AT Computer Solution Limited
Call Us: 01818-446835, 01711-452688

Training

Home / Training

CISCO Certifications

CCNA (Routing and Switching) New Version

CCNA (Routing and Switching) New Version

102 Hours

We have - CCNA Vendor Online Exam Center 

Book Name: CCNA Study Guide - Todd Lammle – 200-125 Edition

OR

CCNA Routing and Switching 200-125 Official Cert Guide Library

 

Chapter 1: Internetworking

  • Internetworking Basics
  • Internetworking Models
  • The OSI Reference Model

 

Chapter 2: Ethernet Networking and Data Encapsulation

  • Ethernet Networks in Review
  • Ethernet Cabling
  • Data Encapsulation
  • The Cisco Three-Layer Hierarchical Model

 

Chapter 3: Introduction to TCP/IP

  • Introducing TCP/IP
  • TCP/IP and DoD Model
  • IP Addressing
  • IPv4 Address Types

 

Chapter 4: Easy Subnetting

  • Subnetting Basics
  • Summary

 

Chapter 5: Variable Length Subnet Masks (VLSMs), Summarization and Troubleshooting TCP/IP

  • Variable Length Subnet Masks (VLSMs)
  • Summarization
  • Troubleshooting IP Addressing

 

Chapter 6: Cisco's Internetworking Operating System (IOS)

  • The IOS User Interface
  • Command-Line Interface (CLI)
  • Router and Switch Administrative Configurations
  • Router Interfaces
  • Viewing, Saving and Erasing Configurations

 

Chapter 7: Managing a Cisco Internetwork + Managing Cisco

Devices (book ICND II)

  • The Internal Components of a Cisco Router
  • The Router Boot Sequence
  • Managing Configuration Register
  • Backing Up and Restoring the Cisco IOS
  • Backing Up and Restoring the Cisco Configuration
  • Using Cisco Discovery Protocol (CDP)
  • Using Telnet
  • Resolving Hostnames
  • Checking Network Connectivity and Troubleshooting

 

Chapter 8: IP Routing

  • Routing Basics
  • The IP Routing Process
  • Configuring IP Routing in Our Network
  • Dynamic Routing
  • Distance-Vector Routing Protocols
  • Routing Information Protocol (RIP)
  • Verifying Your Configurations

 

Chapter 9: Enhanced IGRP (EIGRP) and Open Shortest Path First (OSPF)

  • EIGRP Features and Operation
  • Using EIGRP to Support Larger Networks
  • Configuring EIGRP
  • Load Balancing with EIGRP
  • Verifying EIGRP
  • Open Shortest Path First (OSPF) Basics
  • Configuring OSPF
  • Verifying OSPF Configuration
  • OSPF DR and BDR Elections
  • OSPF and Loopback Interfaces
  • Troubleshooting OSPF
  • Configuring EIGRP and OSPF Summary Routes
  • Chapter 10: Multi-Area OSPF

 

Chapter 11: Layer 2 Switching and Spanning Tree Protocol (STP)

  • Before Layer 2 Switching
  • Switching Services
  • Spanning Tree Protocol (STP)
  • Configuring Catalyst Switches

 

Chapter 12: Virtual LANs (VLANs) & InterVLAN Routing

  • VLAN Basics
  • VLAN Membership
  • Identifying VLANs
  • VLAN Trunking Protocols (VTP)
  • Routing between VLANs
  • Configuring VLANs
  • Configuring VTP
  • Telephony: Configuring Voice VLANs
  • RSTP
  • PVSTP
  • Ether Channels

Chapter 13: Security

  • Perimeter, Firewall and Internal Routers
  • Introduction to Access Lists
  • Standard Access Lists
  • Extended Access Lists
  • Turning Off and Configuring Network Services
  • Monitoring Access Lists

 

Chapter 14: Network Address Translation (NAT)

  • When Do We Use NAT?
  • Type of Network Address Translation
  • NAT Names
  • How NAT Works
  • Testing and Troubleshooting NAT

 

Chapter 15: Internet Protocol Version 6 (IPv6)

  • Why Do We Need IPv6?
  • The Benefits and Uses of IPv6
  • IPv6 Addressing and Expressions
  • How IPv6 Works in an Internetwork
  • IPv6 Routing Protocols
  • Migrating to IPv6

 

Chapter 16: IP Services

  • Client Redundancy Issues

Introducing First Hop Redundancy Protocol (FHRP)

  • Hot Standby Router Protocol (HSRP)
  • Virtual Router Redundancy Protocol
  • Syslog
  • SNMP
  • NetFlow

Chapter 17: Wide Area Networks

  • Introduction to Wide Area Networks
  • Cable and DSL
  • Cabling the Serial Wide Area Network
  • High-Level Data-Link Control (HDLC) Protocol
  • Point-to-Point Protocol (PPP)
  • Virtual Private Networks
  • GRE Tunnels

Project:  18 Hours

Exam Preparation: 24 Hours

 

If you have any query regarding the below course outline please feel free to call     01711- 452688

 


CCNP (Cisco Certified Network Professional)

CCNP Route (300-101)

Part I: Fundamental Routing Concepts

Chapter 1. Characteristics of Routing Protocols

Chapter 2. Remote Site Connectivity

 

