Prerequisites
To apply for the VAPT Training, you need to either:
- You should have a basic understanding of computer networking concepts like TCP/IP, DNS and firewalls
- You should have a basic understanding of Operating systems like Windows & Linux
- You should have a basic understanding of security concepts like access control, encryption and authentication
- You should also be familiar with at least one programming language like Java, Ruby or Python.
Course Curriculum
Module 1: Explain the role and function of network components
- Routers
- L2 and L3 switches
- Next-generation firewalls and IPS
- Access points 1.1.e Controllers (Cisco DNA Center and WLC)
- Endpoints 1.1.g Servers
Module 2: Describe characteristics of network topology architectures
- 2 tier
- 3 tier
- Spine-leaf
- WAN
- Small office/home office (SOHO) 1
- On-premises and cloud
Module 3: Identify interface and cable issues
- collisions,
- errors,
- mismatch duplex, and/or speed
Module 4: Compare physical interface and cabling types
- Single-mode fiber, multimode fiber, copper
- Connections (Ethernet shared media and point-to-point)
- Concepts of PoE
Module 5: Compare TCP to UDP
- Learn TCP and UDP
- Compare them
Module 6: Configure and verify IPv4 addressing and subnetting
- Learn about configure and IPv4 addressing
- Subnetting
Module 7: Describe the need for private IPv4 addressing
- Need of private IPv4 addressing
Module 8: Configure and verify IPv6 addressing and prefix
- Configure and verify IPv6 addressing
Module 9: Compare IPv6 address types
- Global unicast
- Unique local
- Link local
- Anycast
- Multicast
- Modified EUI 64
Module 10: Verify IP parameters for Client OS (Windows, Mac OS, Linux)
- Verifying IP parameters for different OS
Module 11: Describe wireless principles
- Nonoverlapping Wi-Fi channels
- SSID
- RF
- Encryption
Module 12: Explain virtualization fundamentals (virtual machines)
- Learn about virtual machine fundamentals
Module 13: Describe switching concepts
- MAC learning and aging
- Frame switching
- Frame flooding
- MAC address table
Module 14: Configure and verify VLANs (normal range) spanning multiple switches
- Access ports (data and voice)
- Default VLAN
- Connectivity
Module 15: Configure and verify interswitch connectivity
- Trunk ports
- 802.1Q
- Native VLAN
Module16: Configure and verify (Layer 2/Layer 3) EtherChannel (LACP)
- Configure and verify (Layer 2/Layer 3) EtherChannel (LACP)
Module 17: Configure and verify Layer 2 discovery protocols (Cisco Discovery Protocol and LLDP)
- Configure and verify Layer 2 discovery protocols
Module 18: Describe the need for and basic operations of Rapid PVST+ Spanning Tree Protocol and identify basic operations
- Root port, root bridge (primary/secondary), and other port names
- Port states (forwarding/blocking)
- PortFast benefits
Module 19: Compare Cisco Wireless Architectures and AP modes
- Compare Cisco Wireless Architectures and AP modes
Module 20: Describe physical infrastructure connections of WLAN components (AP, WLC, access/trunk ports, and LAG)
- WLAN components
Module 21: Describe AP and WLC management access connections (Telnet, SSH, HTTP, HTTPS, console, and TACACS+/RADIUS)
- AP and WLC management access connections
Module 22: Configure the components of a wireless LAN access for client connectivity using GUI
- WLAN creation,
- security settings,
- QoS profiles, and advanced WLAN settings
Module 23: Interpret the components of routing table
- Routing protocol code
- Prefix
- Network mask
- Next hop
- Administrative distance
- Metric
- Gateway of last resort
Module 24: Configure and verify IPv4 and IPv6 static routing
- Default route
- Network route
- Host route
- Floating static
Module 25: Determine how a router makes a forwarding decision by default
- Longest match
- Administrative distance
- Routing protocol metric
Module 26: Configure and verify single area OSPFv2
- Neighbor adjacencies
- Point-to-point
- Broadcast (DR/BDR selection)
- Router ID
Module 27: Describe the purpose of first hop redundancy protocol
- Hop redundancy protocol
Module 28: Configure and verify inside source NAT using static and pools
- Learn about NAT
Module 29: Configure and verify NTP operating in a client and server mode
- NTP operating in client and server mode
Module 30: Explain the role of DHCP and DNS within the network
- DHCP and DNS
Module 31: Explain the function of SNMP in network operations
- Function of SNMP
Module 32: Describe the use of syslog features including facilities and levels
- Syslog features
Module 33: Explain the forwarding per-hop behavior (PHB) for QoS
- Classification,
- marking,
- queuing,
- congestion,
- policing,
- shaping
Module 34: Configure and verify DHCP client and relay
- Verifying the DHCP client
Module 35: Configure network devices for remote access using SSH
- Learn about SSH
Module 36: Describe the capabilities and function of TFTP/FTP in the network
- Functioning of TFTP and FTP in the network
Module 37: Define key security concepts
- threats,
- vulnerabilities,
- exploits, and mitigation techniques
Module 38: Describe security program elements
- user awareness, training, and physical access control
Module 39: Configure device access control using local passwords
- Configure device access control using local passwords
Module 40: Describe security password policies elements
- Management, complexity, and password alternatives
- Multi Factor authentication, certificates, and biometrics
Module 41: Describe remote access and site-to-site VPNs
- Describe remote access and site-to-site VPNs
Module 42: Configure and verify access control lists
- Configure and verify access control lists
Module 43: Configure Layer 2 security features
- DHCP snooping,
- dynamic ARP inspection, and port security
Module 44: Differentiate authentication, authorization, and accounting concepts
- authentication, authorization, and accounting
Module 45: Describe wireless security protocols
- WPA, WPA2, and WPA3
Module 46: Configure WLAN using WPA2 PSK using the GUI
- Configure WLAN using WPA2 PSK
Module 47: Compare traditional networks with controller-based networking
- Compare traditional networks with controller-based networking
Module 48: Explain how automation impacts network management
- Learn how automation impacts network management
Module 49: Describe controller-based and software defined architectures (overlay, underlay, and fabric)
- Separation of control plane and data plane
- North-bound and south-bound APIs
Module 50: Compare traditional campus device management with Cisco DNA Center enabled device management
- Comparison between the traditional campus device management with cisco DNA center enabled device management
Module 51: Describe characteristics of REST-based APIs
- CRUD, HTTP verbs, and data encoding
Module 52:Capabilities of configuration management mechanisms
- Learn about the key functioning of Puppet, Chef, and Ansible
Module 53: Conclusion
- Summarize all the points discussed.