| Course Name | Category | Duration | Fees | Hardware Tech Support
Who may take the Course?
Hardware Tech Support is a course Open to anyone from Diploma or any graduation background, should be well conversant in English. A certificate in Hardware Tech Support signifies that the Certified Individual posses the Knowledge and skills essential for a successful entry level Computer Hardware technician with the necessary skills of office automation tools like Word, Excel, PowerPoint & Internet
Duration : 1.5 months with 2hrs/day & 6 days/Week
Objectives :
By the end of the course, students will be able to : Have an In depth Knowledge of Computer Hardware, Assembling & Troubleshooting Computers and Install Application Software, Configure the Computers for Multimedia Applications & Install Peripherals.
Job opportunities :
The qualified person can find job opportunities as a Hardware Technician & in Hardware Tech Support Jobs.
| General | 1.5 months | | Desktop Tech Support Hardware Tech Support + Desktop OS & Anti-Virus Durantion:25Days (50Hrs)
DOS 6.2
DOS Fundamentals
Booting DOS
Starting and Restarting a PC
Using DOS Commands
Batch Files, Controlling DOS
DOS Editor, Files and Directories
Comparing Files and Disks
Formatting Floppy Disks
Protecting Data on Disks
Setting Up a Hard Disk
System Configuration Files
Configuration Commands
Memory Management
System Diagnosis
Win95/98/ME Basics
Win98 Architecture
Basic Features,
Boot Sequence
Installation Process
Multimedia Configuration
System Administration
Configuring Win98
Printers, Networking, Utilities,
Using Outlook Express
Anti-virus Software
Introduction to Computer
Viruses, Worms, Trojan Horses. Macros etc.
Installing & Configuring Anti-virus
Software (Server & Client)
Updating Anti-virus
Virus Removal & Prevention
Windows 2000 /XP Professional
General
Introduction
Version Differences
New Features
Customizing Windows 2000 Professional
Installation
Installation Prerequisites/HCL
Installation Methods
Management
Setting up & Managing User
Setting up & Managing Group Accounts, MMC, Services
Service Packs, ICS
Managing Data Storage
Disk Management
File Systems
DFS, EFS, and Compression
FAT and FAT32, NTFS
Printers
Installing printer locally
Accessing a Remote printer
Implementing Security
System Maintenance and Optimization
Auditing Resources & Events, De fragmentation, Performance, Scheduled Tasks, Disk Quotas, ERD, Backup & Restore, Troubleshooting
Using Outlook Express
Linux Desktop Essentials
General
Introduction
Features
Installation
Linux Workstation class installation and configuration
Installing new applications on Linux
Using of a dual booting system
Linux Commands
Basic command on the shell
Popular text editors on the shell
Working with Graphics
The X windows system
Configure and customize your Linux Desktop
Use and configure the GNOME graphical user interface
Using GNOME application
GUI utilities
Linux Tools
Using Open office suite
Working with graphic image editor
Creating files with cross-platform compatibility
such as PDF
Open, read, edit, save and send files created
under other operating system
Using Basic Services
Configuring printers
Configuring an internet connection
Configuring email accounts for corporate
& personal use.
| General | 25 Days | | Network Tech Support Desktop OS & Anti Virus + Networking Essentials
General
Introduction to Networking
Basic elements of Networking
Networking and its uses
Types of Networks
LAN
MAN
WAN (Enterprise & Global)
Peer-to-peer
Client-Server
Network Topology
BUS
STAR
RING
MESH
CELLULAR
HYBRID
Transmission Media
Cable
Co-axial, Twisted Pair & Fiber Optic cables
Wireless
Radio, Infrared & Micro waves
Network Devices
Repeaters
Hubs
Switches
Bridges
MUX
MAU
Routers
Brouters
Modems
Transmission Media Connectors
T-BNC, RJ –11, RJ-45, etc.,
Cabling Standards
Jack Panel
I/O ports
Structured Cabling Guidelines.
OSI Model
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data-Link Layer
Physical Layer
Protocol Stacks
IPX/SPX Model
IPV4
IPV6
Apple Talk
IP Addressing
Address Classes
Binary <- -> Decimal Representation
Classful Masks
Private Address Space
Subnet Masks
Routing & Switching
Circuit Switching
Packet Switching
Routing Table
Link State
RIP, OSPF
Network Services & Protocols
File, Print, Database, Messaging,
Application & Specialized Services.
DNS, DHCP, HTTP, FTP, Telnet, SMTP, NNTP, POP3, IMAP4, HTTPS, SSL, BOOTP, L2TP, PPTP, IPSec, Kerberos, SNMP, etc.,
WAN Technology
Serial Connectivity, X.25, FDDI, ISDN, ATM, Frame Relay, CSU/DSU, etc., VPN, Proxy Servers, Firewalls RAID, Network Attached
Storage, Storage Area Networks,
Network Administration
NOS
Backup
Client Server
Clustering
Documentation
Security
Scenarios
Network Cards
Cable Crimping
Configuration
Installation
Troubleshooting
Analyzers, Hardware-Related Problems,
Logging Events
Monitoring Trends and Performance
Network
Software
User-Related Problems
| General | 80 Hours | | System Administrator Desktop Tech Support + Network Tech Support + Network Operating System
Windows 2000 Server Introduction to Windows
2000 Server
Installation & Boot Process
Windows 2000 Administration Tools
Creating Users & Groups
User Profiles, System Policies
DNS, WINS, Disk Administrator
Creation of Groups Permissions
Shared Folder and NTFS Permissions
Print Permissions, Backup and Restore
Windows 2003 Server
Introduction to Windows 2003 Server
Installation of Windows 2003 Server
Adding and Removing Drivers and Software
File systems – FAT32 and NTFS
Creating User & Group Accounts
Configuring Disk Quotas
Controlling Access to Files and Resources
Sharing Resources on the Network
Configuring Printers & Modems
Installing & Configuring DNS, DHCP, ADS
Installing & Configuring Terminal Services
Using Backup & Restore Utility
SCO UNIX 5.0.5
Introduction to UNIX
Basic Architecture of UNIX
Installation of UNIX
File system, Basic Commands
Administering UNIX
Creating Users & Groups
File and Directory Permissions
Processes and Process Administration
Automating Tasks, Backup & Restore
Installing and Configuring Printers, Mouse, NIC
Working with X window System
RED HAT LINUX 9.0
Introduction to LINUX
Basic Architecture of LINUX
File system
Installation of LINUX
Basic Commands
Starting & Stopping Services in LINUX
Administering LINUX
Creating Users & Groups
File and Directory Permissions
Processes and Process Administration
Automating Tasks
Backup & Restore
Installing & Configuring Printers
Installing & Configuring Mouse
