Saturday, 24 December 2016
Managing and troubleshooting hardware devices and local area networks
Understanding PC and its components
Troubleshooting strategy for computers
Configuring I/O devices and displays
Upgrading and troubleshooting memory
Disk devices
Printers and Scanners
Deploying network and safety measurements
Designing and implementing structured cabling
Ethernet standards
LAN troubleshooting techniques and tools
FDDI and token rings standards
Digital subscriber lines
Troubleshooting strategy for computers
Configuring I/O devices and displays
Upgrading and troubleshooting memory
Disk devices
Printers and Scanners
Deploying network and safety measurements
Designing and implementing structured cabling
Ethernet standards
LAN troubleshooting techniques and tools
FDDI and token rings standards
Digital subscriber lines
Introduction to Datacomm and networking
Datacomm and network fundamentals
The OSI referenced model
LAN fundamentals
WAN fundamentals
Network devices
The OSI referenced model
LAN fundamentals
WAN fundamentals
Network devices
Managing windows server/XP Client and Server Desktop environment
Introduction of windows.net family
Managing windows desktop environment
Managing users and group accounts
Managing data storage
Sharing and securing file resources
Implementing printing
Managing windows desktop environment
Managing users and group accounts
Managing data storage
Sharing and securing file resources
Implementing printing
Basics of Internet and computer applications
Introduction of computer architecture
Understanding file and operating system
Using internet and email
Using office applications
Understanding file and operating system
Using internet and email
Using office applications
Security operations and controls
Backup/restore
Information security management system
Incident response management
Separation of duties
Disaster recovery and business continuity
Record management to assist certification and auditor
Visitors management
Information security management system
Incident response management
Separation of duties
Disaster recovery and business continuity
Record management to assist certification and auditor
Visitors management
Information system, security and controls
Virus, worms, trojan, phishing & cookies
Anti virus and patch management
Internet, email and web security
Vulnerability management and scanning tools
Application hardening(ftp, email, browser)
Security services in ISO/OSI layers
Leased line, wireless and mobile connectivity
Router/ swithches hardening guidelines
Firewalls, IDS & IPS
IT act and Cyber law
Anti virus and patch management
Internet, email and web security
Vulnerability management and scanning tools
Application hardening(ftp, email, browser)
Security services in ISO/OSI layers
Leased line, wireless and mobile connectivity
Router/ swithches hardening guidelines
Firewalls, IDS & IPS
IT act and Cyber law
Data center, networks, building security, safety and controls
Physical & logical access control
Server hardening guidelines
Access control devices and systems
Integrated micro controller based security system
Escalation of alarm thru mobile communication
Environmental infrastructure monitor & control( UPS, alternate power source)
CCTV, biometric, smart access control & RFID devices management
Intruder alarm and building automation
Fire zone, panic zone, alarm control
Server hardening guidelines
Access control devices and systems
Integrated micro controller based security system
Escalation of alarm thru mobile communication
Environmental infrastructure monitor & control( UPS, alternate power source)
CCTV, biometric, smart access control & RFID devices management
Intruder alarm and building automation
Fire zone, panic zone, alarm control
security fundamentals
vulnerabilities, threat, risk and controls relationship
Asset and risk identification
Confidentiality, integrity and availability
Authentication, authorisation and accounting
Policy, procedures, guidelines and standards
IT security versus application security versus and information security
Encryption/decryption/public key infrastructure
Ecommerce security issues and solutions
Asset and risk identification
Confidentiality, integrity and availability
Authentication, authorisation and accounting
Policy, procedures, guidelines and standards
IT security versus application security versus and information security
Encryption/decryption/public key infrastructure
Ecommerce security issues and solutions
70+ Industry simulated labs in live environment
PC configuation & troubleshooting
Network configuration and troubleshooting
Windows server configuration and troubleshooting
Exchange servers configuration and troubleshooting
WiFi network configuration and troubleshooting
Routers and switches configuration and troubleshooting
Internet configuration and troubleshooting
