new ccna7 200-301 training available |
Thursday, 2 January 2020
new ccna7 200-301 available now
Wednesday, 1 January 2020
CCNA Certification 200-125 to 200-301
CCNA 200-125 Certification |
Really always memorable for you.
Contact for Training and Certifications CCNA 200-301
Admissions and Course Material Available
CCNA by Saeed Labels:
CCNA Certification 200-125 to 200-301
Saturday, 21 December 2019
ccna7 200-301 New Modules in Details
New Module:
LAN Security Concepts
• Endpoint
Security: Network attacks, Security
devices, Endpoint Protection, Email and Web Security
• Access
Control: Local Password, Authentication, Authorization, Accounting, 802.1x
• Security
Threats: Layer 2 Vulnerabilities, Switch Attack Categories, Switch attack
mitigation techniques
• MAC
Address Table Attacks and mitigation
• LAN
Attacks: VLAN Hopping, VLAN Double Tagging, DHCP Attacks, ARP Attacks,
Address Spoofing attacks, STP Attacks, CDP Reconnaissance
New Module:
Switch Security Configuration
• Implement
Port Security: Secure unused ports, Mitigate MAC Address Table Attacks,
Enable Port Security, Limit and Learn MAC Addresses, Port Security Aging, Port
Security Violation Modes, Ports in err-disabled state, Verify Port Security
• Mitigate
VLAN Attacks: Mitigate VLAN Hopping
• Mitigate
DHCP Attacks: DHCP Snooping, Configuration
• Mitigate
ARP Attacks: Dyn ARP Inspection,
DAI Implementation
• Mitigate
STP Attacks: PortFast and BPDU Guard, Configuration
New Module:
WLAN Concepts
• Introduction
to Wireless: Benefits of Wireless, Type of Wireless networks, Wireless
Technologies, 802.11, Radio Frequencies, Wireless Standards Organizaions
• WLAN
Components: Wireless NIC, Wireless Home Router, Wireless Access Point, AP
Categories, Wireless Antennas
• WLAN
Operation: 802.11 Modes, BSS and ESS, 802.11 Frame Structure, CSMA/CA, Client
and AP Association, Passive and Active discovery
• CAPWAP
Operation: Introduction to CAPWAP, Split MAC Architecture, DTLS Encryption,
FlexConnect APs
• Channel
Management: Frequency Channel Saturation, Channel Selection, Planning a
WLAN Deployment
• WLAN
Threats: DoS attacks, Rouge Access Points, MITM Attack
• Secure
WLANs: SSID Cloaking and MAC Filtering, 802.11 Original Auth. Methods,
Shared Key auth. Methods, Authenticating a home user, Encryption Methods, Auth.
In the Enterprise, WPA3
New Module:
WLAN Configuration
• Remote
Site WLAN Configuration: Wireless Router, Log in to Wireless Router, Basic
Network setup, Configure a wireless mesh network, NAT for IPv4, QoS
• Configure
a Basic WLAN on the WLC: WLC Topology, Log into the WLC, View AP
Information, Advanced Settings, Configure a WLAN
• Configure
a WPA2 Enterprise WLAN on the WLC: SNMP and RADIUS, Configure SNMP Server
Information, Configure RADIUS Server Information, Configure a VLAN for a New
WLAN, Topology with VLAN 5 Addressing, Configure a new Interface, Configure a
DHCP in a new WLAN, Configure DHCP Scope, Configure WPA2 Enterprise WLAN
• Troubleshoot
WLAN Issues: Wireless Client not connecting, Network is slow, Updating
Firmware
New Module:
Network Security Concepts
• Current
State of Cybersecurity: Current state of Affairs, Vectors of network
attacks, Data Loss
• Threat
Actors: The Hacker, Evolution of Hackers, Cyber Criminals, Hacktivists,
State-Sponsored Hackers
• Threat
Actor Tools: Attack Tools, Evolution of Security Tools, Attack Types
• Malware:
Viruses and Trojan Horses, Types of Malware
• Common
Network Attacks: Reconnaissance, Access, Social Engineering, Dos and DDoS
• IP
Vulnerabilities and Threats: ICMP, Amplification and Reflection, Address
Spoofing Attacks
• TCP
and UDP Vulnerabilities: TCP and UDP Segment Header, TCP Services, TCP
Attacks, UDP Attacks
• IP
Services: ARP Vulnerabilities, ARP Cache poisoning, DNS Attacks, DNS
Tunneling, DHCP Attacks
• Network
Security Best Practices: CIA, Defence-in-Depth approach, Firewalls, IPS,
Content Security Appliances
• Cryptography:
Securing communication, Data Integrity, Hash Functions, Origin Auth., Data
Confidentiality, Symmetric Encryption, Asymmetric Encryption, Deffie-Helman
New Module:
VPN and IPsec Concepts
• VPN
Technology: VPN Benefits, Site-to-Site and Remote-access VPN, Enterprise
and Service provider VPN
• Types
