Archive for August 2014
CISCO CERTIFIED NETWORK PROFESSIONAL SECURITY (CCNP SECURITY)
Implementing Cisco Secure
Access Solutions (SISAS) v1.0 is a newly created instructor-led training course
that is part of the curriculum path leading to the Cisco Certified Network
Professional Security (CCNP Security) certification. Additionally, it is designed
to prepare security engineers with the knowledge and hands-on experience so
that they can deploy Cisco’s Identity Services Engine and 802.1X secure network
access. The goal of the course is to provide students with foundational
knowledge and the capabilities to implement and managed network access security
by utilizing Cisco ISE appliance product solution.
The student will gain
hands-on experience with configuring various advance Cisco security solutions
for mitigating outside threats and securing devices connecting to the network.
At the end of the course, students will be able to reduce the risk to their IT
infrastructures and applications using Cisco’s ISE appliance feature and
provide operational support identity and network access control.Upon completing
this course, the learner will be able to meet these overall objectives:
·
Understand
Cisco Identity Services Engine architecture and access control capabilities.
·
Understand
802.1X architecture, implementation and operation.
·
Understand
commonly implemented Extensible Authentication Protocols (EAP).
·
Implement
Public-Key Infrastructure with ISE.
·
Understand
the implement Internal and External authentication databases.
·
Implement
MAC Authentication Bypass.
·
Implement
identity based authorization policies.
·
Understand
Cisco TrustSec features.
·
Implement
Web Authentication and Guest Access.
·
Implement
ISE Posture service.
·
Implement
ISE Profiling.
·
Understand
Bring Your Own Device (BYOD) with ISE.
·
Troubleshoot
ISE .
TOPICS COVERED:
In
preparation to earn an CCNP SISAS certification, Mazenet recommends a training
path based on a candidate’s background:
·
Introduction
·
Lab
Guide
·
Threat
Mitigation through Identity Services
·
Cisco
ISE Fundamentals
·
Advance
Access Control
·
Web
Authentication and Guest Access
·
Endpoint
Access Control
·
Troubleshooting
Network Access Control
Cisco Certified Internet Expert
CCIE certification indicates expert level knowledge
of networking across various LAN and WAN interfaces, and a variety of routers
and switches. Experts in R&S solve complex connectivity problems and apply
technology solutions to increase bandwidth, improve response times, maximize
performance, improve security, and support global applications. Candidates
should be able to install, configure, and maintain LAN, WAN, and dial access
services.
CCIE Routing & Switching
The CCIE Routing and Switching Written Exam will
validate that professionals have the expertise to: configure, validate, and
troubleshoot complex enterprise network infrastructure; understand how
infrastructure components interoperate; and translate functional requirements
into specific device configurations.
·
Implement Layer
2 Technologies
·
Implement IPv4
·
Implement IPv6
·
Implement MPLS
Layer 3 VPNs
·
Implement IP
Multicast
·
Implement
Network Security
·
Implement
Network Services
·
Implement QoS
·
Troubleshoot a
Network
·
Optimize the
Network
·
Evaluate Proposed
Changes to a Network
Android 4.4 Application Development
·
Android is a top
niche in mobile application development sector. Android supports not just
mobile platform but also tablets and many other devices.
·
The extendable
application environment of Android is specifically designed to suit industry
requirements to tap the mobile consumer market and offers immense scope for
Android application developers.
·
Greater part of
Android application development is carried out in Java and our Android Training
Course focuses on Java based application development.
Why Android App
Development Course?
·
Model of
application development is changing to App based.
·
Android is most
popular OS for smart phones and all the businesses want to have their own Apps
for Android.
TOPICS
COVERED:
·
Introduction to
Java
·
Introduction to
Android
·
My First Android
Application
·
Application
Structure(in detail)
·
XML Introduction
to Basic UI design
·
Advanced UI
Programming
·
Intents &
Views (in detail)
·
Styles &
Themes
·
Adapters and
Widgtes
·
Tabs and
TabActivity
·
Data Storage
& SQLite Programming
·
Linkify &
Telephony API
·
Android Security
Essentials
·
Publishing
Android Applications
CISCO COURSES TAKEN IN REDBACK IT ACADEMY
Cisco Certified Network Associate (CCNA) is a
certification program for entry-level network engineers that helps maximize
your investment in foundational networking knowledge and increase the value of
your employer's network. CCNA is for Network Specialists, Network
Administrators, and Network Support Engineers with 0-3 years of experience. The
CCNA validates the ability to install, configure, operate, and troubleshoot
medium-size routed and switched networks.
TOPICS COVERED
Configure, verify and troubleshoot a switch with
VLANs and interswitch communications
·
Select the
appropriate media, cables, ports, and connectors to connect switches to other
network devices and hosts
·
Explain the
technology and media access control method for Ethernet networks
·
Explain network
segmentation and basic traffic management concepts
·
Explain basic
switching concepts and the operation of Cisco switches
·
Perform and
verify initial switch configuration tasks including remote access management
·
Verify network
status and switch operation using basic utilities (including: ping, traceroute,
telnet, SSH, arp, ipconfig), SHOW & DEBUG commands
·
Identify,
prescribe, and resolve common switched network media issues, configuration
issues, auto negotiation, and switch hardware failures
·
Describe
enhanced switching technologies (including: VTP, RSTP, VLAN, PVSTP, 802.1q)
·
Describe how
VLANs create logically separate networks and the need for routing between them
·
Configure,
verify, and troubleshoot VLANs
·
Configure, verify,
and troubleshoot trunking on Cisco switches
·
Configure,
verify, and troubleshoot interVLAN routing
·
Configure,
verify, and troubleshoot VTP
·
Implement basic
switch security (including: port security, trunk access, management vlan other
than vlan1, etc.)
