Archive for June 2015
Enable SSH in Switch And Router
Enable SSH in Switch And Router
Assuming the IP address, enable password and default route are in place, the additional steps needed are as follows:
1. Configure a domain name
cisco(config)# ip domain-name cisco.com
2. Configure the RSA key generation for encryption
cisco(config)# crypto key generate rsa
* it may prompt user for the key length generated in the range of 360 to 2048. Default is 512-bit.
3. Configure authentication method
a) Using local database
cisco(config)# username cisco password cisco
OR
b) Using Radius server
cisco(config)# aaa new-model
cisco(config)# aaa authentication login Radius_Server group radius
cisco(config)# radius-server host 192.168.1.155
4. Configure the terminal line
cisco(config)# line vty 0 4
cisco(config-line)# login local // using local database
OR
cisco(config-line)# login authentication Radius_Server //using radius server
cisco(config-line)# transport input ssh
How To Run Linux Router Vyatta in GNS3
How to run Linux Router Vyatta in GNS3
What is the Vyatta ?
Vyatta is bringing innovation and affordability to the networking industry by delivering advanced routing and security in a software-based network OS that scales from the branch office to the service provider edge. Vyatta has decoupled networking software from proprietary hardware allowing users to leverage the price and performance advantages of standard x86-based hardware and components as well as Citrix XenServer and VMWare virtual or cloud environments.
http://www.vyatta.com/
In this tutorial brezular shows us how to install Vyatta 6.1 Core LiveCD on Qemu image and run it from GNS3.
1. Download Vyatta Core 6.1 LiveCD iso (You need to fill short questionnaire for Vyatta download)
Vyatta download http://www.vyatta.com/downloads/index.php
2. Create Qemu qcow2 image
/usr/local/bin/qemu-img create -f qcow2 ./vyatta6.1vc.img 1G
3. Boot Qemu image with Vyatta 6.1 LiveCD
/usr/local/bin/qemu -boot d -hda ./vyatta6.1vc.img -cdrom ./vyatta-livecd_VC6.1-2010.08.20_i386.iso -m 512
login/password: vyatta/vyatta
4. Install Live CD
To install Live CD to Qemu image enter this command (as user vyatta)
install-system
The tutorial is opened and it walk you through installation process:
Would you like to continue? (Yes/No) [YES]: Enter
Partition (Auto/Union/Parted/Skip) [Auto]: Enter
Install the image on? [sda]: Enter
This will destroy all data on /dev/sda.
Continue? (Yes/No) [No]: Yes
How big of root partition should I create? (1000MB – 1074MB) [1074]MB: Enter
I found the following configuration files
/opt/vyatta/etc/config/config.boot
Which one should I copy to sda? [/opt/vyatta/etc/config/config.boot] Enter
Enter password for administrator account
Enter vyatta password: your_password
Retype vyatta password: your_password
Which drive should GRUB modify the boot partition on? [sda]: Enter
Done!
Now you successfully install Vyatta.
5. Adapt Vyatta NIC behavior to GNS3 Qemuwrapper
GNS3 qemuwrapper always changes MAC address of presented NIC during the boot of Qemu instance. Vyatta is programmed to save MAC address of existing ethernet interfaces. If MAC address of particular NIC is changed (by GNS3 qemuwrapper) Vyatta preserves the interface with old MAC and create new interface with new MAC.
Each time Qemu instace is restarted the number of interfaces doubled.
These are my steps how to solve it (it must be a better solution but I didn’t find any with Google search):
a) Enable root account on Vyatta 6.1
thank to Tim Peerlings blog http://www.timpeerlings.nl/enable-root-account-on-vyatta-6-1/
vyatta$ configure
vyatta#set system login user root authentication plaintext-password test
vayata# commit
vyatta# save
exit
Now you should switch to user root:
su
Password: test
b) Remove vyatta_net_name script (root account needed)
cd /lib/udev/
mv ./vyatta_net_name ./vyatta_net_name_backup
rm ./vyatta_net_name
6. Setup serial console login
thanks to Petr’s blog http://linux.xvx.cz/2009/08/debian-with-grub2-and-serial-connection/
This configuration redirects output to serial ttyS0 and allows you to use Console in GNS3.
