<?xml version="1.0" encoding="UTF-8"?><rss
version="2.0"	xmlns:content="http://purl.org/rss/1.0/modules/content/"	xmlns:wfw="http://wellformedweb.org/CommentAPI/"	xmlns:dc="http://purl.org/dc/elements/1.1/"	xmlns:atom="http://www.w3.org/2005/Atom"	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"	xmlns:slash="http://purl.org/rss/1.0/modules/slash/">	<channel><title>Laimoon.com</title><link>https://courses.laimoon.com/sitemap/rss</link>	    <description>Courses in Dubai, Abu Dhabi, Sharjah Diplomas, Degrees &amp; Doctorates - Laimoon Course Guide</description>	    <language>en-us</language>	    	    	    						<item><title><![CDATA[Cyber Security Audit  - GBA -Professional London Training Center , Australia, Germany, India, Netherlands, Turkey, UAE, United Kingdom, Dubai, Delhi, Mumbai, Sydney, London, Istanbul, Frankfurt, Munich, The Hague ]]></title><link>https://courses.laimoon.com/course/cyber-security-audit-gba-professional-london-training-center/online</link>				  <description>				  <![CDATA[						Overview<br
/><br
/>Cyber Security Audit training equips professionals to assess and strengthen an organization&#39;s cyber defenses, covering risk assessment, vulnerability management, compliance, and implementing controls.<br
/><br
/>The Cyber Security Audit training course provides participants with a practical and structured understanding of how to assess the effectiveness of cyber security controls, policies, and governance frameworks within an organisation. The course focuses on evaluating compliance with recognised standards and regulatory requirements, identifying control gaps, and assessing cyber risks that may impact the confidentiality, integrity, and availability of information assets.<br
/><br
/>Participants will learn how to plan and conduct cybersecurity audits, review technical and organisational controls, and report audit findings in a clear and actionable manner.<br
/><br
/>Objective<ul><li>Define and apply principles of threat and vulnerability management</li><li>Assess and prioritise threats using vulnerability assessment tools</li><li>Design and implement secure authentication and authorisation mechanisms</li><li>Explain key components of effective cyber security governance</li><li>Differentiate between firewall technologies and broader network security controls</li><li>Strengthen asset, configuration, change, and patch management processes</li><li>Manage enterprise identity, access, and information security</li><li>Identify and evaluate application security controls</li></ul><p>Cost: 4250 USD</p><p>Duration: 5 Days</p>					]]>				  </description>				  <pubDate>Wed, 24 Dec 2025 18:16:48 +04</pubDate>				</item> 								<item><title><![CDATA[Cyber Security Risk Management  - GBA -Professional London Training Center , Australia, Germany, India, Netherlands, Turkey, UAE, United Kingdom, Dubai, Delhi, Mumbai, Sydney, London, Istanbul, Frankfurt, Munich, The Hague ]]></title><link>https://courses.laimoon.com/course/cyber-security-risk-management-gba-professional-london-training-center/online</link>				  <description>				  <![CDATA[						Overview<br
/><br
/>Cyber Security Risk Management&nbsp;focuses on identifying, assessing, and mitigating cyber threats that can impact an organisation&rsquo;s information assets, operations, and reputation. This training provides a practical understanding of cyber risk frameworks, threat landscapes, and control strategies aligned with international standards and best practices.<br
/><br
/>Participants will learn how to evaluate cyber risks, implement appropriate security controls, integrate cyber risk into enterprise risk management, and support informed decision-making to enhance organisational resilience in an increasingly digital environment.<br
/><br
