Skip to main content

Home

 

   Register Here    

 

 

Data Center Training 

 

 

New Trizons IT Dhaka offers Data Center Training, is designed to test a candidate’s understanding of the key components of data center. This certification & training addresses how to set up and improve key operations and maintenance aspects that are required to ensure high availability.

Who is this certification for?

Data Centre Training has been created with IT facility and data center operations professionals in mind. It is ideal for those who work in and around the data center and are responsible for improving availability and manageability.

 

   Data Center Training Summary course outline is given below:
1. Network Fundamentals
a. Explain the role and function of network components
i. Routers
ii. L2 and L3 switches
iii. Next-generation firewalls and IPS
iv. Access points
v. Controllers (Cisco DNA Center and WLC)
vi. Endpoints
vii. Servers
b. Describe characteristics of network topology architectures
i. 2 tier
ii. 3 tier
iii. Spine-leaf
iv. WAN
v. Small office/home office (SOHO)
vi. On-premises and cloud
2. Compare physical interface and cabling types
3. a Single-mode fiber, multimode fiber, copper
4. Connections (Ethernet shared media and point-to-point)
5. Concepts of PoE
6. Identify interface and cable issues (collisions, errors, mismatch duplex, and/or 
speed)
7. Compare TCP to UDP
8. Configure and verify IPv4 addressing and subnetting
9. Describe the need for private IPv4 addressing
10.Network Access
11. Configure and verify VLANs (normal range) spanning multiple switches
12. Access ports (data and voice)
13.Default VLAN
14. Connectivity
15. Configure and verify inters witch connectivity
Course Outline
Data Center Training
16. Trunk ports
17. 802.1Q
18.Native VLAN
19. Configure and verify Layer 2 discovery protocols (Cisco Discovery Protocol and 
LLDP)
20. Configure and verify (Layer 2/Layer 3) Ether Channel (LACP)
21.Describe the need for and basic operations of Rapid PVST+ Spanning Tree Protocol 
and identify basic operations
22. Root port, root bridge (primary/secondary), and other port names
23. Port states (forwarding/blocking)
24. Compare Cisco Wireless Architectures and AP modes
25.Describe physical infrastructure connections of WLAN components (AP, WLC, 
access/trunk ports, and LAG)
26.Describe AP and WLC management access connections (Telnet, SSH, HTTP, HTTPS, 
console, and TACACS+/RADIUS)
27. Configure the components of a wireless LAN access for client connectivity using GUI 
only such as WLAN creation, security settings, QoS profiles, and advanced WLAN 
settings
28. IP Connectivity
29. Interpret the components of routing table
30. Routing protocol code
31. Prefix
32.Network mask
33.Next hop
34. Administrative distance
35. Metric
36.Gateway of last resort
37.Determine how a router makes a forwarding decision by default
38. Longest match
39. Administrative distance
40. Routing protocol metric
41. Configure and verify IPv4 and IPv6 static routing
42.Default route
43.Network route
44.Host route
45. Floating static
46. Configure and verify single area OSPFv2
47.Neighbor adjacencies
48. Point-to-point
49. Broadcast (DR/BDR selection)
50. Router ID
51.Describe the purpose of first hop redundancy protocol
52. IP Services
53. Configure and verify inside source NAT using static and pools
54. Security Fundamentals
55.Define key security concepts (threats, vulnerabilities, exploits, and mitigation 
techniques)
56.Describe security program elements (user awareness, training, and physical access 
control)
57. Configure device access control using local passwords
58.Describe security password policies elements, such as management, complexity, 
and password alternatives (multifactor authentication, certificates, and biometrics)
59.Describe remote access and site-to-site VPNs
60. Configure and verify access control lists
61. Configure Layer 2 security features (DHCP snooping, dynamic ARP inspection, and 
port security)
62.Differentiate authentication, authorization, and accounting concepts
63.Describe wireless security protocols (WPA, WPA2, and WPA3)
64. Configure WLAN using WPA2 PSK using the GUI


MikroTik Configuration: 
• MikroTik Basic Configuration 
• DHCP Server Configuration 
• DHCP Client Configuration 
• Routing 
• Network Address Translation NAT 
• User & Group Configuration 
• Firewall Configuration 
• Bandwidth Management 
• Wireless Configuration 
• Bridge Configuration 


ASA Firewall: 
• Introduction to ASA Firewall Device. 
• ASA Firewall Basic configuration. Basic Commands.

 

Practical Hands-on-Lab Session

 

Talk to our Course Coordinator

   Register Here