Login as root with su command and modify grub configuration file:
vim /etc/default/grub
Change the lines in configuration file according to these lines
# This file is sourced by update-grub, and its variables are propagated
# to its children in /etc/grub.d/
GRUB_DEFAULT=0
GRUB_TIMEOUT=0
GRUB_DISTRIBUTOR=`lsb_release -i -s 2> /dev/null || echo Debian`
GRUB_CMDLINE_LINUX_DEFAULT=”console=tty0 console=ttyS0,9600n8″
# Uncomment to disable graphical terminal (grub-pc only)
GRUB_TERMINAL=serial
GRUB_SERIAL_COMMAND=”serial –speed=9600 –unit=0 –word=8 –parity=no –stop=1″
# Uncomment if you don’t want GRUB to pass “root=UUID=xxx” parameter to Linux
#GRUB_DISABLE_LINUX_UUID=true
Now update grub with command:
update-grub
7. Setup GNS3 for Vyatta qemu image
- Start GNS3
- Edit-> Preferences-> Qemu-> Qemu Host
Check Kvm option only if your processor supports hardware virtualization. Check Kqemu option only if it is installed and running. If you are not sure with these options let them unchecked otherwise Qemu will be not started.
You need also set Qemu general settings like path to qemu, qemu-img and qemuwrapper.
- Edit-> Preferences-> Qemu-> General Settings
Login to Vyatta:
login/password: vyatta/your_password
8. Conclusion
Brezular has made a video to prove functionality of Yvatta Qemu image. In this video three Vyatta Qemu instances run RIP routing protocol.
How to set up auto reply in outlook 2003/2007/2010?
How to set up auto reply in outlook 2003/2007/2010?
2. In Outlook 2003, select File >> Save As... from the menu; In Outlook 2007, click the Office button.
3. Select Outlook Template under Save as type:.
4. Select Tools >> Rules and Alerts... from the menu in Outlook window.
5. Click New Rule...
6. Select Start from a blank rule and make sure Check messages when they arrive is selected, and click Next.
7. Check Where my name is in the To box under Select condition(s), and clickNext.
8. Check reply using a specific template under Select action(s), and Click ona specific template under Edit the rule description.
9. Select User Templates in File System under Look In:, select the template that created before and click Open. Click Next.
10. Check Except if it is an Out of Office message under Select exception(s), and click Next.
11. Type a name for your auto reply rule under Specify a name for this rule, and click Next.
Learn Ethical Hacking in 16 hours
About the Course
This level will start totally from core basics. Here we will be more focused on understanding what exactly a computer is and how it functions as per software perspective. It is totally like if you want to perform something unusual, you need to understand the system more than a normal user. Even if you are not from computer engineering background, this course aims to teach from scratch.
After that we will perform some real-life hacking techniques and we will excel towards the path an ethical hacker does.
Module 0 -Some pre-requisite setup required for hacking
• Operating System Introduction
• Live CD Operating Systems and Distributions
• Introduction to Virtualization
• Implementing Virtualization
• Basics of Networking
• Implementing Networking Concepts in Virtualization
• Setting up PC for hacking practice
Ethical hacking Concepts
• Module 1 - Introduction to Ethical hacking
o Difference between hacking and Ethical Hacking
o Types of hackers
o Phases of conducting hacking
o Case studies
• Module 2 -Ethics and Rules
o Hackers and hacking methodology
o Malicious hacker strategy
o Steps to conduct Ethical hacking
o Hiding your identity while you hack
• Module 3 -Information gathering and Scanning
o Get to know how hackers gather information about the target
o Information gathering on websites
o Scanning website
o Finding admins
• Module 4 -Google Hacking
o What is Google?
o Using google as hacking tool
o Finding vulnerability website using Google
o Using special operators
o Live attacks performed by malicious hackers.
