AT Computer Solution Limited
Call Us: 01818-446835, 01711-452688

Training

Home / Training

CISCO Training & Certification

CCNA (Routing and Switching) New Version

CCNA (Routing and Switching) New Version

102 Hours

We have - CCNA Vendor Online Exam Center 

Chapter 1: Internetworking

  • Internetworking Basics
  • Internetworking Models
  • The OSI Reference Model

 

Chapter 2: Ethernet Networking and Data Encapsulation

  • Ethernet Networks in Review
  • Ethernet Cabling
  • Data Encapsulation
  • The Cisco Three-Layer Hierarchical Model

 

Chapter 3: Introduction to TCP/IP

  • Introducing TCP/IP
  • TCP/IP and DoD Model
  • IP Addressing
  • IPv4 Address Types

 

Chapter 4: Easy Subnetting

  • Subnetting Basics
  • Summary

 

Chapter 5: Variable Length Subnet Masks (VLSMs), Summarization and Troubleshooting TCP/IP

  • Variable Length Subnet Masks (VLSMs)
  • Summarization
  • Troubleshooting IP Addressing

 

Chapter 6: Cisco's Internetworking Operating System (IOS)

  • The IOS User Interface
  • Command-Line Interface (CLI)
  • Router and Switch Administrative Configurations
  • Router Interfaces
  • Viewing, Saving and Erasing Configurations

 

Chapter 7: Managing a Cisco Internetwork + Managing Cisco

Devices (book ICND II)

  • The Internal Components of a Cisco Router
  • The Router Boot Sequence
  • Managing Configuration Register
  • Backing Up and Restoring the Cisco IOS
  • Backing Up and Restoring the Cisco Configuration
  • Using Cisco Discovery Protocol (CDP)
  • Using Telnet
  • Resolving Hostnames
  • Checking Network Connectivity and Troubleshooting

 

Chapter 8: IP Routing

  • Routing Basics
  • The IP Routing Process
  • Configuring IP Routing in Our Network
  • Dynamic Routing
  • Distance-Vector Routing Protocols
  • Routing Information Protocol (RIP)
  • Verifying Your Configurations

 

Chapter 9: Enhanced IGRP (EIGRP) and Open Shortest Path First (OSPF)

  • EIGRP Features and Operation
  • Using EIGRP to Support Larger Networks
  • Configuring EIGRP
  • Load Balancing with EIGRP
  • Verifying EIGRP
  • Open Shortest Path First (OSPF) Basics
  • Configuring OSPF
  • Verifying OSPF Configuration
  • OSPF DR and BDR Elections
  • OSPF and Loopback Interfaces
  • Troubleshooting OSPF
  • Configuring EIGRP and OSPF Summary Routes
  • Chapter 10: Multi-Area OSPF

 

Chapter 11: Layer 2 Switching and Spanning Tree Protocol (STP)

  • Before Layer 2 Switching
  • Switching Services
  • Spanning Tree Protocol (STP)
  • Configuring Catalyst Switches

 

Chapter 12: Virtual LANs (VLANs) & InterVLAN Routing

  • VLAN Basics
  • VLAN Membership
  • Identifying VLANs
  • VLAN Trunking Protocols (VTP)
  • Routing between VLANs
  • Configuring VLANs
  • Configuring VTP
  • Telephony: Configuring Voice VLANs
  • RSTP
  • PVSTP
  • Ether Channels

Chapter 13: Security

  • Perimeter, Firewall and Internal Routers
  • Introduction to Access Lists
  • Standard Access Lists
  • Extended Access Lists
  • Turning Off and Configuring Network Services
  • Monitoring Access Lists

 

Chapter 14: Network Address Translation (NAT)

  • When Do We Use NAT?
  • Type of Network Address Translation
  • NAT Names
  • How NAT Works
  • Testing and Troubleshooting NAT

 

Chapter 15: Internet Protocol Version 6 (IPv6)

  • Why Do We Need IPv6?
  • The Benefits and Uses of IPv6
  • IPv6 Addressing and Expressions
  • How IPv6 Works in an Internetwork
  • IPv6 Routing Protocols
  • Migrating to IPv6

 

Chapter 16: IP Services

  • Client Redundancy Issues

Introducing First Hop Redundancy Protocol (FHRP)

  • Hot Standby Router Protocol (HSRP)
  • Virtual Router Redundancy Protocol
  • Syslog
  • SNMP
  • NetFlow

Chapter 17: Wide Area Networks

  • Introduction to Wide Area Networks
  • Cable and DSL
  • Cabling the Serial Wide Area Network
  • High-Level Data-Link Control (HDLC) Protocol
  • Point-to-Point Protocol (PPP)
  • Virtual Private Networks
  • GRE Tunnels

Project:  18 Hours

Exam Preparation: 24 Hours

 

If you have any query regarding the below course outline please feel free to call     01711- 452688

 


CCNP (Cisco Certified Network Professional)

CCNP Route (300-101)

Part I: Fundamental Routing Concepts

Chapter 1. Characteristics of Routing Protocols

Chapter 2. Remote Site Connectivity

 

Part II: IGP Routing Protocols

Chapter 3. IPv6 Review and RIPng

Chapter 4. Fundamental EIGRP Concepts

Chapter 5. Advanced EIGRP Concepts

Chapter 7. Fundamental OSPF Concepts

Chapter 8. The OSPF Link-State Database

Chapter 9. Advanced OSPF Concepts

 

Part III: Route Redistribution and Selection

Chapter 10. Route Redistribution

Chapter 11. Route Selection

 

Part IV: Internet Connectivity

Chapter 12. Fundamentals of Internet Connectivity

Chapter 13. Fundamental BGP Concepts

Chapter 14. Advanced BGP Concepts

Chapter 15. IPv6 Internet Connectivity

 

Part V: Router and Routing Security

Chapter 16. Fundamental Router Security Concepts

Chapter 17. Routing Protocol Authentication

 

CCNP Switch (300-115)

Part I: Designing Campus Networks

Chapter 1. Enterprise Campus Network Design

Chapter 2. Switch Operation

Chapter 3. Switch Port Configuration

 

Part II: Building a Campus Network

Chapter 4. VLANs and Trunks

Chapter 5. VLAN Trunking Protocol

 

Part III: Working with Redundant Links

Chapter 6. Traditional Spanning Tree Protocol

Chapter 7. Spanning-Tree Configuration

Chapter 8. Protecting the Spanning Tree Protocol Topology

Chapter 9. Advanced Spanning Tree Protocol

Chapter 10. Aggregating Switch Links

 

Part IV: Multilayer Switching

Chapter 11. Multilayer Switching

Chapter 12. Configuring DHCP

 

Part V: Monitoring Campus Networks

Chapter 13. Logging Switch Activity

Chapter 14. Managing Switches with SNMP

Chapter 15. Monitoring Performance with IP SLA

Chapter 16. Using Port Mirroring to Monitor Traffic

 

Part VI: Implementing High Availability

Chapter 17. Understanding High Availability

Chapter 18. Layer 3 High Availability

 

Part VII: Securing Switched Networks

Chapter 19. Securing Switch Access

Chapter 20. Securing VLANs

Chapter 21. Preventing Spoofing Attacks

Chapter 22. Managing Switch Users

 

CCNP TSHOOT (300-135)

Part I Fundamental Troubleshooting and Maintenance Concepts

Chapter 1 Introduction to Troubleshooting and Network Maintenance

Chapter 2 Troubleshooting and Maintenance Tools

Chapter 3 Troubleshooting Device Performance

 

Part II Troubleshooting Cisco Catalyst Switch Features

Chapter 4 Troubleshooting Layer 2 Trunks, VTP, and VLANs

Chapter 5 Troubleshooting STP and Layer 2 EtherChannel

Chapter 6 Troubleshooting Inter-VLAN Routing and Layer 3 EtherChannels

Chapter 7 Troubleshooting Switch Security Features

Chapter 8 Troubleshooting First-Hop Redundancy Protocols

 

Part III Troubleshooting Router Features

Chapter 9 Troubleshooting IPv4 Addressing and Addressing Technologies

Chapter 10 Troubleshooting IPv6 Addressing and Addressing Technologies

Chapter 11 Troubleshooting IPv4 and IPv6 ACLs and Prefix Lists

Chapter 12 Troubleshooting Basic IPv4/IPv6 Routing and GRE Tunnels

Chapter 13 Troubleshooting RIPv2 and RIPng

Chapter 14 Troubleshooting EIGRP

Chapter 15 Troubleshooting OSPF

Chapter 16 Troubleshooting Route Maps and Policy-Based Routing

Chapter 17 Troubleshooting Redistribution

Chapter 18 Troubleshooting BGP

 

Part IV Troubleshooting Management

Chapter 19 Troubleshooting Management Protocols and Tools

Chapter 20 Troubleshooting Management Access

--------------------------END-----------------------------

If you have any question regarding the above course outline please call - 01711452688.


CCNA Security

Crash Course / Exam Preparation Course / 1-on-1 Course

AT Computer Solution Limited is offered Crash Course / Exam Preparation Course. It will focus on the best paths to take education to help you advance in your career. It will help you to get a professional certificate easily.

 

Advantages of 1-on-1 Training are:

  • You can start from Any Date.
  • Fully customized course to suit your training need.
  • You get a personal trainer for the entire duration of the boot camp.
  • Better quality. Quality of instruction has an inverse relation with the number of students in a class.
  • Quicker learning since you receive undivided attention of the trainer. You don't have to wait for your turn to seek an explanation

 

 

CCNA Security (New Version) & 210-260 IINS Exam

Course Outline

1. Security Concepts

  • Threatscape
  • Threat defense technologies
  • Security policy and basic security architectures
  • Cryptographic technologies

2. Secure Network Devices

  • Implementing AAA
  • Management protocols and systems
  • Securing the control plane

3. Layer 2 Security

  • Securing Layer 2 infrastructures
  • Securing Layer 2 protocols

4. Firewall

  • Firewall technologies
  • Introducing the Cisco ASA v9.2
  • Cisco ASA access control and service policies
  • Cisco IOS zone based firewall

5. VPN

  • IPsec technologies
  • Site-to-site VPN
  • Client-based remote access VPN
  • Clientless remote access VPN

6. Advanced Topics

  • Intrusion detection and protection
  • Endpoint protection
  • Content security
  • Advanced network security architectures

Labs

Lab 1: Exploring Cryptographic Technologies

Lab 2: Configure and Verify AAA

Lab 3: Configuration Management Protocols

Lab 4: Securing Routing Protocols

Lab 5: VLAN Security and ACLs on Switches

Lab 6: Port Security and Private VLAN Edge

Lab 7: Securing DHCP, ARP, and STP

Lab 8: Explore Firewall Technologies

Lab 9: Cisco ASA Interfaces and NAT

Lab 10: Site-to-Site VPN

Lab 11: Clientless Remote Access VPN

Lab 12: Configure DHCP Snooping and STP Protection

Lab 13: Configure Interfaces and NAT on the Cisco ASA


CCNP Security (Cisco Certified Network Professional Security)

CCNP Security (New Version)

Exam Number

Exam Name

1. 300-208 SISAS

Implementing Cisco Secure Access Solutions (SISAS)

2. 300-206 SENSS

Implementing Cisco Edge Network Security Solutions (SENSS)

3. 300-209 SIMOS

Implementing Cisco Secure Mobility Solutions (SIMOS)

4. 300-207 SITCS

Implementing Cisco Threat Control Solutions (SITCS)

 1. 300-208 Implementing Cisco Secure Access Solutions (SISAS)

Exam Description: The Implementing Cisco Secure Access Solutions (SISAS) (300-208) exam tests whether a network security engineer knows the components and architecture of secure access by utilizing 802.1X and Cisco TrustSec. This 90-minute exam consists of 65–75 questions. It tests on Cisco Identity Services Engine (ISE) architecture, solution, and components as an overall network threat mitigation and endpoint control solutions. It also includes the fundamental concepts of bring your own device (BYOD) using posture and profiling services of ISE. Candidates can prepare for this exam by taking the Implementing Cisco Secure Access Solutions (SISAS) course.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam.

 

1.0 Identity Management/Secure Access 

1.1 Implement device administration

1.1.a Compare and select AAA options

1.1.b TACACS+

1.1.c RADIUS

1.1.d Describe Native AD and LDAP

1.2 Describe identity management

1.2.a Describe features and functionality of authentication and authorization

1.2.b Describe identity store options (i.e., LDAP, AD, PKI, OTP, Smart Card, local)

1.2.c Implement accounting

1.3 Implement wired/wireless 802.1x

1.3.a Describe RADIUS flows

1.3.b AV pairs

1.3.c EAP types

1.3.d Describe supplicant, authenticator, server

1.3.e Supplicant options

1.3.f 802.1X phasing (monitor mode, low impact, closed mode)

1.3.g AAA server

1.3.h Network access devices

1.4 Implement MAB

1.5 Implement network authorization enforcement

1.5.a dACL

1.5.b Dynamic VLAN assignment

1.5.c Describe SGA

1.5.d Named ACL

1.5.e CoA

1.6 Implement central web authorization

1.7 Implement profiling

1.8 Implement guest services

1.9 Implement posturing

1.10 Implement BYOD access

1.10.a Describe elements of a BYOD policy

1.10.b Device registration

1.10.c My devices portal

1.10.d Describe supplicant provisioning

 

2.0 Threat Defense

2.1 Implement firewall

2.1.a Describe SGA ACLs

 

3.0 Troubleshooting, Monitoring, and Reporting Tools

3.1 Troubleshoot identity management solutions

 

4.0 Threat Defense Architectures

4.1 Design highly secure wireless solution

 

5.0 Identity Management Architectures

5.1 Design AAA security solution

5.2 Design profiling security solution

5.3 Design posturing security solution

5.4 Design BYOD security solution

5.5 Design device administration security solution

5.6 Design guest services security solution

 

2. 300-206 Implementing Cisco Edge Network Security Solutions (SENSS)

Exam Description: The Implementing Cisco Edge Network Security (SENSS) (300-206) exam tests the knowledge of a network security engineer to configure and implement security on Cisco network perimeter edge devices such as a Cisco switch, Cisco router, and Cisco ASA firewall. This 90-minute exam consists of 65-75 questions and focuses on the technologies used to strengthen security of a network perimeter such as Network Address Translation (NAT), ASA policy and application inspect, and a zone-based firewall on Cisco routers. Candidates can prepare for this exam by taking the Cisco Edge Network Security (SENSS) course.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam.

 

1.0 Threat Defense

1.1 Implement firewall

1.1.a Implement ACLs

1.1.b Implement static/dynamic NAT/PAT

1.1.c Implement object groups

1.1.d Describe threat detection features

1.1.3 Implement botnet traffic filtering

1.2 Implement Layer 2 security

1.2.a Configure DHCP snooping

1.2.b Describe dynamic ARP inspection

1.2.c Describe storm control

1.2.d Configure port security

1.2.e Describe common Layer 2 threats and attacks and mitigation

1.2.f Describe MACSec

1.3 Configure device hardening per best practices

1.3.a Routers

1.3.b Switches

  1.3.c Firewalls

1.4 Implement firewall

1.4.a Configure application filtering and protocol inspection

1.4.b Describe virtualized firewalls    

 

2.0 Cisco Security Devices GUIs and Secured CLI Management

2.1 Implement SSHv2, SSL, SNMPv3 access on the network devices

2.2 Implement RBAC on the ASA/IOS CLI and on ASDM

2.3 Describe Cisco Prime Infrastructure

2.4 Describe CSM

2.5 Implement device managers

 

3.0 Management Services on Cisco Devices

3.1 Implement NetFlow exporter

3.2 Implement SNMPv3

3.3 Implement logging

3.4 Implement NTP with authentication

3.5 Describe CDP, DNS, SCP, SFTP, and DHCP

 

4.0 Troubleshooting, Monitoring and Reporting Tools

4.1 Monitor firewall using analysis of packet tracer, packet capture, and syslog

 

5.0 Threat Defense Architectures

5.1 Design a firewall solution

5.2 Design Layer 2 security solution

 

6.0 Security Components and Considerations

6.1 Describe security operations management architecture

6.2 Describe Data Center security components and considerations

6.3 Describe Collaboration security components and considerations

6.4 Describe common IPv6 security considerations

  

3. 300-209 Implementing Cisco Secure Mobility Solutions (SIMOS)

Exam Description: The Implementing Cisco Secure Mobility Solutions (SIMOS) (300-209) exam tests a network security engineer on the variety of Virtual Private Network (VPN) solutions that Cisco has available on the Cisco ASA firewall and Cisco IOS software platforms. This 90-minute exam consists of 65–75 questions and assesses the knowledge necessary to properly implement highly secure remote communications through VPN technology, such as remote access SSL VPN and site-to-site VPN (DMVPN, FlexVPN). Candidates can prepare for this exam by taking the Implementing Cisco Secure Mobility Solutions (SIMOS) course.

The following topics are general guidelines for the content likely to be included on the exam.

