Master in Network Engineering
Period of Preparation 610* Hours
12 Projects for Real Time
“A+” (System Administration)
BIOS Settings Setup and Apply
Differentiate between the Board of Mothers
- RAM Compare and Contrast
- Expansion Cards Load & Setup
- Storage Modules Load and Customize
- Install & Set Up Backup
- Install a compatible power supply
- Installing the SOHO Router Setup
- Apps with inputs
- Total assembly of the machine
- N+ and N+ (Network Administration)
Basic Network and Networking principles
Network Type - Tools for Networking and Inter Networking
- Transmission Media Systems
- T M-LAB
- PC’s and Peripherals Arrangement
- Terminology for Networking
- Addressing With
- Mask of Subnets – VLSM, FLSM
- Solving Problems-Subnetting
- Safety-Firewall
- Model of Reference
- Troubleshooting Simple Framework and Familiarization with System
- CCNA v1.0 (Associate of Cisco Accredited Network (200-301))
Fundamentals of Networks
Explain the role and purpose of components in the network - Describe characteristics of architectures for network topology
- Compare cabling forms and physical interfaces
- Identify problems with the interface and cable (collision, mistake, duplex mismatch and/or speed)
- IPv4 Addressing and Subnetting setup and verification
- Describe the need for IPv4 addressing private
- Compare the forms of IPv6 addresses
- Verify Client OS IP Parameters (Windows, Mac OS, Linux)
- Describe values for wireless
- Explain the fundamentals of virtualization (virtual machines)
- Describe principles for switches
- Network Access
- Accessing the Network
- Configure and validate multiple switches spanning VLANs (normal range)
- Inter-switch connectivity setup and verification
- Configure and validate discovery protocols on Layer 2 (Cisco Discovery Protocol and LLDP)
- Setup and verification (Layer 2/Layer 3) of EtherChannel (LACP)
- Describe the need for Rapid PVST+ Spanning Tree Protocol and basic operations and define the basic operations
- Compare AP modes and Cisco Wireless Architectures
- Describe physical WLAN part infrastructure links (AP, WLC, access/trunk ports, and LAG)
- Describe access links for AP and WLC management (Telnet, SSH, HTTP, HTTPS, terminal, and TACACS+/RADIUS)
- Set up wireless LAN access components for client networking using Interface only, such as WLAN development, security settings, QoS profiles, and advanced WLAN setup.
- IP Connectivity
- Interpret routing table components
- Determine if a router by default takes a forwarding decision
- Configuring and checking static routing for IPv4 and IPv6
- Configure and validate the OSPFv2 single field
- Describe the purpose of the Protocol of First Hop Redundancy
About IP Facilities
- Using static and pools to setup and check internal root NAT
- Configure and validate NTP for client and server mode operations
- Explain DHCP and DNS’ position within the network
- Explain SNMP’s role in network operations
- Describe the use of syslog functionality, including instals and levels
- DHCP Client and Relay setup and verification
- Explain the per-hop (PHB) forwarding actions for QoS, such as grouping, tagging, queuing, congestion, police, shaping,
- Set up Remote Access Network Modules using SSH
- Describe the network features and functionality of TFTP/FTP
- Security Fundamentals
- Establish core principles for defence (threats, vulnerabilities, exploits, and mitigation techniques)
- Describe elements of security systems (user awareness, training, and physical access control)
- Configure access control of computers using local passwords
- Describe features of protection password policy, such as administration, difficulty, and alternate passwords (multifactor authentication, certificates, and biometrics)
- Describe site-to-site VPNs and remote access
- Configure and check lists for access management
- Configure Protection Controls on Layer 2 (DHCP snooping, dynamic ARP inspection, and port security)
- Differentiate definitions for authentication, registration, and accounting
- Describe protocols for Wireless Authentication (WPA, WPA2, and WPA3)
- Using the GUI, customise WLAN using WPA2 PSK
- Compare conventional networks with controller-based networking Describe controller-based and software-defined architectures (overlay, underlay, and fabric) Compare traditional campus system management with device management allowed by Cisco DNA Center Describe features of REST-based APIs (CRUD, HTTP verbs, and data encoding).
- CCNP – R&S (Cisco Certified Network Professional)
- Implementing Cisco IP Routing
- CCNP – R&S Facilities (Cisco Certified Network Professional)
- Implementing IP Routing from Cisco
- Identify, customise, and check subnetting and IPv4 addressing
- Identify, Set up IPv6 Addressing
- Configure Static Routing and check it
- Configure and check Routing by Default
- Assess types of routing protocols
- Describe Passive Interfaces and Administrative Gap
- Digital Routing Concept and Forwarding
- Configure and Check Redistribution and Filtering between all Routing Protocols or Routing Sources
- The Road Charts Definition
- Policy-based routing setup and testing
- Suboptimal Routing Recognition
- Configure and Check Process for Loop Prevention
- Ripv1 and Ripv2 Customize and Check
- The RIPng Definition
- EIGRP and EIGRP Packets Definition
- EIGRP Neighbor Relationship and Authentication Configure and Check, EIGRP STUBS
- Configure and check load balancing for EIGRP
- Describe and refine metrics from EIGRP
- EIGRP setup and testing for IPv6
- OSPF and OSPF Packet Types Definition
- Configure and check the relationship and authentication of the OSPF neighbour
- Configure and check network forms, types of areas and types of routers
- Preferences and Operation Configure and Check Route
- OSPF IPv6 Configure and Check
- Describe, customise, and check authentication and BGP peer relationships
- Configure and search eBGP and iBGP
- Technologies for VPN
- Infrastructure and Protection Definition Define IOS AAA for local database use
- Using IOS AAA to explain system protection with TACACS+ and RADIUS
- Configure and check access control of systems
- Configure and check protection features for routers
- Infrastructure Services Definition and Configuring and checking system control.
