Linux Learning Centre


Posted Date: 28 Dec 2008

Posted By: Ramkumar

Member Level: Gold
Name: Linux Learning Centre
Address: #635, 6th Main Road, Near 4th Cross, Adjacent to Bank of India,
Hanumanthnagar, Bangalore-560019
Tel: +91-80-22428538, +91-80-26610999, TeleFax: +91-80-26600839
Mobile: +91-9845057731 CDMA:+91-9343780054
City: Bangalore
State: Karnataka
Telephone Number: +91-9845057731
Email:
Official website: http://www.linuxlearningcentre.com




Linux Learning Centre was founded in the year 1999 as a training school dedicated to the promotion and development of Linux OS. LLC is the first of its kind in the entire Asian subcontinent to start offering training and consultancy exclusively on Linux platform. Initially promoted by Institute for Specialised Education, Linux Learning Centre started offering education on the open source platform to the masses when Linux technologies were available with only a handful of self-taught professionals.




Training Courses

Add Course to this Training Center
Course NameCategoryDurationFees
RH033 Red Hat Linux Essentials
Course Outline Linux Usage Basics - Starting X from the Console - Changing your Password - The root User - Elevating your Privileges Running Commands and Getting Help - Reading Usage Summaries - man, info, & whatis Commands Browsing the Filesystem - Linux File Hierachy Concepts - Current Working Directory Files & Directory Name - Absolute and Relative Pathnames - Create, remove, change, list, copy, move Files & Directories - Using Nautilus - Determining File Content, Viewing Files Using the bash Shell - bash Introductin History & Features - Command Line Shortcuts & Editing Tricks - Command Line Expansion - gnome-terminal Standard I/O & Pipes - Standard Input and Output, Pipes to connect Processes - Overwriting vs Appending - Redirecting both standard Output and Error Text Processing Tools - Tools for Extracting, Analysing & Manipulating Text - Special Characters for Matching Text Basic System Configuration - Configuring Date and Time - Configuring Printers, Network - System Logs vi and vim - Opening, Modifying, Saving Files & Undoing Changes - Using Command Mode - Visual Mode - Splitting the Screen - Configuring vi and vim Configuring the bash Shell - bash Variables, Environment Variables and Aliases - Configuring and Information Variables - Variables Expansion, Protecting against Variable Expansion - Types of Shells, bash startup & Exit Scripts - using Variables in Shell Scripts Finding and Processing Files - The slocate & find Commands, Basic find Examples - find and Logical Operators, find & Permissions - find and Numeric Criteria, find & Access Times - Executing Commands with find and Gnome Search Tool Network Applications - Firefox, Evolution, E-mail clients and Web Browsers - E-mail, Encryption, & Digital Signatures - The Gaim Messaging System - Encrypted Communications with ssh and scp - telnet and the "r" services, FTP Clients - Connecting to Windows Disk Shares - File Transfer with Nautilus - Network Diagnostic Tools Managing Users, Groups & Permissions - The Linux Security Model - Users & Groups, Permission Types - Examining & Changing Permissions - Changing Permissions using Nautilus Advanced Topics in Users, Groups & Permissions - System Users and Groups - The etc/passwd, /etc/shadow, and /etc/group files - Changing your identity - User Information Commands - Default Permissions, Special Permission The Linux Filesystem in-depth - Partitions, Filesystem and checking free space - cp, mv, rm, & inodes - Symbolic Links and Hard Links - The Seven Fundamental Filetypes - Mounting CDs, DVDs, USB Media & Floppy Disks - Creating, Inspecting & Extracting Files from File Archives - Compressing Utilities, Compressing Archives Investigating and Managing Processes - Process States, Viewing Processes and Nice Values - Sending Signals to Processes, Terminating - Foreground & Background Process - at, crontab Listing & Scheduling Jobs Essential System Administration Tools - Installation - Managing Services, Managing Packages - Securing the System
GeneralFour Days: 9:00 am - 5:30 pmRs. 6,000/- (plus service tax)
RH133 Red Hat Linux System Administration
Course Outline System Initialization - Boot Sequence - Boot Loader Components - GRUB and grub.conf - Kernel Initialization - init Initialization - Run levels; /etc/rc.d/rc.sysinit, /etc/rc.d/rc - System V run levels; - /Etc/rc.d/rc.local - Controlling Services Package Management - RPM Package Manager - Installing and Removing Software - Updating a Kernel RPM; rpm Queries, rpm Verification - About yum; using yum - Searching packages/files - Configuring Additional Repositories - Creating a private repository - Red Hat Network Server; Entitlements - Red Hat Network Client Kernel Services - Kernel Modules, Kernel Images & Variants - Managing the initrd image - Accessing Drivers through /dev - Kernel Configuration with /proc - sysctl: Persistent Kernel Configuration - Monitoring Processes and Resources System Services - Network Time Protocol; syslog Configuration - Xorg Server Configuration; Remote X Sessions - Virtual Network Computing; SSH: Secure Shell - System crontab Files; Daily Cron Jobs; CUPS User Administration - Adding a New User Account; User Private Groups - Group Administration; Modifying/Deleting Accounts - Password Aging Policies - Switching Accounts, sudo - Network Users - Authentication Configuration; NIS Client Configuration - LDAP Client Configuration; File Ownership - Linux File Permissions; SUID / SGID Executables - The Sticky Bit; The SGID Directories - Default File Permissions; Access Control Lists (ACLs) - SELinux, SELinux Targeted Policy, Management Filesystem Management - Device Recognition; Disk Partitioning - Managing Partitions; Making Filesystem - Filesystem Labels; tune2fs - Mount Points and /etc/fstab; Mounting Filesystems - Handling Swap Files and Partitions - Mounting NFS Filesystems; Automounter Advanced Filesystem Management - Configuring the Quota System - Software RAID Configuration & Recovery - Creating & Resizing Logical Volumes - Archiving tools: tar; dump/restore; rsync Network Configuration - Network Interfaces; IPv4 Addresses; Device Aliases - Routing table; Default gateway; Verify IP connectivity - Defining Local Host Name; Verify DNS Connectivity - Network Configuration Utilities - Transparent Dynamic Configuration - Ipv6: Dynamic & Static Interface Configuration - New and Modified Utilities Installation - Boot Media, Accessing Installer, Installation Method - Configuring File System; Advanced Partitioning - Starting Kickstart Installation - Kickstart; %pre, %post Virtualization with Xen - Hardware Considerations; Preparing Domain-0 - Virtual Resources; Domain-U Configuration - Domain Management with xm - Activating Domains on boot Troubleshooting - Method of Fault Analysis; Gathering Data - Order of the Boot Process - Filesystem Corruption & Recovery - Recovery Run-levels; Rescue Environment
GeneralFour Days: 9:00 am - 5:30 pmRs. 6,000/- (plus service tax)
RH253 Red Hat Linux Network & Security Administration
