Admission Requirements To be considered for admission into the RN to BSN program, candidates must meet the following criteria: Age Requirement: All applicants must be at least 18 years old. Applicants under 18 must have consent from a parent or legal guardian to gain admission to the school. Proof of Age: Applicants must provide proof of age by presenting a government-issued ID or birth certificate. Educational Background: All applicants must submit a copy of their GED, High School Diploma, or an equivalent qualification. If an applicant is unable to provide a High School Diploma or GED, a basic skills examination administered by the school will be required to assess the student’s readiness for training. Basic Skills Examination: The basic skills assessment, designed to verify the applicant's ability to read and write in English, consists of two tests: Reading for Technician: A minimum passing grade of 60 or higher is required. Writing for Technician: A minimum passing grade of 60 or higher is required. Degree-Level Admission Criterion: Applicants must have previously earned an Associate Degree in Nursing (ADN) or a Diploma in Nursing. A minimum of 120 credit hours is required to earn the Bachelor of Science in Nursing (BSN) degree, which includes: General Education Hours: A minimum of 30 credit hours. Core Nursing Courses: A minimum of 30 credit hours. Transferable Credit Hours: Up to 90 hours of prior college coursework may be transferred to the program, with a maximum of 75% of the total degree requirements. Acceptable Electives and Grades for Transfer: Electives: Students may transfer in acceptable electives that align with the nursing curriculum, such as courses in psychology, sociology, or health sciences. Grades: Only courses in which the student earned a grade of "C" or higher are eligible for transfer. Enrollment Advisory: Potential applicants are encouraged to consult with an academic advisor prior to enrollment to understand their commitment and financial obligations. During this visit, students will complete Potential applicants are encouraged to consult with an academic advisor prior to enrollment to understand their commitment and financial obligations. During this visit, students will complete an application and receive a copy of the school catalog. Campus Security: Dade Institute of Technology does not maintain a campus security or police force. Any criminal activity must be reported to the proper civil authorities. The Owner/Director or a designated staff member is responsible for contacting local or state law enforcement, fire, or medical personnel as needed in emergencies. All breaches of security, including theft or misconduct, are to be reported immediately to the Owner/Director or staff member. The importance of these policies will be emphasized during orientation to ensure a safe and secure learning environment. Previous Qualifications: Candidates must possess a valid and unencumbered Registered Nurse (RN) license. Educational Background: A minimum of an Associate Degree in Nursing (ADN) or a Diploma in Nursing is required. Applicants must also present documentation of completion of general education requirements that may include English, mathematics, and social sciences. Academic Performance: A cumulative GPA of 2.75 or higher on a 4.0 scale from all prior nursing education is preferred for admission. Admission Process: The admission process involves several steps: Application Submission: Interested candidates must complete and submit an application form along with all required documentation, including transcripts, proof of RN license, and any other relevant certifications. Assessment of Qualifications: The admissions committee will review applications to ensure that all requirements are met, including the minimum GPA and educational background. Interview: Selected applicants may be invited for an interview with faculty members to further discuss their qualifications and goals. Notification of Admission Status: Applicants will receive notification regarding their admission status via email within a specified timeframe, typically within two weeks of the application deadline. Enrollment: Accepted candidates must confirm their enrollment and complete any necessary pre-enrollment