IPD Week, February 2020
hosted by the Technical Field Engagement Team
17-23 February 2020

IPD Week, February 2020

Configure devices using security best practices.
Explain how Layer 2 switches forward data.
Implement VLANs and trunking in a switched network.
Troubleshoot inter-VLAN routing on Layer 3 devices.
Explain how STP enables redundancy in a layer 2 network.
Troubleshoot EtherChannel on switched networks.
Implement DHCPv4 to operate across multiple LANs.
Configure dynamic address allocation in IPv6 networks.
Explain how FHRPs provide default gateway services in a redundant network.
Explain how vulnerabilities compromise LAN security.
Configure switch security to mitigate LAN attacks.
Explain how WLANs enable network connectivity.
Implement a WLAN using a wireless router and a WLC.
Explain how routers use information in packets to make forwarding decisions.
Configure IPv4 and IPv6 static routes.
Troubleshoot static and default routes.

FHSRP

Router Redundancy

 

Assignments in Module Now… 

Modules   1 – 3:    Basic Network Connectivity and Communications
Modules   4 – 7:    Ethernet Concepts
Modules  8 – 10:   Communicating Between Networks
Modules 11 – 13:  IP Addressing
Modules 14 – 15:  Network Application Communications
Modules 16 – 17:  Building and Securing a Small Network

03 Feb 2020

Linux II Version 2.0 Releases

Linux II English version 2.0 is now available offering an updated user interface and content, bug fixes, and alignment to the latest Linux Essentials Professional Development Certificate (PDC) version 5.0.

Linux I and II End-of-Life (EOL) Dates

With the release of Linux II version 2.0, Linux II English version 1.0 will EOL 31 July 2020.  Please note, Linux I version 2.0 released last year, 1 August 2019, and Linux I version 1.0 EOL date is now also set to EOL 31 July 2020.

 

All new Linux I and II courses should be created with version 2.0 and any existing courses should transition to version 2.0 before 31 July 2020.

New CCNA7 class available

Posted: January 5, 2020 in 200-301, ccna7, Microsoft

CCNAv7: Introduction to Networks
CCNAv7: Switching, Routing, and Wireless Essentials
CCNAv7: Enterprise Networking, Security, and Automation
CCNAv7: Bridging

Show Command in CCNA Version 7

New Netacad Course Interface ccna7

Protocol Analysis Using Wireshark CCNA Version 7

New ccna7 interface design for students

CCNA Version 7 Course View

new ccna7 admission open

200-301 Course

ccna7 classes in Faisalabad

WhatsApp Image 2019-12-30 at 11.51.54WhatsApp Image 2019-12-30 at 11.51.54 (1)WhatsApp Image 2019-12-30 at 11.51.53WhatsApp Image 2019-12-30 at 11.51.52WhatsApp Image 2019-12-30 at 11.51.53 (1)Building Exterior of Millat Chowk Campus showing parking space

Pearson VUE Faisalabad

Career InstituteTM

Address : Career Institute, P-165 B, 1st Floor, Millat Chowk, Faisalabad, Pakistan
Mobile : 0315-8580027
Phone : 041-8580027
Email : info@career.edu.pk

CCNA7 Muscat Oman

Posted: December 27, 2019 in 200-125, 200-301, 210-260, CCNA Cyber Ops, Cisco

Get online ccna7 200-301
Training in Muscat Oman
100% Certification Get New CCNA7 200-301 Syllabus

CCNA Syllabus , New CCNA version 7 Training in Oman available 

Get Contact WhatsApp: 0092-301-7640931

New ccna7 Syllabus 200-301

Posted: December 23, 2019 in 200-301, Cisco

New Module: LAN Security Concepts

  • Endpoint Security: Network attacks, Security devices, Endpoint Protection, Email and Web Security
  • Access Control: Local Password, Authentication, Authorization, Accounting, 802.1x
  • Security Threats: Layer 2 Vulnerabilities, Switch Attack Categories, Switch attack mitigation techniques
  • MAC Address Table Attacks and mitigation
  • LAN Attacks: VLAN Hopping, VLAN Double Tagging, DHCP Attacks, ARP Attacks, Address Spoofing attacks, STP Attacks, CDP Reconnaissance

New Module: Switch Security Configuration

  • Implement Port Security: Secure unused ports, Mitigate MAC Address Table Attacks, Enable Port Security, Limit and Learn MAC Addresses, Port Security Aging, Port Security Violation Modes, Ports in err-disabled state, Verify Port Security
  • Mitigate VLAN Attacks: Mitigate VLAN Hopping
  • Mitigate DHCP Attacks: DHCP Snooping, Configuration
  • Mitigate ARP Attacks: Dyn ARP Inspection, DAI Implementation
  • Mitigate STP Attacks: PortFast and BPDU Guard, Configuration

