دوره های مربوط به سیسکو

Cisco-6500
عنوان دوره مدت (ساعت) پيش نياز اساتید
DCNI-6500 32 CCNA & CCNP یوحنایی
معرفی دورهاهداف دورهمخاطبین دورهسر فصل های دوره
در این دوره در 8 ساعت ابتدا بر روی خود تجهیزات سری 6500 بحث و بررسی می گردد و سعی می شود تا حد امکان ماژول های که بر روی این تجهیزات نصب می گردند ، تحوه نوشتن و تهیه LOM و نیازهای دانشجویان در زمینه سخت افزار این تجهیزات بیان شود .
در 24 ساعت دوم بر روی قابلیت های این تجهیزات از جمله نحوه تنظیم نمودن این تجهیزات به صورت کلی ، نحوه تنظیم نمودن ماژول های سرویس ، نحوه BOOT نمودن سیستم عامل های مختلف ، نحوه Password Recovery ، راه اندازی VSS و ... (در صورت وجود تجهیزات کافی ) بحث و بررسی می گردد ، همچنین در مورد انواع IOS های موجود برای این تجهیزات و تفاوت های آنها با یکدیگر بحث و بررسی می گردد.
آشنایی دانشجویان با این تجهیزات و نحوه استفاده از آنها ، همچنین نحوه تنظیم نمودن این تجهیزات ، نحوه نوشتن LOM این تجهیزات و به طور کلی راهبری تجهیزات سری 6500 
کارشناسان و مدیران IT & ICT که در حال حاظر دارای تجهیزات سری 6500 می باشند و یا در فکر تهیه این تجهیزات هستند.
Implementing Cisco Data Center Network Infrastructure 1 DCNI-1
Course Objectives
• Identify the Catalyst 6500, 4900, and Blade Switch families and hardware options
• Describe the Catalyst 6500 advanced configuration, management, and maintenance features
• Identify, design, and implement the firewall services using the Catalyst 6500 Series switch Firewall Services Module (FWSM)
• Describe, configure, and use the NAM for network traffic monitoring
• Identify, describe, and deploy the high availability (HA) features in the Data Center
• Describe the steps for the initial NAM configuration
• Configure the Catalyst 6500 Series switch to collect and send data to NAM
• Identify the first-hop (default gateway) failure and describe the various options (HSRP, FHRP, VRRP, and GLBP) to overcome this problem
• Identify and describe the purpose of the Catalyst 6500 Series switch supervisor engine redundancy features including RPR, RPR+, and State full Switchover (SSO) with emphasis on the latest
• Configure, examine, and compare the RPR+, SSO, and SSO with NSF Catalyst 6500 Series switch supervisor redundancy features
Course Content
The DCNI-1 course will teach you to build scalable, reliable, and intelligent Data Center networks using Catalyst 6500 Series switches. You will deploy an efficient and expandable enterprise network using Catalyst 6500, 4900, and the Data Center Infrastructure Module of the Enterprise Composite Network Model (ECNM). Explore the capabilities and performance considerations of the Catalyst 6500 Series switch supervisor modules including Sup720-3B/BXL, Sup32-PISA, and Sup720-10G-3C/CXL.
In class you will identify and implement traffic flows including FWSM routed/transparent modes, supervisor based packet acceleration, and FWSM—PISA integration and describe the multiple contexts concept, and how multiple contexts are provisioned and managed on FWSM.[\justify]Module 1 - Implementing the Catalyst 6500 , 4900 and Blade Switches
• Describing the Catalyst 6500 and 4900 Data Center Architecture
• Describing the Options and Hardware Available for the Catalyst 6500 and 4900 Series Switches
• Describing the Catalyst 6500 Series Switch Supervisors
• Implementing VSS
• Upgrading IOS on Catalyst 6500 and 4900 Series Switches
• Upgrading IOS Using Software Modularity
• Implementing NetFlow
• Implementing QoS
• Implementing EEM
• Utilizing Automated Diagnostics
• Implementing SPAN, RSPAN, and ERSPAN
• Describing the Cisco Blade Switch Family
Module 2 - Implementing FWSM for a Data Center Network Infrastructure
• Implementing Traffic Flows
• Implementing Management Access
• Implementing ACLs
• Implementing Contexts
• Implementing Routing
• Implementing Failover
• Implementing Deep Packet Inspection
Module 3 - Implementing Network Analysis with NAM
• Implementing Initial Configuration
• Implementing Collection Mechanisms
• Monitoring, Viewing, and Saving Data
Module 4 - Implementing High Availability Data Center Features
• Implementing HA Features in the Catalyst 6500 Series Switch
• Implementing HA Features in the Catalyst 4900 Series Switch
• Implementing State full Switchover
• Implementing Non-Stop Forwarding
Duration: 5 days
Cisco-CCNA Cloud 210-451
عنوان دوره مدت (ساعت) پيش نياز حق التدریس اساتید
CCNA Cloud 16 CCNA R&S ساعتی 110,000 یوحنایی ، توکلی
معرفی دورهاهداف دورهمخاطبین دورهسر فصل های دوره
.........
.........
کارشناسان و مدیران IT & ICT که …..

