Server Engineering Package

A+ Essentials

+ Computer Components Identification
+ Assemble and Disassemble
Computer Components
+ Components in Portable Computers
+ Devices Installation and Configuration
+ Characteristics of Cabling and their Connectors
+ Common IDE, SCSI and Peripheral Devices
+ Optimize PC Operations Optimization
+ Determine the Issues that must be
Considered when upgrading a PC
+ Popular CPU Chips
+ Types of Memory (RAM)
+ Types of Motherboards and their Components
+ Printer Technologies, Interfaces 
and Options/Upgrades
+ Troubleshoot Common Printer Problems
+ Operating System Fundamentals OS Installation
+ Common Error Codes Interpretation
+ Networking Capabilities of Windows
+ Basic Internet Protocols and Terminologies
+ Procedures for Establishing Internet Connectivity

MCITP – Enterprise Server

+ Introduction to windows 7
+ Windows 7 Editions
+ Windows 7 Hardware Requirements
+ Features of Windows 7
+ Performing fresh Creating a Password Reset Disk
+ Parental Control
+ Network configuring
+ Configuring disk quotas
+ Managing branch cache
+ Hosted Cache Mode
+ Distributed Cache Mode
+ Securing data by using EFS and bit locker
+ Local security policy settings
+ Windows 7performance tools
+ System restore in windows 7
+ Managing Virtual Hard Disk Files
+ Managing User and Groups
+ Introduction to windows server 2008
+ Features of windows server 2008
+ Windows Server 2008 Installation and Administration
+ Server core Installation
+ Introduction to Workgroup
+ Domain and its types
+ Domain controller and its types
+ Forest & Site
+ Introduction to active directory
+ Managing User accounts, Groups and OU
+ User profile and its types
+ Provisioning Data and Credential Delegation
+ NTFS Permission
+ Home Folder
+ Quota Management
+ Volume Shadow copy
+ Configuring Web server and File server
+ Introduction to SMTP server
+ Implementing Fault tolerance
+ Configuring different RAID levels
+ Introduction to RODC
+ CSVDE and LDIFDE
+ Introduction to IP Addressing
+ IPv6 in Windows Server 2008
+ Subnetting
+ Naming Servers
+ Domain Naming Service
+ Records and Types of DNS
+ Recursive and Iterative Queries
+ Zones of DNS
+ Dynamic Host configuration Protocol
+ DHCP DORA Process
+ Scope of DHCP
+ Networking commands
+ Windows Deployment server
+ Script for WDS
+ Application Servers and Deployment
+ Terminal Services
+ Roles of Terminal services
+ Remote Administration Technologies
+ Network Access Protection
+ Network policy server
+ Remote Accessing Server
+ Routing
+ NAT
+ Introduction to IPSEC
+ Firewall
+ Public key Infrastructure
+ Introduction to Clustering
+ Networking Load Balancing
+ Storage Technologies
+ Storage Area Networks and Logical Unit Numbers (LUN)
+ Fail Over Clustering
+ Implementing AD Forest
+ Introduction to AD Partition;
+ FSMO roles
+ Forest Wide Role
+ Domain Wide Role
+ Transferring and Seizing of Operations Master Roles
+ Replication services
+ Active Directory Sites
+ Configuring Intra site and Inter site Replication
+ Global Catalog
+ Bridge Head Server
+ UGMC
+ Trust Relationship
+ Conditional Forwarders
+ Distributed File System
+ Backing Up Data and Disaster Recovery
+ AD backup and its Type
+ DSRM & IFM
+ Metadata cleanup
+ AD Defragmentation
+ Group policy Object
+ Security and Audit policy
+ WSUS Administration
+ Introduction to ADCS
+ Introduction to ADLDS
+ Introduction to ADFS
+ Introduction to ARMS
+ Event Viewer
+ Networking monitoring Tools
+ Replication and Troubleshooting Tools
+ Introduction to windows server 2008 R2
+ Hyper – V

TS: System Center Virtual Machine Manager 2008, Configuring

Installing SCVMM
+ Install SCVMM server components
+ Install self-service portal
+ Install PRO tips
Administering SCVMM
+ Configure user roles
+ Setup self service
+ Maintain VMM library
+ Configure hosts
+ Monitor jobs
Maintaining and Monitoring VMs
+ Configure VM hardware
+ Manage virtual instance checkpoints and patches
+ Monitoring and reporting VMs
Deploying and Migrating VMs
+ Convert from physical or virtual platforms
+ Move VMs between hosts
+ Deploy VMs
+ Deploy a High Availability VM

