CCNA

The CCNA (Cisco Certified Network Associate) certification is the first in Cisco´s line of certifications that an aspiring networking professional must acquire in order to add value to their IT career. The CCNA certification validates a firm foundation of networking skills that include fundamentals like the OSI Reference Model, Networking Protocols, Layer 2 Switching Concepts and Protocols, Routing Concepts and Protocols, and Wide-Area Networking (WAN) Connectivity. Thus a person who is aiming to qualify for the CCNA certification should be proficient in their abilities to provide basic network installations and troubleshooting.

Course Contents

  • Introduction to Wide Area Networks
  • Internetwork Operating System (IOS)
  • IP Routing (Static & Dynamic)
  • LAN Switching
  • IPv4 & IPv6
  • STP, PVSTP & RSTP
  • Virtual Private Network – VPN
  • Redundancy Protocols
  • Network monitoring tools
  • NAT & PAT
  • Cisco Express Forwarding
  • Network Device Security
  • WAN Technologies (Cloud, SDN, IoT)
  • Troubleshooting

Course Details

Network Fundamentals

  • Compare & contrast OSI & TCP/IP models
  • Compare & contrast TCP & UDP protocols
  • Impact of infrastructure components in a network
    • Firewalls, Access points, Wireless controllers
  • Effects of cloud resources on network architecture
    • Traffic path to internal and external cloud services
    • Virtual services
    • Basic virtual network infrastructure
  • Compare & contrast collapsed core and three-tier architecture
  • Compare & contrast network topologies
    • Star, Mesh, Hybrid
  • Select the appropriate cabling type (Straight & Cross)
  • Apply troubleshooting methodologies to resolve problems
    • Perform and document fault isolation
    • Resolve or escalate
    • Verify & monitor resolution
  • Configure, verify & troubleshoot IPv4 addressing & subnetting
  • Compare & contrast IPv4 address types
    • Unicast, Broadcast, Multicast
  • Describe the need for private IPv4 addressing
  • Identify IPv6 addressing to use in LAN/WAN environment
  • Configure, verify & troubleshoot IPv6 addressing
  • Configure & verify IPv6 Stateless Address Auto Configuration
  • Compare & contrast IPv6 address types Global unicast,
  • Unique local, Link local, Multicast, Modified EUI 64, Autoconfiguration, Anycast

LAN Switching Technologies

  • Describe & verify switching concepts
    • MAC learning & aging, Frame switching, Frame flooding, MAC address table
  • Interpret Ethernet frame format
  • Troubleshoot interface & cable issues (collisions, errors, duplex, speed)
  • Configure, verify, and troubleshoot VLANs (normal/extended range) spanning multiple switches
    • Access ports (data & voice), Default VLAN
  • Configure, verify, and troubleshoot inter switch connectivity
    • Trunk ports, Add & remove VLANs on a trunk
    • DTP, VTP (v1&v2), and 802.1Q Native VLAN
  • Configure, verify, & troubleshoot STP protocols
    • STP mode (PVST+ and RPVST+), STP root bridge selection
  • Configure, verify & troubleshoot STP related optional features
    • PortFast, BPDU guard
  • Configure & verify Layer 2 protocols
    • Cisco Discovery Protocol, LLDP
  • Configure, verify, & troubleshoot (Layer 2/Layer 3) EtherChannel
    • Static, PAGP, LACP
  • Describe the benefits of switch stacking & chassis aggregation

Routing Technologies

  • Describe the routing concepts
    • Packet handling along the path through a network
    • Forwarding decision based on route lookup
    • Frame rewrite
  • Interpret the components of a routing table
    • Prefix, Network mask, Next hop, Routing protocol code
    • Administrative distance, Metric
    • Gateway of last resort & Admin distance
  • Configure, verify, & troubleshoot inter-VLAN routing
    • Router on a stick & SVI
  • Compare & contrast static routing & dynamic routing
  • Compare & contrast distance vector and link state routing protocols
  • Compare & contrast interior and exterior routing protocols
  • Configure, verify & troubleshoot IPv4 and IPv6 static routing
    • Default route, Network route, Host route, Floating static
  • Configure, verify & troubleshoot single area & multi-area OSPFv2 for IPv4 & IPv6
    (excluding authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs)
  • Configure, verify & troubleshoot EIGRP for IPv4 & IPv6
    (excluding authentication, filtering, manual summarization, redistribution, stub)
  • Configure, verify, and troubleshoot RIPv2 for IPv4
    (excluding authentication, filtering, manual summarization, redistribution)
  • Troubleshoot basic Layer 3 end-to-end connectivity issues

WAN Technologies

  • Configure & verify PPP and MLPPP on WAN interfaces using local authentication
  • Configure, verify, & troubleshoot PPPoE client-side interfaces using local authentication
  • Configure, verify, & troubleshoot GRE tunnel connectivity
  • Describe WAN topology options
    • Point-to-point, Hub and spoke, Full mesh, Single vs dual-homed
  • Describe WAN access connectivity options
    • MPLS, Metro Ethernet, Broadband PPPoE, Internet VPN (DMVPN, site-to-site VPN, client VPN)
  • Configure and verify single-homed branch connectivity using eBGP IPv4 (limited to peering and route advertisement using Network command only)
  • Describe basic QoS concepts
    • Marking, Device trust, Prioritization, (Voice, Video & Data)
    • Shaping, Policing, Congestion management

Infrastructure Services

  • Describe DNS lookup operation
  • Troubleshoot client connectivity issues involving DNS
  • Configure and verify DHCP on a router (excluding static reservations)
    • Server, Relay, Client, TFTP, DNS, & gateway options
  • Troubleshoot client- and router-based DHCP connectivity issues
  • Configure, verify, and troubleshoot basic HSRP
    • Priority, Pre-emption, Version
  • Describe common access layer threat mitigation techniques
    • Using CDP or LLDP for device discovery
    • Licensing, Logging, Time zone & Loopback
  • Configure and verify initial device configuration
  • Perform device maintenance

Linux Basics

This course will cover all aspects of Linux Certification. At the end of the course delegates will have the skills required to administer a Linux System. The course will also cover Internet application server configuration on live registered domain name with valid public IP addresses. The training will be given by Senior System / Network engineers with several years of industry experience.

Course Contents

  • Introduction to UNIX & LINUX
  • Files and Directories Management
  • User and Group Administration
  • Basic File Permissions
  • Disk Partitioning and Mounting File System
  • RAID (Redundant Array of Inexpensive Disks)
  • Data Backup and Recovery
  • Software Package Administration
  • Dynamic Host Configuration Protocol (DHCP)
  • FTP Server (vsftpd daemon)
  • Network File System (NFS)
  • DNS Server
  • Web Server (Apache)

Course Detail

Introduction to UNIX & LINUX

  • History of UNIX and LINUX
  • Differences between CentOS, Red Hat Enterprise Linux & Fedora
  • FHS and Linux Installation

Files and Directories Management

  • Creating files using cat and touch commands
  • Creating directories using mkdir command
  • Modifying file content using vi / vim editors

User and Group Administration

  • Creating and deleting users from the systems
  • Creating and deleting groups

Basic File Permissions

  • Verifying file permissions of existing objects
  • Modifying files permissions using chmod command

Disk Partitioning and Mounting File System

  • Creating partition using fdisk command
  • Formatting the partitions
  • Mounting the partitions

RAID (Redundant Array of Inexpensive Disks)

  • Implementing RAID on Linux
  • RAID levels (0, 1 and 5) configuration using RAID tools

Data Backup and Recovery

  • Taking data backup using tar command

Software Package Administration

  • Installing and deleting software packages using RPM & YUM
  • Querying and updating software packages

Dynamic Host Configuration Protocol (DHCP)

  • Configuring Linux as DHCP Server
  • Configuring various clients for DHCP Server (Windows & Linux)

FTP Server (vsftpd daemon)

  • Basics of File Transfer Protocol
  • Configuring FTP protocol to download and upload the files

Network File System (NFS)

  • Configuring NFS file sharing server
  • Mounting NFS shared folder from client systems

DNS Server

  • Configuration of DNS server
  • Configuration of forward lookup zone
  • Configuration of reverse lookup zone
  • Testing tool of DNS zones

Web Server (Apache)

  • Basics of Web Service
  • Introduction to Apache
  • Configuring Apache to host website

Linux Advanced

Practical Implementation in Real Time Environment

AcadiGO  brings to you the all new Advanced Linux course. This course is designed for professionals to easily install and configure advanced Linux services like IPv6, IPsec VPN, iptables as well as configuration of SAN, MySQL etc. The training will be conducted by senior System / Network engineers with several years of industry experience.

