Saturday, 21 December 2019

ccna7 200-301 New Modules in Details

New Module: LAN Security Concepts
       Endpoint Security:  Network attacks, Security devices, Endpoint Protection, Email and Web Security
       Access Control: Local Password, Authentication, Authorization, Accounting, 802.1x
       Security Threats: Layer 2 Vulnerabilities, Switch Attack Categories, Switch attack mitigation techniques
       MAC Address Table Attacks and mitigation
       LAN Attacks: VLAN Hopping, VLAN Double Tagging, DHCP Attacks, ARP Attacks, Address Spoofing attacks, STP Attacks, CDP Reconnaissance
New Module: Switch Security Configuration
       Implement Port Security: Secure unused ports, Mitigate MAC Address Table Attacks, Enable Port Security, Limit and Learn MAC Addresses, Port Security Aging, Port Security Violation Modes, Ports in err-disabled state, Verify Port Security
       Mitigate VLAN Attacks: Mitigate VLAN Hopping
       Mitigate DHCP Attacks: DHCP Snooping, Configuration
       Mitigate ARP Attacks: Dyn ARP Inspection,  DAI Implementation
       Mitigate STP Attacks: PortFast and BPDU Guard, Configuration
New Module: WLAN Concepts
       Introduction to Wireless: Benefits of Wireless, Type of Wireless networks, Wireless Technologies, 802.11, Radio Frequencies, Wireless Standards Organizaions
       WLAN Components: Wireless NIC, Wireless Home Router, Wireless Access Point, AP Categories, Wireless Antennas
       WLAN Operation: 802.11 Modes, BSS and ESS, 802.11 Frame Structure, CSMA/CA, Client and AP Association, Passive and Active discovery
       CAPWAP Operation: Introduction to CAPWAP, Split MAC Architecture, DTLS Encryption, FlexConnect APs
       Channel Management: Frequency Channel Saturation, Channel Selection, Planning a WLAN Deployment
       WLAN Threats: DoS attacks, Rouge Access Points, MITM Attack
       Secure WLANs: SSID Cloaking and MAC Filtering, 802.11 Original Auth. Methods, Shared Key auth. Methods, Authenticating a home user, Encryption Methods, Auth. In the Enterprise, WPA3
New Module: WLAN Configuration
       Remote Site WLAN Configuration: Wireless Router, Log in to Wireless Router, Basic Network setup, Configure a wireless mesh network, NAT for IPv4, QoS
       Configure a Basic WLAN on the WLC: WLC Topology, Log into the WLC, View AP Information, Advanced Settings, Configure a WLAN
       Configure a WPA2 Enterprise WLAN on the WLC: SNMP and RADIUS, Configure SNMP Server Information, Configure RADIUS Server Information, Configure a VLAN for a New WLAN, Topology with VLAN 5 Addressing, Configure a new Interface, Configure a DHCP in a new WLAN, Configure DHCP Scope, Configure WPA2 Enterprise WLAN
       Troubleshoot WLAN Issues: Wireless Client not connecting, Network is slow, Updating Firmware
New Module: Network Security Concepts
       Current State of Cybersecurity: Current state of Affairs, Vectors of network attacks, Data Loss
       Threat Actors: The Hacker, Evolution of Hackers, Cyber Criminals, Hacktivists, State-Sponsored Hackers
       Threat Actor Tools: Attack Tools, Evolution of Security Tools, Attack Types
       Malware: Viruses and Trojan Horses, Types of Malware
       Common Network Attacks: Reconnaissance, Access, Social Engineering, Dos and DDoS
       IP Vulnerabilities and Threats: ICMP, Amplification and Reflection, Address Spoofing Attacks
       TCP and UDP Vulnerabilities: TCP and UDP Segment Header, TCP Services, TCP Attacks, UDP Attacks
       IP Services: ARP Vulnerabilities, ARP Cache poisoning, DNS Attacks, DNS Tunneling, DHCP Attacks
       Network Security Best Practices: CIA, Defence-in-Depth approach, Firewalls, IPS, Content Security Appliances
       Cryptography: Securing communication, Data Integrity, Hash Functions, Origin Auth., Data Confidentiality, Symmetric Encryption, Asymmetric Encryption, Deffie-Helman

New Module: VPN and IPsec Concepts
       VPN Technology: VPN Benefits, Site-to-Site and Remote-access VPN, Enterprise and Service provider VPN
       Types of VPN: Remote-access, SSL, Site-to-Site IPsec, GRE over IPsec, DMVPN, IPsec Virtual Tunnel Interface, Service Provider MPLS
       IPsec: IPsec  concepts, IPsec technologies, IPsec protocol encapsulation, Confidentiality, Integrity, Authentication, Secure Key Exchange with DH, IPsec transport and Tunnel modes
New Module: Network Automation
       Automation Overview
       Data Formats: Data formats concept, data format rules, JSON, YAML, XML
       APIs: API Concept, API Example, Open, Internal and Partner APIs, Types of Web Service APIs
       REST: REST and RESTful API, RESTful implementation, URI/URN/URL, Anatomy of RESTful Request, RESTful API Applications
       Configuration Management Tools: Traditional Network Configuration, Network Automation, Ansible, Chef, Puppet, SaltStack
       IBN and Cisco DNA Center: Intent Based Networking, Network Infrastructure as Fabric, Cisco DNA, CDA Center


CCNA version 6 v/s CCNA version 7

CCNA version 6 v/s CCNA version 7 Module 1

CCNA version 6 v/s CCNA version 7 Module 2 
CCNA version 6 v/s CCNA version 7 Module 3