Installing & Configuring Network Cards
Working with KDE and GNOME
Using Open Office software
Installing additional packages on LINUX
SuSE LINUX 9.0
Introduction to SuSE LINUX
Basic Architecture
Installation of SuSE Linux Enterprise Edition
File system, Basic Commands
Starting & Stopping Services
Administration Commands and Utilities
Creating Users & Groups
File and Directory Permissions
Processes and Process Administration
Automating Tasks, Backup & Restore
Installing & Configuring Printers
Installing & Configuring Mouse
Installing & Configuring Network Cards
Working with GUI
Installing additional packages
| General | 234 Hours | | Hardware Engineer Hardware
Basic Introduction to Computers – 4 hrs
History of Computers
Types of Computers
Components, Features and System Design
Identifying the different parts of computer
Microprocessor Types and
Specification – 2 hrs
Processor Specification
Intel-Compatible Processors
Processor Types
Motherboard and Buses – 4 hrs
Mother Board Components
Intel and Non-Intel Chipsets
BIOS, CMOS, Type of I/O Buses,
DMA Channels, IRQs, I/O Port Address
Memory – 2 hrs
Memory Basics
Types of Memory
Memory Speed
Cache Memory
System Logical Memory Layout
Power Supply and case – 4hrs
Power Supply Function and Operation
Switch Mode Power Supplies SMPS Connectors
SMPS Voltages
Voltage Stabilizers
UPS as Backups
Types of UPS
UPS Specification
Input - Output Interfaces – 4 hrs
Serial, Parallel, USB, FireWire,
ST-506, IDE, SCSI, SATA
Magnetic Storage – 2 hrs
Principles of Magnetic Storage
Formatting
Capacity Measurements
Floppy drive – 2 hrs
Floppy Drive Basics
Types of Floppy Disk Drive
Drive Components
File Allocation
Drive Installation
Hard disk drive – 4 hrs
Hard Disk Basics
File Allocation
Formatting – low and high
Using Disk Manager
Tape Drives – 2 hrs
Tape Backup Standards
The QIC Standards
Tape Drive Installation
Tape Drive Backup Software
Optical Storage – 4 hrs
CD R / RW
CD – ROM Driver Basics
Drive Specification
Loading Mechanism
Drive Formats
CD – Writers Basics
Drive Installation & Usage
DVD (Digital Versatile Disks)
DVD – ROM Basics
DVD Specification
DVD Standards
DVD – Writers Basics
Drive installation & Usage
Input Devices Keyboard – 2Hrs
Basics functions
Types of Keyboard
Compatibility
Keyboard Technology
Mice – 2Hrs
Basics functions of Mouse
Types of Mouse
Mouse Interface
Printers – 4Hrs
Printer Technology
Laser, Inkjet, Dot Matrix
Color Printing
Printer Drivers
Display – 6 Hrs
Monitor Basics
Monochrome vs Color
Digital, Analog, TFT, LCD
Display Adapters
VESA SVGA Standards
Video Adapter Components
3D Graphics Accelerators
Audio – 2Hrs
Audio Adapter Features
Audio Adapters Concepts and Terms
Audio Adapter Applications
Audio Adapter Installation
Network Interface Cards – 2Hrs
Need for NIC
Type of NIC
NIC Types
NIC Connectors
Modems – 2 Hrs
Need for Modem
Types of Modem
Internet connection
Miscellaneous Devices – 4 Hrs
Scanner, TV Tuner Cards
WEB Camera, Laptops
Notebooks, Dumb Terminals
Assembling and Disassembling – 4 Hrs
Preventive Maintenance –2Hrs
Diagnostic Software
PC Maintenance Tools
Maintenance Procedure
Upgrading your PC
Troubleshooting – 6 Hrs
Boot Problems
Motherboard, Devices
Modem Problems
NIC & Network Problems
Sound Card Problems
Video Problems, etc.,
Desktop OS & Anti-Virus Durantion
DOS 6.2 DOS Fundamentals
Booting DOS
Starting and Restarting a PC
Using DOS Commands
Batch Files, Controlling DOS
DOS Editor, Files and Directories
Comparing Files and Disks
Formatting Floppy Disks
Protecting Data on Disks
Setting Up a Hard Disk
System Configuration Files
Configuration Commands
Memory Management
System Diagnosis
Win95/98/ME Basics
Win98 Architecture
Basic Features,
Boot Sequence
Installation Process
Multimedia Configuration
System Administration
Configuring Win98
Printers, Networking, Utilities,
Using Outlook Express
Anti-virus Software
Introduction to Computer
Viruses, Worms, Trojan Horses. Macros etc.
Installing & Configuring Anti-virus Software
(Server & Client)
Updating Anti-virus
Virus Removal & Prevention
Windows 2000 /XP Professional
General
Introduction
Version Differences
New Features
Customizing Windows 2000 Professional
Installation
Installation Prerequisites/HCL
Installation Methods
Management
Setting up & Managing User
Setting up & Managing Group Accounts,
MMC, Services
Service Packs, ICS
Managing Data Storage
Disk Management
File Systems
DFS, EFS, and Compression
FAT and FAT32, NTFS
Printers
Installing printer locally
Accessing a Remote printer
Implementing Security
System Maintenance and Optimization
Auditing Resources & Events,
De fragmentation, Performance,
Scheduled Tasks, Disk Quotas, ERD,
Backup & Restore, Troubleshooting
Using Outlook Express
Linux Desktop Essentials
General
Introduction
Features
Installation
Linux Workstation class installation and configuration
Installing new applications on Linux
Using of a dual booting system
Linux Commands
Basic command on the shell
Popular text editors on the shell
Working with Graphics
The X windows system
Configure and customize your Linux Desktop
Use and configure the GNOME graphical
user interface
Using GNOME application
GUI utilities
Linux Tools
Using Open office suite
Working with graphic image editor
Creating files with cross-platform
compatibility such as PDF
Open, read, edit, save and send files
created under other operating system
Using Basic Services
Configuring printers
Configuring an internet connection
Configuring email accounts for
corporate & personal use.
Networking Essentials
General
Introduction to Networking
Basic elements of Networking
Networking and its uses
Types of Networks
LAN
MAN
WAN (Enterprise & Global)
Peer-to-peer
Client-Server
Network Topology
BUS
STAR
RING
MESH
CELLULAR
HYBRID
Transmission Media
Cable
Co-axial, Twisted Pair & Fiber Optic cables
Wireless
Radio, Infrared & Micro waves
Network Devices
Repeaters
Hubs
Switches
Bridges
MUX
MAU
Routers
Brouters
Modems
Transmission Media Connectors
T-BNC, RJ –11, RJ-45, etc.,
Cabling Standards
Jack Panel
I/O ports
Structured Cabling Guidelines.
OSI Model
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data-Link Layer
Physical Layer
Protocol Stacks
IPX/SPX Model
IPV4
IPV6
Apple Talk
IP Addressing
Address Classes
Binary <- -> Decimal Representation
Classful Masks
Private Address Space
Subnet Masks
Routing & Switching
Circuit Switching
Packet Switching
Routing Table
Link State
RIP, OSPF
Network Services & Protocols
File, Print, Database, Messaging,
Application & Specialized Services.
