CISCO PACKAGES

  • Eligibility
    1. candidate should have 60% through out his/her academics
    2. should have good communication skills
  • Topics

    1. CCNA Syllabus
      • Internetworking
        1. Internetworking Basic
        2. Internetworking Models
        3. The OSI Reference Model
        4. Ethernet Networking
        5. Ethernet Cabling
        6. Data Encapsulation
        7. The Cisco Three-Layer Hierarchical Model
      • Introduction to TCP/IP
        1. TCP/IP and the DoD Model
        2. IP Addressing
        3. Broadcast Address
      • Subnetting, Variable Length Subnet Masks (VLSMs), and Troubleshooting TCP/IP
        1. Subnetting Basics
        2. Variable Length Subnet Masks (VLSMs)
        3. Summarization
        4. Troubleshooting IP Addressing
      • Cisco’s Internetworking Operating System (IOS) and Security Device Manager (SDM)
        1. The IOS User Interface
        2. Command-Line Interface
        3. Router and Switch Administrative Configurations
        4. Cisco’s Security Device Manager (SDM)
      • Managing a Cisco Internetwork
        1. The Internal Components of a Cisco Router
        2. The Router Boot Sequence
        3. Managing Configuration Register
        4. Backing up and Restoring the Cisco IOS
        5. Backing Up and Restoring the Cisco Configuration
        6. Using Cisco Discovery Protocols (CDP)
        7. Using Telnet
        8. Using Telnet
        9. Checking Network Connectivity and Troubleshooting
      • IP Routing
        1. Routing Basics
        2. The IP Routing Process
        3. Configuring IP Routing in Our Network
        4. Dynamic Routing
        5. Distance-Vector Routing Protocols
        6. Routing Information Protocol (RIP)
        7. Inferior Gateway Routing Protocol (IGRP)
        8. Verifying your Configuration
      • Enhanced IGRP (EIGRP) and Open Shortest Path First (OSPF)
        1. EIGRP Features and Operation
        2. Using EIGRP to Support Large Networks
        3. Configuring EIGRP
        4. Load Balancing with EIGRP
        5. Verifying EIGRP
        6. Open Shortest Path First (OSPF) Basics
        7. Configuring OSPF
        8. Verifying OSPF Configuration
        9. OSPF DR and BDR Elections
        10. OSPF and Loopback Interfaces
        11. Troubleshooting OSPF
        12. Configuring EIGRP and OSPF Summary Routes
      • Layer 2 Switching and Spanning Tree Protocol (STP)
        1. Before Layer 2 Switching
        2. Before Layer 2 Switching
        3. Spanning Tree Protocol (STP)
        4. Configuring Catalyst Switches
        5. Cisco Network Assistant
      • Virtual LANs (VLANs)
        1. VLAN Basics
        2. VLAN Memberships
        3. Identifying VLANs
        4. VLAN Trunking Protocol (VTP)
        5. Routing between VLANs
        6. Configuring VLANs
        7. Configuring VTP
        8. Telephony Configuring Voice VLANs
        9. Using the CAN to Configure VLANs and Inter-VLAN Routing
      • Security
        1. Perimeter, Firewall and Internal Routers
        2. Recognizing Security Threats
        3. Mitigating Security Threats
        4. Introduction to Access Lists
        5. Standard Access Lists
        6. Extended Access Lists
        7. Advanced Access Lists
        8. Monitoring Access Lists
        9. Configuring Access Lists Using SDM
      • Network Address Translation (NAT)
        1. When Do We Use NAT?
        2. Types of Network Address Translation
        3. NAT Names
        4. How NAT Works
        5. Testing and Troubleshooting NAT
        6. Configuring NAT on Our Internetwork
        7. Configuring NAT Using SDM
      • Cisco’s Wireless Technologies
        1. Introduction to Wireless Technology
        2. Ciscos Unified Wireless Solution
        3. Configuring Our Wireless Internetwork
      • Internet Protocol Version 6 (IPv6)
        1. Why Do We Need IPv6
        2. The Benefits and Uses of IPv6
        3. IPv6 Addressing and Expressions
        4. How IPv6 Works in an Internetwork
        5. IPv6 Routing Protocols
        6. Migrating to IPv6
        7. Configuring IPv6 on Our Internetwork
      • Wide Area Networks
        1. Cable and DSL
        2. Cabling the Serial Wide Area Network
        3. High-Level Data-Link Control (HDLC) Protocol
        4. Point-to-Point Protocol (PPP)
        5. Frame Relay
        6. Using SDM for WAN Connections
        7. Virtual Private Networks
    1. CCNP Syllabus

