Network Security Training (NPT)

Next batch:
Sessions: 45
Course Type: Online
1000+ Students
4.9/5 Google Rating
Certificate Included
Material
Live Teams Classes

What You'll Learn

Networking fundamentals: OSI/TCP‑IP models, IP addressing/subnetting, routing and switching.

Protocol deep‑dives: ARP, ICMP, DNS, DHCP, SMB, SNMP, SMTP/IMAP/POP, SSH, RDP, FTP, HTTP/S.

Discovery and scanning with Nmap: host discovery, port scanning, service/version detection, NSE scripts.

Traffic capture and analysis using Wireshark; validation with Netcat and banner grabbing.

Enumeration and initial access with Hydra, Responder, CrackMapExec, and Impacket tools.

Exploitation and post‑exploitation using Metasploit (payloads, exploits, post modules).

MITM and network manipulation with Ettercap/Bettercap; wireless attacks with Aircrack‑ng.

Android exploitation basics and mapping findings to OWASP Testing activities for networks.

Welcome to Cyber Allegiance's Network Security Training, a hands‑on program for students, ethical hackers, and IT professionals who want to assess and compromise networks securely in a lab setting.

This instructor‑led course is aligned with the OWASP Testing Methodology and maps network activities to OWASP categories such as Information Gathering, Configuration Management Testing, and Network Services Testing. You'll practice reconnaissance, enumeration, exploitation, and post‑exploitation on services like SMB, RDP, SSH, FTP, DNS, SNMP, HTTP/S, and wireless networks.

You'll work with industry tools such as Nmap, Wireshark, Netcat, Metasploit, Hydra, Responder, CrackMapExec, Aircrack‑ng, Bettercap, and Impacket to perform end‑to‑end assessments against lab networks.

By the end, you will complete a full‑scale network penetration test, pivot through subnets, capture and analyze traffic, and deliver a professional report mapped back to the OWASP Testing methodology. Labs, assignments, and guided exercises reinforce every stage.

Key Benefits
  • Offensive network focus: Learn practical techniques to discover, enumerate, exploit, and persist on real services.
  • Methodology‑driven: All labs mapped to OWASP Testing activities for network services and configuration testing.
  • Tool mastery: Gain confidence with Nmap, Wireshark, Metasploit, Hydra, Responder, CrackMapExec, Aircrack‑ng, Bettercap, and Impacket.
  • Career‑ready: Build a professional network pentest report and receive a certificate with six‑month material access.

Join Cyber Allegiance – and elevate your skills with a hands‑on, career‑focused Network Security training experience.

