icon
+91-8800955639, +91-9871700866, +91-8368840052
IAF iso ec-council certification
icon
+91-8800955639, +91-9871700866, +91-8368840052

Need Help? call us free

IAF
iso
ec-council certification

Diploma in Networking Infrastructure & Cloud Administration

Diploma in Networking Infrastructure & Cloud Administration 2024

Rating on Best Python Programming Training Institute & Certification in Noida 4.9 out of 5 based on 4000 Students Rating
Course Summary

First Semester-
1. CompTIA- A+ Hardware Training
2. Networking- Cisco Certified Network Associate (CCNA- 200-301)
3. Linux- Red Hat Certified System Administrator (RHCSA- 9.0)
4. Amazon Web Services- AWS Cloud Training & Implementation
5. Microsoft Azure Cloud Az-104 Training

Second Semester-
1. Linux- Red Hat Certified Engineer (RHCE)
2. Server 2022 Microsoft Active Directory
3. Certified Ethical Hacking Security Training- (CEHv12)
4. Cisco Certified Network Professional- (CCNP)
5. ChatGPT for Networking and Cloud Computing
6. Interview Preparation, Exam Preparation & Placement Support

Syllabus
CompTIA- A+ Hardware Training


Module 1- Hardware Fundamentals (Day- 1-5)
• Describe fundamental cable types, their characteristics, and intended uses.
• Identify prevalent connector types used in computing.
• Demonstrate the installation of various RAM types in different scenarios.
• Select, install, and configure storage devices according to specific scenarios.
• Install and configure motherboards, CPUs, and additional cards as needed.
• Explain the functions and applications of various peripheral devices.
• Summarize the types and features of power supplies.
• Configure and select suitable components to meet custom PC configurations for specific customer requirements.
• Install and manage common devices based on provided scenarios.
• Configure settings for SOHO multifunction devices and printers.
• Install, maintain, and troubleshoot various print technologies as per requirements.

Module 2- Operating Systems Overview (Day- 6-9)
• Compare and contrast different types of operating systems and their purposes.
• Differentiate between various versions of Microsoft Windows, highlighting their distinctive features.
• Summarize considerations for OS installations and methods for upgrades.
• Utilize appropriate Microsoft command line tools in given scenarios.
• Employ Microsoft operating system features, tools, and Control Panel utilities as needed.
• Explain application installation and configuration concepts.

Module 3- Software Troubleshooting (Day- 10-11)
• Troubleshoot Microsoft Windows OS issues based on provided scenarios.
• Identify and resolve PC security issues adhering to best practices.
• Implement best practice procedures for malware detection, removal, and prevention.

Module 4- Hardware and Network Troubleshooting (Day- 12-16)
• Resolve problems using the best practice methodology in provided scenarios.
• Troubleshoot issues related to motherboards, RAM, CPUs, and power supplies.
• Address problems with hard drives and RAID arrays effectively.
• Resolve issues concerning video, projectors, and displays.
• Troubleshoot common problems encountered with mobile devices following appropriate procedures.
• Address printer-related issues as per provided scenarios.
• Diagnose common wired and wireless network problems in given scenarios.

Module 5- Security Fundamentals (Day- 17-18)
• Explain the significance of physical security measures.
• Define logical security concepts.
• Compare and contrast various wireless security protocols and authentication methods.
• Detect, remove, and prevent malware using suitable tools and methods in different scenarios.

Module 6- Networking Essentials (Day- 19-22)
• Compare and contrast TCP and UDP ports, protocols, and their functions.
• Differentiate between common networking hardware devices.
• Install and configure basic wired/wireless SOHO networks in various scenarios.
• Compare different wireless networking protocols.
• Explain the properties and purposes of networked hosts' services.
• Describe common network configuration concepts.
• Compare and contrast Internet connection types and network features.
• Use appropriate networking tools in given scenarios.

