Courses Details

Course Type : paid
Duration : 50 hrs
Category
CISCO Certification
Similar Courses
what students say
Course Description

<p>Today&rsquo;s interconnected world makes everyone more susceptible to cyber-attacks. Whether you&rsquo;re attracted to the relativity new world of cybersecurity as a professional, or just interested in protecting yourself online and in social media, this introductory course is the answer. It explores cyber trends, threats&mdash;along with the broader topic of cybersecurity in a way that will matter to YOU. For instance, you&rsquo;ll learn how to protect your personal privacy online while gaining additional insight on the challenges companies, and governmental and educational institutions face today. No prerequisites required.</p> <p><strong>You&#39;ll Learn These Core Skills:</strong></p> <ul> <li>Learn what cybersecurity is and its potential impact to you.</li> <li>Understand the most common threats, attacks and vulnerabilities.</li> <li>Gain insights for how businesses protect their operations from attacks.</li> <li>Find the latest job trends and why cybersecurity continues to grow.</li> </ul>

Curriculum

    • Explain the role and function of network components
    • Describe characteristics of network topology architectures
    • Compare physical interface and cabling types
    • Identify interface and cable issues (collisions, errors, mismatch duplex, and/or speed)
    • Compare TCP to UDP Configure and verify IPv4 addressing and subnetting
    • Describe the need for private IPv4 addressing 2019 Cisco Systems, Inc.
    • Configure and verify IPv6 addressing and prefix
    • Compare IPv6 address types
    • Verify IP parameters for Client OS (Windows, Mac OS, Linux)
    • Describe wireless principles
    • Explain virtualization fundamentals (virtual machines)
    • Describe switching concepts
    • 2.1 Configure and verify VLANs (normal range) spanning multiple switches
    • 2.2 Configure and verify interswitch connectivity
    • 2.3 Configure and verify Layer 2 discovery protocols (Cisco Discovery Protocol and LLDP)
    • 2.4 Configure and verify (Layer 2/Layer 3) EtherChannel (LACP)
    • 2.5 Describe the need for and basic operations of Rapid PVST+ Spanning Tree Protocol and identify basic operations
    • 2.6 Compare Cisco Wireless Architectures and AP modes
    • 2.7 Describe physical infrastructure connections of WLAN components (AP, WLC, access/trunk ports, and LAG)
    • 2.8 Describe AP and WLC management access connections (Telnet, SSH, HTTP, HTTPS, console, and TACACS+/RADIUS)
    • 2.9 Configure the components of a wireless LAN access for client connectivity using GUI only such as WLAN creation, security settings, QoS profiles, and advanced WLAN settings
    • 3.1 Interpret the components of routing table
    • 3.2 Determine how a router makes a forwarding decision by default
    • 3.3 Configure and verify IPv4 and IPv6 static routing
    • 3.4 Configure and verify single area OSPFv2 3.4.a Neighbor adjacencies
    • 3.5 Describe the purpose of first hop redundancy protocol
    • 4.1 Configure and verify inside source NAT using static and pools 2019 Cisco Systems, Inc.
    • 4.2 Configure and verify NTP operating in a client and server mode
    • 4.3 Explain the role of DHCP and DNS within the network
    • 4.4 Explain the function of SNMP in network operations
    • 4.5 Describe the use of syslog features including facilities and levels
    • 4.6 Configure and verify DHCP client and relay
    • 4.7 Explain the forwarding per-hop behavior (PHB) for QoS such as classification, marking, queuing, congestion, policing, shaping
    • 4.8 Configure network devices for remote access using SSH
    • 4.9 Describe the capabilities and function of TFTP/FTP in the network
    • 5.1 Define key security concepts (threats, vulnerabilities, exploits, and mitigation techniques)
    • 5.2 Describe security program elements (user awareness, training, and physical access control)
    • 5.3 Configure device access control using local passwords
    • 5.4 Describe security password policies elements, such as management, complexity, and password alternatives (multifactor authentication, certificates, and biometrics)
    • 5.5 Describe remote access and site-to-site VPNs
    • 5.6 Configure and verify access control lists
    • 5.7 Configure Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port security)
    • 5.8 Differentiate authentication, authorization, and accounting concepts
    • 5.9 Describe wireless security protocols (WPA, WPA2, and WPA3)
    • 5.10 Configure WLAN using WPA2 PSK using the GUI
    • 6.1 Explain how automation impacts network management
    • 6.2 Compare traditional networks with controller-based networking
    • 6.3 Describe controller-based and software defined architectures (overlay, underlay, and fabric)
    • 6.3.a Separation of control plane and data plane
    • 6.3.b North-bound and south-bound APIs
    • 6.4 Compare traditional campus device management with Cisco DNA Center enabled device management
    • 6.5 Describe characteristics of REST-based APIs (CRUD, HTTP verbs, and data encoding)
    • 6.6 Recognize the capabilities of configuration management mechanisms Puppet, Chef, and Ansible
    • 6.7 Interpret JSON encoded data

Instructor

Dipesh Gainju

Similar Courses
what students say