Network Labs - Hardware Training Institute, Bangalore

Posted By: Nitin    Member Level: Gold Post Date: 25 Nov 2008   
Name: Network Labs - Hardware Training Institute
Address: Corporate Office & Training Center:
'Laxmi Mansion' #81/B, 22nd Cross,
8th Main Jayanagar 3rd Block,
(opp. to Food World)
City: Bangalore
State: Karnataka
Telephone Number: 91-80-22443350 / 51
Email: contact@networklabs.in
Official website: http://www.networklabs.in/




Network Labs is one of the leading Training center in the Bangalore. It offers training in all hardware and software Core level training.

It even recruits the trainee in its sister company based on his performance. Network Labs has many center in around Bangalore. It is multi level training center which is not only in Bangalore or in the state.

At Network Labs, next level thinking is not just a slogan.

Network labs offer training in different parts of hardware and software to each and every individual depending on the individual requirements.

1) Junior Level
2) Middle Level
3) Senior Level
4) Expert Level.

Each level has it on format of training.

Training Courses in Network Labs - Hardware Training Institute

Course NameCategoryDurationFees
Hardware Tech Support
Who may take the Course? Hardware Tech Support is a course Open to anyone from Diploma or any graduation background, should be well conversant in English. A certificate in Hardware Tech Support signifies that the Certified Individual posses the Knowledge and skills essential for a successful entry level Computer Hardware technician with the necessary skills of office automation tools like Word, Excel, PowerPoint & Internet Duration : 1.5 months with 2hrs/day & 6 days/Week Objectives : By the end of the course, students will be able to : Have an In depth Knowledge of Computer Hardware, Assembling & Troubleshooting Computers and Install Application Software, Configure the Computers for Multimedia Applications & Install Peripherals. Job opportunities : The qualified person can find job opportunities as a Hardware Technician & in Hardware Tech Support Jobs.
General1.5 months
Desktop Tech Support
Hardware Tech Support + Desktop OS & Anti-Virus Durantion:25Days (50Hrs) DOS 6.2 DOS Fundamentals Booting DOS Starting and Restarting a PC Using DOS Commands Batch Files, Controlling DOS DOS Editor, Files and Directories Comparing Files and Disks Formatting Floppy Disks Protecting Data on Disks Setting Up a Hard Disk System Configuration Files Configuration Commands Memory Management System Diagnosis Win95/98/ME Basics Win98 Architecture Basic Features, Boot Sequence Installation Process Multimedia Configuration System Administration Configuring Win98 Printers, Networking, Utilities, Using Outlook Express Anti-virus Software Introduction to Computer Viruses, Worms, Trojan Horses. Macros etc. Installing & Configuring Anti-virus Software (Server & Client) Updating Anti-virus Virus Removal & Prevention Windows 2000 /XP Professional General Introduction Version Differences New Features Customizing Windows 2000 Professional Installation Installation Prerequisites/HCL Installation Methods Management Setting up & Managing User Setting up & Managing Group Accounts, MMC, Services Service Packs, ICS Managing Data Storage Disk Management File Systems DFS, EFS, and Compression FAT and FAT32, NTFS Printers Installing printer locally Accessing a Remote printer Implementing Security System Maintenance and Optimization Auditing Resources & Events, De fragmentation, Performance, Scheduled Tasks, Disk Quotas, ERD, Backup & Restore, Troubleshooting Using Outlook Express Linux Desktop Essentials General Introduction Features Installation Linux Workstation class installation and configuration Installing new applications on Linux Using of a dual booting system Linux Commands Basic command on the shell Popular text editors on the shell Working with Graphics The X windows system Configure and customize your Linux Desktop Use and configure the GNOME graphical user interface Using GNOME application GUI utilities Linux Tools Using Open office suite Working with graphic image editor Creating files with cross-platform compatibility such as PDF Open, read, edit, save and send files created under other operating system Using Basic Services Configuring printers Configuring an internet connection Configuring email accounts for corporate & personal use.
General25 Days
Network Tech Support
Desktop OS & Anti Virus + Networking Essentials General Introduction to Networking Basic elements of Networking Networking and its uses Types of Networks LAN MAN WAN (Enterprise & Global) Peer-to-peer Client-Server Network Topology BUS STAR RING MESH CELLULAR HYBRID Transmission Media Cable Co-axial, Twisted Pair & Fiber Optic cables Wireless Radio, Infrared & Micro waves Network Devices Repeaters Hubs Switches Bridges MUX MAU Routers Brouters Modems Transmission Media Connectors T-BNC, RJ –11, RJ-45, etc., Cabling Standards Jack Panel I/O ports Structured Cabling Guidelines. OSI Model Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data-Link Layer Physical Layer Protocol Stacks IPX/SPX Model IPV4 IPV6 Apple Talk IP Addressing Address Classes Binary <- -> Decimal Representation Classful Masks Private Address Space Subnet Masks Routing & Switching Circuit Switching Packet Switching Routing Table Link State RIP, OSPF Network Services & Protocols File, Print, Database, Messaging, Application & Specialized Services. DNS, DHCP, HTTP, FTP, Telnet, SMTP, NNTP, POP3, IMAP4, HTTPS, SSL, BOOTP, L2TP, PPTP, IPSec, Kerberos, SNMP, etc., WAN Technology Serial Connectivity, X.25, FDDI, ISDN, ATM, Frame Relay, CSU/DSU, etc., VPN, Proxy Servers, Firewalls RAID, Network Attached Storage, Storage Area Networks, Network Administration NOS Backup Client Server Clustering Documentation Security Scenarios Network Cards Cable Crimping Configuration Installation Troubleshooting Analyzers, Hardware-Related Problems, Logging Events Monitoring Trends and Performance Network Software User-Related Problems
General80 Hours
System Administrator
Desktop Tech Support + Network Tech Support + Network Operating System Windows 2000 Server Introduction to Windows 2000 Server Installation & Boot Process Windows 2000 Administration Tools Creating Users & Groups User Profiles, System Policies DNS, WINS, Disk Administrator Creation of Groups Permissions Shared Folder and NTFS Permissions Print Permissions, Backup and Restore Windows 2003 Server Introduction to Windows 2003 Server Installation of Windows 2003 Server Adding and Removing Drivers and Software File systems – FAT32 and NTFS Creating User & Group Accounts Configuring Disk Quotas Controlling Access to Files and Resources Sharing Resources on the Network Configuring Printers & Modems Installing & Configuring DNS, DHCP, ADS Installing & Configuring Terminal Services Using Backup & Restore Utility SCO UNIX 5.0.5 Introduction to UNIX Basic Architecture of UNIX Installation of UNIX File system, Basic Commands Administering UNIX Creating Users & Groups File and Directory Permissions Processes and Process Administration Automating Tasks, Backup & Restore Installing and Configuring Printers, Mouse, NIC Working with X window System RED HAT LINUX 9.0 Introduction to LINUX Basic Architecture of LINUX File system Installation of LINUX Basic Commands Starting & Stopping Services in LINUX Administering LINUX Creating Users & Groups File and Directory Permissions Processes and Process Administration Automating Tasks Backup & Restore Installing & Configuring Printers Installing & Configuring Mouse Installing & Configuring Network Cards Working with KDE and GNOME Using Open Office software Installing additional packages on LINUX SuSE LINUX 9.0 Introduction to SuSE LINUX Basic Architecture Installation of SuSE Linux Enterprise Edition File system, Basic Commands Starting & Stopping Services Administration Commands and Utilities Creating Users & Groups File and Directory Permissions Processes and Process Administration Automating Tasks, Backup & Restore Installing & Configuring Printers Installing & Configuring Mouse Installing & Configuring Network Cards Working with GUI Installing additional packages