Module 7- Mobile Devices Management (Day- 23-25)
• Install and configure laptop hardware and components in accordance with provided scenarios.
• Install components within laptop displays based on given situations.
• Utilize various laptop features effectively.
• Compare and contrast characteristics of different types of mobile devices.
• Connect and configure accessories and ports on various mobile devices as needed.
• Configure basic mobile device network connectivity and support applications.
• Use methods for performing mobile device synchronization in different scenarios.

Module 8- Virtualization and Cloud Computing Overview (Day- 26-27)
• Explain cloud computing concepts and compare them.
• Set up and configure client-side virtualization in given scenarios.

Module 9- Operational Procedures (Day- 28-30)
• Compare and contrast best practices related to various types of documentation.
• Implement basic change management best practices in provided scenarios.
• Explain common safety procedures.
• Utilize remote access technologies based on given scenarios.


Cisco Certified Network Associate (CCNA- 200-301)


Module 1- Network Fundamentals (Day- 1-5)
• Clarify the objectives and operations of diverse network devices.
• Differentiate between TCP/IP & OSI models
• Analyze the influence of network topologies on operations.
• Identify the components of Ethernet LANs.
• Evaluate the differences between collapsed and three-tier architectures.
• Compare various network topologies for their advantages and disadvantages.
• Determine the suitable cabling type based on specific implementation needs.
• Apply troubleshooting methodologies to resolve network issues effectively.

Module 2- Network Access (Day- 6-10)
• Set up and confirm VLAN configurations.
• Configure and authenticate trunking on Cisco switches.
• Establish and confirm Layer 2 discovery protocols like CDP and LLDP.
• Configure and ensure proper functioning of interVLAN routing.
• Resolve connectivity problems related to VLANs and interVLAN routing.
• Verify and manage wireless client access.
• Compare different Cisco Wireless Architectures and AP modes.
• Describe the access connections for AP and WLC.

Module 3- IP Connectivity (Day- 11-15)
• Interpret the elements of a routing table.
• Examine how routers make routing decisions.
• Set up, confirm, and troubleshoot IPv4 and IPv6 static routing.
• Configure and troubleshoot routing protocols like RIP, OSPF, etc.
• Employ troubleshooting techniques using ping, traceroute, and telnet.

Module 4- IP Services (Day- 16-20)
• Configure and authenticate DHCP on IOS Routers.
• Explain the functions of DHCP and DNS in a network setup.
• Describe the types, features, and applications of Access Control Lists (ACLs).
• Establish and confirm ACLs in a network environment.
• Set up and verify NTP operating in both client and server modes.
• Configure network devices for remote access using SSH.
• Explain the functionalities and role of TFTP in a network.
• Identify the fundamental operation of NAT and its variations.

Module 5- Security Fundamentals (Day- 21-25)
• Define crucial security concepts.
• Outline the elements of a security program.
• Explain how network components contribute to network security.
• Discuss the functions of firewalls, intrusion prevention systems, and VPNs.
• Describe technologies ensuring endpoint security.
• Explain wireless security protocols such as WPA, WPA2, and WPA3.
• Configure WLAN using WPA2 PSK through a graphical interface.

Module 6- Automation and Programmability (Day- 25-30)
• Detail the impact of automation on network management.
• Compare traditional networks with controller-based networking.
• Describe controller-based and software-defined architectures.
• Understanding configuration management tools like Puppet, Chef & Ansible.
• Interpret data encoded in JSON format


Red Hat Certified System Administrator (RHCSA- 9.0)


Module 1- System Configuration and Management (Day- 1)
• Introduction to Linux Operating System
• Different Linux Distributions Overview
• Installing Red Hat Linux on a Virtual Platform

Module 2- File Handling (Day- 2-3)
• Accessing and Navigating the Command Line Interface
• Managing Files through Command Line Operations
• Creating, Viewing, and Editing Text Files
• Managing Linux File System Permissions for File Access Control
• Monitoring and Administering Linux Processes
• Working with Vim and Nano text editors
• Using Find and Grep commands for searching and pattern matching

