Network Engineering Package

A+ Essentials

+ Computer Components Identification
+ Assemble and Disassemble
Computer Components
+ Components in Portable Computers
+ Devices Installation and Configuration
+ Characteristics of Cabling and their Connectors
+ Common IDE, SCSI and Peripheral Devices
+ Optimize PC Operations Optimization
+ Determine the Issues that must be
Considered when upgrading a PC
+ Popular CPU Chips
+ Types of Memory (RAM)
+ Types of Motherboards and their Components
+ Printer Technologies, Interfaces 
and Options/Upgrades
+ Troubleshoot Common Printer Problems
+ Operating System Fundamentals OS Installation
+ Common Error Codes Interpretation
+ Networking Capabilities of Windows
+ Basic Internet Protocols and Terminologies
+ Procedures for Establishing Internet Connectivity

CCNA

+ Fundamentals of Networking
+ OSI Reference Model and TCP/IP Protocol Suite
+ Functions of Transport Layer Protocols of TCP/IP
+ Functions of Internet Layer Protocol
+ IP Addressing V4
+ IP Subnetting
+ Math Operations Used When Subentting
+ IP Routing
+ Three layer Hierarchical model 
+ VLSM and Route Summarization
+ Auto Summarization
+ Packet delivery process
+ Managing Router Startup and Configuration
+ Router Configuration and Verification
+ Interface Configuration and Verification
+ Operating Cisco IOS
+ Device Configuration, IOS backup and Restoration
+ Different Forms of Routing
+ Link State Routing Protocol
+ Dynamic Routing Protocol
+ Advanced Dynamic Routing Protocols
+ EIGRP
+ OSPF
+ Fundamentals of LANs
+ LAN Switching
+ Ethernet Switch Configuration
+ Configuring the Switch for Remote Access
+ Port Security 
+ Troubleshooting LAN Switching
+ VLAN and Trunks
+ VLAN Trunking Protocol (VTP)
+ Preventing Bridging Loops
+ Inter VLAN Routing
+ Access Control List
+ Standard ACL Operation
+ Extended ACL Operation
+ ACL Editing and Troubleshooting
+ Conserving IP Address Space
+ Network Address Translation (NAT)
+ IP version 6
+ Different WAN Technologies 
+ Advanced Wide Area Network
+ Frame Relay
+ Virtual Private Network
+ Wireless Network Technologies
+ PPP Concepts & Configuration
+ Securing the Router CLI
+ Remote Access to the router using Telnet and SSH
+ Network Utilities
+ Troubleshooting Routing Protocols

CCNP – Switch

+ VLAN Trunks & DTP
+ Switch Operation
+ Switch Port Configuration
+ CAM & TCAM Table Operation
+ VTP Configuration
+ VTP Pruning
+ Virtual LANs
+ Traditional Spanning Tree Protocol 
+ Common Spanning Tree
+ Per-VLAN Spanning Tree & PLUS
+ Tuning the Root Path Cost & Port ID
+ Modifying STP Timers
+ Root Guard, BPDU Guard
+ Loop Guard, UDLD
+ Rapid Spanning Tree Protocol
+ Rapid Per-VLAN Spanning Tree Protocol
+ Multiple Spanning Tree Protocol
+ Hot Standby Router Protocol
+ Virtual Router Redundancy Protocol
+ Gateway Load Balancing Protocol
+ Switch Port Aggregation with Ether Channel
+ Port Security
+ Port-Based Authentication
+ DHCP Snooping, IP Source Guard
+ VLAN Access Lists 
+ Private VLANs
+ Port Fast: Access-Layer Nodes
+ Backbone Fast: Redundant Backbone Paths
+ Multilayer Switching 
+ InterVLAN Routing
+ Multilayer Switching with CEF
+ Using DHCP with a Multilayer Switch
+ IP Telephony 
+ Power over Ethernet
+ Configuring PoE
+ Voice VLANs
+ Voice Qos
+ Cisco Unified Wireless Network Architecture
+ Configuring Switch Ports for WLAN Use
+ Layer 3 High Availability
+ Integrating Wireless LANs
+ Securing Switch Access
+ Securing with VLANs

Installing and Configuring Windows 7 (MCTS)

