


Masters in Network Engineering
Training Duration:12 Months
12 Real Time Projects
- A+ (System Administration)
- N+ (Network Administration)
- CCNA v1.0 (Cisco Certified Network Associate (200-301))
- Network Fundamentals
- Network Access
- IP Connectivity
- IP Services
- Security Fundamentals
- Automation and Programmability
- CCNP – R&S (Cisco Certified Network Professional)
- Implementing Cisco IP Routing
- Implementing Cisco IP Switched Networks
- Cyber Security with Ethical Hacking (CEH v10 312-50 )
- Routing & Switching – Huawei
- MCSA2016 (Microsoft Certified Solutions Associate)
- MCSE2016 (Microsoft Certified Solutions Expert)
- Cloud Computing – AWS Solutions Architect Associate
- RHCSA v8 (Redhat Certified System Administrator – RHEL8)
- RHCE v8 (Redhat Certified Engineer – RHEL8)
- UTMs & Firewalls (Cisco, Fortinet & Huawei)
- Wireless & WLAN Controllers
- Structured Cabling & Passive Devices
- CCTV & IP Camera Surveillance
- IP Telephony, CME
More information
Our Modules
Master in Network Engineering Training Duration 610* Hours 12 Real Time Projects
- A+ (System Administration)
- Configure and Apply BIOS Settings
- Differentiate Between Mother Board
- Compare and Contrast RAM
- Install & Configure Expansion Cards
- Install and Configure Storage Devices
- install & configure storage
- Install Appropriate Power Supply
- Installing Configuring SOHO Routers
- Input devices
- Full system assembling
- N+ (Network Administration)
- Basic concepts of Network and Networking
- Type of Networks
- Networking and Inter Networking Devices
- Transmission Media
- T M – LAB
- Arrangement of PC's and Peripherals
- Networking Terminology
- Addressing
- Subnet Mask - VLSM, FLSM
- Problem Solving – Subnetting
- Security – Firewall
- Reference Model
- Basic System Troubleshooting and System Familiarization
- CCNA v1.0 (Cisco Certified Network Associate (200-301))
- Network Fundamentals
- Explain the role and function of network components
- Describe characteristics of network topology architectures
- Compare physical interface and cabling types
- Identify interface and cable issues (collisions, errors, mismatch duplex, and/or speed)
- Configure and verify IPv4 addressing and subnetting
- Describe the need for private IPv4 addressing
- Compare IPv6 address types
- Verify IP parameters for Client OS (Windows, Mac OS, Linux)
- Describe wireless principles
- Explain virtualization fundamentals (virtual machines)
- Describe switching concepts
- Network Access
- Configure and verify VLANs (normal range) spanning multiple switches
- Configure and verify inter-switch connectivity
- Configure and verify Layer 2 discovery protocols (Cisco Discovery Protocol and LLDP)
- Configure and verify (Layer 2/Layer 3) EtherChannel (LACP)
- Describe the need for and basic operations of Rapid PVST+ Spanning Tree Protocol and identify basic operations
- Compare Cisco Wireless Architectures and AP modes
- Describe physical infrastructure connections of WLAN components (AP, WLC, access/trunk ports, and LAG)
- Describe AP and WLC management access connections (Telnet, SSH, HTTP, HTTPS, console, and TACACS+/RADIUS)
- Configure the components of a wireless LAN access for client connectivity using GUI only such as WLAN creation, security settings, QoS profiles, and advanced WLAN setting
- IP Connectivity
- Interpret the components of routing table
- Determine how a router makes a forwarding decision by default
- Configure and verify IPv4 and IPv6 static routing
- Configure and verify single area OSPFv2
- Describe the purpose of first hop redundancy protocol
- Configure and verify inside source NAT using static and pools
- Configure and verify NTP operating in a client and server mode
- Explain the role of DHCP and DNS within the network
- Explain the function of SNMP in network operations
- Describe the use of syslog features including facilities and levels
- Configure and verify DHCP client and relay
