Network Engineering: All in one Course LAN and WAN,Redhat,Cisco,Linux,Routers and Switches

Placed Students

Upcoming Batches

Network Engineering

This Course is for those who are interested in Network Administration




    In this Hi-tech age, huge networks play a very vital role.  The need to understand the prevalent networking technologies is therefore essential for any IT professional. This course caters to the existing and ever evolving requirements of the IT Industry.   In simple words, this course helps you to understand networking technologies in a very sound manner.

    About this Course

    Network Engineering(NE) training program is composed of several key core courses and electives which gears you towards your chosen goal.  NE is designed to provide you with a course content offered by Microsoft and Cisco added with a lot of notable enhancements. Together with subject matter which is theoretical in nature the essential practical sessions are the highlights of this industry centric course.  It is general enough to give a broad overview of today’s technologies and trends, while detailed enough for you to see the inner workings of modern networking.  Successful completion of Logic’s Network Engineering program would mean an assured career since you would be equipped for taking certifications such as MCSE, CCNA, CCNP.

    Importance of Network Engineering Program

    As a Computer Professional, you undoubtedly recognize that there is no substitute for adequate training.  In our discussion with several Network Administrators, we were amazed to note that there was a certain lack on in-depth knowledge that existed within the networking domain.  Most LAN, WAN and Firewall personnel have had to train themselves for the most part, pulling themselves up by the bootstraps, foraging through large manuals to fight the everyday fires.  Many hav2e not had the opportunity of intensive training, and this leads to a certain gap in knowledge.  On Completion of the Network Engineering program, you would have attained a certain level of competence, enabling you to successfully pursue a career in networking.  In short, we want you to step on our shoulders to reach great heights of success.

    Network Engineering Prerequisites & Course Objectives

    We recommend this course for B.Tech, MCA, M.Sc, Degree and Diploma holders.  This course will provide training on a host of networking topics.  At Logic, we strive to make every student who has successfully completed the training capable of handling the following areas :-

    Level I : MCSE (Microsoft Certified Solutions Expert): Cloud Platform and Infrastructure

     Introduction: Fundamental Hardware and Networking Concepts

    Module 1: Hardware Fundamentals

    The Importance of Skill in Managing and Troubleshooting PCs, How the PC Works – Input, Processing, Output, Storage, The Complete PC – External Connections, Devices and Their Connectors, System Case, CPU, RAM, Motherboard, Power Supply, Floppy Drive, Hard Drive, Optical Media, Microprocessors – CPU Core Components, Memory ( Memory and RAM, Address Bus), Random Access Memory (RAM) -Types of RAM (SDRAM, RDRAM, DDR SDRAM, DDR2 & DDR3), BIOS & CMOS – Power-On Self-Test ( The Beep Codes, Text Errors), The Boot Process, Clearing CMOS, Flashing ROM, Expansion BUS – Structure and Function of the Expansion Bus (PC Bus, ISA, PCI), System Resources (I/O Addresses, IRQ, Direct Memory Access, Memory Addresses), Motherboard – How Motherboards Work, Form Factors (AT/ATX), Chipset, Motherboard Components, Diff. types of Ports, Power Supplies – SMPS Components and wire arrangements, UPS, Hard Drive Technologies – HDD Components, PATA, SATA, SCSI, Intro . RAID.

    Module 2: Networking Fundamentals

    Overview of Computer networking, Understanding Local Area Networking, Defining Networks with the OSI Model, Understanding Internet Protocol, Subnetting, Supernetting, Understanding Network Devices,

    Module 3: Windows 10 Fundamentals

    Introducing Windows 10,Preparing to Install Windows 10,Installing Windows 10,Activating Windows 10. Managing Disks and Device Drivers-Managing Disks, Partitions, and Volumes,Maintaining Disks, Partitions, and Volumes,Working with Virtual Hard Disks,Installing and Configuring Device Drivers. Implementing Network Security-Overview of Threats to Network Security,Configuring Windows Firewall,Securing Network Traffic,Configuring Windows Defender.Securing Windows 10 Desktops-Securing Data with EFS and BitLocker,Configuring User Account Control. Optimizing and Maintaining Windows 10 Client Computers-Optimizing the Performance of Windows 10,Managing the Reliability of Windows 10,Managing Windows 10 Updates. Configuring Mobile Computing and Remote Access-Configuring Remote Desktop.Troubleshooting and Recovering Windows 10-Backing Up and Restoring Files in Windows 10,Recovery Options in Windows 10.

