background

Home / Training / IT Training / Job Oriented Courses / Network Administration

Image

Network Administration

India has witnessed a extraordinary growth in the number of Telecom Service Providers, Chain of Retail/Media/Healthcare, E-Governance Project, ATMs installed, BPO and IT companies. Network Connectivity is the backbone of all these segments, which leads to great employment opportunity for candidates with skills to manage Small to Large Network consisting of various Firewalls, ISDN, Routers, connected through Leased Line, Switches, Broadband, MPLS. A businedd network connects all the isolated departmental or work group networks into an intra-company network. In this scenario, no group or user is an island. All systems can potentially communicate with all other systems while maintaining reasonable security, reliability, and performance. This course starts with basics of Networking and covers Establishing and Securing an Enterprise Network.

Audience:

Students who has completed their Diploma/Graduation in Electronics/Computer Science and have fair knowledge of Windows/Linux and Networking.

Duration of the course
Part Time : 180 Days(2 hrs./day)
Full Time : 90 Days(4 hrs./day)


Key Benefits:

On completion of this course, the candidate will have the opportunity to work as Network Engineer for ISP/IT/Telecom/Infrastructure Management companies Network Administrator for MNC/Retail Chain/Healthcare/Media Network Support in Technical Call Center Entrepreneurial opportunity to run your own Business.


Course Outline

Network +

  • Introduction to Network
  • ISO/OSI Reference Model
  • Network & Cable Types
  • LAN Technologies
  • Networking Topology
  • Networking Devices
  • TCP/IP
  • IP Addressing
  • Subnet and Supernet
  • DHCP
  • DNS & WINS
  • IP Routing
  • TCP/IP Utilities
  • WAN Technologies
  • Security Protocol (IPSEC, L2TP)
  • Troubleshooting network problem

CCNA: Version 3

  • INTERNETWORKING CONCEPTS OVERVIEW
  • IP ADDRESSING
  • IPV6 ADDRESSING
  • ASSEMBLING AND CABLING CISCO DEVICES
  • OPERATING AND CONFIGURING A CISCO IOS DEVICE
  • MANAGING YOUR NETWORK ENVIRONMENT
  • Determining IP Routes
  • Routing Protocol Overview
  • Introducing Link-State Protocol OSPF
  • OSPF LINK STATE ROUTING PROTOCOL
  • INTRODUCING HYBRID ROUTING PROTOCOL EIGRP
  • EIGRP HYBRID ROUTING PROTOCOL
  • Introduction to BGP
  • BASIC IP TRAFFIC MANAGEMENT WITH ACCESS LISTS
  • IMPLEMENTING TYPES OF ACCESS LISTS
  • SCALING IP ADDRESS SPACE
  • Introduction to different WAN protocols
  • WAN TECHNOLOGIES
  • INTRODUCTION TO FRAME RELAY
  • INTRODUCTION TO VPN
  • CONFIGURING VPN
  • IP SERVICES
  • Troubleshoot network connectivity issues using ICMP echo-based IP SLA
  • QUALITY OF SERVICE - QOS
  • SWITCHING
  • ADVANCE STP PROCESS
  • VIRTUAL LANs (VLANs)
  • CONFIGURING LAYER 2 SECURITY
  • CONFIGURING INTER VLAN ROUTING
  • Switch Ether channel
  • DEVICE MANAGEMENT - AAA
  • INTRODUCTION TO CLOUD

CCNP ROUTE (300-101): Implementing Cisco IP Routing(ROUTE):

Implementing Basic EIGRP:

  • Describing Network Requirements
  • Introducing EIGRP
  • Configuring Advanced EIGRP Options
  • Using EIGRP in an Enterprise Network
  • Introducing the OSPF Protocol
  • OSPF LSA Types
  • OSPF Route Summarization
  • Introducing OSPF Network Types
  • Configuring Special Area Types
  • Route Redistribution
  • Controlling Routing Update Traffic
  • Using BGP in an Enterprise Network
  • Explaining EBGP and IBGP
  • Configuring Basic BGP Operations
  • Selecting a BGP Path
  • Route Maps to Manipulate BGP Paths
  • Introduction to IPv6
  • Implementing IPv6 Routing Protocols
  • IPV6 and IPV4 co-existence
  • Routing over Branch offices
  • Introduction to IPSec VPN
  • Introduction to GRE Tunnel

CCNP SWITCH (300-115): Implementing Cisco IP Switching(SWITCH):