Module 3- User Administration (Day- 4-5)
• Creating New User Accounts
• Setting and Changing Passwords for Users
• Removing or Deleting User Accounts
• Retrieving User Information
• Obtaining Password Hashes of Linux Users

Module 4- Group Administration (Day- 6-7)
• Creating New Groups
• Adding Users to Specific Groups
• Establishing Administrative Users for Groups
• Removing Users from Groups
• Deleting Existing Groups
• Obtaining Group Information

Module 5- Storage Management (Day- 8-9)
• Creating, Deleting, and Formatting Partitions and File Systems
• Setting up Swap Space Configuration
• Mounting and Un-mounting Network File Systems like NFS
• Extending Existing Logical Volumes
• Setting up and Configuring LUKS-Encrypted Partitions

Module 6- Network Configuration and Administration (Day- 10-12)
• Configuring Network Settings
• Enabling and Disabling Network Interfaces
• Setting Host Names and Configuring Name Resolution
• Configuring Local Network Services such as NTP and SSH
• Setting up SSH and SecureCopy (SCP) configurations
• Basic Firewall Configuration using Firewalld

Module 7- Docker Container Management (Day- 13-15)
• Installing Docker and Managing Its Environment
• Handling Docker Images- Pulling, Pushing, and Committing
• Running and Administering Docker Containers
• Managing Docker Storage and Networking

Module 8- Security Management (Day- 16-17)
• Configuring Firewall Settings via Firewalld
• Implementing SSH Key-Based Authentication
• Configuring Logging for Monitoring and Analysis

Module 9- Automation and Deployment (Day- 18-20)
• Managing Simple Shell Scripts for Automation
• Automating System Tasks through systemd
• Scheduling Future Tasks in Linux via cronjobs
• Managing Software Packages using yum
• Configuring Network Services for Auto-Startup during Boot


Amazon Web Services (AWS)


Module 1- Introduction to AWS Cloud Computing (Day-1)
• Grasping Cloud Computing Concepts
• Advantages and Benefits of Cloud Computing
• Different Types of Cloud Services Offered
• Various Cloud Deployment Models
• Overview of AWS and its Array of Services and Offerings

Module 2- Amazon EC2 (Elastic Compute Cloud) (Day- 2-5)
• Initiating and Setting Up EC2 Instances
• Understanding EC2 Instance Types and their Use Cases
• Management of EC2 Instances and Security Groups
• Launching Windows and Linux Instances
• Configuration of Web Servers
• Implementing Elastic IP
• Load Balancing Varieties with EC2
• Auto Scaling Applications with EC2
• Snapshotting Volumes and Instances

Module 3- Amazon S3 (Simple Storage Service) (Day- 6-8)
• Creation and Management of S3 Buckets
• Utilizing S3 for Object Storage and Ensuring Data Consistency
• S3 Security Measures and Bucket Policies
• Implementing S3 Versioning and Lifecycle Policies
• Hosting Static Web Pages using S3 Buckets

Module 4- Amazon RDS (Relational Database Service) (Day- 9-11)
• Establishing RDS Instances (MySQL, PostgreSQL, etc.)
• Configuring RDS Multi-AZ Deployments and Read Replicas
• Handling Backups, Restoration, and Snapshots
• Strategies for Scaling and Performance Tuning RDS

Module 5- Amazon VPC (Virtual Private Cloud) (Day- 12-15)
• Understanding VPC Components and Concepts
• Working with Subnets, Route Tables, and Security Groups
• Implementing VPC Peering and VPN Connections
• Leveraging Network ACLs and Bastion Hosts

Module 6- AWS Lambda and Serverless Computing (Day- 16-18)
• Introduction to Serverless Architecture
• Creation and Deployment of Lambda Functions
• Integration of Lambda with Other AWS Services
• Utilizing Event Triggers and Adhering to Serverless Best Practices

