Curriculum Outline


Tab 1



All the training courses are delivered via instructor-led approach with hands-on lab.
✸ Instructor-Led Training: Set in an interactive classroom environment, the instructor will introduce concepts and guide students with detailed explanations and interesting examples to meet the student expectations and requirements and at the same time keep the students engaged.
✸ Hands-on Lab: Step-by-step hands-on labs with detail instructions and guide are provided to reinforce all key concepts. It allows the student to reinforce concepts by performing the tasks they have just learned.
✸ As these are certification programs, candidates are required to pass both the written and hands-on evaluation to qualify for the certificate.

1.IPv6 Forum Certified Course & Network Engineer (Silver)

 

Plan and Implement IPv6 in a Multi-Vendor, Commercial Environment.
You will learn to:
✸ Implementing new networking software and devices to support IPv6.
✸ Implementing auto-configuration to manage IPv6 addresses.
✸ Configure the different IPv6 migration tools as tunnelling in order to facilitate the transition.
✸ Obtain and configure upgrades for common operating systems.

Prerequisites

A good knowledge of general networking concepts is assumed. IPv4 is reviewed as it is compared and contrasted with IPv6, but experience on IPv6 is not critical. Knowledge on the level of Cisco Certified Network Associate (CCNA) would be an added advantage.

Prerequisites Course Outline

The Internet Protocol
✸ Introduction to IP
✸ Internet as a Datagram Network
✸ Internet as a Connectionless Network
✸ IPv6 Technical Features
✸ Differences between IPv4 and IPv6
✸ Address Space
✸ Quality of Service and Routing Efficiency
✸ Plug and Play
✸ Mobility
✸ Security

IPv6 Address Architecture and Scheme

✸ Notation of IPv6 addresses
✸ Types of addresses
✸ IPv6 Addressing Schemes
✸ A case study of IPv6 addressing scheme

OS IPv6 Configuration

✸ Windows ✸ Linux ✸ BSD Configuration Information

IPv6 device configuration

✸ Autoconfiguration
✸ Stateless autoconfiguration
✸ Stateful autoconfiguration
✸ Duplicate address detection
✸ Address Resolution
✸ Neighbour discovery procedures
✸ Neighbour solicitation messages
✸ Neighbour advertisement messages

Introduction to routing

✸ Introduction Static Routing ✸ Introduction Dynamic Routing ✸ Hands on (Static Routing)

Translation Mechanisms

✸ CGN ✸ NAT44 ✸ NAT444 ✸ AFT

Introduction to Tunelling

✸ 6-to-4 ✸ 6-in-4 ✸ 6-r-d ✸ Isatap ✸ Teredo

Tab 2

2.IPv6 Forum Certified Course & Network Engineer (Gold)

 

Plan and Implement Advanced IPv6 in a Multi-Vendor, Commercial Environment.
You will learn to:
✸ Generate and test IPv6 packets in a network.
✸ Plan and manage the migration of your network to IPv6.
✸ Implementing new networking software and devices to support IPv6.
✸ Install and configure associated network services such as DNS and routing protocols.
✸ Update and configure common networking applications such as email and Web servers.Configure routers and dual stack.

Prerequisites

A good knowledge of general networking concepts is assumed. Certified IPv6 Network Engineer (CNE6) Level 1 is necessary to pursue this training program.

Course Outline

✸ IPv6 Packet Generation
✸ Understanding scapy6
✸ Crafting packets
✸ Testing with various configurations
✸ IPv6 Packet Detection
✸ Understading SNORT IPv6 Capabilities
✸ Native IPv6
✸ IPv6 over Tunnels
✸ IP Sec
✸ IPv6 IPSec overview
✸ Security policies and security associations
✸ IPSec tunneling
✸ IPSec Framework
✸ Authentication header
✸ Encapsulating security payload
✸ ESP transport mode
✸ ISAKMP/IKE

Internet key exchange IPv6 IPSec in a Windows environment Microsoft symmetric key authentication Setting up the IPSec tunnel