General234 Hours
Hardware Engineer
Hardware Basic Introduction to Computers – 4 hrs History of Computers Types of Computers Components, Features and System Design Identifying the different parts of computer Microprocessor Types and Specification – 2 hrs Processor Specification Intel-Compatible Processors Processor Types Motherboard and Buses – 4 hrs Mother Board Components Intel and Non-Intel Chipsets BIOS, CMOS, Type of I/O Buses, DMA Channels, IRQs, I/O Port Address Memory – 2 hrs Memory Basics Types of Memory Memory Speed Cache Memory System Logical Memory Layout Power Supply and case – 4hrs Power Supply Function and Operation Switch Mode Power Supplies SMPS Connectors SMPS Voltages Voltage Stabilizers UPS as Backups Types of UPS UPS Specification Input - Output Interfaces – 4 hrs Serial, Parallel, USB, FireWire, ST-506, IDE, SCSI, SATA Magnetic Storage – 2 hrs Principles of Magnetic Storage Formatting Capacity Measurements Floppy drive – 2 hrs Floppy Drive Basics Types of Floppy Disk Drive Drive Components File Allocation Drive Installation Hard disk drive – 4 hrs Hard Disk Basics File Allocation Formatting – low and high Using Disk Manager Tape Drives – 2 hrs Tape Backup Standards The QIC Standards Tape Drive Installation Tape Drive Backup Software Optical Storage – 4 hrs CD R / RW CD – ROM Driver Basics Drive Specification Loading Mechanism Drive Formats CD – Writers Basics Drive Installation & Usage DVD (Digital Versatile Disks) DVD – ROM Basics DVD Specification DVD Standards DVD – Writers Basics Drive installation & Usage Input Devices Keyboard – 2Hrs Basics functions Types of Keyboard Compatibility Keyboard Technology Mice – 2Hrs Basics functions of Mouse Types of Mouse Mouse Interface Printers – 4Hrs Printer Technology Laser, Inkjet, Dot Matrix Color Printing Printer Drivers Display – 6 Hrs Monitor Basics Monochrome vs Color Digital, Analog, TFT, LCD Display Adapters VESA SVGA Standards Video Adapter Components 3D Graphics Accelerators Audio – 2Hrs Audio Adapter Features Audio Adapters Concepts and Terms Audio Adapter Applications Audio Adapter Installation Network Interface Cards – 2Hrs Need for NIC Type of NIC NIC Types NIC Connectors Modems – 2 Hrs Need for Modem Types of Modem Internet connection Miscellaneous Devices – 4 Hrs Scanner, TV Tuner Cards WEB Camera, Laptops Notebooks, Dumb Terminals Assembling and Disassembling – 4 Hrs Preventive Maintenance –2Hrs Diagnostic Software PC Maintenance Tools Maintenance Procedure Upgrading your PC Troubleshooting – 6 Hrs Boot Problems Motherboard, Devices Modem Problems NIC & Network Problems Sound Card Problems Video Problems, etc., Desktop OS & Anti-Virus Durantion DOS 6.2 DOS Fundamentals Booting DOS Starting and Restarting a PC Using DOS Commands Batch Files, Controlling DOS DOS Editor, Files and Directories Comparing Files and Disks Formatting Floppy Disks Protecting Data on Disks Setting Up a Hard Disk System Configuration Files Configuration Commands Memory Management System Diagnosis Win95/98/ME Basics Win98 Architecture Basic Features, Boot Sequence Installation Process Multimedia Configuration System Administration Configuring Win98 Printers, Networking, Utilities, Using Outlook Express Anti-virus Software Introduction to Computer Viruses, Worms, Trojan Horses. Macros etc. Installing & Configuring Anti-virus Software (Server & Client) Updating Anti-virus Virus Removal & Prevention Windows 2000 /XP Professional General Introduction Version Differences New Features Customizing Windows 2000 Professional Installation Installation Prerequisites/HCL Installation Methods Management Setting up & Managing User Setting up & Managing Group Accounts, MMC, Services Service Packs, ICS Managing Data Storage Disk Management File Systems DFS, EFS, and Compression FAT and FAT32, NTFS Printers Installing printer locally Accessing a Remote printer Implementing Security System Maintenance and Optimization Auditing Resources & Events, De fragmentation, Performance, Scheduled Tasks, Disk Quotas, ERD, Backup & Restore, Troubleshooting Using Outlook Express Linux Desktop Essentials General Introduction Features Installation Linux Workstation class installation and configuration Installing new applications on Linux Using of a dual booting system Linux Commands Basic command on the shell Popular text editors on the shell Working with Graphics The X windows system Configure and customize your Linux Desktop Use and configure the GNOME graphical user interface Using GNOME application GUI utilities Linux Tools Using Open office suite Working with graphic image editor Creating files with cross-platform compatibility such as PDF Open, read, edit, save and send files created under other operating system Using Basic Services Configuring printers Configuring an internet connection Configuring email accounts for corporate & personal use. Networking Essentials General Introduction to Networking Basic elements of Networking Networking and its uses Types of Networks LAN MAN WAN (Enterprise & Global) Peer-to-peer Client-Server Network Topology BUS STAR RING MESH CELLULAR HYBRID Transmission Media Cable Co-axial, Twisted Pair & Fiber Optic cables Wireless Radio, Infrared & Micro waves Network Devices Repeaters Hubs Switches Bridges MUX MAU Routers Brouters Modems Transmission Media Connectors T-BNC, RJ –11, RJ-45, etc., Cabling Standards Jack Panel I/O ports Structured Cabling Guidelines. OSI Model Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data-Link Layer Physical Layer Protocol Stacks IPX/SPX Model IPV4 IPV6 Apple Talk IP Addressing Address Classes Binary <- -> Decimal Representation Classful Masks Private Address Space Subnet Masks Routing & Switching Circuit Switching Packet Switching Routing Table Link State RIP, OSPF Network Services & Protocols File, Print, Database, Messaging, Application & Specialized Services. DNS, DHCP, HTTP, FTP, Telnet, SMTP, NNTP, POP3, IMAP4, HTTPS, SSL, BOOTP, L2TP, PPTP, IPSec, Kerberos, SNMP, etc., WAN Technology Serial Connectivity, X.25, FDDI, ISDN, ATM, Frame Relay, CSU/DSU, etc., VPN, Proxy Servers, Firewalls RAID, Network Attached Storage, Storage Area Networks, Network Administration NOS Backup Client Server Clustering Documentation Security Scenarios Network Cards Cable Crimping Configuration Installation Troubleshooting Analyzers, Hardware-Related Problems, Logging Events Monitoring Trends and Performance Network Software User-Related Problems Microsoft Xp Professional General Introduction to Windows XP Professional Version Differences/New Features Windows Installer Customizing Windows XP Professional Installation Installation Prerequisites/HCL Installation Methods Attended Unattended Over the Network Upgrading previous