This Course is for those who are interested in Network Administration
NETWORK ENGINEERING + [RHCE or ETHICAL HACKING (OPTIONAL)]
In this Hi-tech age, huge networks play a very vital role. The need to understand the prevalent networking technologies is therefore essential for any IT professional. This course caters to the existing and ever evolving requirements of the IT Industry. In simple words, this course helps you to understand networking technologies in a very sound manner.
About this Course
Network Engineering(NE) training program is composed of several key core courses and electives which gears you towards your chosen goal. NE is designed to provide you with a course content offered by Microsoft and Cisco added with a lot of notable enhancements. Together with subject matter which is theoretical in nature the essential practical sessions are the highlights of this industry centric course. It is general enough to give a broad overview of today’s technologies and trends, while detailed enough for you to see the inner workings of modern networking. Successful completion of Logic’s Network Engineering program would mean an assured career since you would be equipped for taking certifications such as MCSE, CCNA, CCNP.
Importance of Network Engineering Program
As a Computer Professional, you undoubtedly recognize that there is no substitute for adequate training. In our discussion with several Network Administrators, we were amazed to note that there was a certain lack on in-depth knowledge that existed within the networking domain. Most LAN, WAN and Firewall personnel have had to train themselves for the most part, pulling themselves up by the bootstraps, foraging through large manuals to fight the everyday fires. Many hav2e not had the opportunity of intensive training, and this leads to a certain gap in knowledge. On Completion of the Network Engineering program, you would have attained a certain level of competence, enabling you to successfully pursue a career in networking. In short, we want you to step on our shoulders to reach great heights of success.
Network Engineering Prerequisites & Course Objectives
We recommend this course for B.Tech, MCA, M.Sc, Degree and Diploma holders. This course will provide training on a host of networking topics. At Logic, we strive to make every student who has successfully completed the training capable of handling the following areas :-
Level I : MCSE (Microsoft Certified Solutions Expert): Cloud Platform and Infrastructure
Introduction: Fundamental Hardware and Networking Concepts
Module 1: Hardware Fundamentals
The Importance of Skill in Managing and Troubleshooting PCs, How the PC Works – Input, Processing, Output, Storage, The Complete PC – External Connections, Devices and Their Connectors, System Case, CPU, RAM, Motherboard, Power Supply, Floppy Drive, Hard Drive, Optical Media, Microprocessors – CPU Core Components, Memory ( Memory and RAM, Address Bus), Random Access Memory (RAM) -Types of RAM (SDRAM, RDRAM, DDR SDRAM, DDR2 & DDR3), BIOS & CMOS – Power-On Self-Test ( The Beep Codes, Text Errors), The Boot Process, Clearing CMOS, Flashing ROM, Expansion BUS – Structure and Function of the Expansion Bus (PC Bus, ISA, PCI), System Resources (I/O Addresses, IRQ, Direct Memory Access, Memory Addresses), Motherboard – How Motherboards Work, Form Factors (AT/ATX), Chipset, Motherboard Components, Diff. types of Ports, Power Supplies – SMPS Components and wire arrangements, UPS, Hard Drive Technologies – HDD Components, PATA, SATA, SCSI, Intro . RAID.
Module 2: Networking Fundamentals
Overview of Computer networking, Understanding Local Area Networking, Defining Networks with the OSI Model, Understanding Internet Protocol, Subnetting, Supernetting, Understanding Network Devices,
Module 3: Windows 10 Fundamentals
Introducing Windows 10,Preparing to Install Windows 10,Installing Windows 10,Activating Windows 10. Managing Disks and Device Drivers-Managing Disks, Partitions, and Volumes,Maintaining Disks, Partitions, and Volumes,Working with Virtual Hard Disks,Installing and Configuring Device Drivers. Implementing Network Security-Overview of Threats to Network Security,Configuring Windows Firewall,Securing Network Traffic,Configuring Windows Defender.Securing Windows 10 Desktops-Securing Data with EFS and BitLocker,Configuring User Account Control. Optimizing and Maintaining Windows 10 Client Computers-Optimizing the Performance of Windows 10,Managing the Reliability of Windows 10,Managing Windows 10 Updates. Configuring Mobile Computing and Remote Access-Configuring Remote Desktop.Troubleshooting and Recovering Windows 10-Backing Up and Restoring Files in Windows 10,Recovery Options in Windows 10.
