{"id":10287,"date":"2019-05-29T13:28:29","date_gmt":"2019-05-29T16:28:29","guid":{"rendered":"https:\/\/www.ethicalhacker.com.br\/site\/?p=10287"},"modified":"2019-06-06T14:24:14","modified_gmt":"2019-06-06T17:24:14","slug":"iniciando-no-gns3","status":"publish","type":"post","link":"https:\/\/www.ethicalhacker.com.br\/site\/2019\/05\/exploits\/iniciando-no-gns3\/","title":{"rendered":"Iniciando no GNS3"},"content":{"rendered":"<div class=\"clp-component-render\">\n<div style=\"text-align: justify;\" data-purpose=\"lead-headline\"><\/div>\n<div class=\"clp-lead__headline\" style=\"text-align: justify;\" data-purpose=\"lead-headline\">GNS3 b\u00e1sico, configure IOS, IOU L2 , integre m\u00e1quinas virtuais, instale GNS3 VM, Dockers e Appliances<\/div>\n<\/div>\n<div style=\"text-align: justify;\" data-purpose=\"lead-headline\"><\/div>\n<div data-purpose=\"lead-headline\">\n<div class=\"what-you-get\">\n<div class=\"js-simple-collapse js-simple-collapse--what-you-get\" data-purpose=\"course-objectives\" data-more=\"Ver mais\">\n<div class=\"js-simple-collapse-inner\">\n<div class=\"what-you-get__content\" style=\"text-align: justify;\">\n<div class=\"what-you-get__title\"><strong>O que voc\u00ea aprender\u00e1<\/strong><\/div>\n<ul class=\"what-you-get__items\">\n<li class=\"what-you-get__item what-you-get__item--columns\"><span class=\"what-you-get__text\">Baixar e instalar o GNS3 no Windows , Linux e Mac OS<\/span><\/li>\n<li class=\"what-you-get__item what-you-get__item--columns\">\n<p class=\"what-you-get__text what-you-get__text--h3\">Configurar IOS reais de Roteadores Cisco<\/p>\n<\/li>\n<li class=\"what-you-get__item what-you-get__item--columns\">\n<p class=\"what-you-get__text what-you-get__text--h3\">Integrar M\u00e1quinas Virtuais ao GNS3<\/p>\n<\/li>\n<li class=\"what-you-get__item what-you-get__item--columns\">\n<p class=\"what-you-get__text what-you-get__text--h3\"><span class=\"what-you-get__text\">Instalar o GNS3 VMWARE<\/span><\/p>\n<\/li>\n<li class=\"what-you-get__item what-you-get__item--columns\">\n<p class=\"what-you-get__text what-you-get__text--h3\"><span class=\"what-you-get__text\">Configurar Docker Container e Appliances<\/span><\/p>\n<\/li>\n<li class=\"what-you-get__item what-you-get__item--columns\"><span class=\"what-you-get__text\">Instalar e Configurar IOU L2 para comuta\u00e7\u00e3o<\/span><\/li>\n<\/ul>\n<\/div>\n<div class=\"what-you-get__content\">\n<div class=\"row row--component-margin\">\n<div class=\"col-xxs-8 left-col\">\n<div class=\"clp-component-render\">\n<div class=\"requirements\" data-purpose=\"course-requirements\">\n<div class=\"requirements__title\" style=\"text-align: justify;\"><strong>Requisitos<\/strong><\/div>\n<div class=\"requirements__content\">\n<ul class=\"requirements__list\">\n<li class=\"requirements__item\" style=\"text-align: justify;\">Conhecimentos b\u00e1sicos em redes de computadores<\/li>\n<li class=\"requirements__item\" style=\"text-align: justify;\">Conhecimentos b\u00e1sicos em Linux<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"row row--component-margin\">\n<div class=\"col-xs-8 left-col\" data-purpose=\"curriculum-practice-test\"><\/div>\n<\/div>\n<div class=\"row row--component-margin\">\n<div class=\"col-xxs-8 left-col\">\n<div class=\"clp-component-render\">\n<div class=\"description js-user-tracker-click\" data-purpose=\"course-description\" data-user-tracker-schema=\"action-logs\" data-user-tracker-object-id=\"2382757\" data-user-tracker-action=\"full-description-read\" data-user-tracker-target-selector-class=\"js-simple-collapse-more-btn\">\n<div class=\"js-simple-collapse js-simple-collapse--description\" data-more=\"+ Ver mais\" data-purpose=\"collapse-description-btn\">\n<div class=\"js-simple-collapse-inner\" data-purpose=\"collapse-description-text\">\n<div class=\"description__title\"><strong>Descri\u00e7\u00e3o<\/strong><\/div>\n<div class=\"\">\n<p style=\"text-align: justify;\">O Graphic Network Simulator (GNS3) \u00e9 um software de rede que emula o Cisco Router, ASA, etc.<\/p>\n<p style=\"text-align: justify;\">Este software, ao contr\u00e1rio de seu nome, n\u00e3o \u00e9 um simuladohttps:\/\/www.udemy.com\/iniciando-no-gns3-w\/r mas sim um emulador que se integra a m\u00e1quinas virtuais e permite simular redes complexas como se voc\u00ea estivesse trabalhando em uma infraestrutura de redes real.<\/p>\n<p style=\"text-align: justify;\">O GNS3 \u00e9 amplamente utilizado na pr\u00e1tica de laborat\u00f3rios, principalmente para os alunos que est\u00e3o se preparando para os exames de certifica\u00e7\u00e3o da Cisco ou cursando faculdade de redes de computadores.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><a href=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/gns3.