Private lessons
online via webcam
from11.65USD/ h
Practical Course in Cisco CCNA 200-301 with Packet Tracer
Translated using Google Translate. Click to view original.
The Cisco CCNA Exam is designed to verify an individual's knowledge of and operation of data network protocols. For most people, the use of more than one instructional method is important to solidify an understanding of the complex and interconnected systems of data network protocols. Watching videos and reading books are very important and this course is designed to add an extra and active learning method. In this course, The Basics, each unit examines a specific and fundamental topic in data networks. First, you will explore MAC and ARP addresses. Next, you will walk through VLANs, Trunking and InterVLAN routing. Finally, you will test static routing and dynamic routing. By the end of this course, you will have gone step-by-step through the challenges, solutions to problems, and how to solve them for each topic.Location
Online via webcam
General info
Skills: | |
---|---|
Age: | Children (7-12 years old) Teenagers (13-17 years old) Adults (18-64 years old) Seniors (65+ years old) |
Student level: | Beginner Intermediate Advanced |
Duration: | 60 minutes 90 minutes |
The class is taught in: | Arabic, English |
About Me
Translated using Google Translate. Click to view original.
Amin has successfully delivered software products and solutions to companies around the world. He is passionate about technology and loves what he does. After many years of experience in computer science, he has created a number of IT certification courses over the past 11 years and really enjoys helping people advance their careers through training and personal development.Education
Translated using Google Translate. Click to view original.
Computer Science Engineer, 2010Professorship in Computer Science Applied to Disposition, 2008
2020 Full-Stack Web Development with React Specialization
2021 IBM Cybersecurity Analyst Professional Certificate
Experience / Qualifications
Translated using Google Translate. Click to view original.
Operating systems, website programming, networks, computer maintenance, information security, graphic design,Technical Support Fundamentals
The Bits and Bytes of Computer Networking
Operating Systems and You: Becoming a Power User
System Administration and IT Infrastructure Services
IT Security: Defense against the digital dark arts
The courses cover the topics that get you working with the Linux operating system. This includes discussing Linux installation and configuration scenarios before starting to manage Linux processes. By the end of this course, you will have built a solid foundation with Linux which will serve as a starting point for your Linux skills and roles
Basic requirements
Knowledge of operating systems may be helpful, but not necessary.
what will you learn
Working with Linux and open source software
Linux installation and boot management
Linux environment management
Working with Linux package managers
Understand the command line
Find system help
Working with the Linux file system
Objectives
The program begins with an introductory level cybersecurity skills training, then progresses to advanced cybersecurity techniques such as reverse engineering, penetration testing techniques, and more. This training program will enable you to:
• Implement technical strategies, tools, and techniques to secure data and information for your organization
• Adhere to ethical security behavior to analyze and mitigate risks
• Understand security in cloud computing architecture in depth
• Understand legal requirements, privacy issues, and audit methodologies within a cloud environment
• Focus on IT compliance and enterprise systems integrity to create a more secure enterprise IT framework
what will you learn
1. Inactive survey conduct
Attackers spend 70-80 percent of their time gathering information about their target. Doing so answers a lot of questions that saves them time during the activity. It makes sense that you as a security professional would do the same. In this module, Passive Survey Conducting, you will learn about effective untraceable data collection, referred to as a survey. First, you will see what information can be discovered about your target using public and open source information. Next, you'll discover what WHOIS, nslookup, and even Google can reveal about your target. Finally, you'll explore some of the apps designed to help automate this stage of the survey. Upon completion of this unit, you will have the skills and knowledge of passive reconnaissance needed to perform penetration testing.
