India has witnessed a phenomenal growth in the number of ATMs installed, Telecom Service Providers, Chain of Retail/Healthcare/Media, E-Governance Project, IT and BPO companies. Network Connectivity is the backbone of all these segments, which leads to tremendous employment opportunity for candidates with skills to manage Small to Large Network consisting of various Routers, Switches, Firewalls, connected through Leased Line, ISDN, MPLS, Broadband. An enterprise network connects all the isolated departmental or workgroup networks into an intra-company network. In this scenario, no user or group is an island. All systems can potentially communicate with all other systems while maintaining reasonable performance, security, and reliability. This course starts with basics of Networking and covers Establishing and Securing an Enterprise Network.Audience : Students who has completed their Diploma/Graduation in Electronics/Computer Science and have fair knowledge of Windows/Linux and Networking.
Duration of the course :
Part Time : 6 Months
Full Time : 3 Months
Full Time : 3 Months
Key Benefits :
On completion of this course, the candidate will have the opportunity to work as Network Engineer for ISP/IT/Telecom/Infrastructure Management companies Network Administrator for MNC/Retail Chain/Healthcare/Media Network Support in Technical Call Center Entrepreneurial opportunity to run your own BusinessFees in INR : 25000/-NETWORK +
•Introduction to Network
•ISO/OSI Reference Model
•Network & Cable Types
•LAN Technologies
•Networking Topology
•Networking Devices
•TCP/IP
•IP Addressing
•Subnet and Supernet
•DHCP
•DNS & WINS
•IP Routing
•TCP/IP Utilities
•WAN Technologies
•Security Protocol (IPSEC, L2TP)
•Troubleshooting network problem
•Configuring a Router
•Building a Network
•Managing CISCO in an Internetwork
•IP Routing
•Switching
•Virtual LANs
•Access Lists
•WAN Configuration
Course Overview :
•Implementing Basic EIGRP
•Implementing Advanced EIGRP
•Implementing Basic OSPF
•Implementing a Scalable Multiarea Network OSPF based Solution
•Implementing OSPF over NBMA 1 & NBMA 2
•Describing Different OSPF Area Types
•Controlling Routing Updates
•Implementing Simple Redistribution & Advanced Redistribution
•Foundation concepts and Planning of BGP Routing
•Implementing Basic BGP
•Tuning Attributes of BGP
•Configuring Path Control
•Understanding And Implementing IPv6 Addressing
•Implementing IPv6 Routing and Routing Protocols
(642-813): Implementing Cisco IP Switched Networks (SWITCH)
Course Overview :
•Analyzing Campus Network Designs
•Implementing VLANs in Campus Networks
•Implementing Spanning Tree
•Implementing Inter-VLAN Routing
•Implementing First Hop Redundancy in a Campus Environment
•Implementing a Highly Available Network
•Minimizing Service Loss and Data Theft in a Campus Network
•Integrating Wireless LANs into a Campus Network
•Accommodating Voice and Video in Campus Network
(642-832) Troubleshooting and Maintaining Cisco IP Networks (TSHOOT)
•Planning Maintenance for Complex Networks
•Selecting Maintenance and Troubleshooting Tools and Applications
•Planning Troubleshooting Processes for Complex Enterprise Networks
•Maintaining and Troubleshooting Campus Switching-Based Problems
•Maintaining and Troubleshooting Routing Based Solutions
•Maintaining and Troubleshooting Network Security Solutions
•Maintaining and Troubleshooting Integrated, Complex Enterprise Networks
•Troubleshooting Performance Problems on Switches
•Troubleshooting Wireless Connectivity
•Troubleshooting Voice over IP
•Troubleshooting Multicast
•Troubleshooting NAT and PAT
•Troubleshooting DHCP
•Troubleshooting IPv6, OSPFv3, and RIPngCCNA SECURITY
•Describe and list mitigation methods for common network attacks
•Describe and list mitigation methods for Worm, Virus, and Trojan Horse attacks
•Describe the Cisco Self Defending Network architecture
•Secure Cisco routers using the SDM Security Audit feature
•Secure Cisco routers by configuring multiple privilege levels and role based CLI
•Implement AAA on Cisco routers using local router database and external ACS
•Mitigate threats to Cisco routers and networks using ACLs
•Configure IP ACLs to prevent IP address spoofing using CLI
•Discuss the caveats to be considered when building ACLs
•Use CLI and SDM to configure SSH on Cisco routers to enable secured management access
•Use CLI and SDM to configure Cisco routers to send Syslog messages to a Syslog server
•Mitigate common Layer 2 attacks
•Describe the operational strengths and weaknesses of the different firewall technologies
•Explain stateful firewall operations and the function of the state table
•Implement Zone Based Firewall using SDM
•Define network based vs. host based intrusion detection and prevention
•Explain IPS technologies, attack responses, and monitoring options
•Enable and verify Cisco IOS IPS operations using SDM
•Explain the different methods used in cryptography
•Explain IKE protocol functionality and phases
•Describe the building blocks of IPSec and the security functions it provides
•Configure and verify an IPSec site-to-site VPN with pre-shared key authentication using SDM