versions Remote Installation Services Application Installation Hardware Installation Device Drivers Multiple Boot Configurations Management Setting up & Managing User Setting up & Managing Group Accounts MMC Services Service Packs Managing Data Storage Disk Management File Systems DFS EFS Compression FAT and FAT32 NTFS Offline Folders System Maintenance and Optimization De fragmentation Performance Scheduled Tasks Windows Update Manager Security Authentication File and Share Security Securing Resources NTFS Permissions Administering Shared Folders and Resources Auditing Resources and Events Disk Quota Firewall Printers Installing printer locally Accessing a Remote printer Implementing Security to printers Networking File and Printer Sharing Mobile Computing Understanding DNS Understanding TCP/IP Remote Desktop Connection Terminal Service Web Connection Internet Connection Sharing and Firewall Configuration Troubleshooting Advanced Recovery Options Backup & Restore Domain Logon and Authentication Hardware and Driver Issues Using Files and Setting Transfer wizard Managing & Maintaining a Microsoft Windows 2003 Server Environment General Introduction to Windows 2003 Server Version Differences/New Features Windows Installer Customizing Windows 2003 Server Installation Basic Attended Unattended Installation Remote Installations Service Upgrading from Windows 2000 Active Directory & DNS Configuring Directory Services Directory Services Terminology Domain Administration Domain Planning Domains and Forest Structures Server Administration User Accounts Group Accounts Computer Accounts Profiles Disks and File Systems Administering File Systems, Shares, Advanced Disk Management, Distributed and Remote File Systems, File Systems, Replication, and Fault Tolerance, Shadows Copies, Disk Quota Printers Installing & Configuring Local Printer Installing & Configuring Remote Printer, Using IPP Security Configuring Security Group Policies Security Templates Security and Kerberos Auditing System Resources Server Configuration Network Configuration Remote Desktop Administration IIS 6.0 Terminal Servers Terminal Service Web Connection Internet Connection Sharing RAID Performance Monitoring Performance Tuning Maintenance Disaster Recovery Backup & Restore Using ASR Server Optimization Software and Updates Storage Troubleshooting Boot up failure Client and Connectivity Problems Network Problems Permissions Print Services Problem
General200 Hours
Network Enginer
Network Operating System Windows 2000 Server Introduction to Windows 2000 Server Installation & Boot Process Windows 2000 Administration Tools Creating Users & Groups User Profiles, System Policies DNS, WINS, Disk Administrator Creation of Groups Permissions Shared Folder and NTFS Permissions Print Permissions, Backup and Restore Windows 2003 Server Introduction to Windows 2003 Server Installation of Windows 2003 Server Adding and Removing Drivers and Software File systems – FAT32 and NTFS Creating User & Group Accounts Configuring Disk Quotas Controlling Access to Files and Resources Sharing Resources on the Network Configuring Printers & Modems Installing & Configuring DNS, DHCP, ADS Installing & Configuring Terminal Services Using Backup & Restore Utility SCO UNIX 5.0.5 Introduction to UNIX Basic Architecture of UNIX Installation of UNIX File system, Basic Commands Administering UNIX Creating Users & Groups File and Directory Permissions Processes and Process Administration Automating Tasks, Backup & Restore Installing and Configuring Printers, Mouse, NIC Working with X window System RED HAT LINUX 9.0 Introduction to LINUX Basic Architecture of LINUX File system Installation of LINUX Basic Commands Starting & Stopping Services in LINUX Administering LINUX Creating Users & Groups File and Directory Permissions Processes and Process Administration Automating Tasks Backup & Restore Installing & Configuring Printers Installing & Configuring Mouse Installing & Configuring Network Cards Working with KDE and GNOME Using Open Office software Installing additional packages on LINUX SuSE LINUX 9.0 Introduction to SuSE LINUX Basic Architecture Installation of SuSE Linux Enterprise Edition File system, Basic Commands Starting & Stopping Services Administration Commands and Utilities Creating Users & Groups File and Directory Permissions Processes and Process Administration Automating Tasks, Backup & Restore Installing & Configuring Printers Installing & Configuring Mouse Installing & Configuring Network Cards Working with GUI Installing additional packages CCNA (Cisco Certified Network Associates) OSI Model Connection vs. Connection-less Data Encapsulation History & Function Layer Identification Port/Socket Concepts Hardware Architecture Identify Components Interfaces & Cabling Router Features Switch Features IOS/Command Line CDP Functions Configuration Commands IOS Management Commands Password Recovery Troubleshooting Commands IP Addressing Address Classes Binary <- -> Decimal Representation Classful Masks, Private Address Space Subnet Masks, VLSM LAN Switching Bridging Types Flow Control ISL & IEEE 802.1Q MAC Layer Addressing Routing vs. Bridging Spanning Tree Switched Ethernet, Fast Ethernet, Gigabit Ethernet Switched Token Ring & FDDI Switching Types, VLANs Dial Solutions Callback & Dial Backup ISDN PRI & BRI PPP, VPDN, L2T, L2, IPSec Network Protocols ICMP IP Network Layer IP Transport Layer IPX Addressing IPX Encapsulation Types SAP Function in IPX Routing Protocols BGP, Distance Vector, EIGRP Identify Routable Traffic IGRP, Link State, OSPF, RIP Traffic Management AAA - Authentication, Authorization & Accounting Compression & Queuing Extended Access Lists SAP Traffic Management SNMP SNTP & NTP Standard IP Access Lists Standard IPX Access Lists TACACS+, RADIUS WAN Connectivity DTE vs. DCE Frame Relay Serial Connectivity/HDLC X.25 + MCSA or LINUX
General340 Hours
ORACLE DBA 9i
Oracle DBA 9i SQL Introduction Writing a Basic SQL Statement Restricting & Sorting Data Single Row Functions Displaying Data from Multiple Tables Aggregating Data by using Group Functions Writing Sub queries Producing Readable Output with iSQL *Plus Manipulating Data Creating and Managing Tables Including Constraints Creating Views Other Database Objects Controlling User Access SQL Workshop Using Set Operators Oracle 9i Date time functions Enhancements to the GROUP BY Clause Advanced Sub queries Hierarchical Retrieval Oracle9i Extensions to DML and DDL Statements Fundamentals I Oracle Architectural Components Getting Started with the Oracle Server Identifying the Features of the Universal Installer Defining the Optimal Flexible Architecture Creating a database during installation Creating a new database Identifying database administrative users Managing an Oracle Instance Creating a Database Using the Data Dictionary Maintaining the Control Files Maintaining Redo Log Files Managing Tablespaces and Datafiles Describing Storage hierarchy Establishing the Difference between SYSTEM and Non-SYSTEM tablespaces Storage Structures and Relationships Managing Undo Data Understanding the difference between automatic undo management and manual undo Creating and maintaining UNDO tablespaces Managing Tables Managing Indexes Identifying unused indexes Fundamentals II Network Overview Basic Oracle Net Architecture Basic Oracle Net Services Server-Side Configuration Basic Oracle Net Services Client-Side configuration Usage and Configuration of the Oracle Shared Server Backup and Recovery Overview Instance and Media Recovery Structures Configuration of the Database Archiving Mode Oracle Recovery Manager (RMAN) Overview and configuration User-Managed Backups RMAN Backups User-Managed Complete Recovery RMAN Complete Recovery User-Managed Incomplete Recovery RMAN Incomplete Recovery RMAN Repository Maintenance RMAN Catalog Creating and Usage Transporting Data between Database Backup and Recovery and Networking workshop Performance Tuning Overview of Oracle 9i Performance Tuning Diagnostic and Tuning Tools Sizing the Shared Pool Sizing the Buffer Cache Sizing other SGA Structures Database Configuration and I/O Issues Optimize Sort Operations Diagnosing Contention For Latches Tuning Rollback (or UNDO) Segments Monitoring and Detecting Lock Contention Tuning Oracle Shared Server Application Tuning Using Oracle Blocks Efficiently