 

1.0 Secure Communications

1.1 Implement site-to-site VPNs on routers and firewalls

1.1.a Describe GETVPN

1.1.b Implement IPsec (with IKEv1 and IKEv2)

1.1.c Implement DMVPN (hub-Spoke and spoke-spoke)

1.2 Implement remote access VPNs on routers and firewalls

1.2.a Implement AnyConnect IKEv2 VPNs

1.2.b Implement SSLVPN: client and clientless

1.3 Implement site-to-site VPNs on routers and firewalls

1.3.a Implement FlexVPN

1.4 Implement remote access VPNs on routers and firewalls

1.4.a Implement SSLVPN: client and clientless

1.4.b Implement FLEX VPN

 

2.0 Troubleshooting, Monitoring, and Reporting Tools

2.1 Analyze syslog and VPN debug logs using ASDM

 

3.0 Secure Communications Architectures

3.1 Design site-to-site VPN solution

3.2 Design remote access VPN solution

3.3 Describe encryption, hashing, NGE

 

4. 300-207 Implementing Cisco Threat Control Solutions (SITCS)

Exam Description: The Implementing Cisco Threat Control Solutions (SITCS) (300-207) exam tests a network security engineer on advanced firewall architecture and configuration with the Cisco next-generation firewall, utilizing access and identity policies. This 90-minute exam consists of 65–75 questions and covers integration of Intrusion Prevention System (IPS) and context-aware firewall components, as well as Web (Cloud) and Email Security solutions. Candidates can prepare for this exam by taking the Implementing Cisco Threat Control Solutions (SITCS) course.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam.

 

1.0 Content Security

1.1 Implement Cisco CX

1.1.a Describe features and functionality

1.1.b Implement web usage control

1.1.c Implement AVC

1.1.d Implement decryption policies

1.1.e Describe traffic redirection and capture methods

1.2 Implement Cisco Cloud Web Security

1.2.a Describe features and functionality

1.2.b Implement IOS and ASA connectors

1.2.c Implement AnyConnect web security module

1.2.d Describe web usage control

1.2.e Describe AVC

1.2.f Describe anti-malware

1.2.g Describe decryption policies

1.3 Implement Cisco WSA

1.3.a Implement data security

1.3.b Describe traffic redirection and capture methods

1.4 Implement Cisco ESA

1.4.a Describe features and functionality

1.4.b Implement email encryption

1.4.c Implement anti-spam policies

1.4.d Implement virus outbreak filter

1.4.e Implement DLP policies

1.4.f Implement anti-malware                

1.4.g Implement inbound and outbound mail policies and authentication

1.4.h Describe traffic redirection and capture methods

 

2.0 Threat Defense

2.1 Implement network IPS

2.1.a Describe traffic redirection and capture methods

2.1.b Configure network IPS

2.1.c Describe signatures

2.1.d Implement event actions

2.1.e Configure event action overrides

2.1.f Implement risk ratings

2.1.g Describe router-based IPS

2.2 Configure device hardening per best practices

2.2.a IPS

2.2.b Content Security appliances

2.3 Implement Network IPS

2.3.a Describe signatures

2.3.b Configure blocking

2.3.c Implement anomaly detection

 

3.0 Devices GUIs and Secured CLI

3.1 Implement Content Security

 

4.0 Troubleshooting, Monitoring, and Reporting Tools

4.1 Configure IME and IP logging for IPS

4.2 Monitor Content Security

4.3 Monitor Cisco Security IntelliShield

 

5.0 Threat Defense Architectures

5.1 Design IPS solution

 

6.0 Content Security Architectures

6.1 Design Web Security solution

6.2 Design Email Security solution

6.3 Design Application Security solution

 

We assure your best learning. If you have any quire please feel free to call # +88 01711-452688


CCNA Data Center

CCNA Data Center

 

1. 640-911 DCICN   Introducing Cisco Data Center Networking (DCICN)

Course Outline

  • Module 1: Building a Simple Network (7 lessons)
  • Module 2: Implementing a Switched Network (6 lessons)
  • Module 3: IP Addressing (4 lessons)
  • Module 4: Routing on the Cisco Nexus Switch (4 lessons)

 

2. 640-916 DCICT   Introducing Cisco Data Center Technologies (DCICT)

 Course Outline

  • Module 1: Cisco Data Center Fundamentals Concepts (11 lessons)
  • Module 2: Data Center Unified Fabric (5 lessons)
  • Module 3: Storage Networking (8 lessons)
  • Module 4: DC Virtualization (4 lessons)
  • Module 5: Unified Computing (7 lessons)

 

For more details visit:

http://www.cisco.com/c/en/us/training-events/training-certifications/certifications/associate/ccna-data-center.html


CCIE Routing and Switching

1.0  Layer 2 Technologies

1.1  LAN switching technologies

 1.1.a  Implement and troubleshoot switch administration

1.1.a (i)  Managing MAC address table

1.1.a (ii)    errdisable recovery

1.1.a (iii)  L2 MTU

1.1.b   Implement and troubleshoot layer 2 protocols

1.1.b (i)  CDP, LLDP

1.1.b (ii)  UDLD

1.1.c   Implement and troubleshoot VLAN

1.1.c (i)  access ports

1.1.c (ii)  VLAN database

1.1.c (iii)  normal, extended VLAN, voice VLAN

1.1.d   Implement and troubleshoot trunking

1.1.d (i)  VTPv1, VTPv2, VTPv3, VTP pruning

1.1.d (ii)  dot1Q

1.1.d (iii)  Native VLAN

1.1.d (iv)  Manual pruning

1.1.e   Implement and troubleshoot etherchannel

1.1.e (i)  LACP, PAgP, manual

1.1.e (ii)  layer 2, layer 3

1.1.e (iii)  load-balancing

1.1.e (iv)  etherchannel misconfiguration guard

1.1.f  Implement and troubleshoot spanning-tree

1.1.f (i)  PVST+/RPVST+/MST

1.1.f (ii)  switch priority, port priority, path cost, STP timers

1.1.f (iii)  port fast, BPDUguard, BPDUfilter

1.1.f (iv)  loopguard, rootguard

1.1.g   Implement and troubleshoot other LAN switching technologies

1.1.g (i)  SPAN, RSPAN, ERSPAN

 

1.2  Layer 2 Multicast

1.2.a  Implement and troubleshoot IGMP

1.2.a (I)  IGMPv1, IGMPv2, IGMPv3

1.2.a (ii)  IGMP snooping

1.2.a (iii)  IGMP querier

1.2.a (iv)  IGMP filter

1.2.a (v)  IGMP proxy

 

1.3  Layer 2 WAN circuit technologies

1.3.a  Implement and troubleshoot HDLC

1.3.b  Implement and troubleshoot PPP

1.3.b (i)  authentication (PAP, CHAP)

1.3.b (ii)  PPPoE

1.3.b (iii)  MLPPP

 

1.4  Troubleshooting layer 2 technologies

1.4.a  Use IOS troubleshooting tools

1.4.a (i)  debug, conditional debug

1.4.a (ii)  ping, traceroute with extended options

1.4.a (iii)  Embedded packet capture

1.4.b  Apply troubleshooting methodologies

1.4.b (i)  Diagnose the root cause of networking issue (analyze symptoms,

                                                            identify and describe root cause)

1.4.b (ii)  Design and implement valid solutions according to constraints

1.4.b (iii)  Verify and monitor resolution

1.4.c  Interpret packet capture

1.4.c (i)  Using wireshark trace analyzer

1.4.c (ii)  Using IOS embedded packet capture

 

40%  2.0  Layer 3 Technologies

2.1  Addressing technologies

2.1.a  Identify, implement and troubleshoot IPv4 addressing and sub-netting

2.1.a (i)  Address types, VLSM

2.1.a (ii)  ARP

2.1.b  Identify, implement and troubleshoot IPv6 addressing and sub-netting

2.1.b (i)  Unicast, multicast

2.1.b (ii)  EUI-64

2.1.b (iii)  ND, RS/RA

2.1.b (iv)  Autoconfig/SLAAC temporary addresses (RFC4941)

2.1.b (v)  Global prefix configuration feature

 

2.2  Layer 3 Multicast

2.2.a  Troubleshoot reverse path forwarding

2.2.a (i)  RPF failure

2.2.a(ii)  RPF failure with tunnel interface 

2.2.b  Implement and troubleshoot IPv4 protocol independent multicast

2.2.b (i)  PIM dense mode, sparse mode, sparse-dense mode

2.2.b (ii)  Static RP, auto-RP, BSR

2.2.b (iii)  Bidirectional PIM

2.2.b (iv)  Source-specific multicast

2.2.b (v)  Group to RP mapping

2.2.b (vi)  Multicast boundary

2.2.c  Implement and troubleshoot multicast source discovery protocol

2.2.c.(i)  Intra-domain MSDP (anycast RP)

2.2.c.(ii)  SA filter

 

2.3  Fundamental routing concepts

2.3.a  Implement and troubleshoot static routing

2.3.b  Implement and troubleshoot default routing

2.3.c  Compare routing protocol types

2.3.c (i)  distance vector

2.3.c (ii)  link state

2.3.c (iii)  path vector

2.3.d  Implement, optimize and troubleshoot administrative distance

2.3.e  Implement and troubleshoot passive interface

2.3.f  Implement and troubleshoot VRF lite

2.3.g  Implement, optimize and troubleshoot filtering with any routing protocol

2.3.h  Implement, optimize and troubleshoot redistribution between any routing

                                      protocol

2.3.i  Implement, optimize and troubleshoot manual and auto summarization                              with  any routing protocol

2.3.j  Implement, optimize and troubleshoot policy-based routing

2.3.k  Identify and troubleshoot sub-optimal routing

2.3.l  Implement and troubleshoot bidirectional forwarding detection

2.3.m  Implement and troubleshoot loop prevention mechanisms

2.3.m (i)  Route tagging, filtering

2.3.m (ii)  Split horizon

2.3.m (iii)  Route poisoning

2.3.n  Implement and troubleshoot routing protocol authentication

2.3.n (i)  MD5

2.3.n (ii)  key-chain

2.3.n (iii)  EIGRP HMAC SHA2-256bit

2.3.n (iv)  OSPFv2 SHA1-196bit

2.3.n (v)  OSPFv3 IPsec authentication

 

 

2.4  RIP v2

2.4.a  Implement and troubleshoot RIPv2

 

2.5  EIGRP (for IPv4 and IPv6)

2.5.a  Describe packet types

2.5.a (i)  Packet types (hello, query, update, and such)

2.5.a (ii)  Route types (internal, external)

2.5.b  Implement and troubleshoot neighbor relationship

2.5.b (i)  Multicast, unicast EIGRP peering

2.5.c  Implement and Troubleshoot Loop free path selection

2.5.c (i)  RD, FD, FC, successor, feasible successor

2.5.c (ii)  Classic metric

2.5.c (iii)  Wide metric

2.5.d  Implement and troubleshoot operations

2.5.d (i)  General operations

2.5.d (ii)  Topology table, update, query, active, passive

2.5.d (iii)  Stuck in active

2.5.d (iv)  Graceful shutdown

2.5.e  Implement and troubleshoot EIGRP stub

2.5.e (i)  stub

2.5.e (ii)  leak-map

2.5.f  Implement and troubleshoot load-balancing

2.5.f (i)  equal-cost

2.5.f (ii)  unequal-cost

2.5.f (iii)  add-path

2.5.g  Implement EIGRP (multi-address) named mode

2.5.g (i)  Types of families

2.5.g (ii)  IPv4 address-family

2.5.g (iii)  IPv6 address-family

2.5.h  Implement, troubleshoot and optimize EIGRP convergence and scalability

2.5.h (i)  Describe fast convergence requirements

2.5.h (ii)  Control query boundaries

2.5.h (iii)  IP FRR/fast reroute (single hop)

2.5.h (iv)  Summary leak-map

2.5.h (v)  Summary metric

 

2.6  OSPF (v2 and v3)

2.6.a  Describe packet types

2.6.a (i)  LSA types (1, 2, 3, 4, 5, 7, 9)

2.6.a (ii)  Route types (N1, N2, E1, E2)

2.6.b  Implement and troubleshoot neighbor relationship

2.6.c  Implement and troubleshoot OSPFv3 address-family support

2.6.c (i)  IPv4 address-family

2.6.c (ii)  IPv6 address-family

2.6.d  Implement and troubleshoot network types, area types and router types

2.6.d (i)  Point-to-point, multipoint, broadcast, non-broadcast

              2.6.d (ii)  LSA types, area type: backbone, normal, transit, stub, NSSA, totally stub

2.6.d (iii)  Internal router, ABR, ASBR

2.6.d (iv)  Virtual link

2.6.e  Implement and troubleshoot path preference

2.6.f  Implement and troubleshoot operations

2.6.f (i)  General operations

2.6.f (ii)  Graceful shutdown

2.6.f (iii)  GTSM (generic TTL security mechanism)

2.6.g  Implement, troubleshoot and optimize OSPF convergence and scalability

2.6.g (i)  Metrics

2.6.g (ii)  LSA throttling, SPF tuning, fast hello

2.6.g (iii)  LSA propagation control (area types, ISPF)

2.6.g (iv)  IP FR/fast reroute (single hop)

2.6.g (v)  LFA/loop-free alternative (multi hop)

2.6.g (vi)  OSPFv3 prefix suppression

 

2.7  BGP

2.7.a  Describe, implement and troubleshoot peer relationships

2.7.a (i)  Peer-group, template

2.7.a (ii)  Active, passive

2.7.a (iii)  States, timers

2.7.a (iv)  Dynamic neighbors

2.7.b  Implement and troubleshoot IBGP and EBGP

2.7.b (i)  EBGP, IBGP

2.7.b (ii)  4 bytes AS number

2.7.b (iii)  Private AS

2.7.c  Explain attributes and best-path selection

2.7.d  Implement, optimize and troubleshoot routing policies

2.7.d (i)  Attribute manipulation

2.7.d (ii)  Conditional advertisement

2.7.d (iii)  Outbound route filtering

2.7.d (iv)  Communities, extended communities

2.7.d (v)  Multi-homing

2.7.e  Implement and troubleshoot scalability

2.7.e (i)  Route-reflector, cluster

2.7.e (ii)  Confederations

2.7.e (iii)  Aggregation, AS set

2.7.f  Implement and troubleshoot multi-protocol BGP

2.7.f (i)  IPv4, IPv6, VPN address-family

2.7.g  Implement and troubleshoot AS path manipulations

2.7.g (i)  Local AS, allow AS in, remove private AS

2.7.g (ii)  Prepend

2.7.g (iii)  Regexp

2.7.h  Implement and Troubleshoot Other Features

2.7.h (i)  Multipath

2.7.h (ii)  BGP synchronization

2.7.h (iii)  Soft reconfiguration, route refresh

 

2.8  Troubleshooting layer 3 technologies

2.8.a  Use IOS troubleshooting tools

2.8.a (i)  debug, conditional debug

2.8.a (ii)  ping, traceroute with extended options

2.8.a (iii)  Embedded packet capture

2.8.b  Apply troubleshooting methodologies

2.8.b (i)  Diagnose the root cause of networking issue (analyze symptoms,

                                                            identify and describe root cause)

2.8.b (ii)  Design and implement valid solutions according to constraints

2.8.b (iii)  Verify and monitor resolution

2.8.c  Interpret packet capture

2.8.c (i)  Using wireshark trace analyzer

2.8.c (ii)  Using IOS embedded packet capture

 

20%  3.0  VPN Technologies

3.1  Tunneling

3.1.a  Implement and troubleshoot MPLS operations

3.1.a (i)  Label stack, LSR, LSP

3.1.a (ii)  LDP

3.1.a (iii)  MPLS ping, MPLS traceroute

3.1.b  Implement and troubleshoot basic MPLS L3VPN

3.1.b (i)  L3VPN, CE, PE, P

3.1.b (ii)  Extranet (route leaking)

3.1.c  Implement and troubleshoot encapsulation

3.1.c (i)  GRE

3.1.c (ii)  Dynamic GRE

3.1.d  Implement and troubleshoot DMVPN (single hub)

3.1.d (i)  NHRP

3.1.d (ii)  DMVPN with IPsec using preshared key

3.1.d (iii)  QoS profile

3.1.d (iv)  Pre-classify

 

3.2  Encryption

3.2.a  Implement and troubleshoot IPsec with preshared key

3.2.a (i)  IPv4 site to IPv4 site

3.2.a (ii)  IPv6 in IPv4 tunnels

3.2.a (iii)  Virtual tunneling interface (VTI)

 

3.3  Troubleshooting VPN technologies

3.3.a  Use IOS troubleshooting tools

3.3.a (i)  debug, conditional debug

3.3.a (ii)  ping, traceroute with extended options

3.3.a (iii)  Embedded packet capture

3.3.b  Apply troubleshooting methodologies

3.3.b (i)  Diagnose the root cause of networking issue (analyze symptoms,

                                                            identify and describe root cause)

3.3.b (ii)  Design and implement valid solutions according to constraints

3.3.b (iii)  Verify and monitor resolution

3.3.c  Interpret packet capture

3.3.c (i)  Using wireshark trace analyzer

3.3.c (ii)  Using IOS embedded packet capture

 

5%  4.0  Infrastructure Security

4.1  Device security

4.1.a  Implement and troubleshoot IOS AAA using local database

4.1.b  Implement and troubleshoot device access control 

4.1.b (i)  Lines (VTY, AUX, console)

4.1.b (ii)  SNMP

4.1.b (iii)  Management plane protection

4.1.b (iv)  Password encryption

4.1.c  Implement and troubleshoot control plane policing

 

4.2  Network security

4.2.a  Implement and troubleshoot switch security features

4.2.a (i)  VACL, PACL

4.2.a (ii)  Stormcontrol

4.2.a (iii)  DHCP snooping

4.2.a (iv)  IP source-guard

4.2.a (v)  Dynamic ARP inspection

4.2.a (vi)  Port-security

4.2.a (vii)  Private VLAN

4.2.b  Implement and troubleshoot router security features

4.2.b (i)  IPv4 access control lists (standard, extended, time-based)

4.2.b (ii)  IPv6 traffic filter

4.2.b (iii)  Unicast reverse path forwarding

4.2.c  Implement and troubleshoot IPv6 first hop security

4.2.c (i)  RA guard

4.2.c (ii)  DHCP guard

4.2.c (iii)  Binding table

4.2.c (iv)  Device tracking

4.2.c (v)  ND inspection/snooping

4.2.c (vi)  Source guard

4.2.c (vii)  PACL

 