Part II: IGP Routing Protocols

Chapter 3. IPv6 Review and RIPng

Chapter 4. Fundamental EIGRP Concepts

Chapter 5. Advanced EIGRP Concepts

Chapter 7. Fundamental OSPF Concepts

Chapter 8. The OSPF Link-State Database

Chapter 9. Advanced OSPF Concepts

 

Part III: Route Redistribution and Selection

Chapter 10. Route Redistribution

Chapter 11. Route Selection

 

Part IV: Internet Connectivity

Chapter 12. Fundamentals of Internet Connectivity

Chapter 13. Fundamental BGP Concepts

Chapter 14. Advanced BGP Concepts

Chapter 15. IPv6 Internet Connectivity

 

Part V: Router and Routing Security

Chapter 16. Fundamental Router Security Concepts

Chapter 17. Routing Protocol Authentication

 

CCNP Switch (300-115)

Part I: Designing Campus Networks

Chapter 1. Enterprise Campus Network Design

Chapter 2. Switch Operation

Chapter 3. Switch Port Configuration

 

Part II: Building a Campus Network

Chapter 4. VLANs and Trunks

Chapter 5. VLAN Trunking Protocol

 

Part III: Working with Redundant Links

Chapter 6. Traditional Spanning Tree Protocol

Chapter 7. Spanning-Tree Configuration

Chapter 8. Protecting the Spanning Tree Protocol Topology

Chapter 9. Advanced Spanning Tree Protocol

Chapter 10. Aggregating Switch Links

 

Part IV: Multilayer Switching

Chapter 11. Multilayer Switching

Chapter 12. Configuring DHCP

 

Part V: Monitoring Campus Networks

Chapter 13. Logging Switch Activity

Chapter 14. Managing Switches with SNMP

Chapter 15. Monitoring Performance with IP SLA

Chapter 16. Using Port Mirroring to Monitor Traffic

 

Part VI: Implementing High Availability

Chapter 17. Understanding High Availability

Chapter 18. Layer 3 High Availability

 

Part VII: Securing Switched Networks

Chapter 19. Securing Switch Access

Chapter 20. Securing VLANs

Chapter 21. Preventing Spoofing Attacks

Chapter 22. Managing Switch Users

 

CCNP TSHOOT (300-135)

Part I Fundamental Troubleshooting and Maintenance Concepts

Chapter 1 Introduction to Troubleshooting and Network Maintenance

Chapter 2 Troubleshooting and Maintenance Tools

Chapter 3 Troubleshooting Device Performance

 

Part II Troubleshooting Cisco Catalyst Switch Features

Chapter 4 Troubleshooting Layer 2 Trunks, VTP, and VLANs

Chapter 5 Troubleshooting STP and Layer 2 EtherChannel

Chapter 6 Troubleshooting Inter-VLAN Routing and Layer 3 EtherChannels

Chapter 7 Troubleshooting Switch Security Features

Chapter 8 Troubleshooting First-Hop Redundancy Protocols

 

Part III Troubleshooting Router Features

Chapter 9 Troubleshooting IPv4 Addressing and Addressing Technologies

Chapter 10 Troubleshooting IPv6 Addressing and Addressing Technologies

Chapter 11 Troubleshooting IPv4 and IPv6 ACLs and Prefix Lists

Chapter 12 Troubleshooting Basic IPv4/IPv6 Routing and GRE Tunnels

Chapter 13 Troubleshooting RIPv2 and RIPng

Chapter 14 Troubleshooting EIGRP

Chapter 15 Troubleshooting OSPF

Chapter 16 Troubleshooting Route Maps and Policy-Based Routing

Chapter 17 Troubleshooting Redistribution

Chapter 18 Troubleshooting BGP

 

Part IV Troubleshooting Management

Chapter 19 Troubleshooting Management Protocols and Tools

Chapter 20 Troubleshooting Management Access

--------------------------END-----------------------------

If you have any question regarding the above course outline please call - 01711452688.


CCNA Security

Crash Course / Exam Preparation Course / 1-on-1 Course

AT Computer Solution Limited is offered Crash Course / Exam Preparation Course. It will focus on the best paths to take education to help you advance in your career. It will help you to get a professional certificate easily.

 

Advantages of 1-on-1 Training are:

  • You can start from Any Date.
  • Fully customized course to suit your training need.
  • You get a personal trainer for the entire duration of the boot camp.
  • Better quality. Quality of instruction has an inverse relation with the number of students in a class.
  • Quicker learning since you receive undivided attention of the trainer. You don't have to wait for your turn to seek an explanation

 

 

CCNA Security (New Version) & 210-260 IINS Exam

Course Outline

1. Security Concepts

  • Threatscape
  • Threat defense technologies
  • Security policy and basic security architectures
  • Cryptographic technologies

2. Secure Network Devices

  • Implementing AAA
  • Management protocols and systems
  • Securing the control plane

3. Layer 2 Security

  • Securing Layer 2 infrastructures
  • Securing Layer 2 protocols

4. Firewall

  • Firewall technologies
  • Introducing the Cisco ASA v9.2
  • Cisco ASA access control and service policies
  • Cisco IOS zone based firewall

5. VPN

  • IPsec technologies
  • Site-to-site VPN
  • Client-based remote access VPN
  • Clientless remote access VPN