DNS, DHCP, HTTP, FTP, Telnet, SMTP, NNTP, POP3, IMAP4, HTTPS, SSL, BOOTP, L2TP, PPTP, IPSec, Kerberos, SNMP, etc.,
WAN Technology
Serial Connectivity, X.25, FDDI, ISDN, ATM, Frame Relay, CSU/DSU, etc., VPN, Proxy Servers, Firewalls RAID, Network Attached
Storage, Storage Area Networks,
Network Administration
NOS
Backup
Client Server
Clustering
Documentation
Security
Scenarios
Network Cards
Cable Crimping
Configuration
Installation
Troubleshooting
Analyzers, Hardware-Related Problems,
Logging Events
Monitoring Trends and Performance
Network
Software
User-Related Problems
Microsoft Xp Professional
General
Introduction to Windows XP Professional
Version Differences/New Features
Windows Installer
Customizing Windows XP Professional
Installation
Installation Prerequisites/HCL
Installation Methods
Attended
Unattended
Over the Network
Upgrading previous versions
Remote Installation Services
Application Installation
Hardware Installation
Device Drivers
Multiple Boot Configurations
Management
Setting up & Managing User
Setting up & Managing Group Accounts
MMC
Services
Service Packs
Managing Data Storage
Disk Management
File Systems
DFS
EFS
Compression FAT and FAT32
NTFS
Offline Folders
System Maintenance and Optimization
De fragmentation
Performance
Scheduled Tasks
Windows Update Manager
Security
Authentication
File and Share Security
Securing Resources
NTFS Permissions
Administering Shared Folders and Resources
Auditing Resources and Events
Disk Quota
Firewall
Printers
Installing printer locally
Accessing a Remote printer
Implementing Security to printers
Networking
File and Printer Sharing
Mobile Computing
Understanding DNS
Understanding TCP/IP
Remote Desktop Connection
Terminal Service Web Connection
Internet Connection Sharing and Firewall Configuration
Troubleshooting
Advanced Recovery Options
Backup & Restore
Domain Logon and Authentication
Hardware and Driver Issues
Using Files and Setting Transfer wizard
Managing & Maintaining a Microsoft Windows 2003 Server Environment
General
Introduction to Windows 2003 Server
Version Differences/New Features
Windows Installer
Customizing Windows 2003 Server
Installation
Basic Attended
Unattended Installation
Remote Installations Service
Upgrading from Windows 2000
Active Directory & DNS
Configuring Directory Services
Directory Services Terminology
Domain Administration
Domain Planning
Domains and Forest Structures
Server Administration
User Accounts
Group Accounts
Computer Accounts
Profiles
Disks and File Systems
Administering File Systems, Shares, Advanced Disk Management, Distributed and Remote File Systems, File Systems, Replication, and Fault Tolerance, Shadows Copies, Disk Quota
Printers
Installing & Configuring Local Printer
Installing & Configuring Remote Printer, Using IPP
Security
Configuring Security
Group Policies
Security Templates
Security and Kerberos
Auditing System Resources
Server Configuration
Network Configuration
Remote Desktop Administration
IIS 6.0
Terminal Servers
Terminal Service Web Connection
Internet Connection Sharing
RAID
Performance Monitoring
Performance Tuning
Maintenance
Disaster Recovery
Backup & Restore
Using ASR
Server Optimization
Software and Updates
Storage
Troubleshooting
Boot up failure
Client and Connectivity Problems
Network Problems
Permissions
Print Services Problem
| General | 200 Hours | | Network Enginer Network Operating System
Windows 2000 Server Introduction to Windows
2000 Server
Installation & Boot Process
Windows 2000 Administration Tools
Creating Users & Groups
User Profiles, System Policies
DNS, WINS, Disk Administrator
Creation of Groups Permissions
Shared Folder and NTFS Permissions
Print Permissions, Backup and Restore
Windows 2003 Server
Introduction to Windows 2003 Server
Installation of Windows 2003 Server
Adding and Removing Drivers and Software
File systems – FAT32 and NTFS
Creating User & Group Accounts
Configuring Disk Quotas
Controlling Access to Files and Resources
Sharing Resources on the Network
Configuring Printers & Modems
Installing & Configuring DNS, DHCP, ADS
Installing & Configuring Terminal Services
Using Backup & Restore Utility
SCO UNIX 5.0.5
Introduction to UNIX
Basic Architecture of UNIX
Installation of UNIX
File system, Basic Commands
Administering UNIX
Creating Users & Groups
File and Directory Permissions
Processes and Process Administration
Automating Tasks, Backup & Restore
Installing and Configuring Printers, Mouse, NIC
Working with X window System
RED HAT LINUX 9.0
Introduction to LINUX
Basic Architecture of LINUX
File system
Installation of LINUX
Basic Commands
Starting & Stopping Services in LINUX
Administering LINUX
Creating Users & Groups
File and Directory Permissions
Processes and Process Administration
Automating Tasks
Backup & Restore
Installing & Configuring Printers
Installing & Configuring Mouse
Installing & Configuring Network Cards
Working with KDE and GNOME
Using Open Office software
Installing additional packages on LINUX
SuSE LINUX 9.0
Introduction to SuSE LINUX
Basic Architecture
Installation of SuSE Linux Enterprise Edition
File system, Basic Commands
Starting & Stopping Services
Administration Commands and Utilities
Creating Users & Groups
File and Directory Permissions
Processes and Process Administration
Automating Tasks, Backup & Restore
Installing & Configuring Printers
Installing & Configuring Mouse
Installing & Configuring Network Cards
Working with GUI
Installing additional packages
CCNA (Cisco Certified Network Associates)
OSI Model
Connection vs. Connection-less
Data Encapsulation
History & Function
Layer Identification
Port/Socket Concepts
Hardware Architecture
Identify Components
Interfaces & Cabling
Router Features
Switch Features
IOS/Command Line
CDP Functions
Configuration Commands
IOS Management Commands
Password Recovery
Troubleshooting Commands
IP Addressing
Address Classes
Binary <- -> Decimal Representation
Classful Masks, Private Address Space
Subnet Masks, VLSM
LAN Switching
Bridging Types
Flow Control
ISL & IEEE 802.1Q
MAC Layer Addressing
Routing vs. Bridging
Spanning Tree
Switched Ethernet, Fast Ethernet, Gigabit Ethernet
Switched Token Ring & FDDI
Switching Types, VLANs
Dial Solutions
Callback & Dial Backup
ISDN PRI & BRI
PPP, VPDN, L2T, L2, IPSec
Network Protocols
ICMP
IP Network Layer
IP Transport Layer
IPX Addressing
IPX Encapsulation Types
SAP Function in IPX
Routing Protocols
BGP, Distance Vector, EIGRP
Identify Routable Traffic
IGRP, Link State, OSPF, RIP
Traffic Management
AAA - Authentication, Authorization & Accounting
Compression & Queuing
Extended Access Lists
SAP Traffic Management
SNMP
SNTP & NTP
Standard IP Access Lists
Standard IPX Access Lists
TACACS+, RADIUS
WAN Connectivity
DTE vs. DCE
Frame Relay
Serial Connectivity/HDLC
X.25
+ MCSA or LINUX
| General | 340 Hours | | ORACLE DBA 9i Oracle DBA 9i
SQL
Introduction
Writing a Basic SQL Statement
Restricting & Sorting Data
Single Row Functions
Displaying Data from Multiple Tables
Aggregating Data by using Group Functions
Writing Sub queries
Producing Readable Output with iSQL *Plus
Manipulating Data
Creating and Managing Tables
Including Constraints
Creating Views
Other Database Objects
Controlling User Access
SQL Workshop
Using Set Operators
Oracle 9i Date time functions
Enhancements to the GROUP BY Clause
Advanced Sub queries
Hierarchical Retrieval
Oracle9i Extensions to DML and DDL Statements
Fundamentals I
Oracle Architectural Components
Getting Started with the Oracle Server
Identifying the Features of the Universal Installer
Defining the Optimal Flexible Architecture
Creating a database during installation
Creating a new database
Identifying database administrative users
Managing an Oracle Instance
Creating a Database
Using the Data Dictionary
Maintaining the Control Files
Maintaining Redo Log Files
Managing Tablespaces and Datafiles
Describing Storage hierarchy
Establishing the Difference between SYSTEM and
Non-SYSTEM tablespaces
Storage Structures and Relationships
Managing Undo Data
Understanding the difference between automatic
undo management and manual undo
Creating and maintaining UNDO tablespaces
Managing Tables
Managing Indexes
Identifying unused indexes
Fundamentals II
Network Overview
Basic Oracle Net Architecture
Basic Oracle Net Services Server-Side Configuration
Basic Oracle Net Services Client-Side configuration
Usage and Configuration of the Oracle Shared Server
Backup and Recovery Overview
Instance and Media Recovery Structures
Configuration of the Database Archiving Mode
Oracle Recovery Manager (RMAN) Overview and configuration
User-Managed Backups
RMAN Backups
User-Managed Complete Recovery
RMAN Complete Recovery
User-Managed Incomplete Recovery
RMAN Incomplete Recovery
RMAN Repository Maintenance
RMAN Catalog Creating and Usage
Transporting Data between Database
Backup and Recovery and Networking workshop
Performance Tuning
Overview of Oracle 9i Performance Tuning
Diagnostic and Tuning Tools
Sizing the Shared Pool
Sizing the Buffer Cache
Sizing other SGA Structures
Database Configuration and I/O Issues
Optimize Sort Operations
Diagnosing Contention For Latches
Tuning Rollback (or UNDO) Segments
Monitoring and Detecting Lock Contention
Tuning Oracle Shared Server
Application Tuning
Using Oracle Blocks Efficiently
| General | 150 Hours | | CCSA & CCSE Check Point Certified Security Administrator
CCSA is a foundation level certification that validates a candidates ability to configure and manage fundamental implementations of Check Point's flagship product, FireWall-1, as an enterprise level Internet security solution to protect corporate networks. As a CCSA, security professionals possess the requisite skills to define and configure security policies that enable secure access to information across corporate networks. In addition to these essential skills, CCSAs also have the ability to monitor network security activity and implement measures to block intruder access to networks.
