FREE COMPUTER CERTIFICATION
CCNA
Introduction:
CCNA
The CCNA certification (Cisco Certified Network Associate) indicates a foundation in and apprentice knowledge of networking. CCNA certified professionals can install, configure and operate LAN, WAN, and dial access services.
-->CCNA
Introduction:
CCNA
The CCNA certification (Cisco Certified Network Associate) indicates a foundation in and apprentice knowledge of networking. CCNA certified professionals can install, configure and operate LAN, WAN, and dial access services.
Describe how a network works
• Describe the purpose and functions of various network devices
• Select the components required to meet a network specification
• Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network
• Describe common networked applications including web applications
• Describe the purpose and basic operation of the protocols in the OSI and TCP models
• Describe the impact of applications (Voice Over IP and Video Over IP) on a network
• Interpret network diagrams
• Determine the path between two hosts across a network
• Describe the components required for network and Internet communications
• Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered model approach
• Differentiate between LAN/WAN operation and features
Configure, verify and troubleshoot a switch with VLANs and interswitch communications
• Explain the technology and media access control method for Ethernet networks
• Explain network segmentation and basic traffic management concepts
• Explain basic switching concepts and the operation of Cisco switches
• Perform and verify initial switch configuration tasks including remote access management
• Verify network status and switch operation using basic utilities (including: ping, traceroute, telnet, SSH, arp, ipconfig), SHOW & DEBUG commands
• Identify, prescribe, and resolve common switched network media issues, configuration issues, auto negotiation, and switch hardware failures
• Describe enhanced switching technologies (including: VTP, RSTP, VLAN, PVSTP, 802.1q)
• Describe how VLANs create logically separate networks and the need for routing between them
• Configure, verify, and troubleshoot VLANs
• Configure, verify, and troubleshoot trunking on Cisco switches
• Configure, verify, and troubleshoot interVLAN routing
• Configure, verify, and troubleshoot VTP
• Configure, verify, and troubleshoot RSTP operation
• Interpret the output of various show and debug commands to verify the operational status of a Cisco switched network.
• Implement basic switch security (including: port security, trunk access, management vlan other than vlan1, etc.)
• Select the appropriate media, cables, ports, and connectors to connect switches to other network devices and hosts
Implement an IP addressing scheme and IP Services to meet network requirements in a medium-size Enterprise branch office network.
• Describe the operation and benefits of using private and public IP addressing
• Explain the operation and benefits of using DHCP and DNS
• Configure, verify and troubleshoot DHCP and DNS operation on a router.(including: CLI/SDM)
• Implement static and dynamic addressing services for hosts in a LAN environment
• Calculate and apply an addressing scheme including VLSM IP addressing design to a network
• Determine the appropriate classless addressing scheme using VLSM and summarization to satisfy addressing requirements in a LAN/WAN environment
• Describe the technological requirements for running IPv6 in conjunction with IPv4 (including: protocols, dual stack, tunneling, etc).
• Describe IPv6 addresses
• Identify and correct common problems associated with IP addressing and host configurations
Configure, verify, and troubleshoot basic router operation and routing on Cisco devic
• Describe basic routing concepts (including: packet forwarding, router lookup process)
• Describe the operation of Cisco routers (including: router bootup process, POST, router components)
• Select the appropriate media, cables, ports, and connectors to connect routers to other network devices and hosts
• Configure, verify, and troubleshoot RIPv2
• Access and utilize the router to set basic parameters.(including: CLI/SDM)
• Connect, configure, and verify operation status of a device interface
• Verify device configuration and network connectivity using ping, traceroute, telnet, SSH or other utilities
• Perform and verify routing configuration tasks for a static or default route given specific routing requirements
• Manage IOS configuration files. (including: save, edit, upgrade, restore)
Manage Cisco IOS.
• Compare and contrast methods of routing and routing protocols
• Configure, verify, and troubleshoot OSPF
• Configure, verify, and troubleshoot EIGRP
• Verify network connectivity (including: using ping, traceroute, and telnet or SSH)
• Troubleshoot routing issues
• Verify router hardware and software operation using SHOW & DEBUG commands.