6. Advanced Topics

  • Intrusion detection and protection
  • Endpoint protection
  • Content security
  • Advanced network security architectures

Labs

Lab 1: Exploring Cryptographic Technologies

Lab 2: Configure and Verify AAA

Lab 3: Configuration Management Protocols

Lab 4: Securing Routing Protocols

Lab 5: VLAN Security and ACLs on Switches

Lab 6: Port Security and Private VLAN Edge

Lab 7: Securing DHCP, ARP, and STP

Lab 8: Explore Firewall Technologies

Lab 9: Cisco ASA Interfaces and NAT

Lab 10: Site-to-Site VPN

Lab 11: Clientless Remote Access VPN

Lab 12: Configure DHCP Snooping and STP Protection

Lab 13: Configure Interfaces and NAT on the Cisco ASA


CCNP Security (Cisco Certified Network Professional Security)

CCNP Security (New Version)

Exam Number

Exam Name

1. 300-208 SISAS

Implementing Cisco Secure Access Solutions (SISAS)

2. 300-206 SENSS

Implementing Cisco Edge Network Security Solutions (SENSS)

3. 300-209 SIMOS

Implementing Cisco Secure Mobility Solutions (SIMOS)

4. 300-207 SITCS

Implementing Cisco Threat Control Solutions (SITCS)

 1. 300-208 Implementing Cisco Secure Access Solutions (SISAS)

Exam Description: The Implementing Cisco Secure Access Solutions (SISAS) (300-208) exam tests whether a network security engineer knows the components and architecture of secure access by utilizing 802.1X and Cisco TrustSec. This 90-minute exam consists of 65–75 questions. It tests on Cisco Identity Services Engine (ISE) architecture, solution, and components as an overall network threat mitigation and endpoint control solutions. It also includes the fundamental concepts of bring your own device (BYOD) using posture and profiling services of ISE. Candidates can prepare for this exam by taking the Implementing Cisco Secure Access Solutions (SISAS) course.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam.

 

1.0 Identity Management/Secure Access 

1.1 Implement device administration

1.1.a Compare and select AAA options

1.1.b TACACS+

1.1.c RADIUS

1.1.d Describe Native AD and LDAP

1.2 Describe identity management

1.2.a Describe features and functionality of authentication and authorization

1.2.b Describe identity store options (i.e., LDAP, AD, PKI, OTP, Smart Card, local)

1.2.c Implement accounting

1.3 Implement wired/wireless 802.1x

1.3.a Describe RADIUS flows

1.3.b AV pairs

1.3.c EAP types

1.3.d Describe supplicant, authenticator, server

1.3.e Supplicant options

1.3.f 802.1X phasing (monitor mode, low impact, closed mode)

1.3.g AAA server

1.3.h Network access devices

1.4 Implement MAB

1.5 Implement network authorization enforcement

1.5.a dACL

1.5.b Dynamic VLAN assignment

1.5.c Describe SGA

1.5.d Named ACL

1.5.e CoA

1.6 Implement central web authorization

1.7 Implement profiling

1.8 Implement guest services

1.9 Implement posturing

1.10 Implement BYOD access

1.10.a Describe elements of a BYOD policy

1.10.b Device registration

1.10.c My devices portal

1.10.d Describe supplicant provisioning

 

2.0 Threat Defense

2.1 Implement firewall

2.1.a Describe SGA ACLs

 

3.0 Troubleshooting, Monitoring, and Reporting Tools

3.1 Troubleshoot identity management solutions

 

4.0 Threat Defense Architectures

4.1 Design highly secure wireless solution

 

5.0 Identity Management Architectures

5.1 Design AAA security solution

5.2 Design profiling security solution

5.3 Design posturing security solution

5.4 Design BYOD security solution

5.5 Design device administration security solution

5.6 Design guest services security solution

 

2. 300-206 Implementing Cisco Edge Network Security Solutions (SENSS)

Exam Description: The Implementing Cisco Edge Network Security (SENSS) (300-206) exam tests the knowledge of a network security engineer to configure and implement security on Cisco network perimeter edge devices such as a Cisco switch, Cisco router, and Cisco ASA firewall. This 90-minute exam consists of 65-75 questions and focuses on the technologies used to strengthen security of a network perimeter such as Network Address Translation (NAT), ASA policy and application inspect, and a zone-based firewall on Cisco routers. Candidates can prepare for this exam by taking the Cisco Edge Network Security (SENSS) course.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam.

 

1.0 Threat Defense

1.1 Implement firewall

1.1.a Implement ACLs

1.1.b Implement static/dynamic NAT/PAT

1.1.c Implement object groups

1.1.d Describe threat detection features

1.1.3 Implement botnet traffic filtering

1.2 Implement Layer 2 security

1.2.a Configure DHCP snooping

1.2.b Describe dynamic ARP inspection

1.2.c Describe storm control

1.2.d Configure port security

1.2.e Describe common Layer 2 threats and attacks and mitigation

1.2.f Describe MACSec

1.3 Configure device hardening per best practices

1.3.a Routers

1.3.b Switches

  1.3.c Firewalls

1.4 Implement firewall

1.4.a Configure application filtering and protocol inspection

1.4.b Describe virtualized firewalls    

 

