Part 1: Windows System Core Level
Module 1: Installing and Configuring Domain Controllers
Overview of AD DS
Overview of AD DS Domain Controllers
Deploying a Domain Controller
Deploying AD DS
Deploying Domain Controllers by Cloning
Administering AD DS
Module 2: Managing Objects in AD DS
Managing User Accounts
Managing Groups in AD DS
Managing Computer Objects in AD DS
Using Windows PowerShell for AD DS Administration
Implementing and Managing Organizational Units (OUs)
Labs
Lab: Managing AD DS Objects
Creating and managing groups in AD DS
Creating and configuring user accounts in AD DS
Managing computer objects in AD DS
Lab: Administering AD DS
Delegating administration for OUs
Creating and modifying AD DS objects with Windows PowerShell
Part 2: Network System Core Level
Module 1: Building a Simple Network
Exploring the Functions of Networking
Understanding the Host-to-Host Communication Model
Introducing LANs
Operating Cisco IOS Software
Starting a Switch
Understanding Ethernet and Switch Operation
Troubleshooting Common Switch Media Issues
Module 2: Establishing Internet Connectivity
Understanding the TCP/IP Internet Layer
Understanding IP Addressing and Subnets
Understanding the TCP/IP Transport Layer
Exploring the Functions of Routing
Configuring a Cisco Router
Exploring the Packet Delivery Process
Enabling Static Routing
Managing Traffic Using ACLs
Enabling Internet Connectivity
Module 3: Implementing DNS
Implementing DNS Servers
Configuring DNS Zones
Configuring Name Resolution Between DNS Zones
Configuring DNS Integration with AD DS
Configuring Advanced DNS Settings
Troubleshooting DNS
Labs
Lab: Planning and Implementing Name Resolution Using DNS
Planning DNS name resolution
Implementing DNS servers and zones
Lab: Integrating DNS with Active Directory
Integrating DNS with AD DS
Lab: Configuring Advanced DNS Settings
Configuring DNS policies
Validating DNS implementation
Part 3: Linux System Core Level
Linux Command Basics
Navigating Directories
Getting Help in Linux
Creating, Copying, Moving, and Removing Files/Directories
Editing Files with VIM
Using Wildcards to Speed Up Tasks
Managing Users and Groups
Managing File Permissions
Command Redirection and Output Control
Managing Services
Networking Basics
Archiving Files and Directories
SSH Access
Downloading, Installing, Updating, and Managing Software Packages from:
Package Repositories
GitHub
Part 4: Ethical Hacking (CEHv11)
Introduction to Ethical Hacking
Footprinting and Reconnaissance
Scanning Networks
Enumeration
Vulnerability Analysis
System Hacking
Malware Threats
Sniffing
Social Engineering
Denial-of-Service (DoS)
Session Hijacking
Evading IDS, Firewalls, and Honeypots
Hacking Web Servers
Hacking Web Applications
SQL Injection
Hacking Wireless Networks
Hacking Mobile Platforms
IoT and OT Hacking
Cloud Computing Security
Cryptography
Part 5: Capture The Flag (CTF)
What is CTF?
CTF is a hands-on cybersecurity competition format designed to develop offensive and defensive security skills.
Common CTF Types
Jeopardy-Style CTF
Task-based challenges in areas such as Web, Forensics, Crypto, and Binary
Teams gain points for each solved challenge
Higher difficulty challenges award more points
Attack-Defence CTF
Each team has its own vulnerable network/services
Teams must defend their own systems and attack opponents
Scoring combines defense points and attack points
Mixed CTF
Combination of Jeopardy and Attack-Defence formats