Course Details!

List Of Diploma Courses

  • CCNA 200 - 301
  • MCSA
  • LINUX Administration I
  • LINUX Administration II
  • python


Cybersecurity is defined as the steps and processes taken to protect networks, devices, programs, information’s and data from unauthorized access that can result in Attacks, theft or damage.
Small and large companies alike put cybersecurity measures into place to protect their network, servers, and all information assets, as well as to restrict employees from visiting websites or take an action that may compromise sensitive data.
It's just as important as any measures a company takes to secure their trade secrets or physical assets from being compromised.
In that Diploma, you will receive an advanced and fully qualified training in the field of cybersecurity.
This training is ideal for those new to the field, but interested in pursuing a career.
The diploma covers the many areas of cybersecurity that you'll need ,to gain employment in many it and security fields , including network administration and support , system Administration , Linux administration , python programming and information security security
The study in that diploma is divided into 3 stages to cover all cyber security tracks : Networks, Servers, Data Centers, Operating systems, Web and Databases.

What Will I Learn?

  • 1st stage is Networking and OSA (CCNA-MCSA)
  • 2ND Stage is Linux and programming (Linux Admin I –II – Cyber python )
  • 3rd Stage is Security basics and Ethical Hacking (CEH – CTF )


  • Certificate Of Attendance from IT-Gate Academy
  • Certificate From Ain Shams University (Optional)

Unit 1: Network Fundamentals

  • Introduction to the OSI Model

  • Introduction to IPv4 (Internet Protocol)

  • IPv4 Packet Header

  • Address Resolution Protocol (ARP)

  • Introduction to TCP and UDP

  • TCP Header

  • TCP Window Size Scaling

  • Introduction to ICMP

  • Introduction to DNS

  • Introduction to Cisco Command Line Interface (CLI)

  • User mode and Privileged mode

  • Introduction to Subnetting

  • Basics of Binary Numbers

  • Subnetting in Binary

  • Subnetting in Decimal (Fast Method)

  • Classless Inter-Domain Routing (CIDR)

  • Variable Length Subnet Mask (VLSM)

  • Route Summarization

  • Hexadecimal to Binary and Decimal Conversion

  • Create a Subnetting Cheat Sheet

  • IPv6

  • Introduction to IPv6

  • Shortening IPv6 Addresses

  • How to find IPv6 Prefix

  • IPv6 Address Types

  • IPv6 Address Assignment Example

  • IPv6 EUI-64

  • IPv6 Summarization

  • IPv6 Solicited Node Multicast Address

  • IPv6 Neighbor Discovery Protocol (NDP)

  • IPv6 Stateless Auto configuration

Unit 2: Network Access

  • 2.2 VLANs and Trunks

  • Introduction to VLANs

  • How to configure VLANs

  • VLAN Trunking Protocol (VTP)

  • Introduction to 802.1Q

  • How to configure a Trunk

  • Dynamic Trunking Protocol (DTP)

  • 802.1Q Native VLAN

  • Introduction to Voice VLAN

  • Etherchannels

  • L3 Etherchannel

  • 2.3 Spanning-Tree

  • Introduction to Spanning-Tree

  • Per VLAN Spanning-Tree

  • Spanning-Tree Port States

  • Spanning-Tree Cost Calculation

  • Spanning-Tree Portfast

  • Rapid PVST

  • Rapid PVST Configuration

  • 2.4 Wireless

  • Introduction to Wireless Networks

  • Introduction to Wireless LANs

  • Wireless LAN 802.11 Service Sets

  • Introduction to Wireless Security

  • Wireless Authentication Methods

  • Wireless Encryption and Integrity

  • Wi-Fi Protected Access (WPA)

  • Cisco Wireless Network Architectures

  • Cisco WLC Deployment Models

  • Cisco Wireless AP Modes

  • Cisco Wireless LAN Controller (WLC) Basic Configuration

  • Cisco WLC WPA2 PSK Authentication

Unit 3: IP Connectivity

  • 3.1 Introduction

  • Introduction to Routers and Routing

  • Cisco IOS Router Basic Configuration

  • Introduction to Wide Area Networks (WAN)

  • 3.2 IPv4 Subnetting

  • 3.4 Routing

  • Default Gateway

  • Static Routing

  • IPv6 Static Route

  • IP Routing Explained

  • Router on a Stick

  • InterVLAN Routing

  • Administrative Distance Floating Static Route

  • Introduction to Route Summarization


  • Introduction to OSPF

  • OSPF Configuration

  • OSPF Packets and Neighbor Discovery

  • OSPF Reference Bandwidth

  • OSPF Router ID


  • BDR Election

  • OSPF Passive Interface

  • OSPF Hello and Dead Interval

  • 3.6 Gateway Redundancy

  • Introduction to Gateway Redundancy HSRP

Unit 4: IP Services

  • 4.1 DHCP (Dynamic Host Configuration Protocol)