Course Contents:

  • Introduction and configuration of LDAP Server
  • Configuration of Winbind Server
  • Integration of Active Directory Users with Linux Clients
  • Implementation of LDAP Backup Server
  • Introduction & configuration of Postfix Mail Server
  • Authentication of SAMBA DOMAIN Server with WINDOWS Clients
  • Introduction & configuration of Kerberos Server
  • Introduction & configuration of MySQL Database Server
  • Implementation of HTTPS Service
  • Implementation of Nagios Monitoring Tool Service
  • Introduction & configuration of SAN
  • Explanation & configuration of CLUSTER Servers
  • Importance & configuration of NTP Server, Network Teaming and Rsyslog Server
  • Introduction & configuration of VPN (IPSeC)
  • Introduction & configuration of Apache Tomcat.
  • Implementation of all Servers on IPv6 DNS, WEB & MAIL etc.,
  • Securing Network with Firewall (IPtables, SElinux and FirewallD)

Course Detail

Booting Process

  • Introduction to Booting Process
  • Explaining types of booting process
  • Kernel Initialization
  • Types of Runlevels
  • Changing Runlevels
  • Managing services and daemons using systemctl command

Troubleshooting Linux System

  • Recovering super user password
  • Assigning password on GRUB
  • Recovering GRUB password
  • Troubleshooting server related issues

Virtualization

  • Installing Virtual machines using QEMU hypervisor
  • Starting and stopping libvirt daemon
  • Creating clone on virtual operating system

Apache Web Server (HTTPS)

  • Introduction of Apache
  • Differences between HTTP And HTTPS
  • Generating SSL keys
  • Creating CA
  • Redirecting http to https
  • Configuring HTTPS Clients

Apache Tomcat Server

  • Installation of JDK
  • Installation and Configuration of Tomcat
  • Creating tomcat user and password
  • Access Tomcat with web Interface
  • Deployment of Java files

Proxy Server (Squid)

  • Introduction to proxy server
  • Configuring proxy server and clients
  • Creating squid ACL’s rules to control internet access
  • Explanation about cache records

NTP Server

  • Introduction of NTP server
  • Configuration of NTP server
  • Configuration of NTP and Chronyd Clients
  • Verifying date and time synchronization

Advanced File Permissions

  • Explanation of SUID, SGID and Sticky bit
  • Configuring SUID on commands
  • Configuring SGID on group users
  • Configuring Sticky bit on objects
  • Configuring different permissions on users/groups using ACL permissions policy

Links Configuration

  • Explaining types of Links
  • Creating soft links and hard links
  • Differences between Soft and Hard links

Samba Server

  • Introduction to samba server
  • Configuring Samba server to share data with Linux and windows clients
  • Configuring samba server for multiple users

SAMBA PDC (Primary Domain Controller)

  • Configuring samba PDC server
  • Creating samba password on root user
  • Integrating windows client system into samba PDC server
  • Creating users in samba PDC database
  • Login Linux users into windows client systems

Samba Winbind Configuration

  • Introduction to samba winbind
  • Installing samba winbind
  • Integrating Linux client system with Active Directory domain
  • Starting winbind and oddjobd services
  • Login Active Directory Users from Linux clients

Kerberos Server

  • Introduction to Kerberos
  • Kerberos server configuration
  • Kerberos client configuration
  • Creating certificates in Kerberos server and client systems
  • Integrating Kerberos with NFS server
  • Configuration of Kerberos clients

Remote Installation (PXE Server)

  • Introduction to PXE and Kickstart
  • Kickstart configuration
  • PXE configuration at server system
  • Installing an operating system in client systems

Backup and Recovery

  • Introduction to dump command and backup methods
  • Taking full backup, Incremental and Differential backup
  • Explaining values of dump command
  • Deleting an existing data
  • Restoring lost data

Remote Backup

  • Taking remote backup using scp command
  • Finding data in destination system
  • Restoring the data back

Automation of jobs

  • Introduction to Crontab
  • Scheduling the system task automatically
  • Verifying the result

Openssh Configuration

  • Introduction to Openssh
  • Accessing the remote system using ssh command
  • Creating ssh key using ssh-keygen
  • Configuration of ssh authentication
  • Making client login into other system without password

IPsec VPN

  • Introduction to VPN
  • Features of VPN
  • Types of VPN
  • Types of VPN Protocols
  • Creating tunnel in between networks
  • Configuration of host to host VPN
  • Verifying result in client systems

Maria DB

  • Installation of MariaDB on LINUX
  • Starting the service
  • Creating a MariaDB root Account
  • Location of MariaDB Database
  • Accessing MariaDB Command Line
  • Creating and Deleting MariaDB

IPv6 Configuration

  • Check For Ipv6 Support In The Current Running Kernel
  • Compile kernel with IPv6 capabilities
  • IPv6 network devices
  • Adding, Checking and Removing IPv6 using nmcli command
  • Bringing Interface up/down
  • Configuring Servers on IPv6 address

LDAP Server

  • Introduction of LDAP
  • Structure of LDAP Schema
  • Features of LDAP
  • Differences between NIS and LDAP
  • Configuring LDAP Server
  • Configuring LDAP Client
  • Adding, Modifying and Deleting Users from LDAP Database

Auto Mounting

  • Introduction to Auto Mounting
  • Auto Mounting to NFS shared directory

Kernel Up gradation

  • Checking existing Kernel
  • Upgrading Kernel with RPM tool
  • Check new kernel version

Log Server

  • Configuring Rsyslog and Saving Syslog Messages
  • Sending Syslog Message over the network
  • Configuring Rsyslog clients and Users log files

Mail Server (Postfix/Squirrelmail)

  • Basics of Mail Servers
  • Configuring SMTP service using Postfix
  • Configuring POP3 / IMAP service on Linux

Storage Technologies (iSCSI SAN)

  • Introduction to SAN, DAS and NAS
  • Explaining components of SAN
  • Configuring SAN Server by using targetcli
  • Making SAN Clients by using iscsiadm tool

Logical Volume Manager (LVM)

  • Introduction to LVM components
  • Increasing and decreasing partition size

Disk Quotas

  • Enabling Quotas on partitions
  • Creating Quotas for users
  • Auditing Quotas limit

Process Management

  • Introduction to Various Process
  • Managing Background and Foreground Process
  • killing process
  • Monitoring and Managing using top command
  • Explanation of Nice values, Zombie and Orphan process

Network Teaming (IP Bonding)

  • Introduction to Teaming
  • Round Robin Runner
  • Active Backup Runner
  • Load Balancer Runner
  • Configuring active backup Teaming

Clustering (Web Based)

  • Types of CLUSTER
  • Explanation of Load Balancing & LVS Components
  • Configuring Real and Backup Servers
  • Checking Load Balancing in CLUSTER Server

