<ul>
<li>Personal Computer Components</li>
<li>Operating System Fundamentals</li>
<li>Installing and Configuring Peripheral Components</li>
<li>Installing and Configuring System Components</li>
<li>Maintaining and Troubleshooting Peripheral Components</li>
<li>Troubleshooting System Components</li>
<li>Maintaining and Troubleshooting Microsoft Windows</li>
<li>Network Technologies</li>
<li>Installing and Managing Network Connections</li>
<li>Supporting Printers and Scanners</li>
</ul>
<p>Module 1.1</p>
<p><strong>Module – 1.1 (A) Hardware A+ </strong></p>
<ul>
<li>Personal Computer Components</li>
<li>Operating System Fundamentals</li>
<li>Installing and Configuring Peripheral Components</li>
<li>Installing and Configuring System Components</li>
<li>Maintaining and Troubleshooting Peripheral Components</li>
<li>Troubleshooting System Components</li>
<li>Maintaining and Troubleshooting Microsoft Windows</li>
<li>Network Technologies</li>
<li>Installing and Managing Network Connections</li>
<li>Supporting Printers and Scanners</li>
</ul>
<p>Module – 1.1 (B ) N+</p>
<ul>
<li>Network Basics</li>
<li>Wired Computer-to-Computer Connections</li>
<li>Network-to-Network Connections</li>
<li>Wired Internetworking Device</li>
<li>Wired Communication Standards</li>
<li>Wireless Networking</li>
<li>Security Threats and Mitigation</li>
<li>Network Access Control</li>
<li>Monitoring</li>
<li>Troubleshooting</li>
</ul>
<p>Module 1.2 – lpv4 ADDRESSING</p>
<ul>
<li>IP address</li>
<li>IP Addressing</li>
<li>Version of IP Address</li>
<li>Public</li>
<li>Private IP Address</li>
<li>Network Mask</li>
<li>Role Network mask in IP Addressing</li>
<li>Default Mask of Classful IP Address</li>
<li>IP Address is combination of Network bits & Host bits</li>
<li>Network ID or Network Address</li>
<li>Broadcast ID or Broadcast Address</li>
<li>No. of Network ID’: & Valid IP Address in Class A, Class B, Class C</li>
<li>Design & Implementation of Network Scenario with Classful Network</li>
</ul>
<p>Module 1.3 – IPV4 Saving Techniques</p>
<ul>
<li>Subnetting</li>
<li>VLSM</li>
<li>NAT</li>
<li>Subnetting & its advantages</li>
<li>How to proceed for Subnetting & VLSM</li>
<li>I Design & Implementation of Network Scenario with Subnetted Network & VLSM</li>
<li>Network Address, Broadcast Address</li>
<li>First Valid IP address</li>
<li>Last valid IP address</li>
<li>Valid range of IP address</li>
<li>Sub net mask,</li>
<li>Block size</li>
<li>Next Network Address</li>
</ul>
<p>Module 1.4 – Cisco Router Introduction Theory:</p>
<ul>
<li>Introduction to Cisco Router</li>
<li>General port diagram of Cisco Routers</li>
<li>Cable & Connection.</li>
<li>Connectivity diagram of Cisco Routers with Network Devices</li>
<li>Describe the boot process of Cisco IOS routers
<ul>
<li>POST</li>
<li>Booting Process of Routers</li>
<li>Boot preferences</li>
<li>Cisco IOS image(s)</li>
<li>How to access Cisco Router Console</li>
<li>Basic Management mode & Commands of Cisco Router</li>
</ul>
</li>
</ul>
<p>Module 1.5 – IP ROUTING Theory:</p>
<ul>
<li>Basic Routing Concept</li>
<li>Routed & Routing Protocols
<ul>
<li>Types of Routing & Protocols.</li>
