•   Networking Beginner
      • Networking

        • Lecture 1 – Network Theory
          Networking Terminology
          Network Categories
          Standard Network Models
          Physical Network Topologies
          Logical Network Topologies
        • Lecture  2 – Network Communications Methods
          Data Transmission Methods
          Media Access Methods
          Signaling Methods
        • Lecture  3 – Network Media and Hardware
          Bounded Network Media
          Unbounded Network Media
          Noise Control
          Network Connectivity Devices
        • Lecture  4 – Network Implementations
          Ethernet Networks
          Wireless Networks
        • Lecture 5 – Networking Models
          The OSI Model
          The TCP/IP Model
        • Lecture  6 – TCP/IP Addressing and Data Delivery
          The TCP/IP Protocol Suite
          IP Addressing
          Default IP Addressing Schemes
          Create Custom IP Addressing Schemes
          Implement IPv6 Addresses
          Delivery Techniques
        • Lecture  7 – TCP/IP Services
          Assign IP Addresses
          Domain Naming Services
          TCP/IP Commands
          Common TCP/IP Protocols
          TCP/IP Interoperability Services
        • Lecture  8 – LAN Infrastructure
          Enable Static Routing
          Implement Dynamic IP Routing
          Virtual LANs
          Plan a SOHO Network
        • Lecture  9 – WAN Infrastructure
          WAN Transmission Technologies
          WAN Connectivity Methods
          Voice over Data Transmission
        • Lecture  10 – Remote Networking
          Remote Network Architectures
          Remote Access Networking Implementations
          Virtual Private Networking
          VPN Protocols
        • Lecture  11 – System Security
          Computer Security Basics
          System Security Tools
          Authentication Methods
          Encryption Methods
        • Lecture  12 – Network Security
          Network Perimeter Security
          Intrusion Detection and Prevention
          Protect Network Traffic Using IPSec
        •  Lecture 13 – Network Security Threats and Attacks
          Network-Based Security Threats and Attacks
          Apply Threat Mitigation Techniques
          Educate Users
        •  Lecture 14 – Network Management
          Network Monitoring
          Configuration Management Documentation
          Network Performance Optimization
        • Lecture  15 – Network Troubleshooting
          Network Troubleshooting Models
          Network Troubleshooting Utilities
          Hardware Troubleshooting Tools
          Common Connectivity Issues
        Fee: 8,000 Tk
        Duration: 3 Month
        Prereqisite: Basic Computer