Saturday 21 December 2019

ccna7 200-301 New Modules in Details

New Module: LAN Security Concepts
       Endpoint Security:  Network attacks, Security devices, Endpoint Protection, Email and Web Security
       Access Control: Local Password, Authentication, Authorization, Accounting, 802.1x
       Security Threats: Layer 2 Vulnerabilities, Switch Attack Categories, Switch attack mitigation techniques
       MAC Address Table Attacks and mitigation
       LAN Attacks: VLAN Hopping, VLAN Double Tagging, DHCP Attacks, ARP Attacks, Address Spoofing attacks, STP Attacks, CDP Reconnaissance
New Module: Switch Security Configuration
       Implement Port Security: Secure unused ports, Mitigate MAC Address Table Attacks, Enable Port Security, Limit and Learn MAC Addresses, Port Security Aging, Port Security Violation Modes, Ports in err-disabled state, Verify Port Security
       Mitigate VLAN Attacks: Mitigate VLAN Hopping
       Mitigate DHCP Attacks: DHCP Snooping, Configuration
       Mitigate ARP Attacks: Dyn ARP Inspection,  DAI Implementation
       Mitigate STP Attacks: PortFast and BPDU Guard, Configuration
New Module: WLAN Concepts
       Introduction to Wireless: Benefits of Wireless, Type of Wireless networks, Wireless Technologies, 802.11, Radio Frequencies, Wireless Standards Organizaions
       WLAN Components: Wireless NIC, Wireless Home Router, Wireless Access Point, AP Categories, Wireless Antennas
       WLAN Operation: 802.11 Modes, BSS and ESS, 802.11 Frame Structure, CSMA/CA, Client and AP Association, Passive and Active discovery
       CAPWAP Operation: Introduction to CAPWAP, Split MAC Architecture, DTLS Encryption, FlexConnect APs
       Channel Management: Frequency Channel Saturation, Channel Selection, Planning a WLAN Deployment
       WLAN Threats: DoS attacks, Rouge Access Points, MITM Attack
       Secure WLANs: SSID Cloaking and MAC Filtering, 802.11 Original Auth. Methods, Shared Key auth. Methods, Authenticating a home user, Encryption Methods, Auth. In the Enterprise, WPA3
New Module: WLAN Configuration
       Remote Site WLAN Configuration: Wireless Router, Log in to Wireless Router, Basic Network setup, Configure a wireless mesh network, NAT for IPv4, QoS
       Configure a Basic WLAN on the WLC: WLC Topology, Log into the WLC, View AP Information, Advanced Settings, Configure a WLAN
       Configure a WPA2 Enterprise WLAN on the WLC: SNMP and RADIUS, Configure SNMP Server Information, Configure RADIUS Server Information, Configure a VLAN for a New WLAN, Topology with VLAN 5 Addressing, Configure a new Interface, Configure a DHCP in a new WLAN, Configure DHCP Scope, Configure WPA2 Enterprise WLAN
       Troubleshoot WLAN Issues: Wireless Client not connecting, Network is slow, Updating Firmware
New Module: Network Security Concepts
       Current State of Cybersecurity: Current state of Affairs, Vectors of network attacks, Data Loss
       Threat Actors: The Hacker, Evolution of Hackers, Cyber Criminals, Hacktivists, State-Sponsored Hackers
       Threat Actor Tools: Attack Tools, Evolution of Security Tools, Attack Types
       Malware: Viruses and Trojan Horses, Types of Malware
       Common Network Attacks: Reconnaissance, Access, Social Engineering, Dos and DDoS
       IP Vulnerabilities and Threats: ICMP, Amplification and Reflection, Address Spoofing Attacks
       TCP and UDP Vulnerabilities: TCP and UDP Segment Header, TCP Services, TCP Attacks, UDP Attacks
       IP Services: ARP Vulnerabilities, ARP Cache poisoning, DNS Attacks, DNS Tunneling, DHCP Attacks
       Network Security Best Practices: CIA, Defence-in-Depth approach, Firewalls, IPS, Content Security Appliances
       Cryptography: Securing communication, Data Integrity, Hash Functions, Origin Auth., Data Confidentiality, Symmetric Encryption, Asymmetric Encryption, Deffie-Helman