        ROUTE

      • Implement an EIGRP based solution, given a network design and a set of requirements
        1. Determine network resources needed for implementing OSPF on a network
        2. Create an OSPF implementation plan
        3. Create an OSPF verification plan
        4. Configure OSPF routing
        5. Verify OSPF solution was implemented properly using show and debug commands
        6. Document the verification results for an OSPF implementation plan
      • Implement a multi-area OSPF Network, given a network design and a set of requirements
        1. Personal Computer Operating Systems
        2. Windows User Interface Components
        3. Windows File System Management
        4. Windows System Management Tools
      • Implement an eBGP based solution, given a network design and a set of requirements
        1. Determine network resources needed for implementing eBGP on a network
        2. Create an eBGP implementation plan
        3. Create an eBGP verification plan
        4. Configure eBGP routing
        5. Verify eBGP solution was implemented properly using show and debug commands
        6. Document verification results for an eBGP implementation plan
      • Implement an IPv6 based solution, given a network design and a set of requirements
        1. Determine network resources needed for implementing IPv6 on a network
        2. Create an IPv6 implementation plan
        3. Create an IPv6 verification plan
        4. Configure IPv6 routing
        5. Configure IPv6 interoperation with IPv4
        6. Verify IPv6 solution was implemented properly using show and debug commands
        7. Document verification results for an IPv6 implementation plan
      • Implement an IPv4 or IPv6 based redistribution solution, given a network design and a set of requirements
        1. Create a redistribution implementation plan based upon the results from a redistribution analysis
        2. Create a redistribution verification plan
        3. Configure a redistribution solution
        4. Verify that a redistribution was implemented
        5. Document results of a redistribution implementation and verification plan
        6. Identify the differences between implementing an IPv4 and IPv6 redistribution solution
      • Implement Layer 3 Path Control Solution
        1. Create a Layer 3 path control implementation plan based upon the results of the redistribution analysis
        2. Create a Layer 3 path control verification plan
        3. Configure Layer 3 path control
        4. Verify that a Layer 3 path control was implemented
        5. Document results of a Layer 3 path control implementation and verification plan
        6. Implement basic teleworker and branch services
        7. Describe broadband technologies
        8. Configure basic broadband connections
        9. Describe basic VPN technologies
        10. Configure GRE
        11. Describe branch access technologies
      • SWITCH

      • Implement VLAN based solution, given a network design and a set of requirements
        1. Determine network resources needed for implementing a VLAN based solution on a network
        2. Create a VLAN based implementation plan
        3. Create a VLAN based verification plan
        4. Configure switch-to-switch connectivity for the VLAN based solution
        5. Configure loop prevention for the VLAN based solution
        6. Configure Access Ports for the VLAN based solution
        7. Verify the VLAN based solution was implemented properly using show and debug commands
        8. Document the verification after implementing a VLAN solution
      • Implement a Security Extension of a Layer 2 solution, given a network design and a set of requirements
        1. Determine network resources needed for implementing a Security solution
        2. Create a implementation plan for the Security solution
        3. Create a verification plan for the Security solution
        4. Configure port security features
        5. Configure general switch security features
        6. Configure private VLANs
        7. Configure VACL and PACL
        8. Verify the Security based solution was implemented properly using show and debug commands
        9. Document the verification results after implementing a Security solution
      • Implement Switch based Layer 3 services, given a network design and a set of requirements
        1. Determine network resources needed for implementing a Switch based Layer 3 solution
        2. Create an implementation plan for the Switch based Layer 3 solution
        3. Create a verification plan for the Switch based Layer 3 solution
        4. Configure routing interfaces
        5. Configure Layer 3 Security
        6. Verify the Switch based Layer 3 solution was implemented properly using show and debug commands
        7. Document the verification results after implementing a Switch based Layer 3 solution
      • Prepare infrastructure to support advanced services
        1. Implement a Wireless Extension of a Layer 2 solutions
        2. Implement a VoIP support solution
        3. Implement video support solution
      • Implement High Availability, given a network design and a set of requirements
        1. Determine network resources needed for implementing High Availability on a network
        2. Create a High Availability implementation plan
        3. Create a High Availability verification plan
        4. Implement first hop redundancy protocols
        5. Implement switch supervisor redundancy
        6. Verify High Availability solution was implemented properly using show and debug commands
        7. Document results of High Availability implementation and verification
      • TSHOOT

