Vuoi essere un Junior Network Engineer?

Programma del corso Junior Network Engineer, certificazione Cisco e requisiti

PERCORSO CORE

Cisco Certified Network Associate

180 ore

competenze
  • Configure switches and end devices to provide access to local and remote network resources.
  • Explain how physical and data link layer protocols support the operation of Ethernet in a switched network.
  • Configure routers to enable end-to-end connectivity between remote devices.
  • Create IPv4 and IPv6 addressing schemes and verify network connectivity between devices.
  • Explain how the upper layers of the OSI model support network applications.
  • Use security best practices to configure a small network.
  • Troubleshoot connectivity in a small network.
  • Configure VLANs and Inter-VLAN routing, applying security best practices.
  • Troubleshoot inter-VLAN routing on Layer 3 devices.
  • Configure redundancy on a switched network using STP and EtherChannel.
  • Troubleshoot EtherChannel on switched networks.
  • Explain how to support available and reliable networks using dynamic addressing and first-hop redundancy protocols.
  • Configure dynamic address allocation in IPv6 networks.
  • Configure WLANs using a WLC and L2 security best practices.
  • Configure switch security to mitigate LAN attacks.
  • Configure IPv4 and IPv6 static routing on routers.
  • Configure single-area OSPFv2 in both point-to-point and multiaccess networks.
  • Explain how to mitigate threats and enhance network security using access control lists and security best practices.
  • Implement standard IPv4 ACLs to filter traffic and secure administrative access.
  • Configure NAT services on the edge router to provide IPv4 address scalability.
  • Explain techniques to provide address scalability and secure remote access for WANs.
  • Explain how to optimize, monitor, and troubleshoot scalable network architectures.
  • Explain how networking devices implement QoS.
  • Implement protocols to manage the network.
  • Explain how technologies such as virtualization, software defined networking, and automation affect evolving networks
SPECIALIZZAZIONE

Cisco Cybersecurity Foundation

40 ore

COMPETENZE
  • Windows and Linux Operating System vulnerability assessment
  • Apply penetration testing procedures
  • Denial of Service and malware injection
  • Use network monitoring tools (sniffers) to prevent attacks
  • Apply in depth defense approach
  • Evaluate security alerts
  • Identify compromised hosts and vulnerabilities
SPECIALIZZAZIONE

Palo Alto Networks Security

40 ore

COMPETENZE
  • Configure and manage the features of next generation firewalls
  • Identify threats through machine learning augmented analysis
  • Monitor network traffic
  • Decript and inspect network traffic to reveal encrypted threats
  • Prevent credentials based attacks
  • Apply protection from vulnerability exploits, malware, malware-generated command
  • Apply multiple identification techniques to determine the identity of applications traversing your network
  • Prevent zero-day exploits and malware
  • Protect systems that are located outside of the data-center perimeter
  • Configure site-to-site VPN
  • Configure and manage firewall high availability
SPECIALIZZAZIONE

VMware vSphere8 Install, Configuration & Manage

40 ore

COMPETENZE
  • Install and configure ESXi hosts
  • Deploy and configure vCenter
  • Use the vSphere Client to create the vCenter inventory and assign roles to vCenter users
  • Create and configure virtual networks using vSphere standard switches and distributed switches
  • Create and configure datastores using storage technologies supported by vSphere
  • Use the vSphere Client to create virtual machines, templates, clones, and snapshots
  • Create a content library for deploying virtual machines
  • Manage virtual machine resource use
  • Configure ESXi hosts to support vSphere vMotion and vSphere Storage vMotion migrations
  • Create and configure a vSphere cluster that is enabled with vSphere High Availability and vSphere Distributed Resource Scheduler
  • Manage the life cycle of vSphere to keep vCenter and ESXi hosts up to date
SPECIALIZZAZIONE ELETTIVA