2.0 Cisco Security Devices GUIs and Secured CLI Management

2.1 Implement SSHv2, SSL, SNMPv3 access on the network devices

2.2 Implement RBAC on the ASA/IOS CLI and on ASDM

2.3 Describe Cisco Prime Infrastructure

2.4 Describe CSM

2.5 Implement device managers

 

3.0 Management Services on Cisco Devices

3.1 Implement NetFlow exporter

3.2 Implement SNMPv3

3.3 Implement logging

3.4 Implement NTP with authentication

3.5 Describe CDP, DNS, SCP, SFTP, and DHCP

 

4.0 Troubleshooting, Monitoring and Reporting Tools

4.1 Monitor firewall using analysis of packet tracer, packet capture, and syslog

 

5.0 Threat Defense Architectures

5.1 Design a firewall solution

5.2 Design Layer 2 security solution

 

6.0 Security Components and Considerations

6.1 Describe security operations management architecture

6.2 Describe Data Center security components and considerations

6.3 Describe Collaboration security components and considerations

6.4 Describe common IPv6 security considerations

  

3. 300-209 Implementing Cisco Secure Mobility Solutions (SIMOS)

Exam Description: The Implementing Cisco Secure Mobility Solutions (SIMOS) (300-209) exam tests a network security engineer on the variety of Virtual Private Network (VPN) solutions that Cisco has available on the Cisco ASA firewall and Cisco IOS software platforms. This 90-minute exam consists of 65–75 questions and assesses the knowledge necessary to properly implement highly secure remote communications through VPN technology, such as remote access SSL VPN and site-to-site VPN (DMVPN, FlexVPN). Candidates can prepare for this exam by taking the Implementing Cisco Secure Mobility Solutions (SIMOS) course.

The following topics are general guidelines for the content likely to be included on the exam.

 

1.0 Secure Communications

1.1 Implement site-to-site VPNs on routers and firewalls

1.1.a Describe GETVPN

1.1.b Implement IPsec (with IKEv1 and IKEv2)

1.1.c Implement DMVPN (hub-Spoke and spoke-spoke)

1.2 Implement remote access VPNs on routers and firewalls

1.2.a Implement AnyConnect IKEv2 VPNs

1.2.b Implement SSLVPN: client and clientless

1.3 Implement site-to-site VPNs on routers and firewalls

1.3.a Implement FlexVPN

1.4 Implement remote access VPNs on routers and firewalls

1.4.a Implement SSLVPN: client and clientless

1.4.b Implement FLEX VPN

 

2.0 Troubleshooting, Monitoring, and Reporting Tools

2.1 Analyze syslog and VPN debug logs using ASDM

 

3.0 Secure Communications Architectures

3.1 Design site-to-site VPN solution

3.2 Design remote access VPN solution

3.3 Describe encryption, hashing, NGE

 

4. 300-207 Implementing Cisco Threat Control Solutions (SITCS)

Exam Description: The Implementing Cisco Threat Control Solutions (SITCS) (300-207) exam tests a network security engineer on advanced firewall architecture and configuration with the Cisco next-generation firewall, utilizing access and identity policies. This 90-minute exam consists of 65–75 questions and covers integration of Intrusion Prevention System (IPS) and context-aware firewall components, as well as Web (Cloud) and Email Security solutions. Candidates can prepare for this exam by taking the Implementing Cisco Threat Control Solutions (SITCS) course.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam.

 

1.0 Content Security

1.1 Implement Cisco CX

1.1.a Describe features and functionality

1.1.b Implement web usage control

1.1.c Implement AVC

1.1.d Implement decryption policies

1.1.e Describe traffic redirection and capture methods

1.2 Implement Cisco Cloud Web Security

1.2.a Describe features and functionality

1.2.b Implement IOS and ASA connectors

1.2.c Implement AnyConnect web security module

1.2.d Describe web usage control

1.2.e Describe AVC

1.2.f Describe anti-malware

1.2.g Describe decryption policies

1.3 Implement Cisco WSA

1.3.a Implement data security

1.3.b Describe traffic redirection and capture methods

1.4 Implement Cisco ESA

1.4.a Describe features and functionality

1.4.b Implement email encryption

1.4.c Implement anti-spam policies

1.4.d Implement virus outbreak filter

1.4.e Implement DLP policies

1.4.f Implement anti-malware                

1.4.g Implement inbound and outbound mail policies and authentication

1.4.h Describe traffic redirection and capture methods

 

2.0 Threat Defense

2.1 Implement network IPS

2.1.a Describe traffic redirection and capture methods

2.1.b Configure network IPS

2.1.c Describe signatures

2.1.d Implement event actions

2.1.e Configure event action overrides

2.1.f Implement risk ratings

2.1.g Describe router-based IPS

2.2 Configure device hardening per best practices

2.2.a IPS

2.2.b Content Security appliances

2.3 Implement Network IPS

2.3.a Describe signatures

2.3.b Configure blocking

2.3.c Implement anomaly detection

 

3.0 Devices GUIs and Secured CLI

3.1 Implement Content Security

 

4.0 Troubleshooting, Monitoring, and Reporting Tools

4.1 Configure IME and IP logging for IPS

4.2 Monitor Content Security

4.3 Monitor Cisco Security IntelliShield

 

5.0 Threat Defense Architectures

5.1 Design IPS solution

 

6.0 Content Security Architectures

6.1 Design Web Security solution

6.2 Design Email Security solution

6.3 Design Application Security solution

 