  • Introduction to DHCP

  • DHCP Server Configuration

  • DHCP Relay Agent

  • DHCP Client

  • DHCP Server IPv6 Configuration

  • 4.2 SNMP (Simple Network Management Protocol)

  • Introduction to SNMP

  • SNMPv2

  • SNMPv3

  • 4.3 NAT (Network Address Translation)

  • Introduction to NAT and PAT

  • NAT Static

  • NAT Dynamic

  • Port Address Translation (PAT)

  • 4.4 (QoS) Quality of Service

  • Introduction to Quality of Service (QoS)

  • IP Precedence and DSCP Values

  • Classification

  • Marking

  • Shaping

  • Policing

Unit 5: Security Fundamentals

  • 5.1 Access-Lists

  • Introduction to Access-Lists

  • Wildcard Bits

  • Standard Access-List

  • Extended Access-List

  • Time-based Access-List

  • 5.2 Misc

  • Port-Security

  • AAA and 802.1X

  • AAA User Authentication

  • AAA Admin Authentication

  • DHCP Snooping

  • Introduction to Firewalls

  • Introduction to VPNs

Unit 6: Network Management

  • Introduction to CDP

  • Introduction to LLDP

  • Telnet Server and Client

  • SSH Server and Client

  • Introduction to NTP

  • Introduction to Syslog

  • Configuration Register

  • Password Recovery on Cisco IOS

  • Cisco IOS File System

  • Upgrade Cisco IOS Image

Unit 7: Automation and Programmability

  • Device Programmability


  • Data Models and Structures

  • Configuration Management Tools and Version Control Systems

  • Introduction to Software Defined Networking (SDN)

  • Spine and Leaf Architecture

Unit 8: Cloud Computing

  • Virtual Machines and Containers

  • Introduction to Cloud Computing

  • Cloud Connectivity

20-740 Installation, Storage and Compute with Windows Server 2016

  • Introducing Windows Server 2016

  • Preparing and installing Nano Server and Server Core

  • Preparing for upgrades and migrations

  • Migrating server roles and workloads

  • Windows Server activation models

  • Lab : Installing and configuring Nano Server

  • Implementing Nano Server

  • Completing post-installation tasks on the Nano Server

  • Performing remote management

  • Module 2: Configuring local storage

  • Managing disks in Windows Server 2016

  • Managing volumes in Windows Server 2016

  • Lab : Managing disks and volumes in Windows Server 2016

  • Creating and Managing virtual hard disks by using Windows PowerShell

  • Converting virtual hard disks from .vhd to .vhdx

  • Resizing a volume

  • Module 3: Implementing enterprise storage solutions

  • Overview of direct-attached storage, network-attached storage, and storage area networks

  • Comparing Fibre Channel, iSCSI, and FCoE

  • Understanding iSNS, data centre bridging, and MPIO

  • Configuring sharing in Windows Server 2016

  • Lab : Planning and configuring storage technologies and components

  • Planning storage requirements

  • Configuring iSCSI storage

  • Configuring and managing the share infrastructure

  • Module 4: Implementing Storage Spaces and Data Deduplication

  • Implementing Storage Spaces

  • Managing Storage Spaces

  • Implementing Data Deduplication

  • Lab : Implementing Storage Spaces

  • Creating a storage space

  • Enabling and configuring storage tiering

  • Lab : Implementing Data Deduplication

  • Installing Data Deduplication

  • Configuring Data Deduplication

  • Module 5: Installing and configuring Hyper-V and virtual machines

  • Overview of Hyper-V

  • Installing Hyper-V

  • Configuring storage on Hyper-V host servers

  • Configuring networking on Hyper-V host servers

  • Configuring Hyper-V virtual machines

  • Managing Hyper-V virtual machines

  • Lab : Installing and configuring Hyper-V

  • Installing the Hyper-V server role

  • Configuring Hyper-V settings

  • Creating and configuring a virtual machine

  • Managing a virtual machine by using PowerShell Direct

  • Module 6: Deploying and managing Windows Server and Hyper-V containers

  • Overview of containers in Windows Server 2016

  • Deploying Windows Server and Hyper-V containers

  • Installing, configuring, and managing containers

  • Lab : Installing and configuring containers

  • Installing and configuring Windows Server containers by using Windows PowerShell

  • Installing and configuring Windows Server containers by using Docker

  • Module 7: Overview of high availability and disaster recovery

  • Defining levels of availability

  • Planning high availability and disaster recovery solutions with Hyper-V virtual machines

  • Backing up and restoring the Windows Server 2016 operating system and data by using Windows Server B

  • High availability with failover clustering in Windows Server 2016

  • Lab : Planning and implementing a high availability and disaster recovery solution

