Cybersecurity , CompTIA Network+ Security+ CCNA
Fortray Global Services LTD
Earn up-to 55K OR Your Money Back
Summary
- Tutor is available to students
- Job guarantee programme is included in this course
Add to basket or enquire
Overview
Certifications
Cisco CCNA Routing and Switching
Course media
Description
- The course consists of 10 days of classroom-based training during weekdays or weekends, including hands-on learning experience with Cisco and other vendors like juniper, Check Point, Palo Alto, Fortinet, and major networking and security products.
- We are so confident you will be offered world-class training that is if for any reason you were not, we will refund 100% of your course fees back to you.
Lesson 1: Explaining the OSI Model and TCP/IP Models
Lesson 2: Explaining Properties of Network Traffic
Lesson 3: Installing and Configuring Switched Networks
Lesson 4: Configuring IP Networks
Lesson 5: Installing and Configuring Routed Networks
Lesson 6: Configuring and Monitoring Ports and Protocols
Lesson 7: Explaining Network Applications and Storage Services
Lesson 8: Monitoring and Troubleshooting Networks
Lesson 9: Explaining Networking Attacks and Mitigations
Lesson 10: Installing and Configuring Security Devices
Lesson 11: Explaining Authentication and Access Controls
Lesson 12: Deploying and Troubleshooting Cabling Solutions
Lesson 13: Implementing and Troubleshooting Wireless Technologies
Lesson 14: Comparing and Contrasting WAN Technologies
Lesson 15: Using Remote Access Methods
Lesson 16: Identifying Site Policies and Best Practices
NETWORK+ LABS:
Exploring the Lab Environment
Configuring Ethernet Networking
Configuring IPv4 Networking
Configuring IPv4 Subnets
Configuring IPv6 Networking
Configuring Address Assignments
Configuring Routing
Using Port Scanning Tools
Configuring DNS Servers
Configuring Application Protocols
Using Event Management and Performance Monitors
Configuring a NAT Firewall
Securing Appliance Administration with RADIUS Authentication
Configuring Secure Access Channels
SECURITY+ TOPICS:
Topics Covered
Lesson 1: Comparing Security Roles and Security Controls
Lesson 2: Explaining Threat Actors and Threat Intelligence
Lesson 3: Performing Security Assessments
Lesson 4: Identifying Social Engineering and Malware
Lesson 5: Summarizing Basic Cryptographic Concepts
Lesson 6: Implementing Public Key Infrastructure
Lesson 7: Implementing Authentication Controls
Lesson 8: Implementing Identity and Account Management Controls
Lesson 9: Implementing Secure Network Designs
Lesson 10: Implementing Network Security Appliances
Lesson 11: Implementing Secure Network Protocols
Lesson 12: Implementing Host Security Solutions
Lesson 13: Implementing Secure Mobile Solutions
Lesson 14: Summarizing Secure Application Concepts
Lesson 15: Implementing Secure Cloud Solutions
Lesson 16: Explaining Data Privacy and Protection Concepts
Lesson 17: Performing Incident Response
Lesson 18: Explaining Digital Forensics
Lesson 19: Summarizing Risk Management Concepts
Lesson 20: Implementing Cybersecurity Resilience
Lesson 21: Explaining Physical Security
SECURITY+ LAB:
Labs Available:
Assisted Lab: Exploring the Lab Environment
Assisted Lab: Scanning and Identifying Network Nodes
Assisted Lab: Intercepting and Interpreting Network Traffic with Packet Sniffing Tools
Assisted Lab: Analyzing the Results of a Credentialed Vulnerability Scan
Assisted Lab: Installing, Using, and Blocking a Malware-based Backdoor
APPLIED LAB: Performing Network Reconnaissance and Vulnerability Scanning
Assisted Lab: Managing the Lifecycle of a Certificate
Assisted Lab: Managing Certificates with OpenSSL
Assisted Lab: Auditing Passwords with a Password Cracking Utility
Assisted Lab: Managing Centralized Authentication
Assisted Lab: Managing Access Controls in Windows Server
Assisted Lab: Configuring a System for Auditing Policies
Assisted Lab: Managing Access Controls in Linux
APPLIED LAB: Configuring Identity and Access Management Controls
Assisted Lab: Implementing a Secure Network Design
Assisted Lab: Configuring a Firewall
Assisted Lab: Configuring an Intrusion Detection System
Assisted Lab: Implementing Secure Network Addressing Services
Assisted Lab: Implementing a Virtual Private Network
Assisted Lab: Implementing a Secure SSH Server