Course Outline System Performance and Security - Security Policy; Response Strategies - Fault Analysis; Hypothesis and Gathering Data - Filesystem Analysis; Typical Problematic Permissions - Monitoring & Managing Processes; Log File Analysis System Service Access Controls - System Initializations and service management - Xinetd managed service; host pattern Access control - tcp_wrappers configuration; Daemon Specification - Client Specification; macro definitions - SElinux targeted policy, management & file types Network Resource Access Controls - IPv6: Dynamic and static interface configuration - Netfilter tables and chains; Basic chain operation - Match arguments; connection tracking - Network address translation (NAT); DNAT; SNAT - IPv6 & IPv6 tables Organizing Networked Systems - Host name resolution; The stub resolver - DNS Specific resolvers; Trace DNS Query with dig - Forward & Reverse Lookups; SOA Lookups - Exploring DNS with host; Transitioning to the server - Service profile: DNS; Access Control profile: Bind - Address match list; Access control list (ACL) - Allowing queries, recursion, transfers - Slave Zone and Master Zone Declaration - Remote Name Daemon Control (rndc) - Delegating Subdomains & DHCP Overview Network File Sharing Services - File Transfer Protocol; Network File Service- - Samba services; Configuring file & directory sharing - Printing to the samba server; Authentication methods - Samba client tool: smbclient, nmb lookup, mounts Web Services - Apache Overview - Apache Configuration - Apache Access Configuration - Apache Encrypted Web Servers - Squid Web Proxy Server Electronic Mail Services - Essential E-mail Operation - Simple mail transport protocols - Sendmail & Sendmail Configuration - Postfix & postfix Configuration - Procmail & Procmail Configuration - Dovecot Configuration - Pop & Imap Operation Securing Data - Fundamentals of Encryption Protocols - Symmetric & Asymmetric Encryption I - II - Generation of Digital Certificates (SSL) - OpenSSH Server -OpemSSH Client Account Management - User Accounts & Accounts Information - Name Service Switch (NSS) - Pluggable Authentication Modules (pam) - PAM Operations - Network Authentication - Password Policy & Security - Utilities and Authentication - PAM Troubleshooting
GeneralFour Days: 9:00 am - 5:30 pmRs. 6,000/- (plus service tax)
RH142 Linux Troubleshooting Techniques and Tools
Course Outline Troubleshooting Techniques - An introduction to troubleshooting methods, best practices, and tools. Troubleshooting Boot Issues - Working with advanced GRUB features; - rescue and GRUB CDs; - advanced ext2/ext3 filesystem repair - rescuing RAID and LVM volumes. Local Configuration - Tools to identify configuration problems. Hardware - Preempting hardware failures (looking for the signs) - protecting against hardware failures - redundant configurations; - tools to help identify hardware failures and intermittent problems. Applications - An overview of tools and techniques for troubleshooting applications. Some common application problems and how to solve them. Network - Manual configuration of network cards, troubleshooting advanced setups (bonded interfaces, virtual interfaces) - connectivity issues - network diagnostic tools. Security - Working effectively with (and not against) security tools, including SELinux, SSL, & authentication. Red Hat Resources and Reporting Problems - Support options; - Knowledgebase; - certified training; - initiating support calls; - TAM support; - developer support; - bugzillas; - support workflow; - diagnostic and information-gathering tools.
GeneralFour Days: 9:00 am - 5:30 pmRs. 6,000/- (plus service tax)
RH184 Red Hat Enterprise Linux Virtualization
Course Outline Introduction to Virtualization - What is virtualization? - Why is virtualization important? - Types of virtualization - Basic architecture of Xen virtualization Basic Paravirtualized Domain Installation - Preparing for domain installation - Basic installs using virt-manager - Configuring domains to automatically start at boot Virtual Machine Management - Using generic libvirt-based utilities - Using native Xen utilities Advanced Installation and Configuration - Syntax of Xen domain configuration files - Virtual Block Devices and types of block storage - Xen and bridged networking - Manual and command-line domain installation Live Migration - Live migration of Xen paravirtualized domains - Advanced configuration of xend - Live migration issues Troubleshooting - Differences from a standard environment - Viewing hypervisor log messages and log files - Accessing domain virtual block devices - Common issues Hardware-assisted Virtualization - Fully-virtualized vs. paravirtualized domains - Installing unmodified OSes
GeneralTwo Days: 9:00 am - 5:30 pmRs. 5,000/- (plus service tax)
RHS333 Red Hat Enterprise Security: Network Services
Course Outline The Threat Model and Protection Methods - Internet threat model & the attacker's plan - System security and service availability - An overview of protection mechanisms Basic Service Security - SELinux - Host-based access control - Firewalls using Netfilter and iptables - xinetd and service limits Cryptography - Overview of cryptographic techniques - Management of SSL certificates - Using GnuPG Logging and NTP - Time synchronization with NTP - Logging: syslog and its weaknesses - Protecting log servers BIND and DNS Security - BIND vulnerabilities - DNS Security: attacks on DNS - Access control lists - Transaction signatures - Restricting zone transfers & recursive queries - DNS Topologies - Bogus servers and blackholes - Views - Monitoring and logging - Dynamic DNS security Network Authentication: RPC, NIS & Kerberos - Vulnerabilities - Network-managed users & account management - RPC and NIS security issues - Improving NIS security - Using Kerberos authentication - Debugging Kerberized Services - Kerberos Cross-Realm Trust - Kerberos Encryption Network File System -Overview of NFS versions 2, 3, and 4 -Security in NFS versions 2 and 3 -Improvements in security in NFS4 -Troubleshooting NFS4 -Client-side mount options OpenSSH -Vulnerabilities -Server configuration and the SSH protocols -Authentication and access control -Client-side security -Protecting private keys -Port-forwarding and X11-forwarding issues Electronic Mail with Sendmail -Vulnerabilities -Server topologies -Email encryption -Access control and STARTTLS -Anti-spam mechanisms Postfix -Vulnerabilities -Security and Postfix design -Configuring SASL/TLS FTP -Vulnerabilities -The FTP protocol and FTP servers -Logging -Anonymous FTP -Access control Apache security -Vulnerabilities -Access control -Authentication: files, passwords, Kerberos -Security implications of common configuration options -CGI security -Server side includes -suEXEC Intrusion Detection and Recovery -Intrusion risks -Security policy -Detecting possible intrusions -Monitoring network traffic and open ports -Detecting modified files -Investigating & verifying detected intrusions -Recovering from, reporting, and documenting intrusions
