Students will learn how to install, operate, configure, and verify a basic IPv4 and IPv6 network, including configuring a LAN switch, configuring an IP router, connecting to a WAN, and identifying basic security threats. Students will also gain an in depth knowledge of systems security, access control, network infrastructure, assessments and audits, cryptography and organizational security across all vendor products. These skills have become increasingly important, as additional safeguards such as intrusion detection systems, physical access control and multifactor authentication become standard methods of protection.

Students are given real world scenarios to reinforce the material covered and will learn how to apply the concepts to their daily operations. IT Security Administrator Program teaches critical knowledge of communication security, infrastructure security, cryptography, operational security, and general security concepts. Because human error is the number one cause for a network security breach, CompTIA Security+ and Cisco Interconnecting Networking Devices Courses are recognized by the technology community as a valuable credential that proves competency with information security.


Course Image Interconnecting Networking Devices Part 1

Students will learn how to install, operate, configure, and verify a basic IPv4 and IPv6 network, including configuring a LAN switch, configuring an IP router, connecting to a WAN, and identifying basic security threats.

Learn the following topics;

  • Switch Startup and Initial Configuration

  • Troubleshoot Switch Media Issues

  • Router Setup and Initial Configuration

  • Configure a Static Route, DHCP, and Network Address Translation

  • Enhance the Security of Router and Switch Configuration

  • Device Hardening

  • Filter Traffic with ACLs

  • Enhanced - Troubleshoot ACLs

  • Configure an Expanded Switched Network

  • Configure DHCP Server

  • Implement Single-Area OSPF

  • Configure Basic IPv6

  • Implement IPv6 Stateless Auto-Configuration

  • Implement IPv6 Routing

  • ICND1 Super Lab


Course Image Interconnecting Networking Devices Part 2

Students will learn how to install, operate, configure, and verify a basic IPv4 and IPv6 network, including configuring a LAN switch, configuring an IP router, connecting to a WAN, and identifying basic security threats. In this course, you will gain the knowledge and skills needed to install, configure, operate, and troubleshoot a small enterprise network. You will focus on redundant topologies, troubleshooting common networking issues, configuring EIGRP and multi-area OSPF in both IPv4 and IPv6, understanding WAN technologies, and becoming familiar with device management and Cisco licensing.

Learn the following topics;

  • ICND1 Review Lab

  • Troubleshoot VLANs and Trunks

  • Optimize STP

  • Configure Ether Channel

  • Exclusive - Configure HSRP

  • Troubleshoot IP Connectivity

  • Implement EIGRP

  • Troubleshoot EIGRP

  • Implement EIGRP for IPv6

  • Configure Multi-area OSPF

  • Troubleshoot Multi-area OSPF

  • Configure Multi-area OSPFv3

  • Configure and Troubleshoot a Serial Connection

  • Establish a Frame Relay WAN

  • Establish a GRE Tunnel

  • Configure Basic SNMP and Syslog

  • Manage Cisco Devices and Licensing

  • ICND2 Super Lab


 

Course Image Network Security

Learn how to examine Network Device security, secure Network Administration and Design elements. Secure and insecure Network Protocols, Network Ports, securing wireless and domain devices.

Course Image Compliance and Operational Security

Learn risk Concepts, risk mitigation, incident response, security training, Business Continuity, environmental controls, Disaster Recovery and Confidentiality, Integrity and Availability (CIA)

Course Image Threats and Vulnerabilities

Learn different threat and security threats including;

·         Malware Types

·         Attack Types

·         Social Engineering Attacks

·         Wireless Attacks

·         Application Attacks

·         Attack Mitigation and Deterrence

·         Attack Assessment Tools

·         Penetration Testing vs. Vulnerability

 

·         Domain Review

·         Threats and Vulnerability Exercises

·         Auditing

·         Browser Security

·         Personal Firewall

·         Windows Software Update Services

·         Password Crackers

·         WinPatrol

 


Course Image Application, Data and Host Security

Learn Application security concepts such as fuzzing, cross-site scripting, cross site request forgery, application and database hardening, device security, encryption, data-wiping, SCADA and embedded systems security, virtualization and cloud security concepts, mobile device security and the various methods used to implement best practices.

Course Image Cryptography

Learn Cryptography Concepts, Tools, Products, and Algorithms. Public Key Infrastructure, Certificate Services, Servers and Requests and use Steganography Software.