4.3  Troubleshooting infrastructure security

4.3.a  Use IOS troubleshooting tools

4.3.a (i)  debug, conditional debug

4.3.a (ii)  ping, traceroute with extended options

4.3.a (iii)  Embedded packet capture

4.3.b  Apply troubleshooting methodologies

4.3.b (i)  Diagnose the root cause of networking issue (analyze symptoms,

                                                           identify and describe root cause)

4.3.b (ii)  Design and implement valid solutions according to constraints

4.3.b (iii)  Verify and monitor resolution

4.3.c  Interpret packet capture

4.3.c (i)  Using wireshark trace analyzer

4.3.c (ii)  Using IOS embedded packet capture

 

15%  5.0  Infrastructure Services

5.1  System management

5.1.a  Implement and troubleshoot device management

5.1.a (i)  Console and VTY

5.1.a (ii)  telnet, HTTP, HTTPS, SSH, SCP

5.1.a (iii)  (T)FTP

5.1.b  Implement and troubleshoot SNMP

5.1.b (i)  v2c, v3

5.1.c  Implement and troubleshoot logging

5.1.c (i)  Local logging, syslog, debug, conditional debug

5.1.c (ii)  Timestamp

 

5.2  Quality of service

5.2.a  Implement and troubleshoot end to end QoS

5.2.a (i)  CoS and DSCP mapping

5.2.b  Implement, optimize and troubleshoot QoS using MQC

5.2.b (i)  Classification

5.2.b (ii)  Network based application recognition (NBAR)

5.2.b (iii)  Marking using IP precedence, DSCP, CoS, ECN

5.2.b (iv)  Policing, shaping

5.2.b (v)  Congestion management (queuing)

5.2.b (vi)  HQoS, sub-rate ethernet link

5.2.b (vii)  Congestion avoidance (WRED)

 

5.3  Network services

5.3.a  Implement and troubleshoot first-hop redundancy protocols

5.3.a (i)  HSRP, GLBP, VRRP

5.3.a (ii)  Redundancy using IPv6 RS/RA

5.3.b  Implement and troubleshoot network time protocol

5.3.b (i)  NTP master, client, version 3, version 4

5.3.b (ii)  NTP authentication

5.3.c  Implement and troubleshoot IPv4 and IPv6 DHCP

5.3.c (i)  DHCP client, IOS DHCP server, DHCP relay

5.3.c (ii)  DHCP options

5.3.c (iii)  DHCP protocol operations

5.3.c (iv)  SLAAC/DHCPv6 interaction

5.3.c (v)  Stateful, stateless DHCPv6

5.3.c (vi)  DHCPv6 prefix delegation

5.3.d  Implement and troubleshoot IPv4 network address translation

5.3.d (i)  Static NAT, dynamic NAT, policy-based NAT, PAT

5.3.d (ii)  NAT ALG

 

5.4  Network optimization

5.4.a  Implement and troubleshoot IP SLA

5.4.a (i)  ICMP, UDP, jitter, VoIP

5.4.b  Implement and troubleshoot tracking object

5.4.b (i)  Tracking object, tracking list

5.4.b (ii)  Tracking different entities (e.g. interfaces, routes, IPSLA, and such)

5.4.c  Implement and troubleshoot netflow

5.4.c (i)  Netflow v5, v9

5.4.c (ii)  Local retrieval

5.4.c (iii)  Export (configuration only)

5.4.d  Implement and troubleshoot embedded event manager

5.4.d (i)  EEM policy using applet

 

5.5  Troubleshooting infrastructure services

5.5.a  Use IOS troubleshooting tools

5.5.a (i)  debug, conditional debug

5.5.a (ii)  ping, traceroute with extended options

5.5.a (iii)  Embedded packet capture

5.5.b  Apply troubleshooting methodologies

5.5.b (i)  Diagnose the root cause of networking issue (analyze symptoms,

                                                           identify and describe root cause)

5.5.b (ii)  Design and implement valid solutions according to constraints

5.5.b (iii)  Verify and monitor resolution

5.5.c  Interpret packet capture

5.5.c (i)  Using wireshark trace analyzer

5.5.c (ii)  Using IOS embedded packet capture


Redhat Linux Training & Certification

Red Hat Certified Engineer (RHCE)

We are -  Authorized RedHat Linux Training & Exam Partner in Bangladesh

Click  =  http://www.redhat.com/en/services/training/locations-facilities

 

RHCE Course Outline

Total 110 Hours

Per Class 06 Hours

One Class = 06 Hours Friday Evening Batch (3:30pm-9:30pm) /

                    Friday Morning 4 hours (9am – 1pm) & Saturday Evening 2 hours (7:30pm-9:30pm)

Red Hat System Administration I (RH124)

Chapter 1 : Accessing the Command Line

Chapter 2: Managing Files From the Command Line

Chapter 3: Getting Help in Red Hat Enterprise Linux [Without LAB]

Chapter 4: Creating, Viewing, and Editing Text Files

ONE Class

 

Chapter 5: Managing Local Linux Users and Groups

Chapter 6: Controlling Access to Files With Linux File System Permission

Chapter 8: Controlling Services and Daemons

Chapter 11: Managing Red Hat Enterprise Linux Networking

ONE Class

 

Chapter 9: Configuring and Securing OpenSSH Service

Chapter 12: Archiving and Copying Files Between Systems

Chapter 13: Installing and Updating Software Packages

Chapter 14: Accessing Linux file Systems

ONE Class

*** Exam Class

Red Hat System Administration II (RH134)

Chapter 2 : Using Regular Expression With grep

Chapter 3 : Creating and Editing Text files with vim

Chapter 4 : Scheduling Future Linux Tasks

Chapter  6: Controlling Access to Files With Access Control lists (ACLs)

Chapter 7 : Managing SELinux Security

ONE Class

 

Chapter 8: Connecting to Network-defined Users and Groups

Chapter 9: Adding Disks, Partitions, and File System to a Linux System

Chapter 10: Managing Logical Volume Management (LVM) Storage

ONE Class

 

Chapter 11: Accessing Network Storage with Network File System (NFS)

Chapter 13: Controlling and Troubleshooting the Red Hat  Enterprise Linux Boot Process

Chapter 14: Limiting Network Communication with firewalld

ONE Class

*** Exam Class

Red Hat System Administration III (RH254)

Chapter 1: Controlling Services and Daemons

Chapter 2: Managing IPv6 Networking

Chapter 3: Configuring Link Aggregation and Bridging

ONE Class

 

Chapter 4: Network Port Security

Chapter 5: Managing DNS for Servers

Chapter 6: Configuring Email Transmission

Chapter 7: Providing Remote Block Storage

ONE Class

*** Exam Class

Chapter 8: Providing File-based Storage

Chapter 9: Configuring MariaDB Databases

Chapter 10: Providing Apache HTTPD Web Service

ONE Class

 

Chapter 11:Writing Bash Scripts

Chapter 12: Bash Conditionals and Control Structures

Chapter 13: Configuring the Shell Environment

ONE Class

*** Exam Class

 

Exam Preparation:   20 Hours

Project:   18 Hours

=> Special discount for Linux RHCE 7 Course fee TK 7000 + 3 Original Books TK 8000 = 15,000 (110 Hours)

 

If you have any query please feel free call - 01711452688

 

 


Red Hat Certified Architect (RHCA)

We are -  Authorized RedHat Linux Training & Exam Partner in Bangladesh

Click  =  http://www.redhat.com/en/services/training/locations-facilities

 

RHCA Course Outline

 

 

If you have any query please feel free call - 01711452688


Red Hat Enterprise Virtualization (RH318)

Course Content

  • Install Red Hat Enterprise Virtualization Manager and any dependencies
  • Use Red Hat Enterprise Virtualization Manager to:
    • Create datacenters and clusters
    • Manage hypervisor hosts
    • Configure storage
    • Create Red Hat Enterprise Linux virtual machines
    • Develop pools and templates
    • Set up Red Hat Enterprise Virtualization Manager users
  • Install and configure a Red Hat Virtualization Hypervisor to support guests and attach to a Red Hat Enterprise Virtualization Manager
  • Import installation media for creating new virtual machines
  • Perform management tasks, such as collecting logs, creating bookmarks for specific events, and more

 


Red Hat Gluster Storage Administration (RH236)

Course Outline

  • Install Red Hat Storage Server on both physical and virtual systems and work with existing Red Hat Storage Server appliances
  • Configure a Red Hat Storage Server storage pool
  • Create individual storage bricks on either physical devices or logical volumes
  • Create various Red Hat Storage Server volumes such as:
    • Distributed
    • Replicated
    • Distributed-replicated
    • Stripe-replicated
    • Distributed-striped
    • Distributed-striped-replicated
  • Format the volumes with an appropriate file system
  • Create Red Hat Storage Server volume snapshots
  • Extend existing storage volumes by adding additional bricks and performing appropriate rebalancing operations
  • Configure clients to use Red Hat Storage Server appliance volumes using native and network file systems (NFS)
  • Configure clients to use Red Hat Storage Server appliance volumes using SMB
  • Configure Red Hat Storage Server features including disk quotas and POSIX access control lists (ACLs)
  • Configure IP failover for NFS-and SMB-based cluster services
  • Configure geo-replication services
  • Configure unified object storage
  • Configure Red Hat Storage Server to support Hadoop
  • Troubleshoot Red Hat Storage Server problems
  • Monitor Red Hat Storage Server workloads
  • Perform Red Hat Storage Server management tasks such as tuning volume options, volume migration, stopping and deleting volumes, and configuring server-side quorum

 


Red Hat High Availability Clustering (RH436)

Candidates should be able to perform the tasks listed below:

  • Configure a high-availability cluster, using either physical or virtual systems, that:
    • Utilizes shared storage.
    • Provides service fail-over between the cluster nodes.
    • Provides preferred node for a given service.
    • Selectively fails over services based on specific constraints.
    • Preemptively removes non-functioning cluster members to prevent corruption of shared storage.
  • Manage logical volumes in a clustered environment:
    • Create volume groups that are available to all members of a highly available cluster.
    • Create logical volumes that can be simultaneously mounted by all members of a high-availability cluster.
  • Configure a GFS file system to meet specified size, layout, and performance objectives.
  • Configure iSCSI initiators.
  • Use multipathed devices.
  • Configure cluster logging.
  • Configure cluster monitoring.

As with all Red Hat performance-based exams, configurations must persist after reboot without intervention.

 


Red Hat OpenStack Administration (CL210)

Course outline

Candidates for the RHCSA in Red Hat OpenStack should be able to perform the following tasks:

  • Install and configure Red Hat Enterprise Linux OpenStack Platform
  • Manage users
  • Manage projects
  • Manage flavors
  • Manage roles
  • Set quotas
  • Manage images
  • Configure images at instantiation
  • Add additional compute nodes
  • Manage Swift storage
  • Manage networking
  • Manage Cinder storage

 


Red Hat Server Hardening (RH413)

Course Outline

Candidates for the Red Hat Certificate of Expertise in Server Hardening should be able to perform the following tasks:

  • Identify Red Hat Common Vulnerabilities and Exposures (CVEs) and Red Hat Security Advisories (RHSAs) and selectively update systems based on this information
  • Verify package security and validity
  • Identify and employ standards-based practices for configuring file system security, create and use encrypted file systems, tune file system features, and use specific mount options to restrict access to file system volumes
  • Configure default permissions for users and use special file permissions, attributes, and access control lists (ACLs) to control access to files
  • Install and use intrusion detection capabilities in Red Hat Enterprise Linux to monitor critical system files
  • Manage user account security and user password security
  • Manage system login security using pluggable authentication modules (PAM)
  • Configure console security by disabling features that allow systems to be rebooted or powered off using bootloader passwords
  • Configure system-wide acceptable use notifications
  • Install, configure, and manage identity management services and configure identity management clients
  • Configure remote system logging services, configure system logging, and manage system log files using mechanisms such as log rotation and compression
  • Configure system auditing services and review audit reports
  • Use network scanning tools to identify open network service ports and configure and troubleshoot system firewalling

As with all Red Hat performance-based exams, configurations must persist after reboot without intervention.

 


Microsoft Training & Certification

MCSA: Windows Server 2016

MCSA: Windows Server 2016

 Prepares you for exam 70-740, 70-741 & 70-742

 

Installation, Storage, and Compute with Windows Server 2016 (Exam 70-740)

Course Outline:

Module 1: Installing, upgrading, and migrating servers and workloadsThis module describes the new features of Windows Server 2016, and explains how to prepare for and install Nano Server and Server Core. This module also describes how to plan a server upgrade and migration strategy, and explains how to perform a migration of server roles and workloads within and across domains. Finally, this module explains how to choose an activation model based on your environment characteristics.Lessons

  • Introducing Windows Server 2016
  • Preparing and installing Nano Server and Server Core
  • Preparing for upgrades and migrations
  • Migrating server roles and workloads
  • Windows Server activation models

Lab : Installing and configuring Nano Server

  • Installing Nano Server
  • Completing post-installation tasks on Nano Server
  • Performing remote management

After completing this module, students will be able to:

  • Describe the new features of Windows Server 2016.
  • Prepare for and install Nano Server and Server Core.
  • Plan a server upgrade and migration strategy.
  • Perform a migration of server roles and workloads within a domain and across domains.
  • Choose an activation model.

Module 2: Configuring local storageThis module explains how to manage disks and volumes in Windows Server 2016.Lessons

  • Managing disks in Windows Server
  • Managing volumes in Windows Server

Lab : Configuring local storage

  • Creating and managing volumes
  • Resizing volumes
  • Managing virtual hard disks

After completing this module, students will be able to:

  • Manage disks in Windows Server.
  • Manage volumes in Windows Server.

Module 3: Implementing enterprise storage solutionsThis module discusses direct-attached storage (DAS), network-attached storage (NAS), and storage area networks (SANs). It also explains the purpose of Microsoft Internet Storage Name Service (iSNS) Server, data center bridging (DCB), and Multipath I/O (MPIO). Additionally, this module compares Fibre Channel, Internet Small Computer System Interface (iSCSI), and Fibre Channel over Ethernet (FCoE), and describes how to configure sharing in Windows Server 2016.Lessons

  • Overview of DAS, NAS, and SANs
  • Comparing Fibre Channel, iSCSI, and Fibre Channel over Ethernet
  • Understanding iSNS, DCB, and MPIO
  • Configuring sharing in Windows Server 2016

Lab : Planning and configuring storage technologies and components

  • Planning storage requirements
  • Configuring iSCSI storage
  • Configuring and managing the share infrastructure

After completing this module, students will be able to:

  • Describe DAS, NAS, and SANs.
  • Compare Fibre Channel iSCSI, and FCoE.
  • Explain the use of iSNS, DCB, and MPIO.
  • Configure sharing in Windows Server.

Module 4: Implementing Storage Spaces and Data DeduplicationThis module explains how to implement and manage Storage Spaces. This module also explains how to implement Data Deduplication.Lessons

  • Implementing Storage Spaces
  • Managing Storage Spaces
  • Implementing Data Deduplication

Lab : Implementing Storage Spaces

  • Creating a Storage Space

Lab : Implementing Data Deduplication

  • Installing Data Deduplication
  • Configuring Data Deduplication

After completing this module, students will be able to:

  • Describe and implement the Storage Spaces feature in the context of enterprise storage needs.
  • Manage and maintain Storage Spaces.
  • Describe and implement Data Deduplication.

Module 5: Installing and configuring Hyper-V and virtual machinesThis module provides an overview of Hyper-V and virtualization. It explains how to install Hyper-V, and how to configure storage and networking on Hyper-V host servers. Additionally, it explains how to configure and manage Hyper-V virtual machines.Lessons

  • Overview of Hyper-V
  • Installing Hyper-V
  • Configuring storage on Hyper-V host servers
  • Configuring networking on Hyper-V host servers
  • Configuring Hyper-V virtual machines
  • Managing virtual machines

Lab : Installing and configuring Hyper-V

  • Verify installattion of the Hyper-V server role
  • Configuring Hyper-V networks
  • Creating and configuring a virtual machines
  • Enable nested virtualization for a virtual machine

After completing this module, students will be able to:

  • Describe Hyper-V and virtualization.
  • Install Hyper-V.
  • Configure storage on Hyper-V host servers.
  • Configure networking on Hyper-V host servers.
  • Configure Hyper-V virtual machines.
  • Manage Hyper-V virtual machines.

Module 6: Deploying and managing Windows and Hyper-V containersThis module provides and overview of containers in Windows Server 2016. Additionally, this module explains how to deploy Windows Server and Hyper-V containers. It also explains how to install, configure, and manage containers by using Docker.Lessons

  • Overview of containers in Windows Server 2016
  • Deploying Windows Server and Hyper-V containers
  • Installing, configuring, and managing containers by using Docker

Lab : Installing and configuring containers

  • Installing and configuring Windows Server containers by using Windows PowerShell
  • Installing and configuring Windows Server containers by using Docker Installing

After completing this module, students will be able to:

  • Describe containers in Windows Server 2016.
  • Explain how to deploy containers.
  • Explain how to install, configure, and manage containers using Docker.

Module 7: Overview of high availability and disaster recoveryThis module provides an overview of high availability and high availability with failover clustering in Windows Server 2016. It further explains how to plan high availability and disaster recovery solutions with Hyper-V virtual machines. Additionally, this module explains how to back up and restore the Windows Server 2016 operating system and data by using Windows Server Backup.Lessons

  • Defining levels of availability
  • Planning high availability and disaster recovery solutions with Hyper-V virtual machines
  • Backing up and restoring by using Windows Server Backup
  • High availability with failover clustering in Windows Server 2016

Lab : Planning and implementing a high availability and disaster recovery solution

  • Determining the appropriate high availability and disaster recovery solution
  • Implementing storage migration
  • Configuring Hyper-V replicas

After completing this module, students will be able to:

  • Describe levels of availability.
  • Plan for high availability and disaster recovery solutions with Hyper-V virtual machines.
  • Back up and restore data by using Windows Server Backup.
  • Describe high availability with failover clustering in Window Server 2016.