+ Installing Windows 7
+ Preparing the Windows 7 Installation Source
+ User and Group Management
+ Password Reset Disk
+ Parental Control
+ Upgrading to Windows 7
+ User Profiles Management
+ System Images Capturing
+ Virtual Hard Disk Files
+ Application Compatibility
+ Introducing Windows 7
+ Windows Aero and Mouse operations
+ Switching Users
+ Disks and Device Drivers
+ Network Settings
+ IPv4/IPv6 Configuration
+ Network Configuration
+ Folder and File Access
+ BranchCache
+ Printers in Windows 7
+ Windows 7 Desktops Security
+ Windows 7 Client Computers
+ Mobile Computing and Remote Access in Windows 7

Red Hat System Administration I (RH124)

+ Get Started with the GNOME Graphical Desktop
+ Manage Files Graphically with Nautilus
+ Get Help in a Graphical Environment
+ Configure Local Services
+ Manage Physical Storage I
+ Manage Logical Volumes
+ Monitor System Resources
+ Manage System Software
+ Get Started with Bash
+ Get Help in a Textual Environment
+ Establish Network Connectivity
+ Administer Users and Groups
+ Manage Files from the Command Line
+ Secure Linux File Access
+ Administer Remote Systems
+ Configure General Services
+ Manage Physical Storage II
+ Install Linux Graphically
+ Manage Virtual Machines
+ Control the Boot Process
+ Deploy File Sharing Services
+ Secure Network Services

Cisco ASA

Pre-Production Design 
+ Choose ASA Perimeter Security technologies/features to implement HLD based on givensecurity requirements
+ Choose the correct ASA model to implement HLD based on given performance requirements
+ Create and test initial ASA appliance configurations using CLI
+ Determine which ASA licenses will be required based on given requirements
Complex Operations Support
+ Optimize ASA Perimeter Security features performance, functions, and configurations
+ Create complex ASA security perimeter policies such as ACLs, NAT/PAT, L3/L4/L7 statefulinspections, QoS policies, cut-thru proxy, threat detection, botnet detection/filter using CLIand/or ASDM
+ Perform initial setup on the AIP-SSM and CSC-SSM using CLI and/or ASDM
+ Configure, verify and troubleshoot High Availability ASAs (A/S and A/A FO) operations usingCLI and/or ASDM
+ Configure, verify and troubleshoot static routing and dynamic routing protocols on the ASAusing CLI and/or ASDM
+ Configure, verify and troubleshoot ASA transparent firewall operations using CLI
+ Configure, verify and troubleshoot management access/protocols on the ASA using CLI and/or ASDM 
Describe Advanced Troubleshooting 
+ Advanced ASA security perimeter configuraiton/software/hardware troubleshooting using CLIand/or ASD fault finding and repairing

Network + Essentials

+ Logical or Physical Network Topologies 
+ Networking Standards
+ Characteristics of Different Types of Cables
+ Different media Connectors and Describe
their uses
+ Purposes, Features and Functions of
Network Components
+ General Characteristics of the Different
wireless technologies
+ Different Network Protocols
+ Classful IP and Their Subnet Masks
+ Subnetting
+ Private and Public network addressing schemes
+ WAN Technologies
+ Security protocols and authentication protocols
+ Basic capabilities different server 
operating systems
+ Antivirus software
+ Fault Tolerance
+ Network Utility to Troubleshoot Networks
+ Impact of modifying, adding or removing
network services
+ Network Troubleshooting with Physical Topology