GeneralFour Days: 10:00 am - 5:30 pmRs. 9,600/- (plus service tax)
RH423 Red Hat Enterprise Directory Services and Authentication
Course Outline Introduction to Directory Services -What is a directory? -LDAP: models, schema, and attributes -Object classes -LDIF The LDAP Naming Model -Directory information trees & Distingued Names -X.500 and "Internet" naming suffixes -Planning the directory hierarchy Red Hat Directory Server: Basic Configuration -Installation & setup of Red Hat Directory Server -Using the Red Hat Console -Using logging to monitor Red Hat Directory Server activity -Backing up and restoring the directory -Basic performance tuning with indexes Red Hat Directory Server: Authentication& Security -Configuring TLS security -Using access control instructions (ACI's) -ACI's and the Red Hat Console Searching and Modifying the LDAP Directory -Using command line utilities to search the directory -Search filter syntax -Updating the directory -Using graphical LDAP client utilities Linux User Authentication with NSS and PAM -Understanding authentication & authorization -Name service switch (NSS) -Advanced pluggable authentication modules (PAM) configuration Centralized User Authentication with LDAP -Central account management with LDAP -Using migration scripts to migrate existing data into an LDAP server -LDAP user authentication Kerberos and LDAP -Introduction to Kerberos -Configuring the Kerberos key distribution center (KDC) and clients -Configuring LDAP to support Kerberos -Access control with Simple Authentication and Security Layer (SASL) Directory Referrals and Replication -Referrals and replication -Single master configuration -Multiple master configuration -Planning for directory server availability Authenticating Windows Clients -Windows networking overview -Configuring a Samba primary domain controller (PDC) using LDAP Windows Domain Authentication & Linux Clients -Active Directory servers -Linux as a client -Active Directory and NSS -OpenLDAP -Winbind
GeneralFour Days: 10:00 am - 5:30 pmRs. 9,600/- (plus service tax)
RHS429 Red Hat Enterprise SELinux Policy Administration
Course Outline Introduction to SELinux -Traditional DAC System -SELinux System and History -What SELinux Can Do and Cannot Do -Architecture, User Identity and Role -Domain / Type, Sensitivities and Categories -Security Context -What is an SELinux Policy -Targeted Policy; Where is the policy? -Policy Booleans; Security Context Information -Using Security Context Information -Access Control Example -Archiving tar, star, rsync; Get & Set Extended Attributes Using SELinux -Controlling SELinux; File Contexts -Relabel files; Relabel a filesystem -Mount options for SELinux The Red Hat Targeted Policy -Protected Services -Identifying & Toggling Protected Services -Apache; Apache Security Contexts -Web Content -Special Configuration Booleans for Apache -NIS Client; NIS Client Contexts -Some othe Services; Contexts -File Context for Special Directory Trees -Troubleshooting; denied messages, Example -SELinux Logging; Identify a Problem Introduction to Policies -Installing the source RPM -Compiling, Loading the Monolithic Policy -Loading Policy Modules -Policy Type Enforcement Module Syntax -Object Classes; Domain Transition Policy Utilities -seaudit Introduction -seaudit Demo: Monitor Logs & Query Policy -Seaudit_report, apol -apol DemoPolicy Components, Rules & Analysis -Interference of Policies with Services -Breakage of Services by Policies -checkpolicy, sesearch, sestatus, audit2allow, audit2why, sealert, avcstat, seinfo, semanage & module User and Role Security -Role-based Access Control -Multi Category Security; Defining SecAdmin -MLS; The strict Policy; General Identification -User Identification, system_u, users_u & root -How users are Declared; Role Identification -How roles are Declared -Roles in use in Transitions; Role Dominance Anatomy of a Policy -Policy Macros; Type Enforcement -Type Attributes; Type Aliases -Type Transitions for Objects -When and How do Files get Labeled? -Restorecond -Customizable Types Manipulating Policies -Installing & Compiling Policies -The Policy Language; Access vector -SELinux logs, Security Identifiers-SIDs -Filesystem Labeling Behavior -Statements: fs_use and genfs_contexts -Context on network objects; Booleans -Examples: allow, auditallow, neverallow, dontaudit, can_exec, macros and Enableaudit Project -Best practices; Overview of changes -Create File Contexts -Create File Types -Create File Typealiases -Edit or Create Network Contexts -Edit Domains -Create Domains -Create Macros
GeneralFour Days: 10:00 am - 5:30 pmRs. 9,600/- (plus service tax)
LLC102 Linux Desktop Essentials
Course Outline Introduction to Linux - GNU Project / GPL Licensing - Evolution of Linux & Development Model - Bash Shell Essentials - Device Identities in Linux - Partitioning Schema Linux Installation & Configuration : Workstation & Server Classes The Graphical User Interface - X Window System - Basic Structure - Invoking the Graphical User Interface Configure and customize your Linux desktop An Overview of GNOME/KDE Desktop/Applications An Overview of OpenOffice Suite - Exploring Word Processor, Spreadsheet & Presentation Modules Linux File System - Ext2 / Ext3 Features - Directory Structure & Contents Basic Shell utilities /commands - Directory / File Operations - System/Process/Disk Status Indicators - Installing applications using RPM - Getting Help : man, info pages, On-Line Manuals Exploring the default text editor : vi Configure an Internet connection Access the Internet using a web browser - Using Firefox Configure email accounts using kmail
GeneralTwo days: 10 am - 5.30 pmRs.3,000/- (plus service tax)
LLC104 Linux Internals & Programming Essentials
Course Outline Introduction to Kernel - History of Linux - Types of Kernel - The Linux kernel - Kernel Architecture The Boot Process - BIOS Level - Boot Loader - Setup, startup_32 functions - The start_kernel() function Kernel Recompilation - Importance of make files - Procedure to recompile the kernel Implementing System Calls - System Calls Defined - System Calls and APIs - System Call Table - Unistd.h and entry.S files - Implementing a new system call The File System - Virtual File system & its role - VFS data structures super_block, inode, file, dentry - Files associated with a process - System Calls - Lab Exercisers Process management - Process Defined - Process Descriptor Structures in the kernel - Process States - Process Scheduling - Process Creation - System calls related to process management Inter Process Communication - Pipes, Fifo's, signals - System-V IPC's - Message queues - Shared memory - Semaphores Sockets - An Overview - System calls related to TCP and UDP sockets Memory Management - Defining and Creating secondary memory areas - Responsibilities of Memory Management Module - Memory allocation & deallocation system calls malloc, calloc, alloca, free - Demand Paging defined - Process Organization in Memory - Address Translation and page fault handling - Memory allocation strategies - Buddy System Algorithm - Slab Allocator - Swapping Memory Areas - Memory Mapping Programming & Debugging Tools - strace: tracing system calls - Tools used to detect memory access error and Memory leakage in Linux : mtrace - Using gdb and ddd utilities
