Course Details

CYBER

SECURITY

Course Overview

Global spending on Security and services is expected to increase by 12 to 15 percent every year until 2021. Security at a network, system, as well as the personal front, is becoming a huge vulnerability at the individual as well as the business front. Companies and individuals are learning it the hard way to keep their systems and network security. Cyber Security is the protection of data, systems, and programs from digital attacks on cyberspace. Cyber Attacks are dangerous for any organization, consumer or business. Therefore, Cybersecurity ensuring the safety and confidentiality of data or information.

Course lessons

  • WHAT IS COMPUTER
  • PC COMPONENTS
  • WHAT IS HARDWARE
  • WHAT IS SOFTWARE
  • WHAT IS OPRETING SYSTEM
  • OPRETING SYSTEM INSTALLATION
  • 32-BIT VS 64-BIT
  • DISK MANAGEMENT
  • USER MANAGEMENT
  • DUAL BOOT
  • GRUB-UP
  • PASSWORD BYPASS
  • CMD INTERNAL-EXTERNAL COMMAND
  • FILE SYSTEM
  • BOOTING SEQUENCE OF COMPUTER
  • BOOTMGR ERROR
  • BIOS
  • TYPES OF MEMORY
  • STORAGE DEVICE
  • PROCESSER
  • MOTHERBOARD
  • WHAT IS SMPS
  • MOTHERBOARD CONNECTOR
  • PC BULDING
  • TROUBLESHOOTING
  • WHAT IS NETWORK
  • TYPES OF NETWORK
  • NETWORK TOPOLOGY
  • NETWORK ADDRESS
  • IP ADDRESS
  • IPV4 CLASS
  • SUBNETING
  • CIDR
  • FLSM / VLSM
  • DATA SHARING
  • PRINTER SHARING
  • MAP NETWORK DRIVE
  • REMOTE DESKTOP
  • ANYDESK
  • TEAM VIEWER
  • LAN SCHOOL
  • IP MESSENGER
  • NETWORK DEVICE
  • NETWORK CABLE
  • NETWORK PROTOCOL
  • OSI REFERENCE MODEL
  • CCTV
  • OUTLOOK CONFIGRATION
  • TELNET
  • PROXY SERVER
  • WEB SERVER (HTTP)
  • FTP SERVER
  • DHCP SERVER
  • DNS SERVER
  • ADDS
  • WIRELESS ROUTER
  • TROUBLESHOOTING
1. Basic Of Networking
  • Internetworking Basics
  • Internetworking Models
  • The OSI Reference Model
  • The OSI Reference Model

2. Review of Ethernet Networking and Data Encapsulation
  • Ethernet Networks in Review
  • Ethernet Cabling
  • Data Encapsulation
  • The Cisco Three Layer Hierarchical Model

3. Introduction to TCP/IP
  • Introducing  TCP/IP
  • TCP/IP and the DoD Model
  • IP Addressing
  • IPv4 Address Types

4. Easy Subnetting
  • Subnetting Basics
  • Subnetting Class C Addresses
  • Subnetting Class B Addresses
  • Subnetting Class A Addresses

5. Variable length Subnet Masks ( VLSMs ), Summarization and Troubleshooting TCP/IP
  • Variable Length Subnet Masks ( VLSMs )
  • Summarization
  • Troubleshooting TCP/IP

6. Cisco’s Internetworking Operating System ( IOS )
  • The IOS User Interface
  • Command Line Interfaces ( CLI )
  • Router and Switch Administrative Configurations
  • Router Interfaces
  • Viewing,Saving and Erasing Configurations

7. Managing a Cisco Internetwork
  • The Internal Components of a Cisco Router
  • The Router Boot Sequence
  • Managing Configuration Register
  • Backing Up and Restoring the Cisco IOS
  • Backing Up and Restoring the Cisco Configuration
  • Using Cisco Discovery Protocol ( CDP )
  • Using Telnet
  • Resolving Hostnames
  • Checking Network Connectivity and Troubleshooting

8. IP Routing
  • Routing Basics
  • The IP Routing Process
  • Configuring IP Routing in Our Network
  • Static Routing and Default Routing
  • Dynamic Routing
  • Distance Vector Routing Protocols
  • Routing Information Protocol ( RIP )
  • RIP Version 2 ( RIPv2 )
  • Verifying Configurations
  • Practice

