Other Courses
CompTIA - A+
A+ Operating System Technologies
• Introduction to Computers
• Types of Software & languages
Introduction to Operating System (DOS)
• Introduction to OS Booting sequence in DOS
• Internal & external commands
Working with Windows 98/2003/VISTA
• Hardware profiles • System and memory Resource management • Boot
sequence • System management and maintenance tools • Registry monitoring
tools and troubleshooting resources. Working with Windows 2000/2003/VISTA •
Installing Windows 2000 Professional and Server • Administration tools •
Microsoft Management Consoles • Basic disk management • The boot process
• System recovery using safe mode • Using Device manager Networking with
Windows 98/
2000/2003/VISTA • Discussion on TCP/IP • Installing Network adapters,
protocols and services
• Discussion of Workgroup or Domain models
• Mapping network and printer connections.
A+ PC Support (Core Hardware)
Assembling & Installation • Add on card identification • Assembling
a computer
• Installation of DOS, 95, 98, ME, 2000, 20003, VISTA, MS-Office XP/ 2000 etc.,
• Configuration of display, sound card
Basic Electronics
• Resistors, capacitors and Inductors
• Conductors, Insulators and semi-conductors
• Comparison between AC and DC Current
• Diodes and transistors • Rectifiers and voltage Regulators
Digital Electronics
• Number System and conversion • Basic logic gates (NOT, AND, OR) •
Universal gates (NAND, NOR) • Flip flops (RS, D and JK)
• Counters, Shift registers • Multiplexer and Demultiplexer • Introduction
to Integrated Circuits • Microprocessor and Support chips
• Difference between 8085,8086 and 8088
• Data, Address and control bus • Dumb and Smart chip • Use of 8284,8288,
74LS245, 74LS373, in a PC • Use of 8237,8253.8255 & 8259 in a PC.
Advanced Microprocessor
• Difference between PC-XT & PC-AT • Processor speed ratings •
Study on Intel 80286, 80386, 80486 • Study on Pentium, MMX, Pentium Pro, Celeron,
PII, PIII,P4, Xeon • Study on Hyper-threading and Dual-Core Technology •
Pipelining and super-scalar execution • Difference between RISC and CISC •
Discussion on Overdrive processor • Processor performance tests • AMD-
K5, K6, K7, Athlon, Duron, Cyrix- M II, Media GX • Multiprocessor configuration
• Using System Resources and Memory • Managing IRQ and I/O Base addresses.
• Configuring DMA Channels •Troubleshooting resource conflicts •
Memory management • The system and logical Memory Layouts • Adapter Memory
Configuration and optimization • Different Memory types • Discussion on
Cache Memory.
• Socket identification & I/O Slots • Study on LX, BX, ZX, 810,820,
815, 840 and 850 motherboard • Upgrading the motherboard and the processor
• Bus Slots and I/O Cards • Types of I/O Buses (ISA, EISA, MCA, VESA,
PCMCIA and PCI) • Study on Notebook and Laptop architecture.
Storage Devices
• Floppy Disk Controller and drive
• Read/write Heads and Head Actuators
• Sensors and motors in a FDD • Analyzing floppy disk and drive construction
• Data organization in floppy disk • Analyzing problems in FDD.
Hard Disk Drives
• Data encoding scheme (FM, MFM, RLL)
• Different HDD interface (ST-506/412, ESDI, IDE) • Study on SCSI interface
• Data organization (MBR, DBR, FAT) • Data recovery using Various tools
• Hard Disk Limitations (File System and BIOS) • Introduction to Disk
Arrays (RAID) • Analyzing and troubleshooting
Hard Disk Drive
• Introduction to Tape Drives
Optical Storage Device
• Introduction to CD-ROM, DVD, CD-RW
• Encoding and data organization in CD-ROM • Multiread and Universal Disk
Format (UDF)
• Troubleshooting CD-ROM Drives
• Introduction to MO Drives
VIRUS
• Virus History • Types of viruses (Trojans, File, Boot sector, etc.)