  • Determining the appropriate high availability and disaster recovery solution

  • Implementing storage migration

  • Implementing Hyper-V Replica

  • Module 8: Implementing and managing failover clustering

  • Planning a failover cluster

  • Creating and configuring a new failover cluster

  • Maintaining a failover cluster

  • Troubleshooting a failover cluster

  • Implementing site high availability with stretch clustering

  • Lab : Implementing a failover cluster

  • Creating a failover cluster

  • Verifying quorum settings and adding a node

  • Lab : Managing a failover cluster

  • Evicting a node and verifying quorum settings

  • Changing the quorum from Disk Witness to File Share Witness, and defining node voting

  • Adding and removing disks from the cluster

  • Module 9: Implementing failover clustering for Hyper-V virtual machines

  • Overview of integrating Hyper-V in Windows Server 2016 with failover clustering

  • Implementing and maintaining Hyper-V virtual machines on failover clusters

  • Key features for virtual machines in a clustered environment

  • Lab : Implementing failover clustering with Hyper-V

  • Configuring a failover cluster for Hyper-V

  • Configuring a highly available virtual machine

  • Module 10: Implementing Network Load Balancing

  • Overview of NLB clusters

  • Configuring an NLB cluster

  • Planning an NLB implementation

  • Lab : Implementing an NLB cluster

  • Implementing an NLB cluster

  • Configuring and managing the NLB cluster

  • Validating high availability for the NLB cluster

  • Module 11: Creating and managing deployment images

  • Introduction to deployment images

  • Creating and managing deployment images by using MDT

  • Virtual machine environments for different workloads

  • Lab : Using MDT to deploy Windows Server 2016

  • Installing and configuring MDT

  • Creating and deploying an image

  • Module 12: Managing, monitoring, and maintaining virtual machine installations

  • WSUS overview and deployment options

  • Update management process with WSUS

  • Overview of PowerShell DSC

  • Overview of Windows Server 2016 monitoring tools

  • Using Performance Monitor

  • Monitoring Event Logs

  • Lab : Implementing WSUS and deploying updates

  • Implementing WSUS

  • Configuring update settings

  • Approving and deploying an update by using WSUS

  • Lab : Monitoring and troubleshooting Windows Server 2016

  • Establishing a performance baseline

  • Identifying the source of a performance problem

  • Viewing and configuring centralized event logs

Networking in Windows Server 2016 (20-741)

  • Module 1: Planning and implementing an IPv4 network

  • Planning IPv4 addressing

  • Configuring an IPv4 host

  • Managing and troubleshooting IPv4 network connectivity

  • Lab : Planning an IPv4 network

  • Planning the IPv4 address assignments

  • Lab : Implementing and troubleshooting an IPv4 network

  • Verifying the IPv4 configuration

  • Troubleshooting IPv4

  • Module 2: Implementing DHCP

  • Overview of the DHCP server role

  • Deploying DHCP

  • Managing and troubleshooting DHCP

  • Lab : Implementing DHCP

  • Planning the DHCP server implementation

  • Implementing the DHCP configuration

  • Validating the DHCP implementation

  • Module 3: Implementing IPv6

  • Overview of IPv6 addressing

  • Configuring an IPv6 host

  • Implementing IPv6 and IPv4 coexistence

  • Transitioning from IPv4 to IPv6

  • Lab : Implementing IPv6

  • Reviewing the default IPv6 configuration

  • Implementing DHCPv6

  • Lab : Configuring and evaluating IPv6 transition technologies

  • Configuring network integration by using ISATAP

  • Configuring native IPv6 connectivity

  • Configuring 6to4 connectivity

  • Module 4: Implementing DNS

  • Implementing DNS servers

  • Configuring zones in DNS

  • Configuring name resolution between DNS zones

  • Configuring DNS integration with Active Directory Domain Services (AD DS)