2. Take an active survey
So far, we've been "calm" about the survey. But the passive side is that we often don't see every system through passive ways. This was the active poll come to play. In this module, Conducting Active Reconnaissance, you will gain the ability to discover more network nodes and collect system information during penetration tests. First, you will learn how to discover all targets on a given network. Next, you will discover how to use enumeration to find services and even accounts on targets. Next, you'll see how to scan each point for vulnerabilities that could allow someone to gain unauthorized access to protected digital or electronic materials, and might get around routers or even firewalls to get in. Finally, you will explore how to research different types of scripts and some great tools to help automate your tasks. Upon completion of this course, you will have the skills and knowledge to discover many nodes, service accounts and even some of the vulnerabilities needed to cover every aspect of an active survey step in any pent-up engagement.
3. Gathering information and identifying weaknesses
Now that you have identified, enumerated, and exposed vulnerabilities through both active and passive reconnaissance efforts, you need to know what to do with that data. In this module Gathering Information and Identifying Weaknesses, you will learn basic knowledge and gain the ability to analyze the weaknesses that you have discovered. First, you will learn how to choose the right vulnerability scanner, whether it is open source, commercial, on-premises or cloud-based. Next, you will discover how to organize said data by classifying assets, identifying false positives and preparing for judgment. Finally, you will explore how to turn this data into actionable exploits. Upon completion of this unit, you will possess the skills and knowledge to analyze vulnerabilities or command you to prepare for the next stage of the penetration testing lifecycle.
4. Application testing
There are many different ways that software flaws can be exposed through design and implementation, so you will need to perform a variety of tests thoroughly to evaluate each application for which the company is responsible. In this module, Testing Applications, you will learn how to exploit vulnerabilities in web-based applications while participating. First, you will learn the commonalities between web applications. Once you understand this, you will be able to use this knowledge to your advantage. Next, you will explore the different types of authentication, injection, and web shell attacks that you can use to exploit these applications. Finally, you will use specific analysis techniques on compiled programs to see if you can compromise on these types of applications. Upon completion of this module, you will have the skills and knowledge of penetration testing needed to exploit most any application in any interaction.
5. Digital Forensics
This unit will teach you the basics of safety and evidence acquisition, examination and analysis to create a cybercrime timeline.
6. Digital Forensics: Getting Started with File Systems
Do you like the idea of being able to find what others can't? In this unit, Digital Forensics: Getting Started with File Systems, you'll dive into digital forensics and file systems and how digital forensics investigators use them to prove what happened or didn't happen on the system. You'll start by covering topics, such as paths, sectors, groups, blocks, and slack space. Next, you will explore in more depth Permissions and Metadata. Finally, you'll look at the timestamps, and jot it all down while using the autopsy as your tool. By the end of this course, you'll know how to navigate Autopsy and the original Windows, Linux, and Mac OS X operating systems to find forensic evidence at the file system level.
7. Kali Linux Digital Forensics Tools: Imaging and Hash
Kali Linux (formerly BackTrack) is known as the premier Linux distribution system for application and network penetration testers. Kali also includes many useful digital forensic tools for formal forensic investigations, IT problem solving, and learning about digital forensics. Professional digital forensic examiners, IT staff, and students new to digital forensics will all find the information and demonstrations of digital imaging and cryptographic hashing tools in this course extremely useful.
8. Practical coding using Python
Security is very important in today's world. In this module, Practical Coding with Python, you will learn the practical side of coding with the great programming language Python, and gain the confidence to master the skill of coding using real-life examples. First, you will learn about hashing algorithms. Next, you will discover symmetric encryption using Python. Finally, you will explore the many angles of asymmetric encryption using public and private keys. When you have finished this unit, you will have the necessary skills and knowledge about coding to use in your career.
9. Social Engineering with Social Engineering Toolkit
The Social Engineer Toolkit (SET) is an open source Python-based tool intended for penetration testing around social engineering. Vulnerability scanners will find security problems in computer systems. If you want a good tool, SET is here to help you assess your company's security cavity. In this module, Social Engineering Using the Social Engineer Toolkit, you will learn the social engineering attacks that SET supports. First, you will discover how a SET phishing attack works with an email attack. Next, you'll explore how to use a website attack vector, along with creating a payload and a listener. Next, you'll delve into powerful PowerShell attacks and how to take advantage of this command line tool to bypass security on Windows. Next, you'll explore the world of electronics to learn how to use the hardware-based module in SET. Finally, you will learn various ways to deal with the Social Engineer Toolkit, such as Wireless Access Point Attack, QRCode Generator, SMS Spoofing, and Infectious Media Generator. By the end of this unit, you will have the basic knowledge to use the social engineer's toolkit efficiently.