1.0 Cloud Characteristics and Models
1.1 Describe common cloud characteristics
• 1.1.a On-demand self service
• 1.1.b Elasticity
• 1.1.c Resource pooling
• 1.1.d Metered service
• 1.1.e Ubiquitous network access (smartphone, tablet, mobility)
• 1.1.f Multi-tenancy
1.2 Describe Cloud Service Models
• 1.2.a Infrastructure as a Service (IaaS)
• 1.2.b Software as a Service (SaaS)
• 1.2.c Platform as a Service (PaaS)
2.0 Cloud Deployment
2.1 Describe cloud deployment models
• 2.1.a Public
• 2.1.b Private
• 2.1.c Community
• 2.1.d Hybrid
2.2 Describe the Components of the Cisco Intercloud Solution
• 2.2.a Describe the benefits of Cisco Intercloud
• 2.2.b Describe Cisco Intercloud Fabric Services
3.0 Basic Knowledge of Cloud Compute
3.1 Identify key features of Cisco UCS
• 3.1.a Cisco UCS Manager
• 3.1.b Cisco UCS Central
• 3.1.c B-Series
• 3.1.d C-Series
• 3.1.e Server identity (profiles, templates, pools)
3.2 Describe Server Virtualization
• 3.2.a Basic knowledge of different OS and hypervisors
4.0 Basic Knowledge of Cloud Networking
4.1 Describe network architectures for the data center
• 4.1.a Cisco Unified Fabric
o 4.1.a.1 Describe the Cisco Nexus product family
o 4.1.a.2 Describe device virtualization
• 4.1.b SDN
o 4.1.b.1 Separation of control and data
o 4.1.b.2 Programmability
o 4.1.b.3 Basic understanding Open Daylight
• 4.1.c ACI
• 4.1.c.1 Describe how ACI solves the problem not addressed by SDN
o 4.1.c.2 Describe benefits of leaf/spine architecture
o 4.1.c.3 Describe the role of APIC Controller
4.2 Describe Infrastructure Virtualization
• 4.2.a Difference between vSwitch and DVS
• 4.2.b Cisco Nexus 1000V components
o 4.2.b.1 VSM
o 4.2.b.2 VEM
o 4.2.b.3 VSM appliance
• 4.2.c Difference between VLAN and VXLAN
• 4.2.d Virtual networking services
• 4.2.e Define Virtual Application Containers
o 4.2.e.1 Three-tier application container
o 4.2.e.2 Custom container
5.0 Basic Knowledge of Cloud Storage
5.1 Describe storage provisioning concepts
• 5.1.a Thick
• 5.1.b Thin
• 5.1.c RAID
• 5.1.d Disk pools
5.2 Describe the difference between all the storage access technologies
• 5.2.a Difference between SAN and NAS; block and file
• 5.2.b Block technologies
• 5.2.c File technologies
5.3 Describe basic SAN storage concepts
• 5.3.a Initiator, target, zoning
• 5.3.b VSAN
• 5.3.c LUN
5.4 Describe basic NAS storage concepts
• 5.4.a Shares / mount points
• 5.4.b Permissions
5.5 Describe the various Cisco storage network devices
• 5.5.a Cisco MDS family
• 5.5.b Cisco Nexus family
• 5.5.c UCS Invicta (Whiptail)
5.6 Describe various integrated infrastructures
• 5.6.a FlexPod (NetApp)
• 5.6.b VBlock (VCE)
• 5.6.c VSPEX (EMC)
• 5.6.d OpenBlock (Red Hat)

Cisco-CCNA Cloud
عنوان دوره مدت (ساعت) پيش نياز حق التدریس اساتید
CCNA Cloud 24 CCNA Cloud 210-451 ساعتی 100,000 یوحنایی ، توکلی
معرفی دورهاهداف دورهمخاطبین دورهسر فصل های دوره
.....
.....
کارشناسان و مدیران IT & ICT که .....

1.0 Cloud Infrastructure Administration and Reporting
1.1 Configure users/groups and role-based access control in the portal, including basic troubleshooting
• 1.1.a Describe default roles
• 1.1.b Configure new user with single role
• 1.1.c Describe multirole user profiles
• 1.1.d Configure a user profile
1.2 Perform virtual machine operations
• 1.2.a Configure live migrations of VMs from host to host
• 1.2.b Edit VM
• 1.2.c Configure VM snapshots
• 1.2.d Describe reverting a VM to a snapshot
1.3 Deploy virtual app containers
• 1.3.a Provide basic support and troubleshoot app container with firewall, networking, and load balancer
2.0 Chargeback and Billing Reports
2.1 Describe the chargeback model
• 2.1.a Describe chargeback features
• 2.1.b Describe budget policy
• 2.1.c Describe cost models
• 2.1.d Describe adding a cost model to a tenant
2.2 Generate various reports for virtual and physical accounts
• 2.2.a Execute billing reports
• 2.2.b Execute a system utilization reporting
• 2.2.c Execute a snapshot report
3.0 Cloud Provisioning
3.1 Describe predefined Cisco UCS Director-based services within the Cisco Prime Service Catalog
• 3.1.a Describe the configuration of service names and icons
• 3.1.b Describe order permissions
o 3.1.b (i) RBAC
o 3.1.c Describe template formats
o 3.1.c (i) Storage
o 3.1.c (ii) Compute
o 3.1.c (iii) Network
o 3.1.c (iv) Virtualization
3.2 Describe provisioning verification
• 3.2.a Describe how to place an order for a service from the Cisco Primer Service Catalog as an end-user
• 3.2.b Verify that provisioning is done correctly
• 3.2.c Access VMs and applications that have been provisioned
3.3 Deploy preconfigured templates and make minor changes to the service catalog offerings that do not affect workflows or services
• 3.3.a Describe the deployment of templates: storage, compute, network, and virtualization
• 3.3.b Describe differences between the templates
• 3.3.c Describe the need to convert between templates
4.0 Cloud Systems Management and Monitoring
4.1 Identify the components of Cisco Prime Service Catalog
• 4.1.a End-user store front
• 4.1.b Stack designer
• 4.1.c Heat orchestration
4.2 Describe the components of Cisco UCS Director
• 4.2.a Describe infrastructure management and monitoring
• 4.2.b Describe orchestration
• 4.2.c Describe the portal
• 4.2.d Describe the Bare Metal Agent
4.3 Describe Cisco UCS Performance Manager
• 4.3.a Describe capacity planning
• 4.3.b Describe bandwidth monitoring
• 4.3.c Describe how host groups facilitate dynamic monitoring
4.4 Describe the components of Cisco IAC
• 4.4.a Describe Cisco Process Orchestrator
• 4.4.b Describe Cisco Prime Service Catalog
• 4.4.c Describe Cisco Server Provisioner
4.5 Perform cloud monitoring using Cisco Prime Service Catalog, Cisco UCS Director, Cisco Prime infrastructure
• 4.5.a Describe fault monitoring
• 4.5.b Describe performance monitoring
• 4.5.c Describe monitoring of provisioning outcomes
4.6 Create monitoring dashboards
• 4.6.a Configure custom dashboards
• 4.6.b Configure threshold settings
5.0 Cloud Remediation
5.1 Configure serviceability options
• 5.1.a Configure syslog
• 5.1.b Configure NTP
• 5.1.c Configure DNS
• 5.1.d Configure DHCP
• 5.1.e Configure SMTP
5.2 Interpret Logs for root cause analysis
• 5.2.a Analyze fault logs
• 5.2.b Analyze admin logs
• 5.2.c Analyze application logs
5.3 Configure backups
• 5.3.a Configure database backup
• 5.3.b Configure database restore

