Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Netlabs IT Diksha diploma for student who appeared for or cleared class 12

Netlabs IT Diksha Road to Success Programme

Our highly job oriented Netlabs IT Diksha Road to Success Programme is a package course available for the students who are fresh to the IT field with almost no exposure to IT technologies. This package is suitable for Graduates with or without IT exposure. We are dedicated to instill and inspire confidence in our students to face the job interviews and to prepare them for the industry right from day one of their job. To achieve our goal, not only do we provide excellent technical training but also we insist our students to go through personality development programs to help them enhance their communication skills. With the help of expert faculties with enriched industrial experience and industry oriented curriculum, we help our students to learn the technology for certifications and know the industry beforehand in order to gain confidence for interviews. Our Excellent placement record has proved this strategy to be very successful.The topics covered in this course are: Basics of Computer Architecture and Applications, MS Office, Windows 8 and Mobile Computing Applications, Datacomm, Hardware training, MCSE 2012, CCNA, Exchange Server 2010/13, Information Security & Control, Lotus Domino Server, RHCE & ITIL 2011.
Duration: 15 Months
Programme Eligibility:Students should have appeared for, or cleared Class 12; or currently be in 1st year/2nd year of college in any stream.

Admission Process: Admission to this programme will be on the basis of an English test taken by the applicant at our Center.

  • Login to see the comments

  • Be the first to like this

Netlabs IT Diksha diploma for student who appeared for or cleared class 12

  1. 1. NETLABS ITS An ISO 9001: 2008 Certified Company Quality Gives Confidence Netlabs IT Diksha Road to Success
  2. 2. About Netlabs ITS Netlabs ITS is one of the best IT training institutes in Delhi, which has helped many students change their dreams of becoming IT Professional. We have been awarded ISO 9001:2008 for our quality services. Netlabs ITS has a goal of providing job oriented IT training to a wide range of students group. We take special care of the students who come from rural areas and are weak in technical or/and communication skills. We train them well enough to face the global work environment with confidence. Netlabs Fact Sheet • Netlabs ITS has already trained more than 5,000 candidates who have been working with various blue chip companies around the world. • Netlabs offers advance courses and networking solutions on state-of-the-art technologies and platforms. • Netlabs is an Information Technology training institute specializing in training on networking technologies with quality assurance • Netlabs is a professionally managed organization, providing solutions and training in emerging networking technologies like Vmware, Exchange Server, Lotus Domino, RHCE, CCNA, CCNP, ITIL, Citrix, Solaris, MCITP etc. • Netlabs faculties have taken innumerable number of corporate batches and thus have a very good understanding of the industry standards and requirements. • Netlabs has leveraged its position in the IT Industry with an enviable list of clients and a phenomenal growth rate, dedicated teams and quality training The Undisputed Leader in Hardware & Networking Training Benefits which students enjoy: • FREE Course Material covering all topics in depth including case studies. • Training sessions are delivered by the experts who have real time experience on training and development.
  3. 3. • Candidates don’t have to buy any textbook or depend on other material at least during the course. • State-of-the-art equipment is provided to candidates for hands-on experience during training sessions. • As a value add, Communication Skills, Personality Development and Soft Skills training is provided to ease the students excel in the work proficiency. • Mock interviews are conducted to enable the students to understand the interview scenario. • 100% placement assistance. Benefits @ Netlabs ITS – Certification Guidance Participants will be provided ‘Training Participation Certificate’ after successful completion of training. After completion of training, participants may apply for ‘Global Certification’ of given training if required. Why choose Netlabs ITS We follow classic cum modern imparting methodology. This helps Netlabs to maintain consistency in training delivery and assure quality in imparting. The interactive sessions are conducted during the class helps student to clear the concept and learn faster. At Netlabs, for every module, we take case studies relating to real time scenario. Our Course content is designed the way that strikes a balance between concepts and tool based learning.