    70-740: Installation, Storage, and Compute with Windows Server 2016

    Module 1: Installing, upgrading, and migrating servers and workloads

    Introducing Windows Server 2016, Preparing and installing Nano Server and Server Core, Preparing for upgrades and migrations, Migrating server roles and workloads, Windows Server activation models

    Module 2: Configuring local storage

    Managing disks in Windows Server, Managing volumes in Windows Server

    Module 3: Implementing enterprise storage solutions

    Overview of DAS, NAS, and SANs, Comparing Fibre Channel, iSCSI, and Fibre Channel over Ethernet, Understanding iSNS, DCB, and MPIO, Configuring sharing in Windows Server 2016

    Module 4: Implementing Storage Spaces and Data Deduplication

    Implementing Storage Spaces, Managing Storage Spaces, Implementing Data Deduplication

    Module 5: Installing and configuring Hyper-V and virtual machines

    Overview of Hyper-V, Installing Hyper-V, Configuring storage on Hyper-V host servers, Configuring networking on Hyper-V host servers, Configuring Hyper-V virtual machines, Managing virtual machines

    Module 6: Deploying and managing Windows and Hyper-V containers (Theory)

    Overview of containers in Windows Server 2016, Deploying Windows Server and Hyper-V containers, Installing, configuring, and managing containers by using Docker

    Module 7: Overview of high availability and disaster recovery

    Defining levels of availability, Planning high availability and disaster recovery solutions with Hyper-V virtual machines, Backing up and restoring by using Windows Server Backup, High availability with failover clustering in Windows Server 2016

    Module 8: Implementing failover clustering

    Planning a failover cluster, Creating and configuring a new failover cluster, Maintaining a failover cluster, Troubleshooting a failover cluster, Implementing site high availability with stretch clustering

    Module 9: Implementing failover clustering with Windows Server 2016 Hyper-V

    Overview of the integration of Hyper-V Server 2016 with failover clustering, Implementing Hyper-V VMs on failover clusters, Key features for VMs in a clustered environment

    Module 10: Implementing Network Load Balancing

    Overview of NLB, Configuring an NLB cluster, Planning an NLB implementation

    Module 11: Creating and managing deployment images

    Introduction to deployment images, Creating and managing deployment images by using MDT, Virtual machine environments for different workloads

    Module 12: Managing, monitoring, and maintaining virtual machine installations

    WSUS overview and deployment options ,Update management process with WSUS, Overview of Windows PowerShell DSC, Overview of Windows Server 2016 monitoring tools, Using Performance Monitor, Monitoring event logs

    70-741: Networking with Windows Server 2016

    Module 1: Planning and implementing an IPv4 network

    Planning IPv4 addressing, Configuring an IPv4 host, Managing and troubleshooting IPv4 network connectivity

    Module 2: Implementing DHCP

    Overview of the DHCP server role, Deploying DHCP, Managing and troubleshooting DHCP

    Module 3: Implementing IPv6

    Overview of IPv6 addressing, Configuring an IPv6 host, Implementing IPv6 and IPv4 coexistence, Transitioning from IPv4 to IPv6

    Module 4: Implementing DNS

    Implementing DNS servers,Configuring zones in DNS,Configuring name resolution between DNS zones,Configuring DNS integration with Active Directory Domain Services (AD DS),Configuring advanced DNS settings

    Module 5: Implementing and managing IPAM

    Overview of IPAM,Deploying IPAM,Managing IP address spaces by using IPAM

    Module 6: Remote access in Windows Server 2016 (Theory)

    Overview of remote access,Implementing the Web Application Proxy

    Module 7: Implementing DirectAccess (Theory)

    Overview of DirectAccess,Implementing DirectAccess by using the Getting Started Wizard, Implementing and managing an advanced DirectAccess infrastructure

    Module 8: Implementing VPNs

    Planning VPNs,Implementing VPNs

    Module 9: Implementing networking for branch offices

    Networking features and considerations for branch offices,Implementing Distributed File System (DFS) for branch offices,Implementing BranchCache for branch offices

    Module 10: Configuring advanced networking features

    Overview of high performance networking features,Configuring advanced Microsoft Hyper-V networking features

    Module 11: Implementing Software Defined Networking (Theory)

    Overview of SDN.,,implementing network virtualization,Implementing Network Controller

    70-742 Identity with Windows Server 2016

    Module 1: Installing and configuring domain controllers

    Overview of AD DS,Overview of AD DS domain controllers,Deploying a domain controller

    Module 2: Managing objects in AD DS

    Managing user accounts,Managing groups in AD DS,Managing computer objects in AD DS,Using Windows PowerShell for AD DS administration,Implementing and managing OUs

    Module 3: Advanced AD DS infrastructure management

    Overview of advanced AD DS deployments,Deploying a distributed AD DS environment,Configuring AD DS trusts

    Module 4: Implementing and administering AD DS sites and replication

    Overview of AD DS replication,Configuring AD DS sites,Configuring and monitoring AD DS replication

    Module 5: Implementing Group Policy

    Introducing Group Policy,Implementing and administering GPOs,Group Policy scope and Group Policy processing,Troubleshooting the application of GPOs

    Module 6: Managing user settings with Group Policy

    Implementing administrative templates,Configuring Folder Redirection, software installation, and scripts,Configuring Group Policy preferences

    Module 7: Securing Active Directory Domain Services

    Securing domain controllers,Implementing account security,Implementing audit authentication,Configuring managed service accounts

    Module 8: Deploying and managing AD CS

    Deploying Cas,Administering Cas,Troubleshooting and maintaining CAs

    Module 9: Deploying and managing certificates

    Deploying and managing certificate templates,Man aging certificate deployment, revocation, and recovery,Using certificates in a business environment,Implementing and managing smart cards

    Module 10: Implementing and administering AD FS (Theory)

    Overview of AD FS,AD FS requirements and planning,Deploying and configuring AD FS,Overview of Web Application Proxy

