|
Introduction to Mastering In Cloud Computing & Cyber Security
|
|
|
|
Introduction to Mastering In Cloud Computing & Cyber Security
|
|
|
Networking Essentials (Mapped to CompTIA Network+)
|
|
|
|
Introduction to Networking Technologies Day-1
|
|
|
|
Network Topology
|
|
|
|
The OSI Model Day-1
|
|
|
|
The OSI Model Day-2
|
|
|
|
The OSI Model Day-3
|
|
|
|
IP Addressing
|
|
|
|
Subnetting Day-1
|
|
|
|
Subnetting Day-2
|
|
|
|
Subnetting Day -3
|
|
|
|
Subnetting Day-4
|
|
|
|
Subnetting - Day 5
|
|
|
|
TCP/IP Protocols Day-1
|
|
|
|
TCP/IP Protocols Day-2
|
|
|
|
TCP/IP Protocols Day-3
|
|
|
|
TCP/IP Protocols Day-4
|
|
|
|
TCP/IP Protocol Day-5
|
|
|
|
TCP/IP Protocols Day-6
|
|
|
|
TCP/IP Protocols Day-7
|
|
|
|
Doubt Session Day-1
|
|
|
|
Doubt Session Day-2
|
|
|
|
Network Essential
|
|
|
|
WAN Technologies Day-1
|
|
|
|
WAN Technologies Day-2
|
|
|
|
WAN Technologies Day-3
|
|
|
|
WAN Technologies Day-3
|
|
|
|
Doubt Session Day-3
|
|
|
|
Network Services
|
|
|
|
Protocols & Ports
|
|
|
|
Cabling Solutions
|
|
|
|
Wireless Solutions
|
|
|
|
Cloud Computing and Virtualization
|
|
|
|
Network Operations
|
|
|
|
Network Security
|
|
|
|
Network Troubleshooting
|
|
|
The TCP/IP Model
|
|
|
The Networking Media & TCP Math
|
|
|
TCP Math (Number System)
|
|
|
Routing & Switching Technologies (Mapped to CCNA 200-301)
|
|
|
|
Routers & Cisco IOS Day-2
|
|
|
|
Router Configuration Day-1
|
|
|
|
Router Configuration Day-2
|
|
|
|
Router Configuration Day-3
|
|
|
|
Default Route Configuration
|
|
|
|
Routing Day-1
|
|
|
|
Routing Day-2
|
|
|
|
Routing Day-3
|
|
|
|
RIP Configuration Day 1
|
|
|
|
RIP Configuration Day-2
|
|
|
|
IGRP
|
|
|
|
OSPF Day-1
|
|
|
|
OSPF Day-2
|
|
|
|
OSPF Day-3
|
|
|
|
OSPF Configuration Day-1
|
|
|
|
OSPF Configuration Day-2
|
|
|
|
OSPF Day 5
|
|
|
|
OSPF Day-6
|
|
|
|
EIGRP Day-1
|
|
|
|
EIGRP Day-2
|
|
|
|
CDP
|
|
|
|
CDP Practical
|
|
|
|
EIGRP Practical
|
|
|
|
Access Control List Day-1
|
|
|
|
Access Control List Day-2
|
|
|
|
Access Control List Day-3
|
|
|
|
Access Control List Day-4
|
|
|
|
Switching Day-1
|
|
|
|
Switching Day-2
|
|
|
|
Switching Day-3
|
|
|
|
Switching Day-4
|
|
|
|
VLAN
|
|
|
|
VLAN Configuration
|
|
|
|
VTP Configuration
|
|
|
|
VTP Configuration
|
|
|
|
VTP Configuration
|
|
|
|
VTP Configuration
|
|
|
|
VTP Configuration
|
|
|
|
VTP Configuration
|
|
|
|
Network Address Translator(NAT)
|
|
|
|
WAN Technologies Day-1
|
|
|
|
WAN Technologies Day-1
|
|
|
|
WAN Technologies Day-2
|
|
|
|
WAN Technologies Day-3
|
|
|
|
WAN Technologies Day-4
|
|
|
|
Doubt Session
|
|
|
Linux Administration (Mapped to RHCSA)
|
|
|
|
RHEL9 Installation Step By Step
|
|
|
|
Accessing the Command Line
|
|
|
|
Accessing the Command Line
|
|
|
|
Accessing the Command Line
|
|
|
|
Accessing the Command Line
|
|
|
|
Accessing the Command Line
|
|
|
|
Accessing the Command Line
|
|
|
|
Accessing the Command Line
|
|
|
|
Accessing the Command Line
|
|
|
|
Accessing the Command Line
|
|
|
|
Basics Commands
|
|
|
|
Accessing the Command Line
|
|
|
|
User Management
|
|
|
|
Users & Groups Management Day-1
|
|
|
|
Users & Groups Management Day-2
|
|
|
|
Users & Groups Management Day-3
|
|
|
|
Users & Groups Management Day-4
|
|
|
|
Users & Groups Management Day-5
|
|
|
File Permission
|
|
|
|
File Permission Day-1
|
|
|
|
File Permission Day-2
|
|
|
|
File Permission Day-3
|
|
|
|
File Permission Day-4
|
|
|
|
Partitioning Day-1
|
|
|
|
Partitioning Day-2
|
|
|
|
Partitioning Day-3
|
|
|
|
Partitioning Day-4
|
|
|
|
Partitioning Day-5
|
|
|
|
LVM Reduce and RAID-1 Configuration
|
|
|
|
RAID Configuration
|
|
|
Introduction to Cloud Computing
|
|
|
|
What is Cloud Computing?
