Cyber Security And Ethicle Hacking Concepts Here.

  • Certified Ethical Hacker (CEH)

    Certified Ethical Hacker (CEH) is a professional designation for hackers that perform legitimate services for IT companies and other organizations. A CEH is hired to locate and repair application and system security vulnerabilities to preempt exploitations by black hat hackers and others with potentially illegal intentions. CEH oversight is provided by the International Council of E-Commerce Consultants (EC-Council).

  • Computer Hacking Forensic Investigator

    Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks.

Cisco Certified Internetwork Expert (Security) Course Outline

Cisco Certified Internetwork Expert (Security)

The CCIE Security Programs recognizes individuals who have the knowledge and skills to implement, maintain and support extensive Cisco Network Security Solutions using the latest industry best practices and technologies.

Course Outline




  • Basic Initialization
  • Access Management
  • Address Translation
  • ACLs
  • IP Routing
  • Object Groups
  • VLANs
  • AAA
  • VPNs
  • Filtering
  • Failover
  • Layer 2 Transparent Firewall
  • Security Contexts (Virtual Firewall)
  • Modular Policy Framework
  • Application-Aware Inspection
  • High Availability Scenarios
  • QoS Policies
  • Other Advanced Features
 

  • CBAC
  • Audit
  • Auth Proxy
  • PAM
  • Access Control
  • Performance Tuning
  • Advanced Features
 

  • IPSec LAN-to-LAN
  • SSL VPN
  • DMVPN
  • CA (PKI)
  • Remote Access VPN
  • VPN3000 Concentrator
  • VPN3000 IP Routing
  • Unity Client
  • WebVPN
  • EzVPN Hardware Client
  • XAuth, Split-tunnel, RRI, NAT-T
  • High Availability
  • QoS for VPN
  • GRE, mGRE
  • L2TP
  • PPTP
  • Advanced VPN Features
 

  • IPS 4200 Series Sensor Appliance
  • Basic Initialization
  • Sensor Configuration
  • Sensor Management
  • Promiscuous and Inline Monitoring
  • Signature Tuning
  • Custom Signatures
  • Blocking
  • TCP Resets
  • Rate Limiting
  • Signature Engines
  • IDM
  • Event Action
  • Event Monitoring
  • IOS IPS
  • PIX IDS
  • SPAN, RSPAN
  • Advanced Features
 

  • Security Protocols (RADIUS and TACACS+)
  • Cisco Secure ACS Configuration
  • Access Management (Telnet, SSH, Pwds, Priv Levels)
  • Proxy Authentication
  • Service Authentication (FTP, Telnet, HTTP, other)
  • Network Admission Control (NAC Framework solution)
  • 802.1x
  • Advanced Features
 

  • Mitigation Techniques
  • Packet Marking Techniques
  • Security RFCs (RFC1918, RFC2827, RFC2401)
  • Service Provider Security
  • Black Holes, Sink Holes
  • RTBH Filtering (Remote Triggered Black Hole)
  • Traffic Filtering using Access-lists
  • NAT
  • TCP Intercept
  • uRPF
  • CAR
  • NBAR
  • NetFlow
  • Flooding
  • Spoofing
  • Policing
  • Fragmentation
  • Sniffer Traces
  • Catalyst Management and Security
  • Traffic Control and Congestion Management
  • Catalyst Features and Advanced Configuration
  • IOS Security Features
 

  • Network Reconnaissance
  • IP Spoofing Attacks
  • MAC Spoofing Attacks
  • ARP Spoofing Attacks
  • Denial of Service (DoS)
  • Distributed Denial of Service (DDoS)
  • Man-in-the-Middle (MiM) Attacks
  • Port Redirection Attacks
  • DHCP Attacks
  • DNS Attacks
  • Fragment Attacks
  • Smurf Attacks
  • SYN Attacks
  • MAC Attacks
  • VLAN Hopping Attacks
  • Other Layer2 and Layer3 Attacks


Share:

Cisco Certified Internetwork Expert (Service Provider) Course Outline

Cisco Certified Internetwork Expert (Service Provider)


