Korattur, Chennai-80
+91 9952792938
sundar@thereceptacle.com
Batches | Regular | Weekend | Fast Track |
---|---|---|---|
Duration | 40-45 Days | 8 Weekend | 15 Days |
Hours Per Day | 2 Hours | 6 Hours | 5 Hours |
Demo Class | Yes - 2 Days | Yes - 1 Weekend | Yes - 1 Day |
001 OSI Layers Ports & Protocols A Tale of Two Kings
002 OSI Layers Ports & Protocols The 7 Layers of the OSI Model
003 OSI Layers Ports & Protocols TCPIP Suite Layers
004 OSI Layers Ports & Protocols Core TCPIP Protocols
005 OSI Layers Ports & Protocols Wireshark Views of Core TCPIP Protocols
006 OSI Layers Ports & Protocols How Ports Are Used in TCPIP
007 OSI Layers Ports & Protocols Verifying L4 Ports with Wireshark
008 OSI Layers Ports & Protocols Common Protocols and Their Well-known Ports
009 OSI Layers Ports & Protocols TCP's Three-way Handshake
010 OSI Layers Ports & Protocols Wireshark Verification of a TCP 3-Way Handshake
011 Ethernet Switching Properties of Network Traffic
012 Ethernet Switching Layer 2 Ethernet Addresses
013 Ethernet Switching How a Layer 2 Switch Works
014 Ethernet Switching Demonstration Switch Dynamic Learning
015 Ethernet Switching Understanding VLANs
016 Ethernet Switching Configuring a VLAN
017 Ethernet Switching Overview of 802.1Q and Trunks
018 Ethernet Switching Configuring an 802.1Q Ethernet Trunk
019 Ethernet Switching How Address Resolution Protocol (ARP) Operates
020 Ethernet Switching Predicting the MAC Address Table
021 Ethernet Switching Validating MAC Address Table Predictions
022 Ethernet Switching Game Predict MAC Table After PC1 Pings PC4
023 Ethernet Switching Game Predict MAC Table After PC3 Pings PC5
024 Ethernet Switching Switching Loops and Spanning Tree Protocol (STP)
025 Ethernet Switching STP Reacting to a Network Change
026 Ethernet Switching Design Considerations and PoE
027 Ethernet Switching Switch Port Mirroring
028 IP Routing and Forwarding Introduction to IP Routing
029 IP Routing and Forwarding How to Train a Router
030 IP Routing and Forwarding Options for Static Routes
031 IP Routing and Forwarding Configuring Static Routes
032 IP Routing and Forwarding Dynamic Routing Protocol Overview
033 IP Routing and Forwarding Dynamic Routing Protocol Demonstration
034 IP Routing and Forwarding Address Translation with PAT
035 IP Routing and Forwarding One-to-one Translations with NAT
036 IP Routing and Forwarding Using Wireshark to Verify IP Translations
037 IP Routing and Forwarding Access Control Lists
038 IP Routing and Forwarding ACL Demonstration
039 IP Routing and Forwarding Enterprise Network Forwarding
040 IP Addressing and Subnetting IPv4 Overview
041 IP Addressing and Subnetting Binary Basics
042 IP Addressing and Subnetting Converting Decimal to Binary
043 IP Addressing and Subnetting Converting Binary to Decimal
044 IP Addressing and Subnetting The IP Mask
045 IP Addressing and Subnetting Practice Using a Different IP Mask
046 IP Addressing and Subnetting Borrowing Host Bits
047 IP Addressing and Subnetting Practicing the Finger Game
048 IP Addressing and Subnetting Identifying New Subnets
049 IP Addressing and Subnetting Exercise 1 Identify the New Subnets
050 IP Addressing and Subnetting Exercise 2 Identify the New Subnets
051 IP Addressing and Subnetting ID Valid Host Addresses on a Subnet
052 IP Addressing and Subnetting Exercise 1 ID Valid Host Addresses
053 IP Addressing and Subnetting Exercise 2 ID Valid Host Addresses
054 IP Addressing and Subnetting Calculate the Number of Hosts per Subnet
055 IP Addressing and Subnetting Determine the Subnet Based on a Host's IP Address
056 IP Addressing and Subnetting Planning and Assigning IP Addresses
057 IP Addressing and Subnetting Test Your IPv4 Knowledge Lab
058 IP Addressing and Subnetting Identifying New Subnets
059 Network Topologies Wired Topologies
060 Network Topologies Wireless Topologies
061 Network Topologies Types of Networks
062 Network Topologies Introducing the Internet of Things (IoT)
063 Network Topologies Internet of Things (IoT) Technologies
064 Wireless Technologies and Configurations The Purpose of Wireless
065 Wireless Technologies and Configurations Understanding Radio Frequency
066 Wireless Technologies and Configurations Understanding Radio Channels
067 Wireless Technologies and Configurations Wireless Communication Technologies
068 Wireless Technologies and Configurations Designing for Wireless Speed and Coverage
069 Wireless Technologies and Configurations Understanding Wireless Antennas
070 Wireless Technologies and Configurations Wireless Performance Improvements
071 Cloud Concepts Types of Services
072 Cloud Concepts Cloud Delivery Models
073 Cloud Concepts Connectivity Methods
074 Cloud Concepts Security Implications Considerations