9. Enhanced IGRP ( EIGRP ) and Open Shortest Path First ( OSPF )
  • EIGRP Features and Operation
  • Using EIGRP to support Large Networks
  • Configuring EIGRP
  • Load Balancing With EIGRP
  • Verifying EIGRP
  • Open Shortest Path First ( OSPF ) Basics
  • Configuring OSPF
  • Verifying OSPF Configuration
  • OSPF DR and BDR Elections
  • OSPF and Loopback Interfaces
  • Troubleshooting OSPF
  • Configuring EIGRP and OSPF Summary Routes

10. Layer-2 Switching and Spanning Tree Protocol ( STP )
  • Switching Services
  • Limitations of Layer-2 Switching
  • Spanning Tree Protocol ( STP )
  • Configuring Catalyst Switches

11. Virtual LANs ( VLANs )
  • VLAN Basics
  • VLAN Memberships
  • Static VLANs
  • Dynamic VLANs
  • Identifying VLANs
  • VLAN Trunking Protocol ( VTP )
  • VTP Modes of Operation and VTP Pruning
  • Routing Between VLANs
  • Configuring VLANs
  • Configuring VTP

12. Security
  • Perimeter , Firewall and Internal Routers
  • Introduction to Access Lists
  • Standard Access Lists
  • Extended Access Lists
  • Named ACLs
  • Turning Off and Configuring Network Services
  • Monitoring Access Lists

13. Network Address Translation ( NAT )
  • Types of Network Address Translation
  • NAT Names
  • NAT Working
  • Static NAT , Dynamic NAT and PAT ( Overloading )
  • Testing and Troubleshooting NAT

14. Wireless
  • Introduction to Wireless Technology
  • Basic Wireless Devices
  • Wireless Regulations
  • Wireless Topologies
  • Ad Hoc ,  BSS and Infrastructure Basic Service Set
  • Wireless Security

15. Internet Protocol Version 6 ( IPv6 )
  • The Benefits and Uses of IPv6
  • IPv6 Addressing and Expressions
  • IPv6 Works in an Internetwork
  • IPv6 Routing Protocols
  • Migrating to IPv6

16. Wide Area Netwokrs
  • Introduction to Wide Area Networks
  • Cable and DSL
  • Cabling the Serial Wide Area Network
  • High Level Data Link Control ( HDLC ) Protocol
  • Point to Point Protocol ( PPP )
  • Frame Relay
  • Virtual Private Networks ( VPN )
  • Implementing Active Directory Domain Services
  • Configuring Domain Name Service for Active Directory Domain Services
  • Configuring Active Directory Objects and Trusts
  • Configuring Active Directory Domain Services Sites and Replication
  • Creating and Configuring Group Policy
  • Configuring User Environments Using Group Policy
  • Implementing Security Using Group Policy
  • Implementing an Active Directory Domain Services Monitoring Plan
  • Implementing an Active Directory Domain Services Maintenance Plan
  • Troubleshooting AD DS, DNS and Replication Issues
  • Troubleshooting Group Policy Issues
  • Implementing an Active Directory Domain Services Infrastructure
  • Planing And Configuration IPv4
  • configuring and trouble shooting DHCP
  • Configuring and Troubleshooting DNS
  • Configuring and troubleshooting IPv6 TCP/IP
  • Configuring and Troubleshooting Routing and Remote Access
  • Installing ,Configuring and Troubleshooting the Network Policy Server Role Service
  • Implementing Network Access Protection
  • Increasing Security for Windows Servers
  • Increasing Security for Network Communication
  • Configuring and Troubleshooting Network File And print Services
  • Optimizing Data Access fo Branch Offices
  • Controlling and Monitoring Network Storage
  • Recovering Network Data and Servers
  • Monitoring Windows Servers Network Infrastucture Servers
1. Introduction to AWS
  • What Is Cloud Computing?
  • AWS Fundamentals
  • AWS Cloud Computing Platform
  • Summary
  • Exam Essentials
  • Review Questions

