Free Vocational Institute

FREE COMPUTER CERTIFICATION

CCNA
Introduction:


CCNA

The CCNA certification (Cisco Certified Network Associate) indicates a foundation in and apprentice knowledge of networking. CCNA certified professionals can install, configure and operate LAN, WAN, and dial access services.
-->




Describe how a network works

• Describe the purpose and functions of various network devices

• Select the components required to meet a network specification

• Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network

• Describe common networked applications including web applications

• Describe the purpose and basic operation of the protocols in the OSI and TCP models

• Describe the impact of applications (Voice Over IP and Video Over IP) on a network

• Interpret network diagrams

• Determine the path between two hosts across a network

• Describe the components required for network and Internet communications

• Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered model approach

• Differentiate between LAN/WAN operation and features





Configure, verify and troubleshoot a switch with VLANs and interswitch communications

• Explain the technology and media access control method for Ethernet networks

• Explain network segmentation and basic traffic management concepts

• Explain basic switching concepts and the operation of Cisco switches

• Perform and verify initial switch configuration tasks including remote access management

• Verify network status and switch operation using basic utilities (including: ping, traceroute, telnet, SSH, arp, ipconfig), SHOW & DEBUG commands

• Identify, prescribe, and resolve common switched network media issues, configuration issues, auto negotiation, and switch hardware failures

• Describe enhanced switching technologies (including: VTP, RSTP, VLAN, PVSTP, 802.1q)

• Describe how VLANs create logically separate networks and the need for routing between them

• Configure, verify, and troubleshoot VLANs

• Configure, verify, and troubleshoot trunking on Cisco switches

• Configure, verify, and troubleshoot interVLAN routing

• Configure, verify, and troubleshoot VTP

• Configure, verify, and troubleshoot RSTP operation

• Interpret the output of various show and debug commands to verify the operational status of a Cisco switched network.

• Implement basic switch security (including: port security, trunk access, management vlan other than vlan1, etc.)

• Select the appropriate media, cables, ports, and connectors to connect switches to other network devices and hosts





Implement an IP addressing scheme and IP Services to meet network requirements in a medium-size Enterprise branch office network.

• Describe the operation and benefits of using private and public IP addressing

• Explain the operation and benefits of using DHCP and DNS

• Configure, verify and troubleshoot DHCP and DNS operation on a router.(including: CLI/SDM)

• Implement static and dynamic addressing services for hosts in a LAN environment

• Calculate and apply an addressing scheme including VLSM IP addressing design to a network

• Determine the appropriate classless addressing scheme using VLSM and summarization to satisfy addressing requirements in a LAN/WAN environment

• Describe the technological requirements for running IPv6 in conjunction with IPv4 (including: protocols, dual stack, tunneling, etc).

• Describe IPv6 addresses

• Identify and correct common problems associated with IP addressing and host configurations





Configure, verify, and troubleshoot basic router operation and routing on Cisco devic



• Describe basic routing concepts (including: packet forwarding, router lookup process)

• Describe the operation of Cisco routers (including: router bootup process, POST, router components)

• Select the appropriate media, cables, ports, and connectors to connect routers to other network devices and hosts

• Configure, verify, and troubleshoot RIPv2

• Access and utilize the router to set basic parameters.(including: CLI/SDM)

• Connect, configure, and verify operation status of a device interface

• Verify device configuration and network connectivity using ping, traceroute, telnet, SSH or other utilities

• Perform and verify routing configuration tasks for a static or default route given specific routing requirements

• Manage IOS configuration files. (including: save, edit, upgrade, restore)

Manage Cisco IOS.

• Compare and contrast methods of routing and routing protocols

• Configure, verify, and troubleshoot OSPF

• Configure, verify, and troubleshoot EIGRP

• Verify network connectivity (including: using ping, traceroute, and telnet or SSH)

• Troubleshoot routing issues

• Verify router hardware and software operation using SHOW & DEBUG commands.