IPv6 Integration

✸ Header translation
✸ Tunnel Brokers
✸ Teredo Tunneling
✸ 6-in-4 Tunneling
✸ 6rd
✸ ds-lite
✸ IPv4 to IPv6
✸ Steps to migrate to IPv6
✸ Hardware
✸ Software
✸ Operating System (OS)
✸ Windows Vista/7/2008 Server
✸ Linux
✸ Mac OS
✸ Legacy OS
✸ DNS
✸ Web
✸ E-mail
✸ Name Service in IPv6
✸ IPv6 and DNS
✸ AAAA and A6 records
✸ Reverse lookup in IP.ARPA
✸ DNS Setup
✸ Routing protocols
✸ Dynamic routing and its advantages over the static routing
✸ RIPng
✸ ISIS for IPv6
✸ BGP4+
✸ DHCPv6
✸ Stateful address management
✸ Stateless address management
✸ Manual address management

Tab 3

3.IPv6 Forum Certified Trainer(Gold)

 

IPv6 Forum will certify and qualify trainers to teach IPv6 Forum instructor-led courses.
The train-the-trainer (TTT) program covers the standard syllabus with an addition of 1-day trainer training that will cover the following:
1)Know-how on setting up IPv6 network.
2)Configuring servers to support and enable IPv6 connectivity.
3)Advanced knowledge required for the trainer.
4)Additional evaluation catered specifically for trainer candidates.

IPv6 Forum Certified Train The Trainer Course (Gold)

IPv6 training courses can be developed and delivered by IPv6 experts worldwide. In order to qualify for the IPv6 Forum course certification, the course has to comply to the objectives highlighted for training courses highlighted from Section 5.1 through section 5.5 has to be observed by the course being evaluated to ensure consistency and standards of IPv6 capacity building is adhered to. Through the evaluation of these courses, we can also indicate which processes should be improved, to affect better results. The evaluation team will be comprised of esteemed members of the IPv6 Forum Global who will vet and advice on the courses brought forward and finally decides to award either Silver or Gold to the evaluated courses. IPv6 Forum will evaluate based on (but not limited to) the following criteria:
✸ Content relevance to IPv6.
✸ Course length and class size appropriateness for training goals.
✸ Quality of lecturers and course materials.
✸ Participatory and action-learning methods used.
List of courses shown in the table below:
http://www.6deploy.eu/index.php?page=tutorials
http://6diss.6deploy.eu/tutorials/

Download Specifications

Please download the specifications from here: IPv6 Forum Education Logo Program v6.6.doc


Tab 4

4.Certified IPv6 Network Programmer (CNP6)

(i) Introduction: This course is an advanced training course for those who need deeper understanding of IPv6 network programming and testing. The course covers topics such as socket API, IPv4 vs. IPv6 prgramming in C/C++ and Visual C#.NET. This course focuses on the differences in IPv6 programming from traditional network programming and assumes prior knowledge in basic network programming. Upon completion of this course, each participant will receive the "CNP6 Certified Network Programmer" certificate.
(ii) Training Approach:
For any kind of training to have a lasting and measurable impact, the course conents have been designed and delivered in the context of the client's specific environment and business need. NLTVC has customized the content with leading edge and time-honored training approaches that includes instructor-led, mentor learning hands-on approach, to meet the specific learning style of the individual and the complex learning objectives of organizations.
(iii) Who Should Attend?
This course is designed for software and/or computer engineers (designers/developers, testers etc.) and programmers who develop and test IP-applications and require deeper knowledge on how to build IPv6 solutions/applications as well as porting existing IPv4 applications to support IPv6.

Tab 5

5.Certified IPv6 Security Engineer Silver

(i) Introduction:
The aim of this IPv6 training program is to give in fundamental information on the implementation of security parameters in transition from IPv4 to IPv6 and expose the participants on the security issues in the deployment of IPv6 in the organizations network. This course would provide fundamental understanding about security issue revolving around IPv6 and will be one of the pre-requisite for Certified Security Engineer for IPv6 (CSE6).
(ii) Who Should Attend?
-Security enthusiast
-Decision makers for IT Security spending
-Network/Security Architect
-Network/Security Architect
-IT administrator
-Network/IT support technicians

(iii) You Will Learn:
-Understand IPv6 Security features.
-Understand various IPv6 Security Issues.
-Will expose to IPv6 network monitoring techniques.

