Saturday, March 8, 2014

CCNA Topics 2013 - Exam 200-120

CCNA Topics 2013 - Exam 200-120


IP Data Networks
  • Understand the operation of data networks.
  • Know the purpose and functions of network devices such as routers, switches, bridges and hubs.
  • Be able to select components to meet a specific network requirement.
  • Understand how certain applications can impact network performance.
  • Know the protocols, purpose and operation of both the OSI and TCP/IP models.
  • Describe the data flow between two hosts on a network
  • Be able to choose the most appropriate cables, media, ports and connectors to connect network devices and hosts to a LAN.
LAN Switching
  • Understand the media access control method for Ethernet.
  • Describe the basic switching concepts and the operation of switches.
  • Configure and verify switch configuration including remote access management.
  • Verify a network and switch operation using basic utilities such as ping, telnet and SSH.
  • Describe VLANs and the need for routing between VLANs.
  • Understand network segmentation and traffic management.
  • Be able to configure and verify VLANs.
  • Configure and verify trunking on Cisco switches.
  • Understand advanced switching technologies:
    • RSTP
    • PVSTP
    • EtherChannel
  • Be able to configure and verify PVSTP operation.
  • Describe the process of root bridge election.
IP Addressing (IPv4 and IPv6)
  • Describe the need for public and private addresses for IPv4.
  • Understand IPv6 addresses.
  • Describe the appropriate IPv6 addressing scheme for a LAN/WAN environment.
  • Describe the appropriate IPv4 addressing scheme for a LAN/WAN environment, including VLSM and summarization.
  • Describe the technologies required to run IPv6 and IPv4 concurrently such as dual stack.
IP Routing
  • Understand the basic routing concepts.
  • Understand the boot process of a Cisco router.
  • Configure and verify a basic router configuration using the command line interface.
  • Configure and verify both serial and Ethernet interfaces.
  • Be able to verify the network connectivity and configuration of a router.
  • Configure a static or default route given specific requirements, then verify.
  • Manage Cisco IOS files and image(s).
  • Understand Cisco IOS licensing.
  • Understand and distinguish different methods of routing and routing protocols.
  • Configure and verify EIGRP in a single autonomous system.
  • Configure and verify OSPF (v2 and v3) in a single area.
  • Configure and verify interVLAN routing using router-on-a-stick.
  • Be able to configure SVI interfaces.
IP Services
  • Configure and verify DHCP on a Cisco router.
  • Understand the features and applications of each type of ACL.
  • Be able to configure and verify ACLs.
  • Understand the basic operation of NAT.
  • Configure and verify NAT based on a set of network requirements.
  • Be able to configure and verify NTP as a client.
  • Recognize high availability FHRP.
  • Understand, configure and verify Syslog and utilize Syslog output.
  • Understand SNMP v2 and v3.
Network Device Security
  • Be able to configure and verify device security features.
  • Understand, configure and verify switch port security features.
  • Configure and verify ACLs for filtering network traffic.
  • Limit telnet and SSH access to a router by configuring ACLs.
Troubleshooting
  • Troubleshoot and correct common issues concerning IP addressing and host configurations.
  • Be able to utilize netflow and monitor data.
  • Troubleshoot and fix spanning tree operation.
  • Troubleshoot and resolve routing issues, including OSPF, and EIGRP.
  • Troubleshoot and correct VLAN problems.
  • Identify and resolve interVLAN problems.
  • Troubleshoot and resolve switch trunking issues.
  • Troubleshoot and fix ACL problems.
  • Troubleshoot and correct layer 1 problems.
  • Troubleshoot and correct WAN issues.
  • Troubleshoot EtherChannel issues.
WAN Technologies
  • Understand and identify different WAN technologies including:
    • Metro Ethernet
    • Frame Relay
    • VSAT
    • Cellular 3G and 4G
    • MPLS
    • T1/E1
    • ISDN
    • DSL
    • Cable
    • VPN
  • Configure and verify a serial WAN connection.
  • Configure Frame Relay on Cisco routers including verification.
  • Be able to configure and verify a PPP connection between two Cisco routers.
  • Configure and troubleshoot PPPoE.

Saturday, February 1, 2014

SEO Syllabus 2014


TYPES OF SEARCH ENGINE OPTIMIZATION
  1. On Page Optimization
  2. Off page Optimization
  3. ON PAGE OPTIMIZATION

SEO ON PAGE OPTIMIZATION TOOLS

  1. Competitors Analysis
  2. Keyword Research
  3. Keyword Placement
  4. Title Creation
  5. Meta Tag Creation
  6. Meta Description Creation
  7. Content Optimization
  8. Keyword Density
  9. URL Structure Analysis
  10. Content Creation
  11. Image Optimization
  12. Sitemap Creation
  13. Use of robots.txt
  14. Doorway Pages
  15. Invisible Text
  16. Cloaking

SEO OFF PAGE OPTIMIZATION
 

SEO Off Page Optimization tools
  1. Search Engine Submission
  2. Directory Submission
  3. Article Submission
  4. Press Release submission
  5. Forums Posting
  6. Link Building
  7. One-Way
  8. Two-Way / Reciprocal / Link Exchange
  9. Three-Way
  10. Blogs
  11. Blogs Creation
  12. Blogs submission
  13. Blogs Commenting
  14. Posting Free Classifieds
  15. Google Mapping/Listing
  16. Social Book marking
  17. RSS feeds
  18. Video optimization
  19. Link Building
  20. BLACK HAT / WHITE HAT / GREY HAT

SEO TOOLS

  1. Google Keyword Tool
  2. Word Tracker
  3. Keyword Spy
  4. Keywords Position Checker
  5. Keyword Density Checker
  6. Google Analytics
  7. Stats Counter

SEO REPORTING

Thursday, January 30, 2014

CheckPoint Firewall Exam Topics (Syllabus 2014)


Installation
Standalone installation
Distributed installation
Primary and Secondary installation
Rule base, Objects and Smart view tracker.

Network Address Translation
Configuring Hide mode or Dynamic NAT
Configuring Static NAT Configuring Manual NAT

Cryptography
Symmetric Key Cryptography
Asymmetric Key Cryptography
Public Key Infrastructure, Public and Private Keys
Encryption and Decryption Message Digest, Hashing Algorithm
Digital Signature
Authentication, Integrity and Non-repudiation
Diffie Helman Key exchange

Authentication
Kerberos
User Authentication
Client Authentication
Session Authentication
Partially automatic/ Fully automatic authentication

CheckPoint Smart Defense
Tracking and alerting
TCP/IP 3 way handshake
SYN Defender
SYN Relay
Passive SYN Defender

VPN
VPN Fundamentals
Creating VPN tunnels
Internet Key Exchange (IKE)
ISAKMP Phase 1 (SA Negotiation)
IPSec Phase 2 (SA Negotiation)
AH and ESP headers
Site to Site VPN using Pre-shared secret
Site to Site VPN using Certificate Authority
Site to Site VPN (Secure Remote)

Content Security
Security Servers on the Firewall
SMTP, HTTP and FTP traffic security
The Content Vectoring Protocol (CVP Server)
The URL Filtering Protocol (UFP Server)
Filtering with UFP Server
Filtering with CVP server

Miscellaneous
Light weight Directory Access Protocol
Load Balancing alogirthms
Clustering of Firewall for Redundancy (Failover)