GeneralThree Days: 10 am - 5.30pmRs. 4,600/- (plus service tax)
LLC103 Linux System And Network Administration
Course Outline User Administration - Essentials : Concept of users & groups - User Account Management - Password Management - Group Management - Configuring a co-administrator - the sudo utility File / Directory Access Control Mechanisms - Default Permissions & umask setting - Exploring suid/sgid/sticky bits - The Extended Attributes - File System ACL 's Exploring Critical Configuration files - grub.conf, inittab, fstab Service initializing scripts Task Schedulers - at, cron & anacron daemons Disk Quotas - Assigning user quotas Printer & Backup Management - Configuring a printer - Printer Management using CUPS - Archiving & Backup -Using gzip, bzip2 & tar Linux Networking Environment - Networking features of Linux - Configuring a NIC - Miitool - Setting Gateway - IP Forwarding Basic Network Client Services - telnet, ftp & SSH Services Basic Concepts of DNS - Implementation of BIND - forward & reverse lookup - DNS Client Commands - DNS Slave Configuration DHCP - Server / Client setup NFS - Network File System - RPC portmapper - autofs implementation NIS - Network Information System - ypserver / yp client - Slave Server Configuration Apache Web Server - Basic Configuration - Name & IP Based Virtual Hosting - Restriction through htaccess - Authentication through SSL Samba Server - File & Print Service - Authentication through samba - smbmount, smbclient services Sendmail - Mail Server - Configuring mail service - SMTP Server, POP3 / IMAP Server Setup (Dovecot ) An Overview of Postfix mail server - Configuration Proxy Server - Squid - ACL for restricting access - User Authentication Working with GUI tools - Default applications - Webmin Utility
GeneralFour Days: 10 am - 5.30 pmRs. 6,000/- (plus service tax)
LLC203 Linux Advanced Administration
Course Outline Samba Primary Domain Controllers - Samba PDC Configuration - Authentication for Windows Clients - Profiles For Windows Clients - Logon Scripts - Home Directory Clusters in Linux - Types and Terminology - High Availability Cluster - Cluster using Heartbeat - IP Takeover - Service Takeover - Resource Takeover - Linux Virtual Server - Ipvsdam Configuration Introduction to Kernel Concepts - Types of Kernels - Updating Modules - Patching the Kernel - Kernel Compiling Methods - Compilation Process - Booting with Modified Kernel RPM Management - Advanced Options - Conversion from Source to Binary Web Proxy Server - Squid with Password Authentication - Danse Guardian - Content Filtering - Squid Monitoring - sarg - Squid Analysis & Report Generator - Transparent Proxy Tomcat with Apache Server - Jakarta Tomat - Tomcat Configuration - Configure Apache Connector - Create Tomcat Admin
GeneralTwo Days: 10 am - 5.30 pmRs. 5,000/- (plus service tax)
LLC303 Linux System & Network Monitoring Tools
Course Outline Monitoring System and Services - Terminology - Host and Network Security - Network Monitoring Utilities - System Monitoring Utilities Nagios The Network Monitor - Nagios Dependencies - Installing of Nagios - Nagios Configuration - Object Configuration - CGI Configuration - External Commands Multi Router Traffic Grapher - SNMP and MRTG Terminology - MRTG Installation and Configuration - MRTG and Linux MIBs - CPU And Memory Monitoring MIB - TCP/IP Monitoring MIB - Target Parameters Network Intrusion Prevention System - Overview of Snort Rules - Configuration of Snort - Snort GUI Configuration - Snort with MySQL - Snort Logging Network Based Utilities - Wireshark ---- Protocol Analyzer ---- Packet Sniffing ---- Generate Datastream - Nmap ---- Port Scanner ---- Nmap Front End - tcpdump ----Console Based Packet Analyzing - Webalizer ----Web Log Analyzer System Monitoring Utilities - System Snapshot Generation - System Statistics Tools - Logwatch and Logrotate Concepts
GeneralTwo Days: 10 am - 5.30 pmRs. 5,000/- (plus service tax)
LLC105 Programming with Qt
Course Outline Introduction to Qt - Survey of GUI toolkits - Technical and product history of Qt, Trolltech. - Dual-license of Qt Installation - Getting Qt sources - Compiling & Installing Qt -“ Hello World” program in Qt Introduction to Signals and Slots - Making, Breaking a connection - Creating signals and slots Introduction to UI programming in Qt - The QWidget class - the QMainWindow class - Qt Designer - User actions:QAction/QToolButton/QMenu/QToolBar - Exercise: Text Editor Containers, Types, and Macros - QList, QMap, QStack & Interating containers Common Widgets - QPushButton, QCheckBox, QRadioButton - QLabel, QLineEdit, QSpinBox, QGroupBox, QSlider & QProgressBar Common Dialogs - QFileDialog, QInputDialog & QColorDialog - QMessageBox - QProgressDialog Custom Widgets - Form Widgets - Custom controls Layouts - Vertical and Horizontal layouts - Grid layouts - Form layouts - Custom layouts - Drawing & Printing (Arthur Framework) - Drawing framework: QPainter, QPaintDevice, PaintEngine - Helper classes: QRect, QPoint, QPen, QBrush,Gradient & QPainterPat - Drawing on widgets - Drawing on pixmaps - Printing; Transformations: QMatrix, QTransform Handling Events in Qt - Event model in Qt. (QEvent and subclasses, QObject::event() method) - Event handlers in Qt (paintEvent, mousePressEvent, mouseReleaseEvent) - Event filters; Signal/Slot internals (QMetaObject and friends) The Model-View Framework (Interview) - Introduction to MVC Design Pattern - QAbstractItemModel – Qt's Model class - QAbstractItemView – Qt's View class - QAbstractItemDelegate – Qt's Delegate class - QModelIndex – Qt's data pointer into model - Built in models: QDirModel, QStringListModel, QFileSystemModel - Built in views: QListView, QTreeView, QColumnView, QTableView - Built in item views: QListWidget, QTreeWidget, QtableWidget - Writing custom models and views Graphics View Framework - QGraphicsScene, QGraphicsView & QGraphicsItem - OTS Items: QGraphicsLineItem, QGraphicsRectItem, QgraphicsEllipseItem - Custom items; Transformations and Interactive graphics Files, Streams - IO Device framework: QIODevice - Built in IO Devices: QFile, QBuffer - Stream classes: QTextStream & QdataStream - Buffer classes: QByteArray, QString Help System (Qt 4.4 module) - How to create compressed help files in Qt - Using compressed help files in Qt assistant - Showing help in your applications using - HelpEngine & friends Multimedia (Phonon) - How to play audio and video files in Qt HTML Rendering (WebKit) - Introduction to WebKit project; QWebView – the Browser control in Qt Making your applications scriptable (QtScript) - Basic concepts: What does a scriptable application mean - Evaluating scripts using QScriptEngine - Accessing Qt/C++ objects in the script environment - Accessing variables in the script within Qt/C++ - Designing objects for scriptability XML - DOM and SAX; Parsing XML files; Authoring XML files OpenGL - The QGLWidget class; Using OpenGL in graphics view - Using OpenGL in your widgets Doing Things in Parallel. (Threads and Qprocess) - QThread, QMutex and QSemaphore; - QProcess Plugin system - QPlugin and friend classes; Creating Qt Designer plugins - Architecting applications to allow extensions via plugins - How to load and use plugins - Using QLibrary to dynamically load libraries Networking - Understanding QAbstractSocket - TCP/IP communication using QTcpSocket & QTcpServer - UDP communication using QUdpSocket - FTP / HTTP Transactions Introduction to Third-Party Libraries - Qwt – Graphing Library - GCF – Components Framework Library (similar to Microsoft's COM & KParts)
