Saturday, 24 December 2016



Managing and troubleshooting hardware devices and local area networks

Understanding PC and its components
Troubleshooting strategy for computers
Configuring I/O devices and displays
Upgrading and troubleshooting memory
Disk devices
Printers and Scanners
Deploying network and safety measurements
Designing and implementing structured cabling
Ethernet standards
LAN troubleshooting techniques and tools
FDDI and token rings standards
Digital subscriber lines

Introduction to Datacomm and networking

Datacomm and network fundamentals
The OSI referenced model
LAN fundamentals
WAN fundamentals
Network devices

Managing windows server/XP Client and Server Desktop environment

Introduction of windows.net family
Managing windows desktop environment
Managing users and group accounts
Managing data storage
Sharing and securing file resources
Implementing printing

Basics of Internet and computer applications

Introduction of computer architecture
Understanding file and operating system
Using internet and email
Using office applications

Security operations and controls

Backup/restore
Information security management system
Incident response management
Separation of duties
Disaster recovery and business continuity
Record management to assist certification and auditor
Visitors management

Information system, security and controls

Virus, worms, trojan, phishing & cookies
Anti virus and patch management
Internet, email and web security
Vulnerability management and scanning tools
Application hardening(ftp, email, browser)
Security services in ISO/OSI layers
Leased line, wireless and mobile connectivity
Router/ swithches hardening guidelines
Firewalls, IDS & IPS
IT act and Cyber law

Data center, networks, building security, safety and controls

Physical & logical access control
Server hardening guidelines
Access control devices and systems
Integrated micro controller based security system
Escalation of alarm thru mobile communication
Environmental infrastructure monitor & control( UPS, alternate power source)
CCTV, biometric, smart access control & RFID devices management
Intruder alarm and building automation
Fire zone, panic zone, alarm control

security fundamentals

vulnerabilities, threat, risk and controls relationship
Asset and risk identification
Confidentiality, integrity and availability
Authentication, authorisation and accounting
Policy, procedures, guidelines and standards
IT security versus application security versus and information security
Encryption/decryption/public key infrastructure
Ecommerce security issues and solutions

70+ Industry simulated labs in live environment

PC configuation & troubleshooting
Network configuration and troubleshooting
Windows server configuration and troubleshooting
Exchange  servers configuration and troubleshooting
WiFi network configuration and troubleshooting
Routers and switches configuration and troubleshooting
Internet configuration and troubleshooting

Designing and implementing WiFi and VoIP networks

The wireless LAN revolution
Configuring a wireless workgroup
Installing and configuring access points
Antenna Fundamentals
Deploying an enterprise Network
Introduction to VoIP
Configuring VoIP
Voice Quality Engineering

Designing and Administering CISCO internetworks intrastructure

Basic of IOS
Advanced IOS concept
Switching and VLAN
IP routing
Working through access list
Wide area networking Protocols
Introduction to Link state protocols
Design goals and identifying the customer objectives
Designing for specific protocols
Network topology and LAN design
WAN design
IPv6
Network address translation
DNS & DHCP on router

Designing and Implementing

Implementing DHCP services
Implementing WINS services
Implementing Web services
Designing security for IIS
Implementing Windows
Remote access services
Implementing RADIUS server
Implementing IP routing
Implementing IPSec
Implementing windows VPN
Designing VPN security
Public Key intrastructure
Designing Certification Authority
Designing Security for network management

Administering and configuring exchange server

Installing exchange
Creating and managing mail-enabled objects
Connecting with Outlook and OWA
Backing up and restoring a database
Navigating the exchange system manager
Creating storage groups and databases

Administering and configuring Linux Operating system

Installing Linux
File system
Adding Users and Computers
Essential TCP/IP services
Network configuration
Printing in Linux
Apache, squid and sendmail server
Securing Services

Designing and implementing windows active directory service

Understanding logical model of Domain
Designing Active directory
Implementing Group policy
Publishing Resources
Implementing security in active directory
Implementing sites for replication
Designing sites for replication
Managing disaster recovery

Administrating, installing and configuring windows server and XP professional

Installing windows server and XP professional
Securing server, Disks and partitions
Monitoring and centralizing the management of shared folders
Monitoring server performance
Supporting Microsoft internet explorer and outlook express
Supporting applications and MS office
Installing and configuring terminal server
Remote installation services
Managing client environment
Implementing active directory
Delegating administrative control

Configuring and trouble shooting internetworks with TCP/IP

Application support protocols
Internet Protocols
Introduction to IPv6
Troubleshooting TCP/IP utilities
Configuring Proxy server
Implementing windows 2003 DNS server