Campus Networking, Network Security, Wireless, Server Administration and Datacenter.

With the rapid transformation of IT towards flexible consumption models, and with data and algorithms bringing new value to lines of business, the workforce is evolving to meet the needs of a new, dynamic environment.

Here you will find technical information and professional networking opportunities, which will help advance your goals.

Practice labs (10:00 AM to 10:30 PM x7 days) to continue your learning beyond the classroom with Cisco Router, Juniper Router, Cisco Firewall, Cisco Wireless Access Point and Cisco Switches .

What You'll Learn

Operation of IP Data Networks

A. Recognize the purpose and functions of various network devices such as routers, switches, bridges and hubs
B. Select the components required to meet a given network specification
C. Identify common applications and their impact on the network
D. Describe the purpose and basic operation of the protocols in the OSI and TCP/IP models E. Predict the data flow between two hosts across a network

LAN Switching Technologies

A. Identify the appropriate media, cables, ports, and connectors to connect Cisco network devices to other network devices and hosts in a LAN
B. Determine the technology and media access control method for Ethernet networks
C. Identify basic switching concepts and the operation of Cisco switches
D. Collision domains
E. 1.1 Broadcast domains
F. 1.2 Ways to switch
G. 1.3 (i) Store
H. 1.4 (ii) Forward
I. 1.5 (iii) Cut through
J. 1.6 (iv) CAM Table
K. Configure and verify initial switch configuration including remote access management
L. 2.1.a hostname M. 2.2.b mgmt ip address
N. 2.3.c Ip default-gateway O. 2.4.d local user and password
P. 2.5.e enable secret password
Q. 2.6.f console and VTY logins
R. 2.7.g exec-timeout
S. 2.8.h service password encryption
T. 2.9.i copy run start
U. Verify network status and switch operation using basic utilities such as
V. 3.1.a ping W. 3.2.b telnet
X. 3.3.c SSH
Y. Describe how VLANs create logically separate networks and the need for routing between them
Z. 4.1.a Explain network segmentation and basic traffic management concepts AA. Configure and verify VLANs BB. Configure and verify trunking on Cisco switches

IP addressing (IPv4/IPv6)

A. Describe the operation and necessity of using private and public IP addresses for IPv4 addressing
B. Identify the appropriate IPv6 addressing scheme to satisfy addressing requirements in a LAN/WAN environment
C. Identify the appropriate IPv4 addressing scheme using VLSM and summarization to satisfy addressing requirements in a LAN/WAN environment

IP Routing Technologies

A. Describe basic routing concepts.
B. Router Packet forwarding
C. Router lookup process
D. Process Switching/Fast Switching/CEF
E. Configure and verify utilizing the CLI to set basic Router configuration
F. 1.2.a Hostname G. 1.2.b Local user & password
H. 1.2.c Enable secret password I. 1.2.d Console & VTY logins J. 1.2.e exec-timeout
K. 1.2.f service password encryption
L. 1.2.g Interface IP Address
M. 1.2.g (i) loopback
N. 1.2.h banner
O. 1.2.i motd
P. 1.2.j copy run start
Q. Configure and verify operation status of an Ethernet interface
R. Verify router configuration and network connectivity using
S. 2.3.a ping
T. 2.3.a (i) Extended ping
U. 2.3.b traceroute
V. 2.3.c telnet W. 2.3.d SSH X. 2.3.e Show cdp neighbors Y. Configure and verify routing configuration for a static or default route given specific routing requirements
Z. Differentiate methods of routing and routing protocols A. 3.4.a Static vs. dynamic
B. 3.4.b Link state vs. distance vector
C. 3.4.c Next hop
D. 3.4.d Ip routing table
E. 3.4.e Passive interfaces (how they work)

Network Security

A. Configure and verify network device security features
B. 4.1.a Device password security
C. 4.1.b Enable secret vs. enable
D. 4.1.c Transport
E. 4.1.c (i) Disable telnet
F. 4.1.c (ii) SSH
G. 4.1.d VTYs
H. 4.1.e Physical security I. 4.1.f Service password J. 4.1.g Describe external authentication methods
K. Configure and verify switch port security L. 5.2.a Sticky mac
M. 5.2.b MAC address limitation
N. 5.2.c Static/dynamic O. 5.2.d Violation modes
P. 5.2.d (i) Err disable
Q. 5.2.d (ii) Shutdown
R. 5.2.d (iii) Protect restrict
S. 5.2.e Shutdown unused ports
T. 5.2.f Err disable recovery
U. 5.2.g Assign unused ports in unused VLANs
V. 5.2.h Putting Native VLAN to other than VLAN 1


A. Configure and verify network device security features
B. Troubleshoot and correct common problems associated with IP addressing and host configurations
C. Troubleshoot and resolve VLAN problems D. 6.3.a Identify that VLANs are configured
E. 6.3.b Verify port membership is correct F. 6.3.c Correct IP address is configured
G. Troubleshoot and resolve trunking problems on Cisco switches
H. 7.3.a Verify correct trunk states
I. 7.3.b Verify correct encapsulation is configured
J. 7.3.c Correct VLANs are allowed


A. Configuration of all base features, including wireless security, the administration of the WLAN network, and maintenance
B. Troubleshooting wireless network issues
C. How to Configure Wireless router and Wireless Access point.

Linux Server Administration

A. Basic knowledge
B. Introduction to the command line
C. Managing physical storage
D. Learning how to install and configure software components and services
E. Establishing network connections and firewall access F. Monitoring and managing processes
G. Managing and securing files
H. Administrating users and groups
I. Accessing Linux file systems
J. IP Configuration
K. Ping, Trace Route
L. Default gateway setup

Windows Server Administration

A. Configuring the DNS Server Role
B. Configuring DNS Zones
C. Configuring DNS Zone Transfers
D. Managing and Troubleshooting DNS
E. Implementing Virtualized Domain Controllers
F. Implementing Read Only Domain Controllers
G. Administering AD DS
H. Managing the AD DS Database
I. Configuring Password Policy and User Account
J. Configuring Managed Service Accounts

Datacenter Infrastructure

A. Choose an optimum site for mission-critical data center based on current and future needs
B. Describe all components that are important for high availability in a data center and how to effectively setup the data center
C. Describe the various technologies for UPS, -re suppression, cooling, monitoring systems, cabling standards, etc., and to select and apply those effectively to cost- efficiently enhance the high-availability of the data center.

Lab Devices

Gain hands-on technical experience with our live labs. Practice with cutting-edge equipment to develop your routing, networking and configuration skills in real-world situations.

Westech IT specializes in IT training with a strong focus in all things networking. We provide industry leading video training courses, workbooks, bootcamps, and training bundles—everything you need to achieve your career goals. We constantly strive to achieve perfection in customer satisfaction and individual success rates.