Netlabs IT Diksha Road to Success Programme
Our highly job oriented Netlabs IT Diksha Road to Success Programme is a package course available for the students who are fresh to the IT field with almost no exposure to IT technologies. This package is suitable for Graduates with or without IT exposure. We are dedicated to instill and inspire confidence in our students to face the job interviews and to prepare them for the industry right from day one of their job. To achieve our goal, not only do we provide excellent technical training but also we insist our students to go through personality development programs to help them enhance their communication skills. With the help of expert faculties with enriched industrial experience and industry oriented curriculum, we help our students to learn the technology for certifications and know the industry beforehand in order to gain confidence for interviews. Our Excellent placement record has proved this strategy to be very successful.The topics covered in this course are: Basics of Computer Architecture and Applications, MS Office, Windows 8 and Mobile Computing Applications, Datacomm, Hardware training, MCSE 2012, CCNA, Exchange Server 2010/13, Information Security & Control, Lotus Domino Server, RHCE & ITIL 2011.
Duration: 15 Months
Programme Eligibility:Students should have appeared for, or cleared Class 12; or currently be in 1st year/2nd year of college in any stream.
Admission Process: Admission to this programme will be on the basis of an English test taken by the applicant at our Center.
Linux Certification Training In Hyderabad - Amrita Technologies - is a best institutions in India Linux Certification Training In Hyderabad , linux system administration Hyderabad India , Red Hat Training in Hyderabad.
Linux Certification Training In Hyderabad - Amrita Technologies - is a best institutions in India Linux Certification Training In Hyderabad , linux system administration Hyderabad India , Red Hat Training in Hyderabad.
Tours Cercano y Lejano Oriente 2013 y 2014. MapaplusMapaplus
Tours o circuitos por Egipto, Crucero por el Nilo, Cleopatra, Jerusalén, Belén, Nazaret, Jordania, Israel, Dubai o Emiratos Árabes Unidos. Compruebe todos los itinerarios disponibles para conocer el Cercano o el Lejano Oriente en un viaje organizado por Mapaplus.
Quantified Self, Smart Grid und Smart Home mit UOMo & JSR 363 | Eclipse Dem...Werner Keil
Ein Überblick an Hand von Live Demos wie Eclipse UOMo und JSR 363, Units of Measurement API für Java(TM) im Bereich Gesundheit/Quantified Self, Smart Home oder Smart Grid nutzbar sind
Cette présentation s'est déroulée le 21 avril 2016 dans le cadre des soirées organisées par le Club Molière à Pézenas.
Conférence à destination de chefs d'entreprise désirant améliorer leur visibilité locale sur Google.
Tours Cercano y Lejano Oriente 2013 y 2014. MapaplusMapaplus
Tours o circuitos por Egipto, Crucero por el Nilo, Cleopatra, Jerusalén, Belén, Nazaret, Jordania, Israel, Dubai o Emiratos Árabes Unidos. Compruebe todos los itinerarios disponibles para conocer el Cercano o el Lejano Oriente en un viaje organizado por Mapaplus.
Quantified Self, Smart Grid und Smart Home mit UOMo & JSR 363 | Eclipse Dem...Werner Keil
Ein Überblick an Hand von Live Demos wie Eclipse UOMo und JSR 363, Units of Measurement API für Java(TM) im Bereich Gesundheit/Quantified Self, Smart Home oder Smart Grid nutzbar sind
Cette présentation s'est déroulée le 21 avril 2016 dans le cadre des soirées organisées par le Club Molière à Pézenas.
Conférence à destination de chefs d'entreprise désirant améliorer leur visibilité locale sur Google.
The Cinderella-Project: How retailers have to set out to find their future customers instead of waiting for them to line up at their stores, call-centers or online-shops.
Los Juegos Olímpicos de Londres 2012, oficialmente conocidos como los Juegos de la XXX Olimpiada, fueron un evento multideportivo internacional, celebrado en la ciudad de Londres, Reino Unido, entre el 27 de julio y el 12 de agosto de 2012. En estos Juegos, los terceros celebrados en la capital británica, participaron un total de 10 568 atletas (5892 hombres y 4676 mujeres) de 204 países.
Progettare spazi e costruire community. Il codesign migliora gli esseri umani.Andrea Paoletti
Le persone non sono robot che pensano in maniera meccanica al loro lavoro. Pensano anche a quello che realmente vogliono fare. Quindi non abbiamo bisogno di creare solo spazi confortevoli, ma abbiamo bisogno di creare spazi in cui le persone sono incoraggiate a dare il loro meglio e a trovare un senso in quello che fanno.
