You are on page 1of 9

Networking Career Development Program Lectureflow

IT Fundamentals ====>Module 1) IT Fundamentals 3

What is Information Technology?


What is hardware and Network?
What are software, Applications, Enterprise Applications
What is project management
What is security and compliance in IT industry
Roles in IT industry
How Internet works?
What is website? What are applications
Different Computer Parts
How computer works
COmputer Architecture - bits, bytes, types of memory
Computer network - Lan, wan, topology, IP address, firewall, hubs and switches
Cable, Fiber optics, wireless internet
What is software?
What is Programming?
What is a database?
Different Programming languages
Web Browser
search engines
MUST HAVE FOR Getting basic job skills - word, ppt, excel, computer storage, files access,
windows explorer
Folder settings
file extensions
Using clipboard
searching for files
compressed files
Save work, screenhsot, editing photos, playing videos
emailing multiple files, compress, outlook
email usage, scheduling calendars, creating meeting invites
Organizing tasks
hide folder - unhide folder
Gmail Label wise Arrangement, Searching Google Drive Sharing
Google - SLIDE,DOC,SHEETS
Contacts Group wise Mail
Task Management
MS OFFICE - excel
sheets, calculator ,basic formulas, multiple tabs, merge cells search, match and replace,
data tables, filtter freeze and split frame, resizing print area
Invoice creation
Word Writing a paragraph, formatting Elements, create your resume,

Page I
insert table, add pic Text alignment with image
Word to pdf convert, pdf to word convertor

Term - 1 ===>Module 1) A+ - Understanding of Hardware and its 16


components

The visible computer


CPU, RAM & Firmware
Motherboard & power supply
Mass storage implementation
Essentials peripherals
Display Technologies
Mobile Devices & portable computing
Printers & Multifunction devices

Module 2) A+ - Installation and Maintenance of Hardware and Its 8


components

Users, Groups & permissions


Maintaining & optimizing operating systems
Working with command line interfaces
Securing Computers

Module 3) A+ - Understanding and maintenance of Networks 6

Local area networking


Wireless networking
The Internet
Virtualization

Module 4) A+ - Troubleshooting and Helpdesk 3

Troubleshooting of operating systems


Operational procedure

Module 5) N+ - Network Fundamentals and building networks 14

Introduction to Networks
Network Topologies
OSI Layer
Network Cable and connectors
Ethernet standard and specification

Page II
Network devices
IP addressing & Subnetting
Configure IPv6 Addressing
IP routing and routing protocols
Switching and VLANS
Wireless Networking

Module 6) N+ - Network security, Maintenance and Troubleshooting 9


procedures

Build a SOHO network


Secure networks with firewalls NAT, port filtering, packet filtering, and other methods
Authentication and Access Control
Network Threats and Mitigation & Physical Security and Risk
Wide Area Networks
Troubleshooting Tools
Software and Hardware Tools
Network Troubleshooting, Management, Monitoring, and Optimization

Term - 2 ====>Module 7) CCNA - Network fundamentals 4

host-to-host communication Model


Cisco Internetwork Operating System software
Describe LANs and the role of switches within LANs
Describe Ethernet as the network access layer of TCP/IP
describe the operation of switches

Module 8) CCNA - Network Access 13

Install a switch and perform the initial configuration


Describe the TCP/IP Internet layer, IPv4, its addressing scheme, and subnetting
Explain host-to-host communications across switches and routers
Describe the operation, benefits, and limitations of static routing
Describe, implement, and verify Virtual Local Area Networks (VLANs) and trunks
Describe the application and configuration of inter-VLAN routing
Explain the basics of dynamic routing protocols
Describe IPv6 addresses, and configure and verify basic IPv6 connectivity
Describe the terms of Open Shortest Path First (OSPF)
Configure link aggregation using EtherChannel
Describe the purpose of Layer 3 redundancy protocols

Module 9) CCNA - IP connectivity and IP services 5

Page III
Describe the operation of Access Control Lists (ACLs)
Configure Internet access using Dynamic Host Configuration Protocol (DHCP) explain and
configure Network Address Translation (NAT) on Cisco routers
Describe basic Quality of Service (QoS) concepts
Describe the concepts of wireless networks
use of Wireless LAN Controllers (WLCs)

Module 10) CCNA - Security fundamentals 4

Configure basic IOS system monitoring tools


Describe the management of Cisco devices
Describe the current security threat landscape
Describe threat defense technologies
Implement a basic security configuration of the device management plane
Implement basic steps to harden network devices

Module 11) CCNA - Automation and programmability 4

Describe network and device architectures


Introduce virtualization
Introduce the concept of network programmability and (SDN)
describe smart network management solutions such as Cisco DNA Center
Software-Defined Access (SD-Access) & Software-Defined Wide Area Network (SD-WAN)