Network configuration and troubleshooting
Windows server configuration and troubleshooting
Exchange servers configuration and troubleshooting
WiFi network configuration and troubleshooting
Routers and switches configuration and troubleshooting
Internet configuration and troubleshooting
Designing and implementing WiFi and VoIP networks
The wireless LAN revolution
Configuring a wireless workgroup
Installing and configuring access points
Antenna Fundamentals
Deploying an enterprise Network
Introduction to VoIP
Configuring VoIP
Voice Quality Engineering
Configuring a wireless workgroup
Installing and configuring access points
Antenna Fundamentals
Deploying an enterprise Network
Introduction to VoIP
Configuring VoIP
Voice Quality Engineering
Designing and Administering CISCO internetworks intrastructure
Basic of IOS
Advanced IOS concept
Switching and VLAN
IP routing
Working through access list
Wide area networking Protocols
Introduction to Link state protocols
Design goals and identifying the customer objectives
Designing for specific protocols
Network topology and LAN design
WAN design
IPv6
Network address translation
DNS & DHCP on router
Advanced IOS concept
Switching and VLAN
IP routing
Working through access list
Wide area networking Protocols
Introduction to Link state protocols
Design goals and identifying the customer objectives
Designing for specific protocols
Network topology and LAN design
WAN design
IPv6
Network address translation
DNS & DHCP on router
Designing and Implementing
Implementing DHCP services
Implementing WINS services
Implementing Web services
Designing security for IIS
Implementing Windows
Remote access services
Implementing RADIUS server
Implementing IP routing
Implementing IPSec
Implementing windows VPN
Designing VPN security
Public Key intrastructure
Designing Certification Authority
Designing Security for network management
Implementing WINS services
Implementing Web services
Designing security for IIS
Implementing Windows
Remote access services
Implementing RADIUS server
Implementing IP routing
Implementing IPSec
Implementing windows VPN
Designing VPN security
Public Key intrastructure
Designing Certification Authority
Designing Security for network management
Administering and configuring exchange server
Installing exchange
Creating and managing mail-enabled objects
Connecting with Outlook and OWA
Backing up and restoring a database
Navigating the exchange system manager
Creating storage groups and databases
Creating and managing mail-enabled objects
Connecting with Outlook and OWA
Backing up and restoring a database
Navigating the exchange system manager
Creating storage groups and databases
Administering and configuring Linux Operating system
Installing Linux
File system
Adding Users and Computers
Essential TCP/IP services
Network configuration
Printing in Linux
Apache, squid and sendmail server
Securing Services
File system
Adding Users and Computers
Essential TCP/IP services
Network configuration
Printing in Linux
Apache, squid and sendmail server
Securing Services
Designing and implementing windows active directory service
Understanding logical model of Domain
Designing Active directory
Implementing Group policy
Publishing Resources
Implementing security in active directory
Implementing sites for replication
Designing sites for replication
Managing disaster recovery
Designing Active directory
Implementing Group policy
Publishing Resources
Implementing security in active directory
Implementing sites for replication
Designing sites for replication
Managing disaster recovery
Administrating, installing and configuring windows server and XP professional
Installing windows server and XP professional
Securing server, Disks and partitions
Monitoring and centralizing the management of shared folders
Monitoring server performance
Supporting Microsoft internet explorer and outlook express
Supporting applications and MS office
Installing and configuring terminal server
Remote installation services
Managing client environment
Implementing active directory
Delegating administrative control
Securing server, Disks and partitions
Monitoring and centralizing the management of shared folders
Monitoring server performance
Supporting Microsoft internet explorer and outlook express
Supporting applications and MS office
Installing and configuring terminal server
Remote installation services
Managing client environment
Implementing active directory
Delegating administrative control
Configuring and trouble shooting internetworks with TCP/IP
Application support protocols
Internet Protocols
Introduction to IPv6
Troubleshooting TCP/IP utilities
Configuring Proxy server
Implementing windows 2003 DNS server
Internet Protocols
Introduction to IPv6
Troubleshooting TCP/IP utilities
Configuring Proxy server
Implementing windows 2003 DNS server
Subscribe to:
Comments (Atom)