70-740: Installation, Storage, and Compute with Windows Server 2016
Module 1: Installing, upgrading, and migrating servers and workloads
Introducing Windows Server 2016, Preparing and installing Nano Server and Server Core, Preparing for upgrades and migrations, Migrating server roles and workloads, Windows Server activation models
Module 2: Configuring local storage
Managing disks in Windows Server, Managing volumes in Windows Server
Module 3: Implementing enterprise storage solutions
Overview of DAS, NAS, and SANs, Comparing Fibre Channel, iSCSI, and Fibre Channel over Ethernet, Understanding iSNS, DCB, and MPIO, Configuring sharing in Windows Server 2016
Module 4: Implementing Storage Spaces and Data Deduplication
Implementing Storage Spaces, Managing Storage Spaces, Implementing Data Deduplication
Module 5: Installing and configuring Hyper-V and virtual machines
Overview of Hyper-V, Installing Hyper-V, Configuring storage on Hyper-V host servers, Configuring networking on Hyper-V host servers, Configuring Hyper-V virtual machines, Managing virtual machines
Module 6: Deploying and managing Windows and Hyper-V containers (Theory)
Overview of containers in Windows Server 2016, Deploying Windows Server and Hyper-V containers, Installing, configuring, and managing containers by using Docker
Module 7: Overview of high availability and disaster recovery
Defining levels of availability, Planning high availability and disaster recovery solutions with Hyper-V virtual machines, Backing up and restoring by using Windows Server Backup, High availability with failover clustering in Windows Server 2016
Module 8: Implementing failover clustering
Planning a failover cluster, Creating and configuring a new failover cluster, Maintaining a failover cluster, Troubleshooting a failover cluster, Implementing site high availability with stretch clustering
Module 9: Implementing failover clustering with Windows Server 2016 Hyper-V
Overview of the integration of Hyper-V Server 2016 with failover clustering, Implementing Hyper-V VMs on failover clusters, Key features for VMs in a clustered environment
Module 10: Implementing Network Load Balancing
Overview of NLB, Configuring an NLB cluster, Planning an NLB implementation
Module 11: Creating and managing deployment images
Introduction to deployment images, Creating and managing deployment images by using MDT, Virtual machine environments for different workloads
Module 12: Managing, monitoring, and maintaining virtual machine installations
WSUS overview and deployment options ,Update management process with WSUS, Overview of Windows PowerShell DSC, Overview of Windows Server 2016 monitoring tools, Using Performance Monitor, Monitoring event logs
70-741: Networking with Windows Server 2016
Module 1: Planning and implementing an IPv4 network
Planning IPv4 addressing, Configuring an IPv4 host, Managing and troubleshooting IPv4 network connectivity
Module 2: Implementing DHCP
Overview of the DHCP server role, Deploying DHCP, Managing and troubleshooting DHCP
Module 3: Implementing IPv6
Overview of IPv6 addressing, Configuring an IPv6 host, Implementing IPv6 and IPv4 coexistence, Transitioning from IPv4 to IPv6
Module 4: Implementing DNS
Implementing DNS servers,Configuring zones in DNS,Configuring name resolution between DNS zones,Configuring DNS integration with Active Directory Domain Services (AD DS),Configuring advanced DNS settings
Module 5: Implementing and managing IPAM
Overview of IPAM,Deploying IPAM,Managing IP address spaces by using IPAM
Module 6: Remote access in Windows Server 2016 (Theory)
Overview of remote access,Implementing the Web Application Proxy
Module 7: Implementing DirectAccess (Theory)
Overview of DirectAccess,Implementing DirectAccess by using the Getting Started Wizard, Implementing and managing an advanced DirectAccess infrastructure
Module 8: Implementing VPNs
Planning VPNs,Implementing VPNs
Module 9: Implementing networking for branch offices
Networking features and considerations for branch offices,Implementing Distributed File System (DFS) for branch offices,Implementing BranchCache for branch offices
Module 10: Configuring advanced networking features
Overview of high performance networking features,Configuring advanced Microsoft Hyper-V networking features
Module 11: Implementing Software Defined Networking (Theory)
Overview of SDN.,,implementing network virtualization,Implementing Network Controller
70-742 Identity with Windows Server 2016
Module 1: Installing and configuring domain controllers
Overview of AD DS,Overview of AD DS domain controllers,Deploying a domain controller
Module 2: Managing objects in AD DS
Managing user accounts,Managing groups in AD DS,Managing computer objects in AD DS,Using Windows PowerShell for AD DS administration,Implementing and managing OUs
Module 3: Advanced AD DS infrastructure management
Overview of advanced AD DS deployments,Deploying a distributed AD DS environment,Configuring AD DS trusts
Module 4: Implementing and administering AD DS sites and replication
Overview of AD DS replication,Configuring AD DS sites,Configuring and monitoring AD DS replication
Module 5: Implementing Group Policy
Introducing Group Policy,Implementing and administering GPOs,Group Policy scope and Group Policy processing,Troubleshooting the application of GPOs
Module 6: Managing user settings with Group Policy
Implementing administrative templates,Configuring Folder Redirection, software installation, and scripts,Configuring Group Policy preferences
Module 7: Securing Active Directory Domain Services
Securing domain controllers,Implementing account security,Implementing audit authentication,Configuring managed service accounts
Module 8: Deploying and managing AD CS
Deploying Cas,Administering Cas,Troubleshooting and maintaining CAs
Module 9: Deploying and managing certificates
Deploying and managing certificate templates,Man aging certificate deployment, revocation, and recovery,Using certificates in a business environment,Implementing and managing smart cards
Module 10: Implementing and administering AD FS (Theory)
Overview of AD FS,AD FS requirements and planning,Deploying and configuring AD FS,Overview of Web Application Proxy
Module 11: Implementing and administering AD RMS
Overview of AD RMS,Deploying and managing an AD RMS infrastructure,Configuring AD RMS content protection
Module 12: Implementing AD DS synchronization with Microsoft Azure AD (Theory)
Planning and preparing for directory synchronization,Implementing directory synchronization by using Azure AD Connect,Managing identities with directory synchronization
Module 13: Monitoring, managing, and recovering AD DS
Monitoring AD DS,Managing the Active Directory database,Active Directory backup and recovery options for AD DS and other identity and access solutions
70-745: Implementing a Software Defined Datacenter
Module 1 SQL Server 2016 Basics Installing Microsoft SQL Server2016 System Requirements Editions of SQL Server Preparing for a SQL 2016 Installation Client Connectivity Enabling Server Connectivity Database Basics Configure SQL db for VMM
Module 2 Plan and Implement System Center VMM Install VMM Add Hosts Create service accounts Install and Configure VMM Host Servers Bare metal installation Integrate WSUS Manage host groups library servers library shares Highly Available VMM Hyper-V Host cluster implement Scale-Out File Server.