Come si fa? Qui lo spiego!
The first keynote I delivered at #eas14 used Brookfield's notion of lenses of reflection to encourage participants to consider other roles in everyday practice. This presentation focussed on a number of examples, including visualising assessment timelines.
Netlabs ITS offer 6 month diploma in hardware & networkingNetlabs ITS
NETLABS’s Hardware & Networking
Diploma Programme for Graduates in Final Year
Duration: 6 Months
Eligibility: Students should have appeared for/ passed, or currently be in final year of college in
any stream.
My name is Sainul Abid, I’m a diploma holder in computer science and engineering along with having four years of experience as a System and Network support engineer. I have also completed Advance hardware and Network professional courses which includes MCSE, CCNA, RHCE, VMWare, Hardware and networking.
My detailed Resume is enclosed for your perusal. I would like to be the part of your esteemed organization and gain valuable knowledge from the vastly experienced and to contribute my skills and abilities to achieve organization goals.
MIITE India-Career Options with IT & Soft skill certification for Freshers, P...Prof. Harsha Kestur
Today, skill imparting and up-gradation is most wanted to entrepreneurs & professionals Keeping this in focus and as our objective, and with support from both National and International institutions, the EFS Academy, India has developed programs to suit professionals, students, entrepreneur needs.
EFS Academy has developed many ‘skill-based programs,’ that are grouped under major skill-sets. These programs are tailor-made to the training needs. For this purpose, we have collaborated with the ‘National Education University, USA,’ and the ‘State University of New York USA’ for the course design, content, and delivery, to meet the requirements of professionals, students.
These programs are administered by RIMSR, EFS Academy, which are technology driven dedicated skill-enhancement institutions in India. The programs are delivered on e-platform. Upon successful completion of the courses, the participants are duly certified.
These Programs offers more than 400 skill-sets so that professional has option to choose based on their specific needs. The focus is on the content, quality and the learning index of the participants. Program Fees Rs. 2400/- per participant per program as per enclosed PPT.
To say it in short, these programs are extremely useful, to entrepreneurs, professionals,students to professionalize themselves with the global standards.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Netlabs IT Diksha diploma for student who appeared for or cleared class 12
1. NETLABS ITS
An ISO 9001: 2008 Certified Company
Quality Gives Confidence
Netlabs IT Diksha Road to Success
2. About Netlabs ITS
Netlabs ITS is one of the best IT training institutes in Delhi, which has helped many students
change their dreams of becoming IT Professional.
We have been awarded ISO 9001:2008 for our quality services.
Netlabs ITS has a goal of providing job oriented IT training to a wide range of students group.
We take special care of the students who come from rural areas and are weak in technical or/and
communication skills. We train them well enough to face the global work environment with
confidence.
Netlabs Fact Sheet
• Netlabs ITS has already trained more than 5,000 candidates who have been working with
various blue chip companies around the world.
• Netlabs offers advance courses and networking solutions on state-of-the-art technologies
and platforms.
• Netlabs is an Information Technology training institute specializing in training on
networking technologies with quality assurance
• Netlabs is a professionally managed organization, providing solutions and training in
emerging networking technologies like Vmware, Exchange Server, Lotus Domino,
RHCE, CCNA, CCNP, ITIL, Citrix, Solaris, MCITP etc.
• Netlabs faculties have taken innumerable number of corporate batches and thus have a
very good understanding of the industry standards and requirements.
• Netlabs has leveraged its position in the IT Industry with an enviable list of clients and a
phenomenal growth rate, dedicated teams and quality training
The Undisputed Leader in Hardware & Networking Training
Benefits which students enjoy:
• FREE Course Material covering all topics in depth including case studies.
• Training sessions are delivered by the experts who have real time experience on training
and development.
3. • Candidates don’t have to buy any textbook or depend on other material at least during the
course.
• State-of-the-art equipment is provided to candidates for hands-on experience during
training sessions.
• As a value add, Communication Skills, Personality Development and Soft Skills training
is provided to ease the students excel in the work proficiency.
• Mock interviews are conducted to enable the students to understand the interview
scenario.
• 100% placement assistance.
Benefits @ Netlabs ITS – Certification Guidance
Participants will be provided ‘Training Participation Certificate’ after successful completion of
training. After completion of training, participants may apply for ‘Global Certification’ of given
training if required.
Why choose Netlabs ITS
We follow classic cum modern imparting methodology. This helps Netlabs to maintain
consistency in training delivery and assure quality in imparting. The interactive sessions are
conducted during the class helps student to clear the concept and learn faster. At Netlabs, for
every module, we take case studies relating to real time scenario. Our Course content is designed
the way that strikes a balance between concepts and tool based learning.