10. Penetration testing with Metasploit Framework
Penetration testing workflow is a huge challenge in our career as security professionals. In this unit course, Penetration Testing with Metasploit Framework, you will learn how to take your ethical hacking skills to the next level by using Metasploit in your career as a penetration tester. First, you will learn how to list and enumerate services. Then, you will discover new ways to exploit vulnerabilities. Finally, you will explore how to raise your privileges and move sideways on the network. Upon completion of this unit, you will possess the skills and knowledge needed to conduct a successful penetration test like a pro.
A graphic designer must properly use typography, images, composition, layout, and color to solve visual communication problems. Common uses of graphic design include identity (logos and brands), publications (magazines, newspapers, books), print advertisements, and posters.
Required software:
-Photoshop
- Illustrator
-InDesign
program duration:
Photoshop: 6 hours
Illustrator: 6 hours
- InDesign: 6 hours
This course focuses on the skills and knowledge required to analyze network traffic using Wireshark. You'll start with the basics of network packet analysis before delving into using wireshark to analyze, visualize, and troubleshoot networks. You will also immerse yourself in network protocol analysis and using Wireshark on the command line. One thing to note is that these courses and concepts are not just for network engineers. Wireshark is a valuable tool for software developers and system administrators as well. By the end of this path, you will be confident that you will be able to take full advantage of Wireshark's capabilities.
requirements
Networking basics basics
what will you learn
Wireshark Basic Functions
Use Wireshark's advanced features
Visualize network traffic with Wireshark
Using Wireshark on the command line
Network protocol analysis with Wireshark
Troubleshoot slow networks with Wireshark
Ask a question
Send a message explaining your needs and امين will reply soon:
The more detail, the better.
Ex. "Hi, when are you available to meet for a lesson?"
Ex. "Hi, when are you available to meet for a lesson?"
Availability of a typical week
(GMT -05:00) New York
Mon | Tue | Wed | Thu | Fri | Sat | Sun | |
---|---|---|---|---|---|---|---|
0 | |||||||
1 | |||||||
2 | |||||||
3 | |||||||
4 | |||||||
5 | |||||||
6 | |||||||
7 | |||||||
8 | |||||||
9 | |||||||
10 | |||||||
11 | |||||||
12 | |||||||
13 | |||||||
14 | |||||||
15 | |||||||
16 | |||||||
17 | |||||||
18 | |||||||
19 | |||||||
20 | |||||||
21 | |||||||
22 | |||||||
23 |
from $11.65Online via webcam
100% Satisfaction Guarantee
Good-fit Instructor Guarantee
If you are not satisfied after your first lesson, Apprentus will find you another instructor or will refund your first lesson.
Online reputation
- Instructor since February 2022
- Phone number verified
- Linkedin connected
Availability of a typical week
(GMT -05:00) New York
Mon | Tue | Wed | Thu | Fri | Sat | Sun | |
---|---|---|---|---|---|---|---|
0 | |||||||
1 | |||||||
2 | |||||||
3 | |||||||
4 | |||||||
5 | |||||||
6 | |||||||
7 | |||||||
8 | |||||||
9 | |||||||
10 | |||||||
11 | |||||||
12 | |||||||
13 | |||||||
14 | |||||||
15 | |||||||
16 | |||||||
17 | |||||||
18 | |||||||
19 | |||||||
20 | |||||||
21 | |||||||
22 | |||||||
23 |
from $11.65Online via webcam
Good-fit Instructor Guarantee
If you are not satisfied after your first lesson, Apprentus will find you another instructor or will refund your first lesson.