  • Configuring advanced DNS settings

  • Lab : Planning and implementing name resolution by using DNS

  • Planning DNS name resolution

  • Implementing DNS servers and zones

  • Lab : Integrating DNS with Active Directory

  • Integrating DNS with Active Directory

  • Lab : Configuring advanced DNS settings

  • Configuring DNS policies

  • Validating the DNS implementation

  • Troubleshooting DNS

  • Module 5: Implementing and managing IPAM

  • IPAM overview

  • Deploying IPAM

  • Managing IP address spaces by using IPAM

  • Lab : Implementing IPAM

  • Installing the IPAM Server feature

  • Provisioning the IPAM Server feature

  • Managing IP address spaces by using IPAM

  • Module 6: Remote access in Windows Server 2016

  • Remote access overview

  • Implementing Web Application Proxy

  • Lab : Implementing Web Application Proxy

  • Implementing Web Application Proxy

  • Validating Web Application Proxy

  • Module 7: Implementing DirectAccess

  • Overview of DirectAccess

  • Implementing DirectAccess by using the Getting Started Wizard

  • Implementing and managing an advanced DirectAccess infrastructure

  • Lab : Implementing DirectAccess by using the Getting Started Wizard

  • Verifying readiness for a DirectAccess deployment

  • Configuring DirectAccess

  • Validating the DirectAccess deployment

  • Lab : Deploying an advanced DirectAccess solution

  • Preparing the environment for DirectAccess

  • Implementing the advanced DirectAccess infrastructure

  • Validating the DirectAccess deployment

  • Module 8: Implementing VPNs

  • Planning VPNs

  • Implementing VPNs

  • Lab : Implementing a VPN

  • Implementing a VPN

  • Validating VPN deployment

  • Lab : Troubleshooting VPN access

  • Troubleshooting VPN access

  • Module 9: Implementing networking for branch offices

  • Networking features and considerations for branch offices

  • Implementing Distributed File System (DFS) for branch offices

  • Implementing BranchCache for branch offices

  • Lab : Implementing DFS for branch offices

  • Implementing DFS

  • Validating the deployment

  • Lab : Implementing BranchCache

  • Implementing BranchCache

  • Validating the deployment

  • Module 10: Configuring advanced networking features

  • Overview of high performance networking features

  • Configuring advanced Hyper-V networking features

  • Lab : Configuring advanced Hyper-V networking features

  • Creating and using Microsoft Hyper-V virtual switches

  • Configuring and using the advanced features of a virtual switch

  • Module 11: Implementing software defined networking

  • Overview of software defined networking

  • Implementing network virtualization

  • Implementing Network Controller

  • Lab : Implementing Network Controller

  • Deploying Network Controller

  • Configuring network services with Network Controller

  • Managing and monitoring with Network Controller

Identity in Windows Server 2016

  • module 1: Installing and configuring DCs

  • Overview of AD DS

  • Overview of AD DS DCs

  • Deploying DCs

  • Lab : Deploying and administering AD DS

  • Deploying AD DS

  • Deploying a DC by performing DC cloning

  • Administering AD DS by using Active Directory Administrative Center

  • Module 2: Managing objects in AD DS

  • Managing user accounts

  • Managing groups in AD DS

  • Managing computer accounts

  • Using Windows PowerShell for AD DS administration

  • Implementing and managing organizational units

  • Lab : Deploying and administering AD DS

  • Creating and configuring user accounts in AD DS

  • Creating and configuring groups in AD DS

  • Managing computer objects in AD DS

  • Lab : Administering AD DS

  • Delegating administration for a branch office

  • Creating user accounts and groups by using Windows PowerShell

  • Module 3: Advanced AD DS infrastructure management

  • Overview of advanced AD DS deployments

  • Deploying a distributed AD DS environment

  • Configuring AD DS trusts

  • Lab : Domain and trust management in AD DS

  • Implementing child domains in AD DS

  • Implementing forest trusts

  • Module 4: Implementing and administering AD DS sites and replication

  • Overview of AD DS replication

  • Configuring AD DS sites

  • Configuring and monitoring AD DS replication

  • Lab : Managing and implementing AD DS sites and replication

  • Modifying the default site

  • Creating additional sites and subnets

  • Configuring AD DS replication

  • Monitoring and troubleshooting AD DS replication

  • Module 5: Implementing Group Policy

  • Introducing Group Policy

  • Implementing and administering GPOs

  • Group Policy scope and Group Policy processing

  • Troubleshooting the application of GPOs

  • Lab : Implementing a Group Policy infrastructure

  • Creating and configuring GPOs

  • Managing GPO scope

  • Lab : Troubleshooting a Group Policy infrastructure

  • Verify GPO application

  • Troubleshooting GPOs

  • Module 6: Managing user settings with GPOs

  • Implementing administrative templates

  • Configuring Folder Redirection and scripts

  • Configuring Group Policy preferences

  • Lab : Managing user settings with GPOs

  • Using administrative templates to manage user settings

  • Implement settings by using Group Policy preferences

  • Configuring Folder Redirection

  • Planning Group Policy (optional)

  • Module 7: Securing AD DS

  • Securing domain controllers

  • Implementing account security

  • Audit authentication

  • Configuring managed service accounts (MSAs)

  • Lab : Securing AD DS

  • Implementing security policies for accounts and passwords

  • Implementing administrative security policies

  • Deploying and configuring a read-only domain controller (RODC)