Course Comtents :
CCSA (Checkpoint Certified Security Analyst) Check Point FireWall-1 Administration
VPN-1 NGX Overview
Objectives
How VPN-1 NGX Works
VPN-1 NGX Architecture
Distributed Deployments
The Security Policy
Security Policy Defined
Rule Base Defined
Detecting IP Spoofing
Multicasting
Creating the Rule Base
Completing the Rule Base
Security Policy Command-Line Options
Network Address Translation
Understanding Network Address Translation
Configuring Network Address Translation
Manual NAT
Monitoring Traffic and Connections
Smart View Monitor
Smart View Monitor Login
Monitoring Suspicious Activity Rules
Monitoring Alerts
Monitoring Gateways
Monitoring Traffic or Counters
Monitoring Tunnels
Monitoring Remote Users
Event Reporter
Smart Defense
Active Defense
Smart Defense in Action
Content Security
Role of the Security Server
Understanding Content Security
Content Vectoring Protocol (CVP)
URI Filtering Protocol (UFP)
Implementing Content Security
Resources and the Rule Base
CVP Load Sharing and Chaining
Implementing the TCP Resource
Authentication
Understanding Authentication
User Authentication
Session Authentication
Client Authentication
LDAP User Management with Smart Directory
LDAP Servers
Integrating LDAP with NGX
Using Smart Dashboard to Manage LDAP Users
LDAP and User Manager Troubleshooting
Configuring VPNs
IKE
VPN Deployments
VPN Implementation
VPN Setup
Simplified Intranet Setup
Integrating VPNs into a Rule Base
Disaster Recovery
Objective
Backing Up for Disaster Recovery
| General | | | CCNA (must have the basic knowledge of networking)
The first step in Cisco networking begins at the Associate level. CCNA certified professionals can install, configure and operate LAN, WAN and dial access services for small networks. On successful completion of this course, the candidate will have knowledge and skills necessary to select, connect, configure and troubleshoot the various Cisco networking devices. The course covers topics on Extending Switched Networks with VLANS, Determining IP Routes, Managing IP traffic with Access Lists, Establishing Point-to-Point connections and Establishing Frame Relay Connections.
Course Contents
CCNA (Cisco Certified Network Associates)
OSI Model
Connection vs. Connection-less
Data Encapsulation
History & Function
Layer Identification
Port/Socket Concepts
Hardware Architecture
Identify Components
Interfaces & Cabling
Router Features
Switch Features
IOS/Command Line
CDP Functions
Configuration Commands
IOS Management Commands
Password Recovery
Troubleshooting Commands
IP Addressing
Address Classes
Binary <- -> Decimal Representation
Classful Masks, Private Address Space
Subnet Masks, VLSM
LAN Switching
Bridging Types
Flow Control
ISL & IEEE 802.1Q
MAC Layer Addressing
Routing vs. Bridging
Spanning Tree
Switched Ethernet, Fast Ethernet, Gigabit Ethernet
Switched Token Ring & FDDI
Switching Types, VLANs
Dial Solutions
Callback & Dial Backup
ISDN PRI & BRI
PPP, VPDN, L2T, L2, IPSec
Network Protocols
ICMP
IP Network Layer
IP Transport Layer
IPX Addressing
IPX Encapsulation Types
SAP Function in IPX
Routing Protocols
BGP, Distance Vector, EIGRP
Identify Routable Traffic
IGRP, Link State, OSPF, RIP
Traffic Management
AAA - Authentication, Authorization & Accounting
Compression & Queuing
Extended Access Lists
SAP Traffic Management
SNMP
SNTP & NTP
Standard IP Access Lists
Standard IPX Access Lists
TACACS+, RADIUS
WAN Connectivity
DTE vs. DCE
Frame Relay
Serial Connectivity/HDLC
X.25
| Cisco Certification | 50 Hours | | CCNP (must have the basic knowledge of networking)
642-901 BSCI
Building Scalable Cisco Internet works
Implement EIGRP operations.
• Explain the functions and operations of EIGRP (e.g., DUAL).
• Configure EIGRP routing. (e.g., Stub Routing, authentication, etc.)
• Verify or troubleshoot EIGRP routing configurations.
Implement multiarea OSPF operations.
• Explain the functions and operations of multiarea OSPF.
• Configure multiarea OSPF routing. (e.g., Stub, NSSA, authentication, etc.)
• Verify or troubleshoot multiarea OSPF routing configurations.
Describe integrated IS-IS.
• Describe the features and benefits of integrated IS-IS.
• Configure and verify integrated IS-IS.
Implement Cisco IOS routing features.
• Describe, configure or verify route redistribution between IP routing IGPs. (e.g., route-maps, default routes, etc.)
• Describe, configure or verify route filtering (i.e., distribute-lists and passive interfaces).
• Describe and configure DHCP services (e.g., Server, Client, IP helper address, etc.).
Implement BGP for enterprise ISP connectivity
• Describe the functions and operations of BGP.
• Configure or verify BGP operation in a non-transit AS (e.g., authentication).
• Configure BGP path selection. (i.e., Local Preference, AS Path, Weight or MED attributes).
Implement multicast forwarding.
• Describe IP Multicast (e.g., Layer-3 to Layer-2 mapping, IGMP, etc.).
• Describe, configure, or verify IP multicast routing (i.e., PIM Sparse-Dense Mode).
Implement IPv6.
• Describe IPv6 addressing operations.
• Describe IPv6 interoperation with IPv4.
• Describe, configure or verify OSPF routing with IPv6 addressing.
642-812 BCMSN
Building Converged Cisco Multilayer Switched Networks
Implement VLANs.
• Explain the functions of VLANs in a hierarchical network.
• Configure VLANs (e.g., Native, Default, Static and Access).
• Explain and configure VLAN trunking (i.e., IEEE 802.1Q and ISL).
• Explain and configure VTP.
• Verify or troubleshoot VLAN configurations.
Conduct the operation of Spanning Tree protocols in a hierarchical network.
• Explain the functions and operations of the Spanning Tree protocols (i.e., RSTP, PVRST, MISTP).
• Configure RSTP (PVRST) and MISTP.