CCNA Data Center 640-916
عنوان دوره مدت (ساعت) پيش نياز حق التدریس اساتید
CCNA Data Center 40 CCNA R&S CNA R&S یوحنایی ، توکلی
معرفی دورهاهداف دورهمخاطبین دورهسر فصل های دوره
.........
.........
کارشناسان و مدیران IT & ICT که …..

Introducing Cisco Data Center Technologies 640-916
1.0 Cisco Data Center Fundamentals Concepts
1.1 Describe network architectures for the Data Center describe the purpose and functions of various network devices • 1.1.a LAN
• 1.1.b SAN
1.2 Describe the Modular Approach in Network Design
1.3 Describe the data center core layer
1.4 Describe the data center aggregation layer
1.5 Describe the data center access layer
1.6 Describe the collapse core model
1.7 Describe FabricPath
1.8 Identify key differentiator between DCI and network interconnectivity
1.9 Describe, configure, and verify vPC
1.10 Describe the functionality of and configuration of port channels
1.11 Describe and configure virtual device context (VDC)
1.12 Describe the edge/core layers of the SAN
1.13 Describe the Cisco Nexus product family
1.14 Configure and verify network connectivity
1.15 Identify control and data plane traffic
1.16 Perform initial set up

2.0 Data Center Unified Fabric
2.1 Describe FCoE
2.2 Describe FCoE multihop
2.3 Describe VIFs
2.4 Describe FEX products
2.5 Perform initial set up
3.0 Storage Networking
3.1 Describe initiator target
3.2 Verify SAN switch operations
3.3 Describe basic SAN connectivity
3.4 Describe the different storage array connectivity
3.5 Verify name server login
3.6 Describe, configure, and verify zoning
3.7 Perform initial set up
3.8 Describe, configure, and verify VSAN
4.0 DC Virtualization
4.1 Describe device Virtualization
4.2 Describe Server Virtualization
4.3 Describe Nexus 1000v
4.4 Verify initial set up and operation for Nexus 1k
5.0 Unified Computing
5.1 Describe and verify discovery operation
5.2 Describe, configure, and verify connectivity
5.3 Perform initial set up
5.4 Describe the key features of UCSM
6.0 Data Center Network Services
6.1 Describe standard ACE features for load balancing
6.2 Describe server load balancing virtual context and HA
6.3 Describe server load balancing management options
6.4 Describe the benefits of Cisco Global Load Balancing Solution
6.5 Describe how the Cisco global load balancing solution integrates with local Cisco load balancers
6.6 Describe Cisco WAAS needs and advantages in the Data Center.

CCNA Routing & Switching
عنوان دوره مدت (ساعت) پيش نياز حق التدریس اساتید
CCNA R&S Composite 40 CCNA R&S Network+ یوحنایی ، توکلی
معرفی دورهاهداف دورهمخاطبین دورهسر فصل های دوره
.........
.........
کارشناسان و مدیران IT & ICT که …..