  • Creating and associating a gMSA

  • Module 8: Deploying and managing AD CS

  • Deploying CAs

  • Administering CAs

  • Troubleshooting and maintaining CAs

  • Lab : Deploying and configuring a two-tier CA hierarchy

  • Deploying an offline root CA

  • Deploying an enterprise subordinate CA

  • Module 9: Deploying and managing certificates

  • Deploying and managing certificate templates

  • Managing certificate deployment, revocation, and recovery

  • Using certificates in a business environment

  • Implementing and managing smart cards

  • Lab : Deploying certificates

  • Configuring certificate templates

  • Enrolling and using certificates

  • Configuring and implementing key recovery

  • Module 10: Implementing and administering AD FS

  • Overview of AD FS

  • AD FS requirements and planning

  • Deploying and configuring AD FS

  • Overview of Web Application Proxy

  • Lab : Implementing AD FS

  • Configuring AD FS prerequisites

  • Installing and configuring AD FS

  • Configuring AD FS for a single organization

  • Configuring AD FS for federated business partners

  • Module 11: Implementing and administering AD RMS

  • Overview of AD RMS

  • Deploying and managing an AD RMS infrastructure

  • Configuring AD RMS content protection

  • Lab : Implementing an AD RMS infrastructure

  • Installing and configuring AD RMS

  • Configuring AD RMS templates

  • Using AD RMS on clients

  • Module 12: Implementing AD DS synchronization with Azure AD

  • Planning and preparing for directory synchronization

  • Implementing directory synchronization by using Azure AD Connect

  • Managing identities with directory synchronization

  • Lab : Configuring directory synchronization

  • Preparing for directory synchronization

  • Configuring directory synchronization

  • Managing Active Directory users and groups

  • Module 13: Monitoring, managing, and recovering AD DS

  • Monitoring AD DS

  • Managing the AD DS database

  • Recovering AD DS objects

  • Lab : Recovering objects in AD DS

  • Backing up and restoring AD DS

Get started with Enterprise Linux

  • Describe and define open source, Linux distributions, and Red Hat Enterprise Linux.

Access the command line

  • Log into a Linux system and run simple commands using the shell.

Manage files from the command line

  • Copy, move, create, delete, and organize files while working from the bash shell.

Get help in Linux

  • Resolve problems by using local help systems.

Create, view, and edit text files

  • Manage text files from command output or in a text editor.

Manage local users and groups

  • Create, manage, and delete local users and groups, as well as administer local password policies.

Control access to files

  • Set Linux file system permissions on files and interpret the security effects of different permission settings.

Monitor and manage Linux processes

  • Evaluate and control processes running on Linux system.

Control services and daemons

  • Control and monitor network services and system daemons using system.

Configure and secure SSH

  • Configure secure command line service on remote systems, using Open SSH.

Analyze and store logs

  • Locate and accurately interpret logs of system events for troubleshooting purposes.

Manage networking

  • Configure network interfaces and settings on Red Hat Enterprise Linux servers.

Archive and transfer files

  • Archive and copy files from one system to another.

Install and update software

  • Download, install, update, and manage software packages from Red Hat and yum package repositories.

Access Linux files systems

  • Access, inspect, and use existing file systems on storage attached to a Linux server.

Analyze servers and get support

  • Investigate and resolve issues in the web-based management interface, getting support from Red Hat to help solve problems.

Comprehensive review

  • Review the content covered in this course by completing hands-on exercises.

Improve command line productivity

  • Run commands more efficiently by using advanced features of the Bash shell, shell scripts, and various utilities provided by Red Hat Enterprise Linux.

Schedule future tasks

  • Schedule commands to run in the future, either one time or on a repeating schedule.

Control access to files with ACLs

  • Interpret and set access control lists (ACLs) on files to handle situations requiring complex user and group access permissions.

Manage SE Linux security

  • Protect and manage the security of a server by using SE Linux.

Manage basic storage

  • Create and manage storage devices, partitions, file systems, and swap spaces from the command line.

Manage logical volumes

  • Create and manage logical volumes containing file systems and swap spaces from the command line.

Implement advanced storage features

  • Manage storage using the Stratis local storage management system and use VDO volumes to optimize storage space in use.

Access network-attached storage

  • Use the NFS protocol to administer network-attached storage.

Control the boot process

  • Manage the boot process to control services offered and to troubleshoot and repair problems.

Manage network security

  • Control network connections to services using the system firewall and SELinux rules.

Install Red Hat Enterprise Linux

  • Install Red Hat Enterprise Linux on servers and virtual machines.

Run Containers

  • Obtain, run, and manage simple, lightweight services as containers on a single Red Hat Enterprise Linux server.