processes, including completing orientation and registering for classes. Expected Outcomes: Upon successful completion of the RN to BSN program, graduates are expected to: Demonstrate advanced clinical skills and competencies in a variety of healthcare settings, promoting safe and effective nursing practice. Utilize evidence-based practices in patient care, integrating research findings to improve patient outcomes and enhance nursing practices. Communicate effectively with patients, families, and healthcare teams to foster collaborative relationships that enhance care quality. Engage in critical thinking and problem-solving in complex healthcare situations, demonstrating leadership and decision-making skills within the nursing profession. Prepare for advanced roles in nursing, including management, education, and community health, by applying theoretical knowledge to real-world nursing challenges. Commit to lifelong learning and professional development by pursuing further education or certifications as needed in the evolving healthcare landscape. Program Length Total Contact Hours Program Cost Clock Hours n/a Theory Hours 450 Tuition $ 24,500.00 Credit Hours 30 Lab Hours Registration Fees $ 150.00 Weeks 52 SIM Lab Hours Books & Supplies $ 2,850.00 Clinical Hours Technology Fee $ 1,000.00 Materials Fee $ 1,500.00 Total Hours 450 Total Program Cost $ 30,000.00 Course Number Course Title Credit Hours Theory Hours Lab Hours Sim Lab Hours Clinical Hours NURS 2050 Transition to the professional Nursing Role 4 60 0 0 0 NURS 3150 Healthcare Informatics 3 45 0 0 0 NURS 3200 Health Promotion 4 60 0 0 0 NURS 3300 Concepts of Pathophysiology 4 60 0 0 0 NURS 4000 Science of Evidence-Based Practice 4 60 0 0 0 NURS 4150 Healthcare Policy and Economics in Nursing 4 60 0 0 0 NURS 4310 Leadership Immersion 3 45 0 0 0 NURS 4850 Capstone Course 4 60 30 0 0 Total Credit Hours for the RN-BSN Program 30 450 0 0 0 Program Objectives The Bachelor of Science in Nursing (RN to BSN) program is designed to provide qualified registered nurses with the opportunity to advance their education and enhance their professional nursing practice through a comprehensive curriculum that integrates theoretical knowledge with practical application. Program Description NURS 3050 Transition to the Professional Nursing Role. Focuses on the knowledge, competencies, skills, and abilities for transformation to the professional nurse role. This course
Troubleshooting and Maintaining Cisco IP Networks 2.0 Overview/Description Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) v2.0 is an instructor-led training course. TSHOOT is designed for network engineers with at least one year of professional work experience, who are ready to advance their skills and work independently on complex network solutions. Students will learn to plan and perform regular maintenance on complex enterprise routed and switched networks and use technology-based practices and a systematic ITIL-compliant approach to perform network troubleshooting. Prerequisites This course is to be taken following attendance in both ROUTE and SWITCH. Students who do not meet this prerequisite will find this material unnecessarily challenging. CCNA-level knowledge is expected of those who attend the TSHOOT course. Certification This course offers the official training for the Implementing TSHOOT 2.0 certification exam which is a component exam for the CCNP certification. Passing this exam will also refresh CCNA certification, which expires after three years. Exams 300-135 TSHOOT 2.0 Outline Troubleshooting and Maintaining Cisco IP Networks 2.0 Module 1: Tools and Methodologies of Troubleshooting Lesson 1: Describing Troubleshooting Methodologies Lesson 2: Using Troubleshooting Procedures Lesson 3: Following Recommended Practices During Routine Network Maintenance Lesson 4: Using Basic IOS Troubleshooting Tools Lesson 5: Using Specialized Troubleshooting Tools Module 2: Troubleshooting IPv4 and IPv4 Fundamentals Lesson 1: Troubleshooting IPv4 and IPv6 Addressing Lesson 2: Troubleshooting IPv4 and IPv6 Basic Routing Module 3: Troubleshooting Dynamic Routing Lesson 1: Troubleshooting OSPF Lesson 2: Troubleshooting EIGRP Lesson 3: Troubleshooting RIPv2 and RIPng Lesson 4: Troubleshooting