CCNP – Route

+ EIGRP Overview and Neighbour Relationships 
+ Manipulating EIGRP Hello and Hold Timers
+ EIGRP Metric Tuning(Bandwidth, Delay & K Values)
+ Configuration Settings That Could Prevent Neighbour Relationships
+ Controlling Neighbour ships Using EIGRP Authentication
+ The Content of EIGRP Update Message
+ Optimizing EIGRP Convergence
+ Fast Convergence to Feasible Successors
+ Neighbour ship on Frame Relay
+ WAN Issues for EIGRP Topology Exchange
+ EIGRP Route Summarization and Filtering 
+ OSPF Overview and Neighbour Relationships 
+ LSAs and the OSPF Link State Database
+ OSPF Neighbours and Adjacencies on LANs
+ Understanding OSPF Virtual Link Concepts
+ Route Filtering & Route Summarization
+ Manual Summarization at ABRs & ASBRs
+ OSPF Route Summarization, Filtering, and Default Routing 
+ Default Routes and Stub Areas
+ OSPF Frame Relay Operations 
+ Basic IGP Redistribution 
+ Advanced IGP Redistribution 
+ Policy-Based Routing and IP Service Level Agreement 
+ Understanding IP SLA Concepts
+ Introduction to BGP
+ BGP ASNs and the AS_SEQ Path Attribute
+ Internal and External BGP
+ BGP Path Control 
+ Verifying the BGP Table
+ Single Homed
+ Dual Homed
+ Single Multihomed
+ Dual Multihomed
+ MED Configuration
+ IP Version 6 Addressing
+ RIP Next Generation (RIPng)
+ IPv6 IGP Redistribution
+ IPv4 and IPv6 Coexistence 
+ IPv4/IPv6 Dual Stacks Tunnelling
+ Automatic to Tunnels
+ IPv6 ISATAP Tunnels
+ Multipoint IPv6 Tunnel 
+ Configuring DHCP Server
+ VPN Configuration
+ Configuring an IPsec VPN
+ Configuring GRE Tunnels
+ Routing over Branch Internet Connections

CCNP – T.Shoot

+ Basic Network Maintenance Tools
+ Network Documentation Tools
+ Incident Recovery Tools
+ Monitoring and Measuring Tools
+ Introduction to Troubleshooting Processes 
+ The Maintenance and Troubleshooting Toolbox 
+ Basic Cisco Catalyst Switch Troubleshooting 
+ STP Troubleshooting Issues
+ Advanced Cisco Catalyst Switch Troubleshooting 
+ Router Redundancy Troubleshooting
+ HSRP, VRRP , GLBP 
+ Introduction to Troubleshooting Routing Protocols 
+ Layer 3 Troubleshooting
+ OSPF and Route Redistribution Troubleshooting 
+ OSPF Troubleshooting
+ Troubleshooting BGP and Router Performance Issues 
+ BGP Troubleshooting Issues
+ Security Troubleshooting 
+ IP Services Troubleshooting 
+ IP Communications Troubleshooting 
+ IPv6 Troubleshooting 
+ Advanced Services Troubleshooting 
+ Large Enterprise Network Troubleshooting
+ Trouble shooting and Monitoring tools
+ Trouble shooting scenarios for the concepts in routing and switching

MCITP Server Administration: Windows Server 2008 Administration

+ Windows Server 2008 Installation and Administration
+ Automated Server Deployment
+ Windows Deployment Services and Network 
Connectivity
+ IPv6 in Windows Server 2008
+ Domain and Forest Functionality
+ Group Policy in Windows Server 2008
+ Application Servers and Deployment
+ Server and Application Virtualization
+ Terminal Services RemoteApp
+ File and Print Servers
+ Provisioning Data and Credential Delegation
+ Remote Administration Technologies
+ Windows Server 2008 Patch Management 
Strategies
+ Replica Mode and Autonomous Mode
+ WSUS (Windows Server Update Services)
+ Server Security and Remote Access
+ VPN (Virtual Private Network) Protocols
+ Network Policy Server and Remote Access 
Accounting
+ Network Access Protection
+ Storage Area Networks and Logical Unit Numbers
(LUN)
+ Certificate Services Role-Based Administration
+ Credential Roaming and Web Enrollment Support
+ Online Responder for Certificate Services
+ Network Device Enrollment Service
+ Clustering and High Availability
+ Backing Up Data and Disaster Recovery

CCSA (Checkpoint Certified Security Administrator)