• Implement basic router security





Explain and select the appropriate administrative tasks required for a WLA



• Describe standards associated with wireless media (including: IEEE WI-FI Alliance, ITU/FCC)

• Identify and describe the purpose of the components in a small wireless network. (Including: SSID, BSS, ESS)

• Identify the basic parameters to configure on a wireless network to ensure that devices connect to the correct access point

• Compare and contrast wireless security features and capabilities of WPA security (including: open, WEP, WPA-1/2)

• Identify common issues with implementing wireless networks. (Including: Interface, missconfiguration)





Identify security threats to a network and describe general methods to mitigate those threats

• Describe today's increasing network security threats and explain the need to implement a comprehensive security policy to mitigate the threats

• Explain general methods to mitigate common security threats to network devices, hosts, and applications

• Describe the functions of common security appliances and applications

• Describe security recommended practices including initial steps to secure network devices





Implement, verify, and troubleshoot NAT and ACLs in a medium-size Enterprise branch office network.

• Describe the purpose and types of ACLs

• Configure and apply ACLs based on network filtering requirements.(including: CLI/SDM)

• Configure and apply an ACLs to limit telnet and SSH access to the router using (including: SDM/CLI)

• Verify and monitor ACLs in a network environment

• Troubleshoot ACL issues

• Explain the basic operation of NAT

• Configure NAT for given network requirements using (including: CLI/SDM)

• Troubleshoot NAT issues





Implement and verify WAN links

• Describe different methods for connecting to a WAN

• Configure and verify a basic WAN serial connection

• Configure and verify Frame Relay on Cisco routers

• Troubleshoot WAN implementation issues

• Describe VPN technology (including: importance, benefits, role, impact, components)

• Configure and verify a PPP connection between Cisco routers



CCNP
 
Implement an EIGRP based solution, given a network design and a set of requirements


Determine network resources needed for implementing EIGRP on a network

Create an EIGRP implementation plan

Create an EIGRP verification plan

Configure EIGRP routing

Verify EIGRP solution was implemented properly using show and debug commands

Document results of EIGRP implementation and verification



Implement a multi-area OSPF Network, given a network design and a set of requirements

Determine network resources needed for implementing OSPF on a network

Create an OSPF implementation plan

Create an OSPF verification plan

Configure OSPF routing

Verify OSPF solution was implemented properly using show and debug commands

Document results of OSPF implementation and verification plan



Implement an eBGP based solution, given a network design and a set of requirements

Determine network resources needed for implementing eBGP on a network

Create an eBGP implementation plan

Create an eBGP verification plan

Configure eBGP routing

Verify eBGP solution was implemented properly using show and debug commands

Document results of eBGP implementation and verification plan



Implement an IPv6 based solution, given a network design and a set of requirements

Determine network resources needed for implementing IPv6 on a network

Create an IPv6 implementation plan

Create an IPv6 verification plan

Configure IPv6 routing

Configure IPv6 interoperation with IPv4

Verify IPv6 solution was implemented properly using show and debug commands

Document results of IPv6 implementation and verification plan



Implement an IPv4 or IPv6 based redistribution solution, given a network design and a set of requirements

Create a redistribution implementation plan based upon the results of the redistribution analysis

Create a redistribution verification plan

Configure a redistribution solution

Verify that a redistribution was implemented

Document results of a redistribution implementation and verification plan

Identify the differences between implementing an IPv4 and IPv6 redistribution solution



Implement Layer 3 Path Control Solution

Create a Layer 3 path control implementation plan based upon the results of the redistribution analysis

Create a Layer 3 path control verification plan

Configure Layer 3 path control

Verify that a Layer 3 path control was implemented

Document results of a Layer 3 path control implementation and verification plan

Implement basic teleworker and branch services

Describe broadband technologies

Configure basic broadband connections

Describe basic VPN technologies

Configure GRE

Describe branch access technologies



SWITCH 642-813

Implement VLAN based solution, given a network design and a set of requirements

Determine network resources needed for implementing a VLAN based solution on a network

Create a VLAN based implementation plan

Create a VLAN based verification plan

Configure switch-to-switch connectivity for the VLAN based solution

Configure loop prevention for the VLAN based solution

Configure Access Ports for the VLAN based solution

erify the VLAN based solution was implemented properly using show and debug commands

Document results of VLAN implementation and verification



Implement a Security Extension of a Layer 2 solution, given a network design and a set of requirements