Module 8: Implementing failover clusteringThis module explains how to plan for failover clustering. It also explains how to create, manage, and troubleshoot a failover cluster.Lessons

  • Planning a failover cluster
  • Creating and configuring a new failover cluster
  • Maintaining a failover cluster
  • Troubleshooting a failover cluster
  • Implementing site high availability with stretch clustering

Lab : Implementing a failover clustering

  • Creating a failover cluster
  • Verifying quorum settings and adding a node

Lab : Managing a failover cluster

  • Evicting a node and verifying quorum settings
  • Changing the quorum from Disk Witness to File Share Witness, and defining node voting
  • Verifying high availability

After completing this module, students will be able to:

  • Plan for a failover-clustering implementation.
  • Create and configure a failover cluster.
  • Maintain a failover cluster.
  • Troubleshoot a failover cluster.
  • Implement high availability and stretch clustering for a site.

Module 9: Implementing failover clustering with Windows Server 2016 Hyper-VThis module describes how Hyper-V integrates with failover clustering. It also explains how to implement Hyper-V virtual machines (VMs) in failover clusters.Lessons

  • Overview of the integration of Hyper-V Server 2016 with failover clustering
  • Implementing Hyper-V VMs on failover clusters
  • Key features for VMs in a clustered environment

Lab : Implementing failover clustering with Windows Server 2016 Hyper-V

  • Configure iSCSI storage
  • Configuring a failover cluster for Hyper-V
  • Configuring a highly available VM

After completing this module, students will be able to:

  • Describe how Hyper-V integrates with failover clustering.
  • Implement Hyper-V VMs on failover clusters.
  • Describe the key features for VMs in a clustered environment.

Module 10: Implementing Network Load BalancingThis module provides an overview of NLB clusters. It also explains how to plan and configure an NLB cluster implementation.Lessons

  • Overview of NLB
  • Configuring an NLB cluster
  • Planning an NLB implementation

Lab : Implementing NLB

  • Implementing a Network Load Balancing (NLB) cluster
  • Configuring and managing the NLB cluster
  • Validating high availability for the NLB cluster

After completing this module, students will be able to:

  • Describe NLB.
  • Configure an NLB cluster.
  • Explain how to plan an NLB implementation.

Module 11: Creating and managing deployment imagesThis module provides an overview of the Windows Server 2016 image deployment process. It also explains how to create and manage deployment images by using the Microsoft Deployment Toolkit (MDT). Additionally, it describes different workloads in the virtual machine environment.Lessons

  • Introduction to deployment images
  • Creating and managing deployment images by using MDT
  • Virtual machine environments for different workloads

Lab : Using MDT to deploy Windows Server 2016

  • Configuring MDT
  • Creating and deploying an image

After completing this module, students will be able to:

  • Describe the Windows Server 2016 image deployment process.
  • Create and manage deployment images by using MDT.
  • Describe the different workloads in the virtual machine environment.

Module 12: Managing, monitoring, and maintaining virtual machine installationsThis module provides an overview on Windows Server Update Services (WSUS) and the requirements to implement WSUS. It explains how to manage the update process with WSUS. Additionally, this module provides an overview of Windows PowerShell Desired State Configuration (DSC) and Windows Server 2016 monitoring tools. Finally, this module describes how to use Performance Monitor, and how to manage event logs.Lessons

  • WSUS overview and deployment options
  • Update management process with WSUS
  • Overview of Windows PowerShell DSC
  • Overview of Windows Server 2016 monitoring tools
  • Using Performance Monitor
  • Monitoring event logs

Lab : Implementing WSUS and deploying updates

  • Implementing WSUS
  • Configuring update settings
  • Approving and deploying an update by using WSUS

Lab : Monitoring and troubleshooting Windows Server 2016

  • Establishing a performance baseline
  • Identifying the source of a performance problem
  • Viewing and configuring centralized event logs

After completing this module, students will be able to:

  • Describe the purpose of WSUS and the requirements to implement WSUS.
  • Manage the update process with WSUS.
  • Describe the purpose and benefits of Windows PowerShell DSC.
  • Describe the monitoring tools available in Windows Server 2016.
  • Use Performance Monitor.
  • Manage event logs.

Networking with Windows Server 2016 (Exam 70-741)

Course Outline:

Module 1: Planning and implementing an IPv4 networkThis module also explains how to use fundamental networking tools and techniques to configure and troubleshoot IPv4-based networks. Lessons

  • Planning IPv4 addressing
  • Configuring an IPv4 host
  • Managing and troubleshooting IPv4 network connectivity

Lab : Planning an IPv4 network

  • Planning the IPv4 address assignments

Lab : Implementing and troubleshooting an IPv4 network

  • Verifying IPv4
  • Troubleshooting IPv4

After completing this module, students will be able to:

  • Plan IPv4 addressing.
  • Configure an IPv4 host.
  • Manage and troubleshoot IPv4 network connectivity

 

Module 2: Implementing DHCPThis module explains how to plan and implement DHCP to support the IPv4 infrastructure.Lessons

  • Overview of the DHCP server role
  • Deploying DHCP
  • Managing and troubleshooting DHCP

Lab : Implementing DHCP

  • Planning a DHCP server implementation
  • Implementing the DHCP configuration
  • Validating the DHCP implementation

After completing this module, students will be able to:

  • Explain the DHCP server role.
  • Deploy DHCP.
  • Manage and troubleshoot DHCP.

Module 3: Implementing IPv6This module explains how to implement IPv6, and how to integrate IPv6 and IPv4 networks.Lessons

  • Overview of IPv6 addressing
  • Configuring an IPv6 host
  • Implementing IPv6 and IPv4 coexistence
  • Transitioning from IPv4 to IPv6

Lab : Configuring and evaluating IPv6 transition technologies

  • Reviewing the default IPv6 configuration
  • Implementing DHCPv6
  • Configuring network integration by using ISATAP
  • Configuring native IPv6 connectivity
  • Configuring 6to4 connectivity

After completing this module, students will be able to:

  • Describe the features and benefits of IPv6.
  • Configure an IPv6 host.
  • Implement the coexistence between IPv4 and IPv6 networks.
  • Transition from an IPv4 network to an IPv6 network.

Module 4: Implementing DNSThis module explains how to install, configure, and troubleshoot DNS within the organization’s network.Lessons

  • Implementing DNS servers
  • Configuring zones in DNS
  • Configuring name resolution between DNS zones
  • Configuring DNS integration with Active Directory Domain Services (AD DS)
  • Configuring advanced DNS settings

Lab : Planning and implementing name resolution by using DNS

  • Planning DNS name resolution
  • Implementing DNS servers and zones

Lab : Integrating DNS with Active Directory

  • Integrating DNS with Active Directory

Lab : Configuring advanced DNS settings

  • Configuring DNS policies
  • Validating the DNS implementation
  • Troubleshooting DNS

After completing this module, students will be able to:

  • Implement DNS servers.
  • Configure zones in DNS.
  • Configure name resolution between DNS zones.
  • Configure DNS integration with AD DS.
  • Configure advanced DNS settings

 

Module 5: Implementing and managing IPAMThis module explains how to implement and manage the IPAM feature in Windows Server 2016. This module also explains how to use IPAM to manage services such as DHCP and DNS.Lessons

  • Overview of IPAM
  • Deploying IPAM
  • Managing IP address spaces by using IPAM

Lab : Implementing IPAM

  • Installing the IPAM Server feature
  • Provisioning the IPAM Server
  • Managing IP address spaces by using IPAM

After completing this module, students will be able to:

  • Describe the IPAM functionality and components.
  • Deploy IPAM.
  • Manage IP address spaces by using IPAM.

Module 6: Remote access in Windows Server 2016This module explains how to plan for remote access in Windows Server 2016 and how to implement Web Application Proxy.Lessons

  • Overview of remote access
  • Implementing the Web Application Proxy

Lab : Implementing Web Application Proxy

  • Implementing Web Application Proxy
  • Validating the Web Application Proxy deployment

After completing this module, students will be able to:

  • Describe remote access.
  • Implement Web Application Proxy.

Module 7: Implementing DirectAccessThis module explains how to implement and manage DirectAccess in Windows Server 2016.Lessons

  • Overview of DirectAccess
  • Implementing DirectAccess by using the Getting Started Wizard
  • Implementing and managing an advanced DirectAccess infrastructure

Lab : Implementing DirectAccess by using the Getting Started Wizard

  • Verifying readiness for a DirectAccess deployment
  • Configuring DirectAccess
  • Validating the DirectAccess deployment

Lab : Deploying an advanced DirectAccess solution

  • Preparing the environment for DirectAccess
  • Implementing the advanced DirectAccess infrastructure
  • Validating the DirectAccess deployment

After completing this module, students will be able to:

  • Explain DirectAccess and how it works.
  • Implement DirectAccess by using the Getting Started Wizard.
  • Implement and manage an advanced DirectAccess infrastructure.

Module 8: Implementing VPNsThis module explains how to implement and manage remote access in Windows Server 2016 by using VPNs.Lessons

  • Planning VPNs
  • Implementing VPNs

Lab : Implementing VPN

  • Implementing VPN
  • Validating the VPN deployment
  • Troubleshooting VPN access

After completing this module, students will be able to:

  • Plan a VPN solution.
  • Implement VPNs.

Module 9: Implementing networking for branch officesThis module explains how to implement network services for branch offices.Lessons

  • Networking features and considerations for branch offices
  • Implementing Distributed File System (DFS) for branch offices
  • Implementing BranchCache for branch offices

Lab : Implementing DFS for branch offices

  • Implementing DFS
  • Validating the deployment

Lab : Implementing BranchCache

  • Implementing BranchCache
  • Validating the deployment

After completing this module, students will be able to:

  • Describe the networking features and considerations for branch offices.
  • Implement DFS for branch offices.
  • Implement BranchCache for branch offices.

Module 10: Configuring advanced networking featuresThis module explains how to implement an advanced networking infrastructure.Lessons

  • Overview of high performance networking features
  • Configuring advanced Microsoft Hyper-V networking features

Lab : Configuring advanced Hyper-V networking features

  • Creating and using Hyper-V virtual switches
  • Configuring and using the advanced features of a virtual switch

After completing this module, students will be able to:

  • Describe the high performance networking enhancements in Windows Server 2016.
  • Configure the advanced Microsoft Hyper-V networking features.

Module 11: Implementing Software Defined NetworkingThis module explains how to implement SDN.Lessons

  • Overview of SDN.
  • Implementing network virtualization
  • Implementing Network Controller

Lab : Deploying Network Controller

  • Preparing to deploy Network Controller
  • Deploying Network Controller

After completing this module, students will be able to:

  • Describe SDN.
  • Implement network virtualization.
  • Implement Network Controller

 

Identity with Windows Server 2016 (Exam 70-742)

Course Outline:

Module 1: Installing and configuring domain controllersThis module describes the features of AD DS and how to install domain controllers (DCs). It also covers the considerations for deploying DCs. Lessons

  • Overview of AD DS
  • Overview of AD DS domain controllers
  • Deploying a domain controller

Lab : Deploying and administering AD DS

  • Deploying AD DS
  • Deploying domain controllers by performing domain controller cloning
  • Administering AD DS

After completing this module, students will be able to:

  • Describe AD DS and its main components.
  • Describe the purpose and roles of domain controllers.
  • Describe the considerations for deploying domain controllers.

Module 2: Managing objects in AD DSThis module describes how to use various techniques to manage objects in AD DS. This includes creating and configuring user, group, and computer objects.Lessons

  • Managing user accounts
  • Managing groups in AD DS
  • Managing computer objects in AD DS
  • Using Windows PowerShell for AD DS administration
  • Implementing and managing OUs

Lab : Managing AD DS objects

  • Creating and managing groups in AD DS
  • Creating and configuring user accounts in AD DS
  • Managing computer objects in AD DS

Lab : Administering AD DS

  • Delegate administration for OUs
  • Creating and modifying AD DS objects with Windows PowerShell

After completing this module, students will be able to:

  • Manage user accounts in AD DS.
  • Manage groups in AD DS.
  • Manage computer objects in AD DS.
  • Use Windows PowerShell for AD DS administration.
  • Implement and manage OUs.
  • Administer AD DS.

Module 3: Advanced AD DS infrastructure managementThis module describes how to plan and implement an AD DS deployment that includes multiple domains and forests. The module provides an overview of the components in an advanced AD DS deployment, the process of implementing a distributed AD DS environment, and the procedure for configuring AD DS trusts.Lessons

  • Overview of advanced AD DS deployments
  • Deploying a distributed AD DS environment
  • Configuring AD DS trusts

Lab : Domain and trust management in AD DS

  • Implementing forest trusts
  • Implementing child domains in AD DS

After completing this module, students will be able to:

  • Describe the components of an advanced AD DS deployment.
  • Deploy a distributed AD DS environment..
  • Configure AD DS trusts.

.Module 4: Implementing and administering AD DS sites and replicationThis module describes how to plan and implement an AD DS deployment that includes multiple locations. The module explains how replication works in a Windows Server 2016 AD DS environment.Lessons

  • Overview of AD DS replication
  • Configuring AD DS sites
  • Configuring and monitoring AD DS replication

Lab : Implementing AD DS sites and replication

  • Modifying the default site
  • Creating additional sites and subnets
  • Configuring AD DS replication
  • Monitoring and troubleshooting AD DS replication

After completing this module, students will be able to:

  • Describe how AD DS replication works.
  • Configure AD DS sites to help optimize authentication and replication traffic.
  • Configure and monitor AD DS replication.

Module 5: Implementing Group PolicyThis module describes how to implement a GPO infrastructure. The module provides an overview of the components and technologies that compose the Group Policy framework.Lessons

  • Introducing Group Policy
  • Implementing and administering GPOs
  • Group Policy scope and Group Policy processing
  • Troubleshooting the application of GPOs

Lab : Implementing a Group Policy infrastructure

  • Creating and configuring GPOs
  • Managing GPO scope

Lab : Troubleshooting Group Policy infrastructure

  • Verify GPO application
  • Troubleshooting GPOs

After completing this module, students will be able to:

  • Explain what Group Policy is.
  • Implement and administer GPOs.
  • Describe Group Policy scope and Group Policy processing.
  • Troubleshoot GPO application.

Module 6: Managing user settings with Group PolicyThis module describes how to configure Group Policy settings and Group Policy preferences. This includes implementing administrative templates, configuring folder redirection and scripts, and configuring Group Policy preferences.Lessons

  • Implementing administrative templates
  • Configuring Folder Redirection, software installation, and scripts
  • Configuring Group Policy preferences

Lab : Managing user settings with GPOs

  • Using administrative templates to manage user settings
  • Implement settings by using Group Policy preferences
  • Configuring Folder Redirection
  • Planning Group Policy (optional)

After completing this module, students will be able to:

  • Implement administrative templates.
  • Configure Folder Redirection, software installation, and scripts.
  • Configure Group Policy preferences.

Module 7: Securing Active Directory Domain ServicesThis module describes how to configure domain controller security, account security, password security, and Group Managed Service Accounts (gMSA).Lessons

  • Securing domain controllers
  • Implementing account security
  • Implementing audit authentication
  • Configuring managed service accounts

Lab : Securing AD DS

  • Implementing security policies for accounts, passwords, and administrative groups
  • Deploying and configuring an RODC
  • Creating and associating a group MSA

After completing this module, students will be able to:

  • Secure domain controllers.
  • Implement account security.
  • Implement audit authentication.
  • Configure managed service accounts (MSAs).

Module 8: Deploying and managing AD CSThis module describes how to implement an AD CS deployment. This includes deploying, administering, and troubleshooting CAs.Lessons

  • Deploying CAs
  • Administering CAs
  • Troubleshooting and maintaining CAs

Lab : Deploying and configuring a two-tier CA hierarchy

  • Deploying an offline root CA
  • Deploying an enterprise subordinate CA

After completing this module, students will be able to:

  • Deploy CAs.
  • Administer CAs.
  • Troubleshoot and maintain CAs.

Module 9: Deploying and managing certificatesThis module describes how to deploy and manage certificates in an AD DS environment. This involves deploying and managing certificate templates, managing certificate revocation and recovery, using certificates in a business environment, and implementing smart cards.Lessons

  • Deploying and managing certificate templates
  • Managing certificate deployment, revocation, and recovery
  • Using certificates in a business environment
  • Implementing and managing smart cards

Lab : Deploying and using certificates

  • Configuring certificate templates
  • Enrolling and using certificates
  • Configuring and implementing key recovery

After completing this module, students will be able to:

  • Deploy and manage certificate templates.
  • Manage certificates deployment, revocation, and recovery.
  • Use certificates in a business environment.
  • Implement and manage smart cards

Module 10: Implementing and administering AD FSThis module describes AD FS and how to configure AD FS in a single-organization scenario and in a partner-organization scenario.Lessons

  • Overview of AD FS
  • AD FS requirements and planning
  • Deploying and configuring AD FS
  • Overview of Web Application Proxy

Lab : Implementing AD FS

  • Configuring AD FS prerequisites
  • Installing and configuring AD FS
  • Configuring an internal application for AD
  • Configuring AD FS for federated business partners

After completing this module, students will be able to:

  • Describe AD FS.
  • Explain how to deploy AD FS.
  • Explain how to implement AD FS for a single organization.
  • Explain how to extend AD FS to external clients.
  • Implement single sign-on (SSO) to support online services.