Cisco Certified Specialist Enterprise Core

60 ore

COMPETENZE
  • Compare hardware and software switching mechanisms.
  • Configure spanning tree protocol in a switched environment.
  • Configure STP with protection mechanisms.
  • Configure multiple versions of the spanning tree protocol.
  • Configure multiple versions of the spanning tree protocol.
  • Configure routers using different algorithms to determine the best path.
  • Configure EIGRP to improve network performance.
  • Implement multiarea OSPFv2.
  • Use advanced OSPF features to optimize network performance.
  • Implement single-area OSPFv3.
  • Configure eBGP in a single-homed remote access network.
  • Explain how advanced BGP features improve performance.
  • Explain the concepts and protocols that are required to understand multicast operation.
  • Explain the mechanisms used by QoS to ensure transmission quality.
  • Select appropriate wireless topologies and antennas to allow APs to pair with WLCs in an enterprise network.
  • Explain how to configure a wireless network to support and manage wireless roaming.
  • Compare different methods to authenticate wireless clients before gaining access to the wireless network.
  • Troubleshoot wireless connectivity issues using tools and strategies.
  • Compare secure solutions for different places in the network
  • Configure network access control using tools and features that provide device and infrastructure security.
  • Explain the purpose and characteristics of network and server virtualization.
  • Explain common network programmability concepts and programmatic methods of management.
  • Explain the benefits and operation of various automation tools.
SPECIALIZZAZIONE ELETTIVA

Microsoft Azure AZ-104

40 ore

COMPETENZE
  • Identity
  • Governance and Compliance
  • Azure Administration
  • Virtual Networking
  • Intersite Connectivity
  • Network Traffic Management
  • Azure Storage
  • Virtual Machines
  • Serverless Computing
  • Data Protection
  • Monitoring
SPECIALIZZAZIONE ELETTIVA

VMware vSphere8 Optimize, Scale and Secure

40 ore

COMPETENZE
  • Configure and manage a VMware Tools Repository
  • Configure vSphere Replication and recover replicated VMs
  • Manage VM resource usage with resource pools
  • Configure and manage vSphere networking and storage for a large and sophisticated enterprise
  • Configure vCenter High Availability
  • Use host profiles to manage VMware ESXi host compliance
  • Use the vSphere Client and the command line to manage certificates
  • Monitor the vCenter, ESXi, and VMs performance in the vSphere Client
  • Secure vCenter, ESXi, and VMs in your vSphere environment
  • Use Identity Federation to configure the vCenter to use external identity sources
  • Use VMware vSphere Trust Authority to secure the infrastructure for encrypted VMs
SPECIALIZZAZIONE ELETTIVA

Ethical Hacking

60 ore

COMPETENZE
  • Conoscenza dell’evoluzione della sicurezza informatica, hacking etico, leggi e standard
  • Eseguire le fasi di preparazione dell’attacco hacker di footprinting e reconnaissance, utilizzando le più recenti tecniche e strumenti
  • Tecniche di network scanning e contromisure
  • Tecniche di enumeration e contromisure
  • Analisi delle vulnerabilità per identificare le falle di sicurezza nell’infrastruttura di comunicazione e negli end system target.
  • Metodologie di system hacking, steganografia, attacchi di steganalisi, copertura delle tracce lasciate per scoprire vulnerabilità del sistema e della rete.
  • Tipi di malware (Trojan,Virus, worm, ecc.), analisi degli attacchi malware e contromisure.
  • Tecniche di sniffing dei pacchetti per scoprire vulnerabilità di rete e contromisure di difesa
  • Tecniche di social engineering, analisi degli attacchi finalizzati a verificare le vulnerabilità umane e contromisure.
  • Tecniche e strumenti di attacco DoS/DDoS per effettuare l’audit di un bersaglio, contromisure DoS/DDoS.
  • Tecniche di dirottamento (hijacking) della sessione per intercettare sessioni di management a livello di rete, autenticazione/autorizzazione, debolezze crittografiche e relative contromisure
  • Attacchi a Web server e metodologie di attacco per verificare le vulnerabilità nell’infrastruttura del server Web e relative contromisure.
  • Attacchi alle applicazioni Web e metodologia completa di hacking delle applicazioni Web per verificare le vulnerabilità nelle applicazioni Web e le contromisure.
  • Tecniche di SQL injection, strumenti di rilevamento per rilevare tentativi di SQL injection e contromisure.
  • Crittografia wireless, metodologia di hacking wireless, strumenti di hacking wireless e strumenti di sicurezza Wi-Fi
  • Vettori di attacco alle piattaforme mobile, sfruttamento delle vulnerabilità di Android, linee guida e strumenti per la sicurezza mobile.
  • Tecniche di evasion per firewall, IDS e honeypot; strumenti e tecniche di evasion per analizzare un perimetro di rete con l’obiettivo di individuare punti deboli; relative contromisure.
  • Concetti di cloud computing (tecnologia dei container, serverless computing), varie minacce/attacchi e tecniche, strumenti di sicurezza.
  • Penetration testing, security audit, vulnerability assessment, penetration testing roadmap.
  • Minacce alle piattaforme IoT e OT, metodologie di difesa dei dispositivi IoT e OT
  • Cifrari crittografici, infrastruttura a chiave pubblica (PKI), attacchi crittografici e strumenti di crittoanalisi.
MODULO NON TECNICO

