Hotline: 1800 PROGRESO (1800 776 4737)


Cisco CCNA Security: The A, B, C's of IPv6
 
Students will get a thorough understanding of IPv6 and how we would implement it in a real world environment.
 
We will discuss the format of an IPv6 address, and breakdown the different components, like the Network Prefix, Interface ID, what each 16 bit section does and specifically the subnetting section of IPv6. We will learn about the new types of addresses that comes with IPv6, its configurations using RIPng, EIGRP for IPv6, OSPFv3 using both static assigned addresses and the EUI-64 format. We will also learn about the transition methods such as ISATAP, 6to4, and NAT-PT.
 
This is a lecture based course using the Touch-IT Technology Smart board, which will make learning very interactive and engaging. Hands on labs will be used to drill down the concepts learned in each lecture using Cisco’s Packet Tracer.
 
Handouts will be available to facilitate learning and practice.
 
This course will help the student become familiar with the use of IPv6, recognizing IPv6 addresses and how to implement them in your environment…but it will also help in preparing for any networking certification or Computer Science Degree; not to mention the fact that for those already in the field, it will further improve routing decisions in their particular networks.
 
What are the requirements?
Students should have an understanding of the IPv4 Protocol and hexadecimal numbers.
 
What am I going to get from this course?
Once you finish my course, you will have a strong grasp on the concepts of IPv6 and methods to use in different networking environments. You will be able to configure any of the routing protocols discussed using IPv6. You will learn how to dual stack your router using both IPv4 and IPv6 to help in the transition to a fully implemented IPv6 environment.
The understanding of IPv6 is an essential element for any Networking and/or IT Professional. This course will prepare the student for any networking certification such as N+, CCNA, MCSE to include any Computer Science Degree.
 
What is the target audience?
This course is intended for anyone that is preparing for a network certification or Computer Science Degree. However, it does go beyond that, it is also intended for those Networking and/or IT Professionals that are already in the field and need a better understanding of IPv6.
 
 
Click HERE for the Course Outline.
 
Use Coupon Code: PROGRESO30 for 30% discount.
 
 
 
 
Course Schedule
Related Courses
IPv6 Essentials - Foundations of the new Internet Protocol
This course covers all major aspects of the new Internet Protocol and what changed, compared to IPv4.
IPv6 - learn the basics of the new IP protocol
Understand how IPv6 works. Difference between the address spaces. How Ipv6 addresses are constructed and shortened.
Introduction to the Internet of Everything Preview
Internet and its evolution to the interconnection of people, processes, data, and things
Introduction to Cyber Security - SkillsFuture Approved
Learn the basic and vital components of Cyber Security & Cyberspace. In this course you learn cyber security components!
The Complete Cyber Security Course : Network Security!
Volume 2 : Network Security, WiFi Security, WiFi Hackers, Firewalls, Wireshark. Plus the Best Password Managers
Hacking & Digital Forensics & Autopsy - Stay Anonymous
With Technology Advancement, staying anonymous and protecting your online and offline activities is critical.
Internet and Computer Security: Protect Yourself Online!
Learn how to protect your identity and information online using tried and tested techniques, tips and tricks.
Become Computer Forensics Expert & Start your career!
The best Computer Forensics course! From Beginner to Professional.
Surviving Digital Forensics: Memory Analysis 1
Learn how to identify suspicious processes running in Windows memory
Surviving Digital Forensics: Resolving Attached USBs
A forensic guide for linking USB activity to Windows computer systems
Surviving Digital Forensics: Windows Prefetch
Helping you sharpen your computer forensic skills to prove file use and knowledge.
Surviving Digital Forensics: Link Files
A computer forensic guide for understanding LINK file evidence on Windows computer systems
 
Your Name
Contact No
E-mail
Subject
Message
Text Limit :
Security Code
 
10
824
96