Course Outline

    Bridging and Switching

  • A. VTP, VLAN, Trunk, Spanning tree
  • B. Frame Relay, DLCI, FR multilink
  • C. ATM PVC, SVC, FR/ATM interworking
  • D. PPPoE

    IGP Routing

  • A. IS-IS, Level 1/2, Metric
  • B. OSPF, LSA, Area
  • C. Redistribution, Summarization, Filtering
  • D. Policy routing

    BGP Routing

  • A. IBGP, EBGP
  • B. BGP attributes
  • C. Confederation, Route reflector
  • D. Synchronization, Aggregation, Stability
  • E. Redistribution, Filtering
  • F. Multipath

    SP Multicast

  • A. PIM-SM, PIM-DM, SSM, PIM-BIDIR, IGMP
  • B. Auto RP, Static RP, BSR, Anycast RP
  • C. MP-BGP for multicast, MSDP

    MPLS

  • A. Label distribution, LDP/ TDP
  • B. Label filtering, Label merging, Multipath
  • C. MPLS COS
  • D. MPLS Netflow
  • E. MPLS over ATM
  • F. MPLS Traffic Engineering

    L3/L2 VPN

  • A. MPLS VPN, MP-iBGP
  • B. PE-CE routing, RIPv2, OSPF, EIGRP, Static, ISIS, EBGP
  • C. BGP Extended Community
  • D. Inter AS MPLS VPN
  • E. Carrier Supporting Carrier
  • F. VRF-Lite, VRF Select
  • G. Multicast MPLS VPN
  • H. GRE, multipoint GRE
  • I. AToM, L2TPv3
  • J. 802.QinQ

    SP QoS and Security

  • A. DSCP/EXP, TOS, NBAR
  • B. Marking, Shaping, Policing
  • C. CAR, FRTS
  • D. WRQ, CBWFQ, LLQ, PQ, CQ
  • E. RED, WRED
  • F. LFI, cRTP
  • G. RSVP
  • H. ACL, RPF, Filtering
  • I. Routing update security
  • J. Common attacks

    High Availability

  • A. NSF, GLBP
  • B. Fast reroute, Link/Node protection
  • C. HSRP, VRRP

    Management
  • A. SNMP, SYSLOG, RMON
  • B. Accounting
  • C. Netflow
  • D. NTP
Share:

Cisco Certified Internetwork Expert (Routing & Switching) Course Outline

Cisco Certified Internetwork Expert (Routing & Switching)

CCIE is a high level certification program designed to identify and serve the best of internetworking experts. The CCIE written and the lab exams assume that the students have an expert level knowledge of Cisco IOS. The CCIE labs are two days of hands on network construction and troubleshooting.
The Path to CCIE
The two requirements to become a CCIE are a passing grade on the Routing and Switching qualification exam and a passing grade on the Routing and Switching lab exam. The qualification exam is a prerequisite for attempting and scheduling the lab exam.
CISCOM offers a two month course with thrice a week class schedule, after CCNP, for the preparation of CCIE Qualifying Exam.
CISCOM highly recommends that the potential CCIE’s have an absolute minimum of 250 hours of hands on experience working with Cisco routers in complex networking scenarios, last hundred hours of hands on experience should occur no earlier than six weeks before the exam. You want this information to be fresh. CISCOM’s mission is to provide the hardware, documented labs and coaching so that you will have the skills to master these concepts. (Unless you are very bright), your practice lab whether it’s ours, yours or your employer’s should have at least eight routers with one of them having a minimum 8 serial. The lab comprises Cisco 3600, 2600, 2500 series routers, Catalyst 5000, 3550 and 2950 series switches, PIX firewall, VoIP Gateways and access servers. The latest literature and documentation for this course will also be provided.