Module3 Implement Software-Defined Networking (SDN) Network Fabric logical networks Network sites IP pool Uplink port profiles Virtual port profiles Port classifications Logical switches Hyper-V extensible virtual switch NIC teaming Switch Embedded Teaming MAC pools Domain Name System (DNS) NIC offload technologies vRSS and VMMQ Single-Root I/O Virtualization (SR-IOV) on capable NICs
Plan for and Implement SDN solution Describe logical networks SLB multiplexers VLANs Service Templates Single tenant and multi-tenant scenarios Define front end VIPs Define back end DIPs SDN Host agent DNS integration with SDN Network Controller Multi-node Network Controller Highly available Network Controller Describe SLB SLB host agent SLB Multiplexer Describe WSG GRE tunnelling IPsec Site-to-Site tunnel M+N redundancy Gateway pools Integrate gateways with SLB Forwarding proxy Highly available Windows Server Gateway
Module 4 Implement Software-Defined Storage Solutions Storage Spaces Direct Storage tiering iSCSI storage Storage Spaces fault tolerance CSVs SMB 3 storage NIC offload technologies SMB file storage Encrypt cluster volumes Storage QoS policies Provision Thin and Thick storage solutions Storage classifications for storage pools Storage Replica solutions Hyper-V replica solutions Offloaded Data Transfer (ODX) LUN usage Optimize Storage Spaces Direct storage pools Network QoS policies SAN copy to rapidly provision VMs
Module 5 Implement Datacenter Compute Solutions with Virtual Machine Manager (VMM VMtemplates Hardware profiles Guest operating system profiles Application profiles Nano server containers Operating system deployments using unattend.xml options Integrate sysprep with unattend.xml answer file Migrate existing virtual machine deployments to VMM Checkpoints Clone virtual machines Linux virtual machines Virtual machines from an existing VHD, template, or VMM library Service Templates
Module 6 Secure your Software-Defined Datacenter Secure the Compute Environment Host Guardian Service Implement shielded VMs for new VMs and existing virtual machines Guarded Fabric solutions DHCP guard Run as accounts and User Roles RBAC Secure boot Secure the Network Environment Port ACLs VM subnets and virtual NICs Datacenter Firewall solutions ACL Rules using Datacenter Firewall Configure and apply Network Controller network policies
Module 7 Monitor and Maintain the Software-Defined Datacenter Install and Configure SCOM Monitor and Manage Infrastructure and Virtual Machine Workloads using SCOM Tune Monitoring using Targeting and Overrides, maintenance schedules, suspend monitoring temporarily, configure notifications, configure reporting, integrate Operations Manager and VMM, enable PRO, backing up and restoring with tools such as Data Protection Manager (DPM).
Level II : Cisco Certified Network Associate 200-125
This course teaches learners how to install, operate, configure, and verify a basic IPv4 and IPv6 network, including configuring a LAN switch, configuring an IP router, identifying basic security threats, understanding redundant topologies, troubleshooting common network issues, connecting to a WAN, configuring EIGRP and OSPF in both IPv4 and IPv6, understanding wide-area network technologies, and getting familiar with device management and Cisco licensing infrastructure services, infrastructure security, and infrastructure management. It also includes more in-depth topics that teach learners how to perform basic troubleshooting steps in enterprise branch office networks, preparing students for the Cisco CCNA certification and also describe the effects of new technologies such as IoE, IoT, IWAN, and SDN on network evolution.
