Training Type | Classroom & Online |
---|---|
Course Duration | 80 Hours Training |
No. of Hours | 2/3/4 Hours/day |
Certificate | Yes |
Skill Level | Intermediate |
Price | ₹ 15,000 (Online) |
Study Material | Yes |
Batches Available | (Mon-Thu) & (Sat-Sun) |
Send us a message
Course Outline
- History of Computer Network
- Explain Network and Networking • Explain the Importance of Networking
- Explain the Role and function of Computer Hardware • Explain Computer Motherboard Architecture
- Explain about CPU, Core, and types of CPU
- Explain role of Graphic- Integrated and dedicated GPU
- Explain Types of Computer Memory- Internal Memory and External Memory • Explain Types of Internal Memory RAM, ROM, and Cache
- Explain Types of RAMS- SRAM, RDRAM, SDRAM and DDR
- Explain External Memory like- Hard Drive and SSD • Explain Different types of Connectors like- PATA, SATA, SAS, NVME, M.2 and NVME M.2
- Explain Network Interface Card (NIC Card)
- Explain about Network topologies
- BUS Topology- Thick Coaxial cable, BNC T-Connector, BNC Plug and Terminator
- Ring Topology
- Star Topology • Mesh/full Mesh
- Advantage and Disadvantage of topologies
- Explain Networking Devices like HUB, Switch, Repeater, Router, Access Point (Broadband Wireless Router), Voice over IP (VOIP), Endpoints, Servers, Web Servers and IOT Devices
- Explain Network Types LAN, WAN, MAN and GAN
- Explain Small office home office (SOHO) Network and Enterprise LAN
- Explain about Internet and how internet works
- Explain ISP 3 Tier Model- Tier 1 ISP, Tier 2 ISP and Tier 3 ISP
- Explain how IT Network works
- Explain Network Attacks like DOS/DDOS, Email Crime, Web Crime, Network HAcking
- Explain Network Security Devices • Explain Network Firewall- IP Packet filter, firewall Access-list
- Explain Email Security Appliance (ESA)- GEO location blocking, Data lost Privation (DLP), Email categories block, Email Data Scanning
- Web Security Appliance (WSA)- URL Filtering, Application Visibility Control (AVC), File Blocking
- Explain Identity Service Engine (ISE)- Authentication, Authorization and Accounting
- History of IP ADDRESS
- Explain IPv4 address- Size, Octet
- Explain IPv4 IP classes
- Explain Private IP and Public IP
- Explain Decimal to Binary
- Explain Binary to Decimal
- Explain about Subnet Mask and Subnetting
- Types of Subnetting - FLSM and VLSM
- Explain FLSM of class C and B
- FLSM of Class C- Required IP 5, 10, 16, 30
- FLSM of Class B- Required IP 100, 200, 500, 1000
- Configure LAN Network using Class B, C FLSM example
- FLSM of Class A- Required IP 1000, 2000, 5000
- Configure Different LAN Network using class A FLSM
- Explain about VLSM of class B, C and A
- VLSM of Class C- Required IP 5, 10, 16, 30
- VLSM of Class B- Required IP 100, 200, 500, 100
- VLSM of Class A- Required IP 1000, 2000, 5000
- Configure and Verify different Department like Sales, Marketing, Finance and IT Network using VLSM
- Configure and Verify FLSM and VLSM with lab
- Explain Network Protocols- TCP, UDP and ICMP
- Explain about TCP protocol
- Explain TCP 3- & 5-way handshake
- Explain TCP services like- telnet, SSH, HTTP, HTTPS, SMTP-IMAP and POP3
- Explain TCP header
- Explain UDP protocol and services like-DHCP, DNS, Video streaming services, Voice traffic
- Difference between TCP and UDP
- Explain ICMP protocol and ICMP services like- PING, TRACEROUTE
- Explain OSI model
- Explain different types of OSI layers
- Explain Application layer Role and Responsibility
- Explain Prestation layer- Data Encode and Decode, Compression and Decompression, DATA Encryption and Decryption, DATA format method
- Explain how Session layer works
- Explain Transport layer- TCP/UDP sockets, Source port and Destination port
- Explain Network Layer- IP Packet, L3 Devices
- Explain DATA link Layer- MAC address, Switch, Frames
- Explain Physical Layer- DATA conversation, Hardware, Power, Cable Check
- Explain packet flow in OSI model from Sender to Receiver
- Explain TCP/IP model
- Difference between OSI and TCP/IP model
• Explain Ethernet Technology
• Explain Types of LAN Cables – STP and UTP
• Difference between Shielded Twisted Pair (STP) and Unshielded Twisted Pair (UTP)
• Explain LAN Cable Categories- CAT
• Difference Between CAT 5, CAT6, CAT6A, CAT7, CAT7a and CAT8
• Explain Straight and Cross Cable
• Explain TIA/EIA 568A and TIA/EIA 568B Wiring Standard