General150 Hours
CCSA & CCSE
Check Point Certified Security Administrator CCSA is a foundation level certification that validates a candidates ability to configure and manage fundamental implementations of Check Point's flagship product, FireWall-1, as an enterprise level Internet security solution to protect corporate networks. As a CCSA, security professionals possess the requisite skills to define and configure security policies that enable secure access to information across corporate networks. In addition to these essential skills, CCSAs also have the ability to monitor network security activity and implement measures to block intruder access to networks. Course Comtents : CCSA (Checkpoint Certified Security Analyst) Check Point FireWall-1 Administration VPN-1 NGX Overview Objectives How VPN-1 NGX Works VPN-1 NGX Architecture Distributed Deployments The Security Policy Security Policy Defined Rule Base Defined Detecting IP Spoofing Multicasting Creating the Rule Base Completing the Rule Base Security Policy Command-Line Options Network Address Translation Understanding Network Address Translation Configuring Network Address Translation Manual NAT Monitoring Traffic and Connections Smart View Monitor Smart View Monitor Login Monitoring Suspicious Activity Rules Monitoring Alerts Monitoring Gateways Monitoring Traffic or Counters Monitoring Tunnels Monitoring Remote Users Event Reporter Smart Defense Active Defense Smart Defense in Action Content Security Role of the Security Server Understanding Content Security Content Vectoring Protocol (CVP) URI Filtering Protocol (UFP) Implementing Content Security Resources and the Rule Base CVP Load Sharing and Chaining Implementing the TCP Resource Authentication Understanding Authentication User Authentication Session Authentication Client Authentication LDAP User Management with Smart Directory LDAP Servers Integrating LDAP with NGX Using Smart Dashboard to Manage LDAP Users LDAP and User Manager Troubleshooting Configuring VPNs IKE VPN Deployments VPN Implementation VPN Setup Simplified Intranet Setup Integrating VPNs into a Rule Base Disaster Recovery Objective Backing Up for Disaster Recovery
General
CCNA
(must have the basic knowledge of networking) The first step in Cisco networking begins at the Associate level. CCNA certified professionals can install, configure and operate LAN, WAN and dial access services for small networks. On successful completion of this course, the candidate will have knowledge and skills necessary to select, connect, configure and troubleshoot the various Cisco networking devices. The course covers topics on Extending Switched Networks with VLANS, Determining IP Routes, Managing IP traffic with Access Lists, Establishing Point-to-Point connections and Establishing Frame Relay Connections. Course Contents CCNA (Cisco Certified Network Associates) OSI Model Connection vs. Connection-less Data Encapsulation History & Function Layer Identification Port/Socket Concepts Hardware Architecture Identify Components Interfaces & Cabling Router Features Switch Features IOS/Command Line CDP Functions Configuration Commands IOS Management Commands Password Recovery Troubleshooting Commands IP Addressing Address Classes Binary <- -> Decimal Representation Classful Masks, Private Address Space Subnet Masks, VLSM LAN Switching Bridging Types Flow Control ISL & IEEE 802.1Q MAC Layer Addressing Routing vs. Bridging Spanning Tree Switched Ethernet, Fast Ethernet, Gigabit Ethernet Switched Token Ring & FDDI Switching Types, VLANs Dial Solutions Callback & Dial Backup ISDN PRI & BRI PPP, VPDN, L2T, L2, IPSec Network Protocols ICMP IP Network Layer IP Transport Layer IPX Addressing IPX Encapsulation Types SAP Function in IPX Routing Protocols BGP, Distance Vector, EIGRP Identify Routable Traffic IGRP, Link State, OSPF, RIP Traffic Management AAA - Authentication, Authorization & Accounting Compression & Queuing Extended Access Lists SAP Traffic Management SNMP SNTP & NTP Standard IP Access Lists Standard IPX Access Lists TACACS+, RADIUS WAN Connectivity DTE vs. DCE Frame Relay Serial Connectivity/HDLC X.25
Cisco Certification 50 Hours
CCNP
(must have the basic knowledge of networking) 642-901 BSCI Building Scalable Cisco Internet works Implement EIGRP operations. • Explain the functions and operations of EIGRP (e.g., DUAL). • Configure EIGRP routing. (e.g., Stub Routing, authentication, etc.) • Verify or troubleshoot EIGRP routing configurations. Implement multiarea OSPF operations. • Explain the functions and operations of multiarea OSPF. • Configure multiarea OSPF routing. (e.g., Stub, NSSA, authentication, etc.) • Verify or troubleshoot multiarea OSPF routing configurations. Describe integrated IS-IS. • Describe the features and benefits of integrated IS-IS. • Configure and verify integrated IS-IS. Implement Cisco IOS routing features. • Describe, configure or verify route redistribution between IP routing IGPs. (e.g., route-maps, default routes, etc.) • Describe, configure or verify route filtering (i.e., distribute-lists and passive interfaces). • Describe and configure DHCP services (e.g., Server, Client, IP helper address, etc.). Implement BGP for enterprise ISP connectivity • Describe the functions and operations of BGP. • Configure or verify BGP operation in a non-transit AS (e.g., authentication). • Configure BGP path selection. (i.e., Local Preference, AS Path, Weight or MED attributes). Implement multicast forwarding. • Describe IP Multicast (e.g., Layer-3 to Layer-2 mapping, IGMP, etc.). • Describe, configure, or verify IP multicast routing (i.e., PIM Sparse-Dense Mode). Implement IPv6. • Describe IPv6 addressing operations. • Describe IPv6 interoperation with IPv4. • Describe, configure or verify OSPF routing with IPv6 addressing. 