  • Python History & Features


  • Local Environment

  • Installing Python Setting up PATH

  • Setting path at Unix

  • Linux – Windows

  • Python Environment Variables

  • Running Python


  • First Python Program

  • Python Identifiers- Keywords

  • Lines and Indentation

  • Multi-Line Statements

  • Quotation – Comments in Python

  • Using Blank Lines

  • Multiple Statements on a Single Line

  • Multiple Statement Groups as Suites

  • Command Line Arguments

  • Accessing Command-Line Arguments

  • Parsing Command-Line Arguments


  • Assigning Values to Variables

  • Multiple Assignment

  • Standard Data Types , Conversion

  • Python Numbers, Strings, Lists

  • Python Tuples, Dictionary


  • Types of Operators

  • Python Arithmetic, Comparison Operators

  • Python Assignment, Bitwise Operators

  • Python Logical, Membership Operators

  • Python Identity Operators

  • Python Operators Precedence


  • If Statement

  • If…else Statement

  • Single Statement Suites


  • While Loop

  • The Infinite Loop

  • Using else Statement with Loops

  • Single Statement Suites

  • For Loop

  • Iterating by Sequence Index

  • Using else Statement with Loops

  • Nested Loops

  • Loop Control Statements

  • Break Statement

  • Continue Statement

  • Pass Statement


  • Number Type Conversion

  • Random Number Functions

  • Trigonometric Functions

  • Mathematical Constants


  • Accessing Values in Strings

  • Updating Strings

  • Escape Characters

  • String Special Operators

  • String Formatting Operator

  • Triple Quotes

  • Unicode String

  • Built-in String Methods


  • Python Lists

  • Accessing Values in Lists

  • Updating Lists

  • Deleting List Elements

  • Basic List Operations

  • Indexing, Slicing, and Matrixes

  • Built-in List Functions and Methods


  • Accessing Values in Tuples

  • Updating Tuples

  • Deleting Tuple Elements

  • Basic Tuples Operations

  • Indexing, Slicing, and Matrixes

  • No Enclosing Delimiters

  • Built-in Tuple Functions


  • Accessing Values in Dictionary

  • Updating Dictionary

  • Delete Dictionary Elements

  • Properties of Dictionary Keys

  • Built-in Dictionary Functions and Methods


  • What is Tick?

  • What is Time Tuple

  • Getting Current Time

  • Getting Formatted Time

  • Getting Calendar for a Month

  • The time Module

  • The calendar Module

  • Other Modules and Functions


  • Defining a Function

  • Calling a Function

  • Passing by Reference Versus Passing by Value

  • Function Arguments

  • Required Arguments

  • Keyword Arguments

  • Default Arguments

  • Variable Length Arguments

  • The Anonymous Functions

  • The return Statement

  • Scope of Variables

  • Global vs. Local variables


  • The import Statement

  • The from...import Statement

  • The from...import * Statement:

  • Locating Modules:

  • The PYTHONPATH Variable

  • Namespaces and Scoping

  • The dir( ) Function

  • The globals() and locals() Functions

  • The reload() Function

  • Packages in Python


  • Printing to the Screen

  • Reading Keyboard Input

  • The raw_input Function

  • The input Function

  • Opening and Closing Files

  • The open Function

  • The file Object Attributes

  • The close() Method

  • Reading and Writing Files

  • The write() Method

  • The read() Method File Positions

  • Renaming and Deleting Files

  • The rename() Method

  • The remove() Method

  • Directories in Python

  • The mkdir() Method

  • The chdir() Method

  • The getcwd() Method

  • The rmdir() Method

  • File and Directory Related Methods


  • What is Exception?

  • Handling an Exception

  • The except Clause with No Exceptions

  • The except Clause with Multiple Exceptions

  • The try-finally Clause

  • Argument of an Exception

  • Raising an Exception

  • User-Defined Exceptions


  • Overview of OOP Terminology

  • Creating Classes

  • Creating Instance Objects

  • Accessing Attributes

  • Built-In Class Attributes

  • Destroying Objects (Garbage Collection)

  • Class Inheritance

  • Overriding Methods

  • Base Overloading Methods

  • Overloading Operators

  • Data Hiding

  • Polymorphism,

  • Abstraction,

  • Constructor,

  • Destructor

1 - Introduction to Ethical Hacking

  • Overview of Current Security Trends

  • Understanding Elements of Information Security

  • Understanding Information Security Threats and Attack Vectors

  • • Overview of hacking concepts, types, and phases

  • Understanding ethical hacking concepts and scope

  • Overview of information security management and defense-in-depth

  • Overview of policies, procedures, and awareness

  • Overview of physical security and controls

  • Understanding incidence management process

  • Overview of vulnerability assessment and penetration testing

  • Overview of information security acts and laws

2 - Footprinting and Reconnaissance

  • Understanding footprinting concepts

  • Footprinting through search engines

  • Footprint using advance google hacking techniques

  • Footprint through social networking sites

  • Understanding different techniques for website footprinting

  • Understanding different techniques for email footprinting

  • • Understanding different techniques of competitive intelligence

  • Understanding different techniques for WHO IS footprinting

  • Understanding different techniques for network footprinting

  • Understanding different techniques of footprinting through social engineering

  • Footprinting tools

  • Footprinting countermeasures

  • Overview of footprinting Pen Testing

3 - Scanning Networks

  • Overview of networking scanning

  • Understanding different techniques to check for Live Systems

  • Understanding different techniques to check for Open Ports

  • Understanding various scanning techniques

  • Understanding various IDS Evasion Techniques

  • Understanding banner grabbing

  • Overview of Vulnerability scanning

  • Drawing network diagrams

  • Using Proxies and Anonymizer for attack

  • Understanding IP Spoofing and various detection techniques

  • Overview of scanning and Pen Testing

4 - Enumeration

  • Understanding Enumeration Concepts

  • Understanding different techniques for NetBIOS Enumeration

  • Understanding different techniques for SNMP enumeration

  • Understanding different techniques for LDAP enumeration

  • Understanding different techniques for NTP enumeration

  • Understanding different techniques for SMTP and DNS enumeration countermeasures