• Hands on practice- how to cut, make, crimp and test Ethernet Cable
• Explain Rollover Cable (console cable), Fiber Cable
• Difference Between Ethernet Cable and Fiber Cable
• Explain RJ45 port, power-over-ethernet (poe) port and SFP Port
• History of Cisco Switch • Explain different types of Cisco Hardware models • Explain Cisco Switch features • Explain Cisco Switch software- IOS • Explain Cisco Switch memory types • Explain Cisco Switch boot process • Explain how to access Switch first time • Console Access of Cisco Switch • Explain different types of CLI modes in Switch • Explain User mode (Enable mode), Privilege mode (Exec mode), Configure mode(Global mode) and interface mode • Show Switch basic command
• Explain Switch MAC or Content Addressable Memory (CAM) table
• Explain Address Resolution Protocol (ARP)
• Explain Reverse ARP (RARP)
• Explain Gratuitous ARP (GARP)
• Explain Switch Packet Flow
• Explain Ethernet Frame Format
• Broadcast Domain and Collision Domain
• Configure basic LAN Network using Switch
• Explain Half-Duplex and Full Duplex
• Explain about Virtual LAN (VLAN) • Explain Static VLAN, Dynamic VLAN, Native VLAN and Voice VLAN • Explain Switch ports mode- Access mode and trunk mode • Difference between Trunking Protocol ISL and Dot1q • Explain Dynamic Trunking Protocol (DTP) • Configure LAN Network with VLAN and Trunk
• Explain VLAN Routing Method • Explain Inter-VLAN Routing • Explain Static Virtual Interface (SVI) on switch • Explain Router on Stick (Sub-Interface) • Configure and Verify Inter-VLAN Routing on Switch • Configure and Verify Router on Stick
• Explain Switch Layer 3 Model
• Explain Access Switch, Core Switch and Distribute switch
• Explain Virtual Trunking Protocol (VTP) • Explain VTP Modes- Server mode, Client mode and transparent mode in VTP
• Configure and Verify VTP Server, client and transparent mode
• Explain Switch looping • Prevent loop between Switches using STP • Explain Spanning Tree Protocol (STP) • Explain STP Root Bridge election Process • Configure and Verify STP
• Explain STP Port-fast, BPDU Guard and BPDU filter
• Configure and Verify BPDU Guard and Fitter
• Explain Rapid STP (RSTP)
• Explain Per VLAN STP (PVSTP)
• Difference Between STP, RSTP and PVSTP
• Setup Remote Access Services • Configure Telnet SSH Access for Switch Remote Access • Explain Enable Password, Secret Password and Username Password Authentication • Configure Switch line for login Access
• Explain EtherChannel or Link Aggregation • EtherChannel Protocol LACP and PAGP • Explain LACP EtherChannel mode- Active, Passive and ON mode • Explain PAGP mode- Auto, Desirable • Difference between LACP and PAGP • Configure EtherChannel between switches using LACP • Configure EtherChannel between switches using PAGP • Configure EtherChannel between Switch and Router
• History of Cisco Router
• Explain different types of Router Hardware models
• Explain Cisco Router features
• Explain Cisco Router software- IOS, IOS XE and IOS XR
• Explain Cisco Router memory
• Explain Cisco Router boot process
• Explain how to access router first time
• Console Access of Cisco Router
• Explain different types of CLI modes in Router
• Explain User mode(Enable mode), Privilege mode( Exec mode), Configure mode( Global mode) and interface mode
• Show Routers basic command
• Configure Router Interface and assign IP address
• Configure Remote Access protocols like telnet, SSH, HTTP and HTTPS
• Access Router via Remote access
• Configure LAN Network using Router
• Explain Routing feature and why routing is required
• Explain different types of Routing Methods
• Explain Static Routing, Dynamic Routing and Default Routing
• Configure Static Routing and connect different subnets using static routing
• Configure Default Routing
• Explain about Dynamic Routing protocols categories like- distance vector, link state and
• Hybrid Routing protocols
• Explain about RIP routing protocol
• Explain RIP features
• Explain RIP path selection process
• Explain RIP timers- Update time, Hold-down time and Flush time
• Difference between RIP v1 and v2
• Configure RIPv1 and RIPv2
• Explain and Configure Passive interface
• Explain and Configure Split horizon
• Explain EIGRP Routing protocol
• Explain Features of EIGRP Protocol
• Explain EIGRP packet flow
• Explain different types of tables in EIGRP
• Difference between Neighbor table, Topology table and Routing Table
