{"id":136,"date":"2016-04-18T19:45:59","date_gmt":"2016-04-18T19:45:59","guid":{"rendered":"http:\/\/it.tct.al\/?p=136"},"modified":"2017-06-02T19:15:34","modified_gmt":"2017-06-02T17:15:34","slug":"rrjeti-intermediate","status":"publish","type":"post","link":"https:\/\/it.tct.al\/en\/rrjeti-intermediate\/","title":{"rendered":"Computer Networking &#8211; ICND2"},"content":{"rendered":"<p>This course is for everyone who seeks to develop their career in computer networking. It completes your knowledge and technical expertise, allowing you to take special responsibility as a network administrator.<\/p>\n<h6>\u00a0What jobs will I qualify for?<\/h6>\n<p>Network engineers that want to have strong background in network configuration and network security will benefit from this course.<\/p>\n<p>Some of the main points that are taught in this course are:<\/p>\n<ul>\n<li>&#8220;Layer 2&#8221;, Presentation of the protocols that are used, and their configuration in a switch.<\/li>\n<li>IPv4, from the beginning to the end. Design and configuration of these addresses in a computer network.<\/li>\n<li>Routing protocols in &#8220;Layer 3&#8221;.<\/li>\n<li>ACL configuration.<\/li>\n<li>NAT configuration.<\/li>\n<li>VPN configuration, and protocols of routing:\u00a0RIP, OSPF, BGP.<\/li>\n<li>Domain Name Service (DNS), configuration and testing.<\/li>\n<li>SSL certificates.<\/li>\n<li>Firewall, configuration and testing.<\/li>\n<li>Network security.<\/li>\n<li>MikroTik configuration.<\/li>\n<\/ul>\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>This course is for everyone who seeks to develop their career in computer networking. It completes your knowledge and technical expertise, allowing you to take special responsibility as a network administrator. \u00a0What jobs will I qualify for? Network engineers that want to have strong background in network configuration and network security will benefit from this [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[12],"tags":[18,17,49,48,47,42,46,44,43,40,45,41,27],"class_list":["post-136","post","type-post","status-publish","format-standard","hentry","category-programet-tona","tag-cisco","tag-kurs","tag-kurse-baza-programimi","tag-kurse-c","tag-kurse-databaze","tag-kurse-it","tag-kurse-java","tag-kurse-kompjuteri-kurse-kompiuteri","tag-kurse-profesionale","tag-kurse-programimi","tag-kurse-rrjeti","tag-qender-kursesh-it","tag-router"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/it.tct.al\/en\/wp-json\/wp\/v2\/posts\/136","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/it.tct.al\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/it.tct.al\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/it.tct.al\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/it.tct.al\/en\/wp-json\/wp\/v2\/comments?post=136"}],"version-history":[{"count":4,"href":"https:\/\/it.tct.al\/en\/wp-json\/wp\/v2\/posts\/136\/revisions"}],"predecessor-version":[{"id":882,"href":"https:\/\/it.tct.al\/en\/wp-json\/wp\/v2\/posts\/136\/revisions\/882"}],"wp:attachment":[{"href":"https:\/\/it.tct.al\/en\/wp-json\/wp\/v2\/media?parent=136"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/it.tct.al\/en\/wp-json\/wp\/v2\/categories?post=136"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/it.tct.al\/en\/wp-json\/wp\/v2\/tags?post=136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}