Course Details
Topic 1: Get Ready
- What is Virtual Private Network
- Types of VPN in the world
Topic 2: Site to Site VPN - IPSEC VPN Configuration
- Introduction of IPSEC VPN and Encapsulation
- IPSEC Transport Mode
- IPSEC Tunnel Mode
- Site to Site VPN - IPSEC VPN Pratice
Topic 3: Site to Site VPN - IPSEC over GRE Tunnel Configuration
- Introduction of GRE Tunnel
- Problem in IPSEC Tunnel
- IPSEC over GRE Tunnel Practise
Topic 4: Site to Site VPN - Building a Scalable VPN Network for Large Enterprise
- Comparison of all Site to Site VPN for Enterprise
- Explanation of DMVPN(Dynamic Multipoint VPN)
- Dynamic Routing protocol(OSPF) for route exchange in DMVPN
- DMVPN/DSVPN Practise
Topic 5: Remote VPN - Window Server Remote VPN Access
- AAA(Authentication, Authorization and Accounting)
- PPTP (Point-to-Point Tunneling Protocol) Explanation
- Lab for Small and Medium Size Network with File Service and PPTP VPN configuration
Topic 6: Remote VPN - SSL VPN
- SSL Explanation
- Integrate Local User to SSL VPN and Policy at Firewall
- Lab for Small and Medium Size Network with File Service and SSL VPN configuration
Topic 7: Moving forward to MPLS VPN(Service Provider VPN Service)
- What is MPLS VPN?
Course Info
Prerequisite:
Basic TCP/IP knowledge is assumedHRDF Funding
Please refer to this video https://youtu.be/Kzpd-V1F9Xs
1- HRD Corp Grant Helper
How to submit grant applications for HRD Corp Claimable Courses
2- Employers are required to apply for the grant at least one week before training commences.
Employers must submit their applications with supporting documents, including invoices/quotations, trainer profiles, training schedule and course content.
3- First, Login to Employer’s e-TRIS account -https://etris.hrdcorp.gov.my
Second, Click Application
4- Click Grant on the left side under Applications
5- Click Apply Grant on the left side under Applications
6- Click Apply
7- Choose a Scheme Code and select HRD Corp Claimable Courses: Skim Bantuan Latihan Khas. Then, click Apply
8- Scheme Code represents all types of training that suit the requirements provided by HRD Corp. Below are the list of schemes offered by HRD Corp:
9- Select your Immediate Officer and click Next
10- Select a Training Provider, then click Next
11- Please select a training programme from the list, then key in all the required details and click Next
Select your desired training programme.
Give an explanation on why the participant is required to attend the training. E.g., related to their tasks/ career development, etc.
Explain the background and objective of this training.
Select a relevant focus area. For Employer-Specific Courses, select ‘Not Applicable’.
12- If the training programme is a micro-credential programme, you are required to complete these 3 fields. Save and click Next
Insert MiCAS Application number
13- Based on the nine (9) pillars listed below, HRD Corp Focus Area Courses are closely tied to support government initiatives towards nation building. As such, courses offered through the HRD Corp Focus Areas are designed to provide the workforce with skills required for current and future demands. Details of the focus areas are as follows:
14- Please select a Course Title and Type of Training
15- Select the correct type of training according to the actual type of training, or as mentioned in the training brochure:
16- Please key in the Training Location and click Next
17- Please select the Level of Certification and click Next
18- Please follow the instructions and key in trainee details
19- Click Add Batch, then click Save
20- Click Add Trainee Details
21- Please key in all the required details, then click Add
22- Click Add if there are more participants. Once done, click Save
23- Click Next
24- Please key in the course fees and allowance details, then click Save
25- Estimated cost includes the course fees/external trainer fees, allowances, and consumable training materials. Please comply with the HRD Corp Allowable Cost Matrix.
26- Select Upfront Payment to Training Provider and key in the percentage from 0% to 30%. Then, click Save and Next
27- Complete the declaration form and select a desired officer
28- Add all the required documents, then click Add Attachment. Then, click Save and Submit Application
29- Once the New Grant Application is successfully submitted, the Grant Officer will evaluate the application accordingly. The application may be queried if additional information is required.
The application status will be updated via the employer’s dashboard, email, and the e-TRiS inbox.
Job Roles
- Network Engineers
- Network Administators
Trainers
Gokulnath Parthiban: Gokulnath Parthiban stated his Network Technical Training (Network Trainer) from 2015. Various Training provided by different Learning center. Got hands-on Experience in Networking, Remote Management, Installation configuration, and troubleshooting of Networking products such as Modem, Router, AccessPoint, Switch, Hub, Repeaters, Extenders, and Adapters. He was a Netgear Professional System based on Wireless security, LAN, WAN interfaces, and also do Networking for Windows and MAC Osx Operating system. He works with countries such as the United States, Canada, Australia, and Middle-east countries as on job training. He provides technical training to new hires and enhanced training for existing experts of various companies.
Dr. Meisam Eslahi: Dr. Meisam Eslahi is an information security and digital forensics researcher, consultant, and professional trainer with specialized expertise in organized cyber crimes (Botnets) detection and prevention. His domain of interests includes Cyber security Threats Detection, Mitigation and Response, Network and Mobile Behavioral Analysis, Secure BYOD, Cyber safety and Awareness. He has over 14 years of experience in the field of Information Technology mostly focused on Cyber Security, digital forensics, penetration testing and incident response. Meisam has been contributing in many projects, consultancies and developments as follows:
- APT and Botnet Analysis and Detection (Communication Pattern Analysis)
- Red/Blue teaming Design and Implantation
- Digital Forensics with main focus on Memory Analysis
- Telecommunication Fraud Investigation
- Penetration Testing and Vulnerability Assessment
- Cyber (Security) Maturity Assessment
- Disaster Recovery and Incident Response Plan and Implantation
- Creating and Managing an Incident Response Team and Frameworks