• Implement basic router security
Explain and select the appropriate administrative tasks required for a WLA
• Describe standards associated with wireless media (including: IEEE WI-FI Alliance, ITU/FCC)
• Identify and describe the purpose of the components in a small wireless network. (Including: SSID, BSS, ESS)
• Identify the basic parameters to configure on a wireless network to ensure that devices connect to the correct access point
• Compare and contrast wireless security features and capabilities of WPA security (including: open, WEP, WPA-1/2)
• Identify common issues with implementing wireless networks. (Including: Interface, missconfiguration)
Identify security threats to a network and describe general methods to mitigate those threats
• Describe today's increasing network security threats and explain the need to implement a comprehensive security policy to mitigate the threats
• Explain general methods to mitigate common security threats to network devices, hosts, and applications
• Describe the functions of common security appliances and applications
• Describe security recommended practices including initial steps to secure network devices
Implement, verify, and troubleshoot NAT and ACLs in a medium-size Enterprise branch office network.
• Describe the purpose and types of ACLs
• Configure and apply ACLs based on network filtering requirements.(including: CLI/SDM)
• Configure and apply an ACLs to limit telnet and SSH access to the router using (including: SDM/CLI)
• Verify and monitor ACLs in a network environment
• Troubleshoot ACL issues
• Explain the basic operation of NAT
• Configure NAT for given network requirements using (including: CLI/SDM)
• Troubleshoot NAT issues
Implement and verify WAN links
• Describe different methods for connecting to a WAN
• Configure and verify a basic WAN serial connection
• Configure and verify Frame Relay on Cisco routers
• Troubleshoot WAN implementation issues
• Describe VPN technology (including: importance, benefits, role, impact, components)
• Configure and verify a PPP connection between Cisco routers
CCNP
Implement an EIGRP based solution, given a network design and a set of requirements
Determine network resources needed for implementing EIGRP on a network
Create an EIGRP implementation plan
Create an EIGRP verification plan
Configure EIGRP routing
Verify EIGRP solution was implemented properly using show and debug commands
Document results of EIGRP implementation and verification
Implement a multi-area OSPF Network, given a network design and a set of requirements
Determine network resources needed for implementing OSPF on a network
Create an OSPF implementation plan
Create an OSPF verification plan
Configure OSPF routing
Verify OSPF solution was implemented properly using show and debug commands
Document results of OSPF implementation and verification plan
Implement an eBGP based solution, given a network design and a set of requirements
Determine network resources needed for implementing eBGP on a network
Create an eBGP implementation plan
Create an eBGP verification plan
Configure eBGP routing
Verify eBGP solution was implemented properly using show and debug commands
Document results of eBGP implementation and verification plan
Implement an IPv6 based solution, given a network design and a set of requirements
Determine network resources needed for implementing IPv6 on a network
Create an IPv6 implementation plan
Create an IPv6 verification plan
Configure IPv6 routing
Configure IPv6 interoperation with IPv4
Verify IPv6 solution was implemented properly using show and debug commands
Document results of IPv6 implementation and verification plan
Implement an IPv4 or IPv6 based redistribution solution, given a network design and a set of requirements
Create a redistribution implementation plan based upon the results of the redistribution analysis
Create a redistribution verification plan
Configure a redistribution solution
Verify that a redistribution was implemented
Document results of a redistribution implementation and verification plan
Identify the differences between implementing an IPv4 and IPv6 redistribution solution
Implement Layer 3 Path Control Solution
Create a Layer 3 path control implementation plan based upon the results of the redistribution analysis
Create a Layer 3 path control verification plan
Configure Layer 3 path control
Verify that a Layer 3 path control was implemented
Document results of a Layer 3 path control implementation and verification plan
Implement basic teleworker and branch services
Describe broadband technologies
Configure basic broadband connections
Describe basic VPN technologies
Configure GRE
Describe branch access technologies
SWITCH 642-813
Implement VLAN based solution, given a network design and a set of requirements
Determine network resources needed for implementing a VLAN based solution on a network
Create a VLAN based implementation plan
Create a VLAN based verification plan
Configure switch-to-switch connectivity for the VLAN based solution
