Want create site? With Free visual composer you can do it easy.

Project Based Training programs

 VB.NET / C#.NET, ASP.NET 4.0,Mobile Appliction, .NET Framework,SQL

 

  • Introduction to Networking and the world wide web.
  • Building multi-tier enterprise applications.
  • Introduction to the .NET framework.
  • .NET Interoperation services.
  • Client side programming: HTTP, CGI, Cookies, JavaScript, HTML, XML.
  • Server side programming: Web Forms, ASP.NET Web Services, ADO.NET Data Access
  • Client/Server Programming, 3-tier architecture.
  • .NET Remoting.
  • NET Web services and web service security.
  • RESTful, SOAP, DISCO, and UDDI.
  • Simple Object Access Protocol (SOAP) and Web Services.
  • Software as a Service (SaaS).
  • Cross-Platform Mobile Application Development with HTML5 and PhoneGap

 Project Work

  • System Analysis & Design
  • SRS, FRS, DFD

Jobs:

After successfully completing the .net Course Certificate will be provided for the candidates. Those who were certified can get various job opportunities such as

  • .NET application engineer
  • Web application developer
  • NET MVC developer
  • .NET developer with MVC
  • Windows store app developer
OOPs in Java,Threading,Collection framework,Applets,Socket programming

 

Language Fundamentals the Java Environment:

  • Installing Java.
  • Java Program Development
  • Java Source File Structure
  • Compilation

Basic Language Elements:

  • Lexical Tokens, Identifiers
  • Keywords, Literals, Comments
  • Primitive Datatypes, Operators

Object Oriented Programming

  • Class Fundamentals.
  • Object & Object reference.
  • Object Life time & Garbage Collection.
  • Creating and Operating Objects.
  • Constructor & initialization code block.
  • Access Control, Modifiers, methods
  • Nested , Inner Class &Anonymous Classes
  • Abstract Class & Interfaces
  • Defining Methods, Argument Passing Mechanism
  • Method Overloading, Recursion.
  • Dealing with Static Members. Finalize() Method.
  • Native Method. Use of “this “ reference.
  • Use of Modifiers with Classes & Methods.
  • Design of Accessors and Mutator Methods
  • Cloning Objects, shallow and deep cloning
  • Generic Class Types

Extending Classes and Inheritance

  • Use and Benefits of Inheritance in OOP
  • Types of Inheritance in Java
  • Inheriting Data Members and Methods
  • Role of Constructors in inheritance
  • Overriding Super Class Methods.
  • Use of “super”.
  • Polymorphism in inheritance.
  • Type Compatibility and Conversion
  • Implementing interfaces.

Package

  • Organizing Classes and Interfaces in Packages.
  • Package as Access Protection
  • Defining Package.
  • CLASSPATH Setting for Packages.
  • Making JAR Files for Library Packages
  • Import and Static Import
  • Naming Convention For Packages

Exception Handling:

  • The Idea behind Exception
  • Exceptions & Errors
  • Types of Exception
  • Control Flow In Exceptions
  • JVM reaction to Exceptions
  • Use of try, catch, finally, throw, throws in Exception Handling.
  • In-built and User Defined Exceptions
  • Checked and Un-Checked Exceptions

Array & String:

  • Defining an Array
  • Initializing & Accessing Array
  • Multi –Dimensional Array
  • Operation on String
  • Mutable & Immutable String
  • Using Collection Bases Loop for String
  • Tokenizing a String
  • Creating Strings using StringBuffer

Thread :

  • Understanding Threads
  • Needs of Multi-Threaded Programming.
  • Thread Life-Cycle
  • Thread Priorities
  • Synchronizing Threads
  • Inter Communication of Threads
  • Critical Factor in Thread -DeadLock

Applet

  • Applet & Application
  • Applet Architecture.
  • Parameters to Applet
  • Embedding Applets in Web page.
  • Applet Security Policies

A Collection of Useful Classes

  • Utility Methods for Arrays
  • Observable and Observer Objects
  • Date & Times
  • Using Scanner
  • Regular Expression
  • Input/Output Operation in Java(java.io Package)
  • Streams and the new I/O Capabilities
  • Understanding Streams
  • The Classes for Input and Output
  • The Standard Streams
  • Working with File Object
  • File I/O Basics
  • Reading and Writing to Files
  • Buffer and Buffer Management
  • Read/Write Operations with File Channel
  • Serializing Objects

GUI Programming

  • Designing Graphical User Interfaces in Java
  • Components and Containers
  • Basics of Components
  • Using Containers
  • Layout Managers
  • AWT Componets
  • Adding a Menu to Window
  • Extending GUI Features Using Swing Components
  • Java Utilities (java.util Package)
  • The Collection Framework :
  • Collections of Objects
  • Collection Types
  • Sets
  • Sequence
  • Map
  • Understanding Hashing
  • Use of ArrayList & Vector

Event Handling

  • Event-Driven Programming in Java
  • Event- Handling Process
  • Event-Handling Mechanism
  • The Delegation Model of Event Handling
  • Event Classes
  • Event Sources
  • Event Listeners
  • Adapter Classes as Helper Classes in Event Handling
  • Anonymous Inner classes a Short –cut to Event Handling
  • Avoiding Deadlocks in GUI Code
  • Event Types & Classes
  • Networking Programming
  • Networking Basics
  • Client-Server Architecture
  • Socket Overview
  • Networking Classes and Interfaces
  • Network Protocols
  • Developing Networking Applications in Java

Database Programming using JDBC

  • Introduction to JDBC
  • JDBC Drivers & Architecture
  • CURD operation Using JDBC
  • Connecting to non-conventional Databases.

Mail API

  • Introduction to Email Technical Internals
  • Understanding of POP and SMTP framework
  • Complete understanding the email API
  • Mass mailer Application development
  • Introduction to J2EE
  • J2EE Overview
  • Why J2EE?
  • J2EE Architecture
  • J2EE APIs
  • J2EE Containers

Java Server Technologies Servlet

  • Web Application Basics.
  • Architecture and challenges of Web Application.
  • Introduction to servlet
  • Servlet life cycle
  • Developing and Deploying Servlets
  • Exploring Deployment Descriptor (web.xml).
  • Handling Request and Response
  • Initializing a Servlet
  • Accessing Database
  • Servlet Chaining
  • Session Tracking & Management
  • Dealing with cookies
  • Transferring Request
  • Accessing Web Context
  • Passing INIT and CONTEXT Parameter
  • Sharing information using scope object
  • Controlling concurrent access
  • User Authentication
  • Filtering Request and Response
  • Programming Filter
  • Filter Mapping
  • Servlet Listeners

Java Server Pages:

  • Basic JSP Architecture
  • Life Cycle of JSP (Translation, compilation)
  • JSP Tags and Expressions
  • Role of JSP in MVC-2
  • JSP with Database
  • JSP Implicit Objects
  • Tag Libraries
  • JSP Expression Language (EL)
  • Using Custom Tag
  • JSP Capabilities:
  • Exception Handling
  • Session Management
  • Directives
  • JSP with Java Bean

RMI (Remote Method Invocation)

  • RMI overview
  • RMI architecture
  • Example demonstrating RMI
  • Enterprise JAVA Beans
  • Enterprise Bean overview
  • Types of enterprise beans
  • Advantages of enterprise beans
  • The Life Cycles of Enterprise Beans
  • Working with Session Beans
  • Statefull vs. Stateless Session Beans
  • Working with Entity Beans
  • Message Driven Beans
  • JNDI (Java Naming and Directory Interface)
  • JNDI overview
  • JNDI API
  • Context operations
  • Using JNDI in J2EE applications

 Extras

  • Various interview questions covered along with the course. You will get to know live examples.