Module 11: Implementing and administering AD RMSThis module describes how to implement an AD RMS deployment. The module provides an overview of AD RMS, explains how to deploy and manage an AD RMS infrastructure, and explains how to configure AD RMS content protection.Lessons

  • Overview of AD RMS
  • Deploying and managing an AD RMS infrastructure
  • Configuring AD RMS content protection

Lab : Implementing an AD RMS infrastructure

  • Installing and configuring AD RMS
  • Configuring AD RMS templates
  • Using AD RMS on clients

After completing this module, students will be able to:

  • Describe AD RMS.
  • Deploy and manage an AD RMS infrastructure. .
  • Configure AD RMS content protection.

Module 12: Implementing AD DS synchronization with Microsoft Azure ADThis module describes how to plan and configure directory syncing between Microsoft Azure Active Directory (Azure AD) and on-premises AD DS. The modules describes various sync scenarios, such as Azure AD sync, AD FS and Azure AD, and Azure AD Connect.Lessons

  • Planning and preparing for directory synchronization
  • Implementing directory synchronization by using Azure AD Connect
  • Managing identities with directory synchronization

Lab : Configuring directory synchronization

  • Preparing for directory synchronization
  • Configuring directory synchronization
  • Managing Active Directory users and groups

After completing this module, students will be able to:

  • Plan and prepare for directory synchronization.
  • Implement directory synchronization by using Microsoft Azure Active Directory Connect (Azure AD Connect).
  • Manage identities with directory synchronization.

Module 13: Monitoring, managing, and recovering AD DSThis module describes how to monitor, manage, and maintain AD DS to help achieve high availability of AD DS.Lessons

  • Monitoring AD DS
  • Managing the Active Directory database
  • Active Directory backup and recovery options for AD DS and other identity and access solutions

Lab : Recovering objects in AD DS

  • Backing up and restoring AD DS
  • Recovering objects in AD DS

After completing this module, students will be able to:

  • Monitor AD DS.
  • Manage the Active Directory database.
  • Describe the backup and recovery options for AD DS and other identity access solutions.

MCSA: Office 365

MCSA:Enabling and Managing Office 365

Prepares you for exam 70-346 and exam 70-347

 

Managing Office 365 Identities and Requirements. (Exam 70-346)

Course Outline:

Provision Office 365:

·       Provision tenants

·       Add and configure custom domains

·       Plan a pilot

Plan and Implement Networking and Security in Office:

·       Configure DNS records for services

·       Enable client connectivity to Office 365

·       Administer Microsoft Azure Rights Management (RM)

·       Manage administrator roles in Office 365

Manage Cloud Identities:

·       Configure password management

·       Manage user and security groups

·       Manage cloud identities with Windows PowerShell

Implement and Manage Identities by Using Azure AD Connect:

·       Prepare on-premises Active Directory for Azure AD Connect

·       Set up Azure AD Connect tool

·       Manage Active Directory users and groups with Azure AD Connect in place

Implement and Manage Federated Identities for Single Sign-On:

·       Plan requirements for Active Directory Federation Services (AD FS)

·       Install and manage AD FS servers

·       Install and manage WAP servers

Monitor and Troubleshoot Office 365 availability and Usage:

·       Analyze reports

·       Monitor service health

·       Isolate service interruption

Enabling Office 365 Services. (Exam 70-347)

Course Outline:

Manage clients and end-user devices

  • Manage user-driven client deployments
  • Manage IT deployments of Office 365 ProPlus
  • Set up telemetry and reporting
  • Plan for Office clients


Provision SharePoint Online site collections

  • Configure external user sharing
  • Create SharePoint site collection
  • Plan a collaboration solution


Configure Exchange Online and Skype for Business Online for end users

  • Configure additional email addresses for users
  • Create and manage external contacts, resources, and groups
  • Configure personal archive policies
  • Configure Skype for Business Online end-user communication settings


Plan for Exchange Online and Skype for Business Online

  • Manage anti-malware and anti-spam policies
  • Recommend a mailbox migration strategy
  • Plan for Exchange Online
  • Manage Skype for Business global external communications settings

 


MCSE: Exchange Server 2016

MCSE : Designing and Deploying Microsoft Exchange Server 2016

Prepares you for exam 70-345

Course Outline:

Plan,Deploy,Manage and Troubleshoot Mailbox Databases:

·       Plan, deploy, and manage mailbox databases

·       Plan, deploy, and manage high availability solutions for mailbox databases

·       Plan, deploy, and manage a site-resilient Database Availability Group (DAG)

·       Monitor and troubleshoot mailbox databases

·       Plan, deploy, and manage backup and recovery solutions for mailbox databases

Plan,Deply,Manage and Troubleshoot Client Access Services:

·       Plan, deploy, and manage Client Access services

·       Plan, deploy and manage mobility solutions

·       Plan, deploy, and manage load balancing

·       Monitor and troubleshoot client connectivity

·       Plan, deploy, and manage a site-resilient client access services solution

Plan,Deply,Manage and Troubleshoot Transport Services:

·       Plan, deploy, and manage transport services

·       Troubleshoot and monitor transport services

·       Plan, deploy, and manage message hygiene

·       Plan, deploy and manage site resilience transport services

Plan,Deploy and Manage Exchange Infrastructure, Recipients and Security:

·       Plan and configure Active Directory (AD) Domain Services for Exchange and Organizational settings

·       Create and configure mail-enabled objects

·       Manage mail-enabled object permissions

·       Plan, deploy, manage, and troubleshoot Role Based Access Control (RBAC)

·       Plan an appropriate security strategy

·       Plan, deploy, manage, and troubleshoot IRM with Active Directory Rights Management Services (AD RMS) or Azure RMS

Plan,Deploy and Manage Compliance Archiving, eDiscovery and Auditing:

·       Plan and configure Data Loss Prevention (DLP) solutions

·       Plan, configure, and manage Archiving and Message Records Management (MRM)

·       Plan, configure, and perform eDiscovery

·       Plan, configure, and manage a compliance solution

·       Plan, manage, and use mailbox and administrative auditing

Implement and Manage Coexistence, Hybrid Scenarios, Migration and Federation:

·       Plan, deploy, and troubleshoot coexistence with Office 365 (Exchange Online)

·       Plan, deploy, manage, and troubleshoot Exchange federation

·       Plan, deploy, and troubleshoot on-premises coexistence with earlier supported versions of Exchange

·       Migrate from earlier supported versions of Exchange


AAA: Azure Administrator Associate

 

AAA : Azure Administrator Associate

Prepares you for exam AZ-100, AZ-101 & AZ-102

 

AZ-100 : Microsoft Azure Infrastructure and Deployment

01.Manage Azure subscriptions and resources

  • Manage Azure subscriptions
  • Analyze resource utilization and consumption
  • Manage resource groups

02.Implement and manage storage

  • Create and configure storage accounts
  • Import and export data to Azure
  • Configure Azure files
  • Implement Azure backup

03.Deploy and manage virtual machines (VMs)

  • Create and configure a VM for Windows and Linux
  • Automate deployment of VMs
  • Manage Azure VM
  • Manage VM backups

04.Configure and manage virtual networks

  • Create connectivity between virtual networks
  • Implement and manage virtual networking
  • Configure name resolution
  • Create and configure a Network Security Group (NSG)

05.Manage identities

  • Manage Azure Active Directory (AD)
  • Manage Azure AD objects (users, groups, and devices)
  • Implement and manage hybrid identities

 

AZ-101 : Microsoft Azure Integration and Security

01.Evaluate and perform server migration to Azure

  • Evaluate migration scenarios by using Azure Migrate
  • Migrate servers to Azure

02.Implement and manage application services

  • Configure serverless computing
  • Manage App Service plans
  • Manage App services

03.Implement advanced virtual networking

  • Implement application load balancing
  • Implement Azure load balancer
  • Monitor and manage networking
  • Integrate on premises network with Azure virtual network

04.Secure identities

  • Implement Multi-Factor Authentication (MFA)
  • Manage role-based access control (RBAC)
  • Implement Azure Active Director (AD) Privileged Identity Management (PIM)

 


MikroTik Training & Certification

MTCNA - MikroTik Certified Network Associate
MikroTik Certified Network Associate (MTCNA)
 
Duration:                               
  3 days
 
Outcomes:            
 By the end of this training session, the student will be familiar with RouterOS software and RouterBOARD products and be able to connect the client to the Internet. He will also be able to configure, manage, do basic troubleshooting of a MikroTik router and provide basic services to clients.
 
Target audience:             
  Network engineers and technicians wanting to deploy and support:
            •  Corporate networks
            •  Client CPEs (WISPs and ISPs)
Course prerequisites:   
 The student must have a good understanding of TCP/IP and subnetting.
              Suggested reading: Search for “ipv4 tutorial”
              Test yourself with the 'example test' on
              https://www.mikrotik.com/client/trainingSessions
 
Module 1: Introduction
• About MikroTik
         -What is RouterOS
         -What is RouterBOARD
• First time accessing the router
         -WinBox and MAC-WinBox
         -WebFig and Quick Set
         -Default configuration
• RouterOS command line interface (CLI)
         - Null Modem cable
         -SSH and Telnet
         -New terminal in WinBox/WebFig
• RouterOS CLI principles
         -, double , “?”, navigation
         -Command history and its benefits
• Initial configuration (Internet access)
          -WAN DHCP-client
          -LAN IP address and default gateway
          - Basic Firewall - NAT masquerade
• Upgrading RouterOS
          - Package types
          - Ways of upgrading
          -RouterBOOT firmware upgrade
• Router identity
• Manage RouterOS logins
• Manage RouterOS services
• Managing configuration backups
          - Saving and restoring the backup
          -Difference between a backup and an export (.rsc) file
          - Editing an export file
• Resetting a RouterOS device
• Reinstalling a RouterOS device (Netinstall)
• RouterOS license levels
• Sources of additional information
         - wiki.mikrotik.com
         - forum.mikrotik.com
         - mum.mikrotik.com
         - Distributor and consultant support
         - support@mikrotik.com
• Module 1 laboratory
 
Module 2 : DHCP
• DHCP server and client
          -DHCP client
          -DHCP server setup
          -Leases management
          -DHCP server network configuration
• Address Resolution Protocol (ARP)
          -ARP modes
          -RouterOS ARP table
• Module 2 laboratory
 
Module 3: Bridging
• Bridging overview
         -Bridge concepts and settings
         -Creating bridges
         -Adding ports to bridges
• Bridge wireless networks
         -Station bridge
• Module 3 laboratory
 
Module 4: Routing
• Routing overview
         -Routing concepts
         -Route flags
• Static routing
         -Creating routes
         -Setting default route
         -Managing dynamic routes
         -Implementing static routing in a simple network
• Module 4 laboratory
 
Module 5: Wireless
• 802.11a/b/g/n/ac Concepts
         -Frequencies (bands, channels) data-rates / chains (tx power, rx sensitivity, country regulations)
• Setup a simple wireless link
         -Access Point configuration
         -Station configuration
• Wireless Security and Encryption
         -Access List
         -Connect List
         -Default Authenticate
         -Default Forward
         -WPA-PSK, WPA2-PSK
         -WPS accept, WPS client
• Monitoring Tools
         -Snooper
         -Registration table
• Module 5 laboratory
 
Module 6 : Firewall
• Firewall principles
         -Connection tracking and states
         -Structure, chains and actions
• Firewall Filter in action
         -Filter actions
         -Protecting your router (input)
         -Protection your customers (forward)
• Basic Address-List
• Source NAT
          -Masquerade and src-nat action
• Destination NAT
           -dst-nat and redirect actions
• FastTrack
• Module 6 laboratory
 
Module 7: QoS
• Simple Queue
          -Target
          -Destinations
          -Max-limit and limit-at
          -Bursting
• One Simple queue for the whole network (PCQ)
          -pcq-rate configuration
          -pcq-limit configuration
• Module 7 laboratory
 
Module 8: Tunnels
• PPP settings
          -PPP profile
         -PPP secret
         -PPP status
• IP pool
        -Creating pool
        -Managing ranges
        -Assigning to a service
• Secure local network
        -PPPoE service-name
        -PPPoE client
        -PPPoE server
• Point-to-point addresses
• Secure remote networks communication
        -PPTP client and PPTP server (Quick Set)
       -SSTP client
• Module 8 laboratory
 
Module 9 : Misc
• RouterOS tools
        -E-mail
        -Netwatch
        -Ping
        -Traceroute
        -Profiler (CPU load)
• Monitoring
        -Interface traffic monitor
        -Torch
        -Graphs
        -SNMP
        -The Dude
• Contacting support@mikrotik.com
        - supout.rif, autosupout.rif and viewer
        -System logs, enabling debug logs
        -Readable configuration (item comments and names)
        -Network diagrams
• Module 9 laboratory
 

MTCRE- MikroTik Certified Routing Engineer
MikroTik Certified Routing Engineer (MTCRE)
 
Duration:                                  2 days
Outcomes:                            By the end of this training session, the student will be able to plan, implement and debug routed
                                                     MikroTik RouterOS network configurations.
Target audience:                 Network engineers and technicians wanting to deploy and support static and/or dynamic routed
                                                     networks.
Course prerequisites:     MTCNA certificate
 
 
Module 1: Static Routing
• More specific routes
• ECMP
• How to force gateway over specific interface
• Gateway reachability check and route distance
• Routing mark and route policy
• Recursive next-hop and scope/target-scope usage
• Module 1 laboratory
 
Module 2: Point to Point Address Configuration
• Point to Point address configuration
• Module 2 laboratory
 

Module 3: VPN

• What is VPN?
• Different types of VPN
• Site to site connectivity with tunnels
     -IPIP, EoIP, PPTP, SSTP, L2TP, PPPoE
• VLAN and it's usage
• QinQ implementation
• VLAN and managed switch
• VLAN and switch chip configuration on RouterBOARDs
• Module 3 laboratory
 
Module 4: OSPF
• What is OSPF?
• How OSPF protocol works
        -Hello protocol
        -Database distribution and LSA types explained
• OSPF network structure Areas
        -Router types
• OSPF neighbors and neighbor states (DR and BDR election)
• External Route Distribution methods (type1, type2)
• Interface cost and interface types (broadcast, NBMA, etc.)
• SPT calculation algorithm
• OSPF and multicast (problems with NBMA)
• Stub, NSSA and area ranges (route aggregation)
• Virtual links, usage and limitations
• OSPF routing filters and limitations
• Module 4 laboratory

CISA /CISM / AWS Training & Certification

CISA: Certified Information System Auditor

CISA - Certified Information Systems Auditor

 

Course Outline:

The job practice domains and task and knowledge statements are as follows:

Domain 1—The Process of Auditing Information Systems (21%)
Domain 2—Governance and Management of IT (16%)
Domain 3—Information Systems Acquisition, Development and Implementation (18%)
Domain 4—Information Systems Operations, Maintenance and Service Management (20%)
Domain 5—Protection of Information Assets (25%)

Domain 1 : The Process of Auditing Information Systems

Provide audit services in accordance with IS audit standards to assist the organization in protecting and controlling information systems. (21%)

Task Statements:

1.1 Execute a risk-based IS audit strategy in compliance with IS audit standards to ensure that key risk areas are audited.

1.2 Plan specific audits to determine whether information systems are protected, controlled and provide value to the organization.

1.3 Conduct audits in accordance with IS audit standards to achieve planned audit objectives.

1.4 Communicate audit results and make recommendations to key stakeholders through meetings and audit reports to promote change when necessary.

1.5 Conduct audit follow-ups to determine whether appropriate actions have been taken management in a timely manner.

Knowledge Statements:

1.1 Knowledge of ISACA IT Audit and Assurance Standards, Guidelines and Tools and Techniques, Code of Professional Ethics and other applicable standards.

1.2 Knowledge of the risk assessment concepts and tools and techniques used in planning, examination, reporting and follow-up

1.3 Knowledge of fundamental business processes (e.g., purchasing, payroll, accounts payable, accounts receivable) and the role of IS in these processes.

1.4 Knowledge of the control principles related to controls in information systems.

1.5 Knowledge of risk-based audit planning and audit project management techniques including follow-up.

1.6 Knowledge of the applicable laws and regulations that affect the scope, evidence collection and preservation, and frequency of audits.

1.7 Knowledge of the evidence collection techniques (e.g., observation, inquiry, inspection, interview, data analysis, forensic investigation techniques, computer-assisted audit techniques [CAATs]) used to gather, protect and preserve audit evidence.

1.8 Knowledge of different sampling methodologies and other substantive/data analytical procedures.

1.9 Knowledge of reporting and communication techniques (e.g., facilitation, negotiation, conflict resolution, audit report structure, issue writing, management summary, result verification)

1.10 Knowledge of audit quality assurance (QA) systems and frameworks

1.11 Knowledge of various types of audits (e.g., internal, external, financial) and methods for assessing and placing reliance on the work of other auditors or control entities.

 

Domain 2: Governance and Management of IT

Provide assurance that the necessary leadership and organizational structures and processes are in place to achieve objectives and to support the organization's strategy. (16%)

Task Statements:

2.1 Evaluate the IT strategy, including IT direction, and the processes for the strategy’s development, approval, implementation and  maintenance for alignment with the organization’s strategies and objectives.

2.2 Evaluate the effectiveness of the IT governance structure to determine whether IT decisions, directions and performance support the organization’s strategies and objectives.

2.3 Evaluate IT organizational structure and human resources (personnel) management to determine whether they support the organization’s strategies and objectives.

2.4 Evaluate the organization’s IT policies, standards and procedures, and the processes for their development, approval, release/publishing, implementation and maintenance to determine whether they support the IT strategy and comply with regulatory and legal requirements.

