Apply For This Course Now
Total Course Duration: 16 Months
-
MS-Word
-
Create & manage documents
-
Format text, paragraphs and sections
-
Create tables & lists
-
Apply reference
-
Insert and format objects
-
-
MS-PowerPoint
-
Create and manage presentation
-
Insert and format slides & shapes
-
Create slide content
-
Apply transition and animations
-
Manage multiple presentations
-
-
MS-Excel
-
Manage and share workbooks
-
Apply custom format and layouts
-
Create advance formulas
-
Create advance charts and tables
-
-
MS-Outlook
-
Manage the Outlook environment
-
Manage messages
-
Manage schedule
-
Manage contacts and groups
-
-
MS-Access
-
Create and manage database
-
Build tables
-
Create queries
-
Create forms
-
Create reports
-
Part I 220-901
-
Motherboards, Processor, and Memory
-
Storage device and power supplies
-
Peripherals and expansion slots
-
Display devices
-
Installing and configuring printers
-
Understanding laptops
-
Custom configuration
-
Understanding mobile devices
-
Hardware troubleshooting
-
Network fundamentals
-
Introduction to TCP/IP
-
Installing wireless & SOHO networks
-
Network troubleshooting
Part II 220-902
-
Operating system basics
-
Operating system administrations
-
Working with Windows 7
-
Working with Windows 8.1
-
Working with Mac OS and Linux
-
Security
-
Network services, cloud computing and virtualization
-
Mobile operating systems and connectivity
-
Troubleshooting theory, OSs and security
-
Understanding operational procedure
-
Topologies and infrastructure
-
Topologies and the OSI model
-
Ethernet
-
Hubs, bridges, switches
-
Infrastructure and design
-
-
Addressing & Routing
-
Internet and protocol
-
IPv4 addressing
-
DHCP & APIA
-
IPv6 addressing
-
Routing
-
-
Troubleshooting and management
-
Transport protocols
-
Name resolution
-
Application and services
-
Management and monitoring
-
Cloud and virtualization
-
-
Installation
-
Network sites
-
Installing cables
-
Installing wireless networks
-
WAN technologies
-
Installing remote access links
-
-
Security
-
Vulnerabilities and threats
-
Security appliances
-
Authentication
-
Incident response
-
Change and configuration management
-
-
Overview of Windows 10
-
Installing Windows 10
-
Configuring your device
-
Configuring network connectivity
-
Managing storage
-
Managing files and printers
-
Managing apps in windows 10
-
Managing data security
-
Managing device security
-
Managing network security
-
Troubleshooting and recovery
-
Maintaining Windows 10
-
Networking fundamentals
-
Introduction to TCP/IP
-
IPv4 addressing
-
Subnetting & VLSM
-
Configuring Cisco Switch-Catalyst
-
Configuring Cisco router
-
Managing IOS file
-
IP routing concepts
-
Static routing
-
Dynamic routing – RIP, EIGRP, OSPF, BGP
-
Access Control List (ACL)
-
Network Address Translation (NAT)
-
Implementing Virtual LANs (VLANs)
-
Spanning Tree Protocol (STP) concepts
-
Implementing point-to-point WAN
-
Private WANs with Ethernet and MPLS
-
Private WANs with Internet VPN
-
Creating Redundant First-Hop Routers
-
IPv6 addressing & routing
-
Network management
-
Accessing the command line
-
Manging files from the command line
-
Getting help in Red Hat Enterprise Linux
-
Creating, viewing and editing text files
-
Managing local Linux users and groups
-
Controlling access to files with Linux file system permissions
-
Monitoring and managing Linux processes
-
Controlling services and daemons
-
Configuring and securing OpenSSH service
-
Analyzing and storing logs
-
Managing Red Hat Enterprise Linux networking
-
Archiving and copying files between systems
-
Installing and updating software packages
-
Access Linux file systems
-
Using virtualized systems
-
Automating installation with kickstart
-
Using regular expressions with grep
-
Creating and editing text files with vim
-
Scheduling future Linux tasks
-
Managing priority of Linux processes
-
Controlling access to files with access control lists (ACLs)
-
Managing Selinux security
-
Connecting to network-defined users and groups
-
Adding disks, partitions and file systems to a Linux system
-
Managing logical volume management (LVM) storage
-
Accessing network storage with network file system (NFS)
-
Accessing network storage with SMB
-
Controlling and troubleshooting the Red Hat Enterprise Linux boot process
-
Limiting network communication with firewalld
-
Controlling services and daemons
-
Managing IPv6 networking
-
Configuring link aggregation and bridging
-
Network port security
-
Managing DNS for servers
-
Configuring Email transmission
-
Providing remote block storage
-
Providing file-based storage
-
Configuring MariaDB databases
-
Providing Apache HTTPD web service
-
Writing Bash scripts
-
Bash conditionals and control structures
-
Configuring the Shell environment
-
Linux containers and Docker
-
Introduction to Ethical Hacking
-
Footprinting and Reconnaissance
-
Scanning Networks
-
Enumeration
-
System Hacking
-
Malware threats
-
Sniffing
-
Social Engineering
-
Denial of Service
-
Session Hijacking
-
Hacking Webservers
-
Hacking Web Applications
-
SQL Injection
-
Hacking Wireless Networks
-
Hacking Mobile Platforms
-
Evading IDS, Firewalls and Honeypots
-
Cloud computing
-
Cryptography
-
Check Point Technology Overview
-
Deployment Platforms and Security Policies
-
Monitoring Traffic and Connections
-
Network Address Translations
-
User Management and Authentication
-
Using SmartUpdate
-
Implementing Identity Awareness
-
Introduction to check point VPNs
-
Resolving security administration issues
-
What is cloud computing?
-
Cloud models
-
Service models
-
Current cloud technologies
-
Cloud business value
-
Cloud infrastructure planning
-
Strategies for cloud adoption
-
Applications in the cloud
-
Cloud service rollout
-
Cloud service-level management
-
Security in cloud
-
Privacy and compliance
-
Fundamental of network security
-
Networking security concepts
-
Common security threats
-
-
Secure access
-
Implementing AAA in Cisco IOS
-
Bring your own device (BYOD)
-
-
Virtual Private Network (VPN)
-
Fundamentals of VPN Technology and Cryptography
-
Fundamentals of IP Security
-
Implementing IPsec Site-to-Site VPNs
-
-
Secure Routing and Switching
-
Securing Layer 2 Technologies
-
Network Foundation Protection
-
Securing the Management Plane on Cisco IOS Devices
-
Securing the Data Plane in IPv6
-
Securing Routing Protocols and the Control Plane
-
- Red Hat Certified System Administrator (RHCSA)
- Red Hat Certified Engineer (RHCE)
- MCSA (Microsoft Certified Solution Associate): Windows Server 2016
- CCSA (Check Point Certified Security Administrator)
- Certified Ethical Hacker (CEH)
- CompTIA Cloud+
like Linux system engineer, Linux system administrator, Windows server administrator,
firewall engineer, security analyst and many more.