  4. 4. Netlabs IT Diksha Road to Success Programme… Your First Step towards a Successful Career! Our highly job oriented Netlabs IT Diksha Road to Success Programme is a package course available for the students who are fresh to the IT field with almost no exposure to IT technologies. This package is suitable for Graduates with or without IT exposure. We are dedicated to instill and inspire confidence in our students to face the job interviews and to prepare them for the industry right from day one of their job. To achieve our goal, not only do we provide excellent technical training but also we insist our students to go through personality development programs to help them enhance their communication skills. With the help of expert faculties with enriched industrial experience and industry oriented curriculum, we help our students to learn the technology for certifications and know the industry beforehand in order to gain confidence for interviews. Our Excellent placement record has proved this strategy to be very successful. The topics covered in this course are: Basics of Computer Architecture and Applications, MS Office, Windows 8 and Mobile Computing Applications, Datacomm, Hardware training, MCSE 2012, CCNA, Exchange Server 2010/13, Information Security & Control, Lotus Domino Server, RHCE & ITIL 2011. Duration: 15 Months Programme Eligibility: Students should have appeared for, or cleared Class 12; or currently be in 1st year/2nd year of college in any stream. Admission Process: Admission to this programme will be on the basis of an English test taken by the applicant at our Center.
  5. 5. diKsha 1 Basics of Computer Architecture & Applications • Introduction to Computer Architecture • Working with File System • Working with Operating System • Advanced DOS Commands • Understanding Windows 8 and its Features • Customizing Files & Folders • Connecting Internet with Windows 8 • Configuring and Using USB Modem • Internet Search Engines (Google, Yahoo, MSN, AOL) • Chatting on Internet (AIM, Yahoo & MSN Messenger, iChat) Working with Microsoft Office 2010 • Introduction and Installation to Microsoft Office 2010 • Introducing Microsoft Word 2010 • Working with the Document in MS Word 2010 • Working with Graphical Objects and Tables • Using Mail Merge, Envelops and Labels • Introduction to Excel 2010 • Working with Worksheets • Working with Charts • Working with SmartArt Graphics • Working with Formulas and Functions • Introducing Microsoft PowerPoint 2010 • Working with a Presentation • Enhancing the Presentation • Creating a Photo Album • Converting a Presentation in a Video Format Installing and Configuring Windows 8 and Mobile Computing Applications • Installing & Upgrading Windows 8 • Configuring Hardware and Applications • Configure Application Compatibility • Configure Application Restrictions • Configuring Network Connectivity • Configure IPv4 & IPv6 Network Settings
  6. 6. • Configure Windows Firewall • Configure Remote Management • Configuring Access to Resources • Configure User Account Control (UAC) • Configuring Mobile Computing • Configure BitlockerandBitlocker to Go • Configure DirectAccess • Configure Mobility Options • Monitoring and Maintaining Systems • Configure Updates to Windows 8 • Monitor Systems • Configure Performance Settings • Configuring Backup • Configure Recovery • Configure System Recovery Options • Configure File Recovery Options *After completing these modules, candidate would be eligible for following International Certification. a) Configuring windows 8.1 (70-687) Introduction to Datacomm and Networking • DataComm& Network Fundamentals • OSI Reference Model • LAN & WAN Fundamentals • ISDN & Lease Lines • Network Devices • Firewall & Applications Gateway • Designing & Implementing Structured Cabling • Ethernet Standards • FDDI & Token Ring Standards • Digital Subscriber Line • TCP/IP Protocol Suite • IP Version 4 • IP Version 6 • Deploying a Networking and Security Measures • Securing Small Office Home Office (SOHO) PCs • LAN Troubleshooting Technologies and Tools Managing and Troubleshooting Hardware Devices • Understanding PC and its components
  7. 7. • Troubleshooting Strategy for computers • Configuring I/O and Displays Devices • Working with Keyboard and Mouse • Installing & Configuring TV Tuner Card • Installing & Troubleshooting Sound Card • Upgrading & Troubleshooting Memory • Disk Devices - HDD, CDROM and DVD • Optimizing the Hard Disk • Printers and Scanners(DMP, Inkjet & Laser Jet) • SMPS & Monitor • Motherboards • Processor -Celeron, Core2 Duo , Intel Core i7, Intel Server) • USB Devices • All in one Printers(Printer, Scanner and Fax) • PC Assembling and Maintenance • Optimizing the Overall Performance of PC • Using Data Recovery Tools • Dealing with a Dead System • Laptop Maintenance & Troubleshooting • MCSE Server Administration: Windows • Server 2012 Administration o Windows Server 2012 Installation and Administration