<div style="margin:20px 0 0 200px"> To view the site, enable JavaScript by changing your browser options, then <a href="">Try Again</a>.</div>

Networking is the most effective study curriculum to have an in depth knowledge about Networking. The module is authorized by Cisco, the Numero Uno of Networking World, and it focuses mainly on how to implement the technologies required for Local Area Networks and Internet. It is a pure practical based industry oriented module which also clarifies the basic and vital theoretical concepts of Networking. The curriculum is ideal for any individual (either student or professional from any academic background), desiring to get a first level entry into Networking Jobs. Equipped with Networking knowledge students will be able to get Network Administrator jobs in Core Networking, IT/ITES, Software and even Non-IT Industry.

None of the other IT Vendors have designed such a well structured industry based study curriculum. Cisco Routing and Switching commands are pretty simple to master and after learning Networking, students will be 100% confident and efficient on handling Cisco networking devices as well as a wide array of related networking devices produced by different vendors.

Ethical Hacking and Countermeasures course mission is to educate, introduce and demonstrate hacking tools for penetration testing purposes only. Prior to attending this course, you will be asked to sign an agreement stating that you will not use the newly acquired skills for illegal or malicious attacks. If you use this skills you can not held us responsible.

Duration

Duration

40 hours - 2 classes per week

Eligibility

Eligibility

Open to all, specially for non-tech users

Course Fees

Course Fees

Rs.24,500/-
Inclusive of all taxes

Course Details of Module 1

  • Layers of OSI model
  • Layers of TCP/IP model
  • Relationship between OSI model and TCP/IP model
  • Logical and Physical Network
  • LAN and WAN
  • Private and Public Network
  • Collision Domain and Broadcast Domain
  • Networking Devices (Router, Switch, Hub, Modem)
  • Networking Media - Cable (Copper and Fiber Optics), Wireless Waves
  • Static IP address and DHCP IP address
  • Types of IP address - IPv4 and IPv6, Private and Public IP address, Unicast, Multicast, Broadcast and Anycast, Class A, B, C, D, E, Classfull and Classless IP address
  • Subnet Mask and Subnetting
  • Supernetting
  • Router Hardware Components and IOS
  • Routing Table and Router Configuration Files
  • Basic Router Management
  • Securing Router with Password
  • IOS backup and Recovery
  • Static Routing and Dynamic Routing
  • Routing Protocols and their types
  • Distance Vector, Link State, Hybrid and Path Vector Routing Protocols
  • Classfull and Classless Routing Protocols
  • Interior Gateway Protocol and Exterior Gateway Protocol
  • Working Logic and Route Cost
  • RIP v1 and RIPv2
  • Basic configuration
  • Route Summarization and Default Route
  • Working Logic and Route Cost
  • OSPF Area
  • Designated Router and Backup Designated Router
  • Basic configuration
  • Route Summarization and Default Route
  • Working Logic and Route Cost
  • Successor and Feasible Successor Route
  • Unequal Cost Load Balancing
  • Interface Bandwidth Limiting
  • Basic Configuration
  • Route Summarization and Default Route
  • Working Logic
  • IBGP and EBGP
  • Basic Configuration
  • Working Logic
  • Standard ACL and Extended ACL
  • Placement of ACL
  • Configuration
  • Public and Private IP
  • Static Nat
  • Dynamic Nat
  • Port Address Translation (PAT)
  • Inside and Outside NAT
  • Port Forwarding
  • Configuration
  • Concepts and Advantages of VPN
  • Site To Site VPN and Remote Access VPN
  • Intranet and Extranet VPN
  • Simple Tunnel Network Configuration
  • Serial Cable using HDLC or PPP
  • Serial Cable using Frame-relay
  • Digital Subscriber Line (DSL) with Asynchronous Transfer Mode (ATM)
  • Metro Ethernet
  • Multi Protocol Label Switching (MPLS)
  • Types of Switching
  • Switch Hardware Components
  • Basic Switch Configuration
  • 1Securing a Switch by Password
  • Accessing a switch via Telnet
  • Content Addressable Memory (CAM) Table
  • CAM Table management
  • Securing Switch Ports by Port Security
  • VLAN concepts, VLAN.DAT
  • Inter VLAN Routing
  • VLAN Trunking and VLAN Trunking Protocol (VTP)
  • VTP Domain and VTP Server, VTP Client, VTP Transparent
  • How a Layer 2 Loop happens
  • Role of STP to eliminate Layer 2 Loops
  • STP Topology - Root Bridge, Designated Bridge, Root Port, Designated Port
  • Bridge Protocol Data Units (BPDU) and STP Port states
  • How to speed up STP - Portfast, Uplinkfast, Backbonefast, Rapid STP (RSTP)
  • WLAN Concepts
  • Basic Configuration
  • WLAN Security Concepts
  • Benefits of IPv6
  • IPv6 address format
  • Types of IPv6 address - Unicast, Multicast and Anycast, Global and Link Local
  • Configuring Interfaces with IPv6 address

Course Details of Module 2

  • Introduction to Ethical Hacking
  • Legality and Ethics
  • Networking & Basics
  • Foot Printing
  • Google Hacking
  • Scanning
  • Enumeration
  • System Hacking
  • Windows Hacking
  • Trojans & Backdoors
  • Virus & Worms
  • Sniffers
  • Social Engineering
  • Proxy Server & Packet Filtering
  • Denial of Service
  • Social Engineering
  • Phishing
  • Denial of Service Attack
  • Session Hijacking
  • Penetration Testing
  • Vulnerability Assessment
  • Linux Hacking
  • Physical Security
  • Hacking Webservers
  • Web Application Vulnerabilities
  • Web Based password Cracking Techniques
  • SQL Injection Vulnerabilities
  • Cryptography
  • Wireless Network Hacking and Countermeasures
  • Evading IDS, Firewalls and Detecting Honey Pots
  • Buffer Overflows
  • Reverse Engineering
  • Hacking Database Servers
  • Steganography
  • Spying Technologies
  • Hacking Routers and Firewalls
  • Computer Forensics and Incident Handling
  • Botnets
  • Hacking emails
  • Privacy on the Internet
  • Creating Security Policies
  • Exploit Writing
  • Patch Management
  • Covering Tracks

Enroll Now

Fields marked with * are mandatory.