1.0 Operation of IP Data Networks
1.1 Recognize the purpose and functions of various network devices such as routers, switches, bridges and hubs 1.2 Select the components required to meet a given network specification 1.3 Identify common applications and their impact on the network 1.4 Describe the purpose and basic operation of the protocols in the OSI and TCP/IP models 1.5 Predict the data flow between two hosts across a network 1.6 Identify the appropriate media, cables, ports, and connectors to connect Cisco network devices to other network devices and hosts in a LAN
2.0 LAN Switching Technologies
2.1 Determine the technology and media access control method for Ethernet networks 2.2 Identify basic switching concepts and the operation of Cisco switches • 2.2.a Collision Domains
• 2.2.b Broadcast Domains
• 2.2.c Ways to switch
o 2.2.c [i] Store
o 2.2.c [ii] Forward
o 2.2.c [iii] Cut through
• 2.2.d CAM Table 2.3 Configure and verify initial switch configuration including remote access management • 2.3.a hostname
• 2.3.b mgmt IP address
• 2.3.c IP default-gateway
• 2.3.d local user and password
• 2.3.e enable secret password
• 2.3.f console and VTY logins
• 2.3.g exec-timeout
• 2.3.h service password encryption
• 2.3.i copy run start 2.4 Verify network status and switch operation using basic utilities such as
• 2.4.a ping
• 2.4.b telnet
• 2.4.c SSH 2.5 Describe how VLANs create logically separate networks and the need for routing between them
• 2.5.a Explain network segmentation and basic traffic management concepts 2.6 Configure and verify VLANs 2.7 Configure and verify trunking on Cisco switches
• 2.7.a dtp (topic)
• 2.7.b auto-negotiation 2.8 Identify enhanced switching technologies
• 2.8.a RSTP
• 2.8.b PVSTP
• 2.8.c Etherchannels 2.9 Configure and verify PVSTP operation
• 2.9.a Describe root bridge election
• 2.9.b Spanning tree mode
3.0 IP Addressing (IPv4/IPv6)
3.1 Describe the operation and necessity of using private and public IP addresses for IPv4 addressing 3.2 Identify the appropriate IPv6 addressing scheme to satisfy addressing requirements in a LAN/WAN environment 3.3 Identify the appropriate IPv4 addressing scheme using VLSM and summarization to satisfy addressing requirements in a LAN/WAN environment. 3.4 Describe the technological requirements for running IPv6 in conjunction with IPv4
• 3.4.a dual stack 3.5 Describe IPv6 addresses
• 3.5.a global unicast
• 3.5.b multicast
• 3.5.c link local
• 3.5.d unique local
• 3.5.e eui 64
• 3.5.f auto-configuration
4.0 IP Routing Technologies
4.1 Describe basic routing concepts
• 4.1.a packet forwarding
• 4.1.b router lookup process
• 4.1.c Process Switching/Fast Switching/CEF 4.2 Configure and verify utilizing the CLI to set basic Router configuration
• 4.2.a hostname
• 4.2.b local user and password
• 4.2.c enable secret password
• 4.2.d console and VTY logins
• 4.2.e exec-timeout
• 4.2.f service password encryption
• 4.2.g Interface IP Address
o 4.2.g [i] loopback
• 4.2.h banner
• 4.2.i motd
• 4.2.j copy run start 4.3 Configure and verify operation status of a device interface
• 4.3.a Serial
• 4.3.b Ethernet 4.4 Verify router configuration and network connectivity using
• 4.4.a ping
o 4.4.a [i] extended
• 4.4.b traceroute
• 4.4.c telnet
• 4.4.d SSH
• 4.4.e sh cdp neighbors 4.5 Configure and verify routing configuration for a static or default route given specific routing requirements 4.6 Differentiate methods of routing and routing protocols
• 4.6.a Static versus Dynamic
• 4.6.b Link state versus Distance Vector
• 4.6.c next hop
• 4.6.d ip routing table
• 4.6.e Passive Interfaces (how they work)
• 4.6.f Admin Distance
• 4.6.g split horizon
• 4.6.h metric 4.7 Configure and verify OSPF
• 4.7.a Benefit of single area
• 4.7.b Configure OSPv2
• 4.7.c Configure OSPv3
• 4.7.d Router ID
• 4.7.e Passive Interface
• 4.7.f Discuss multi-area OSPF
• 4.7.g Understand LSA types and purpose 4.8 Configure and verify interVLAN routing (Router on a stick)
• 4.8.a sub interfaces
• 4.8.b upstream routing
• 4.8.c encapsulation 4.9 Configure SVI interfaces 4.10 Manage Cisco IOS Files
• 4.10.a Boot Preferences
• 4.10.b Cisco IOS Images (15)
• 4.10.c Licensing
o 4.10.c [i] Show license
o 4.10.c [ii] Change license 4.11 Configure and verify EIGRP (single AS)
• 4.11.a Feasible Distance/Feasible Successors/Administrative distance
• 4.11.b Feasibility condition
• 4.11.c Metric composition
• 4.11.d Router ID
• 4.11.e auto summary
• 4.11.f Path Selection
• 4.11.g Load Balancing
o 4.11.g [i] Unequal
o 4.11.g [ii] Equal
5.0 IP Services
5.1 Configure and verify DHCP (IOS Router)
• 5.1.a Configuring router interfaces to use DHCP
• 5.1.b DHCP options (basic overview and functionality)
• 5.1.c Excluded addresses
• 5.1.d Lease time 5.2 Describe the types, features, and applications of ACLs
• 5.2.a standard (editing and sequence numbers)
• 5.2.b extended
• 5.2.c named
• 5.2.d numbered
• 5.2.e Log option 5.3 Configure and verify ACLs in a network environment
• 5.3.a named
• 5.3.b numbered
• 5.3.c Log option 5.4 Identify the basic operation of NAT
• 5.4.a purpose
• 5.4.b pool
• 5.4.c static
• 5.4.d 1 to 1
• 5.4.e overloading
• 5.4.f source addressing
• 5.4.g one way NAT 5.5 Configure and verify NAT for given network requirements 5.6 Configure and verify NTP as a client. 5.7 Recognize High availability (FHRP)
• 5.7.a VRRP
• 5.7.b HSRP
• 5.7.c GLBP 5.8 Configure and verify syslog
• 5.8.a Utilize Syslog Output 5.9 Describe SNMP v2 and v3
6.0 Network Device Security
6.1 Configure and verify network device security features
• 6.1.a Device password security
• 6.1.b enable secret versus enable
• 6.1.c Transport
• 6.1.c.1 disable telnet
• 6.1.c.2 SSH
• 6.1.d VTYs
• 6.1.e physical security
• 6.1.f service password
• 6.1.g Describe external authentication methods 6.2 Configure and verify Switch Port Security
• 6.2.a Sticky mac
• 6.2.b MAC address limitation
• 6.2.c static/dynamic
• 6.2.d violation modes
o 6.2.d [i] err disable
o 6.2.d [ii] shutdown
o 6.2.d [iii] protect restrict
• 6.2.e shutdown unused ports
• 6.2.f err disable recovery
• 6.2.g assign unused ports in unused VLANs
• 6.2.h putting Native VLAN to other than VLAN 1 6.3 Configure and verify ACLs to filter network traffic 6.4 Configure and verify ACLs to limit telnet and SSH access to the router
7.0 Troubleshooting
7.1 Troubleshoot and correct common problems associated with IP addressing and host configurations 7.2 Troubleshoot and resolve VLAN problems
• 7.2.a Identify that VLANs are configured
• 7.2.b Verify port membership correct
• 7.2.c Correct IP address configured 7.3 Troubleshoot and resolve trunking problems on Cisco switches
• 7.3.a Verify correct trunk states
• 7.3.b Verify correct encapsulation configured
• 7.3.c Correct VLANs allowed 7.4 Troubleshoot and resolve ACL issues
• 7.4.a Verify statistics
• 7.4.b Verify permitted networks
• 7.4.c Verify direction
o 7.4.c [i] Interface 7.5 Troubleshoot and resolve Layer 1 problems
• 7.5.a Framing
• 7.5.b CRC
• 7.5.c Runts
• 7.5.d Giants
• 7.5.e Dropped packets
• 7.5.f Late collisions
• 7.5.g Input/output errors 7.6 Identify and correct common network problems 7.7 Troubleshoot and resolve spanning tree operation issues
• 7.7.a Verify root switch
• 7.7.b Verify priority
• 7.7.c Verify mode is correct
• 7.7.d Verify port states 7.8 Troubleshoot and resolve routing issues
• 7.8.a Verify routing is enabled (sh IP protocols)
• 7.8.b Verify routing table is correct
• 7.8.c Verify correct path selection 7.9 Troubleshoot and resolve OSPF problems
• 7.9.a Verify neighbor adjacencies
• 7.9.b Verify Hello and Dead timers
• 7.9.c Verify OSPF area
• 7.9.d Verify interface MTU
• 7.9.e Verify network types
• 7.9.f Verify neighbor states
• 7.9.g Review OSPF topology table 7.10 Troubleshoot and resolve EIGRP problems
• 7.10.a Verify neighbor adjacencies
• 7.10.b Verify AS number
• 7.10.c Verify load balancing
• 7.10.d Split horizon 7.11 Troubleshoot and resolve interVLAN routing problems
• 7.11.a Verify connectivity
• 7.11.b Verify encapsulation
• 7.11.c Verify subnet
• 7.11.d Verify native VLAN
• 7.11.e Port mode trunk status 7.12 Troubleshoot and resolve WAN implementation issues
• 7.12.a Serial interfaces
• 7.12.b Frame relay
• 7.12.c PPP
8.0 WAN Technologies
8.1 Identify different WAN technologies
• 8.1.a Metro ethernet
• 8.1.b VSAT
• 8.1.c Cellular 3g/4g
• 8.1.d MPLS
• 8.1.e T1/E1
• 8.1.f ISDN
• 8.1.g DSL
• 8.1.h Frame relay
• 8.1.i Cable
• 8.1.j VPN 8.2 Configure and verify a basic WAN serial connection 8.3 Configure and verify a PPP connection between Cisco routers 8.4 Configure and verify Frame Relay on Cisco routers 8.5 Implement and troubleshoot PPPoE