642-812 BCMSN Building Converged Cisco Multilayer Switched Networks Implement VLANs. • Explain the functions of VLANs in a hierarchical network. • Configure VLANs (e.g., Native, Default, Static and Access). • Explain and configure VLAN trunking (i.e., IEEE 802.1Q and ISL). • Explain and configure VTP. • Verify or troubleshoot VLAN configurations. Conduct the operation of Spanning Tree protocols in a hierarchical network. • Explain the functions and operations of the Spanning Tree protocols (i.e., RSTP, PVRST, MISTP). • Configure RSTP (PVRST) and MISTP. • Describe and configure STP security mechanisms (i.e., BPDU Guard, BPDU Filtering, Root Guard). • Configure and Verify UDLD and Loop Guard. • Verify or troubleshoot Spanning Tree protocol operations. • Configure and verify link aggregation using PAgP or LACP. Implement Inter-VLAN routing. • Explain and configure Inter-VLAN routing (i.e., SVI and routed ports). • Explain and enable CEF operation. • Verify or troubleshoot InterVLAN routing configurations. Implement gateway redundancy technologies. • Explain the functions and operations of gateway redundancy protocols (i.e., HSRP, VRRP, and GLBP). • Configure HSRP, VRRP, and GLBP. • Verify High Availability configurations. Describe and configure wireless client access. • Describe the components and operations of WLAN topologies (i.e., AP and Bridge). • Describe the features of Client Devices, Network Unification, and Mobility Platforms (i.e., CCX, LWAPP). • Configure a wireless client (i.e., ADU). Describe and configure security features in a switched network. • Describe common Layer 2 network attacks (e.g., MAC Flooding, Rogue Devices, VLAN Hopping, DHCP Spoofing, etc.) • Explain and configure Port Security,802.1x, VACLs, Private VLANs, DHCP Snooping, and DAI. • Verify Catalyst switch (IOS-based) security configurations (i.e., Port Security, 802.1x, VACLs, Private VLANs, DHCP Snooping, and DAI). Configure support for voice. • Describe the characteristics of voice in the campus network. • Describe the functions of Voice VLANs and trust boundaries. • Configure and verify basic IP Phone support (i.e. Voice VLAN, Trust and CoS options, AutoQoS for voice). 642-825 ISCW Implementing Secure Converged Wide Area Networks Implement basic teleworker services. • Describe Cable (HFC) technologies. • Describe xDSL technologies. • Configure ADSL (i.e., PPPoE or PPPoA). • Verify basic teleworker configurations. Implement Frame-Mode MPLS. • Describe the components and operation of Frame-Mode MPLS (e.g., packet-based MPLS VPNs). • Configure and verify Frame-Mode MPLS. Implement a site-to-site IPSec VPN • Describe the components and operations of IPSec VPNs and GRE Tunnels. • Configure a site-to-site IPSec VPN/GRE Tunnel with SDM (i.e., preshared key). • Verify IPSec/GRE Tunnel configurations (i.e., IOS CLI configurations). • Describe, configure, and verify VPN backup interfaces. • Describe and configure Cisco Easy VPN solutions using SDM. Describe network security strategies. • Describe and mitigate common network attacks (i.e., Reconnaissance, Access, and Denial of Service). • Describe and mitigate Worm, Virus, and Trojan Horse attacks. • Describe and mitigate application-layer attacks (e.g., management protocols). Implement Cisco Device Hardening • Describe, Configure, and verify AutoSecure/One-Step Lockdown implementations (i.e., CLI and SDM). • Describe, configure, and verify AAA for Cisco Routers. • Describe and configure threat and attack mitigation using ACLs. • Describe and configure IOS secure management features (e.g., SSH, SNMP, SYSLOG, NTP, Role-Based CLI, etc.) Implement Cisco IOS firewall. • Describe the functions and operations of Cisco IOS Firewall (e.g., Stateful Firewall, CBAC, etc.). • Configure Cisco IOS Firewall with SDM. • Verify Cisco IOS Firewall configurations (i.e., IOS CLI configurations, SDM Monitor). Describe and configure Cisco IOS IPS. • Describe the functions and operations of IDS and IPS systems (e.g., IDS/IPS signatures, IPS Alarms, etc.) • Configure Cisco IOS IPS using SDM. 642-845 ONT Optimizing Converged Cisco Networks Describe Cisco VoIP implementations. • Describe the functions and operations of a VoIP network (e.g., packetization, bandwidth considerations, CAC, etc.). • Describe and identify basic voice components in an enterprise network (e.g. Gatekeepers, Gateways, etc.) Describe QoS considerations. • Explain the necessity of QoS in converged networks (e.g., bandwidth, delay, loss, etc.). • Describe strategies for QoS implementations (e.g. QoS Policy, QoS Models, etc.). Describe DiffServ QoS implementations. • Describe classification and marking (e.g., CoS, ToS, IP Precedence, DSCP, etc.). • Describe and configure NBAR for classification. • Explain congestion management and avoidance mechanisms (e.g., FIFO, PQ, WRR, WRED, etc.). • Describe traffic policing and traffic shaping (i.e., traffic conditioners). • Describe Control Plane Policing. • Describe WAN link efficiency mechanisms (e.g., Payload/Header Compression, MLP with interleaving, etc.). • Describe and configure QoS Pre-Classify. Implement AutoQoS. • Explain the functions and operations of AutoQoS. • Describe the SDM QoS Wizard. • Configure, verify, and torubleshoot AutoQoS implementations (i.e., MQC). Implement WLAN security and management. • Describe and Configure wireless security on Cisco Clients and APs (e.g., SSID, WEP, LEAP, etc.). • Describe basic wireless management (e.g., WLSE and WCS). Configure and verify basic WCS configuration (i.e., login, add/review controller/AP status, security, and import/review maps). • Describe and configure WLAN QoS.
Cisco Certification 50 Hours
MCSE
(must have knowledge of Hardware & Networking) Microsoft Certified Systems Engineer (MCSE) candidates on the Microsoft Windows Server 2003 track are required to satisfy the following requirements : Core Exams (6 Exams Required) Four networking system exams One client operating system exam One design exam Elective Exams (1 Exam Required) Together with the core exams, the elective exams provide a valid and reliable measure of technical proficiency and expertise in solution design and implementation. MCSE candidates should also have at least one year of experience implementing and administering network operating systems and desktop operating systems. CORE EXAMS : NETWORKING SYSTEM Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003 Exam 70-291 : Implementing, Managing and Maintaining a Microsoft Windows Server 2003 Network Infrastructure. Exam 70-293 : Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure. Exam 70-294 : Planning, Implementing and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure. CORE EXAMS : CLIENT OPERATING SYSTEM Exam 70-270 : Installing, Configuring and Administering Microsoft Windows XP Professional. CORE EXAMS : DESIGN Exam 70-297 : Designing a Microsoft Windows Server 2003 Active Directory Network Infrastructure. ELECTIVE EXAM Exam 70-284 : Implementing and Managing Microsoft Exchange Server 2003. Microsoft Windows 2000 Professional General Introduction to Windows 2000 Professional Version Differences / New Features Customizing Windows 200 Professional Installation Installation Prerequisites/HCL Installation Methods Attended Unattended Over the Network Upgrading previous versions Application Installation Hardware Installation Device Drivers Multiple Boot Configurations Management Setting up & Managing User Setting up & Managing Group Accounts MMC Services Service Packs Managing Data Storage Disk Management File Systems DFS, EFS, and Compression FAT and FAT32 NTFS Offline Folders System Maintenance and Optimization De fragmentation Performance Scheduled Tasks Security Authentication File and Share Security Securing Resources NTFS Permissions Administering Shared Folders and Resources Auditing Resources and Events Disk Quota Printers Installing printer locally Accessing a Remote printer Implementing Security to printers Networking File and Printer Sharing Understanding DNS Understanding TCP/IP Internet Connection Sharing & Firewall Configuration Troubleshooting Emergency Repair Disk Backup & Restore Domain Logon and Authentication Hardware and Driver Issues Recovery Console Microsoft