• Installing different Antivirus packages
Communication Ports and Modem
• Using communication ports and devices • Serial port configuration •
Null Modem Configuration (RS-232) • Modem Standards • Configuring modem
for internet connectivity • Internet concept and browsing • Introduction
of USB
Parallel Ports and Printers
• Parallel port configuration • Detecting and testing Parallel port using
DEBUG • Introduction
to Printers • Printer working concepts (DMP,
Inkjet, LaserJet) • Detailed study about dot-
matrix and inkjet printers • Troubleshooting printer • Introduction
Scanners
Software and Hardware Diagnostic Tools
• Power-on Self Test (POST) • Using AMIDIAG, Norton Diagnostics, QAPLUS
and MSD • GUI based Diagnostics Utility
Operating system and hardware
troubleshooting
• Differentiating problems between Hardware, software and OS • Potential
system problems
• Diagnosing problems through Beep Sounds
• Analyzing and repairing hardware problem
• Advanced Troubleshooting
Monitors and Power Supply
• Power supply functions and operation • AT and ATX power supply •
Repairing a power supply
• Introduction to monitors • Identifying different sections in monitor
• Basic troubleshooting of monitors
Introduction to Networking
• Network Cabling and Interfaces • Introduction to Baseband and
broadband • Network Cable Types (Co-axial, Twisted pair, Fiber Optic) •
Network Technologies (Ethernet, Token Ring) • Discussion on ISO/OSI Model and
Network Protocol
CompTIA - N+
Basic Network Theory
• Network Definitions • Network Models
• Connectivity • Network Addressing • Signaling Concepts
Network Connectivity
• The Data Package • Establishing a Connection • Reliable Delivery
• Network Connectivity
• Noise Control • Building Codes • Connection Devices
Advanced Network Theory
• The OSI Model • Ethernet • Network Resources • Token Ring/IEEE
802.5 • FDDI • Wireless Networking
Common Network Protocols
• Families of Protocols • NetBEUI • Bridges and Switches • The
TCP/IP Protocol • Building a TCP/IP Network • The TCP/IP Suite
TCP/IP Services
• Dynamic Host Configuration Protocol • DNS Name Resolution • NetBIOS
Support• SNMP
• TCP/IP Utilities • Upper Layer Services: FTP
Alternate Network Protocols
• Introduction to IPX/SPX • AppleTalk
• Introduction to Apple Open Transport
• Introduction to Ipv6
Network LAN Infrastructure
• Implement LAN Protocols on a Network • IP Routing • IP Routing
Tables • Router Discovery Protocols • Data Movement in a Routed Network
• Virtual LANs (VLANs)
Network WAN Infrastructure
• The WAN Environment • WAN Transmission Technologies • WAN Connectivity
Devices • Voice Over Data Services
Remote Networking
• Remote Networking • Remote Access Protocols
• VPN Technologies
Network Security
• Introduction to Network Security • Virus Protection • Local Security
• Network Access
• Internet Security
Disaster Recovery
• The Need for Disaster Recovery • Disaster Recovery Plan • Data
Backups • Fault Tolerance
Advanced Data Storage Techniques
• Enterprise Data Storage • Clustering • Network Attached Storage
• Storage Area Networks
Network Troubleshooting
• Using a Systematic Approach to Troubleshooting • The Network Baseline
Network Operating Systems
• Novell NetWare • Microsoft BackOffice • Linux History and Operation
• Macintosh
CompTIA - SECURITY+
Identifying Security Threats • Importance of security
in a network • Identify Social Engineering Attacks • Attackers goal •
Consideration when setting up a security
Security Basics
• Functions of cryptography • Classify Network Attacks • Classify
Software-based Attacks • Basic components of cryptography Hardening Internal
Systems and Services • Harden Base Operating Systems • Harden Directory
Services • Harden DHCP Servers • Harden Network File and Print Servers
• Hardening Internetwork Devices and Services • Harden Internetwork Connection
Devices • Harden DNS and BIND Servers • Harden Web Servers • Harden
FTP Servers • Harden Network News Transport Protocol (NNTP) Servers •
Harden Email Servers • Harden Conferencing and Messaging Servers
Securing Network Communications
• Secure Client Internet Access • Secure Network Traffic Using IP Security