• Module 5 -Scanning using tools
o IPScanner
o Nmap
o Generating reports.
• Module 6 -Sniffing
o What is sniffing
o Types of sniffing
o Using weakness of hardware device
o Using sniffing to get sensitive data
o Man in the middle attack
• Module 7 -Introduction to Malware(Malicious Software)
o Malware Unleashed
o Detailed Study of Virus, Worms, Trojan Horse
o Technique to check whether your antivirus is working properly or not.
o How anti-virus work
• Module 8 -Introduction to Cryptography
o Encryption
o Decryption
o Demo on Cryptography
o Creating secured password protected area in Harddisk
• Module 9 -Trojans
o Creation of Trojan
o Hiding Trojan in a legitimate program
o Gaining control on others system.
o Detection and removal of Trojans
o Live hacking in LAN Environment
• Module 10 -Rootkits
o Defining rootkits
o Identifying rootkits in system
o Removal and avoidance
• Module 11 -Email Hacking
o Tracing an email
o Email bombing
o Using phishing page
o Keyloggers
• Module 12 -System Hacking
o Windows Password hacking
o Steganography
o File hiding technique
• Module 13 -Social Engineering and Clearing the Tracks
Bonus level – Ethical hacking implementations
Be a super spy like tom cruise of mission impossible.
• Self-accessible webcam
• Webcam surveillance system
• Find your stolen laptop
• Make your own laptop anti-theft system
• Phone call forgery
• Creating a fake website of a legitimate website
• Creating and tracking of what user is performing in the system
21 ways to hack and secure email
• Normal ways to hack email account remotely
• Local ways to hack email account
• Advanced ways normally done by detective agency
• Email mass spreading ways
• Email password and data security
• Using anonymous mails
After that we will perform some real-life hacking techniques and we will excel towards the path an ethical hacker does.
Topics Covered
The course contents are described below:Module 0 -Some pre-requisite setup required for hacking
• Operating System Introduction
• Live CD Operating Systems and Distributions
• Introduction to Virtualization
• Implementing Virtualization
• Basics of Networking
• Implementing Networking Concepts in Virtualization
• Setting up PC for hacking practice
Ethical hacking Concepts
• Module 1 - Introduction to Ethical hacking
o Difference between hacking and Ethical Hacking
o Types of hackers
o Phases of conducting hacking
o Case studies
• Module 2 -Ethics and Rules
o Hackers and hacking methodology
o Malicious hacker strategy
o Steps to conduct Ethical hacking
o Hiding your identity while you hack
• Module 3 -Information gathering and Scanning
o Get to know how hackers gather information about the target
o Information gathering on websites
o Scanning website
o Finding admins
• Module 4 -Google Hacking
o What is Google?
o Using google as hacking tool
o Finding vulnerability website using Google
o Using special operators
o Live attacks performed by malicious hackers.
• Module 5 -Scanning using tools
o IPScanner
o Nmap
o Generating reports.
• Module 6 -Sniffing
o What is sniffing
o Types of sniffing
o Using weakness of hardware device
o Using sniffing to get sensitive data
o Man in the middle attack
• Module 7 -Introduction to Malware(Malicious Software)
o Malware Unleashed
o Detailed Study of Virus, Worms, Trojan Horse
o Technique to check whether your antivirus is working properly or not.
o How anti-virus work
• Module 8 -Introduction to Cryptography
o Encryption
o Decryption
o Demo on Cryptography
o Creating secured password protected area in Harddisk
• Module 9 -Trojans
o Creation of Trojan
o Hiding Trojan in a legitimate program
o Gaining control on others system.
o Detection and removal of Trojans
o Live hacking in LAN Environment
• Module 10 -Rootkits
o Defining rootkits
o Identifying rootkits in system
o Removal and avoidance
• Module 11 -Email Hacking
o Tracing an email
o Email bombing
o Using phishing page
o Keyloggers
• Module 12 -System Hacking
o Windows Password hacking
o Steganography
o File hiding technique
• Module 13 -Social Engineering and Clearing the Tracks
Bonus level – Ethical hacking implementations
Be a super spy like tom cruise of mission impossible.