    Module 11: Implementing and administering AD RMS

    Overview of AD RMS,Deploying and managing an AD RMS infrastructure,Configuring AD RMS content protection

    Module 12: Implementing AD DS synchronization with Microsoft Azure AD (Theory)

    Planning and preparing for directory synchronization,Implementing directory synchronization by using Azure AD Connect,Managing identities with directory synchronization

    Module 13: Monitoring, managing, and recovering AD DS

    Monitoring AD DS,Managing the Active Directory database,Active Directory backup and recovery options for AD DS and other identity and access solutions

    70-745: Implementing a Software Defined Datacenter

    Module 1 SQL Server 2016 Basics Installing Microsoft SQL Server2016   System Requirements  Editions of SQL Server  Preparing for a SQL 2016 Installation  Client Connectivity  Enabling Server Connectivity   Database Basics   Configure SQL db for VMM

    Module 2 Plan and Implement System Center VMM Install VMM   Add Hosts   Create service accounts Install and Configure VMM Host Servers   Bare metal installation Integrate WSUS Manage host groups   library servers   library shares   Highly Available VMM Hyper-V Host cluster implement Scale-Out File Server.

    Module3 Implement Software-Defined Networking (SDN)  Network Fabric   logical networks  Network sites  IP pool  Uplink port profiles  Virtual port profiles  Port classifications Logical switches   Hyper-V extensible virtual switch NIC teaming   Switch Embedded Teaming   MAC pools   Domain Name System (DNS)  NIC offload technologies vRSS and VMMQ  Single-Root I/O   Virtualization (SR-IOV) on capable NICs

    Plan for and Implement SDN solution  Describe logical networks  SLB multiplexers  VLANs Service Templates  Single tenant and multi-tenant scenarios  Define front end VIPs  Define back end DIPs  SDN Host agent  DNS integration with SDN Network Controller Multi-node Network Controller Highly available Network Controller  Describe  SLB   SLB host agent   SLB Multiplexer  Describe WSG   GRE tunnelling  IPsec Site-to-Site tunnel   M+N redundancy Gateway pools  Integrate gateways with SLB   Forwarding proxy Highly available Windows Server Gateway

    Module 4 Implement Software-Defined Storage Solutions  Storage Spaces Direct   Storage tiering   iSCSI storage  Storage Spaces fault tolerance  CSVs  SMB 3 storage   NIC offload technologies  SMB file storage  Encrypt cluster volumes   Storage QoS policies  Provision Thin and Thick storage solutions  Storage classifications for storage pools  Storage Replica solutions  Hyper-V replica solutions  Offloaded Data Transfer (ODX)   LUN usage  Optimize Storage Spaces  Direct storage pools  Network QoS policies   SAN copy to rapidly provision VMs

    Module 5 Implement Datacenter Compute Solutions with Virtual Machine Manager (VMM VMtemplates   Hardware profiles   Guest operating system profiles  Application profiles Nano server containers   Operating system deployments using unattend.xml options   Integrate sysprep with unattend.xml answer file   Migrate existing virtual machine deployments to VMM    Checkpoints  Clone virtual machines   Linux virtual machines  Virtual machines from an existing VHD, template, or VMM library  Service Templates

    Module 6 Secure your Software-Defined Datacenter Secure the Compute Environment   Host Guardian Service   Implement shielded VMs for new VMs and existing virtual machines Guarded Fabric solutions DHCP guard Run as accounts and User Roles   RBAC Secure boot Secure the Network Environment Port ACLs VM subnets and virtual NICs  Datacenter Firewall solutions  ACL Rules using Datacenter Firewall Configure and apply Network Controller network policies

    Module 7 Monitor and Maintain the Software-Defined Datacenter Install and Configure SCOM  Monitor and Manage Infrastructure and Virtual Machine Workloads using SCOM  Tune Monitoring using Targeting and Overrides,  maintenance schedules, suspend monitoring temporarily, configure notifications, configure reporting, integrate Operations Manager and VMM, enable PRO, backing up and restoring with tools such as Data Protection Manager (DPM).


    Level II : Cisco Certified Network Associate 200-125

    This course teaches learners how to install, operate, configure, and verify a basic IPv4 and IPv6 network, including configuring a LAN switch, configuring an IP router, identifying basic security threats, understanding redundant topologies, troubleshooting common network issues, connecting to a WAN, configuring EIGRP and OSPF in both IPv4 and IPv6, understanding wide-area network technologies, and getting familiar with device management and Cisco licensing infrastructure services, infrastructure security, and infrastructure management. It also includes more in-depth topics that teach learners how to perform basic troubleshooting steps in enterprise branch office networks, preparing students for the Cisco CCNA certification and also describe the effects of new technologies such as IoE, IoT, IWAN, and SDN on network evolution.