2.5 Evaluate IT resource management, including investment, prioritization, allocation and use, for alignment with the organization’s strategies and objectives.

2.6 Evaluate IT portfolio management, including investment, prioritization and allocation, for alignment with the organization’s strategies and objectives.

2.7 Evaluate risk management practices to determine whether the organization’s IT-related risk is identified, assessed, monitored, reported and managed.

2.8 Evaluate IT management and monitoring of controls (e.g., continuous monitoring, quality assurance [QA]) for compliance with the organization’s policies, standards and procedures.

2.9 Evaluate monitoring and reporting of IT key performance indicators (KPIs) to determine whether management receives sufficient and timely information.

2.10 Evaluate the organization’s business continuity plan (BCP), including alignment of the IT disaster recovery plan (DRP) with the BCP, to determine the organization’s ability to continue essential business operations during the period of an IT disruption.

Knowledge Statements:

2.1 Knowledge of the purpose of IT strategy, policies, standards and procedures for an organization and the essential elements of each

2.2 Knowledge of IT governance, management, security and control frameworks, and related standards, guidelines and practices

2.3 Knowledge of the organizational structure, roles and responsibilities related to IT, including segregation of duties (SoD)

2.4 Knowledge of the relevant laws, regulations and industry standards affecting the organization

2.5 Knowledge of the organization’s technology direction and IT architecture and their implications for setting long-term strategic directions

2.6 Knowledge of the processes for the development, implementation and maintenance of IT strategy, policies, standards and procedures

2.7 Knowledge of the use of capability and maturity models

2.8 Knowledge of process optimization techniques

2.9 Knowledge of IT resource investment and allocation practices, including prioritization criteria (e.g., portfolio management, value management, personnel management)

2.10 Knowledge of IT supplier selection, contract management, relationship management and performance monitoring processes, including third-party outsourcing relationships

2.11 Knowledge of enterprise risk management (ERM)

2.12 Knowledge of the practices for monitoring and reporting of controls performance (e.g., continuous monitoring, quality assurance [QA])

2.13 Knowledge of quality management and quality assurance (QA) systems

2.14 Knowledge of the practices for monitoring and reporting of IT performance (e.g., balanced scorecard [BSC], key performance indicators [KPIs])

2.15 Knowledge of business impact analysis (BIA)

2.16 Knowledge of the standards and procedures for the development, maintenance and testing of the business continuity plan (BCP)

2.17 Knowledge of the procedures used to invoke and execute the business continuity plan (BCP) and return to normal operations

 

Domain 3: Information Systems Acquisition, Development and Implementation

Provide assurance that the practices for the acquisition, development, testing and implementation of information systems meet the organization’s strategies and objectives. (18%)

Task Statements:

3.1 Evaluate the business case for the proposed investments in information systems acquisition, development, maintenance and subsequent retirement to determine whether the business case meets business objectives

3.2 Evaluate IT supplier selection and contract management processes to ensure that the organization’s service levels and requisite controls are met.

3.3 Evaluate the project management framework and controls to determine whether business requirements are achieved in a cost-effective manner while managing risk to the organization.

3.4 Conduct reviews to determine whether a project is progressing in accordance with project plans, is adequately supported by documentation, and has timely and accurate status reporting.

3.5 Evaluate controls for information systems during the requirements, acquisition, development and testing phases for compliance with the organization's policies, standards, procedures and applicable external requirements.

3.6 Evaluate the readiness of information systems for implementation and migration into production to determine whether project deliverables, controls and the organization's requirements are met.

3.7 Conduct post-implementation reviews of systems to determine whether project deliverables, controls and the organization's requirements are met.

 

Knowledge Statements:

3.1 Knowledge of benefits realization practices, (e.g., feasibility studies, business cases, total cost of ownership [TCO], return on investment [ROI])

3.2 Knowledge of IT acquisition and vendor management practices (e.g., evaluation and selection process, contract management, vendor risk and relationship management, escrow, software licensing), including third-party outsourcing relationships, IT suppliers and service providers.

3.3 Knowledge of project governance mechanisms (e.g., steering committee, project oversight board, project management office)

3.4 Knowledge of project management control frameworks, practices and tools

3.5 Knowledge of the risk management practices applied to projects

3.6 Knowledge of requirements analysis and management practices (e.g., requirements verification, traceability, gap analysis, vulnerability management, security requirements)

3.7 Knowledge of the enterprise architecture (EA) related to data, applications and technology (e.g., web-based applications, web services, n-tier applications, cloud services, virtualization)

3.8 Knowledge of system development methodologies and tools, including their strengths and weaknesses (e.g., agile development practices, prototyping, rapid application development [RAD], object-oriented design techniques, secure coding practices, system version control)

3.9 Knowledge of the control objectives and techniques that ensure the completeness, accuracy, validity and authorization of transactions and data

3.10 Knowledge of the testing methodologies and practices related to the information system development life cycle (SDLC)

3.11 Knowledge of the configuration and release management relating to the development of information systems

3.12 Knowledge of system migration and infrastructure deployment practices and data conversion tools, techniques and procedures.

3.13 Knowledge of project success criteria and project risk

3.14 Knowledge of post-implementation review objectives and practices (e.g., project closure, control implementation, benefits realization, performance measurement)

 

Domain 4: Information Systems Operations, Maintenance and Service Management

Provide assurance that the processes for information systems operations, maintenance and service management meet the organization’s strategies and objectives. (20%)

Task Statements:

4.1 Evaluate the IT service management framework and practices (internal or third party) to determine whether the controls and service levels expected by the organization are being adhered to and whether strategic objectives are met.

4.2 Conduct periodic reviews of information systems to determine whether they continue to meet the organization’s objectives within the enterprise architecture (EA).

4.3 Evaluate IT operations (e.g., job scheduling, configuration management, capacity and performance management) to determine whether they are controlled effectively and continue to support the organization’s objectives.

4.4 Evaluate IT maintenance (patches, upgrades) to determine whether they are controlled effectively and continue to support the organization’s objectives.

4.5 Evaluate database management practices to determine the integrity and optimization of databases.

4.6 Evaluate data quality and life cycle management to determine whether they continue to meet strategic objectives.

4.7 Evaluate problem and incident management practices to determine whether problems and incidents are prevented, detected, analyzed, reported and resolved in a timely manner to support the organization´s objectives.

4.8 Evaluate change and release management practices to determine whether changes made to systems and applications are adequately controlled and documented.

4.9 Evaluate end-user computing to determine whether the processes are effectively controlled and support the organization’s objectives.

4.10 Evaluate IT continuity and resilience (backups/restores, disaster recovery plan [DRP]) to determine whether they are controlled effectively and continue to support the organization’s objectives.

Knowledge Statements:

4.1 Knowledge of service management frameworks

4.2 Knowledge of service management practices and service level management

4.3 Knowledge of the techniques for monitoring third-party performance and compliance with service agreements and regulatory requirements

4.4 Knowledge of enterprise architecture (EA)

4.5 Knowledge of the functionality of fundamental technology (e.g., hardware and network components, system software, middleware, database management systems)

4.6 Knowledge of system resiliency tools and techniques (e.g., fault-tolerant hardware, elimination of single point of failure, clustering)

4.7 Knowledge of IT asset management, software licensing, source code management and inventory practices 

4.8 Knowledge of job scheduling practices, including exception handling

4.9 Knowledge of the control techniques that ensure the integrity of system interfaces

4.10 Knowledge of capacity planning and related monitoring tools and techniques

4.11 Knowledge of systems performance monitoring processes, tools and techniques (e.g., network analyzers, system utilization reports, load balancing)

4.12 Knowledge of data backup, storage, maintenance and restoration practices

4.13 Knowledge of database management and optimization practices

4.14 Knowledge of data quality (completeness, accuracy, integrity) and life cycle management (aging, retention)

4.15 Knowledge of problem and incident management practices

4.16 Knowledge of change management, configuration management, release management and patch management practices

4.17 Knowledge of the operational risk and controls related to end-user computing

4.18 Knowledge of the regulatory, legal, contractual and insurance issues related to disaster recovery

4.19 Knowledge of business impact analysis (BIA) related to disaster recovery planning

4.20 Knowledge of the development and maintenance of disaster recovery plans (DRPs)

4.21 Knowledge of the benefits and drawbacks of alternate processing sites (e.g., hot sites, warm sites, cold sites)

4.22 Knowledge of disaster recovery testing methods

4.23 Knowledge of the processes used to invoke the disaster recovery plans (DRPs)

 

Domain 5: Protection of Information Assets

Provide assurance that the organization’s policies, standards, procedures and controls ensure the confidentiality, integrity and availability of information assets. (25%)

Task Statements:

5.1 Evaluate the information security and privacy policies, standards and procedures for completeness, alignment with generally accepted practices and compliance with applicable external requirements.

5.2 Evaluate the design, implementation, maintenance, monitoring and reporting of physical and environmental controls to determine whether information assets are adequately safeguarded.

5.3 Evaluate the design, implementation, maintenance, monitoring and reporting of system and logical security controls to verify the confidentiality, integrity and availability of information.

5.4 Evaluate the design, implementation and monitoring of the data classification processes and procedures for alignment with the organization’s policies, standards, procedures and applicable external requirements.

5.5 Evaluate the processes and procedures used to store, retrieve, transport and dispose of assets to determine whether information assets are adequately safeguarded.

5.6 Evaluate the information security program to determine its effectiveness and alignment with the organization’s strategies and objectives.

Knowledge Statements:

5.1 Knowledge of the generally accepted practices and applicable external requirements (e.g., laws, regulations) related to the protection of information assets

5.2 Knowledge of privacy principles

5.3 Knowledge of the techniques for the design, implementation, maintenance, monitoring and reporting of security controls

5.4 Knowledge of the physical and environmental controls and supporting practices related to the protection of information assets

5.5 Knowledge of the physical access controls for the identification, authentication and restriction of users to authorized facilities and hardware

5.6 Knowledge of the logical access controls for the identification, authentication and restriction of users to authorized functions and data

5.7 Knowledge of the security controls related to hardware, system software (e.g., applications, operating systems) and database management systems.

5.8 Knowledge of the risk and controls associated with virtualization of systems

5.9 Knowledge of the risk and controls associated with the use of mobile and wireless devices, including personally owned devices (bring your own device [BYOD])

5.10 Knowledge of voice communications security (e.g., PBX, Voice-over Internet Protocol [VoIP])

5.11 Knowledge of network and Internet security devices, protocols and techniques

5.12 Knowledge of the configuration, implementation, operation and maintenance of network security controls

5.13 Knowledge of encryption-related techniques and their uses

5.14 Knowledge of public key infrastructure (PKI) components and digital signature techniques

5.15 Knowledge of the risk and controls associated with peer-to-peer computing, instant messaging, and web-based technologies (e.g., social networking, message boards, blogs, cloud computing)

5.16 Knowledge of the data classification standards related to the protection of information assets

5.17 Knowledge of the processes and procedures used to store, retrieve, transport and dispose of confidential information assets

5.18 Knowledge of the risk and controls associated with data leakage

5.19 Knowledge of the security risk and controls related to end-user computing

5.20 Knowledge of methods for implementing a security awareness program

5.21 Knowledge of information system attack methods and techniques

5.22 Knowledge of prevention and detection tools and control techniques

5.23 Knowledge of security testing techniques (e.g., penetration testing, vulnerability scanning)

5.24 Knowledge of the processes related to monitoring and responding to security incidents (e.g., escalation procedures, emergency incident response team)

5.25 Knowledge of the processes followed in forensics investigation and procedures in collection and preservation of the data and evidence (i.e., chain of custody).

5.26 Knowledge of the fraud risk factors related to the protection of information assets


CISM: Certified Information Security Manager

CISM - Certification Information Security Manager

 

Course Outline:
The job practice domains and task and knowledge statements are as follows:

Domain 1—Information Security Governance (24%)
Domain 2—Information Risk Management (30%)
Domain 3—Information Security Program Development and Management (27%)
Domain 4—Information Security Incident Management (19%)

 

Domain 1: Information Security Governance

Establish and/or maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives. (24%)

Task Statements

1.1 Establish and/or maintain an information security strategy in alignment with organizational goals and objectives to guide the establishment and/or ongoing management of the information security program.

1.2 Establish and/or maintain an information security governance framework to guide activities that support the information security strategy.

1.3 Integrate information security governance into corporate governance to ensure that organizational goals and objectives are supported by the information security program.

1.4 Establish and maintain information security policies to guide the development of standards, procedures and guidelines in alignment with enterprise goals and objectives.

1.5 Develop business cases to support investments in information security.

1.6 Identify internal and external influences to the organization (e.g., emerging technologies, social media, business environment, risk tolerance, regulatory requirements, third-party considerations, threat landscape) to ensure that these factors are continually addressed by the information security strategy

1.7 Gain ongoing commitment from senior leadership and other stakeholders to support the successful implementation of the information security strategy.

1.8 Define, communicate, and monitor information security responsibilities throughout the organization (e.g., data owners, data custodians, end users, privileged or high-risk users) and lines of authority.

1.9 Establish, monitor, evaluate and report key information security metrics to provide management with accurate and meaningful information regarding the effectiveness of the information security strategy.

Knowledge Statements

k1.1 Knowledge of techniques used to develop an information security strategy (e.g., SWOT [strengths, weaknesses, opportunities, threats] analysis, gap analysis, threat research)

k1.2 Knowledge of the relationship of information security to business goals, objectives, functions, processes and practices

k1.3 Knowledge of available information security governance frameworks

k1.4 Knowledge of globally recognized standards, frameworks and industry best practices related to information security governance and strategy development

k1.5 Knowledge of the fundamental concepts of governance and how they relate to information security

k1.6 Knowledge of methods to assess, plan, design and implement an information security governance framework

k1.7 Knowledge of methods to integrate information security governance into corporate governance 

k1.8 Knowledge of contributing factors and parameters (e.g., organizational structure and culture, tone at the top, regulations) for information security policy development

k1.9 Knowledge of content in, and techniques to develop, business cases

k1.10 Knowledge of strategic budgetary planning and reporting methods

k1.11 Knowledge of the internal and external influences to the organization (e.g., emerging technologies, social media, business environment, risk tolerance, regulatory requirements, third-party considerations, threat landscape) and how they impact the information security strategy

k1.12 Knowledge of key information needed to obtain commitment from senior leadership and support from other stakeholders (e.g., how information security supports organizational goals and objectives, criteria for determining successful implementation, business impact)

k1.13 Knowledge of methods and considerations for communicating with senior leadership and other stakeholders (e.g., organizational culture, channels of communication, highlighting essential aspects of information security)

k1.14 Knowledge of roles and responsibilities of the information security manager

k1.15 Knowledge of organizational structures, lines of authority and escalation points

k1.16 Knowledge of information security responsibilities of staff across the organization (e.g., data owners, end users, privileged or high-risk users)

k1.17 Knowledge of processes to monitor performance of information security responsibilities

k1.18 Knowledge of methods to establish new, or utilize existing, reporting and communication channels throughout an organization

k1.19 Knowledge of methods to select, implement and interpret key information security metrics (e.g., key performance indicators [KPIs] or key risk indicators [KRIs])

 

Domain 2—Information Risk Management

Manage information risk to an acceptable level based on risk appetite in order to meet organizational goals and objectives. (30%)

Task Statements

2.1 Establish and/or maintain a process for information asset classification to ensure that measures taken to protect assets are proportional to their business value.

2.2 Identify legal, regulatory, organizational and other applicable requirements to manage the risk of noncompliance to acceptable levels.

2.3 Ensure that risk assessments, vulnerability assessments and threat analyses are conducted consistently, at appropriate times, and to identify and assess risk to the organization’s information.

2.4 Identify, recommend or implement appropriate risk treatment/response options to manage risk to acceptable levels based on organizational risk appetite.

2.5 Determine whether information security controls are appropriate and effectively manage risk to an acceptable level.

2.6 Facilitate the integration of information risk management into business and IT processes (e.g., systems development, procurement, project management) to enable a consistent and comprehensive information risk management program across the organization.

2.7 Monitor for internal and external factors (e.g., key risk indicators [KRIs], threat landscape, geopolitical, regulatory change) that may require reassessment of risk to ensure that changes to existing, or new, risk scenarios are identified and managed appropriately.

2.8 Report noncompliance and other changes in information risk to facilitate the risk management decision-making process.

2.9 Ensure that information security risk is reported to senior management to support an understanding of potential impact on the organizational goals and objectives.

Knowledge Statements

k2.1 Knowledge of methods to establish an information asset classification model consistent with business objectives

k2.2 Knowledge of considerations for assigning ownership of information assets and risk

k2.3 Knowledge of methods to identify and evaluate the impact of internal or external events on information assets and the business

k2.4 Knowledge of methods used to monitor internal or external risk factors

k2.5 Knowledge of information asset valuation methodologies

k2.6 Knowledge of legal, regulatory, organizational and other requirements related to information security

k2.7 Knowledge of reputable, reliable and timely sources of information regarding emerging information security threats and vulnerabilities

k2.8 Knowledge of events that may require risk reassessments and changes to information security program elements

k2.9 Knowledge of information threats, vulnerabilities and exposures and their evolving nature

k2.10 Knowledge of risk assessment and analysis methodologies

k2.11 Knowledge of methods used to prioritize risk scenarios and risk treatment/response options

k2.12 Knowledge of risk reporting requirements (e.g., frequency, audience, content)

k2.13 Knowledge of risk treatment/response options (avoid, mitigate, accept or transfer) and methods to apply them

k2.14 Knowledge of control baselines and standards and their relationships to risk assessments

k2.15 Knowledge of information security controls and the methods to analyze their effectiveness

k2.16 Knowledge of gap analysis techniques as related to information security

k2.17 Knowledge of techniques for integrating information security risk management into business and IT processes

k2.18 Knowledge of compliance reporting requirements and processes

k2.19 Knowledge of cost/benefit analysis to assess risk treatment options

 

Domain 3—Information Security Program Development and Management

Develop and maintain an information security program that identifies, manages and protects the organization’s assets while aligning to information security strategy and business goals, thereby supporting an effective security posture. (27%)

Task Statements

3.1 Establish and/or maintain the information security program in alignment with the information security strategy.

3.2 Align the information security program with the operational objectives of other business functions (e.g., human resources [HR], accounting, procurement and IT) to ensure that the information security program adds value to and protects the business.

