Cyber Security And Ethicle Hacking Concepts Here.

  • Certified Ethical Hacker (CEH)

    Certified Ethical Hacker (CEH) is a professional designation for hackers that perform legitimate services for IT companies and other organizations. A CEH is hired to locate and repair application and system security vulnerabilities to preempt exploitations by black hat hackers and others with potentially illegal intentions. CEH oversight is provided by the International Council of E-Commerce Consultants (EC-Council).

  • Computer Hacking Forensic Investigator

    Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks.

Cisco Certified Internetwork Expert (Security) Course Outline

Cisco Certified Internetwork Expert (Security)

The CCIE Security Programs recognizes individuals who have the knowledge and skills to implement, maintain and support extensive Cisco Network Security Solutions using the latest industry best practices and technologies.

Course Outline




  • Basic Initialization
  • Access Management
  • Address Translation
  • ACLs
  • IP Routing
  • Object Groups
  • VLANs
  • AAA
  • VPNs
  • Filtering
  • Failover
  • Layer 2 Transparent Firewall
  • Security Contexts (Virtual Firewall)
  • Modular Policy Framework
  • Application-Aware Inspection
  • High Availability Scenarios
  • QoS Policies
  • Other Advanced Features
 

  • CBAC
  • Audit
  • Auth Proxy
  • PAM
  • Access Control
  • Performance Tuning
  • Advanced Features
 

  • IPSec LAN-to-LAN
  • SSL VPN
  • DMVPN
  • CA (PKI)
  • Remote Access VPN
  • VPN3000 Concentrator
  • VPN3000 IP Routing
  • Unity Client
  • WebVPN
  • EzVPN Hardware Client
  • XAuth, Split-tunnel, RRI, NAT-T
  • High Availability
  • QoS for VPN
  • GRE, mGRE
  • L2TP
  • PPTP
  • Advanced VPN Features
 

  • IPS 4200 Series Sensor Appliance
  • Basic Initialization
  • Sensor Configuration
  • Sensor Management
  • Promiscuous and Inline Monitoring
  • Signature Tuning
  • Custom Signatures
  • Blocking
  • TCP Resets
  • Rate Limiting
  • Signature Engines
  • IDM
  • Event Action
  • Event Monitoring
  • IOS IPS
  • PIX IDS
  • SPAN, RSPAN
  • Advanced Features
 

  • Security Protocols (RADIUS and TACACS+)
  • Cisco Secure ACS Configuration
  • Access Management (Telnet, SSH, Pwds, Priv Levels)
  • Proxy Authentication
  • Service Authentication (FTP, Telnet, HTTP, other)
  • Network Admission Control (NAC Framework solution)
  • 802.1x
  • Advanced Features
 

  • Mitigation Techniques
  • Packet Marking Techniques
  • Security RFCs (RFC1918, RFC2827, RFC2401)
  • Service Provider Security
  • Black Holes, Sink Holes
  • RTBH Filtering (Remote Triggered Black Hole)
  • Traffic Filtering using Access-lists
  • NAT
  • TCP Intercept
  • uRPF
  • CAR
  • NBAR
  • NetFlow
  • Flooding
  • Spoofing
  • Policing
  • Fragmentation
  • Sniffer Traces
  • Catalyst Management and Security
  • Traffic Control and Congestion Management
  • Catalyst Features and Advanced Configuration
  • IOS Security Features
 

  • Network Reconnaissance
  • IP Spoofing Attacks
  • MAC Spoofing Attacks
  • ARP Spoofing Attacks
  • Denial of Service (DoS)
  • Distributed Denial of Service (DDoS)
  • Man-in-the-Middle (MiM) Attacks
  • Port Redirection Attacks
  • DHCP Attacks
  • DNS Attacks
  • Fragment Attacks
  • Smurf Attacks
  • SYN Attacks
  • MAC Attacks
  • VLAN Hopping Attacks
  • Other Layer2 and Layer3 Attacks


Share:

Cisco Certified Internetwork Expert (Service Provider) Course Outline

Cisco Certified Internetwork Expert (Service Provider)


Course Outline

    Bridging and Switching

  • A. VTP, VLAN, Trunk, Spanning tree
  • B. Frame Relay, DLCI, FR multilink
  • C. ATM PVC, SVC, FR/ATM interworking
  • D. PPPoE

    IGP Routing

  • A. IS-IS, Level 1/2, Metric
  • B. OSPF, LSA, Area
  • C. Redistribution, Summarization, Filtering
  • D. Policy routing

    BGP Routing

  • A. IBGP, EBGP
  • B. BGP attributes
  • C. Confederation, Route reflector
  • D. Synchronization, Aggregation, Stability
  • E. Redistribution, Filtering
  • F. Multipath

    SP Multicast

  • A. PIM-SM, PIM-DM, SSM, PIM-BIDIR, IGMP
  • B. Auto RP, Static RP, BSR, Anycast RP
  • C. MP-BGP for multicast, MSDP

    MPLS

  • A. Label distribution, LDP/ TDP
  • B. Label filtering, Label merging, Multipath
  • C. MPLS COS
  • D. MPLS Netflow
  • E. MPLS over ATM
  • F. MPLS Traffic Engineering