 Project work

  • System Analysis & Design
  • SRS, FRS, DFD

JAVA Concepts

  • OOPs Concepts
  • Inheritance in detail
  • Exception handling
  • Packages & interfaces
  • JVM & .jar file extension
  • Multi threading (Thread class & Runnable Interface)

 SQL

  • DML & DDL Queries in brief

Introduction to Android

  • What is Android?
  • Setting up development environment
  • Dalvik Virtual Machine & .apk file extension
  • Fundamentals:
  1. Basic Building blocks – Activities,Services,Broadcast Receivers & Content providers
  2. UI Components – Views & notifications
  3. Components for communication -Intents & Intent Filters
  • Android API levels (versions & version names)

Application Structure (in detail)

  • xml
  • uses-permission & uses-sdk
  • Resources & R.java
  • Assets
  • Layouts & Drawable Resources
  • Activities and Activity lifecycle
  • First sample Application

Emulator-Android Virtual Device

  • Launching emulator
  • Editing emulator settings
  • Emulator shortcuts
  • Logcat usage
  • Introduction to DDMS
  • Second App:- (switching between activities)
  • Develop an app for demonstrating the communication between Intents

 Basic UI design

  • Form widgets
  • Text Fields
  • Layouts
  • [dip, dp, sip, sp] versus px
  • Examples

Preferences

  • SharedPreferences
  • Preferences from xml
  • Examples

Menu

  • Option menu
  • Context menu
  • Sub menu
  • menu from xml
  • menu via code
  • Examples

 Intents (in detail)

  • Explicit Intents
  • Implicit intents
  • Examples

UI design

  • Time and Date
  • Images and media
  • Composite
  • AlertDialogs & Toast
  • Popup
  • Examples

Tabs and Tab Activity

  • Examples

Styles & Themes

  • xml
  • drawable resources for shapes, gradients (selectors)
  • style attribute in layout file
  • Applying themes via code and manifest file
  • Examples

Content Providers

  • SQLite Programming
  • SQLiteOpenHelper
  • SQLiteDatabse
  • Cursor
  • Reading and updating Contacts
  • Reading bookmarks
  • Example

Develop an App to demonstrate database usage. CRUD operations must be implemented.

Final details should be viewed in GridView as well as in ListView.

Android Debug Bridge (adb) tool

Linkfy

  • Web URLs, Email address, text, map address, phone numbers
  • MatchFilter & TransformFilter
  • Examples

Adapters and Widgets

  • Adapters:-Array Adapters Base Adapters
  • ListView and ListActivity
  • Custom listview
  • GridView using adapters
  • Gallery using adapters
  • Examples

Notifications

  • Broadcast Receivers
  • Services and notifications
  • Toast
  • Alarms
  • Examples

Custom components

  • Custom Tabs
  • Custom animated popup panels
  • Other components
  • Examples

 Threads

  • Threads running on UI thread (runOnUiThread)
  • Worker thread
  • Handlers & Runnable
  • AsynTask (in detail)
  • Examples

Advanced

  • Live Folders
  • Using sdcards
  • XML Parsing
  • JSON Parsing
  • Maps, GPS, Location based Services
  • Accessing Phone services (Call, SMS, MMS)
  • Network connectivity services
  • Sensors

WHAT IS CLOUD COMPUTING?

Cloud computing refers to a new class of network enabled computing hosted over the internet. Previously, we used to run applications/programs from software downloaded on a physical computer or server. Cloud computing allows us to access the same through the internet. Cloud computing allows one to access latest technologies without spending a penny on infrastructure, without exhausting hard drive storage and without necessitating an additional software. Everything can be done online which means that cloud computing can be done anywhere, anytime.

 

WHAT ARE THE VARIOUS CLOUD SERVICE MODELS?

Cloud service models are divided into three service categories.

  • IaaS (Infrastructure as a Service) model, provides the computing infrastructure, physical or virtual machines, block and file-based storage, firewalls, load balancers, IP addresses, virtual local area networks etc. thus enabling the user to outsource and build a virtual data center in the cloud. Eg: Amazon EC2, Windows Azure, Rackspace, Google Compute Engine, HPCloud.
  • PaaS (Platform as a Service) model, provides computing platforms which includes operating system, programming language execution environment, database, web server etc. on which a software can be developed and deployed. Eg: AWS Elastic Beanstalk, Apple iCloud, Windows Azure, Google App Engine, Apache Stratos.
  • SaaS (Software as a Service) model, users are provided with access to application softwares , where the service provider will install, manage and upgrade software, thus reduces the cost of licensing software. Eg: Google Apps, Microsoft Office 365, Dropbox.

 

WHY WE USE CLOUD? DO I USE IT?

Well, Instead of traditional on-site usage most of the business enterprises widely use cloud either directly or indirectly due to its significant advantages like cost reduction, universal access, scalability, flexibility, choice of applications, up-to-date software etc. Obviously, usage of cloud is integrated with ones like in one way or the other. For instance, If you own a smartphone, maybe once in an hour or at least once in a day you use the cloud. The most popular examples of applications which run on Cloud in our daily social life are WhatsApp, Facebook, Twitter, Emails, etc.

WHAT ARE THE JOB OPPORTUNITIES IN CLOUD?

The growth of Cloud computing is very fast, which enhance job vacancies chasing behind the qualified candidates. Extensive knowledge in the technology (Amazon Web Services, OpenStack, Salesforce.com or Azure) is required for most of the cloud jobs. Cloud computing jobs range from architects and developers to data scientists and more with a high salary package even if you are a fresher. You can work as Cloud Engineer, Data Engineer, Data Scientist, Cloud Architect, Cloud Developer, etc. It is very important to ensure the security of information in the cloud server, which eventually creates the opportunity for Security Engineers.

WHY IS CLOUD A BIG DEAL IN THE JOB MARKET?

Almost 85% of cloud servers are running in Linux, of which 75% are in Red Hat. So we can easily say that Red Hat Certification can guarantee a job in the cloud, as it assures you an upper hand.

WHAT ARE THE CLOUD CERTIFICATIONS AVAILABLE?

Red Hat, World’s leading provider of open source solutions deliver various certifications in cloud computing which are accepted globally.

Web Graphics and Mobile UI Designing

  • Rules of website design
  • Browsers support , w3crecommendations and Design
  • Alignment, Balance, Consistency, Repetition, Contrast, Golden Rectangle, Proximity, White space
  • Shape, Spacing, and Rhythm
  • Basic Design Principles Applied in Contemporary Design
  • Current trends. Typographyfor digital uses
  • Color, Texture, and Imagery
  • Standing Strong with a Historical Graphic DesignGrounding
  • Basic tools of photo manipulation. Understand copyright and artistic legal and ethical responsibility in use of photography.
  • Research, capture, manipulation and production of digital photography
  • Work effectively and flexibly with Photoshop tools to create stylish web graphics
  • Internalize the Graphic DesignProcess, Conceptual Solutions, Real World Experience, and Creative Application.
  • Export from Photoshopusing the most appropriate file formats for the web.
  • Develop Photoshop skills further using the in depth knowledge gained during this course

Web Designing & Development

  • Started with HTML5CSS3 and Responsive Web Design
  • HTML5 Core (HTML5 semantics, video, and audio; and later, Advanced HTML5 APIs)
  • Embracing Fluid Layouts.
  • Supporting Differing View ports by Media Queries
  • Responsive Designs by HTML5
  • Selectors, typeface & Color mode by CSS3
  • CSS3 for Stunning Aesthetics
  • jQuery UI Widget, jQuery UI
  • jQuery, and Other Libraries & Frameworks
  • Styling the NAV
  • Transitions, Transformations & Animations by using CSS3
  • HTML5 FormsImage SlidersFlexible VideoLazy Loading, and Image Sprites
  • Making it a real website with cross browser compatibility a favicon and meta tag

Responsive Web Designing

  • Responsive Web Design (create fluid, responsive layouts from scratch and from static, pixel based layouts; responsive images, icons, and videos; and more)
  • Tools and Strategies for Designing the user interface and static comps for responsive websites
  • Finishing the Responsive Design
  • Media Queries, The third Media Query and a Nav button
  • Cross-browserResponsive Testing
  • Twitter Bootstrap 4 versions
  • PureCSS & Base CSS
  • Responsive CSS Frameworks
  • LESS / SASSCSS Frameworks
  • HTML5 Boilerplate, Modernizr, and Initializr
  • Working with the Lightbox
  • Twitter Bootstrap 3.0 Responsive Layout and Best Practices

Digital Marketing –SEO | SMO | SEM

  • Fundamentals of Website Design and Development
  • Digital MarketingStrategies: From market planning to media strategies
  • Mobile Marketing
  • Analytics for Digital Marketing
  • Email Marketing & Lead Nurturing
  • Social Media Marketing
  • YouTube and Video Marketing
  • Content Marketing Budgetand Measurement
  • Google analytics
  • Click analytics
  • Customer life cycle analytics
  • On-site web analytics
  • Integrated Digital Marketing Campaign Management
  • Digital Marketing- Fundamentals and Strategy
  • Enhancing Search Engine Performance

Live Project based industrial Training

  • Registering Your Website Name
  • Managing Your Website Structure
  • Testing and Fixing Your Internet Site
  • Uploading Your Files
  • Editing and Updating Your Website
  • Registering with The Search Engines
  • Marketing Your Site

Our web designing course in Punjab are comprehensive in general using the right mixture of technical along with the additional non technical skills required to produce that website design company who can fulfill demands with a holistic approach. The trainers with us at   Net Geeks Ropar Completely complement our course-design due to their exposure and expertise thus adding value to your objective..

