CCIE

Cisco Certified Internetwork Expert (CCIE)

Course contents:

Exam 350-001 | Certificates CCIE – R/S

CCIE Routing and Switching Written Boot Camp Course Syllabus

Day 1:

1. Course Introduction

2. CCIE R&S Program Overview

2.1. CCIE Written Test Overview 2.2. CCIE Written Blueprint

3. General Network Theory 3.1. General Routing Concepts 3.1.1. Link State and Distance Vector Protocols 3.1.2. Split Horizon 3.1.3. Summarization 3.1.4. Classful and a Classless routing protocol 3.2. Routing Information Base (RIB) and Routing Protocols Interaction 3.2.1. Administrative Distance 3.2.2. Routing Table 3.2.3. RIB and Forwarding Information Base interaction 3.3. Redistribution 3.3.1. Redistribution between routing 3.3.2. Troubleshooting routing loop

4. Bridging and Switching 4.1. Spanning T 4.1.1. 802.1d 4.1.2. 802.1w 4.1.3. 802.1s 4.1.4. Loopguard 4.1.5. Rootguard 4.1.6. Bridge Protocol Data Unit (BRDU) Guard 4.1.7. Storm Control 4.1.8. Rapid Spanning Tree Protocol (RSTP) 4.1.9. Unicast flooding 4.1.10. STP port roles, failure propagation and loopguard operation 4.2. LAN Switching 4.2.1. VLAN Trunking Protocol (VTP) administrative functions 4.2.2. Trunks 4.3. Ethernet 4.4. Fast Ethernet 4.5. Gigabit Ethernet 4.6. Issues

Day 2:

5. IP 5.1. Addressing 5.1.1. Subnetting 5.1.2. Hot Standby Routing Protocol (HSRP) 5.1.3. Gateway Load Balancing Protocol (GLBP) 5.1.4. Virtual Router Redundancy Protocol (VRRP) 5.1.5. Network Address Translation (NAT) 5.2. Services 5.2.1. Network Time Protocol (NTP) 5.2.2. Dynamic Host Control Protocol (DHCP) 5.2.3. Web Cache Communication Protocol (WCCP) 5.3. Network Management 5.3.1. Logging 5.3.2. Syslog 5.4. IPv6 5.4.1. IPv6 Addressing and types 5.4.2. IPv6 Neighbor Discovery 5.4.3. Basic IPv6 functionality protocols 5.4.4. IPv6 Multicast and related Multicast protocols 5.4.5. Tunneling Techniques 5.4.6. OSPFv3 5.4.7. EIGRPv6

Day 3:

6. Routing Protocols 6.1. OSPF 6.1.1. Standard OSPF areas 6.1.2. Stub area 6.1.3. Totally stub area 6.1.4. Not-so stubby-area (NSSA) 6.1.5. Totally NSSA 6.1.6. Link State Advertisement (LSA) types 6.1.7. Adjacency on a point-to-point and on a multi-access (broadcast) 6.1.8. Graceful Restart 6.2. BGP 6.2.1. BGP Overview 6.2.2. iBGP 6.2.3. Route Reflectors 6.2.4. Confederations 6.2.5. eBGP 6.2.6. Authentication 6.2.7. BGP Attributes 6.2.8. Communities 6.2.9. BGP Path Selection 6.2.10. AS Path Filtering 6.3. EIGRP 6.3.1. EIGRP Metrics and Best path Selection 6.3.2. Loop free paths 6.3.3. EIGRP operations when alternate loop free paths are available and when it is not available 6.3.4. EIGRP queries 6.3.5. Manual summarization 6.3.6. Auto-summarization 6.3.7. EIGRP Stubs

Day 4:

7. WAN 7.1. Frame Relay 7.1.1. Local Management Interface (LMI) 7.1.2. Frame Relay Traffic Shaping 7.1.3. HUB and Spoke routers 7.2. MPLS 7.2.1. Label Switching Router (LSR) 7.2.2. Label Switched Path (LSP) 7.2.3. Label Format 7.2.4. Label imposition/disposition 7.2.5. Label Distribution 7.2.6. PHP 7.2.7. DMVPN

8. QOS 8.1. Network-Base Application Recognition (NBAR) 8.2. Class-based weighted fair queuing (CBWFQ) 8.3. Policing 8.4. Shaping 8.5. Marking 8.6. Random Early Detection (RED) 8.6.1.

9. Security 9.1. Extended IP access lists 9.2. Unicast Reverse Path Forwarding (uRPF) 9.3. IP Source Guard 9.4. Context Based Access Control (CBAC)

Day 5: Review and take CCIE Routing and Switching Exam 350-001.

 

Certified Ethical Hacking (CEH)

Course contents: CEH V8

  • 1. Intruduction to Ethical Hacking
  • 2. Footprinting and Reconnaissance
  • 3. Scanning Networks
  • 4. Enumeration
  • 5. System Hacking
  • 6. Trojans and Backdoors
  • 7. Viruses and Worms
  • 8. Sniffers
  • 9. Social Engineering
  • 10. Denial of Service
  • 11. Session Hijacking
  • 12. Hacking Webservers
  • 13. Hacking Web Applications
  • 14. SQL Injection
  • 15. Hacking Wireless Networks
  • 16. Evading IDS, Firewalls, and Honeypots
  • 17. Buffer Overflow
  • 18. Cryptography
  • 19. Penetration Testing
  • 20. Mobile Ethical Hackign and Forensics training