- Explain the forwarding per-hop behavior (PHB) for QoS such as classification, marking, queuing, congestion, policing, shaping
- Configure network devices for remote access using SSH
- Describe the capabilities and function of TFTP/FTP in the network
- Security Fundamentals
- Define key security concepts (threats, vulnerabilities, exploits, and mitigation techniques)
- Describe security program elements (user awareness, training, and physical access control)
- Configure device access control using local passwords
- Describe security password policies elements, such as management, complexity, and password alternatives (multifactor authentication, certificates, and biometrics)
- Describe remote access and site-to-site VPNs
- Configure and verify access control lists
- Configure Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port security)
- Differentiate authentication, authorization, and accounting concepts
- Describe wireless security protocols (WPA, WPA2, and WPA3)
- Configure WLAN using WPA2 PSK using the GUI
- Network Fundamentals
- Automation and Programmability
- Explain how automation impacts network management
- Compare traditional networks with controller-based networking
- Describe controller-based and software defined architectures (overlay, underlay, and fabric
- Compare traditional campus device management with Cisco DNA Center enabled device management
- Describe characteristics of REST-based APIs (CRUD, HTTP verbs, and data encoding)
- Recognize the capabilities of configuration management mechanisms Puppet, Chef, and Ansible
- Interpret JSON encoded data
- CCNP - R&S (Cisco Certified Network Professional)
- Implementing Cisco IP Routing
- Identify, configure, and verify IPv4 addressing and subnetting
- Identify, Configure IPv6 Addressing
- Configure and verify Static Routing
- Configure and verify Default Routing
- Evaluate routing protocol types
- Describe Administrative Distance and Passive Interfaces
- Concept of Virtual Routing and Forwarding
- Configure and Verify Redistribution between any Routing Protocols or Routing Sources and Filtering
- Concept of Route Maps
- Configure and verify policy-based routing
- Identifying Suboptimal Routing
- Configure and Verify Loop Prevention Mechanism
- Configure and Verify Ripv1 and Ripv2
- Concept of RIPng
- Concept of EIGRP and EIGRP Packets
- Configure and verify EIGRP neighbor relationship and authentication ,EIGRP STUBS
- Configure and verify EIGRP load balancing
- Describe and optimize EIGRP metrics
- Configure and verify EIGRP for IPv6
- Concept of OSPF and OSPF Packet Types
- Configure and verify OSPF neighbour relationship and authentication
- Configure and verify network types, area types, and router types
- Configure and Verify Path Prefernce and Operation
- Configure and Verify OSPF IPv6
- Describe, configure, and verify BGP peer relationships and authentication
- Configure and verify eBGP and iBGP
- VPN Technologies
- Concept of Infrastructure and Security Describe IOS AAA using local Database
- Describe device security using IOS AAA with TACACS+ and RADIUS
- Configure and verify device access control
- Configure and verify router security features
- Concept of Infrastructure Services and Configure and verify device management.
- Concept of SNMP (v1 and v2)
- Concept of Logging
- Configure and verify Network Time Protocol (NTP)
- Configure and verify IPv4 and IPv6 DHCP
- Configure and verify IPv4 Network Address Translation (NAT)
- Concept Of SLA(Service Level Agreement)
- Concept of Cisco Express Forwarding concepts
- Configure and verify PPP
- Explain Frame Relay
- Implementing Cisco IP Switched Networks
- Configure and verify switch administration
- Configure and verify Layer 2 protocols
- Configure and verify VLANs
- Configure and verify trunking
- Configure and verify EtherChannels
- Configure and verify spanning tree
- Concept of Switch Security Features
- Describe device security using Cisco IOS AAA with TACACS+ and RADIUS
- Configure and verify first-hop redundancy protocols
