Rated Online Education
Certification In Networking CCNA
- Duration - 3 Months
- Eligibility Criteria - No Eligibility Criteria. Basic concepts provided by DataSpace Academy
- Lifetime Access to DataSpace Security Academy LAB (50+ pdf, 100+ videos)
- 24X7 Round the clock Doubt clearing session
- World Recognised Certificate
![](https://accentrexglobal.com/wp-content/uploads/2023/02/arrow-indicator.png)
Ongoing Classes (7622)
Scheduled Students (320)
Class Completed (2672)
Course Highlights
Get certified by global certification bodies and deepen your expertise
Mobile Application Hacking And Penetration Testing
The Mobile Application Penetration Testing Methodology (MAPTM) is the approach that should be used when conducting mobile app penetration testing. It depends on the android application hacking security approach and moves the focus of customary application security, which thinks about the actual danger originating from the Internet. Customer-side security, file system, hardware, and network security are all part of the mobile application penetration testing methodology. It is has been long considered that the end client is in charge of the device. Android is the enormous organized base of any mobile platform and overgrowing—consistently. Furthermore, Android is ascending as the most broadened working operating system in this perspective due to various reasons. DataSpace Security being the best cybersecurity company in Kolkata, provides computer data protection services.
Your course to success
Program Overview
Class Mode
Online | Interactive Live sessions
Eligibility Criteria
No Eligibility Criteria. Basic concepts provided by us
Course Fees
10,000 INR + 18% GST
Lab
Lifetime Access (50+ pdf, 100+ videos)
Support
24X7 Round the clock doubt clearing session
Certificate
World Recognised Certificate
Course Module
- Explain network & types of network
- Understand & compare Broad network categories
- Explain benifits of network
- Understand and Explain OSI Model
- Describe 7 layers of OSI
- Explain PDU in OSI model
- Explain types of networking media
- Understand and explain coaxial cables, Twisted pair cables, Fiber optic cables
- Understand straight cable & crossover cable
- Structured Cabling
- Understand networking devices and its use
- Understand and Explain Topology and it need
- Explain different types of physical topologies used in networking
- Understand about ip address
- Explain about IP Version 4 classes and Subnet Mask
- Configuring and verifying IP Address
- Understand and explain about TCP/IP
- Compare OSI Model and TCP/IP Model
- Explain Layer in TCP/IP Model
TCP,UDP,ICMP,FTP,TFTP,RDP,SMTP,POP,IMAP,ARP,RARP,HTTP,HTTPS
- VLAN: Access Ports
Trunk Ports
Native VLAN
802.1Q - INTER-VLAN: Legacy or Traditional Method
Router-On-a Stick Method
Layer-3 Switch Method
- Static Routing: Static Routing Using Exit Interface
Static Routing Using Next Hop Address - Default Routing
- Dynamic Routing
- Routed Protocol
- Autonomous System
- Interior Gateway Protocol(IGP): DVRP
- LSRP
- HYBRID
- Exterior Gateway Protocol(EGP)
- RIP Version 1
- RIP Version 2
- Load Balancing
- Equal Cost Load Balancing
- Unequal Cost Load Balancing
- Single Area OSPF
- Multi Area OSPF
- Numbered ACL(Standard , Extended)
- Named ACL
- Static NAT
- Dynamic NAT
- PAT(Port Address Translation)
Site-to-Site VPN
Get Your Quality Skills Certificate Through Exam
![](https://accentrexglobal.com/wp-content/uploads/2023/02/Networking-CCNA-scaled.jpg)
Skills Covered
- Introduction to the computer network
- Classification of computer network
- IPv4 and IPv6
- Network Topology
![](https://accentrexglobal.com/wp-content/uploads/2023/02/skill-removebg-preview.png)
![](https://accentrexglobal.com/wp-content/uploads/2023/02/tools-removebg-preview.png)
![](https://accentrexglobal.com/wp-content/uploads/2023/02/blue-bg-1024x243.png)
Why Should You Choose Us?
Degrees in cyber security are more popular than ever. Hackers and cyberterrorists have limitless chances to exploit individuals, government institutions, and even major corporations since we live in the digital age. Top companies are willing to pay a high price for cyber security professionals who can protect their data and eliminate vulnerabilities in order to defend against cyber attacks and security breaches. DataSpace Academy is bringing the opportunity to learn cybersecurity courses from expert professionals. Mentoring sessions with industry experts, as well as individualized attention in small groups of 5-6 students. Get hands-on experience by working on projects that are relevant to your industry.
- We provide information about the latest IT sector development and also give them the chance of learning by doing. We train our students to identify vulnerabilities of a system and also the protective steps to counter the problem.
- We have experienced faculties to help our students get the most extensive practical training in our certification course in ethical hacking.
- We provide the information and skill to the students to excel in job interviews and build a successful career.
What Our Students Say About Us
![](https://accentrexglobal.com/wp-content/uploads/2023/02/client-3-150x150.png)
I have enrolled for the training of ethical hacking. As they told me earlier yes it is an industrial training by industry experts. I took a free class first then I have joined for full course. They are providing flexible slot for everyone that's why I am doing this training or it will be very tuff for me.
Ayan Santra
Cyber security Analyst
![](https://accentrexglobal.com/wp-content/uploads/2023/02/client-6-150x150.png)
I have enrolled for the training of ethical hacking. As they told me earlier yes it is an industrial training by industry experts. I took a free class first then I have joined for full course. They are providing flexible slot for everyone that's why I am doing this training or it will be very tuff for me.
Ram Kumar
Business Analyst,India
![](https://accentrexglobal.com/wp-content/uploads/2023/02/client-1-150x150.png)
I have enrolled for the training of ethical hacking. As they told me earlier yes it is an industrial training by industry experts. I took a free class first then I have joined for full course. They are providing flexible slot for everyone that's why I am doing this training or it will be very tuff for me.
Samapti Saha
Student, India
Got Any
Questions?
The term “networking” refers to the process of connecting to and operating on a network. It is the process of establishing and utilizing wired or wireless networks for the purpose of exchanging data, ideas, files, and other forms of electronic communication.
There are two different kinds of networks:
A network based on servers
Peer-to-peer (P2P) networking
The protocol is described as the set of rules that link two or more devices in order to send data from one to the other. Knowing how data is transmitted from one network to another for communication purposes is beneficial.
Routing is the process of determining the best route for information or data to travel from its source to its destination. Routers are the devices that allow routing to take place.
The peer-to-peer (P2P) network is a distributed and decentralized network in which individual nodes, or peers, function as both producers and consumers of resources.