Loading...

Tshoot For Networking Solutions

Support and Training

Contact With US
CCNA
  • Orientation
  • Network Typologies
  • OSI Model
  • Headers and Encapsulation
  • Application Layer (Part 1)
  • Application Layer (Part 2)
  • Transport Layer
  • IPv4
  • Fixed Subnetting
  • VLSM+Private IPv4
  • IPv4 Header + ARP Protocol
  • IPv6 Concepts
  • Cables
  • Router Modes
  • Router Passwords
  • Router Components
  • GNS3 Installation
  • TFTP server
  • Telnet vs SSH
  • Banner
  • Cisco Router Password Recovery
  • Serial Interfaces
  • CDP (Cisco Discovery Protocol)
  • Static Routing
  • RIP Protocol
  • RIP Configurations
  • OSPF Protocol
  • OSPF Lab1
  • OSPF Lab2
  • EIGRP Protocol (Bonus Lab)
  • EIGRP Configuration (Bonus Lab)
  • IPv6 Routing
  • DHCPv4 and DHCPv6
  • Access Control List (ACL)
  • Router Switching Modes (Bonus Lab)
  • Network Address Translation (NAT)
  • Hierarchical Network Design and Spine Leaf Architecture
  • Switching Essentials and Basic Configurations
  • Switch Password Recovery
  • Building MAC Address Table
  • IOS License
  • VLAN Configuration
  • VLAN Trunking Protocols
  • VLAN Hopping and Voice VLANs
  • STP Protocol
  • Per VLAN STP (PVST+)
  • STP Enhancement (PortFast)
  • Rapid STP Protocol (RSTP)
  • LAN Security Attack (MAC Address Flood + DHCP Snooping)
  • LAN Security Attack Dynamic ARP Inspection
  • LAN Security Attack Port Security
  • Power Over Ethernet (PoE)
  • Inter VLAN Routing
  • L2 Etherchannel
  • EtherChannel Misconfig Guard and L3 EtherChannel
  • VTP Protocol
  • VTP Pruning and VTP V3
  • Hot Standby Router Protocol (HSRP)
  • Virtual Router Redundancy Protocol (VRRP)
  • Gateway Load Balance Protocol (GLBP)
  • AAA Server (Authentication, Authorization, Accounting)
  • Dot1x Protocol
  • Wi-Fi Technology
  • WAN Technology
  • Security Concepts
  • VPN
  • GRE tunnel
  • IPv6 migration
  • Syslog Server
  • SNMP Protocol
  • NTP Server
  • Clouding
  • QOS
  • Automation
CCNP Security
  • Information Security Concepts
  • Common TCP IP Attacks
  • common network application attacks
  • common network attacks
  • network security technologies
  • Deploying Cisco ASA Firewall
  • Deploying CIsco FIrepower Next Genration FIrewall
  • Deploying Email Content Security
  • Deploying Web Content Security
  • Deploying CIsco Umbrella
  • Explaining VPN Technologies and Cryptography Concepts
  • Introducing Cisco Secure Site-to-Site VPN Solutions
  • Deploying Cisco IOS VTI-Based Point-to-Point IPsec VPNs
  • Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW
  • Introducing Cisco Secure Remote Access VPN Solutions
  • Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW
  • Explaining Cisco Secure Network Access Solutions
  • Describing 802.1X Authentication
  • Configuring 802.1X Authentication
  • Describing Endpoint Security Technologies
  • Deploying Cisco AMP for Endpoints
  • Introducing Network Infrastructure Protection
  • Deploying Control Plane Security Controls
  • Deploying Layer 2 Data Plane Security Controls
  • Deploying Layer 3 Data Plane Security Controls
  • Deploying Management Plane Security Controls
  • Deploying Traffic Telemetry Methods
  • Deploying Cisco Stealthwatch Enterprise
  • Describing Cloud and Common Cloud Attacks
  • Securing the Cloud
  • Deploying Cisco Stealthwatch Cloud
  • Describing SDN
MCSA
  • Network Topologies
  • OSI model
  • TCP/IP model
  • Encapsulation
  • Application layer protocols
  • Transport layer
  • IPv4
  • Subnetting
  • IPv6
  • Cables
  • Windows Server 2025 installation
  • Windows 10 installation
  • Windows core
  • Active directory installation
  • Client Join domain
  • Create Domain Users
  • User Automation
  • Computer Account
  • Remote Desktop
  • Server Manager and mmc
  • Remotely Administering Windows Server 2025
  • Create User Delegation and Custom Management
  • Management Tool
  • Active Directory Partitions and Additional DC
  • Operation Master Roles
  • Demote DC
  • RODC (Read-only Domain Controller)
  • IFM (Install From Media)
  • AD Upgrade From Windows Server 2019 to Windows
  • Server 2025
  • Disk Management
  • NTFS Permissions
  • Sharing Permissions
  • Map Network Drive and Offline Sharing
  • DHCP Server
  • DNS Server
  • Configuring a New Domain Tree in an Existing
  • Forest
  • Adding a Child Domain
  • Configuring Trust Relationships
  • Active Directory Groups
  • Group Policy
  • System and Bare Metal Backup
  • WSUS server
  • VPN Server
Linux

admin 1 & 2

  • Getting Started with Red Hat Enterprise Linux
  • Accessing the Command Line
  • Managing Files From the Command Line
  • Getting Help in Red Hat Enterprise Linux
  • Creating, Viewing, and Editing Text Files
  • Managing Local Users and Groups
  • Controlling Access to Files
  • Monitoring and Managing Linux Processes
  • Controlling Services and Daemons
  • Configuring and Securing SSH
  • Analyzing and Storing Logs
  • Managing Networking
  • Archiving and Transferring Files
  • Installing and Updating Software Packages
  • Accessing Linux File Systems
  • Analyzing Servers and Getting Support
  • Writing Simple Bash Scripts
  • Scheduling Future Tasks
  • Tuning System Performance
  • Controlling Access to Files with ACLs
  • Managing SELinux Security
  • Managing Basic Storage
  • Managing Logical Volumes
  • Implementing Advanced Storage Features
  • Accessing Network
  • Attached Storage
  • Controlling the Boot Process
  • Managing Network Security
  • Installing Red Hat Enterprise Linux
Fortigate
  • Firewall History and Types
  • Fortigate VM Installation
  • Fortigate Basic Configuration and password recovery
  • Fortigate IP Configuration and DHCP
  • Fortigate Load
  • Balancing Configuration
  • Fortigate IPv4 Policies Configuration
  • Fortigate Web Filtering Configuration
  • Fortigate SSL Inspection Configuration
  • Fortigate Application Control Configuration
  • Fortigate QoS Configuration
  • Fortigate LDAP Configuration
  • Fortigate SSO Configuration
  • Fortigate IPv4 Policies With SSO Configuration
  • Fortigate Site To Site VPN
  • Fortigate Remote Site VPN
  • Fortigate High Availability Configuration
  • Fortigate OSPF Configuration
  • Fortigate BGP Configuration