Digital Marketing (also known as Online Marketing,Internet Marketing or Web Marketingis an activity approved out to support products or services of a business on the Internet by web.  One of the more attractive aspects of Digital Marketing is Online Behavioral Advertising (OBA).

OBA is a new method for advertising which involves tailoring ads and campaigns to users based on their likes and preferences. According to your level of expertise, you can choose any of our two major internet marketing training programs:

 

Certified Digital Marketing Course Syllabus

Professional SEO Expert (Training Program)

  • Keyword Research and analysis
  • Search engine Optimizationof the website
  • Dynamic Optimization of the website
  • Basics of SEO friendly website design
  • Website architecture analysis
  • Search Engine Submissions
  • Google Algorithms– Panda & Panguin
  • Directory Submissions on Web
  • Advanced Link Buildingand concept of Link Popularity
  • Posting on Forums, Blogs, Guestbooks and Free classifieds
  • Competitor Analysis
  • LSI (Latent Semantic Indexing)
  • Google Sandbox Effect
  • Search Engine Spam
  • Webmaster& Google Analytics
  • Optimizing For GoogleYahoo and Bing
  • Google PPC Adwords, Adds Companign

 

Social Media Marketing Course in Punjab

In addition to the Professional SEO Experts Course we also take the following subject in the advanced internet marketing training program

Build your expertise by enrolling the challenging programme of study and research in Digital Marketing!
OOPs concept, Arrays, Pointers, File Handling, Exception Handling

Course Content

    • Introduction to Programming
    • Bits and Bytes
    • Data Types and Variables
    • Storage Clases
    • Operators
    • Library Functions
    • Recursive Function and Stack
    • Control Structure
    • One Dimensional Arrays
    • Two Dimensional Arrays
    • Pointers
    • Strings
    • Structure and Unions
    • Pointer to Structure
    • Preprocessor Directives
    • Object Oriented Programming
    • Classes and Objects
    • Constructor and Destructor
    • Copy Constructors
    • Inheritance
    • Friend Functions
    • Pointer to Object
    • Array of Objects
    • Virtual Classes
    • Dynaminc Memory Management
    • Polymorphism
    • Function Overloading
    • Function Overriding
    • Operator Overloading
    • Abstract Classes
    • Virtual Functions
    • File Handling
    • Templates
    • Exception Handling
    • Project

     

Introduction

  • Ethical Hacking Evolution and Hacktivism
  • Need and Technical Terms
  • Skills Needed and Stages of Hacking
  • Ethical Hacking Modes
  • Networking Basics
  • Penetration Testing

Ethics

  • Moral Direction and Hacker Ethics Principles
  • Security Grey Areas
  • Cyber Laws (IT Act, etc.)
  • Rules of Engagement

Cryptography

  • Cryptography Basics
  • Evolution and Data Encryption Methods
  • Symmetric and Asymmetric key Cryptography
  • Private and Public Key Exchange
  • Stream and Block Ciphers
  • Secret Key Cryptography
  • Message Authentication and Hash Functions
  • Digital Signatures and Public Key Infrastructure

Footprinting

  • Information Gathering
  • DNS, whois and ARIN records
  • Using traceroute, e-mail tracking and web spider
  • Google Hacking

Social Engineering

  • Social Engineering Concepts
  • Social Engineering Attack Types
  • Countermeasures for Social Engineering

Physical Security

  • Basics and Need
  • Physical Security Countermeasures

Network Scanning and Enumeration

  • Network Scanning Techniques
  • Scanners and Analyzers
  • HTTP tunneling and IP spoofing
  • Enumerating null sessions and SNMP enumeration

Network Attacks

  • TCP/IP Packet Formats and Ports
  • Firewall and IDS
  • Switch Attacks
  • Router Attacks
  • DoS, DDoS, Session Hijacking

Wireless Networks

  • Wireless LAN Basics
  • WLAN Security
  • WLAN Attacks
  • WLAN Attack Countermeasures

System Hacking

  • Password Attacks, Vulnerabilities and Countermeasure
  • Spyware
  • Rootkit
  • Steganography
  • Trojans
  • Computer worm
  • Backdoor
  • Buffer Overflow

Windows Hacking

  • Memory and Process
  • Windows Architecture
  • Windows Security
  • Windows Attacks
  • Countermeasures
  • Windows Memory Protection, SEH and OllyDbg

Linux Hacking

  • Linux Basics
  • Linux Threats
  • Linux Security
  • Kernel Patching

Web Hacking

  • Web Basics
  • Web Server Attacks
  • Web Application Attacks
  • VoIP Attacks

Emerging Trends

  • Cloud Computing and Security
  • Identity Access Management
  • Security Policies
  • Mobile Security
  • New Threats
CORE PHP,ADVANCE PHP,MYSQL,WordPress,Joomla, Drupal etc.

Introduction to web technology

  • Web application
  • Web server
  • Client and Server
  • Scripting languages

HTML 5

Introduction & History

  • Basic tags and attributes
  • HTML5 New Elements
  • HTML5 Input Types
  • HTML5 Form Elements
  • HTML5 Form Attributes
  • HTML5 Canvas
  • HTML5 SVG
  • HTML5 Video
  • HTML5 Audio

CSS 3

  • Selectors
  • Box Model
  • Backgrounds and Borders
  • Image Values and Replaced Content
  • Text Effects

JavaScript

  • Introduction to JavaScript
  • Variables
  • Operators
  • Data type conversion
  • Functions
  • Conditional statements and Loops
  • Form manipulation
  • Validation

PHP BASIC

  • Introduction
  • XAMPP & WAMPP
  • Configure php.ini
  • PHP Syntax
  • Variables, Strings, Constants, Operators
  • Echo / Print
  • …Else……Else if
  • Switch
  • Loops
  • For, For each, While
  • Functions
  • String functions – introduction
  • User defined functions

Strings & Patterns

  • Quoting
  • Matching
  • Extracting
  • Searching
  • Replacing
  • Formatting

Arrays

  • Introduction
  • Array syntax
  • Array Index
  • get length without using pre-defined functions
  • Array push and pull
  • Associative arrays
  • loop through arrays
  • Multidimensional Arrays
  • Array functions
  • Array Sorting without using pre-defined functions

Date and Time

  • include, include_once, require, require_once
  • $_GET , $_POST , $_REQUEST

Sessions – introduction

  • Start a PHP session
  • Session variables
  • Modify session
  • destroy session

Cookies

  • Error handling
  • try-catch-throw
  • Exception
  • Filters
  • Filers Advanced
  • File handling
  • File Open/Read
  • File Create/Write

OOPS

  • Classes and objects
  • Constructor & Destructor
  • Inheritance
  • Static methods and properties
  • Methods overloading
  • Abstracts class & Interface

MySQL

  • MySQL datatypes
  • DML and DDL
  • Aggregate functions
  • Sub query and join

Database Programming

  • PHP and MYSQL
  • My sql functions
  • One tier architecture
  • Two tier Architecture
  • Three tier Architecture

File programming

  • File uploading and downloading.

AJAX

  • Introduction
  • PHP AJAX example
  • AJAX Database programming

J Query

  • jQuery Install
  • jQuery Syntax
  • jQuery Selectors
  • jQuery Events
  • jQuery Hide/Show
  • jQuery Fade
  • jQuery Slid e
  • jQuery Animat e
  • jQuery stop( )
  • jQuery Callbac k
  • jQuery Chainin g
  • noConflict
  • JSON

 CMS

  • Word Press
  • Admin
  • Theme Customization.
  • Plugins
  • Create a blog using Word press

MVC

  • Code Igniter
  • Models, views, controllers
  • Installation
  • Working with CI

Web service

  • Introduction
  • Provider and use
  • php
  • How to use API’s
  • Google developer account

Basics of Electrical Engineering ,Estimation of Plant Electrical Load calculation ,Development of Single Line Diagrams , Cable Routing ,Control Schematics

  • Single phase system and Polyphase system and their Importance
  • Power Generation, Transmission, distribution and utilization.
  • Introduction of key electrical equipments used in Projects

Calculation of Load

  • Checking load of any Industry
  • Determination of Power Requirement
  • Generators Rating w.r.t Their Prime mover
  • Standby Power Capacity Requirement
  • Operating Temperature of Prime Mover
  • Motor Specification w.r.t their Mechanical Driving load
  • Rating Of Motors In Relation To Their Driven Machines