Tab 6

5.Certified IPv6 Security Engineer Gold

(i) Introduction:
The aim of CSE6 training program is to give in-depth information on IPv6 security and provide adequate exposure to the participants on the technical knowledge required to understand the IPv6 security issues. Having completed this 4-days course, participants will learn about:
- Security features that exists in IPv6
- Vulnerabilities that exists in IPv6 (and IPv4)
- The benefits of IPv6 in terms of security aspect
- Managing security in IPv6
The practical/hands-on includes:
- Basic IPv6 Configuration; auto-configuration and routing
- Using The Hackers Choice (THC-IPv6) IPv6 Suite and other relevant tools
- Configuring IPSec in a router
- Implementing SEND and CGA
- Detecting/Mitigating ND Attacks
- Configuring IPv6 firewalls; ingress and egress
- Developing IPv6 security policy and best practice
- Monitoring an IPv6 Network
And many others!!!
(ii) Training Approach:
For any kind of training to have a lasting and measurable impact, the course contents have been designed and delivered in the context of the client's specific environment and business need. NLTVC has customize the content with leading edge and time-honored training approaches that includes instructor-led, mentor learning hands-on approach, to meet the specific learning style of the individual and the complex learning objectives of organizations.
(iii) Who Should Attend?
CSE6 is ideal for network administrators, network support personnel, network security designers, networking consultants, IT managers & technical staffs.

Tab 7

6. Certified 5G Deployment Engineer for IPv6 Silver (C5GDE6S)

Introduction:
5G (from "5th Generation") is the latest generation of cellular mobile communications. It succeeds the 4G (LTE-A, WiMax), 3G (UMTS, LTE) and 2G (GSM) systems. 5G performance targets high data rate, reduced latency, energy saving, cost reduction, higher system capacity, and massive device connectivity. The first phase of 5G specifications in Release-15 has been completed by April 2019 to accommodate the early commercial deployment. The second phase in Release-16 is due to be completed by April 2020 for submission to the International Telecommunication Union (ITU) as a candidate for IMT-2020 technology. This training will provide detailed deployment strategy of how to implement IPv6 addressing in the 5G networks.
Key Objective
The key objective of this training to train engineers on how to deploy IPv6 over 5G network.
The engineers whom attend this course should have the following basic knowledge on the following
a. Basic knowledge on network and network devices
b. Basic knowledge on mobile network such as 2.5, 3G and 4G would be added advantage
c. Basic knowledge on security
Upon completion of this course, the engineers
1. Able to design and deploy IPv6 in the 5G networks.
2. Able to troubleshoot issues related to IPv6 deployment over 5G network.
3. Able to configure and secure the 5G network.
4. Able to configure end customer network.
5. Also able to design and configure 4G networks

Course Outline

1 5G Introduction
1.1 What is 5G
1.2 5G Standards
1.3 5G Air Interface
1.4 5G Overall Architecture
1.5 5G Services, Applications and Use Cases
1.6 Network Slicing
1.7 Programmability & Softwarization
1.8 Management and Orchestration
1.9 5G Security Architecture

2 IPv6 Introduction
2.1 What is IPv6
2.2 Global Internet Resource Management
2.3 Five Steps on the Path to IPv6
2.4 IPv4 vs IPv6
2.5 IPv6 Addresses
2.6 IPv6 Text Representation
2.7 Text Representation of Address Prefixes
2.8 IPv6 Address Abbreviation
2.9 Recommendation for IPv6 Address Text Representation
2.10 IPv6 Address Types (RFC 4291)
2.11 Address Scope
2.12 Understanding Address Types
2.12.1 IPv6 Unicast Address
2.12.2 Link-Local & Site-Local Addresses
2.12.3 Unique Local Addresses
2.12.4 Unspecified Address
2.12.5 IPv4-Compatible Address
2.12.6 IPv6 Anycast Address
2.12.7 IPv6 Multicast Address
2.12.8 IPv6 Multihoming
2.13 Dual-Stack Solutions
2.14 DNS for IPv6
2.15 Fragment Header

3 IPv6 Address Allocation Schemes
3.1 Understanding ICMPv6
3.2 Understanding Neighbor Discovery Protocol (NDP)
3.3 Static Addressing
3.4 Stateful Addressing
3.4.1 DHCPv6
3.5 Stateless Addressing
3.5.1 EUI 64
3.5.2 Privacy Extension

4 IPv6 Address Allocation Schemes for 5G
4.1 Addressing Types
4.1.1 Infrastructure Addressing
4.1.2 Subscriber addressing
4.2 Deployment Consideration
4.3 IPv6 Addressing Types

5 IPv6 Routing for 5G Transport
5.1 IPv6 Routing Tables
5.2 MP-BGP
5.3 OSPFv3

6 IPv6 Transition Strategies for 5G
6.1 IPv6 Provider Edge (6PE)
6.2 IPv6 VPN Provider Edge (6VPE)
6.3 6PE & 6VPE
6.4 464XLAT Technology
6.5 IPv6 3GPP Standards for 5G

