About The Course:
In today's rapidly evolving technological landscape, the need for robust cybersecurity and cloud computing expertise has never been more crucial. The Cybersecurity and Cloud course is designed to provide you with the skills and knowledge necessary to protect sensitive data, ensure network security, and effectively manage cloud-based infrastructure. This comprehensive program to provide participants with a deep understanding of fundamental concepts of Cybersecurity and Cloud with our specialized course. Covering a broad spectrum of topics, from computer hardware and networking fundamentals to advanced concepts like firewall configurations and AWS services, this program equips you with in-depth knowledge and practical skills. Delve into ethical hacking, AWS management, and network security, gaining expertise in areas such as virtualization, routing, and security protocols. Elevate your understanding of NAS, fiber optic technologies, and Windows Server administration.
Course Certification:
Successfully completing our Cybersecurity and Cloud course earns participants a prestigious certification, validating their expertise. This comprehensive program covers computer hardware, networking, firewall configurations, AWS management, ethical hacking, and more. Participants gain practical skills in Windows Server administration, network security, and advanced technologies like NAS and fiber optics. Focused on real-world applications, this course ensures a well-rounded skill set. Join us to excel in the dynamic fields of cybersecurity and cloud technology, enhancing your capabilities for future challenges.
COMPUTER HARDWARE AND NETWORKING
Chapter 1: Introduction to Computer Hardware:
1. Overview of computer hardware components
2. Basic troubleshooting and maintenance
Chapter 2: Operating Systems and Software:
1. Understanding operating systems (Windows, Linux)
2. Device drivers and software installation
3. System updates and patches
Chapter 3: Computer Networks Basics:
1. Introduction to computer networks
2. Network topologies and architectures
3. OSI and TCP/IP models
Chapter 4: Networking Devices:
1. Routers, switches, hubs, and access points
2. Understanding MAC addresses and IP addresses
3. Configuration of networking devices
Chapter 5: Ethernet and LAN Technologies:
1. Introduction to Ethernet technology,
2. Local Area Network (LAN) design and implementation
3. Ethernet cable types and connectors.
Chapter 6: Wireless Networking:
1. Wireless standards (Wi-Fi),
2. Configuring and securing wireless networks,
3. Troubleshooting
4. common wireless issues
Chapter 7: Internet and Wide Area Networks (WAN):
1. Overview of the Internet and web technologies
2. Wide Area Network (WAN) concepts
3. Connecting to the Internet
Chapter 8: TCP/IP Protocols:
1. Understanding TCP/IP protocols
2. IP addressing and subnetting
3. DHCP and DNS configurations
Chapter 9: Routing and Switching:
1. Routing concepts and protocols (e.g., RIP, OSPF)
2. Switching concepts and VLANs
3. Basic router and switch configurations
Chapter 10: Network Security:
1. Introduction to network security
2. Firewalls, IDS, and IPS
3. Securing wireless networks
Chapter 11: Network Troubleshooting:
1. Troubleshooting methodologies
2. Use of network diagnostic tools (e.g., ping, traceroute)
3. Common network issues and resolutions
Chapter 12: Introduction to Cloud Computing:
1. Overview of cloud computing
2. Cloud service models (IaaS, PaaS, SaaS)
3. Cloud deployment models (public, private, hybrid
WINDOWS SERVER
Chapter 1: Windows Server Administration
1. Introducing Windows Server 2019
2. Windows Server Core Overview
3. Windows Server administration principles and tools overview