Nagios Monitoring Tool

  • Installation of Nagios and Plugins
  • Configuration of Nagios
  • Creating Nagios User and Group
  • Starting the Service
  • Monitoring network infrastructure via Nagios web interface
  • Adding hosts and services into Nagios database

IP-tables Firewall

  • Introduction to IP-tables chains and tables
  • Configuration of IP-tables rules
  • Activating the IP-tables rules
  • Configuring IP-tables to secure network

SElinux Firewall

  • Introduction to SElinux policies
  • Configuring SElinux Permanent
  • Configuring SElinux to protect various servers

Dynamic Firewall

  • Introduction to firewalld
  • Difference between IP-tables and Dynamic Firewall
  • Configuring rich rules
  • Configuring port forwarding rule
  • Adding firewalld rules permanent and temporary
  • Updating the rules

Webmin Installation

  • Introduction to webmin
  • Installation of webmin

Operating Linux on GUI mode

MCSE 2016

In today’s rapidly changing IT marketplace, Microsoft Certifications are designed to help the IT professional to utilize advanced technologies, fine tune troubleshooting skills and improve job satisfaction. A certification from Microsoft also confirms your demonstrated experience and knowledge in using Microsoft products and solutions.

Over the last many years, the Training Academy at Zoom Technologies has been a center for training thousands of aspiring IT professionals in various Microsoft Certifications at our state-of-the-art facility in Hyderabad. The training will be given by Senior System / Network engineers with several years of field experience.

Course Contents

  • Microsoft Hyper-V & Active Directory Domain Services
  • Organizational Unit & Distributed File System
  • Structures of Active Directory
  • Active Directory Trust
  • Operation Masters & Group Policies
  • Dynamic Host Configuration Protocol (DHCP)
  • Domain Naming System (DNS) using IPv4 & IPv6
  • Windows Deployment Services (WDS)
  • Windows Server Update Services (WSUS)
  • Storage Management
  • Routing & Remote Access Services (RRAS)
  • AD Federation Services (AD-FS) & AD Lightweight Directory Services (AD-LDS)
  • AD Rights Management Services (AD-RMS) & AD Certificate Services (AD-CS)
  • Failover Clustering, Containers, Dockers & Microsoft Passport

Course Detail

Operating System

  • Introduction to Server 2016 Operating System
  • History of Server Operating System
  • Editions of Windows Server 2016
  • Requirements to install Windows Server 2016
  • Installing Windows Server 2016 Operating System
  • Upgrading Windows Server 2012 to Windows Server 2016
  • Introduction to Nano Server

Microsoft Hyper-V

  • Introduction to Virtualization
  • Types of Hypervisors
  • Virtualization using Hyper-V
  • Configuring Virtual Machines
  • Configuring Virtual Hard Disks
  • Configuring Virtual Switches

Active Directory Domain Services

  • IP Addressing (IPv4 & IPv6)
  • Client/Server Architecture
  • Introduction to Active Directory
  • Features of Active Directory
  • Installing Active Directory Domain Controller

Clients, Member Servers, User Management

  • Configuring Clients & Member Servers
  • Creating Users in ADDS
  • Password Policies
  • Account Lockout Policies
  • Allow Log On Locally
  • User Properties
  • Kerberos Policies

Organizational Unit & Distributed File System

  • Permissions (Security & Sharing)
  • Creating Organizational Units
  • Delegating Control to a User
  • Groups
  • DFS Namespaces
  • Overview of DFS Replica
  • Branch Cache

Structures of Active Directory

  • Configuring Additional Domain Controller
  • Tree Structure – Child Domain
  • Forest Structure – Tree Domain

Operation Masters

  • Transferring Operation Masters
  • Seizing Operation Master
  • Migrating Operation Masters from Windows 2012 DC to Windows 2016 DC

Group Policies

  • User & Computer Policies
  • Scopes of Policies – OU, Domain & Sites
  • Resultant Set of Policies (RSOP)
  • Software Deployment
  • Scripts, Folder Redirection
  • Group Policy Preferences
  • Auditing

Active Directory Trust

  • Introduction to Active Directory Trust Relationship
  • Categories, Directions & Types of Trusts
  • Functional Levels
  • Configuring Forest Trusts
  • Active Directory Recycle Bin

Read Only Domain Controller & Sites

  • Active Directory Partitions
  • Configuring Global Catalog Servers
  • Configuring Sites, Sitelinks
  • Configuring RODC using Install from Media (IFM)

Dynamic Host Configuration Protocol (DHCP)

  • Installing DHCP Service
  • Authorizing DHCP Server
  • Creating Scopes (IPv4 & IPv6)
  • Reservations
  • DHCP Backup
  • DHCP Failover on IPv4
  • DHCP Migrations

Domain Naming System (DNS) using IPv4 & IPv6

  • Introduction to DNS
  • DNS Naming Hierarchy
  • Types of Lookups
  • Types of Zones
  • Types of DNS Records
  • Forwarders
  • Dynamic Updates
  • DNS Policies
  • DNS Security (DNSSEC)

Windows Deployment Services (WDS)

  • Introduction & Configuration of WDS Server
  • Attended & Unattended Installation

Windows Server Update Services (WSUS)

  • Introduction & Configuration of WSUS
  • Deploying Patches
  • Windows Server Backup

Storage Management

  • Storage Types
  • Introduction to Storage Spaces & Storage Pools
  • Configuring Simple Volume (RAID-0)
  • Configuring Mirrored Volume (RAID-1)
  • Configuring Parity Volume (RAID-5)
  • Introduction to ISNS (Internet Storage Name Service) & MPIO (Multipath Input/Output)

Routing & Remote Access Services (RRAS)

  • Configuring Static Routes on IPv4 & IPv6
  • NAT, DHCP Relay Agent
  • VPN & Direct Access

AD Federation Services (AD-FS) & AD Lightweight Directory Services (AD-LDS)

AD Rights Management Services (AD-RMS) & AD Certificate Services (AD-CS)

Failover Clustering

  • Configuring High Availability on Virtual Machines

Containers, Dockers & Microsoft Passport

Amazon Web Services

Cloud hosted web sites and applications are the future of Information Technology. Amazon Web Services (AWS) is a secure cloud services platform, offering compute power, database storage, content delivery, highly reliable, scalable, low-cost pay-for-what-you-use infrastructure platform on the cloud. AWS powers hundreds of thousands of businesses around the world and offers other functionality to help businesses scale and grow.

As Cloud Computing has become very popular, there is a great demand for System and Cloud Administrators with AWS skills.

This course is taught by industry experts with several years of experience.