Career Ready

COMPETENZE
  • Flanking technical paths with a training course, based on the development of soft skills
  • Gaining awareness of the importance of possessing both technical skills and relational skills
  • Train the capacity for observation and reflection on personal and group dynamics

I corsi

Clicca sul corso e scopri di più.

Cisco Routing & Switching

PERCORSO CORE

Cisco Routing & Switching

180 ore

competenze
  • Explain network technologies
  • Explain how devices access local and remote network resources
  • Implement basic network connectivity between devices
  • Design an IP addressing scheme to provide network connectivity for a small to medium-sized business network
  • Describe router hardware
  • Explain how switching operates in a small to medium-sized business network
  • Configure monitoring tools available for small to medium-sized business networks
  • Configure initial settings on a network device
  • Implement DHCP on a router
  • Implement network address translation (NAT)
  • Implement access control lists (ACLs)
  • Determine how a router will forward traffic based on the contents of a routing table
  • Implement static routing
  • Explain how switching operates in a small to medium-sized business network
  • Configure Ethernet switch ports
  • Implement VLANs
  • Use monitoring tools and network management protocols to troubleshoot data networks
  • Configure monitoring tools available for small to medium-sized business networks
  • Configure initial settings on a network device

VMware Virtualization ICM

SPECIALIZZAZIONE

VMware vSphere8 Install, configuration and manage

40 ore

competenze
  • Install and configure ESXi hosts
  • Deploy and configure vCenter
  • Use the vSphere Client to create the vCenter inventory and assign roles to vCenter users
  • Create and configure virtual networks using vSphere standard switches and distributed switches
  • Create and configure datastores using storage technologies supported by vSphere
  • Use the vSphere Client to create virtual machines, templates, clones, and snapshots
  • Create a content library for deploying virtual machines
  • Manage virtual machine resource use
  • Configure ESXi hosts to support vSphere vMotion and vSphere Storage vMotion migrations
  • Create and configure a vSphere cluster that is enabled with vSphere High Availability and vSphere Distributed Resource Scheduler
  • Manage the life cycle of vSphere to keep vCenter and ESXi hosts up to date

Cisco Cybersecurity

SPECIALIZZAZIONE

Cisco Cybersecurity Foundation

40 ore

competenze
  • Windows and Linux Operating System vulnerability assessment
  • Apply penetration testing procedures
  • Denial of Service and malware injection xxxxx
  • Use network monitoring tools (sniffers) to prevent attacks
  • Apply in depth defense approach
  • Evaluate security alerts
  • Identify compromised hosts and vulnerabilities

Palo Alto Networks Security

SPECIALIZZAZIONE

Palo Alto Networks Security

40 ore

competenze
  • Configure and manage the features of next generation firewalls
  • Identify threats through machine learning augmented analysis
  • Monitor network traffic
  • Decript and inspect network traffic to reveal encrypted threats
  • Prevent credentials based attacks
  • Apply protection from vulnerability exploits, malware, malware-generated command
  • Apply multiple identification techniques to determine the identity of applications traversing your network
  • Prevent zero-day exploits and malware
  • Protect systems that are located outside of the data-center perimeter
  • Configure site-to-site VPN
  • Configure and manage firewall high availability