• Explain EIGRP timers like Hello time, Hold down time
• Explain Periodical update and trigger update
• Explain Broadcast update and Multicast Update
• Explain full table update and incremental update
• Explain EIGRP metrics
• Explain EIGRP path selection method with examples
• Show EIGRP metric calculations process
• Configure LAN Network using EIGRP protocols
• Explain OSPF Routing protocol
• Explain Features of OSPF Protocol
• Explain OSPF State like- Down state, Init state, Two way state, Exstart start, Exchange state, Loading state and full state
• Explain different types of tables in OSPF
• Difference between Neighbor table, Database table and Routing Table
• Explain OSPF timers like Hello time, Hold down time
• Explain OSPF Area concept
• Explain OSPF Network Types- Point to Point, Point to Multipoint and Broadcast
• Explain OPSF DR and BDR in Broadcast Network type
• Explain OSPF DR and BDR Election Process
• Explain OSPF LSA types
• Explain OSPF path selection method with examples
• Show OSPF metric calculations process
• Configure OSPF protocols with different areas
• Explain and Configure Static floating Routing • Explain need of Redistribution • Configure Multiple Routing Methods on Router • Configure Redistribution between RIP, EIGRP, OSPF and Static Routing (Not Included in CCNA official Blueprint)
• Explain Network Address Translation (NAT)
• Explain Static NAT, Dynamic NAT and PAT
• Configure Static NAT with real time scenarios
• Configure Dynamic NAT
• Configure Port Address Translation (PAT)
• Explain Dynamic Host Control Protocol (DHCP) protocols
• Explain Bootstrap Protocol
• Explain and Show DHCP DORA Message
• Configure DHCP on cisco Router
• Explain Domain name Sever (DNS)
• Configure DNS server on Cisco Router
• Explain and configure Network Time protocol (NTP)
• Explain Simple Network Management Protocol (SNMP)
• Configure and Verify SNMP
• Explain Network Foundation Protection (NFP)
• Explain DATA Plane, Control Plane and Management Plane
• Explain QOS such as per-hop behavior (phb) Classification, marking, Queuing, congestion,
policing and shaping
• Explain Class-map, Policy map and service policy in QOS
• Explain Monitoring (logging)
• Explain different types of logging methods like console, buffer and syslog server
• Explain different types of messages levels in logging
• Show how to monitor VPN Message, Routing Message and other Alerts
• Configure console, buffer and syslog server logging
• Explain Router Password Recovery Process
• Show how to Bypass Router Password if Password Forgot
• Explain how to Upgrade, Backup Cisco Routers
• Show the process of Cisco software image upgradation using Rommon mode and TFTP server
• Explain how to Control Network Traffic using ACL
• Explain Access-List in Cisco Router
• Explain and Standard and Extended
• Explain Name and Number ACL
• Configure Standard ACL using Number and Name
• Configure Extended ACL using Number and Name
• Switch (L2) Security
• Understanding about common L2 Attacks
• Explain about DHCP starvation attack
• Implementing Port security on cisco switch for Prevent DHCP Starvation Attack
• Explanation about DHCP spoofing (Rouge DHCP server) attack
• Implementing DHCP Snooping on cisco Switch for Prevent DHCP Spoofing Attack
• Understanding about ARP spoofing attack
• Implementing Dynamic ARP Inspection (DAI) on switch for Prevent DAI Attacks
• Explain Native VLAN
• Explain VLAN Hopping Attack and explain how someone hack network using Native VLAN
• Explain Authentication, Authorization, and accounting (AAA) model • Explain Local AAA and Centralized AAA • Explain how to Authenticate, Authorize and Accounting (monitor) Network Devices using Local AAA • Explain how to Authenticate, Authorize and Accounting (monitor) Network Devices using Remote AAA • Explain AAA feature using cisco ISE
• Describe about Cryptography • Types of Cryptography • Encryption overview • Types of Encryptions • Symmetric Encryption • Asymmetric Encryption • Overview Encryption Algorithm • Types of Encryption Algorithm • Data Encryption Standard (DES) • Triple Data Encryption Standard (3DES) • Advanced Encryption Standard (AES) • RC4 RC5 RC6 Algorithm • RSA Algorithm • Public & Private Key • Why we need Cryptography Hash overview • Types of Hashing Algorithm • MD5 Hash Algorithm • SHA Hash Algorithm
• Explain Virtual Private Network (VPN)
• Explain Benefits using VPN- CIA
