welcome to IIHT Jaipur

course details


IIHT’s CCNA Security course is specifically designed to address the challenges faced while implementing and maintaining networks and provide effective solutions to secure the networks from breaches. This course provides Learners with the required foundation to understand the importance of good network security and the various techniques to protect the system from threats. The hands-on, practical skills that Learners get during the program helps them to design and provide a high-level security implementation and troubleshooting skills.


Already know which course to sign up for?

Explore a wide range of courses offered in a blended learning environment and find the course you want to enroll for.

View Courses

Not sure which course is ideal for you?

Speak to an expert and explore what the industry is looking for, and identify which course will help you with your career.

Call Us



  • Design and configure systems specific to business needs
  • Design security at various levels and provide required support specific to security aspects
  • Hands on knowledge of Security design and configuration
  • Ensure security enhancement of system as per business needs
  • Provide expert technical support for security-related aspects



Computer networking and infrastructure management has become an integral part of almost all organisations. Despite the fact that companies and organizations have an array of computers and communication tools at their disposal, to a certain degree, they tend to be separate. This sets them back significantly as the accuracy and speed of data-flow and transactions play a vital role in an organization’s success. To overcome such obstacles that limit the efficiency of infrastructure Networking jobs are in great demand with companies and various government agencies looking to upgrade their IT infrastructure. Major companies like Cognizant and Infosys are big recruiters for network management, and with services like Universal Identification becoming more relevant over the past few years, there is an increase in demand for professionals who can manage networks in the public sector as well. Management, networking becomes a crucial element in an enterprise’s day-to-day operations.



  • Internetworking Basics
  • Internetworking Models
  • The Layered Approach
  • Advantages of Reference Models
  • The OSI Reference Model
  • The Application Layer
  • The Presentation Layer
  • The Session Layer
  • The Transport Layer
  • The Network Layer
  • The Data Link Layer
  • The Physical Layer

  • Ethernet Networks in Review
  • Collision Domain
  • Broadcast Domain
  • Half- and Full-Duplex Ethernet
  • Ethernet at the Data Link Layer
  • Ethernet at the Physical Layer
  • Ethernet Cabling
  • Ethernet Cabling
  • Crossover Cable
  • Rolled Cable
  • Fiber Optic
  • Data Encapsulation
  • The Cisco Three-Layer Hierarchical Model
  • The Core Layer
  • The Distribution Layer
  • The Access Layer

  • Introducing TCP/IP
  • A Brief History of TCP/IP
  • TCP/IP and the DoD Model
  • The Process/Application Layer Protocols
  • The Host-to-Host or Transport Layer Protocols
  • The Internet Layer Protocols
  • IP Addressing
  • IP Terminology
  • The Hierarchical IP Addressing Scheme
  • Private IP Addresses (RFC 1918)
  • IPv4 Address Types
  • Layer 2 Broadcasts
  • Layer 3 Broadcasts
  • Unicast Address
  • Multicast Address

  • Subnetting Basics
  • How to Create Subnets
  • Subnet Masks
  • Classless Inter-Domain Routing (CIDR)
  • IP Subnet-Zero
  • Subnetting Class C Addresses
  • Subnetting Class B Addresses
  • Subnetting Class A Addresses

  • Installation and Configuring Puppet
  • Puppet Master and Puppet Language Basics
  • Templates
  • Example Code
  • Puppet Forge

  • Jenkins Architecture 
  • Installation
  • Build Deployments
  • Securing Jenkins

  • Docker Architecture
  • Installation
  • Docker Hub
  • Custom images
  • Docker Networking
  • Docker Compose

  • Managing the Configuration Register
  • Understanding the Configuration Register Bits
  • Checking the Current Configuration Register Value
  • Boot System Commands
  • Recovering Passwords
  • Backing Up and Restoring the Cisco IOS
  • Verifying Flash Memory
  • Backing Up the Cisco IOS
  • Restoring or Upgrading the Cisco Router IOS
  • Using the Cisco IOS File System (Cisco IFS)
  • Licensing
  • Right-To-Use Licenses (Evaluation Licenses)
  • Backing Up and Uninstalling the License

  • Routing Basics
  • The IP Routing Process
  • The Cisco Router Internal Process
  • Testing Your IP Routing Understanding
  • Configuring IP Routing
  • Static Routing
  • Default Routing
  • Dynamic Routing
  • Routing Protocol Basics
  • Routing Information Protocol (RIP) and RIPv2
  • Configuring RIP Routing
  • Holding Down RIP Propagations