Cisco-CCNA Security 210-260
عنوان دوره مدت (ساعت) پيش نياز اساتید
CCNA Security 32 CCNA R&S .......
معرفی دورهاهداف دورهمخاطبین دورهسر فصل های دوره
.........
.........
کارشناسان و مدیران IT & ICT که …..

1.0 Security Concepts
1.1 Common security principles
• 1.1.a Describe confidentiality, integrity, availability (CIA)
• 1.1.b Describe SIEM technology
• 1.1.c Identify common security terms
• 1.1.d Identify common network security zones
1.2 Common security threats
• 1.2.a Identify common network attacks
• 1.2.b Describe social engineering
• 1.2.c Identify malware
• 1.2.d Classify the vectors of data loss/exfiltration
1.3 Cryptography concepts
• 1.3.a Describe key exchange
• 1.3.b Describe hash algorithm
• 1.3.c Compare and contrast symmetric and asymmetric encryption
• 1.3.d Describe digital signatures, certificates, and PKI
1.4 Describe network topologies
• 1.4.a Campus area network (CAN)
• 1.4.b Cloud, wide area network (WAN)
• 1.4.c Data center
• 1.4.d Small office/home office (SOHO)
• 1.4.e Network security for a virtual environment
2.0 Secure Access
2.1 Secure management
• 2.1.a Compare in-band and out-of band
• 2.1.b Configure secure network management
• 2.1.c Configure and verify secure access through SNMP v3 using an ACL
• 2.1.d Configure and verify security for NTP
• 2.1.e Use SCP for file transfer
2.2 AAA concepts
• 2.2.a Describe RADIUS and TACACS+ technologies
• 2.2.b Configure administrative access on a Cisco router using TACACS+
• 2.2.c Verify connectivity on a Cisco router to a TACACS+ server
• 2.2.d Explain the integration of Active Directory with AAA
• 2.2.e Describe authentication and authorization using ACS and ISE
2.3 802.1X authentication
• 2.3.a Identify the functions 802.1X components
2.4 BYOD
• 2.4.a Describe the BYOD architecture framework
• 2.4.b Describe the function of mobile device management (MDM)
3.0 VPN
3.1 VPN concepts
• 3.1.a Describe IPsec protocols and delivery modes (IKE, ESP, AH, tunnel mode, transport mode)
• 3.1.b Describe hairpinning, split tunneling, always-on, NAT traversal
3.2 Remote access VPN
• 3.2.a Implement basic clientless SSL VPN using ASDM
• 3.2.b Verify clientless connection
• 3.2.c Implement basic AnyConnect SSL VPN using ASDM
• 3.2.d Verify AnyConnect connection
• 3.2.e Identify endpoint posture assessment
3.3 Site-to-site VPN
• 3.3.a Implement an IPsec site-to-site VPN with pre-shared key authentication on Cisco routers and ASA firewalls
• 3.3.b Verify an IPsec site-to-site VPN
4.0 Secure Routing and Switching
4.1 Security on Cisco routers
• 4.1.a Configure multiple privilege levels
• 4.1.b Configure Cisco IOS role-based CLI access
• 4.1.c Implement Cisco IOS resilient configuration
4.2 Securing routing protocols
• 4.2.a Implement routing update authentication on OSPF
4.3 Securing the control plane
• 4.3.a Explain the function of control plane policing
4.4 Common Layer 2 attacks
• 4.4.a Describe STP attacks
• 4.4.b Describe ARP spoofing
• 4.4.c Describe MAC spoofing
• 4.4.d Describe CAM table (MAC address table) overflows
• 4.4.e Describe CDP/LLDP reconnaissance
• 4.4.f Describe VLAN hopping
• 4.4.g Describe DHCP spoofing
4.5 Mitigation procedures
• 4.5.a Implement DHCP snooping
• 4.5.b Implement Dynamic ARP Inspection
• 4.5.c Implement port security
• 4.5.d Describe BPDU guard, root guard, loop guard
• 4.5.e Verify mitigation procedures
4.6 VLAN security
• 4.6.a Describe the security implications of a PVLAN
• 4.6.b Describe the security implications of a native VLAN
5.0 Cisco Firewall Technologies
5.1 Describe operational strengths and weaknesses of the different firewall technologies
• 5.1.a Proxy firewalls
• 5.1.b Application firewall
• 5.1.c Personal firewall
5.2 Compare stateful vs. stateless firewalls
• 5.2.a Operations
• 5.2.b Function of the state table
5.3 Implement NAT on Cisco ASA 9.x
• 5.3.a Static
• 5.3.b Dynamic
• 5.3.c PAT
• 5.3.d Policy NAT
• 5.3 e Verify NAT operations
5.4 Implement zone-based firewall
• 5.4.a Zone to zone
• 5.4.b Self zone
5.5 Firewall features on the Cisco Adaptive Security Appliance (ASA) 9.x
• 5.5.a Configure ASA access management
• 5.5.b Configure security access policies
• 5.5.c Configure Cisco ASA interface security levels
• 5.5.d Configure default Cisco Modular Policy Framework (MPF)
• 5.5.e Describe modes of deployment (routed firewall, transparent firewall)
• 5.5.f Describe methods of implementing high availability
• 5.5.g Describe security contexts
• 5.5.h Describe firewall services
6.0 IPS
6.1 Describe IPS deployment considerations
• 6.1.a Network-based IPS vs. host-based IPS
• 6.1.b Modes of deployment (inline, promiscuous - SPAN, tap)
• 6.1.c Placement (positioning of the IPS within the network)
• 6.1.d False positives, false negatives, true positives, true negatives
6.2 Describe IPS technologies
• 6.2.a Rules/signatures
• 6.2.b Detection/signature engines
• 6.2.c Trigger actions/responses (drop, reset, block, alert, monitor/log, shun)
• 6.2.d Blacklist (static and dynamic)
7.0 Content and Endpoint Security
7.1 Describe mitigation technology for email-based threats
• 7.1.a SPAM filtering, anti-malware filtering, DLP, blacklisting, email encryption
7.2 Describe mitigation technology for web-based threats
• 7.2.a Local and cloud-based web proxies
• 7.2.b Blacklisting, URL filtering, malware scanning, URL categorization, web application filtering, TLS/SSL decryption
7.3 Describe mitigation technology for endpoint threats
• 7.3.a Anti-virus/anti-malware
• 7.3.b Personal firewall/HIPS
• 7.3.c Hardware/software encryption of local data