2. Amazon Simple Storage Service (Amazon S3) and Amazon Glacier Storage
  • Introduction
  • Object Storage versus Traditional Block and File Storage
  • Amazon Simple Storage Service (Amazon S3) Basics
  • Buckets
  • Amazon S3 Advanced Features
  • Amazon Glacier
  • Summary
  • Exam Essentials
  • Exercises
  • Review Questions

3. Amazon Elastic Compute Cloud (Amazon EC2) and Amazon Elastic Block Store (Amazon EBS)
  • Introduction
  • Amazon Elastic Compute Cloud (Amazon EC2)
  • Amazon Elastic Block Store (Amazon EBS)
  • Summary
  • Exam Essentials
  • Exercises
  • Review Questions

4. Amazon Virtual Private Cloud (Amazon VPC)
  • Introduction
  • Amazon Virtual Private Cloud (Amazon VPC)
  • Subnets
  • Route Tables
  • Internet Gateways
  • Dynamic Host Configuration Protocol (DHCP) Option Sets
  • Elastic IP Addresses (EIPs)
  • Elastic Network Interfaces (ENIs)
  • Endpoints
  • Peering
  • Security Groups
  • Network Access Control Lists (ACLs)
  • Network Address Translation (NAT) Instances and NAT Gateways
  • Virtual Private Gateways (VPGs), Customer Gateways (CGWs), and Virtual Private Networks (VPNs)
  • Summary
  • Exam Essentials
  • Exercises
  • Review Questions

5. Elastic Load Balancing, Amazon CloudWatch, and Auto Scaling
  • Introduction
  • Elastic Load Balancing
  • Amazon CloudWatch
  • Auto Scaling
  • Summary
  • Exam Essentials
  • Exercises
  • Review Questions

6. AWS Identity and Access Management (IAM)
  • Principals
  • Authentication
  • Authorization
  • Other Key Features
  • Summary
  • Exam Essentials
  • Exercises
  • Review Questions

7. Databases and AWS
  • Database Primer
  • Amazon Relational Database Service (Amazon RDS)
  • Amazon Redshift
  • Amazon DynamoDB
  • Summary
  • Exam Essentials
  • Exercises
  • Review Questions

8. SQS, SWF, and SNS
  • Amazon Simple Queue Service (Amazon SQS)
  • Amazon Simple Workflow Service (Amazon SWF)
  • Amazon Simple Notification Service (Amazon SNS)
  • Summary
  • Exam Essentials
  • Exercises
  • Review Questions

9. Domain Name System (DNS) and Amazon Route 53
  • Domain Name System (DNS)
  • Amazon Route 53 Overview
  • Summary
  • Exam Essentials
  • Exercises
  • Review Questions

10. Amazon ElastiCache
  • Introduction
  • In-Memory Caching
  • Amazon ElastiCache
  • Summary
  • Exam Essentials
  • Exercises
  • Review Questions

11. Additional Key Services
  • Introduction
  • Storage and Content Delivery
  • Security
  • Analytics
  • DevOps
  • Summary
  • Exam Essentials
  • Review Questions

12. Security on AWS
  • Introduction
  • Shared Responsibility Model
  • AWS Compliance Program
  • AWS Global Infrastructure Security
  • AWS Account Security Features
  • AWS Cloud Service-Specific Security
  • Summary
  • Exam Essentials
  • Exercises
  • Review Questions

13. AWS Risk and Compliance
  • Introduction
  • Overview of Compliance in AWS
  • Evaluating and Integrating AWS Controls
  • AWS Risk and Compliance Program
  • AWS Reports, Certifications, and Third-Party Attestations
  • Summary
  • Exam Essentials
  • Review Questions

14. Architecture Best Practices
  • Introduction
  • Design for Failure and Nothing Fails
  • Implement Elasticity
  • Leverage Different Storage Options
  • Build Security in Every Layer
  • Think Parallel
  • Loose Coupling Sets You Free
  • Don’t Fear Constraints
  • Summary
  • Exam Essentials
  • Exercises
  • Review Questions
  • Introduction
  • Enumeration
  • Hacking Mobile Platforms
  • Sniffing
  • Scanning Networks
  • Social Engineering
  • Hacking Webservers
  • Footprinting and Reconnaissance
  • Denial Of Services
  • Session Hijacking
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Malware Threats
  • System Hacking
  • Evading IDS, Firewalls, and Honeypots

Our Newsletter

© 2022 H&B Computer Education