GATEWAY TO IT EXPERT PACKAGE

Course

Online

Price on request

Description

  • Type

    Course

  • Methodology

    Online

The CompTIA & Cisco bundle also includes access to the Practice-Labs, a dedicated PC and networking hardware resource that allows students to test their knowledge and complete all of the practical examples outlined in the course materials.

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • Network Training
  • Ethernet
  • Ethernet training
  • Network
  • Cisco
  • Networking
  • Access

Course programme

  • Networking Fundamentals
  • Basic Ethernet LAN Implementation
  • Designing Ethernet LANS
  • Understanding IPv4
  • Working With Cisco Routers
  • IPv4 Design And Troubleshooting
  • IPv4 Services
  • Implementing IPv6
  • Configuring Ethernet LANs
  • Configuring IPv4 Routing Protocols
  • Wide Area Networks
  • IPv4 Services
  • IPv4 Routing And Troubleshooting
  • IPv6 Routing
  • Cloud Based Networking
  • Wireless Basics
  • Wireless Standards
  • Wireless Signals
  • Antennas
  • Topologies
  • Frame Types
  • Planning Coverage
  • Architectures
  • Stand Alone And Cloud Deployments
  • Controller Based Deployment
  • Controller Discovery
  • Roaming
  • Radio Resource Management
  • Wireless Security
  • WLAN Configuration
  • Guest Networks
  • Client Connectivity
  • Managing Wireless
  • Interference
  • Troubleshooting
  • Plan And Design
  • EIGRP Enhanced Interior Gateway Routing Procol
  • IPv6
  • OSPF
  • Border Gateway Protocol BGP
  • Course Review
  • Plan And Design
  • Switch Configuration
  • IP Configuration
  • STP And RTP
  • Routing
  • HSRP, VRRP, GLBP
  • Course Review
  • Introduction to Cisco Troubleshooting
  • Troubleshooting Switches
  • Troubleshooting VLANS and Trunking
  • Troubleshooting Spanning Tree Protocol, EtherChannel
  • Troubleshooting Inter­VLAN Routing and Layer 3 EtherChannel
  • Troubleshooting Switch Security Features
  • Troubleshooting First­Hop Redundancy Protocols
  • Troubleshooting IPv4 and IPv4 Addressing
  • IPv6 Addressing and Addressing Technologies
  • Troubleshooting IPv4 and IPv6 ACLs and Prefix Lists
  • Troubleshooting GRE and Basic Routing Tunnels
  • Troubleshooting RIPv2 and RIPng
  • Troubleshooting EIGRP
  • OSPF and OSPFv3
  • Troubleshooting Route Maps and Policy Based Routing
  • Troubleshooting Redistribution
  • Troubleshooting BGP
  • Troubleshooting Management Protocols and Tools
  • Troubleshooting Management Access
  • Introduction
  • Telephony
  • Basic Call Routing
  • VOIP Call Routing
  • CUCME Call Routing Basics
  • Preparing Network for Voice
  • IP Phone Behavior
  • CUCME Administration Basics
  • CUCME StandUp
  • CUCME StandUp Part 2
  • CUCME StandUp CUCME
  • End Users And End User Interface
  • Endpoint Implementation
  • Call Coverage
  • Calling Restrictions and Routing
  • CUCME Advance Call Coverage
  • Implementing Unity Connection
  • Network Review
  • Terminology And Fundamentals
  • PKI And Cryptography
  • AAA
  • Bring Your Own Device
  • Secure Access
  • VPNs
  • Secure Routing And Switching
  • Firewalls
  • Intrusion Protection System (IPS)
  • Content And Endpoint Security
  • CCNA Security 210-260 Promo Video
  • Wireless Basics
  • Wireless Standards
  • Wireless Signals
  • Antennas
  • Topologies
  • Frame Types
  • Planning Coverage
  • Architectures
  • Stand Alone And Cloud Deployments
  • Controller Based Deployment
  • Controller Discovery
  • Roaming
  • Radio Resource Management
  • Wireless Security
  • WLAN Configuration
  • Guest Networks
  • Client Connectivity
  • Managing Wireless
  • Interference
  • Troubleshooting
  • Methodologies Used To Design A Network
  • Network Structure And Modularity
  • Basic Enterprise Campus Networks
  • Enterprise Edge And Remote Network Modules
  • IP Addressing And Routing Protocols
  • Enterprise Switching I