CCNP Route & Switch & TSHOOT 300-101,115,135
عنوان دوره مدت (ساعت) پيش نياز اساتید
CCNP Composite 93 CCNA R&S یوحنایی ، توکلی
معرفی دورهاهداف دورهمخاطبین دورهسر فصل های دوره
.........
.........
کارشناسان و مدیران IT & ICT که …..

Implementing Cisco IP Routing (300-101)
1.0 Network Principles
1.1 Identify Cisco Express Forwarding concepts
• 1.1.a FIB
• 1.1.b Adjacency table
1.2 Explain general network challenges
• 1.2.a Unicast
• 1.2.b Out-of-order packets
• 1.2.c Asymmetric routing
1.3 Describe IP operations
• 1.3.a ICMP Unreachable and Redirects
• 1.3.b IPv4 and IPv6 fragmentation
• 1.3.c TTL
1.4 Explain TCP operations
• 1.4.a IPv4 and IPv6 (P)MTU
• 1.4.b MSS
• 1.4.c Latency
• 1.4.d Windowing
• 1.4.e Bandwidth-delay product
• 1.4.f Global synchronization
1.5 Describe UDP operations
• 1.5.a Starvation
• 1.5.b Latency
1.6 Recognize proposed changes to the network
• 1.6.a Changes to routing protocol parameters
• 1.6.b Migrate parts of the network to IPv6
• 1.6.c Routing protocol migration
2.0 Layer 2 Technologies
2.1 Configure and verify PPP
• 2.1.a Authentication (PAP, CHAP)
• 2.1.b PPPoE (client side only)
2.2 Explain Frame Relay
• 2.2.a Operations
• 2.2.b Point-to-point
• 2.2.c Multipoint
3.0 Layer 3 Technologies
3.1 Identify, configure, and verify IPv4 addressing and subnetting
• 3.1.a Address types (Unicast, broadcast, multicast, and VLSM)
• 3.1.b ARP
• 3.1.c DHCP relay and server
• 3.1.d DHCP protocol operations
3.2 Identify IPv6 addressing and subnetting
• 3.2.a Unicast
• 3.2.b EUI-64
• 3.2.c ND, RS/RA
• 3.2.d Autoconfig (SLAAC)
• 3.2.e DHCP relay and server
• 3.2.f DHCP protocol operations
3.3 Configure and verify static routing
3.4 Configure and verify default routing
3.5 Evaluate routing protocol types
• 3.5.a Distance vector
• 3.5.b Link state
• 3.5.c Path vector
3.6 Describe administrative distance
3.7 Troubleshoot passive interfaces
3.8 Configure and verify VRF lite
3.9 Configure and verify filtering with any protocol
3.10 Configure and verify redistribution between any routing protocols or routing sources
3.11 Configure and verify manual and autosummarization with any routing protocol
3.12 Configure and verify policy-based routing
3.13 Identify suboptimal routing
3.14 Explain ROUTE maps
3.15 Configure and verify loop prevention mechanisms
• 3.15.a Route tagging and filtering
• 3.15.b Split-horizon
• 3.15.c Route poisoning
3.16 Configure and verify RIPv2
3.17 Describe RIPng
3.18 Describe EIGRP packet types
3.19 Configure and verify EIGRP neighbor relationship and authentication
3.20 Configure and verify EIGRP stubs
3.21 Configure and verify EIGRP load balancing
• 3.21.a Equal cost
• 3.21.b Unequal cost
3.22 Describe and optimize EIGRP metrics
3.23 Configure and verify EIGRP for IPv6
3.24 Describe OSPF packet types
3.25 Configure and verify OSPF neighbor relationship and authentication
3.26 Configure and verify network types, area types, and router types
• 3.26.a Point-to-point, multipoint, broadcast, nonbroadcast
• 3.26.b LSA types, area type: backbone, normal, transit, stub, NSSA, totally stub
• 3.26.c Internal router, backbone router, ABR, ASBR
• 3.26.d Virtual link
3.27 Configure and verify OSPF path preference
3.28 Configure and verify OSPF operations
3.29 Configure and verify OSPF for IPv6
3.30 Describe, configure, and verify BGP peer relationships and authentication
• 3.30.a Peer group
• 3.30.b Active, passive
• 3.30.c States and timers
3.31 Configure and verify eBGP (IPv4 and IPv6 address families)
• 3.31.a eBGP
• 3.31.b 4-byte AS number
• 3.31.c Private AS
3.32 Explain BGP attributes and best-path selection
4.0 VPN Technologies
4.1 Configure and verify GRE
4.2 Describe DMVPN (single hub)
4.3 Describe Easy Virtual Networking (EVN)
5.0 Infrastructure Security
5.1 Describe IOS AAA using local database
5.2 Describe device security using IOS AAA with TACACS+ and RADIUS
• 5.2.a AAA with TACACS+ and RADIUS
• 5.2.b Local privilege authorization fallback
5.3 Configure and verify device access control
• 5.3.a Lines (VTY, AUX, console)
• 5.3.b Management plane protection
• 5.3.c Password encryption
5.4 Configure and verify router security features
• 5.4.a IPv4 access control lists (standard, extended, time-based)
• 5.4.b IPv6 traffic filter
• 5.4.c Unicast reverse path forwarding
6.0 Infrastructure Services
6.1 Configure and verify device management
• 6.1.a Console and VTY
• 6.1.b Telnet, HTTP, HTTPS, SSH, SCP
• 6.1.c (T)FTP
6.2 Configure and verify SNMP
• 6.2.a v2
• 6.2.b v3
6.3 Configure and verify logging
• 6.3.a Local logging, syslog, debugs, conditional debugs
• 6.3.b Timestamps
6.4 Configure and verify Network Time Protocol (NTP)
• 6.4.a NTP master, client, version 3, version 4
• 6.4.b NTP authentication
6.5 Configure and verify IPv4 and IPv6 DHCP
• 6.5.a DHCP client, IOS DHCP server, DHCP relay
• 6.5.b DHCP options (describe)
6.6 Configure and verify IPv4 Network Address Translation (NAT)
• 6.6.a Static NAT, dynamic NAT, PAT
6.7 Describe IPv6 NAT
• 6.7.a NAT64
• 6.7.b NPTv6
6.8 Describe SLA architecture
6.9 Configure and verify IP SLA
• 6.9.a ICMP
6.10 Configure and verify tracking objects
• 6.10.a Tracking objects
• 6.10.b Tracking different entities (for example, interfaces, IPSLA results)
6.11 Configure and verify Cisco NetFlow
• 6.11.a NetFlow v5, v9
• 6.11.b Local retrieval
• 6.11.c Export (configuration only)