Module 7- DNS Management with Amazon Route53 (Day- 19-21)
• Exploring Amazon Route 53 and its Role in DNS
• Domain Name Registration and Configuration
• Managing Hosted Zones and DNS Records
• Traffic Flow Management using Route 53
• Integration of Route 53 with Additional AWS Services (Elastic BeanStalk, EC2, etc.)
• Monitoring and Logging DNS Queries within Route 53
• Best Practices for Configuration and Administration of DNS with Route 53

Module 8- AWS Elastic Beanstalk (Day- 22-24)
• Introduction to AWS Elastic Beanstalk and Platform-as-a-Service (PaaS)
• Understanding Application Environments and Deployment Platforms
• Application Creation and Deployment through Elastic Beanstalk
• Effective Management of Application Versions and Deployment Environments
• Customization of Application Environments via Configuration Files
• Implementation of Autoscaling and Load Balancing with Elastic Beanstalk
• Application Monitoring and Logging within Elastic Beanstalk
• Best Practices for Application Development and Deployment on Elastic Beanstalk

Module 9- AWS IAM (Identity and Access Management) (Day- 25-27)
• Administration of Users, Groups, and Roles
• Managing AWS Resource Policies and Permissions
• Utilization of Multi-Factor Authentication (MFA) and Identity Federation
• Secure Practices for Safeguarding AWS Resources

Module 10- AWS Monitoring and Logging (Day-28-29)
• Utilizing Amazon CloudWatch for Monitoring
• CloudWatch Metrics, Alarms, and Dashboards
• Log Management using CloudWatch Logs
• Configuration of CloudWatch Events and Triggers

Module 11- Amazon Simple Notification Service (SNS) (Day-30)
• Introduction to Amazon SNS and its Pub/Sub Messaging Model
• Creating Topics and Subscriptions within SNS
• Different Subscription Types (HTTP, HTTPS, Email, SMS, Lambda, etc.)
• Setting up Message Filtering and Delivery Policies
• Best Practices for Effective SNS Usage and Design

Microsoft Azure


Module 1- (Day- 1-2)
• Azure-Introduction
• Azure-Cloud-Model-and-services-Geography

Module 2- (Day- 3-4)
• Resource-Groups-Subscription

Module 3- (Day- 5-8)
• Virtual-Machine for Linux
• Virtual-Machine for Windows
• Connecting with virtual machines

Module 4- (Day- 9-12)
• Subnetting-Virtual-Network
• Creating Private network
• Vnet-peering-private-dns

Module 5- (Day- 13-15)
• Learning about dns-vnet-peering-NAT-gw

Module 6- (Day- 16-17)
• Learning about Storage Service
• Managing Storage

Module 7- (Day- 18-19)
• Learning about Blob-files-nsg

Module 8- (Day- 20-22)
• Learning about Azure-CLI-ARM
• LoadBalancer-App-gateway

Module 9- (Day- 23-24)
• Learning about vmss-image-webapp

Module 10- (Day-25-26)
• Learning about Azure-database-containerization

Module 11- (Day- 27-28)
• Learning about AKS-migration

Module 12- (Day- 29-30)
• Entra-ID-logging-monitoring


Red Hat Certified Engineer (RHCE)


Module 1- (Day- 1-2)
• General Discussion
• Ansible Introductions

Module 2- (Day- 3)
• Arch session-1
• Installation
• Lab Setup and Installation

Module 3- (Day- 4-5)
• Static Inventory and Authentications

Module 4- (Day- 6-8)
• Ansible Privilege Escalation
• Add Hoc
• Ad Hoc Session-1
• Ad Hoc Session-2

Module 5- (Day- 9-10)
• Introduction to Simple Playbooks

Module 6- (Day- 11-12)
• Playbook Variable
• Command Variable
• Prompt Variable

Module 7- (Day- 13-14)
• Inventory Variable
• Setup and Register Variable

Module 8- (Day- 15-16)
• Ansible Vault
• Ansible Loop

Module 9- (Day- 17-18)
• Loop Session-2
• Conditions

Module 10- (Day- 19-21)
• Condition Session-2
• Notify and handlers
• Error Handling
• Ansible Cloud integration & Dynamic Inventory