Design of Single Line Diagram (SLD)

  • Main SLD
  • Detail SLD
  • Lighting Load SLD
  • Small power SLD
  • Metering and Control diagram

Control Schematics

  • Introduction
  • Block Diagram
  • Typical Motor Feeder Schematics
  • Typical Power Feeder Schematics
  • Typical Transformer Feeder Schematics
  • Cable Routing Layout
  • Cable Tagging
  • Installation details

Cable Selection and Sizing

  • Cable Selection
  • Introduction Power and Control cable
  • Low Voltage and Current System Cable sizing
  • High voltage system Cable sizing
  • Voltage Drop Consideration
  • Cable Testing Procedure
  • Earth fault Loop Impedance consideration
  • Cable Schedules
  • Cable interconnection Schedule
  • Selection and Sizing of Cable Tray
  • Cable tray schedule
  • Cable Drum schedule
  • Conduit Selection
  • Conduit Sizing
  • High Voltage and Current Cable Glanding

Selection and Sizing of Electrical Equipments (LV / HV)

  • Emergency Generator Selection
  • Transformer Specification
  • Resistor for Neutral Grounding
  • HV/MV Switchgears
  • Low Voltage Switchgears
  • Power Factor Corrector HV/MV/LV Capacitor Bank
  • DC Battery & Battery Charger Selection & Testing
  • Data Retrieval, Insertion, Deletion & Updating
  • AC Invertors & UPS
  • AC/DC Machines

Selection and Classification of Equipments for Hazardous Area

  • Classification of different working Zone /Division
  • Hazardous Areas Types, Pre Procedures to Enter In Zone
  • Protection Equipment Zone Wise
  • Hazardous source List Preparation
  • Certification Of Hazardous Area Equipment
  • Marking Of Equipment Nameplates
  • Hazardous Area Drawings / Layouts Preparation

System Studies and Calculation

  • Harmonics Study
  • Load Flow Analysis
  • Motor Starting Study
  • Short Circuit Analysis (Fault Calculations and Stability Studies)
  • Relay Coordination Study

Earthing & Lightening Protection Design

  • Importance of Earthing in Industrial Plants
  • Calculations of Earthing Design
  • Different Type of Earthing and Details
  • Earthing Installation Details
  • Earthing Layout Design
  • Lightening Protection Requirement
  • Lightening Protection Calculation
  • Lightening Installation Details
  • Lightening Layout Design

Illumination Design

  • Introduction
  • Type of Lighting Fixtures
  • Selection of Lighting Fixtures
  • Preparation Of Fixture Schedule
  • Indoor Illumination Calculation
  • Outdoor Illumination Calculation
  • Calculation on Software
  • Lighting Layout Design
  • Lighting Installation Detail
  • Small Power selection
  • Lighting Board Schedule

Sub-Station design

  • Introduction
  • Type of Sub-Stations
  • General arrangement of substation
  • Equipment Layout

Specification of Electrical Equipment / System

  • Transformer
  • Diesel Generator
  • HV /MV Switchgears
  • LV Switchgear
  • HV/LV Capacitor Bank
  • DC Battery Charger
  • AC UPS
  • Battery
  • VFD
  • Power Cables
  • Control Cables
  • Illumination
  • Earthing and Lightening Protection
  • Page Party system
  • CCTV system
  • Telephone System

CMOS

  • MOS Fundamentals and Characterization
  • NMOS/PMOS/CMOS Technologies
  • Fabrication Principles
  • Different Styles of Fabrication for NMOS/PMOS/CMOS
  • Design with CMOS Gates
  • Characterization of CMOS Circuits
  • Layout Representation for CMOS Circuits
  • Design Exercise using CMOS
  • Scaling Effects
  • Sub-Micron Designs
  • Parasitic Extraction and Calculations
  • Subsystem Design
  • Introduction of IC Design
  • Different Methodologies for IC Design
  • Fabrication Flows and Fundamentals

VHDL

  • VHDL Overview and Concepts
  • Levels of Abstraction
  • Entity, Architecture
  • Data Types and declaration
  • Enumerated Data Types
  • Relational, Logical, Arithmetic Operators
  • Signal and Variables, Constants
  • Process Statement
  • Concurrent Statements
  • When-else, With-select
  • Sequential Statement
  • If-then-else, Case
  • Slicing and Concatenation
  • Loop Statements
  • Delta Delay Concept
  • Arrays, Memory Modeling, FSM
  • Writing Procedures
  • Writing Functions
  • Behavioral / RTL Coding
  • Operator Overloading
  • Structural Coding
  • Component declarations and installations
  • Generate Statement
  • Configuration Block
  • Libraries, Standard packages
  • Local and Global Declarations
  • Package, Package body
  • Writing Test Benches
  • Assertion based verification
  • Files read and write operations
  • Code for complex FPGA and ASICs
  • Generics and Generic maps

VERILOG

  • Language introduction
  • Levels of abstraction
  • Module, Ports types and declarations
  • Different Styles of Fabrication for NMOS/PMOS/CMOS
  • Registers and nets, Arrays
  • Identifiers, Parameters
  • Relational, Arithmetic, Logical, Bit-wise shift Operators
  • Writing expressions
  • Behavioral Modeling
  • Structural Coding
  • Continuous Assignments
  • Procedural Statements
  • Always, Initial Blocks, begin ebd, fork join
  • Blocking and Non-blocking statements
  • Operation Control Statements
  • If, case
  • Loops: while, for-loop, for-each, repeat
  • Combination and sequential circuit designs
  • CMOS gate modeling
  • Writing Tasks
  • Writing Functions
  • Compiler directives
  • Conditional Compilation
  • System Tasks
  • Gate level primitives
  • User defined primitives
  • Delays, Specify block
  • Testbenchs, modeling, timing checks
  • Assertion based verification
  • Code for synthesis
  • Advanced topics
  • Writing reusable code

System Verilog

  • Introduction to System Verilog
  • System Verilog Declaration spaces
  • System Verilog Literal Values and Built-in Data Types
  • System Verilog User-Defined and Enumerated Types
  • System Verilog Arrays, Structures and Unions
  • System Verilog Procedural Blocks, Tasks and Function
  • System Verilog Procedural Statements
  • Modelling Finite State Machines with System Verilog
  • System Verilog Design Hierarchy
  • System Verilog Interfaces
  • Behavioral and Transaction Level Modelling

FPGA Flow

  • Re-configurable Devices, FPGA’s/CPLD’s
  • Architectures of XILINX, ALTERA Devices
  • Designing with FPGAs
  • FPGA’s and its Design Flows
  • Architecture based coding
  • Efficient resource utilization
  • Constrains based synthesis
  • False paths and multi cycle paths
  • UCF file creation
  • Timing analysis/Floor Planning
  • Place and route/RPM
  • Back annotation, Gate level simulation, SDF Format
  • DSP on FPGA
  • Writing Scripts
  • Hands on experience with industry Standard Tools

ASIC Flow

Projects: As a part of course 2 mini projects and 1 major project

  • EDA Tools / CAD Flow for IC Design
  • Simulation/Synthesis using ASIC libraries
  • Clock Tree Synthesis
  • False paths / Multi cycle paths / Critical paths
  • Design for Testability (DFT)
  • Scan Insertion / Types of Scan
  • Fault Models
  • Logic BIST, Memory BIST, ATGP, Boundary Scan
  • Pattern Compression
  • Scan Diagnostics
  • Layout Design
  • Placing and Routing
  • LVS/DRC/OPC/Physical verification
  • Diagnosis, DFM, Yield Analysis
  • SOC Design and Trade-offs
  • Future Trends and challenges
  • ASIC Case Studies

LAN TRAINING – Windows Server 2008,Windows Server 2012

The NETWORKING LAN TRAINING PROGRAM corresponds to proven expertise in designing and implementing the infrastructure for business solutions based on the Microsoft Windows 2003/2008 platform. We provide training for LAN on Windows Server 2008/ 2012.