We assure your best learning. If you have any quire please feel free to call # +88 01711-452688


CCNA Data Center

CCNA Data Center

 

1. 640-911 DCICN   Introducing Cisco Data Center Networking (DCICN)

Course Outline

  • Module 1: Building a Simple Network (7 lessons)
  • Module 2: Implementing a Switched Network (6 lessons)
  • Module 3: IP Addressing (4 lessons)
  • Module 4: Routing on the Cisco Nexus Switch (4 lessons)

 

2. 640-916 DCICT   Introducing Cisco Data Center Technologies (DCICT)

 Course Outline

  • Module 1: Cisco Data Center Fundamentals Concepts (11 lessons)
  • Module 2: Data Center Unified Fabric (5 lessons)
  • Module 3: Storage Networking (8 lessons)
  • Module 4: DC Virtualization (4 lessons)
  • Module 5: Unified Computing (7 lessons)

 

For more details visit:

http://www.cisco.com/c/en/us/training-events/training-certifications/certifications/associate/ccna-data-center.html


CCIE Routing and Switching

1.0  Layer 2 Technologies

1.1  LAN switching technologies

 1.1.a  Implement and troubleshoot switch administration

1.1.a (i)  Managing MAC address table

1.1.a (ii)    errdisable recovery

1.1.a (iii)  L2 MTU

1.1.b   Implement and troubleshoot layer 2 protocols

1.1.b (i)  CDP, LLDP

1.1.b (ii)  UDLD

1.1.c   Implement and troubleshoot VLAN

1.1.c (i)  access ports

1.1.c (ii)  VLAN database

1.1.c (iii)  normal, extended VLAN, voice VLAN

1.1.d   Implement and troubleshoot trunking

1.1.d (i)  VTPv1, VTPv2, VTPv3, VTP pruning

1.1.d (ii)  dot1Q

1.1.d (iii)  Native VLAN

1.1.d (iv)  Manual pruning

1.1.e   Implement and troubleshoot etherchannel

1.1.e (i)  LACP, PAgP, manual

1.1.e (ii)  layer 2, layer 3

1.1.e (iii)  load-balancing

1.1.e (iv)  etherchannel misconfiguration guard

1.1.f  Implement and troubleshoot spanning-tree

1.1.f (i)  PVST+/RPVST+/MST

1.1.f (ii)  switch priority, port priority, path cost, STP timers

1.1.f (iii)  port fast, BPDUguard, BPDUfilter

1.1.f (iv)  loopguard, rootguard

1.1.g   Implement and troubleshoot other LAN switching technologies

1.1.g (i)  SPAN, RSPAN, ERSPAN

 

1.2  Layer 2 Multicast

1.2.a  Implement and troubleshoot IGMP

1.2.a (I)  IGMPv1, IGMPv2, IGMPv3

1.2.a (ii)  IGMP snooping

1.2.a (iii)  IGMP querier

1.2.a (iv)  IGMP filter

1.2.a (v)  IGMP proxy

 

1.3  Layer 2 WAN circuit technologies

1.3.a  Implement and troubleshoot HDLC

1.3.b  Implement and troubleshoot PPP

1.3.b (i)  authentication (PAP, CHAP)

1.3.b (ii)  PPPoE

1.3.b (iii)  MLPPP

 

1.4  Troubleshooting layer 2 technologies

1.4.a  Use IOS troubleshooting tools

1.4.a (i)  debug, conditional debug

1.4.a (ii)  ping, traceroute with extended options

1.4.a (iii)  Embedded packet capture

1.4.b  Apply troubleshooting methodologies

1.4.b (i)  Diagnose the root cause of networking issue (analyze symptoms,

                                                            identify and describe root cause)

1.4.b (ii)  Design and implement valid solutions according to constraints

1.4.b (iii)  Verify and monitor resolution

1.4.c  Interpret packet capture

1.4.c (i)  Using wireshark trace analyzer

1.4.c (ii)  Using IOS embedded packet capture

 

40%  2.0  Layer 3 Technologies

2.1  Addressing technologies

2.1.a  Identify, implement and troubleshoot IPv4 addressing and sub-netting

2.1.a (i)  Address types, VLSM

2.1.a (ii)  ARP

2.1.b  Identify, implement and troubleshoot IPv6 addressing and sub-netting

2.1.b (i)  Unicast, multicast

2.1.b (ii)  EUI-64

2.1.b (iii)  ND, RS/RA

2.1.b (iv)  Autoconfig/SLAAC temporary addresses (RFC4941)

2.1.b (v)  Global prefix configuration feature

 

2.2  Layer 3 Multicast

2.2.a  Troubleshoot reverse path forwarding

2.2.a (i)  RPF failure

2.2.a(ii)  RPF failure with tunnel interface 

2.2.b  Implement and troubleshoot IPv4 protocol independent multicast

2.2.b (i)  PIM dense mode, sparse mode, sparse-dense mode

2.2.b (ii)  Static RP, auto-RP, BSR

2.2.b (iii)  Bidirectional PIM

2.2.b (iv)  Source-specific multicast

2.2.b (v)  Group to RP mapping

2.2.b (vi)  Multicast boundary

2.2.c  Implement and troubleshoot multicast source discovery protocol

2.2.c.(i)  Intra-domain MSDP (anycast RP)