4. Netlabs IT Diksha Road to Success Programme…
Your First Step towards a Successful Career!
Our highly job oriented Netlabs IT Diksha Road to Success Programme is a package course
available for the students who are fresh to the IT field with almost no exposure to IT
technologies. This package is suitable for Graduates with or without IT exposure. We are
dedicated to instill and inspire confidence in our students to face the job interviews and to
prepare them for the industry right from day one of their job. To achieve our goal, not only do
we provide excellent technical training but also we insist our students to go through personality
development programs to help them enhance their communication skills. With the help of expert
faculties with enriched industrial experience and industry oriented curriculum, we help our
students to learn the technology for certifications and know the industry beforehand in order to
gain confidence for interviews. Our Excellent placement record has proved this strategy to be
very successful.
The topics covered in this course are: Basics of Computer Architecture and Applications, MS
Office, Windows 8 and Mobile Computing Applications, Datacomm, Hardware training, MCSE
2012, CCNA, Exchange Server 2010/13, Information Security & Control, Lotus Domino Server,
RHCE & ITIL 2011.
Duration: 15 Months
Programme Eligibility: Students should have appeared for, or cleared Class 12; or currently be
in 1st year/2nd year of college in any stream.
Admission Process: Admission to this programme will be on the basis of an English test taken
by the applicant at our Center.
5. diKsha 1
Basics of Computer Architecture & Applications
• Introduction to Computer Architecture
• Working with File System
• Working with Operating System
• Advanced DOS Commands
• Understanding Windows 8 and its Features
• Customizing Files & Folders
• Connecting Internet with Windows 8
• Configuring and Using USB Modem
• Internet Search Engines (Google, Yahoo, MSN, AOL)
• Chatting on Internet (AIM, Yahoo & MSN Messenger, iChat)
Working with Microsoft Office 2010
• Introduction and Installation to Microsoft Office 2010
• Introducing Microsoft Word 2010
• Working with the Document in MS Word 2010
• Working with Graphical Objects and Tables
• Using Mail Merge, Envelops and Labels
• Introduction to Excel 2010
• Working with Worksheets
• Working with Charts
• Working with SmartArt Graphics
• Working with Formulas and Functions
• Introducing Microsoft PowerPoint 2010
• Working with a Presentation
• Enhancing the Presentation
• Creating a Photo Album
• Converting a Presentation in a Video Format
Installing and Configuring Windows 8 and Mobile Computing Applications
• Installing & Upgrading Windows 8
• Configuring Hardware and Applications
• Configure Application Compatibility
• Configure Application Restrictions
• Configuring Network Connectivity
• Configure IPv4 & IPv6 Network Settings
6. • Configure Windows Firewall
• Configure Remote Management
• Configuring Access to Resources
• Configure User Account Control (UAC)
• Configuring Mobile Computing
• Configure BitlockerandBitlocker to Go
• Configure DirectAccess
• Configure Mobility Options
• Monitoring and Maintaining Systems
• Configure Updates to Windows 8
• Monitor Systems
• Configure Performance Settings
• Configuring Backup
• Configure Recovery
• Configure System Recovery Options
• Configure File Recovery Options
*After completing these modules, candidate would be eligible for following International
Certification.
