Sie sind auf Seite 1von 3

TABLE OF CONTENTS

CONTENTS Training Venue Details Certificate of Training Confirmation Training ID card and Admit Card Details Project Letter Course Syllabus Detailed Description of Training Content (Day-wise) Day 1-3 Day 4-6 Day 7-9 Day 10-12 Day 13-15 Day 16-18 Day 19-21 Day 22-24 Day 25-27 Day 28-30 Day 31-33 Day 34-35 (Project) List of Abbreviations Learnt List of Port Numbers for Various Services Laboratory Work Lab 1 : Setting up a LAN wire (Straight & Cross) Lab 2 : Introduction to VLANs Lab 3 : VLAN Trunking Ports (VTP) Lab 4 : Spanning Tree Protocol (STP) Lab 5 : Routing Internet Protocol (RIP) Lab 6 : Enhanced Internet Gateway Routing Protocol (EIGRP) Lab 7 : Using Access Lists Lab 8 : Network Address Translation (NAT) Lab 9 : Project Work

PAGE NO. i ii iii iv v

COURSE SYLLABUS
TOPIC
Introduction to Networking Topologies OSI / TCP Reference Model Ethernet Standards IPV4 Addressing and Sub-netting Subnets Gateways Variable Length Subnet Masks (VLSM) Classless Inter-Domain Routing (CIDR) Hubs vs. Switches vs. Bridges vs. Routers Introduction to Cisco Routers Router Vendors Cisco Hierarchical Design Model Fixed and Modular Router Router Interfaces Internal and External Components Initial Router Configuration Lease Line Introduction CSU / DSU Encapsulation Guidelines of Routing Types of Routing Static Routing Packet Forwarding Mechanism Administrative Distance Disadvantages of Static Routing Default Routing Dynamic Routing Advantages / Disadvantages Types of Dynamic Routing Protocol RIPv1 / RIPv2 Metric Calculation / Timers / Routing Loops EIGRP Features Calculation of Metric Tables Link State Routing OSPF Metric Calculation Hello Messages Router ID Tables Access Lists : Standard / Extended / Named NAT / PAT Static / Dynamic NAT

THEORY(hrs)
3

LAB(hrs)
NA

NA

1 2

NA NA

0.5

NA

2.5

1.5 2

3 2

IOS & Configuration Backup Password Recovery Hub and Switches Broadcast Domain Collision Domain Initial Configuration of Switch Virtual LAN VLAN Trunking Protocol (VTP) Inter-VLAN Routing VLAN hopping attack DHCP Starvation Attack Man in the Middle Attack Switchport Security Virtual Private Network Understanding Network Security Principles Defending the Perimeter Configuring AAA Protocol Wi-Fi Technology Introduction to WLAN Types of WLAN 802.11 standards Installation of Wireless Local Area Network Protecting WLAN from outside attacks How to manage and configure the Wi-Fi network at home

1 2

1 2

1 2

1 2

2 2

2 NA

NA

3.5

Das könnte Ihnen auch gefallen