2.2.c.(ii)  SA filter

 

2.3  Fundamental routing concepts

2.3.a  Implement and troubleshoot static routing

2.3.b  Implement and troubleshoot default routing

2.3.c  Compare routing protocol types

2.3.c (i)  distance vector

2.3.c (ii)  link state

2.3.c (iii)  path vector

2.3.d  Implement, optimize and troubleshoot administrative distance

2.3.e  Implement and troubleshoot passive interface

2.3.f  Implement and troubleshoot VRF lite

2.3.g  Implement, optimize and troubleshoot filtering with any routing protocol

2.3.h  Implement, optimize and troubleshoot redistribution between any routing

                                      protocol

2.3.i  Implement, optimize and troubleshoot manual and auto summarization                              with  any routing protocol

2.3.j  Implement, optimize and troubleshoot policy-based routing

2.3.k  Identify and troubleshoot sub-optimal routing

2.3.l  Implement and troubleshoot bidirectional forwarding detection

2.3.m  Implement and troubleshoot loop prevention mechanisms

2.3.m (i)  Route tagging, filtering

2.3.m (ii)  Split horizon

2.3.m (iii)  Route poisoning

2.3.n  Implement and troubleshoot routing protocol authentication

2.3.n (i)  MD5

2.3.n (ii)  key-chain

2.3.n (iii)  EIGRP HMAC SHA2-256bit

2.3.n (iv)  OSPFv2 SHA1-196bit

2.3.n (v)  OSPFv3 IPsec authentication

 

 

2.4  RIP v2

2.4.a  Implement and troubleshoot RIPv2

 

2.5  EIGRP (for IPv4 and IPv6)

2.5.a  Describe packet types

2.5.a (i)  Packet types (hello, query, update, and such)

2.5.a (ii)  Route types (internal, external)

2.5.b  Implement and troubleshoot neighbor relationship

2.5.b (i)  Multicast, unicast EIGRP peering

2.5.c  Implement and Troubleshoot Loop free path selection

2.5.c (i)  RD, FD, FC, successor, feasible successor

2.5.c (ii)  Classic metric

2.5.c (iii)  Wide metric

2.5.d  Implement and troubleshoot operations

2.5.d (i)  General operations

2.5.d (ii)  Topology table, update, query, active, passive

2.5.d (iii)  Stuck in active

2.5.d (iv)  Graceful shutdown

2.5.e  Implement and troubleshoot EIGRP stub

2.5.e (i)  stub

2.5.e (ii)  leak-map

2.5.f  Implement and troubleshoot load-balancing

2.5.f (i)  equal-cost

2.5.f (ii)  unequal-cost

2.5.f (iii)  add-path

2.5.g  Implement EIGRP (multi-address) named mode

2.5.g (i)  Types of families

2.5.g (ii)  IPv4 address-family

2.5.g (iii)  IPv6 address-family

2.5.h  Implement, troubleshoot and optimize EIGRP convergence and scalability

2.5.h (i)  Describe fast convergence requirements

2.5.h (ii)  Control query boundaries

2.5.h (iii)  IP FRR/fast reroute (single hop)

2.5.h (iv)  Summary leak-map

2.5.h (v)  Summary metric

 

2.6  OSPF (v2 and v3)

2.6.a  Describe packet types

2.6.a (i)  LSA types (1, 2, 3, 4, 5, 7, 9)

2.6.a (ii)  Route types (N1, N2, E1, E2)

2.6.b  Implement and troubleshoot neighbor relationship

2.6.c  Implement and troubleshoot OSPFv3 address-family support

2.6.c (i)  IPv4 address-family

2.6.c (ii)  IPv6 address-family

2.6.d  Implement and troubleshoot network types, area types and router types

2.6.d (i)  Point-to-point, multipoint, broadcast, non-broadcast

              2.6.d (ii)  LSA types, area type: backbone, normal, transit, stub, NSSA, totally stub

2.6.d (iii)  Internal router, ABR, ASBR

2.6.d (iv)  Virtual link

2.6.e  Implement and troubleshoot path preference

2.6.f  Implement and troubleshoot operations

2.6.f (i)  General operations

2.6.f (ii)  Graceful shutdown

2.6.f (iii)  GTSM (generic TTL security mechanism)

2.6.g  Implement, troubleshoot and optimize OSPF convergence and scalability

2.6.g (i)  Metrics

2.6.g (ii)  LSA throttling, SPF tuning, fast hello

2.6.g (iii)  LSA propagation control (area types, ISPF)

2.6.g (iv)  IP FR/fast reroute (single hop)

2.6.g (v)  LFA/loop-free alternative (multi hop)

2.6.g (vi)  OSPFv3 prefix suppression

 