|
|
|
|
Advantages of Cloud Computing
|
|
|
|
Cloud Service Models
|
|
|
|
Cloud Deployment Models
|
|
|
Virtualization and Management in Cloud Computing
|
|
|
|
Virtualization Technologies
|
|
|
|
Cloud Infrastructure
|
|
|
|
Managing and Monitoring Cloud Services
|
|
|
Cloud Security Fundamentals
|
|
|
|
Understanding Security in the Cloud
|
|
|
|
Cloud Security Challenges
|
|
|
|
Data Protection in the Cloud
|
|
|
Securing Cloud Infrastructure
|
|
|
|
Cloud Network Security
|
|
|
|
Identity and Access Management (IAM)
|
|
|
|
Secure Cloud Storage
|
|
|
|
Cloud Disaster Recovery
|
|
|
Cloud Application Security
|
|
|
|
Web Application Security
|
|
|
|
API Security
|
|
|
|
Securing Cloud Databases
|
|
|
|
Application-level Encryption
|
|
|
Cloud Incident Response and Forensics
|
|
|
|
Cloud Incident Response Process
|
|
|
|
Cloud Forensics
|
|
|
|
Legal and Privacy Issues in Cloud Forensics
|
|
|
Cyber Threats and Attacks in the Cloud
|
|
|
|
Understanding Cyber Threats
|
|
|
|
Types of Cloud Attacks
|
|
|
|
Malware and Vulnerability Management
|
|
|
Cloud Security Best Practices
|
|
|
|
Security Governance and Risk Management
|
|
|
|
Cloud Compliance and Auditing
|
|
|
|
Cloud Security Assessment and Testing
|
|
|
Cloud Security Architectures
|
|
|
|
Architecting for Cloud Security
|
|
|
|
Security in Virtual Private Clouds (VPC)
|
|
|
|
Secure Multi-Cloud Deployments
|
|
|
Emerging Trends in Cloud Computing and Cyber Security
|
|
|
|
Next Generation Cloud Technologies
|
|
|
|
Cloud Security Automation
|
|
|
|
Internet of Things (IoT) Security
|
|
|
Checkpoint (Mapped to R-80) + Wireshark (Mapped to WCNA)
|
|
|
|
Introduction To Check Point Architecture
|
|
|
|
Install and Tour The Gui
|
|
|
|
Security Policy Management
|
|
|
|
Schedule Backups For The Gateway
|
|
|
|
Check Point Security Solutions
|
|
|
|
Manage Network Traffic
|
|
|
|
Basic Concepts of VPN
|
|
|
|
Configure and Deploy A Site-to-site VPN
|
|
|
|
Analyze The Tunnel Traffic
|
|
|
|
Working With Cluster XI
|
|
|
|
Administrator Task Implementation
|
|
|
|
Smartevent Reports
|
|
|
|
Wireshark Functionality
|
|
|
|
Capture Traffic With Wireshark
|
|
|
|
Interpret Basic Trace File Statistics
|
|
|
|
TCP/IP and Protocol Analysis
|
|
|
|
Network Forensics and Scanning Discovery Process
|
|
|
|
Analyze Suspect Traffic
|
|
|
Kali Linux
|
|
|
Ethical Hacking (Mapped to CEH-V11-312-50)
|
|
|
|
Introduction To Ethical Hacking
|
|
|
|
Information Gathering Using Footprinting_reconnaissance
|
|
|
|
Network Scanning Techniques
|
|
|
|
Enumeration and Countermeasures
|
|
|
|
Denial of Services And Buffer Overflows
|
|
|
|
Session Hijacking Techniques and Countermeasures
|
|
|
|
Web Server Hacking and Countermeasures
|
|
|
|
Web Applications Hacking and Countermeasures
|
|
|
|
SQL Injection Attacks and Detection
|
|
|
|
Wireless Hacking and Security
|
|
|
|
Mobile Hacking
|
|
|
|
Evading Ids, Firewall and Honeypots and Countermeasures
|
|
|
|
Hacking IOT Devices
|
|
|
|
Cloud Computing Threats and Security Techniques
|
|
|
|
Cryptography
|
|
|
|
Basics of Penetration Testing
|
|