IT SECURITY

IT SECURITY

A+
Networking Concept & Lab
CCNA 200-120 (Routing & Switching)

1:- Basic Network Hardware and IOS

2:- Understanding Network & Topology

3:- LAN & OSI

4:- IP Addressing

5:- Cisco IOS

6:- Routing Fundamental

7:- ACL

8:- NAT & WAN

9:- L2 Switching

10:- IpV6 & Wireless

11:- Redundancy

12:- Network Management

CCNA (Security 640-554)

1:- Network Security Principles

2:- Securing Cisco Routers

3:- Network security using IOS firewall via SDM

4:- Site to site VPN & SSL VPL

5:- Mitigate threat using ACL

6:- Mitigate common IOS firewall Feature set using SDM

7:- Perimeter Security

8:- Network security using ASA firewall

CCNP (Route300-101, Switch300-115, TroubleShoot300-135)

1:- Implement EIGRP based solution

2:- Implement BGP Based solution

3:- Implement multi area OSPF network

4:- Implement Layer three Path control solution

5:- GRE VPN

6:- Tunneling

7:- Dynamic Multi-point VPN

8:- Radius and TACACS+

9:- Implement VLAN

10:- Prepare Infrastructure to integrate Voice video And Wireless

11:- Implement High availability

12:- Security Extension of Layer 2 Solution

13:- Troubleshooting

20687B Configuring Windows® 8

1:- Installing and Deploying Windows 8

2:- Upgrading and Migrating to Windows 8

3:- Managing Disks and Device Drivers

4:- Configuring and Troubleshooting Network Connections

5:- Implementing Wireless Network Connections

6:- Implementing Network Security

7:- Securing Windows 8 Desktops

8:- Configuring Applications

9:- Configuring Mobile Computing and Remote Access

10:- Implementing Hyper-V

11:- Troubleshooting and Recovering Windows 8

20410B WindowServer 2012 Installing and Configuring

1:- Deploying and Managing Windows Server 2012

2:- Introduction to Active Directory Domain Services

3:- Installing a Domain Controller 2-14

4:- Managing Active Directory Domain Services Objects

5:- Implementing IPv4

6:- Implementing Dynamic Host Configuration Protocol

7:- Implementing Domain Name System

8:- Implementing IPv6

9:- Implementing Local Storage

10:- Implementing File and Print Services

12:- Implementing Group Policy

13:- Securing Windows Servers Using Group Policy Objects

14:- Implementing Server Virtualization with Hyper-V

20411B Administering Windows Server® 2012

1:- Deploying and Maintaining Server Images

2:- Configuring and Troubleshooting Domain Name System

3:- Maintaining Active Directory Domain Services

4:- Managing User and Service Accounts

5:- Implementing a Group Policy Infrastructure

6:- Managing User Desktops with Group Policy

7:- Configuring and Troubleshooting Remote Access

8:- Installing, Configuring, and Troubleshooting

9:- Implementing Network Access Protection

10:- Optimizing File Services

12:- Configuring Encryption and Advanced Auditing

13:- Implementing Update Management

14:- Monitoring Windows Server 2012

20412B Configuring Advanced Windows Server® 2012 Services

1:- Implementing Advanced Network Services

2:- Implementing Advanced File Services

3:- Implementing Dynamic Access Control

4:- Implementing Distributed Active Directory Domain Services Deployments

5:- Implementing Active Directory Domain Services Sites and Replication

6:- Implementing Active Directory Certificate Services

7:- Implementing Active Directory Rights Management Services

8:- Implementing Active Directory Federation Services

9:- Implementing Network Load Balancing

10:- Implementing Failover Clustering

11:- Implementing Failover Clustering with Hyper-V

12:- Implementing Disaster Recovery

Configuring Microsoft Exchange Server

1:- Installing Exchange Server

2:- Exchange Databases and Address Lists

3:- Exchange Mailboxes

4:- Distribution Groups and Public Folders

5:- Configuring Client Access

6:- Federated Sharing and Role Based Access Control

7:- Routing and Transport Rules

8:- Configuring Transport Servers

9:- Monitoring Exchange Server

10:- Logging and Reports

11:- Managing Records and Compliance

12:- Message Integrity, Antivirus, and Anti-Spam

13:- Exchange High-Availability Solutions

14:- Exchange Disaster Recovery

Check Point (CCSA)

1:- VPN-1 NGX and Checkpoint’s virtual network Network architecture

2:- Track, monitor and account for all connections logged by checkpoint component

3:- Protect organization from known and unknown attacks using SmartDefense

4:- Identify and address NGX security issues including encryption and VPN

5:- Implement LDAP and Integrate it with Smart centre

Red Hat Linux

1:- Introduction - Introduction

2:- Linux Ideas and History

3:- Linux Usage Basics

4:- Running Commands and Getting Help

5:- Browsing the File system

6:- Users, Groups and Permissions

7:- Using the bash Shell

8:- Standard I/O and Pipes

9:- Text Processing Tools

10:- vim: An Advanced Text Editor

11:- Basic System Configuration Tools

12:- Investigating and Managing Processes

13:- Configuring the Bash Shell

14:- Finding and Processing Files

15:- Network Clients

16:- Advanced Topics in Users, Groups and Permissions

17:- The Linux File system In-Depth

18:- Essential System Administration Tools

19:- System Initialization

20:- Package Management

21:- Kernel Services

22:- System Services

23:- User Administration

24:- File system Management

25:- Advanced File system Management

26:- Network Configuration

27:- Virtualization with Xen

28:- Troubleshooting

29:- System Performance and Security

30:- System Service Access Controls

31:- Network Resource Access Controls

32:- Organizing Networked Systems

33:- Network File Sharing Services

34:- Web Services

35:- Electronic Mail Services

36:- Securing Data

37:- Account Management

Hacking & Network Security Level 1

1:- Introduction

2:- Footprinting / Reconnaissance

3:- Google Hacking

4:- Scanning

5:- System Hacking: Win7 and Linux

6:- Android & iPhone Hacking

7:- Cross Site Scripting

8:- Sniffing

9:- Identity Theft Fraud

10:- Denial of Service

11:- Session Hijacking

12:- Penetration Testing

13:- Buffer Overflow

14:- Firewalls & Honey pots

15:- IDS & IPS

16:- Hacking Web Server

17:- Physical Security

18:- Reverse Engineering

19:- Email Hacking

20:- Security Compliance & Auditing

Hacking & Network Security Level2

1:- Open System Interconnectivity Model

2:- ICMP, WAP, NAT, DNS

3:- Advance Port Scanning

4:- DOS and DDOS

5:- Session Hijacking Attacks

6:- Network Traffic Analysis

7:- Network Vulnerability

8:- Snort

9:- OSSEC

10:- Hash Function

11:- Trust Model

12:- VLAN Security

13:- VPN Security

14:- Wireless Network

15:- WPA/WPA2 Security

16:- DNS Tunneling

17:- OS Logs and Splunk

Hacking & Web Application Security Level 3

1:- Web Architectures

2:- Php Basics

3:- Cross Site Request Forgery

4:- Web Based DDOS Attack

5:- PHP Injection

6:- Web Based Worms

7:- Cookie Poisoning

8:- Flash Based Web Attack

9:- Click Jacking

10:- Testing On DVWA

11:- OWASP 10

12:- Metasploit Framework

13:- Automated Bots

14:- Phishing 2.0

15:- Brute Forcing Web Application

16:- Summary

17:- Computer forensics

18:- Incident Handling

Related Courses