Course Outline

  1. Introduction to Cloud Computing
  2. Introduction to Amazon Web Services (AWS)
  3. Compute Services (EC2, AMI Etc.)
  4. EC2 Instances
  5. Amazon Elastic Block Store (EBS)
  6. LOAD BALANCING & Auto Scaling
  7. Network & Security
  8. Elastic Beanstalk, Amazon Virtual Private Cloud (VPC)
  9. Amazon Route 53
  10. Security & Identity Services, IAM
  11. Storage & Content Delivery Services, Amazon S3 & Amazon Glacier
  12. Database Services (RDS, NoSQL Service)
  13. Management Tools (Amazon Cloud watch, Cloud Formation)
  14. Application Services (SES, SQS, SNS)

Course Detail

Introduction to Cloud Computing

  • What is Cloud
  • Why Cloud?
  • Types of Cloud Deployment Models
  • Types of Cloud Services
  • Future of Cloud Technologies
  • Advantages and Disadvantages of Cloud

Introduction to Amazon Web Services (AWS)

  • What is AWS?
  • How to Subscribe for AWS account
  • What is the AWS Free Usage Tier
  • AWS Certification
  • Introduction to the AWS management Console
  • List of services given by AWS

Compute Services

Elastic Compute Cloud (EC2)

  • What is Amazon EC2?
  • Features of Amazon EC2
  • Managing the EC2 infrastructure
  • EC2 Dashboard
  • Pricing for Amazon EC2

Regions and Availability Zone Concepts

  • Describing Regions
  • Availability Zones, and Endpoints
  • Managing instances in an Availability Zone

Amazon Machine Images (AMI)

  • Managing AMIs
  • Working with Windows, Linux AMIs
  • Shared and Paid AMI
  • Making an AMI Public

EC2 Instances

  • Instance Type
  • Instance life cycle
  • Differences between reboot, stop, and terminate
  • Building an EC2 windows and linux instances
  • To install instance in public and private subnet
  • Security via Key Pairs
  • EC2 Class and VPC Security Groups
  • Managing Elastic IP’s
  • Pricing model in EC2 instances
  • EC2 with Amazon command line interface

Amazon Elastic Block Store (EBS)

  • Features of Amazon EBS
  • Amazon EBS volumes
  • Managing EBS volumes
  • Increasing the volume size
  • AmazonEBS snapshots

Load Balancing

  • Creating a load balancer
  • Internal and external load balancer
  • Load balancing protocols
  • Security groups for the load balancer
  • Health check for the load balancer
  • Cross-zone load balancing
  • Connection Draining

Auto Scaling

  • What is auto scaling?
  • Auto scaling components
  • Benefits of auto scaling
  • Creation of launch configuration
  • Configuration of auto scaling policies
  • Advantages of using auto scaling with ELB

Network & Security

  • Security Groups
  • Elastic IPs
  • Placement Groups
  • Key Pairs
  • Network Interfaces

Elastic Beanstalk

  • Deploy, manage, scale an application
  • How management complexity are reduced
  • Workflow of Elastic Beanstalk
  • Create Application
  • Launch Environment
  • Manage Environment
  • Creating application source bundle
  • Modifying the properties of the deployment

Networking Services

Amazon Virtual Private Cloud (VPC)

  • What is Amazon VPC?
  • VPC Essentials
  • Default and Nondefault VPC
  • VPC Networking and ACL
  • Security Groups
  • DNS and DHCP Options Sets
  • VPC Peering and Endpoints
  • Subnet Routing
  • VPC Internet Gateway
  • Elastic IP addresses and network interfaces
  • VPC integration with many other AWS services
  • Creating a NAT instance in a VPC
  • Configuring a Web application in VPC
  • Pricing for Amazon VPC

Amazon Route 53

  • Route 53 as your DNS service
  • Using Traffic Flow
  • Route 53 Health Checks
  • Configuring DNS Failover
  • Latency Based Routing
  • Weighted Routing Policies

Security & Identity Services

Identity Access Management (IAM)

  • IAM Features
  • Getting Started With IAM
  • Creation of user, groups, roles
  • Managing policies
  • Credential Report
  • IAM Console and the Sign-in Page

Storage & Content Delivery Services

Amazon S3

  • What is object Storage?
  • Data as objects
  • Lifecycles of S3
  • Managing Buckets
  • Accessing S3 storage via tools
  • Creation of a static website using S3 storage

Amazon Glacier

  • Low-cost storage service
  • Storage for data backup and archival
  • Pricing model for Glacier storage
  • Working with vaults and archives

Database Services

Relational Database Service (RDS)

  • RDS Essentials
  • Launching RDS instance
  • Selecting the Engine
  • Configuring the Database Engine
  • Managing RDS Database
  • Setting up automatic backups
  • Authorizing access to the DB

DynamoDB (NoSQL Service)

  • DynamoDB overview
  • What is NoSQL database?
  • How It Works
  • Using the DynamoDB Console
  • Creating Tables and Loading Sample Data
  • Query and Scan Operations in DynamoDB

Management Tools

Amazon CloudWatch

  • Amazon CloudWatch Architecture
  • List of services monitored by CloudWatch
  • Collect and track metrics
  • Monitoring memory and disk Metrics
  • Monitoring logs, Graphs
  • Set Alarms

Cloud Formation

  • Building AWS infrastructure as a code
  • Design a template
  • Create a Stack
  • Create a Template from your Existing Resources
  • Introduction to JSON

Application Services

Amazon Simple Email Service (SES)

  • Simple email service overview
  • Configuring Amazon email service
  • Amazon SES and Deliverability
  • Amazon SES Email-Sending Process
  • Email format and Limits of SES

Amazon Simple Queue Service (SQS)

  • Simple Queue service overview
  • SQS for background work task
  • Creating a Queue
  • Confirming the Queue exists
  • Add a permission to the Queue

Amazon Simple Notification Service (SNS)

  • Simple Notification Service overview
  • SNS architecture
  • Publishers and subscribers
  • Creation of a topic
  • Subscribing to topic via Email
  • Setting notification for EC2 instance changes

Microsoft Azure

Course Detail

Introduction to Azure

  • Cloud technology overview
  • Overview of Azure
  • Managing Azure with the Azure portal
  • Managing Azure with Windows PowerShell
  • Overview of Azure Resource Manager
  • Azure management services

Managing Microsoft Azure

  • Use the Azure portals
  • Use Azure Resource Manager features via the Azure portal.
  • Use Azure PowerShell

Implementing and managing Azure networking

  • Overview of Azure networking
  • Implementing and managing Azure virtual networks
  • Configuring Azure virtual networks
  • Configuring Azure virtual network connectivity
  • Overview of Azure classic networking

Using a deployment template to implement Azure virtual networks

  • Creating an Azure virtual network by using a deployment template
  • Creating a virtual network by using PowerShell
  • Configure virtual networks

Configuring connectivity between classic and Azure Resource Manager virtual networks

  • Using a PowerShell script to connect a classic VNet and an Azure Resource Manager VNet
  • Configuring a point-to-site VPN
  • Validating virtual network connectivity

Implementing virtual machines

  • Overview of Azure Resource Manager virtual machines
  • Planning for Azure virtual machines
  • Deploying Azure Resource Manager virtual machines
  • Authoring Azure Resource Manager templates
  • Overview of classic virtual machines

Creating Azure Resource Manager virtual machines in Azure

  • Creating virtual machines by using the Azure portal and Azure PowerShell
  • Validating virtual machine creation

Deploying Azure Resource Manager virtual machines by using Azure Resource Manager templates

  • Using Visual Studio and an Azure Resource Manager template to deploy virtual machines
  • Using Azure PowerShell and an Azure Resource Manager template to deploy virtual machines

Managing Azure virtual machines

  • Configuring virtual machines
  • Configuring virtual machine disks
  • Managing and monitoring Azure virtual machines
  • Managing classic virtual machines
  • Configuring availability
  • Implementing desired state configuration (DSC)
  • Implementing storage space–based volumes

Planning and implementing storage, backup, and recovery services

  • Planning storage
  • Implementing and managing storage
  • Implementing Azure Content Delivery Networks
  • Implementing Azure Backup
  • Planning for and implementing Azure Site Recovery
  • Creating and configuring Azure storage
  • Using Azure file storage
  • Protecting data with Microsoft Azure Backup

Implementing Azure Active Directory

  • Creating and managing Azure AD tenants
  • Configuring application and resource access with Azure AD
  • Overview of Azure AD Premium
  • Administering Active AD
  • Configuring SSO
  • Configuring Multi-Factor Authentication
  • Configuring SSO from a Windows 10–based computer that is joined to Azure AD

 

This course focuses on skills required for IT Professionals who take part in evaluating, planning, deploying Office 365 services and set up an Office 365 tenant including its identities, dependencies, requirements and supporting technologies.

