A Digital World Revolves Around IT

GET INTO IT JOIN ITPT

LEARN

CERTIFY

WORK

 Course schedule

Use this course schedule page to find course starting dates, click on each course to see more details.

Dates subject to change. SAAS funding approval/Fee deposit required one week prior to each start date.

Mar
11
Mon
Boot Camp: CCNA Security @Edinburgh
Mar 11 @ 9:00 am – Mar 15 @ 5:00 pm

Course Introduction:
CCNA Security is a job role based certification for Security Specialists, Security Administrators, and Network Security Support Engineers. This certification validates skills including installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices and develops competency in the technologies that Cisco uses in its security structure.
Students completing the recommended Cisco training will gain an introduction to security technologies as well as how to develop security policies and mitigate risks. IT organizations that employ CCNA Security-holders will have IT staff that can develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats.

Course objectives
• Understanding, implementing, and verifying AAA (authentication, authorization, and accounting), including the details of TACACS+ and RADIUS
• Understanding and describing the various methods for filtering implemented by firewalls, including stateful filtering.
• Compare and contrast the strengths and weaknesses of the various firewall technologies.
• Image Understanding the methods that a firewall may use to implement
Network Address Translation (NAT) and Port Address Translation (PAT).
• Comparing and contrasting intrusion prevention systems (IPS) versus intrusion detection systems (IDS), including the pros and cons of each and the methods used by these systems for identifying malicious traffic
• Finally, understanding virtual private networks (VPNs), including the concepts of symmetrical, asymmetrical, encryption, hashing, Internet Key Exchange (IKE), public key infrastructure (PKI), authentication, Diffie-Hellman, certificate authorities, and so on

Hands on Experience
Hands on experience will be provided on latest live Routers, Switches & Cisco Security Devices.

Modes of Learning:
Our taught and revision courses are flexible and you may choose from the following modes of attendance to suite your personal circumstances.

1. Tutor Led Learning
2. Blended Distance Learning
3. Distance Learning
What ITPT will be providing?
==> MOODLE Access: We provide MOODLE access to students where they can access Tutor PowerPoint slides, lecture Recordings, Course Materials and Labs.
==> Lab based experience
==> Work Shops
==> Hands out during the course delivery
==> Volunteer work experience (provided if offer by any of our IT Support Associates)
==> In house course completion certificate will be awarded on successful completion
==> SCQF Credit Points are embedded into this qualification
==> Work experience letter will be awarded if attended.
==> Disabled candidates accommodations
==> Job hunting help is aligned with our courses.
==> Extra days to use ITPT labs besides their normal course days
==> Borrowing books
==> CV building help & Job hunting help is aligned with our courses.
Classes Duration:
This course will be delivered 5 days, Monday – Friday, 09:00 – 17:00

Student Support:
ITPT Moodle Access:

We provide MOODLE access to students where they can access the following;
1. Lecture PowerPoint
2. Course Materials
3. Labs
4. Group Chat
5. Expert Advice

Course Tuition Fees:
£1299.00 (No Hidden Cost) including VAT

There is further discounts if there a group of students or delegates from the company attending this course.

For more information please do contact us on 0131 552 5558 / info@itpt.co.uk

CompTIA Network + 5 Days Boot Camp @ Edinburgh @ IT Professional Training
Mar 11 @ 9:00 am – Mar 15 @ 5:00 pm

 Troubleshoot WAN Issues

  • Common WAN Issues

 Troubleshoot Security Issues

  • Security Configuration Issues
  • Other Security Issues

 Troubleshoot Network Issues

  • Physical Layer Issues
  • Data Link Layer Issues
  • Network Layer Issues

 Troubleshoot Copper and Fiber Cabling Issues

  • Common Copper Cable Issues
  • Common Fiber Cable Issues

 Troubleshoot Wireless Issues

  • Wireless Transmission Issues
  • Wireless Configuration Issues

 Troubleshooting Tools

  • Command-Line Tools
  • The ipconfig Command
  • The tracert Command
  • The ping Command
  • Windows pathping Command
  • The arp Command
  • The netstat Command
  • The nbtstat Command
  • The nslookup Command
  • The Cisco show mac-address-table Command
  • Hardware and Software Tools

