Gateway to It Expert Package
Course
Online
Description
-
Type
Course
-
Level
Intermediate
-
Methodology
Online
-
Class hours
60h
-
Duration
1 Year
-
Start date
Different dates available
-
Online campus
Yes
-
Support service
Yes
-
Virtual classes
Yes
Boost skills and experience quickly and easily with this comprehensive package. This cost-effective bundle contains seven separate courses that will ensure students have a complete grounding in modern computer and networking concepts. Using vendor neutral courseware from CompTIA along with Cisco-approved networking resources, this bundle is an ideal choice for individuals who want to develop a set of technical skills that will help them be productive in almost any IT support of administration role. Other people who may benefit from the CompTIA & Cisco bundle include:
Experienced network and systems engineers who need to sharpen their skills or earn industry-recognised qualifications.
Support engineers who want to take the step up to network management.
Individuals who want to re-skill for a role in technical support or network administration.
Facilities
Location
Start date
Start date
About this course
Motherboard and BIOS configurations, and the associated components.
The use of expansion cards, display devices and peripherals to extend PC functionality.
How to build custom personal computers for specific applications and purposes.
Networking computers and laptops for sharing data and resources.
Understanding the Windows operating system environment and advanced features like BitLocker drive encryption.
Applying security policy and groups to protect data and applications stored on the PC’s hard drive.
Networking fundamentals, and configuration of PCs for use on a corporate domain or workgroup.
Monitoring and maintaining PCs to reduce the risk of a failure.
PC and server management.
Cisco networking technologies.
System security at both file, machine and network level.
A good understanding of the Linux operating system.
Modern document management technologies.
IT project management and delivery.
Selling IT solutions to technical buyers.
Students will also be ready to sit a number of industry-recognised qualifications that will broaden their career options and pave the way for promotions and pay rises.
Reviews
Subjects
- Access Control
- Risk
- Access
- Voice
- Networking
- Windows
- Networks
- Cisco
- Network
- Ethernet training
- IPV6 training
- Network security
- CCNP
- Ethernet
- Operating Systems
- Design
- Wireless
- Network Training
- IP
- Systems
Course programme
Cisco 100-105 ICND1 Interconnecting Cisco Network Devices Part 1
- Networking Fundamentals
- Basic Ethernet LAN Implementation
- Designing Ethernet LANS
- Understanding IPv4
- Working With Cisco Routers
- IPv4 Design And Troubleshooting
- IPv4 Services
- Implementing IPv6
- Configuring Ethernet LANs
- Configuring IPv4 Routing Protocols
- Wide Area Networks
- IPv4 Services
- IPv4 Routing And Troubleshooting
- IPv6 Routing
- Cloud Based Networking
- Wireless Basics
- Wireless Standards
- Wireless Signals
- Antennas
- Topologies
- Frame Types
- Planning Coverage
- Architectures
- Stand Alone And Cloud Deployments
- Controller Based Deployment
- Controller Discovery
- Roaming
- Radio Resource Management
- Wireless Security
- WLAN Configuration
- Guest Networks
- Client Connectivity
- Managing Wireless
- Interference
- Troubleshooting
- Plan And Design
- EIGRP Enhanced Interior Gateway Routing Procol
- IPv6
- OSPF
- Border Gateway Protocol BGP
- Course Review
- Plan And Design
- Switch Configuration
- IP Configuration
- STP And RTP
- Routing
- HSRP, VRRP, GLBP
- Course Review
- Introduction to Cisco Troubleshooting
- Troubleshooting Switches
- Troubleshooting VLANS and Trunking
- Troubleshooting Spanning Tree Protocol, EtherChannel
- Troubleshooting InterVLAN Routing and Layer 3 EtherChannel
- Troubleshooting Switch Security Features
- Troubleshooting FirstHop Redundancy Protocols
- Troubleshooting IPv4 and IPv4 Addressing
- IPv6 Addressing and Addressing Technologies
- Troubleshooting IPv4 and IPv6 ACLs and Prefix Lists
- Troubleshooting GRE and Basic Routing Tunnels
- Troubleshooting RIPv2 and RIPng
- Troubleshooting EIGRP
- OSPF and OSPFv3
- Troubleshooting Route Maps and Policy Based Routing
- Troubleshooting Redistribution
- Troubleshooting BGP
- Troubleshooting Management Protocols and Tools
- Troubleshooting Management Access
- Introduction
- Telephony
- Basic Call Routing
- VOIP Call Routing
- CUCME Call Routing Basics
- Preparing Network for Voice
- IP Phone Behavior
- CUCME Administration Basics
- CUCME StandUp