Redistribution Lesson 5: Troubleshooting BGP Module 4: Troubleshooting Switching Lesson 1: Troubleshooting Layer 2 Switching Lesson 2: Troubleshooting InterVLAN Routing Lesson 3: Troubleshooting FHRP Module 5: Troubleshooting Security and Device Operation Lesson 1: Troubleshooting Security Lesson 2: Troubleshooting Router Features Included Labs Trouble Ticket 1 Trouble Ticket 2 Trouble Ticket 3 Trouble Ticket 4 Trouble Ticket 5 Trouble Ticket 6 Trouble Ticket 7 Trouble Ticket 8 Trouble Ticket 9 Trouble Ticket 10 Trouble Ticket 11 Trouble Ticket 12 Trouble Ticket 13 Trouble Ticket 14 Trouble Ticket 15 Trouble Ticket 16 Trouble Ticket 17 Trouble Ticket 18 Trouble Ticket 19 Trouble Ticket 20 Trouble Ticket 21 Trouble Ticket 22 Implementing Cisco IP Switched Networks 2.0 Overview/Description This is an advanced course on Cisco switching configuration. Upon completion of this course students will be able to configure and optimize a switched infrastructure using VLANS, STP, RSTP, MSTP, and HSRP. Additionally, students will be able to secure this switched infrastructure. Live training will focus on content within Modules 2-7. Students are expected to complete Module 1 by using the recorded training format. This recorded-only training section can be reviewed within the Encore format’s thorough coverage or your Live Session Homework (Live Session + Live Session Homework or Encore required for completion). This allows the Live sessions to focus on the most challenging and critical material. Additionally, DHCP coverage, Module 2 Lessons 3 and 4, will be taught following the completion of Module 3 so that it more logically flows within the content. Prerequisites Students attending this course should have a solid foundation in routing fundamentals, Cisco IOS basics, and Cisco routing basics. Attending the ICND1 and ICND2 classes or having the CCNA certification will fulfill these expectations. Certification This course offers the official training for the Implementing Cisco IP Switched Networks 2.0 certification exam which is a component exam for the CCNP and CCDP certifications. Passing this exam will also refresh CCNA certification, which expires after three years. Exams 300-115 SWITCH 2.0 Outline Implementing Cisco IP Switched Networks 2.0 Module 1: Basic Concepts and Network Design Lesson 1: Analyzing Campus Network Structure Lesson 2: Comparing Layer 2 and Multilayer Switches Lesson 3: Using Cisco SDM Templates Lesson 4: Implementing LLDP Lesson 5: Implementing PoE Module 2: Campus Network Architecture Lesson 1: Implementing VLANs and Trunks Lesson 2: Introducing VTP Lesson 3: Implementing DHCP Lesson 4: Implementing DHCP for IPv6 Lesson 5: Configuring Layer 2 Port Aggregation Module 3: Spanning Tree Implementation Lesson 1: Implementing RSTP Lesson 2: Implementing STP Stability Mechanisms Lesson 3: Implementing Multiple Spanning Tree Protocol Module 4: Configuring Inter-VLAN Routing Lesson 1: Implementing Inter-VLAN Routing Using a Router Lesson 2: Configuring a Switch to Route Module 5: Implementing High Availability Networks Lesson 1: Configuring Network Time Protocol Lesson 2: Implementing SNMP Version 3 Lesson 3: Implementing IP SLA Lesson 4: Implementing Port Mirroring for Monitoring Support Lesson 5: Verifying Switch Virtualization Module 6: First Hop Redundancy Implementation Lesson 1: Configuring Layer 3 Redundancy with HSRP Lesson 2: Configuring Layer 3 Redundancy with VRRP Lesson 3: Configuring Layer 3 Redundancy with GLBP Lesson 4: Configuring First Hop Redundancy for IPv6 Module 7: Campus Network Security Lesson 1: Implementing Port Security Lesson 2: Implementing Storm Control Lesson 3: Implementing Access to External Authentication Lesson 4: Mitigating Spoofing Attacks Lesson 5: Securing VLAN Trunks Lesson 6: Configuring Private VLANs Included Labs Verifying Connectivity Changing SDM Templates Enabling LLDP Creating VLANs Assigning Switchports to VLANs Configuring Trunks from ASW1 to DSW1 and DSW2 Configuring Trunks from ASW2 to DSW1 and DSW2 Configuring Trunks between DSW1 and DSW2 Modifying the Native VLAN on 802.1q trunks Controlling VLANs on Trunks Configuring Voice VLANs Configuring VTP Configuring Etherchannel Between DSW1 and DSW2 Modifying Etherchannel Load Balancing Algorithm Configuring