Term - 3 ===>Module 12) Windows Server - Installation, Storage, 20


and Compute with Wi

Install Windows Servers in Host and Compute Environments


Implement Storage Solutions
Implement Hyper-V
Implement Windows Containers
Implement High Availability
Maintain and Monitor Server Environments

Module 13) Windows Server - Networking with Windows Server 21

Implement Domain Name System (DNS)


Implement DHCP and IPAM
Implement Network Connectivity and Remote Access Solutions
Implement Core and Distributed Network Solutions
Implement an Advanced Network Infrastructure

Page IV
Module 14) Windows server - Identity with Windows Server 24

Install and Configure Active Directory Domain Services (AD DS)


Manage and Maintain AD DS
Create and Manage Group Policy
Implement Active Directory Certificate Services (AD CS)
Implement Identity Federation and Access Solutions

Term - 3 ===>Module 15) Linux server - Understand and use 4


essential tools

Access a shell prompt & Use input-output redirection


Use grep and regular expressions to analyse text
Access remote systems using SSH
Log in and switch users in multiuser targets
Archive, compress, unpack, and uncompressed files using tar, star, gzip, and bzip2
Work with file, directories, hard and soft links
List, set, and change standard File permissions
Locate, read, and use system documentation including man, info, and files in /usr/share/doc

Module 16) Linux server - Operate running systems 6

Boot, reboot, and shut down a system normally


Boot systems into different targets manually
Interrupt the boot process in order to gain access to a system
Identify CPU/memory intensive processes and kill processes
Adjust process scheduling & Manage tuning profiles
Locate and interpret system log files and journals
Start, stop, and check the status of network services
Securely transfer files between systems

Module 17) Linux server - Configure local storage 4

List, create, delete partitions on MBR and GPT disks


Create and remove physical volumes
Assign physical volumes to volume groups
Create and delete logical volumes
Configure systems to mount file systems at boot by universally unique ID (UUID) or label
Add new partitions and logical volumes, and swap to a system non-destructively

Module 18) Linux server - Manage user and Groups and working 6
with file systems

Page V
Create, delete, and modify local user accounts
Change passwords and adjust password aging for local user accounts
Create, delete, and modify local groups and group memberships
Create, mount, unmount, and use vfat, ext4, and xfs file systems
Mount and unmount network file systems using NFS
Extend existing logical volumes
Create and configure set-GID directories for collaboration
Configure disk compression & Manage layered storage
Diagnose and correct file permission problems

Module 19) Linux server - Deploy, configure, and maintain systems 6

Schedule tasks using at and cron Jobs


Start and stop services and configure services to start automatically at boot
Configure systems to boot into a specific target automatically
Configure time service clients
Install and update software packages from RHN, a remote repository, or from the local file system
Work with package module streams
Modify the system bootloader

Module 20) Linux server - Manage basic networking & Security 6

Configure IPv4 and IPv6 addresses


Configure hostname resolution
Configure network services to start automatically at boot
Restrict network access using firewall-cmd/firewall
Configure firewall settings using firewall-cmd/firewalld
Create and use file access control lists
Configure key-based authentication for SSH
Set enforcing and permissive modes for SELinux
List and identify SELinux file and process context
Use boolean settings to modify system SELinux settings
Diagnose and address routine SELinux policy violations

Module 21) Linux server - deployment of network services 8

DNS, APACHE HTTPD, MARIADB, POSTFIX. MAIL SERVER


NFS, SAMBA & ISCSI STORAGE
FIREWALLD etc

Term - 4 ===>Module 22) Cloud Computing - Fundamentals 3

Contrasting Cloud Services

Page VI
Contrasting Cloud Delivery Models
Cloud Characteristics and Terms
Object Storage Concepts

Module 23) Cloud Computing - Virtualization and Storage 5


Management

Differences in Hypervisor Roles


Install, Configure, and Manage Virtual Machines and Devices
Virtual Resource Migration
Benefits of Virtualization in a Cloud Environment
Virtual Components Used to Construct Cloud Environments
Storage Technologies
Storage Configuration Concepts and Storage Provisioning
Network Configuration & Optimization
Common Network Protocols, Ports, and Topologies
Hardware Resources and Features Used to Enable Virtual Environments

Module 24) Cloud Computing - system management and Public Cloud 6

Policies and Procedures in a Cloud Environment


Diagnose Remediate, and Optimize Physical Host Performance
Host and Guest Performance Concepts
Implement Appropriate Testing Techniques when Deploying Cloud Services
Accessing AWS, Azure and Google cloud Platforms

Module 25) Cloud Computing - Resource management and security 4

Resource Monitoring Techniques


Best Practice for Appropriate Allocation of Physical & Virtual Host Resources
Appropriate Remote Access Tools
Network & Storage Security Concepts, Tools and Best Practices
Encryption Technologies and Methods
Identifying Access Control Methods
Implementing Guest and Host Hardening Techniques