 

Implementing Cisco IP Switched Networks (300-115)
1.0 Layer 2 Technologies
1.1 Configure and verify switch administration
• 1.1.a SDM templates
• 1.1.b Managing MAC address table
• 1.1.c Troubleshoot Err-disable recovery
1.2 Configure and verify Layer 2 protocols
• 1.2.a CDP, LLDP
• 1.2.b UDLD
1.3 Configure and verify VLANs
• 1.3.a Access ports
• 1.3.b VLAN database
• 1.3.c Normal, extended VLAN, voice VLAN
1.4 Configure and verify trunking
• 1.4.a VTPv1, VTPv2, VTPv3, VTP pruning
• 1.4.b dot1Q
• 1.4.c Native VLAN
• 1.4.d Manual pruning
1.5 Configure and verify EtherChannels
• 1.5.a LACP, PAgP, manual
• 1.5.b Layer 2, Layer 3
• 1.5.c Load balancing
• 1.5.d EtherChannel misconfiguration guard
1.6 Configure and verify spanning tree
• 1.6.a PVST+, RPVST+, MST
• 1.6.b Switch priority, port priority, path cost, STP timers
• 1.6.c PortFast, BPDUguard, BPDUfilter
• 1.6.d Loopguard and Rootguard
1.7 Configure and verify other LAN switching technologies
• 1.7.a SPAN, RSPAN
1.8 Describe chassis virtualization and aggregation technologies
• 1.8.a Stackwise
2.0 Infrastructure Security
2.1 Configure and verify switch security features
• 2.1.a DHCP snooping
• 2.1.b IP Source Guard
• 2.1.c Dynamic ARP inspection
• 2.1.d Port security
• 2.1.e Private VLAN
• 2.1.f Storm control
2.2 Describe device security using Cisco IOS AAA with TACACS+ and RADIUS
• 2.2.a AAA with TACACS+ and RADIUS
• 2.2.b Local privilege authorization fallback
3.0 Infrastructure Services
3.1 Configure and verify first-hop redundancy protocols
• 3.1.a HSRP
• 3.1.b VRRP
• 3.1.c GLBP