CCNA

Red Hat Enterprise Linux Virtualization with KVM overview
+ Advanced Red Hat Enterprise Linux Virtualization with KVM
+ Overview of RHEV platform
+ Creating and configuring: Data Centers, Host Clusters and RHEV-M
+ Installing and upgrading RHEV-H
+ Configure Data, ISO and Export storage domains using NFS and iSCSI
+ Create and manage Virtual Servers and Virtual Desktops
+ Create and manage Snapshots and Templates
+ Create and manage users and Desktop Pools
+ Exporting/importing virtual machines

RH318 Red Hat Enterprise Virtualization (RHCVA)

1. DefiningaFirewall 
+ What is a Firewall?
+ Type of the Firewall
+ Packet Filtering
+ Application Layer Gateway (Proxy)
+ Check Point’s Stateful Inspection Technology
2. CheckPoint Firewall-1 Architecture 
+ How Check Point Firewall-1 Works?
+ Check Point Firewall-1 Components and Modules
+ Check Point Firewall-1 Kernel
+ Check Point Firewall-1 Daemon
3. CheckPoint Firewall-1 Overview 
+ Methods of securing networks
+ Check Point Firewall-1 Architecture
+ Secure Internal Communications
+ Distributed client/server model
+ Application Intelligence technology
4. Security Policy
+ Security Policy definition
+ SmartDashboard
+ Access control for administrators
+ Creating the Rule Base
+ Implicit and explicit rules
+ Command-line options for the Security Policy
5. FireWall-1 Setup and Installation
+ Pre-installation Configuration
+ System Requirement
+ How to install license
+ Install additional firewall module
6. Working with the Smart Dashboard
+ Masking and disabling rules
+ Uninstalling a Security Policy
+ Improving VPN-1/FireWall-1 performance
7. Understanding Rule Base Order
+ What is a Rule Base
+ How to create Rule Base
+ Important of the Rule Base Order
+ Implicit and Explicit Rules
+ FW1 Control Connections
+ Outgoing Packets
+ Additional Settings
+ Implicit Drop Rule
8. Troubleshooting the Security Policy
+ Maximum number of rules and objects
+ Deleting Administrator accounts
+ Deleting Administrator accounts
9. Detecting Hacking Method–Spoofing 
+ What is Spoofing
+ Anti-Spoofing Configuration
10. Advanced Security Policy
+ Masking Rules
+ Disabling Rules
+ Uninstalling a Security Policy
+ Security Policy File
+ Command Line Options for the Security Policy
11. Log Management
+ Log Viewer GUI
+ Log Viewer Modes
+ Creating and Selecting Selection Criteria
+ Blocking Connections
+ Block Intruder
+ System Status GUI
+ System Status Logon
+ Log Viewer Modes
+ Creating and Selecting Selection Criteria
+ Blocking Connections
+ Block Intruder
12. Authentication and Authentication Parameters
+ Understanding Authentication
+ How User Authentication Works
+ Type of Authentication
+ User Authentication
+ Client Authentication
+ Session Authentication
13. Authentication Schemes
+ Defining a User Template
+ Defining Users and Groups
14. Network Address Translation(NAT)
+ How NAT Works
+ Type of NAT
+ Static NAT
+ Hide NAT
+ Address Resolution Protocol (ARP)
+ NAT Routing
+ Static NAT and Anti-Spoofing
+ Troubleshooting NAT

Fundamentals of Data Center Management

The Data Centre Operations Team
+ Vendor Management
+ Maintenance Contracts
+ Managing Safety & Statutory Requirements
+ Service Level Agreement (SLA) Management
+ Managing Physical Security
+ Managing Daily Data Centre Operations / Floor Management
+ Capacity Management
+ Cable Management
+ M&E Maintenance Regime
+ Data Centre Monitoring and Automation
+ Managing Documentations/Archives
+ Equipment Life-Cycle Management

Network + Essentials

+ Logical or Physical Network Topologies 
+ Networking Standards
+ Characteristics of Different Types of Cables
+ Different media Connectors and Describe
their uses
+ Purposes, Features and Functions of
Network Components
+ General Characteristics of the Different
wireless technologies
+ Different Network Protocols
+ Classful IP and Their Subnet Masks
+ Subnetting
+ Private and Public network addressing schemes
+ WAN Technologies
+ Security protocols and authentication protocols
+ Basic capabilities different server 
operating systems
+ Antivirus software
+ Fault Tolerance
+ Network Utility to Troubleshoot Networks
+ Impact of modifying, adding or removing
network services
+ Network Troubleshooting with Physical Topology