7 IPv6 Built-in IPSec over 5G
7.1 Introduction
7.2 Security Challenges in IPv6 over 5G
7.3 Cell-Site Break-Ins & Attacks on the S1 & X2: Fact & Fiction
7.4 IPSec Framework in IPv6
7.5 Operator Uncertainty About the Case for IPsec

8. Models for IPsec Deployment
8.1 Introduction
8.2 Operators Are Pursuing a One-Tunnel Model at Launch
8.3 Implementing IPsec With QoS
8.4 Implementing IPsec With Packet Synchronization
8.5 Authentication in 5G: New Applications of a Mature Technology
8.6 Advanced Models for IPsec Deployment

The lab exercise would include IPv6 address assignment and Connectivity Lab

- Assigning IPv6 addresses to mobile IPv6 nodes in 5G network using different address allocation methods
- Setup the network monitoring software to the monitor IPv6 traffic over the 5G network


(ii) Training Approach:

This course includes instructor-led, mentor learning hands-on approach, to meet the specific learning style of the individual and the complex learning objectives of organizations.

(iii) Who Should Attend?

This course is ideal for telecommunication engineers whom design and deploy whom are deploying IPv6 for 56 networks.

Tab 8

6. Certified IoT Security Professional (CIoTSP)

Introduction:
The ability to connect, communicate with, and remotely manage an incalculable number of networked, automated devices (approximately 26 Billion by 2020) via the Internet is becoming pervasive, from the factory floor to the hospital operating room to the residential basement. The transition from closed networks to enterprise IT networks to the public Internet is accelerating at an alarming pace—and justly raising alarms about security. As we become increasingly reliant on intelligent, interconnected devices in every aspect of our lives, how do we protect potentially billions of them from intrusions and interference that could compromise personal privacy or threaten public safety? This training covers the basics and Intermediate levels of IoT landscape and takes you through IoT Security Challenges and vulnerabilities and teaches you the steps to hack and harden the IoT devices, applications and ecosystem.

Training Approach
The training would involve both theory and practical led by the instructor . Easy to understand case study-based real life approach. In depth knowledge from experienced trainer.

Who Should Attend?
This course is recommended for IoT Enthusiasts, IoT Designers, IoT Developers, IoT Implementers, IT Managers, IT Auditors and anyone who is ready to master the steps required to secure IOT Implementations.

Prerequisites
1. Should be involved in the IT field.
2. Should be familiar with using Windows, Linux and VMWare
3. Should understand programming concepts, but programming experience is not mandatory
4. Background knowledge in reverse code engineering and vulnerability assessment will be helpful, but not required.
5. Enthusiasm is a must.

Course Outline
Chap 1. Overview of IOT technologies
What is IoT?
IoT Architecture & Ecosystem
Hardware & Software Platforms
Communication Channels & Protocols
Cloud & IoT
Cloud & RESTful Web Services
Data Streaming & IoT
IoT Myths
IoT Applications
- Agriculture
- Medical
- Meteorology

Chp 2. IoT Security Overview
Overview of IOT Security
IoT Threats
Challenges to Secure IoT Deployments
Types of IoT Attacks

Chp 3. Baseline Policies for IoT Security
IoT Security Controls Lifecyle
Authentication / Authorization
Logging & Audit Framework
Privacy by Design
Data Protection Policies

Chp 4. IoT Vulnerabilities
Insecure Web Interface
Insufficient Authentication/Authorization
Insecure Network Services
Lack of Transport Encryption
Privacy concerns
Insecure Cloud Interface
Insecure Mobile Interface
Insufficient Security Configurability
Insecure Software/Firmware
Poor Physical Security

Chp. 5 IoT Endpoint Security Guidelines
IoT Endpoint Security Challenges
IoT Endpoint Security Model and Recommendations.
Secure the IoT Systems
Securing the IoT Network.
IPv4 Based Security Guidelines
IPv6 Based Security Guidelines
Data Link Layer Based Network Guidelines

Chp. 6 IoT Security Recommendations
High Priority Security Recommendations
Medium Priority Recommendations
Low Priority Recommendations
5G based IoT Endpoint Security Recommendations

Practical Hacking IoT Devices (Hands On)
IOT Lab installation (install Kali Linux, install required tools)
IoT
Security Lan installation
IoT Operating system Security
IoT communication (Wifi/Bluetooth) security
IoT vulnerability search engine