Cisco Certified Internetwork Expert (Routing & Switching)

CCIE is a high level certification program designed to identify and serve the best of internetworking experts. The CCIE written and the lab exams assume that the students have an expert level knowledge of Cisco IOS. The CCIE labs are two days of hands on network construction and troubleshooting.
The Path to CCIE
The two requirements to become a CCIE are a passing grade on the Routing and Switching qualification exam and a passing grade on the Routing and Switching lab exam. The qualification exam is a prerequisite for attempting and scheduling the lab exam.
CISCOM offers a two month course with thrice a week class schedule, after CCNP, for the preparation of CCIE Qualifying Exam.
CISCOM highly recommends that the potential CCIE’s have an absolute minimum of 250 hours of hands on experience working with Cisco routers in complex networking scenarios, last hundred hours of hands on experience should occur no earlier than six weeks before the exam. You want this information to be fresh. CISCOM’s mission is to provide the hardware, documented labs and coaching so that you will have the skills to master these concepts. (Unless you are very bright), your practice lab whether it’s ours, yours or your employer’s should have at least eight routers with one of them having a minimum 8 serial. The lab comprises Cisco 3600, 2600, 2500 series routers, Catalyst 5000, 3550 and 2950 series switches, PIX firewall, VoIP Gateways and access servers. The latest literature and documentation for this course will also be provided.

Course Outline


CCIE Routing and Switching (Written Exam) Course Outline


  • Commands (show, debug)
  • Infrastructure (NVRAM, Flash, Memory & CPU, File system, config reg)
  • Operations (file transfers, Password recovery, SNMP, Accessing the device, Security, Security [password])
 

  • OSI Models
  • General Routing Concepts (Split horizon, Link state, difference between switching and routing, Summarization, Link state vs. Distance vector, loops, Tunneling)
  • Standards (802.x, cable specs, protocol limitations)
  • Protocol Mechanics (Windowing/ACK, fragmentation, MTU, handshaking, termination)
 

  • Transparent (IEEE/DEC Spanning tree, Translational, IRB, ACLs, MISTP)
  • SRB (SRT/LB, SRT, DLSw, RSRB, ACLs)
  • LAN Switching (Trunking, VTP, DISL, VLANS, Fast Ether Channel (FEC), CDP, CGMP)
  • Security (VACL, RACL, Private VLANS)
  • MLS
 

  • Addressing (CIDR, subnetting, ARP, NAT, HSRP)
  • Services (DNS, BOOTP, DHCP, ICMP)
  • Applications (telnet, FTP, TFTP)
  • Transport (IP fragmentation, sockets, ports)
  • ACLs
  • IPv6 (Basic)
 

  • OSPF (I -Design: areas, Virtual links, stub, NSSA, ABR/ASBR redistributions, media dependencies, external vs. internal, Summarization. II - Operation: DR, BDR, adjacencies, LSA types, link state database, SPF algorithm, authentication)
  • BGP( I -Design: Peer Groups, Route Reflectors, Confederations, Clusters, Attributes, AS. II - Operation: Route Maps, Filters, Neighbors, decision algorithm, IBGP, EBGP)
  • EIGRP (Metrics, mechanics, & design)
  • IS-IS (Metrics, mechanics, & design)
  • ACLs (distribute lists, route maps, policy routing, redistribution, route tagging)
  • DDR (dial backup)
  • IGRP
  • RIP
  • RIPv2
 

  • Fancy Queuing
  • PoS and IP precedence
  • CoS
  • Weighted RED
  • WRR/queu scheduling
  • Shaping vs. Policing (rate limiting)/CAR
  • NBAR
  • 802.1X
  • DSCP
 

  • ISDN (LAPD, BRI/PRI framing, signaling, mapping, NI1s, dialer map, interface types, B/D channel, channel bonding)
  • Frame Relay (LMIs, DLCI, PVC, framing, traffic shaping, FECN, BECN, CIR, DE, Mapping, compression)
  • ATM (PVC/SVC, AAL, SSCOP, UNI/NNI, ILMI, Cell format, QoS, RFC 1483, PNNI, mapping)
  • Physical Layer (Synchronization, SONET, T1, E1, encoding)
  • Leased Line Protocols (HDLC, PPP, Async & modems, compression)
  • PoS
  • DPT/SRP
 

  • Data Link Layer (addressing, 802.2)
  • Ethernet/FE/GE (encapsulation, CSMA/CD, topology, speed, controller errors, limitations)
  • Wireless/802.11b
 