/>Learning Outcome<ul><li>Implement standards-based, proven methodologies for assessing and managing organisation&#39;s information infrastructure risks.</li><li>Select and implement security controls that ensure compliance with applicable laws, regulations, policies, and directives.</li><li>Extend security protection to ICS (Industrial Control Systems) and the cloud.</li><li>Understand the fundamentals of cyber security risk, including threats, vulnerabilities, and impacts on business operations</li><li>Identify and assess cyber risks using structured risk assessment frameworks and methodologies</li><li>Apply risk treatment strategies to reduce, transfer, avoid, or accept cyber risks</li><li>Align cyber security risk management with enterprise risk management and governance structures</li><li>Understand relevant standards and frameworks such as ISO 27001, NIST, and other leading practices</li><li>Enhance organisational resilience through effective monitoring, reporting, and continuous improvement of cyber risk controls</li><li>&nbsp;</li></ul><p>Cost: 4250 USD</p><p>Duration: 5 Days</p>					]]>				  </description>				  <pubDate>Wed, 24 Dec 2025 18:04:42 +04</pubDate>				</item> 								<item><title><![CDATA[Principles and Practices of Cyber Security  - GBA -Professional London Training Center , Australia, Germany, India, Netherlands, Turkey, UAE, United Kingdom, Dubai, Delhi, Mumbai, Sydney, London, Istanbul, Frankfurt, Munich, The Hague ]]></title><link>https://courses.laimoon.com/course/principles-and-practices-of-cyber-security-gba-professional-london-training-center/online</link>				  <description>				  <![CDATA[						Cybersecurity plays an important role in every business as it encompasses everything that relates to protecting sensitive data, personal information, intellectual property, and governmental and industry information systems from theft and damage attempted by criminals and adversaries.<br
/><br
/>This course is designed to understand and gain practical skills to plan, deliver and monitor IT/cyber security to internal and external clients, understanding a complete knowledge in the areas of IT policies, Security-Operational-Run-Book, security/penetration testing, ethical hacking and black hat hacking, including understanding the basics of Kali Operating System and its tools and techniques.<br
/><br
/>It will also cover WiFi security, Website security, human factors, cyber forensics, cyber security team management, including all other areas related to Cyber Security.<br
/><br
/><strong>Objective</strong><ul><li>Understand the fundamental principles and concepts of cybersecurity</li><li>Identify common cyber threats, vulnerabilities, and attack vectors</li><li>Apply best practices and security controls to protect digital assets and networks</li><li>Conduct risk assessments and implement mitigation strategies for cyber threats</li><li>Develop effective incident response and recovery plans</li><li>Ensure compliance with relevant regulations, standards, and organizational policies</li><li>Promote a culture of cyber security awareness within the organization</li><li>Integrate cyber security practices into day-to-day operations to safeguard information and maintain business continuity</li></ul><p>Cost: 4250 USD</p><p>Duration: 5 Days</p>					]]>				  </description>				  <pubDate>Fri, 19 Dec 2025 18:19:22 +04</pubDate>				</item> 								<item><title><![CDATA[Process Control Cybersecurity  - GBA -Professional London Training Center , Australia, Germany, India, Netherlands, Turkey, UAE, United Kingdom, Dubai, Delhi, Mumbai, Sydney, London, Istanbul, Frankfurt, Munich, The Hague ]]></title><link>https://courses.laimoon.com/course/process-control-cybersecurity-gba-professional-london-training-center/online</link>				  <description>				  <![CDATA[						Overview<br
/><br
/>Industrial control systems in sectors such as oil &amp; gas, energy, and manufacturing are increasingly vulnerable to cyber threats, which can disrupt operations, compromise safety, and cause significant financial loss. This training equips participants with the knowledge and practical skills to identify, assess, and mitigate cybersecurity risks in process control environments.<br
/><br
/>The program covers industrial control system (ICS) security fundamentals, threat and vulnerability assessment, network protection, incident response, and best practices for maintaining operational integrity. Participants will also learn how to implement security policies, compliance measures, and risk management strategies tailored to process control systems.<br
/><br