General Five Days: 10 am - 5.30pmRs. 15,000/- (plus service tax)
LLC106 Device Driver Programming
Course Outline An introduction to device drivers - Role of the Device Drivers - Splitting the kernel - Classes of devices and modules - Kernel Architecture or Model Module Basics -Introduction to Modules & Device Drivers - Modules Defined - Types of Modules in the kernel - Writing Your first kernel module - Module Related Commands - Kernel Module vs Applications - User space vs Kernel space - Statically linked vs Dynamically linked drivers/modules - Exporting symbols from modules - The kernel symbol table - Concurrency in the kernel - Module Parameters - Version dependency - Lab exercises OS Services And Data Structures - Atomic functions, Bit Operations - Linked List, Memory barriers - Semaphores - Basic memory Management - Time intervals in the kernel - Delaying execution,Kernel timers - The proc file system Character Device Drivers - Registering a character device driver - File operations - The file structure - devfs / lseek /ioctl - Blocking, non blocking and asynchronous operations Hardware and Interrupt Handling - Using IO Ports - Installing and implementing an interrupt handler - Tasklets and Bottom halves - Task queues Block Device Drivers - Handling requests - Ram Disk Driver Network Drivers - The net_device structure in detail - Packet transmission - Packet reception - Simulating a network device - Exploring the rtl8139 network card
GeneralFour Days: 10 am - 5.30 pmRs. 6,000/- (plus service tax)
LLC107 Network Programming on Linux
Course Outline Networks - Introduction - Layering Principles - OSI, TCP Models - TCP, IP, UDP - TCP (ARP, RARP, ICMP) - IP (Classes, Datagram formats, IP routing, v4 v5 v6) - ICMP (Error Reporting, Correction. icmp format) Process And Signals - Process & Process Environment - System calls related to Process Management - Daemons - Signals Interprocess Communication - Introduction - Pipes - FIFO's - Message Queues - Semaphores - Shared Memory with relavant Examples on client - server model Sockets - Introduction to Linux domain Sockets - Sockaddr structure - Elementary Socket System Calls - Advanced Socket System Calls - Socket Options, TCP/UDP client - Server Examples Session Byte order, IP addr conversion routines I & II Server Application Design - Interative Servers - Concurrent Servers - Select, System Call - Telnet, Netstat, TFTP & POP3 Threading - Introduction to threads - Basic thread functions - Communication b/w threads - Syncronization b/w threads - Mutual Exclusion b/w threads - Multi thread concurrent Server
GeneralThree Days: 10 am - 5.30 pmRs. 4,600/- (plus service tax)
LLC108 Bash Shell Scripting Essentials
Course Outline Introduction -Shells -Types of Unix Shells -Uses fir Shell Scripts -Advantages of Shell Scripts Bash Basics -Initialization Files ----Login Shells, Non-Login Shells -Aliases, Variables ----Working with Variables ----Important Internal Bash Variables -Command History -Input and Output Channels ----Redirection to Files ----The here Operator << ----Feeding Output to Another Process ----Duplicating the Output with tee -Types of Commands -Quoting -Substitution and Expansion ----Variable Substitution ----Filename Expansion(File Globbing) ----Command & Arithmetic Substitution ----Command-Line Interpretation ----Command Separators Basic Script Elements 1(Input,Output) -Program Flow Charts -General Considerations -Producing Output From a Script -Reading User Input -Simple Operation with Variables ----Basic Strings Operation ----Arithmetic Operations Basic Script Elements 2(Control Structures) -Simple Branching With if ----Short Form of if -Multiple Branch with case -Iterations and Loops ----Looping With while and until ----Processing a List With for -Exiting From a Loops ----Exiting from the Current Loop ----Iteration with continue ----Exiting from the Loop with break Advanced Scripting Techniques -Reading input with read -Shell Functions -Reading Options with getopts -Signal Handiling with trap -Implementing Simple Menus with select -Dialog Boxes with dialog ----Yes/No Box(yesno) ----Message Box(msgbox) ----Input Box(input box) ----Text Box(text box) ----Menu Box(menu) ----Check List Box(checklist) ----Radio List Box(radiolist) ----progress Meter Box(gauge) Useful Commands for Shell Scripts -cat, cut, date, echo, grep, egrep, sed, test, tr Regular Expressions Special Variable Subtitution Operators for Bash Debugging Shell Scripts Sample Scripts
GeneralTwo Days: 10 am - 5.30 pmRs. 3,000/- (plus service tax)
LLC109 CVS on Linux
Course Outline Introduction to Concurrent Version System (CVS) Architecture Overview Various features of Concurrent Version CVS Installation & Configuration - Server Setup - Client Setup Importing Projects to CVS Servers - Repository CVS Server Administration Checkin, Checkout, Updates, Review Changes, Conflict Mgt CVS User Maintenance Commands - Comparisons with previous versions - Tagging, Branching & Merging Operations - Concurrent properties CVS using GUI tools Advanced Concepts Access permissions & privileges Introduction to Subversion (SVN) Architecture Overview Various features of Concurrent Version SVN Installation & Configuration - Server Setup - Client Setup Importing Projects to SVN Servers - Repository SVN Server Administration Checkin, Checkout, Updates, Review Changes, Conflict Mgt SVN User Maintenance Commands - Comparisons with previous versions - Tagging, Branching & Merging Operations - Concurrent properties SVN using GUI tools Advanced Concepts Mailing hooks with log Access permissions & privileges
GeneralTwo Days - 10 am to 5:30 pmRs. 4,600/- (plus service tax)
LLC204 MySQL on Linux