    L3/L2 VPN

  • A. MPLS VPN, MP-iBGP
  • B. PE-CE routing, RIPv2, OSPF, EIGRP, Static, ISIS, EBGP
  • C. BGP Extended Community
  • D. Inter AS MPLS VPN
  • E. Carrier Supporting Carrier
  • F. VRF-Lite, VRF Select
  • G. Multicast MPLS VPN
  • H. GRE, multipoint GRE
  • I. AToM, L2TPv3
  • J. 802.QinQ

    SP QoS and Security

  • A. DSCP/EXP, TOS, NBAR
  • B. Marking, Shaping, Policing
  • C. CAR, FRTS
  • D. WRQ, CBWFQ, LLQ, PQ, CQ
  • E. RED, WRED
  • F. LFI, cRTP
  • G. RSVP
  • H. ACL, RPF, Filtering
  • I. Routing update security
  • J. Common attacks

    High Availability

  • A. NSF, GLBP
  • B. Fast reroute, Link/Node protection
  • C. HSRP, VRRP

    Management
  • A. SNMP, SYSLOG, RMON
  • B. Accounting
  • C. Netflow
  • D. NTP
Share:

Cisco Certified Internetwork Expert (Routing & Switching) Course Outline

Cisco Certified Internetwork Expert (Routing & Switching)

CCIE is a high level certification program designed to identify and serve the best of internetworking experts. The CCIE written and the lab exams assume that the students have an expert level knowledge of Cisco IOS. The CCIE labs are two days of hands on network construction and troubleshooting.
The Path to CCIE
The two requirements to become a CCIE are a passing grade on the Routing and Switching qualification exam and a passing grade on the Routing and Switching lab exam. The qualification exam is a prerequisite for attempting and scheduling the lab exam.
CISCOM offers a two month course with thrice a week class schedule, after CCNP, for the preparation of CCIE Qualifying Exam.
CISCOM highly recommends that the potential CCIE’s have an absolute minimum of 250 hours of hands on experience working with Cisco routers in complex networking scenarios, last hundred hours of hands on experience should occur no earlier than six weeks before the exam. You want this information to be fresh. CISCOM’s mission is to provide the hardware, documented labs and coaching so that you will have the skills to master these concepts. (Unless you are very bright), your practice lab whether it’s ours, yours or your employer’s should have at least eight routers with one of them having a minimum 8 serial. The lab comprises Cisco 3600, 2600, 2500 series routers, Catalyst 5000, 3550 and 2950 series switches, PIX firewall, VoIP Gateways and access servers. The latest literature and documentation for this course will also be provided.

Cisco Certified Internetwork Expert (Routing & Switching)

CCIE is a high level certification program designed to identify and serve the best of internetworking experts. The CCIE written and the lab exams assume that the students have an expert level knowledge of Cisco IOS. The CCIE labs are two days of hands on network construction and troubleshooting.
The Path to CCIE
The two requirements to become a CCIE are a passing grade on the Routing and Switching qualification exam and a passing grade on the Routing and Switching lab exam. The qualification exam is a prerequisite for attempting and scheduling the lab exam.
CISCOM offers a two month course with thrice a week class schedule, after CCNP, for the preparation of CCIE Qualifying Exam.
CISCOM highly recommends that the potential CCIE’s have an absolute minimum of 250 hours of hands on experience working with Cisco routers in complex networking scenarios, last hundred hours of hands on experience should occur no earlier than six weeks before the exam. You want this information to be fresh. CISCOM’s mission is to provide the hardware, documented labs and coaching so that you will have the skills to master these concepts. (Unless you are very bright), your practice lab whether it’s ours, yours or your employer’s should have at least eight routers with one of them having a minimum 8 serial. The lab comprises Cisco 3600, 2600, 2500 series routers, Catalyst 5000, 3550 and 2950 series switches, PIX firewall, VoIP Gateways and access servers. The latest literature and documentation for this course will also be provided.

Course Outline


CCIE Routing and Switching (Written Exam) Course Outline


  • Commands (show, debug)
  • Infrastructure (NVRAM, Flash, Memory & CPU, File system, config reg)
  • Operations (file transfers, Password recovery, SNMP, Accessing the device, Security, Security [password])
 

  • OSI Models
  • General Routing Concepts (Split horizon, Link state, difference between switching and routing, Summarization, Link state vs. Distance vector, loops, Tunneling)
  • Standards (802.x, cable specs, protocol limitations)
  • Protocol Mechanics (Windowing/ACK, fragmentation, MTU, handshaking, termination)
 

  • Transparent (IEEE/DEC Spanning tree, Translational, IRB, ACLs, MISTP)
  • SRB (SRT/LB, SRT, DLSw, RSRB, ACLs)
  • LAN Switching (Trunking, VTP, DISL, VLANS, Fast Ether Channel (FEC), CDP, CGMP)
  • Security (VACL, RACL, Private VLANS)
  • MLS
 

  • Addressing (CIDR, subnetting, ARP, NAT, HSRP)
  • Services (DNS, BOOTP, DHCP, ICMP)
  • Applications (telnet, FTP, TFTP)
  • Transport (IP fragmentation, sockets, ports)
  • ACLs
  • IPv6 (Basic)
 