<li>Static Routing.</li>
<li>Static Route</li>
<li>Default route</li>
</ul>
</li>
<li>Differentiate terms:
<ul>
<li>Next hop</li>
<li>AD</li>
<li>Metric</li>
<li>Destination NID</li>
<li>Route Codes</li>
<li>Outgoing interface</li>
</ul>
</li>
<li>AD & Metrics of Different Routing Protocols</li>
</ul>
<p>LAB :</p>
<ul>
<li>configure and verify Static Route</li>
<li>Con?gure and verify Default Route</li>
</ul>
<p>Module 1.6 – DYNAMIC PROTOCOLS & DYNAMIC ROUTING Theory:</p>
<ul>
<li>Types of dynamic protocols</li>
<li>IGP vs EGP protocols</li>
<li>Static vs. Dynamic</li>
<li>Link state vs. Distance Vector</li>
</ul>
<p>Module 1.7 – OSPF ( Open Shortest Path First ) Theory: OSPF Terminology</p>
<ul>
<li>Link-states Advertisement</li>
<li>Router ID & its selection.</li>
<li>Loopback Interface & Loopback Interface
<ul>
<li>Hello Timer & Dead Timer</li>
<li>Concept of Area in OSPF & its Advantages</li>
<li>Backbone area</li>
<li>Types of Area’s in OSPF</li>
<li>OSPF router interface Priority</li>
<li>DR & BDR Concept</li>
<li>Process ID</li>
<li>Concept of Wild Card Mask</li>
<li>ABR & ASBR</li>
<li>Passive Interface</li>
<li>AD & Metric</li>
</ul>
</li>
<li>Neighbor adjacency components</li>
<li>OSPF router states</li>
<li>Discuss OSPF single & multi area</li>
</ul>
<p><strong>Type of Tables in OSPF</strong></p>
<ul>
<li>Neighbor Table</li>
<li>Topology Table</li>
<li>Routing Table</li>
</ul>
<p>LAB :</p>
<ul>
<li>Configure and verify ospfv2 single area</li>
<li>Configure and verify ospfv2 multi area</li>
<li>Verify ospf metric calculation.</li>
<li>Modify OSPF Parameter.</li>
</ul>
<p>Helpful Command use in LAB</p>
<ul>
<li>showip interface brief</li>
<li>show protocols</li>
<li>show running-config</li>
<li>showip route</li>
<li>showip route connected</li>
<li>show ip route ospf</li>
</ul>
<p>Module 1.8 – EIGRP (Enhanced Interior Gateway</p>
<p><strong>Routing Protocol) Theory</strong></p>
<ul>
<li>Characteristics of EIGRP</li>
<li>Feasible Distance / Feasible Successors /Administrative distance</li>
<li>Feasibility condition</li>
<li>Metric composition</li>
<li>Router ID</li>
<li>Auto summary & no auto summary</li>
<li>Muticast address of eigrp</li>
<li>Hello & Hold timer</li>
<li>AD”s of eigrp</li>
<li>Passive interface</li>
<li>Wild card mask</li>
<li><strong>Types of eigrp tables. </strong></li>
<li>Neighbor Table</li>
<li>Topology Table</li>
<li>Routing Table
<ul>
<li>Neighbor adjacency Parameter</li>
</ul>
</li>
<li>Hello</li>
<li>ASN</li>
<li>METRIC</li>
</ul>
<p>LAB:</p>
<ul>
<li>Configure and verify EIGRP</li>
<li>Configure and verify Redistribution with non¬-eigrp</li>
<li>Stop unwanted Traffic on LAN segment (using passive-interface.)</li>
<li>Modify EIGRP Parameter.</li>
</ul>
<p><strong>Helpful Command use in LAB</strong></p>
<ul>
<li>show ip interface brief</li>
<li>show protocols</li>
<li>show running-config</li>
<li>show ip route</li>
<li>show ip route eigrp</li>
<li>show ipeigrpneighbour</li>
<li>show ipeigrp topology</li>
</ul>
<p><strong>Module 1.9 – HOW TO MANAGE CISCO DEVICES Theory</strong></p>
<ul>
<li>Cisco Discovery Protocol (CDP)</li>
<li>Introduction</li>
<li>How to enable & disable CDP on Router & Interface</li>