    Course Content :

    Network Fundamentals

    Compare and contrast OSI and TCP/IP models,1.2 Compare and contrast TCP and UDP protocols, Describe the impact of infrastructure components in an enterprise network, Firewalls, Access points, Wireless controllers,1.4 Describe the effects of cloud resources on enterprise network architecture,  Traffic path to internal and external cloud services, Virtual services, Basic virtual network infrastructure, Compare and contrast collapsed core and three-tier architectures,Compare and contrast network topologies, Star, Mesh, Hybrid, Select the appropriate cabling type based on implementation requirements, Apply troubleshooting methodologies to resolve problems, Perform and document fault isolation, Resolve or escalate,Verify and monitor resolution,Configure, verify, and troubleshoot IPv4 addressing and subnetting,Compare and contrast IPv4 address types,Unicast,Broadcast, Multicast, Describe the need for private IPv4 addressing, Identify the appropriate IPv6 addressing scheme to satisfy addressing requirements in a LAN/WAN environment,Configure, verify, and troubleshoot IPv6 addressing, Configure and verify IPv6 Stateless Address Auto Configuration,Compare and contrast IPv6 address types,Global unicast, Unique local, Link local, Multicast, Modified EUI 64, Autoconfiguration, Anycast

    LAN Switching Technologies

    Describe and verify switching concepts,MAC learning and aging,Frame switching, Frame flooding, MAC address table,Interpret Ethernet frame format,Troubleshoot interface and cable issues (collisions, errors, duplex, speed),Configure, verify, and troubleshoot VLANs (normal/extended range) spanning multiple switches, Access ports (data and voice), Default VLAN,Configure, verify, and troubleshoot interswitch connectivity, Trunk ports, Add and remove VLANs on a trunk, DTP, VTP (v1&v2), and 802.1Q,2.5.d Native VLAN,Configure, verify, and troubleshoot STP protocols,STP mode (PVST+ and RPVST+),STP root bridge selection,Configure, verify and troubleshoot STP related optional features,PortFast, BPDU guard,Configure and verify Layer 2 protocols,Cisco Discovery Protocol, LLDP, Configure, verify, and troubleshoot (Layer 2/Layer 3) EtherChannel,Static, PAGP, LACP,Describe the benefits of switch stacking and chassis aggregation

    Routing Technologies

    Describe the routing concepts,Packet handling along the path through a network,Forwarding decision based on route lookup, Frame rewrite, Interpret the components of a routing table,Prefix, Network mask, Next hop,Routing protocol code, Administrative distance,Metric, Gateway of last resort,Describe how a routing table is populated by different routing information sources,Admin distance,Configure, verify, and troubleshoot inter-VLAN routing,Router on a stick, SVI,Compare and contrast static routing and dynamic routing, Compare and contrast distance vector and link state routing protocols,Compare and contrast interior and exterior routing protocols,Configure, verify, and troubleshoot IPv4 and IPv6 static routing,Default route, Network route,Host route,Floating static,Configure, verify, and troubleshoot single area and multi-area OSPFv2 for IPv4 (excluding authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs),Configure, verify, and troubleshoot single area and multi-area OSPFv3 for IPv6 (excluding authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs), Configure, verify, and troubleshoot EIGRP for IPv4 (excluding authentication, filtering, manual summarization, redistribution, stub) Configure, verify, and troubleshoot EIGRP for IPv6 (excluding authentication, filtering, manual summarization, redistribution, stub),Configure, verify, and troubleshoot RIPv2 for IPv4 (excluding authentication, filtering, manual summarization, redistribution),Troubleshoot basic Layer 3 end-to-end connectivity issues

    WAN Technologies

    Configure and verify PPP and MLPPP on WAN interfaces using local authentication, Configure, verify, and troubleshoot PPPoE client-side interfaces using local authentication, Configure, verify, and troubleshoot GRE tunnel connectivity, Describe WAN topology options,Point-to-point, Hub and spoke, Full mesh, Single vs dual-homed, Describe WAN access connectivity options,MPLS, Metro Ethernet, Broadband PPPoE, Internet VPN (DMVPN, site-to-site VPN, client VPN),Configure and verify single-homed branch connectivity using eBGP IPv4 (limited to peering and route advertisement using Network command only), Describe basic QoS concepts, Marking, Device trust, Prioritization, Voice, Video, Data, Shaping, Policing, Congestion management

    Infrastructure Services

    Describe DNS lookup operation, Troubleshoot client connectivity issues involving DNS, Configure and verify DHCP on a router (excluding static reservations), Server, Relay, Client, TFTP, DNS, and gateway options,Troubleshoot client- and router-based DHCP connectivity issues Configure, verify, and troubleshoot basic HSRP,Priority, Preemption, Version,Configure, verify, and troubleshoot inside source NAT,Static,Pool, PAT Configure and verify NTP operating in a client/server mode

    Infrastructure Security

    Configure, verify, and troubleshoot port security, Static, Dynamic, Sticky, Max MAC addresses, Violation actions, Err-disable recovery, Describe common access layer threat mitigation techniques, 802.1x,DHCP snooping, Nondefault native VLAN,Configure, verify, and troubleshoot IPv4 and IPv6 access list for traffic filtering, Standard, Extended, Named,Verify ACLs using the APIC-EM Path Trace ACL analysis tool,Configure, verify, and troubleshoot basic device hardening, Local authentication, Secure password, Access to device, Source address, Telnet/SSH,Login banner ,Describe device security using AAA with TACACS+ and RADIUS

