Professional Documents
Culture Documents
Course Topics
Course Topics
Introduction to Networking
Network Types and Devices
Network Media and Cables
Network Topologies and Architecture
Network Protocols and Commands
Wireless Technologies
Network Protocols and Models
OSI Model
TCP/IP Model
Transport Protocols and Logical Ports
Introduction to Wireshark Address
ARP and Encapsulation
Switch Fundamentals
The Cisco IOS
Initial Device Configuration
Manage IOS and System Files
Port Security
Remote Access
Decimal, Binary, and Hex
The Router
Routing Process
IPv4
IPv6
CIDR
VLSM
Network Address Scheme Design
Subnetting
Router Operation
IPv4 Static Routing
IPv6 Static Routing
Dynamic Routing Concepts
RIPv2
OSPFv2
Virtual LANs
Inter-VLAN Routing
Troubleshooting Methodology
Neighbor Discovery Protocols
Log Events and Syslog Server
Network Time Protocol
ACL Overview
Standard ACL Implementation
Extended ACL Implementation
DHCP Overview
DHCP Implementation
NAT Overview
NAT Implementation
LINUX/Linux Security
History
Distribution
Open-Source Philosophy
Linux Installation
System Libraries
Users
CLI Interface
Terminal Emulator
CLI and Terminal Emulators
Command Structure
File System Structure
Listing Files
Working with Files and Folders
Data Streams
Grep Basics
Find and Locate
History
Piping
Advanced Grep and Awk
Additional Commands
Users
Password Management
Groups
Permissions
Sticky Bit and PATH
Network Testing Using Ping and Traceroute
Networking Files and Configuration
Updating and Upgrading
Apache
Other Applications
Common Services and Protocols
SSH and SCP
FTP
Samba
Hardening
Bash Scripting
Bash Scripting Introduction
Script Input and Output
Conditions
Arithmetic Operators
Archives
File Integrity
Crontab
Linux External Mounting
Boot Protection
PAM
SELinux and AppArmor
Privilege Escalation
Crontab Security
Iptables
FirewalId
Fail2ban
Log Monitoring
Bash Scripting to Counter Forced Apache Enumeration
Secure Apache Configuration
Banner Hiding for SSH and Apache
SSL encryption
SFTP
CLOUD Computing
Cloud Computing Fundamentals
Cloud Security Fundamentals
AWS Billing
Virtualization in Cloud Computing
Compute Virtualization
Identity and Access Management
Cloud Network Virtualization
Virtual Appliances
Containers
Security Challenges in the Cloud
Securing Cloud Networking
Software Defined Perimeter
Securing Data in the Cloud
Benefits and Concerns of SECaaS