Course Content :
Compare and contrast OSI and TCP/IP models,1.2 Compare and contrast TCP and UDP protocols, Describe the impact of infrastructure components in an enterprise network, Firewalls, Access points, Wireless controllers,1.4 Describe the effects of cloud resources on enterprise network architecture, Traffic path to internal and external cloud services, Virtual services, Basic virtual network infrastructure, Compare and contrast collapsed core and three-tier architectures,Compare and contrast network topologies, Star, Mesh, Hybrid, Select the appropriate cabling type based on implementation requirements, Apply troubleshooting methodologies to resolve problems, Perform and document fault isolation, Resolve or escalate,Verify and monitor resolution,Configure, verify, and troubleshoot IPv4 addressing and subnetting,Compare and contrast IPv4 address types,Unicast,Broadcast, Multicast, Describe the need for private IPv4 addressing, Identify the appropriate IPv6 addressing scheme to satisfy addressing requirements in a LAN/WAN environment,Configure, verify, and troubleshoot IPv6 addressing, Configure and verify IPv6 Stateless Address Auto Configuration,Compare and contrast IPv6 address types,Global unicast, Unique local, Link local, Multicast, Modified EUI 64, Autoconfiguration, Anycast
LAN Switching Technologies
Describe and verify switching concepts,MAC learning and aging,Frame switching, Frame flooding, MAC address table,Interpret Ethernet frame format,Troubleshoot interface and cable issues (collisions, errors, duplex, speed),Configure, verify, and troubleshoot VLANs (normal/extended range) spanning multiple switches, Access ports (data and voice), Default VLAN,Configure, verify, and troubleshoot interswitch connectivity, Trunk ports, Add and remove VLANs on a trunk, DTP, VTP (v1&v2), and 802.1Q,2.5.d Native VLAN,Configure, verify, and troubleshoot STP protocols,STP mode (PVST+ and RPVST+),STP root bridge selection,Configure, verify and troubleshoot STP related optional features,PortFast, BPDU guard,Configure and verify Layer 2 protocols,Cisco Discovery Protocol, LLDP, Configure, verify, and troubleshoot (Layer 2/Layer 3) EtherChannel,Static, PAGP, LACP,Describe the benefits of switch stacking and chassis aggregation
Describe the routing concepts,Packet handling along the path through a network,Forwarding decision based on route lookup, Frame rewrite, Interpret the components of a routing table,Prefix, Network mask, Next hop,Routing protocol code, Administrative distance,Metric, Gateway of last resort,Describe how a routing table is populated by different routing information sources,Admin distance,Configure, verify, and troubleshoot inter-VLAN routing,Router on a stick, SVI,Compare and contrast static routing and dynamic routing, Compare and contrast distance vector and link state routing protocols,Compare and contrast interior and exterior routing protocols,Configure, verify, and troubleshoot IPv4 and IPv6 static routing,Default route, Network route,Host route,Floating static,Configure, verify, and troubleshoot single area and multi-area OSPFv2 for IPv4 (excluding authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs),Configure, verify, and troubleshoot single area and multi-area OSPFv3 for IPv6 (excluding authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs), Configure, verify, and troubleshoot EIGRP for IPv4 (excluding authentication, filtering, manual summarization, redistribution, stub) Configure, verify, and troubleshoot EIGRP for IPv6 (excluding authentication, filtering, manual summarization, redistribution, stub),Configure, verify, and troubleshoot RIPv2 for IPv4 (excluding authentication, filtering, manual summarization, redistribution),Troubleshoot basic Layer 3 end-to-end connectivity issues
Configure and verify PPP and MLPPP on WAN interfaces using local authentication, Configure, verify, and troubleshoot PPPoE client-side interfaces using local authentication, Configure, verify, and troubleshoot GRE tunnel connectivity, Describe WAN topology options,Point-to-point, Hub and spoke, Full mesh, Single vs dual-homed, Describe WAN access connectivity options,MPLS, Metro Ethernet, Broadband PPPoE, Internet VPN (DMVPN, site-to-site VPN, client VPN),Configure and verify single-homed branch connectivity using eBGP IPv4 (limited to peering and route advertisement using Network command only), Describe basic QoS concepts, Marking, Device trust, Prioritization, Voice, Video, Data, Shaping, Policing, Congestion management
Describe DNS lookup operation, Troubleshoot client connectivity issues involving DNS, Configure and verify DHCP on a router (excluding static reservations), Server, Relay, Client, TFTP, DNS, and gateway options,Troubleshoot client- and router-based DHCP connectivity issues Configure, verify, and troubleshoot basic HSRP,Priority, Preemption, Version,Configure, verify, and troubleshoot inside source NAT,Static,Pool, PAT Configure and verify NTP operating in a client/server mode