  • Voice/Video (H323)
  • codecs
  • SS7
  • RTP
  • RTCP
  • SIP
  • MPLS
 


  • IGMP/CGMP (IGMPv1, IGMPv2, Designated Querier)
  • Addressing (Group addresses, Admin Group, Link-local L3-to-L2 Mapping)
  • Distribution Trees (Shared Trees, Source Trees)
  • PIM-SM Mechanics (Joining, Pruning PIM State, Mroute table)
  • Rendezvous Points (Auto-RP, BSR)

Share:

Cisco Certified Security Professional-(CCSP) Course Outline

Cisco Certified Security Professional-(CCSP)

Cisco Certified Security Professional (CCSP®) validates advanced knowledge and skills required to secure Cisco networks. With a CCSP certification, a network professional demonstrates the skills required to secure and manage network infrastructures to protect productivity, mitigate threats, and reduce costs. The CCSP curriculum emphasizes Cisco Router IOS (ISR) and Catalyst Switch security features, Adaptive Security Appliance (ASA), secure VPN connectivity, Intrusion Prevention Systems (IPS), Cisco Security Agent (CSA), Security Enterprise and Device Management, Network Admission Control (NAC) as well as techniques to optimize these technologies in a single, integrated network security solution. In addition, CCSP leverages the new CCNA Security certification as a prerequisite.

Course Outline



 
  • Cisco Secure ACS for Windows configuration
  • Configuring Cisco IOS Security Feature Set including IOS Firewall CBAC(Context-Based Access Control), Authentication Proxy and IPS (Intrusion Prevention System)
  • Layer 2 Security, including Cisco IBNS (Identity Based Network Services), and 802.1x Port-Based Authentication
  • Building Cisco IOS-based VPNs Using Cisco Routers and Pre-Shared Keys
  • Building Cisco IOS-based VPNs Using Cisco Routers and Certificate Authorities - Cisco IOS Remote Access Using Cisco Easy VPN
  • Cisco Security Device Manager (SDM).


 
  • Cisco Security Appliance Technology and Features
  • Cisco PIX Security Appliance and ASA Adaptive Security Appliance Families
  • Getting Started with Cisco Security Appliances
  • Translations and Connections
  • Access Control Lists and Content Filtering
  • Object Grouping
  • Authentication, Authorization, and Accounting
  • Switching and Routing
  • Modular Policy Framework
  • Configuring Security Appliance Remote Access Using Cisco Easy VPN
  • Configuring ASA for WebVPN
  • Configuring Transparent Firewall
  • Configuring Security Contexts
  • Failover
  • Cisco Security Appliance Device Manager
  • Configuring PIX Security Appliance Remote Access Using Cisco Easy VPN


 
  • Network Security and the Cisco Virtual Private Network
  • Overview of VPN and IPSec Technologies
  • Cisco Virtual Private Network 3000 Concentrator Series Hardware Overview
  • Configure Cisco VPN 3000 for Remote Access Using Pre-shared Keys
  • Configure Cisco VPN 3000 for Remote Access Using Digital Certificates
  • Configure Cisco VPN Firewall Feature for IPSec Software Client
  • Configure Cisco VPN Client Auto-initiation
  • Monitor and Administrator Cisco Virtual Private Network 3000 Remote Access Networks
  • Configure Cisco Virtual Private Network 3002 Hardware Client Remote Access
  • Configuring Cisco 3002 Hardware Client for user and unit authentication
  • Configuring Cisco 3002 Hardware Client for backup server, load balancing and reverse route
  • Configuring Cisco 3002 Hardware Client for software auto-update
  • Configuring Cisco 3002 Hardware Client for IPSec over TCP and UDP
  • Cisco VPN 3000 LAN-to-LAN with Pre-Shared Keys
  • Configure Cisco VPN Concentrator for LAN-toLAN Using NAT
  • Configure Cisco Virtual Private Network 3000 LAN-to-LAN Using Digital Certificates


 
  • Security Fundamentals
  • Intrusion Prevention Overview
  • Getting Started with the IDS Command Line Interface
  • Using IDM
  • Basic Sensor Configuration
  • Cisco Intrusion Detection System Alarms and Signatures
  • Signature Engines
  • Signature Configuration
  • Sensor Tuning
  • Alarm Monitoring and Management
  • Blocking Configuration
  • Capturing Network Traffic for Intrusion Detection Systems