• Describe and configure STP security mechanisms (i.e., BPDU Guard, BPDU Filtering, Root Guard).
• Configure and Verify UDLD and Loop Guard.
• Verify or troubleshoot Spanning Tree protocol operations.
• Configure and verify link aggregation using PAgP or LACP.
Implement Inter-VLAN routing.
• Explain and configure Inter-VLAN routing (i.e., SVI and routed ports).
• Explain and enable CEF operation.
• Verify or troubleshoot InterVLAN routing configurations.
Implement gateway redundancy technologies.
• Explain the functions and operations of gateway redundancy protocols (i.e., HSRP, VRRP, and GLBP).
• Configure HSRP, VRRP, and GLBP.
• Verify High Availability configurations.
Describe and configure wireless client access.
• Describe the components and operations of WLAN topologies (i.e., AP and Bridge).
• Describe the features of Client Devices, Network Unification, and Mobility Platforms (i.e., CCX, LWAPP).
• Configure a wireless client (i.e., ADU).
Describe and configure security features in a switched network.
• Describe common Layer 2 network attacks
(e.g., MAC Flooding, Rogue Devices, VLAN Hopping, DHCP Spoofing, etc.)
• Explain and configure Port Security,802.1x, VACLs, Private VLANs, DHCP Snooping, and DAI.
• Verify Catalyst switch (IOS-based) security configurations (i.e., Port Security, 802.1x, VACLs, Private VLANs, DHCP
Snooping, and DAI).
Configure support for voice.
• Describe the characteristics of voice in the campus network.
• Describe the functions of Voice VLANs and trust boundaries.
• Configure and verify basic IP Phone support (i.e. Voice VLAN, Trust and CoS options, AutoQoS for voice).
642-825 ISCW
Implementing Secure Converged Wide Area Networks
Implement basic teleworker services.
• Describe Cable (HFC) technologies.
• Describe xDSL technologies.
• Configure ADSL (i.e., PPPoE or PPPoA).
• Verify basic teleworker configurations.
Implement Frame-Mode MPLS.
• Describe the components and operation of Frame-Mode MPLS (e.g., packet-based MPLS VPNs).
• Configure and verify Frame-Mode MPLS.
Implement a site-to-site IPSec VPN
• Describe the components and operations of IPSec VPNs and GRE Tunnels.
• Configure a site-to-site IPSec VPN/GRE Tunnel with SDM (i.e., preshared key).
• Verify IPSec/GRE Tunnel configurations (i.e., IOS CLI configurations).
• Describe, configure, and verify VPN backup interfaces.
• Describe and configure Cisco Easy VPN solutions using SDM.
Describe network security strategies.
• Describe and mitigate common network attacks (i.e., Reconnaissance, Access, and Denial of Service).
• Describe and mitigate Worm, Virus, and Trojan Horse attacks.
• Describe and mitigate application-layer attacks (e.g., management protocols).
Implement Cisco Device Hardening
• Describe, Configure, and verify AutoSecure/One-Step Lockdown implementations (i.e., CLI and SDM).
• Describe, configure, and verify AAA for Cisco Routers.
• Describe and configure threat and attack mitigation using ACLs.
• Describe and configure IOS secure management features (e.g., SSH, SNMP, SYSLOG, NTP, Role-Based CLI, etc.)
Implement Cisco IOS firewall.
• Describe the functions and operations of Cisco IOS Firewall (e.g., Stateful Firewall, CBAC, etc.).
• Configure Cisco IOS Firewall with SDM.
• Verify Cisco IOS Firewall configurations (i.e., IOS CLI configurations, SDM Monitor).
Describe and configure Cisco IOS IPS.
• Describe the functions and operations of IDS and IPS systems (e.g., IDS/IPS signatures, IPS Alarms, etc.)
• Configure Cisco IOS IPS using SDM.
642-845 ONT
Optimizing Converged Cisco Networks
Describe Cisco VoIP implementations.
• Describe the functions and operations of a VoIP network (e.g., packetization, bandwidth considerations, CAC, etc.).
• Describe and identify basic voice components in an enterprise network (e.g. Gatekeepers, Gateways, etc.)
Describe QoS considerations.
• Explain the necessity of QoS in converged networks (e.g., bandwidth, delay, loss, etc.).
• Describe strategies for QoS implementations (e.g. QoS Policy, QoS Models, etc.).
Describe DiffServ QoS implementations.
• Describe classification and marking (e.g., CoS, ToS, IP Precedence, DSCP, etc.).
• Describe and configure NBAR for classification.
• Explain congestion management and avoidance mechanisms (e.g., FIFO, PQ, WRR, WRED, etc.).
• Describe traffic policing and traffic shaping (i.e., traffic conditioners).
• Describe Control Plane Policing.
• Describe WAN link efficiency mechanisms (e.g., Payload/Header Compression, MLP with interleaving, etc.).
• Describe and configure QoS Pre-Classify.
Implement AutoQoS.
• Explain the functions and operations of AutoQoS.
• Describe the SDM QoS Wizard.
• Configure, verify, and torubleshoot AutoQoS implementations (i.e., MQC).
Implement WLAN security and management.
• Describe and Configure wireless security on Cisco Clients and APs (e.g., SSID, WEP, LEAP, etc.).
• Describe basic wireless management (e.g., WLSE and WCS). Configure and verify basic WCS configuration
(i.e., login, add/review controller/AP status, security, and import/review maps).
• Describe and configure WLAN QoS.
| Cisco Certification | 50 Hours | | MCSE (must have knowledge of Hardware & Networking)
Microsoft Certified Systems Engineer (MCSE) candidates on the Microsoft Windows Server 2003 track are required to satisfy the following requirements :
Core Exams (6 Exams Required)
Four networking system exams
One client operating system exam
One design exam
Elective Exams (1 Exam Required)
Together with the core exams, the elective exams provide a valid and reliable measure of technical proficiency and expertise in solution design and implementation. MCSE candidates should also have at least one year of experience implementing and administering network operating systems and desktop operating systems.
CORE EXAMS : NETWORKING SYSTEM
Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003
Exam 70-291 : Implementing, Managing and Maintaining a Microsoft Windows Server 2003 Network Infrastructure.
Exam 70-293 : Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure.
Exam 70-294 : Planning, Implementing and Maintaining a Microsoft Windows Server 2003 Active Directory
Infrastructure.
CORE EXAMS : CLIENT OPERATING SYSTEM
Exam 70-270 : Installing, Configuring and Administering Microsoft Windows XP Professional.
CORE EXAMS : DESIGN
Exam 70-297 : Designing a Microsoft Windows Server 2003 Active Directory Network Infrastructure.
ELECTIVE EXAM
Exam 70-284 : Implementing and Managing Microsoft Exchange Server 2003.