  • OSPF (I -Design: areas, Virtual links, stub, NSSA, ABR/ASBR redistributions, media dependencies, external vs. internal, Summarization. II - Operation: DR, BDR, adjacencies, LSA types, link state database, SPF algorithm, authentication)
  • BGP( I -Design: Peer Groups, Route Reflectors, Confederations, Clusters, Attributes, AS. II - Operation: Route Maps, Filters, Neighbors, decision algorithm, IBGP, EBGP)
  • EIGRP (Metrics, mechanics, & design)
  • IS-IS (Metrics, mechanics, & design)
  • ACLs (distribute lists, route maps, policy routing, redistribution, route tagging)
  • DDR (dial backup)
  • IGRP
  • RIP
  • RIPv2
 

  • Fancy Queuing
  • PoS and IP precedence
  • CoS
  • Weighted RED
  • WRR/queu scheduling
  • Shaping vs. Policing (rate limiting)/CAR
  • NBAR
  • 802.1X
  • DSCP
 

  • ISDN (LAPD, BRI/PRI framing, signaling, mapping, NI1s, dialer map, interface types, B/D channel, channel bonding)
  • Frame Relay (LMIs, DLCI, PVC, framing, traffic shaping, FECN, BECN, CIR, DE, Mapping, compression)
  • ATM (PVC/SVC, AAL, SSCOP, UNI/NNI, ILMI, Cell format, QoS, RFC 1483, PNNI, mapping)
  • Physical Layer (Synchronization, SONET, T1, E1, encoding)
  • Leased Line Protocols (HDLC, PPP, Async & modems, compression)
  • PoS
  • DPT/SRP
 

  • Data Link Layer (addressing, 802.2)
  • Ethernet/FE/GE (encapsulation, CSMA/CD, topology, speed, controller errors, limitations)
  • Wireless/802.11b
 

  • Voice/Video (H323)
  • codecs
  • SS7
  • RTP
  • RTCP
  • SIP
  • MPLS
 


  • IGMP/CGMP (IGMPv1, IGMPv2, Designated Querier)
  • Addressing (Group addresses, Admin Group, Link-local L3-to-L2 Mapping)
  • Distribution Trees (Shared Trees, Source Trees)
  • PIM-SM Mechanics (Joining, Pruning PIM State, Mroute table)
  • Rendezvous Points (Auto-RP, BSR)

Share:

Cisco Certified Security Professional-(CCSP) Course Outline

Cisco Certified Security Professional-(CCSP)

Cisco Certified Security Professional (CCSP®) validates advanced knowledge and skills required to secure Cisco networks. With a CCSP certification, a network professional demonstrates the skills required to secure and manage network infrastructures to protect productivity, mitigate threats, and reduce costs. The CCSP curriculum emphasizes Cisco Router IOS (ISR) and Catalyst Switch security features, Adaptive Security Appliance (ASA), secure VPN connectivity, Intrusion Prevention Systems (IPS), Cisco Security Agent (CSA), Security Enterprise and Device Management, Network Admission Control (NAC) as well as techniques to optimize these technologies in a single, integrated network security solution. In addition, CCSP leverages the new CCNA Security certification as a prerequisite.

Course Outline



 
  • Cisco Secure ACS for Windows configuration
  • Configuring Cisco IOS Security Feature Set including IOS Firewall CBAC(Context-Based Access Control), Authentication Proxy and IPS (Intrusion Prevention System)
  • Layer 2 Security, including Cisco IBNS (Identity Based Network Services), and 802.1x Port-Based Authentication
  • Building Cisco IOS-based VPNs Using Cisco Routers and Pre-Shared Keys
  • Building Cisco IOS-based VPNs Using Cisco Routers and Certificate Authorities - Cisco IOS Remote Access Using Cisco Easy VPN
  • Cisco Security Device Manager (SDM).


 
  • Cisco Security Appliance Technology and Features
  • Cisco PIX Security Appliance and ASA Adaptive Security Appliance Families
  • Getting Started with Cisco Security Appliances
  • Translations and Connections
  • Access Control Lists and Content Filtering
  • Object Grouping
  • Authentication, Authorization, and Accounting
  • Switching and Routing
  • Modular Policy Framework
  • Configuring Security Appliance Remote Access Using Cisco Easy VPN
  • Configuring ASA for WebVPN
  • Configuring Transparent Firewall
  • Configuring Security Contexts
  • Failover
  • Cisco Security Appliance Device Manager
  • Configuring PIX Security Appliance Remote Access Using Cisco Easy VPN