Module 11- (Day- 22-23)
• Error Handling
• Linux Tasks

Module 12- (Day- 24-25)
• Ansible Template
• Ansible Role-1

Module 13- (Day- 26-27)
• Ansible Role Session-2

Module 14- (Day- 28-30)
• Ansible Tower


Server 2022 Microsoft Active Directory


Module 1- (Day- 1-2)
• Introduction

Module 2- (Day- 3-4)
• Windows Server 2022 Features

Module 3- (Day- 5-6)
• Computer Generations

Module 4- (Day- 7-8)
• First Mainframe Computer and Personal Computer of IBM

Module 5- (Day- 9-10)
• Computer Components

Module 6- (Day- 11-12)
• Networking
• Requirements to set up a Network

Module 7- (Day- 13-14)
• Windows Server 2022 OS
• Install the Windows Server 2022 OS

Module 8- (Day- 15-16)
• IP Addressing
• Topologies

Module 9- (Day- 17-18)
• Domain Controller
• Clients In Domain Model

Module 10- (Day- 19-20)
• User Management | Editing Password Policy
• Permissions

Module 11- (Day- 21-22)
• Assigning Administrator rights to users
• Security Level Permissions

Module 12- (Day- 23-24)
• Shared Folder
• Profiles

Module 13- (Day- 25-26)
• FSRM
• Organizational Unit
• Additional Domain Controller (ADC)

Module 14- (Day- 27-28)
• Tree
• Forest

Module 15- (Day- 29-30)
• Active Directory Roles
• Group Policy

Module 16- (Day- 31-32)
• Trust
• Active Directory Partitions
• Global Catalog

Module 17- (Day- 33-34)
• Sites
• DHCP
• DNS

Module 18- (Day- 35-36)
• IIS
• Remote Desktop Service (RDS)
• Remote Access Service (RAS)

Module 19- (Day- 37-38)
• Backup and Recovery
• Network Load Balancing (NLB)

Module 20- (Day- 39-40)
• Windows Deployent Services (WDS)
• Server Core
• Virtualization- Hyper -V


Certified Ethical Hacker (CEHv12)


Unit 01- Introduction to Ethical Hacking (Day- 1-2)
• Understanding Information Security
• Identifying Information Security Threats and Attack Vectors
• Fundamental Hacking Concepts
• Ethical Hacking Principles
• Implementing Information Security Controls
• Exploring Penetration Testing Concepts
• Comprehending Information Security Laws and Standards

Unit 02- Footprinting and Reconnaissance (Day- 3-5)
• Exploring Footprinting Fundamentals
• Utilizing Search Engines for Footprinting
• Gathering Information via Web Services
• Leveraging Social Networking Sites for Footprinting
• Footprinting Websites
• Conducting Email Footprinting
• Understanding Competitive Intelligence Gathering
• Identifying Individuals via Footprinting
• Utilizing DNS for Footprinting
• Conducting Network Footprinting
• Employing Social Engineering for Footprinting
• Utilizing Footprinting Tools
• Implementing Countermeasures for Footprinting
• Conducting Footprinting Penetration Testing

Unit 03- Scanning Networks (Day- 6-7)
• Understanding Network Scanning Principles
• Exploring Various Network Scanning Tools
• Implementing Different Scanning Techniques
• Banner Grabbing Techniques
• Creating Network Diagrams
• Performing Scanning Penetration Testing

Unit 04- Enumeration (Day- 8-9)
• Understanding Enumeration Concepts
• Conducting NetBIOS Enumeration
• Exploring SNMP Enumeration
• Identifying LDAP Enumeration Techniques
• NTP Enumeration Methodologies
• Enumerating SMTP and DNS
• Utilizing Other Enumeration Techniques
• Implementing Enumeration Countermeasures

