Courses

We currently offers the following courses

alt text

CCNA

Duration: 42 days (Normal Track)
12 weeks (Weekend Track)

Networking is the practice of connecting computer devices together to support communication among them.

  • Overview
  • Communication Protocols
  • Transmission Media
  • Networking Devices

Subnetting is the process of dividing an IP network into smaller networks called Subnets.

  • Overview
  • Importance of Subnetting
  • Subnet zero
  • Importance of Subnet Mask
  • Classful / Classless addressing
  • VLSM

Routing is the act of moving data across an internetwork from a source to a destination.

  • Overview
  • Understanding the Routing Table
  • Types of Routing
  • Static Routing
  • Disadvantages of Static Routing

When a host transmits data across a network to another device, data is encapsulated with several headers and trailers.

  • Overview
  • OSI Reference Model
  • Encapsulation
  • Decapsulation
  • Connection Oriented Protocol
  • Connectionless Protocol

Dynamic routing is the process of learning routing information automatically with the help of routing protocols.

  • Overview
  • Classes of routing protocols
  • RIP
  • IGRP
  • EIGRP
  • OSPF
  • Route summarization
  • Route Redistribution
  • Load Balancing

A switch is a device that forwards frames from any of input ports to specific output port based on MAC address.

  • Overview
  • Functions of Switch
  • Broadcast Domain
  • Collision Domain
  • Spanning Tree Protocol
  • VLAN
  • Trunking
  • VTP
  • InterVlan Routing

Packet filtering is a network security mechanism that works by controlling which data can flow to and from a network.

  • Overview
  • Access Control Lists
  • Standard ACL
  • Extended ACL
  • Named ACL

Network address translation (NAT) allows a router to modify packets to allow for multiple devices to share a single public IP address.

  • Overview
  • Static NAT
  • Dynamic NAT
  • Dynamic NAT with Overload
  • Port Address Translation

It is a network protocol to automatically assign an IP address to a computer.

  • Overview
  • Static Configuration
  • Dynamic Configuration
  • Address Pool
  • Exclusions
  • Address Lease
  • DHCP Relay Agent

It is a new version of Internet protocol designed for larger address space.

  • Overview
  • Link Local Unicast
  • Site Local Unicast
  • Global Unicast
  • Multicast
  • Static Routing
  • IPv6 to IPv4 tunneling

A wide area network is a network that covers a broad area.

  • Overview
  • Leased Line
  • Packet Switching
  • Circuit Switching
  • PPP
  • HDLC
  • Frame Relay

A virtual private network is a mechanism for providing secure communication over the Internet.

  • Overview
  • Cryptography
  • VPN Phases
  • ISAKMP
  • IPSec
  • Encapsulating Security Payload
  • Authentication Header
alt text

CCNP - Routing

22 days (Normal Track)
5 weeks (Weekend Track)

OSPF is an open standard, Link state routing protocol uses shortest path first algorithm to determine its best path to each network.

  • Dijkstra Algorithm
  • Metric Calculation
  • OSPF Single Area & Multi Area
  • Virtual link
  • OSPF LSA Types
  • OSPF Network Types
  • OSPF Area types
  • Passive Interface
  • OSPF Summarization
  • OSPF Authentication
  • OSPF Filtering

EIGRP is an advanced distance vector routing protocol developed by CISCO that converges quickly.

  • DUAL Algorithm
  • Metric Calculation
  • Default Route
  • EIGRP over Frame Relay
  • EIGRP Stub
  • Passive Interface
  • EIGRP Summarization
  • EIGRP Authentication
  • EIGRP Filtering
  • EIGRP Load Balancing

BGP is a path vector protocol, an exterior gateway protocol used for routing between autonomous systems.

  • IBGP
  • EBGP
  • BGP Next Hop Selection
  • BGP Synchronization Rule
  • BGP Path Selection
  • BGP Attributes
  • Private AS
  • Public AS
  • BGP Confederation Peers
  • BGP Filtering
  • BGP Authentication
  • Route Redistribution
  • Policy Based Routing
  • Controlling Routing Updates
  • Administrative Distance

It is a new version of Internet protocol designed for larger address space.

  • Address Representation
  • Address types
  • Link Local Unicast
  • Site Local Unicast
  • Global Unicast
  • Multicast
  • Prefix length
  • Interface ID
  • Static Routing
  • IPv6 Routing Protocols
  • Integration of IPv4 and IPv6 networks

A virtual private network is a mechanism for providing secure communication over the Internet.

  • Cryptography
  • Privacy
  • Integrity
  • Non Repudiation
  • Authentication
  • VPN Phases
  • ISAKMP
  • IPSec
  • Encapsulating Security Payload
  • Authentication Header
  • Site to Site VPN
  • Site to Client VPN
alt text

CCNP - Switching

22 days (Normal Track)
5 weeks (Weekend Track)

A switch is a device that forwards frames from any of input ports to specific output port based on MAC address.