/>By the end of the training, participants will be able to:<ul><li>Understand the architecture and vulnerabilities of industrial control systems.</li><li>Identify and assess cybersecurity threats specific to process control environments.</li><li>Apply security measures to protect operational technology networks and systems.</li><li>Develop incident response and risk mitigation strategies.</li><li>Promote a culture of cybersecurity awareness within industrial operations.</li><li>Perform security countermeasures to protect process control networks and assets.</li><li>Utilize diagnostics and troubleshooting tools to monitor and respond to cybersecurity incidents.</li><li>Establish security governance practices, including management of change and compliance measures.</li></ul><p>Cost: 4250 USD</p><p>Duration: 5 Days</p>					]]>				  </description>				  <pubDate>Thu, 18 Dec 2025 16:30:33 +04</pubDate>				</item> 								<item><title><![CDATA[ISO42001 Lead Implementer  - Opportunities Workshop , UAE, United Kingdom, Dubai, Online, London ]]></title><link>https://courses.laimoon.com/course/iso42001-lead-implementer-opportunities-workshop/online</link>				  <description>				  <![CDATA[						TRECCERT AI Management System ISO/IEC 42001 Lead Implementer is an expert-level course developed to equip trainees with a practical understanding of the AIMS implementation approach based on the requirements of the ISO/IEC 42001 standard.<br
/><br
/>The training course provides a comprehensive overview of the AIMS implementation based on the Plan-Do-Check-Act model and related concepts, processes, methods, and techniques.<br
/><br
/>Learning Objectives:<ul><li>Know and understand artificial intelligence management fundamental concepts, standards, best practices and laws/ regulations.</li><li>Know and understand ISO/IEC 42001 requirements, and describe their function and operation.</li><li>Know, understand and be able to define a framework for implementing a AI Management System (AIMS) within an organisation.</li><li>Know, understand and be able to interpret ISO/IEC 42001 controls and implement the AIMS based on the defined framework.</li><li>Know, understand and be able to support the implementation team to continually improve the implemented management system.</li></ul><br
/><strong>COURSE OUTLINE</strong><br
/><br
/>1. Introduction to AIMS<ul><li>Introduction to AI</li><li>AI Management System Overview</li><li>AI Governance Frameworks and Best Practices</li></ul>2. ISO/IEC 42001 Requirements<ul><li>Context of the Organization</li><li>Leadership</li><li>Planning</li><li>Support</li><li>Operation</li><li>Performance Evaluation</li><li>Improvement</li></ul>3. AI Controls<ul><li>Policies Related to AI</li><li>Internal Organisation</li><li>Resources for AI Systems</li><li>Assessing Impacts of AI systems</li><li>AI System Life Cycle</li><li>Data for AI Systems</li><li>Information for Interested Parties of AI Systems</li><li>Use of AI Systems</li><li>Third Party Relationships</li></ul>4. AIMS Initiation<ul><li>Develop the Project Charter</li><li>Ensure Management Commitment</li><li>Identify the Interested Parties</li><li>Conduct a Gap Analysis</li><li>Prepare the PDCA Cycle</li></ul>5. Establishment Phase<ul><li>Establish the Context of the Organization</li><li>Define the AIMS Scope</li><li>Establish the Objectives, Processes, and Procedures</li><li>Establish the AIMS Policy</li><li>Define the Risk Assessment Approach</li><li>Create the AIMS Implementation Plan</li><li>Management Authorization to Implement and</li><li>Operate the AIMS</li></ul>6. Implementation and Operation Phase<ul><li>AI Risk Management</li><li>Implement the AI Management Policies and Procedures</li><li>Manage AIMS Operations</li><li>Awareness and Training</li><li>Resource Management and Documented Information</li></ul>7. Monitor and Review Phase<ul><li>Monitor the AIMS</li><li>Conduct Internal Audits</li><li>Review the AIMS</li></ul><br
/>8. Maintenance and Improvement Phase<ul><li>Implement the Identified Improvements</li><li>Corrective and Preventive Actions</li><li>Communicate the Actions and Improvements</li><li>Ensure Continual Improvement of AIMS</li></ul><p>Cost: 2000 USD</p><p>Duration: 5 Days</p>					]]>				  </description>				  <pubDate>Tue, 22 Apr 2025 16:55:08 +04</pubDate>				</item> 								<item><title><![CDATA[Cyber IT Security Diploma  - Opportunities Workshop , Online, Dubai, United Arab Emirates, London, United Kingdom ]]></title><link>https://courses.laimoon.com/course/part-time-cyber-it-security-diploma-opportunities-workshop/online</link>				  <description>				  <![CDATA[						<strong>Course Overview:</strong><br