Course Outline Database Terminology - DBMS and RDBMS - Tables and Databases - Primary Key and Foreign Key - Unique Keys - Structured Query Language - SQL as DDL, DML and DCL MySQL Database Server - Features of MySQL - MySQL Data Directory - Logging and Log Files - Installation of MySQL Server MySQL Database Design - Data Definition Language - Columns and Datatypes - Primary and Foreign Keys - Unique Keys and NOT NULL - Auto Increment Values - Table, View & Database Creation MySQL Queries - Data Manipulation Language - INSERT Records to Table - UPDATE Records of Table - DELETE Records from Table - Relationships Between Tables - Inner Joins and Natural Joins - Left Joins and Right Joins - Locking the Tables Optimizing Tables and Queries - Indexes in MySQL - Setting Indexes to Existing Tables - Non Unique Indexes - MySQL Functions - MySQL Cursors MySQL User Management - MySQL Users and Privileges - Local and Remote users - user() Function - Access Rights with MySQL - SQL GRANT Statement - Granting Multiple Privileges - Setting Password for Users - Revoking Privileges - Display Privileges for Tables & Users MySQL Storage Engines - MyISAM, InnoDB , HEAP Tables - Features of InnoDB and MyISAM - Repairing Tables by isamchk - myisamchk MySQL Server Backup & Replication - Backup Principles - mysqldump and mysqlhotcopy - Transfers to Database or Server - Backup by Direct Copying - Recovering Databases and Tables - Setting Multiple MySQL Servers - MySQL Server Replication - MySQL Triggers API based MySQL Server - Basics of Standard APIs - Overview of Using PHP API - PHPMyAdmin - JDBC and MySQL
GeneralTwo Days: 10 am - 5.30 pmRs. 3,000/- (plus service tax)
LLC205 Programming with PHP
Course Outline PHP Overview - Introduction to PHP - Insider Serve Side Web Scripting - Comparison with dynamic content alternatives like (Perl, CGI, ASP, JSP, Servlets , CGI, etc) - Three Tier Architecture - PHP installation and configuration (configuraton with Apache Web Server and MySQL) PHP Programming Options Takilng User inputs from Forms via PHP - Create a basic PHP Script - Taking user input - Pass PHP variables via the URL - Using the form GET and POST method - Obtaining data from forms through variables - Calling pages from themselves using forms Storing Data in Arrays using PHP - Indexing and Initialising arrays - One-dimensional and Multi-dimensional arrays - Array-related functions PHP Functions - Purpose of functions - Built-in functions - Declaring functions - Arguments to functions - Scope (global vs local) and Recursion Objects in PHP - Object basics - Inheritance - Classes - Constructor functions - Accessing instance data and functions Using Cookies with PHP - Cookie properties - Setting, Retrieving, and Expiring/Deleting cookies - Using cookies and Security Issues Session Management in PHP - What is a session? - Dependencies on the php.ini file - Understanding PHP session variables - Create a PHP session variable - Register and modify PHP session variables - PHP Sessions and databases Image Generation and Manipulation using PHP - Installing PHP with image support - Create, Resize, Modufy and Delete images - Drawing basic geometric shapes - Basic examples Generating PDF files using PHP - Installing PHP with PDF support - Creating PDF files - Setting PDF based content Handling Databases with PHP - PHP's database APIs - Error-handling strategies - Connection/disconnection, log in/log out - Including common access functions - Doing simple SQL queries via PHP - Building HTML tables using SQL Queries
General Two Days: 10 am - 5.30 pmRs. 3,000/- (plus service tax)
LLC206 Programming with Perl
Course Outline Introduction - What is Perl ? - Why Perl ? - Gettingl and Installing Perl - Perl as an Interpreter - Writing our first Perl program - Executing a Perl Program Perl Programming Options - Scalar Variables, Print function, Number Strings and Assignments - Working with Lists, Arrays and Hashes. - Conditional Statements - if-elseif, else & unless - Conditional Loops - foreach, while, until, do....while and do ...until - References and Typeglobs Pattern Matching with Regular Expressions. - String Interpolation - Where Regular Expressions Occur - Elements of Regular Expressions - More Advanced Pattern matching Expressions - Extracting Matched Text - Matching more than once Subroutines - Difference between Subroutines & Functions - Declaring and Calling Subroutines - Passing Parameters - Prototypes - Returning Values from Subroutines - Reference to Subroutines Working with Files and I/O - Creating Filehandles - Reading from Files - Writing from Files - Opening Pipes - Manipulating files and Directories Standard Perl Modules. - Modules and Packages - Package and Lexical Variables - Loading Module - Using do, require & use - Special Hash %INC and Special Array @INC - Installing Modules - Finding out what Modules are Installed - Exploring some of the Modules Using Perl for Administration - User Administration - Implementing Disk Quotas - Executing a Remote Command - Remote Backup - Automating FTP - Getting DNS Address Debugging Perl Scripts. - Syntax Error Checklist - Diagnostic Modules - Using Perl Debugger
GeneralTwo Days: 10 am - 5.30 pmRs. 3,000/- (plus service tax)
LLC207 Programming with Python
Course Outline Introduction to Python - A Brief history - The Uses and scope of python - Getting and installing Python The Python Interpreter - Using the interpreter - The other IDE's available The Language - Basic I/O operations - Assignment operators - Basic data types - Code blocks and indentations - Conditional statements - Iterations - Some built-in functions - Using exceptions - Functions - File Operations Object Oriented Principles - Creating classes - Creating instances - Inheritance - Polymorphism - Metaclasses Modules - Extending the language with the help of modules - Creating modules - Accessing attributes and importing specific module names from packages - Use of the os module - Use of the re module for pattern matching using regular expressions - Use of the thread module for creating threads - Using the socket module for opening sockets - Using some client side network protocol modules like HTTP and FTP Debugging and Optimizing - Debugging - The warnings module - The profile module - Optimizing loops and I/O
GeneralTwo Days: 10 am - 5.30 pmRs. 3,000/- (plus service tax)
LLC208 PostgreSQL on Linux
Course Outline Database Terminalogy - DBMS and RDBMS - Relational Databases - Structured Query Langauage - SQL as DDL,DML and DCL Installation and configuration - Features of PostgreSQL - Installation - Creating the PostgreSQL User - Configuration - Initialization - Starting the Server PostgreSQL Basic Queries - Create and Drop Tables - Adding Data with INSERT - Viewing Data with SELECT - Removing Data with DELETE - Modifying Data with UPDATE - Sorting Data with ORDER BY PostgreSQL Database Design - Columns and Datatypes - Primary Keys and Foreign Keys - Unique key and NOT NULL - Auto Increment Values - Table, View & Database Creation PostgreSQL Database Queries - NULL and DEFAULT - AND/OR Usage - Range of Values - LIKE Comparison - CASE Clause - Distinct Rows - Functions and Operators - SET, SHOW, and RESET - Using GROUP BY, HAVING Joining Tables - Creating Joined Tables - Three- and Four-Table Joins - Choosing a Join Key - One-to-Many Joins - Unjoined Tables - Table Aliases and Self-joins Managing database privileges - Temporary Tables - ALTER TABLE - Assigning users to roles - Understanding role access - GRANT and REVOKE - Views - Rules - LISTEN and NOTIFY Functions and Triggers - Functions - SQL Functions - PL/PGSQL Functions - Triggers Importing and Exporting Data - Using COPY - COPY File Format - DELIMITERS - COPY Without Files Advance Administration - Creating Users - Backup and Restore - Server Start-up and Shutdown - Performance Monitoring - System Tables - PostgreSQL logging API Based PostgreSQL Server - Basic of Standards APIs - Overview of Using PHP API - PHPpgAdmin - Application Integration to PostgreSQL