Xp Professional General Introduction to Windows XP Professional Version Differences/New Features Windows Installer Customizing Windows XP Professional Installation Installation Prerequisites/HCL Installation Methods Attended Unattended Over the Network Upgrading previous versions Remote Installation Services Application Installation Hardware Installation Device Drivers Multiple Boot Configurations Management Setting up & Managing User Setting up & Managing Group Accounts MMC Services Service Packs Managing Data Storage Disk Management File Systems DFS EFS Compression FAT and FAT32 NTFS Offline Folders System Maintenance and Optimization De fragmentation Performance Scheduled Tasks Windows Update Manager Security Authentication File and Share Security Securing Resources NTFS Permissions Administering Shared Folders and Resources Auditing Resources and Events Disk Quota Firewall Printers Installing printer locally Accessing a Remote printer Implementing Security to printers Networking File and Printer Sharing Mobile Computing Understanding DNS Understanding TCP/IP Remote Desktop Connection Terminal Service Web Connection Internet Connection Sharing and Firewall Configuration Troubleshooting Advanced Recovery Options Backup & Restore Domain Logon and Authentication Hardware and Driver Issues Using Files and Setting Transfer wizard Managing & Maintaining a Microsoft Windows 2003 Server Environment General Introduction to Windows 2003 Server Version Differences/New Features Windows Installer Customizing Windows 2003 Server Installation Basic Attended Unattended Installation Remote Installations Service Upgrading from Windows 2000 Active Directory & DNS Configuring Directory Services Directory Services Terminology Domain Administration Domain Planning Domains and Forest Structures Server Administration User Accounts Group Accounts Computer Accounts Profiles Disks and File Systems Administering File Systems, Shares, Advanced Disk Management, Distributed and Remote File Systems, File Systems, Replication, and Fault Tolerance, Shadows Copies, Disk Quota Printers Installing & Configuring Local Printer Installing & Configuring Remote Printer, Using IPP Security Configuring Security Group Policies Security Templates Security and Kerberos Auditing System Resources Server Configuration Network Configuration Remote Desktop Administration IIS 6.0 Terminal Servers Terminal Service Web Connection Internet Connection Sharing RAID Performance Monitoring Performance Tuning Maintenance Disaster Recovery Backup & Restore Using ASR Server Optimization Software and Updates Storage Troubleshooting Boot up failure Client and Connectivity Problems Network Problems Permissions Print Services Problem Implementing, Managing and Maintaining a Microsoft Windows Server 2003 Network Infrastructure General Understanding windows 2003 Networks OSI Reference Model Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data-Link Layer Physical Layer TCP/IP Model TCP / IP IP Addressing Sub netting Super netting CIDR Routing ICS NAT DHCP Understanding DHCP DHCP Server DHCP Clients DHCP Relay Agents DNS Introduction to DNS DNS Servers DNS Clients DNS Records (A, CNAME, PTR, MX, AAAA, etc.,) Zones, Delegation Zones, Stub Zones Primary Secondary Caching Only Forwarders Dynamic DNS WINS WINS Overview WINS Components WINS Database Designing a WINS Infrastructure Advanced Routing Concepts Static Routing Dynamic Routing RIS OSPF Remote Access Service RAS Server RAS Clients RADIUS Virtual Private Network PPTP L2TP Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Planning a Network Network Topology BUS, STAR, RING, MESH, CELLULAR, HYBRID Network Cables Co-axial, Twisted Pair, Fiber Optic Network Devices Repeaters, Hubs, Switches, Bridges, Routers, Brouters, Modems, etc., Transmission Media Connectors T-BNC, RJ –11, RJ-45, etc., Cabling Standards Jack Panel, I/O ports, Structured Cabling Guidelines. Locating Network Resources Determining Location Criteria Locating Workstation, Peripherals, Cables, Connectivity Devices, Servers Planning a TCP/IP Network Infrastructure Determining IP Addressing Requirements Using Public and Private Addresses Using Routers & Switches Planning for internet connectivity Planning, Designing and Implementing the Given Scenarios Planning for Security Infrastructure Security Basics Security Updates Security Policies Securing a Wireless Network Designing a Security Infrastructure Cryptography Port Blocking Packet Filtering Network Monitoring Installing, Configuring and Maintaining Multiple Web Site (IP Based and Hostname Based) Multiple FTP Site Administration Web Site Telnet Server Creating and Managing Digital Certificates Enterprise Stand alone Web Server Certificate Web Browser Certificate E-mail Certificate Maintaining Server Availability Network Load Balancing Clustering Planning a Secure Baseline Installation Deploying Security Configurations Securing Network Communications using IP Sec Planning, Implementing & Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure General Introduction to ADS Active Directory Objects & Components The Global Catalog Object Naming DNS Active Directory Concepts Forests Domain Trees Domain Controllers Additional Domain Controllers Child Domain Controllers Sites Replication Trust Relation Ship Installing & Configuring Active Directory Creating Multiple Domains, Trees and Forests Configuring Sites and Managing Replication Configuring Intersite Replication Renaming and Restructuring Domains Renaming Domain Controllers Managing Operation Master Roles Managing Trust Relationship Disaster Recovery Backing up ADS Restoring ADS Using ASR Administering Active Directory User Accounts User Profiles and Home Folder Group Accounts OU Structure Command Line Administration Group Policy Understanding Group Policy Group Policy Settings Administrative Templates Resultant Set of Policy (RSOP) Creating, Filtering, Linking, Modifying & Removing GPO Deploying Software Using GPO Setting up a SDP Administering Security Locating & Controlling Access to Active Directory Objects Delegating Administrative Control Using Security Templates Using Security Configuration and Analysis Implementing Audit Policy, Software Restriction Policies Managing Active Directory Performance Service Logs & System Monitor Performance Logs & Alters Optimizing and Troubleshooting ADS Using windows 2003 Support Tools Designing a Microsoft Windows Server 2003 Active Directory Network Infrastructure. Introduction to Active Directory & Network Infrastructure Active Directory Overview DNS Overview TCP/IP Overview Remote Access Overview Analyzing and Existing Infrastructure Analyzing the Company Analyzing the Existing Network Topology Analyzing the Existing Directory Structure Planning an Active Directory Structure Designing a Forest & Domain Model Defining a Naming Strategy Designing an Administrative Security Structure Designing an OU Structure Planning an Account Strategy Designing a GPO Implementation Designing a Site Plan Designing a Site Topology Planning a Domain Controllers Planning a Replication Strategy Designing a Migration Path Designing a DNS Structure Analyzing the Existing DNS Implementation Designing a DNS Name Resolution Strategy Designing a DNS Implementation Designing a DNS Service Placement Strategy Designing a WINS Structure Understanding WINS Designing a WINS Infrastructure Designing a WINS Replication Strategy Designing a Network and Routing