Chapter 2: Identity Services in Windows Server
1. AD DS Overview
2. Deploying Windows Server domain controllers
3. Azure AD overview
4. Implementing Group Policy
5. Active Directory Certificate Services overview
Chapter 3: Network Infrastructure services
1. Deploying and managing DHCP
2. Deploying and managing DNS service
3. Deploying and managing IPAM
4. Remote Access Services in Windows Server
Chapter 4: File Servers and Storage management
1. Volumes and File Systems in Windows Server
2. Implementing sharing in Windows Server
3. Implementing Storage Spaces in Windows Server
4. Implementing Data Deduplication
5. Implementing iSCSI
6. Deploying Distributed File System
Chapter 5: Hyper-V virtualization and containers
1. Hyper-V in Windows Server
2. Configuring VMs
3. Securing virtualization in Windows Server
4. Containers in Windows Server
5. Overview of Kubernetes
Chapter 6: Disaster recovery
1. Hyper-V Replica
2. Backup and restore infrastructure
Chapter 7: Windows Server security
1. Credentials and privileged access protection
2. Hardening Windows Server
3. JEA in Windows Server
4. Securing and analyzing SMB traffic
5. Windows Server update management
Chapter 8: RDS in Windows Server
1. Overview of RDS
2. Configuring a session-based desktop deployment
3. Overview of personal and pooled virtual desktops
Chapter 9: Remote access and web services
1. Implementing VPNs
2. Implementing NPS
3. Web Server in Windows Server
CCNA
Chapter 1: Network Fundamentals
Network components (Routers - L2 and L3 Switches - Servers -Endpoints and Access Points) - Network Topology Architecture (2 tier, 3-tier, Spine-leaf, WAN, SOHO, On-premise and cloud) - Compare TCP to UDP - IPv4 and IPv6 Addressing - Compare IPv6 Address Types – Switching (frame switching, frame flooding)
Chapter 2: Network Access
Multiple switches(Access ports, default vlan, connectivity) – spanning Tree Protocol(Root port, root bridge, port states, portfast benefits) – WLAN(connections of wlan components)
Chapter 3: IP Connectivity
Routing table(Routing protocol code, prefix, network mask,next hop) – Router – Static Routing – OSPF(v2)
Chapter 4: IP Services
Network Address Translation (NAT) - Network Time Protocol (NTP) - DHCP and DNS - SNMP and Syslog - Per-Hop Behavior (PHB) - TFTP/ FTP
Chapter 5: Security Fundamentals
Security concepts(Threats, Vulnerabilities¸ Exploits, Mitigation techniques) Security Program Elements - Virtual Private Networks (VPNs – define remote access and site to site vpns) – Security features – wireless security protocols(WPA, WPA2, WPA3) – WLAN.
Chapter 6: Automation and programmability
Network management -Controller-based and Software-defined architectures(control pane, Data plane, Northbound APIs, Southbound APIs) – Device management – REST based APIs(CRUD, HTTP verbs, data encoding) – Configuration management(puppet, chef, ansible) - JSON
CISCO CONFIGURATION
Chapter 1: Cisco 800M Series Integrated Services Routers Overview
Overview of the Cisco 800M Series ISR, Cisco 800M Series ISR Models Cisco 800M Series ISR Features
Chapter 2: Basic Router Configuration
Configuring Global Parameters, Configuring Gigabit Ethernet WAN Interfaces, configuring a Loopback Interface, Configuring Command-Line Access, Configuring Gigabit Ethernet LAN Interfaces, Configuring Static Routes, Configuring Dynamic Routes, Configuring Image and Configuration Recovery Using the Push Button, configuring 800M Series ISR using ZeroTouch Deployment.
Chapter 3: Configuring the Serial Interface
1. Configuring the Serial Interface, Features Supported by Serial Module, Information About
2. Configuring Serial Interfaces, How to Configure Serial Interfaces, Configuration Examples.
Chapter 4: Ethernet Switch ports:
1. Configuring VLANs, Configuring VTP, Configuring 802.1x Authentication, Configuring
2. Spanning Tree Protocol, Configuring MAC Address Table Manipulation, Configuring MAC
3. Address Notification Traps, Configuring the Switched Port Analyzer, Configuring IGMP
4. Snooping, Configuring Per-Port Storm Control, Configuring HSRP, Configuring VRRP.
Chapter 5: Configuring Security Features
1. Configuring Authentication, Authorization, and Accounting, Configuring Access Lists,
2. Configuring Cisco IOS IPS, Configuring VPN, Configuring Dynamic Multipoint VPN,
3. Configuring Group Encrypted Transport VPN, Configuring SSL VPN, Configuring FlexVPN,
4. Configuring Zone-Based Policy Firewall, Configuring VRF-Aware Cisco Firewall, Configuring Subscription-Based Cisco IOS Content Filtering, Configuring On-Device Management for Security Features
Chapter 6: Configuring
1. Configuring Class Based Weighted Fair Queuing, Configuring Low-Latency Queueing,
2. Configuring Class-Based Traffic Shaping, Configuring Class-Based Traffic Policing,
3. Configuring Class-Based Weighted Random Early Detection, Configuring QoS Hierarchical Queueing Framework, Configuring Network-Based Application Recognition,
4. Configuring Resource Reservation Protocol, Configuring Quality of Service for VPNs, Configuring Per Tunnel QoS for DMVPN, Configuring Layer 2 Auto QoS.
Chapter 7: Configuring Network Management Features
Cisco Configuration Professional, Cisco Configuration Professional Express, Cisco Prime Infrastructure, Embedded Event Manager, Configuring IP SLAs, Configuring Radius, Configuring TACACS+, Configuring SSH, Configuring SNMP, Configuring NetFlow, Configuring Flexible NetFlow, MIB Support.
Chapter 8: Configuring IP Addressing and IP Services Features
Configuring DHCP, Configuring DNS, Configuring NAT, Configuring NHRP, Configuring BFD, Configuring RIP, Configuring BGP, Configuring OSPF, Configuring BGP, Configuring Performance Routing v3, Configuring Multi VRF, Configuring IPv6 Features.
NETWORK ATTACHED STORAGE
Chapter 1: Introduction to NAS
General-Purpose Servers vs. NAS Devices - Benefits of NAS -Comparison with other storage solutions (e.g., SAN) - Common use cases and applications - File Systems and Remote File Sharing.
Chapter 2: NAS Protocols
File-level protocols (NFS, SMB/CIFS) - block-level protocols (iSCSI) - Security considerations for NAS protocols
chapter 3: NAS Implementations
Integrated NAS - Gateway NAS - Integrated NAS Connectivity - Gateway NAS Connectivity
Chapter 4: NAS Management:
User and group management, File system management, Monitoring and reporting tools
Chapter 5: Data Backup and Recovery:
Importance of data backup, Simple backup strategies for NAS, Basic recovery procedures
Chapter 6: NAS Security Basics:
Introduction to access control and user authentication, Basic security measures for protecting NAS data, Password and encryption considerations.
Chapter 7: NAS in Virtualized Environments
Integration with virtualization platforms, Storage provisioning for virtual machines, NAS considerations in cloud environments.
FIREWALL CONFIGURATION
Chapter 1: Introduction to Network Security and Firewall
Importance of Network Security- Types of Cyber Threats - Security Policies and Procedures - Legal and Ethical Considerations - Define firewall – need for firewall – IP addressing – TCP/IP basics – network traffic – Transport layer protocol – application layer protocol.
Chapter 2: Firewall Basics
Types – Packet filtering firewalls, Stateful inspection firewalls, Proxy firewalls – Network address translation – Monitoring and logging
Chapter 3: Firewall – not so basics
Static address mapping – Filtering content – Detecting intrusion – Caching and load balancing – using encryption – Http – Https – IP and security
Chapter 4: Virtual Private Network (VPN)
VPN uses, advantages and types - Need of firewall in VPN - Threat free tunnelling - VPN Bandwidth management - SSL VPN - Dialup IPsec VPN
Chapter 5: Rules for protocols
Inbound, outbound firewall rules – radius functionality – configure inbound radius firewall rules - File transfer protocol – ICMP – IPsecn Encryption
Chapter 6: IDPS
Intrusion Detection and Prevention Systems (IDPS) - High availability and redundancy - Logging, auditing, and reporting
Chapter 7: Firewall Management
Firewall Policy Management - Developing and enforcing security policies - Rule optimization and organization - Developing and enforcing security policies.