New Module: WLAN Concepts

  • Introduction to Wireless: Benefits of Wireless, Type of Wireless networks, Wireless Technologies, 802.11, Radio Frequencies, Wireless Standards Organizaions
  • WLAN Components: Wireless NIC, Wireless Home Router, Wireless Access Point, AP Categories, Wireless Antennas
  • WLAN Operation: 802.11 Modes, BSS and ESS, 802.11 Frame Structure, CSMA/CA, Client and AP Association, Passive and Active discovery
  • CAPWAP Operation: Introduction to CAPWAP, Split MAC Architecture, DTLS Encryption, FlexConnect APs
  • Channel Management: Frequency Channel Saturation, Channel Selection, Planning a WLAN Deployment
  • WLAN Threats: DoS attacks, Rouge Access Points, MITM Attack
  • Secure WLANs: SSID Cloaking and MAC Filtering, 802.11 Original Auth. Methods, Shared Key auth. Methods, Authenticating a home user, Encryption Methods, Auth. In the Enterprise, WPA3

New Module: WLAN Configuration

  • Remote Site WLAN Configuration: Wireless Router, Log in to Wireless Router, Basic Network setup, Configure a wireless mesh network, NAT for IPv4, QoS
  • Configure a Basic WLAN on the WLC: WLC Topology, Log into the WLC, View AP Information, Advanced Settings, Configure a WLAN
  • Configure a WPA2 Enterprise WLAN on the WLC: SNMP and RADIUS, Configure SNMP Server Information, Configure RADIUS Server Information, Configure a VLAN for a New WLAN, Topology with VLAN 5 Addressing, Configure a new Interface, Configure a DHCP in a new WLAN, Configure DHCP Scope, Configure WPA2 Enterprise WLAN
  • Troubleshoot WLAN Issues: Wireless Client not connecting, Network is slow, Updating Firmware

New Module: Network Security Concepts

  • Current State of Cybersecurity: Current state of Affairs, Vectors of network attacks, Data Loss
  • Threat Actors: The Hacker, Evolution of Hackers, Cyber Criminals, Hacktivists, State-Sponsored Hackers
  • Threat Actor Tools: Attack Tools, Evolution of Security Tools, Attack Types
  • Malware: Viruses and Trojan Horses, Types of Malware
  • Common Network Attacks: Reconnaissance, Access, Social Engineering, Dos and DDoS
  • IP Vulnerabilities and Threats: ICMP, Amplification and Reflection, Address Spoofing Attacks
  • TCP and UDP Vulnerabilities: TCP and UDP Segment Header, TCP Services, TCP Attacks, UDP Attacks
  • IP Services: ARP Vulnerabilities, ARP Cache poisoning, DNS Attacks, DNS Tunneling, DHCP Attacks
  • Network Security Best Practices: CIA, Defence-in-Depth approach, Firewalls, IPS, Content Security Appliances
  • Cryptography: Securing communication, Data Integrity, Hash Functions, Origin Auth., Data Confidentiality, Symmetric Encryption, Asymmetric Encryption, Deffie-Helman

New Module: VPN and IPsec Concepts

  • VPN Technology: VPN Benefits, Site-to-Site and Remote-access VPN, Enterprise and Service provider VPN
  • Types of VPN: Remote-access, SSL, Site-to-Site IPsec, GRE over IPsec, DMVPN, IPsec Virtual Tunnel Interface, Service Provider MPLS
  • IPsec: IPsec concepts, IPsec technologies, IPsec protocol encapsulation, Confidentiality, Integrity, Authentication, Secure Key Exchange with DH, IPsec transport and Tunnel modes

New Module: Network Automation

  • Automation Overview
  • Data Formats: Data formats concept, data format rules, JSON, YAML, XML
  • APIs: API Concept, API Example, Open, Internal and Partner APIs, Types of Web Service APIs
  • REST: REST and RESTful API, RESTful implementation, URI/URN/URL, Anatomy of RESTful Request, RESTful API Applications
  • Configuration Management Tools: Traditional Network Configuration, Network Automation, Ansible, Chef, Puppet, SaltStack
  • IBN and Cisco DNA Center: Intent Based Networking, Network Infrastructure as Fabric, Cisco DNA, CDA Center

CCNA7 New Modules in Details

Posted: December 22, 2019 in 200-301, Cisco

New Module: LAN Security Concepts

  • Endpoint Security: Network attacks, Security devices, Endpoint Protection, Email and Web Security
  • Access Control: Local Password, Authentication, Authorization, Accounting, 802.1x
  • Security Threats: Layer 2 Vulnerabilities, Switch Attack Categories, Switch attack mitigation techniques
  • MAC Address Table Attacks and mitigation
  • LAN Attacks: VLAN Hopping, VLAN Double Tagging, DHCP Attacks, ARP Attacks, Address Spoofing attacks, STP Attacks, CDP Reconnaissance

New Module: Switch Security Configuration

  • Implement Port Security: Secure unused ports, Mitigate MAC Address Table Attacks, Enable Port Security, Limit and Learn MAC Addresses, Port Security Aging, Port Security Violation Modes, Ports in err-disabled state, Verify Port Security
  • Mitigate VLAN Attacks: Mitigate VLAN Hopping
  • Mitigate DHCP Attacks: DHCP Snooping, Configuration
  • Mitigate ARP Attacks: Dyn ARP Inspection, DAI Implementation
  • Mitigate STP Attacks: PortFast and BPDU Guard, Configuration