o Automated Server Deployment o Windows Deployment Services and Network Connectivity o IPv6 in Windows Server 2012 o Domain and Forest Functionality o Group Policy in Windows Server 2012 o Application Servers and Deployment o Server and Application Virtualization o Terminal Services RemoteApp o File and Print Servers o Provisioning Data and Credential Delegation o Remote Administration Technologies o Windows Server 2012 Patch Management Strategies o Replica Mode and Autonomous Mode o WSUS (Windows Server Update Services) o Server Security and Remote Access o VPN (Virtual Private Network) Protocols o Network Policy Server and Remote Access Accounting o Network Access Protection o Storage Area Networks and Logical Unit Numbers (LUN) o Certificate Services Role-Based Administration o Credential Roaming and Web Enrollment Support
  8. 8. o Online Responder for Certificate Services o Network Device Enrollment Service o Clustering and High Availability o Backing Up Data and Disaster Recovery o diKsha 2 MCSE Server Administration: Windows Server 2012 Network Installing, Configuring and Administration o Windows Server 2012 Installation o DNS Server Role and Domain Name System o Recursive and Iterative Queries o Forward and Windows internet o Forward and Windows internet Name System o Overview of the DHCP Server Role o Dual Layer Architecture o IPSec Tunneling and Port Proxy o Transitioning from IPv4 to IPv6 o Network and VPN Access o Network Policy Server o RADIUS Clients and Servers o NPS Authentication Methods o Log File Properties o SQL Server Logging o Storage Technologies o Windows Server 2012 Storage Management Overview o Common Capacity Management Challenges o File Server Resource Manager o Quota Management o Network load balancing manager o Security and Audit policy o WSUS Administration
  9. 9. MCITP Server Administration: Windows Server 2012 Active Directory, Configuring o Windows Server 2012 Active Directory o Organizational Units and Domain Controllers Global Catalog o Operations Masters and Server Manager o Global Catalog Servers o RID Master o Transferring and Seizing of Operations Master Roles o Active Directory and DNS o Command-Line DNS Server Administration o Zone Transfers and Replication o Active Directory Sites and Replication o Active Directory Sites o Active Directory Lightweight Directory Services AD LDS) o Active Directory Rights Management Services AD RMS) o Read-Only Domain Controllers o Active Directory Federation Services (AD FS) o Windows Server 2012 Virtualization o Active Directory Objects and Trusts o Organizational Units o Group Membership o Group Policy to Deploy Software o Backing Up and Recovering Active Directory o Use of Windows Server Backup o Active Directory Certificate Services o Installing Active Directory Certificate Services o Certificate Templates and Revocation *After completing these modules, candidate would be eligible for following International Certification. a) Installing and Configuring Windows Server 2012 (70-410) b) Administering Windows Server 2012 (70-411) c) Configuring Advanced Windows Server 2012 Services (70-412) d) Designing and Implementing a Server Infrastructure (70-413) e) Implementing an Advanced Server Infrastructure (70-414)
  10. 10. Configuring Microsoft Exchange Server 2010 and 2013 • Introduction to Exchange Server 2010 and Server Roles • Installing Exchange Server 2010 • Configuring Recipients • Implementing the Client Access Server Role • Configuring OWA • Getting Started with MS Outlook 2010 • Managing Storage Groups • Configuring Public Folders • Understanding & Managing Message Routing in Exchange Server 2010 • Configuring Message Compliance and Security • Monitoring and Reporting • Disaster Recovery *After completing these modules, candidate would be eligible for following International Certification. a) MicrosoftExchangeServer2010(examno:70-663) b) MicrosoftExchangeServer 2013 (exam no:70-341) c) MicrosoftExchangeServer 2013 (exam no:70-342)
  11. 11. diKsha 3 Building Soft Skills Communication Etiquettes • Facing Interview Situations Confidently • Appearing for Interview and Resume Preparation • Business Writing Skills • Presentation Skills • Corporate Etiquettes Configuring and Troubleshooting Windows Server 2012 Network Infrastructure • IPv4 and IPv6 • Implementing DHCP Server • Implementing DNS Server • Configure Windows Firewall with Advanced Security • Configuring a Web Services Infrastructure (IIS) • Remote Access Services • Network Access Protection (NAP) • Implementing Routing • Configure Windows Server Update Services (WSUS) • Windows Deployment Services (WDS) • Simple Network Management Protocol (SNMP) • Deploy and Manage Certificates • Windows Server 2012 Monitoring • Troubleshooting Windows Server 2012 Network