  • EIGRP Features and Operations
  • Neighbor Discovery
  • Reliable Transport Protocol (RTP)
  • Diffusing Update Algorithm (DUAL)
  • Route Discovery and Maintenance
  • Configuring EIGRP
  • VLSM Support and Summarization
  • Controlling EIGRP Traffic
  • Split Horizon
  • Verifying and Troubleshooting EIGRP

  • Open Shortest Path First (OSPF) Basics
  • OSPF Terminology
  • OSPF Operation
  • Configuring OSPF
  • Enabling OSPF
  • Configuring OSPF Areas
  • Configuring OSPF
  • OSPF and Loopback Interfaces
  • Configuring Loopback Interfaces
  • Verifying OSPF Configuration
  • The show ip ospf Command
  • The show ip ospf database Command
  • The show ip ospf interface Command
  • The show ip ospf neighbor Command
  • The show ip protocols Command

  • OSPF Scalability
  • Categories of Multi-area Components
  • Adjacency Requirements
  • OSPF Router Roles
  • Link-State Advertisements
  • OSPF Hello Protocol
  • Neighbor States
  • Basic Multi-area Configuration
  • Verifying and Troubleshooting Multi-area OSPF Networks
  • The show ip ospf Command
  • The show ip ospf interface Command
  • The show ip protocols Command
  • The show ip route Command
  • The show ip ospf database Command
  • Troubleshooting OSPF Scenario
  • Simple Troubleshooting OSPF
  • OSPFv3
  • Verifying OSPFv3

  • Introduction to Access Lists
  • Mitigating Security Issues with ACLs
  • Standard Access Lists
  • Wildcard Masking
  • Controlling VTY (Telnet/SSH) Access
  • Extended Access Lists
  • Named ACLs
  • Monitoring Access Lists

  • When Do We Use NAT?
  • Types of Network Address Translation
  • NAT Names
  • How NAT Works
  • Static NAT Configuration
  • Dynamic NAT Configuration
  • PAT (Overloading) Configuration
  • Simple Verification of NAT
  • Testing and Troubleshooting NAT

  • Why Do We Need IPv6?
  • The Benefits and Uses of IPv6
  • IPv6 Addressing and Expressions
  • Shortened Expression
  • Address Types
  • Special Addresses
  • How IPv6 Works in an Internetwork
  • Manual Address Assignment
  • Stateless Autoconfiguration (eui-64)
  • DHCPv6 (Stateful)
  • IPv6 Header
  • ICMPv6
  • IPv6 Routing Protocols
  • Static Routing with IPv6
  • Configuring IPv6
  • Configuring Routing

  • Switching Services
  • Three Switch Functions at Layer 2
  • Port Security
  • Configuring Catalyst Switches
  • Catalyst Switch Configuration
  • Verifying Cisco Catalyst Switches

  • VLAN Basics
  • Broadcast Control
  • Security
  • Flexibility and Scalability
  • Identifying VLANs
  • Frame Tagging
  • VLAN Identification Methods
  • Routing between VLANs
  • Configuring VLANs
  • Assigning Switch Ports to VLANs
  • Configuring Trunk Ports
  • Configuring Inter-VLAN Routing

  • VLAN Review
  • Assigning Switch Ports to VLANs
  • Configuring Trunk Ports
  • VLAN Trunking Protocol (VTP)
  • VTP Modes of Operation
  • VTP Pruning
  • Configuring VTP
  • Troubleshooting VTP
  • Spanning Tree Protocol (STP)
  • Spanning-Tree Terms
  • Spanning-Tree Operations
  • Types of Spanning-tree Protocols
  • Common Spanning Tree
  • Per-VLAN Spanning Tree+
  • Modifying and Verifying the Bridge ID
  • Spanning-Tree Failure Consequences
  • PortFast and BPDU Guard
  • BPDU Guard
  • EtherChannel
  • Configuring and Verifying Port Channels

  • Troubleshooting IP Network Connectivity
  • Using IP SLA for Troubleshooting
  • Using SPAN for Troubleshooting
  • Configuring and Verifying Extended Access Lists
  • Troubleshooting IPv6 Network Connectivity
  • ICMPv6
  • Troubleshooting IPv6 Extended Access Lists
  • Troubleshooting VLAN Connectivity
  • VLAN Troubleshooting
  • Trunk Troubleshooting