- SNMP Definition (v1 and v2)
- Logging Principle
- Network Time Protocol setup and testing (NTP)
- IPv4 and IPv6 DHCP Configure and Check
- IPv4 Network Address Conversion setup and verification (NAT)
- SLA’s Definition (Service Level Agreement)
- Definition of definitions in Cisco Express Forwarding
- PPP setup and verification
- Frame Clarify realy
- Implementing Cisco IP Switched Networks
- Configure and check management for switches
- Configure and validate protocols from Layer 2
- VLANs Setup and Check
- Trunking setup and verification
- EtherChannels Setup and Check
- Spanning tree design and testing
- Definition of Functionality for Transfer Protection
- Describe system protection with TACACS+ and RADIUS using Cisco IOS AAA
- Configure and validate protocols for first-hop redundancy
- Cyber Security with Ethical Hacking (CEH v10 312-50 )Network Administration
- Basic principles & Networking Introduction
- ISO/OSI and Templates for TCP/IP
- IP Addressing and addressing to MAC
- Tools for Networks
- Network Styles
- Media networks
- Basic Linux commands and support
- Control of users
- Regulation of files
- Configuring the Network
- Forwarding of the port
- Ethical Hacking Introduction
- Reconnaissance and Footprinting
- Networks Scanning
- The Enumeration
- Hacking of the system
- Sniffing About
- Of Social Engineering
- Hijacking session
- Denial-of-Program Service
- Evading IDS, Honeypots, and Firewalls
- Online Servers Hacking
- Wireless Networks Hacking
- Injection of SQL
- Mobile Platforms Hacking
- Cryptographics
- Huawei Routing & Switching-
- Introduction and Elementary Commands
- Protocols Setup
- Multi-vendor interlinking (CISCO)
- Of MCSA2016 (Microsoft Certified Solutions Associate)
- 70-740: Windows Server 2016 Download, Storage, and Computing
- 70-741: Windows Server 2016 Networking
- 70-742: Windows Server 2016 identity To MCSE2016 (Microsoft Certified Solutions Expert)
- 70-744: Windows Server 2016 Protecting
- Cloud Computing-Architect Partner with AWS Solutions
- BASICS OF CLOUD
- CLOUD COMPUTING INTRODUCTION
- TO AWS INTRODUCTION
- CLOUD With ELASTIC COMPUTING (EC2)
- NETWORKING & COMPUTE Resources
- DELIVERY of AWS STORAGE & CONTENT
- SOLUTION OF DATABASE ON AWS
- DNS Operation AWS
- BALANCING Operation AWS LOAD
- LAMDA AWS
- WEB SERVICE OF CONTENT Distribution
- Easy MONTHLY CALCULATOR OF AWS
- RHCSA v8 (Redhat Certified Administrator of System-RHEL8)
- Operating Framework for Linux
- With Terminal and Shell, Linux Virtual Console Explained
- System of files and its hierarchy
- Installing Server
- Basic Commands for Linux
- Control of Users
- Control of Directories in Linux
- Permissions on Register
- List of Access Management
- Management of Disk
- Regulation of Conceptual Volume
- Understanding and using fundamental methods
- Phase of Handling & Controlling
- Access to protection
- Computer Installation And Maintenance
- Troubleshooting here
- Firewalls & UTMs (Cisco, Fortinet & Huawei)
- UTMs introduction
- Technologies from UTM
- Advantages and pitfalls
- Products
- Object-grouping and class of object
- Modes of service (types of firewall) and regulation setup
- Integration of extra features
- Configuration introduction (Huawei)
- Deployment of Legislation
Wireless & WLAN Controllers
- 802.11 Summary
- Overview of Radio Frequency
- RF Signal Power, Obstruction and Disturbance
- Fresnel Areas RF
- Channels 802.11
- Preventing Duplication in Channel
- 802.11 as well as Crashes
- The 802.11 Enhancements
- Access Point for Cellular (WAP)
- Protocol on Wireless Equivalence (WEP)
- Safe Connections to Wi-Fi (WPA)
- Protocol for Lightweight Extensible Authentication (LEAP)
- EAP via Secure Tunneling and Scalable Authentication (EAP-FAST)
- EAP with Security of the Transport Layer (EAP-TLS)
- EAP Safe (PEAP)
Passive Devices & Standardized Cabling
Understanding various kinds of Network Cables & Tools
Network Elements Comprehension
Rack Setup
Cabling with
Cables Crimping & Punching
Patch panel and IO Box for assembly, etc.
Camera Monitoring for CCTV & IP
Introduction of Cameras for Monitoring
CCTV Camera Principles
IP Camera & CCTV Camera Gap
Advantages & pitfalls
Introduction to DVR
CCTV Video Installation & Configuration
IP Camera Principles
NVR Introduction Introduction
IP Video installation & setup
Telephony IP, CME
Introductory to VOIP
IP Telephony Principles
Introduction of IP Phones from CISCO
Phase for CISCO IP Phone Startup
Requirements for an IP phone