    Infrastructure Management

    Configure and verify device-monitoring protocols,SNMPv2,7.1.b SNMPv3,7.1.c Syslog, Troubleshoot network connectivity issues using ICMP echo-based IP SLA, Configure and verify device management, Backup and restore device configuration, Using Cisco Discovery Protocol or LLDP for device discovery, Licensing, Logging, Timezone, Loopback, Configure and verify initial device configuration, Perform device maintenance ,Cisco IOS upgrades and recovery (SCP, FTP, TFTP, and MD5 verify), Password recovery and configuration register, File system management, Use Cisco IOS tools to troubleshoot and resolve problems, Ping and traceroute with extended option, Terminal monitor, Log events, Local SPAN, Describe network programmability in enterprise network architecture, Function of a controller, Separation of control plane and data plane, Northbound and southbound APIs

    This course teaches learners how to install, operate, configure, and verify a basic IPv4 and IPv6 network, including configuring a LAN


    Level III : Cisco Certified Network Professional (CCNP)

     Cisco Certified Network Professional (CCNP) validates knowledge and skills required to install, configure and troubleshoot converged local and wide area networks with 100 to 500 or more nodes. With a CCNP certification, a network professional demonstrates the knowledge and skills required to manage the routers and switches that form the network core, as well as edge applications that integrate voice, wireless, and security into the network. The CCNP curriculum includes building scalable Cisco networks, Cisco multilayer switched networks, securing converged wide area networks, and optimizing converged networks.

    CCNP Prerequisites:

    Valid CCNA certification

    300-101 ROUTE

    1.0   Network Principles

    Identify Cisco Express Forwarding concepts, FIB, Adjacency table,  Explain general network challenges,Unicast, Out-of-order packets, Asymmetric routing, Describe IP operations, ICMP Unreachable and Redirects, IPv4 and IPv6 fragmentation, TTL, Explain TCP operations, IPv4 and IPv6 (P)MTU, MSS, Latency, Windowing , Bandwidth-delay product, Global synchronization, Describe UDP operations, Starvation, Latency, Recognize proposed changes to the network, Changes to routing protocol parameters, Migrate parts of the network to IPv6, Routing protocol migration

    2.0   Layer 2 Technologies

    Configure and verify PPP, Authentication (PAP, CHAP), PPPoE (client side only) , 2.2  Explain Frame Relay, Operations,Point-to-point , Multipoint

    3.0   Layer 3 Technologies

    Identify, configure, and verify IPv4 addressing and subnettingAddress types (Unicast, broadcast, multicast, and VLSM), ARP, DHCP relay and server ,DHCP protocol operations, Identify IPv6 addressing and subnettingUnicast, EUI-64, ND, RS/RA , Autoconfig (SLAAC) , DHCP relay and server,  DHCP protocol operations , Configure and verify static routing, Configure and verify default routing, Evaluate routing protocol types Distance vector, Link state, Path vector , Describe administrative distance,  Troubleshoot passive interfaces, Configure and verify VRF lite, Configure and verify filtering with any protocol,  Configure and verify redistribution between any routing protocols or routing sources, Configure and verify manual and auto summarization with any routing protocol, Configure and verify policy-based routing, Identify suboptimal routing,  Explain ROUTE maps,  Configure and verify loop prevention mechanisms. Route tagging and filtering, Split-horizon, Route poisoning, Configure and verify RIPv2,  Describe RIPng, Describe EIGRP packet types, Configure and verify EIGRP neighbor relationship and authentication,  Configure and verify EIGRP stubs Configure and verify EIGRP load balancing. Equal cost, Unequal cost, Describe and optimize EIGRP metrics, Configure and verify EIGRP for IPv6, Describe OSPF packet types,  Configure and verify OSPF neighbor relationship and authentication,  Configure and verify network types, area types, and router types. Point-to-point, mult ipoint, broadcast, nonbroadcast, LSA types, area type: backbone, normal, transit, stub, NSSA, totally stub, Internal router, backbone router, ABR, ASBR , Virtual link,  Configure and verify OSPF path preference, Configure and verify OSPF operations, Configure and verify OSPF for IPv6,  Describe, configure, and verify BGP peer relationships and authentication. Peer group,Active, passive, States and timers, Configure and verify eBGP (IPv4 and IPv6 address families) eBGP,4-byte AS number/p> ,  Private AS,  Explain BGP attributes and best-path selection

    4.0   VPN Technologies

    Configure and verify GRE, Describe DMVPN (single hub), Describe Easy Virtual Networking (EVN)

    5.0   Infrastructure Security

    Describe IOS AAA using local database,Describe device security using IOS AAA with TACACS+ and RADIUS.AA with TACACS+ and RADIUS, Local privilege authorization fallback, Configure and verify device access control. Lines (VTY, AUX, console), Management plane protection, Password encryption, Configure and verify router security features. IPv4 access control lists (standard, extended, time-based), IPv6 traffic filter, Unicast reverse path forwarding

    6.0   Infrastructure Services

    Configure and verify device management .Console and VTY, Telnet, HTTP, HTTPS, SSH, SCP,(T)FTP,  Configure and verify SNMP. V2, V3, Configure and verify logging. Local logging, syslog, debugs, conditional debugs, Timestamps, Configure and verify Network Time Protocol (NTP). NTP master, client, version 3, version 4,  NTP authentication,  Configure and verify IPv4 and IPv6 DHCP.  DHCP client, IOS DHCP server, DHCP relay,  DHCP options (describe),  Configure and verify IPv4 Network Address Translation (NAT). Static NAT, dynamic NAT, PAT,  Describe IPv6 NAT. NAT64,NPTv6,  Describe SLA architecture,  Configure and verify IP SLA. ICMP,  Configure and verify tracking objects. Tracking objects, Tracking different entities (for example, interfaces, IPSLA results, Configure and verify Cisco NetFlow. NetFlow v5, v9,  Local retrieval,  Export (configuration only)