• Explain Confidentiality, Integrity and Authentication
• Explain Types of VPN
• Explain Site to Site VPN
• Explain Remote Access VPN
• Types of VPN technologies -IPSEC and SSL
• Difference Between Site-to-Site VPN and Remote Access VPN
• Explain IPv6 features
• Difference between IPv4 and IPv6
• Explain different types of IPv6 address
• Explain Hexadecimal format of IPv6
• Explain Hexadecimal to binary
• Explain IPv6 different types of shortening methods
• Explain Unicast address- Global address, Link local address and Unique local address
• Explain Multicast IPv6 address
• Explain Anycast IPv6 address
• Configure IPv6 on Cisco Router
• Configure and verify Network Connection using IPv6
• Configure different types of Routing protocols like RIP, EIGRP and OSPF using IPv6 (Not include in CCNA official blueprint)
• Explain Problems in Traditional Network Management • Explain benefits of Automaton • Explain different types of Automation- Network Automation, Cloud Automaton, Data Center Automation, Wireless Network Automaton • Explain how Network Automation works • Explain Software Defined Networking (SDN) • Explain How to Manage Network using SDN Controllers
• Explain Application Programing Interface (API) • Explain types of API • Explain Northbound API • Explain types of Northbound API- • SOAP (simple object Access Protocol) and Representation state transfer (REST) • Explain REST API- CRUD, HTTP verbs and DATA encoding (JSON) • Explain Southbound API • Explain Southbound API types • CLI (telnet/ssh), SNMP ant NETCONF • Open Flex (from Cisco) • OpenFlow (from ONF) • Cisco DEVNET • Explain Cisco DNA Center • Benefits using DNA Center • Network Automation tool like – CHEF, Puppet and Ansible
• Wireless Network • Explain Wireless Network- Advantage and Disadvantage • Explain Types of Wireless Networks- • Wireless LAN (WLAN), Wireless PAN (WPAN), Wireless MAN (WMAN), Wireless WAN (WWAN) • Difference between Wired and Wireless Network • Explain Wireless Devices- Access Point (AP), Wireless LAN Controller (WLC) • Explain Wireless Terms like Service Set Identifier (SSID), Basic Service Set (BSSID) and Extended Service Set (ESSID) • Explain Wireless Standard • Difference Between 802.11a, 802.11b, 802.11c, 802.11n, 802.11ac and 802.11ax • Explain Wireless Authentication process • Explain types of Wireless Encryption- WEP, WPA, LEAP, WPA2 PSK, WPA2 Enterprise, WPA3, Radius, EAP, AES • Explain how WEP, WPA and WPA2-PSK, and WPA2 Enterprise works • Explain Wireless Attacks- De-Authentication, Password Cracking-Brute force, Rouge Access Point and Main in the Middle (MITM) • Explain Wireless Security- MAC binding, Hide SSID
• Wireless Deployment method • Show to Setup any Wi-Fi Router for office or Home Network • Configure and verify Wireless LAN Network using WPA2-PSK • Connect Wireless Network to Wired Network and deploy Company LAN Network
• Explain First Hop Redundancy Protocol (FHRP)
• Explain Cisco Hot Standby Router Protocol (HSRP)
• Configure and Verify LAN Network using HSRP
• Explain about Virtual Router Redundancy Protocol (VRRP)
• Configure and Verify VRRP
• Explain about Gateway Load Balancing Protocol (GLBP)
• Configure and Verify GLBP
• Difference between HSRP,VRRP and GLBP
• Explain Internal Routing Protocol and External Routing Protocol
• Explain BGP Routing Protocol
• Why Companies prefer BGP Routing Protocol
• Explain features of BGP Routing Protocol
• Explain EBGP and IBGP
• Explain BGP Basic Attributes
• Configure BGP Routing Protocol
• Explain DATA Center RACK mounting process • Explain how to Access RACK Devices using Cisco Terminal Server • Explain about ASYNC console cable • Asynchronous interface modules • Configure Cisco Terminal Server and Connect Network Devices to ASYNC cable • Access Terminal Server from Remote site
• Explain IOT Devices
• Explain Virtualization Technology
• Explain DATA Center Virtualization
• Explain VMware Workstation
• Explain VMware vSphere Client and Server
• Explain how to Implement DATA Center Virtualization using VMware
• Explain Virtualization Certification like- VCSA and VCSP
• Explain Cloud Technology
• Explain how Cloud works
• Explain about AWS, GCP and Microsoft Azure
• Advantage and Disadvantage of Cloud
• Difference between Traditional Network and Cloud
• Explain IOT Technology
Track | Classroom & Online |
---|---|
Duration | 80 Hours Training |
Hours | 2/3/4 Hours/day |