Rapid Spanning Tree Protocol Manipulating STP Cost Manipulating STP Port Priority Enabling Portfast and BPDUGuard Enabling BPDUFilter and RootGuard Configuring Loop Guard and UDLD Configuring MSTP Manipulating MSTP Root Bridge and Port Cost Configuring InterVLAN Routing Creating SVIs Enabling IPv4 Routing on a MLS Creating Routed Ports on an MLS Enabling Routing Protocols on an MLS Configuring an MLS as a DHCPv4 Server Configuring Manual DHCPv4 Bindings Configuring an MLS as a DHCPv4 Relay Agent Configuring an MLS as a Stateless DHCPv6 Server Configuring NTP Configuring SNMPv3 Configuring IPSLA Configuring SPAN and RSPAN Configuring HSRP Configuring HSRP Interface Tracking Configuring VRRP Configuring GLBP Configuring Port Security Configuring Err-Disable Recovery Configuring Storm Control Configuring DHCP Snooping Configuring DAI Configuring IP Source Guard Configuring AAA Authentication Configuring 8021x
Personal time management skills are essential for professional & personal success in any area of life. Those able to successfully implement time management strategies are able to control their workload rather than spend each day in a frenzy of activity reacting to crisis after crisis.
Program Description Prepare the student to become a Cisco Certified Networking Engineer. It validates the ability to install, configure, operate, and troubleshoot medium-size routed and switched networks, including implementation and verification of connections to remote sites in a WAN. CCNA curriculum includes basic mitigation of security threats, introduction to wireless networking concepts and terminology, and performance-based skills. This new curriculum also includes (but is not limited to) the use of these protocols: IP, Enhanced Interior Gateway Routing Protocol (EIGRP), Serial Line Interface Protocol Frame Relay, Routing Information Protocol Version 2 (RIPv2),VLANs, Ethernet, access control lists (ACLs). A- Interconnecting Cisco Networking Devices (ICND1) Cisco Certified Entry-Level Network Technician (CCENT) 1- Network Fundamentals 1.1 Compare and contrast OSI and TCP/IP models 1.2 Compare and contrast TCP and UDP protocols 1.3 Describe the impact of infrastructure components in an enterprise network 1.3.a Firewalls 1.3.b Access points 1.3.c Wireless controllers1.5 Compare and contrast network topologies 1.4 Compare and contrast collapsed core and three-tier architectures 1.5.a Star 1.5.b Mesh 1.5.c Hybrid1.7 Apply troubleshooting methodologies to resolve problems 1.6 Select the appropriate cabling type based on implementation requirements 1.7.a Perform fault isolation and document 1.7.b Resolve or escalate 1.7.c Verify and monitor resolution1.9 Compare and contrast IPv4 address types 1.8 Configure, verify, and troubleshoot IPv4 addressing and subnetting 1.9.a Unicast 1.9.b Broadcast 1.9.c Multicast1.11 Identify the appropriate IPv6 addressing scheme to satisfy addressing requirements in a LAN/WAN environment1.13 Configure and verify IPv6 Stateless Address Auto Configuration 1.14 Compare and contrast IPv6 address types 1.12 Configure, verify, and troubleshoot IPv6 addressing 1.10 Describe the need for private IPv4 addressing 1.14.a Global unicast 1.14.b Unique local 1.14.c Link local 1.14.d Multicast 1.14.e Modified EUI 64 1.14.f Autoconfiguration 1.14.g Anycast 2- LAN Switching Fundamentals 2.1 Describe and verify switching concepts 2.1.a MAC learning and aging 2.1.b Frame switching 2.1.c Frame flooding 2.1.d MAC address table2.3 Troubleshoot interface and cable issues (collisions, errors, duplex, speed) 2.4 Configure, verify, and troubleshoot VLANs (normal range) spanning multiple switches 2.2 Interpret Ethernet frame format 2.4.a Access ports (data and voice) 2.4.b Default VLAN 2.5 Configure, verify, and troubleshoot interswitch connectivity 2.5.a Trunk ports 2.5.b 802.1Q 2.5.c Native VLAN 2.6 Configure and verify Layer 2 protocols 2.6.a Cisco Discovery Protocol 2.6.b LLDP 2.7 Configure, verify, and troubleshoot port security 2.7.a Static 2.7.b Dynamic 2.7.c Sticky 2.7.d Max MAC addresses 2.7.e Violation actions 2.7.f Err-disable recovery 3- Routing Fundamentals 3.1 Describe the routing concepts 3.1.a Packet handling along the path through a network 3.1.b Forwarding decision based on route lookup 3.1.c Frame