• Self-accessible webcam
• Webcam surveillance system
• Find your stolen laptop
• Make your own laptop anti-theft system
• Phone call forgery
• Creating a fake website of a legitimate website
• Creating and tracking of what user is performing in the system
21 ways to hack and secure email
• Normal ways to hack email account remotely
• Local ways to hack email account
• Advanced ways normally done by detective agency
• Email mass spreading ways
• Email password and data security
• Using anonymous mails
Who should attend
Anyone who is passionate to learn something different.
Anyone who want to be different in the field of IT.
Anyone who wants to defeat bad hackers.
Anyone who wants to secure yourself from the cyberspace attacks.
Anyone who want to be different in the field of IT.
Anyone who wants to defeat bad hackers.
Anyone who wants to secure yourself from the cyberspace attacks.
Pre-requisites
All you must know how to surf the internet and email.
Networking knowledge can add an advantage
Networking knowledge can add an advantage
What you need to bring
Laptop (Preferred)."
Key Takeaways
By the end of the day you will be well equipped to defeat bad hackers.
Study Material
2 DVDs containing tools for practicing hacking demonstrated with videos.
You will get a different identity in the field of IT.
Lots of friends and a team.
Study Material
2 DVDs containing tools for practicing hacking demonstrated with videos.
You will get a different identity in the field of IT.
Lots of friends and a team.
How To Make And Optimize Your Windows To Perform Better And Faster
How To Make And Optimize Your Windows To Perform Better And Faster ?
“Slow” we hate this word. No matter how fast and new our computer was, one day it will get slower time to time. I know you are thinking “why my pc getting slow” the answer is, internet junk what you’ve surfing over a long time, junk software’s you’ve installed previously and carrying viruses from your friends pendrive. That is all like giving a free load to your windows computer. So, in this tutorial I’ll show you how you can easily free up the waste work load off to your computer and make it fast as it new.
Whatever the problem is there is always a solution to solve it and in the computers there are lots of ways to solve your problem. Here are some tips and tricks below to speed up and optimize your computer.
We divide the solution in two parts first Basic and the second is advance.
Basic 1-5 = Basic is what you can must try first.
Advance 6-8 = If the basic solution doesn’t work follow our advance options to make your computer fast.
1. Remove Temporary Junk
The first thing is to do is deleting temporary junk. This junk was created by viruses, internet cookies, program installer etc. by deleting these files you can easily give a head start to speed up your computer. So, now I make thing more easier for you, you’ll just need to download the zip file below and double click on it and that will delete all your temporary junk off to your computer.
Click to download >>>>>> Temp files and Junk deleter
Step 1 – Download the “Deleter” from above blue link.
Step 2 – Open the zip folder and double click on the file name “Temp Files and Junk Delete”.
Step 3 – Type “Y” and hit enter if you want to empty your bin too.
2. Remove Programs You Never Use
Junk program can be the reason for your slow computer, by saying “junk” I mean those programs and software you never used before. Sometimes some programs and adware software can installed automatically and starts decreasing our computers speed. By deleting these files you can easily speed up your computer.
Step 1 – Open the windows run command. You can also open it by pressing (windows key+ R).
Step 2 – Type “appwiz.cpl” and hit enter.
Step 3 – Remove the programs.
Now the window called programs and features is open, in this window you can select the programs what you’ve never used and uninstall it.
If you having problem with uninstalling a program here is link to show you “How To Remove A Program & Software Which Won’t Able To Uninstall ?”
3. Limits Startup Programs
Startup programs are those programs which starts automatically when your windows starts. You can customize your startup programs and make your windows boots up quickly.
Step 1 – Open run command.
Step 2 – Type “msconfig” and hit enter.
Step 3 – Go to the startup tab and Un-tick those programs what you’ve never want to start with your windows startup.
4. Windows drive cleanup
It’s easy to perform a disk clean up, by using this you can easily delete the junk files, previous windows file, internet temporary files and etc.