 
  • Network Security and the Cisco Virtual Private Network
  • Overview of VPN and IPSec Technologies
  • Cisco Virtual Private Network 3000 Concentrator Series Hardware Overview
  • Configure Cisco VPN 3000 for Remote Access Using Pre-shared Keys
  • Configure Cisco VPN 3000 for Remote Access Using Digital Certificates
  • Configure Cisco VPN Firewall Feature for IPSec Software Client
  • Configure Cisco VPN Client Auto-initiation
  • Monitor and Administrator Cisco Virtual Private Network 3000 Remote Access Networks
  • Configure Cisco Virtual Private Network 3002 Hardware Client Remote Access
  • Configuring Cisco 3002 Hardware Client for user and unit authentication
  • Configuring Cisco 3002 Hardware Client for backup server, load balancing and reverse route
  • Configuring Cisco 3002 Hardware Client for software auto-update
  • Configuring Cisco 3002 Hardware Client for IPSec over TCP and UDP
  • Cisco VPN 3000 LAN-to-LAN with Pre-Shared Keys
  • Configure Cisco VPN Concentrator for LAN-toLAN Using NAT
  • Configure Cisco Virtual Private Network 3000 LAN-to-LAN Using Digital Certificates


 
  • Security Fundamentals
  • Intrusion Prevention Overview
  • Getting Started with the IDS Command Line Interface
  • Using IDM
  • Basic Sensor Configuration
  • Cisco Intrusion Detection System Alarms and Signatures
  • Signature Engines
  • Signature Configuration
  • Sensor Tuning
  • Alarm Monitoring and Management
  • Blocking Configuration
  • Capturing Network Traffic for Intrusion Detection Systems


  • Introduction to Network Security Policies
  • Securing the Perimeter
  • Securing the LAN Devices
  • Configuring a Cisco IOS Firewall
  • Securing Networks with Cisco IOS IPS
  • Building IPSec VPNs
Share:

Cisco Certified Voice Professional-(CCVP) Course Outline

Cisco Certified Voice Professional-(CCVP)

Cisco Certified Network Professional CCNP Voice validates advance knowledge and skills required to integrate into underlying network architectures. Furthermore, this certification validates a robust set of skills in implementing, operating, configuring, and troubleshooting a converged IP network. With a CCNP Voice certification, a network professional can create a collaboration solution that is transparent, scalable, and manageable. The CCNP Voice focuses on Cisco Unified Communications Manager (formerly Unified CallManager), quality of service (QoS), gateways, gatekeepers, IP phones, voice applications, and utilities on Cisco routers and Cisco Catalyst switches. Additionally, the integration and troubleshooting of Cisco Unified Communications applications are now covered in the CCNP Voice, specifically the Cisco Unity Connection and Cisco Unified Presence applications.

Course Outline

642-436

1-CVOICE Cisco Voice over IP (CVOICE v6.0)

Cisco Voice over IP (CVOICE) v6.0 provides an understanding of converged voice and data networks and also the challenges faced by the various network technologies. The course also provides network administrators and network engineers with the knowledge and skills required to integrate gateways and gatekeepers into an enterprise VoIP network. This course is one of several courses in the Cisco CCVP track that addresses design, planning, and deployment practices and provides comprehensive hands-on experience in configuration and deployment of VoIP networks.

642-446 CIPT1

2-Implementing Cisco Unified Communications Manager Part 1 (CIPT1 v6.0)

Implementing Cisco Unified Communications IP Telephony Part 1 (CIPT1) v6.0 prepares you for installing and configuring, a Cisco Unified Communications Manager solution in a single site. This course focuses primarily on Cisco Unified Communications Manager Release 6.0, the call routing and signaling component for the Cisco Unified Communications solution. This course includes lab activities in which you will perform post-installation tasks, configure Cisco Unified Communications Manager and switches, implement H.323 gateways; and build dial plans to place on-net and off-net phone calls. You will also implement media resources as well as numerous user telephone features.

642-642

3-QoS Quality of Service (QoS)

The Implementing Cisco Quality of Service (QoS) v2.2 course provides students with in-depth knowledge of IP QoS requirements, conceptual models using Differentiated Services (DiffServ), Integrated Services (IntServ) and Best Effort (over provisioning), and the implementation of IP QoS on Cisco IOS switch and router platforms.

642-456

4-CIPT2 Implementing Cisco Unified Communications Manager Part 2 (CIPT2 v6.0)

Implementing Cisco Unified Communications IP Telephony Part 2 (CIPT2) v6.0 prepares you for installing and configuring, a Cisco Unified Communications Manager solution in a multisite environment. This course focuses on Cisco Unified CallManager Release 6.0, the call routing and signaling component for the Cisco Unified Communications solution. It also includes H.323 and Media Gateway Control Protocol (MGCP) gateway implementation, the use of a Cisco Unified Border Element, and configuration of Survivable Remote Site Telephony (SRST), different mobility features, and voice security. This course includes lab activities in which you will apply a dialplan for a multisite environment, configure survivability for remote sites during WAN failure and implement solutions to reduce bandwidth requirements in the IP WAN. You will also enable Call Admission Control (CAC) and automated alternate routing (AAR), a feature that allows rerouting of calls over the public switched telephone network (PSTN) in case of no available bandwidth. There are labs for implementing device mobility, extension mobility, Cisco Unified Mobility, and voice security.
642-426

5-TUC Troubleshooting Cisco Unified Communications Systems (TUC v1.0)

Troubleshooting Cisco Unified Communications Systems (TUC) v1.0 equips network professionals with the knowledge and skills required to troubleshoot Unified Communications Systems / solutions in Enterprise, Mid-Market, and Commercial deployments. TUC teaches troubleshooting methodology, triage, resources, tools and fixes at the integrated System / Solution level, and for components (such as Cisco Unified Call Manager, Cisco Unity, videoconferencing, and infrastructure).
Share:

Cisco Certified Internetwork Professional-(CCIP) Course Outline

Cisco Certified Internetwork Professional-(CCIP)

Cisco Certified Internetwork Professional (CCIP®) validates advanced knowledge and skills required to manage service provider infrastructures. With a CCIP certification, a network professional working in a service provider organization demonstrates competencies in infrastructure IP networking solutions. The CCIP curriculum includes IP routing, IP QoS, BGP, and MPLS.