/>The Cyber IT Security Diploma programme is designed to equip students with essential skills and knowledge for a career in cybersecurity.<br
/><br
/><strong>Key Learning Outcomes:</strong><ul><li>Understand Foundational Security Concepts and Governance:<ul><li>Gain a solid understanding of cybersecurity principles, frameworks, and governance practices.</li></ul></li><li>Develop Skills in Intrusion Prevention and Penetration Testing:<ul><li>Learn how to prevent cyber-attacks and how to conduct penetration testing to identify vulnerabilities.</li></ul></li><li>Enhance Knowledge of Networking and Cloud Security:<ul><li>Deepen understanding of network security and best practices for securing cloud infrastructures.</li></ul></li><li>Manage and Plan for Security Risks:<ul><li>Understand risk management strategies to mitigate and manage security threats effectively.</li></ul></li><li>Comply with Legal and Regulatory Frameworks:<ul><li>Learn to navigate the legal and regulatory aspects of cybersecurity, ensuring compliance with industry standards.</li></ul></li></ul><strong>Programme Structure:</strong><br
/>This programme consists of 8 two-week sprints, featuring:<ul><li>Face-to-face workshops to introduce key topics.</li><li>Flexible online learning modules to provide self-paced learning.</li><li>Practical skills activities to apply theoretical knowledge.</li></ul>Throughout the course, students will work towards achieving the CompTIA Security+ certification.<br
/><br
/>This programme is designed for anyone eager to start a career in cybersecurity or those looking to strengthen their existing IT security knowledge and skills.<p>Cost: 3999 USD</p><p>Duration: 3 To 6 Months</p>					]]>				  </description>				  <pubDate>Thu, 30 Jan 2025 14:57:04 +04</pubDate>				</item> 								<item><title><![CDATA[Fortinet Fortigate  - Learnovate Training Center , UAE, Dubai, Online, Bur Dubai,United Arab Emirates ]]></title><link>https://courses.laimoon.com/course/fortinet-fortigate-learnovate-training-center/online</link>				  <description>				  <![CDATA[						<strong>Fortinet Fortigate Outlines</strong><ul><li>Learn Fortinet Fortigate Firewall configuration from the basics</li><li>Fine-tune the FortiGate device and implement eye-catching dashboards</li><li>Identify threats, monitor, and correlate events</li><li>Learn all about LAN, WAN, SSL Decryption, DNS Filtering, Safe Search, Routing, Endpoint Control, Intrusion Prevention</li><li>Gain knowledge of Network Address Translation (NAT)</li><li>Link Aggregation and much more</li></ul><strong>This course is ideal for the following candidates</strong><ul><li>Network Security Professionals</li><li>Network and System Administrators</li><li>Security Administrators</li><li>Technicians desiring to work with Fortinet Technologies</li><li>Existing Cyber Security specialists</li><li>Freshers looking to expand in the field of Network Security</li></ul><p>Cost: 600 AED</p><p>Duration: Upto 12 Hours</p>					]]>				  </description>				  <pubDate>Tue, 29 Oct 2024 16:48:33 +04</pubDate>				</item> 								<item><title><![CDATA[Cybersec First Responder CFR-410  - emt Academy  , Dubai ]]></title><link>https://courses.laimoon.com/course/cybersec-first-responder-cfr-410-emt-academy/online</link>				  <description>				  <![CDATA[						<strong>CyberSec First Responder (CFR-410)</strong><br
/><strong>Course Length</strong>: 5 days<br
/><strong>Location: </strong>Dubai Silicon Oasis, Dubai - UAE<br
/><strong>Overview</strong>:&nbsp;<br
/>This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT&#39;s National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination, NIST (Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations). It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, defend cybersecurity assets, identify various types of common threats, evaluate the organization&#39;s security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization.<br