Office 365

Course Outline

  1. Overview of Office 365, plan an Office 365 pilot deployment
  2. Creating the Office 365 tenant
  3. Manage Organization settings and user settings
  4. Manage Office 365 users, groups, and licenses, and configure delegated administration
  5. Plan and configure client connectivity to Office 365
  6. Plan and implement the deployment of Office 365 ProPlus
  7. Plan and configure directory synchronization between Azure AD and on-premises AD DS
  8. Plan and manage Exchange Online recipients and permissions
  9. Plan and configure Exchange Online services
  10. Plan and configure SharePoint Online
  11. Plan and configure Yammer Enterprise, OneDrive for Business
  12. Plan and configure Microsoft Teams
  13. Plan and configure Security and compliance features in Office 365
  14. Monitor and review Office 365 services, and troubleshoot Office 365 issues

Course Detail

Module 1: Planning and provisioning Office 365

  • Overview of Office 365
  • Provisioning an Office 365 tenant
  • Planning a pilot deployment
  • Creating Office 365 tenant.

Module 2: Managing Office 365 Organizational and users settings

  • Configuring user settings
  • Configuring Organization settings

Module 3: Managing Office 365 users and groups

  • Managing user accounts and licenses
  • Managing passwords and authentication
  • Managing security groups in Office 365
  • Configuring Roles and administrative access
  • Managing Office 365 users and groups with Windows PowerShell

Module 4: Configuring client connectivity to Microsoft Office 365

  • Planning for Office 365 clients
  • Planning connectivity for Office 365 clients
  • Configuring connectivity for Office 365 clients

Module 5: Planning and deploying Office 365 ProPlus

  • Overview of Office 365 ProPlus
  • Planning and managing user-driven Office 365 ProPlus deployments
  • Planning and managing centralized deployments of Office 365 ProPlus
  • Office telemetry and reporting

Module 6: Planning and configuring directory synchronization

  • Planning and preparing for directory synchronization
  • Implementing directory synchronization by using Azure AD Connect
  • Managing Office 365 identities with directory synchronization

Module 7: Planning and managing Exchange Online recipients and permissions

  • Overview of Exchange Online
  • Managing Exchange Online recipients
  • Planning and configuring Exchange Online permissions

Module 8: Planning and configuring Exchange Online services

  • Planning and configuring email flow in Office 365
  • Planning and configuring email protection in Office 365
  • Planning and configuring client access policies

Module 9: Planning and configuring SharePoint Online

  • Configuring SharePoint Online services
  • Planning and configuring SharePoint site collections
  • Planning and configuring external user sharing

Module 10: Planning and configuring a Office 365 collaboration solution

  • Planning and configuring OneDrive for Business
  • Planning and managing Yammer Enterprise

Module 11: Planning and deploying Microsoft Teams

  • Overview of Microsoft Teams
  • Planning and creating Teams
  • Managing Microsoft Teams

Module 12: Security and compliance in Office 365

  • Overview of the Security and compliance features in Office 365
  • Managing the Security and compliance in Office 365

Module 13: Monitoring and troubleshooting Microsoft Office 365

  • Monitoring Office 365 service health
  • Troubleshooting Office 365

OpenStack

The OpenStack Foundation has developed the Certified OpenStack Administrator exam which offers a career-path based Certification for OpenStack professionals. The exam is performance-based and will test the baseline skills of an OpenStack Administrator, a person with at least 6 months of OpenStack experience who provides day-to-day operation and management of an OpenStack cloud.

Below are the specific content areas (Domains) and the specific tasks on which candidates may be expected to demonstrate their knowledge.

Course Detail

Getting to know OpenStack

  • Understand the components that make up the cloud
  • Use the OpenStack API/CLI

Identity management

  • Manage Keystone catalogue services and endpoints
  • Manage/Create domains, groups, projects, users, and roles
  • Create roles for the environment
  • Manage the identity service
  • Verify operation of the Identity service

Dashboard

  • Verify operation of the Dashboard

Compute

  • Manage flavors
  • Manage compute instance actions (e.g. launch, shutdown, terminate)
  • Manage Nova user keypairs
  • Launch a new instance
  • Shutdown an Instance
  • Terminate Instance
  • Configure an Instance with a Floating IP address
  • Manage project security group rules
  • Assign security group to Instance
  • Assign floating IP address to Instance
  • Detach floating IP address from Instance
  • Manage Nova host consoles (rdp, spice, tty)
  • Access an Instance using a keypair
  • Manage instance snapshots
  • Manage Nova compute servers
  • Manage quotas
  • Get Nova stats (hosts, services, tenants
  • Verify operation of the Compute service

Object Storage

  • Manage access to object storage
  • Manage expiring objects
  • Manage storage policies
  • Monitor space available for object store
  • Verify operation of Object Storage
  • Manage permissions on a container in object storage

Block Storage

  • Manage volume
  • Create volume group for block storage
  • Create a new Block Storage Volume and mount it to a Nova Instance
  • Manage quotas
  • Manage volumes quotas
  • Manage volumes backups
  • Backup and restore volumes
  • Manage volume snapshots (e.g, take, list, recover)
  • Verify that block storage can perform snapshotting function
  • Snapshot volume
  • Manage volumes encryption
  • Set up storage pools
  • Monitor reserve capacity of block storage devices
  • Analyze discrepancies in reported volume sizes

Networking

  • Manage network resources (e.g., routers, subnets)
  • Create external networks
  • Create project networks
  • Create project routers
  • Manage network services for a virtual environment
  • Manage project security group rules
  • Manage quotas
  • Verify operation of network service
  • Manage network interfaces on compute instances
  • Troubleshoot network issues for a tenant network (enter namespace, run tcpdump, etc)

Heat/Orchestration

  • Launch a stack using a Heat/Orchestration template (e.g., storage, network, and compute
  • Use Heat/Orchestration CLI and Dashboard
  • Verify Heat/Orchestration stack is working
  • Verify operation of Heat/Orchestration
  • Create a Heat/Orchestration template that matches a specific scenario
  • Update a stack
  • Obtain detailed information about a stack

Troubleshooting

  • Analyze log files
  • Backup the database(s) used by an OpenStack instance
  • Centralize and analyze logs (e.g.,/var/log/COMPONENT_NAME, Database Server, Messaging Server, Web Server, syslog)
  • Analyze database servers
  • Analyze Host/Guest OS and Instance status
  • Analyze messaging servers
  • Analyze meta data servers
  • Analyze network status (physical & virtual)
  • Analyze storage status (local, block & object)
  • Manage OpenStack Services
  • Diagnose service incidents
  • Digest OpenStack environment (Controller, Compute, Storage and Network nodes)
  • Direct logging files through centralized logging system
  • Backup and restore an OpenStack instance
  • Troubleshoot network performance

Image management

  • Deploy a new image to an OpenStack instance
  • Manage image types and backends
  • Manage images (e.g. add, update, remove)
  • Verify operation of the Image Service
CCNA

CCNA

The CCNA (Cisco Certified Network Associate) certification is the first in Cisco´s line of certifications that an aspiring networking professional must acquire in order to add value to their IT career. The CCNA certification validates a firm foundation of networking skills that include fundamentals like the OSI Reference Model, Networking Protocols, Layer 2 Switching Concepts and Protocols, Routing Concepts and Protocols, and Wide-Area Networking (WAN) Connectivity. Thus a person who is aiming to qualify for the CCNA certification should be proficient in their abilities to provide basic network installations and troubleshooting.

