OOPS
4 HrRDBMS
8 HrJava programming
10 HrJ2EE
4 HrSQL programming & Data persistent oo mapping
8 HrWeb page design (HTML5, CSS3, Responsive UI)
10 HrIntro to Angular, ReactJS, NodeJS,
10 HrOOPS
4 HrRDBMS
8 HrJava programming
10 HrAlgorithm
4 HrData Structure
4 HrNetworking Concepts
4 HrNetworking Concepts
4 HrIntro to Ethical hacking
4 HrFirewall and Cloud Concepts
8 HrLinux fundamentals
5 HrIntro to Network security
4 HrIntro to Cloud Security
4 HrInstall, configure and deploy public key infrastructure and network components while assessing and troubleshooting issues to support organizational security
6 HrMaster advanced hacking concepts to manage information security efficiently
6 HrDesign security architecture and framework for a secure IT operation
6 HrFrame cloud data storage architectures and security strategies, and utilize them to analyze risks
6 HrProtect data movement, perform disaster recovery, access CSP security and manage client databases
6 HrIntro to A+, N+, Security certification programs
5 HrAlgorithm
4 HrData Structure
4 HrNetworking Concepts
4 HrOperating Systems
4 HrIntro to Ethical hacking
4 HrFirewall and Cloud Concepts
8 HrLinux fundamentals
5 HrIntro to Network security
4 HrIntro to Cloud Security
4 HrInstall, configure and deploy public key infrastructure and network components while assessing and troubleshooting issues to support organizational security
6 HrMaster advanced hacking concepts to manage information security efficiently
6 HrDesign security architecture and framework for a secure IT operation
6 HrFrame cloud data storage architectures and security strategies, and utilize them to analyze risks
6 HrProtect data movement, perform disaster recovery, access CSP security and manage client databases
6 HrIntro to A+, N+, Security certification programs
5 HrAlgorithm
4 HrData Structure
4 HrNetworking Concepts
4 HrOperating Systems
4 HrIntro to Ethical hacking
4 HrFirewall and Cloud Concepts
8 HrLinux fundamentals
5 HrIntro to Network security
4 HrIntro to Cloud Security
4 HrInstall, configure and deploy public key infrastructure and network components while assessing and troubleshooting issues to support organizational security
6 HrMaster advanced hacking concepts to manage information security efficiently
6 HrDesign security architecture and framework for a secure IT operation
6 HrFrame cloud data storage architectures and security strategies, and utilize them to analyze risks
6 HrProtect data movement, perform disaster recovery, access CSP security and manage client databases
6 HrIntro to A+, N+, Security certification programs
5 HrAlgorithm
4 HrData Structure
4 HrNetworking Concepts
4 HrOperating Systems
4 HrIntro to Ethical hacking
4 HrFirewall and Cloud Concepts
8 HrLinux fundamentals
5 HrIntro to Network security
4 HrIntro to Cloud Security
4 HrInstall, configure and deploy public key infrastructure and network components while assessing and troubleshooting issues to support organizational security
6 HrMaster advanced hacking concepts to manage information security efficiently
6 HrDesign security architecture and framework for a secure IT operation
6 HrFrame cloud data storage architectures and security strategies, and utilize them to analyze risks
6 HrProtect data movement, perform disaster recovery, access CSP security and manage client databases
6 HrIntro to A+, N+, Security certification programs
5 HrAlgorithm
4 HrData Structure
4 HrNetworking Concepts
4 HrOperating Systems
4 HrIntro to Ethical hacking
4 HrFirewall and Cloud Concepts
8 HrLinux fundamentals
5 HrIntro to Network security
4 HrIntro to Cloud Security
4 HrInstall, configure and deploy public key infrastructure and network components while assessing and troubleshooting issues to support organizational security
6 HrMaster advanced hacking concepts to manage information security efficiently
6 HrDesign security architecture and framework for a secure IT operation
6 HrFrame cloud data storage architectures and security strategies, and utilize them to analyze risks
6 HrProtect data movement, perform disaster recovery, access CSP security and manage client databases
6 HrIntro to A+, N+, Security certification programs
5 HrAlgorithm
4 HrData Structure
4 HrNetworking Concepts
4 HrOperating Systems
4 HrIntro to Ethical hacking
4 HrFirewall and Cloud Concepts
8 HrLinux fundamentals
5 HrIntro to Network security
4 HrIntro to Cloud Security
