Archive for December, 2019

CCNA7 Muscat Oman

Posted: December 27, 2019 in 200-125, 200-301, 210-260, CCNA Cyber Ops, Cisco

Get online ccna7 200-301
Training in Muscat Oman
100% Certification Get New CCNA7 200-301 Syllabus

CCNA Syllabus , New CCNA version 7 Training in Oman available 

Get Contact WhatsApp: 0092-301-7640931

New ccna7 Syllabus 200-301

Posted: December 23, 2019 in 200-301, Cisco

New Module: LAN Security Concepts

  • Endpoint Security: Network attacks, Security devices, Endpoint Protection, Email and Web Security
  • Access Control: Local Password, Authentication, Authorization, Accounting, 802.1x
  • Security Threats: Layer 2 Vulnerabilities, Switch Attack Categories, Switch attack mitigation techniques
  • MAC Address Table Attacks and mitigation
  • LAN Attacks: VLAN Hopping, VLAN Double Tagging, DHCP Attacks, ARP Attacks, Address Spoofing attacks, STP Attacks, CDP Reconnaissance

New Module: Switch Security Configuration

  • Implement Port Security: Secure unused ports, Mitigate MAC Address Table Attacks, Enable Port Security, Limit and Learn MAC Addresses, Port Security Aging, Port Security Violation Modes, Ports in err-disabled state, Verify Port Security
  • Mitigate VLAN Attacks: Mitigate VLAN Hopping
  • Mitigate DHCP Attacks: DHCP Snooping, Configuration
  • Mitigate ARP Attacks: Dyn ARP Inspection, DAI Implementation
  • Mitigate STP Attacks: PortFast and BPDU Guard, Configuration

New Module: WLAN Concepts

  • Introduction to Wireless: Benefits of Wireless, Type of Wireless networks, Wireless Technologies, 802.11, Radio Frequencies, Wireless Standards Organizaions
  • WLAN Components: Wireless NIC, Wireless Home Router, Wireless Access Point, AP Categories, Wireless Antennas
  • WLAN Operation: 802.11 Modes, BSS and ESS, 802.11 Frame Structure, CSMA/CA, Client and AP Association, Passive and Active discovery
  • CAPWAP Operation: Introduction to CAPWAP, Split MAC Architecture, DTLS Encryption, FlexConnect APs
  • Channel Management: Frequency Channel Saturation, Channel Selection, Planning a WLAN Deployment
  • WLAN Threats: DoS attacks, Rouge Access Points, MITM Attack
  • Secure WLANs: SSID Cloaking and MAC Filtering, 802.11 Original Auth. Methods, Shared Key auth. Methods, Authenticating a home user, Encryption Methods, Auth. In the Enterprise, WPA3

New Module: WLAN Configuration

  • Remote Site WLAN Configuration: Wireless Router, Log in to Wireless Router, Basic Network setup, Configure a wireless mesh network, NAT for IPv4, QoS
  • Configure a Basic WLAN on the WLC: WLC Topology, Log into the WLC, View AP Information, Advanced Settings, Configure a WLAN
  • Configure a WPA2 Enterprise WLAN on the WLC: SNMP and RADIUS, Configure SNMP Server Information, Configure RADIUS Server Information, Configure a VLAN for a New WLAN, Topology with VLAN 5 Addressing, Configure a new Interface, Configure a DHCP in a new WLAN, Configure DHCP Scope, Configure WPA2 Enterprise WLAN
  • Troubleshoot WLAN Issues: Wireless Client not connecting, Network is slow, Updating Firmware

New Module: Network Security Concepts

  • Current State of Cybersecurity: Current state of Affairs, Vectors of network attacks, Data Loss
  • Threat Actors: The Hacker, Evolution of Hackers, Cyber Criminals, Hacktivists, State-Sponsored Hackers
  • Threat Actor Tools: Attack Tools, Evolution of Security Tools, Attack Types
  • Malware: Viruses and Trojan Horses, Types of Malware
  • Common Network Attacks: Reconnaissance, Access, Social Engineering, Dos and DDoS
  • IP Vulnerabilities and Threats: ICMP, Amplification and Reflection, Address Spoofing Attacks
  • TCP and UDP Vulnerabilities: TCP and UDP Segment Header, TCP Services, TCP Attacks, UDP Attacks
  • IP Services: ARP Vulnerabilities, ARP Cache poisoning, DNS Attacks, DNS Tunneling, DHCP Attacks
  • Network Security Best Practices: CIA, Defence-in-Depth approach, Firewalls, IPS, Content Security Appliances
  • Cryptography: Securing communication, Data Integrity, Hash Functions, Origin Auth., Data Confidentiality, Symmetric Encryption, Asymmetric Encryption, Deffie-Helman