    300-115 SWITCH

    1.0   Layer 2 Technologies

    Configure and verify switch administration. SDM templates, Managing MAC address table, Troubleshoot Err-disable recovery, Configure and verify Layer 2 protocols CDP, LLDP, UDLD, Configure and verify VLANs. Access ports, VLAN database, Normal, extended VLAN, voice VLAN, Configure and verify trunking. VTPv1, VTPv2, VTPv3, VTP pruning, dot1Q, Native VLAN, Manual pruning, Configure and verify EtherChannels. LACP, PAgP, manual, Layer 2, Layer 3,Load balancing,  Ether Channel mis configuration guard, Configure and verify spanning tree. PVST+, RPVST+, MST, Switch priority, port priority, path cost, STP timers, PortFast, BPDUguard, BPDUfilter, Loopguard and Rootguard,  Configure and verify other LAN switching technologies. SPAN, RSPAN, Describe chassis virtualization and aggregation technologies Stackwise

    2.0   Infrastructure Security

    Configure and verify switch security features. DHCP snooping, IP Source Guard , Dynamic ARP inspection ,Port security , Private VLAN , Storm controls, Describe device security using Cisco IOS AAA with TACACS+ and RADIUS AAA with TACACS+ and RADIUS,Local privilege authorization fallback

    3.0   Infrastructure Services

    3.1 Configure and verify first-hop redundancy protocols HSRP, VRRP, GLBP

    300-135 TSHOOT

    1.0   Network Principles

    Use Cisco IOS troubleshooting tools. Debug, conditional debug, Ping and trace route with extended options, Apply troubleshooting methodologies. Diagnose the root cause of networking issues (analyze symptoms, identify and describe root cause),  Design and implement valid solutions, Verify and monitor resolution

    2.0   Layer 2 Technologies

    Troubleshoot switch administration, SDM templates, Managing MAC address table , Troubleshoot Err-disable recovery, Troubleshoot Layer 2 protocols CDP, LLDP, UDLD, Troubleshoot VLANs, Access ports, VLAN database , Normal, extended VLAN, voice VLAN Troubleshoot trunking VTPv1, VTPv2, VTPv3, VTP pruning, dot1Q , Native VLAN , Manual pruning, Troubleshoot EtherChannels LACP, PAgP, manual, Layer 2, Layer 3 , Load balancing,Ether Channel miscon figuration guard, Troubleshoot spanning tree PVST+, RPVST +, MST, Switch priority, port priority, path cost, STP timers, PortFast, BPDUguard, BPDUfilter,Loopguard, Rootguard Troubleshoot other LAN switching technologies SPAN, RSPAN, Troubleshoot chassis virtualization and aggregation technologies Stackwise

    3.0   Layer 3 Technologies

    Troubleshoot IPv4 addressing and subnetting Address types (Unicast, broadcast, multicast, and VLSM),ARP,DHCP relay and server ,DHCP protocol operations, Troubleshoot IPv6 addressing and subnetting Unicast, EUI-64,ND, RS/RA ,Autoconfig (SLAAC) , DHCP relay and server , DHCP protocol operations,   Troubleshoot static routing, Troubleshoot default routing, Troubleshoot administrative distance, Troubleshoot passive interfaces,  Troubleshoot VRF lite, Troubleshoot filtering with any protocol, Troubleshoot between any routing protocols or routing sources, Troubleshoot manual and autosummarization with any routing protocol,  Troubleshoot policy-based routing, Troubleshoot suboptimal routing, Troubleshoot loop prevention mechanisms Route tagging, filtering, Split-horizon, Route poisoning,  Troubleshoot RIPv2,  Troubleshoot EIGRP neighbor relationship and authentication, Troubleshoot loop free path selection RD, FD, FC, successor, feasible successor,  Troubleshoot EIGPR operations Stuck in active,  Troubleshoot EIGRP stubs Troubleshoot EIGRP load balancing Equal cost,Unequal cost, Troubleshoot EIGRP metrics,  Troubleshoot OSPF neighbor relationship and authentication,  Troubleshoot network types, area types, and router types Point-to-point, multipoint, broadcast, nonbroadcast, LSA types, area type: backbone, normal, transit, stub, NSSA, totally stub,Internal router, backbone router, ABR, ASBR, Virtual link Troubleshoot OSPF path preference,  Troubleshoot OSPF operations,  Troubleshoot OSPF for IPv6,  Troubleshoot BGP peer relationships and authentication Peer group, Active, passive, States and timers, Troubleshoot eBGP eBGP,4-byte AS number

    4.0   VPN Technologies

    Troubleshoot GRE

    5.0   Infrastructure Security

    Troubleshoot IOS AAA using local database, Troubleshoot device access control Lines (VTY, AUX, console), Management plane protection, Password encryption, Troubleshoot router security features IPv4 access control lists (standard, extended, time-based), IPv6 traffic filter, Unicast reverse path forwarding