  12. 12. diKsha 4 Designing and Administering CISCO Internetworks Infrastructure • Cisco IOS • Setting up Router • Advanced IOS concept • Boot Sequence • Password Recovery • Backup & Restore • Internet Protocol • Subnetting & Supernetting • Switching & VLAN • Configuring VLANs • Configuring Trunk Ports • Spanning Tree Protocol (STP) • IP Routing • Static Routing
  13. 13. • Dynamic Routing - RIP, RIPv2, EIGRP & OSPF • Working with Access List • Wide Area Networking Protocol • Point to Point Protocol • Frame Relay • IPv6 • IPv6 Routing Protocols • DHCP and DNS on Router • Network Address Translation (NAT) • Cisco's Wireless Technologies • IPSec Overview • VPN Overview Designing and Implementing Cisco Wireless Networks • Wireless Fundamentals • Basic Cisco WLAN Installation • Wireless Clients • Using Default OS Configuration Tool • Cisco Aironet WLAN Client Adapter • Cisco Secure Services Client • Wireless Security Framework and Components • Establishing Basic IEEE 802.11 Security • Managing Authentication and Encryption with WPA and WPA2 • Configuring Security on Controllers and Clients • Installing WCS • Administering WCS • Monitoring the Network with WCS • WLAN Maintenance and Troubleshooting Managing & Implementing Convergence Technologies • Networking Infrastructure and Design • Telephony Fundamentals • Telephony Hardware • Data and Voice Converged • Multimedia and Video • Understanding Quality of Service • QoS Implementation Techniques • Identify Elements of a Call Center or Contact Center • Contact Center Management • Customer Interaction • Call Routing, Queuing, Recording • Interactive Voice Response
  14. 14. • Identify Essential Elements of a Converged Network • Planning a Convergent Solution • LAN & WAN Monitoring Tools • Data and Protocol Analyzers • Traffic Management and Traffic Shaping • Converged Network Administration • Configuring VoIP • Troubleshoot Convergent Networks • Security Solutions Managing Cloud Computing Infrastructure • Overview of Cloud Computing • Business Value of Cloud Computing • Technical Perspectives of Cloud Computing • Steps to Successful Adoption of Cloud Services • Designing Cloud Service • Identifying Risks and Consequences CCNA(R&S) – Paper Code 200-120 • Describe how a network works  Describe the purpose and functions of various network devices.  Select the components required to meet a network specification.  Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network.  Describe common networked applications including web applications.  Describe the purpose and basic operation of the protocols in the OSI and TCP models.  Describe the impact of applications (Voice Over IP and Video Over IP) on a network.  Interpret network diagrams.  Determine the path between two hosts across a network.  Describe the components required for network and Internet communications.  Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered model approach.  Differentiate between LAN/WAN operation and features • Configure, verify and troubleshoot a switch with VLANs and interswitch communications
  15. 15.  Select the appropriate media, cables, ports, and connectors to connect switches to other network devices and hosts.  Explain the technology and media access control method for Ethernet networks.  Explain network segmentation and basic traffic management concepts.  Explain basic switching concepts and the operation of Cisco switches.  Perform and verify initial switch configuration tasks including remote access management.  Verify network status and switch operation using basic utilities (including: ping, traceroute, telnet, SSH, arp, ipconfig), SHOW & DEBUG commands.  Identify, prescribe, and resolve common switched network media issues, configuration issues, auto negotiation, and switch hardware failures.  Describe enhanced switching technologies (including: VTP, RSTP, VLAN, PVSTP, 802.1q).  Describe how VLANs create logically separate networks and the need for routing between them.  Configure, verify, and troubleshoot VLANs  Configure, verify, and troubleshoot trunking on Cisco switches.  Configure, verify, and troubleshoot InterVLAN routing.  Configure, verify, and troubleshoot VTP.  Configure, verify, and troubleshoot RSTP operation.  Interpret the output of various show and debug commands to verify the operational status of a Cisco switched network.  Implement basic switch security (including: port security, trunk access, management vlan other than vlan1, etc.) • Implement an IP addressing scheme and IP Services to meet network requirements in a medium-size Enterprise branch office network.  Describe the operation and benefits of using private and public IP addressing.  Explain the operation and benefits of using DHCP and DNS.  Configure, verify and troubleshoot DHCP and DNS operation on a router. (including: CLI/SDM).  Implement static and dynamic addressing services for hosts in a LAN environment.  Calculate and apply an addressing scheme including VLSM IP addressing design to a network.  Determine the appropriate classless addressing scheme using VLSM and summarization to satisfy addressing requirements in a LAN/WAN environment.  Describe the technological requirements for running IPv6 in conjunction with IPv4 (including: protocols, dual stack,tunneling, etc.).  Describe IPv6 addresses.  Identify and correct common problems associated with IP addressing and host configurations
