Networking is the most effective study curriculum to have an in depth knowledge about Networking. The module is authorized by Cisco, the Numero Uno of Networking World, and it focuses mainly on how to implement the technologies required for Local Area Networks and Internet. It is a pure practical based industry oriented module which also clarifies the basic and vital theoretical concepts of Networking. The curriculum is ideal for any individual (either student or professional from any academic background), desiring to get a first level entry into Networking Jobs. Equipped with Networking knowledge students will be able to get Network Administrator jobs in Core Networking, IT/ITES, Software and even Non-IT Industry.

None of the other IT Vendors have designed such a well structured industry based study curriculum. Cisco Routing and Switching commands are pretty simple to master and after learning Networking, students will be 100% confident and efficient on handling Cisco networking devices as well as a wide array of related networking devices produced by different vendors.

Ethical Hacking and Countermeasures course mission is to educate, introduce and demonstrate hacking tools for penetration testing purposes only. Prior to attending this course, you will be asked to sign an agreement stating that you will not use the newly acquired skills for illegal or malicious attacks. If you use this skills you can not held us responsible.

Duration

Duration

40 hours-2 classes per week

Eligibility

Eligibility

  1. Open to all, specially for non-tech users
Course Fees

Course Fees

Rs.24,000/-

Module 1 Course Details

Layers of OSI model
Layers of TCP/IP model
Relationship between OSI model and TCP/IP model
Logical and Physical Network
LAN and WAN
Private and Public Network
Collision Domain and Broadcast Domain
Networking Devices (Router, Switch, Hub, Modem)
Networking Media - Cable (Copper and Fiber Optics), Wireless Waves
Static IP address and DHCP IP address
Types of IP address - IPv4 and IPv6, Private and Public IP address, Unicast, Multicast, Broadcast and Anycast, Class A, B, C, D, E, Classfull and Classless IP address
Subnet Mask and Subnetting
Supernetting
Router Hardware Components and IOS
Routing Table and Router Configuration Files
Basic Router Management
Securing Router with Password
IOS backup and Recovery
Static Routing and Dynamic Routing
Routing Protocols and their types
Distance Vector, Link State, Hybrid and Path Vector Routing Protocols
Classfull and Classless Routing Protocols
Interior Gateway Protocol and Exterior Gateway Protocol
Working Logic and Route Cost
RIP v1 and RIPv2
Basic configuration
Route Summarization and Default Route
Working Logic and Route Cost
OSPF Area
Designated Router and Backup Designated Router
Basic configuration
Route Summarization and Default Route
Working Logic and Route Cost
Successor and Feasible Successor Route
Unequal Cost Load Balancing
Interface Bandwidth Limiting
Basic Configuration
Route Summarization and Default Route
Working Logic
IBGP and EBGP
Basic Configuration
Working Logic
Standard ACL and Extended ACL
Placement of ACL
Configuration
Public and Private IP
Static Nat
Dynamic Nat
Port Address Translation (PAT)
Inside and Outside NAT
Port Forwarding
Configuration
Concepts and Advantages of VPN
Site To Site VPN and Remote Access VPN
Intranet and Extranet VPN
Simple Tunnel Network Configuration
Serial Cable using HDLC or PPP
Serial Cable using Frame-relay
Digital Subscriber Line (DSL) with Asynchronous Transfer Mode (ATM)
Metro Ethernet
Multi Protocol Label Switching (MPLS)
Types of Switching
Switch Hardware Components
Basic Switch Configuration
1Securing a Switch by Password
Accessing a switch via Telnet
Content Addressable Memory (CAM) Table
CAM Table management
Securing Switch Ports by Port Security
VLAN concepts, VLAN.DAT
Inter VLAN Routing
VLAN Trunking and VLAN Trunking Protocol (VTP)
VTP Domain and VTP Server, VTP Client, VTP Transparent
How a Layer 2 Loop happens
Role of STP to eliminate Layer 2 Loops
STP Topology - Root Bridge, Designated Bridge, Root Port, Designated Port
Bridge Protocol Data Units (BPDU) and STP Port states
How to speed up STP - Portfast, Uplinkfast, Backbonefast, Rapid STP (RSTP)
WLAN Concepts
Basic Configuration
WLAN Security Concepts
Benefits of IPv6
IPv6 address format
Types of IPv6 address - Unicast, Multicast and Anycast, Global and Link Local
Configuring Interfaces with IPv6 address
 

Module 2 Course Details

Introduction to Ethical Hacking
Legality and Ethics
Networking & Basics
Foot Printing
Google Hacking
Scanning
Enumeration
System Hacking
Windows Hacking
Trojans & Backdoors
Virus & Worms
Sniffers
Social Engineering
Proxy Server & Packet Filtering
Denial of Service
Social Engineering
Phishing
Denial of Service Attack
Session Hijacking
Penetration Testing
Vulnerability Assessment
Linux Hacking
Physical Security
Hacking Webservers
Web Application Vulnerabilities
Web Based password Cracking Techniques
SQL Injection Vulnerabilities
Cryptography
Wireless Network Hacking and Countermeasures
Evading IDS, Firewalls and Detecting Honey Pots
Buffer Overflows
Reverse Engineering
Hacking Database Servers
Steganography
Spying Technologies
Hacking Routers and Firewalls
Computer Forensics and Incident Handling
Botnets
Hacking emails
Privacy on the Internet
Creating Security Policies
Exploit Writing
Patch Management
Covering Tracks
 

 

Enroll Now

Fields marked with * are mandatory.

Workshop Seminar Newspaper Internet Facebook Others