<li>Password recovery procedure</li>
<li>Backup & Up gradation of IOS</li>
<li>Backup & Up gradation of Configuration File</li>
</ul>
<p><strong>Describe following terms:</strong></p>
<ul>
<li>Ping</li>
<li>Traceroute</li>
<li>Tracert</li>
<li>DebugIP Packet</li>
<li>DebuglPlCMP</li>
</ul>
<p>LAB:</p>
<ul>
<li>Verify CDP to ?nd out information ofdirectly connected Cisco devices</li>
<li>Disable CDP on router and interface</li>
<li>Modify CDP Timers.</li>
<li>Con?gure and verify of Advance Telnet feature.</li>
<li>Configure & Verify HOST Resolving.</li>
<li>Backup of IOS File</li>
<li>Backup of Con?guration File.</li>
<li>Restoring of I0S FiIe</li>
<li>Restoring of Con?guration File.</li>
<li>Cisco router Password recovery & Recovery of NVRM File.</li>
</ul>
<p>Module 1.10 – IP SERIVCES DHCP</p>
<ul>
<li>DHCP Server (IOS Router)</li>
<li>DHCP Client</li>
<li>DHCP Pool</li>
<li>Default Router</li>
</ul>
<p><strong>Packet Filtering via ACL</strong></p>
<ul>
<li>Describe the types, features, and applications of ACLs</li>
<li>Standard</li>
<li>Sequence numbers</li>
<li>Editing</li>
<li>Extended</li>
<li>Numbered</li>
<li>Log option</li>
<li>Inbound & Outbound ACL</li>
<li>Drawback of Standard 81 Extended ACL</li>
<li>How to overcome Drawback of Standard & Extended ACL</li>
<li>ACL Implementation Rules</li>
<li>Identify the basic operation of NAT</li>
<li>Purpose</li>
<li>Pool</li>
<li>Static (?xed – One Private IP need One Public IP)</li>
<li>1 to 1 (variable – One Private IP need One Public IP)</li>
<li>Overloading (Group of Private IP Address need one Public IP)</li>
<li>Source addressing (bi-directional)</li>
<li>One way NAT ( uni-directional)</li>
</ul>
<p><strong>NTP</strong></p>
<ul>
<li>NTP Server</li>
<li>NTP Client</li>
</ul>
<p><strong>ADVANCE TOPICS</strong></p>
<ul>
<li>VRRP</li>
<li>HSRP</li>
<li>GLBP</li>
<li>Concept of Syslog sewer</li>
</ul>
<p>LAB:</p>
<ul>
<li>Configure and verify Static (?xed) NAT.</li>
<li>Configure and verify Static (with pool) NAT</li>
<li>Configure and verify PAT (Overloading)</li>
<li>Configure and verify Numbered Standard & Named Standard ACL</li>
<li>Configure and verify Numbered Extended & Named Extended ACL.</li>
<li>Configure and verify NTP Server and Client.</li>
<li>Con?guring and verify router interfaces to useDHCP</li>
<li>Con?guring and verify DHCP</li>
</ul>
<p>Module 1.11 – LAN Switching Technology</p>
<ul>
<li>Introduction of Cisco Switches</li>
<li>Collision Domain & Broadcast Domain</li>
<li>Bridges and Hubs</li>
<li>Types of switching</li>
</ul>
<p><strong>Bridge & its Function</strong></p>
<ul>
<li>Forwarding</li>
<li>Filtering</li>
<li>Flooding</li>
<li>Formation of MAC Table or CAM Table</li>
</ul>
<p><strong>VLAN & its Advantage</strong></p>
<ul>
<li>Network segmentation</li>
<li>Security</li>
<li>Enhanced performance</li>
<li>How to creates VLAN</li>
<li>Types of VLAN membership</li>
<li>Access port & Access Ilnk</li>
<li>Trunk port & Trunk link</li>
<li>How to form trunk 8: its requirements</li>
<li>Trunking Protocols ISL & dot1q</li>
<li>Frame Forwarding Techniques in Switch</li>
<li>Inter-Vlan Routing</li>
<li>STP</li>