075 Cloud Concepts Local and Cloud Resource Relationships
076 Network Services DHCP Overview
077 Network Services Verify DHCP with Wireshark
078 Network Services DNS Overview
079 Network Services DNS Methods Records and Design Options
080 Network Services DNS Testing and Validation
081 Network Services Network Time Protocol (NTP)
082 Network Services IP Address Management (IPAM)
083 Deploying Appropriate Cabling Solutions Copper Network Media Types
084 Deploying Appropriate Cabling Solutions Fiber Network Media Types
085 Deploying Appropriate Cabling Solutions Network Termination Points
086 Deploying Appropriate Cabling Solutions Network Transceivers
087 Device Placement and Configuration Network Device Placement
088 Device Placement and Configuration Device Configuration Overview
089 Device Placement and Configuration Configure Switch Ports Lab
090 Device Placement and Configuration Configure IP Addresses Lab
091 Device Placement and Configuration Configure IP Routing Lab
092 Device Placement and Configuration Configuring DHCP Services Lab
093 Device Placement and Configuration Configuring a VLAN Interface Lab
094 Device Placement and Configuration Configuring NAT Lab
095 Advanced Networking Devices Multi-Layer Switch Overview
096 Advanced Networking Devices Configure Multi-Layer Switch Lab
097 Advanced Networking Devices Load Balancer Overview
098 Advanced Networking Devices IDS and IPS
099 Advanced Networking Devices Proxy Servers and Content Filtering
100 Advanced Networking Devices Security Network Devices
101 Advanced Networking Devices AAARADIUS Server
102 Advanced Networking Devices VoIP PBX and Gateway
103 Advanced Networking Devices Wireless Controller
104 Virtualization & Network Storage Hypervisor Introduction
105 Virtualization & Network Storage Virtual Networking Components
106 Virtualization & Network Storage Creating a Virtual Switch and VM Lab
107 Virtualization & Network Storage Network Storage
108 WAN Technologies Understanding the LAN MAN and WAN Difference
109 WAN Technologies WAN Transmission over Copper Fiber Wireless and Satellite
110 WAN Technologies WAN Types ISDNPRI T1-T3 E1-E3 and OC
111 WAN Technologies WAN Types Cable DSL Dial-up
112 WAN Technologies WAN Characteristics Frame Relay ATM MPLS and DMVPN
113 WAN Technologies What is PPP and PPPoE
114 WAN Technologies What is SIP Trunking
115 WAN Technologies The Physical Reality of a WAN Connection
116 Network Diagram & Documentation Network Documentation is Fun
117 Network Diagram & Documentation Creating Logical Network Diagrams
118 Network Diagram & Documentation Creating Physical Diagrams
119 Network Diagram & Documentation Naming Conventions and Labeling
120 Network Diagram & Documentation Documenting Wiring and Port Locations
121 Network Diagram & Documentation SOPs and Work Instructions
122 Network Diagram & Documentation Network Change Management
123 Network Diagram & Documentation Configuration and Monitoring Baselines
124 Network Diagram & Documentation Inventory Management
125 Business Continuity Availability Concepts
126 Business Continuity Load Sharing and Balancing
127 Business Continuity Power Management
128 Business Continuity Site Recovery Options
129 Business Continuity Backups
130 Business Continuity Backup and Restore Hands On Lab
131 Business Continuity MTTR and MTBF
132 Business Continuity SLA Requirements
133 Scanning Monitoring & Patching Scanning Overview
134 Scanning Monitoring & Patching Network Scanning Methodology
135 Scanning Monitoring & Patching Port Scanning and Discovery
136 Scanning Monitoring & Patching OS Discovery and Fingerprinting
137 Scanning Monitoring & Patching Motivators for Vulnerability Management
138 Scanning Monitoring & Patching Vulnerability Scanning
139 Scanning Monitoring & Patching Logging and Review
140 Scanning Monitoring & Patching Packet and Traffic Analysis
141 Scanning Monitoring & Patching Packet Capture and Analysis Lab
142 Scanning Monitoring & Patching Remediation and Patch Management
143 Scanning Monitoring & Patching Network Scanning with NMAP and Zenmap Lab
144 Scanning Monitoring & Patching Baselines
145 Remote Access Methods Telnet and SSH for CLI Remote Access
146 Remote Access Methods HTTPS Management URLs
147 Remote Access Methods VPNs
148 Remote Access Methods Remote Desktop Access
149 Remote Access Methods Out-of-Band Management
150 Identify Policies & Best Practices Privileged User Agreement
151 Identify Policies & Best Practices Password Policy
152 Identify Policies & Best Practices On-boarding and Off-boarding
153 Identify Policies & Best Practices Licensing Restrictions
154 Identify Policies & Best Practices International Export Controls
155 Identify Policies & Best Practices Data Loss Prevention