  • Overview
  • Functions of Switch
  • Methods of Switching
  • Multilayer Switching
  • Ethernet Technology

A VLAN is a logical LAN which is used to segment the broadcast domain.

  • Overview
  • VLAN Database
  • Static VLAN
  • Dynamic VLAN
  • Advantages of VLAN

A trunk is point - to - point link that carries traffic for more than one VLAN.

  • Overview
  • Trunking Protocols
  • Dynamic Trunking Protocol (DTP)
  • Native VLAN

VLAN Trunking Protocol runs over trunk links and synchronizes the VLAN databases of all switches in the VTP domain.

  • Overview
  • VTP Modes
  • VTP Domain Name
  • VTP Configuration Revision Number
  • VTP Version

STP is used to avoid loops in the switched network and to provide redundancy.

  • Overview
  • STP Election
  • PVST
  • RSTP
  • MST
  • Port Fast
  • Uplink fast
  • Backbone Fast
  • BPDU filter
  • BPDU Guard
  • Root Guard
  • Loop Guard
  • UDLD

An Etherchannel is a way of combining several physical links between switches into one logical connection.

  • Overview
  • Port Aggregation Protocol (PAgP)
  • Link Aggregation Control Protocol (LACP)

InterVLAN Routing is used to enable communication between different VLANs.

  • Overview
  • Router On a stick
  • Routed Ports
  • Switched Virtual Interface
  • Multi Layer Switching
  • Cisco Express Forwarding

Gateway Redundancy Protocol is used to provide L3 Redundancy and Load balancing.

  • Overview
  • Hot Standby Router Protocol
  • Virtual Router Redundancy Protocol
  • Gateway Load Balancing Protocol
  • Preempt
  • Interface Tracking

It is to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources.

  • Overview
  • MAC Address Flooding Attack
  • Port Security
  • Port Based Authentication
  • Spoofing Attacks
  • DHCP Snooping
  • VACL
  • Private VLANs
  • Dynamic ARP Inspection

Voice VLAN enables access ports to carry IP voice traffic from an IP Phone.

  • Overview
  • IP Phone
  • Voice VLAN
  • Quality of Service
  • DSCP
  • COS
  • Power over Ethernet

Wireless LAN transmits and receives using radio or infrared signals sent through an access point (AP).

  • Overview
  • Access Point
  • Service Set Identifier (SSID)
  • Cell
  • Client Connectivity
  • AdHOC Mode
  • Infrastructure Mode
  • IEEE 802.11a/ b/ g
  • Autonomous AP
  • Lightweight AP
alt text

Check Point

22 days (Normal Track)
5 weeks (Weekend Track)

When a host transmits data across a network to another device, data is encapsulated with several headers and trailer.

  • Overview
  • OSI Reference Model
  • Encapsulation
  • Decapsulation
  • Connection Oriented Protocol
  • Connectionless Protocol

Check Point software is designed to work across multiple platforms. Each installation differs depending on the product and the platform.

  • Stateful Inspection Technology
  • Standalone Deployment
  • Distributed Deployment
  • Secure Platform
  • Security Gateway
  • Security Management Server
  • Secure Internal Communication

The firewall rule base should be as simple as possible. The fewer rules you have the more efficient and less error prone the rule base will be.

  • Smart Dashboard
  • Node Object
  • Network Object
  • Service Object
  • Accept
  • Drop
  • Implied Rule
  • Stealth Rule

Network address translation (NAT) allows a router to modify packets to allow for multiple devices to share a single public IP address.

  • Overview
  • Static NAT
  • Hide Mode NAT
  • Manual NAT
  • Automatic NAT

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be.

  • Overview
  • User Authentication
  • Session Authentication
  • Client Authentication

A Virtual Private Network is a mechanism for providing secure communication over the Internet.

  • Overview
  • Cryptography
  • VPN Phases
  • ISAKMP
  • IPSec
  • Encapsulating Security Payload
  • Authentication Header
  • Site to Site VPN
  • Site to Client VPN

A cluster is two or more interconnected computers that create a solution to provide higher availability, higher scalability or both.

  • Security Cluster
  • Cluster Member
  • Cluster Synchronization
  • High Availability
  • Load Sharing

Content security extends data inspection to the highest level, protecting users from viruses while providing granular access control to the Internet.

  • Overview
  • Content Security for Web
  • Content Security for FTP
  • Content Security for SMTP

Protecting database against data loss and reconstructing the database after any kind of data loss.

It is the process of moving from the use of one operating environment to another operating environment.

  • Overview
  • Migration from R65 to R71
  • Management High Availability
  • Primary Smart Center Server
  • Secondary Smart Center Server
  • Log Server
alt text

MCITP

52 days (Normal Track)
15 weeks (Weekend Track)