Coincent learners will now be certified by Microsoft.
Duration : 2.5 month Each Year
Seat : 150 seats, only One Batch
Enroll Now Download SyllabusTypes of Networks
Basic Terminologies
OSI Model
Protocols
Common Protocols & Ports
Installing Kali Linux
Linux Basic Commands
ls
, cd
,
pwd
, cp
, mv
,
mkdir
, touch
— used for basic file
and directory navigation.
Intermediate Commands
grep
, find
,
chmod
, chown
, tar
,
wget
, curl
, top
— for
system management and data handling.
Linux Directory & File Permissions
rwx
, ownership
via chown
, permission changes with
chmod
, and special bits like SUID/SGID.
Linux Utilities
nmap
,
netstat
, tcpdump
,
iptables
, wireshark
— essential
for network analysis and monitoring.
Information Security Overview
Cyber Kill Chain
Hacking Concepts
Ethical Hacking Concepts
Information Security Controls
Information Security Laws and Standards
Footprinting Methodology
Search Engine Footprinting
Web Services & WHOIS
Social Media Footprinting
DNS & Network Footprinting
Email Tracking & Metadata Analysis
Network Scanning Concepts
Scanning Tools
Nmap
,
Netcat
, and Angry IP Scanner
—
used for scanning, enumeration, and debugging network
services.
Host Discovery
Port and Service Detection
Nmap
’s service detection.
OS Fingerprinting
Bypassing Firewalls/IDS Detection
NetBIOS Enumeration
SNMP, LDAP Enumeration
DNS, SMTP, NFS, NTP Enumeration
Tools
enum4linux
,
snmpwalk
, rpcclient
,
ldapsearch
— used for extracting data from
remote services.
System Hacking Concepts
Password Cracking
Vulnerability Exploitation
Metasploit
to identify,
exploit, and validate vulnerabilities on target systems.
Privilege Escalation Techniques
Maintaining Access
Covering Tracks
DoS/DDoS Techniques
Botnets
Attack Tools
LOIC
, HOIC
,
and hping3
— used to generate traffic floods
and stress test networks.Case Studies
Countermeasures
Year 2 is full of hands-on-experience on 8 live projects
Scanning using OWASP ZAP involves identifying vulnerabilities in web applications through automated security testing. ZAP (Zed Attack Proxy) is an open-source tool developed by OWASP...
Scanning for open ports and attacking them is a common technique in cybersecurity used to identify entry points into a system. Tools like Nmap scan a target machine to detect active ports...
Information Gathering tools in cybersecurity are used to collect data about a target system, organization, or individual before launching a potential attack or penetration test. These tools...
Exploiting server vulnerabilities in cybersecurity involves taking advantage of weaknesses in a server’s software, configuration, or exposed services to gain unauthorized access or control...
OWASP Juice Shop is a deliberately insecure web application developed for learning and practicing web application security. It simulates a real-world e-commerce platform filled with...
System Hacking in the cybersecurity domain refers to the process of gaining unauthorized access to computer systems to uncover vulnerabilities, test defenses, or demonstrate potential...
Simulated Ransomware Attack and Defense is a controlled cybersecurity exercise that mimics a real ransomware attack to test an organization’s detection and response capabilities...
Cybersecurity Analyst
Security Engineer
Security Architect
Compliance & Risk Analyst
Penetration Tester (Ethical Hacker)
Incident Responder
Cloud Security Engineer
Security Operations Center (SOC) Analyst
Cybersecurity Trainer / Awareness Officer
Cyber Threat Intelligence Analyst
Read how Coincent’s training, mentorship & certifications helped students build careers.
Limited Seats
Available
(150 seats Each Domain)
Limited Seats
Available
(150 seats Each Domain)
No, there are no additional charges. The total fee for enrolling in the Coincent 3-Year Program is Rs.3,500, and this includes access to Microsoft certification training and exams, as well as all other program benefits.
Coincent is able to offer this program at such an affordable cost because 50% of the program expenses are sponsored by partnered companies. These companies not only support the training but also consider hiring top-performing candidates directly in the final year.
In the third year, candidates will participate in an internship designed to provide hands-on industry experience. During this period, they will work directly on company projects within their chosen domain. Following the internship, a comprehensive placement preparation phase will be conducted, covering aptitude, soft skills, and domain-specific interview training.
Please note that the internship will be offered only upon successful completion of the live projects conducted in the second year.
Yes, students receive year-wise, domain-specific program certifications. The certificate includes industrial training completion, internship & participation, and is endorsed by our industry partners.
Additionally, students who opt for domains such as AI, ML, Data Science, or Cybersecurity will receive a Microsoft certification as part of the program.
Yes, the Coincent 3-Year Program is designed to complement regular college academics. All learning modules are delivered through flexible evening live sessions led by industry mentors and experts.
Sessions are typically scheduled at 6:00 PM, making it convenient for students to balance both college and skill development.
Once registered, your seat is immediately reserved with one of our partnered companies. These industry partners offer only 150 domain-specific seats, and since we run just one batch per year, seat allocation is both limited and competitive.
This continuous mentorship ensures personalized guidance and growth at every stage of the program.
This certification is available only for specific domains:
Coincent offers a full refund only if our partnered companies fail to deliver the promised services on time.
However, we strongly advise candidates to register only if they are fully clear about the program and aligned with its goals. Since there is only one batch per year per domain, your seat is instantly confirmed with the respective partnered company upon registration.
Therefore, the program is non-transferable and non-refundable under normal circumstances.