  • Mitigating Threats at the Access Layer
  • External Authentication Options
  • SNMP
  • Management Information Base (MIB)
  • Configuring SNMP
  • Client Redundancy Issues
  • Introducing First Hop Redundancy Protocols (FHRPs)
  • Hot Standby Router Protocol (HSRP)”
  • Virtual MAC Address
  • HSRP Timers
  • Group Roles
  • Configuring and Verifying HSRP

  • Introduction to Wide Area Networks
  • WAN Topology Options
  • Defining WAN Terms
  • WAN Connection Bandwidth
  • WAN Connection Types
  • WAN Support
  • Cisco Intelligent WAN (IWAN)
  • Cabling the Serial Wide Area Network
  • Serial Transmission
  • DTE and DCE”
  • High-Level Data-Link Control (HDLC) Protocol
  • Point-to-Point Protocol (PPP)
  • Link Control Protocol (LCP) Configuration Options
  • PPP Session Establishment
  • PPP Authentication Methods
  • Configuring PPP on Cisco Routers
  • Configuring PPP Authentication
  • Verifying and Troubleshooting Serial Links
  • Multilink PPP (MLP)
  • PPP Client (PPPoE)
  • Configuring a PPPoE Client”
  • Virtual Private Networks
  • Benefits of VPNs
  • Enterprise- and Provider-Managed VPNs
  • Introduction to Cisco IOS IPsec
  • IPsec Transforms
  • GRE Tunnels
  • GRE over IPsec
  • Configuring GRE Tunnels
  • Verifying GRP Tunnels”
  • Single-Homed EBGP
  • Protocol Comparison and Overview
  • Configuring and Verifying EBGP
  • Verifying EBGP


What do you gain from IIHT’s Blended Learning ?

IIHT’s learning model is integrated with the latest Learning trends to ensure that the audience remains engaged and their overall learning experience is flexible, convenience and productive. What more? We provide you a unique and engaging content on a user friendly and immersive learning platform that helps you to not only attend the training sessions, but watch Learning videos, read Learning Materials, interact with fellow students, write to the faculty members, practice labs, 24x7 support from a single window that makes learning effective. The assignments and assessments designed as part of the course ensures you develop right capability to prove your worth in your existing job or with prospective employer. Our state of the art learning system helps you to connect with fellow learners who are mostly working professionals that helps you to learn through collaboration and knowledge sharing.

Key concepts will be explained by Online / Live Instructor led sessions, where syllabus material will be presented and the subject matter will be illustrated with demonstrations and examples. Tutorials and/or labs and/or group discussions (including online forums) focused on projects and problem solving will help one practice in the application of theory and procedures, allow exploration of concepts with mentors and other fellow students. You get regular feedback on your progress and understanding; assignments, as described in Overview of Assessment (below), requiring an integrated understanding of the subject matter; and private study, working through the course as presented in classes and learning materials, and gaining practice at solving conceptual and technical problems.You get access to informative Learning videos from Global Experts that helps you to get larger perspective from real time perspective that you would not get in any other Live session.



In this project, you’ll use GIT to keep track of meal guidelines for animals at the Manhattan Zoo based on the meal regimens provided:

Zookeeper Intern Onboarding:
Meal Guidelines

1. California Sea Lions
Meal: 40 lbs. salmon, 40 lbs. herring, 20 lbs. Northern Anchovy, 20 lbs. Octopus
Times: 6:00 am, 9:00 am, 12:00 pm, 3:00 pm, 6:00 pm, 9:00 pm
Directions: Leave buckets for the trainer at 12:00 pm and 3:00 pm, otherwise, follow standard protocol.

2. Ring-tailed Lemurs
Meal: 10 bags Tamarind pods
Times: 6:00 am, 3:00 pm, 8:00 pm
Directions: Empty bags over meadow area during designated times”

Deploy a web server to an acceptance environment.

Creating a development environment and adding nodes to it. Automate code deployments to the Puppet Master

  • Use an Amazon CloudWatch Metric
  • Create a Launch Configuration and Auto Scaling Group
  • Create a Scaling Policy

Build a Continuous Integration along with Maven and Jenkins. Create a Maven-Jenkins based Project. Run the Workspace.


Related course

MCSA | RHCE | CCNA Security