  • Overview of enumeration pen testing

5 - Vulnerability Analysis

  • Vulnerability of the management life cycle

  • Understanding various approaches to vulnerability analysis

  • Tools used to perform the vulnerability assessments

  • Vulnerability analysis tools and techniques

6 - System Hacking

  • Overview of CEH Hacking Methodology

  • Understanding different techniques to gain access to the system

  • Understanding privilege escalation techniques

  • Understanding different techniques to create and maintain remote access to the system

  • Overview of different types of Rootkits

  • Overview of Steganograpy and Steganalysis

  • Understanding techniques to hide the evidence of compromise

  • Overview of system hacking penetration testing

7 - Malware Threats

  • Introduction to malware and malware propagation techniques

  • Overview of Trojans, their types, and how to infect systems

  • Overview of viruses, their types, and how they infect files

  • Introduction to computer worm

  • Understanding the Malware Analysis Process

  • Understanding different techniques to detect malware

  • Malware countermeasures

  • Overview of Malware penetration testing

8 - Sniffing

  • Overview of sniffing concepts

  • Understanding MAC attacks

  • Understanding DHCP attacks

  • Understanding ARP Poisoning

  • Understanding MAC Spoofing attacks

  • Understanding DNS poisoning

  • Sniffing tools

  • Sniffing countermeasures

  • Understanding various techniques to detect sniffing

  • Overview of sniffing Pen Testing

9 - Social Engineering

  • Overview of social engineering

  • Understanding various social engineering techniques

  • Understanding insider threats

  • Understanding impersonation on social networking sites

  • Understanding identity theft

  • Social engineering countermeasures

  • Identify theft countermeasures

  • Overview of Social Engineering Pen Testing

10 - Denial-of-Service

  • Overview of Denial of Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks

  • Overview different DoS

  • DDoS) attack techniques

  • Understanding the botnet network

  • Understanding various DoS and DDoS Attack Tools

  • DoS

  • DDoS Countermeasures

  • Overview of DoS Attack Penetration Testing

11 - Session Hijacking

  • Understanding session hijacking concepts

  • Understanding application level session hijacking

  • Understanding network level session hijacking

  • Session hijacking tools

  • Session hijacking countermeasures

  • Overview of session hijacking penetration testing

12 - Evading IDS, Firewalls, and Honeypots

  • Understanding IDS, Firewall, and honeypot concepts

  • IDS, Firewall and honeypot solutions

  • Understanding different techniques to bypass IDS

  • Understanding different techniques to bypass firewalls

  • IDS

  • Firewall evading tools

  • Understanding different techniques to detect honeypots

  • IDS

  • Firewall evasion countermeasures

  • Overview of IDS and firewall Penetration Testing

13 - Hacking Web Servers

  • Understanding webserver concepts

  • Understanding webserver attacks

  • Understanding webserver attack methodology

  • Webserver attack tools

  • Countermeasures against webserver attacks

  • Overview of Patch Management

  • Webserver security tools

  • Overview of Webserver penetration testing

14 - Hacking Web Applications

  • Understanding web application concepts

  • Understanding web application threats

  • Understanding web application hacking methodology

  • Web application hacking tools

  • Understanding web application countermeasures

  • Web application security tools

  • Overview of web application penetration testing

15 - SQL Injection

  • Understanding SQL injection concepts

  • Understanding various types of SQL injection attacks

  • Understanding SQL injection methodology

  • SQL injection tools

  • Understanding different IDS evasion techniques

  • SQL injection countermeasures

  • SQL injection detection tools

16 - Hacking Wireless Networks

  • Understanding wireless concepts

  • Understanding wireless encryption algorithms

  • Understanding wireless threats

  • Understanding wireless hacking methodology

  • Wireless hacking tools

  • Understanding Bluetooth hacking techniques

  • Understanding wireless hacking countermeasures

  • Wireless security tools

  • Overview of wireless penetration testing

17 - Hacking Mobile Platforms

  • Understanding mobile attack platform vectors

  • Understanding various android threat and attacks

  • Understanding various iOS threats and attacks

  • Understanding various Windows Phone OS threats and attacks

  • Understanding various blackberry threats and attacks

  • Understanding mobile device management (MDM)