a) Configuring windows 8.1 (70-687)
Introduction to Datacomm and Networking
• DataComm& Network Fundamentals
• OSI Reference Model
• LAN & WAN Fundamentals
• ISDN & Lease Lines
• Network Devices
• Firewall & Applications Gateway
• Designing & Implementing Structured Cabling
• Ethernet Standards
• FDDI & Token Ring Standards
• Digital Subscriber Line
• TCP/IP Protocol Suite
• IP Version 4
• IP Version 6
• Deploying a Networking and Security Measures
• Securing Small Office Home Office (SOHO) PCs
• LAN Troubleshooting Technologies and Tools
Managing and Troubleshooting Hardware Devices
• Understanding PC and its components
7. • Troubleshooting Strategy for computers
• Configuring I/O and Displays Devices
• Working with Keyboard and Mouse
• Installing & Configuring TV Tuner Card
• Installing & Troubleshooting Sound Card
• Upgrading & Troubleshooting Memory
• Disk Devices - HDD, CDROM and DVD
• Optimizing the Hard Disk
• Printers and Scanners(DMP, Inkjet & Laser Jet)
• SMPS & Monitor
• Motherboards
• Processor -Celeron, Core2 Duo , Intel Core i7, Intel Server)
• USB Devices
• All in one Printers(Printer, Scanner and Fax)
• PC Assembling and Maintenance
• Optimizing the Overall Performance of PC
• Using Data Recovery Tools
• Dealing with a Dead System
• Laptop Maintenance & Troubleshooting
• MCSE Server Administration: Windows
• Server 2012 Administration
o Windows Server 2012 Installation and Administration
o Automated Server Deployment
o Windows Deployment Services and Network Connectivity
o IPv6 in Windows Server 2012
o Domain and Forest Functionality
o Group Policy in Windows Server 2012
o Application Servers and Deployment
o Server and Application Virtualization
o Terminal Services RemoteApp
o File and Print Servers
o Provisioning Data and Credential Delegation
o Remote Administration Technologies
o Windows Server 2012 Patch Management Strategies
o Replica Mode and Autonomous Mode
o WSUS (Windows Server Update Services)
o Server Security and Remote Access
o VPN (Virtual Private Network) Protocols
o Network Policy Server and Remote Access Accounting
o Network Access Protection
o Storage Area Networks and Logical Unit Numbers (LUN)
o Certificate Services Role-Based Administration
o Credential Roaming and Web Enrollment Support
8. o Online Responder for Certificate Services
o Network Device Enrollment Service
o Clustering and High Availability
o Backing Up Data and Disaster Recovery
o
diKsha 2
MCSE Server Administration:
Windows Server 2012 Network
Installing, Configuring and Administration
o Windows Server 2012 Installation
o DNS Server Role and Domain Name System
o Recursive and Iterative Queries
o Forward and Windows internet
o Forward and Windows internet Name System
o Overview of the DHCP Server Role
o Dual Layer Architecture
o IPSec Tunneling and Port Proxy
o Transitioning from IPv4 to IPv6
o Network and VPN Access
o Network Policy Server
o RADIUS Clients and Servers
o NPS Authentication Methods
o Log File Properties
o SQL Server Logging
o Storage Technologies
o Windows Server 2012 Storage Management Overview
o Common Capacity Management Challenges
o File Server Resource Manager
o Quota Management
o Network load balancing manager
o Security and Audit policy
o WSUS Administration
9. MCITP Server Administration: Windows Server
2012 Active Directory, Configuring
o Windows Server 2012 Active Directory
o Organizational Units and Domain Controllers Global Catalog
o Operations Masters and Server Manager
o Global Catalog Servers
o RID Master
o Transferring and Seizing of Operations Master Roles
o Active Directory and DNS
o Command-Line DNS Server Administration
o Zone Transfers and Replication
o Active Directory Sites and Replication
o Active Directory Sites
o Active Directory Lightweight Directory Services AD LDS)
o Active Directory Rights Management Services AD RMS)
o Read-Only Domain Controllers
o Active Directory Federation Services (AD FS)
o Windows Server 2012 Virtualization
o Active Directory Objects and Trusts
o Organizational Units
o Group Membership
o Group Policy to Deploy Software
o Backing Up and Recovering Active Directory
o Use of Windows Server Backup
o Active Directory Certificate Services
o Installing Active Directory Certificate Services
o Certificate Templates and Revocation
*After completing these modules, candidate would be eligible for following International
Certification.
a) Installing and Configuring Windows Server 2012 (70-410)
b) Administering Windows Server 2012 (70-411)
c) Configuring Advanced Windows Server 2012 Services (70-412)
d) Designing and Implementing a Server Infrastructure (70-413)
e) Implementing an Advanced Server Infrastructure (70-414)
10. Configuring Microsoft Exchange Server 2010 and 2013
• Introduction to Exchange Server 2010 and Server Roles
• Installing Exchange Server 2010
• Configuring Recipients
• Implementing the Client Access Server Role
• Configuring OWA
• Getting Started with MS Outlook 2010
• Managing Storage Groups
• Configuring Public Folders
• Understanding & Managing Message Routing in Exchange Server 2010
• Configuring Message Compliance and Security
• Monitoring and Reporting
• Disaster Recovery
*After completing these modules, candidate would be eligible for following International
Certification.