/>This course is designed to assist students in preparing for the CertNexus CyberSec First Responder <strong>(Exam CFR-410)</strong> certification examination. What you learn and practice in this course can be a significant part of your preparation.<br
/><strong>Course Objectives:</strong><br
/>In this course, you will identify, assess, respond to, and protect against security threats and operate a system and network security analysis platform. You will:<ul><li>Assess cybersecurity risks to the organization</li><li>Analyze the threat landscape. &nbsp;</li><li>Analyze various reconnaissance threats to computing and network environments.</li><li>Analyze various attacks on computing and network environments.</li><li>Analyze various post-attack techniques.</li><li>Assess the organization&#39;s security posture through auditing, vulnerability management, and penetration testing.</li><li>Collect cybersecurity intelligence from various network-based and host-based sources. Copyright 2021 CertNexus. All Rights Reserved</li><li>Analyze log data to reveal evidence of threats and incidents.</li><li>Perform active asset and network analysis to detect incidents.</li><li>Respond to cybersecurity incidents using containment, mitigation, and recovery tactics.</li><li>Investigate cybersecurity incidents using forensic analysis techniques.</li></ul><p>Cost: 6000 AED</p><p>Duration: 3 Days</p>					]]>				  </description>				  <pubDate>Tue, 17 Jan 2023 18:06:21 +04</pubDate>				</item> 								<item><title><![CDATA[CISSP Certification  - Learners Point Training Institute , UAE, Dubai,Dubai,Bahrain,Oman,Qatar,Saudi Arabia,United Arab Emirates,Kuwait ]]></title><link>https://courses.laimoon.com/course/part-time-cissp-certification-learners-point-training-institute/online</link>				  <description>				  <![CDATA[						<strong>OVERVIEW: </strong>The Certified Information Systems Security Professional CISSP certification is recognized around the world as a mark of expertise for professionals working in Information Technology Security. The CISSP certification training in Dubai develops the expertise of professionals in defining IT architecture. This CISSP training enhances professionals&#39; skills in designing, creating, and maintaining secure business environments using globally approved information security standards.<br
/><br
/><strong>CAREER OPPORTUNITIES:<br
/><br
/>Market Trends:</strong> In today&#39;s information age, networks have become increasingly interconnected, making cyberattacks and their prevention more challenging. In 2020, cyber crimes have increased by 600% boosting the need for information security experts. The global cybersecurity market has been valued at USD billion in 2020, growing at a CAGR of McKinsey &amp; Company found that only 16% of executives believe their organizations are well prepared to deal with cyber risks, showing the huge dearth of information security management. As this data indicates, professionals with CISSP certification in Dubai have numerous career options.<br
/><br
/><strong>Salary Trends:</strong> Cybercrimes have become prevalent in this age of information technology, making cybersecurity jobs one of the most lucrative careers with hefty salaries. According to Burning Glass, 59% of all cybersecurity positions require at least one certification, among which the CISSP certification is most sought after. Due to the high demand for CISSP - certified professionals in the job market, they command a premium on their salaries. In the UAE, the average salary for professionals with CISSP certification is AED 308,000 per annum.<br
/><br
/><strong>Demand and Opportunities: </strong>The Internet and computers are now an integral part of any organization, so security against data breaches is an extremely crucial issue, which drives the demand for IT security professionals. The Bureau of Labor Statistics reports that employment of Information Security Analysts is increasing at a rate of 33%, which is much higher than all other occupations. In 2021, the cost of cybercrime is expected to amount to $6 trillion, leading to the creation of million cybersecurity jobs. From the data above it can be observed that there is a massive demand for cybersecurity professionals with CISSP certification in Dubai.<br
/><br