Determine network resources needed for implementing a Security solution

Create a implementation plan for the Security solution

Create a verification plan for the Security solution

Configure port security features

Configure general switch security features

Configure private VLANs Configure VACL and PACL

Verify the Security based solution was implemented properly using show and debug commands

Document results of Security implementation and verification



Implement Switch based Layer 3 services, given a network design and a set of requirements

Determine network resources needed for implementing a Switch based Layer 3 solution

Create an implementation plan for the Switch based Layer 3 solution

Create a verification plan for the Switch based Layer 3 solution

Configure routing interfaces Configure Layer 3 Security

Verify the Switch based Layer 3 solution was implemented properly using show and debug commands

Document results of Switch based Layer 3 implementation and verification



Prepare infrastructure to support advanced services

Implement a Wireless Extension of a Layer 2 solution

Implement a VoIP support solution

Implement video support solution



Implement High Availability, given a network design and a set of requirements

Determine network resources needed for implementing High Availability on a network

Create a High Availability implementation plan

Create a High Availability verification plan

Implement first hop redundancy protocols

Implement switch supervisor redundancy

Verify High Availability solution was implemented properly using show and debug commands

Document results of High Availability implementation and verification





TSHOOT 642-832



Maintain and monitor network performance

Develop a plan to monitor and manage a network

Perform network monitoring using IOS tools

Perform routine IOS device maintenance

Isolate sub-optimal internetwork operation at the correctly defined OSI Model layer



Troubleshoot Multi Protocol system networks

Troubleshoot EIGRP

Troubleshoot OSPF

Troubleshoot eBGP

Troubleshoot routing redistribution solution

Troubleshoot a DHCP client and server solution

Troubleshoot NAT

Troubleshoot first hop redundancy protocols

Troubleshoot IPv6 routing

Troubleshoot IPv6 and IPv4 interoperability

Troubleshoot switch-to-switch connectivity for the VLAN based solution

Troubleshoot loop prevention for the VLAN based solution

Troubleshoot Access Ports for the VLAN based solution

Troubleshoot private VLANS

Troubleshoot port security

Troubleshoot general switch security

Troubleshoot VACL and PACL

Troubleshoot switch virtual interfaces (SVIs)

Troubleshoot switch supervisor redundancy

Troubleshoot switch support of advanced services (i.e., Wireless, VOIP and Video)

Troubleshoot a VoIP support solution

Troubleshoot a video support solution

Troubleshoot Layer 3 Security

Troubleshoot issues related to ACLs used to secure access to Cisco routers

Troubleshoot configuration issues related to accessing the AAA server for authentication purposes

Troubleshoot security issues related to IOS services (i.e.,finger, NTP, HTTP, FTP, RCP etc.)



CCIE (Routing & Switching)
CCIE Objective: -




CCIE is a high level certification program designed to identify and serve the best of internetworking experts. The CCIE written and the lab exams assume that the students have an expert level knowledge of Cisco IOS. The CCIE labs are two days of hands on network construction and troubleshooting.



The Path to CCIE

The two requirements to become a CCIE are a passing grade on the Routing and Switching qualification exam and a passing grade on the Routing and Switching lab exam. The qualification exam is a prerequisite for attempting and scheduling the lab exam.



Corvit Systems offers a two month course with thrice a week class schedule, after CCNP, for the preparation of CCIE Qualifying Exam.





Corvit highly recommends that the potential CCIE’s have an absolute minimum of 250 hours of hands on experience working with Cisco routers in complex networking scenarios, last hundred hours of hands on experience should occur no earlier than six weeks before the exam. You want this information to be fresh. Corvit’s mission is to provide the hardware, documented labs and coaching so that you will have the skills to master these concepts. (Unless you are very bright), your practice lab whether it’s ours, yours or your employer’s should have at least eight routers with one of them having a minimum 8 serial. The lab comprises Cisco 3600, 2600, 2500 series routers, Catalyst 5000, 3550 and 2950 series switches, PIX firewall, VoIP Gateways and access servers. The latest literature and documentation for this course will also be provided.



