Topic | Learnings |
---|---|
Networking | |
Introduction | Network OSI Mode, Network Devices, TCP Model, Cables, IPV4 addressing, Subnetting, Network Design, IPV6, IPV6 Neighbor Discovery Protocol, IPV6 Subnetting, TCP & UDP, Verifying IP Parameters, Describing Wireless Principles, Virtualization Fundamentals, Switching Concepts |
Network Access | Configuring & Verifying VLAN, Configuring and Verifying Interswitch connectivity, configure and verify Cisco Delivery Protocol & LLDP, Configuring LACP, Basic Operations of RAPID PVST+, Spanning Tree Protocol & basic operations, Wireless Architecture, WLAN Components (AP WLC, access/Trunk ports & LAG), Configuring Wireless LAN, AP & WLC management access connections, PPP, MLPP, PPoE |
IP Connectivity | Routing Table, Components of Routing Table, How Router makes a forwarding decision, Configure and Verify IPV4 and IPV6 static routing, configure and verify single area OSPF V2, First Hop redundancy protocol |
IP Services | Configure inside source NAT using static and pools, configure NTP operating in a client server mode, DHCP, DNS, SNMP, use of syslog, Configure DHCP client and relay, PHB for QoS classification / marking / queuing / congestion / policy / shaping, remote access for network devices, TFTP/FTP functionality, |
Security | Security Concepts, security Program elements, password policy/management/complexity/alternatives, remote access, site to site vpn, ACL, DHCP Snooping, ARP inspection, Port Security, authentication vs authorization vs accounting concepts, WPA, WPA2,WPA3, configuring WLAN using WPA2 PSK |
Automation | Impact of automation on network management, traditional network vs controller-based networking, controller-based vs software based (overlay, underlay and fabric), REST based API, SDN, JSON, Configuration management using CHEF, PUPPET and ANSIBLE |
Cyber Security | |
Introduction | Introduction to Cyber Security, |
Fundamentals | Fundamentals of Cyber Security, Security/Threat/Vulnerability/Adversaries, Security Modeling & Risk Assessment, Confidentiality, Integrity and Availability, Zero Trust Model, Security Bugs & Vulnerabilities, Hackers/Crackers/Cyber Criminals, Malware/Viruses/rootkings/RAT, Phishing/Vishing/SMShing, spamming and doxing Crypto Mining Malware and Crypto Jackers, Security Policy, Security Mitigation Methods |
Encryption | Introduction, Symmetric/Asymmetric, hash Functions, Digital Signatures, SSL/TLS, SSL Stripping, HTTPS, Digital Certificates, End to End Encryption |
Architecture | Secure Architecture, Wireless Networks, Network Security controls, Security Testing, Cloud |
Governance | Security Governance, Risk Management |
Incident Management | Incident and Response Management, Digital Forensics, BCP and DR |
WhatsApp us