Course Outline

1-Building Scalable Cisco Internetworks (BSCI) v3.0

    Course Introduction to Routing in an Enterprise Networks
    Configuring EIGRP
    Configuring OSPF
    The IS-IS Protocol
    Manipulating Routing Updates
    Implementing BGP
    Implementing Multicast
    Implementing the Basics of IPv6

2-Implementing Cisco Quality of Service (QOS) v2.1

    Module 1: Introduction to IP QoS
    Module 2: The Building Blocks of IP QoS
    Module 3: Introduction to Modular QoS CLI and Auto-QoS
    Module 4: Classification and MarkingModule
    Module 5: Congestion Management
    Module 6: Congestion Avoidance
    Module 7: Traffic Policing and Shaping
    Module 8: Link Efficiency Mechanisms
    Module 9: QoS Best Practices

3-Configuring BGP on Cisco Routers (BGP) v3.2

    BGP Overview
    BGP Transit Autonomous Systems
    Route Selection Using Policy Controls
    Route Selection Using Attributes
    Customer to Provider Connectivity with BGP
    Scaling Service Provider Networks
    Optimizing BGP Scalability

4-Implementing Cisco MPLS (MPLS) v2.1

    MPLS Concepts
    MPLS Label Assignment and Distribution Frame- Mode / Cell-Mode
    MPLS Implementation on Cisco IOS Platforms
    MPLS Virtual Private Networks Technology
    MPLS Virtual Private Networks Implementation
    MPLS Virtual Private Networks Advanced Features
Share:

Cisco Certified Network Professional-(CCNP) Course Outline

Cisco Certified Network Professional-(CCNP)

Equipped with a CCNP certification, you are ready to manage today's complex networks - whether its working with core technologies, optimizing infrastructure, or keeping key applications secure and performing efficiently.

Course Outline CCNP

ROUTE: 300-101

1-Implement an EIGRP based solution, given a network design and a set of requirements

    Determine network resources needed for implementing EIGRP on a network
    Create an EIGRP implementation plan
    Create an EIGRP verification plan
    Configure EIGRP routing
    Verify EIGRP solution was implemented properly using show and debug commands
    Document results of EIGRP implementation and verification

2-Implement a multi-area OSPF Network , given a network design and a set of requirements

    Determine network resources needed for implementing OSPF on a network
    Create an OSPF implementation plan
    Create an OSPF verification plan
    Configure OSPF routing
    Verify OSPF solution was implemented properly using show and debug commands
    Document results of OSPF implementation and verification plan
   
3-Implementan eBGP based solution, given a networkand a set of requirements

    Determine network resources needed for implementing eBGP on a network
    Create an eBGP implementation plan
    Create an eBGP verification plan
    Configure eBGP routing
    Verify eBGP solution was implemented properly using show and debug commands
    Document results of eBGP implementation and verification plan

4-Implement an IPv6 based solution, given a network design and a set of requirements

    Determine network resources needed for implementing IPv6 on a network
    Create an IPv6 implementation plan
    Create an IPv6 verification plan
    Configure IPv6 routing
    Configure IPv6 interoperation with IPv4
    Verify IPv6 solution was implemented properly using show and debug commands
    Document results of IPv6 implementation and verification plan
   
5-Implement an IPv4 or IPv6 based redistribution, given a network design and a set of requirements

    Create a redistribution implementation plan based upon the results of the redistribution analysis
    Create a redistribution verification plan
    Configure a redistribution solution
    Verify that a redistribution was implemented
    Document results of a redistribution implementation and verification plan
    Identify the differences between implementing an IPv4 and IPv6 redistribution solution

6-Implement Layer 3 Path Control Solution

    Create a Layer 3 path control implementation plan based upon the results of the redistribution analysis
    Create a Layer 3 path control verification plan
    Configure Layer 3 path control
    Verify that a Layer 3 path control was implemented
    Document results of a Layer 3 path control implementation and verification plan
    Implement basic teleworker and branch services
    Describe broadband technologies
    Configure basic broadband connections
    Describe basic VPN technologies
    Configure GRE
    Describe branch access technologies

SWITCH 300-115
7-Implement VLAN based solution, given a network design and a set of requirements
   
    Determine network resources needed for implementing a VLAN based solution on a network
    Create a VLAN based implementation plan
    Create a VLAN based verification plan
    Configure switch-to-switch connectivity for the VLAN based solution
    Configure loop prevention for the VLAN based solution
    Configure Access Ports for the VLAN based solution
    erify the VLAN based solution was implemented properly using show and debug commands
    Document results of VLAN implementation and verification

