Loading...
TSHOOT
Home
About
Courses
Network
Pages
Testimonial
Contact
WhatsAPP
Tshoot
For Networking Solutions
Support and Training
Contact With US
CCNA
Orientation
Network Typologies
OSI Model
Headers and Encapsulation
Application Layer (Part 1)
Application Layer (Part 2)
Transport Layer
IPv4
Fixed Subnetting
VLSM+Private IPv4
IPv4 Header + ARP Protocol
IPv6 Concepts
Cables
Router Modes
Router Passwords
Router Components
GNS3 Installation
TFTP server
Telnet vs SSH
Banner
Cisco Router Password Recovery
Serial Interfaces
CDP (Cisco Discovery Protocol)
Static Routing
RIP Protocol
RIP Configurations
OSPF Protocol
OSPF Lab1
OSPF Lab2
EIGRP Protocol (Bonus Lab)
EIGRP Configuration (Bonus Lab)
IPv6 Routing
DHCPv4 and DHCPv6
Access Control List (ACL)
Router Switching Modes (Bonus Lab)
Network Address Translation (NAT)
Hierarchical Network Design and Spine Leaf Architecture
Switching Essentials and Basic Configurations
Switch Password Recovery
Building MAC Address Table
IOS License
VLAN Configuration
VLAN Trunking Protocols
VLAN Hopping and Voice VLANs
STP Protocol
Per VLAN STP (PVST+)
STP Enhancement (PortFast)
Rapid STP Protocol (RSTP)
LAN Security Attack (MAC Address Flood + DHCP Snooping)
LAN Security Attack Dynamic ARP Inspection
LAN Security Attack Port Security
Power Over Ethernet (PoE)
Inter VLAN Routing
L2 Etherchannel
EtherChannel Misconfig Guard and L3 EtherChannel
VTP Protocol
VTP Pruning and VTP V3
Hot Standby Router Protocol (HSRP)
Virtual Router Redundancy Protocol (VRRP)
Gateway Load Balance Protocol (GLBP)
AAA Server (Authentication, Authorization, Accounting)
Dot1x Protocol
Wi-Fi Technology
WAN Technology
Security Concepts
VPN
GRE tunnel
IPv6 migration
Syslog Server
SNMP Protocol
NTP Server
Clouding
QOS
Automation
CCNP Security
Information Security Concepts
Common TCP IP Attacks
common network application attacks
common network attacks
network security technologies
Deploying Cisco ASA Firewall
Deploying CIsco FIrepower Next Genration FIrewall
Deploying Email Content Security
Deploying Web Content Security
Deploying CIsco Umbrella
Explaining VPN Technologies and Cryptography Concepts
Introducing Cisco Secure Site-to-Site VPN Solutions
Deploying Cisco IOS VTI-Based Point-to-Point IPsec VPNs
Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW
Introducing Cisco Secure Remote Access VPN Solutions
Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW
Explaining Cisco Secure Network Access Solutions
Describing 802.1X Authentication
Configuring 802.1X Authentication
Describing Endpoint Security Technologies
Deploying Cisco AMP for Endpoints
Introducing Network Infrastructure Protection
Deploying Control Plane Security Controls
Deploying Layer 2 Data Plane Security Controls
Deploying Layer 3 Data Plane Security Controls
Deploying Management Plane Security Controls
Deploying Traffic Telemetry Methods
Deploying Cisco Stealthwatch Enterprise
Describing Cloud and Common Cloud Attacks
Securing the Cloud
Deploying Cisco Stealthwatch Cloud
Describing SDN
MCSA
Network Topologies
OSI model
TCP/IP model
Encapsulation
Application layer protocols
Transport layer
IPv4
Subnetting
IPv6
Cables
Windows Server 2025 installation
Windows 10 installation
Windows core
Active directory installation
Client Join domain
Create Domain Users
User Automation
Computer Account
Remote Desktop
Server Manager and mmc
Remotely Administering Windows Server 2025
Create User Delegation and Custom Management
Management Tool
Active Directory Partitions and Additional DC
Operation Master Roles
Demote DC
RODC (Read-only Domain Controller)
IFM (Install From Media)
AD Upgrade From Windows Server 2019 to Windows
Server 2025
Disk Management
NTFS Permissions
Sharing Permissions
Map Network Drive and Offline Sharing
DHCP Server
DNS Server
Configuring a New Domain Tree in an Existing
Forest
Adding a Child Domain
Configuring Trust Relationships
Active Directory Groups
Group Policy
System and Bare Metal Backup
WSUS server
VPN Server
Linux
admin 1 & 2
Getting Started with Red Hat Enterprise Linux
Accessing the Command Line
Managing Files From the Command Line
Getting Help in Red Hat Enterprise Linux
Creating, Viewing, and Editing Text Files
Managing Local Users and Groups
Controlling Access to Files
Monitoring and Managing Linux Processes
Controlling Services and Daemons
Configuring and Securing SSH
Analyzing and Storing Logs
Managing Networking
Archiving and Transferring Files
Installing and Updating Software Packages
Accessing Linux File Systems
Analyzing Servers and Getting Support
Writing Simple Bash Scripts
Scheduling Future Tasks
Tuning System Performance
Controlling Access to Files with ACLs
Managing SELinux Security
Managing Basic Storage
Managing Logical Volumes
Implementing Advanced Storage Features
Accessing Network
Attached Storage
Controlling the Boot Process
Managing Network Security
Installing Red Hat Enterprise Linux
Fortigate
Firewall History and Types
Fortigate VM Installation
Fortigate Basic Configuration and password recovery
Fortigate IP Configuration and DHCP
Fortigate Load
Balancing Configuration
Fortigate IPv4 Policies Configuration
Fortigate Web Filtering Configuration
Fortigate SSL Inspection Configuration
Fortigate Application Control Configuration
Fortigate QoS Configuration
Fortigate LDAP Configuration
Fortigate SSO Configuration
Fortigate IPv4 Policies With SSO Configuration
Fortigate Site To Site VPN
Fortigate Remote Site VPN
Fortigate High Availability Configuration
Fortigate OSPF Configuration
Fortigate BGP Configuration