Configure, verify, and troubleshoot port security, Static, Dynamic, Sticky, Max MAC addresses, Violation actions, Err-disable recovery, Describe common access layer threat mitigation techniques, 802.1x,DHCP snooping, Nondefault native VLAN,Configure, verify, and troubleshoot IPv4 and IPv6 access list for traffic filtering, Standard, Extended, Named,Verify ACLs using the APIC-EM Path Trace ACL analysis tool,Configure, verify, and troubleshoot basic device hardening, Local authentication, Secure password, Access to device, Source address, Telnet/SSH,Login banner ,Describe device security using AAA with TACACS+ and RADIUS
Configure and verify device-monitoring protocols,SNMPv2,7.1.b SNMPv3,7.1.c Syslog, Troubleshoot network connectivity issues using ICMP echo-based IP SLA, Configure and verify device management, Backup and restore device configuration, Using Cisco Discovery Protocol or LLDP for device discovery, Licensing, Logging, Timezone, Loopback, Configure and verify initial device configuration, Perform device maintenance ,Cisco IOS upgrades and recovery (SCP, FTP, TFTP, and MD5 verify), Password recovery and configuration register, File system management, Use Cisco IOS tools to troubleshoot and resolve problems, Ping and traceroute with extended option, Terminal monitor, Log events, Local SPAN, Describe network programmability in enterprise network architecture, Function of a controller, Separation of control plane and data plane, Northbound and southbound APIs
This course teaches learners how to install, operate, configure, and verify a basic IPv4 and IPv6 network, including configuring a LAN
Level III : Cisco Certified Network Professional (CCNP)
Cisco Certified Network Professional (CCNP) validates knowledge and skills required to install, configure and troubleshoot converged local and wide area networks with 100 to 500 or more nodes. With a CCNP certification, a network professional demonstrates the knowledge and skills required to manage the routers and switches that form the network core, as well as edge applications that integrate voice, wireless, and security into the network. The CCNP curriculum includes building scalable Cisco networks, Cisco multilayer switched networks, securing converged wide area networks, and optimizing converged networks.
Valid CCNA certification
1.0 Network Principles
Identify Cisco Express Forwarding concepts, FIB, Adjacency table, Explain general network challenges,Unicast, Out-of-order packets, Asymmetric routing, Describe IP operations, ICMP Unreachable and Redirects, IPv4 and IPv6 fragmentation, TTL, Explain TCP operations, IPv4 and IPv6 (P)MTU, MSS, Latency, Windowing , Bandwidth-delay product, Global synchronization, Describe UDP operations, Starvation, Latency, Recognize proposed changes to the network, Changes to routing protocol parameters, Migrate parts of the network to IPv6, Routing protocol migration
2.0 Layer 2 Technologies
Configure and verify PPP, Authentication (PAP, CHAP), PPPoE (client side only) , 2.2 Explain Frame Relay, Operations,Point-to-point , Multipoint
3.0 Layer 3 Technologies
Identify, configure, and verify IPv4 addressing and subnettingAddress types (Unicast, broadcast, multicast, and VLSM), ARP, DHCP relay and server ,DHCP protocol operations, Identify IPv6 addressing and subnettingUnicast, EUI-64, ND, RS/RA , Autoconfig (SLAAC) , DHCP relay and server, DHCP protocol operations , Configure and verify static routing, Configure and verify default routing, Evaluate routing protocol types Distance vector, Link state, Path vector , Describe administrative distance, Troubleshoot passive interfaces, Configure and verify VRF lite, Configure and verify filtering with any protocol, Configure and verify redistribution between any routing protocols or routing sources, Configure and verify manual and auto summarization with any routing protocol, Configure and verify policy-based routing, Identify suboptimal routing, Explain ROUTE maps, Configure and verify loop prevention mechanisms. Route tagging and filtering, Split-horizon, Route poisoning, Configure and verify RIPv2, Describe RIPng, Describe EIGRP packet types, Configure and verify EIGRP neighbor relationship and authentication, Configure and verify EIGRP stubs Configure and verify EIGRP load balancing. Equal cost, Unequal cost, Describe and optimize EIGRP metrics, Configure and verify EIGRP for IPv6, Describe OSPF packet types, Configure and verify OSPF neighbor relationship and authentication, Configure and verify network types, area types, and router types. Point-to-point, mult ipoint, broadcast, nonbroadcast, LSA types, area type: backbone, normal, transit, stub, NSSA, totally stub, Internal router, backbone router, ABR, ASBR , Virtual link, Configure and verify OSPF path preference, Configure and verify OSPF operations, Configure and verify OSPF for IPv6, Describe, configure, and verify BGP peer relationships and authentication. Peer group,Active, passive, States and timers, Configure and verify eBGP (IPv4 and IPv6 address families) eBGP,4-byte AS number/p> , Private AS, Explain BGP attributes and best-path selection
4.0 VPN Technologies
Configure and verify GRE, Describe DMVPN (single hub), Describe Easy Virtual Networking (EVN)