FIBER OPTICAL CABLE
Chapter 1: Fiber Optic Introduction
1. Standards,
Terminology
Chapter 2: Cables
1. Indoor/Outdoor
2. Special Types
Chapter 3: Connectors
1. Single-mode Connectors
2. Multimode Connectors
3. SFF Connector Styles
4. Connectorization Process
5. Reflection and Polishes
6. Attenuators and Terminators
7. Cleaning and Inspection
Chapter 4: Splicing
1. Fusion,
2. Mechanical,
3. Cleaving Tools
Chapter 5: Cable Lying
1. Patch and Splice Panels,
2. Distribution Panels,
3. LAN Panels,
4. Splice Closures,
5. Hubs and Pedestals,
6. FTTx Products
Chapter 6: Test Equipments
1. Optical Time-domain,
2. Reflectometers (OTDRs),
3. Optical Loss Test Sets,
4. Visual Inspection Equipment,
5. Dispersion Testers
Chapter 7: Safety
1. Sources / Detectors,Repeaters / Amplifiers,
2. Passive Devices,
3. WDM / DWDM / CWDM,
4. System Design,
5. Loss Budgets,
6. Integration,
7. Standards.
ETHICAL HACKING
Chapter 1: Foundations of Ethical Hacking
Ethical Hacking: Introduction, Networking & Basics, Foot Printing, Google Hacking, Scanning, Windows Hacking, Linux Hacking, Trojans & Backdoors, Virus & Worms, Proxy & Packet Filtering, Denial of Service, Sniffer, Social Engineering.
Chapter 2: Computer Systems and Network Security
Introduction to Computer Systems and Networks, information systems and networks (including wireless networks) and their role in industry business and society, System and Network Vulnerability and Threats to Security, various types of attack and the various types of attackers in the context of the vulnerabilities associated with computer and information systems and networks.
Chapter 3: Advanced Security Concepts and Techniques
Physical Security, Steganography, Cryptography, Wireless Hacking, Firewall & Honeypots, IDS & IPS, Vulnerability, Penetration Testing, Session Hijacking, Hacking Web Servers, SQL Injection, Cross Site Scripting, Exploit Writing, Buffer Overflow, Reverse Engineering, Email Hacking, Incident Handling & Response, Bluetooth Hacking, Mobile Phone Hacking.
Chapter 4: Hands-On Ethical Hacking Tools
An introduction to basic ethical hacking tools and usage of these tools in a professional environment in a form of project.
Chapter 5: Legal, Professional, and Ethical Considerations
An introduction to the particular legal, professional and ethical issues likely to face the domain of ethical hacking. Ethical responsibilities, professional integrity and making appropriate use of the tools and techniques associated with ethical hacking AWS.
Chapter 1: Introduction to AWS Course
Classic Data Center, Virtualization, Cloud and Cloud Computing, Cloud Computing Service Models, Cloud Computing Deployment Models, Service Comparison: AWS, Azure, and GCP, Amazon Web Services (AWS) and its Benefits, AWS Global Infrastructure, AWS Regions and Replication of data between the Regions, Availability Zones and High Availability, AWS Edge Location, Different Amazon Web Services, Ways to access AWS: CLI, Console, and SDKs
Chapter 2: Security Management in AWS
AWS Services Security Token Services, AWS Resource Access Manager (RAM), AWS Single Sign-On (SSO), AWS Cognito, AWS Security & Encryption: KMS, CloudHSM, Shield, WAF, Guard Duty, API keys service access, Best practices for IAM, Access billing and create alerts on billing
Chapter 3: Object Storage Options
Traditional Storage, Need to Move to Cloud Storage, Traditional vs. Cloud Storage Cost Cloud Storage, Different Storage Options Available on AWS, Simple Storage Service (S3) and Its Components, Working of S3, Difference Between S3, EBS and EFS, Bucket Policy Access Control List(ACL), Versioning, Cross-Region Replication (CRR) and Its Use Case, Amazon S3 Transfer Acceleration, Choice of Storage Classes on S3, Lifecycle Policy of S3 Bucket, CDN: CloudFront and AWS Global Accelerator, Storage Gateways.