3.3 Identify, acquire and manage requirements for internal and external resources to execute the information security program.

3.4 Establish and maintain information security processes and resources (including people and technologies) to execute the information security program in alignment with the organization’s business goals.

3.5 Establish, communicate and maintain organizational information security standards, guidelines, procedures and other documentation to guide and enforce compliance with information security policies.

3.6 Establish, promote and maintain a program for information security awareness and training to foster an effective security culture.

3.7 Integrate information security requirements into organizational processes (e.g., change control, mergers and acquisitions, system development, business continuity, disaster recovery) to maintain the organization’s security strategy.

3.8 Integrate information security requirements into contracts and activities of third parties (e.g., joint ventures, outsourced providers, business partners, customers) and monitor adherence to established requirements in order to maintain the organization’s security strategy.

3.9 Establish, monitor and analyze program management and operational metrics to evaluate the effectiveness and efficiency of the information security program.

3.10 Compile and present reports to key stakeholders on the activities, trends and overall effectiveness of the IS program and the underlying business processes in order to communicate security performance.

Knowledge Statements

k3.1 Knowledge of methods to align information security program requirements with those of other business functions

k3.2 Knowledge of methods to identify, acquire, manage and define requirements for internal and external resources

k3.3 Knowledge of current and emerging information security technologies and underlying concepts

k3.4 Knowledge of methods to design and implement information security controls

k3.5 Knowledge of information security processes and resources (including people and technologies) in alignment with the organization’s business goals and methods to apply them

k3.6 Knowledge of methods to develop information security standards, procedures and guidelines 

k3.7 Knowledge of internationally recognized regulations, standards, frameworks and best practices related to information security program development and management

k3.8 Knowledge of methods to implement and communicate information security policies, standards, procedures and guidelines

k3.9 Knowledge of training, certifications and skill set development for information security personnel

k3.10 Knowledge of methods to establish and maintain effective information security awareness and training programs

k3.11 Knowledge of methods to integrate information security requirements into organizational processes (e.g., access management, change management, audit processes)

k3.12 Knowledge of methods to incorporate information security requirements into contracts, agreements and third-party management processes

k3.13 Knowledge of methods to monitor and review contracts and agreements with third parties and associated change processes as required 

k3.14 Knowledge of methods to design, implement and report operational information security metrics 

k3.15 Knowledge of methods for testing the effectiveness and efficiency of information security controls 

k3.16 Knowledge of techniques to communicate information security program status to key stakeholders 

 

Domain 4—Information Security Incident Management

Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact. (19%)

Task Statements

4.1 Establish and maintain an organizational definition of, and severity hierarchy for, information security incidents to allow accurate classification and categorization of and response to incidents.

4.2 Establish and maintain an incident response plan to ensure an effective and timely response to information security incidents.

4.3 Develop and implement processes to ensure the timely identification of information security incidents that could impact the business.

4.4 Establish and maintain processes to investigate and document information security incidents in order to determine the appropriate response and cause while adhering to legal, regulatory and organizational requirements.

4.5 Establish and maintain incident notification and escalation processes to ensure that the appropriate stakeholders are involved in incident response management.

4.6 Organize, train and equip incident response teams to respond to information security incidents in an effective and timely manner.

4.7 Test, review and revise (as applicable) the incident response plan periodically to ensure an effective response to information security incidents and to improve response capabilities.

4.8 Establish and maintain communication plans and processes to manage communication with internal and external entities.

4.9 Conduct postincident reviews to determine the root cause of information security incidents, develop corrective actions, reassess risk, evaluate response effectiveness and take appropriate remedial actions.

4.10 Establish and maintain integration among the incident response plan, business continuity plan and disaster recovery plan.

Knowledge Statements

k4.1 Knowledge of incident management concepts and practices

k4.2 Knowledge of the components of an incident response plan

k4.3 Knowledge of business continuity planning (BCP) and disaster recovery planning (DRP) and their relationship to the incident response plan

k4.4 Knowledge of incident classification/categorization methods

k4.5 Knowledge of incident containment methods to minimize adverse operational impact

k4.6 Knowledge of notification and escalation processes

k4.7 Knowledge of the roles and responsibilities in identifying and managing information security incidents

k4.8 Knowledge of the types and sources of training, tools and equipment required to adequately equip incident response teams

k4.9 Knowledge of forensic requirements and capabilities for collecting, preserving and presenting evidence (e.g., admissibility, quality and completeness of evidence, chain of custody)

k4.10 Knowledge of internal and external incident reporting requirements and procedures

k4.11 Knowledge of postincident review practices and investigative methods to identify root causes and determine corrective actions

k4.12 Knowledge of techniques to quantify damages, costs and other business impacts arising from information security incidents

k4.13 Knowledge of technologies and processes to detect, log, analyze and document information security events

k4.14 Knowledge of internal and external resources available to investigate information security incidents 

k4.15 Knowledge of methods to identify and quantify the potential impact of changes made to the operating environment during the incident response process 

k4.16 Knowledge of techniques to test the incident response plan 

k4.17 Knowledge of applicable regulatory, legal and organization requirements 

k4.18 Knowledge of key indicators/metrics to evaluate the effectiveness of the incident response plan 

 

 


aws Certification

Certified Information Systems Security Professional (CISSP)

 

CISSP - Certified Information Systems Security Professional

 

Domain 1: Security and Risk Management                                                                                                             

Domain 2: Asset Security                                                                                                                                              

Domain 3: Security Engineering                                                                                                                                   

Domain 4: Communications and Network Security                                                                                                    

Domain 5: Identity and Access Management                                                                                                             

Domain 6: Security Assessment and Testing                                          

Domain 7: Security Operations                                                                                                                                     

Domain 8: Software Development Security

 

Domain 1: Security and Risk Management

1.1 Understand and apply concepts of confidentiality, integrity and availability

1.2 Apply security governance principles through:

1.3 Compliance

    »» Legislative and regulatory compliance

    »» Privacy requirements compliance

1.4 Understand legal and regulatory issues that pertain to information security in a global context

1.5 Understand professional ethics

   »» Exercise (ISC)² Code of Professional Ethics

   »» Support organization’s code of ethics

1.6 Develop and implement documented security policy, standards, procedures, and guidelines.

1.7 Understand business continuity requirements

    »» Develop and document project scope and plan

    »» Conduct business impact analysis

    »» Alignment of security function to strategy, goals,

mission, and objectives (e.g., business case, budget and resources)

   »» Organizational processes (e.g., acquisitions, divestitures, governance committees)

   »» Security roles and responsibilities

   »» Control frameworks

   »» Due care

   »» Due diligence

   »» Computer crimes

   »» Licensing and intellectual property (e.g., copyright, trademark, digital-rights management)

   »» Import/export controls                                           

   »» Trans-border data flow                                         

   »» Privacy

   »» Data breaches

CISSP Certification Exam Outline 6

1.8 Contribute to personnel security policies

1.9 Understand and apply risk management concepts

1.10 Understand and apply threat modeling

1.11 Integrate security risk considerations into acquisition strategy and practice

1.12 Establish and manage information security education, training, and awareness

   »» Appropriate levels of awareness, training, and education required within organization

   »» Periodic reviews for content relevancy

   »» Employment candidate screening (e.g., reference checks, education verification)

   »» Employment agreements and policies

   »» Employment termination processes

   »» Vendor, consultant, and contractor controls

   »» Compliance

   »» Privacy

   »» Identify threats and vulnerabilities

   »» Risk assessment/analysis (qualitative, quantitative, hybrid)

   »» Risk assignment/acceptance (e.g., system authorization)

   »» Countermeasure selection

   »» Implementation

   »» Types of controls (preventive, detective, corrective, etc.)

   »» Control assessment

   »» Monitoring and measurement

  »» Asset valuation

  »» Reporting

  »» Continuous improvement

  »» Risk frameworks

  »» Identifying threats (e.g., adversaries, contractors, employees, trusted partners)

  »» Determining and diagramming potential attacks (e.g., social engineering, spoofing)

  »» Performing reduction analysis

  »» Technologies and processes to remediate threats (e.g., software architecture and operations)

  »» Hardware, software, and services

  »» Third-party assessment and monitoring (e.g., onsite assessment, document exchange and review, process/policy review)

  »» Minimum security requirements

  »» Service-level requirements

CISSP Certification Exam Outline 7

 

Domain 2: Asset Security

2.1 Classify information and supporting assets (e.g., sensitivity, criticality)

2.2 Determine and maintain ownership (e.g., data owners, system owners, business/mission owners)

2.3 Protect privacy

2.4 Ensure appropriate retention (e.g., media, hardware, personnel)

2.5 Determine data security controls (e.g., data at rest, data in transit)

2.6 Establish handling requirements (markings, labels, storage, destruction of sensitive information)

  »» Data owners

  »» Data processers

  »» Data remanence

  »» Collection limitation

 »» Baselines

 »» Scoping and tailoring

 »» Standards selection

»» Cryptography

CISSP Certification Exam Outline 8

 

Domain 3: Security Engineering

3.1 Implement and manage engineering processes using secure design principles

3.2 Understand the fundamental concepts of security models (e.g., Confidentiality,

Integrity, and Multi-level Models)

3.3 Select controls and countermeasures based upon systems security evaluation models

3.4 Understand security capabilities of information systems (e.g., memory protection,

virtualization, trusted platform module, interfaces, fault tolerance)

3.5 Assess and mitigate the vulnerabilities of security architectures, designs, and solution

elements

3.6 Assess and mitigate vulnerabilities in web-based systems (e.g., XML, OWASP)

3.7 Assess and mitigate vulnerabilities in mobile systems

3.8 Assess and mitigate vulnerabilities in embedded devices and cyber-physical systems (e.g.,

network-enabled devices, Internet of things (loT))

3.9 Apply cryptography

»» Client-based (e.g., applets, local caches)

»» Server-based (e.g., data flow control)

»» Database security (e.g., inference, aggregation,

data mining, data analytics, warehousing)

»» Large-scale parallel data systems

»» Distributed systems (e.g., cloud computing, grid

computing, peer to peer)

»» Cryptographic systems

»» Industrial control systems (e.g., SCADA)

»» Cryptographic life cycle (e.g., cryptographic

limitations, algorithm/protocol governance)

»» Cryptographic types (e.g., symmetric, asymmetric,

elliptic curves)

»» Public Key Infrastructure (PKI)

»» Key management practices

»» Digital signatures

»» Digital rights management

»» Non-repudiation

»» Integrity (hashing and salting)

»» Methods of cryptanalytic attacks (e.g., brute force,

cipher-text only, known plaintext)

CISSP Certification Exam Outline 9

3.10 Apply secure principles to site and facility design

3.11 Design and implement physical security

»» Wiring closets

»» Server rooms

»» Media storage facilities

»» Evidence storage

»» Restricted and work area security (e.g., operations

centers)

»» Data center security

»» Utilities and HVAC considerations

»» Water issues (e.g., leakage, flooding)

»» Fire prevention, detection and suppression

CISSP Certification Exam Outline 10

 

Domain 4: Communications and Network Security

4.1 Apply secure design principles to network architecture (e.g., IP & non-IP protocols,

segmentation)

4.2 Secure network components

4.3 Design and establish secure communication channels

4.4 Prevent or mitigate network attacks

»» OSI and TCP/IP models

»» IP networking

»» Implications of multilayer protocols (e.g., DNP3)

»» Converged protocols (e.g., FCoE, MPLS, VoIP,

iSCSI)

»» Software-defined networks

»» Wireless networks

»» Cryptography used to maintain communication

security

»» Operation of hardware (e.g., modems, switches,

routers, wireless access points, mobile devices)

»» Transmission media (e.g., wired, wireless, fiber)

»» Network access control devices (e.g.,

firewalls, proxies)

»» Endpoint security

»» Content-distribution networks

»» Physical devices

»» Voice

»» Multimedia collaboration (e.g., remote meeting

technology, instant messaging)

»» Remote access (e.g., VPN, screen scraper, virtual

application/desktop, telecommuting)

»» Data communications (e.g., VLAN, TLS/SSL)

»» Virtualized networks (e.g., SDN, virtual SAN, guest

operating systems, port isolation)

CISSP Certification Exam Outline 11

 

Domain 5: Identity and Access Management

5.1 Control physical and logical access to assets

»» Information

»» Systems

»» Devices

»» Facilities

5.2 Manage identification and authentication of people and devices

5.3 Integrate identity as a service (e.g., cloud identity)

5.4 Integrate third-party identity services (e.g., on-premise)

5.5 Implement and manage authorization mechanisms

»» Role-Based Access Control (RBAC) methods

»» Rule-based access control methods

»» Mandatory Access Control (MAC)

»» Discretionary Access Control (DAC)

5.6 Prevent or mitigate access control attacks

5.7 Manage the identity and access provisioning lifecycle (e.g., provisioning, review)

»» Identity management implementation (e.g., SSO,

LDAP)

»» Single/multi-factor authentication (e.g., factors,

strength, errors)

»» Accountability

»» Session management (e.g., timeouts,

screensavers)

»» Registration and proofing of identity

»» Federated identity management (e.g., SAML)

»» Credential management systems

CISSP Certification Exam Outline 1122

6.1 Design and validate assessment and test strategies

6.2 Conduct security control testing

6.3 Collect security process data (e.g., management and operational controls)

6.4 Analyze and report test outputs (e.g., automated, manual)

6.5 Conduct or facilitate internal and third party audits

»» Vulnerability assessment

»» Penetration testing

»» Log reviews

»» Synthetic transactions

»» Code review and testing (e.g., manual, dynamic,

static, fuzz)

»» Misuse case testing

»» Test coverage analysis

»» Interface testing (e.g., API, UI, physical)

»» Account management (e.g., escalation,

revocation)

»» Management review

»» Key performance and risk indicators

»» Backup verification data

»» Training and awareness

»» Disaster recovery and business continuity

Domain 6: Security Assessment and Testing

CISSP Certification Exam Outline 13

7.1 Understand and support investigations

7.2 Understand requirements for investigation types

7.3 Conduct logging and monitoring activities

7.4 Secure the provisioning of resources

7.5 Understand and apply foundational security operations concepts

7.6 Employ resource protection techniques

»» Media management

»» Hardware and software asset management

Domain 7:

Security Operations

»» Evidence collection and handling (e.g., chain of

custody, interviewing)

»» Reporting and documenting

»» Investigative techniques (e.g., root-cause analysis,

incident handling)

»» Digital forensics (e.g., media, network, software,

and embedded devices)

»» Intrusion detection and prevention

»» Security information and event management

»» Continuous monitoring

»» Egress monitoring (e.g., data loss prevention,

steganography, watermarking)

»» Asset inventory (e.g., hardware, software)

»» Configuration management

»» Physical assets

»» Virtual assets (e.g., software-defined network,

virtual SAN, guest operating systems)

»» Cloud assets (e.g., services, VMs, storage,

networks)

»» Applications (e.g., workloads or private clouds,

web services, software as a service)

»» Need-to-know/least privilege (e.g., entitlement,

aggregation, transitive trust)

»» Separation of duties and responsibilities

»» Monitor special privileges (e.g., operators,

administrators)

»» Job rotation

»» Information lifecycle

»» Service-level agreements

»» Operational

»» Criminal

»» Civil

»» Regulatory

»» Electronic discovery (eDiscovery)

CISSP Certification Exam Outline 14

7.7 Conduct incident management

7.8 Operate and maintain preventative measures

7.9 Implement and support patch and vulnerability management

7.10 Participate in and understand change management processes (e.g., versioning, baselining,

security impact analysis)

7.11 Implement recovery strategies

7.12 Implement disaster recovery processes

7.13 Test disaster recovery plans

7.14 Participate in business continuity planning and exercises

7.15 Implement and manage physical security

»» Perimeter (e.g., access control and monitoring)

»» Internal security (e.g., escort requirements/visitor control, keys and locks)

7.16 Participate in addressing personnel safety concerns (e.g., duress, travel, monitoring)

»» Detection

»» Response

»» Mitigation

»» Reporting

»» Recovery

»» Remediation

»» Lessons learned

»» Firewalls

»» Intrusion detection and prevention systems

»» Whitelisting/Blacklisting

»» Third-party security services

»» Sandboxing

»» Honeypots/Honeynets

»» Anti-malware

»» Backup storage strategies (e.g., offsite storage,

electronic vaulting, tape rotation)

»» Recovery site strategies

»» Multiple processing sites (e.g., operationally

redundant systems)

»» System resilience, high availability, quality of

service, and fault tolerance

»» Response

»» Personnel

»» Communications

»» Assessment

»» Restoration

»» Training and awareness

»» Read-through

»» Walkthrough

»» Simulation

»» Parallel

»» Full interruption

CISSP Certification Exam Outline 15

Domain 8:

Software Development Security

8.1 Understand and apply security in the software development lifecycle

8.2 Enforce security controls in development environments

8.3 Assess the effectiveness of software security

»» Auditing and logging of changes

»» Risk analysis and mitigation

»» Acceptance testing

8.4 Assess security impact of acquired software

»» Development methodologies (e.g., Agile,

Waterfall)

»» Maturity models

»» Operation and maintenance

»» Change management

»» Integrated product team (e.g., DevOps)

»» Security of the software environments

»» Security weaknesses and vulnerabilities at

the source-code level (e.g., buffer overflow,

escalation of privilege, input/output validation)

»» Configuration management as an aspect of

secure coding

»» Security of code repositories

»» Security of application programming interfaces

CISSP Certification Exam Outline 16

 

 

 


1-on-1 Training

CCNA (Routing & Switching)

Crash Course / Exam Preparation Course / 1-on-1 Course

AT Computer Solution Limited is offered Crash Course / Exam Preparation Course. It will focus on the best paths to take education to help you advance in your career. It will help you to get a professional certificate easily.