/><strong>COURSE OUTLINE:</strong><br
/><br
/>Security and Risk Management<ul><li>Security Governance Principles</li><li>Compliance</li><li>Professional Ethics</li><li>Security Documentation</li><li>Risk Management</li><li>Threat Modeling</li><li>Business Continuity Plan Fundamentals</li><li>Acquisition Strategy and Practice</li><li>Personnel Security Policies</li><li>Security Awareness and Training</li></ul>Asset Security<ul><li>Asset Classification</li><li>Privacy Protection</li><li>Asset Retention</li><li>Data Security Controls</li><li>Secure Data Handling</li></ul>Security Engineering<ul><li>Security in the Engineering Lifecycle</li><li>System Component Security</li><li>Security Models</li><li>Controls and Countermeasures in Enterprise Security</li><li>Information System Security Capabilities</li><li>Design and Architecture Vulnerability Mitigation</li><li>Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems</li><li>Cryptography Concepts</li><li>Cryptography Techniques</li><li>The site and Facility Design for Physical Security</li><li>Physical Security Implementation in Sites and Facilities</li></ul>Communications and Network Security<ul><li>Network Protocol Security</li><li>Network Components Security</li><li>Communication Channel Security</li><li>Network Attack Mitigation</li></ul>Identity and Access Management<ul><li>Physical and Logical Access Control</li><li>Identification, Authentication, and Authorization</li><li>Identity as a Service</li><li>Authorization Mechanisms</li><li>Access Control Attack Mitigation</li></ul>Security Assessment and Testing<ul><li>System Security Control Testing</li><li>Software Security Control Testing</li><li>Security Process Data Collection</li><li>Audits</li></ul>Security Operations<ul><li>Security Operations Concepts</li><li>Physical Security</li><li>Personnel Security</li><li>Logging and Monitoring</li><li>Preventative Measures</li><li>Resource Provisioning and Protection</li><li>Patch and Vulnerability Management</li><li>Change Management</li><li>Incident Response</li><li>Investigations</li><li>Disaster Recovery Planning</li><li>Disaster Recovery Strategies</li><li>Disaster Recovery Implementation</li></ul><strong>KEY TAKEAWAYS:</strong><br
/><br
/>Successful completion of our CISSP course in Dubai will enable candidates to:<ul><li>Understand the fundamentals of communication and network security</li><li>Reduce security risks by recognizing and mitigating them</li><li>Identify network-based attacks</li><li>Manage threats, data assets, and principles pertaining to data security</li><li>Oversee the information technology security in a corporate setting</li></ul><strong>ACCREDITATION:</strong><br
/><br
/>Our CISSP training in Dubai is accredited by ISO 9001: 2015 and the Knowledge and Human Development Authority (KHDA).<br
/><br
/><strong>ALUMNI:</strong> Our academy graduates are successfully placed in some of the top-notch companies in Dubai like Jumeirah, Aramex, Airarabia, Damac, Emaar, etc. They are entrepreneurs, career changers, and lifelong learners.<br
/><br
/><strong>WHY LEARNER&rsquo;S POINT:</strong><br
/><br
/>Being the leading providers of the CISSP course in Dubai, we have substantial experience in delivering relevant skills and knowledge to prepare for CISSP certification in Dubai.<br
/>Our CISSP certification course offers the following advantages:<ul><li>Our CISSP training is designed based on real-world scenarios, formulating and evaluating practical requirements</li><li>Our CISSP courses strive to provide a reality check and insight into the requirements of a challenging role and how to fulfill it</li><li>We also provide live interactive sessions and hands-on experience through assignments associated with the actual work environment</li><li>To enhance the learning experience of our students we provide organized group sessions and integrated training modules</li><li>Our discrete approach to career guidance enables our students to get successfully placed in renowned organizations</li></ul><p>Cost: 7500 AED</p><p>Discount: 50% Off for Laimoon Users!</p><p>Duration: 34 Hours</p>					]]>				  </description>				  <pubDate>Mon, 08 Nov 2021 14:47:16 +04</pubDate>				</item> 								<item><title><![CDATA[CCNAX  - Learners Point Training Institute , UAE, Dubai,Dubai,Bahrain,Kuwait,Oman,Qatar,Saudi Arabia,United Arab Emirates ]]></title><link>https://courses.laimoon.com/course/ccnax-learners-point-training-institute/online</link>				  <description>				  <![CDATA[						CCNA is the one-exam entry level certification also known as &lsquo;Cisco Certified Network Associate Routing &amp; ; This course tests a candidate&#39;s knowledge and skills required to install, operate, and troubleshoot a small-to-medium size enterprise branch network.<br