Microsoft Windows 2000 Professional
General
Introduction to Windows 2000 Professional
Version Differences / New Features
Customizing Windows 200 Professional
Installation
Installation Prerequisites/HCL
Installation Methods
Attended
Unattended
Over the Network
Upgrading previous versions
Application Installation
Hardware Installation
Device Drivers
Multiple Boot Configurations
Management
Setting up & Managing User
Setting up & Managing Group Accounts
MMC
Services
Service Packs
Managing Data Storage
Disk Management
File Systems
DFS, EFS, and Compression
FAT and FAT32
NTFS
Offline Folders
System Maintenance and Optimization
De fragmentation
Performance
Scheduled Tasks
Security
Authentication
File and Share Security
Securing Resources
NTFS Permissions
Administering Shared Folders and Resources
Auditing Resources and Events
Disk Quota
Printers
Installing printer locally
Accessing a Remote printer
Implementing Security to printers
Networking
File and Printer Sharing
Understanding DNS
Understanding TCP/IP
Internet Connection Sharing & Firewall Configuration
Troubleshooting
Emergency Repair Disk
Backup & Restore
Domain Logon and Authentication
Hardware and Driver Issues
Recovery Console
Microsoft Xp Professional
General
Introduction to Windows XP Professional
Version Differences/New Features
Windows Installer
Customizing Windows XP Professional
Installation
Installation Prerequisites/HCL
Installation Methods
Attended
Unattended
Over the Network
Upgrading previous versions
Remote Installation Services
Application Installation
Hardware Installation
Device Drivers
Multiple Boot Configurations
Management
Setting up & Managing User
Setting up & Managing Group Accounts
MMC
Services
Service Packs
Managing Data Storage
Disk Management
File Systems
DFS
EFS
Compression FAT and FAT32
NTFS
Offline Folders
System Maintenance and Optimization
De fragmentation
Performance
Scheduled Tasks
Windows Update Manager
Security
Authentication
File and Share Security
Securing Resources
NTFS Permissions
Administering Shared Folders and Resources
Auditing Resources and Events
Disk Quota
Firewall
Printers
Installing printer locally
Accessing a Remote printer
Implementing Security to printers
Networking
File and Printer Sharing
Mobile Computing
Understanding DNS
Understanding TCP/IP
Remote Desktop Connection
Terminal Service Web Connection
Internet Connection Sharing and Firewall Configuration
Troubleshooting
Advanced Recovery Options
Backup & Restore
Domain Logon and Authentication
Hardware and Driver Issues
Using Files and Setting Transfer wizard
Managing & Maintaining a Microsoft Windows 2003 Server Environment
General
Introduction to Windows 2003 Server
Version Differences/New Features
Windows Installer
Customizing Windows 2003 Server
Installation
Basic Attended
Unattended Installation
Remote Installations Service
Upgrading from Windows 2000
Active Directory & DNS
Configuring Directory Services
Directory Services Terminology
Domain Administration
Domain Planning
Domains and Forest Structures
Server Administration
User Accounts
Group Accounts
Computer Accounts
Profiles
Disks and File Systems
Administering File Systems, Shares, Advanced Disk Management, Distributed and Remote File Systems, File Systems, Replication, and Fault Tolerance, Shadows Copies, Disk Quota
Printers
Installing & Configuring Local Printer
Installing & Configuring Remote Printer, Using IPP
Security
Configuring Security
Group Policies
Security Templates
Security and Kerberos
Auditing System Resources
Server Configuration
Network Configuration
Remote Desktop Administration
IIS 6.0
Terminal Servers
Terminal Service Web Connection
Internet Connection Sharing
RAID
Performance Monitoring
Performance Tuning
Maintenance
Disaster Recovery
Backup & Restore
Using ASR
Server Optimization
Software and Updates
Storage
Troubleshooting
Boot up failure
Client and Connectivity Problems
Network Problems
Permissions
Print Services Problem
Implementing, Managing and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
General
Understanding windows 2003 Networks
OSI Reference Model
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data-Link Layer
Physical Layer
TCP/IP Model
TCP / IP
IP Addressing
Sub netting
Super netting
CIDR
Routing
ICS
NAT
DHCP
Understanding DHCP
DHCP Server
DHCP Clients
DHCP Relay Agents
DNS
Introduction to DNS
DNS Servers
DNS Clients
DNS Records (A, CNAME, PTR, MX, AAAA, etc.,)
Zones, Delegation Zones, Stub Zones
Primary
Secondary
Caching Only
Forwarders
Dynamic DNS
WINS
WINS Overview
WINS Components
WINS Database
Designing a WINS Infrastructure
Advanced Routing Concepts
Static Routing
Dynamic Routing
RIS
OSPF
Remote Access Service
RAS Server
RAS Clients
RADIUS
Virtual Private Network
PPTP
L2TP
Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
Planning a Network
Network Topology
BUS, STAR, RING, MESH, CELLULAR, HYBRID
Network Cables
Co-axial, Twisted Pair, Fiber Optic
Network Devices
Repeaters, Hubs, Switches, Bridges, Routers,
Brouters, Modems, etc.,
Transmission Media Connectors
T-BNC, RJ –11, RJ-45, etc.,
Cabling Standards
Jack Panel, I/O ports, Structured Cabling Guidelines.
Locating Network Resources
Determining Location Criteria
Locating Workstation, Peripherals, Cables,
Connectivity Devices, Servers
Planning a TCP/IP Network Infrastructure
Determining IP Addressing Requirements
Using Public and Private Addresses
Using Routers & Switches
Planning for internet connectivity
Planning, Designing and Implementing the
Given Scenarios
Planning for Security Infrastructure
Security Basics
Security Updates
Security Policies
Securing a Wireless Network
Designing a Security Infrastructure
Cryptography
Port Blocking
Packet Filtering
Network Monitoring
Installing, Configuring and Maintaining
Multiple Web Site (IP Based and Hostname Based)
Multiple FTP Site
Administration Web Site
Telnet Server
Creating and Managing Digital Certificates
Enterprise
Stand alone
Web Server Certificate
Web Browser Certificate
E-mail Certificate
Maintaining Server Availability
Network Load Balancing
Clustering
Planning a Secure Baseline Installation
Deploying Security Configurations
Securing Network Communications using IP Sec
Planning, Implementing & Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure
General
Introduction to ADS
Active Directory Objects & Components
The Global Catalog
Object Naming
DNS
Active Directory Concepts
Forests
Domain Trees
Domain Controllers
Additional Domain Controllers
Child Domain Controllers
Sites
Replication
Trust Relation Ship
Installing & Configuring Active Directory
Creating Multiple Domains, Trees and Forests
Configuring Sites and Managing Replication
Configuring Intersite Replication
Renaming and Restructuring Domains
Renaming Domain Controllers
Managing Operation Master Roles
Managing Trust Relationship
Disaster Recovery
Backing up ADS
Restoring ADS
Using ASR
Administering Active Directory
User Accounts
User Profiles and Home Folder
Group Accounts
OU Structure
Command Line Administration
Group Policy
Understanding Group Policy
Group Policy Settings
Administrative Templates
Resultant Set of Policy (RSOP)
Creating, Filtering, Linking, Modifying & Removing GPO
Deploying Software Using GPO
Setting up a SDP
Administering Security
Locating & Controlling Access to Active Directory Objects
Delegating Administrative Control
Using Security Templates
Using Security Configuration and Analysis
Implementing Audit Policy, Software Restriction Policies
Managing Active Directory Performance
Service Logs & System Monitor
Performance Logs & Alters
Optimizing and Troubleshooting ADS
Using windows 2003 Support Tools
Designing a Microsoft Windows Server 2003 Active Directory Network Infrastructure.