Step 1 – Go to the C:/ drive properties and click on disk cleanup. After that click on “clean up system files” if showing.
Step 2 – Select the files what you wanna to delete and click “ok” to delete it.
5. Viruses checkup
Viruses are the main reason for a slow computer. Download the free antivirus software (recently updated) and full scan your computer.
Here’s a link to download the free antivirus >>>
Link 1 -http://filehippo.com/download_avast_antivirus
Link 2 – http://www.avast.com/download-thank-you.php
Step 1- Download the antivirus and install it.
Step 2 – Now update the antivirus software.
Step 3 – Full scan your computer.
6. Defragment your hard disk
Disk Defragmenter rearranges fragmented data so your disks and drives can work more efficiently. You can use the windows disk defragment tool or you use the 3rd party defragment tool.
You can open windows Defragment tool by using run command. Here’s a command below to open disk defragment:
Windows XP Run Command — dfrg.msc
Windows 7, 8 Run Command – dfrgui
I recommend you to use the 3rd party software named “defraggler” because it’s fast and work better. Here’s a download link bellow to download that software.
Link 1 – https://www.piriform.com/defraggler
Link 2 – http://filehippo.com/download_defraggler
7. Turn off visual effects
You can customize and disable your windows visual effects to make your windows response faster.
Step 1 – Open your computer’s properties. (Shortcut key WINDOWS KEY+PAUSE/BREAK )
Step 2 – click “Advanced System Settings” on the left and after that click on “setting” under the performance tab.
Now you can customize you’re your visual effects and make your computer faster.
8. Adding more memory (RAM)
RAM is random access memory. It’s a fast version of a typical hard drive, and it’s used to store temporary information and data currently in use by your system (mainly operating system). The more RAM you have the better performance your machine gives you. You can think of RAM as tellers in a bank processing customers’ needs in real time. The more tellers you have (RAM), the faster the processing. Adding a memory is a good up gradation to speed up your computer. Here’s some links which can help’s you regarding your ram upgradation.
Computer Hardware and Networking Training
COMPUTER HARDWARE AND NETWORKING
Comptia A+ Course
Lesson 1: Personal Computer Components
Topic 1A: Personal Computer Components
Topic 1B: System Unit Components
Topic 1C: Storage Devices
Topic 1D: Personal Computer Connection Methods
Topic 1B: System Unit Components
Topic 1C: Storage Devices
Topic 1D: Personal Computer Connection Methods
Lesson 2: Operating System Fundamentals
Topic 2A: Personal Computer Operating Systems
Topic 2B: Windows User Interface Components
Topic 2C: Windows File System Management
Topic 2D: Windows System Management Tools
Topic 2B: Windows User Interface Components
Topic 2C: Windows File System Management
Topic 2D: Windows System Management Tools
Lesson 3: PC Technician Professional Best Practices
Topic 3A: Tools of the Trade
Topic 3B: Electrical Safety
Topic 3C: Environmental Safety and Materials Handling
Topic 3D: Perform Preventative Maintenance
Topic 3E: Diagnostics and Troubleshooting
Topic 3F: Professionalism and Communication
Topic 3B: Electrical Safety
Topic 3C: Environmental Safety and Materials Handling
Topic 3D: Perform Preventative Maintenance
Topic 3E: Diagnostics and Troubleshooting
Topic 3F: Professionalism and Communication
Lesson 4: Installing and Configuring Peripheral Components
Topic 4A: Install and Configure Display Devices
Topic 4B: Install and Configure Input Devices
