Select the components required to meet a network specification.
Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network.
Describe common networked applications including web applications.
Describe the purpose and basic operation of the protocols in the OSI and TCP models.
Describe the impact of applications (Voice Over IP and Video Over IP) on a network Interpret network diagrams.
Determine the path between two hosts across a network.
Describe the components required for network and Internet communications.Configure, verify and troubleshoot a switch with VLANs and interswitch communications.
Select the appropriate media, cables, ports, and connectors to connect switches to other network devices and hosts.
Explain the technology and media access control method for Ethernet Networks.
Explain network segmentation and basic traffic management concepts.
Explain basic switching concepts and the operation of Cisco switches.
Perform and verify initial switch configuration tasks including remote access management
Verify network status and switch operation using basic utilities (including: ping, traceroute, telnet, SSH, arp, ipconfig),SHOW & DEBUG commands Identify, prescribe, and resolve common switched network media issues, configuration issues, auto negotiation, and switch hardware failures.
Configure, verify, and troubleshoot trunking on Cisco switches, Configure, verify, and troubleshoot interVLAN routing, Configure, verify, and troubleshoot VTP, Configure, verify, and troubleshoot RSTP operation Interpret the output of various show and debug commands to verify the operational status of a Cisco switched network.
Implement basic switch security (including: port security, trunk access, management vlan other than vlan1, etc.)
Explain the operation and benefits of using DHCP and DNS Configure, verify and troubleshoot DHCP and DNS operation on a router.
(including: CLI/SDM) Implement static and dynamic addressing services for hosts in a LAN environment.
Calculate and apply an addressing scheme including VLSM IP addressing design to a network.
Determine the appropriate classless addressing scheme using VLSM and summarization to satisfy addressing requirements in a LAN/WAN environment.
Describe the technological requirements for running IPv6 in conjunction with IPv4
(including: protocols, dual stack, tunneling, etc).
Describe IPv6 addresses.
Identify and correct common problems associated with IP addressing and host configurations Configure, verify, and troubleshoot basic router operation and routing on Cisco devices Describe basic routing concepts
(including: packet forwarding, router lookup process).
Describe the operation of Cisco routers
(including: router bootup process, POST, router components).
Select the appropriate media, cables, ports, and connectors to connect routers to other network devices and hosts.
Configure, verify, and troubleshoot RIPv2 Access and utilize the router to set basic parameters.
(including: CLI/SDM)
Connect, configure, and verify operation status of a device interface
Verify device configuration and network connectivity using ping, traceroute, telnet, SSH or other utilities.
Perform and verify routing configuration tasks for a static or default route given specific routing requirements
Manage IOS configuration files. (including: save, edit, upgrade, restore)
Manage Cisco IOS Compare and contrast methods of routing and routing protocols Configure, verify, and troubleshoot OSPF
Configure, verify, and troubleshoot EIGRP Verify network connectivity (including: using ping, traceroute, and telnet or SSH)
Troubleshoot routing issues Verify router hardware and software operation using SHOW & DEBUG commands. Implement basic router security.Identify and describe the purpose of the components in a small wireless network. (Including: SSID, BSS, ESS)
Identify the basic parameters to configure on a wireless network to ensure that devices connect to the correct access point
Compare and contrast wireless security features and capabilities of WPA security (including: open, WEP, WPA-1/2)
Identify common issues with implementing wireless networks. (Including: Interface, missconfiguration).Explain general methods to mitigate common security threats to network devices, hosts, and applications
Describe the functions of common security appliances and applications
Describe security recommended practices including initial steps to secure network devices.Configure and apply an ACLs to limit telnet and SSH access to the router using (including: SDM/CLI) Verify and monitor ACLs in a network environment Troubleshoot ACL issues, Explain the basic operation of NAT Configure NAT for given network requirements using (including:CLI/SDM) Troubleshoot NAT issues.