MCSE

Exam 70-410 Installing and Configuring Windows Server 2012 Install and configure servers (15–20%)

   Install servers Plan for a server installation; plan for server roles; plan for a server upgrade; install Server Core; optimize resource utilization by using Features on Demand; migrate roles from previous versions of Windows Server

   Configure servers Configure Server Core; delegate administration; add and remove features in offline images; deploy roles on remote servers; convert Server Core to/from full GUI; configure services; configure NIC teaming

   Configure local storage Design storage spaces; configure basic and dynamic disks; configure MBR and GPT disks; manage volumes; create and mount virtual hard disks (VHDs); configure storage pools and disk pools

Configure server roles and features (15–20%)

   Configure file and share access

   Create and configure shares; configure share permissions; configure offline files;

configure NTFS permissions; configure access-based enumeration (ABE);

configure Volume Shadow Copy Service (VSS); configure NTFS quotas

   Configure print and document services

   Configure the Easy Print print driver; configure Enterprise Print Management;

configure drivers; configure printer pooling; configure print priorities; configure printer

permissions

   Configure servers for remote management

   Configure WinRM; configure down-level server management; configure servers for day-to-day management tasks; configure multi-server management; configure Server Core;configure Windows Firewall

Configure Hyper-V (15–20%)

   Create and configure virtual machine settings Configure dynamic memory; configure smart paging; configure Resource Metering;configure guest integration services

   Create and configure virtual machine storage Create VHDs and VHDX; configure differencing drives; modify VHDs; configure pass-through disks; manage snapshots; implement a virtual Fibre Channel adapter

   Create and configure virtual networks Implement Hyper-V Network Virtualization; configure Hyper-V virtual switches;optimize network performance; configure MAC addresses; configure network isolation;configure synthetic and legacy virtual network adapters

Deploy and configure core network services (15–20%)

   Configure IPv4 and IPv6 addressing Configure IP address options; configure subnetting; configure supernetting; configure interoperability between IPv4 and IPv6; configure ISATAP; configure Teredo

   Deploy and configure Dynamic Host Configuration Protocol (DHCP) service Create and configure scopes; configure a DHCP reservation; configure DHCP options;configure client and server for PXE boot; configure DHCP relay agent; authorize DHCP server

   Deploy and configure DNS service Configure Active Directory integration of primary zones; configure forwarders; configure Root Hints; manage DNS cache; create A and PTR resource records

Install and administer Active Directory (15–20%)

   Install domain controllers Add or remove a domain controller from a domain; upgrade a domain controller; install Active Directory Domain Services (AD DS) on a Server Core installation; install a domain controller from Install from Media (IFM); resolve DNS SRV record registratio issues; configure a global catalog server

   Create and manage Active Directory users and computers Automate the creation of Active Directory accounts; create, copy, configure, and delete users and computers; configure templates; perform bulk Active Directory operations;configure user rights; offline domain join; manage inactive and disabled accounts

   Create and manage Active Directory groups and organizational units (OUs)Configure group nesting; convert groups including security, distribution, universal,domain local, and domain global; manage group membership using Group Policy enumerate group membership; delegate the creation and management of Active Directory objects; manage default Active Directory containers; create, copy, configure, and delete groups and OUs

Create and manage Group Policy (15–20%)

   Create Group Policy objects (GPOs) Configure a Central Store; manage starter GPOs; configure GPO links; configure multiple local group policies; configure security filtering

   Configure security policies Configure User Rights Assignment; configure Security Options settings; configure Security templates; configure Audit Policy; configure Local Users and Groups; configure User Account Control (UAC)

   Configure application restriction policies Configure rule enforcement; configure Applocker rules; configure Software Restriction Policies

   Configure Windows Firewall Configure rules for multiple profiles using Group Policy; configure connection security rules; configure Windows Firewall to allow or deny applications, scopes, ports, and users; configure authenticated firewall exceptions; import and export settings

Exam   70-411 Administering Windows Server 2012

Deploy, manage, and maintain servers (15–20%)

   Deploy and manage server images Install the Windows Deployment Services (WDS) role; configure and manage boot, install, and discover images; update images with patches, hotfixes, and drivers; install features for offline images

   Implement patch management

Install and configure the Windows Server Update Services (WSUS) role; configure group policies for updates; configure client-side targeting; configure WSUS synchronization; configure WSUS groups

   Monitor servers

Configure Data Collector Sets (DCS); configure alerts; monitor real-time performance; monitor virtual machines (VMs); monitor events; configure event subscriptions; configure network monitoring

Configure file and print services (15–20%)

   Configure Distributed File System (DFS) Install and configure DFS namespaces; configure DFS Replication Targets; configure Replication Scheduling; configure Remote Differential Compression settings; configure staging; configure fault tolerance

   Configure File Server Resource Manager (FSRM) Install the FSRM role; configure quotas; configure file screens; configure reports

   Configure file and disk encryption Configure Bitlocker encryption; configure the Network Unlock feature; configure Bitlocker policies; configure the EFS recovery agent; manage EFS and Bitlockercertificates including backup and restore

   Configure advanced audit policies Implement auditing using Group Policy and AuditPol.exe; create expression-based audit policies; create removable device audit policies

Configure network services and access (15–20%)

   Configure DNS zones Configure primary and secondary zones; configure stub zones; configure conditional forwards; configure zone and conditional forward storage in Active Directory; configure zone delegation; configure zone transfer settings; configure notify settings

   Configure DNS records Create and configure DNS Resource Records (RR) including A, AAAA, PTR, SOA, NS,SRV, CNAME, and MX records; configure zone scavenging; configure record options including Time To Live (TTL) and weight; configure round robin; configure secure dynamic updates

   Configure VPN and routing Install and configure the Remote Access role; implement Network Address Translation (NAT); configure VPN settings; configure remote dial-in settings for users; configure routing

   Configure Direct Access Implement  server requirements;  implement  client configuration; configure DNS for Direct Access; configure certificates for Direct Access

Configure a Network Policy Server infrastructure (10–15%)

   Configure Network Policy Server (NPS) Configure multiple RADIUS server infrastructures; configure RADIUS clients; manage RADIUS templates; configure RADIUS accounting; configure certificates

   Configure NPS policiesConfigure connection request policies; configure network policies for VPN clients (multilink and bandwidth allocation, IP filters, encryption, IP addressing); manage NPS templates; import and export NPS policies

   Configure Network Access Protection (NAP) Configure System Health Validators (SHVs); configure health policies; configure NAP enforcement using DHCP and VPN; configure isolation and remediation of non-compliant computers using DHCP and VPN; configure NAP client settings

Configure and manage Active Directory (15–20%)

   Configure service authentication Create and configure Service Accounts; create and configure Group Managed Service Accounts; create and configure Managed Service Accounts; configure Kerberos delegation; manage Service Principal Names (SPNs)

   Configure Domain Controllers Configure Universal Group Membership Caching (UGMC); transfer and seize operations masters; install and configure a read-only domain controller (RODC); configure Domain Controller cloning

   Maintain Active Directory Back up Active Directory and SYSVOL; manage Active Directory offline; optimize an Active Directory database; clean up metadata; configure Active Directory snapshots; perform object- and container-level recovery; perform Active Directory restore

   Configure account policies Configure domain user password policy; configure and apply Password Settings Objects (PSOs); delegate password settings management; configure local user password policy; configure account lockout settings

Configure and manage Group Policy (15–20%)

   Configure Group Policy processing Configure processing order and precedence; configure blocking of inheritance;configure enforced policies; configure security filtering and WMI filtering; configure loop back processing; configure and manage slow-link processing; configure client-side extension (CSE) behavior

   Configure Group Policy settings Configure settings including software installation, folder redirection, scripts, and administrative template settings; import security templates; import custom administrative template file; convert administrative templates using ADMX Migrator; configure property filters for administrative templates

   Manage Group Policy objects (GPOs) Back up, import, copy, and restore GPOs; create and configure Migration Table; reset default GPOs; delegate Group Policy management

   Configure Group Policy preferences Configure Group Policy Preferences (GPP) settings including printers, network drive mappings, power options, custom registry settings, Control Panel settings, Internet Explorer settings, file and folder deployment, and shortcut deployment; configure item-level targeting

Exam 70-412 Configuring Advanced Windows Server 2012 Services

Configure and manage high availability (15–20%)

   Configure Network Load Balancing (NLB)Install NLB nodes; configure NLB prerequisites; configure affinity; configure port rules;configure cluster operation mode; upgrade an NLB cluster

   Configure failover clusteringConfigure Quorum; configure cluster networking; restore single node or cluster configuration; configure cluster storage; implement Cluster Aware Updating; upgrade a cluster

   Manage fail over clustering roles Configure   role-specific   settings   including   continuously   available   shares;   configure VM monitoring; configure failover and preference settings

   Manage Virtual Machine (VM) movement

   Perform   Live   Migration;   perform   quick   migration;   perform   storage   migration;import, export, and copy VMs; migrate from other platforms (P2V and V2V)

Configure file and storage solutions (15–20%)

   Configure advanced file services Configure NFS data store; configure BranchCache; configure File Classification Infrastructure (FCI) using File Server Resource Manager (FSRM); configure file access auditing