CCIE Routing and Switching (Written Exam) Course Outline



Cisco Device Operation

• Commands (show, debug)

• Infrastructure (NVRAM, Flash, Memory & CPU, File system, config reg)

• Operations (file transfers, Password recovery, SNMP, Accessing the device, Security, Security [password])





General Networking Theory

• OSI Models

• General Routing Concepts (Split horizon, Link state, difference between switching and routing, Summarization, Link state vs. Distance vector, loops, Tunneling)

• Standards (802.x, cable specs, protocol limitations)

• Protocol Mechanics (Windowing/ACK, fragmentation, MTU, handshaking, termination)





Bridging and LAN Switching

• Transparent (IEEE/DEC Spanning tree, Translational, IRB, ACLs, MISTP)

• SRB (SRT/LB, SRT, DLSw, RSRB, ACLs)

• LAN Switching (Trunking, VTP, DISL, VLANS, Fast Ether Channel (FEC),

CDP, CGMP)

• Security (VACL, RACL, Private VLANS)

• MLS





IP

• Addressing (CIDR, subnetting, ARP, NAT, HSRP)

• Services (DNS, BOOTP, DHCP, ICMP)

• Applications (telnet, FTP, TFTP)

• Transport (IP fragmentation, sockets, ports)

• ACLs

• IPv6 (Basic)





IP Routing

• OSPF (I -Design: areas, Virtual links, stub, NSSA, ABR/ASBR redistributions, media dependencies, external vs. internal, Summarization. II - Operation: DR, BDR, adjacencies, LSA types, link state database, SPF algorithm, authentication)

• BGP( I -Design: Peer Groups, Route Reflectors, Confederations, Clusters, Attributes, AS. II - Operation: Route Maps, Filters, Neighbors, decision algorithm, IBGP, EBGP)

• EIGRP (Metrics, mechanics, & design)

• IS-IS (Metrics, mechanics, & design)

• ACLs (distribute lists, route maps, policy routing, redistribution, route tagging)

• DDR (dial backup)

• IGRP

• RIP

• RIPv2





QoS

• Fancy Queuing

• PoS and IP precedence

• CoS

• Weighted RED

• WRR/queu scheduling

• Shaping vs. Policing (rate limiting)/CAR

• NBAR

• 802.1X

• DSCP





WAN

• ISDN (LAPD, BRI/PRI framing, signaling, mapping, NI1s, dialer map, interface types, B/D channel, channel bonding)

• Frame Relay (LMIs, DLCI, PVC, framing, traffic shaping, FECN, BECN, CIR, DE, Mapping, compression)

• ATM (PVC/SVC, AAL, SSCOP, UNI/NNI, ILMI, Cell format, QoS, RFC 1483,

PNNI, mapping)

• Physical Layer (Synchronization, SONET, T1, E1, encoding)

• Leased Line Protocols (HDLC, PPP, Async & modems, compression)

• PoS

• DPT/SRP





LAN

• Data Link Layer (addressing, 802.2)

• Ethernet/FE/GE (encapsulation, CSMA/CD, topology, speed, controller errors, limitations)

• Wireless/802.11b





Multiservice

• Voice/Video (H323)

• codecs

• SS7

• RTP

• RTCP

• SIP

• MPLS





IP Multicast

• IGMP/CGMP (IGMPv1, IGMPv2, Designated Querier)

• Addressing (Group addresses, Admin Group, Link-local L3-to-L2 Mapping)

• Distribution Trees (Shared Trees, Source Trees)

• PIM-SM Mechanics (Joining, Pruning PIM State, Mroute table)

• Rendezvous Points (Auto-RP, BSR)





CCIE (Security)
I. Firewall


A. PIX and ASA Firewall

• Basic Initialization

• Access Management

• Address Translation

• ACLs

• IP Routing

• Object Groups

• VLANs

• AAA

• VPNs

• Filtering

• Failover

• Layer 2 Transparent Firewall

• Security Contexts (Virtual Firewall)

• Modular Policy Framework

• Application-Aware Inspection

• High Availability Scenarios

• QoS Policies

• Other Advanced Features





B. IOS Firewall

• CBAC

• Audit

• Auth Proxy

• PAM

• Access Control

• Performance Tuning

• Advanced Features





II. VPN

• IPSec LAN-to-LAN

• SSL VPN

• DMVPN

• CA (PKI)