rewrite 3.2 Interpret the components of routing table 3.2.a Prefix 3.2.b Network mask 3.2.c Next hop 3.2.d Routing protocol code 3.2.e Administrative distance 3.2.f Metric 3.2.g Gateway of last resort 3.3 Describe how a routing table is populated by different routing information sources 3.3.a Admin distance3.4.a Router on a stick3.6 Configure, verify, and troubleshoot IPv4 and IPv6 static routing 3.5 Compare and contrast static routing and dynamic routing 3.4 Configure, verify, and troubleshoot inter-VLAN routing 3.6.a Default route 3.6.b Network route 3.6.c Host route 3.6.d Floating static 3.7 Configure, verify, and troubleshoot RIPv2 for IPv4 (excluding authentication, filtering, manual summarization, redistribution) 4- Infrastructure Services 4.1 Describe DNS lookup operation 4.2 Troubleshoot client connectivity issues involving DNS 4.3 Configure and verify DHCP on a router (excluding static reservations) 4.3.a Server 4.3.b Relay 4.3.c Client4.4 Troubleshoot client- and router-based DHCP connectivity issues4.6 Configure, verify, and troubleshoot IPv4 standard numbered and named access list for routed interfaces 4.7 Configure, verify, and troubleshoot inside source NAT 4.5 Configure and verify NTP operating in client/server mode 4.3.d TFTP, DNS, and gateway options 4.7.a Static 4.7.b Pool 4.7.c PAT 5- Infrastructure Maintenance 5.1 Configure and verify device-monitoring using syslog 5.2 Configure and verify device management 5.2.a Backup and restore device configuration 5.2.b Using Cisco Discovery Protocol and LLDP for device discovery 5.2.c Licensing 5.2.d Logging 5.2.e Timezone 5.2.f Loopback5.4 Configure, verify, and troubleshoot basic device hardening 5.3 Configure and verify initial device configuration 5.4.a Local authentication 5.4.b Secure password 5.4.c Access to device 5.4.c. [i] Source address 5.4.c. [ii] Telnet/SSH 5.4.d Login banner 5.5 Perform device maintenance 5.5.a Cisco IOS upgrades and recovery (SCP, FTP, TFTP, and MD5 verify) 5.5.b Password recovery and configuration register 5.5.c File system management 5.6 Use Cisco IOS tools to troubleshoot and resolve problems 5.6.a Ping and traceroute with extended option 5.6.b Terminal monitor 5.6.c Log events B- Interconecting Cisco Networking Devices (ICND 2) 1- LAN Switching Technologies 1.1 Configure, verify, and troubleshoot VLANs (normal/extended range) spanning multiple switches 1.1.a Access ports (data and voice) 1.1.b Default VLAN 1.2 Configure, verify, and troubleshoot interswitch connectivity 1.2.a Add and remove VLANs on a trunk 1.2.b DTP and VTP (v1&v2) 1.3 Configure, verify, and troubleshoot STP protocols 1.3.a STP mode (PVST+ and RPVST+) 1.3.b STP root bridge selection 1.4 Configure, verify, and troubleshoot STP-related optional features 1.4.a PortFast 1.4.b BPDU guard 1.5 Configure, verify, and troubleshoot (Layer 2/Layer 3) EtherChannel 1.5.a Static 1.5.b PAGP 1.5.c LACP1.7 Describe common access layer threat mitigation techniques 1.6 Describe the benefits of switch stacking and chassis aggregation 1.7.a 802.1x 1.7.b DHCP snooping 1.7.c Nondefault native VLAN 2- Routing Technologies 2.1 Configure, verify, and troubleshoot Inter-VLAN routing 2.1.a Router on a stick 2.1.b SVI2.3 Compare and contrast interior and exterior routing protocols2.5 Configure, verify, and troubleshoot single area and multiarea OSPFv3 for IPv6 (excluding authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs)2.7 Configure, verify, and troubleshoot EIGRP for IPv6 (excluding authentication, filtering, manual summarization, redistribution, stub) 2.6 Configure, verify, and troubleshoot EIGRP for IPv4 (excluding authentication, filtering, manual summarization, redistribution, stub) 2.4 Configure, verify, and troubleshoot single area and multiarea OSPFv2 for IPv4 (excluding authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs) 2.2 Compare and contrast distance vector and link-state routing protocols 3- WAN Technologies 3.1 Configure and verify PPP and MLPPP on WAN interfaces using local authentication 3.2 Configure, verify, and troubleshoot PPPoE client-side interfaces using local authentication 3.3 Configure, verify, and troubleshoot GRE tunnel connectivity 3.4 Describe WAN topology options 3.4.a Point-to-point 3.4.b Hub and