Course Contents

  • Introduction to Wide Area Networks
  • Internetwork Operating System (IOS)
  • IP Routing (Static & Dynamic)
  • LAN Switching
  • IPv4 & IPv6
  • STP, PVSTP & RSTP
  • Virtual Private Network – VPN
  • Redundancy Protocols
  • Network monitoring tools
  • NAT & PAT
  • Cisco Express Forwarding
  • Network Device Security
  • WAN Technologies (Cloud, SDN, IoT)
  • Troubleshooting

Course Details

Network Fundamentals

  • Compare & contrast OSI & TCP/IP models
  • Compare & contrast TCP & UDP protocols
  • Impact of infrastructure components in a network
    • Firewalls, Access points, Wireless controllers
  • Effects of cloud resources on network architecture
    • Traffic path to internal and external cloud services
    • Virtual services
    • Basic virtual network infrastructure
  • Compare & contrast collapsed core and three-tier architecture
  • Compare & contrast network topologies
    • Star, Mesh, Hybrid
  • Select the appropriate cabling type (Straight & Cross)
  • Apply troubleshooting methodologies to resolve problems
    • Perform and document fault isolation
    • Resolve or escalate
    • Verify & monitor resolution
  • Configure, verify & troubleshoot IPv4 addressing & subnetting
  • Compare & contrast IPv4 address types
    • Unicast, Broadcast, Multicast
  • Describe the need for private IPv4 addressing
  • Identify IPv6 addressing to use in LAN/WAN environment
  • Configure, verify & troubleshoot IPv6 addressing
  • Configure & verify IPv6 Stateless Address Auto Configuration
  • Compare & contrast IPv6 address types Global unicast,
  • Unique local, Link local, Multicast, Modified EUI 64, Autoconfiguration, Anycast

LAN Switching Technologies

  • Describe & verify switching concepts
    • MAC learning & aging, Frame switching, Frame flooding, MAC address table
  • Interpret Ethernet frame format
  • Troubleshoot interface & cable issues (collisions, errors, duplex, speed)
  • Configure, verify, and troubleshoot VLANs (normal/extended range) spanning multiple switches
    • Access ports (data & voice), Default VLAN
  • Configure, verify, and troubleshoot inter switch connectivity
    • Trunk ports, Add & remove VLANs on a trunk
    • DTP, VTP (v1&v2), and 802.1Q Native VLAN
  • Configure, verify, & troubleshoot STP protocols
    • STP mode (PVST+ and RPVST+), STP root bridge selection
  • Configure, verify & troubleshoot STP related optional features
    • PortFast, BPDU guard
  • Configure & verify Layer 2 protocols
    • Cisco Discovery Protocol, LLDP
  • Configure, verify, & troubleshoot (Layer 2/Layer 3) EtherChannel
    • Static, PAGP, LACP
  • Describe the benefits of switch stacking & chassis aggregation

Routing Technologies

  • Describe the routing concepts
    • Packet handling along the path through a network
    • Forwarding decision based on route lookup
    • Frame rewrite
  • Interpret the components of a routing table
    • Prefix, Network mask, Next hop, Routing protocol code
    • Administrative distance, Metric
    • Gateway of last resort & Admin distance
  • Configure, verify, & troubleshoot inter-VLAN routing
    • Router on a stick & SVI
  • Compare & contrast static routing & dynamic routing
  • Compare & contrast distance vector and link state routing protocols
  • Compare & contrast interior and exterior routing protocols
  • Configure, verify & troubleshoot IPv4 and IPv6 static routing
    • Default route, Network route, Host route, Floating static
  • Configure, verify & troubleshoot single area & multi-area OSPFv2 for IPv4 & IPv6
    (excluding authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs)
  • Configure, verify & troubleshoot EIGRP for IPv4 & IPv6
    (excluding authentication, filtering, manual summarization, redistribution, stub)
  • Configure, verify, and troubleshoot RIPv2 for IPv4
    (excluding authentication, filtering, manual summarization, redistribution)
  • Troubleshoot basic Layer 3 end-to-end connectivity issues

WAN Technologies

  • Configure & verify PPP and MLPPP on WAN interfaces using local authentication
  • Configure, verify, & troubleshoot PPPoE client-side interfaces using local authentication
  • Configure, verify, & troubleshoot GRE tunnel connectivity
  • Describe WAN topology options
    • Point-to-point, Hub and spoke, Full mesh, Single vs dual-homed
  • Describe WAN access connectivity options
    • MPLS, Metro Ethernet, Broadband PPPoE, Internet VPN (DMVPN, site-to-site VPN, client VPN)
  • Configure and verify single-homed branch connectivity using eBGP IPv4 (limited to peering and route advertisement using Network command only)
  • Describe basic QoS concepts
    • Marking, Device trust, Prioritization, (Voice, Video & Data)
    • Shaping, Policing, Congestion management

Infrastructure Services

  • Describe DNS lookup operation
  • Troubleshoot client connectivity issues involving DNS
  • Configure and verify DHCP on a router (excluding static reservations)
    • Server, Relay, Client, TFTP, DNS, & gateway options
  • Troubleshoot client- and router-based DHCP connectivity issues
  • Configure, verify, and troubleshoot basic HSRP
    • Priority, Pre-emption, Version
  • Describe common access layer threat mitigation techniques
    • Using CDP or LLDP for device discovery
    • Licensing, Logging, Time zone & Loopback
  • Configure and verify initial device configuration
  • Perform device maintenance
Linux Basics

Linux Basics

This course will cover all aspects of Linux Certification. At the end of the course delegates will have the skills required to administer a Linux System. The course will also cover Internet application server configuration on live registered domain name with valid public IP addresses. The training will be given by Senior System / Network engineers with several years of industry experience.

Course Contents

  • Introduction to UNIX & LINUX
  • Files and Directories Management
  • User and Group Administration
  • Basic File Permissions
  • Disk Partitioning and Mounting File System
  • RAID (Redundant Array of Inexpensive Disks)
  • Data Backup and Recovery
  • Software Package Administration
  • Dynamic Host Configuration Protocol (DHCP)
  • FTP Server (vsftpd daemon)
  • Network File System (NFS)
  • DNS Server
  • Web Server (Apache)

Course Detail

Introduction to UNIX & LINUX

  • History of UNIX and LINUX
  • Differences between CentOS, Red Hat Enterprise Linux & Fedora
  • FHS and Linux Installation

Files and Directories Management

  • Creating files using cat and touch commands
  • Creating directories using mkdir command
  • Modifying file content using vi / vim editors

User and Group Administration

  • Creating and deleting users from the systems
  • Creating and deleting groups

Basic File Permissions

  • Verifying file permissions of existing objects
  • Modifying files permissions using chmod command

Disk Partitioning and Mounting File System

  • Creating partition using fdisk command
  • Formatting the partitions
  • Mounting the partitions

RAID (Redundant Array of Inexpensive Disks)

  • Implementing RAID on Linux
  • RAID levels (0, 1 and 5) configuration using RAID tools

Data Backup and Recovery

  • Taking data backup using tar command

Software Package Administration

  • Installing and deleting software packages using RPM & YUM
  • Querying and updating software packages

Dynamic Host Configuration Protocol (DHCP)

  • Configuring Linux as DHCP Server
  • Configuring various clients for DHCP Server (Windows & Linux)

FTP Server (vsftpd daemon)

  • Basics of File Transfer Protocol
  • Configuring FTP protocol to download and upload the files

Network File System (NFS)

  • Configuring NFS file sharing server
  • Mounting NFS shared folder from client systems

DNS Server

  • Configuration of DNS server
  • Configuration of forward lookup zone
  • Configuration of reverse lookup zone
  • Testing tool of DNS zones

Web Server (Apache)

  • Basics of Web Service
  • Introduction to Apache
  • Configuring Apache to host website
Linux Advance

Linux Advanced

Practical Implementation in Real Time Environment

AcadiGO  brings to you the all new Advanced Linux course. This course is designed for professionals to easily install and configure advanced Linux services like IPv6, IPsec VPN, iptables as well as configuration of SAN, MySQL etc. The training will be conducted by senior System / Network engineers with several years of industry experience.