  16. 16. • Configure, verify, and troubleshoot basic router operation and routing on Cisco devices  Describe basic routing concepts (including: packet forwarding, router lookup process).  Describe the operation of Cisco routers (including: router bootup process, POST, router components).  Select the appropriate media, cables, ports, and connectors to connect routers to other network devices and hosts.  Configure, verify, and troubleshoot RIPv2.  Access and utilize the router to set basic parameters.(including: CLI/SDM).  Connect, configure, and verify operation status of a device interface.  Verify device configuration and network connectivity using ping, traceroute, telnet, SSH or other utilities.  Perform and verify routing configuration tasks for a static or default route given specific routing requirements.  Manage IOS configuration files. (including: save, edit, upgrade, restore).  Manage Cisco IOS.  Compare and contrast methods of routing and routing protocols.  Configure, verify, and troubleshoot OSPF.  Configure, verify, and troubleshoot EIGRP.  Verify network connectivity (including: using ping, traceroute, and telnet or SSH).  Troubleshoot routing issues.  Verify router hardware and software operation using SHOW & DEBUG commands.  Implement basic router security. • Explain and select the appropriate administrative tasks required for a WLAN  Describe standards associated with wireless media (including: IEEE WI-FI Alliance, ITU/FCC).  Identify and describe the purpose of the components in a small wireless network. (Including: SSID, BSS, ESS).  Identify the basic parameters to configure on a wireless network to ensure that devices connect to the correct access point.  Compare and contrast wireless security features and capabilities of WPA security (including: open, WEP, WPA-1/2).  Identify common issues with implementing wireless networks. (Including: Interface, misconfiguration) • Identify security threats to a network and describe general methods to mitigate those threats
  17. 17.  Describe today's increasing network security threats and explain the need to implement a comprehensive security policy to mitigate the threats.  Explain general methods to mitigate common security threats to network devices, hosts, and applications.  Describe the functions of common security appliances and applications.  Describe security recommended practices including initial steps to secure network devices. • Implement, verify, and troubleshoot NAT and ACLs in a medium-size Enterprise branch office network.  Describe the purpose and types of ACLs.  Configure and apply ACLs based on network filtering requirements. (including: CLI/SDM).  Configure and apply an ACLs to limit telnet and SSH access to the router using (including: SDM/CLI).  Verify and monitor ACLs in a network environment.  Troubleshoot ACL issues.  Explain the basic operation of NAT.  Configure NAT for given network requirements using (including: CLI/SDM).  Troubleshoot NAT issues • Implement and verify WAN links • Describe different methods for connecting to a WAN.  Configure and verify a basic WAN serial connection.  Configure and verify Frame Relay on Cisco routers.  Troubleshoot WAN implementation issues.  Describe VPN technology (including: importance, benefits, role, impact, components).  Configure and verify a PPP connection between Cisco routers. *After completing these modules, candidate would be eligible for following International Certification. a) CCNA Routing and Switching (200-120) Implementing Cisco IP Routing(ROUTE) This course is designed for network professionals who want to correctly implement routing based solutions given a network design using Cisco IOS services and features, where implementation of routing includes planning, configuring and verification
  18. 18. This course is a component of the Cisco CCNP Routing and Switching curriculum designed to help delegates with information on the use of advanced routing in implementing scalability for Cisco • Planning Routing Services to Requirements • Assessing Complex Enterprise Network Requirements • Common Maintenance Processes and Procedures • Implementing an EIGRP- Based Solution • Planning Routing Implementations with EIGRP • Implementing and Verifying Basic EIGRP for the Enterprise LAN Architecture • Configuring and Verifying EIGRP for the Enterprise WAN Architecture • Implementing and Verifying EIGRP Authentication • Advanced EIGRP Features in an Enterprise Network • Implementing a Scalable Multiarea Network OSPF-Based Solution • Planning Routing Implementations with OSPF as Scalable Routing Protocol • How OSPF Packet Processes Work • Improving Routing