  • Module 1: Networking Basics
    • OSI vs TCP/IP models, IP addressing/subnetting, routing and switching, lab setup.
    • Linux fundamentals for network testing (Kali/Parrot), safety and ethics.
  • Module 2: Network Protocols
    • ARP, ICMP, DNS, DHCP, SMB, SNMP, SMTP/IMAP/POP, SSH/RDP/FTP/HTTP – enumerations and misconfigs.
    • OWASP mapping: Information Gathering & Configuration Management Testing.
  • Module 3: Network Scanning
    • Discovery strategies, stealth vs speed, validating findings with Wireshark and banners.
  • Module 4: Nmap Basics
    • Host discovery (ARP, ICMP), outputs, timing, and performance tuning.
    • Netcat for quick verification and banner grabbing.
  • Module 5: Nmap Port Scanning Techniques
    • TCP SYN/Connect, UDP, FIN/Xmas/Null, idle scans; firewall/IDS evasion.
    • Tuning: rate limiting, fragmenting, decoys, proxies.
  • Module 6: Nmap Version Scan
    • Service/version detection, fingerprinting; mapping to exploits and CVEs.
  • Module 7: Nmap Scripts
    • NSE categories: discovery, vuln; safe vs intrusive scripts; chaining NSE with other tools.
  • Module 8: Metasploit Basics
    • Modules, workspaces, databases, msfconsole workflow; payloads and handlers.
  • Module 9: Metasploit Auxiliaries Enumeration
    • SMB, SNMP, FTP, SSH, HTTP enumeration; Responder/Impacket tie‑ins and Hydra for passwords.
  • Module 10: Metasploit Exploits
    • Selecting/tuning exploits; when to go manual with Netcat/Impacket.
  • Module 11: Metasploit Post Exploits
    • Privilege escalation, credential dumping, pivoting, persistence; CrackMapExec & Impacket.
  • Module 12: Metasploit Payloads (Reverse & Bind Shells)
    • Staged vs stageless, reverse vs bind shells; AV/EDR evasion basics; shell stabilization.
  • Module 13: Exploiting Android Mobile
    • Attack surface overview; payload generation; session handling; post‑exploitation.
    • No prior experience is required. Our course is beginner-friendly and designed for entry-level learners.
    • Basic computer knowledge is helpful, but not mandatory. You don’t need any formal certification to get started.
    • Not at all! If you’re familiar with basic hacking concepts, you're well-prepared. Certification is not required to join.
    • A performance-oriented laptop or desktop that meets current standards is recommended. For specific configurations, feel free to contact us at +91-9963256606.
    • No. All necessary tools will be provided and guided by the instructor during the training sessions.
    • Yes! Live demonstrations and practical exposure are included. Full hands-on access depends on your chosen course type. (T&C apply)
    • No, coding is not mandatory. However, having some programming background can enhance your understanding.
    • Yes, a laptop is essential for participating in hands-on labs and activities.
    • CyberAllegiance provides online training only. You can attend sessions from anywhere.
    • Yes, we offer personalized training that includes live 1-on-1 mentorship with our instructors.
    • You can attend training from anywhere without travel. It’s ideal for working professionals, includes live interactive sessions, 6 months of email support, and gives you access to recorded sessions and downloadable materials for flexible learning.
    • Yes, you’ll receive recorded sessions and downloadable materials. Access is valid for 180 days, with optional extensions available.
    • Yes, a certificate is awarded upon successful completion of the course.
    • Absolutely. The course is designed to prepare you for real-world cybersecurity roles through practical, industry-relevant training.
    • Yes. While we don't guarantee placement, we offer placement assistance, including resume building, interview prep, and mock interviews.
    • We assist in finding internship opportunities based on availability and eligibility.
    • You’ll use Nmap, Wireshark, Netcat, Metasploit, Hydra, Ettercap, Responder, CrackMapExec, Aircrack‑ng, Bettercap, and Impacket (plus Kali toolchain).
    • Our instructors come from top MNCs with 7+ years of experience, and the course is crafted around current industry demands.
    • You may cancel your enrollment within the first week of training if you're not satisfied. We guarantee a 100% refund. Just contact training@cyberallegiance or call +91-9963256606.
    • Upon approval, refunds are credited via the original payment method within 10 business days.
    • Students who have completed more than one week of training, received finalized invoices, accessed recordings or documentation, or whose payment includes gateway charges (non-refundable), will not be eligible for refunds.
    • Anyone with a passion to learn can enroll. Our training is open to all eligible learners interested in cybersecurity.
    • We’re happy to help! Reach out anytime at training@cyberallegiance or +91-9963256606.

Google Reviews

Certificate of Completion (Sample)

This is a sample certificate format. Students will receive a personalized certificate upon course completion.

Sample Certificate

*Certificate will contain your name, course details, issued date and certificate number.

Network Security

₹ 10,000 (GST 18% applicable)

Enroll Now Course Type: Online 100% Positive Reviews 1000+ Students 45 Lessons Assessments Included Live Instructor-Led Classes Mentor Support Available 6 Months Recording Access Documentation for Every Topic Sessions Recorded and Shared Instantly Real-Time Project Included Classes Conducted via Microsoft Teams Private Chat Community Access Skill level All levels