    6.0   Infrastructure Services

    Troubleshoot device management Console and VTY, Telnet, HTTP, HTTPS, SSH, SCP,(T)FTP, Troubleshoot SNMP V2, V3 Troubleshoot logging Local logging, syslog, debugs, conditional debugs, Timestamps, Troubleshoot Network Time Protocol(NTP) NTP master, client, version 3, version 4, NTP authentication, Troubleshoot IPv4 and IPv6 DHCP DHCP client, IOS DHCP server, DHCP relay, DHCP options (describe), Troubleshoot IPv4 Network Address Translation (NAT) Static NAT, dynamic NAT, PAT

    Troubleshoot SLA architecture, Troubleshoot Tracking objects, Tracking different entities (for example, interfaces, IPSLA results)


    Level IV (OPTIONAL SUBJECT) with extra Fee.  Red Hat Certified Engineer 7( RHCE 7.0)


    Module NoModule NameExam Name & No
    RH 124Red Hat System Administration IRe Hat Certified system Administrator (RHCSA) (EX200)  single exam covering topics from both modules
    RH 135Red Hat System Administration  II
    RH 255Red Hat System Administration  IIIRed Hat Certified Engineer (RHCE) Exam (Ex300)

    I ) Red Hat System Administration I (RH124) Course Outline

    ➢     Access the command line,Log in to a Linux system and run simple commands using the shell.

    ➢     Manage files from the command line Copy, move, create, delete, and organize files from the bash shell prompt.

    Getting help in Red Hat Enterprise Linux ,Resolve problems by using online help systems and Red Hat support utilities.

    ➢     Create, view, and edit text files, Create, view, and edit text files from command output or in an editor.

    ➢     Manage local Linux users and groups, Manage local Linux users and groups, and administer local password policies.

    ➢     Control access to files with Linux file system permissions, Set Linux file system permissions on files and interpret the security effects of different permission settings.

    Monitor and manage Linux processes, Obtain information about the system, and control processes running on it.

    ➢     Control services and daemons, Control and monitor network services and system daemons using systemd.

    ➢     Configure and secure Open Ssh service, Access and provide access to the command line on remote systems securely using Open Ssh.

    ➢     Analyze and store logs, Locate and accurately interpret relevant system log files for troubleshooting purposes.

    ➢     Manage Red Hat Enterprise Linux networking, Configure basic IPv4 networking on Red Hat Enterprise Linux systems.

    ➢     Archive and copy files between systems, Archive files and copy them from one system to another.

    ➢     Install and update software packages, Download, install, update, and manage software packages from Red Hat and yum package repositories.

    ➢     Access Linux file systems, Access and inspect existing file systems on a Red Hat Enterprise Linux system.

    ➢     Use virtualized systems,

    Create and use Red Hat Enterprise Linux virtual machines with KVM and libvirt.

    1. II) Red Hat System Administration II (RH135) Course Outline

         Automate installation with Kickstart

    Automate the installation of Red Hat Enterprise Linux systems with Kickstart.

    ➢     Use regular expressions with grep, Write regular expressions that, when partnered with grep, will allow you to quickly isolate or locate content within text files.

    ➢     Create and Edit text files with vim, Introduce the vim text editor, with which you can open, edit, and save text files.

    ➢     Schedule future Linux tasks, Schedule tasks to automatically execute in the future.

    ➢     Manage priority of Linux processes, Influence the relative priorities at which Linux processes run.

    ➢     Control access to files with access control lists (ACL), Manage file security using POSIX access control lists.

    ➢     Manage SELinux security, Manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise.

    ➢     Connect to network-defined users and groups, Configure systems to use central identity management services.

    ➢     Add disks, partitions, and file systems to a Linux system, Manage simple partitions and file systems.

    ➢     Manage logical volume management (LVM) storage, Manage logical volumes from the command line.

    ➢     Access networked attached storage with network file system (NFS), Access (secure) NFS shares.

    ➢     Access networked storage with SMB, Use autofs and the command line to mount and unmount SMB file systems.

    ➢     Control and troubleshoot the Red Hat Enterprise Linux boot process

    ➢     Limit network communication with firewall, Configure a basic firewall.

    III) Red Hat System Administration III (RH255) course outline

    • Control services and daemons, Review how to manage services and the boot-up process using systemctl.
    • Manage IPv6 networking, Configure and troubleshoot basic IPv6 networking on Red Hat Enterprise Linux systems.
    • Configure link aggregation and bridging, Configure and troubleshoot advanced network interface functionality including bonding, teaming, and local software bridges.
    • Control network port security, Permit and reject access to network services using advanced SELinux and firewalld filtering techniques.
    • Manage DNS for servers, Set and verify correct DNS records for systems and configure secure DNS caching.
    • Configure email delivery, Relay all email sent by the system to an SMTP gateway for central delivery.
    • Provide block-based storagem Provide and use networked iSCSI block devices as remote disks.
    • Provide file-based storage, Provide NFS exports and SMB file shares to specific systems and users.
    • Configure MariaDB databases, Provide a MariaDB SQL database for use by programs and database administrators.
    • Provide Apache HTTPD web service, Configure Apache HTTPD to provide Transport Layer Security (TLS)-enabled websites and virtual hosts.
    • Write Bash scripts, Write simple shell scripts using Bash.
    • Bash conditionals and control structures, Use Bash conditionals and other control structures to write more sophisticated shell commands and scripts.
    • Configure the shell environment, Customize Bash startup and use environment variables, Bash aliases, and Bash functions.
    • Linux containers preview, Preview the capabilities of Linux containers, Docker, and other related technologies in Red Hat Enterprise Linux 7.