 

Advantages of 1-on-1 Training are:

  • You can start from Any Date.
  • Fully customized course to suit your training need.
  • You get a personal trainer for the entire duration of the boot camp.
  • Better quality. Quality of instruction has an inverse relation with the number of students in a class.
  • Quicker learning since you receive undivided attention of the trainer. You don't have to wait for your turn to seek an explanation

 

1 to 1 CCNA (Routing & Switching) Course Outline / Crash Course

Per class 2 (two) hours

Project: 18 Hours (Real Life - Hands on Lab)

 

 

 

 

 Class 1 & 2

 1: Internetworking + Ethernet Networking and Data Encapsulation

 

 

 

 

 Class 3

 2: Introduction to TCP/IP

 

 

 

 

 Class 4 & 5

 3: Easy Subnetting + Variable Length Subnet Masks (VLSMs)

 

 

 

 

 Class 6

 4: Cisco's Internetworking Operating System (IOS)

 

 

 

 

 Class 7 & 8

 5: IP Routing with Static & RIP

 

 

 

 

 Class 9

 6: Enhanced IGRP (EIGRP)

 

 

 

 

 Class 10

 7: Open Shortest Path First (OSPF)

 

 

 

 

 Class 11 & 12

 8:Layer 2 Switching and Spanning Tree Protocol (STP) & Virtual LANs (VLANs)

 

 

 

 

 Class 13

 9: InterVLAN Routing

 

 

 

 

 Class 14

 10: Security - ACL

 

 

 

 

 Class 15

 11: Network Address Translation (NAT)

 

 

 

 

 Class 16

 12. Internet Protocol Version 6 (IPv6) with LAB

 

 

 

 

Class 17

  Detail discussion on Project:

# # Project:  18 Hours (Real Life - Hands on Lab) with Exam Preparation

 

*** We assure your 100% learning guaranty and CCNA pass guaranty otherwise we will refund your course fee and exam fee.

 


CCNA Security

Crash Course / Exam Preparation Course / 1-on-1 Course

AT Computer Solution Limited is offered Crash Course / Exam Preparation Course. It will focus on the best paths to take education to help you advance in your career. It will help you to get a professional certificate easily.

 

Advantages of 1-on-1 Training are:

  • You can start from Any Date.
  • Fully customized course to suit your training need.
  • You get a personal trainer for the entire duration of the boot camp.
  • Better quality. Quality of instruction has an inverse relation with the number of students in a class.
  • Quicker learning since you receive undivided attention of the trainer. You don't have to wait for your turn to seek an explanation

 

 

CCNA Security (New Version) & 210-260 IINS Exam

Course Outline

1. Security Concepts

  • Threatscape
  • Threat defense technologies
  • Security policy and basic security architectures
  • Cryptographic technologies

2. Secure Network Devices

  • Implementing AAA
  • Management protocols and systems
  • Securing the control plane

3. Layer 2 Security

  • Securing Layer 2 infrastructures
  • Securing Layer 2 protocols

4. Firewall

  • Firewall technologies
  • Introducing the Cisco ASA v9.2
  • Cisco ASA access control and service policies
  • Cisco IOS zone based firewall

5. VPN

  • IPsec technologies
  • Site-to-site VPN
  • Client-based remote access VPN
  • Clientless remote access VPN

6. Advanced Topics

  • Intrusion detection and protection
  • Endpoint protection
  • Content security
  • Advanced network security architectures

Labs

Lab 1: Exploring Cryptographic Technologies

Lab 2: Configure and Verify AAA

Lab 3: Configuration Management Protocols

Lab 4: Securing Routing Protocols

Lab 5: VLAN Security and ACLs on Switches

Lab 6: Port Security and Private VLAN Edge

Lab 7: Securing DHCP, ARP, and STP

Lab 8: Explore Firewall Technologies

Lab 9: Cisco ASA Interfaces and NAT

Lab 10: Site-to-Site VPN

Lab 11: Clientless Remote Access VPN

Lab 12: Configure DHCP Snooping and STP Protection

Lab 13: Configure Interfaces and NAT on the Cisco ASA


CCNP

Crash Course / Exam Preparation Course / 1-on-1 Course

AT Computer Solution Limited is offered Crash Course / Exam Preparation Course. It will focus on the best paths to take education to help you advance in your career. It will help you to get a professional certificate easily.

 

Advantages of 1-on-1 Training are:

  • You can start from Any Date.
  • Fully customized course to suit your training need.
  • You get a personal trainer for the entire duration of the boot camp.
  • Better quality. Quality of instruction has an inverse relation with the number of students in a class.
  • Quicker learning since you receive undivided attention of the trainer. You don't have to wait for your turn to seek an explanation

 

CCNP Route (300-101)

Part I: Fundamental Routing Concepts

Chapter 1. Characteristics of Routing Protocols

Chapter 2. Remote Site Connectivity

 

Part II: IGP Routing Protocols

Chapter 3. IPv6 Review and RIPng

Chapter 4. Fundamental EIGRP Concepts

Chapter 5. Advanced EIGRP Concepts

Chapter 7. Fundamental OSPF Concepts

Chapter 8. The OSPF Link-State Database

Chapter 9. Advanced OSPF Concepts

 

Part III: Route Redistribution and Selection

Chapter 10. Route Redistribution

Chapter 11. Route Selection

 

Part IV: Internet Connectivity

Chapter 12. Fundamentals of Internet Connectivity

Chapter 13. Fundamental BGP Concepts

Chapter 14. Advanced BGP Concepts

Chapter 15. IPv6 Internet Connectivity

 

Part V: Router and Routing Security

Chapter 16. Fundamental Router Security Concepts

Chapter 17. Routing Protocol Authentication

 

CCNP Switch (300-115)

Part I: Designing Campus Networks

Chapter 1. Enterprise Campus Network Design

Chapter 2. Switch Operation

Chapter 3. Switch Port Configuration

 

Part II: Building a Campus Network

Chapter 4. VLANs and Trunks

Chapter 5. VLAN Trunking Protocol

 

Part III: Working with Redundant Links

Chapter 6. Traditional Spanning Tree Protocol

Chapter 7. Spanning-Tree Configuration

Chapter 8. Protecting the Spanning Tree Protocol Topology

Chapter 9. Advanced Spanning Tree Protocol

Chapter 10. Aggregating Switch Links

 

Part IV: Multilayer Switching

Chapter 11. Multilayer Switching

Chapter 12. Configuring DHCP

 

Part V: Monitoring Campus Networks

Chapter 13. Logging Switch Activity

Chapter 14. Managing Switches with SNMP

Chapter 15. Monitoring Performance with IP SLA

Chapter 16. Using Port Mirroring to Monitor Traffic

 

Part VI: Implementing High Availability

Chapter 17. Understanding High Availability

Chapter 18. Layer 3 High Availability

 

Part VII: Securing Switched Networks

Chapter 19. Securing Switch Access

Chapter 20. Securing VLANs

Chapter 21. Preventing Spoofing Attacks

Chapter 22. Managing Switch Users

 

CCNP TSHOOT (300-135)

Part I Fundamental Troubleshooting and Maintenance Concepts

Chapter 1 Introduction to Troubleshooting and Network Maintenance

Chapter 2 Troubleshooting and Maintenance Tools

Chapter 3 Troubleshooting Device Performance

 

Part II Troubleshooting Cisco Catalyst Switch Features

Chapter 4 Troubleshooting Layer 2 Trunks, VTP, and VLANs

Chapter 5 Troubleshooting STP and Layer 2 EtherChannel

Chapter 6 Troubleshooting Inter-VLAN Routing and Layer 3 EtherChannels

Chapter 7 Troubleshooting Switch Security Features

Chapter 8 Troubleshooting First-Hop Redundancy Protocols

 

Part III Troubleshooting Router Features

Chapter 9 Troubleshooting IPv4 Addressing and Addressing Technologies

Chapter 10 Troubleshooting IPv6 Addressing and Addressing Technologies

Chapter 11 Troubleshooting IPv4 and IPv6 ACLs and Prefix Lists

Chapter 12 Troubleshooting Basic IPv4/IPv6 Routing and GRE Tunnels

Chapter 13 Troubleshooting RIPv2 and RIPng

Chapter 14 Troubleshooting EIGRP

Chapter 15 Troubleshooting OSPF

Chapter 16 Troubleshooting Route Maps and Policy-Based Routing

Chapter 17 Troubleshooting Redistribution

Chapter 18 Troubleshooting BGP

 

Part IV Troubleshooting Management

Chapter 19 Troubleshooting Management Protocols and Tools

Chapter 20 Troubleshooting Management Access

--------------------------END-----------------------------

If you have any question regarding the above course outline please call - 01711452688.

 


RHCE

Crash Course / Exam Preparation Course / 1-on-1 Course

AT Computer Solution Limited is offered Crash Course / Exam Preparation Course. It will focus on the best paths to take education to help you advance in your career. It will help you to get a professional certificate easily.

 

Advantages of 1-on-1 Training are:

  • You can start from Any Date.
  • Fully customized course to suit your training need.
  • You get a personal trainer for the entire duration of the boot camp.
  • Better quality. Quality of instruction has an inverse relation with the number of students in a class.
  • Quicker learning since you receive undivided attention of the trainer. You don't have to wait for your turn to seek an explanation

 

AT Computer Solution Limited

RHCE Course Outline

Total 110 Hours

One Class = 06 Hours Friday Evening Batch (3:30pm-9:30pm) /

                     Friday Morning 4 hours (9am – 1pm) & Saturday Evening 2 hours (7:30pm-9:30pm)

Red Hat System Administration I (RH124)

Chapter 1 : Accessing the Command Line

Chapter 2: Managing Files From the Command Line

Chapter 3: Getting Help in Red Hat Enterprise Linux [Without LAB]

Chapter 4: Creating, Viewing, and Editing Text Files

ONE Class

 

 

Chapter 5: Managing Local Linux Users and Groups

Chapter 6: Controlling Access to Files With Linux File System Permission

Chapter 8: Controlling Services and Daemons

Chapter 11: Managing Red Hat Enterprise Linux Networking

ONE Class

 

 

Chapter 12: Archiving and Copying Files Between Systems

Chapter 13: Installing and Updating Software Packages

Chapter 14: Accessing Linux file Systems

ONE Class

 

*** Exam Class

 

Red Hat System Administration II (RH134)

Chapter 2 : Using Regular Expression With grep

Chapter 3 : Creating and Editing Text files with vim

Chapter 4 : Scheduling Future Linux Tasks

Chapter  6: Controlling Access to Files With Access Control lists (ACLs)

Chapter 7 : Managing SELinux Security

ONE Class

 

 

Chapter 8: Connecting to Network-defined Users and Groups

Chapter 9: Adding Disks, Partitions, and File System to a Linux System

Chapter 10: Managing Logical Volume Management (LVM) Storage

ONE Class

 

 

Chapter 11: Accessing Network Storage with Network File System (NFS)

Chapter 13: Controlling and Troubleshooting the Red Hat  Enterprise Linux Boot Process

Chapter 14: Limiting Network Communication with firewalld

ONE Class

 

*** Exam Class

Red Hat System Administration III (RH254)

Chapter 1: Controlling Services and Daemons

Chapter 2: Managing IPv6 Networking

Chapter 3: Configuring Link Aggregation and Bridging

ONE Class

 

 

Chapter 4: Network Port Security

Chapter 5: Managing DNS for Servers

Chapter 6: Configuring Email Transmission

Chapter 7: Providing Remote Block Storage

ONE Class

 

*** Exam Class

 

Chapter 8: Providing File-based Storage

Chapter 9: Configuring MariaDB Databases

Chapter 10: Providing Apache HTTPD Web Service

ONE Class

 

 

Chapter 11:Writing Bash Scripts

Chapter 12: Bash Conditionals and Control Structures

Chapter 13: Configuring the Shell Environment

ONE Class

*** Exam Class

 

 

Exam Preparation:   20 Hours

Project:   18 Hours

 

If you have any query please feel free call - 01711452688


MCSA

Crash Course / Exam Preparation Course / 1-on-1 Course

AT Computer Solution Limited is offered Crash Course / Exam Preparation Course. It will focus on the best paths to take education to help you advance in your career. It will help you to get a professional certificate easily.

 

Advantages of 1-on-1 Training are:

  • You can start from Any Date.
  • Fully customized course to suit your training need.
  • You get a personal trainer for the entire duration of the boot camp.
  • Better quality. Quality of instruction has an inverse relation with the number of students in a class.
  • Quicker learning since you receive undivided attention of the trainer. You don't have to wait for your turn to seek an explanation

MCSA: Microsoft Windows Server 2016 Course Outline / Crash Course

Per class 2 (two) hours

Project: 15 Hours (Real Life - Hands on Lab)

70-740 = Installation, Storage, and Compute with Windows Server 2016

1.    Install and configure servers
      i.    Install server
      ii.    Configure local storage
2.    Configure server roles and features
      i.    Configure file and share access
      ii.    Configure print and document services
3.    Configure Hyper-v
      i.    Create and configure virtual machine settings
      ii.    Create and configure virtual machine storage
      iii.    Create and configure virtual networks
4.    Deploy and configure core network services
      i.    Deploy and configure Dynamic Host Configuration Protocol (DHCP) service
      ii.    Deploy and configure DNS service
5.    Install and configure active directory
      i.    Install domain controllers
      ii.    Create and manage Active Directory users and computers
      iii.    Create and manage Active Directory groups and organizational units (OUs)
6.    Create and manage group policy
      i.    Create Group Policy objects (GPOs)
      ii.    Configure security policies
      iii.    Configure Windows Firewall

 

70-741 = Networking with Windows Server 2016


1.    Deploy, manage and maintain servers
       i.    Deploy and manage server images
       ii.    Monitor servers
2.    Configure file and print services
       i.    Configure Distributed File System (DFS)
       ii.    Configure File Server Resource Manager (FSRM)
       iii.    Configure file and disk encryption
       iv.    Configure advanced audit policies
3.    Configure network services and access
       i.    Configure DNS zones
       ii.    Configure DNS records
       iii.    Configure NAT and routing
4.    Configure network policy server infrastructure
       i.    Configure Network Access Protection (NAP)
5.    Configure and manage active directory
       i.    Configure domain controllers
       ii.    Maintain Active Directory
       iii.    Configure account policies
6.    Configure and manage group policy
       i.    Configure Group Policy processing
       ii.    Configure Group Policy settings
       iii.    Manage Group Policy objects (GPOs)
       iv.    Configure Group Policy preferences (GPP)


70-742 = Identity with Windows Server 2016


1.    Configure and manage high availability
       i.    Configure Network Load Balancing (NLB)
       ii.    Configure failover clustering
2.    Configure file and storage services
       i.    Configure advanced file services
       ii.    Implement Dynamic Access Control (DAC)
3.    Implement business continuity and recovery
       i.    Configure and manage backups
       ii.    Recover servers
4.    Configure network services
       i.    Implement an advanced Dynamic Host Configuration Protocol (DHCP) solution
       ii.    Deploy and manage IP Address Management (IPAM)
5.    Configure active directory infrastructure
       i.    Configure a forest or a domain
       ii.    Configure trusts
       iii.    Configure sites
6.    Configure identity and access solutions
       i.    Install and configure Active Directory Certificate Services (AD CS)
       ii.    Install and configure Active Directory Rights Management Services (AD RMS)

*** We assure your 100% learning guaranty and MCSA pass guaranty otherwise we will refund your course fee and exam fee.

 


Oracle Training & Certification

Oracle Training & Certification

CISSP Training & Certification

Close

ADMISSION FORM



* Name :
Parent/Guardian :
Permanent Address :
* Current Address :
* Email :
* Phone :
* Course Title :
Sex :
Date of Birth :
Computer Knowledge :
Reference :
* Last Education :
* Occupation :
Terms & Condition:
  1. Studentship will be terminated if two uninterrupted weeks are absent.
  2. Students are bound to follow the given class schedule.


Close
965/1, Shewrapara, Kafrul, Dhaka -1216

CONTACT FORM

Personal Information
* Name :
Professional Information
Office :
Designation :
Contact Information
* Mobile :
* Email :
Academic Information
Last Education :
Other Qualification :


Close
965/1, Shewrapara, Kafrul, Dhaka -1216

AT Computer Training Survey

Student Information
* Name :
Email :
* Student ID :
Contract Number :
Course :
Section One: Instructor

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

Please share any comments you have about the instructor:
Section Two: Curriculum

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

  • No. There was not nearly enough time.
  • No. There was not enough time.
  • Yes
  • No. There was not enough material.
  • No. There was not nearly enough material.

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

Please share any comments you have on the training format and materials:
Section Three: Facility

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

Please share any comments you have about the facilities:
Section Four: Overall
Suggestion box: Our model is continual improvement. We invite you to suggest specific improvements.


Please share any comments you have about the facilities:


Please share any comments you have about the facilities:
Close

Forgot ID or Password ?
Don't have account?
Close

0.1286