Describe different methods for connecting to a WAN Configure and verify a basic WAN serial connection
Configure and verify Frame Relay on Cisco routers Troubleshoot WAN implementation issues Describe VPN technology (including: importance, benefits, role, impact, components) Configure and verify a PPP connection between Cisco routers.MCSE with Microsoft Windows Vista Client Administration (MCSE: 70-620)
Installation : Hardware Requirements, Editions – Windows Vista Installation – Windows Vista Migration and Windows Easy Transfer – Anytime Upgrade, Troubleshooting Installation – Install and Configure Drivers – Troubleshooting Post Installation Configuration Issues, Windows Aero – Configuring Internet Explorer, Configure and Troubleshoot Parental Controls – Security: Configure and Troubleshoot User Account Control – Security: Windows Defender – Dynamic Security for IE 7 – Security: Configure Security Settings in Windows Firewall – Configuring Networking by using the Network and Sharing Center – Sharing Resources and Securing Wireless Access Points – Remote Access: Remote Desktop – Network Troubleshooting – Configure Windows Mail – Configure Windows Calendar , Meeting Space – Configure Windows Sidebar, Media Applications – Optimizing Windows Vista – Data Protection and Windows Update.Configure routing. May include but is not limited to: static routing, persistent routing, Routing Internet Protocol (RIP), Open Shortest Path First (OSPF) Configure IPsec. May include but is not limited to: create IPsec policy, IPsec Authentication Header (AH), IPsec Encapsulating Security Payload (ESP)
Configuring Name ResolutionConfigure DNS zones. May include but is not limited to: DNS Refresh no-refresh, intervals, DNS listserv address (NSLOOKUP), primary/secondary zones, Active Directory integration, Dynamic Domain Name System (DDNS), GlobalNames, SOA refresh
Configure DNS records. May include but is not limited to: record types, host, pointer, MX, SRV, NS, dynamic updates, Time to Live (TTL)
Configure DNS replication. May include but is not limited to: DNS secondary zones, DNS stub zones, DNS scavenging interval, replication scope
Configure name resolution for client computers. May include but is not limited to: DNS and WINS integration, configuring HOSTS file, LMHOSTS, node type, Link-Local
Multicast Name Resolution (LLMNR), broadcasting, resolver cache, DNS Server list, Suffix Search order, manage client settings by using group policyConfigure shadow copy services. May include but is not limited to: recover previous versions, set schedule, set storage locations
Configure backup and restore. May include but is not limited to: backup types, backup schedules, managing remotely, restoring data
Manage disk quotas. May include but is not limited to: quota by volume or quota by user, quota entries, quota templates
Configure and monitor print services. May include but is not limited to: printer share, publish printers to Active Directory, printer permissions, deploy printer connections, install printer drivers, export and import print queues and printer settings, add counters to Reliability and Performance Monitor to monitor print servers, print pooling, print priority
Monitoring and Managing a Network Infrastructure
Configure Windows Server Update Services (WSUS) server settings. May include but is not limited to: update type selection, client settings, Group Policy object (GPO), client targeting, software updates, test and approval, disconnected networks
Capture performance data. May include but is not limited to: Data Collector Sets, Performance Monitor, Reliability Monitor, monitoring System Stability Index
Monitor event logs. May include but is not limited to: custom views, application and services logs, subscriptions, DNS log
Gather network data. May include but is not limited to: Simple Network Management Protocol (SNMP), Baseline Security Analyzer, Network MonitorPlan for automated server deployment. May include but is not limited to: standard server image, automation and scheduling of server deployments
Plan infrastructure services server roles. May include but is not limited to: address assignment, name resolution, network access control, directory services, application services, certificate services
Plan application servers and services. May include but is not limited to: virtualization server planning, availability, resilience, and accessibility
Plan file and print server roles. May include but is not limited to: access permissions, storage quotas, replication, indexing, file storage policy, availability, printer publishingPlan for delegated administration. May include but is not limited to: delegate authority, delegate Active Directory objects, application management