of VPN: Remote-access, SSL, Site-to-Site IPsec, GRE over IPsec, DMVPN,
IPsec Virtual Tunnel Interface, Service Provider MPLS
• IPsec:
IPsec concepts, IPsec technologies,
IPsec protocol encapsulation, Confidentiality, Integrity, Authentication,
Secure Key Exchange with DH, IPsec transport and Tunnel modes
New Module:
Network Automation
• Automation
Overview
• Data
Formats: Data formats concept, data format rules, JSON, YAML, XML
• APIs:
API Concept, API Example, Open, Internal and Partner APIs, Types of Web Service
APIs
• REST:
REST and RESTful API, RESTful implementation, URI/URN/URL, Anatomy of RESTful
Request, RESTful API Applications
• Configuration
Management Tools: Traditional Network Configuration, Network Automation,
Ansible, Chef, Puppet, SaltStack
• IBN
and Cisco DNA Center: Intent Based Networking, Network Infrastructure as
Fabric, Cisco DNA, CDA Center
CCNA by Saeed Labels:
ccna7 200-301 New Modules in Details
CCNA version 6 v/s CCNA version 7
CCNA version 6 v/s CCNA version 7 Module 1 |
CCNA version 6 v/s CCNA version 7 Module 2 |
CCNA version 6 v/s CCNA version 7 Module 3 |
CCNA by Saeed Labels:
CCNA version 6 v/s CCNA version 7
Content removed from ccna version 6 routing and switching
CCNA by Saeed Labels:
Content removed from ccna version 6 routing and switching
Friday, 13 December 2019
Kali Linux Training | Hacking sessions | Learn Linux in Faisalabad
The NDG Linux Essentials course objectives cover the following subject areas:
• Linux as an operating system
• Considerations for choosing an operating system
• The basics of open source software and licensing
• Basic knowledge of working with Linux
• Basic Linux command line skills
• How to use help commands and navigate help systems when using Linux
• How to work with Linux files and directories
• Search and extract data from Linux files
• Basic understanding of the concept of scripting
• The components of desktop and server computers
• Where data is stored on a Linux system
• Query vital network settings for a Linux computer on a Local Area Network
• Various types of users on a Linux system
• Creating users and groups on a Linux system
• Managing Linux file permissions and ownership
• Special Linux directories and files
0301-7640931 041-8542950 041-2640083
CCNA by Saeed Labels:
hacking linux,
kali linux,
linux training
Sunday, 1 December 2019
Storing Switch Configuration Files
When you configure a switch, it needs to use the configuration. It also needs to be able
to retain the configuration in case the switch loses power. Cisco switches contain randomaccess memory (RAM) to store data while Cisco IOS is using it, but RAM loses its contents
when the switch loses power or is reloaded. To store information that must be retained when
the switch loses power or is reloaded, Cisco switches use several types of more permanent
memory, none of which has any moving parts. By avoiding components with moving parts
(such as traditional disk drives), switches can maintain better uptime and availability.
The following list details the four main types of memory found in Cisco switches, as well as
the most common use of each type:
■ RAM: Sometimes called DRAM, for dynamic random-access memory, RAM is used
by the switch just as it is used by any other computer: for working storage. The running
(active) configuration file is stored here.
■ Flash memory: Either a chip inside the switch or a removable memory card, flash memory stores fully functional Cisco IOS images and is the default location where the switch
gets its Cisco IOS at boot time. Flash memory also can be used to store any other files,
including backup copies of configuration files.
■ ROM: Read-only memory (ROM) stores a bootstrap (or boothelper) program that is loaded when the switch first powers on. This bootstrap program then finds the full Cisco IOS
image and manages the process of loading Cisco IOS into RAM, at which point Cisco
IOS takes over operation of the switch.
■ NVRAM: Nonvolatile RAM (NVRAM) stores the initial or startup configuration file that
is used when the switch is first powered on and when the switch is reloaded.
CCNA by Saeed Labels:
memory command,
router memory,
show mem,
show run,
show start,
switch config,
switch configuration,
switch memory
Subscribe to:
Posts (Atom)