Unit 05- Vulnerability Analysis (Day- 10)
• Exploring Vulnerability Assessment Concepts
• Implementing Vulnerability Assessment Solutions
• Understanding Vulnerability Scoring Systems
• Utilizing Vulnerability Assessment Tools
• Generating Vulnerability Assessment Reports

Unit 06- System Hacking (Day- 11-14)
• Understanding System Hacking Concepts
• Cracking Passwords and Gaining Unauthorized Access
• Conducting System Hacking using malicious files
• Exploiting vulnerabilities on Applications for Unauthorized Access
• Hiding Files to Maintain Access
• Covering tracks
• Logs clearing

Unit 07- Malware Threats (Day- 15-17)
• Understanding Malware Concepts
• Exploring Trojan, Virus, and Worm Concepts
• Analyzing Malware and Conducting Malware Analysis
• Implementing Countermeasures Against Malware
• Utilizing Anti-Malware Software
• Conducting Malware Penetration Testing

Unit 08- Sniffing (Day- 18-19)
• Understanding Sniffing Concepts
• Utilizing MAC Attacks for Sniffing
• Implementing DHCP Attacks for Sniffing
• Employing ARP Poisoning for Sniffing
• Exploring Spoofing Attacks for Sniffing
• Implementing Countermeasures Against Sniffing
• Detecting Sniffing Attempts Using Specific Techniques
• Conducting Sniffing Penetration Testing

Unit 09- Social Engineering (Day- 20-21)
• Understanding Social Engineering Concepts
• Exploring Various Social Engineering Techniques
• Addressing Insider Threats in Organizations
• Understanding Impersonation on Social Networking Sites
• Implementing Countermeasures Against Social Engineering Attacks

Unit 10- Denial-of-Service (Day- 22-23)
• Understanding DoS/DDoS Concepts
• Exploring DoS/DDoS Attack Techniques
• Investigating Botnets and their Role in DDoS Attacks
• Analyzing DDoS Case Studies
• Exploring DoS/DDoS Attack Tools
• Implementing Countermeasures Against DoS/DDoS Attacks

Unit 11- Session Hijacking (Day- 24)
• Understanding Session Hijacking Concepts
• Implementing Application-Level Session Hijacking Techniques
• Implementing Countermeasures Against Session Hijacking Attacks
• Conducting Session Hijacking Penetration Testing

Unit 12- Evading IDS, Firewalls, and Honeypots (Day- 25-26)
• Understanding IDS, Firewall, and Honeypot Concepts
• Implementing IDS, Firewall, and Honeypot Solutions
• Evading Firewalls and Detecting Honeypots
• Implementing IDS/Firewall Evasion Countermeasures
• Conducting Penetration Testing Against IDS, Firewalls, and Honeypots

Unit 13- Hacking Web Servers (Day- 27)
• Understanding Web Server Concepts
• Exploring Web Server Attack Methods
• Following a Web Server Attack Methodology
• Implementing Patch Management for Web Servers
• Utilizing Web Server Security Tools
• Conducting Web Server Penetration Testing

Unit 14- Hacking Web Applications (Day- 28-29)
• Understanding Web Application Concepts
• Exploring Web Application Threats
• Implementing Web Application Hacking Methodologies
• Utilizing Web Application Hacking Tools
• Implementing Countermeasures Against Web Application Attacks
• Conducting Web Application Security Testing and Penetration Testing

Unit 15- SQL Injection (Day- 30)
• Understanding SQL Injection Concepts
• Exploring Different Types of SQL Injection
• Following a Methodology for SQL Injection Attacks
• Implementing Evasion Techniques for SQL Injection
• Utilizing Countermeasures Against SQL Injection Attacks

Unit 16- Hacking Wireless Networks (Day- 31-32)
• Understanding Wireless Concepts
• Exploring Wireless Encryption Methods
• Conducting Wireless Hacking Methodologies
• Utilizing Wireless Hacking Tools
• Exploring Bluetooth Hacking Techniques
• Implementing Countermeasures for Wireless Networks
• Conducting Wireless Security Testing and Penetration Testing