5.0 Infrastructure Security
Describe IOS AAA using local database,Describe device security using IOS AAA with TACACS+ and RADIUS.AA with TACACS+ and RADIUS, Local privilege authorization fallback, Configure and verify device access control. Lines (VTY, AUX, console), Management plane protection, Password encryption, Configure and verify router security features. IPv4 access control lists (standard, extended, time-based), IPv6 traffic filter, Unicast reverse path forwarding
6.0 Infrastructure Services
Configure and verify device management .Console and VTY, Telnet, HTTP, HTTPS, SSH, SCP,(T)FTP, Configure and verify SNMP. V2, V3, Configure and verify logging. Local logging, syslog, debugs, conditional debugs, Timestamps, Configure and verify Network Time Protocol (NTP). NTP master, client, version 3, version 4, NTP authentication, Configure and verify IPv4 and IPv6 DHCP. DHCP client, IOS DHCP server, DHCP relay, DHCP options (describe), Configure and verify IPv4 Network Address Translation (NAT). Static NAT, dynamic NAT, PAT, Describe IPv6 NAT. NAT64,NPTv6, Describe SLA architecture, Configure and verify IP SLA. ICMP, Configure and verify tracking objects. Tracking objects, Tracking different entities (for example, interfaces, IPSLA results, Configure and verify Cisco NetFlow. NetFlow v5, v9, Local retrieval, Export (configuration only)
1.0 Layer 2 Technologies
Configure and verify switch administration. SDM templates, Managing MAC address table, Troubleshoot Err-disable recovery, Configure and verify Layer 2 protocols CDP, LLDP, UDLD, Configure and verify VLANs. Access ports, VLAN database, Normal, extended VLAN, voice VLAN, Configure and verify trunking. VTPv1, VTPv2, VTPv3, VTP pruning, dot1Q, Native VLAN, Manual pruning, Configure and verify EtherChannels. LACP, PAgP, manual, Layer 2, Layer 3,Load balancing, Ether Channel mis configuration guard, Configure and verify spanning tree. PVST+, RPVST+, MST, Switch priority, port priority, path cost, STP timers, PortFast, BPDUguard, BPDUfilter, Loopguard and Rootguard, Configure and verify other LAN switching technologies. SPAN, RSPAN, Describe chassis virtualization and aggregation technologies Stackwise
2.0 Infrastructure Security
Configure and verify switch security features. DHCP snooping, IP Source Guard , Dynamic ARP inspection ,Port security , Private VLAN , Storm controls, Describe device security using Cisco IOS AAA with TACACS+ and RADIUS AAA with TACACS+ and RADIUS,Local privilege authorization fallback
3.0 Infrastructure Services
3.1 Configure and verify first-hop redundancy protocols HSRP, VRRP, GLBP
1.0 Network Principles
Use Cisco IOS troubleshooting tools. Debug, conditional debug, Ping and trace route with extended options, Apply troubleshooting methodologies. Diagnose the root cause of networking issues (analyze symptoms, identify and describe root cause), Design and implement valid solutions, Verify and monitor resolution
2.0 Layer 2 Technologies
Troubleshoot switch administration, SDM templates, Managing MAC address table , Troubleshoot Err-disable recovery, Troubleshoot Layer 2 protocols CDP, LLDP, UDLD, Troubleshoot VLANs, Access ports, VLAN database , Normal, extended VLAN, voice VLAN Troubleshoot trunking VTPv1, VTPv2, VTPv3, VTP pruning, dot1Q , Native VLAN , Manual pruning, Troubleshoot EtherChannels LACP, PAgP, manual, Layer 2, Layer 3 , Load balancing,Ether Channel miscon figuration guard, Troubleshoot spanning tree PVST+, RPVST +, MST, Switch priority, port priority, path cost, STP timers, PortFast, BPDUguard, BPDUfilter,Loopguard, Rootguard Troubleshoot other LAN switching technologies SPAN, RSPAN, Troubleshoot chassis virtualization and aggregation technologies Stackwise
3.0 Layer 3 Technologies
Troubleshoot IPv4 addressing and subnetting Address types (Unicast, broadcast, multicast, and VLSM),ARP,DHCP relay and server ,DHCP protocol operations, Troubleshoot IPv6 addressing and subnetting Unicast, EUI-64,ND, RS/RA ,Autoconfig (SLAAC) , DHCP relay and server , DHCP protocol operations, Troubleshoot static routing, Troubleshoot default routing, Troubleshoot administrative distance, Troubleshoot passive interfaces, Troubleshoot VRF lite, Troubleshoot filtering with any protocol, Troubleshoot between any routing protocols or routing sources, Troubleshoot manual and autosummarization with any routing protocol, Troubleshoot policy-based routing, Troubleshoot suboptimal routing, Troubleshoot loop prevention mechanisms Route tagging, filtering, Split-horizon, Route poisoning, Troubleshoot RIPv2, Troubleshoot EIGRP neighbor relationship and authentication, Troubleshoot loop free path selection RD, FD, FC, successor, feasible successor, Troubleshoot EIGPR operations Stuck in active, Troubleshoot EIGRP stubs Troubleshoot EIGRP load balancing Equal cost,Unequal cost, Troubleshoot EIGRP metrics, Troubleshoot OSPF neighbor relationship and authentication, Troubleshoot network types, area types, and router types Point-to-point, multipoint, broadcast, nonbroadcast, LSA types, area type: backbone, normal, transit, stub, NSSA, totally stub,Internal router, backbone router, ABR, ASBR, Virtual link Troubleshoot OSPF path preference, Troubleshoot OSPF operations, Troubleshoot OSPF for IPv6, Troubleshoot BGP peer relationships and authentication Peer group, Active, passive, States and timers, Troubleshoot eBGP eBGP,4-byte AS number
