Archive for August 2014

CISCO CERTIFIED NETWORK PROFESSIONAL SECURITY (CCNP SECURITY)

Implementing Cisco Secure Access Solutions (SISAS) v1.0 is a newly created instructor-led training course that is part of the curriculum path leading to the Cisco Certified Network Professional Security (CCNP Security) certification. Additionally, it is designed to prepare security engineers with the knowledge and hands-on experience so that they can deploy Cisco’s Identity Services Engine and 802.1X secure network access. The goal of the course is to provide students with foundational knowledge and the capabilities to implement and managed network access security by utilizing Cisco ISE appliance product solution. 






The student will gain hands-on experience with configuring various advance Cisco security solutions for mitigating outside threats and securing devices connecting to the network. At the end of the course, students will be able to reduce the risk to their IT infrastructures and applications using Cisco’s ISE appliance feature and provide operational support identity and network access control.Upon completing this course, the learner will be able to meet these overall objectives:
·         Understand Cisco Identity Services Engine architecture and access control capabilities.
·         Understand 802.1X architecture, implementation and operation.
·         Understand commonly implemented Extensible Authentication Protocols (EAP).
·         Implement Public-Key Infrastructure with ISE.
·         Understand the implement Internal and External authentication databases.
·         Implement MAC Authentication Bypass.
·         Implement identity based authorization policies.
·         Understand Cisco TrustSec features.
·         Implement Web Authentication and Guest Access.
·         Implement ISE Posture service.
·         Implement ISE Profiling.
·         Understand Bring Your Own Device (BYOD) with ISE.
·         Troubleshoot ISE .
TOPICS COVERED:
In preparation to earn an CCNP SISAS certification, Mazenet recommends a training path based on a candidate’s background:
·         Introduction
·         Lab Guide
·         Threat Mitigation through Identity Services
·         Cisco ISE Fundamentals
·         Advance Access Control
·         Web Authentication and Guest Access
·         Endpoint Access Control
·         Troubleshooting Network Access Control
Saturday 30 August 2014
Posted by Unknown

Cisco Certified Internet Expert


CCIE certification indicates expert level knowledge of networking across various LAN and WAN interfaces, and a variety of routers and switches. Experts in R&S solve complex connectivity problems and apply technology solutions to increase bandwidth, improve response times, maximize performance, improve security, and support global applications. Candidates should be able to install, configure, and maintain LAN, WAN, and dial access services.




CCIE Routing & Switching
The CCIE Routing and Switching Written Exam will validate that professionals have the expertise to: configure, validate, and troubleshoot complex enterprise network infrastructure; understand how infrastructure components interoperate; and translate functional requirements into specific device configurations.
·        Implement Layer 2 Technologies
·        Implement IPv4
·        Implement IPv6
·        Implement MPLS Layer 3 VPNs
·        Implement IP Multicast
·        Implement Network Security
·        Implement Network Services
·        Implement QoS
·        Troubleshoot a Network
·        Optimize the Network
·        Evaluate Proposed Changes to a Network


Friday 22 August 2014
Posted by Unknown

Android 4.4 Application Development


·        Android is a top niche in mobile application development sector. Android supports not just mobile platform but also tablets and many other devices.
·        The extendable application environment of Android is specifically designed to suit industry requirements to tap the mobile consumer market and offers immense scope for Android application developers.
·        Greater part of Android application development is carried out in Java and our Android Training Course focuses on Java based application development.




Why Android App Development Course?
·        Model of application development is changing to App based.
·        Android is most popular OS for smart phones and all the businesses want to have their own Apps for Android.
TOPICS COVERED:
·        Introduction to Java
·        Introduction to Android
·        My First Android Application
·        Application Structure(in detail)
·        XML Introduction to Basic UI design
·        Advanced UI Programming
·        Intents & Views (in detail)
·        Styles & Themes
·        Adapters and Widgtes
·        Tabs and TabActivity
·        Data Storage & SQLite Programming
·        Linkify & Telephony API
·        Android Security Essentials
·        Publishing Android Applications
Wednesday 20 August 2014
Posted by Unknown
Tag :

CISCO COURSES TAKEN IN REDBACK IT ACADEMY

Cisco Certified Network Associate (CCNA) is a certification program for entry-level network engineers that helps maximize your investment in foundational networking knowledge and increase the value of your employer's network. CCNA is for Network Specialists, Network Administrators, and Network Support Engineers with 0-3 years of experience. The CCNA validates the ability to install, configure, operate, and troubleshoot medium-size routed and switched networks.




TOPICS COVERED
Configure, verify and troubleshoot a switch with VLANs and interswitch communications
·        Select the appropriate media, cables, ports, and connectors to connect switches to other network devices and hosts
·        Explain the technology and media access control method for Ethernet networks
·        Explain network segmentation and basic traffic management concepts
·        Explain basic switching concepts and the operation of Cisco switches
·        Perform and verify initial switch configuration tasks including remote access management
·        Verify network status and switch operation using basic utilities (including: ping, traceroute, telnet, SSH, arp, ipconfig), SHOW & DEBUG commands
·        Identify, prescribe, and resolve common switched network media issues, configuration issues, auto negotiation, and switch hardware failures
·        Describe enhanced switching technologies (including: VTP, RSTP, VLAN, PVSTP, 802.1q)
·        Describe how VLANs create logically separate networks and the need for routing between them
·        Configure, verify, and troubleshoot VLANs
·        Configure, verify, and troubleshoot trunking on Cisco switches
·        Configure, verify, and troubleshoot interVLAN routing
·        Configure, verify, and troubleshoot VTP