Cisco Certified Network Associates CCNA Cisco Certified Network Associates CCNA “Test Prep” Program Length Total Contact Hours Clock Hours 120 Theory Hours 40 Weeks 5 Lab Hours 80 Externship Hours Total Hours 120 Course Number Course Title Clock Hours Lab Hours CCNA 200-301 V1.0 Cisco Certified Network Associate v1.0 (CCNA 200-301) 40 Total of Theory Hours 40 CCNA 200-301 V1.0 Cisco Certified Network Associate v1.0 (CCNA 200-301) v1 80 Total of Lab Hours 80 Introduce the student to the Computer Technology and Aplication software. Train the students to become a Network Technician and Engineer, provide adequate training to promote the growth of Information Technology Professionals. Upon completion of this training the student will be able to work as a Network and Computer System Administrator, Computer Network Engineer, and will be ready to take The Cisco Certified Network Associate v1.0 (CCNA 200-301). Program Description The Cisco Certified Network Associate v1.0 (CCNA 200-301) exam is a 120-minute exam associated with the CCNA certification. This exam tests a candidate’s knowledge and skills related to network fundamentals, network access, IP connectivity, IP services, security fundamentals, and automation and programmability. The course, Implementing and Administering Cisco Solutions (CCNA), helps candidates prepare for this exam. The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. To better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice. 1.0 Network Fundamentals 1.1 Explain the role and function of network components 1.1.a Routers 1.1.b L2 and L3 switches 1.1.c Next-generation firewalls and IPS 1.1.d Access points 1.1.e Controllers (Cisco DNA Center and WLC) 1.1.f Endpoints 1.1.g Servers 1.2 Describe characteristics of network topology architectures 1.2.a 2 tier 1.2.b 3 tier 1.2.c Spine-leaf 1.2.d WAN 1.2.e Small office/home office (SOHO) 1.2.f On-premises and cloud 1.3 Compare physical interface and cabling types 1.3.a Single-mode fiber, multimode fiber, copper 1.3.b Connections (Ethernet shared media and point-to-point) 1.3.c Concepts of PoE 1.4 Identify interface and cable issues (collisions, errors, mismatch duplex, and/or speed) 1.5 Compare TCP to UDP 1.6 Configure and verify IPv4 addressing and subnetting 1.7 Describe the need for private IPv4 addressing 1.8 Configure and verify IPv6 addressing and prefix 1.9 Compare IPv6 address types 1.9.a Global unicast 1.9.b Unique local 1.9.c Link local 1.9.d Anycast 1.9.e Multicast 1.9.f Modified EUI 64 1.10 Verify IP parameters for Client OS (Windows, Mac OS, Linux) 1.11 Describe wireless principles 1.11.a Nonoverlapping Wi-Fi channels 1.11.b SSID 1.11.c RF 1.11.d Encryption 1.12 Explain virtualization fundamentals (virtual machines) 1.13 Describe switching concepts 1.13.a MAC learning and aging 1.13.b Frame switching 1.13.c Frame flooding 1.13.d MAC address table 2.0 Network Access 2.1 Configure and verify VLANs (normal range) spanning multiple switches 2.1.a Access ports (data and voice) 2.1.b Default VLAN 2.1.c Connectivity 2.2 Configure and verify Interswitch connectivity 2.2.a Trunk ports 2.2.b 802.1Q 2.2.c Native VLAN 2.3 Configure and verify Layer 2 discovery protocols (Cisco Discovery Protocol and LLDP) 2.4 Configure and verify (Layer 2/Layer 3) EtherChannel (LACP) 2.5 Describe the need for and basic operations of Rapid PVST+ Spanning Tree Protocol and identify basic operations 2.5.a Root port, root bridge (primary/secondary), and other port names 2.5.b Port states (forwarding/blocking) 2.5.c PortFast benefits 2.6 Compare Cisco Wireless Architectures and AP modes 2.7 Describe physical infrastructure connections of WLAN components (AP,WLC, access/trunk ports, and LAG) 2.8 Describe AP and WLC management access connections (Telnet, SSH, HTTP,HTTPS, console, and TACACS+/RADIUS) 2.9 Configure the components of a wireless LAN access for client connectivity using GUI only such as WLAN creation, security settings, QoS profiles, and advanced WLAN settings 3.0 IP Connectivity 3.1 Interpret the components of routing table 3.1.a Routing protocol code 3.1.b Prefix 3.1.c Network mask 3.1.d Next hop 3.1.e Administrative distance 3.1.f Metric 3.1.g Gateway of last resort 3.2 Determine how a router makes a forwarding decision by default 3.2.a Longest match 3.2.b