About The Course:
Journey through the realms of IT with Cybersecurity course. From hardware fundamentals and network architecture to firewall and router configurations, this program covers it all. Gain skills in system assembly, networking protocols, CCNA essentials, and firewall management, equipping you with the expertise needed to navigate the dynamic landscape of cybersecurity. Elevate your understanding of critical topics, from device drivers to intrusion detection systems, and emerge as a proficient cybersecurity professional. Join us and fortify your knowledge in this ever-evolving field.
Course Certification:
Upon successfully finishing our Cybersecurity course, participants earn a distinguished certification, recognizing their mastery in various facets of cybersecurity. Covering everything from system assembly and network architecture to firewall configuration and intrusion detection, this program ensures a comprehensive understanding of the cybersecurity landscape. Participants will emerge equipped with skills in CCNA essentials, network protocols, and firewall management, positioning themselves as proficient professionals in the dynamic field of cybersecurity.
SYSTEM ASSEMBLING
Chapter 1. Introduction to PC Hardware
Study of basic I/O systems, Types of Memories- Static RAM and Dynamic RAM,ROM, PROM, EPROM, EEPROM, CPU (Central Processing Unit)- ALU and control unit.
Chapter 2. Motherboard and Processor
Study of different types of Motherboards, Motherboard Configuration, Identifying Internal and External connectors, Types of data cables, Types of Processor- Intel, Pentium IV, Dual core, Core 2 Duo, Quad processor etc.
Chapter 3. BIOS Configuration
Study of BIOS Set-up- Advance set-up, Boot configuration, Boot Menu.
Chapter 4. Installation of OS (Operating Software)
Windows XP, installation of different types of Service Packs, Vista and Windows-7 etc.
Chapter 5. Hard Disk
Formatting of Hard disk, Partitioning of Hard disk in different logical drives, Disk defragmentation, Disk clean up, Scan disk etc.
Chapter 6. Installation of Device Drivers
Different types of Motherboard drivers, LAN, Audio, and Video.
Chapter 7. Configuration of External devices
Physical set-up of Printers- Performing test print out, Printing of document etc. Scanner set-up, Webcam, Bluetooth device, Memory card reader etc.
Chapter 8. Diagnostic and troubleshooting of PC
POST (Power on Self Test), identifying problems by Beep codes errors, checking power supply using Multi-meter, Replacement of components etc.
NETWORKING
Chapter 1: Introduction to Computer Networking
Data Communication, Networks – Distributed Processing, Network Criteria, Applications; Protocols and Standards, Standard Organization, Line Configuration – Point to Point, Multi Point; Topology – Mesh, Star, Tree, Bus, Ring, Hybrid; Transmission mode, Categories ofNetwork – LAN, MAN, WAN, Inter Networks.
Chapter 2: Transmission of Digital Data
Analog and Digital, digital data transmission – parallel transmission, serial transmission, DTE-DCE interface – data terminal equipment, data circuit terminating equipment, standards, modems- Transmission rate, Modem standards.
Chapter 3: The OSI Model
ISO organization, The model – Layered architecture, functions of the layers -Physical layer, Data Link layer, Network layer, Transport layer, session layer, Presentation layer, Application layer
Chapter 4: TCP/IP Model & Protocols
The TCP/IP reference model, comparison of TCP/IP & OSI, Introduction to Internet – ARPANET, Architecture of Internet, Client server model, www, IP Address Classes, Protocols: IP, HTTP, TCP. FTP, ARP.
Chapter 5: Network Security
Introduction of Network Security and it’s importance. Cryptography: Definitions, Symmetric Key Cryptography: Traditional Ciphers, Simple modern Ciphers, Asymmetric Key Cryptography: RSA, Security Services, Digital Signatures.
CCNA
Chapter 1: Network Fundamentals
Network components (Routers - L2 and L3 Switches - Servers -Endpoints and Access Points) - Network Topology Architecture (2 tier, 3-tier, Spine-leaf, WAN, SOHO, On-premise and cloud) - Compare TCP to UDP - IPv4 and IPv6 Addressing - Compare IPv6 Address Types – Switching (frame switching, frame flooding)
Chapter 2: Network Access
Multiple switches(Access ports, default vlan, connectivity) – spanning Tree Protocol(Root port, root bridge, port states, portfast benefits) – WLAN(connections of wlan components)
Chapter 3: IP Connectivity
Routing table(Routing protocol code, prefix, network mask,next hop) – Router – Static Routing – OSPF(v2)
Chapter 4: IP Services
Network Address Translation (NAT) - Network Time Protocol (NTP) - DHCP and DNS - SNMP and Syslog - Per-Hop Behavior (PHB) - TFTP/ FTP
Chapter 5: Security Fundamentals
Security concepts(Threats, Vulnerabilities¸ Exploits, Mitigation techniques) Security Program Elements - Virtual Private Networks (VPNs – define remote access and site to site vpns) – Security features – wireless security protocols(WPA, WPA2, WPA3) – WLAN
Chapter 6: Automation and programmability
Network management -Controller-based and Software-defined architectures(control pane, Data plane, Northbound APIs, Southbound APIs) – Device management – REST based APIs(CRUD, HTTP verbs, data encoding) – Configuration management(puppet, chef, ansible) - JSON
ROUTER CONFIGURATION
Chapter 1: Cisco 800M Series Integrated Services Routers Overview
Overview of the Cisco 800M Series ISR, Cisco 800M Series ISR Models Cisco 800M Series ISR Features
Chapter 2: Basic Router Configuration
Configuring Global Parameters, Configuring Gigabit Ethernet WAN Interfaces, configuring a Loopback Interface, Configuring Command-Line Access, Configuring Gigabit Ethernet LAN Interfaces, Configuring Static Routes, Configuring Dynamic Routes, Configuring Image and Configuration Recovery Using the Push Button, configuring 800M Series ISR using Zero Touch Deployment.
Chapter 3: Configuring the Serial Interface
Configuring the Serial Interface, Features Supported by Serial Module, Information About Configuring Serial Interfaces, How to Configure Serial Interfaces, Configuration Examples.
FIREWALL CONFIGURATION
Chapter 1: Introduction to Network Security and Firewall
Importance of Network Security- Types of Cyber Threats - Security Policies and Procedures - Legal and Ethical Considerations - Define firewall – need for firewall – IP addressing – TCP/IP basics – network traffic – Transport layer protocol – application layer protocol
Chapter 2: Firewall Basics
Types – Packet filtering firewalls, Stateful inspection firewalls, Proxy firewalls – Network address translation – Monitoring and logging
Chapter 3: Firewall – not so basics
Static address mapping – Filtering content – Detecting intrusion – Caching and load balancing – using encryption – Http – Https – IP and security
Chapter 4: Virtual Private Network (VPN)
VPN uses, advantages and types - Need of firewall in VPN - Threat free tunnelling - VPN Bandwidth management - SSL VPN - Dialup IPsec VPN
Chapter 5: Rules for protocols
Inbound, outbound firewall rules – radius functionality – configure inbound radius firewall rules - File transfer protocol – ICMP – IPsec Encryption.
Chapter 7: Firewall Management
Firewall Policy Management - Developing and enforcing security policies - Rule optimization and organization - Developing and enforcing security policies.