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-10295 aligncenter\" src=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/gns3.png\"  alt=\"\" width=\"635\" height=\"471\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/gns3.png 932w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/gns3-300x222.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/gns3-768x569.png 768w\" sizes=\"auto, (max-width: 635px) 100vw, 635px\" \/><\/a><\/p>\n<div class=\"js-simple-collapse js-simple-collapse--description\" data-more=\"+ Ver mais\" data-purpose=\"collapse-description-btn\">\n<div class=\"js-simple-collapse-inner\" data-purpose=\"collapse-description-text\">\n<div class=\"\">\n<p><strong>Neste curso, \u00a0voc\u00ea aprender\u00e1 conceitos b\u00e1sicos, tais como:<\/strong><\/p>\n<ul>\n<li>Instalar o GNS3 em sistemas operacionais Mac OS, Linux e Windows,<\/li>\n<li>Instalar e configurar imagens reais de roteadores cisco,<\/li>\n<li>Integrar m\u00e1quinas virtuais ao GNS3,<\/li>\n<li>Configurar NAT,<\/li>\n<li>Instalar o GNS3 VM para configura\u00e7\u00e3o de appliances, Docker Container ;<\/li>\n<li>Instala\u00e7\u00e3o IOU L2 (para comuta\u00e7\u00e3o).<\/li>\n<\/ul>\n<div class=\"audience\" data-purpose=\"course-audience\">\n<div class=\"audience__title\"><strong>Para quem \u00e9 este curso:<\/strong><\/div>\n<ul class=\"audience__list\">\n<li>Alunos de cursos de redes de computadores<\/li>\n<li>Alunos que est\u00e3o se preparando para certifica\u00e7\u00e3o Cisco<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><strong>Link do curso:<\/strong><\/p>\n<p><a title=\"GNS3\" href=\"https:\/\/www.udemy.com\/iniciando-no-gns3-w\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.udemy.com\/iniciando-no-gns3-w\/<\/a><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<p><strong>Sobre o instrutor<\/strong><\/p>\n<div class=\"clp-component-render\">\n<p><img loading=\"lazy\" decoding=\"async\" class=\"user-avatar user-avatar--image\" src=\"https:\/\/i.udemycdn.com\/user\/200_H\/58636714_2d51_2.jpg\" alt=\"S\u00edlvio C\u00e9sar Giavaroto\" width=\"96\" height=\"96\" aria-label=\"S\u00edlvio C\u00e9sar Giavaroto\" data-purpose=\"instructor-image\" \/><\/p>\n<div class=\"instructor--instructor__title-and-job-title--1nr2Z\">\n<div class=\"instructor--instructor__title--2-Bub\"><a class=\"instructor--title__link--1NJ6S\" href=\"https:\/\/www.udemy.com\/user\/silvio-cesar-giavaroto\/\">S\u00edlvio C\u00e9sar Giavaroto<\/a><\/div>\n<div><\/div>\n<div class=\"instructor--instructor__job-title--opFWR\"><strong>Professor<\/strong><\/div>\n<\/div>\n<div class=\"instructor--instructor__description--1A0ot\">\n<div class=\"instructor--instructor__description-content--1CtQI\" data-purpose=\"description-content\">\n<div>\n<p>Possui gradua\u00e7\u00e3o no Curso Superior de Tecnologia em Redes de Computadores, P\u00f3s-Graduado MBA &#8211; Especialista em Seguran\u00e7a da Informa\u00e7\u00e3o pelo Instituto Paulista de P\u00f3s-Gradua\u00e7\u00e3o IPPG.<\/p>\n<p>\u2022Professor de N\u00edvel Superior na \u00e1rea de sistemas de informa\u00e7\u00e3o e redes de computadores;<\/p>\n<p>\u2022J\u00e1 atuei como instrutor academia Cisco CCNA, C|EH Certified Ethical Hacker e C|HFI Computer Hacking Forensic Investigator ;<\/p>\n<p>\u2022Autor de livros voltados a \u00e1rea de seguran\u00e7a de sistemas e redes de computadores, exerce tamb\u00e9m fun\u00e7\u00f5es de revisor t\u00e9cnico de livros na mesma \u00e1rea.<\/p>\n<p><strong>CERTIFICA\u00c7\u00d5ES:<\/strong><\/p>\n<p>C|EH Certified Ethical Hacker da INTERNATIONAL COUNCIL OF E-COMMERCE CONSULTANTS<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>GNS3 b\u00e1sico, configure IOS, IOU L2 , integre m\u00e1quinas virtuais, instale GNS3 VM, Dockers e Appliances O que voc\u00ea aprender\u00e1 Baixar e instalar o GNS3 no Windows , Linux e Mac OS Configurar IOS reais de Roteadores Cisco Integrar M\u00e1quinas Virtuais ao GNS3 Instalar o GNS3 VMWARE Configurar Docker Container e Appliances Instalar e Configurar [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":10299,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[89,100,21,105,99],"tags":[],"class_list":["post-10287","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-basico","category-diversos","category-exploits","category-noticias","category-novidades"],"_links":{"self":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/10287","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/comments?post=10287"}],"version-history":[{"count":21,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/10287\/revisions"}],"predecessor-version":[{"id":10308,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/10287\/revisions\/10308"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media\/10299"}],"wp:attachment":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media?parent=10287"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/categories?post=10287"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/tags?post=10287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}