Hunarmand Zalmy Program

Instructor

Mr. Ishaq Ahmad

Timing

Evening Online

Duration

8-10 Months

Fee

PKR 5000/- per Month

Contact

+92-331-5875434

Brief Introduction

The Hunarmand Zalmy Program at Vision Institute of IT is a comprehensive 8-10 months training designed to equip students with the skills and certifications needed for modern enterprise networking and security roles—both in Pakistan and abroad.

You'll learn and prepare for:

  1. CCNA (Routing & Switching) - exam code 200-301
  2. CCNA (Security) - exam code 210-260
  3. CCNP (Enterprise) - core exam 350-401 ENCOR
  4. Cloud Security fundamentals
  5. Network Security best practices
  6. Cyber Security principles

After completing the program, you'll be ready to sit for all the above certification exams and step directly into roles such as Network Engineer, Security Analyst, or Cloud Security Specialist.

Additional Features

  • Official registration assistance on Cisco and partner portals
  • Certification vouchers at discounted rates
  • Completion certificates from Vision Institute (Cisco-aligned)
  • Experienced instructors with industry backgrounds
  • Career guidance & placement support
  • Intro to Networks (ITN)
    • Networking Today
    • Basic Switch and End Device Configuration
    • Protocol Models
    • Physical Layer
    • Number Systems
    • Data Link Layer
    • Ethernet Switching
    • Network Layer
    • Address Resolution
    • Basic Router Configuration
    • IPv4 Addressing
    • IPv6 Addressing
    • ICMP
    • Transport Layer
    • Application Layer
    • Network Security Fundamentals
    • Build a Small Network
  • Switching, Routing, and Wireless Essentials (SRWE)
    • Basic Device Configuration
    • Switching Concepts
    • VLANs
    • Inter-VLAN Routing
    • STP
    • EtherChannel
    • DHCPv4
    • SLAAC and DHCPv6 Concepts
    • FHRP Concepts
    • LAN Security Concepts
    • Switch Security Configuration
    • WLAN Concepts
    • WLAN Configuration
    • Routing Concepts
    • IP Static Routing
    • Troubleshoot Static and Default Routes
  • Enterprise Networking, Security and Automation (ENSA)
    • Single-Area OSPFv2 Concepts
    • Single-Area OSPFv2 Configuration
    • WAN Concepts
    • Network Security Concepts
    • ACL Concepts
    • ACLs for IPv4 Configuration
    • NAT for IPv4
    • VPN and IPsec Concepts
    • QoS Concepts
    • Network Management
    • Network Design
    • Network Troubleshooting
    • Network Virtualization
    • Network Automation
  • Chapter 1: Modern Network Security Threats
    Goal: Explain security threats in modern network infrastructures and how to mitigate them.
  • Chapter 2: Securing Network Devices
    Goal: Secure Cisco routers.
  • Chapter 3: Authentication, Authorization and Accounting
    Goal: Implement AAA on Cisco routers using local router database and server-based ACS or ISE.
  • Chapter 4: Implementing Firewall Technologies
    Goal: Implement firewall technologies to secure the network perimeter.
  • Chapter 5: Implementing Intrusion Prevention
    Goal: Implement IPS to mitigate attacks on networks.
  • Chapter 6: Securing the Local Area Network
    Goal: Secure endpoints and mitigate common Layer 2 attacks.
  • Chapter 7: Cryptographic Systems
    Goal: Secure communications to ensure integrity, authenticity, and confidentiality.
  • Chapter 8: Implementing Virtual Private Networks
    Goal: Implement secure Virtual Private Networks.
  • Chapter 9: Implementing the Cisco ASA
    Goal: Implement an ASA firewall configuration using the CLI.
  • Chapter 10: Advanced Cisco ASA
    Goal: Implement an ASA firewall configuration and VPNs using ASDM.
  • Chapter 11: Managing a Secure Network
    Goal: Test network security and create a technical security policy.
  • Module 01: Getting Started