156 Identify Policies & Best Practices Remote Access Policies
157 Identify Policies & Best Practices Incident Response Policies
158 Identify Policies & Best Practices Bring Your Own Device (BYOD)
159 Identify Policies & Best Practices Acceptable Use Policy (AUP)
160 Identify Policies & Best Practices Non-disclosure Agreements (NDA)
161 Identify Policies & Best Practices System Life Cycle
162 Identify Policies & Best Practices Safety Procedures and Policies
163 Physical Security & Network Attacks Let's Break into a Data Center
164 Physical Security & Network Attacks Video Surveillance and Motion Detection
165 Physical Security & Network Attacks Badges and Smart Cards
166 Physical Security & Network Attacks Biometrics
167 Physical Security & Network Attacks Locks Asset Tags and Tamper Detection
168 Physical Security & Network Attacks DoS and PDoS (Permanent Denial of Service)
169 Physical Security & Network Attacks DDoS (Distributed Denial of Service)
170 Physical Security & Network Attacks DDoS with ICMP and Smurfing
171 Physical Security & Network Attacks DDoS with DNS and NTP
172 Physical Security & Network Attacks Let's Go Phishing
173 Physical Security & Network Attacks Social Engineering and Insider Threats
174 Physical Security & Network Attacks Ransomware and Scareware
175 Physical Security & Network Attacks Cryptolocker and Logic Bombs
176 Physical Security & Network Attacks DNS Spoofing (Poisoning)
177 Physical Security & Network Attacks Man-In-The-Middle with ARP Spoofing
178 Physical Security & Network Attacks Wardriving and Deauthentication
179 Physical Security & Network Attacks Evil Twins and Rogue Access Points
180 Authentication & Access Control AAA
181 Authentication & Access Control Multi-factor Authentication Overview
182 Authentication & Access Control Using Two-Factor Authentication (2FA)
183 Authentication & Access Control Demo Implementing 2FA
184 Authentication & Access Control Switch Port Security
185 Authentication & Access Control Access Control Methods
186 Basic Wireless Network Security The Wireless Security Evolution
187 Basic Wireless Network Security Wireless Authentication and Authorization Types
188 Mitigation Techniques Network Device Hardening
189 Mitigation Techniques Hardening a Windows Server System
190 Mitigation Techniques Signature Management
191 Mitigation Techniques File Integrity Monitoring
192 Mitigation Techniques Privileged User Accounts and Role Separation
193 Mitigation Techniques Network Segmentation
194 Mitigation Techniques Switch Port Protections
195 Mitigation Techniques The Native VLAN
196 Mitigation Techniques Filtering with Access Control Lists (ACLs)
197 Mitigation Techniques Honeypots and Honeynets
198 Mitigation Techniques Penetration Testing
199 Troubleshooting Methodology A Network Troubleshooting Methodology
200 Troubleshooting Methodology Identify the Problem
201 Troubleshooting Methodology Establish a Theory of Probable Cause
202 Troubleshooting Methodology Test the Theory to Determine the Root Cause
203 Troubleshooting Methodology Establish a Plan of Action to Solve the Problem
204 Troubleshooting Methodology Problem Solving Verification and Documentation
205 Network Troubleshooting Hardware Tools
206 Network Troubleshooting Software Tools
207 Network Troubleshooting Using CLI Network Tools ipconfig ping arp
208 Network Troubleshooting Using CLI Network Tools nslookup dig
209 Network Troubleshooting Using CLI Network Tools tracert pathping nmap route
210 Network Troubleshooting Using CLI Network Tools ifconfig iptables tcpdump and netstat
211 Wired Connectivity & Performance Issues Attenuation Latency and Jitter
212 Wired Connectivity & Performance Issues Crosstalk EMI OpenShort
213 Wired Connectivity & Performance Issues Incorrect Pin-Outs or Cable Types
214 Wired Connectivity & Performance Issues Mismatched and Damaged Cables
215 Wired Connectivity & Performance Issues Bad Ports and LED Status Indicators
216 Wired Connectivity & Performance Issues Duplex and Speed Mismatches
217 Wired Connectivity & Performance Issues VLAN Mismatches
218 Wired Connectivity & Performance Issues Native VLAN Mismatches
219 Wired Connectivity & Performance Issues Bottlenecks
220 Troubleshooting Wireless The Nature of Airwaves
221 Troubleshooting Wireless Fighting Frequencies
222 Troubleshooting Wireless Understanding Antenna Types
223 Troubleshooting Wireless Misconfigurations
224 Common Network Service Issues Troubleshooting Name Resolution
225 Common Network Service Issues Troubleshooting MAC Addressing
226 Common Network Service Issues Troubleshooting IP Addressing
227 Common Network Service Issues Troubleshooting Security Settings
228 Common Network Service Issues Troubleshooting Miscellaneous Service Issues