  • Introduction to Network Security Policies
  • Securing the Perimeter
  • Securing the LAN Devices
  • Configuring a Cisco IOS Firewall
  • Securing Networks with Cisco IOS IPS
  • Building IPSec VPNs
Share:

Cisco Certified Voice Professional-(CCVP) Course Outline

Cisco Certified Voice Professional-(CCVP)

Cisco Certified Network Professional CCNP Voice validates advance knowledge and skills required to integrate into underlying network architectures. Furthermore, this certification validates a robust set of skills in implementing, operating, configuring, and troubleshooting a converged IP network. With a CCNP Voice certification, a network professional can create a collaboration solution that is transparent, scalable, and manageable. The CCNP Voice focuses on Cisco Unified Communications Manager (formerly Unified CallManager), quality of service (QoS), gateways, gatekeepers, IP phones, voice applications, and utilities on Cisco routers and Cisco Catalyst switches. Additionally, the integration and troubleshooting of Cisco Unified Communications applications are now covered in the CCNP Voice, specifically the Cisco Unity Connection and Cisco Unified Presence applications.

Course Outline

642-436

1-CVOICE Cisco Voice over IP (CVOICE v6.0)

Cisco Voice over IP (CVOICE) v6.0 provides an understanding of converged voice and data networks and also the challenges faced by the various network technologies. The course also provides network administrators and network engineers with the knowledge and skills required to integrate gateways and gatekeepers into an enterprise VoIP network. This course is one of several courses in the Cisco CCVP track that addresses design, planning, and deployment practices and provides comprehensive hands-on experience in configuration and deployment of VoIP networks.

642-446 CIPT1

2-Implementing Cisco Unified Communications Manager Part 1 (CIPT1 v6.0)

Implementing Cisco Unified Communications IP Telephony Part 1 (CIPT1) v6.0 prepares you for installing and configuring, a Cisco Unified Communications Manager solution in a single site. This course focuses primarily on Cisco Unified Communications Manager Release 6.0, the call routing and signaling component for the Cisco Unified Communications solution. This course includes lab activities in which you will perform post-installation tasks, configure Cisco Unified Communications Manager and switches, implement H.323 gateways; and build dial plans to place on-net and off-net phone calls. You will also implement media resources as well as numerous user telephone features.

642-642

3-QoS Quality of Service (QoS)

The Implementing Cisco Quality of Service (QoS) v2.2 course provides students with in-depth knowledge of IP QoS requirements, conceptual models using Differentiated Services (DiffServ), Integrated Services (IntServ) and Best Effort (over provisioning), and the implementation of IP QoS on Cisco IOS switch and router platforms.

642-456

4-CIPT2 Implementing Cisco Unified Communications Manager Part 2 (CIPT2 v6.0)

Implementing Cisco Unified Communications IP Telephony Part 2 (CIPT2) v6.0 prepares you for installing and configuring, a Cisco Unified Communications Manager solution in a multisite environment. This course focuses on Cisco Unified CallManager Release 6.0, the call routing and signaling component for the Cisco Unified Communications solution. It also includes H.323 and Media Gateway Control Protocol (MGCP) gateway implementation, the use of a Cisco Unified Border Element, and configuration of Survivable Remote Site Telephony (SRST), different mobility features, and voice security. This course includes lab activities in which you will apply a dialplan for a multisite environment, configure survivability for remote sites during WAN failure and implement solutions to reduce bandwidth requirements in the IP WAN. You will also enable Call Admission Control (CAC) and automated alternate routing (AAR), a feature that allows rerouting of calls over the public switched telephone network (PSTN) in case of no available bandwidth. There are labs for implementing device mobility, extension mobility, Cisco Unified Mobility, and voice security.
642-426

5-TUC Troubleshooting Cisco Unified Communications Systems (TUC v1.0)

Troubleshooting Cisco Unified Communications Systems (TUC) v1.0 equips network professionals with the knowledge and skills required to troubleshoot Unified Communications Systems / solutions in Enterprise, Mid-Market, and Commercial deployments. TUC teaches troubleshooting methodology, triage, resources, tools and fixes at the integrated System / Solution level, and for components (such as Cisco Unified Call Manager, Cisco Unity, videoconferencing, and infrastructure).
Share:

Cisco Certified Internetwork Professional-(CCIP) Course Outline

Cisco Certified Internetwork Professional-(CCIP)

Cisco Certified Internetwork Professional (CCIP®) validates advanced knowledge and skills required to manage service provider infrastructures. With a CCIP certification, a network professional working in a service provider organization demonstrates competencies in infrastructure IP networking solutions. The CCIP curriculum includes IP routing, IP QoS, BGP, and MPLS.