Content removed from ccna version 6 routing and switching

Content removed from ccna version 6 routing and switching

Friday, 13 December 2019

Kali Linux Training | Hacking sessions | Learn Linux in Faisalabad

The NDG Linux Essentials course objectives cover the following subject areas:
• Linux as an operating system
• Considerations for choosing an operating system
• The basics of open source software and licensing
• Basic knowledge of working with Linux
• Basic Linux command line skills
• How to use help commands and navigate help systems when using Linux
• How to work with Linux files and directories
• Search and extract data from Linux files
• Basic understanding of the concept of scripting
• The components of desktop and server computers
• Where data is stored on a Linux system
• Query vital network settings for a Linux computer on a Local Area Network
• Various types of users on a Linux system
• Creating users and groups on a Linux system
• Managing Linux file permissions and ownership
• Special Linux directories and files
0301-7640931    041-8542950   041-2640083

Sunday, 1 December 2019

Storing Switch Configuration Files


When you configure a switch, it needs to use the configuration. It also needs to be able to retain the configuration in case the switch loses power. Cisco switches contain randomaccess memory (RAM) to store data while Cisco IOS is using it, but RAM loses its contents when the switch loses power or is reloaded. To store information that must be retained when the switch loses power or is reloaded, Cisco switches use several types of more permanent memory, none of which has any moving parts. By avoiding components with moving parts (such as traditional disk drives), switches can maintain better uptime and availability. The following list details the four main types of memory found in Cisco switches, as well as the most common use of each type: 
RAM: Sometimes called DRAM, for dynamic random-access memory, RAM is used by the switch just as it is used by any other computer: for working storage. The running (active) configuration file is stored here.
Flash memory: Either a chip inside the switch or a removable memory card, flash memory stores fully functional Cisco IOS images and is the default location where the switch gets its Cisco IOS at boot time. Flash memory also can be used to store any other files, including backup copies of configuration files. 
ROM: Read-only memory (ROM) stores a bootstrap (or boothelper) program that is loaded when the switch first powers on. This bootstrap program then finds the full Cisco IOS image and manages the process of loading Cisco IOS into RAM, at which point Cisco IOS takes over operation of the switch. 
NVRAM: Nonvolatile RAM (NVRAM) stores the initial or startup configuration file that is used when the switch is first powered on and when the switch is reloaded.

Wednesday, 27 November 2019

CCNA7 Classes in Faisalabad


CCNAv7: Introduction to Networks (ITN) The first course in the CCNA curriculum introduces the architectures, models, protocols, and networking elements that connect users, devices, applications and data through the Internet and across modern computer networks - including IP addressing and Ethernet fundamentals. By the end of the course, students can build simple local area networks (LAN) that integrate IP addressing schemes, foundational network security, and perform basic configurations for routers and switches. 

CCNAv7: Switching, Routing, and Wireless Essentials (SRWE) The second course in the CCNA curriculum focuses on switching technologies and router operations that support small-to-medium business networks and includes wireless local area networks (WLAN) and security concepts. Students learn key switching and routing concepts. They can perform basic network configuration and troubleshooting, identify and mitigate LAN security threats, and configure and secure a basic WLAN. 

CCNAv7: Enterprise Networking, Security, and Automation (ENSA) The third course in the CCNA curriculum describes the architectures and considerations related to designing, securing, operating, and troubleshooting enterprise networks. This course covers wide area network (WAN) technologies and quality of service (QoS) mechanisms used for secure remote access along with the introduction of software-defined networking, virtualization, and automation concepts that support the digitalization of networks. Students gain skills to configure and troubleshoot enterprise networks, and learn to identify and protect against cybersecurity threats. They are introduced to network management tools and learn key concepts of software-defined networking, including controller-based architectures and how application programming interfaces (APIs) enable network automation.




New CCNA 200-301 Training Faisalabad

Get your CCNA RIGHT NOW!!
new CCNA 200-301


There are three courses that make up the CCNA 7.0 curriculum.
● The three courses align to and cover the competencies outlined for the CCNA Certification Exam (200-301).
● Each course is comprised of multiple modules. Each module is comprised of topics.
● Modules emphasize critical thinking, problem solving, collaboration, and the practical application of skills.
● Each topic contains a Check Your Understanding interactive quiz, or some other way to assess understanding, such as a lab or a Packet Tracer. These topic-level assessments are designed to tell learners if they have a good grasp of the topic content, or if they need to review before continuing. Learners can ensure their level of understanding well before taking a graded quiz or exam. Check Your Understanding quizzes do not affect the learner’s overall grade.
● Students learn the basics of routing, switching, and wireless, advanced technologies to prepare for the Cisco CCNA exam,networking related degree programs, and associate-level networking careers.
● The language used to describe networking concepts is designed to be easily understood by learners at all levels and embedded interactive activities help reinforce comprehension.
● Assessments and practice activities are focused on specific competencies to increase retention and provide flexibility in the learning path.
● Multimedia learning tools, including videos, games, and quizzes, address a variety of learning styles and help stimulate learning and promote increased knowledge retention.
● Hands-on labs and Cisco® Packet Tracer simulation-based learning activities help students develop critical thinking and complex problem-solving skills.
● Embedded assessments provide immediate feedback to support the evaluation of knowledge and acquired skills.
● Cisco Packet Tracer activities are designed for use with the latest version of Packet Tracer.