      • Maintain and monitor network performance
        1. Develop a plan to monitor and manage a network
        2. Perform network monitoring using IOS tools
        3. Perform routine IOS device maintenance
        4. Isolate sub-optimal internetwork operation at the correctly defined OSI Model layer
      • Troubleshoot Multi Protocol system networks
        1. Troubleshoot EIGRP
        2. Troubleshoot OSPF
        3. Troubleshoot eBGP
        4. Troubleshoot routing redistribution solution
        5. Troubleshoot a DHCP client and server solution
        6. Troubleshoot NAT
        7. Troubleshoot first hop redundancy protocols
        8. Troubleshoot IPv6 routing
        9. Troubleshoot IPv6 and IPv4 interoperability
        10. Troubleshoot switch-to-switch connectivity for the VLAN based solution
        11. Troubleshoot loop prevention for the VLAN based solution
        12. Troubleshoot Access Ports for the VLAN based solution
        13. Troubleshoot private VLANS
        14. Troubleshoot port security
        15. Troubleshoot general switch security
        16. Troubleshoot VACLs and PACLs
        17. Troubleshoot switch virtual interfaces (SVIs)
        18. Troubleshoot switch supervisor redundancy
        19. Troubleshoot switch support of advanced services (i.e., Wireless, VOIP and Video)
        20. Troubleshoot a VoIP support solution
        21. Troubleshoot a video support solution
        22. Troubleshoot Layer 3 Security
        23. Troubleshoot issues related to ACLs used to secure access to Cisco routers
        24. Troubleshoot configuration issues related to accessing the AAA server for authentication purposes
        25. Troubleshoot security issues related to IOS services (i.e.,finger, NTP, HTTP, FTP, RCP etc.)
    1. CWNA Syllabus
      • Introduction to WLAN Standards
        1. Discussion of protocol standards and compliance
        2. Overview of 802.11 standard and amendments
        3. Discussion of additional networking standards
        4. Regulatory domains and their impact
      • Radio Frequency (RF) Fundamentals
        1. RF propagation
        2. Properties of RF waves
        3. Types of power loss and environmental impact on radio waves
        4. Spread spectrum, modulation, and coding
        5. Channels and bandwidth
      • Antennas
        1. Antenna fundamentals
        2. Polarization and gain
        3. Types of WLAN antennas
        4. Antenna systems
        5. Antenna implementation and safety
        6. Antenna systems
        7. Antenna systems
        8. RF cables, connectors, and accessories
      • RF Math
        1. RF units of measurement
        2. Basic RF math
        3. RF signal measurements
        4. Link budgets
      • Regulatory Domains
        1. Regulatory domains
        2. Regulatory bodies and frequency bands
        3. Output power rules and examples
      • WLAN Operation
        1. Basic WLAN hardware
        2. Basic operating modes
        3. WLAN hardware
        4. WLAN connectivity
        5. Wireless Network Management Systems (WNMS)
      • Power over Ethernet (PoE))
        1. PoE device types
        2. Power delivery
        3. Planning for PoE
        4. PoE standards
      • 802.11 Service Sets
        1. Service set types
        2. Authentication and association
        3. Network infrastructure
        4. Roaming within a WLAN
        5. Load-balancing
      • Basic WLAN Analysis
        1. Protocol analysis
        2. 802.11 frame types
        3. Protection mechanisms
        4. Power saving operations
        5. Transmission rates
      • Coordinating Frame Transmissions
        1. Introducing CSMA/CA
        2. Distributed Coordination Function (DCF)
        3. WLAN QoS
      • Modern 802.11 PHYs
        1. HT (802.11n) PHY and MAC layer enhancements
        2. MIMO and SISO systems
        3. HT coexistence mechanisms
        4. HT integration and deployment
        5. HT site surveying and analysis
        6. VHT (802.11ac PHY and MAC layer enhancements
      • Basic Site Surveying
        1. RF site survey defined
        2. Gathering information and resources
        3. Spectrum analysis for site surveys
        4. Site survey types
        5. Survey considerations
        6. Survey deliverables
      • Basic Security
        1. Importance of WLAN security
        2. Security policy
        3. Legacy WLAN security mechanisms
        4. Modern WLAN security mechanisms
        5. Baseline WLAN security practices
      • Modern Challenges (BYOD and Guest Access)
        1. Mobile Device Management (MDM)
        2. Bring Your Own Device (BYOD)
        3. Guest access
        4. High density basics

    Benefits of cisco course

      1. students will be getting government authorized certificate and will be valid worldwide
      2. Sharp Mind Info Train provides excellent coaching for the students who are looking to build high career goals.

      3. Sharp Mind not only provides professional teachers but also the necessary material required for the students and takes them to the next level of knowledge.

      4. The institute helps to gain fresh perspectives on your personal challenges and opportunities.

      5. In the era of cut-throat competition, there is huge competition in all the fields. Our institute makes the way for you easy by teaching all the new technologies to be a good competitor and ease your way to reach your goals.

      6. We provide competitive environment to you to make you more and more stable technically with all the best skills.

      7. We have company environment.

      8. All the courses available here are cost effective. The institute also provides 100% career assistance.

  • <