4.0 VPN Technologies
5.0 Infrastructure Security
Troubleshoot IOS AAA using local database, Troubleshoot device access control Lines (VTY, AUX, console), Management plane protection, Password encryption, Troubleshoot router security features IPv4 access control lists (standard, extended, time-based), IPv6 traffic filter, Unicast reverse path forwarding
6.0 Infrastructure Services
Troubleshoot device management Console and VTY, Telnet, HTTP, HTTPS, SSH, SCP,(T)FTP, Troubleshoot SNMP V2, V3 Troubleshoot logging Local logging, syslog, debugs, conditional debugs, Timestamps, Troubleshoot Network Time Protocol(NTP) NTP master, client, version 3, version 4, NTP authentication, Troubleshoot IPv4 and IPv6 DHCP DHCP client, IOS DHCP server, DHCP relay, DHCP options (describe), Troubleshoot IPv4 Network Address Translation (NAT) Static NAT, dynamic NAT, PAT
Troubleshoot SLA architecture, Troubleshoot Tracking objects, Tracking different entities (for example, interfaces, IPSLA results)
Level IV (OPTIONAL SUBJECT) with extra Fee. Red Hat Certified Engineer 7( RHCE 7.0)
|Module No||Module Name||Exam Name & No|
|RH 124||Red Hat System Administration I||Re Hat Certified system Administrator (RHCSA) (EX200) single exam covering topics from both modules|
|RH 135||Red Hat System Administration II|
|RH 255||Red Hat System Administration III||Red Hat Certified Engineer (RHCE) Exam (Ex300)|
I ) Red Hat System Administration I (RH124) Course Outline
➢ Access the command line,Log in to a Linux system and run simple commands using the shell.
➢ Manage files from the command line Copy, move, create, delete, and organize files from the bash shell prompt.
Getting help in Red Hat Enterprise Linux ,Resolve problems by using online help systems and Red Hat support utilities.
➢ Create, view, and edit text files, Create, view, and edit text files from command output or in an editor.
➢ Manage local Linux users and groups, Manage local Linux users and groups, and administer local password policies.
➢ Control access to files with Linux file system permissions, Set Linux file system permissions on files and interpret the security effects of different permission settings.
Monitor and manage Linux processes, Obtain information about the system, and control processes running on it.
➢ Control services and daemons, Control and monitor network services and system daemons using systemd.
➢ Configure and secure Open Ssh service, Access and provide access to the command line on remote systems securely using Open Ssh.
➢ Analyze and store logs, Locate and accurately interpret relevant system log files for troubleshooting purposes.
➢ Manage Red Hat Enterprise Linux networking, Configure basic IPv4 networking on Red Hat Enterprise Linux systems.
➢ Archive and copy files between systems, Archive files and copy them from one system to another.
➢ Install and update software packages, Download, install, update, and manage software packages from Red Hat and yum package repositories.
➢ Access Linux file systems, Access and inspect existing file systems on a Red Hat Enterprise Linux system.
➢ Use virtualized systems,
Create and use Red Hat Enterprise Linux virtual machines with KVM and libvirt.
- II) Red Hat System Administration II (RH135) Course Outline
Automate installation with Kickstart
Automate the installation of Red Hat Enterprise Linux systems with Kickstart.
➢ Use regular expressions with grep, Write regular expressions that, when partnered with grep, will allow you to quickly isolate or locate content within text files.
➢ Create and Edit text files with vim, Introduce the vim text editor, with which you can open, edit, and save text files.
➢ Schedule future Linux tasks, Schedule tasks to automatically execute in the future.
➢ Manage priority of Linux processes, Influence the relative priorities at which Linux processes run.
➢ Control access to files with access control lists (ACL), Manage file security using POSIX access control lists.
➢ Manage SELinux security, Manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise.
➢ Connect to network-defined users and groups, Configure systems to use central identity management services.
➢ Add disks, partitions, and file systems to a Linux system, Manage simple partitions and file systems.
➢ Manage logical volume management (LVM) storage, Manage logical volumes from the command line.
➢ Access networked attached storage with network file system (NFS), Access (secure) NFS shares.
➢ Access networked storage with SMB, Use autofs and the command line to mount and unmount SMB file systems.
➢ Control and troubleshoot the Red Hat Enterprise Linux boot process
➢ Limit network communication with firewall, Configure a basic firewall.
III) Red Hat System Administration III (RH255) course outline
- Control services and daemons, Review how to manage services and the boot-up process using systemctl.