Administrative distance 3.2.c Routing protocol metric 3.3 Configure and verify IPv4 and IPv6 static routing 3.3.a Default route 3.3.b Network route 3.3.c Host route 3.3.d Floating static 3.4 Configure and verify single area OSPFv2 3.4.a Neighbor adjacencies 3.4.b Point-to-point 3.4.c Broadcast (DR/BDR selection) 3.4.d Router ID 3.5 Describe the purpose of first hop redundancy protocol 4.0 IP Services 4.1 Configure and verify inside source NAT using static and pools 4.2 Configure and verify NTP operating in a client and server mode 4.3 Explain the role of DHCP and DNS within the network 4.4 Explain the function of SNMP in network operations 4.5 Describe the use of syslog features including facilities and levels 4.6 Configure and verify DHCP client and relay 4.7 Explain the forwarding per-hop behavior (PHB) for QoS such as classification, marking, queuing, congestion, policing, shaping 4.8 Configure network devices for remote access using SSH 4.9 Describe the capabilities and function of TFTP/FTP in the network 5.0 Security Fundamentals 5.1 Define key security concepts (threats, vulnerabilities, exploits, and mitigation techniques) 5.2 Describe security program elements (user awareness, training, and physical access control) 5.3 Configure device access control using local passwords 5.4 Describe security password policies elements, such as management, complexity, and password alternatives (multifactor authentication, certificates, and biometrics) 5.5. Describe remote access and site-to-site VPNs 5.6 Configure and verify access control lists 5.7 Configure Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port security) 5.8 Differentiate authentication, authorization, and accounting concepts 5.9 Describe wireless security protocols (WPA, WPA2, and
Program Length Total Contact Hours Program Cost Clock Hours 180 Theory Hours 80 Weeks 16 Lab Hours 100 Externship Hours Total Hours 180 Course Number Course Title Theory Hours Lab Hours CLOUD+ CV0-003 Cloud and Cloud Security Management 50 Total theory Hours 50 CLOUD+ CV0-003 Cloud and Cloud Security Management 40 Lab Hours Breakdown 40 Total of Course Hours 90 CLOUD+ CV0-003 Cloud and Cloud Security Management 50 Total theory Hours 50 CLOUD+ CV0-003 Cloud and Cloud Security Management 40 Lab Hours Breakdown 40 Total of Course Hours 90 Total Hours 180 This Course is also offered Online and On-grounds. Program Objective The student will be able to install, configure and troubleshoot computer networks. Student will understand some basic/advanced cloud terminologies and concepts, and have likely worked with public cloud or Software-as-a-Service solutions, the ability to analyze, evaluate, design, and test cloud computing solutions are hard skills to find, and are in high demand. In this course, you will apply the skills required to evaluate and implement standard deployments. You will implement, maintain, and deliver cloud technologies including network, storage, and virtualization technologies to create cloud solutions. You will manage workload migrations, manage cloud vendors to control costs, use automation and orchestration to bring business value from cloud solutions, and ensure security of cloud implementations through the use of cybersecurity best practices Program Description Lesson 1: Preparing to Deploy Cloud Solutions Topic A: Describe Interaction of Cloud Components and Services Topic B: Describe Interaction of Non-cloud Components and Services Topic C: Evaluate Existing Components and Services for Cloud Deployment Topic D: Evaluate Automation and Orchestration Options Topic E: Prepare for Cloud Deployment Lesson 2: Deploying a Pilot Project Topic A: Manage Change in a Pilot Project Topic B: Execute Cloud Deployment Workflow Topic C: Complete Post-Deployment Configuration Lesson 3: Testing Pilot Project Deployments Topic A: Identify Cloud Service Components for Testing Topic B: Test for High Availability and Accessibility Topic C: Perform Deployment Load Testing Topic D: Analyze Test Results Lesson 4: Designing a Secure and Compliant Cloud Infrastructure Topic A: Design Cloud Infrastructure for Security Topic B: Determine Organizational Compliance Needs Lesson 5: Designing and Implementing a Secure Cloud Environment Topic A: Design Virtual Network for