Configure loop prevention for the VLAN based solution
Configure Access Ports for the VLAN based solution
erify the VLAN based solution was implemented properly using show and debug commands
Document results of VLAN implementation and verification
Implement a Security Extension of a Layer 2 solution, given a network design and a set of requirements
Determine network resources needed for implementing a Security solution
Create a implementation plan for the Security solution
Create a verification plan for the Security solution
Configure port security features
Configure general switch security features
Configure private VLANs Configure VACL and PACL
Verify the Security based solution was implemented properly using show and debug commands
Document results of Security implementation and verification
Implement Switch based Layer 3 services, given a network design and a set of requirements
Determine network resources needed for implementing a Switch based Layer 3 solution
Create an implementation plan for the Switch based Layer 3 solution
Create a verification plan for the Switch based Layer 3 solution
Configure routing interfaces Configure Layer 3 Security
Verify the Switch based Layer 3 solution was implemented properly using show and debug commands
Document results of Switch based Layer 3 implementation and verification
Prepare infrastructure to support advanced services
Implement a Wireless Extension of a Layer 2 solution
Implement a VoIP support solution
Implement video support solution
Implement High Availability, given a network design and a set of requirements
Determine network resources needed for implementing High Availability on a network
Create a High Availability implementation plan
Create a High Availability verification plan
Implement first hop redundancy protocols
Implement switch supervisor redundancy
Verify High Availability solution was implemented properly using show and debug commands
Document results of High Availability implementation and verification
TSHOOT 642-832
Maintain and monitor network performance
Develop a plan to monitor and manage a network
Perform network monitoring using IOS tools
Perform routine IOS device maintenance
Isolate sub-optimal internetwork operation at the correctly defined OSI Model layer
Troubleshoot Multi Protocol system networks
Troubleshoot EIGRP
Troubleshoot OSPF
Troubleshoot eBGP
Troubleshoot routing redistribution solution
Troubleshoot a DHCP client and server solution
Troubleshoot NAT
Troubleshoot first hop redundancy protocols
Troubleshoot IPv6 routing
Troubleshoot IPv6 and IPv4 interoperability
Troubleshoot switch-to-switch connectivity for the VLAN based solution
Troubleshoot loop prevention for the VLAN based solution
Troubleshoot Access Ports for the VLAN based solution
Troubleshoot private VLANS
Troubleshoot port security
Troubleshoot general switch security
Troubleshoot VACL and PACL
Troubleshoot switch virtual interfaces (SVIs)
Troubleshoot switch supervisor redundancy
Troubleshoot switch support of advanced services (i.e., Wireless, VOIP and Video)
Troubleshoot a VoIP support solution
Troubleshoot a video support solution
Troubleshoot Layer 3 Security
Troubleshoot issues related to ACLs used to secure access to Cisco routers
Troubleshoot configuration issues related to accessing the AAA server for authentication purposes
Troubleshoot security issues related to IOS services (i.e.,finger, NTP, HTTP, FTP, RCP etc.)
CCIE (Routing & Switching)
CCIE Objective: -
CCIE is a high level certification program designed to identify and serve the best of internetworking experts. The CCIE written and the lab exams assume that the students have an expert level knowledge of Cisco IOS. The CCIE labs are two days of hands on network construction and troubleshooting.
The Path to CCIE
The two requirements to become a CCIE are a passing grade on the Routing and Switching qualification exam and a passing grade on the Routing and Switching lab exam. The qualification exam is a prerequisite for attempting and scheduling the lab exam.
Corvit Systems offers a two month course with thrice a week class schedule, after CCNP, for the preparation of CCIE Qualifying Exam.
Corvit highly recommends that the potential CCIE’s have an absolute minimum of 250 hours of hands on experience working with Cisco routers in complex networking scenarios, last hundred hours of hands on experience should occur no earlier than six weeks before the exam. You want this information to be fresh. Corvit’s mission is to provide the hardware, documented labs and coaching so that you will have the skills to master these concepts. (Unless you are very bright), your practice lab whether it’s ours, yours or your employer’s should have at least eight routers with one of them having a minimum 8 serial. The lab comprises Cisco 3600, 2600, 2500 series routers, Catalyst 5000, 3550 and 2950 series switches, PIX firewall, VoIP Gateways and access servers. The latest literature and documentation for this course will also be provided.