  • Mobile Security Guidelines and security tools

  • Overview of Mobile Penetration Testing

18 - IoT Hacking

  • Understanding IoT concepts

  • Cryptography tools

  • Understanding various IoT threats and attacks

  • Understanding IoT Hacking

  • Understanding IoT attacks

  • IoT security Tools

19 - Cloud Computing

  • Understanding Cloud Computing Concepts

  • Understanding Cloud Computing Threats

  • Understanding Cloud Computing Attacks

  • Understanding Cloud Computing Security

  • Cloud computing Security tools

  • Overview of Cloud Penetration testing

20 - Cryptography

  • Understanding Cryptography concepts

  • Overview of encryption algorithms

  • Cryptography tools

  • Understanding Public Key Infrastructure (PKI)

  • Understanding email encryption

  • Understanding disk encryption

  • Understanding Cryptography attacks

  • Cryptanalysis Tools

Ahmed Abdul Hameed(Course CCNA 200 - 301)

CCNA,CCNA SEC.,CCNP, ITIL, MCSA,MCSE , CCAI, ECCS, CEH ,CHFI Senior Network and Telecom. Engineer – Cisco-Microsoft CompTIA -EC- Council Certified Academy instructor with 12 years of Experience of technical and managerial skills in one of the largest telecommunication companies in middle East Telecom Egypt ,also Certified instructor in the field of networks, security and management and Co founder & CEO of IT Gate Academy & IT Gate Corp.

Ezat Hussien(Course MCSA)

overall experience of (18) years in the different companies in IT field , and recently working as Computer Instructor. I have international certifications (MCP, MCSA , MCSE , MCITP , CCNA , CCNP , A+ , N+, CIW410,CIW470 and ICDL) and many certificates.
Networking Essentials .
LAN & WAN implementation .
Installing and Configuring Windows Server 2016 , 2012 , 2008 , 2003 and 2000 .
Installing and Configuring Active Directory.
Group Policies Management .
Installing and Configuring DHCP, DNS, VPN, IIS, NAP, IPSec, WSUS and WDS Servers .
Implementing and managing IPv4 , IPv6 .
Administration mail server via MS Exchange 2013 .
Implementing and managing Print Server .
Implementing and managing Storage Services .
Implementing and managing Backup Server .
Implementing and managing File Server .
Implementing and managing Failover Clustering .
Microsoft Network Managmenting .
Infrastructure planning & design.
Security Policies planning & Implementation .
Virtualization Hyper-V and VMWare
Network Security and Firewall.
Operating System Security.
Microsoft TMG Server.
Microsoft ISA Server.
Microsoft Network Infrastructure .
Hard ware Trouble Shooting Servers & Pcs.
In-depth knowledge of all Cisco enterprise routing and switching platforms.
Routing: Advanced knowledge on implementation & Tshoot of Routing Protocols (OSPF, EIGRP, RIP, RIPv2, Bgp, DEFAULT and STATIC routes, Redistribution, Route Filtering,,,,,,,,,)
Switching: Configuring and Troubleshooting of Data VLANs, Voice VLANs, Inter-VLAN routing, PAGP, LACP, Trunk, Ether-channel management features, advanced configuration.
Security Installation and configuration cisco ASA with cisco configuration professional, AAA access security with Acs server , securing the Management plane ,securing the local area network and Implementing IOS-Based IPS, IOS Firewall, Zone Based Firewall And Implementing VPN Technologies. Security Auditing Attack and Threat Analysis.
IP Over Linux System.
Trouble Shooting.
End users training.

Ahmed Aziz(Course LINUX Administration I)

Linux Admin I -II -ECSS -CND -CEH

Ahmed Aziz(Course LINUX Administration II)

Linux Admin I -II -ECSS -CND -CEH

Mohammed Gamal(Course python)

Senior System Engineer
RHCSA | CCNA | RHCE Ver.8 | Ansible

Responsible for carrying out system’s related changes & deployments including Applications upgrading and ensures the highest levels of systems & infrastructure availability
Identifying Automation opportunities & work actively with the Team in implementations via Ansible, GoCD , Github & NIFI.
Ensure collaboration with TSSI OPS teams on handling BAU tasks & performing necessary handovers
Corrects software errors in existing systems and improves performance through hardware upgrades
Developed automation framework to maintain the devops model and save operation time
Responsible for the integration between different tools in the supported solution
Confident and able to liaise and influence at all levels within Vodafone and
or relevant customer organizations
Worked on virtualized environment hosted in Google Cloud Platform (GCP)

Basel Mohamed(Course CEH&CTF)

Developer with 5 years of experience in mobile development and back-end development. I have hands-on experience efficiently coding websites and mobile applications using modern programming language, Python, Django, Dart, Flutter , PostgreSQL other using graphics tools, etc.



Diploma Instructors

  • img

    Ahmed Abdul Hameed


    (Course CCNA 200 - 301)

  • img

    Ezat Hussien


    (Course MCSA)

  • img

    Ahmed Aziz


    (Course LINUX Administration I)

  • img

    Ahmed Aziz


    (Course LINUX Administration II)

  • img

    Mohammed Gamal


    (Course python)

  • img

    Basel Mohamed


    (Course CEH&CTF)