Introduction to Active Directory & Network Infrastructure
Active Directory Overview
DNS Overview
TCP/IP Overview
Remote Access Overview
Analyzing and Existing Infrastructure
Analyzing the Company
Analyzing the Existing Network Topology
Analyzing the Existing Directory Structure
Planning an Active Directory Structure
Designing a Forest & Domain Model
Defining a Naming Strategy
Designing an Administrative
Security Structure
Designing an OU Structure
Planning an Account Strategy
Designing a GPO Implementation
Designing a Site Plan
Designing a Site Topology
Planning a Domain Controllers
Planning a Replication Strategy
Designing a Migration Path
Designing a DNS Structure
Analyzing the Existing DNS Implementation
Designing a DNS Name Resolution Strategy
Designing a DNS Implementation
Designing a DNS Service Placement Strategy
Designing a WINS Structure
Understanding WINS
Designing a WINS Infrastructure
Designing a WINS Replication Strategy
Designing a Network and
Routing Infrastructure
Creating an IP Addressing Scheme
Designing a Perimeter Network
Creating a DHCP Strategy
Designing Internet Connectivity
Identifying Redundancy Requirements
Identifying Bandwidth Requirements
Designing NAT
Designing a Remote Access Strategy
Designing Remote Access Strategy
Designing the Remote Access Infrastructure
Designing Security for Remote Access Users
Microsoft Exchange 2003 Server Implementation and Administration
General
Understanding Messaging System
Introduction to Microsoft Exchange 2003 Server
Integration with Microsoft Windows 2003 Server
Microsoft Exchange 2003 Server Architecture
Co-existence with previous versions of Exchange Servers
Backward Compatibility and Interoperability
Planning and Installing Exchange 2003 Server
Prerequisite for installing Exchange 2003 Server
Preparing Windows 2003 Server for
Exchange 2003 Installation
Testing Exchange 2003 Installation
Installing and Upgrading
Microsoft Exchange 2000 Server to
Microsoft Exchange 2003 Server
Microsoft Exchange 2003 Server Client Configuration
Microsoft Outlook Express
Microsoft Outlook
Microsoft Outlook Web Access
Creating and Managing
Microsoft Exchange 2003 Server Configuration
Recipients
Address List
SMTP Transport
Message Routing
POP3
IMAP
HTTP
NNTP
Routing & Administrative Groups
Implementing Advanced Security
Mail Box
Digital Certificates
Public Folder Management & Replication
Disaster Recovery
Microsoft Exchange 2003 Client Side Backup & Restores
Microsoft Exchange 2003 Server Side Backup & Restores
Microsoft Exchange 2003 Server in Clustered Environment
Microsoft Exchange 2003 Server Front End & Back End Configuration
Microsoft Exchange 2003 Server Maintenance & Troubleshooting
| Microsoft Certification | | | Microsoft ISA (Internet Security and Acceleration) 2004 Microsoft ISA (Internet Security and Acceleration) 2004
Microsoft ISA Server 2004 Overview
Introducing ISA Server 2004
Deployment Scenarios for ISA Server 2004
Installing and Maintaining ISA Server 2004
Installing ISA Server 2004
Choosing ISA Server Clients
Installing and Configuring Firewall Clients
Advanced Firewall Client Configuration
Securing ISA Server 2004
Maintaining ISA Server 2004
Enabling Access to Internet Resources
ISA Server 2004 as a Proxy Server
Configuring Multi-Networking on ISA Server
Configuring Access Rule Elements
Configuring Access Rules for Internet Access
Configuring ISA Server 2004 as a Firewall
Using ISA Server as a Firewall
Examining Perimeter Networks and Templates
Configuring System Policies
Configuring Intrusion Detection and IP Preferences
Configuring Access to Internal Resources
Introduction to Publishing
Configuring Web Publishing
Configuring Secure Web Publishing
Configuring Server Publishing
Configuring ISA Server Authentication
Integrating ISA Server 2004 & Microsoft Exchange Server
Issues in E-Mail Security
Configuring ISA Server to Secure SMTP Traffic &
Secure Web Client Connections
Configuring ISA Server to Secure Client Connections
Advanced Application and Web Filtering
Advanced Application and Web Filtering Overview
Configuring HTTP Web Filters
Configuring Additional Application and Web Filters
Configuring VPN Access for Remote Clients and Networks
Virtual Private Networking Overview
Configuring Virtual Private Networking for Remote Clients
Configuring Virtual Private Networking for Remote Sites
Configuring VPN Quarantine Control Using ISA Server 2004
Implementing Caching to Improve Browsing Performance
Caching Overview
Configuring General Cache Properties
Configuring Cache Rules
Configuring Content Download Jobs
Monitoring ISA Server 2004
Monitoring Overview
Configuring Alerts
Configuring Session Monitoring
Configuring Logging
Configuring Reports
Monitoring Connectivity
Monitoring Services and Performance
Implementing ISA Server 2004 Enterprise Edition
Overview of ISA Server 2004 Enterprise Edition
Planning an ISA Server 2004 Enterprise Edition Deployment
Implementing ISA Server 2004 Enterprise Edition
Implementing ISA Server 2004 Enterprise Edition: Firewall
Scenario
Implementing a Back-to-Back Firewall Scenario
Implementing the Site-to-Site VPN Scenario
| Microsoft Certification | | | MS SQL SERVER Microsoft SQL Server
SQL Server Product Overview
Introduction to SQL Server Architecture
SQL Server Programming Environment
Lab A: Working with SQL Server Tools
Using SQL Server Enterprise Manager and SQL Query Analyzer
Creating Columns That Have the Identity Data Type, Uniqueidentifier Data Type,Working with Metadata
Retrieving XML Result Sets
SQL Server Components
Relational Engine, Analyzing Query Plans
Memory and Processes
Client Connectivity, Creating Databases
Writing Scripts for Creating a Database
Creating a Database with Multiple Files and Filegroups
Configuring, Troubleshooting, and Tuning
Configuring Server/Client Network Libraries
Using Extended Stored Procedures
Troubleshooting Queries by Using SHOWPLAN
Optimizing Queries by Using the Index Tuning Wizard
SQL Server Storage Subsystems
SQL Server Storage Structures
SQL Server Index Architecture
Managing Indexes, Working With Statistics
Examining Disk Storage Structures
Examining Indexes by Using DBCC Page
Examining Heaps by Using DBCC Page
SQL Server Administration
Administering SQL Server by Scripting & Using SQL Server Enterprise Manager
Automating Administration by Using SQL Server Agent &
Jobs, Creating and Using Alerts, Using Multiserver Jobs,
osql Scripting, Creating a Script to Perform Administrative
Actions, Executing an Administrative Script with the osql
Utility
Converting the Script to a Stored Procedure
Using SQL Server Agent
Creating and Scheduling Jobs with SQL Server Agent
Creating Alerts and Multiserver jobs
Backup and Restore
SQL Server Recovery Models
SQL Server Backups
Restoring Backups
Backup and Restore
Creating Routine Database Backups
Restoring a Database Using Full, Differential, and Log Backups
If Time Permits: Restoring to a Point in Time
SQL Server Security
SQL Server Security Architecture
Securing SQL Server
Common Security Issues
Applying Security Measures to SQL Server & Database Objects, Assigning Statement Permissions, Assigning Object Permissions
Securing an Installation of SQL Server
Monitoring SQL Server
Monitoring System and Server Activity
Managing Locks, Additional Performance Considerations
Monitoring and Troubleshooting SQL Server Performance
Using Performance Monitor, Using SQL Profiler
Troubleshooting Deadlocks,
Contrasting Cursors and Table Variables
Transferring and Analyzing Data
Distributed Queries, Data Extraction, Transformation, and Loading Tools, Analysis Services, Working with External and Remote Data,
Transferring Database Contents to a Database with a Different Collation, Transforming Data During Extraction and Load, Querying Distributed Data, Transferring Bulk Data In & Out of SQL Server
| Microsoft Certification | | | SUN SOLARIS SUN SOLARIS
System Administration Level – 1 (SAI)
Managing File Systems
Introducing the Solaris OE Directory Hierarchy