Plan and implement group policy strategy. May include but is not limited to: GPO management, GPO backup and recovery, group policy troubleshooting, group policy planning
Monitoring and Maintaining Servers
Implement patch management strategy. May include but is not limited to: operating system patch level maintenance, Windows Server Update Services (WSUS), application patch level maintenance
Monitor servers for performance evaluation and optimization. May include but is not limited to: server and service monitoring, optimization, event management, trending and baseline analysis
Monitor and maintain security and policies. May include but is not limited to: remote access, monitor and maintain NPAS, network access, server security, firewall rules and policies, authentication and authorization, data security, auditingPlan for delegated administration. May include but is not limited to: delegate authority, delegate Active Directory objects, application management
Plan and implement group policy strategy. May include but is not limited to: GPO management, GPO backup and recovery, group policy troubleshooting, group policy planning
Planning Application and Data Provisioning
Provision applications. May include but is not limited to: presentation virtualization, terminal server infrastructure, resource allocation, application virtualization alternatives, application deployment, System Center Configuration Manager
Provision data. May include but is not limited to: shared resources, offline data access
Planning for Business Continuity and High Availability
Plan storage. May include but is not limited to: storage solutions, storage management
Plan high availability. May include but is not limited to: service redundancy, service availability
Plan for backup and recovery. May include but is not limited to: data recovery strategy, server recovery strategy, directory service recovery strategy, object level recoveryDesign for network access. May include but is not limited to: network access policies, remote access strategy, perimeter networks, server and domain isolation
Plan for application delivery. May include but is not limited to: application virtualization, presentation virtualization, locally installed software, Web-based applications
Plan for Terminal Services. May include but is not limited to: Terminal Services licensing, Terminal Services infrastructureDesign the Active Directory physical topology. May include but is not limited to: placement of servers, site and replication topology, printer location policies
Design the Active Directory administrative model. May include but is not limited to: delegation, group strategy, compliance auditing, group administration, organizational structure
Design the enterprise-level group policy strategy. May include but is not limited to: group policy hierarchy and scope filtering, control device installation, authentication and authorizationDesign and implement public key infrastructure. May include but is not limited to: certificate services, PKI operations and maintenance, certificate life cycle management
Plan for interoperability. May include but is not limited to: inter-organizational authorization and authentication, application authentication interoperability, cross-platform interoperabilityDesign for software updates and compliance management. May include but is not limited to: patch management and patch management compliance, Microsoft Update and Windows Update, security baselines, system health models
Design the operating system virtualization strategy. May include but is not limited to: server consolidation, application compatibility, virtualization management, placement of servers
Design for data management and data access. May include but is not limited to: data security, data accessibility and redundancy, data collaboration
Exam 70-620: Configuring Microsoft Windows Vista Client
Configuring Windows security features
Accord Soft Offers Best A+/N+/S+ Training in Chennai. We offer Internships in Real-Life Business Applications of our clients. Students are given Practical Training in the below mentioned syllabus. The syllabus can be customized according to individual needs.
Topic 1B:
Security Building Blocks
Authentication Methods
Authentication Factors
User Name/Password Authentication
Challenge Handshake Authentication Protocol (CHAP)
Kerberos
Tokens
Biometrics
Multi-Factor Authentication
Mutual Authentication
Topic 1C:
Cryptography Fundamentals
Encryption
Encryption Algorithms
Keys
Hashing Encryption
Hashing Encryption Algorithms
Symmetric Encryption
Asymmetric Encryption
Cipher Types
Symmetric Encryption Algorithms Asymmetric Encryption Algorithms
Digital Signatures
Topic 1D:
Security Policy Fundamentals
Policies
Security Policy Components
Security Policy Issues
Common Security Policy Types Security Document Categories
Documentation Handling Measures
Topic 2B:
Software-Based Threats
Software Attacks
Malicious Code Attacks
Types of Malicious Code Default Security Attacks
Software Exploitation Attacks
Types of Software Exploitation Attacks
Misuse of Privilege Attacks
Password Attacks
Types of Password Attacks
Backdoor Attacks
Topic 2C:
Network-based Threats
Port Scanning Attacks Eavesdropping Attacks
IP Spoofing Attacks
Hijacking Attacks
Replay Attacks
Man-in-the-Middle Attacks
Denial of Service (DoS) Attacks
Distributed Denial of Service (DDoS) Attacks
Types of DoS Attacks Domain Name Kiting
DNS and ARP Poisoning
Topic 2D:
Hardware-Based Threats
Hardware Attacks
Specific Device Vulnerabilities Storage Media Vulnerabilities
Topic 3B:
Harden Directory Services
Directory Services
Common Directory Services
Lightweight Directory Access Protocol (LDAP)
Directory Service Vulnerabilities
Topic 3C:
Harden DHCP Servers
Dynamic Host Configuration Protocol (DHCP)
DHCP Vulnerabilities
Topic 3D:
Harden File and Print Servers
File and Print Server Vulnerabilities
The Server Message Block (SMB) Protocol
SMB Signing
Topic 4B:
Harden the Network Infrastructure
Internetwork Devices
Unnecessary Network Protocols
Network Access Control (NAC)
Firmware Updates
Internetwork Device Vulnerabilities
Demilitarized Zones (DMZs)
Intranets Extranets
Virtual LANs (VLANs)
Network Media
Network Media Vulnerabilities
Topic 4C:
Harden DNS and BIND Servers
DNS
DNS and BIND Vulnerabilities
Topic 4D:
Harden Web Servers
HTTP
Web Server Authentication
Web Server Authentication Methods
Web Server Vulnerabilities
Topic 4E:
Harden File Transfer Protocol (FTP) Servers
FTP & FTP Vulnerabilities Secure Shell (SSH) Secure FTP (SFTP)
Topic 4F:
Harden Network News Transfer Protocol(NNTP) Servers NNTP
NNTP Vulnerabilities
Topic 4G:
Harden Email Servers
Simple Mail Transfer Protocol (SMTP)
Email Vulnerabilities
Pretty Good Privacy (PGP)
Secure Multipurpose Internet Mail Extensions (S/MIME)
SPAM
Anti-SPAM Software
Topic 4H:
Harden Conferencing and Messaging Servers
Conferencing and Messaging Vulnerabilities
Topic 5B:
Secure Wireless Traffic
Wireless Protocol Standards
Wireless Protocol Implementations
Wireless Security Protocols
Wireless Vulnerabilities
Topic 5C:
Harden a Web Browser
Browser Vulnerabilities
Internet Explorer Security Settings
Mozilla Firefox Security Settings
Apple Safari Security Settings
Pop-up Blockers
Ad Blockers
Topic 5D:
Secure the Network Telephony Infrastructure
Telephony Components
Telecommunications Vulnerabilities
Topic 5E:
Secure the Remote Access Channel
Remote Access Methods
Tunneling
Virtual Private Networks (VPNs)
VPN Protocols
VPN Security Protocols
Remote Access Vulnerabilities
Topic 5F:
Secure Network Applications
Scripting Methods
Buffer Overflows
Cookies
SMTP Open Relays
P2P
Input Validation
Topic 6B:
Harden a Certificate Authority
Certificate Policies
Multiple and Dual Key Pairs
The Certificate Life Cycle
CA Vulnerabilities
Topic 6C:
Back Up a CA
Topic 6D:
Restore a CA
Topic 7B:
Secure Network Traffic by Using Certificates
Secure Sockets Layer (SSL)
HTTPS
Transport Layer Security (TLS)
Topic 7C:
Renew Certificates
Topic 7D:
Revoke Certificates
Certificate Revocation
The Certificate Revocation List (CRL)
Topic 7E:
Back Up Certificates and Private Keys
Private Key Protection Methods
Topic 7F:
Restore Certificates and Private Keys
Private Key Restoration Methods
Private Key Replacement
Topic 8B:
Enforce Corporate Security Policy Compliance
Due Care
Due Diligence
Due Process
Topic 8C:
Enforce Legal Compliance
Legal Requirements
Forensic Requirements
Human Resources (HR) Policies
Topic 8D:
Enforce Physical Security Compliance
Physical Security Vulnerabilities
Physical Security Measures
Environmental Controls
Topic 8E:
Educate Users
The Employee Education Process
User Security Responsibilities
Topic 8F:
Plan for Disaster Recovery
Business Continuity Plans (BCPs)
Disaster Recovery Plans (DRPs) Service Level Agreements (SLAs)
Alternate Sites
Secure Backups Secure Recovery
Backup Storage Locations
Single Point of Failure Redundancy Measures
Topic 8G:
Conduct a Security Audit
Security Audit Process User Access Monitoring
Storage and Retention Policies
Group Policies
Topic 9B:
Monitor for Security Anomalies
Monitoring Methodologies
Network Monitoring Utilities
Intrusion Detection Systems (IDSs)
Host, Network, and Application-based IDS
Passive and Active IDS
Signature and Anomaly IDS Analysis
Intrusion Prevention Systems (IPS)
Topic 9C:
Set Up a Honeypot
Honeypots
Types of Honeypots
Topic 9D:
Respond to Security Incidents
Incident Response Policies (IRPs)