Performance in a Complex Enterprise Network • Configuring and Verifying OSPF Routing • Configuring and Verifying OSPF Route Summarization • Configuring and Verifying OSPF Special Area Types • OSPF area types • Configuring and Verifying OSPF Authentication Course Course Objectives Implementing Cisco IP Routing (ROUTE) Upon completion of this course, the delegate will be able to: This course forms part of the following Cisco certifications: CCNP (Cisco Certified Network Professional) CCDP (Cisco Certified Design Professional) CCIP (Cisco Certified Internetworking Professional) Certification Required topics are covered for the Cisco exam: 642-902 ROUTE Plan and document the configuration and verification of routing protocols and its optimization in enterprise networks Identify the technologies, components, and metrics of EIGRP to implement and verify EIGRP routing in diverse, large-scale internetworks based on requirements Identify, analyze, and match OSPF multiarea routing functions and benefits for routing efficiencies in network operations in order to implement and verify OSPF routing in a complex enterprise network Implement and verify a redistribution solution in a multiprotocol network that uses IOS features to control path selection and loop free topology according to a given network design and requirements Evaluate common network performance issues and identify the tools needed to provide a layer 3 path control that uses IOS features to control the path Implement and verify a layer 3 solution using BGP to connect an enterprise network to a service provider
  19. 19. • Implement an IPv4-Based Redistribution Solution • Assessing Network Routing Performance and Security Issues • Operating a Network Using Multiple IP Routing Protocols • Configuring and Verifying Route Redistribution • Implementing Path Control • Assessing Path Control Network Performance Issues • Lab 5-1 Debrief • References to additional Path Control in E-Learning • Connection of an Enterprise Network to an ISP Network • Planning the Enterprise-to-ISP Connection • Considering the Advantages of Using BGP • Comparing the Functions and Uses of EBGP and IBGP • Configuring and Verifying Basic BGP Operations • Using the BGP Attributes and Path Selection Process diKsha 5 Information Security and Control • Securing the Network • Compliance and Operational Security • Application, Data and Host Security • Access Controls • Threats and Vulnerabilities • Virus, Worms, Phishing, and Cookies • Antivirus and Patch Management • Vulnerability Management and Scanning Tools • Firewall, IDS and IPS • IT Act and Cyber Law • Building Security, Safety & Controls • Physical & Logical Access Control • Access Control Devices & Systems • Integrated Micro Controller based Security System
  20. 20. • Escalation of Alarm through Mobile Communication • Environment Infrastructure Monitor & Control • Installing CCTV • Installing Biometric & RFID Devices • Intruder Alarm & Building Automation • Fire Zone, Panic Zone, Alarm Control Configuring, Managing and Securing Virtual Environment • Introduction to VMware Virtualization • Concepts of Server, Network, and Storage Virtualization • Install and use vSphere User Interfaces • Create Virtual Machines • VMware vCenter Server • Configure and Manage Virtual Networks • Configure and Manage Virtual Storage • Modify and Manage Virtual Machines • Create and Manage Virtual Machine Snapshots • Data Protection • Access and Authentication Control • Resource Management and Monitoring • Patch Management IBM Lotus Domino Server & Client • Examining the Lotus Domino and Lotus Notes Architecture • Performing Basic Administration Tasks • Examining Lotus Domino Security Mechanisms • Examining Mail Routing in Lotus Domino • Examining Lotus Domino Replication • Extending Lotus Domino Environment • Installing and setting up the first Lotus Domino server and administrator • Setting up servers in the Lotus Domino domain • Adding Lotus Notes workstations to the Lotus Domino domain • Setting up the administration environment • Setting up the replication schedule to synchronize Lotus Domino system databases in the domain • Configuring intranet Lotus Domino mail routing • Configuring internet mail routing • Enabling message controls • Enabling server and messaging monitoring • Troubleshooting common mail setup problems • Managing Users • Managing Groups
  21. 21. • Managing Non-Notes and Notes Clients • Deploying Composite Applications • Managing Servers • Updating Servers • Setting Up Server Monitoring • Using Domino Domain Monitoring • Monitoring Server Performance • Resolving Server Problems • Resolving User Problems Communication Skills and Personality Development • Scope of verbal Communication • Formal Communication • Informal Communication • Phonetics • Pronunciation • Listening • Accent and Neutral Accent • Reading a formal Text • Pace of Communication • Dictionaries • Interviews and its types • Interviewer and Interviewee - Roles and Responsibilities • Skills required for facing an interview • Effective Presentation Skills • Significance of Leadership • Factors of Leadership • Qualities of a good leader Red Hat Linux Red Hat Certified Engineer (RHCE-EX300)