(IPSec) • Encrypting the communication using IP Sec • Secure Wireless
Traffic • Secure the Remote Access Channel
Managing Public Key Infrastructure (PKI)
• Install a Certificate Authority (CA) Hierarchy • Harden a Certificate
Authority • Back Up Certificate Authorities • Restore a Certificate Authority
Managing Certificates • Enroll Certificates for Entities • Secure Network
Traffic Using Certificates • Renew Certificates • Revoke Certificates
• Back Up Certificates and Private Keys • Restore Certificates and Private
Keys Applying Certificates • Using Certificates to protect Web site •
Using Certificates to protect POP3 and IMAP4 • Using Certificates in IPSec
Environment Enforcing Organizational Security Policy • Enforce Corporate Security
Policy Compliance • Enforce Legal Compliance • Enforce Physical Security
Compliance • Educate Users Monitoring the Security Infrastructure • Scan
for Vulnerabilities • Monitor for Intruders • Respond to Security Incidents
Cisco – CCNP (642-901):
Building Scalable Cisco Internetworks (BSCI)
• Scaling large networks • IP addressing
• Understanding VLSM,CIDR • IPV6 addressing operations • IPv6 interoperation
with Ipv4
• Configuring and verifying EIGRP • Configuring and verifying Integrated
IS-IS • Functions and operation of OSPF in multi-areas • Configuring stub,
totally stub, NSSA • Verifying and troubleshooting OSPF • Route Redistribution
• Configuring DHCP services • Route-filtering
• BGP Basic Concepts • BGP Advanced Features
• Implementing Multicast forwarding(PIM-SM,DM) • IGMP
(642-812): Building Cisco Multilayer Switched Networks (BCMSN)
• The campus and Network Design • Switching Technologies • Implementing
VLAN and Trunks
• Implementing Trunks with ISL and 802.1Q
• Explain the Functions and operations of STP and RSTP •Implementing PVRST
and MST • Inter-VLAN Routing • Multilayer Switching • Implementing
Gateway redundancy with HSRP, VRRP and GLBP. • Configuring wireless client
access • Describe the client devices, network unification and mobility platforms
• Explain the Layer2 attacks (Mac-flooding, Rogue Devices, DHCP Spoofing etc)
• Port-security, 802.1x, VACLS, PVLANS, DHCP Snooping and DAI •Characteristics
of voice in the campus network •Configure and verify basic IP Phone
(642-825) Implementing Secure Converged Wide Area Networks (ISCW)
• Implement basic Tele-worker services • Describe xDSL Technologies •Configuring
ADSL Technologies • Describe the components and operation of frame-mode MPLS
• Configuring and verifying frame-mode MPLS • Implementing SITE-TO-SITE
VPN • Pre-shared keys • Configuring and verifying VPN backup interfaces
• Cisco Easy VPN • Describe and mitigate the common network attacks •
Implement Cisco Device Hardening • Describe and configure CISCO IOS Firewall
• Describe and configure CISCO IOS IPS •Working and SDM
(642-845) Optimizing converged Cisco Networks
• Functions and operations of VOIP Network • Describe and verify basic
components in the Enterprise Network • Necessity and strategy of QoS implementation
in converged Networks • Describe and Implement the DiffServ QoS • Traffic
Shaping and Traffic Policing • Control Plane Policing • Explain the operation
of AutoQoS • SDM QoS wizard • Implementing WLAN Securing and Management
• WLSE and WCS • Describe and configure WLAN QOS
Cisco – CCSP
(642-551) Securing Cisco network devices (SND)
• Planning a secure network • Mitigating the network attacks • Introducing
the Cisco security portfolio • Building the Cisco self-defending networks •
Securing Administrative access to Cisco routers • Configuring the AAA on Cisco
routers • Configuring the CSACS on windows servers • Mitigating threats
and attacks with access-lists • Securing catalyst switches and mitigating the
attacks • Introduction and configuring the pix through CLI and PDM • Introduction
and configuring the IPS through CLI AND IDM • Introducing and deploying
the Cisco security through CSAMC • Building and configuring the IPSEC VPN •
Configuring the VPN CLIENT
(642-502) Security networks with Cisco routers and switches (SNRS)
• Deploying CSACS for windows server • Configuring the RADIUS and TACACS+
with
|
|