Course Outline

1-Building Scalable Cisco Internetworks (BSCI) v3.0

    Course Introduction to Routing in an Enterprise Networks
    Configuring EIGRP
    Configuring OSPF
    The IS-IS Protocol
    Manipulating Routing Updates
    Implementing BGP
    Implementing Multicast
    Implementing the Basics of IPv6

2-Implementing Cisco Quality of Service (QOS) v2.1

    Module 1: Introduction to IP QoS
    Module 2: The Building Blocks of IP QoS
    Module 3: Introduction to Modular QoS CLI and Auto-QoS
    Module 4: Classification and MarkingModule
    Module 5: Congestion Management
    Module 6: Congestion Avoidance
    Module 7: Traffic Policing and Shaping
    Module 8: Link Efficiency Mechanisms
    Module 9: QoS Best Practices

3-Configuring BGP on Cisco Routers (BGP) v3.2

    BGP Overview
    BGP Transit Autonomous Systems
    Route Selection Using Policy Controls
    Route Selection Using Attributes
    Customer to Provider Connectivity with BGP
    Scaling Service Provider Networks
    Optimizing BGP Scalability

4-Implementing Cisco MPLS (MPLS) v2.1

    MPLS Concepts
    MPLS Label Assignment and Distribution Frame- Mode / Cell-Mode
    MPLS Implementation on Cisco IOS Platforms
    MPLS Virtual Private Networks Technology
    MPLS Virtual Private Networks Implementation
    MPLS Virtual Private Networks Advanced Features
Share:

Cisco Certified Network Professional-(CCNP) Course Outline

Cisco Certified Network Professional-(CCNP)

Equipped with a CCNP certification, you are ready to manage today's complex networks - whether its working with core technologies, optimizing infrastructure, or keeping key applications secure and performing efficiently.

Course Outline CCNP

ROUTE: 300-101

1-Implement an EIGRP based solution, given a network design and a set of requirements

    Determine network resources needed for implementing EIGRP on a network
    Create an EIGRP implementation plan
    Create an EIGRP verification plan
    Configure EIGRP routing
    Verify EIGRP solution was implemented properly using show and debug commands
    Document results of EIGRP implementation and verification

2-Implement a multi-area OSPF Network , given a network design and a set of requirements

    Determine network resources needed for implementing OSPF on a network
    Create an OSPF implementation plan
    Create an OSPF verification plan
    Configure OSPF routing
    Verify OSPF solution was implemented properly using show and debug commands
    Document results of OSPF implementation and verification plan
   
3-Implementan eBGP based solution, given a networkand a set of requirements

    Determine network resources needed for implementing eBGP on a network
    Create an eBGP implementation plan
    Create an eBGP verification plan
    Configure eBGP routing
    Verify eBGP solution was implemented properly using show and debug commands
    Document results of eBGP implementation and verification plan

4-Implement an IPv6 based solution, given a network design and a set of requirements

    Determine network resources needed for implementing IPv6 on a network
    Create an IPv6 implementation plan
    Create an IPv6 verification plan
    Configure IPv6 routing
    Configure IPv6 interoperation with IPv4
    Verify IPv6 solution was implemented properly using show and debug commands
    Document results of IPv6 implementation and verification plan
   
5-Implement an IPv4 or IPv6 based redistribution, given a network design and a set of requirements

    Create a redistribution implementation plan based upon the results of the redistribution analysis
    Create a redistribution verification plan
    Configure a redistribution solution
    Verify that a redistribution was implemented
    Document results of a redistribution implementation and verification plan
    Identify the differences between implementing an IPv4 and IPv6 redistribution solution