Cloud Deployment Topic B: Determine Network Access Requirements Topic C: Secure Networks for Cloud Interaction Topic D: Manage Cloud Component Security Topic E: Implement Security Technologies Lesson 6: Planning Identity and Access Management for Cloud Deployments Topic A: Determine Identity Management and Authentication Technologies Topic B: Plan Account Management Policies for the Network and Systems Topic C: Control Access to Cloud Objects Topic D: Provision Accounts Lesson 7: Determining CPU and Memory Sizing for Cloud Deployments Topic A: Determine CPU Size for Cloud Deployment Topic B: Determine Memory Size for Cloud Deployment Lesson 8: Determining Storage Requirements for Cloud Deployments Topic A: Determine Storage Technology Requirements Topic B: Select Storage Options for Deployment Topic C: Determine Storage Access and Provisioning Requirements Topic D: Determine Storage Security Options Lesson 9: Analyzing Workload Characteristics to Ensure Successful Migration Topic A: Determine the Type of Cloud Deployment to Perform Topic B: Manage Virtual Machine and Container Migration Topic C: Manage Network, Storage, and Data Migration Lesson 10: Maintaining Cloud Systems Topic A: Patch Cloud Systems Topic B: Design and Implement Automation and Orchestration for Maintenance Lesson 11: Implementing Backup, Restore, Disaster Recovery, and Business Continuity Measures Topic A: Back Up and Restore Cloud Data Topic B: Implement Disaster Recovery Plans Topic C: Implement Business Continuity Plans Lesson 12: Analyzing Cloud Systems for Performance Topic A: Monitor Cloud Systems to Measure Performance Topic B: Optimize Cloud Systems to Meet Performance Criteria Lesson 13: Analyzing Cloud Systems for Anomalies and Growth Forecasting Topic A: Monitor for Anomalies and Resource Needs Topic B: Plan for Capacity Topic C: Create Reports on Cloud System Metrics Lesson 14: Troubleshooting Deployment, Capacity, Automation, and Orchestration Issues Topic A: Troubleshoot Deployment Issues Topic B: Troubleshoot Capacity Issues Topic C: Troubleshoot Automation and Orchestration Issues Lesson 15: Troubleshooting Connectivity Issues Topic A: Identify Connectivity Issues Topic B: Troubleshoot Connectivity Issues Lesson 16: Troubleshooting Security Issues Topic A: Troubleshoot Identity and Access Issues Topic B: Troubleshoot Attacks Topic C: Troubleshoot Other Security Issues Networking Concepts Explain the purposes and uses of ports and protocols Explain devices, applications, protocols and services at their appropriate OSI layers. Explain the concepts and characteristics of routing and switching Given a scenario, configure the appropriate IP addressing components. Compare and contrast the characteristics of network topologies, types and technologies. Given a scenario, implement the appropriate wireless technologies and configurations. Summarize cloud concepts and their purposes Explain the functions of network services. Infrastructure Given a scenario, deploy the appropriate cabling solution. Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them. Explain the purposes and use cases for advanced networking devices Explain the purposes of virtualization and network storage technologies. Compare and contrast WAN technologies. Network Operations Given a scenario, use appropriate documentation and diagrams to manage the network. Compare and contrast business continuity and disaster recovery concepts. Explain common scanning, monitoring and patching processes and summarize their expected outputs. Given a scenario, use remote access methods Identify policies and best practices. Network Security Summarize the purposes of physical security devices Explain authentication and access controls Given a scenario, secure a basic wireless network. Summarize common networking attacks Given a scenario, implement network device hardening. Explain common mitigation techniques and their purposes. Network Troubleshooting and Tools Explain the network troubleshooting methodology Given a scenario, use the appropriate tool. Given a scenario, troubleshoot common wired connectivity and performance issues. Given a scenario, troubleshoot common wireless connectivity and performance issues. Given a scenario, troubleshoot common network service issues