a) MicrosoftExchangeServer2010(examno:70-663)
b) MicrosoftExchangeServer 2013 (exam no:70-341)
c) MicrosoftExchangeServer 2013 (exam no:70-342)
11. diKsha 3
Building Soft Skills Communication Etiquettes
• Facing Interview Situations Confidently
• Appearing for Interview and Resume Preparation
• Business Writing Skills
• Presentation Skills
• Corporate Etiquettes
Configuring and Troubleshooting Windows Server 2012 Network Infrastructure
• IPv4 and IPv6
• Implementing DHCP Server
• Implementing DNS Server
• Configure Windows Firewall with Advanced Security
• Configuring a Web Services Infrastructure (IIS)
• Remote Access Services
• Network Access Protection (NAP)
• Implementing Routing
• Configure Windows Server Update Services (WSUS)
• Windows Deployment Services (WDS)
• Simple Network Management Protocol (SNMP)
• Deploy and Manage Certificates
• Windows Server 2012 Monitoring
• Troubleshooting Windows Server 2012 Network
13. • Dynamic Routing - RIP, RIPv2, EIGRP & OSPF
• Working with Access List
• Wide Area Networking Protocol
• Point to Point Protocol
• Frame Relay
• IPv6
• IPv6 Routing Protocols
• DHCP and DNS on Router
• Network Address Translation (NAT)
• Cisco's Wireless Technologies
• IPSec Overview
• VPN Overview
Designing and Implementing Cisco Wireless Networks
• Wireless Fundamentals
• Basic Cisco WLAN Installation
• Wireless Clients
• Using Default OS Configuration Tool
• Cisco Aironet WLAN Client Adapter
• Cisco Secure Services Client
• Wireless Security Framework and Components
• Establishing Basic IEEE 802.11 Security
• Managing Authentication and Encryption with WPA and WPA2
• Configuring Security on Controllers and Clients
• Installing WCS
• Administering WCS
• Monitoring the Network with WCS
• WLAN Maintenance and Troubleshooting
Managing & Implementing Convergence Technologies
• Networking Infrastructure and Design
• Telephony Fundamentals
• Telephony Hardware
• Data and Voice Converged
• Multimedia and Video
• Understanding Quality of Service
• QoS Implementation Techniques
• Identify Elements of a Call Center or Contact Center
• Contact Center Management
• Customer Interaction
• Call Routing, Queuing, Recording
• Interactive Voice Response
14. • Identify Essential Elements of a Converged Network
• Planning a Convergent Solution
• LAN & WAN Monitoring Tools
• Data and Protocol Analyzers
• Traffic Management and Traffic Shaping
• Converged Network Administration
• Configuring VoIP
• Troubleshoot Convergent Networks
• Security Solutions
Managing Cloud Computing Infrastructure
• Overview of Cloud Computing
• Business Value of Cloud Computing
• Technical Perspectives of Cloud Computing
• Steps to Successful Adoption of Cloud Services
• Designing Cloud Service
• Identifying Risks and Consequences
CCNA(R&S) – Paper Code 200-120
• Describe how a network works
Describe the purpose and functions of various network devices.
Select the components required to meet a network specification.
Use the OSI and TCP/IP models and their associated protocols to explain
how data flows in a network.
Describe common networked applications including web applications.
Describe the purpose and basic operation of the protocols in the OSI and
TCP models.
Describe the impact of applications (Voice Over IP and Video Over IP) on
a network.
Interpret network diagrams.
Determine the path between two hosts across a network.
Describe the components required for network and Internet
communications.
Identify and correct common network problems at layers 1, 2, 3 and 7
using a layered model approach.
Differentiate between LAN/WAN operation and features
• Configure, verify and troubleshoot a switch with VLANs and interswitch
communications
15. Select the appropriate media, cables, ports, and connectors to connect
switches to other network devices and hosts.
Explain the technology and media access control method for Ethernet
networks.
Explain network segmentation and basic traffic management concepts.
Explain basic switching concepts and the operation of Cisco switches.
Perform and verify initial switch configuration tasks including remote
access management.
Verify network status and switch operation using basic utilities (including:
ping, traceroute, telnet, SSH, arp, ipconfig), SHOW & DEBUG
commands.
Identify, prescribe, and resolve common switched network media issues,
configuration issues, auto negotiation, and switch hardware failures.
Describe enhanced switching technologies (including: VTP, RSTP,
VLAN, PVSTP, 802.1q).
Describe how VLANs create logically separate networks and the need for
routing between them.
Configure, verify, and troubleshoot VLANs
Configure, verify, and troubleshoot trunking on Cisco switches.
Configure, verify, and troubleshoot InterVLAN routing.
Configure, verify, and troubleshoot VTP.
Configure, verify, and troubleshoot RSTP operation.
Interpret the output of various show and debug commands to verify the
operational status of a Cisco switched network.
Implement basic switch security (including: port security, trunk access,
management vlan other than vlan1, etc.)
• Implement an IP addressing scheme and IP Services to meet network requirements in a
medium-size Enterprise branch office network.
Describe the operation and benefits of using private and public IP
addressing.
Explain the operation and benefits of using DHCP and DNS.