GeneralTwo Days: 10 am - 5.30 pmRs. 3,000/- (plus service tax)
LLC403 Qmail Server Administration
Course Outline Mail Service Terminology - Mail Trans port Agent - Mail User Agent - Mail Access Agent - Mail Delivery Agent - SMTP, IMAP and POP3 - Mail Delivery Process Role of Qmail Mail Server - Qmail Architecture - Features of Qmail - Mail Store Format - Message Queues & Queue tools - Qmail Configuration Files - ucspi-tcp and daemontools Qmail Mail Server Configuration - Qmail MTA Configuration - Configuration of Aliases - Canonical Maps in Qmail - Qmail-users - Procmail Configuration - Transport Layer Security (TLS) - Autoresponder Qmail in Multiple Domain - Multiple MTA Setup - Virtual Domains - Limiting Mail ID Numbers - Fetchmail Configuration - Relaying through MTA MySQL with Qmail Server - SASL Overview - SASL Libraries MySQL - Need of SMTP AUTH - SMTP AUTH with MySQL - MySQL for Storing Aliases IMAP Server Configuration - Courier IMAP Configuration - IMAP with MySQL - Transport Layer Security (TLS) - Squirrel Mail Securing EMails from Attacks - Setting up User Quota - User Based Restrictions - Host Based Restrictions - Clamav Antivirus - Qmail Scanner - Usage of Spamasassin Qmail Server Monitoring - Qmail Log Files - ISOQ Logs - Qmail-MRTG Qmail Server Utilities - V qadmin - Vpopmail - Qmailadmin - Maildrop - Ezmlm Mailer
GeneralTwo Days: 10 am - 5:30 pmRs. 5,000/- (plus service tax)
LLC404 Postfix Mail Server Administration
Course Outline The role of Postfix Mail Server - The Postfix Block Diagram - Mail Delivery Process - Utility Programs - Lookup Tables Configuration of Postfix Mail Server - Single/Multi MTA Configuration - Message Queues and Queue tools - Aliases and Canonical Maps - Transport Layer Security (TLS) MySQL with Postfix Mail Server - SASL and MySQL - SMTP AUTH with MySQL - MySQL for Storing Aliases IMAP Server Configuration - Dovecot Configuration - Cyrus IMAP Configuration - IMAP with MySQL - Transport Layer Security (TLS) Securing EMails from Attacks - User Quota - Client and User Restrictions - Clamav Antivirus and Amavis - Procmail & Spamasassin - Hosting Multiple Domains - Virtual Domain Configuration - Fetchmail Configuration - Catchall Accounts Relaying through MTA -Inbound Mail Gateway -Outbound Mail Gateway -Transport Maps Mail Server Redundancy - Failover with Backup MX - Archiving Mail for Backup - Exclusive SMTP and IMAP Servers EMail Content Filtering - Content Checking Actions - Mail Header Checking - Mail Body Checking - Mail Attachment Filtering Mail Server Utilities - cyrusadm and postfixadmin - majordomo - squirrelmail - Auto-reply
General Four Days: 10 am - 5:30 pmRs. 9,600/- (plus service tax)
LLC405 Linux FireWall Solutions
Course Outline Firewall using Linux OS Firewall Concepts Proxy Vs Firewall Router Vs Firewall Public and Private IP addresses Routing Concepts Gateways IP Forwarding Communication Between Networks Network Address Translation Implementing Firewall Using iptables iptables Features Installation of iptables iptables Rule Constructs Tables and Chains Restricting the Packets filter table Adding and Inserting Rules Listing and Saving filter Rules INPUT, OUTPUT and FORWARD Chains Advanced Filtering Through iptables Protocol, port Filtering Layer2 Restrictions Generating icmp Messages with REJECT TCPMSS NAT Using iptables Source NAT MASQUERADE Destination NAT Port Forwarding and REDIRECT Mangle Table Implementation Marking the Packets Co-existing of Rules in Multiple Tables TTL,TOS Restrictions Logging and Optimization Syslog and iptables iptables Logging Applying Log Limit Resetting iptables Counters User Defined Chains Creating of User Defined Chains Linking UDC with Built-in Chains Managing User Defined Chains
GeneralTwo Days: 10 am - 5:30 pmRs. 5,000/- (plus service tax)
LLC406 Open LDAP Server Administration
Course Outline Introduction to Directory Services -What is a Directory? -LDAP: Models, Schema, and Attributes -Object Classes The LDAP Naming Model -Directory Information Trees and Distinguished Names -Naming Suffixes -Planning the Directory Hierarchy OpenLDAP Directory Server: Basic Configuration -Installation OpenLDAP Directory Server -LDIF -Logging and Indexing OpenLDAP Directory Server: Authentication & Security -Configuring TLS Security -Using Access Control Lists -slapadd Searching and Modifying the LDAP Directory -Searching the Directory -Updating the Directory -Graphical LDAP Client Utilities Linux User Authentication with NSS and PAM -Understanding Authentication and Authorization -Name Service Switch (NSS) -Advanced PAM Configuration Centralized User Authentication with LDAP -Central Account Management with LDAP -Migrate Existing Data into an LDAP Server -LDAP User Authentication -autofs with LDAP Integration Kerberos and LDAP -Introduction to Kerberos -Configuring the KDC and Clients -Configuring LDAP to Support Kerberos Directory Replication -Replication in LDAP -Master and Slave Configuration -Planning for Directory Server Availability Authenticating Windows Clients -Windows Networking Overview -Configuring a Samba PDC Using LDAP Windows Domain Authentication and Linux Clients -Active Directory Servers -Linux as a Client -Active Directory and Linux Clients
GeneralFour Days: 10 am - 5:30 pmRs. 9,600/- (plus service tax)
LLC408 Samba Server Administration
Course Outline Samba Server Installation of Samba Server Configuration Files Adding Samba Users smbd and nmbd Daemons Exploring Samba Configuration files smbpasswd, smbusers and smb.conf Global Sections and Share Section in smb.conf File and Print Services Testing of smb.conf and testparm Configuring Samba Server for Resource Sharing Discussion of Default Shares Sharing of Directories Sharing of Selected Printers Home Directory Share Issues Configuring Samba Clients Using smbclient and CIFS with mount Sending Print jobs From a Windows Machine Utilities for Samba Statistics Accessing A Windows Share From Linux Machine Samba Server Security IP Based Security Share level Security Security for Users and Groups write list and create mask Unix/Windows Filesystem issues Changing Default File and Directory Permissions Links and Hidden files Forcing the Attributes Like User Samba Configuration Through Web Browser Samba Web Administration Tool xinetd and swat swat configuration swat Restrictions Samba Authentication Server Terminology netbios Name and Workgroup WINS and Browsers Local, Domain and Preferred Master Browsers OS level Samba Primary Domain Controllers Samba as Authentication Server for Windows Clients Samba Server For Storing Windows Profiles Samba Storing Logon Scripts of Windows Users Home Directory mapping LDAP and Samba Servers Samba Authenticating from LDAP Server LDAP Schema For Samba Servers Samba Commands Adding Users to LDAP Server