2.7  BGP

2.7.a  Describe, implement and troubleshoot peer relationships

2.7.a (i)  Peer-group, template

2.7.a (ii)  Active, passive

2.7.a (iii)  States, timers

2.7.a (iv)  Dynamic neighbors

2.7.b  Implement and troubleshoot IBGP and EBGP

2.7.b (i)  EBGP, IBGP

2.7.b (ii)  4 bytes AS number

2.7.b (iii)  Private AS

2.7.c  Explain attributes and best-path selection

2.7.d  Implement, optimize and troubleshoot routing policies

2.7.d (i)  Attribute manipulation

2.7.d (ii)  Conditional advertisement

2.7.d (iii)  Outbound route filtering

2.7.d (iv)  Communities, extended communities

2.7.d (v)  Multi-homing

2.7.e  Implement and troubleshoot scalability

2.7.e (i)  Route-reflector, cluster

2.7.e (ii)  Confederations

2.7.e (iii)  Aggregation, AS set

2.7.f  Implement and troubleshoot multi-protocol BGP

2.7.f (i)  IPv4, IPv6, VPN address-family

2.7.g  Implement and troubleshoot AS path manipulations

2.7.g (i)  Local AS, allow AS in, remove private AS

2.7.g (ii)  Prepend

2.7.g (iii)  Regexp

2.7.h  Implement and Troubleshoot Other Features

2.7.h (i)  Multipath

2.7.h (ii)  BGP synchronization

2.7.h (iii)  Soft reconfiguration, route refresh

 

2.8  Troubleshooting layer 3 technologies

2.8.a  Use IOS troubleshooting tools

2.8.a (i)  debug, conditional debug

2.8.a (ii)  ping, traceroute with extended options

2.8.a (iii)  Embedded packet capture

2.8.b  Apply troubleshooting methodologies

2.8.b (i)  Diagnose the root cause of networking issue (analyze symptoms,

                                                            identify and describe root cause)

2.8.b (ii)  Design and implement valid solutions according to constraints

2.8.b (iii)  Verify and monitor resolution

2.8.c  Interpret packet capture

2.8.c (i)  Using wireshark trace analyzer

2.8.c (ii)  Using IOS embedded packet capture

 

20%  3.0  VPN Technologies

3.1  Tunneling

3.1.a  Implement and troubleshoot MPLS operations

3.1.a (i)  Label stack, LSR, LSP

3.1.a (ii)  LDP

3.1.a (iii)  MPLS ping, MPLS traceroute

3.1.b  Implement and troubleshoot basic MPLS L3VPN

3.1.b (i)  L3VPN, CE, PE, P

3.1.b (ii)  Extranet (route leaking)

3.1.c  Implement and troubleshoot encapsulation

3.1.c (i)  GRE

3.1.c (ii)  Dynamic GRE

3.1.d  Implement and troubleshoot DMVPN (single hub)

3.1.d (i)  NHRP

3.1.d (ii)  DMVPN with IPsec using preshared key

3.1.d (iii)  QoS profile

3.1.d (iv)  Pre-classify

 

3.2  Encryption

3.2.a  Implement and troubleshoot IPsec with preshared key

3.2.a (i)  IPv4 site to IPv4 site

3.2.a (ii)  IPv6 in IPv4 tunnels

3.2.a (iii)  Virtual tunneling interface (VTI)

 

3.3  Troubleshooting VPN technologies

3.3.a  Use IOS troubleshooting tools

3.3.a (i)  debug, conditional debug

3.3.a (ii)  ping, traceroute with extended options

3.3.a (iii)  Embedded packet capture

3.3.b  Apply troubleshooting methodologies

3.3.b (i)  Diagnose the root cause of networking issue (analyze symptoms,

                                                            identify and describe root cause)

3.3.b (ii)  Design and implement valid solutions according to constraints

3.3.b (iii)  Verify and monitor resolution

3.3.c  Interpret packet capture

3.3.c (i)  Using wireshark trace analyzer

3.3.c (ii)  Using IOS embedded packet capture

 

5%  4.0  Infrastructure Security

4.1  Device security

4.1.a  Implement and troubleshoot IOS AAA using local database

4.1.b  Implement and troubleshoot device access control 

4.1.b (i)  Lines (VTY, AUX, console)

4.1.b (ii)  SNMP

4.1.b (iii)  Management plane protection

4.1.b (iv)  Password encryption

4.1.c  Implement and troubleshoot control plane policing

 

4.2  Network security

4.2.a  Implement and troubleshoot switch security features

4.2.a (i)  VACL, PACL

4.2.a (ii)  Stormcontrol

4.2.a (iii)  DHCP snooping

4.2.a (iv)  IP source-guard

4.2.a (v)  Dynamic ARP inspection

4.2.a (vi)  Port-security

4.2.a (vii)  Private VLAN

4.2.b  Implement and troubleshoot router security features

4.2.b (i)  IPv4 access control lists (standard, extended, time-based)

4.2.b (ii)  IPv6 traffic filter

4.2.b (iii)  Unicast reverse path forwarding

4.2.c  Implement and troubleshoot IPv6 first hop security

4.2.c (i)  RA guard

4.2.c (ii)  DHCP guard

4.2.c (iii)  Binding table

4.2.c (iv)  Device tracking

4.2.c (v)  ND inspection/snooping

4.2.c (vi)  Source guard

4.2.c (vii)  PACL

 

4.3  Troubleshooting infrastructure security

4.3.a  Use IOS troubleshooting tools

4.3.a (i)  debug, conditional debug

4.3.a (ii)  ping, traceroute with extended options

4.3.a (iii)  Embedded packet capture

4.3.b  Apply troubleshooting methodologies

4.3.b (i)  Diagnose the root cause of networking issue (analyze symptoms,

                                                           identify and describe root cause)