    Prerequisites/Candidate profile

    You can directly join the RHCE training which is covering the RHCSA topics also.

    Student should know:
    •  Basic operating level knowledge of Microsoft Windows OS.
    •  Recommended – Computer Hardware basic knowledge
    •  Recommended – Internet browsing and emailing.


    Level IV (OPTIONAL SUBJECT) with extra Fee.  Ethical Hacking 9.0

    Module 01 Introduction to Ethical Hacking

    Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts, Types, and Phases Ethical Hacking Concepts and Scope Information Security Controls Information Security Laws and Standards

    Module 02 Foot-printing and Reconnaissance

    Footprinting Concepts Footprinting Methodology Footprinting Tools Footprinting Countermeasures  Footprinting Penetration Testing

    Module 03 Scanning Networks

    Overview of Network Scanning  Scanning Methodologies

    Module 04 Enumeration

    Enumeration Concepts  NetBIOS Enumeration  SNMP Enumeration  LDAP Enumeration  NTP Enumeration  SMTP Enumeration  Enumeration Countermeasures  SMB Enumeration Countermeasures  Enumeration   Pen Testing

    Module 05 System Hacking

    System Hacking: Goals  CEH Hacking Methodology (CHM)  CEH System Hacking Steps  Hiding Files  Covering Tracks  Penetration Testing

    Module 06 Malware Threats

    Introduction to Malware  Trojan Concepts  Types of Trojans  Virus and Worms Concepts  Malware   Reverse Engineering  Malware Detection  Countermeasures  Anti-Malware Software  Penetration Testing

    Module 07 Sniffing

    Sniffing Concepts  MAC Attacks  DHCP Attacks  ARP   Poisoning  Spoofing Attack  DNS Poisoning  Sniffing Tools  Counter measures  Sniffing Detection Techniques  Sniffing Pen Testing

    Module 08 Social Engineering

    Social Engineering Concepts Social Engineering Techniques  Impersonation on Social Networking Sites  Identity Theft  Social Engineering Countermeasures  Penetration Testing

    Module 09 Denial-of-Service

    DoS/DDoS Concepts  DoS/DDoS Attack Techniques  Botnets  DoS/DDoS Attack Tools  Counter-measures  DoS/DDoS Protection Tools  DoS/DDoS Attack Penetration Testing.

    Module 10 Session Hijacking

    Session Hijacking Concepts   Application Level Session Hijacking  Network-level Session Hijacking  Session Hijacking Tools  Counter-measures  Session Hijacking Pen Testing

    Module 11 Hacking Webservers

    Webserver Concepts  Webserver Attacks  Attack Methodology  Webserver Attack Tools  Counter-measures  Patch Management  Webserver  Security Tools  Webserver  Pen Testing

    Module 12 Hacking Web Applications

    Web App Concepts  Web App Threats  Web App Hacking Methodology  Web Application Hacking Tools  Countermeasures  Security Tools  Web App Pen Testing

    Module 13 SQL Injection

    SQL Injection Concepts  Types of SQL Injection  SQL Injection Methodology  SQL Injection Tools  Evasion Techniques  Counter-measures

    Module 14 Hacking Wireless Networks

    Wireless Concepts  Wireless Encryption  Wireless Threats  Wireless Hacking Methodology  Wireless Hacking Tools  Bluetooth Hacking  Counter-measures  Wireless Security Tools  Wi-Fi Pen Testing

    Module 15 Hacking Mobile Platforms

    Mobile Platform Attack Vectors  Hacking Android OS  Hacking iOS  Hacking Windows Phone OS  Hacking BlackBerry  Mobile Device Management (MDM)  Mobile Security Guidelines and Tools  Mobile Pen Testing

    Module 16 Evading IDS, Firewalls, and Honeypots

    IDS, Firewall and Honeypot Concepts  IDS, Firewall and Honeypot System  Evading IDS  Evading Firewalls  IDS/Firewall Evading Tools  Detecting Honeypots  IDS/Firewall Evasion Counter-measures Penetration Testing

    Module 17 Cloud Computing

    Introduction to Cloud Computing  Cloud Computing Threats  Cloud Computing Attacks  Cloud Security  Cloud Security Tools  Cloud Penetration Testing

    Module 18 Cryptography

    Cryptography Concepts  Encryption Algorithms  Cryptography Tools  Public Key Infrastructure(PKI)  Email Encryption  Disk Encryption  Cryptography Attacks  Cryptanalysis Tools

    For Details Contact :- Ms. Angel/ Ms. Ann

    Mobile and Whatsapp No : 9947422200 / 9744166610
    Email id :

    Course Reviews

    No Reviews found for this course.

    Popular Courses

    Placed Students

    Template Design © VibeThemes. All rights reserved.
    Skip to toolbar