Configure, verify and troubleshoot DHCP and DNS operation on a router.
(including: CLI/SDM).
Implement static and dynamic addressing services for hosts in a LAN
environment.
Calculate and apply an addressing scheme including VLSM IP addressing
design to a network.
Determine the appropriate classless addressing scheme using VLSM and
summarization to satisfy addressing requirements in a LAN/WAN
environment.
Describe the technological requirements for running IPv6 in conjunction
with IPv4 (including: protocols, dual stack,tunneling, etc.).
Describe IPv6 addresses.
Identify and correct common problems associated with IP addressing and
host configurations
16. • Configure, verify, and troubleshoot basic router operation and routing on Cisco devices
Describe basic routing concepts (including: packet forwarding, router
lookup process).
Describe the operation of Cisco routers (including: router bootup process,
POST, router components).
Select the appropriate media, cables, ports, and connectors to connect
routers to other network devices and hosts.
Configure, verify, and troubleshoot RIPv2.
Access and utilize the router to set basic parameters.(including:
CLI/SDM).
Connect, configure, and verify operation status of a device interface.
Verify device configuration and network connectivity using ping,
traceroute, telnet, SSH or other utilities.
Perform and verify routing configuration tasks for a static or default route
given specific routing requirements.
Manage IOS configuration files. (including: save, edit, upgrade, restore).
Manage Cisco IOS.
Compare and contrast methods of routing and routing protocols.
Configure, verify, and troubleshoot OSPF.
Configure, verify, and troubleshoot EIGRP.
Verify network connectivity (including: using ping, traceroute, and telnet
or SSH).
Troubleshoot routing issues.
Verify router hardware and software operation using SHOW & DEBUG
commands.
Implement basic router security.
• Explain and select the appropriate administrative tasks required for a WLAN
Describe standards associated with wireless media (including: IEEE WI-FI
Alliance, ITU/FCC).
Identify and describe the purpose of the components in a small wireless
network. (Including: SSID, BSS, ESS).
Identify the basic parameters to configure on a wireless network to ensure
that devices connect to the correct access point.
Compare and contrast wireless security features and capabilities of WPA
security (including: open, WEP, WPA-1/2).
Identify common issues with implementing wireless networks. (Including:
Interface, misconfiguration)
• Identify security threats to a network and describe general methods to mitigate those
threats
17. Describe today's increasing network security threats and explain the need
to implement a comprehensive security policy to mitigate the threats.
Explain general methods to mitigate common security threats to network
devices, hosts, and applications.
Describe the functions of common security appliances and applications.
Describe security recommended practices including initial steps to secure
network devices.
• Implement, verify, and troubleshoot NAT and ACLs in a medium-size Enterprise branch
office network.
Describe the purpose and types of ACLs.
Configure and apply ACLs based on network filtering requirements.
(including: CLI/SDM).
Configure and apply an ACLs to limit telnet and SSH access to the router
using (including: SDM/CLI).
Verify and monitor ACLs in a network environment.
Troubleshoot ACL issues.
Explain the basic operation of NAT.
Configure NAT for given network requirements using (including:
CLI/SDM).
Troubleshoot NAT issues
• Implement and verify WAN links
• Describe different methods for connecting to a WAN.
Configure and verify a basic WAN serial connection.
Configure and verify Frame Relay on Cisco routers.
Troubleshoot WAN implementation issues.
Describe VPN technology (including: importance, benefits, role, impact,
components).
Configure and verify a PPP connection between Cisco routers.
*After completing these modules, candidate would be eligible for following International
Certification.