8-Implement a Security Extension of a Layer 2 solution, given a network design and a set of requirements

    Determine network resources needed for implementing a Security solution
    Create a implementation plan for the Security solution
    Create a verification plan for the Security solution
    Configure port security features
    Configure general switch security features
    Configure private VLANs Configure VACL and PACL
    Verify the Security based solution was implemented properly using show and debug commands
    Document results of Security implementation and verification

9-Implement Switch based Layer 3 services, given a network design and a set of requirements

    Determine network resources needed for implementing a Switch based Layer 3 solution
    Create an implementation plan for the Switch based Layer 3 solution
    Create a verification plan for the Switch based Layer 3 solution
    Configure routing interfaces Configure Layer 3 Security
    Verify the Switch based Layer 3 solution was implemented properly using show and debug commands
    Document results of Switch based Layer 3 implementation and verification

10-Prepare infrastructure to support advanced services

    Implement a Wireless Extension of a Layer 2 solution
    Implement a VoIP support solution
    Implement video support solution

11-Implement High Availability, given a network design and a set of requirements

    Determine network resources needed for implementing High Availability on a network
    Create a High Availability implementation plan
    Create a High Availability verification plan
    Implement first hop redundancy protocols
    Implement switch supervisor redundancy
    Verify High Availability solution was implemented properly using show and debug commands
    Document results of High Availability implementation and verification

TSHOOT: 300-135

12-Maintain and monitor network performance

    Develop a plan to monitor and manage a network
    Perform network monitoring using IOS tools
    Perform routine IOS device maintenance
    Isolate sub-optimal internetwork operation at the correctly defined OSI Model layer


13-Troubleshoot Multi Protocol system networks

    Troubleshoot EIGRP
    Troubleshoot OSPF
    Troubleshoot eBGP
    Troubleshoot routing redistribution solution
    Troubleshoot a DHCP client and server solution
    Troubleshoot NAT
    Troubleshoot first hop redundancy protocols
    Troubleshoot IPv6 routing
    Troubleshoot IPv6 and IPv4 interoperability
    Troubleshoot switch-to-switch connectivity for the VLAN based solution
    Troubleshoot loop prevention for the VLAN based solution
    Troubleshoot Access Ports for the VLAN based solution
    Troubleshoot private VLANS
    Troubleshoot port security
    Troubleshoot general switch security
    Troubleshoot VACL and PACL
    Troubleshoot switch virtual interfaces (SVIs)
    Troubleshoot switch supervisor redundancy
    Troubleshoot switch support of advanced services (i.e., Wireless, VOIP and Video)
    Troubleshoot a VoIP support solution
    Troubleshoot a video support solution
    Troubleshoot Layer 3 Security
    Troubleshoot issues related to ACLs used to secure access to Cisco routers
    Troubleshoot configuration issues related to accessing the AAA server for authentication purposes
    Troubleshoot security issues related to IOS services (i.e.,finger, NTP, HTTP, FTP, RCP etc.)
Share:

Cisco Certified Network Associate-(CCNA) Course Outline

Cisco Certified Network Associate-(CCNA)

This training is offered in two different formats, instructor-led classroom or online training over the Internet. The is designed to prepare the applicants to identify, design and recommend the best Cisco solutions for small to medium-sized businesses. It provides the installation, configuration, and troubleshooting information that technical support people require to install and configure the Cisco products sold through two tier distribution. Lectures, labs and interactive cases are provided to increase your understanding of the products and to best position them to meet customers' requirements. CCNA curriculum includes basic mitigation of security threats, introduction to wireless networking concepts and terminology, and performance-based skills.  

Why should you become a CCNA 
As a networking professional, you will cultivate industry-supported skills and credentials that you will be able to transfer to future employment opportunities. With your CCNA certification, you will be able to demonstrate and promote the fact that you have the necessary skills to do your job effectively and you are certified by the leader in Network Technologies.  

What are the Prerequisites & for CCNA  
Prior to CCNA course, the applicants have to know Networking Technologies and Computer Hardware (A+ Certification). Basic knowledge of networking and TCP/IP is required. An applicant without the above knowledge will find it very difficult to proceed. 

CCNA® Exam Requirements, CCNA® Routing & Switching Certification :
To become Cisco Certified Network Associate, you are required to pass one exam (exam #200-125 CCNA). The exam duration is 90 minutes and there are 50 to 60 questions. This exam is developed with the input of professionals in the industry and reflects how Cisco products are used in organizations throughout the world. The exam is administered by Pearson Vue, an independent testing organization with locations worldwide. Computer Institute is an authorized testing center. The following table shows the exam percentages for exam sections:

1.0 Network Fundamentals

15%

2.0 LAN Switching Technologies

21%

3.0 Routing Technologies

 23%

4.0 WAN Technologies

10%

5.0 Infrastructure Services

10%

6.0 Infrastructure Security

11%

7.0 Infrastructure Management

10%



 CCNA Course Outline
Course Content
This course provides the information you need to identify, design and recommend the best Cisco solutions for small to medium-sized businesses. It provides the installation, configuration, and troubleshooting information that technical support people require to install and configure the Cisco products. Lectures, labs and interactive cases are provided to increase your understanding of the products and how best to position them to meet customers' requirements. CCNA Composite Exam: The 200-125 is the composite exam associated with the Cisco CCNA Routing and Switching certification. Candidates can prepare for this exam by taking the Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v3.0 course. This exam tests a candidate's knowledge and skills required to install, operate, and troubleshoot a small to medium size enterprise branch network. The topics include all the areas covered under ICND1 (100-105) and ICND2 (200-105) Exams.