• Remote Access VPN

• VPN3000 Concentrator

• VPN3000 IP Routing

• Unity Client

• WebVPN

• EzVPN Hardware Client

• XAuth, Split-tunnel, RRI, NAT-T

• High Availability

• QoS for VPN

• GRE, mGRE

• L2TP

• PPTP

• Advanced VPN Features





III. Intrusion Prevention System (IPS)

• IPS 4200 Series Sensor Appliance

• Basic Initialization

• Sensor Configuration

• Sensor Management

• Promiscuous and Inline Monitoring

• Signature Tuning

• Custom Signatures

• Blocking

• TCP Resets

• Rate Limiting

• Signature Engines

• IDM

• Event Action

• Event Monitoring

• IOS IPS

• PIX IDS

• SPAN, RSPAN

• Advanced Features





IV. Identity Management

• Security Protocols (RADIUS and TACACS+)

• Cisco Secure ACS Configuration

• Access Management (Telnet, SSH, Pwds, Priv Levels)

• Proxy Authentication

• Service Authentication (FTP, Telnet, HTTP, other)

• Network Admission Control (NAC Framework solution)

• 802.1x

• Advanced Features





V. Advanced Security

• Mitigation Techniques

• Packet Marking Techniques

• Security RFCs (RFC1918, RFC2827, RFC2401)

• Service Provider Security

• Black Holes, Sink Holes

• RTBH Filtering (Remote Triggered Black Hole)

• Traffic Filtering using Access-lists

• NAT

• TCP Intercept

• uRPF

• CAR

• NBAR

• NetFlow

• Flooding

• Spoofing

• Policing

• Fragmentation

• Sniffer Traces

• Catalyst Management and Security

• Traffic Control and Congestion Management

• Catalyst Features and Advanced Configuration

• IOS Security Features





VI. Network Attacks

• Network Reconnaissance

• IP Spoofing Attacks

• MAC Spoofing Attacks

• ARP Spoofing Attacks

• Denial of Service (DoS)

• Distributed Denial of Service (DDoS)

• Man-in-the-Middle (MiM) Attacks

• Port Redirection Attacks

• DHCP Attacks

• DNS Attacks

• Fragment Attacks

• Smurf Attacks

• SYN Attacks

• MAC Attacks

• VLAN Hopping Attacks

• Other Layer2 and Layer3 Attacks



JNCIA

JNCIP
CCIE (Service Provider)
VoIP
CCSP

CCVP
CCIP

MPLS
Wireless Technology

MCSE 2003

MCSE 2008

MCITP

RHCSA

RHCE
Practical Networking Lab
CCNP Wireless
CCNA Wireless
CISA
PMP

ITIL

SEO

For list of Free Vocational training institute
www.pvtc.gop.pk

Punjab Vocational Training Council (PVTC) is an autonomous corporate body established by the Punjab Government through the PVTC Act of 1998. Its mission is to alleviate poverty through Muslim charity (Zakat) and private sector participation by imparting demand driven skill training and enhancing employability for disadvantaged youth.

Establishment of PVTC came through the realization that the less privileged sections of the society eligible for Zakat should be so empowered economically that they are able to sustain themselves and their families and engage in dignified economic activity. One of the better ways to use Zakat was to provide technical and vocational skills to the youth including girls and boys with certain minimum academic qualifications. This idea of economic empowerment would generate a multiplier effect in terms of economic activity and provide dignified monthly income to them and their families so that they come out of the eligibility of Zakat bracket.

For more information visit

FREE BOOKS DOWNLOAD



Imparting of skill training in market relevant trades would obviously bring much higher rate of return than general education. With the establishment of PVTC, training the young girls and boys into professionally equipped and trained craftsmen has brought quantifiable dividends in the lives of these people

TYPES OF VOCATIONAL EDUCATION

COMPUTER

BEAUTICIAN

DRESS MAKING

PLUMBING

AIR CONDITIONING

TEXTILE DESIGNING

TUNNEL FORMING

CLINICAL

PATTERN DESIGNING

AUTO CAD

MASON

CARPANTOR

AUTO ELECTRICIAN

MOBILE REPAIRING

COMPUTER HARDWARE