4.3.b (ii)  Design and implement valid solutions according to constraints

4.3.b (iii)  Verify and monitor resolution

4.3.c  Interpret packet capture

4.3.c (i)  Using wireshark trace analyzer

4.3.c (ii)  Using IOS embedded packet capture

 

15%  5.0  Infrastructure Services

5.1  System management

5.1.a  Implement and troubleshoot device management

5.1.a (i)  Console and VTY

5.1.a (ii)  telnet, HTTP, HTTPS, SSH, SCP

5.1.a (iii)  (T)FTP

5.1.b  Implement and troubleshoot SNMP

5.1.b (i)  v2c, v3

5.1.c  Implement and troubleshoot logging

5.1.c (i)  Local logging, syslog, debug, conditional debug

5.1.c (ii)  Timestamp

 

5.2  Quality of service

5.2.a  Implement and troubleshoot end to end QoS

5.2.a (i)  CoS and DSCP mapping

5.2.b  Implement, optimize and troubleshoot QoS using MQC

5.2.b (i)  Classification

5.2.b (ii)  Network based application recognition (NBAR)

5.2.b (iii)  Marking using IP precedence, DSCP, CoS, ECN

5.2.b (iv)  Policing, shaping

5.2.b (v)  Congestion management (queuing)

5.2.b (vi)  HQoS, sub-rate ethernet link

5.2.b (vii)  Congestion avoidance (WRED)

 

5.3  Network services

5.3.a  Implement and troubleshoot first-hop redundancy protocols

5.3.a (i)  HSRP, GLBP, VRRP

5.3.a (ii)  Redundancy using IPv6 RS/RA

5.3.b  Implement and troubleshoot network time protocol

5.3.b (i)  NTP master, client, version 3, version 4

5.3.b (ii)  NTP authentication

5.3.c  Implement and troubleshoot IPv4 and IPv6 DHCP

5.3.c (i)  DHCP client, IOS DHCP server, DHCP relay

5.3.c (ii)  DHCP options

5.3.c (iii)  DHCP protocol operations

5.3.c (iv)  SLAAC/DHCPv6 interaction

5.3.c (v)  Stateful, stateless DHCPv6

5.3.c (vi)  DHCPv6 prefix delegation

5.3.d  Implement and troubleshoot IPv4 network address translation

5.3.d (i)  Static NAT, dynamic NAT, policy-based NAT, PAT

5.3.d (ii)  NAT ALG

 

5.4  Network optimization

5.4.a  Implement and troubleshoot IP SLA

5.4.a (i)  ICMP, UDP, jitter, VoIP

5.4.b  Implement and troubleshoot tracking object

5.4.b (i)  Tracking object, tracking list

5.4.b (ii)  Tracking different entities (e.g. interfaces, routes, IPSLA, and such)

5.4.c  Implement and troubleshoot netflow

5.4.c (i)  Netflow v5, v9

5.4.c (ii)  Local retrieval

5.4.c (iii)  Export (configuration only)

5.4.d  Implement and troubleshoot embedded event manager

5.4.d (i)  EEM policy using applet

 

5.5  Troubleshooting infrastructure services

5.5.a  Use IOS troubleshooting tools

5.5.a (i)  debug, conditional debug

5.5.a (ii)  ping, traceroute with extended options

5.5.a (iii)  Embedded packet capture

5.5.b  Apply troubleshooting methodologies

5.5.b (i)  Diagnose the root cause of networking issue (analyze symptoms,

                                                           identify and describe root cause)

5.5.b (ii)  Design and implement valid solutions according to constraints

5.5.b (iii)  Verify and monitor resolution

5.5.c  Interpret packet capture

5.5.c (i)  Using wireshark trace analyzer

5.5.c (ii)  Using IOS embedded packet capture


Close

ADMISSION FORM



* Name :
Parent/Guardian :
Permanent Address :
* Current Address :
* Email :
* Phone :
* Course Title :
Sex :
Date of Birth :
Computer Knowledge :
Reference :
* Last Education :
* Occupation :
Terms & Condition:
  1. Studentship will be terminated if two uninterrupted weeks are absent.
  2. Students are bound to follow the given class schedule.


Close
965/1, Shewrapara, Kafrul, Dhaka -1216

CONTACT FORM

Personal Information
* Name :
Professional Information
Office :
Designation :
Contact Information
* Mobile :
* Email :
Academic Information
Last Education :
Other Qualification :


Close
965/1, Shewrapara, Kafrul, Dhaka -1216

AT Computer Training Survey

Student Information
* Name :
Email :
* Student ID :
Contract Number :
Course :
Section One: Instructor

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

Please share any comments you have about the instructor:
Section Two: Curriculum

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

  • No. There was not nearly enough time.
  • No. There was not enough time.
  • Yes
  • No. There was not enough material.
  • No. There was not nearly enough material.

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

Please share any comments you have on the training format and materials:
Section Three: Facility

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

left arrowstrongly agree

strongly disagreeright arrow

  • 5

  • 4

  • 3

  • 2

  • 1

Please share any comments you have about the facilities:
Section Four: Overall
Suggestion box: Our model is continual improvement. We invite you to suggest specific improvements.


Please share any comments you have about the facilities:


Please share any comments you have about the facilities:
Close

Forgot ID or Password ?
Don't have account?
Close
Close

0.1093