Cisco CCNP ENCOR

SPECIALIZZAZIONE ELETTIVA

Cisco Enterprise Core Technology

40 ore

competenze
  • Compare hardware and software switching mechanisms.
  • Configure spanning tree protocol in a switched environment.
  • Configure STP with protection mechanisms.
  • Configure multiple versions of the spanning tree protocol.
  • Configure multiple versions of the spanning tree protocol.
  • Configure routers using different algorithms to determine the best path.
  • Configure EIGRP to improve network performance.
  • Implement multiarea OSPFv2.
  • Use advanced OSPF features to optimize network performance.
  • Implement single-area OSPFv3.
  • Configure eBGP in a single-homed remote access network.
  • Explain how advanced BGP features improve performance.
  • Explain the concepts and protocols that are required to understand multicast operation.
  • Explain the mechanisms used by QoS to ensure transmission quality.
  • Select appropriate wireless topologies and antennas to allow APs to pair with WLCs in an enterprise network.
  • Explain how to configure a wireless network to support and manage wireless roaming.
  • Compare different methods to authenticate wireless clients before gaining access to the wireless network.
  • Troubleshoot wireless connectivity issues using tools and strategies.
  • Compare secure solutions for different places in the network
  • Configure network access control using tools and features that provide device and infrastructure security.
  • Explain the purpose and characteristics of network and server virtualization.
  • Explain common network programmability concepts and programmatic methods of management.
  • Explain the benefits and operation of various automation tools.

VMware Virtualization OSS

SPECIALIZZAZIONE ELETTIVA

VMware vSphere8 Operate, scale and secure

40 ore

competenze
  • Configure and manage a VMware Tools Repository
  • Configure vSphere Replication and recover replicated VMs
  • Manage VM resource usage with resource pools
  • Configure and manage vSphere networking and storage for a large and sophisticated enterprise
  • Configure vCenter High Availability
  • Use host profiles to manage VMware ESXi host compliance
  • Use the vSphere Client and the command line to manage certificates
  • Monitor the vCenter, ESXi, and VMs performance in the vSphere Client
  • Secure vCenter, ESXi, and VMs in your vSphere environment
  • Use Identity Federation to configure the vCenter to use external identity sources
  • Use VMware vSphere Trust Authority to secure the infrastructure for encrypted VMs

Ethical Hacking

SPECIALIZZAZIONE ELETTIVA

Ethical Hacking

competenze
  • Conoscenza dell’evoluzione della sicurezza informatica, hacking etico, leggi e standard
  • Eseguire le fasi di preparazione dell’attacco hacker di footprinting e reconnaissance, utilizzando le più recenti tecniche e strumenti
  • Tecniche di network scanning e contromisure
  • Tecniche di enumeration e contromisure
  • Analisi delle vulnerabilità per identificare le falle di sicurezza nell’infrastruttura di comunicazione e negli end system target.
  • Metodologie di system hacking, steganografia, attacchi di steganalisi, copertura delle tracce lasciate per scoprire vulnerabilità del sistema e della rete.
  • Tipi di malware (Trojan,Virus, worm, ecc.), analisi degli attacchi malware e contromisure.
  • Tecniche di sniffing dei pacchetti per scoprire vulnerabilità di rete e contromisure di difesa
  • Tecniche di social engineering, analisi degli attacchi finalizzati a verificare le vulnerabilità umane e contromisure
  • Attacchi a Web server e metodologie di attacco per verificare le vulnerabilità nell’infrastruttura del server Web e relative contromisure.
  • Attacchi alle applicazioni Web e metodologia completa di hacking delle applicazioni Web per verificare le vulnerabilità nelle applicazioni Web e le contromisure.
  • Tecniche di SQL injection, strumenti di rilevamento per rilevare tentativi di SQL injection e contromisure.
  • Crittografia wireless, metodologia di hacking wireless, strumenti di hacking wireless e strumenti di sicurezza Wi-Fi
  • Vettori di attacco alle piattaforme mobile, sfruttamento delle vulnerabilità di Android, linee guida e strumenti per la sicurezza mobile.
  • Tecniche di evasion per firewall, IDS e honeypot; strumenti e tecniche di evasion per analizzare un perimetro di rete con l’obiettivo di individuare punti deboli; relative contromisure.
  • Concetti di cloud computing (tecnologia dei container, serverless computing), varie minacce/attacchi e tecniche, strumenti di sicurezza.
  • Penetration testing, security audit, vulnerability assessment, penetration testing roadmap.
  • Minacce alle piattaforme IoT e OT, metodologie di difesa dei dispositivi IoT e OT
  • Cifrari crittografici, infrastruttura a chiave pubblica (PKI), attacchi crittografici e strumenti di crittoanalisi.
  • Tecniche e strumenti di attacco DoS/DDoS per effettuare l’audit di un bersaglio, contromisure DoS/DDoS.
  • Tecniche di dirottamento (hijacking) della sessione per intercettare sessioni di management a livello di rete, autenticazione/autorizzazione, debolezze crittografiche e relative contromisure