4 HrInstall, configure and deploy public key infrastructure and network components while assessing and troubleshooting issues to support organizational security
6 HrMaster advanced hacking concepts to manage information security efficiently
6 HrDesign security architecture and framework for a secure IT operation
6 HrFrame cloud data storage architectures and security strategies, and utilize them to analyze risks
6 HrProtect data movement, perform disaster recovery, access CSP security and manage client databases
6 HrIntro to A+, N+, Security certification programs
5 HrAlgorithm
4 HrData Structure
4 HrNetworking Concepts
4 HrOperating Systems
4 HrIntro to Ethical hacking
4 HrFirewall and Cloud Concepts
8 HrLinux fundamentals
5 HrIntro to Network security
4 HrIntro to Cloud Security
4 HrInstall, configure and deploy public key infrastructure and network components while assessing and troubleshooting issues to support organizational security
6 HrMaster advanced hacking concepts to manage information security efficiently
6 HrDesign security architecture and framework for a secure IT operation
6 HrFrame cloud data storage architectures and security strategies, and utilize them to analyze risks
6 HrProtect data movement, perform disaster recovery, access CSP security and manage client databases
6 HrIntro to A+, N+, Security certification programs
5 HrAlgorithm
4 HrData Structure
4 HrNetworking Concepts
4 HrOperating Systems
4 HrIntro to Ethical hacking
4 HrFirewall and Cloud Concepts
8 HrLinux fundamentals
5 HrIntro to Network security
4 HrIntro to Cloud Security
4 HrInstall, configure and deploy public key infrastructure and network components while assessing and troubleshooting issues to support organizational security
6 HrMaster advanced hacking concepts to manage information security efficiently
6 HrDesign security architecture and framework for a secure IT operation
6 HrFrame cloud data storage architectures and security strategies, and utilize them to analyze risks
6 HrProtect data movement, perform disaster recovery, access CSP security and manage client databases
6 HrIntro to A+, N+, Security certification programs
5 HrAlgorithm
4 HrData Structure
4 HrNetworking Concepts
4 HrOperating Systems
4 HrIntro to Ethical hacking
4 HrFirewall and Cloud Concepts
8 HrLinux fundamentals
5 HrIntro to Network security
4 HrIntro to Cloud Security
4 HrInstall, configure and deploy public key infrastructure and network components while assessing and troubleshooting issues to support organizational security
6 HrMaster advanced hacking concepts to manage information security efficiently
6 HrDesign security architecture and framework for a secure IT operation
6 HrFrame cloud data storage architectures and security strategies, and utilize them to analyze risks
6 HrProtect data movement, perform disaster recovery, access CSP security and manage client databases
6 HrIntro to A+, N+, Security certification programs
5 HrAlgorithm
4 HrData Structure
4 HrNetworking Concepts
4 HrOperating Systems
4 HrIntro to Ethical hacking
4 HrFirewall and Cloud Concepts
8 HrLinux fundamentals
5 HrIntro to Network security
4 HrIntro to Cloud Security
4 HrInstall, configure and deploy public key infrastructure and network components while assessing and troubleshooting issues to support organizational security
6 HrMaster advanced hacking concepts to manage information security efficiently
6 HrDesign security architecture and framework for a secure IT operation
6 HrFrame cloud data storage architectures and security strategies, and utilize them to analyze risks
6 HrProtect data movement, perform disaster recovery, access CSP security and manage client databases
6 HrIntro to A+, N+, Security certification programs
5 HrAlgorithm
4 HrData Structure
4 HrNetworking Concepts
4 HrOperating Systems
4 HrIntro to Ethical hacking
4 HrFirewall and Cloud Concepts
8 HrLinux fundamentals
5 HrIntro to Network security
4 HrIntro to Cloud Security
4 HrInstall, configure and deploy public key infrastructure and network components while assessing and troubleshooting issues to support organizational security
6 HrMaster advanced hacking concepts to manage information security efficiently
6 HrDesign security architecture and framework for a secure IT operation
6 HrFrame cloud data storage architectures and security strategies, and utilize them to analyze risks
6 HrProtect data movement, perform disaster recovery, access CSP security and manage client databases
6 HrIntro to A+, N+, Security certification programs
5 Hr