a) CCNA Routing and Switching (200-120)
Implementing Cisco IP Routing(ROUTE)
This course is designed for network professionals who want to correctly implement routing
based solutions given a network design using Cisco IOS services and features, where
implementation of routing includes planning, configuring and verification
18. This course is a component of the Cisco CCNP Routing and Switching curriculum designed to
help delegates with information on the use of advanced routing in implementing scalability for
Cisco
• Planning
Routing
Services to
Requirements
• Assessing
Complex
Enterprise
Network
Requirements
• Common
Maintenance
Processes and
Procedures
• Implementing
an EIGRP-
Based
Solution
• Planning
Routing
Implementations with EIGRP
• Implementing and Verifying Basic EIGRP for the Enterprise LAN Architecture
• Configuring and Verifying EIGRP for the Enterprise WAN Architecture
• Implementing and Verifying EIGRP Authentication
• Advanced EIGRP Features in an Enterprise Network
• Implementing a Scalable Multiarea Network OSPF-Based Solution
• Planning Routing Implementations with OSPF as Scalable Routing Protocol
• How OSPF Packet Processes Work
• Improving Routing Performance in a Complex Enterprise Network
• Configuring and Verifying OSPF Routing
• Configuring and Verifying OSPF Route Summarization
• Configuring and Verifying OSPF Special Area Types
• OSPF area types
• Configuring and Verifying OSPF Authentication
Course
Course Objectives
Implementing Cisco
IP Routing (ROUTE)
Upon completion of this course, the delegate
will be able to:
This course forms
part of the following
Cisco certifications:
CCNP (Cisco
Certified Network
Professional)
CCDP (Cisco
Certified Design
Professional)
CCIP (Cisco
Certified
Internetworking
Professional)
Certification
Required topics are
covered for the Cisco
exam:
642-902 ROUTE
Plan and document the configuration and
verification of routing protocols and its
optimization in enterprise networks
Identify the technologies, components, and
metrics of EIGRP to implement and verify
EIGRP routing in diverse, large-scale
internetworks based on requirements
Identify, analyze, and match OSPF multiarea
routing functions and benefits for routing
efficiencies in network operations in order to
implement and verify OSPF routing in a
complex enterprise network
Implement and verify a redistribution solution
in a multiprotocol network that uses IOS
features to control path selection and loop free
topology according to a given network design
and requirements
Evaluate common network performance issues
and identify the tools needed to provide a layer
3 path control that uses IOS features to control
the path
Implement and verify a layer 3 solution using
BGP to connect an enterprise network to a
service provider
19. • Implement an IPv4-Based Redistribution Solution
• Assessing Network Routing Performance and Security Issues
• Operating a Network Using Multiple IP Routing Protocols
• Configuring and Verifying Route Redistribution
• Implementing Path Control
• Assessing Path Control Network Performance Issues
• Lab 5-1 Debrief
• References to additional Path Control in E-Learning
• Connection of an Enterprise Network to an ISP Network
• Planning the Enterprise-to-ISP Connection
• Considering the Advantages of Using BGP
• Comparing the Functions and Uses of EBGP and IBGP
• Configuring and Verifying Basic BGP Operations
• Using the BGP Attributes and Path Selection Process
diKsha 5
Information Security and Control
• Securing the Network
• Compliance and Operational Security
• Application, Data and Host Security
• Access Controls
• Threats and Vulnerabilities
• Virus, Worms, Phishing, and Cookies
• Antivirus and Patch Management
• Vulnerability Management and Scanning Tools
• Firewall, IDS and IPS
• IT Act and Cyber Law
• Building Security, Safety & Controls
• Physical & Logical Access Control
• Access Control Devices & Systems
• Integrated Micro Controller based Security System
20. • Escalation of Alarm through Mobile Communication
• Environment Infrastructure Monitor & Control
• Installing CCTV
• Installing Biometric & RFID Devices
• Intruder Alarm & Building Automation
• Fire Zone, Panic Zone, Alarm Control
Configuring, Managing and Securing Virtual Environment
• Introduction to VMware Virtualization
• Concepts of Server, Network, and Storage Virtualization
• Install and use vSphere User Interfaces
• Create Virtual Machines
• VMware vCenter Server
• Configure and Manage Virtual Networks
• Configure and Manage Virtual Storage
• Modify and Manage Virtual Machines
• Create and Manage Virtual Machine Snapshots
• Data Protection
• Access and Authentication Control
• Resource Management and Monitoring
• Patch Management
IBM Lotus Domino Server & Client
• Examining the Lotus Domino and Lotus Notes Architecture
• Performing Basic Administration Tasks
• Examining Lotus Domino Security Mechanisms
• Examining Mail Routing in Lotus Domino
• Examining Lotus Domino Replication
• Extending Lotus Domino Environment
• Installing and setting up the first Lotus Domino server and administrator
• Setting up servers in the Lotus Domino domain
• Adding Lotus Notes workstations to the Lotus Domino domain
• Setting up the administration environment
• Setting up the replication schedule to synchronize Lotus Domino system databases in the
domain
• Configuring intranet Lotus Domino mail routing
• Configuring internet mail routing
• Enabling message controls
• Enabling server and messaging monitoring
• Troubleshooting common mail setup problems
• Managing Users
• Managing Groups
21. • Managing Non-Notes and Notes Clients
• Deploying Composite Applications
• Managing Servers
• Updating Servers
• Setting Up Server Monitoring
• Using Domino Domain Monitoring
• Monitoring Server Performance
• Resolving Server Problems
• Resolving User Problems
Communication Skills and Personality Development
• Scope of verbal Communication
• Formal Communication
• Informal Communication
• Phonetics
• Pronunciation
• Listening
• Accent and Neutral Accent
• Reading a formal Text
• Pace of Communication
• Dictionaries
• Interviews and its types
• Interviewer and Interviewee - Roles and Responsibilities
• Skills required for facing an interview
• Effective Presentation Skills
• Significance of Leadership
• Factors of Leadership
• Qualities of a good leader
Red Hat Linux
Red Hat Certified Engineer (RHCE-EX300)
22. Red Hat Certified System Administrator (RHCSA-EX200)
RHCE Course Outline:
System Configuration and Management:
• Route IP traffic and create static routes
• Use iptables to implement packet filtering and configure network address translation
(NAT)
• Use /proc/sys and sysctl to modify and set kernel run-time parameters | Configure system
to authenticate using Kerberos
• Configure a system as an iSCSI initiator that persistently mounts an iSCSI target
• Produce and deliver reports on system utilization (processor, memory, disk, and
network)
• Use shell scripting to automate system maintenance tasks | Configure a system to log to a
remote system
• Configure a system to accept logging from a remote system.