·        Implement basic switch security (including: port security, trunk access, management vlan other than vlan1, etc.)
Monday 18 August 2014
Posted by Unknown

CHFI (Computer Hacking Forensics Investigator)

CHFI (Computer Hacking Forensics Investigator)
EC-Council releases the most advanced Computer Forensic Investigation program in the world. CHFIv8 presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation. Battles between corporations, governments, and countries are no longer fought using physical force. Cyber war has begun and the consequences can be seen in everyday life. With the onset of sophisticated cyber-attacks, the need for advanced cyber security and investigation training is a mandate in the present day. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminals, then this is the course for you.This course helps students to excel in digital evidence acquisition, handling and analysis in a forensically sound manner. Acceptable in a court of law, these skills will lead to successful prosecutions in various types of security incidents such as data breaches, corporate espionage, insider threats and other intricate cases involving computer systems.





In preparation to earn an CHFI certification, Mazenet recommends a training path based on a candidate’s background:
·         Computer Forensics in Today’s World
·         Computer Forensics Investigation Process
·         Searching and Seizing Computers
·         Digital Evidence
·         First Responder Procedures
·         Computer Forensics Lab
·         Understanding Hard Disks and File Systems
·         Windows Forensics
·         Data Acquisition and Duplication
·         Recovering Deleted Files and Deleted Partitions
·         Forensics Investigation Using AccessData FTK
·         Forensics Investigation Using EnCase
·         Steganography and Image File Forensics
·         Application Password Crackers
·         Log Capturing and Event Correlation
·         Network Forensics, Investigating Logs and Investigating Network Traffic
·         Investigating Wireless Attacks
·         Investigating Web Attacks
·         Tracking Emails and Investigating Email Crimes
·         Mobile Forensics
·         Investigative Reports

·         Becoming an Expert Witness
Thursday 14 August 2014
Posted by Unknown

CSCU (Certified Secure Computer User)

CSCU (Certified Secure Computer User)    




The purpose of the CSCU training program is to provide students with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learnt from the class helps students take the necessary steps to mitigate their security exposure.

In preparation to earn an CSCU certification, Mazenet recommends a training path based on a candidate’s background:
Ø Foundations of Security
Ø Securing Operating Systems
Ø Protecting System Using Antiviruses
Ø Data Encryption
Ø Data Backup and Disaster Recovery
Ø Internet Security
Ø Securing Network Connections
Ø Securing Online Transactions
Ø Securing Email Communications
Ø Social Engineering and Identity Theft
Ø Security on Social Networking Sites
Ø Information Security and Legal Compliance

Ø Securing Mobile Devices
Sunday 10 August 2014
Posted by Unknown

CCNA SECURITY

CCNA  SECURITY
Cisco Certified Network Associate Security (CCNA Security) validates associate-level knowledge and skills required to secure Cisco networks. With a CCNA Security certification, a network professional demonstrates the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. The CCNA Security curriculum emphasizes core security technologies, the installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices, and competency in the technologies that Cisco uses in its security structure.





In preparation to earn an CCNA Security, Mazenet recommends the following training courses:
Common Security Threats
·         Describe common security threats
Security and Cisco Routers
·         Implement security on Cisco routers
·         Describe securing the control, data, and management plane
·         Describe Cisco Security Manager
·         Describe IPv4 to IPv6 transition
AAA on Cisco Devices
·         Implement AAA (authentication, authorization, and accounting)
·         Describe TACACS+
·         Describe RADIUS
·         Describe AAA
·         Verify AAA functionality
IOS ACLs
·         Describe standard, extended, and named IP IOS access control lists (ACLs) to filter packets
·         Describe considerations when building ACLs
·         Implement IP ACLs to mitigate threats in a network
Secure Network Management and Reporting
·         Describe secure network management
·         Implement secure network management
Common Layer 2 Attacks
·         Describe Layer 2 security using Cisco switches
·         Describe VLAN security
·         Implement VLANs and trunking
·         Implement spanning tree
Cisco Firewall Technologies
·         Describe operational strengths and weaknesses of the different firewall technologies
·         Describe stateful firewalls
·         Describe the types of NAT used in firewall technologies
·         Implement zone-based policy firewall using CCP
·         Implement the Cisco Adaptive Security Appliance (ASA)
·         Implement Network Address Translation (NAT) and Port Address Translation (PAT)
Cisco IPS
·         Describe Cisco Intrusion Prevention System (IPS) deployment considerations
·         Describe IPS technologies
·         Configure Cisco IOS IPS using CCP
VPN Technologies
·         Describe the different methods used in cryptography
·         Describe VPN technologies
·         Describe the building blocks of IPSec
·         Implement an IOS IPSec site-to-site VPN with pre-shared key authentication
·         Verify VPN operations

·         Implement Secure Sockets Layer (SSL) VPN using ASA device manager
Wednesday 6 August 2014
Posted by Unknown

widget

Pageviews

Cloud Label

Blogumulus by Roy Tanck and Amanda Fazani

Blog Archive

- Copyright © 2013 Redback IT Academy -- Powered by Redback - Designed by @ Redback Studio -