New Module: VPN and IPsec Concepts

  • VPN Technology: VPN Benefits, Site-to-Site and Remote-access VPN, Enterprise and Service provider VPN
  • Types of VPN: Remote-access, SSL, Site-to-Site IPsec, GRE over IPsec, DMVPN, IPsec Virtual Tunnel Interface, Service Provider MPLS
  • IPsec: IPsec concepts, IPsec technologies, IPsec protocol encapsulation, Confidentiality, Integrity, Authentication, Secure Key Exchange with DH, IPsec transport and Tunnel modes

New Module: Network Automation

  • Automation Overview
  • Data Formats: Data formats concept, data format rules, JSON, YAML, XML
  • APIs: API Concept, API Example, Open, Internal and Partner APIs, Types of Web Service APIs
  • REST: REST and RESTful API, RESTful implementation, URI/URN/URL, Anatomy of RESTful Request, RESTful API Applications
  • Configuration Management Tools: Traditional Network Configuration, Network Automation, Ansible, Chef, Puppet, SaltStack
  • IBN and Cisco DNA Center: Intent Based Networking, Network Infrastructure as Fabric, Cisco DNA, CDA Center

CCNA7 New Modules in Details

Posted: December 22, 2019 in 200-301, Cisco

New Module: LAN Security Concepts

  • Endpoint Security: Network attacks, Security devices, Endpoint Protection, Email and Web Security
  • Access Control: Local Password, Authentication, Authorization, Accounting, 802.1x
  • Security Threats: Layer 2 Vulnerabilities, Switch Attack Categories, Switch attack mitigation techniques
  • MAC Address Table Attacks and mitigation
  • LAN Attacks: VLAN Hopping, VLAN Double Tagging, DHCP Attacks, ARP Attacks, Address Spoofing attacks, STP Attacks, CDP Reconnaissance

New Module: Switch Security Configuration

  • Implement Port Security: Secure unused ports, Mitigate MAC Address Table Attacks, Enable Port Security, Limit and Learn MAC Addresses, Port Security Aging, Port Security Violation Modes, Ports in err-disabled state, Verify Port Security
  • Mitigate VLAN Attacks: Mitigate VLAN Hopping
  • Mitigate DHCP Attacks: DHCP Snooping, Configuration
  • Mitigate ARP Attacks: Dyn ARP Inspection, DAI Implementation
  • Mitigate STP Attacks: PortFast and BPDU Guard, Configuration

New Module: WLAN Concepts

  • Introduction to Wireless: Benefits of Wireless, Type of Wireless networks, Wireless Technologies, 802.11, Radio Frequencies, Wireless Standards Organizaions
  • WLAN Components: Wireless NIC, Wireless Home Router, Wireless Access Point, AP Categories, Wireless Antennas
  • WLAN Operation: 802.11 Modes, BSS and ESS, 802.11 Frame Structure, CSMA/CA, Client and AP Association, Passive and Active discovery
  • CAPWAP Operation: Introduction to CAPWAP, Split MAC Architecture, DTLS Encryption, FlexConnect APs
  • Channel Management: Frequency Channel Saturation, Channel Selection, Planning a WLAN Deployment
  • WLAN Threats: DoS attacks, Rouge Access Points, MITM Attack
  • Secure WLANs: SSID Cloaking and MAC Filtering, 802.11 Original Auth. Methods, Shared Key auth. Methods, Authenticating a home user, Encryption Methods, Auth. In the Enterprise, WPA3

New Module: WLAN Configuration

  • Remote Site WLAN Configuration: Wireless Router, Log in to Wireless Router, Basic Network setup, Configure a wireless mesh network, NAT for IPv4, QoS
  • Configure a Basic WLAN on the WLC: WLC Topology, Log into the WLC, View AP Information, Advanced Settings, Configure a WLAN
  • Configure a WPA2 Enterprise WLAN on the WLC: SNMP and RADIUS, Configure SNMP Server Information, Configure RADIUS Server Information, Configure a VLAN for a New WLAN, Topology with VLAN 5 Addressing, Configure a new Interface, Configure a DHCP in a new WLAN, Configure DHCP Scope, Configure WPA2 Enterprise WLAN
  • Troubleshoot WLAN Issues: Wireless Client not connecting, Network is slow, Updating Firmware