CCIE Routing and Switching (Written Exam) Course Outline
Cisco Device Operation
• Commands (show, debug)
• Infrastructure (NVRAM, Flash, Memory & CPU, File system, config reg)
• Operations (file transfers, Password recovery, SNMP, Accessing the device, Security, Security [password])
General Networking Theory
• OSI Models
• General Routing Concepts (Split horizon, Link state, difference between switching and routing, Summarization, Link state vs. Distance vector, loops, Tunneling)
• Standards (802.x, cable specs, protocol limitations)
• Protocol Mechanics (Windowing/ACK, fragmentation, MTU, handshaking, termination)
Bridging and LAN Switching
• Transparent (IEEE/DEC Spanning tree, Translational, IRB, ACLs, MISTP)
• SRB (SRT/LB, SRT, DLSw, RSRB, ACLs)
• LAN Switching (Trunking, VTP, DISL, VLANS, Fast Ether Channel (FEC),
CDP, CGMP)
• Security (VACL, RACL, Private VLANS)
• MLS
IP
• Addressing (CIDR, subnetting, ARP, NAT, HSRP)
• Services (DNS, BOOTP, DHCP, ICMP)
• Applications (telnet, FTP, TFTP)
• Transport (IP fragmentation, sockets, ports)
• ACLs
• IPv6 (Basic)
IP Routing
• OSPF (I -Design: areas, Virtual links, stub, NSSA, ABR/ASBR redistributions, media dependencies, external vs. internal, Summarization. II - Operation: DR, BDR, adjacencies, LSA types, link state database, SPF algorithm, authentication)
• BGP( I -Design: Peer Groups, Route Reflectors, Confederations, Clusters, Attributes, AS. II - Operation: Route Maps, Filters, Neighbors, decision algorithm, IBGP, EBGP)
• EIGRP (Metrics, mechanics, & design)
• IS-IS (Metrics, mechanics, & design)
• ACLs (distribute lists, route maps, policy routing, redistribution, route tagging)
• DDR (dial backup)
• IGRP
• RIP
• RIPv2
QoS
• Fancy Queuing
• PoS and IP precedence
• CoS
• Weighted RED
• WRR/queu scheduling
• Shaping vs. Policing (rate limiting)/CAR
• NBAR
• 802.1X
• DSCP
WAN
• ISDN (LAPD, BRI/PRI framing, signaling, mapping, NI1s, dialer map, interface types, B/D channel, channel bonding)
• Frame Relay (LMIs, DLCI, PVC, framing, traffic shaping, FECN, BECN, CIR, DE, Mapping, compression)
• ATM (PVC/SVC, AAL, SSCOP, UNI/NNI, ILMI, Cell format, QoS, RFC 1483,
PNNI, mapping)
• Physical Layer (Synchronization, SONET, T1, E1, encoding)
• Leased Line Protocols (HDLC, PPP, Async & modems, compression)
• PoS
• DPT/SRP
LAN
• Data Link Layer (addressing, 802.2)
• Ethernet/FE/GE (encapsulation, CSMA/CD, topology, speed, controller errors, limitations)
• Wireless/802.11b
Multiservice
• Voice/Video (H323)
• codecs
• SS7
• RTP
• RTCP
• SIP
• MPLS
IP Multicast
• IGMP/CGMP (IGMPv1, IGMPv2, Designated Querier)
• Addressing (Group addresses, Admin Group, Link-local L3-to-L2 Mapping)
• Distribution Trees (Shared Trees, Source Trees)
• PIM-SM Mechanics (Joining, Pruning PIM State, Mroute table)
• Rendezvous Points (Auto-RP, BSR)
CCIE (Security)
I. Firewall
A. PIX and ASA Firewall
• Basic Initialization
• Access Management
• Address Translation
• ACLs
• IP Routing
• Object Groups
• VLANs
• AAA
• VPNs
• Filtering
• Failover
• Layer 2 Transparent Firewall
• Security Contexts (Virtual Firewall)
• Modular Policy Framework
• Application-Aware Inspection
• High Availability Scenarios
• QoS Policies
• Other Advanced Features
B. IOS Firewall
• CBAC
• Audit
• Auth Proxy
• PAM
• Access Control
• Performance Tuning
• Advanced Features
II. VPN
• IPSec LAN-to-LAN
• SSL VPN
• DMVPN
• CA (PKI)
• Remote Access VPN
• VPN3000 Concentrator
• VPN3000 IP Routing
• Unity Client
• WebVPN
• EzVPN Hardware Client
• XAuth, Split-tunnel, RRI, NAT-T