GeneralTwo Days: 10 am - 5:30 pmRs. 5,000/- (plus service tax)
LLC409 DNS Administration
Course Outline DNS Terminology - DNS Server Roles - Primary and Slave DNS Servers - Caching Name Servers - DNS Forwarders - Root DNS Servers - Subdomain Delegation - DNS Query Types Bind Configuration - Master DNS Server - Resource Records - Forward Lookup Database - Reverse Lookup Database - Mail Server Support Slave Server Configuration - Replication Parameters - Master/ Slave Replication - IP Based Security - TSIG Security Subdomain Configuration - Subdomain Delegation - Recursive Queries - Iterative Queries - DNS Forwarders - ACL with Subdomains DNS Server Logging - Channeling and Logging - Log Categories - IXFR/AXFR Logs - Logging DNS Queries Split DNS Configuration - Split DNS Topology - DNS Views - Views and ACLs - Match-Clients DNS Server Security - Restricting Queries - Restricting Replication - Access Control Lists - DNS Chrooting Remote Name Daemon Controller - RNDC Configuration - RNDC Key Generation - Configuring Controls - RNDC Clients Dynamic DNS Configuration - DNS Server for Dynamic Update - DHCP Server for Dynamic Update - Shared Key Generation - DDNS Client Configuration
GeneralTwo Days: 10 am - 5.30 pmRs. 5,000/- (plus service tax)
LLC501 Programming with OpenGL
Course Outline Introduction Getting Started with OpenGL What is OpenGL Materials provided in the course Your First OpenGL Program The QGLWidget Class The initializeGL() method The paintGL() method The resizeGL() method OpenGL Command Syntax Function Naming Convention Constants, Datatypes & Macro naming conventions OpenGL as a State Machine Libraries related to OpenGL Animations in OpenGL Drawing Objects Describing a Solid Object: Geometry & Topology OpenGL Primitives Primitive Types Polygon construction rules Solid Object Examples Cube Cone Cylinder Drawing solid objects using GLUT Library Coordinate Transformations Types of transformations Translation Scaling Rotation Matrix Representation of Transformations Vertex Matrix Translation Matrix Scaling Matrix Rotation Matrix Composition of transformation matrices Understanding transformations in OpenGL Eye Coordinates Viewing Transformations Modeling Transformations The Model View duality Projection Transformations Viewport Transformations Specifying Transformations in OpenGL Atom Example Camera Manipulation Viewing in 3D Projection Parallel Projection Math Perspective Projection Math Model View Duality Atom Example Improved Parallel and Perspective Projections. Lights, Color, Materials, depth test Representation of a color in OpenGL Specifying Color in OpenGL Shading The Color Cube Colors in the Real World Light Concepts and Categories Ambient Light Diffuse Light Specular Light Materials Concepts Surface Normals OpenGL Lights and Materials Spot Lights Drawing Curved Surfaces The glColorMaterial() function Texture Mapping Specifying the texture Indicate how the texture is to be applied to each pixel Enable texture mapping Draw the scene, supplying both texture & geometric coordinates XModel: Simple C++ wrapper for OpenGL OpenGL Based Toolkits Open Inventor OpenSG VTK
GeneralThree Days: 10 am - 5.30 pmRs. 12,000/- (plus service tax)
LLC602 Linux Apache MySQL & PHP (LAMP)
Course Outline Linux Operating System - Features of Linux OS - Linux Applications - Device Identities - Overview of Filesystem - Files and Directories - LAMP Overview Linux OS Commands - Bash User Interface - File Operations - Directory Operations - Process Related Commands - Disk Usage and Free Space - Vi Text Editor - RedHat Package Manager - Installation of Softwares Linux Advanced Services - Mounting the Devices - User Related Commands - Network Related Commands - IP Address and Virtual IP - FTP, SSH and Scp Clients - Transfer of Files by GFTP - DNS Server Configuration Apache Web Server - Apache Web Server - IP Based Virtual Hosting - Name Based Virtual Hosting - User Based Security - Host Based Security Tomcat with Apache Server - Jakarta Tomcat - Tomcat Configuration - Configure Apache Connector - Create Tomcat Admin Plus complete contents of LLC204: MySQL on Linux LLC205: Programming with PHP
General6 Days: 10am - 5.30pmRs. 9,600/- (plus 12.36% service tax)
RH301 Red Hat Rapid Track Certification Course
Course Outline Essentials Essential initial topics in system administration, including editors, switching accounts, adding users, using cron, and managing network connections Kernel Services - The Linux kernel: variants and modules - The /proc filesystem and the sysctl command - Accessing devices using udev - Exploring hardware Filesystem Management - Creating filesystems - Making filesystem mounts persistent across reboots - Managing swap space User Administration - Modifying and deleting user accounts - Password aging - Group administration - Creating group directories - Setting disk quotas Local Security - Setting up a host-based firewall - Using access control lists - The SELinux security layer - Managing suid and sgid executables - Controlling access to superuser authority using sudo Advanced Partitioning - Understanding and implementing Software RAID - Understanding Logical Volume Management - Creating and resizing logical volumes Installation - The interactive Anaconda installer - Kickstart: a hands-free method of installation System Initialization - Understanding the boot procedure - Configuring the GRUB boot loader - The Initial RAM Disk - Understanding run levels - Controlling services RPM, YUM, RHN - RPM: The Red Hat Package Manager - The YUM installer - Using the Red Hat Network System Administration Topics - Configuring the X Server - The CUPS printing system - cron and the superuser: the system-wide crontab file - cron and system reboots: the anacron system - Authentication Configuration: Pluggable Authentication Modules Network Configuration - Understanding network addresses - Using OpenSSH for network communications - Using VNC for network communications - Network Authentication Network Security - Protecting services using TCP Wrappers - Protecting the system using a packet filtering host-based firewall Network File Sharing Services - Setting up an NFS server - Setting up an FTP server - The Samba Server: networking with Windows systems Network Infrastructure - Creating a private repository - NTP: Coordinating time - Configuring a DHCP server - Configuring a DNS server HTTP Service - Configuring the Apache web server - Configuring the Squid web proxy cache Mail Service - Understanding e-mail delivery - Using sendmail and postfix - Dovecot: an IMAP and POP server Troubleshooting - A method for fault analysis - Things to check - Understanding recovery run levels - Using the rescue environment
OtherFour Days: 10 am - 5:30 pmRs. 9,600/- (plus service tax)

Add Course to this training Center
Return to Training Centers
Post New Training center

More Training Centers

Awards & Gifts
Active Members
TodayLast 7 Daysmore...

Online Members

Bhakti Savla
More...
ISC Technologies, Kochi - India. Copyright © All Rights Reserved.