</ul>
<p><strong>STP Convergence Components</strong></p>
<ul>
<li>lowest Bridge ID</li>
<li>lowest RPC</li>
<li>lowest Sender BID</li>
<li>lowest Sender Port ID</li>
</ul>
<p><strong>STP Convergence Steps:</strong></p>
<ul>
<li>Election of Root Bridge.</li>
<li>Election of Root Port.</li>
<li>Election of Designated Port</li>
<li>Spanning Tree Mode</li>
<li>Concept of Ether channel</li>
</ul>
<p>LAB:</p>
<ul>
<li>Con?gure and verify initial switch con?guration</li>
<li>Verify CAM Table.</li>
<li>Con?gure and verify VLANs</li>
<li>Con?gure and verify trunking on Ciscoswitches</li>
<li>Con?gure and verify inter VLAN routing(Router on a stick)</li>
<li>sub interfaces</li>
</ul>
<p>Module 1.12 – Network Device Security Con?gure and verify network</p>
<ul>
<li>Device password security</li>
<li>Enable secret vs enable</li>
<li>Transport</li>
<li>Disable telnet</li>
<li>SSH</li>
<li>VTYs</li>
<li>Physical security</li>
<li>Service password</li>
<li>Con?gure and verify Switch Port Security</li>
<li>features such as</li>
<li>Sticky MAC</li>
<li>MAC address limitation</li>
<li>Static / dynamic</li>
</ul>
<p>Module 1.13 – WAN Technologies</p>
<ul>
<li>WAN Connection types</li>
<li>WAN Protocols</li>
<li>Introduction of HDLC</li>
</ul>
<p><strong>Introduction of PPP & its feature</strong></p>
<ul>
<li>PPP sub Protocols</li>
<li>PPP session establishment</li>
<li>PPP authentication methods</li>
<li>Understanding Frame-Relay</li>
<li>Fundamentals</li>
<li>How to make Router as a FRAME_RELAY</li>
<li>Switch</li>
</ul>
<p><strong>Frame-Relay logical Topologies</strong></p>
<ul>
<li>Hub 8- Spoke</li>
<li>Full Mesh</li>
<li>Partial Mesh</li>
<li>Virtual Private Network</li>
<li>Basic fundamentals of VPN</li>
</ul>
<p>LAB :</p>
<p><strong>Configure and verify a basic WAN serial connection</strong></p>
<ul>
<li>Configure and verify a PPP connection between Cisco routers</li>
<li>Configure and verify PPP Authentication</li>
<li>Configure and verify Frame Relay on Cisco routers</li>
</ul>
<p>Module 1.14 – Ipv6</p>
<ul>
<li>Introduction of lpv6</li>
<li>Need of lpv6</li>
</ul>
<p><strong>Ipv6 addressing</strong></p>
<ul>
<li>Link Local address</li>
<li>Site local address</li>
<li>Global Unicast Address</li>
<li>Multicast Address</li>
<li>eui 64</li>
<li>autocon?guratlon</li>
</ul>
<p><strong>Ipv6 packet type</strong></p>
<ul>
<li>Unicast</li>
<li>Multicast</li>
<li>Anycast</li>
<li>Ipv6 supporting protocols (RIPng, OSPFva, EIGRPvG,MP-BGP)</li>
</ul>
<p><strong>LAB :</strong></p>
<ul>
<li>Configuring & Verify IPV6 Address</li>
<li>Configure & verify OSPFv2</li>
</ul>
<p><strong>Module 1.15 – 3 OSI (Open System Interconnection) & TCP/IP</strong></p>
<ul>
<li>Introduction to OSI or Layered Structure mode006C</li>
<li>Data encapsulation & De-encapsulation Process</li>
<li>PDU form of Data at each layer</li>
<li>Role of OSI layers</li>
<li>Application</li>
<li>Presentation</li>
<li>Session</li>
<li>Transport</li>
<li>Network</li>
<li>Data llnk</li>
<li>Physical</li>
<li>Introduction of Protocols & Network Devices per</li>
<li>layer</li>
<li>OSI peer to peer communication diagram</li>
<li>OSI Vs TCP/IP</li>
<li>TCP/IP Layers</li>
</ul>