- Manage IPv6 networking, Configure and troubleshoot basic IPv6 networking on Red Hat Enterprise Linux systems.
- Configure link aggregation and bridging, Configure and troubleshoot advanced network interface functionality including bonding, teaming, and local software bridges.
- Control network port security, Permit and reject access to network services using advanced SELinux and firewalld filtering techniques.
- Manage DNS for servers, Set and verify correct DNS records for systems and configure secure DNS caching.
- Configure email delivery, Relay all email sent by the system to an SMTP gateway for central delivery.
- Provide block-based storagem Provide and use networked iSCSI block devices as remote disks.
- Provide file-based storage, Provide NFS exports and SMB file shares to specific systems and users.
- Configure MariaDB databases, Provide a MariaDB SQL database for use by programs and database administrators.
- Provide Apache HTTPD web service, Configure Apache HTTPD to provide Transport Layer Security (TLS)-enabled websites and virtual hosts.
- Write Bash scripts, Write simple shell scripts using Bash.
- Bash conditionals and control structures, Use Bash conditionals and other control structures to write more sophisticated shell commands and scripts.
- Configure the shell environment, Customize Bash startup and use environment variables, Bash aliases, and Bash functions.
- Linux containers preview, Preview the capabilities of Linux containers, Docker, and other related technologies in Red Hat Enterprise Linux 7.
You can directly join the RHCE training which is covering the RHCSA topics also.
Student should know:
• Basic operating level knowledge of Microsoft Windows OS.
• Recommended – Computer Hardware basic knowledge
• Recommended – Internet browsing and emailing.
Level IV (OPTIONAL SUBJECT) with extra Fee. Ethical Hacking 9.0
Module 01 Introduction to Ethical Hacking
Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts, Types, and Phases Ethical Hacking Concepts and Scope Information Security Controls Information Security Laws and Standards
Module 02 Foot-printing and Reconnaissance
Footprinting Concepts Footprinting Methodology Footprinting Tools Footprinting Countermeasures Footprinting Penetration Testing
Module 03 Scanning Networks
Overview of Network Scanning Scanning Methodologies
Module 04 Enumeration
Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP Enumeration SMTP Enumeration Enumeration Countermeasures SMB Enumeration Countermeasures Enumeration Pen Testing
Module 05 System Hacking
System Hacking: Goals CEH Hacking Methodology (CHM) CEH System Hacking Steps Hiding Files Covering Tracks Penetration Testing
Module 06 Malware Threats
Introduction to Malware Trojan Concepts Types of Trojans Virus and Worms Concepts Malware Reverse Engineering Malware Detection Countermeasures Anti-Malware Software Penetration Testing
Module 07 Sniffing
Sniffing Concepts MAC Attacks DHCP Attacks ARP Poisoning Spoofing Attack DNS Poisoning Sniffing Tools Counter measures Sniffing Detection Techniques Sniffing Pen Testing
Module 08 Social Engineering
Social Engineering Concepts Social Engineering Techniques Impersonation on Social Networking Sites Identity Theft Social Engineering Countermeasures Penetration Testing
Module 09 Denial-of-Service
DoS/DDoS Concepts DoS/DDoS Attack Techniques Botnets DoS/DDoS Attack Tools Counter-measures DoS/DDoS Protection Tools DoS/DDoS Attack Penetration Testing.
Module 10 Session Hijacking
Session Hijacking Concepts Application Level Session Hijacking Network-level Session Hijacking Session Hijacking Tools Counter-measures Session Hijacking Pen Testing
Module 11 Hacking Webservers
Webserver Concepts Webserver Attacks Attack Methodology Webserver Attack Tools Counter-measures Patch Management Webserver Security Tools Webserver Pen Testing
Module 12 Hacking Web Applications
Web App Concepts Web App Threats Web App Hacking Methodology Web Application Hacking Tools Countermeasures Security Tools Web App Pen Testing
Module 13 SQL Injection
SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Counter-measures
Module 14 Hacking Wireless Networks
Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Counter-measures Wireless Security Tools Wi-Fi Pen Testing
Module 15 Hacking Mobile Platforms
Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Hacking Windows Phone OS Hacking BlackBerry Mobile Device Management (MDM) Mobile Security Guidelines and Tools Mobile Pen Testing
Module 16 Evading IDS, Firewalls, and Honeypots
IDS, Firewall and Honeypot Concepts IDS, Firewall and Honeypot System Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Counter-measures Penetration Testing
Module 17 Cloud Computing
Introduction to Cloud Computing Cloud Computing Threats Cloud Computing Attacks Cloud Security Cloud Security Tools Cloud Penetration Testing
Module 18 Cryptography
Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure(PKI) Email Encryption Disk Encryption Cryptography Attacks Cryptanalysis Tools
For Details Contact :- Ms. Angel/ Ms. Ann
Mobile and Whatsapp No : 9947422200 / 9744166610
Email id : email@example.com/ firstname.lastname@example.org
No Reviews found for this course.
Placed As Network Engineer