
Instructor
Mr. Ishaq Ahmad
Timing
Evening Online
Duration
8-10 Months
Fee
PKR 5000/- per Month
Contact
+92-331-5875434
Brief Introduction
The Hunarmand Zalmy Program at Vision Institute of IT is a comprehensive 8-10 months training designed to equip students with the skills and certifications needed for modern enterprise networking and security roles—both in Pakistan and abroad.
You'll learn and prepare for:
- CCNA (Routing & Switching) - exam code 200-301
- CCNA (Security) - exam code 210-260
- CCNP (Enterprise) - core exam 350-401 ENCOR
- Cloud Security fundamentals
- Network Security best practices
- Cyber Security principles
After completing the program, you'll be ready to sit for all the above certification exams and step directly into roles such as Network Engineer, Security Analyst, or Cloud Security Specialist.
Additional Features
- Official registration assistance on Cisco and partner portals
- Certification vouchers at discounted rates
- Completion certificates from Vision Institute (Cisco-aligned)
- Experienced instructors with industry backgrounds
- Career guidance & placement support
- Intro to Networks (ITN)
- Networking Today
- Basic Switch and End Device Configuration
- Protocol Models
- Physical Layer
- Number Systems
- Data Link Layer
- Ethernet Switching
- Network Layer
- Address Resolution
- Basic Router Configuration
- IPv4 Addressing
- IPv6 Addressing
- ICMP
- Transport Layer
- Application Layer
- Network Security Fundamentals
- Build a Small Network
- Switching, Routing, and Wireless Essentials (SRWE)
- Basic Device Configuration
- Switching Concepts
- VLANs
- Inter-VLAN Routing
- STP
- EtherChannel
- DHCPv4
- SLAAC and DHCPv6 Concepts
- FHRP Concepts
- LAN Security Concepts
- Switch Security Configuration
- WLAN Concepts
- WLAN Configuration
- Routing Concepts
- IP Static Routing
- Troubleshoot Static and Default Routes
- Enterprise Networking, Security and Automation (ENSA)
- Single-Area OSPFv2 Concepts
- Single-Area OSPFv2 Configuration
- WAN Concepts
- Network Security Concepts
- ACL Concepts
- ACLs for IPv4 Configuration
- NAT for IPv4
- VPN and IPsec Concepts
- QoS Concepts
- Network Management
- Network Design
- Network Troubleshooting
- Network Virtualization
- Network Automation
- Chapter 1: Modern Network Security Threats
Goal: Explain security threats in modern network infrastructures and how to mitigate them. - Chapter 2: Securing Network Devices
Goal: Secure Cisco routers. - Chapter 3: Authentication, Authorization and Accounting
Goal: Implement AAA on Cisco routers using local router database and server-based ACS or ISE. - Chapter 4: Implementing Firewall Technologies
Goal: Implement firewall technologies to secure the network perimeter. - Chapter 5: Implementing Intrusion Prevention
Goal: Implement IPS to mitigate attacks on networks. - Chapter 6: Securing the Local Area Network
Goal: Secure endpoints and mitigate common Layer 2 attacks. - Chapter 7: Cryptographic Systems
Goal: Secure communications to ensure integrity, authenticity, and confidentiality. - Chapter 8: Implementing Virtual Private Networks
Goal: Implement secure Virtual Private Networks. - Chapter 9: Implementing the Cisco ASA
Goal: Implement an ASA firewall configuration using the CLI. - Chapter 10: Advanced Cisco ASA
Goal: Implement an ASA firewall configuration and VPNs using ASDM. - Chapter 11: Managing a Secure Network
Goal: Test network security and create a technical security policy.
- Module 01: Getting Started
- Introduction to ethical hacking
- What is hacking?
- Difference between ethical and malicious hacking
- White, Black & Grey hat hackers
- Virtual lab setup (Kali Linux & Windows VM)
- Networking protocols (TCP/IP, UDP, ICMP)
- Linux CLI basics, file system, users/groups, permissions
- Reconnaissance & enumeration
- Windows 10 vulnerabilities
- Module 02: Collecting Information
- OSINT overview & methodologies
- Search engine hacking & Google Dorks
- Social media & domain intelligence
- Metadata, WHOIS, DNS enumeration
- Shodan, Maltego, The Harvester
- Deep & Dark web, Tor exploration
- Threat intelligence & visualization
- Legal & ethical OSINT
- Capstone: Practical OSINT investigations
- Module 03: Scanning Networks
- Network & port scanning fundamentals
- Nmap, ping sweeps & topology discovery
- Vulnerability & OS detection
- Wireless, IoT & cloud scanning
- Automation & best practices
- Ethics, legal considerations & case studies
- Capstone: Comprehensive network scan
- Module 04: Enumeration
- NetBIOS, SNMP, LDAP, SMB, DNS, SMTP, NTP, SSH, RDP enumeration
- Banner, user & share enumeration
- AD, Linux, Windows, cloud & IoT enumeration
- Automation & best practices
- Ethics & case studies
- Capstone: Comprehensive enumeration
- Module 05: Vulnerability Analysis
- CVSS, scanners (Nessus, OpenVAS)
- OWASP Top Ten & web/mobile vulnerabilities
- Network, cloud & IoT assessments
- Reporting & remediation
- Ethical & legal aspects
- Capstone: Comprehensive vulnerability analysis
- Modules 06–21: Python 101 & scripting, system hacking, malware analysis, sniffing, social engineering, DoS/DDoS, MitM, web/server/app hacking, PHP/JS security, SQLi, Wi-Fi hacking, mobile exploitation, cryptography, and freelancing (Fiverr & Upwork).
- Module 1: Securing Networks
Assessment: Securing Networks - Module 2: Network Threats
- Module 3: Mitigating Threats
- Module 4: Secure Device Access
- Module 5: Assign Administrative Roles
- Module 6: Device Monitoring & Management
Assessment: Monitoring and Managing Devices - Module 7: AAA
- Module 8: Access Control Lists
- Module 9: Firewall Technologies
- Module 10: Zone-Based Policy Firewalls
- Module 11: IPS Technologies
Assessment: Intrusion Prevention - Module 12: IPS Operation & Implementation
- Module 13: Endpoint Security
- Module 14: Layer 2 Security Considerations
Assessment: Layer 2 and Endpoint Security - Module 15: Cryptographic Services
- Module 16: Basic Integrity & Authenticity
Assessment: Cryptography - Module 17: Public Key Cryptography
- Module 18: VPNs
- Module 19: Implement Site-to-Site IPsec VPNs with CLI
Assessment: VPNs - Module 20: Introduction to the ASA
- Module 21: ASA Firewall Configuration
Assessment: ASA - Module 22: Network Security Testing
- Module 1: Cloud Architecture
Fundamentals of cloud computing, architectures, service delivery/deployment models, virtualization. - Module 2: Infrastructure Security for Cloud
Securing core infrastructure, networks, management interfaces, admin credentials. - Module 3: Managing Cloud Security and Risk
Risk assessment, governance, legal & compliance (discovery requirements). - Module 4: Data Security for Cloud Computing
Data security lifecycle, issues per delivery model, encryption management. - Module 5: Application Security & IAM for Cloud
Federated identity, IAM tools, secure dev, app security in cloud. - Module 6: Cloud Security Operations
Evaluating/managing providers, Security-as-a-Service, incident response.
- CCNP Enterprise: Core Networking (ENCOR)
- CCNP Enterprise: Advanced Routing (ENARSI)