Infrastructure Creating an IP Addressing Scheme Designing a Perimeter Network Creating a DHCP Strategy Designing Internet Connectivity Identifying Redundancy Requirements Identifying Bandwidth Requirements Designing NAT Designing a Remote Access Strategy Designing Remote Access Strategy Designing the Remote Access Infrastructure Designing Security for Remote Access Users Microsoft Exchange 2003 Server Implementation and Administration General Understanding Messaging System Introduction to Microsoft Exchange 2003 Server Integration with Microsoft Windows 2003 Server Microsoft Exchange 2003 Server Architecture Co-existence with previous versions of Exchange Servers Backward Compatibility and Interoperability Planning and Installing Exchange 2003 Server Prerequisite for installing Exchange 2003 Server Preparing Windows 2003 Server for Exchange 2003 Installation Testing Exchange 2003 Installation Installing and Upgrading Microsoft Exchange 2000 Server to Microsoft Exchange 2003 Server Microsoft Exchange 2003 Server Client Configuration Microsoft Outlook Express Microsoft Outlook Microsoft Outlook Web Access Creating and Managing Microsoft Exchange 2003 Server Configuration Recipients Address List SMTP Transport Message Routing POP3 IMAP HTTP NNTP Routing & Administrative Groups Implementing Advanced Security Mail Box Digital Certificates Public Folder Management & Replication Disaster Recovery Microsoft Exchange 2003 Client Side Backup & Restores Microsoft Exchange 2003 Server Side Backup & Restores Microsoft Exchange 2003 Server in Clustered Environment Microsoft Exchange 2003 Server Front End & Back End Configuration Microsoft Exchange 2003 Server Maintenance & Troubleshooting
Microsoft Certification
Microsoft ISA (Internet Security and Acceleration) 2004
Microsoft ISA (Internet Security and Acceleration) 2004 Microsoft ISA Server 2004 Overview Introducing ISA Server 2004 Deployment Scenarios for ISA Server 2004 Installing and Maintaining ISA Server 2004 Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients Advanced Firewall Client Configuration Securing ISA Server 2004 Maintaining ISA Server 2004 Enabling Access to Internet Resources ISA Server 2004 as a Proxy Server Configuring Multi-Networking on ISA Server Configuring Access Rule Elements Configuring Access Rules for Internet Access Configuring ISA Server 2004 as a Firewall Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System Policies Configuring Intrusion Detection and IP Preferences Configuring Access to Internal Resources Introduction to Publishing Configuring Web Publishing Configuring Secure Web Publishing Configuring Server Publishing Configuring ISA Server Authentication Integrating ISA Server 2004 & Microsoft Exchange Server Issues in E-Mail Security Configuring ISA Server to Secure SMTP Traffic & Secure Web Client Connections Configuring ISA Server to Secure Client Connections Advanced Application and Web Filtering Advanced Application and Web Filtering Overview Configuring HTTP Web Filters Configuring Additional Application and Web Filters Configuring VPN Access for Remote Clients and Networks Virtual Private Networking Overview Configuring Virtual Private Networking for Remote Clients Configuring Virtual Private Networking for Remote Sites Configuring VPN Quarantine Control Using ISA Server 2004 Implementing Caching to Improve Browsing Performance Caching Overview Configuring General Cache Properties Configuring Cache Rules Configuring Content Download Jobs Monitoring ISA Server 2004 Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring Reports Monitoring Connectivity Monitoring Services and Performance Implementing ISA Server 2004 Enterprise Edition Overview of ISA Server 2004 Enterprise Edition Planning an ISA Server 2004 Enterprise Edition Deployment Implementing ISA Server 2004 Enterprise Edition Implementing ISA Server 2004 Enterprise Edition: Firewall Scenario Implementing a Back-to-Back Firewall Scenario Implementing the Site-to-Site VPN Scenario
Microsoft Certification
MS SQL SERVER
Microsoft SQL Server SQL Server Product Overview Introduction to SQL Server Architecture SQL Server Programming Environment Lab A: Working with SQL Server Tools Using SQL Server Enterprise Manager and SQL Query Analyzer Creating Columns That Have the Identity Data Type, Uniqueidentifier Data Type,Working with Metadata Retrieving XML Result Sets SQL Server Components Relational Engine, Analyzing Query Plans Memory and Processes Client Connectivity, Creating Databases Writing Scripts for Creating a Database Creating a Database with Multiple Files and Filegroups Configuring, Troubleshooting, and Tuning Configuring Server/Client Network Libraries Using Extended Stored Procedures Troubleshooting Queries by Using SHOWPLAN Optimizing Queries by Using the Index Tuning Wizard SQL Server Storage Subsystems SQL Server Storage Structures SQL Server Index Architecture Managing Indexes, Working With Statistics Examining Disk Storage Structures Examining Indexes by Using DBCC Page Examining Heaps by Using DBCC Page SQL Server Administration Administering SQL Server by Scripting & Using SQL Server Enterprise Manager Automating Administration by Using SQL Server Agent & Jobs, Creating and Using Alerts, Using Multiserver Jobs, osql Scripting, Creating a Script to Perform Administrative Actions, Executing an Administrative Script with the osql Utility Converting the Script to a Stored Procedure Using SQL Server Agent Creating and Scheduling Jobs with SQL Server Agent Creating Alerts and Multiserver jobs Backup and Restore SQL Server Recovery Models SQL Server Backups Restoring Backups Backup and Restore Creating Routine Database Backups Restoring a Database Using Full, Differential, and Log Backups If Time Permits: Restoring to a Point in Time SQL Server Security SQL Server Security Architecture Securing SQL Server Common Security Issues Applying Security Measures to SQL Server & Database Objects, Assigning Statement Permissions, Assigning Object Permissions Securing an Installation of SQL Server Monitoring SQL Server Monitoring System and Server Activity Managing Locks, Additional Performance Considerations Monitoring and Troubleshooting SQL Server Performance Using Performance Monitor, Using SQL Profiler Troubleshooting Deadlocks, Contrasting Cursors and Table Variables Transferring and Analyzing Data Distributed Queries, Data Extraction, Transformation, and Loading Tools, Analysis Services, Working with External and Remote Data, Transferring Database Contents to a Database with a Different Collation, Transforming Data During Extraction and Load, Querying Distributed Data, Transferring Bulk Data In & Out of SQL Server
Microsoft Certification
SUN SOLARIS