 Troubleshooting Methodology

  • Identify the Problem
  • Establish a Theory
  • Test the Theory
  • Establish a Plan of Action
  • Implement the Solution or Escalate
  • Verify the Solution and Implement Preventative Measures
  • Document Findings, Actions, and Outcomes

 Implement Ports and Protocols

  • Transport Protocols: TCP and UDP
  • TCP and UDP Headers
  • Error Recovery
  • Flow Control
  • Connection Establishment and Termination
  • UDP
  • Port Numbers

 Best Practices and Change Management

  • Best Practices
  • Change Management

 Implement Policies, Procedures, and Safety Practices

  • Policies and Procedures
  • Safety Policies

 Wired and Wireless Standards

  • Ethernet Standards
  • Wired Standards
  • TIA/EIA 568A and 568B Standards
  • Wireless Standards

 Network Theory

  • The TCP/IP Application Layer
  • The TCP/IP Transport Layer
  • The TCP/IP Internet Layer
  • The TCP/IP Network Access Layer
  • Collisions
  • Transmission Techniques
  • End-to-End Communication
  • Numbering Systems

 Network Models

  • The OSI and TCP/IP Models
  • OSI Layers
  • TCP/IP Layers and Protocols
  • Data Flow Through the Layers

 Physical Security, Firewalls, Access Control, and Forensics

  • Physical Security
  • Firewalls
  • Firewall Placement and Configuration
  • Access Control Models
  • Forensic Concepts

 Hardening Devices

  • Anti-malware Software
  • Device Hardening
  • Disable Unused Network Services
  • Use Secure Protocols
  • Configure Switch Port Security
  • User Authentication
  • Data Integrity and Hashing
  • Wireless Security

 Risks, Threats, and Vulnerabilities

  • Denial of Service
  • Distributed DoS
  • Reflected and Amplified Attacks
  • Other Attack and Threat Terminology
  • Wireless Attacks
  • Vulnerabilities
  • Risk Management

 WLAN Implementation

  • WLAN Features
  • Frequencies
  • Transmission Methods
  • Channels
  • Antennas
  • WLAN Topologies
  • WLAN Devices
  • Wireless Routers
  • Wireless Access Points
  • Wireless LAN Controllers
  • Wireless Bridge
  • Wireless Installation
  • Channels and Frequency Bands
  • Wireless Site Surveys
  • Wireless Router Configuration

 STP, VLANs, Trunking, and VTP

  • STP and RSTP Concepts and Operation
  • STP Algorithm
  • STP Convergence
  • Port Costs
  • RSTP Operation
  • RSTP Port Roles
  • VLAN Concepts
  • Reasons for and Benefit of Using VLANs
  • Types of VLANs
  • Trunking VLANs
  • VTP Concepts
  • VTP Modes
  • VTP Operation
  • VTP Pruning

 Switch Configuration

  • Evolution to Switching
  • From Bridges to Switches
  • Switch Types
  • Switching Logic
  • Basic Switch Configuration
  • AAA Configuration
  • Link Aggregation Configuration
  • LACP Modes
  • Configuring EtherChannel
  • Port Mirroring Configuration

 Network: Network Segmentation, Patches, and Updates

  • Network Segmentation
  • Patches and Updates

 Network Monitoring and Metrics

  • Types of Metrics
  • SNMP
  • SNMP Message Types
  • SNMP Versions
  • The Management Information Base
  • Syslog
  • Syslog Operation
  • Severity Levels
  • Syslog Message Format
  • Port Scanners
  • Packet Sniffers
  • Packet Flow Monitors (NetFlow)