Assisted Lab: Implementing Endpoint Protection
APPLIED LAB: Securing the Network Infrastructure
Assisted Lab: Identifying Application Attack Indicators
Assisted Lab: Identifying a Browser Attack
Assisted Lab: Implementing PowerShell Security
Assisted Lab: Identifying Malicious Code
APPLIED LAB: Identifying Application Attacks
Assisted Lab: Managing Data Sources for Incident Response
Assisted Lab: Configuring Mitigation Controls
Assisted Lab: Acquiring Digital Forensics Evidence
Assisted Lab: Backing Up and Restoring Data in Windows and Linux
APPLIED LAB: Managing Incident Response, Mitigation and Recovery
CCNA TOPICS:
Implementing VLANs and Trunks
Routing Between VLANs
Introducing OSPF
Building Redundant Switched Topologies
Improving Redundant Switched Topologies with EtherChannel
Exploring Layer 3 Redundancy
Introducing WAN Technologies
Explaining Basics of ACL
Enabling Internet Connectivity
Introducing QoS
Explaining Wireless Fundamentals
Introducing Architectures and Virtualization
Explaining the Evolution of Intelligent Networks
Introducing System Monitoring
Managing Cisco Devices
Examining the Security Threat Landscape
Implementing Threat Defense Technologies
Securing Administrative Access
Implementing Device Hardening
CCNA LABS:
Lab outline
Get Started with Cisco Command-Line Interface (CLI)
Observe How a Switch Operates
Perform Basic Switch Configuration
Implement the Initial Switch Configuration
Inspect TCP/IP Applications
Configure an Interface on a Cisco Router
Configure and Verify Layer 2 Discovery Protocols
Implement an Initial Router Configuration
Configure Default Gateway
Explore Packet Forwarding
Troubleshoot Switch Media and Port Issues
Troubleshoot Port Duplex Issues
Configure Basic IPv6 Connectivity
Configure and Verify IPv4 Static Routes
Configure IPv6 Static Routes
Implement IPv4 Static Routing
Implement IPv6 Static Routing
Configure VLAN and Trunk
Troubleshoot VLANs and Trunk
Configure a Router on a Stick
Implement Multiple VLANs and Basic Routing Between the VLANs
Configure and Verify Single-Area OSPF
Configure and Verify EtherChannel
Improve Redundant Switched Topologies with EtherChannel
Configure and Verify IPv4 ACLs
Implement Numbered and Named IPv4 ACLs
Configure a Provider-Assigned IPv4 Address
Configure Static NAT
Configure Dynamic NAT and Port Address Translation (PAT)
Implement PAT
Log into the WLC
Monitor the WLC
Configure a Dynamic (VLAN) Interface
Configure a DHCP Scope
Configure a WLAN
Define a Remote Access Dial-In User Service (RADIUS) Server
Explore Management Options
Explore the Cisco DNAâ„¢ Center
Configure and Verify NTP
Configure System Message Logging
Create the Cisco IOS Image Backup
Upgrade Cisco IOS Image
Configure WLAN Using Wi-Fi Protected Access 2 (WPA2) Pre-Shared Key (PSK) Using the GUI
Secure Console and Remote Access
Enable and Limit Remote Access Connectivity
Secure Device Administrative Access
Configure and Verify Port Security
Implement Device Hardening
Who is this course for?
The courses are for those who want to make a career in IT and Networking /Cyber Security or already working as a Help desk / Service Desk Role or Desktop role.
Requirements
- No experience or qualification needed
Career path
After this students will be able to apply for the following jobs:
- IT Technician
- Cybersecurity Analyst
- Network Support Engineer
- Network Engineer
- Network Security Engineer
Questions and answers
Currently there are no Q&As for this course. Be the first to ask a question.
Reviews
Currently there are no reviews for this course. Be the first to leave a review.
Sidebar navigation
Legal information
This course is advertised on Reed.co.uk by the Course Provider, whose terms and conditions apply. Purchases are made directly from the Course Provider, and as such, content and materials are supplied by the Course Provider directly. Reed is acting as agent and not reseller in relation to this course. Reed's only responsibility is to facilitate your payment for the course. It is your responsibility to review and agree to the Course Provider's terms and conditions and satisfy yourself as to the suitability of the course you intend to purchase. Reed will not have any responsibility for the content of the course and/or associated materials.