SUN SOLARIS System Administration Level – 1 (SAI) Managing File Systems Introducing the Solaris OE Directory Hierarchy Managing Local Disk Devices Managing the Solaris OE File System Performing Mounts and Unmounts Installing Software Installing the Solaris 9 OE Performing Solaris 9 OE Package Administration Managing Software Patches on the Solaris 9 OE Performing System Boot Procedures Executing Boot PROM commands Performing Boot and Shutdown Procedures Performing User and Security Administration Performing User Administration Performing System Security Managing Network Printers and System Processes Configuring Printer Services Using Print Commands Controlling System Processes Performing System Backups and Restores Performing File System Backups Performing File System Restores Backing Up a Mounted File system with a UFS Snapshot System Administration Level – 2 (SAII) Describing Network Basics Describing Interface Configuration Describing the Client-Server Model Customizing the Solaris Management Console Managing Virtual File Systems and Core Dumps Managing Swap Configuration Managing Crash Dumps and Core Files Configuring NFS Configuring AutoFS Managing Storage Volumes Describing RAID and Solaris Volume Manager Software Configuring Solaris Volume Manager Software Controlling Access and Configuring System Messaging Configuring Access Control Lists (ACL) Configuring Role Based Access Control (RBAC) Performing Smart Card Authentication Configuring System Messaging Setting up Name Services Using Name Services Configuring Name Service Clients Configuring the Network Information Services (NIS) Performing Advanced Installation Procedures Configuring the Custom Jump Start Procedure Performing a Flash Installation
Sun Solaris certification60 Hours
CWNA (Certified Wireless Network Associate)
CWNA (Certified Wireless Network Associate) Radio Frequency (RF) Fundamentals RF behavior and properties Principles of antennas RF math calculations Link budgets and system operating margins Spread Spectrum Technologies Uses of Spread Spectrum Frequency Hopping (FHSS) Direct Sequencing (DSSS) Orthogonal Frequency Division Multiplexing (OFDM) Packet Binary Convolutional Coding (PBCC) Comparing DSSS, FHSS, PBCC, and OFDM Co-location and throughput analysis Chipping code, processing gain, & spreading functions, Channels, data rates, ranges, and comparisons Channel reuse in pure and mixed environments Hardware Installation, Configuration, and Management Access points, Wireless bridges Wireless workgroup bridges Client devices and accessories Residential & Enterprise gateways Wireless LAN switches PoE Switches and patch panels VoWiFi systems, Wireless Routers Troubleshooting Wireless LANs Multipath, Hidden node, Near/Far Identifying and resolving interference problems, Maximizing system throughput Maximizing co-location throughput Range considerations Antennas and Accessories Omni-directional, Semi-directional Highly-directional Determining coverage areas Proper mounting and safety Performing outdoor/indoor installations Power over Ethernet (802.3af and proprietary implementations) Cables & connector usage requirements Amplifiers, attenuators, lightning arrestors, and splitters, Fresnel Zones and Free Space Path Loss, Interference, Fading, & Multipath. Wireless Network Management AAA functions Bandwidth control Wireless Network Management features and products Physical and MAC Layers Differences between wireless and Ethernet frames Collision handling & the use of RTS/CTS Throughput and dynamic rate selection Analysis of DCF mode and the CSMA/CA protocol, How frame fragmentation works & its affects on throughput Wireless LAN Security Analysis of 802.11 security including WEP, WPA, 802.1x/EAP types, & 802.11i Security solutions at Layer2, 3, & 7 Types of network attacks, & protecting the network from attacks Corporate security policies including baseline practices, & common security solutions, Security recommendations Organizations and Standards FCC rules Frequency ranges and channels IEEE 802.11 family of standards Wireless LAN organizations Proper application of WLANs in distribution and access roles Interoperability standards 802.11 Network Architecture Joining a wireless LAN Authentication & association Basic & Extended Service Sets Independent Basic Service Sets Distribution systems Roaming in a wireless LAN Scanning modes using Beacons & Probe Frames, Power management features Site Surveying Understanding the need for a site survey Defining business requirements & justification, Facility analysis Interviewing network management & users, Identifying bandwidth requirements, Determining contours of RF coverage, Documenting installation problems, Locating interference, Reporting methodology & procedures Understanding specifics of each vertical market, Understanding the customer's network topology, Creating appropriate documentation during & after the site survey, Understanding FCC/FAA rules regarding towers, Understanding safety hazards, Using appropriate hardware & software to perform the survey
Other60 Hours
LPI Certified Linux Administrator
Linux has all of the features of a modern, fully fledged operating system: true multitasking, threads, virtual memory, shared libraries, demand loading, shared, copy-on-write executables, proper memory management, loadable device driver modules, video frame buffering, and TCP/IP networking. The Linux certification is for any individual interested in demonstrating fundamental Linux knowledge and skills. Duration : 1 Month Objectives : Gain experience with basic Linux administration tasks. Understand the Linux phenomenon. Explore command line and GUI utilities. Learn system processes. Configure printing and networking. Audience : Those who are taking first steps into using LINUX and want to learn how to administer their LINUX system. SuSE Linux SCLP – Level 1 Basics of System Administration Linux Fundamentals Using Help File System Basics Tools for working with Linux Process Installing Software Advanced System Administration Level –1 Printing User Administration Run level Concept Boot manager System Monitoring Data Backups Integrating Hardware Rescue System Shell programming with BASH Shell Introduction Bash Basics Basic Script Elements 1 (input, output) Basic Script Elements 2 (Control Structures) Advanced Scripting Techniques Useful commands for shell scripts Debugging shell scripts SCLP – Level 2 Basics of Network Administration Basics of Networking Overview of TCP/IP About Interfaces and Routers Starting Services Diagnosis Tools Infrastructure services in the Network level –1 Domain Name System NFS – Network File System NIS – Network Information Service Secure Shell (SSH) DHCP Setting up a Print Server Time Server Samba Server Internet Connection Network Connection with a Modem Network Connection with ISDN Configuring Dial-in Servers Using SuSE Linux Enterprise Server as Mail Server Electronic Mail Postfix Sendmail News with INN Mail Lists in Linux: Majordomo
Other100 Hours
CEH (Certified Ethical Working)
CEH V4 COURSE CONTENTS INTRODUCTION TO ETHICAL HACKING FOOT PRINTING SCANNING ENUMERATION SYSTEM HACKING TROJANS AND BACKDOORS SNIFFERS DENIAL OF SERVICE SOCIAL ENGINEERING SESSION HIJACKING HACKING WEB SERVERS WEB APPLICATION VULNERABILITIES WEB BASED PASSWORD CRACKING TECHNIQUES SQL INJECTION HACKING WIRELESS NETWORKS VIRUS PHYSICAL SECURITY LINUX HACKING EVADING FIREWALLS, IDS AND HONEYPOTS BUFFER OVERFLOWS CRYPTOGRAPHY PENETRATION TESTING
Other150 Hours
EC Council (Certified Ethical Hacker )
EC Council (Certified Ethical Hacker ) Course Description This course will upgrade the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. At the end of the course the student will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50 Who Should Attend This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
Other

Add Course to this training Center  |  Add Branch to this training Center

Photos


(No photos found.)

Return to Training Centers
Submit New Training Center


Top Contributors
Today
    Last 7 Days
      more...

      Awards & Gifts
       
      Promoted by: SpiderWorks Technologies Pvt Ltd, Kochi - India. © All Rights Reserved.