Topic 4C: Install and Configure Adapter Cards
Topic 4D: Install and Configure Multimedia Devices
Topic 4B: Install and Configure Input Devices
Topic 4C: Install and Configure Adapter Cards
Topic 4D: Install and Configure Multimedia Devices
Lesson 5: Installing and Configuring System Components
Topic 5A: Install and Configure Storage Devices
Topic 5B: Install and Configure Power Supplies
Topic 5C: Install and Configure Memory
Topic 5D: Install and Configure CPUs and Cooling System Units
Topic 5E: Install and Configure System Boards
Topic 5B: Install and Configure Power Supplies
Topic 5C: Install and Configure Memory
Topic 5D: Install and Configure CPUs and Cooling System Units
Topic 5E: Install and Configure System Boards
Lesson 6: Maintaining and Troubleshooting Peripheral Components
Topic 6A: Troubleshoot Display Devices
Topic 6B: Maintain and Troubleshoot Input Devices
Topic 6C: Troubleshoot Adapter Cards
Topic 6D: Troubleshoot Multimedia Devices
Topic 6B: Maintain and Troubleshoot Input Devices
Topic 6C: Troubleshoot Adapter Cards
Topic 6D: Troubleshoot Multimedia Devices
Lesson 7: Troubleshooting System Components
Topic 7A: Troubleshoot Storage Devices
Topic 7B: Troubleshoot Power Supplies
Topic 7C: Troubleshoot Memory
Topic 7D: Troubleshoot CPUs and Cooling Systems
Topic 7E: Troubleshoot System Boards
Topic 7B: Troubleshoot Power Supplies
Topic 7C: Troubleshoot Memory
Topic 7D: Troubleshoot CPUs and Cooling Systems
Topic 7E: Troubleshoot System Boards
Lesson 8: Installing and Configuring Operating Systems
Topic 8A: Install Microsoft Windows
Topic 8B: Upgrade Windows
Topic 8C: Add Devices to Windows
Topic 8D: Optimize Windows
Topic 8B: Upgrade Windows
Topic 8C: Add Devices to Windows
Topic 8D: Optimize Windows
Lesson 9: Maintaining and Troubleshooting Microsoft Windows
Topic 9A: Operating System Utilities
Topic 9B: Back Up Microsoft Windows
Topic 9C: Troubleshoot Microsoft Windows
Topic 9D: Recover Microsoft Windows
Topic 9B: Back Up Microsoft Windows
Topic 9C: Troubleshoot Microsoft Windows
Topic 9D: Recover Microsoft Windows
Lesson 10: Network Technologies
Topic 10A: Network Concepts
Topic 10B: Network Communications
Topic 10C: Network Connectivity
Topic 10D: Internet Technologies
Topic 10B: Network Communications
Topic 10C: Network Connectivity
Topic 10D: Internet Technologies
Lesson 11: Installing and Managing Network Connections
Topic 11A: Create Network Connections
Topic 11B: Install and Configure Web Browsers
Topic 11C: Maintain and Troubleshoot Network Connections
Topic 11B: Install and Configure Web Browsers
Topic 11C: Maintain and Troubleshoot Network Connections
Lesson 12: Supporting Laptops and Portable Computing Devices
Topic 12A: Laptop and Portable Computing Device Components
Topic 12B: Install and Configure Laptops and Portable Computing Devices
Topic 12C: Maintain and Troubleshoot Laptops and Portable Computing Devices
Topic 12B: Install and Configure Laptops and Portable Computing Devices
Topic 12C: Maintain and Troubleshoot Laptops and Portable Computing Devices
Lesson 13: Supporting Printers and Scanners
Topic 13A: Printer and Scanner Technologies
Topic 13B: Printer and Scanner Components
Topic 13C: Printer and Scanner Processes
Topic 13D: Install and Configure Printers
Topic 13E: Maintain and Troubleshoot Printers
Topic 13B: Printer and Scanner Components
Topic 13C: Printer and Scanner Processes
Topic 13D: Install and Configure Printers
Topic 13E: Maintain and Troubleshoot Printers
Lesson 14: Personal Computer Security Concepts
Topic 14A: Security Fundamentals
Topic 14B: Security Protection Measures
Topic 14C: Data and Physical Security
