Facebook

Courses

We found 222 courses available for you
See

Cisco CCNP Enterprise: ENSLD eLearning

Intermediate

Course Description The Designing Cisco Enterprise Networks (ENSLD) v1.1 course …

What you'll learn
Design Enhanced Interior Gateway Routing Protocol (EIGRP) internal routing for the enterprise network
Design Open Shortest Path First (OSPF) internal routing for the enterprise network
Design Intermediate System to Intermediate System (IS-IS) internal routing for the enterprise network
Design a network based on customer requirements
Design Border Gateway Protocol (BGP) routing for the enterprise network
Describe the different types and uses of Multiprotocol BGP (MP-BGP) address families
Describe BGP load sharing
Design a BGP network based on customer requirements
Decide where the L2/L3 boundary will be in your Campus network and make design decisions
Describe Layer 2 design considerations for Enterprise Campus networks
Design a LAN network based on customer requirements
Describe Layer 3 design considerations in an Enterprise Campus network
Examine Cisco Software-Defined Access (SD-Access) fundamental concepts
Describe Cisco SD-Access Fabric Design
Design an SD-Access Campus Fabric based on customer requirements
Design service provider-managed VPNs
Design enterprise-managed VPNs
Design a resilient WAN
Design a resilient WAN network based on customer requirements
Examine the Cisco SD-WAN architecture
Describe Cisco SD-WAN deployment options
Design Cisco SD-WAN redundancy
Explain the basic principles of quality of service (QoS)
Design QoS for the WAN
Design QoS for enterprise network based on customer requirements
Explain the basic principles of multicast
Design rendezvous point distribution solutions
Describe high-level considerations when doing IP addressing design
Create an IPv6 addressing plan
Plan an IPv6 deployment in an existing enterprise IPv4 network
Describe the challenges that you might encounter when transitioning to IPv6
Design an IPv6 addressing plan based on customer requirements
Describe Network APIs and protocols
Describe Yet Another Next Generation (YANG), Network Configuration Protocol (NETCONF), and Representational State Transfer Configuration Protocol (RESTCONF)

Cisco CCNP Enterprise: ENARSI eLearning

Intermediate

Course Description: The Implementing Cisco Enterprise Advanced Routing and Services …

What you'll learn
Configure classic Enhanced Interior Gateway Routing Protocol (EIGRP) and named EIGRP for IPv4 and IPv6
Optimize classic EIGRP and named EIGRP for IPv4 and IPv6
Troubleshoot classic EIGRP and named EIGRP for IPv4 and IPv6
Configure Open Shortest Path First version 2 (OSPFv2) and OSPFv3 in IPv4 and IPv6 environments
Optimize OSPFv2 and OSPFv3 behavior
Troubleshoot OSPFv2 for IPv4 and OSPFv3 for IPv4 and IPv6
Implement route redistribution using filtering mechanisms
Troubleshoot redistribution
Implement path control using policy-based routing (PBR) and IP service level agreement (SLA)
Configure Multiprotocol-Border Gateway Protocol (MP-BGP) in IPv4 and IPv6 environments
Optimize MP-BGP in IPv4 and IPv6 environments
Troubleshoot MP-BGP for IPv4 and IPv6
Describe the features of Multiprotocol Label Switching (MPLS)
Describe the major architectural components of an MPLS VPN
Identify the routing and packet forwarding functionalities for MPLS VPNs
Explain how packets are forwarded in an MPLS VPN environment
Implement Cisco IOS Dynamic Multipoint VPNs (DMVPNs)
Implement DHCP
Describe the tools available to secure the IPV6 first hop
Troubleshoot Cisco router security features
Troubleshoot infrastructure security and services

CompTIA Linux+ eLearning Bundle

30 Lessons
Intermediate

CertMaster Learn Details What is CertMaster Learn integrated with CompTIA …

CompTIA Cybersecurity Analyst (CySA+) eLearning Bundle

23 Lessons
Intermediate

CertMaster Learn+Labs Details What is CertMaster Learn integrated with CompTIA …

Featured

CompTIA Network+ eLearning Bundle

Intermediate

What is CertMaster Practice? CompTIA CertMaster Practice is an online …

Cisco CCNA: Implementing and Administering Cisco Solutions eLearning

115 Lessons
Intermediate

Course Description The Implementing and Administering Cisco Solutions (CCNA) course …

What you'll learn
Describe network fundamentals and build simple LANs
Understand routing operations and configuration
Manage network device security
Expand small to medium-sized networks with WAN connectivity
Demonstrate IPv4 and IPv6 basics

Certified Network Defender | CND

20 Lessons
40 hours
Intermediate

Course Description Certified Network Defender (CND) is a vendor-neutral, hands-on, …

Computer Hacking Forensic Investigator | CHFI

16 Lessons
40 hours
Intermediate

Course Description The Computer Hacking Forensic Investigator (CHFI) course delivers …

What you'll learn
Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
Perform anti-forensic methods detection
Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
Extract and analyze of logs from various devices like proxy, firewall, IPS, IDS, Desktop, laptop, servers, SIM tool, router, firewall, switches AD server, DHCP logs, Access Control Logs & conclude as part of investigation process.
Identify & check the possible source / incident origin.
Recover deleted files and partitions in Windows, Mac OS X, and Linux
Conduct reverse engineering for known and suspected malware files
Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents
The computer forensic investigation process and the various legal issues involved
Evidence searching, seizing, and acquisition methodologies in a legal and forensically sound manner
Types of digital evidence, rules of evidence, digital evidence examination process, and electronic crime and digital evidence consideration by crime category
Roles of the first responder, first responder toolkit, securing and evaluating electronic crime scene, conducting preliminary interviews, documenting electronic crime scene, collecting and preserving electronic evidence, packaging and transporting electronic evidence, and reporting the crime scene
Setting up a computer forensics lab and the tools involved in it
Various file systems and how to boot a disk
Gathering volatile and non-volatile information from Windows
Data acquisition and duplication rules
Validation methods and tools required
Recovering deleted files and deleted partitions in Windows, Mac OS X, and Linux
Forensic investigation using AccessData FTK and EnCase
Steganography and its techniques
Steganalysis and image file forensics
Password cracking concepts, tools, and types of password attacks
Investigating password protected files
Types of log capturing, log management, time synchronization, and log capturing tools
Investigating logs, network traffic, wireless attacks, and web attacks
Tracking emails and investigating email crimes
Mobile forensics and mobile forensics software and hardware tools
Writing investigative reports
Dark Web Forensics and IOT Forensics