Cloud Microsoft Azure

SPECIALIZZAZIONE ELETTIVA

Microsoft AZ-104

competenze
  • Identity
  • Governance and Compliance
  • Azure Administration
  • Virtual Networking
  • Intersite Connectivity
  • Network Traffic Management
  • Azure Storage
  • Virtual Machines
  • Serverless Computing
  • Data Protection
  • Monitoring

Career Ready Module

MODULO NON TECNICO

Career Ready

competenze
  • Flanking technical paths with a training course, based on the development of soft skills
  • Gaining awareness of the importance of possessing both technical skills and relational skills
  • Train the capacity for observation and reflection on personal and group dynamics

Figure professionali

Il percorso apre all’inserimento aziendale con i diversi profili professionali in base all’ambito di specializzazione:

  • Network Engineer / Administrator – Profilo di partenza per qualsiasi specializzazioni in ambito sistemistico, è in grado di progettare, implementare, gestire e manutenere un’infrastruttura di rete
  • Security & Cyber Secuirty Specialist – Si occupa di gestire la sicurezza di sistemi aziendali da attacchi e minacce IT, svolgendo attività di analisi degli attacchi, scegliendo e implementando soluzioni per la difesa dell’infrastruttura
  • Datacenter Virtualization & Cloud Specialist – Si occupa di implementare e gestire soluzioni di virtualizzazione e cloud computing in ambito datacenter

> Certificazioni

Il Junior Network Engineer conseguirà la certificazione Cisco CCNA 200-301, titolo d’ingresso nel mondo delle certificazioni Cisco. E’ pensata appositamente per profili entry level richiesti dalle aziende informatiche nazionali e internazionali in espansione e alla ricerca di junior con skill reali.

I bootcamp di specializzazione preparano gli studenti al conseguimento delle certificazioni Vmware VCP Foundation, Understanding Cisco Cybersecurity Fundamentals (SECFND), Palo Alto PCNSA – edu210.

Costituiscono per lo studente e per le aziende partner garanzia di competenze tecniche reali basate sulla conoscenza e l’uso degli apparati di rete più diffusi al mondo e del più alto livello tecnologico.

> Requisiti

Possono accedere al corso neodiplomati provenienti da Istituti Tecnici Industriali o neolaureati presso Università a indirizzo ‘Informatica e Telecomunicazioni’

Sono requisiti d’ingresso la conoscenza di base dell’inglese tecnico, conoscenze sistemistiche di base, forte attitudine.

Costituisce titolo preferenziale aver frequentato percorsi Cisco rivolti al mondo education e il possesso dei relativi certificati rilasciati dagli istituti di provenienza.

Le selezioni per diventare Junior Network Engineer prevedono test di informatica, di inglese, colloquio individuale, laboratorio attitudinale di gruppo su apparati reali.

Junior Network Engineer e Junior Developer Milano 2022
Compila il form

Vuoi sapere di più?