Professional Documents
Culture Documents
Page I
insert table, add pic Text alignment with image
Word to pdf convert, pdf to word convertor
Introduction to Networks
Network Topologies
OSI Layer
Network Cable and connectors
Ethernet standard and specification
Page II
Network devices
IP addressing & Subnetting
Configure IPv6 Addressing
IP routing and routing protocols
Switching and VLANS
Wireless Networking
Page III
Describe the operation of Access Control Lists (ACLs)
Configure Internet access using Dynamic Host Configuration Protocol (DHCP) explain and
configure Network Address Translation (NAT) on Cisco routers
Describe basic Quality of Service (QoS) concepts
Describe the concepts of wireless networks
use of Wireless LAN Controllers (WLCs)
Page IV
Module 14) Windows server - Identity with Windows Server 24
Module 18) Linux server - Manage user and Groups and working 6
with file systems
Page V
Create, delete, and modify local user accounts
Change passwords and adjust password aging for local user accounts
Create, delete, and modify local groups and group memberships
Create, mount, unmount, and use vfat, ext4, and xfs file systems
Mount and unmount network file systems using NFS
Extend existing logical volumes
Create and configure set-GID directories for collaboration
Configure disk compression & Manage layered storage
Diagnose and correct file permission problems
Page VI
Contrasting Cloud Delivery Models
Cloud Characteristics and Terms
Object Storage Concepts
Page VII
Term - 4 ====>Module 27) ECH - Introduction to Ethical 4
Hacking
Hacking terminologies
Types of Hackers
Penetration Testing
Security Framework guidelines and policies
System Hacking
Malware Threats
Sniffing
Social Engineering
Denial-of-Services
Session Hijacking
Hacking Wireless Networks
Hacking Mobile Platforms
Page VIII
windows ,
Linux & Mac,Multi Boot installation,User accounts,Hard drive partitioning,Backup
Restore,Windows firewall and defender security,Bit locker
Network Fundamentals,Types of Network,Network Topology,OSI & TCP/IP Model Network
devices,Network Cable and connectors,IP addressing ipv4 and ipv6,Configuration IP address
,Networking protocols and port numbers Wireless standards,Configuration of access point,Internet
Troubleshooting
Routing Switching,OSI model,IP addressing,TCP/IP Protocols,Subnetting: FLSM , VLSM ,
CIDR,Router and switch basic commands,Types of routing ,Static routing,Default routing,Dynamic
Routing,Dynamic Routing protocols ,RIP,OSPF,EIGRP,IPv4 and IPv6 routing configuration
Router Nat and ACLs,DHCP and DNS services,Switching concepts,VLAN and inter
VLAN,STP,Ether Channel,Redundancy Protocols,HSRP,VRRP,GLBP,Wireless LAN
configuration,Router and switch IOS Backup and Restore,IOS Reset
configuration,VPN,SDN,CISCO DNA Center,Rest APIS
Windows server hardware and software requirements Nano server Hyper -v virtualization
DockerServices Docker hub Docker images DNS and DHCP role Raid concepts iSCSI storage
services Clustering services Quoram and heartbeat importance in cluster Live migration and fail over
Windows backup types Hyper v replica services Dhcp advance concepts Dhcp scopes Dhcp
reservation Dhcp backup Dhcp failover DNS advance concepts
DNS records Primary and secondary dns servers DNS lookup zones DNS zone transfer DNS sec
IPAM NETWORK load balancing Direct access and VPN services Radius server NPS policy Active
directory concepts Active directory components Child dc , rodc ,adc ,PDC Group policy concepts
FSMO roles ADRMS Active directory trust services ADFS
Linux basic Console Switching in between the consoles Linux directory structure Linux file systems
Linux listing commands Switching directories User account management Changing permission
Chmod ,chown practices Changing user default permission Access list controls Grep regular
expression File editors vim , nano , gedit Copying commands Scp and rsync service Tar archives
Find and locate Linux processes Analyze the logs RPM packages Yum configuration Hard links and
soft links Linux storage concepts LVM and Fd
Resizing and creation of volumes Ssh server Samba server NFS server NTP server At and crontab
scheduling task Linux networking using command lines Nmcli and nmtui , configure network file
Kick start auto configuration Selinux policy Firewalld security service Troubleshooting commands
Mail server DNS and DHCP services Centralize storage Domain services Linux Grub boot loader
Root password reset in linux Grub related troubleshooting
Hacking terminology,Types of hacker,System hacking life cycle, Types of foot printings,Example of
foot printing tools,Scanning and enumeration concept s,SNMP enumeration, Active directory
enumeration User account enumeration, Vulnerability analysis Nessus, vulnerability scanner, Nikto
vulnerability scanner System hacking Password cracking techniques Metasploit system hacking
Proxy servers Tor Browser
Malware Types of malware Trojan working process Rat and httprats Viruses Worms Social
engineering Phishing attacks Session hijacking methods Website and web application based hacking
Cross site scripting and cross site forgery attacks SQL injection
attacks Dos and D-Dos attacks Man in the middle attack Honeypots Firewall IDS system Mobile OS
hacking Android hacking Wireless WPA cracking Cryptography Types of cryptography
Cryptography tools example
Page IX