Course Outline

The course covers the topics you need to review for the CCNA exam including:

1. Network Fundamentals

1.1 Compare and contrast OSI and TCP/IP models
1.2 Compare and contrast TCP and UDP protocols
1.3 Describe the impact of infrastructure components in an enterprise network
  • 1.3.a Firewalls
  • 1.3.b Access points
  • 1.3.c Wireless controllers
1.4 Describe the effects of cloud resources on enterprise network architecture
  • 1.4.a Traffic path to internal and external cloud services
  • 1.4.b Virtual services
  • 1.4.c Basic virtual network infrastructure
1.5 Compare and contrast collapsed core and three-tier architectures
1.6 Compare and contrast network topologies
  • 1.6.a Star
  • 1.6.b Mesh
  • 1.6.c Hybrid
1.7 Select the appropriate cabling type based on implementation requirements
1.8 Apply troubleshooting methodologies to resolve problems
  • 1.8.a Perform and document fault isolation
  • 1.8.b Resolve or escalate
  • 1.8.c Verify and monitor resolution
1.9 Configure, verify, and troubleshoot IPv4 addressing and subnetting
1.10 Compare and contrast IPv4 address types
  • 1.10.a Unicast
  • 1.10.b Broadcast
  • 1.10.c Multicast
1.11 Describe the need for private IPv4 addressing
1.12 Identify the appropriate IPv6 addressing scheme to satisfy addressing requirements in a LAN/WAN environment
1.13 Configure, verify, and troubleshoot IPv6 addressing
1.14 Configure and verify IPv6 Stateless Address Auto Configuration
1.15 Compare and contrast IPv6 address types
  • 1.15.a Global unicast
  • 1.15.b Unique local
  • 1.15.c Link local
  • 1.15.d Multicast
  • 1.15.e Modified EUI 64
  • 1.15.f Autoconfiguration
  • 1.15.g Anycast

2. LAN Switching Technologies

2.1 Describe and verify switching concepts
  • 2.1.a MAC learning and aging
  • 2.1.b Frame switching
  • 2.1.c Frame flooding
  • 2.1.d MAC address table
2.2 Interpret Ethernet frame format
2.3 Troubleshoot interface and cable issues (collisions, errors, duplex, speed)
2.4 Configure, verify, and troubleshoot VLANs (normal/extended range) spanning multiple switches
  • 2.4.a Access ports (data and voice)
  • 2.4.b Default VLAN
2.5 Configure, verify, and troubleshoot interswitch connectivity
  • 2.5.a Trunk ports
  • 2.5.b Add and remove VLANs on a trunk
  • 2.5.c DTP, VTP (v1&v2), and 802.1Q
  • 2.5.d Native VLAN
2.6 Configure, verify, and troubleshoot STP protocols
  • 2.6.a STP mode (PVST+ and RPVST+)
  • 2.6.b STP root bridge selection
2.7 Configure, verify and troubleshoot STP related optional features
  • 2.7.a PortFast
  • 2.7.b BPDU guard
2.8 Configure and verify Layer 2 protocols
  • 2.8.a Cisco Discovery Protocol
  • 2.8.b LLDP
2.9 Configure, verify, and troubleshoot (Layer 2/Layer 3) EtherChannel
  • 2.9.a Static
  • 2.9.b PAGP
  • 2.9.c LACP
2.10 Describe the benefits of switch stacking and chassis aggregation

3. Routing Technologies

3.1 Describe the routing concepts
  • 3.1.a Packet handling along the path through a network
  • 3.1.b Forwarding decision based on route lookup
  • 3.1.c Frame rewrite
3.2 Interpret the components of a routing table
  • 3.2.a Prefix
  • 3.2.b Network mask
  • 3.2.c Next hop
  • 3.2.d Routing protocol code
  • 3.2.e Administrative distance
  • 3.2.f Metric
  • 3.2.g Gateway of last resort
3.3 Describe how a routing table is populated by different routing information sources
  • 3.3.a Admin distance
3.4 Configure, verify, and troubleshoot inter-VLAN routing
  • 3.4.a Router on a stick
  • 3.4.b SVI
3.5 Compare and contrast static routing and dynamic routing
3.6 Compare and contrast distance vector and link state routing protocols
3.7 Compare and contrast interior and exterior routing protocols
3.8 Configure, verify, and troubleshoot IPv4 and IPv6 static routing
  • 3.8.a Default route
  • 3.8.b Network route
  • 3.8.c Host route
  • 3.8.d Floating static
3.9 Configure, verify, and troubleshoot single area and multi-area OSPFv2 for IPv4 (excluding authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs)
3.10 Configure, verify, and troubleshoot single area and multi-area OSPFv3 for IPv6 (excluding authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs)
3.11 Configure, verify, and troubleshoot EIGRP for IPv4 (excluding authentication, filtering, manual summarization, redistribution, stub)
3.12 Configure, verify, and troubleshoot EIGRP for IPv6 (excluding authentication, filtering, manual summarization, redistribution, stub)
3.13 Configure, verify, and troubleshoot RIPv2 for IPv4 (excluding authentication, filtering, manual summarization, redistribution)
3.14 Troubleshoot basic Layer 3 end-to-end connectivity issues