    • Introduction to ethical hacking
    • What is hacking?
    • Difference between ethical and malicious hacking
    • White, Black & Grey hat hackers
    • Virtual lab setup (Kali Linux & Windows VM)
    • Networking protocols (TCP/IP, UDP, ICMP)
    • Linux CLI basics, file system, users/groups, permissions
    • Reconnaissance & enumeration
    • Windows 10 vulnerabilities
  • Module 02: Collecting Information
    • OSINT overview & methodologies
    • Search engine hacking & Google Dorks
    • Social media & domain intelligence
    • Metadata, WHOIS, DNS enumeration
    • Shodan, Maltego, The Harvester
    • Deep & Dark web, Tor exploration
    • Threat intelligence & visualization
    • Legal & ethical OSINT
    • Capstone: Practical OSINT investigations
  • Module 03: Scanning Networks
    • Network & port scanning fundamentals
    • Nmap, ping sweeps & topology discovery
    • Vulnerability & OS detection
    • Wireless, IoT & cloud scanning
    • Automation & best practices
    • Ethics, legal considerations & case studies
    • Capstone: Comprehensive network scan
  • Module 04: Enumeration
    • NetBIOS, SNMP, LDAP, SMB, DNS, SMTP, NTP, SSH, RDP enumeration
    • Banner, user & share enumeration
    • AD, Linux, Windows, cloud & IoT enumeration
    • Automation & best practices
    • Ethics & case studies
    • Capstone: Comprehensive enumeration
  • Module 05: Vulnerability Analysis
    • CVSS, scanners (Nessus, OpenVAS)
    • OWASP Top Ten & web/mobile vulnerabilities
    • Network, cloud & IoT assessments
    • Reporting & remediation
    • Ethical & legal aspects
    • Capstone: Comprehensive vulnerability analysis
  • Modules 06–21: Python 101 & scripting, system hacking, malware analysis, sniffing, social engineering, DoS/DDoS, MitM, web/server/app hacking, PHP/JS security, SQLi, Wi-Fi hacking, mobile exploitation, cryptography, and freelancing (Fiverr & Upwork).
  • Module 1: Securing Networks
    Assessment: Securing Networks
  • Module 2: Network Threats
  • Module 3: Mitigating Threats
  • Module 4: Secure Device Access
  • Module 5: Assign Administrative Roles
  • Module 6: Device Monitoring & Management
    Assessment: Monitoring and Managing Devices
  • Module 7: AAA
  • Module 8: Access Control Lists
  • Module 9: Firewall Technologies
  • Module 10: Zone-Based Policy Firewalls
  • Module 11: IPS Technologies
    Assessment: Intrusion Prevention
  • Module 12: IPS Operation & Implementation
  • Module 13: Endpoint Security
  • Module 14: Layer 2 Security Considerations
    Assessment: Layer 2 and Endpoint Security
  • Module 15: Cryptographic Services
  • Module 16: Basic Integrity & Authenticity
    Assessment: Cryptography
  • Module 17: Public Key Cryptography
  • Module 18: VPNs
  • Module 19: Implement Site-to-Site IPsec VPNs with CLI
    Assessment: VPNs
  • Module 20: Introduction to the ASA
  • Module 21: ASA Firewall Configuration
    Assessment: ASA
  • Module 22: Network Security Testing
  • Module 1: Cloud Architecture
    Fundamentals of cloud computing, architectures, service delivery/deployment models, virtualization.
  • Module 2: Infrastructure Security for Cloud
    Securing core infrastructure, networks, management interfaces, admin credentials.
  • Module 3: Managing Cloud Security and Risk
    Risk assessment, governance, legal & compliance (discovery requirements).
  • Module 4: Data Security for Cloud Computing
    Data security lifecycle, issues per delivery model, encryption management.
  • Module 5: Application Security & IAM for Cloud
    Federated identity, IAM tools, secure dev, app security in cloud.
  • Module 6: Cloud Security Operations
    Evaluating/managing providers, Security-as-a-Service, incident response.
  • CCNP Enterprise: Core Networking (ENCOR)
  • CCNP Enterprise: Advanced Routing (ENARSI)