Course Contents:

  • Introduction and configuration of LDAP Server
  • Configuration of Winbind Server
  • Integration of Active Directory Users with Linux Clients
  • Implementation of LDAP Backup Server
  • Introduction & configuration of Postfix Mail Server
  • Authentication of SAMBA DOMAIN Server with WINDOWS Clients
  • Introduction & configuration of Kerberos Server
  • Introduction & configuration of MySQL Database Server
  • Implementation of HTTPS Service
  • Implementation of Nagios Monitoring Tool Service
  • Introduction & configuration of SAN
  • Explanation & configuration of CLUSTER Servers
  • Importance & configuration of NTP Server, Network Teaming and Rsyslog Server
  • Introduction & configuration of VPN (IPSeC)
  • Introduction & configuration of Apache Tomcat.
  • Implementation of all Servers on IPv6 DNS, WEB & MAIL etc.,
  • Securing Network with Firewall (IPtables, SElinux and FirewallD)

Course Detail

Booting Process

  • Introduction to Booting Process
  • Explaining types of booting process
  • Kernel Initialization
  • Types of Runlevels
  • Changing Runlevels
  • Managing services and daemons using systemctl command

Troubleshooting Linux System

  • Recovering super user password
  • Assigning password on GRUB
  • Recovering GRUB password
  • Troubleshooting server related issues

Virtualization

  • Installing Virtual machines using QEMU hypervisor
  • Starting and stopping libvirt daemon
  • Creating clone on virtual operating system

Apache Web Server (HTTPS)

  • Introduction of Apache
  • Differences between HTTP And HTTPS
  • Generating SSL keys
  • Creating CA
  • Redirecting http to https
  • Configuring HTTPS Clients

Apache Tomcat Server

  • Installation of JDK
  • Installation and Configuration of Tomcat
  • Creating tomcat user and password
  • Access Tomcat with web Interface
  • Deployment of Java files

Proxy Server (Squid)

  • Introduction to proxy server
  • Configuring proxy server and clients
  • Creating squid ACL’s rules to control internet access
  • Explanation about cache records

NTP Server

  • Introduction of NTP server
  • Configuration of NTP server
  • Configuration of NTP and Chronyd Clients
  • Verifying date and time synchronization

Advanced File Permissions

  • Explanation of SUID, SGID and Sticky bit
  • Configuring SUID on commands
  • Configuring SGID on group users
  • Configuring Sticky bit on objects
  • Configuring different permissions on users/groups using ACL permissions policy

Links Configuration

  • Explaining types of Links
  • Creating soft links and hard links
  • Differences between Soft and Hard links

Samba Server

  • Introduction to samba server
  • Configuring Samba server to share data with Linux and windows clients
  • Configuring samba server for multiple users

SAMBA PDC (Primary Domain Controller)

  • Configuring samba PDC server
  • Creating samba password on root user
  • Integrating windows client system into samba PDC server
  • Creating users in samba PDC database
  • Login Linux users into windows client systems

Samba Winbind Configuration

  • Introduction to samba winbind
  • Installing samba winbind
  • Integrating Linux client system with Active Directory domain
  • Starting winbind and oddjobd services
  • Login Active Directory Users from Linux clients

Kerberos Server

  • Introduction to Kerberos
  • Kerberos server configuration
  • Kerberos client configuration
  • Creating certificates in Kerberos server and client systems
  • Integrating Kerberos with NFS server
  • Configuration of Kerberos clients

Remote Installation (PXE Server)

  • Introduction to PXE and Kickstart
  • Kickstart configuration
  • PXE configuration at server system
  • Installing an operating system in client systems

Backup and Recovery

  • Introduction to dump command and backup methods
  • Taking full backup, Incremental and Differential backup
  • Explaining values of dump command
  • Deleting an existing data
  • Restoring lost data

Remote Backup

  • Taking remote backup using scp command
  • Finding data in destination system
  • Restoring the data back

Automation of jobs

  • Introduction to Crontab
  • Scheduling the system task automatically
  • Verifying the result

Openssh Configuration

  • Introduction to Openssh
  • Accessing the remote system using ssh command
  • Creating ssh key using ssh-keygen
  • Configuration of ssh authentication
  • Making client login into other system without password

IPsec VPN

  • Introduction to VPN
  • Features of VPN
  • Types of VPN
  • Types of VPN Protocols
  • Creating tunnel in between networks
  • Configuration of host to host VPN
  • Verifying result in client systems

Maria DB

  • Installation of MariaDB on LINUX
  • Starting the service
  • Creating a MariaDB root Account
  • Location of MariaDB Database
  • Accessing MariaDB Command Line
  • Creating and Deleting MariaDB

IPv6 Configuration

  • Check For Ipv6 Support In The Current Running Kernel
  • Compile kernel with IPv6 capabilities
  • IPv6 network devices
  • Adding, Checking and Removing IPv6 using nmcli command
  • Bringing Interface up/down
  • Configuring Servers on IPv6 address

LDAP Server

  • Introduction of LDAP
  • Structure of LDAP Schema
  • Features of LDAP
  • Differences between NIS and LDAP
  • Configuring LDAP Server
  • Configuring LDAP Client
  • Adding, Modifying and Deleting Users from LDAP Database

Auto Mounting

  • Introduction to Auto Mounting
  • Auto Mounting to NFS shared directory

Kernel Up gradation

  • Checking existing Kernel
  • Upgrading Kernel with RPM tool
  • Check new kernel version

Log Server

  • Configuring Rsyslog and Saving Syslog Messages
  • Sending Syslog Message over the network
  • Configuring Rsyslog clients and Users log files

Mail Server (Postfix/Squirrelmail)

  • Basics of Mail Servers
  • Configuring SMTP service using Postfix
  • Configuring POP3 / IMAP service on Linux

Storage Technologies (iSCSI SAN)

  • Introduction to SAN, DAS and NAS
  • Explaining components of SAN
  • Configuring SAN Server by using targetcli
  • Making SAN Clients by using iscsiadm tool

Logical Volume Manager (LVM)

  • Introduction to LVM components
  • Increasing and decreasing partition size

Disk Quotas

  • Enabling Quotas on partitions
  • Creating Quotas for users
  • Auditing Quotas limit

Process Management

  • Introduction to Various Process
  • Managing Background and Foreground Process
  • killing process
  • Monitoring and Managing using top command
  • Explanation of Nice values, Zombie and Orphan process

Network Teaming (IP Bonding)

  • Introduction to Teaming
  • Round Robin Runner
  • Active Backup Runner
  • Load Balancer Runner
  • Configuring active backup Teaming

Clustering (Web Based)

  • Types of CLUSTER
  • Explanation of Load Balancing & LVS Components
  • Configuring Real and Backup Servers
  • Checking Load Balancing in CLUSTER Server

Nagios Monitoring Tool

  • Installation of Nagios and Plugins
  • Configuration of Nagios
  • Creating Nagios User and Group
  • Starting the Service
  • Monitoring network infrastructure via Nagios web interface
  • Adding hosts and services into Nagios database

IP-tables Firewall

  • Introduction to IP-tables chains and tables
  • Configuration of IP-tables rules
  • Activating the IP-tables rules
  • Configuring IP-tables to secure network

SElinux Firewall

  • Introduction to SElinux policies
  • Configuring SElinux Permanent
  • Configuring SElinux to protect various servers

Dynamic Firewall

  • Introduction to firewalld
  • Difference between IP-tables and Dynamic Firewall
  • Configuring rich rules
  • Configuring port forwarding rule
  • Adding firewalld rules permanent and temporary
  • Updating the rules

Webmin Installation

  • Introduction to webmin
  • Installation of webmin

Operating Linux on GUI mode

MCSE 2016

MCSE 2016

In today’s rapidly changing IT marketplace, Microsoft Certifications are designed to help the IT professional to utilize advanced technologies, fine tune troubleshooting skills and improve job satisfaction. A certification from Microsoft also confirms your demonstrated experience and knowledge in using Microsoft products and solutions.