Chapter 4: Amazon EC2
Virtualization, Amazon Elastic Compute Cloud (EC2) and Its Benefits, Amazon Machine Image (AMI), Security Groups in AWS, Authentication through Key-pair, Hardware Tenancy – Shared vs. Dedicated, Networking Layer in EC2: VPC, Elastic Network Interface (ENI) and Its Attributes, Different Categories of IP Address, Public IP vs. Elastic IP, Instance Store, Elastic Block Store (EBS), Its Features and Volume Types, Solid State Drive: General Purpose SSD and Provisioned IOPS, Hard Disk Drive: Throughput Optimized HDD and Cold HDD, Snapshots Elastic File System (EFS) and Its Features, EBS vs. EFS, Amazon FSx: Windows File Server and Lustre.
Chapter 5: Database Services and Analytics
Amazon RDS and its benefits, Read Replica RDS, IAM Authentication, DynamoDB, ElastiCache: Working, Redis vs Memcached, Amazon RedShift, Kinesis: AWS Kinesis Data Streams, AWS Kinesis Data Firehouse, AWS Lake Formation, AWS Athena, AWS QLDB.
Chapter 6: Load Balancing, Auto-Scaling, and Route 53
Elastic Load Balancer and its types, Advanced features of ELB, Launch Templates, Launch Configurations, Comparison of Classic, Network, and Application Load Balancer, AutoScaling, Components of Auto-Scaling, Lifecycle of Auto-Scaling, Auto-Scaling policy, Working of Route 53, Various Routing Policies,
Chapter 7: Networking and Monitoring Services
VPC – Benefits and Components, CIDR Notations, Network Access Control List v/s Security Groups, NAT (Network Address Translation): NAT Devices, NAT Gateway and NAT instance, VPC peering, Direct Connect, Private Link, AWS CloudWatch, AWS CloudTrail, AWS Config, Trusted Advisor.
Chapter 8: Applications Services and AWS Lambda
AWS Simple Email Service (SES), Implement SES, Demonstrate the working of SNS SQS: Work with SQS, ASG with SQS, Amazon MQ, Amazon Event Bridge, AWS Simple Notification Service (SNS), AWS Simple Work Flow (SWF), AWS Lambda AWS Serverless Application Model.
Chapter 9: Configuration Management and Automation
Infrastructure as Code, CloudFormation and its components, Templates in CloudFormation, Stack in CloudFormation, Resource deletion policies in CloudFormation, Introduction to AWS OpsWorks, AWS OpsWorks services, Components of AWS OpsWorks Stack OpsWorks, Lifecycle Events and Deployment Commands OpsWorks for Chef Automate AWS OpsWorks for Puppet Enterprise Auto Healing, Elastic Beanstalk, Components of Elastic Beanstalk Beanstalk v/s OpsWorks v/s CloudFormation.
Chapter 10: Migration to AWS
Why Cloud Migration, What is Cloud Migration, Migration Phases CAF Perspectives and their Roles, AWS Migration Hub and ways to use, AWS Migration Hub Roles and Permissions for AWS Migration Hub, AWS Migration Hub use cases, AWS Application Discovery Service Application Discovery Tools, Application Migration to AWS Application Migration Phases, Virtual Machines migration ways A, WS Server Migration Service(SMS) and its working, Database Migration Implementation steps, Working of DMS AWS Database Migration use cases Types of data transfer: Homogenous and Heterogenous, Database Schema Migration tool, Database Migration best practices.