CHFI (Computer Hacking Forensics Investigator)
CHFI (Computer Hacking
Forensics Investigator)
EC-Council releases the most
advanced Computer Forensic Investigation program in the world. CHFIv8 presents
a detailed methodological approach to computer forensics and evidence analysis.
It is a comprehensive course covering major forensic investigation scenarios
that enable students to acquire hands-on experience on various forensic
investigation techniques and standard tools necessary to successfully carry-out
a computer forensic investigation. Battles between corporations, governments,
and countries are no longer fought using physical force. Cyber war has begun
and the consequences can be seen in everyday life. With the onset of
sophisticated cyber-attacks, the need for advanced cyber security and
investigation training is a mandate in the present day. If you or your
organization requires the knowledge or skills to identify, track, and prosecute
the cybercriminals, then this is the course for you.This course helps students
to excel in digital evidence acquisition, handling and analysis in a
forensically sound manner. Acceptable in a court of law, these skills will lead
to successful prosecutions in various types of security incidents such as data
breaches, corporate espionage, insider threats and other intricate cases
involving computer systems.
In
preparation to earn an CHFI certification, Mazenet recommends a training path
based on a candidate’s background:
·
Computer
Forensics in Today’s World
·
Computer
Forensics Investigation Process
·
Searching
and Seizing Computers
·
Digital
Evidence
·
First
Responder Procedures
·
Computer
Forensics Lab
·
Understanding
Hard Disks and File Systems
·
Windows
Forensics
·
Data
Acquisition and Duplication
·
Recovering
Deleted Files and Deleted Partitions
·
Forensics
Investigation Using AccessData FTK
·
Forensics
Investigation Using EnCase
·
Steganography
and Image File Forensics
·
Application
Password Crackers
·
Log
Capturing and Event Correlation
·
Network
Forensics, Investigating Logs and Investigating Network Traffic
·
Investigating
Wireless Attacks
·
Investigating
Web Attacks
·
Tracking
Emails and Investigating Email Crimes
·
Mobile
Forensics
·
Investigative
Reports
·
Becoming
an Expert Witness
CSCU (Certified Secure Computer User)
CSCU
(Certified Secure Computer User)
The purpose of the CSCU training program is to
provide students with the necessary knowledge and skills to protect their
information assets. This class will immerse students into an interactive
environment where they will acquire fundamental understanding of various
computer and network security threats such as identity theft, credit card
fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex
offenders lurking online, loss of confidential information, hacking attacks and
social engineering. More importantly, the skills learnt from the class helps
students take the necessary steps to mitigate their security exposure.
In preparation to earn
an CSCU certification, Mazenet recommends a training path based on a
candidate’s background:
Ø Foundations of Security
Ø Securing Operating Systems
Ø Protecting System Using Antiviruses
Ø Data Encryption
Ø Data Backup and Disaster Recovery
Ø Internet Security
Ø Securing Network Connections
Ø Securing Online Transactions
Ø Securing Email Communications
Ø Social Engineering and Identity Theft
Ø Security on Social Networking Sites
Ø Information Security and Legal Compliance
Ø Securing Mobile Devices
CCNA SECURITY
CCNA SECURITY
Cisco
Certified Network Associate Security (CCNA Security) validates associate-level
knowledge and skills required to secure Cisco networks. With a CCNA Security
certification, a network professional demonstrates the skills required to
develop a security infrastructure, recognize threats and vulnerabilities to
networks, and mitigate security threats. The CCNA Security curriculum
emphasizes core security technologies, the installation, troubleshooting and
monitoring of network devices to maintain integrity, confidentiality and
availability of data and devices, and competency in the technologies that Cisco
uses in its security structure.
In
preparation to earn an CCNA Security, Mazenet recommends the following training
courses:
Common Security Threats
·
Describe
common security threats
Security and Cisco Routers
·
Implement
security on Cisco routers
·
Describe
securing the control, data, and management plane
·
Describe
Cisco Security Manager
·
Describe
IPv4 to IPv6 transition
AAA on Cisco Devices
·
Implement
AAA (authentication, authorization, and accounting)
·
Describe
TACACS+
·
Describe
RADIUS
·
Describe
AAA
·
Verify
AAA functionality
IOS ACLs
·
Describe
standard, extended, and named IP IOS access control lists (ACLs) to filter
packets
·
Describe
considerations when building ACLs
·
Implement
IP ACLs to mitigate threats in a network
Secure Network Management and
Reporting
·
Describe
secure network management
·
Implement
secure network management
Common Layer 2 Attacks
·
Describe
Layer 2 security using Cisco switches
·
Describe
VLAN security
·
Implement
VLANs and trunking
·
Implement
spanning tree
Cisco Firewall Technologies
·
Describe
operational strengths and weaknesses of the different firewall technologies
·
Describe
stateful firewalls
·
Describe
the types of NAT used in firewall technologies
·
Implement
zone-based policy firewall using CCP
·
Implement
the Cisco Adaptive Security Appliance (ASA)
·
Implement
Network Address Translation (NAT) and Port Address Translation (PAT)
Cisco IPS
·
Describe
Cisco Intrusion Prevention System (IPS) deployment considerations
·
Describe
IPS technologies
·
Configure
Cisco IOS IPS using CCP
VPN Technologies
·
Describe
the different methods used in cryptography
·
Describe
VPN technologies
·
Describe
the building blocks of IPSec
·
Implement
an IOS IPSec site-to-site VPN with pre-shared key authentication
·
Verify
VPN operations
·
Implement
Secure Sockets Layer (SSL) VPN using ASA device manager