  22. 22. Red Hat Certified System Administrator (RHCSA-EX200) RHCE Course Outline: System Configuration and Management: • Route IP traffic and create static routes • Use iptables to implement packet filtering and configure network address translation (NAT) • Use /proc/sys and sysctl to modify and set kernel run-time parameters | Configure system to authenticate using Kerberos • Configure a system as an iSCSI initiator that persistently mounts an iSCSI target • Produce and deliver reports on system utilization (processor, memory, disk, and network) • Use shell scripting to automate system maintenance tasks | Configure a system to log to a remote system • Configure a system to accept logging from a remote system. Network Services: • Boot, reboot, and shut down a system • Run levels | Single-user mode to gain access to a system • Identify CPU/memory intensive processes, adjust process priority with renice& kill processes • Locate and interpret system log files • Access a virtual machine’s console
  23. 23. • Start and stop virtual machines • Start, stop and check the status of network services. HTTP/HTTPS: • Configure a virtual host • Configure private directories • Deploy a basic CGI application • Configure group-managed content DNS: • Configure a caching-only name server • Configure a caching-only name server to forward DNS queries ( Note: Candidates are not expected to configure master or slave name servers) FTP: • Configure anonymous-only download NFS: • Provide network shares to specific clients • Provide network shares suitable for group collaboration SMB: • Provide network shares to specific clients • Provide network shares suitable for group collaboration SMTP:
  24. 24. • Configure a Mail Transfer Agent (MTA) to accept inbound email from other systems • Configure an MTA to forward (relay) email through a smart host SSH: • Configure key-based authentication • Configure additional options described in documentation *After completing these modules, candidate would be eligible for following International Certification. a) Red Hat Certified Engineer (RHCE-EX300) b) Red Hat Certified System Administrator (RHCSA-EX200) ITIL Foundation 2011 Service Desk Module ITIL® 2011 Chapter 1: Introduction • Introduction to key ITIL® concepts • IT as a Service • Introduction to processes and process management • The Service Lifecycle approach Chapter 2: Service Strategy • Purpose, goal, objectives & Scope • Value Creation through Services • Assets – Resources and Capabilities • Service Strategy – Main activities • Service Strategy processes • Service Portfolio management • Demand management
  25. 25. • Financial management Chapter 3: Service Design • Purpose, goal, objectives & Scope • Service Design processes • The 4 P’s • Service Design aspects • Service Catalog Management • Service Level Management • Capacity Management • Availability Management • IT Service Continuity Management • Service Portfolio • Information Security Management • Supplier management Chapter 4: Service Transition • Purpose, goal, objectives & Scope • Service Transition value to the business • Technology and architecture in Service Transition • Service Transition Processes • Change Management • The 7 R’s of Change Management • Service Asset and Configuration Management • Availability Management • IT Service Continuity Management • Release and Deployment Management • Knowledge Management • Supplier management Chapter 5: Service Operation • Purpose, goal, objectives & Scope • Service Operation definitions • The Service Desk • Technical Management • Application Management • IT Operations Management • Service Operations Processes • Event Management • Request Fulfillment • Problem Management
  26. 26. • Access Management • Technical Management Chapter 6: Continual Service Improvement • Purpose, goal, objectives & Scope • Models and Processes • The Deming Cycle • Measurement and metrics • Continual Service Improvement activities • Risk management • Continual Service Improvement interfaces • Interface with Service Level Management Chapter 7: Exam Preparation • Sample Exams • Feedback • Recap *After completing these modules, candidate would be eligible for following International Certification. a) ITIL® 2011 (EXO-001) Exit Profile After completing this programme, you would be able to face real life problems in the field of Hardware and Networking. This programme is designed to make you job ready from day one. With our specially designed course content, it is possible for a student with non-technical background to understand the concepts of Hardware and Networking.
  27. 27. Our candidates are being placed with some of the best companies….. And many more….

×