   Implement Dynamic Access Control (DAC) Configure   user   and   device   claim   types;   implement   policy   changes   and   staging; perform access-denied remediation; configure file classification

   Configure and optimize storage Configure iSCSI Target and Initiator; configure Internet Storage Name server (iSNS);implement thin provisioning and trim; manage server free space using Features on Demand

Implement business continuity and disaster recovery (15–20%)

   Configure and manage backups Configure Windows Server backups; configure Windows Online backups; configure role-specific backups; manage VSS settings using VSSAdmin; create System Restore snapshots

   Recover servers Restore from backups; perform a Bare Metal Restore (BMR); recover servers using Windows Recovery Environment (Win RE) and safe mode; apply System Restore snapshots; configure the Boot Configuration Data (BCD) store

   Configure site-level fault tolerance Configure Hyper-V Replica including Hyper-V Replica Broker and VMs; configure multi-site clustering including network settings, Quorum, and failover settings

Exam 70-413 Designing and Implementing a Server Infrastructure

Plan and deploy a server infrastructure (20–25%)

   Design an automated server installation strategy

   Design considerations including images and bare metal/virtual deployment; design a server implementation using Windows Assessment and Deployment Kit (ADK); design a virtual server deployment

   Plan and implement a server deployment infrastructure

   Configure multicast deployment; configure multi-site topology and distribution points;configure a multi-server topology; configure autonomous and replica Windows Deployment Services (WDS) servers

   Plan and implement server upgrade and migration

   Plan for role migration; migrate server roles; migrate servers across domains and forests;design a server consolidation strategy; plan for capacity and resource optimization

   Plan and deploy Virtual Machine Manager services

   Design Virtual Machine Manager service templates; define operating system profiles;configure hardware and capability profiles; manage services; configure image and template libraries; manage logical networks

   Plan and implement file and storage services

   Planning considerations include iSCSI SANs, Fibre Channel SANs, Virtual Fibre

Channel, storage spaces, storage pools, and data de-duplication; configure the iSCSI

Target server; configure the Internet Storage Name server (iSNS); configure Network

File System (NFS); install Device Specific Modules (DSMs)

Design and implement network infrastructure services (20–25%)

   Design and maintain a Dynamic Host Configuration Protocol (DHCP) solution

   Design considerations including a highly available DHCP solution including split scope,DHCP failover, and DHCP failover clustering, DHCP interoperability, and DHCPv6;implement DHCP filtering; implement and configure a DHCP management pack;maintain a DHCP database

   Design a name resolution solution strategy

   Design considerations including secure name resolution, DNSSEC, DNS Socket Pool,cache locking, disjoint namespaces, DNS interoperability, migration to application partitions, IPv6, Single-Label DNS Name Resolution, zone hierarchy, and zone delegation

   Design and manage an IP address management solution

   Design considerations including IP address management technologies including IPAM,Group Policy based, manual provisioning, and distributed vs. centralized placement;configure role-based access control; configure IPAM auditing; migrate IPs; manage and monitor multiple DHCP and DNS servers; configure data collection for IPAM

Design and implement network access services (15–20%)

   Design a VPN solution

   Design considerations including certificate deployment, firewall configuration, client/site to site, bandwidth, protocol implications, and VPN deployment configurations using Connection Manager Administration Kit (CMAK)

   Design a Direct Access solution

   Design considerations including topology, migration from Forefront UAG, Direct Access deployment, and enterprise certificates

   Implement a scalable remote access solution

   Configure site-to-site VPN; configure packet filters; implement packet tracing;implement multi-site Remote Access; configure Remote Access clustered with Network Load Balancing (NLB); configure Direct Access

   Design a network protection solution

   Design considerations including Network Access Protection (NAP) enforcement methods for DHCP, IPSec, VPN, and 802.1x, capacity, placement of servers, firewall, Network Policy Server (NPS), and remediation network

   Implement a network protection solution

   Implement multi-RADIUS deployment; configure NAP enforcement for IPSec and

802.1x; deploy and configure the Endpoint Protection client; create anti-malware and

firewall policies; monitor for compliance

   Design and implement an Active Directory infrastructure (logical) (20–25%)

   Design a forest and domain infrastructure

   Design considerations including multi-forest architecture, trusts, functional levels,

domain upgrade, domain migration, forest restructure, and hybrid cloud service

   Implement a forest and domain infrastructure

   Configure domain rename; configure Kerberos realm trusts; implement a domain

upgrade; implement a domain migration; implement a forest restructure; deploy

and manage a test forest including synchronization with production forests

   Design a Group Policy strategy

   Design considerations including inheritance blocking, enforced policies, loopback

processing, security, and WMI filtering, site-linked Group Policy Objects (GPOs), slow-link processing, group strategies, organizational unit (OU) hierarchy, and Advanced Group Policy Management (AGPM)

   Design an Active Directory permission model

   Design considerations including Active Directory object security and Active Directory quotas; customize tasks to delegate in Delegate of Control Wizard; deploy administrative tools on the client computer; delegate permissions on administrative users (AdminSDHolder); configure Kerberos delegation

Design and implement an Active Directory infrastructure (physical) (20–25%)

   Design an Active Directory sites topology

   Design considerations including proximity of domain controllers, replication

optimization, and site link; monitor and resolve Active Directory replication conflicts

   Design a domain controller strategy

   Design considerations including global catalog, operations master roles, Read-Only Domain Controllers (RODCs), partial attribute set, and domain controller cloning

   Design and implement a branch office infrastructure

   Design considerations including RODC, Universal Group Membership Caching(UGMC), global catalog, DNS, DHCP, and Branch Cache; implement confidential attributes; delegate administration; modify filtered attributes set; configure password replication policy; configure hash publication

Exam 70-414 Implementing an Advanced Server Infrastructure

   Manage and maintain a server infrastructure (25–30%)

Design an administrative model Design considerations including user rights, built-in groups, and end-user self-service portal; design a delegation of administration structure for Microsoft System Center 2012 Design a monitoring strategy

Design considerations including monitoring servers using Audit Collection Services (ACS),performance monitoring, centralized monitoring, and centralized reporting; implement and optimize System Center 2012 – Operations Manager management packs; plan for monitoring Active Directory Implement automated remediation Create an Update Baseline in Virtual Machine Manager; implement a Desired Configuration Management (DCM) Baseline; implement Virtual Machine Manager Integration with Operations Manager; configure Virtual Machine Manager to move a VM dynamically based on policy;integrate System Center 2012 for automatic remediation into your existing enterprise infrastructure

Plan and implement a highly available enterprise infrastructure (25–30%)

Plan and implement failover clustering Plan for multi-node and multi-site clustering; design considerations including redundant networks, network priority ettings,resource failover and failback, heartbeat and DNS settings,Quorum configuration, and storage placement and replication Plan and implement highly available network services Plan for and configure Network Load Balancing (NLB); design onsiderationsincludingfault-tolerant networking, multicast vs. unicast configuration, state management, andautomated deployment of NLB using Virtual Machine Manager service templates

Plan and implement highly available storage solutions Plan for and configure storage spaces and storage pools; design highly available, multi-replica DFS namespaces; plan for and configure multi-path I/O, including Server Core; configure highly available iSCSI Target and iSNS Server Plan and implement highly available server roles Plan for a highly available Dynamic Host Configuration Protocol (DHCP) Server, Hyper-V clustering, Continuously Available File Shares, and a DFS Namespace Server; plan for and implement highly available applications, services, and scripts using Generic Application,Generic Script, and Generic Service clustering roles Plan and implement a business continuity and disaster recovery solution Plan a backup and recovery strategy; planning considerations including Active Directory domain and forest recovery, Hyper-V replica, domain controller restore and cloning, and Active Directory object and container restore using authoritative restore and Recycle Bin

   Plan and implement a server virtualization infrastructure (25–30%)

Plan and implement virtualization hosts Plan for and implement delegation of virtualization environment (hosts, services, and VMs), including self-service capabilities; plan and implement multi-host libraries including equivalent objects; plan for and implement host resource optimization;integrate third-party virtualization platforms Plan and implement virtualization guests Plan for and implement highly available VMs; plan for and implement guest resource optimization including smart page file,dynamic memory, and RemoteFX; configure placement rules; create Virtual Machine Manager templates Plan and implement virtualization networking Plan for and configure Virtual Machine Manager logical networks; plan for and configure IP address and MAC address settings across multiple Hyper-V hosts including IP virtualization; plan for and configure virtual network optimization Plan and implement virtualization storage Plan for and configure Hyper-V host storage including stand-alone and clustered setup using SMB 2.2 and CSV; plan for and configure Hyper-V guest storage including virtual Fiber Channel, iSCSI, and pass-through disks;plan for storage optimization Plan and implement virtual guest movement Plan for and Configure live, SAN, and network migration between Hyper-V hosts; plan for andmanage P2V and V2V Manage and maintain a server virtualization infrastructure Manage dynamic optimization and resource optimization; manage Operations Manager integration using PRO Tips; automate VM software and configuration updates using service templates; maintain library updates