Network Services:
• Boot, reboot, and shut down a system
• Run levels | Single-user mode to gain access to a system
• Identify CPU/memory intensive processes, adjust process priority with renice& kill
processes
• Locate and interpret system log files
• Access a virtual machine’s console
23. • Start and stop virtual machines
• Start, stop and check the status of network services.
HTTP/HTTPS:
• Configure a virtual host
• Configure private directories
• Deploy a basic CGI application
• Configure group-managed content
DNS:
• Configure a caching-only name server
• Configure a caching-only name server to forward DNS queries ( Note: Candidates are
not expected to configure master or slave name servers)
FTP:
• Configure anonymous-only download
NFS:
• Provide network shares to specific clients
• Provide network shares suitable for group collaboration
SMB:
• Provide network shares to specific clients
• Provide network shares suitable for group collaboration
SMTP:
24. • Configure a Mail Transfer Agent (MTA) to accept inbound email from other systems
• Configure an MTA to forward (relay) email through a smart host
SSH:
• Configure key-based authentication
• Configure additional options described in documentation
*After completing these modules, candidate would be eligible for following International
Certification.
a) Red Hat Certified Engineer (RHCE-EX300)
b) Red Hat Certified System Administrator (RHCSA-EX200)
ITIL Foundation 2011 Service Desk Module
ITIL® 2011
Chapter 1: Introduction
• Introduction to key ITIL® concepts
• IT as a Service
• Introduction to processes and process management
• The Service Lifecycle approach
Chapter 2: Service Strategy
• Purpose, goal, objectives & Scope
• Value Creation through Services
• Assets – Resources and Capabilities
• Service Strategy – Main activities
• Service Strategy processes
• Service Portfolio management
• Demand management
25. • Financial management
Chapter 3: Service Design
• Purpose, goal, objectives & Scope
• Service Design processes
• The 4 P’s
• Service Design aspects
• Service Catalog Management
• Service Level Management
• Capacity Management
• Availability Management
• IT Service Continuity Management
• Service Portfolio
• Information Security Management
• Supplier management
Chapter 4: Service Transition
• Purpose, goal, objectives & Scope
• Service Transition value to the business
• Technology and architecture in Service Transition
• Service Transition Processes
• Change Management
• The 7 R’s of Change Management
• Service Asset and Configuration Management
• Availability Management
• IT Service Continuity Management
• Release and Deployment Management
• Knowledge Management
• Supplier management
Chapter 5: Service Operation
• Purpose, goal, objectives & Scope
• Service Operation definitions
• The Service Desk
• Technical Management
• Application Management
• IT Operations Management
• Service Operations Processes
• Event Management
• Request Fulfillment
• Problem Management
26. • Access Management
• Technical Management
Chapter 6: Continual Service Improvement
• Purpose, goal, objectives & Scope
• Models and Processes
• The Deming Cycle
• Measurement and metrics
• Continual Service Improvement activities
• Risk management
• Continual Service Improvement interfaces
• Interface with Service Level Management
Chapter 7: Exam Preparation
• Sample Exams
• Feedback
• Recap
*After completing these modules, candidate would be eligible for following International
Certification.
a) ITIL® 2011 (EXO-001)
Exit Profile
After completing this programme, you would be able to face real life problems in the field of
Hardware and Networking. This programme is designed to make you job ready from day one.
With our specially designed course content, it is possible for a student with non-technical
background to understand the concepts of Hardware and Networking.
27. Our candidates are being placed with some of the best companies…..
And many more….