Share
You are here
Private lessons
online via webcam
Similar classes
Luana
Courses to start or improve on social networks
Having trouble understanding how social media works? Do you need to highlight your business, your creations, your travels on social networks?
I am a social media expert and I can support you in your launch.
If you've already started, congratulations! I'm here to help you find direction, strategize and take your social media to the next level.
Social networks are now an integral part of our daily lives and all companies, brands and others must be up to date to perform. I would be happy to help you in this process and teach you how to succeed in this digital world where everything is possible.
Jose
Experienced Software Engineer - Linux and Networking Teacher
Eager to learn Linux and infrastructure? Then do no hesitate in contacting me. We can start from the foundations of all these extremely important disciplines, if you consider you have knowledge on system administration is not a problem, we can study Security in Linux and Networks, virtualization and containers.
Noshima
Programming for Everybody - C/C++ Programming, Linux Operating System, Basics of Networking.
This course aims to teach everyone the basics of programming computers using C/C++. We cover the basics of how one constructs a program from a series of simple instructions in C/C++. The course has no prerequisites and avoids all but the simplest mathematics.
We will also learn about Linux operating system in detail.
And also cover the basic networking concepts in detail.
Rocío
Growth for YouTube channel. Optimization and SEO
In this course you will learn how to optimize your channel to get the most out of your brand on this platform
From video editing, to titles, thumbnails, etc.
I will be happy to help you, any questions do not hesitate to contact me
Michael
Computer Networking (CCNA 200-301 exam) and Cyber Security
This class helps you prepare for the newest CCNA 200-301 exam. If this is your first step towards attaining your Cisco certifications, then you are in the right place. Here, I also teach Cyber Security and Ethical Hacking with Kali Linux tools. I have got teaching years of experience and promises to be worth it.
This course is unlike other CCNA courses as it contains:
* Large amount of practical content with detailed explanations of CCNA topics and GNS3 and Cisco Packet Tracer demonstrations
* Packet Tracer assessments and labs. Massive amount of practical, hands-on content that you can use to study offline.
* Software - Subnetting Calculators, Config-Register, binary & hexadecimal & decimal calculators
* Many demonstrations showing you practically how to configure and build Cisco networks
* Cheatsheets
* Quiz questions
Networks are all around us and you are using one right now to access this course.
Imagine for a moment, how different your life would be without access to Facebook, Snapchat, Google, YouTube, Whatsapp or any of the other websites on the Internet? How would you live with no Internet?
The Internet is extremely important in modern life today and all websites and Internet communication relies on networking. This reliance is only predicted to continue with the growth of the Internet of Things (IoT) in the next few years.
Without routers, switches, network cabling and protocols like BGP there would be no Internet!
This course will teach you how networks actually work and how you are able to connect to websites like Facebook, Google, and YouTube. Companies throughout the world (from the smallest to the largest) rely on networks designed, installed and maintained by networking engineers. Join this in demand industry!
Content in this course can be used towards your CCNA. Topics such as IP addressing, subnetting and many others can be applied directly to passing your CCNA certification.
Start your journey today learning about networking.
Faiq
IT Professional (IT Support) a prep course for COMPTIA A+ exam
We are a CISCO Academy and this course is based on CISCO IT Essentials course but is not limited to it. It's closer to COMPTIA A+ exam preparation course.
If you'll do what I say and make your notes you may become a good IT professional in 6 months or even sooner, in sha Allah.
And we offer internship program.
Issamo
Formation CERTIFED ETHICAL HACKING with labs in kali
Ceh is verry intersting formation in security , the goal of this formation is to help student to know how hacker work in the goal to block all threat from real hacker, is ethical hacker.
When you think like hacker you can block them, this formation is very interested
Khalid
Create your website on Wix or Squarespace and start your business with peace of mind.
For your professional activity or your passion (or both, you are lucky :) ), you need to create your website.