New Module: WLAN Concepts

  • Introduction to Wireless: Benefits of Wireless, Type of Wireless networks, Wireless Technologies, 802.11, Radio Frequencies, Wireless Standards Organizaions
  • WLAN Components: Wireless NIC, Wireless Home Router, Wireless Access Point, AP Categories, Wireless Antennas
  • WLAN Operation: 802.11 Modes, BSS and ESS, 802.11 Frame Structure, CSMA/CA, Client and AP Association, Passive and Active discovery
  • CAPWAP Operation: Introduction to CAPWAP, Split MAC Architecture, DTLS Encryption, FlexConnect APs
  • Channel Management: Frequency Channel Saturation, Channel Selection, Planning a WLAN Deployment
  • WLAN Threats: DoS attacks, Rouge Access Points, MITM Attack
  • Secure WLANs: SSID Cloaking and MAC Filtering, 802.11 Original Auth. Methods, Shared Key auth. Methods, Authenticating a home user, Encryption Methods, Auth. In the Enterprise, WPA3

New Module: WLAN Configuration

  • Remote Site WLAN Configuration: Wireless Router, Log in to Wireless Router, Basic Network setup, Configure a wireless mesh network, NAT for IPv4, QoS
  • Configure a Basic WLAN on the WLC: WLC Topology, Log into the WLC, View AP Information, Advanced Settings, Configure a WLAN
  • Configure a WPA2 Enterprise WLAN on the WLC: SNMP and RADIUS, Configure SNMP Server Information, Configure RADIUS Server Information, Configure a VLAN for a New WLAN, Topology with VLAN 5 Addressing, Configure a new Interface, Configure a DHCP in a new WLAN, Configure DHCP Scope, Configure WPA2 Enterprise WLAN
  • Troubleshoot WLAN Issues: Wireless Client not connecting, Network is slow, Updating Firmware

New Module: Network Security Concepts

  • Current State of Cybersecurity: Current state of Affairs, Vectors of network attacks, Data Loss
  • Threat Actors: The Hacker, Evolution of Hackers, Cyber Criminals, Hacktivists, State-Sponsored Hackers
  • Threat Actor Tools: Attack Tools, Evolution of Security Tools, Attack Types
  • Malware: Viruses and Trojan Horses, Types of Malware
  • Common Network Attacks: Reconnaissance, Access, Social Engineering, Dos and DDoS
  • IP Vulnerabilities and Threats: ICMP, Amplification and Reflection, Address Spoofing Attacks
  • TCP and UDP Vulnerabilities: TCP and UDP Segment Header, TCP Services, TCP Attacks, UDP Attacks
  • IP Services: ARP Vulnerabilities, ARP Cache poisoning, DNS Attacks, DNS Tunneling, DHCP Attacks
  • Network Security Best Practices: CIA, Defence-in-Depth approach, Firewalls, IPS, Content Security Appliances
  • Cryptography: Securing communication, Data Integrity, Hash Functions, Origin Auth., Data Confidentiality, Symmetric Encryption, Asymmetric Encryption, Deffie-Helman

New Module: VPN and IPsec Concepts

  • VPN Technology: VPN Benefits, Site-to-Site and Remote-access VPN, Enterprise and Service provider VPN
  • Types of VPN: Remote-access, SSL, Site-to-Site IPsec, GRE over IPsec, DMVPN, IPsec Virtual Tunnel Interface, Service Provider MPLS
  • IPsec: IPsec concepts, IPsec technologies, IPsec protocol encapsulation, Confidentiality, Integrity, Authentication, Secure Key Exchange with DH, IPsec transport and Tunnel modes

New Module: Network Automation

  • Automation Overview
  • Data Formats: Data formats concept, data format rules, JSON, YAML, XML
  • APIs: API Concept, API Example, Open, Internal and Partner APIs, Types of Web Service APIs
  • REST: REST and RESTful API, RESTful implementation, URI/URN/URL, Anatomy of RESTful Request, RESTful API Applications
  • Configuration Management Tools: Traditional Network Configuration, Network Automation, Ansible, Chef, Puppet, SaltStack
  • IBN and Cisco DNA Center: Intent Based Networking, Network Infrastructure as Fabric, Cisco DNA, CDA Center

The NDG Linux Essentials course objectives cover the following subject areas:

• Linux as an operating system

• Considerations for choosing an operating system

• The basics of open source software and licensing

• Basic knowledge of working with Linux

• Basic Linux command line skills

• How to use help commands and navigate help systems when using Linux

• How to work with Linux files and directories

• Search and extract data from Linux files

• Basic understanding of the concept of scripting

• The components of desktop and server computers

• Where data is stored on a Linux system

• Query vital network settings for a Linux computer on a Local Area Network

• Various types of users on a Linux system

• Creating users and groups on a Linux system

• Managing Linux file permissions and ownership

• Special Linux directories and files

kali-linux-responder-31_bixzcjFeatured-Image-Kali-Linux-800x400