New Module: VPN and IPsec Concepts
       VPN Technology: VPN Benefits, Site-to-Site and Remote-access VPN, Enterprise and Service provider VPN
       Types of VPN: Remote-access, SSL, Site-to-Site IPsec, GRE over IPsec, DMVPN, IPsec Virtual Tunnel Interface, Service Provider MPLS
       IPsec: IPsec  concepts, IPsec technologies, IPsec protocol encapsulation, Confidentiality, Integrity, Authentication, Secure Key Exchange with DH, IPsec transport and Tunnel modes
New Module: Network Automation
       Automation Overview
       Data Formats: Data formats concept, data format rules, JSON, YAML, XML
       APIs: API Concept, API Example, Open, Internal and Partner APIs, Types of Web Service APIs
       REST: REST and RESTful API, RESTful implementation, URI/URN/URL, Anatomy of RESTful Request, RESTful API Applications
       Configuration Management Tools: Traditional Network Configuration, Network Automation, Ansible, Chef, Puppet, SaltStack
       IBN and Cisco DNA Center: Intent Based Networking, Network Infrastructure as Fabric, Cisco DNA, CDA Center


CCNA version 6 v/s CCNA version 7

CCNA version 6 v/s CCNA version 7 Module 1

CCNA version 6 v/s CCNA version 7 Module 2 
CCNA version 6 v/s CCNA version 7 Module 3


Content removed from ccna version 6 routing and switching

Content removed from ccna version 6 routing and switching

Friday 13 December 2019

Kali Linux Training | Hacking sessions | Learn Linux in Faisalabad

The NDG Linux Essentials course objectives cover the following subject areas:
• Linux as an operating system
• Considerations for choosing an operating system
• The basics of open source software and licensing
• Basic knowledge of working with Linux
• Basic Linux command line skills
• How to use help commands and navigate help systems when using Linux
• How to work with Linux files and directories
• Search and extract data from Linux files
• Basic understanding of the concept of scripting
• The components of desktop and server computers
• Where data is stored on a Linux system
• Query vital network settings for a Linux computer on a Local Area Network
• Various types of users on a Linux system
• Creating users and groups on a Linux system
• Managing Linux file permissions and ownership
• Special Linux directories and files
0301-7640931    041-8542950   041-2640083

Sunday 1 December 2019

Storing Switch Configuration Files


When you configure a switch, it needs to use the configuration. It also needs to be able to retain the configuration in case the switch loses power. Cisco switches contain randomaccess memory (RAM) to store data while Cisco IOS is using it, but RAM loses its contents when the switch loses power or is reloaded. To store information that must be retained when the switch loses power or is reloaded, Cisco switches use several types of more permanent memory, none of which has any moving parts. By avoiding components with moving parts (such as traditional disk drives), switches can maintain better uptime and availability. The following list details the four main types of memory found in Cisco switches, as well as the most common use of each type: 
RAM: Sometimes called DRAM, for dynamic random-access memory, RAM is used by the switch just as it is used by any other computer: for working storage. The running (active) configuration file is stored here.
Flash memory: Either a chip inside the switch or a removable memory card, flash memory stores fully functional Cisco IOS images and is the default location where the switch gets its Cisco IOS at boot time. Flash memory also can be used to store any other files, including backup copies of configuration files. 
ROM: Read-only memory (ROM) stores a bootstrap (or boothelper) program that is loaded when the switch first powers on. This bootstrap program then finds the full Cisco IOS image and manages the process of loading Cisco IOS into RAM, at which point Cisco IOS takes over operation of the switch. 
NVRAM: Nonvolatile RAM (NVRAM) stores the initial or startup configuration file that is used when the switch is first powered on and when the switch is reloaded.