Course Details
Image

ICITP

ICITP is for the candidates who are pursuing their graduation or students willing to pursue their career in IT management. This course covers highly in-demand technologies and adds an edge to the profile of trained professional. The integrated technologies in the course ensures higher remuneration and direct entry in high profile jobs which is normally meant for post graduate & science graduates.

Apply For This Course Now

Total Course Duration: 16 Months

  1. MS-Word

    • Create & manage documents

    • Format text, paragraphs and sections

    • Create tables & lists

    • Apply reference

    • Insert and format objects

  2. MS-PowerPoint

    • Create and manage presentation

    • Insert and format slides & shapes

    • Create slide content

    • Apply transition and animations

    • Manage multiple presentations

  3. MS-Excel

    • Manage and share workbooks

    • Apply custom format and layouts

    • Create advance formulas

    • Create advance charts and tables

  4. MS-Outlook

    • Manage the Outlook environment

    • Manage messages

    • Manage schedule

    • Manage contacts and groups

  5. MS-Access

    • Create and manage database

    • Build tables

    • Create queries

    • Create forms

    • Create reports

Part I 220-901

  • Motherboards, Processor, and Memory

  • Storage device and power supplies

  • Peripherals and expansion slots

  • Display devices

  • Installing and configuring printers

  • Understanding laptops

  • Custom configuration

  • Understanding mobile devices

  • Hardware troubleshooting

  • Network fundamentals

  • Introduction to TCP/IP

  • Installing wireless & SOHO networks

  • Network troubleshooting

 

Part II 220-902

  • Operating system basics

  • Operating system administrations

  • Working with Windows 7

  • Working with Windows 8.1

  • Working with Mac OS and Linux

  • Security

  • Network services, cloud computing and virtualization

  • Mobile operating systems and connectivity

  • Troubleshooting theory, OSs and security

  • Understanding operational procedure

  1. Topologies and infrastructure

    • Topologies and the OSI model

    • Ethernet

    • Hubs, bridges, switches

    • Infrastructure and design

 

  1. Addressing & Routing

    • Internet and protocol

    • IPv4 addressing

    • DHCP & APIA

    • IPv6 addressing

    • Routing

 

  1. Troubleshooting and management

    • Transport protocols

    • Name resolution

    • Application and services

    • Management and monitoring

    • Cloud and virtualization

 

  1. Installation

    • Network sites

    • Installing cables

    • Installing wireless networks

    • WAN technologies

    • Installing remote access links

 

  1. Security

    • Vulnerabilities and threats

    • Security appliances

    • Authentication

    • Incident response

    • Change and configuration management

  • Overview of Windows 10

  • Installing Windows 10

  • Configuring your device

  • Configuring network connectivity

  • Managing storage

  • Managing files and printers

  • Managing apps in windows 10

  • Managing data security

  • Managing device security

  • Managing network security

  • Troubleshooting and recovery

  • Maintaining Windows 10

  • Networking fundamentals

  • Introduction to TCP/IP

  • IPv4 addressing

  • Subnetting & VLSM

  • Configuring Cisco Switch-Catalyst

  • Configuring Cisco router

  • Managing IOS file

  • IP routing concepts

  • Static routing

  • Dynamic routing – RIP, EIGRP, OSPF, BGP

  • Access Control List (ACL)

  • Network Address Translation (NAT)

  • Implementing Virtual LANs (VLANs)

  • Spanning Tree Protocol (STP) concepts

  • Implementing point-to-point WAN

  • Private WANs with Ethernet and MPLS

  • Private WANs with Internet VPN

  • Creating Redundant First-Hop Routers

  • IPv6 addressing & routing

  • Network management 

  • Accessing the command line

  • Manging files from the command line

  • Getting help in Red Hat Enterprise Linux

  • Creating, viewing and editing text files

  • Managing local Linux users and groups

  • Controlling access to files with Linux file system permissions

  • Monitoring and managing Linux processes

  • Controlling services and daemons

  • Configuring and securing OpenSSH service

  • Analyzing and storing logs

  • Managing Red Hat Enterprise Linux networking

  • Archiving and copying files between systems

  • Installing and updating software packages

  • Access Linux file systems

  • Using virtualized systems

  • Automating installation with kickstart

  • Using regular expressions with grep

  • Creating and editing text files with vim

  • Scheduling future Linux tasks

  • Managing priority of Linux processes

  • Controlling access to files with access control lists (ACLs)

  • Managing Selinux security

  • Connecting to network-defined users and groups

  • Adding disks, partitions and file systems to a Linux system

  • Managing logical volume management (LVM) storage

  • Accessing network storage with network file system (NFS)

  • Accessing network storage with SMB

  • Controlling and troubleshooting the Red Hat Enterprise Linux boot process

  • Limiting network communication with firewalld

  • Controlling services and daemons

  • Managing IPv6 networking

  • Configuring link aggregation and bridging

  • Network port security

  • Managing DNS for servers

  • Configuring Email transmission

  • Providing remote block storage

  • Providing file-based storage

  • Configuring MariaDB databases

  • Providing Apache HTTPD web service

  • Writing Bash scripts

  • Bash conditionals and control structures

  • Configuring the Shell environment

  • Linux containers and Docker

  • Introduction to Ethical Hacking

  • Footprinting and Reconnaissance

  • Scanning Networks

  • Enumeration

  • System Hacking

  • Malware threats

  • Sniffing

  • Social Engineering

  • Denial of Service

  • Session Hijacking

  • Hacking Webservers

  • Hacking Web Applications

  • SQL Injection

  • Hacking Wireless Networks

  • Hacking Mobile Platforms

  • Evading IDS, Firewalls and Honeypots

  • Cloud computing

  • Cryptography

  • Check Point Technology Overview

  • Deployment Platforms and Security Policies

  • Monitoring Traffic and Connections

  • Network Address Translations

  • User Management and Authentication

  • Using SmartUpdate

  • Implementing Identity Awareness

  • Introduction to check point VPNs

  • Resolving security administration issues

  • What is cloud computing?

  • Cloud models

  • Service models

  • Current cloud technologies

  • Cloud business value

  • Cloud infrastructure planning

  • Strategies for cloud adoption

  • Applications in the cloud

  • Cloud service rollout

  • Cloud service-level management

  • Security in cloud

  • Privacy and compliance

  1. Fundamental of network security

    • Networking security concepts

    • Common security threats

  2. Secure access

    • Implementing AAA in Cisco IOS

    • Bring your own device (BYOD)

  3. Virtual Private Network (VPN)

    • Fundamentals of VPN Technology and Cryptography

    • Fundamentals of IP Security

    • Implementing IPsec Site-to-Site VPNs

  4. Secure Routing and Switching

    • Securing Layer 2 Technologies

    • Network Foundation Protection

    • Securing the Management Plane on Cisco IOS Devices

    • Securing the Data Plane in IPv6

    • Securing Routing Protocols and the Control Plane

 

Any technical and non-technical undergraduates/graduates
  • Red Hat Certified System Administrator (RHCSA)
  • Red Hat Certified Engineer (RHCE)
  • MCSA (Microsoft Certified Solution Associate): Windows Server 2016
  • CCSA (Check Point Certified Security Administrator)
  • Certified Ethical Hacker (CEH)
  • CompTIA Cloud+
Once the candidates complete this course, they'll be exposed to various job profiles
like Linux system engineer, Linux system administrator, Windows server administrator,
firewall engineer, security analyst and many more.