  • Enterprise Switching II
  • Subnetting
  • Designing Advanced Services
  • Introduction To Personal Computers And IT Certification
  • Internal Hardware Components
  • Storage Fundamentals
  • Expanding Hardware Capabilities
  • Working With Peripheral Devices
  • Laptop Computers
  • Computer Networking
  • Operational Procedures
  • Installing and Configuring Operating Systems
  • Working With Mobile Devices
  • Understanding System Security
  • Troubleshooting Hardware and Software Issues
  • Introduction To Personal Computers And IT Certification
  • InternalHardwareComponents
  • Storage Fundamentals
  • Expanding Hardware Capabilities
  • Working With Peripheral Devices
  • Mobiles Devices
  • Computer Networking
  • Hardware And Network Troubleshooting
  • Introduction To Operating Systems
  • Installing Windows Operating Systems
  • Configuration And Management In Windows
  • Utilizing Alternative Operating Systems
  • Virtualization And Cloud Computing
  • Managing Mobile Devices
  • Understanding System Security
  • Troubleshooting And Operational Procedures
  • Underlying Security Models
  • Selecting Security
  • Cryptography
  • Storage
  • Virtual Computing
  • IPv6
  • Remote Access Security
  • Domain Name System
  • Directory Services
  • Firewall and VPN
  • Security Configuration Management
  • Network Infrastructure Security
  • Secure Web Services
  • Buffer Overflows
  • SQL Injection
  • Access Control
  • Single Sign-On
  • Risk Assessment
  • Testing and Assessment
  • Common Vulnerability
  • Common Criteria
  • Personally Identifiable Information
  • Risk Management
  • Frameworks
  • Interconnecting Systems
  • Security Services
  • Continuous Monitoring
  • Incident Handling
  • Forensic & Incident Response
  • Requirements Processing
  • Standards Bodies
  • Secure System Life Cycle
  • Email
  • Mobile and BYOD
  • Voiceover IP
  • Physical Facilities Assessment Process
  • Security Requirements Traceability Matrix
  • Module 1
  • Module 2
  • Module 3
  • Module 4
  • Module 5
  • Module 6
  • Module 7
  • Instructions
  • Managing Software
  • Configuring Hardware
  • Managing Files
  • Booting Files
  • X
  • Admin
  • Basic Networking
  • Scripts
  • Security
  • Over-The-Air Technologies
  • Network Infrastructure
  • Mobile Device Manager
  • Security
  • Troubleshooting
  • Introduction To Networking
  • Networking Standards
  • Network Cabling And Transmission
  • Understanding TCP/IP
  • Network Devices
  • Wireless Network
  • Wide Area Network
  • Remote Access
  • Network Security
  • Building Scalable High Performance Networks
  • Monitoring And Troubleshooting Networks
  • Network Security
  • Compliance And Operational Security
  • Threats and Vulnerabilities
  • Application, Data and Host Security
  • Access Control and Identity Management
  • Cyrptography
  • Outro
  • Networking Terminology
  • Locking Down Or Network
  • Wireless
  • Introduction To Security Terminology
  • Policies And Standards
  • Physical Security
  • Risk Analysis
  • Disaster Recovery, Business Continuity, and BIA (Business Impact Analysis)
  • Introduction To Computer Forensics
  • Types Of Attacks
  • System Security Threats
  • Security Assessments
  • Monitoring And Auditing
  • Authentication
  • Access Control
  • Mitigating Security Threats
  • Implementing System Security
  • Cryptography
  • Public Key Infrastructure
  • Virtual Box
  • Basic Commands
  • Special Characters
  • File Editing
  • File System Structure
  • Finding Files
  • Shell Special Characters
  • Regular Expressions
  • Process Management
  • Job Scheduling
  • Customizing Your Account
  • Unix Printing
  • Networking
  • X Windows
  • Back Up And Compression
  • Text Utility
  • Shell Scripting
  • System Administration Basics
  • GATEWAY TO IT EXPERT PACKAGE

    Price on request