• High Availability
• QoS for VPN
• GRE, mGRE
• L2TP
• PPTP
• Advanced VPN Features
III. Intrusion Prevention System (IPS)
• IPS 4200 Series Sensor Appliance
• Basic Initialization
• Sensor Configuration
• Sensor Management
• Promiscuous and Inline Monitoring
• Signature Tuning
• Custom Signatures
• Blocking
• TCP Resets
• Rate Limiting
• Signature Engines
• IDM
• Event Action
• Event Monitoring
• IOS IPS
• PIX IDS
• SPAN, RSPAN
• Advanced Features
IV. Identity Management
• Security Protocols (RADIUS and TACACS+)
• Cisco Secure ACS Configuration
• Access Management (Telnet, SSH, Pwds, Priv Levels)
• Proxy Authentication
• Service Authentication (FTP, Telnet, HTTP, other)
• Network Admission Control (NAC Framework solution)
• 802.1x
• Advanced Features
V. Advanced Security
• Mitigation Techniques
• Packet Marking Techniques
• Security RFCs (RFC1918, RFC2827, RFC2401)
• Service Provider Security
• Black Holes, Sink Holes
• RTBH Filtering (Remote Triggered Black Hole)
• Traffic Filtering using Access-lists
• NAT
• TCP Intercept
• uRPF
• CAR
• NBAR
• NetFlow
• Flooding
• Spoofing
• Policing
• Fragmentation
• Sniffer Traces
• Catalyst Management and Security
• Traffic Control and Congestion Management
• Catalyst Features and Advanced Configuration
• IOS Security Features
VI. Network Attacks
• Network Reconnaissance
• IP Spoofing Attacks
• MAC Spoofing Attacks
• ARP Spoofing Attacks
• Denial of Service (DoS)
• Distributed Denial of Service (DDoS)
• Man-in-the-Middle (MiM) Attacks
• Port Redirection Attacks
• DHCP Attacks
• DNS Attacks
• Fragment Attacks
• Smurf Attacks
• SYN Attacks
• MAC Attacks
• VLAN Hopping Attacks
• Other Layer2 and Layer3 Attacks
JNCIA
JNCIP
CCIE (Service Provider)
VoIP
CCSP
CCVP
CCIP
MPLS
Wireless Technology
MCSE 2003
MCSE 2008
MCITP
RHCSA
RHCE
Practical Networking Lab
CCNP Wireless
CCNA Wireless
CISA
PMP
ITIL
SEO
For list of Free Vocational training institute
www.pvtc.gop.pk
Punjab Vocational Training Council (PVTC) is an autonomous corporate body established by the Punjab Government through the PVTC Act of 1998. Its mission is to alleviate poverty through Muslim charity (Zakat) and private sector participation by imparting demand driven skill training and enhancing employability for disadvantaged youth.
Establishment of PVTC came through the realization that the less privileged sections of the society eligible for Zakat should be so empowered economically that they are able to sustain themselves and their families and engage in dignified economic activity. One of the better ways to use Zakat was to provide technical and vocational skills to the youth including girls and boys with certain minimum academic qualifications. This idea of economic empowerment would generate a multiplier effect in terms of economic activity and provide dignified monthly income to them and their families so that they come out of the eligibility of Zakat bracket.
For more information visit
FREE BOOKS DOWNLOAD
Imparting of skill training in market relevant trades would obviously bring much higher rate of return than general education. With the establishment of PVTC, training the young girls and boys into professionally equipped and trained craftsmen has brought quantifiable dividends in the lives of these people
TYPES OF VOCATIONAL EDUCATION
COMPUTER
BEAUTICIAN
DRESS MAKING
PLUMBING
AIR CONDITIONING
TEXTILE DESIGNING
TUNNEL FORMING
CLINICAL
PATTERN DESIGNING
AUTO CAD
MASON
CARPANTOR
AUTO ELECTRICIAN
MOBILE REPAIRING
COMPUTER HARDWARE