- Implementing Cisco IP Routing
- Cyber Security with Ethical Hacking (CEH v10 312-50 )
- Network Administration
- Basic Concepts & Introduction To Networking
- ISO/OSI and TCP/IP Models
- IP Addressing and MAC addressing
- Network Devices
- Types of Networks
- Network Medias
- Basic and helping Linux commands
- User management
- File management
- Network configuration
- Port forwarding
- Introduction to Ethical Hacking
- Footprinting and Reconnaissance
- Scanning Networks
- Enumeration
- System Hacking
- Sniffing
- Social Engineering
- Session Hijacking
- Denial-of-Service
- Evading IDS, Firewalls, and Honeypots
- Hacking Web Servers
- Hacking Wireless Networks
- SQL Injection
- Hacking Mobile Platforms
- Cryptography
- Routing & Switching – Huawei
- Introduction and basic commands
- Configuring Protocols
- Interconnecting with multi-vendors(CISCO)
- MCSA2016 (Microsoft Certified Solutions Associate)
- 70-740: Installation, Storage, and Compute with Windows Server 2016
- 70-741: Networking with Windows Server 2016
- 70-742: Identity with Windows Server 2016
- MCSE2016 (Microsoft Certified Solutions Expert)
- 70-744: Securing Windows Server 2016
- Cloud Computing – AWS Solutions Architect Associate
- CLOUD BASICS
- INTRODUCTION TO CLOUD COMPUTING
- INTRODUCTION TO AWS
- ELASTIC COMPUTING CLOUD (EC2)
- COMPUTE SERVICES & NETWORKING
- AWS STORAGE & CONTENT DELIVERY
- DATABASE SOLUTION ON AWS
- AWS DNS SERVICE
- AWS LOAD BALANCING SERVICE
- AWS LAMDA
- CONTENT DELIVERY WEB SERVICE
- AWS SIMPLE MONTHLY CALCULATOR
- RHCSA v8 (Redhat Certified System Administrator – RHEL8)
- Linux Operating System
- Linux Virtual Console Explained With Terminal And Shell
- File System And Its Hierarchy
- Server Installation
- Basic Linux Commands
- User Management
- File Management In Linux
- File Permissions
- Access Control List
- Disk Management
- Logical Volume Management
- Understand And Use Essential Tools
- Managing & Monitoring Process
- Security Access
- Installing And Managing Software
- Troubleshooting
- RHCE v8 (Redhat Certified Engineer – RHEL8)
- Server Client Communication
- Enhance User Security
- Scripting
- Advanced Network Configuration
- Remote Services
- Configure an NTP server
- Centralized and secure storage
- Web server
- File Transfer
- Mail Configuration
- File sharing with NFS
- File sharing with CIFS
- NIS Server
- DHCP Server
- VNC Server
- Squid Server
- DNS Server
- UTMs & Firewalls (Cisco, Fortinet & Huawei)
- Introduction to UTMs
- UTM Technologies
- Advantages and disadvantages
- Objects
- object-grouping and object types
- Operation modes (Firewall types) and policy configuration
- Optional features integration
- Introduction to configuration (Huawei)
- Policy deployment
- Wireless & WLAN Controllers
- 11 Overview
- Radio Frequency Overview
- RF Signal Strength, Interference and Obstruction
- RF Fresnel Zones
- 11 Channels
- Preventing Channel Overlap
- 11 and Collisions
- The 802.11 Amendments
- Wireless Access Point (WAP)
- Wireless Equivalence Protocol (WEP)
- Wi-Fi Protected Access (WPA)
- Lightweight Extensible Authentication Protocol (LEAP)
- EAP with Flexible Authentication via Secure Tunneling (EAP-FAST)
- EAP with Transport Layer Security (EAP-TLS)
- Protected EAP (PEAP)
- Structured Cabling & Passive Devices
- Understanding different types of Network Cables & Tools
- Understanding Network Components
- Setup Rack
- Cabling
- Crimping &punching of Cables
- setup patch panel and IO Box etc
- CCTV & IP Camera Surveillance
- Introduction to Surveillance Cameras
- concepts of CCTV Camera
- Difference between IP Camera & CCTV Camera
- Advantages & disadvantages
- Introduction to DVR
- Installing & configuring CCTV Camera
- concepts of IP Camera
- Introduction to NVR
- Installing & configuring IP Camera
- IP Telephony, CME
- Introduction to VOIP
- Concepts of IP Telephony
- Introduction to CISCO IP Phones
- CISCO IP Phone Startup Process
- A+ (System Administration)