Configuring Networks
Configuring Networks
Cybersecurity
23+
YEARS
10+
LAKH
100+
Courses
of Excellence Students Trained Offered
100+
BRANCHES
800+
TRAINERS
1500+MOUs
World Wide & Industry Experts for Placements
Course
The Networking and Cybersecurity learning pathway provides a strong
foundation on the fundamentals of Networking and Cybersecurity concepts,
how to protect against them, and how cybercriminals can use their target’s
digital footprints to find exploits. Given the vastness & dynamic nature of the
cyber world, day-by-day cyber crimes are growing. Cybersecurity is the field
where it is constantly evolving with numerous opportunities at various levels.
There is an ever growing demand for exciting, well-paying jobs in today’s
Networking and Cybersecurity industry.
This professional course will give you the technical skills to become job-ready
for a Cybersecurity Analyst role. Instructional content and labs will introduce
you to concepts including network implementation, security, endpoint
protection, incident response, threat intelligence, penetration testing, and
vulnerability assessment.
Augment the
Networking knowledge
with In-demand
Cybersecurity skills
Curriculum
Introduction to Networking
Network Topologies
Networking Devices
Data encapsulation
Hub vs Switch
Connectors
PoE Concept
Port Numbers
Binary representation of IP
IPv4 Subnetting
VLSM Calculation
Switch Configuration
Port security
Upgrading IOS
Static Routes
Default Routes
Summarisation
Administrative Distance
Loopback Interfaces
RIP Routing
EIGRP Routing
EIGRP operations
EIGRP Authentication
Neighbour adjacencies
OSPF states
DHCP relay
DHCP snooping
Connectivity Troubleshooting
Inter-VLAN Routing
First Hop Redundancy Protocols
Network Redundancy
Rapid PVST+
STP Troubleshooting
Network bonding
EtherChannel (LACP, PAgP)
EtherChannel Load Balancing
Layer 3 EtherChannel
Protocol overview
Overview of Protocols
DHCP, DNS, HTTP, Telnet, SSH, NTP, HTTPS, SNMP, ICMP, POP3, IMAP, SMTP, TFTP, FTP
Configuring ACL
ACL Overview
Static NAT
Dynamic NAT
Introduction to IPv6
The IPv6 Address Format
EUI-64 Addresses
Metro Ethernet
Security Fundamentals
Common Attacks
Syslog
QoS Overview
Congestion Management
IT Services
Traditional IT Deployment Models
Server Virtualization
Network Automation
Ansible LAB
Cybersecurity
Introduction to Cybersecurity
Cryptography
Introduction to cryptography
Physical Security
Fundamentals of physically securing access to facilities and computer systems
systems
Configuring a DMZ, firewalls, NAT router, VPNs, protections against web threats
Network Defences
Introduction to Network Defences
Host defences
Introduction Host Defences
Application defences
Introduction to Application Defences
Concerns about networking software,& security considerations when using a virtual machine.
Data defences
Introduction to Data Defences
Types of Hacking
Hacking Phases
Types of Hackers
Data Management
Components of Malware
Fake Antiviruses
Cracking Passwords
Escalating Privileges
Injection Flaws
Broken Authentication
Security Misconfiguration
Insecure Deserialization
Patch Management
DDos Attack
Jamming Attack
Botnets
Service Hijacking
Social Engineering
Network sniff
XSS attack
Wi-Fi Discovery
GPS Mapping
Traffic canalizing
IP Spoofing Countermeasures
Types of Cryptography
CIPhers
Brute-Force Attack
DUHK Attack
Salary Scale
Maximum 9 LPA
Minimum 3 LPA
Job Roles
Microsoft
Certification Partners
Microsoft
Start your
23+
YEARS
of Excellence
IT Career
With Us
Get in Touch
www.rooman.net #30, 12th Main
080 4044 5566 1st Stage Rajajinagar
[email protected] Bangalore – 560010