Design and implement identity and access solutions (20–25%)

Design a Certificate Services infrastructure Design a multi-tier Certificate Authority (CA) hierarchy with offline root CA; plan for multi-forest CA deployment; plan for Certificate Enrollment Web Services; plan for network device enrollment; plan for certificate validation and revocation; plan for disaster recovery; plan for trust between organizations Implement and manage a Certificate Services infrastructure Configure and manage offline root CA; configure and manage Certificate Enrollment Web Services; configure and manage Network Device Enrollment Services; configure Online Certificates Status Protocol responders; migrate CA; implement administrator role separation;implement and manage trust between organizations; monitor CA health Implement and manage certificates Manage certificate templates; implement and manage deployment, validation, and revocation;manage certificate renewal including Internet-based clients; manage certificate deployment and renewal to network devices;configure and manage key archival and recovery Design and implement a federated identity solution Plan for and implement claims-basedauthentication including planning and implementing Relying Party Trusts; plan for and configure Claims Provider Trust rules; plan for and configure attribute stores including Active Directory Lightweight Directory Services(AD LDS); plan for and manage Active Directory Federation Services (AD FS) certificates; plan for Identity Integration with cloud services Design and implement Active Directory Rights Management Services (AD RMS) Plan for highly available AD RMS deployment; manage AD RMS Service Connection Point;plan for and manage AD RMS client deployment; manage Trusted User Domains; manage Trusted Publishing Domains; manage Federated Identity support; manage Distributed and Archived Rights Policy templates; configure Exclusion Policies; decommission AD RMS

WAN TRAINING – Planning & Designing, Implementation & Operation, Troubleshooting, Wireless

The NETWORKING(WAN) TRAINING PROGRAMS indicates an apprentice level knowledge of networking. Networking (WAN) professionals can install, configure, and operate WAN, and dial access services for small networks (100 nodes or fewer), including but not limited to use of these protocols: IP, IGRP, Serial, Frame Relay, IP RIP, VLANs, RIP, Ethernet, Access Lists. We train you for examination. We have kept pace with technology and always offered training programmers required by global industry.

CCNA 200-125

  1. Network Fundamentals
  • ISO/OSI Reference Model and TCP/IP Model.
  • Describe the impact of infrastructure components in an enterprise network.
  • (Firewalls,     Access points , Wireless controllers)
  • Describe the effects of cloud resources on enterprise network architecture
  • Basic virtual network infrastructure.
  • Network topologies. (Star ,Mesh, Hybrid)
  • Configure, verify, and troubleshoot IPv4 addressing and subnetting.
  • Configure, verify, and troubleshoot IPv6 addressing.
  1. LAN Switching Technologies
  • Switch working.
  • Troubleshoot interface and cable issues (collisions, errors, duplex, speed).
  • Spanning Tree Protocol.
  • PVST+ and RPVST+.
  •  Configure, verify, and troubleshoot VLANs (normal/extended range) .
  • Intervlan Routing.
  • Configure, verify, and troubleshoot interswitch connectivity (Trunk ports).
  • Configure, verify and troubleshoot STP related optional features (PortfastandBPDU Guard).
  • Configure, verify, and troubleshoot (Layer 2/Layer 3) EtherChannel.(Static,PAGP ,LACP)
  1. Routing Technologies
  • Basic Routing concepts.
  • Static Routing.
  • Dynamic Routing.
  • Rip, Rip v2 for Ipv4 and Ipv6.
  • Ospf for Ipv4 and Ipv6 .
  • Eigrp for Ipv4 and Ipv6.
  • Default Routing.
  • Troubleshoot basic Layer 3 end-to-end connectivity issues.
  • Interpret the components of a routing table (Prefix, Network Mask , Next
  • Hop, Administrative Distance, Metric, Gateway of last Resort)
  1. WAN Technologies
  • Configure and verify PPP and MLPPP on WAN interfaces using local authentication.
  • Configure, verify, and troubleshoot GRE tunnel connectivity.
  • Describe WAN topology options.
  • Describe WAN access connectivity options.
  • Describe basic QoS concepts.
  1. Infrastructure Services
  • Describe DNS lookup operation.
  • Configure and verify DHCP on a router.
  • Configure, verify, and troubleshoot basic HSRP.
  • Configure, verify, and troubleshoot inside source NAT.
  1. Infrastructure Security
  • Configure, verify, and troubleshoot port security.
  • Describe common access layer threat mitigation techniques.
  • Configure, verify, and troubleshoot IPv4 and IPv6 access list for traffic filtering.
  • Configure, verify, and troubleshoot basic device hardening.
  • Describe device security using AAA with TACACS+ and RADIUS.
  1. Infrastructure Management
  • Configure and verify device-monitoring protocols.(SNMP, SYSLOG)
  • Configure and verify device management.
  • Configure and verify initial device configuration.
  • Perform device maintenance.
  • Password recovery and configuration register.
  • Use Cisco IOS tools to troubleshoot and resolve problems.
  • Describe network programmability in enterprise network architecture.

 

CCNP Cisco Course Outline

Exam Description

The ROUTE 300-101 exam will certify that the successful candidate has the knowledge and skills necessary to use advanced IP addressing and routing in implementing scalable and secure Cisco ISR routers connected to LANs and WANs. The exam also covers configuration of secure routing solutions to support branch offices and mobile workers.

Exam Topics

The   following   information   provides   general   guidelines   for   the   content   likely   to   be included on the exam. However, other related topics may also appear on any specific delivery of the exam.

Implement an EIGRP based solution, given a network design and a set of requirements

  • Determine network resources needed for implementing EIGRP on a network
  • Create an EIGRP implementation plan
  •  Create an EIGRP verification plan
  • Configure EIGRP routing
  • Verify EIGRP solution was implemented properly using show and debug commands.
  • Document results of EIGRP implementation and verification

 

Implement a multi-area OSPF Network, given a network design and a set of requirements

  • Determine network resources needed for implementing OSPF on a network
  • Create an OSPF implementation plan
  • Create an OSPF verification plan
  • Configure OSPF routing
  • Verify OSPF solution was implemented properly using show and debug commands
  • Document results of OSPF implementation and verification plan

Implement an eBGP based solution, given a network design and a set of requirements

  • Determine network resources needed for implementing eBGP on a network
  • Create an eBGP implementation plan
  • Create an eBGP verification plan
  • Configure eBGP routing
  • Verify eBGP solution was implemented properly using show and debug commands
  • Document results of eBGP implementation and verification plan

Implement an IPv6 based solution, given a network design and a set of

requirements

  • Determine network resources needed for implementing IPv6 on a network
  • Create an IPv6 implementation plan
  • Create an IPv6 verification plan
  • Configure IPv6 routing
  • Configure IPv6 interoperation with IPv4
  • Verify IPv6 solution was implemented properly using show and debug commands
  • Document results of IPv6 implementation and verification plan

Implement an IPv4 or IPv6 based redistribution solution, given a network design and a set of requirements

  • Create a redistribution implementation plan based upon the results of the redistribution analysis
  • Create a redistribution verification plan
  • Configure a redistribution solution
  • Verify that a redistribution was implemented
  • Document results of a redistribution implementation and verification plan
  • Identify the differences between implementing an IPv4 and IPv6 redistribution

solution

Implement Layer 3 Path Control Solution

  • Create a Layer 3 path control implementation plan based upon the results of        the redistribution analysis
  • Create a Layer 3 path control verification plan
  • Configure Layer 3 path control
  • Verify that a Layer 3 path control was implemented
  • Document results of a Layer 3 path control implementation and verification plan
  • Implement basic teleworker and branch services
  • Describe broadband technologies
  • Configure basic broadband connections
  • Describe basic VPN technologies
  • Configure GRE
  • Describe branch access technologies

The SWITCH 300-115 exam will certify that the successful candidate has important knowledge and skills necessary to plan, configure and verify the implementation of complex enterprise switching solutions using Cisco’s Campus Enterprise architecture. The SWITCH exam also covers secure integration of VLANs, WLANs, voice and video into campus networks.