In a few hours, I help you and explain you how to create a website on the platform of your choice.
Wix.com
Squarespace.com
I teach you how to create blocks of text or images, how to import images, how to publish your articles, and how to properly build your SEO on Google.
Use a domain name that represents your business.
I also show you how to link your site to Facebook or Instagram, in order to share quality content.
At the end of the course, you will have a site with your home page, your about page, pages for your articles and portfolios, and a contact page.
This course is therefore aimed at those who want to have a quality presence on the web, it is of course also useful when looking for a job.
Don't hesitate any longer, once your site is online you can start prospecting your customers.
Philippe
How to Advertise on Facebook or Instagram
Facebook and Instagram can be very effective in promoting your business, products and services.
About the course:
- The objective of this course is to teach you how to use Facebook Ads to support your business and to help you understand which advertising formats and types work best. I'll help you 1) understand the different types of ads on Facebook and Instagram, 2) build a Facebook Ads campaign, and 3) understand the different ways to optimize a Facebook Ads campaign.
About me:
- I am a marketing director at one of the largest consumer goods companies (FMCG) in the world which employs> 100,000 people in around 70 countries. In my free time, I am a marketing assistant at the Solvay Brussels School of Economics & Management business school and I practice triathlon and sailing. I love to give coaching hence my lessons on Apprentus.
Marwa
Teaching telecommunication and computer engineering materials
I am a doctor in Telecommunications from Paris, France. I give private lessons in telecommunications and computer engineering for university students, and can help with university projects. I have a research experience in networking and will be happy to help in any research project.
Rebecca
Computer Networks and programming. Completed Ph.D. and have 19 years experience.
I have 19 years of teaching experience in the department of computer science and Data Science. Currently, my research work involves in the investigation of radiographic images of corona virus to prognosis the infection which provides a fast diagnosis, developing a novel framework for secured voting system using Blockchain Technology and Image and video data analysis using machine learning approach. Considering my research and teaching experience in the past 19 years, I am confident that I have the personal determination and skills to further develop and grow as a Researcher in the emerging science and technologies.
I have played dual role as a project coordinator and guide for the undergraduate and post graduate students. Under my guidance, students learnt essential knowledge and skills in computer science and Data science and how to use academic research for the purpose of developing novel solutions for the real time problems.
Rehan
Computer Networking Basic level to Advanced level (Bachelor's level, Master's Level, Certifications: Cisco, Huawei, VMWare, Juniper etc)
I'm a Senior Network Engineer with 10 years Experience. I also have a PhD in Computer Science and Various industry certifications (CCNA, CCNP, HCIE, VCA etc) I can Computer Networking concepts from the Basic level to the advanced level both from academic and Industry Perpective. My course outline is flexible according to the requirements and academic level of the students.
Tahir Ahmed
Learn linux operating system and get confident to use it in your daily life and job
My goal is to teach my students is to make them Linux speciliest. starrting from the installation of operating system on differennt platforms, to creating users, network creation, remote access, file transfer, secure tunnels, dhcp, static IP, backing up drives and etc.
Houssein
Computer Science, Networking, programming, Math, solving assignments and projects
I am a PhD in Computer Science with 11 years experiences as an assistant professor in different universities and schools. I have extensive experience working with students that are different in their abilities and culture. I create a flexible, supportive, and dynamic learning environment and encourage students to challenge the material. I am able to teach courses in computer science but I have a passion in teaching mathematics courses. I can help in preparing assignments and projects.
Ahmad Hani
Learn Networking Essentials, Gain hands-on experience
This course provides an overview of the concepts and fundamentals of computer networks.
Topics include an overview of network architectures and topologies, IP addressing and subnetting, congestion mechanism CSMA/CD, troubleshooting commands and methods, switching and routing devices and their related decisions, TCP/IP layers and their protocols (FTP, HTTP, SMTP, DNS, DHCP, UDP, TCP, IP, ICMP etc…), security measures and how to secure your network using Access Lists and Firewall.