1. DefiningaFirewall 
+ What is a Firewall?
+ Type of the Firewall
+ Packet Filtering
+ Application Layer Gateway (Proxy)
+ Check Point’s Stateful Inspection Technology
2. CheckPoint Firewall-1 Architecture 
+ How Check Point Firewall-1 Works?
+ Check Point Firewall-1 Components and Modules
+ Check Point Firewall-1 Kernel
+ Check Point Firewall-1 Daemon
3. CheckPoint Firewall-1 Overview 
+ Methods of securing networks
+ Check Point Firewall-1 Architecture
+ Secure Internal Communications
+ Distributed client/server model
+ Application Intelligence technology
4. Security Policy
+ Security Policy definition
+ SmartDashboard
+ Access control for administrators
+ Creating the Rule Base
+ Implicit and explicit rules
+ Command-line options for the Security Policy
5. FireWall-1 Setup and Installation
+ Pre-installation Configuration
+ System Requirement
+ How to install license
+ Install additional firewall module
6. Working with the Smart Dashboard
+ Masking and disabling rules
+ Uninstalling a Security Policy
+ Improving VPN-1/FireWall-1 performance
7. Understanding Rule Base Order
+ What is a Rule Base
+ How to create Rule Base
+ Important of the Rule Base Order
+ Implicit and Explicit Rules
+ FW1 Control Connections
+ Outgoing Packets
+ Additional Settings
+ Implicit Drop Rule
8. Troubleshooting the Security Policy
+ Maximum number of rules and objects
+ Deleting Administrator accounts
+ Deleting Administrator accounts
9.Detecting Hacking Method–Spoofing 
+ What is Spoofing
+ Anti-Spoofing Configuration
10. Advanced Security Policy
+ Masking Rules
+ Disabling Rules
+ Uninstalling a Security Policy
+ Security Policy File
+ Command Line Options for the Security Policy
11. Log Management
+ Log Viewer GUI
+ Log Viewer Modes
+ Creating and Selecting Selection Criteria
+ Blocking Connections
+ Block Intruder
+ System Status GUI
+ System Status Logon
+ Log Viewer Modes
+ Creating and Selecting Selection Criteria
+ Blocking Connections
+ Block Intruder
12. Authentication and Authentication Parameters
+ Understanding Authentication
+ How User Authentication Works
+ Type of Authentication
+ User Authentication
+ Client Authentication
+ Session Authentication
13. Authentication Schemes
+ Defining a User Template
+ Defining Users and Groups
14. Network Address Translation(NAT)
+ How NAT Works
+ Type of NAT
+ Static NAT
+ Hide NAT
+ Address Resolution Protocol (ARP)
+ NAT Routing
+ Static NAT and Anti-Spoofing
+ Troubleshooting NAT

CCNA Security

+ Understanding Network Security Principles
+ Developing a Secure Network
+ Defending the Perimeter
+ Configuring AAA
+ Securing the Router
+ Securing Layer 2 Devices
+ Implementing Endpoint Security
+ Providing SAN Security
+ Exploring Secure Voice Solutions
+ Using Cisco IOS Firewalls to Defend the Network
+ Using Cisco IOS IPS to Secure the Network
+ Designing a Cryptographic Solution
+ Implementing Digital Signatures
+ Exploring PKI and Asymmetric Encryption
+ Building a Site-to-Site IPsec VPN Solution

REQUEST A FREE QUOTE

Curriculum of all the programs are as per International Standards set by Principles of the resective technology. 
To join for any of the courses or for further details reach us @ IIHT-VPN or call us at 9677055562 / 044-43069570.

  • International Standard Syllabus.
  • International Standard Materials.
  • State of the Art Infrastructure.
  • Qualified & Service Minded Mentors i.e, Trainers.
  • Convenient Timings (exclusive Day, Evening, Weekend batches for Employed & College Students).
  • Real-Time, Practicals, Presentations, Videos, Debates, Assignments, Case Study, based Trainings.
  • Unlimited Evaluations during training sessions.
  • Unlimited Lab Access.
  • Life Long Support System.
  • Exclusive Communication & Attitude Development training.
  • Exhaustive Interview Training.
  • Unique Employability Training.
  • Special Apperance of Real-Time Experts for considerable duration, at the end of course.
  • Unlimited Interviews.
  • After-Interview Training at the end of each interview.
  • Assured Placement Assistance for continous 3 positions of the Job.
  • Technical Assistance on the Real Time Scenarios, even after completing the course and got Placed.
  • Life long Technology, Industry, Placement Updates.
  • Connectivity to the Industrial Experts for rich Technical aid for entire life time.
  • Access to Online – technology, Career Resources.
  • Exclusive International Certification Preparation Training.
  • Convenient transfer facility to 220+ branches across the Globe.
Top