Exam Topics

The   following   information   provides   general   guidelines   for   the   content   likely   to   be included on the exam. However, other related topics may also appear on any specific delivery of the exam.

Implement VLAN based solution, given a network design and a set of

requirements

  • Determine network resources needed for implementing a VLAN based solution on a network
  • Create a VLAN based implementation plan
  • Create a VLAN based verification plan
  • Configure switch-to-switch connectivity for the VLAN based solution
  • Configure loop prevention for the VLAN based solution
  •  Configure Access Ports for the VLAN based solution
  • verify the VLAN based solution was implemented properly using show and debug commands
  • Document results of VLAN implementation and verification

Implement a Security Extension of a Layer 2 solution, given a network design and a set of requirements

  • Determine network resources needed for implementing a Security solution
  • Create a implementation plan for the Security solution
  • Create a verification plan for the Security solution
  • Configure port security features
  • Configure general switch security features
  • Configure private VLANs Configure VACL and PACL
  • Verify the Security based solution was implemented properly using show and debug commands
  • Document results of Security implementation and verification Implement Switch based Layer 3 services, given a network design and a set of requirements
  • Determine network resources needed for implementing a Switch based Layer3 solution
  • Create an implementation plan for the Switch based Layer 3 solution
  • Create a verification plan for the Switch based Layer 3 solution
  • Configure routing interfaces Configure Layer 3 Security
  • Verify the Switch based Layer 3 solution was implemented properly using show and debug commands
  • Document results of Switch based Layer 3 implementation and verification Prepare infrastructure to support advanced services
  • Implement a Wireless Extension of a Layer 2 solution

CCNP Course Syllabus ipsr solutions ltd • Implement a VoIP support solution

  • Implement video support solution

Implement High Availability, given a network design and a set of

requirements

  • Determine network resources needed for implementing High Availability on a

network

  • Create a High Availability implementation plan
  • Create a High Availability verification plan
  • Implement first hop redundancy protocols
  • Implement switch supervisor redundancy
  • Verify High Availability solution was implemented properly using show and debug

commands,

  • Document results of High Availability implementation and verification

The TSHOOT 300-135 exam will certify that the successful candidate has important knowledge and skills necessary to (1) plan and perform regular maintenance on complex enterprise routed and switched networks and (2) use technology-based practices and a systematic ITIL-compliant approach to perform network troubleshooting.

Exam Topics The   following   information   provides   general   guidelines   for   the   content   likely   to   be included on the exam. However, other related topics may also appear on any specific delivery of the exam.

Maintain and monitor network performance

  • Develop a plan to monitor and manage a network
  • Perform network monitoring using IOS tools
  • Perform routine IOS device maintenance
  • Isolate sub-optimal internetwork   operation   at   the   correctly   defined   OSI   Model

layer Troubleshoot Multi Protocol system networks

  • Troubleshoot EIGRP
  • Troubleshoot OSPF
  • Troubleshoot eBGP
  • Troubleshoot routing redistribution solution
  • Troubleshoot a DHCP client and server solution
  • Troubleshoot NAT
  • Troubleshoot first hop redundancy protocols
  • Troubleshoot IPv6 routing
  • Troubleshoot IPv6 and IPv4 interoperability
  • Troubleshoot switch-to-switch connectivity for the VLAN based solution
  • Troubleshoot loop prevention for the VLAN based solution
  • Troubleshoot Access Ports for the VLAN based solution
  • Troubleshoot private VLANS
  • Troubleshoot port security
  • Troubleshoot general switch security
  • Troubleshoot VACL and PACL
  • Troubleshoot switch virtual interfaces (SVIs)
  • Troubleshoot switch supervisor redundancy
  • Troubleshoot switch support of advanced services (i.e., Wireless, VOIP and Video)
  • Troubleshoot a VoIP support solution
  • Troubleshoot a video support solution
  • Troubleshoot Layer 3 Security
  • Troubleshoot issues related to ACLs used to secure access to Cisco routers
  • Troubleshoot configuration issues related to accessing the AAA server for authentication purposes
  • Troubleshoot security issues related to IOS services (i.e.,finger, NTP, HTTP, FTP,RCP etc.)
  • Digital Electronics Basics
  • PLC Fundamentals & needs
  • PLC Hardware & Architecture
  • Concepts of Programming Languages
  • Introduction to PLC Programming software
  • Ladder programming,
  • Application Development & addressing schemes
  • Basic Programming Instructions
  • Advance Instructions
  • Fault finding & specific troubleshooting,
  • Communication with PC based systems
  • PLC Interfacing modules,
  • Different Industrial automation exercises like Interfacing with pneumatic and hydraulic systems, Load cell, Pneumatic solenoid Valve, Hall Effect Sensor, Thermocouple and PID Controller, Light Sensing, Object Sensing, Metal Detection etc.
  • Industrial visit for students.
  • Module 1 : GSM
    Unit 1: GSM Architecture
    Unit 2: GSM Protocols
    Unit 3: GSM Channels
    Unit 4: GSM ServicesModule 2 : Transmission Technologies
    Unit 1: Transmission Media
    Unit 2: Multiplexing & Applications
    Unit 3: Optical Transport Network
    Unit 4: Switching TechnologiesModule 3 : Antenna System
    Unit 1: Antenna Types
    Unit 2: Antenna Properties
    Unit 3: Antenna Selection Principles

Module 4 : RF Planning
Unit 1: RF Survey
Unit 2: Transmission Survey
Unit 3: ARFCN Concept
Unit 4: Frequency Planning
Unit 5: Planning Parameters
Unit 6: MAP Info Tool
Unit 7: MCOM Tool

Module 5 : BSS Implementation
Unit 1: BTS Hardware
Unit 2: BSC Hardware
Unit 3: Implementation
Unit 4: OMT Tool

Module 6 : Data Services
Unit 1: GPRS
Unit 2: GPRS Architecture
Unit 3: GPRS Data Flow
Unit 4: EDGE
Unit 5: VAS

Module 7 : CDMA Technology
Unit 1: CDMA Basics
Unit 2: CDMA Architecture
Unit 3: CDMA Codes
Unit 4: CDMA Channels
Unit 5: CDMA BTS Hardware

Module 8 : Operation & Maintenance
Unit 1: Faults & Rectification
Unit 2: ICM Tool
Unit 3: Configuration & Performance Management

Module 9: Network Switching System
Unit 1: NSS Description
Unit 2: SS7 Basics
Unit 3: SS7 Architecture
Unit 4: IN Network

Module 10 : 3G Mobile Networks
Unit 1: 3G Basics
Unit 2: WCDMA Concept
Unit 3: 3G Architecture
Unit 4: 3G Channels
Unit 5: 3G Codes

Module 11 : Network Performance Optimization
Unit 1: Optimization Process
Unit 2: Optimization Parameters
Unit 3: Key Performance Indicators

Module 12 : Drive Test
Unit 1: Drive Test Process
Unit 2: Drive Test Parameters
Unit 3:TEMS Investigation Tool

Module 13 : 3.5G Networks
Unit 1: HSDPA
Unit 2: HSUPA
Unit 3: Evolved HSPA

Module 14 : 4G Networks
Unit 1: 4G Introduction
Unit 2: 4G Architecture
Unit 3: Resource Blocks
Unit 4: 4G Channels
Unit 5: 4G Parameters

Module 15 : Networking Concepts
Unit 1: OSI Model
Unit 2: Network Layer
Unit 3: Internet Protocol

Module 16: Telecom Management
Unit 1: TMN Basic
Unit 2: TMN Architecture
Unit 3: SNMP

Module 17 : Cloud Computing & Virtualization
Unit 1: Cloud Computing Concept
Unit 2: Cloud Infrastructure
Unit 3: Virtualization Concept

Module 18 : Software Defined Networking
Unit 1: SDN Introduction
Unit 2: SDN Requirement
Unit 3: SDN Architecture

Module 19 : Network Functions Virtualization
Unit 1: NFV Introduction
Unit 2: NFV Requirement
Unit 3: NFV Architecture

Module 20 : Internet Of Things
Unit 1:IoT Introduction
Unit 2: IoT Architecture
Unit 3: IoT Applications

Module 21: Wi-Fi & Wi-Max
Unit 1: Wi-Fi Concept
Unit 2: Wi-Max Basics
Unit 3: Wi-Max Infrastructure

Module 22 : Career Skills
Career Skills

Module 23 : Project Assessment & Certification

Module 23 : Project Assessment & Certification
Project Assessment & Certification

 

Did you find apk for android? You can find new Free Android Games and apps.