/><br
/>Course Objectives<ul><li>To provide CCNAX preparation to students pursuing a Cisco certification. The training follows official outlined guides and course material provided by Cisco and is taught by trainers from within the profession</li></ul><strong>Course Modules</strong><br
/><br
/>Network Fundamentals<ul><li>Explain the role and function of network components</li><li>Describe the characteristics of network topology architectures</li><li>Compare physical interface and cabling types</li><li>Identify interface and cable issues (collisions, errors, mismatch duplex, and/or speed)</li><li>Compare TCP to UDP</li><li>Configure and verify IPv4 addressing and subnetting</li><li>Describe the need for private IPv4 addressing</li><li>Configure and verify IPv6 addressing and prefix</li><li>Compare IPv6 address types</li><li>Verify IP parameters for Client OS (Windows, Mac OS, Linux)</li><li>Describe wireless principles</li><li>Explain virtualization fundamentals (virtual machines)</li><li>Describe switching concepts</li></ul><strong>Network Access</strong><ul><li>Configure and verify VLANs (normal range) spanning multiple switches</li><li>Configure and verify Interswitch connectivity</li><li>Course outline</li><li>Configure and verify Layer 2 discovery protocols (Cisco Discovery Protocol and LLDP)</li><li>Configure and verify (Layer 2/Layer 3) EtherChannel (LACP)</li><li>Describe the need for and basic operations of Rapid PVST+</li><li>Spanning Tree Protocol and identify basic operations</li><li>Compare Cisco Wireless Architectures and AP modes</li><li>Describe physical infrastructure connections of WLAN components (AP, WLC, access/trunk ports, and LAG)</li><li>Describe AP and WLC management access connections (Telnet, SSH, HTTP, HTTPS, console, and TACACS+/RADIUS)</li><li>Configure the components of a wireless LAN access for client connectivity using GUI only such as WLAN creation, security settings, QoS profiles, and advanced WLAN settings</li></ul><strong>IP Connectivity</strong><ul><li>Interpret the components of the routing table</li><li>Determine how a router makes a forwarding decision by default</li><li>Configure and verify IPv4 and IPv6 static routing</li><li>Configure and verify single area OSPFv2</li><li>Describe the purpose of the first-hop redundancy protocol</li></ul><strong>IP Services</strong><ul><li>Configure and verify inside source NAT using static and pools</li><li>Configure and verify NTP operating in a client and server mode</li><li>Explain the role of DHCP and DNS within the network</li><li>Explain the function of SNMP in network operations</li><li>Describe the use of Syslog features including facilities and levels</li><li>Configure and verify the DHCP client and relay</li><li>Explain the forwarding per-hop behaviour (PHB) for QoS such as classification, marking, queuing, congestion, policing, shaping</li><li>Configure network devices for remote access using SSH</li><li>Describe the capabilities and function of TFTP/FTP in the network</li></ul><strong>Security Fundamentals</strong><ul><li>Define key security concepts (threats, vulnerabilities, exploits, and mitigation techniques)</li><li>Describe security program elements (user awareness, training, and physical access control)</li><li>Configure device access control using local passwords</li><li>Describe security password policy elements, such as management, complexity, and password alternatives (multi-factor authentication, certificates, and biometrics)</li></ul><p>Cost: 8500 AED</p><p>Discount: 55% Off for Laimoon Users!</p><p>Duration: Upto 40 Hours</p>					]]>				  </description>				  <pubDate>Sun, 19 May 2019 12:44:47 +04</pubDate>				</item> 					</channel></rss>
<!-- Mar 14, 2026 07:07:00 -->