- CUCME StandUp Part 2
- CUCME StandUp CUCME
- End Users And End User Interface
- Endpoint Implementation
- Call Coverage
- Calling Restrictions and Routing
- CUCME Advance Call Coverage
- Implementing Unity Connection
- Network Review
- Terminology And Fundamentals
- PKI And Cryptography
- AAA
- Bring Your Own Device
- Secure Access
- VPNs
- Secure Routing And Switching
- Firewalls
- Intrusion Protection System (IPS)
- Content And Endpoint Security
- CCNA Security 210-260 Promo Video
- Wireless Basics
- Wireless Standards
- Wireless Signals
- Antennas
- Topologies
- Frame Types
- Planning Coverage
- Architectures
- Stand Alone And Cloud Deployments
- Controller Based Deployment
- Controller Discovery
- Roaming
- Radio Resource Management
- Wireless Security
- WLAN Configuration
- Guest Networks
- Client Connectivity
- Managing Wireless
- Interference
- Troubleshooting
- Methodologies Used To Design A Network
- Network Structure And Modularity
- Basic Enterprise Campus Networks
- Enterprise Edge And Remote Network Modules
- IP Addressing And Routing Protocols
- Enterprise Switching I
- Enterprise Switching II
- Subnetting
- Designing Advanced Services
- Introduction To Personal Computers And IT Certification
- Internal Hardware Components
- Storage Fundamentals
- Expanding Hardware Capabilities
- Working With Peripheral Devices
- Laptop Computers
- Computer Networking
- Operational Procedures
- Installing and Configuring Operating Systems
- Working With Mobile Devices
- Understanding System Security
- Troubleshooting Hardware and Software Issues
- Introduction To Personal Computers And IT Certification
- InternalHardwareComponents
- Storage Fundamentals
- Expanding Hardware Capabilities
- Working With Peripheral Devices
- Mobiles Devices
- Computer Networking
- Hardware And Network Troubleshooting
- Introduction To Operating Systems
- Installing Windows Operating Systems
- Configuration And Management In Windows
- Utilizing Alternative Operating Systems
- Virtualization And Cloud Computing
- Managing Mobile Devices
- Understanding System Security
- Troubleshooting And Operational Procedures
- Underlying Security Models
- Selecting Security
- Cryptography
- Storage
- Virtual Computing
- IPv6
- Remote Access Security
- Domain Name System
- Directory Services
- Firewall and VPN
- Security Configuration Management
- Network Infrastructure Security
- Secure Web Services
- Buffer Overflows
- SQL Injection
- Access Control
- Single Sign-On
- Risk Assessment
- Testing and Assessment
- Common Vulnerability
- Common Criteria
- Personally Identifiable Information
- Risk Management
- Frameworks
- Interconnecting Systems
- Security Services
- Continuous Monitoring
- Incident Handling
- Forensic & Incident Response
- Requirements Processing
- Standards Bodies
- Secure System Life Cycle
- Mobile and BYOD
- Voiceover IP
- Physical Facilities Assessment Process
- Security Requirements Traceability Matrix
- Module 1
- Module 2
- Module 3
- Module 4
- Module 5
- Module 6
- Module 7
- Instructions
- Managing Software
- Configuring Hardware
- Managing Files
- Booting Files
- X
- Admin
- Basic Networking
- Scripts
- Security
- Over-The-Air Technologies
- Network Infrastructure
- Mobile Device Manager
- Security
- Troubleshooting
- Introduction To Networking
- Networking Standards
- Network Cabling And Transmission
- Understanding TCP/IP
- Network Devices
- Wireless Network
- Wide Area Network
- Remote Access
- Network Security
- Building Scalable High Performance Networks
- Monitoring And Troubleshooting Networks
- Network Security
- Compliance And Operational Security
- Threats and Vulnerabilities
- Application, Data and Host Security
- Access Control and Identity Management
- Cyrptography
- Outro
- Networking Terminology
- Locking Down Or Network
- Wireless
- Introduction To Security Terminology
- Policies And Standards
- Physical Security
- Risk Analysis
- Disaster Recovery, Business Continuity, and BIA (Business Impact Analysis)
- Introduction To Computer Forensics
- Types Of Attacks
- System Security Threats
- Security Assessments
- Monitoring And Auditing
- Authentication
- Access Control
- Mitigating Security Threats
- Implementing System Security
- Cryptography
- Public Key Infrastructure
- Virtual Box
- Basic Commands
- Special Characters
- File Editing
- File System Structure
- Finding Files
- Shell Special Characters
- Regular Expressions
- Process Management
- Job Scheduling
- Customizing Your Account
- Unix Printing
- Networking
- X Windows
- Back Up And Compression
- Text Utility
- Shell Scripting
- System Administration Basics
Gateway to It Expert Package