4. WAN Technologies

4.1 Configure and verify PPP and MLPPP on WAN interfaces using local authentication
4.2 Configure, verify, and troubleshoot PPPoE client-side interfaces using local authentication
4.3 Configure, verify, and troubleshoot GRE tunnel connectivity
4.4 Describe WAN topology options
  • 4.4.a Point-to-point
  • 4.4.b Hub and spoke
  • 4.4.c Full mesh
  • 4.4.d Single vs dual-homed
4.5 Describe WAN access connectivity options
  • 4.5.a MPLS
  • 4.5.b Metro Ethernet
  • 4.5.c Broadband PPPoE
  • 4.5.d Internet VPN (DMVPN, site-to-site VPN, client VPN)
4.6 Configure and verify single-homed branch connectivity using eBGP IPv4 (limited to peering and route advertisement using Network command only)
4.7 Describe basic QoS concepts
  • 4.7.a Marking
  • 4.7.b Device trust
  • 4.7.c Prioritization
    • 4.7.c. [i] Voice
    • 4.7.c. [ii] Video
    • 4.7.c. [iii] Data
  • 4.7.d Shaping
  • 4.7.e Policing
  • 4.7.f Congestion management

5. Infrastructure Services

    5.1 Describe DNS lookup operation
    5.2 Troubleshoot client connectivity issues involving DNS
    5.3 Configure and verify DHCP on a router (excluding static reservations)
    • 5.3.a Server
    • 5.3.b Relay
    • 5.3.c Client
    • 5.3.d TFTP, DNS, and gateway options
    5.4 Troubleshoot client- and router-based DHCP connectivity issues
    5.5 Configure, verify, and troubleshoot basic HSRP
    • 5.5.a Priority
    • 5.5.b Preemption
    • 5.5.c Version
    5.6 Configure, verify, and troubleshoot inside source NAT
    • 5.6.a Static
    • 5.6.b Pool
    • 5.6.c PAT
    5.7 Configure and verify NTP operating in a client/server mode

6. Infrastructure Security

  • 6.1 Configure, verify, and troubleshoot port security
    • 6.1.a Static
    • 6.1.b Dynamic
    • 6.1.c Sticky
    • 6.1.d Max MAC addresses
    • 6.1.e Violation actions
    • 6.1.f Err-disable recovery
    6.2 Describe common access layer threat mitigation techniques
    • 6.2.a 802.1x
    • 6.2.b DHCP snooping
    • 6.2.c Nondefault native VLAN
    6.3 Configure, verify, and troubleshoot IPv4 and IPv6 access list for traffic filtering
    • 6.3.a Standard
    • 6.3.b Extended
    • 6.3.c Named
    6.4 Verify ACLs using the APIC-EM Path Trace ACL analysis tool
    6.5 Configure, verify, and troubleshoot basic device hardening
    • 6.5.a Local authentication
    • 6.5.b Secure password
    • 6.5.c Access to device
      • 6.5.c. [i] Source address
      • 6.5.c. [ii] Telnet/SSH
    • 6.5.d Login banner
    6.6 Describe device security using AAA with TACACS+ and RADIUS
    5.6.a Static
  • 5.6.b Pool
  • 5.6.c PAT
  • Configure and verify NTP operating in a client/server mode

7. Infrastructure Management

7.1 Configure and verify device-monitoring protocols
  • 7.1.a SNMPv2
  • 7.1.b SNMPv3
  • 7.1.c Syslog
7.2 Troubleshoot network connectivity issues using ICMP echo-based IP SLA
7.3 Configure and verify device management
  • 7.3.a Backup and restore device configuration
  • 7.3.b Using Cisco Discovery Protocol or LLDP for device discovery
  • 7.3.c Licensing
  • 7.3.d Logging
  • 7.3.e Timezone
  • 7.3.f Loopback
7.4 Configure and verify initial device configuration
7.5 Perform device maintenance
  • 7.5.a Cisco IOS upgrades and recovery (SCP, FTP, TFTP, and MD5 verify)
  • 7.5.b Password recovery and configuration register
  • 7.5.c File system management
7.6 Use Cisco IOS tools to troubleshoot and resolve problems
  • 7.6.a Ping and traceroute with extended option
  • 7.6.b Terminal monitor
  • 7.6.c Log events
  • 7.6.d Local SPAN
7.7 Describe network programmability in enterprise network architecture
  • 7.7.a Function of a controller
  • 7.7.b Separation of control plane and data plane
  • 7.7.c Northbound and southbound APIs



Share:

Recent Posts

Menu

  • CEH
  • CHFI
  • Computer Security
  • Network Security

Pages

Help

Need our help to just follow or mail our. Contact me with details about the theme customization you need.