Troubleshooting and Maintaining Cisco IP Networks (300-135)
1.0 Network Principles
1.1 Use Cisco IOS troubleshooting tools
• 1.1.a Debug, conditional debug
• 1.1.b Ping and trace route with extended options
1.2 Apply troubleshooting methodologies
• 1.2.a Diagnose the root cause of networking issues (analyze symptoms, identify and describe root cause)
• 1.2.b Design and implement valid solutions
• 1.2.c Verify and monitor resolution
2.0 Layer 2 Technologies
2.1 Troubleshoot switch administration
• 2.1.a SDM templates
• 2.1.b Managing MAC address table
• 2.1.c Troubleshoot Err-disable recovery
2.2 Troubleshoot Layer 2 protocols
• 2.2.a CDP, LLDP
• 2.2.b UDLD
2.3 Troubleshoot VLANs
• 2.3.a Access ports
• 2.3.b VLAN database
• 2.3.c Normal, extended VLAN, voice VLAN
2.4 Troubleshoot trunking
• 2.4.a VTPv1, VTPv2, VTPv3, VTP pruning
• 2.4.b dot1Q
• 2.4.c Native VLAN
• 2.4.d Manual pruning
2.5 Troubleshoot EtherChannels
• 2.5.a LACP, PAgP, manual
• 2.5.b Layer 2, Layer 3
• 2.5.c Load balancing
• 2.5.d EtherChannel misconfiguration guard
2.6 Troubleshoot spanning tree
• 2.6.a PVST+, RPVST +, MST
• 2.6.b Switch priority, port priority, path cost, STP timers
• 2.6.c PortFast, BPDUguard, BPDUfilter
• 2.6.d Loopguard, Rootguard
2.7 Troubleshoot other LAN switching technologies
• 2.7.a SPAN, RSPAN
2.8 Troubleshoot chassis virtualization and aggregation technologies
• 2.8.a Stackwise
3.0 Layer 3 Technologies
3.1 Troubleshoot IPv4 addressing and subnetting
• 3.1.a Address types (Unicast, broadcast, multicast, and VLSM)
• 3.1.b ARP
• 3.1.c DHCP relay and server
• 3.1.d DHCP protocol operations
3.2 Troubleshoot IPv6 addressing and subnetting
• 3.2.a Unicast
• 3.2.b EUI-64
• 3.2.c ND, RS/RA
• 3.2.d Autoconfig (SLAAC)
• 3.2.e DHCP relay and server
• 3.2.f DHCP protocol operations
3.3 Troubleshoot static routing
3.4 Troubleshoot default routing
3.5 Troubleshoot administrative distance
3.6 Troubleshoot passive interfaces
3.7 Troubleshoot VRF lite
3.8 Troubleshoot filtering with any protocol
3.9 Troubleshoot between any routing protocols or routing sources
3.10 Troubleshoot manual and autosummarization with any routing protocol
3.11 Troubleshoot policy-based routing
3.12 Troubleshoot suboptimal routing
3.13 Troubleshoot loop prevention mechanisms
• 3.13.a Route tagging, filtering
• 3.13.b Split-horizon
• 3.13.c Route poisoning
3.14 Troubleshoot RIPv2
3.15 Troubleshoot EIGRP neighbor relationship and authentication
3.16 Troubleshoot loop free path selection
• 3.16.a RD, FD, FC, successor, feasible successor
3.17 Troubleshoot EIGPR operations
• 3.17.a Stuck in active
3.18 Troubleshoot EIGRP stubs
3.19 Troubleshoot EIGRP load balancing
• 3.19.a Equal cost
• 3.19.b Unequal cost
3.20 Troubleshoot EIGRP metrics
3.21 Troubleshoot EIGRP for IPv6
3.22 Troubleshoot OSPF neighbor relationship and authentication
3.23 Troubleshoot network types, area types, and router types
• 3.23.a Point-to-point, multipoint, broadcast, nonbroadcast
• 3.23.b LSA types, area type: backbone, normal, transit, stub, NSSA, totally stub
• 3.23.c Internal router, backbone router, ABR, ASBR
• 3.23.d Virtual link
3.24 Troubleshoot OSPF path preference
3.25 Troubleshoot OSPF operations
3.26 Troubleshoot OSPF for IPv6
3.27 Troubleshoot BGP peer relationships and authentication
• 3.27.a Peer group
• 3.27.b Active, passive
• 3.27.c States and timers
3.28 Troubleshoot eBGP
• 3.28.a eBGP
• 3.28.b 4-byte AS number
• 3.28.c Private AS
4.0 VPN Technologies
4.1 Troubleshoot GRE
5.0 Infrastructure Security
5.1 Troubleshoot IOS AAA using local database
5.2 Troubleshoot device access control
• 5.2.a Lines (VTY, AUX, console)
• 5.2.b Management plane protection
• 5.2.c Password encryption
5.3 Troubleshoot router security features
• 5.3.a IPv4 access control lists (standard, extended, time-based)
• 5.3.b IPv6 traffic filter
• 5.3.c Unicast reverse path forwarding
6.0 Infrastructure Services
6.1 Troubleshoot device management
• 6.1.a Console and VTY
• 6.1.b Telnet, HTTP, HTTPS, SSH, SCP
• 6.1.c (T) FTP
6.2 Troubleshoot SNMP
• 6.2.a v2
• 6.2.b v3
6.3 Troubleshoot logging
• 6.3.a Local logging, syslog, debugs, conditional debugs
• 6.3.b Timestamps
6.4 Troubleshoot Network Time Protocol(NTP)
• 6.4.a NTP master, client, version 3, version 4
• 6.4.b NTP authentication
6.5 Troubleshoot IPv4 and IPv6 DHCP
• 6.5.a DHCP client, IOS DHCP server, DHCP relay
• 6.5.b DHCP options (describe)
6.6 Troubleshoot IPv4 Network Address Translation (NAT)
• 6.6.a Static NAT, Dynamic NAT, PAT
6.7 Troubleshoot SLA architecture
6.8 Troubleshoot tracking objects
• 6.8.a Tracking objects
o 6.8.b Tracking different entities (for example, interfaces, IPSLA results)

رایان نت

شرکت بدر رایان جنوب که از زمان تاسیس و شروع به فعالیت در سال 1381و هنگامی که تنها در یه منطقه و توسط یک نفر اداره میشده است تا کنون که با بیش از80 نفر پرسنل متخصص و مجرب، اقصی نقاط استان خوزستان را تحت پوشش داشته و با اخذ مجوزهای لازم برنامه گسترش دامنه فعالیت خود را به سرتاسر میهن عزیز در دستور کار دارد

رایان نت

ارتباط با ما

 ایمیل: info@rayannet.ir

 شماره تماس : 250-52232160-061

آدرس:

خوزستان ،سربندر-روبروی بیمه مرکزی ایران-شرکت بدررایان جنوب