Sei sulla pagina 1di 9

NETWORKING TRAINING SYLLABUS

DOS COMMANDS

O FILE
O DIRECTORY
O ATTRIBUTE COMMANDS
O PRACTICE

FILES SYSTEM (FAT & NTFS)

O BOOT PROCESS

E-MAIL CONFIGURATION

O DIFFERENCE B/W OUTLOOK EXPRESS & OUTLOOK


O E-MAIL CREATION
O MAIL BACKUP
O MULTIPLE E-MAIL ACCOUNT CONFIGURATION
O NEWPST CREATION
O SET PWD FOR THE PST
O CHANGE SYNC. TIME DURATION
O ADD CONTACT & GROUP
O RULE CREATION

NT BACKUP

OS BACKUP (NORTON GHOST)

HIRENBOOT OPIONS

VIRUS

ANTIVIRUS

PRACTICE

TEST – HARDWARE MODULE AND TROUBLESHOOTING


NETWORK MODULE AND TROUBLE SHOOTING :

NETWORK INTRODUCTION

TYPES OF NETWORK

HOW DO WE NETWORK ?

DIFF OS FAMILY

WORKGROUP AND DOMAIN NETWORK

XP WITH XP – WORKGROUP NW CONFIGURATION

IP CONFIGURATION

FILES AND FOLDER SHARING & PERMISSION

WORKGROUP USER MANAGEMENT

O USER CREATION
O USER LEVEL FILES ACCESS PERMISSION
O PRACTICE

REMOTE DESKTOP

REMOTE ASSISTANCE

NET MEETING

OFFLINE FILE SHARING

PRACTICE

TERMINAL SERVER

IIS SERVER

FTP SERVER CONFIGURATION

NT BACKUP & RESTORE

2008 SERVER OS

O ADS CONFIGURATION
O DHCP CONFIGURATION
O CLIENT CONFIGURATION
USER MANAGEMENT

FILES AND FOLDER SHARING

PROFILES

PRACTICE

GROUP POLICY

O CHANGING DEFAULT PASSWORD POLICY


O ENABLING PASSWORD LOCK OUT POLICY
O COMPLICITY POLICY (PASSWORD LENGTH)
O CHANGING ALLOW LOGON LOCALLY POLICY

TEST – NETWORK MODULE

2008 & 2012 SYSTEM ADMINISTRATION AND TROUBLESHOOTING

INTRODUCTION OF WINDOWS SERVER 2008 R2 & 2012

FEATURES AND EDITIONS

LOGICAL STRUCTURE OF SERVER (DOMAIN, TREE, FOREST)

2008 & 2012 OS INSTALLATION

ADS AND DNS INSTALLTION

CREATING USER ACCOUNTS

CLIENT CONFIGURATION

USER CONFIGURATION

O LOGON HOURS
O LOG ON TO
O PASSWORD RESET
O PASSWORD UNLOCK

GROUP CONFIGURATION

O TYPES OF GROUPS
O DIFFERENCE BETWEEN LOCAL, GLOBAL AND UNIVERSAL GROUPS
USER MANAGEMENT

FAT & NTFS FILE SYSTEM

SHARING LEVEL PERMISSION

SECURITY LEVEL PERMISSION

OFFLINE FILE SHARING

LOCAL PROFILE

ROAMING PROFILE

HOME FOLDER

DISK QUOTA

SHADOW COPY

GROUP POLICY

O OU CREATION
O OU LEVEL POLICY
O DOMAIN LEVEL POLICY
O CHANGING DEFAUL PASSWORD POLICY
O ENABLING PASSWORD LOCK OUT POLICY / COMPLICITY POLICY
O CHANGING ALLOW LOGON LOCALLY POLICY
O DELEGATING CONTROL
O SOFTWARE DEPLOYMENT POLICY
O SCRIPT POLICY
O WALL PAPER POLICY

CONFIGURING ADC

CONFIGURING CHILD DOMAIN

CONFIGURING TREE ROOT DOMAIN

CONFIGURING RODC

FSMO ROLE TRANSFER

FSMO ROLE SEIZING

FOREST TRUST CONFIGURATION


DHCP

O INSTALLING DHCP SERVICE


O CREATING SCOPE
O CREATING IP RESERVCATION
O SCOPE BACKUP AND RESTORE

DNS

O INSTALLING DNS SERVICE


O CREATING AD INTEGRATED ZONE
O CREATING STANDARD FORWARD LOOKUP ZONE
O CREATING STANDARD REVERSE LOOKUP ZONE

IIS

O INSTALLING IIS SERVICE


O WEBSITE CREATION
O IIS CONFIGURATION (WEBSITE HOSTING)