Managing Local Disk Devices
Managing the Solaris OE File System
Performing Mounts and Unmounts
Installing Software
Installing the Solaris 9 OE
Performing Solaris 9 OE Package Administration
Managing Software Patches on the Solaris 9 OE
Performing System Boot Procedures
Executing Boot PROM commands
Performing Boot and Shutdown Procedures
Performing User and Security Administration
Performing User Administration
Performing System Security
Managing Network Printers and System
Processes
Configuring Printer Services
Using Print Commands
Controlling System Processes
Performing System Backups and Restores
Performing File System Backups
Performing File System Restores
Backing Up a Mounted File system
with a UFS Snapshot
System Administration Level – 2 (SAII)
Describing Network Basics
Describing Interface Configuration
Describing the Client-Server Model
Customizing the Solaris Management Console
Managing Virtual File Systems and Core Dumps
Managing Swap Configuration
Managing Crash Dumps and Core Files
Configuring NFS
Configuring AutoFS
Managing Storage Volumes
Describing RAID and Solaris Volume Manager Software
Configuring Solaris Volume Manager Software
Controlling Access and Configuring System Messaging
Configuring Access Control Lists (ACL)
Configuring Role Based Access Control (RBAC)
Performing Smart Card Authentication
Configuring System Messaging
Setting up Name Services
Using Name Services
Configuring Name Service Clients
Configuring the Network Information Services (NIS)
Performing Advanced Installation Procedures
Configuring the Custom Jump Start Procedure
Performing a Flash Installation
| Sun Solaris certification | 60 Hours | | CWNA (Certified Wireless Network Associate) CWNA (Certified Wireless Network Associate)
Radio Frequency (RF) Fundamentals
RF behavior and properties
Principles of antennas
RF math calculations
Link budgets and system operating margins
Spread Spectrum Technologies
Uses of Spread Spectrum
Frequency Hopping (FHSS)
Direct Sequencing (DSSS)
Orthogonal Frequency Division Multiplexing (OFDM)
Packet Binary Convolutional Coding (PBCC)
Comparing DSSS, FHSS, PBCC, and OFDM
Co-location and throughput analysis
Chipping code, processing gain, & spreading functions, Channels, data rates, ranges, and comparisons
Channel reuse in pure and mixed environments
Hardware Installation, Configuration, and Management
Access points, Wireless bridges
Wireless workgroup bridges
Client devices and accessories
Residential & Enterprise gateways
Wireless LAN switches
PoE Switches and patch panels
VoWiFi systems, Wireless Routers
Troubleshooting Wireless LANs
Multipath, Hidden node, Near/Far
Identifying and resolving interference problems,
Maximizing system throughput
Maximizing co-location throughput
Range considerations
Antennas and Accessories
Omni-directional, Semi-directional
Highly-directional
Determining coverage areas
Proper mounting and safety
Performing outdoor/indoor installations
Power over Ethernet (802.3af and proprietary implementations)
Cables & connector usage requirements
Amplifiers, attenuators, lightning arrestors, and splitters, Fresnel Zones and Free Space Path Loss, Interference, Fading, & Multipath.
Wireless Network Management
AAA functions
Bandwidth control
Wireless Network Management features and products
Physical and MAC Layers
Differences between wireless and Ethernet frames
Collision handling & the use of RTS/CTS
Throughput and dynamic rate selection
Analysis of DCF mode and the CSMA/CA protocol, How frame fragmentation works & its affects on throughput
Wireless LAN Security
Analysis of 802.11 security including WEP, WPA, 802.1x/EAP types, & 802.11i
Security solutions at Layer2, 3, & 7
Types of network attacks, & protecting the network from attacks
Corporate security policies including baseline practices, & common security solutions, Security recommendations
Organizations and Standards
FCC rules
Frequency ranges and channels
IEEE 802.11 family of standards
Wireless LAN organizations
Proper application of WLANs in distribution and access roles
Interoperability standards
802.11 Network Architecture
Joining a wireless LAN
Authentication & association
Basic & Extended Service Sets
Independent Basic Service Sets
Distribution systems
Roaming in a wireless LAN
Scanning modes using Beacons & Probe Frames, Power management features
Site Surveying
Understanding the need for a site survey
Defining business requirements & justification, Facility analysis
Interviewing network management & users, Identifying bandwidth requirements, Determining contours of RF coverage, Documenting
installation problems, Locating interference, Reporting methodology & procedures
Understanding specifics of each vertical market, Understanding the customer's network topology, Creating appropriate documentation during & after the site survey, Understanding FCC/FAA rules regarding towers, Understanding safety hazards, Using appropriate hardware & software to perform the survey
| Other | 60 Hours | | LPI Certified Linux Administrator
Linux has all of the features of a modern, fully fledged operating system: true multitasking, threads, virtual memory, shared libraries, demand loading, shared, copy-on-write executables, proper memory management, loadable device driver modules, video frame buffering, and TCP/IP networking. The Linux certification is for any individual interested in demonstrating fundamental Linux knowledge and skills.
Duration : 1 Month
Objectives :
Gain experience with basic Linux administration tasks.
Understand the Linux phenomenon.
Explore command line and GUI utilities.
Learn system processes.
Configure printing and networking.
Audience :
Those who are taking first steps into using LINUX and want to learn how to administer their LINUX system.
SuSE Linux
SCLP – Level 1
Basics of System Administration
Linux Fundamentals
Using Help
File System Basics
Tools for working with Linux
Process
Installing Software
Advanced System Administration Level –1
Printing
User Administration
Run level Concept
Boot manager
System Monitoring
Data Backups
Integrating Hardware
Rescue System
Shell programming with BASH Shell
Introduction
Bash Basics
Basic Script Elements 1 (input, output)
Basic Script Elements 2 (Control Structures)
Advanced Scripting Techniques
Useful commands for shell scripts
Debugging shell scripts
SCLP – Level 2
Basics of Network Administration
Basics of Networking
Overview of TCP/IP
About Interfaces and Routers
Starting Services
Diagnosis Tools
Infrastructure services in the Network level –1
Domain Name System
NFS – Network File System
NIS – Network Information Service
Secure Shell (SSH)
DHCP
Setting up a Print Server
Time Server
Samba Server
Internet Connection
Network Connection with a Modem
Network Connection with ISDN
Configuring Dial-in Servers
Using SuSE Linux Enterprise Server as Mail Server
Electronic Mail
Postfix
Sendmail
News with INN
Mail Lists in Linux: Majordomo
| Other | 100 Hours | | CEH (Certified Ethical Working) CEH V4 COURSE CONTENTS
INTRODUCTION TO ETHICAL HACKING
FOOT PRINTING
SCANNING
ENUMERATION
SYSTEM HACKING
TROJANS AND BACKDOORS
SNIFFERS
DENIAL OF SERVICE
SOCIAL ENGINEERING
SESSION HIJACKING
HACKING WEB SERVERS
WEB APPLICATION VULNERABILITIES
WEB BASED PASSWORD CRACKING TECHNIQUES
SQL INJECTION
HACKING WIRELESS NETWORKS
VIRUS
PHYSICAL SECURITY
LINUX HACKING
EVADING FIREWALLS, IDS AND HONEYPOTS
BUFFER OVERFLOWS
CRYPTOGRAPHY
PENETRATION TESTING
| Other | 150 Hours | | EC Council (Certified Ethical Hacker ) EC Council (Certified Ethical Hacker )
Course Description
This course will upgrade the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. At the end of the course the student will have hands on understanding and experience in Ethical Hacking.
This course prepares you for EC-Council Certified Ethical Hacker exam 312-50
Who Should Attend
This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
| Other | | |
Add Course to this training Center | Add Branch to this training Center |