6-Implement Layer 3 Path Control Solution

    Create a Layer 3 path control implementation plan based upon the results of the redistribution analysis
    Create a Layer 3 path control verification plan
    Configure Layer 3 path control
    Verify that a Layer 3 path control was implemented
    Document results of a Layer 3 path control implementation and verification plan
    Implement basic teleworker and branch services
    Describe broadband technologies
    Configure basic broadband connections
    Describe basic VPN technologies
    Configure GRE
    Describe branch access technologies

SWITCH 300-115
7-Implement VLAN based solution, given a network design and a set of requirements
   
    Determine network resources needed for implementing a VLAN based solution on a network
    Create a VLAN based implementation plan
    Create a VLAN based verification plan
    Configure switch-to-switch connectivity for the VLAN based solution
    Configure loop prevention for the VLAN based solution
    Configure Access Ports for the VLAN based solution
    erify the VLAN based solution was implemented properly using show and debug commands
    Document results of VLAN implementation and verification

8-Implement a Security Extension of a Layer 2 solution, given a network design and a set of requirements

    Determine network resources needed for implementing a Security solution
    Create a implementation plan for the Security solution
    Create a verification plan for the Security solution
    Configure port security features
    Configure general switch security features
    Configure private VLANs Configure VACL and PACL
    Verify the Security based solution was implemented properly using show and debug commands
    Document results of Security implementation and verification

9-Implement Switch based Layer 3 services, given a network design and a set of requirements

    Determine network resources needed for implementing a Switch based Layer 3 solution
    Create an implementation plan for the Switch based Layer 3 solution
    Create a verification plan for the Switch based Layer 3 solution
    Configure routing interfaces Configure Layer 3 Security
    Verify the Switch based Layer 3 solution was implemented properly using show and debug commands
    Document results of Switch based Layer 3 implementation and verification

10-Prepare infrastructure to support advanced services

    Implement a Wireless Extension of a Layer 2 solution
    Implement a VoIP support solution
    Implement video support solution

11-Implement High Availability, given a network design and a set of requirements

    Determine network resources needed for implementing High Availability on a network
    Create a High Availability implementation plan
    Create a High Availability verification plan
    Implement first hop redundancy protocols
    Implement switch supervisor redundancy
    Verify High Availability solution was implemented properly using show and debug commands
    Document results of High Availability implementation and verification

TSHOOT: 300-135

12-Maintain and monitor network performance

    Develop a plan to monitor and manage a network
    Perform network monitoring using IOS tools
    Perform routine IOS device maintenance
    Isolate sub-optimal internetwork operation at the correctly defined OSI Model layer


13-Troubleshoot Multi Protocol system networks

    Troubleshoot EIGRP
    Troubleshoot OSPF
    Troubleshoot eBGP
    Troubleshoot routing redistribution solution
    Troubleshoot a DHCP client and server solution
    Troubleshoot NAT
    Troubleshoot first hop redundancy protocols
    Troubleshoot IPv6 routing
    Troubleshoot IPv6 and IPv4 interoperability
    Troubleshoot switch-to-switch connectivity for the VLAN based solution
    Troubleshoot loop prevention for the VLAN based solution
    Troubleshoot Access Ports for the VLAN based solution
    Troubleshoot private VLANS
    Troubleshoot port security
    Troubleshoot general switch security
    Troubleshoot VACL and PACL
    Troubleshoot switch virtual interfaces (SVIs)
    Troubleshoot switch supervisor redundancy
    Troubleshoot switch support of advanced services (i.e., Wireless, VOIP and Video)
    Troubleshoot a VoIP support solution
    Troubleshoot a video support solution
    Troubleshoot Layer 3 Security
    Troubleshoot issues related to ACLs used to secure access to Cisco routers
    Troubleshoot configuration issues related to accessing the AAA server for authentication purposes
    Troubleshoot security issues related to IOS services (i.e.,finger, NTP, HTTP, FTP, RCP etc.)
Share:

Recent Posts

Menu

  • CEH
  • CHFI
  • Computer Security
  • Network Security

Pages

Help

Need our help to just follow or mail our. Contact me with details about the theme customization you need.