  • Introducing Campus Networks
  • Implementing VLAN Topologies
  • Implementing VLANs
  • Implementing Trunks
  • Propagating VLAN Configurations with VTP
  • Correcting Common VLAN Configuration Errors
  • Describing the STP
  • Implementing RSTP
  • Implementing MSTP
  • Configuring Link Aggregation with EtherChannel
  • Describing Routing Between VLANs
  • Enabling Routing Between VLANs on a Multilayer Switch
  • Deploying CEF-Based Multilayer Switching
  • Configuring Layer 3 Redundancy with HSRP
  • Optimizing HSRP
  • Configuring Layer 3 Redundancy with VRRP and GLBP
  • Introducing WLANs
  • Describing WLAN Topologies
  • Planning for Implementation of Voice in a Campus Network
  • Accommodating Voice Traffic on Campus Switches
  • Understanding Switch Security Issues
  • Protecting Against VLAN Attacks
  • Protecting Against Spoof Attacks
  • Describing STP Security Mechanisms

CCNP Troubleshooting and Maintaining Cisco IP Networks (TSHOOT): 300-135

Planning Maintenance for Complex Networks:
  • Selecting Maintenance and Troubleshooting Tools and Applications
  • Planning Troubleshooting Processes for Complex Enterprise Networks
  • Maintaining and Troubleshooting Campus Switching-Based Problems
  • Maintaining and Troubleshooting Routing Based Solutions
  • Maintaining and Troubleshooting Network Security Solutions
  • Maintaining and Troubleshooting Integrated, Complex Enterprise Networks
  • Troubleshooting Performance Problems on Switches
  • Troubleshooting Wireless Connectivity
  • Troubleshooting Voice over IP
  • Troubleshooting Multicast
  • Troubleshooting NAT and PAT
  • Troubleshooting DHCP
  • Troubleshooting IPv6, OSPFv3, and RIPngCCNA SECURITY
  • Describe and list mitigation methods for common network attacks
  • Describe and list mitigation methods for Worm, Virus, and Trojan Horse attacks
  • Describe the Cisco Self Defending Network architecture
  • Secure Cisco routers using the SDM Security Audit feature
  • Secure Cisco routers by configuring multiple privilege levels and role based CLI
  • Implement AAA on Cisco routers using local router database and external ACS
  • Mitigate threats to Cisco routers and networks using ACLs
  • Configure IP ACLs to prevent IP address spoofing using CLI
  • Discuss the caveats to be considered when building ACLs
  • Use CLI and SDM to configure SSH on Cisco routers to enable secured management access
  • Use CLI and SDM to configure Cisco routers to send Syslog messages to a Syslog server
  • Mitigate common Layer 2 attacks
  • Describe the operational strengths and weaknesses of the different firewall technologies
  • Explain stateful firewall operations and the function of the state table
  • Implement Zone Based Firewall using SDM
  • Define network based vs. host based intrusion detection and prevention
  • Explain IPS technologies, attack responses, and monitoring options
  • Enable and verify Cisco IOS IPS operations using SDM
  • Explain the different methods used in cryptography
  • Explain IKE protocol functionality and phases
  • Describe the building blocks of IPSec and the security functions it provides
  • Configure and verify an IPSec site-to-site VPN with pre-shared key authentication using SDM

CCNA Security

Analyzing Campus Network Designs:
  • Understanding Network Security Principles
  • Understanding the Methods of Network Attacks
  • Developing a Secure Network
  • Creating a Cisco Self-Defending Network
  • Cisco Security Device Manager Overview
  • Configuring AAA
  • IOS Security Features
  • Cisco Integrated Services Routers
  • Cisco 800 Series, Cisco 1800 Series, Cisco 2800 Series
  • Cisco 3800 Series
  • Configuring AAA Using Cisco Secure ACS
  • Overview of TACACS+ and RADIUS
  • Securing the Router
  • Cisco SDM One-Step Lockdown
  • Review of Layer 2 Switch Operation Basic Approaches to Protecting Layer 2 Switches
  • Preventing VLAN Hopping
  • Additional Cisco Catalyst Switch Security Features
  • Cisco Identity-Based Networking Services
  • Implementing Endpoint Security
  • Securing Endpoints with Cisco Technologies
  • Providing SAN Security
  • Identifying Port Authentication Protocols
  • Understanding DHCHAP
  • Exploring Secure Voice Solutions
  • Defining VoIP
  • Using Cisco IOS Firewalls to Defend the Network
  • Application Inspection Firewall Operation
  • Using ACLs to Construct Static Packet Filters
  • Implementing a Cisco IOS Zone-Based Firewall
  • Zone Membership Rules
  • Using Cisco IOS IPS to Secure the Network 385
  • Designing a Cryptographic

642-618 FIREWALL v1.0 Deploying Cisco ASA Firewall Solutions:

Introduction to the Cisco ASA Adaptive Security Appliance:
  • Implementation of Basic Connectivity and Device Management
  • Deployment of Cisco ASA Adaptive Security Appliance Access Control Features
  • Deployment of Cisco ASA Adaptive Security Appliance Network Integration Features
  • Deployment of Cisco ASA Adaptive Security Appliance Virtualization and High-Availability Features
  • Integration of Cisco ASA Adaptive Security Appliance Security Service Modules
  • Configuring Routing on the Cisco ASA Adaptive Security Appliance
  • Lab (Optional): Configuring Dynamic Routing