eBluesoft (https://ebluesoft.com/) he discovered critical vulnerabilities and mitigated those vulnerabilities.
868 Students Taught
IT expert Soumya Maity has more than 2.5+ years of experience in the field of Hardware & Network troubleshooting. Also he has experienced in AWS.
2986 Students Taught
CEH Certified, Qualys Guard VM Certification 2019, DevSecOps Trained, DAST & SAST Handling client end to end from taking requirements till providing end report post-false-positive analysis of over 200 applications. Advance Knowledge of professional tools for Network, Source Code Analysis and Web Application Testing. Providing remediations to the clients for the vulnerable issues found during the auditing of the website & Coordinating with the development team for issues closure
209 Students Taught
DataSpace Academy’s courses are the best deal that you can find in the market. Our Course Fees are structured keeping in mind all kinds of feasibilities for students and professionals.
+18% GST
Training & Mentorship
Flexible Schedule
Online Live Interactive Session
Recorded Session After the class
World Recognised Certificate
3 Months Internship Program after the course
*No cost EMI options are available.
Enroll your desired course and join DataSpace Academy in just few clicks!
Select your desired course
from
our website
Enter your details and
complete
the payment process
Select a batch for your first class
Pursuing ethical hacking training in this company. All are very supportive here. No doubt on training quality. They are starting from beginning so anyone can take this training easily, I am also from a general background. I am happy with this training & want to thanks everyone of DataSpace.
I have enrolled for the training of ethical hacking. As they told me earlier yes it is an industrial training by industry experts. I took a free class first then I have joined for full course. They are providing flexible slot for everyone that's why I am doing this training or it will be very tuff for me. The sessions are really good & I can recommend to join my friends & everyone.
I am a bca student & did python training from DataSpace Academy. The training quality is good no doubt on that. The most important thing which I have seen over here that they are providing good support to everyone as everything is ongoing through online. Almost everything is well & good here.
Data Space Security is a very good technical academy. It's work on data security domain. In this domain very less numbers of professionals are there. All the trainners are very knowledgeable in their domain and they are very friendly in nature. They have sent all the video tutorials after each class. I shall recommend that all the interested person should join the courses provided by the dataspace security pvt. Ltd.
The ethical hacking Training is a very good course. This classes are very informative. I've learnt a lot of information about this and classes are very helpful. Thank you so much dataspace academy. Thank you.
Candidate should have a minimum Educational qualification of (10+2) and a basic understanding of computer Applications.
Because India is Asia's IT hub, networking is in high demand. In India, the scope of networking is enormous. Companies such as TCS, Infosys, Wipro, HCL, Tech Mahindra, and others.
In India, the average starting salary for a Cyber Security analyst is roughly around 1.8 lakhs to 2.20 Lakhs per year (15.0k - 18.0k per month).
DataSpace Academy provides an Internship programme for students who have successfully completed the certification and diploma courses. For pre-qualified candidates who are freshers, there will be a course-related test that needs to be qualified to be a part of the internship programme.