 Network Design and Documentation

  • Network Design
  • Sample Design Approach
  • Design Considerations for Layers 1, 2, and 3
  • Wireless Design Considerations
  • Documentation
  • IP Addressing Scheme
  • Network Diagrams
  • Baselines
  • Asset Management
  • Policies and Procedures

 Unified Communications, Virtualization, and Cloud

  • Unified Communications
  • Quality of Service
  • Virtualization
  • Server Virtualization
  • Networking Device Virtualization
  • Software-Defined Networking
  • Cloud Concepts
  • Storage Area Networks
  • Directly Attached Storage
  • Network-Attached Storage
  • Fibre Channel
  • Fibre Channel over Ethernet
  • iSCSI

 Routing Concepts

  • Static and Default Routing Overview
  • Dynamic Routing Protocols
  • Route Redistribution
  • IGP and EGP Routing Protocols
  • Distance Vector Routing Protocols
  • Link-State Routing Protocols
  • Classful Routing Protocols
  • Classless Routing Protocols
  • Dynamic Routing Metrics
  • Administrative Distance
  • Routing Loop Prevention
  • Link-State Routing Protocol Features
  • Building the LSDB
  • Calculating the Dijkstra Algorithm
  • Convergence with Link-State Protocols
  • Route Aggregation
  • High Availability

 Implement IPv6 Addressing

  • IPv6 Addressing Overview
  • Representing the IPv6 Address
  • Conventions for Writing IPv6 Addresses
  • Conventions for Writing IPv6 Prefixes
  • IPv6 Address Types
  • Global Unicast Addresses
  • Link-Local Addresses
  • Configuring IPv6 Addressing
  • EUI-64 Concept
  • Stateless Address Autoconfiguration
  • Migration to IPv6
  • Dual-Stack
  • Tunnelling

 Implement IPv4 Addressing

  • Local Addressing
  • MAC Addresses
  • Collision and Broadcast Domains
  • IPv4 Addressing
  • IPv4 Address Structure
  • Private and Public IP Addressing
  • IPv4 Address Types
  • Subnetting in Four Steps
  • Determine How Many Bits to Borrow
  • Determine the New Subnet Mask
  • Determine the Subnet Multiplier
  • List the Subnets, Host Ranges, and Broadcast Addresses
  • Subnetting Example 1
  • Subnetting Example 2
  • Subnetting Example 3
  • VLSM and Classless Addressing

 Network Topologies and Infrastructure

  • Network Topologies
  • Bus
  • Ring
  • Star, Extended Star, and Hub-and-Spoke
  • Full and Partial Mesh
  • Client-Server and Peer-to-Peer
  • Network Infrastructures
  • PANs
  • LANs and WLANs
  • CANs
  • MANs
  • WANs
  • Other Network Infrastructures
  • Industrial Networks
  • Mediantes

 Cable Installation

  • Copper
  • Copper Cables
  • Copper Connectors
  • Fibre
  • Fibre-Optic Cables
  • Fibre Connectors
  • Media Converters
  • Tools

 WAN Technologies

  • Packet Switching and Circuit Switching
  • WAN Link Options
  • Home and Small Office
  • Wireless
  • SONET
  • Dedicated Leased Lines
  • Enterprise WANs

 Network Services and Applications

  • VPN
  • Types
  • IPsec and IKE
  • Other VPN Technologies
  • Remote Access Services
  • AAA Services
  • Microsoft’s RAS
  • Other Remote Access Services
  • Unified Communications
  • DHCP
  • DNS
  • NAT

 Network Devices

  • Common Network Devices
  • Specialty Devices
  • Firewalls
  • IDS and IPS
  • Proxy Server
  • Load Balancer
  • Packet Shaper
  • VPN Concentrator

 

COPYRIGHT © 15-18 IT PROFESSIONAL TRAINING LTD REGISTERED IN SCOTLAND UNDER REGISTRATION NUMBER SC423952. VAT REGISTRATION NO 137653694.

X