RH-124

+ Introduction to Unix
+ Unix Architecture
+ Introduction to Linux
+ Linux Features
+ Basic commands
+ Using the GNOME desktop & KDE Desktop
+ Introduction to Bash
+ System Information Commands
+ Listing commands
+ Editor commands using VI or VIM, NANO,GEDIT
+ Scripting commands using AWK,SED,ECHO,WHICH
+ Linux Directory Hierarchy
+ File Components
+ Hard link, Block, directory, device files and soft link
+ Disk Management
+ Partition and types of Partition
+ Partitioning Using FDISK
+ Partition using Parted
+ File system
+ Mount and Unmount File system
+ Managing SWAP space
+ To boot the system to install Linux using GUI
+ User administration
+ Managing User and Group Accounts
+ User profile customization
+ Process Administration
+ Cron and At
+ Package administration Using RPM
+ File permission
+ Administration of quota management
+ Managing User and group quota
+ Boot process
+ Init
+ run levels
+ Booting an alternate kernel
+ Network related commands
+ Assigning the IP Address and hostname
+ Static and Dynamic Route Configuration
+ Bash Scripting and Tools

RH-135

+ Server – Client relationship
+ YUM server configuration
+ Handle Third-Party Software
+ DHCP server configuration
+ The DHCP client
+ DNS server configuration
+ Record of DNS
+ Zones of DNS
+ Apache or web server Configuration
+ NFS server configuration
+ NIS server configuration
+ Configuring NIS Client
+ Synchronize time using NTP peers
+ Samba server configuration or CIFS
+ Squid server configuration
+ Blocking the particular Hosts
+ Mail server configuration
+ Configuring FTP service

RH-255

+ Remote login connection
+ Secure access to remote GNOME desktop
+ Configuring CUPS
+ Introduction to LDAP server
+ Host Based and Network Based Security
+ IP tables
+ Configuring NAT
+ SSH Port Forwarding
+ IP forwarding
+ SELINUX
+ System monitoring and Logs
+ Network Mapping Using NMAP
+ Linux kernel
+ Web Server Security
+ Managing Flexible storage with Logical Volume Manager
+ Redundant array of inexpensive disks
+ Types and levels of RAID
+ Centralized and secure storage
+ KVM virtualization
+ KICKSTART INSTALLATION
+ Linux Troubleshooting
+ Root password recovery
+ Trouble shooting the Boot process
+ System Recovery Techniques
+ GRUB mode recovery both single user mode and rescue mode

CCNA – ICND-1

+ Fundamentals of Networking
+ OSI Reference Model and TCP/IP Protocol Suite
+ Functions of Transport Layer Protocols of TCP/IP
+ Functions of Internet Layer Protocol
+ IP Addressing V4
+ IP Subnetting
+ Math Operations Used When Subentting
+ IP Routing
+ Three layer Hierarchical model
+ VLSM and Route Summarization
+ Auto Summarization
+ Packet delivery process
+ Managing Router Startup and Configuration
+ Router Configuration and Verification
+ Interface Configuration and Verification
+ Operating Cisco IOS
+ Device Configuration, IOS backup and Restoration
+ Different Forms of Routing
+ Link State Routing Protocol
+ Dynamic Routing Protocol
+ Advanced Dynamic Routing Protocols

REQUEST A FREE QUOTE

Courses

Curriculum of all the programs are as per International Standards set by Principles of the resective technology. 
To join for any of the courses or for further details reach us @ IIHT-VPN or call us at 9677055562 / 044-43069570.

Why IIHT-Vadapalani?

  • International Standard Syllabus.
  • International Standard Materials.
  • State of the Art Infrastructure.
  • Qualified & Service Minded Mentors i.e, Trainers.
  • Convenient Timings (exclusive Day, Evening, Weekend batches for Employed & College Students).
  • Real-Time, Practicals, Presentations, Videos, Debates, Assignments, Case Study, based Trainings.
  • Unlimited Evaluations during training sessions.
  • Unlimited Lab Access.
  • Life Long Support System.
  • Exclusive Communication & Attitude Development training.
  • Exhaustive Interview Training.
  • Unique Employability Training.
  • Special Apperance of Real-Time Experts for considerable duration, at the end of course.
  • Unlimited Interviews.
  • After-Interview Training at the end of each interview.
  • Assured Placement Assistance for continous 3 positions of the Job.
  • Technical Assistance on the Real Time Scenarios, even after completing the course and got Placed.
  • Life long Technology, Industry, Placement Updates.
  • Connectivity to the Industrial Experts for rich Technical aid for entire life time.
  • Access to Online – technology, Career Resources.
  • Exclusive International Certification Preparation Training.
  • Convenient transfer facility to 220+ branches across the Globe

Duration: 5 months (3hrs/day)

Top