Topic 14D: Wireless Security
Topic 14E: Social Engineering
Topic 14B: Security Protection Measures
Topic 14C: Data and Physical Security
Topic 14D: Wireless Security
Topic 14E: Social Engineering
Lesson 15: Supporting Personal Computer Security
Topic 15A: Install and Configure Security Measures
Topic 15B: Maintain and Troubleshoot Security Measures
Topic 15B: Maintain and Troubleshoot Security Measures
Comptia N+ Course
Lesson 1: Network Theory
Topic 1A: Networking Terminology
Topic 1B: Network Building Blocks
Topic 1C: Standard Network Models
Topic 1D: Network Topologies
Topic 1E: Network Categories
Topic 1B: Network Building Blocks
Topic 1C: Standard Network Models
Topic 1D: Network Topologies
Topic 1E: Network Categories
Lesson 2: Network Communications Methods
Topic 2A: Transmission Methods
Topic 2B: Media Access Methods
Topic 2C: Signaling Methods
Topic 2B: Media Access Methods
Topic 2C: Signaling Methods
Lesson 3: Network Data Delivery
Topic 3A: Data Addressing and Delivery
Topic 3B: Network Connection Mechanisms
Topic 3C: Reliable Delivery Techniques
Topic 3B: Network Connection Mechanisms
Topic 3C: Reliable Delivery Techniques
Lesson 4: Network Media and Hardware
Topic 4A: Bounded Network Media
Topic 4B: Unbounded Network Media
Topic 4C: Noise Control
Topic 4D: Network Connectivity Devices
Topic 4B: Unbounded Network Media
Topic 4C: Noise Control
Topic 4D: Network Connectivity Devices
Lesson 5: Network Implementations
Topic 5A: The OSI Model
Topic 5B: Client Network Resource Access
Topic 5C: Ethernet Networks
Topic 5D: Token Ring Networks
Topic 5E: Fiber Distributed Data Interface (FDDI) Networks
Topic 5F: Wireless Technologies and Standards
Topic 5B: Client Network Resource Access
Topic 5C: Ethernet Networks
Topic 5D: Token Ring Networks
Topic 5E: Fiber Distributed Data Interface (FDDI) Networks
Topic 5F: Wireless Technologies and Standards
Lesson 6: Networking with TCP/IP
Topic 6A: Families of Protocols
Topic 6B: The TCP/IP Protocol
Topic 6C: Default IP Addresses
Topic 6D: Custom IP Addresses
Topic 6E: The TCP/IP Protocol Suite
Topic 6B: The TCP/IP Protocol
Topic 6C: Default IP Addresses
Topic 6D: Custom IP Addresses
Topic 6E: The TCP/IP Protocol Suite
Lesson 7: TCP/IP Services
Topic 7A: IP Address Assignment Methods
Topic 7B: Host Name Resolution
Topic 7C: NetBIOS Name Resolution
Topic 7D: TCP/IP Utilities
Topic 7E: TCP/IP Upper-layer Services
Topic 7F: TCP/IP Interoperability Services
Topic 7B: Host Name Resolution
Topic 7C: NetBIOS Name Resolution
Topic 7D: TCP/IP Utilities
Topic 7E: TCP/IP Upper-layer Services
Topic 7F: TCP/IP Interoperability Services
Lesson 8: Other Network Protocols
Topic 8A: The NetBEUI Protocol
Topic 8B: The IPX/SPX Protocol
Topic 8C: The AppleTalk Protocol
Topic 8D: The IP Version 6 (IPv6) Protocol
Topic 8B: The IPX/SPX Protocol
Topic 8C: The AppleTalk Protocol
Topic 8D: The IP Version 6 (IPv6) Protocol
Lesson 9: Local Area Network (LAN) Infrastructure
Topic 9A: Bridges and Switches
Topic 9B: IP Routing Topology
Topic 9C: Static IP Routing
Topic 9D: Dynamic IP Routing
Topic 9E: Controlling Data Movement with Filters and VLANs
Topic 9B: IP Routing Topology
Topic 9C: Static IP Routing
Topic 9D: Dynamic IP Routing
Topic 9E: Controlling Data Movement with Filters and VLANs
Lesson 10: Wide Area Network (WAN) Infrastructure
Topic 10A: WAN Switching Technologies
Topic 10B: WAN Transmission Technologies
Topic 10C: WAN Connectivity Methods
Topic 10D: Voice Over Data Systems
Topic 10B: WAN Transmission Technologies
Topic 10C: WAN Connectivity Methods
Topic 10D: Voice Over Data Systems
Lesson 11: Network Security
Topic 11A: Network Threats