Module 26) Cloud computing - Business Continuity in the Cloud 2

Disaster Recovery Methods and Concepts


Deploying Solutions to Meet Availability Requirements

Page VII
Term - 4 ====>Module 27) ECH - Introduction to Ethical 4
Hacking

Hacking terminologies
Types of Hackers
Penetration Testing
Security Framework guidelines and policies

Module 28) ECH - Information Gathering 5

Foot printing & Reconnaissance


Scanning Networks
Enumeration
Vulnerability Analysis

Module 29) ECH - Malware and System Hacks 10

System Hacking
Malware Threats
Sniffing
Social Engineering
Denial-of-Services
Session Hijacking
Hacking Wireless Networks
Hacking Mobile Platforms

Module 30) ECH - Web server and application base Attacks 4

Hacking Web Servers


Hacking Web Applications
SQL Injection

Module 31) ECH - Cloud Base Threats and Security 4

Evading IDS, Firewall and Honeypots Technology


IoT Hacking
Cloud Computing
Cryptography

Interview Prep for Networking CDP 13

Hardware Components,Core components,Motherboard,Ram


,CPU,HDD,BIOS,SMPS,Printers,Operating system,Types of operating system,Installation of

Page VIII
windows ,
Linux & Mac,Multi Boot installation,User accounts,Hard drive partitioning,Backup
Restore,Windows firewall and defender security,Bit locker
Network Fundamentals,Types of Network,Network Topology,OSI & TCP/IP Model Network
devices,Network Cable and connectors,IP addressing ipv4 and ipv6,Configuration IP address
,Networking protocols and port numbers Wireless standards,Configuration of access point,Internet
Troubleshooting
Routing Switching,OSI model,IP addressing,TCP/IP Protocols,Subnetting: FLSM , VLSM ,
CIDR,Router and switch basic commands,Types of routing ,Static routing,Default routing,Dynamic
Routing,Dynamic Routing protocols ,RIP,OSPF,EIGRP,IPv4 and IPv6 routing configuration
Router Nat and ACLs,DHCP and DNS services,Switching concepts,VLAN and inter
VLAN,STP,Ether Channel,Redundancy Protocols,HSRP,VRRP,GLBP,Wireless LAN
configuration,Router and switch IOS Backup and Restore,IOS Reset
configuration,VPN,SDN,CISCO DNA Center,Rest APIS
Windows server hardware and software requirements Nano server Hyper -v virtualization
DockerServices Docker hub Docker images DNS and DHCP role Raid concepts iSCSI storage
services Clustering services Quoram and heartbeat importance in cluster Live migration and fail over
Windows backup types Hyper v replica services Dhcp advance concepts Dhcp scopes Dhcp
reservation Dhcp backup Dhcp failover DNS advance concepts
DNS records Primary and secondary dns servers DNS lookup zones DNS zone transfer DNS sec
IPAM NETWORK load balancing Direct access and VPN services Radius server NPS policy Active
directory concepts Active directory components Child dc , rodc ,adc ,PDC Group policy concepts
FSMO roles ADRMS Active directory trust services ADFS
Linux basic Console Switching in between the consoles Linux directory structure Linux file systems
Linux listing commands Switching directories User account management Changing permission
Chmod ,chown practices Changing user default permission Access list controls Grep regular
expression File editors vim , nano , gedit Copying commands Scp and rsync service Tar archives
Find and locate Linux processes Analyze the logs RPM packages Yum configuration Hard links and
soft links Linux storage concepts LVM and Fd
Resizing and creation of volumes Ssh server Samba server NFS server NTP server At and crontab
scheduling task Linux networking using command lines Nmcli and nmtui , configure network file
Kick start auto configuration Selinux policy Firewalld security service Troubleshooting commands
Mail server DNS and DHCP services Centralize storage Domain services Linux Grub boot loader
Root password reset in linux Grub related troubleshooting
Hacking terminology,Types of hacker,System hacking life cycle, Types of foot printings,Example of
foot printing tools,Scanning and enumeration concept s,SNMP enumeration, Active directory
enumeration User account enumeration, Vulnerability analysis Nessus, vulnerability scanner, Nikto
vulnerability scanner System hacking Password cracking techniques Metasploit system hacking
Proxy servers Tor Browser
Malware Types of malware Trojan working process Rat and httprats Viruses Worms Social
engineering Phishing attacks Session hijacking methods Website and web application based hacking
Cross site scripting and cross site forgery attacks SQL injection
attacks Dos and D-Dos attacks Man in the middle attack Honeypots Firewall IDS system Mobile OS
hacking Android hacking Wireless WPA cracking Cryptography Types of cryptography
Cryptography tools example

Page IX

You might also like