OR
642-617 FIREWALL v1.0 Deploying Cisco ASA Firewall Solutions
•Introduction to the Cisco ASA Adaptive Security Appliance
•Implementation of Basic Connectivity and Device Management
•Deployment of Cisco ASA Adaptive Security Appliance Access Control Features
•Deployment of Cisco ASA Adaptive Security Appliance Network Integration Features
•Deployment of Cisco ASA Adaptive Security Appliance Virtualization and High-Availability Features
•Integration of Cisco ASA Adaptive Security Appliance Security Service Modules
•Configuring Routing on the Cisco ASA Adaptive Security Appliance
•Lab (Optional): Configuring Dynamic Routing
•ISO/OSI Reference Model
•Network & Cable Types
•LAN Technologies
•Networking Topology
•Networking Devices
•TCP/IP
•IP Addressing
•Subnet and Supernet
•DHCP
•DNS & WINS
•IP Routing
•TCP/IP Utilities
•WAN Technologies
•Security Protocol (IPSEC, L2TP)
•Troubleshooting network problem
CCNA (CISCO CERTIFIED NETWORK ASSOCIATE)
•Configuring a Router
•Building a Network
•Managing CISCO in an Internetwork
•IP Routing
•Switching
•Virtual LANs
•Access Lists
•WAN Configuration
CCNP
(642-902): Implementing Cisco IP Routing(ROUTE)Course Overview :
•Implementing Basic EIGRP
•Implementing Advanced EIGRP
•Implementing Basic OSPF
•Implementing a Scalable Multiarea Network OSPF based Solution
•Implementing OSPF over NBMA 1 & NBMA 2
•Describing Different OSPF Area Types
•Controlling Routing Updates
•Implementing Simple Redistribution & Advanced Redistribution
•Foundation concepts and Planning of BGP Routing
•Implementing Basic BGP
•Tuning Attributes of BGP
•Configuring Path Control
•Understanding And Implementing IPv6 Addressing
•Implementing IPv6 Routing and Routing Protocols
(642-813): Implementing Cisco IP Switched Networks (SWITCH)
Course Overview :
•Analyzing Campus Network Designs
•Implementing VLANs in Campus Networks
•Implementing Spanning Tree
•Implementing Inter-VLAN Routing
•Implementing First Hop Redundancy in a Campus Environment
•Implementing a Highly Available Network
•Minimizing Service Loss and Data Theft in a Campus Network
•Integrating Wireless LANs into a Campus Network
•Accommodating Voice and Video in Campus Network
(642-832) Troubleshooting and Maintaining Cisco IP Networks (TSHOOT)
•Planning Maintenance for Complex Networks
•Selecting Maintenance and Troubleshooting Tools and Applications
•Planning Troubleshooting Processes for Complex Enterprise Networks
•Maintaining and Troubleshooting Campus Switching-Based Problems
•Maintaining and Troubleshooting Routing Based Solutions
•Maintaining and Troubleshooting Network Security Solutions
•Maintaining and Troubleshooting Integrated, Complex Enterprise Networks
•Troubleshooting Performance Problems on Switches
•Troubleshooting Wireless Connectivity
•Troubleshooting Voice over IP
•Troubleshooting Multicast
•Troubleshooting NAT and PAT
•Troubleshooting DHCP
•Troubleshooting IPv6, OSPFv3, and RIPngCCNA SECURITY
•Describe and list mitigation methods for common network attacks
•Describe and list mitigation methods for Worm, Virus, and Trojan Horse attacks
•Describe the Cisco Self Defending Network architecture
•Secure Cisco routers using the SDM Security Audit feature
•Secure Cisco routers by configuring multiple privilege levels and role based CLI
•Implement AAA on Cisco routers using local router database and external ACS
•Mitigate threats to Cisco routers and networks using ACLs
•Configure IP ACLs to prevent IP address spoofing using CLI
•Discuss the caveats to be considered when building ACLs
•Use CLI and SDM to configure SSH on Cisco routers to enable secured management access
•Use CLI and SDM to configure Cisco routers to send Syslog messages to a Syslog server
•Mitigate common Layer 2 attacks
•Describe the operational strengths and weaknesses of the different firewall technologies
•Explain stateful firewall operations and the function of the state table
•Implement Zone Based Firewall using SDM
•Define network based vs. host based intrusion detection and prevention
•Explain IPS technologies, attack responses, and monitoring options
•Enable and verify Cisco IOS IPS operations using SDM
•Explain the different methods used in cryptography
•Explain IKE protocol functionality and phases
•Describe the building blocks of IPSec and the security functions it provides
•Configure and verify an IPSec site-to-site VPN with pre-shared key authentication using SDM
OR
642-617 FIREWALL v1.0 Deploying Cisco ASA Firewall Solutions
•Introduction to the Cisco ASA Adaptive Security Appliance
•Implementation of Basic Connectivity and Device Management
•Deployment of Cisco ASA Adaptive Security Appliance Access Control Features
•Deployment of Cisco ASA Adaptive Security Appliance Network Integration Features
•Deployment of Cisco ASA Adaptive Security Appliance Virtualization and High-Availability Features
•Integration of Cisco ASA Adaptive Security Appliance Security Service Modules
•Configuring Routing on the Cisco ASA Adaptive Security Appliance
•Lab (Optional): Configuring Dynamic Routing
best training institute for networking
ReplyDelete