New Module: Network Security Concepts

  • Current State of Cybersecurity: Current state of Affairs, Vectors of network attacks, Data Loss
  • Threat Actors: The Hacker, Evolution of Hackers, Cyber Criminals, Hacktivists, State-Sponsored Hackers
  • Threat Actor Tools: Attack Tools, Evolution of Security Tools, Attack Types
  • Malware: Viruses and Trojan Horses, Types of Malware
  • Common Network Attacks: Reconnaissance, Access, Social Engineering, Dos and DDoS
  • IP Vulnerabilities and Threats: ICMP, Amplification and Reflection, Address Spoofing Attacks
  • TCP and UDP Vulnerabilities: TCP and UDP Segment Header, TCP Services, TCP Attacks, UDP Attacks
  • IP Services: ARP Vulnerabilities, ARP Cache poisoning, DNS Attacks, DNS Tunneling, DHCP Attacks
  • Network Security Best Practices: CIA, Defence-in-Depth approach, Firewalls, IPS, Content Security Appliances
  • Cryptography: Securing communication, Data Integrity, Hash Functions, Origin Auth., Data Confidentiality, Symmetric Encryption, Asymmetric Encryption, Deffie-Helman

New Module: VPN and IPsec Concepts

  • VPN Technology: VPN Benefits, Site-to-Site and Remote-access VPN, Enterprise and Service provider VPN
  • Types of VPN: Remote-access, SSL, Site-to-Site IPsec, GRE over IPsec, DMVPN, IPsec Virtual Tunnel Interface, Service Provider MPLS
  • IPsec: IPsec concepts, IPsec technologies, IPsec protocol encapsulation, Confidentiality, Integrity, Authentication, Secure Key Exchange with DH, IPsec transport and Tunnel modes

New Module: Network Automation

  • Automation Overview
  • Data Formats: Data formats concept, data format rules, JSON, YAML, XML
  • APIs: API Concept, API Example, Open, Internal and Partner APIs, Types of Web Service APIs
  • REST: REST and RESTful API, RESTful implementation, URI/URN/URL, Anatomy of RESTful Request, RESTful API Applications
  • Configuration Management Tools: Traditional Network Configuration, Network Automation, Ansible, Chef, Puppet, SaltStack
  • IBN and Cisco DNA Center: Intent Based Networking, Network Infrastructure as Fabric, Cisco DNA, CDA Center

The NDG Linux Essentials course objectives cover the following subject areas:

• Linux as an operating system

• Considerations for choosing an operating system

• The basics of open source software and licensing

• Basic knowledge of working with Linux

• Basic Linux command line skills

• How to use help commands and navigate help systems when using Linux

• How to work with Linux files and directories

• Search and extract data from Linux files

• Basic understanding of the concept of scripting

• The components of desktop and server computers

• Where data is stored on a Linux system

• Query vital network settings for a Linux computer on a Local Area Network

• Various types of users on a Linux system

• Creating users and groups on a Linux system

• Managing Linux file permissions and ownership

• Special Linux directories and files

kali-linux-responder-31_bixzcjFeatured-Image-Kali-Linux-800x400

Router Basic

Posted: December 7, 2019 in 200-301

Router : OSI Model Layer III Device
Basic purpose is routing
Router has interfaces
1) Ethernet Port
2) Serial Port
3) Aux Port
4) Console Port

Console Session:
————————-
1- we buy new router for the Basic setting
2- password / disaster recovery

Router Mode:
1- User Exec Mode
Router>
Router>enable
2- User Privilege Mode
Router# # means you are as root / administrator
3- Global Config Mode
Router#config terminal
Router(config)#
4- Other Mode
interface mode Router(config-if)#
dhcp mode Router(config-dhcp)#
vlan mode Router(config-vlan)#
router mode Router(config-route)#
etc
? show the available command list
exit one step back
ctrl+z user privelge mode
ctrl+shift+f6 exit from dns lookup
ctrl+c exit command
tab auto complete the command
write save changes
reload restart

Router>enable
Router#config terminal
Router(config)#hostname CCNA
CCNA(config)#exit
CCNA#write
CCNA#reload