Unit 17- Hacking Mobile Platforms (Day- 33-34)
• Understanding Attack Vectors for Mobile Platforms
• Exploring Hacking Techniques for iOS
• Analyzing Mobile Spyware and Mobile Device Management
• Implementing Mobile Security Guidelines and Tools
• Conducting Mobile Penetration Testing

Unit 18- IoT and OT Hacking (Day- 35-36)
• Understanding IoT Concepts and Attack Vectors
• Understanding IoT Attack methodology
• Understanding OT Concepts and Attack Vectors
• Understanding OT Attack methodology

Unit 19- Cloud Computing (Day- 37-38)
• Understanding Cloud Computing Concepts and Threats
• Implementing Cloud Security Measures and Tools
• Conducting Cloud Penetration Testing

Unit 20- Cryptography (Day- 39-40)
• Understanding Cryptography Concepts
• Exploring Encryption Algorithms and Tools
• Implementing Public Key Infrastructure (PKI)
• Utilizing Email and Disk Encryption Methods
• Conducting Cryptanalysis and Implementing Countermeasures


Cisco Certified Network Professional (CCNP)


Module 1- CCNP Routing and Switching (Day- 1-7)
• Advanced IP Addressing and Routing (VLSM, CIDR)
• EIGRP and OSPF Routing Protocols
• BGP (Border Gateway Protocol) Implementation
• Multilayer Switching and VLANs
• HSRP, VRRP, and GLBP for High Availability
• Network Security and Access Control Lists (ACLs)
• Troubleshooting Routing and Switching Issues

Module 2- Implementing Cisco IP Switched Networks (Day- 8-12)
• VLANs and Trunking (802.1Q, VTP)
• Spanning-Tree Protocol (STP) Variants (PVST+, RSTP)
• Inter-VLAN Routing and Layer 3 Switching
• High Availability with HSRP, VRRP, and GLBP
• Layer 2 Security (Port Security, 802.1X)
• Network Design Considerations

Module 3- Implementing Cisco IP Routing (Day- 13-18)
• Advanced EIGRP Configuration
• OSPF and BGP Routing Protocols
• Route Redistribution and Filtering
• Path Control and Route Selection
• IPv6 Routing and Transition Mechanisms
• VPN Technologies (GRE, DMVPN)
• Network Services and Troubleshooting

Module 4- Troubleshooting & Maintaining Cisco IP Networks (Day- 19-24)
• Network Troubleshooting Methodologies
• Layer 2 and Layer 3 Troubleshooting
• Troubleshooting EIGRP, OSPF, and BGP
• Troubleshooting IPv6 and VPNs
• Network Management and Maintenance
• Preparation for CCNP Certification Exams

Module 5- CCNP Security (Day- 25-29)
• Implementing Cisco Secure Access Solutions
• Implementing Cisco Edge Network Security Solutions
• Implementing Cisco Secure Mobility Solutions
• Implementing Cisco Threat Control Solutions

Module 6- CCNP Collaboration (Day- 30-32)
• Implementing Cisco Collaboration Applications
• Implementing Cisco Collaboration Cloud and Edge Solutions
• Troubleshooting and Maintaining Cisco IP Networks

Module 7- CCNP Data Center (Day- 33-35)
• Implementing Cisco Data Center Unified Computing
• Implementing Cisco Data Center Infrastructure
• Implementing Cisco Data Center Virtualization and Automation

Module 8- CCNP Service Provider (Day- 36-38)
• Implementing Cisco Service Provider VPN Services
• Implementing Cisco Service Provider Next-Generation Networks

Module 9- CCNP Wireless (Day- 39-40)
• Implementing Cisco Wireless Network Fundamentals
• Implementing Cisco Wireless Enterprise Networks
• Implementing Cisco Wireless Mobility Solutions

Course Features

  • Duration : 60 Hours
  • Lectures : 30
  • Quiz : 20
  • Students : 15

You may like