FTP

O INSTALLING FTP SERVICE


O CREATING DO NOT ISOLATE USERS FTP SITES
O CREATING ISOLATE USERS FTP SITE

RARS

O INSTALL RARS CONFIGURATION


O RARS VERIFICATION

RDP

O TERMINAL SERVER CONFIGURATION


O RDP SERVER CONFIGURATION

2003 & 2008 R2 MIGRATION

RAID SIMULATION

Q&A

PRACTICE

WEEK 3: LAPTOP COMPLETE DISASSEMBLING & ASSEMBLING (ANY 3 MODELS)

WEEK 7: OS & SOFTWARES INSTALLATION


WEEK 10: PRACTICE

MOTHERBOARD BRANDS LIST:

O COMPAQ MOTHERBOARD
O HP MOTHERBOARD
O ACER MOTHERBOARD
O DELL MOTHERBOARD
O IBM LENOVO MOTHERBOARD
O SONY MOTHERBOARD
O TOSHIBA MOTHERBOARD
O APPLE MOTHERBOARD
O FUJITSU MOTHERBOARD
O SAMSUNG MOTHERBOARD

Network Fundamentals

● 1.1 role and function of network components

○ 1.1.a Routers
○ 1.1.b L2 and L3 switches
○ 1.1.c Next-generation firewalls and IPS
○ 1.1.d Access points
○ 1.1.e Controllers (Cisco DNA Center and WLC)
○ 1.1.f Endpoints
○ 1.1.g Servers

● 1.3 Compare physical interface and cabling types

○ 1.3.a Single-mode fiber, multimode fiber, copper


○ 1.3.b Connections (Ethernet shared media and point-to-point)
○ 1.3.c Concepts of PoE
● 1.4 Identify interface and cable issues (collisions, errors, mismatch duplex, and/or
speed)

o Compare TCP to UDP


o Configure and verify IPv4 addressing and subnetting

o Describe the need for private IPv4 addressing

o Configure and verify IPv6 addressing and prefix

o Compare IPv6 address types

1.13 switching concepts

○ 1.13.a MAC learning and aging


○ 1.13.b Frame switching
○ 1.13.c Frame flooding
○ 1.13.d MAC address table

Network Access

● 2.1 Configure and verify VLANs (normal range) spanning multiple switches

○ 2.1.a Access ports (data and voice)


○ 2.1.b Default VLAN
○ 2.1.c Connectivity
● 2.2 Configure and verify interswitch connectivity
○ 2.2.a Trunk ports
○ 2.2.b 802.1Q
○ 2.2.c Native VLAN
● 2.3 Configure and verify Layer 2 discovery protocols (Cisco Discovery Protocol and
LLDP)

o Configure and verify (Layer 2/Layer 3) EtherChannel (LACP)

o Describe the need for and basic operations of Rapid PVST+ Spanning
Tree Protocol and identify basic operations

2.5.a Root port, root bridge (primary/secondary), and other port names
2.5.b Port states (forwarding/blocking)
2.5.c PortFast benefits

● 2.6 Cisco Wireless Architectures and AP modes

o Describe physical infrastructure connections of WLAN


components (AP,WLC, access/trunk ports, and LAG)
o Describe AP and WLC management access connections (Telnet,
SSH, HTTP,HTTPS, console, and TACACS+/RADIUS)

o Configure the components of a wireless LAN access for client


connectivity using GUI only such as WLAN creation, security settings,
QoS profiles, and advanced WLAN settings

IP Services

● 4.1 Configure and verify inside source NAT using static and pools

Configure and verify NTP operating in a client and server mode

Explain the role of DHCP and DNS within the network

Explain the function of SNMP in network operations

Describe the use of syslog features including facilities and levels

Configure and verify DHCP client and relay

Explain the forwarding per-hop behavior (PHB) for QoS such as


classification, marking, queuing, congestion, policing, shaping

Configure network devices for remote access using SSH

Describe the capabilities and function of TFTP/FTP in the network

Security Fundamentals

● 5.1 key security concepts (threats, vulnerabilities, exploits, and mitigation techniques)

o Describe security program elements (user awareness, training, and


physical access control)

o Configure device access control using local passwords

o Describe security password policies elements, such as management,


complexity, and password alternatives (multifactor authentication,
certificates, and biometrics)
5.5. remote access and site-to-site VPNs

○ Configure and verify access control lists


○ Configure Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port
security)
○ Differentiate authentication, authorization, and accounting concepts
○ Describe wireless security protocols (WPA, WPA2, and WPA3)
○ Configure WLAN using WPA2 PSK using the GUI

Fire Wall Configuration :


○ Router with fire wall configuration
○ FORTINET firewall, palo alto fire wall, cisco FI firewall,
○ NAT configuration

Load Balancer F5, CISCO load balancer.

NAS data storage

Potrebbero piacerti anche