Topic 11B: Virus Protection
Topic 11C: Local Security
Topic 11D: Network Authentication Methods
Topic 11E: Data Encryption
Topic 11F: Internet Security
Topic 11B: Virus Protection
Topic 11C: Local Security
Topic 11D: Network Authentication Methods
Topic 11E: Data Encryption
Topic 11F: Internet Security
Lesson 12: Remote Networking
Topic 12A: Remote Network Architectures
Topic 12B: Terminal Services Implementations
Topic 12C: Remote Access Networking Implementations
Topic 12D: Virtual Private Networking (VPN)
Topic 12B: Terminal Services Implementations
Topic 12C: Remote Access Networking Implementations
Topic 12D: Virtual Private Networking (VPN)
Lesson 13: Disaster Recovery
Topic 13A: Planning for Disaster Recovery
Topic 13B: Data Backup
Topic 13C: Fault Tolerance Methods
Topic 13B: Data Backup
Topic 13C: Fault Tolerance Methods
Lesson 14: Network Data Storage
Topic 14A: Enterprise Data Storage Techniques
Topic 14B: Clustering
Topic 14C: Network Attached Storage (NAS)
Topic 14D: Storage Area Network (SAN) Implementations
Topic 14B: Clustering
Topic 14C: Network Attached Storage (NAS)
Topic 14D: Storage Area Network (SAN) Implementations
Lesson 15: Network Operating Systems
Topic 15A: Microsoft Operating Systems
Topic 15B: Novell NetWare
Topic 15C: UNIX and Linux Operating Systems
Topic 15B: Novell NetWare
Topic 15C: UNIX and Linux Operating Systems
Lesson 16: Network Troubleshooting
Topic 16A: Troubleshooting Models
Topic 16B: TCP/IP Troubleshooting Utilities
Topic 16C: Hardware Troubleshooting Tools
Topic 16D: System Monitoring Tools
Topic 16B: TCP/IP Troubleshooting Utilities
Topic 16C: Hardware Troubleshooting Tools
Topic 16D: System Monitoring Tools
CCNA & CCNP Routing & Switching Certification Training
CCNA & CCNP Routing & Switching Certification
Training
Become
an IT Hardware and Networking Expert
·
What
is this course about?
Redback Academy combo training in Cisco
Certified Network Associate (CCNA) and Cisco Certified Network
Professional (CCNP) is an ideal routing and switching certification
program for entry-level network engineers to maximize their foundational
networking knowledge. Our unique training module combines the dual benefits of
industry’s two most sought-after certifications and provides an enriching
opportunity for participants to work on virtual lab sessions.
The course validates participants the following skills at the end of the training:
The course validates participants the following skills at the end of the training:
·
Ability
to install, configure, operate, and troubleshoot medium-size routed and
switched networks
· Ability
to plan, implement, verify and troubleshoot local and wide-area enterprise
networks
·
Work
collaboratively with specialists on advanced security, voice, wireless and
video solutions
CISCO - CCNA - Routing & Switching Certification Training in Vellore & kanchipuram
-
- What is this course about?Redback Academy traininig in Cisco Certified Network Associate (CCNA) Routing and Switching is an ideal certification program for entry-level network engineers to maximize their foundational networking knowledge. Our training module imparts participants with practical, relevant and industry-ready domain knowledge on network solutions.
The course validates participants the following skills at the end of the training:· Ability to install, configure, operate, and troubleshoot medium-size routed and switched networks· Manage and optimize network systems, focus on network infrastructure, which includes routing, switching, wireless access, security, and connectivity to branch offices using WAN.· http://redbackacademy.com/ccna.php