Over the last many years, the Training Academy at Zoom Technologies has been a center for training thousands of aspiring IT professionals in various Microsoft Certifications at our state-of-the-art facility in Hyderabad. The training will be given by Senior System / Network engineers with several years of field experience.

Course Contents

  • Microsoft Hyper-V & Active Directory Domain Services
  • Organizational Unit & Distributed File System
  • Structures of Active Directory
  • Active Directory Trust
  • Operation Masters & Group Policies
  • Dynamic Host Configuration Protocol (DHCP)
  • Domain Naming System (DNS) using IPv4 & IPv6
  • Windows Deployment Services (WDS)
  • Windows Server Update Services (WSUS)
  • Storage Management
  • Routing & Remote Access Services (RRAS)
  • AD Federation Services (AD-FS) & AD Lightweight Directory Services (AD-LDS)
  • AD Rights Management Services (AD-RMS) & AD Certificate Services (AD-CS)
  • Failover Clustering, Containers, Dockers & Microsoft Passport

Course Detail

Operating System

  • Introduction to Server 2016 Operating System
  • History of Server Operating System
  • Editions of Windows Server 2016
  • Requirements to install Windows Server 2016
  • Installing Windows Server 2016 Operating System
  • Upgrading Windows Server 2012 to Windows Server 2016
  • Introduction to Nano Server

Microsoft Hyper-V

  • Introduction to Virtualization
  • Types of Hypervisors
  • Virtualization using Hyper-V
  • Configuring Virtual Machines
  • Configuring Virtual Hard Disks
  • Configuring Virtual Switches

Active Directory Domain Services

  • IP Addressing (IPv4 & IPv6)
  • Client/Server Architecture
  • Introduction to Active Directory
  • Features of Active Directory
  • Installing Active Directory Domain Controller

Clients, Member Servers, User Management

  • Configuring Clients & Member Servers
  • Creating Users in ADDS
  • Password Policies
  • Account Lockout Policies
  • Allow Log On Locally
  • User Properties
  • Kerberos Policies

Organizational Unit & Distributed File System

  • Permissions (Security & Sharing)
  • Creating Organizational Units
  • Delegating Control to a User
  • Groups
  • DFS Namespaces
  • Overview of DFS Replica
  • Branch Cache

Structures of Active Directory

  • Configuring Additional Domain Controller
  • Tree Structure – Child Domain
  • Forest Structure – Tree Domain

Operation Masters

  • Transferring Operation Masters
  • Seizing Operation Master
  • Migrating Operation Masters from Windows 2012 DC to Windows 2016 DC

Group Policies

  • User & Computer Policies
  • Scopes of Policies – OU, Domain & Sites
  • Resultant Set of Policies (RSOP)
  • Software Deployment
  • Scripts, Folder Redirection
  • Group Policy Preferences
  • Auditing

Active Directory Trust

  • Introduction to Active Directory Trust Relationship
  • Categories, Directions & Types of Trusts
  • Functional Levels
  • Configuring Forest Trusts
  • Active Directory Recycle Bin

Read Only Domain Controller & Sites

  • Active Directory Partitions
  • Configuring Global Catalog Servers
  • Configuring Sites, Sitelinks
  • Configuring RODC using Install from Media (IFM)

Dynamic Host Configuration Protocol (DHCP)

  • Installing DHCP Service
  • Authorizing DHCP Server
  • Creating Scopes (IPv4 & IPv6)
  • Reservations
  • DHCP Backup
  • DHCP Failover on IPv4
  • DHCP Migrations

Domain Naming System (DNS) using IPv4 & IPv6

  • Introduction to DNS
  • DNS Naming Hierarchy
  • Types of Lookups
  • Types of Zones
  • Types of DNS Records
  • Forwarders
  • Dynamic Updates
  • DNS Policies
  • DNS Security (DNSSEC)

Windows Deployment Services (WDS)

  • Introduction & Configuration of WDS Server
  • Attended & Unattended Installation

Windows Server Update Services (WSUS)

  • Introduction & Configuration of WSUS
  • Deploying Patches
  • Windows Server Backup

Storage Management

  • Storage Types
  • Introduction to Storage Spaces & Storage Pools
  • Configuring Simple Volume (RAID-0)
  • Configuring Mirrored Volume (RAID-1)
  • Configuring Parity Volume (RAID-5)
  • Introduction to ISNS (Internet Storage Name Service) & MPIO (Multipath Input/Output)

Routing & Remote Access Services (RRAS)

  • Configuring Static Routes on IPv4 & IPv6
  • NAT, DHCP Relay Agent
  • VPN & Direct Access

AD Federation Services (AD-FS) & AD Lightweight Directory Services (AD-LDS)

AD Rights Management Services (AD-RMS) & AD Certificate Services (AD-CS)

Failover Clustering

  • Configuring High Availability on Virtual Machines

Containers, Dockers & Microsoft Passport

Amazon Web Services

Amazon Web Services

Cloud hosted web sites and applications are the future of Information Technology. Amazon Web Services (AWS) is a secure cloud services platform, offering compute power, database storage, content delivery, highly reliable, scalable, low-cost pay-for-what-you-use infrastructure platform on the cloud. AWS powers hundreds of thousands of businesses around the world and offers other functionality to help businesses scale and grow.

As Cloud Computing has become very popular, there is a great demand for System and Cloud Administrators with AWS skills.

This course is taught by industry experts with several years of experience.

Course Outline

  1. Introduction to Cloud Computing
  2. Introduction to Amazon Web Services (AWS)
  3. Compute Services (EC2, AMI Etc.)
  4. EC2 Instances
  5. Amazon Elastic Block Store (EBS)
  6. LOAD BALANCING & Auto Scaling
  7. Network & Security
  8. Elastic Beanstalk, Amazon Virtual Private Cloud (VPC)
  9. Amazon Route 53
  10. Security & Identity Services, IAM
  11. Storage & Content Delivery Services, Amazon S3 & Amazon Glacier
  12. Database Services (RDS, NoSQL Service)
  13. Management Tools (Amazon Cloud watch, Cloud Formation)
  14. Application Services (SES, SQS, SNS)

Course Detail

Introduction to Cloud Computing

  • What is Cloud
  • Why Cloud?
  • Types of Cloud Deployment Models
  • Types of Cloud Services
  • Future of Cloud Technologies
  • Advantages and Disadvantages of Cloud

Introduction to Amazon Web Services (AWS)

  • What is AWS?
  • How to Subscribe for AWS account
  • What is the AWS Free Usage Tier
  • AWS Certification
  • Introduction to the AWS management Console
  • List of services given by AWS

Compute Services

Elastic Compute Cloud (EC2)

  • What is Amazon EC2?
  • Features of Amazon EC2
  • Managing the EC2 infrastructure
  • EC2 Dashboard
  • Pricing for Amazon EC2

Regions and Availability Zone Concepts

  • Describing Regions
  • Availability Zones, and Endpoints
  • Managing instances in an Availability Zone

Amazon Machine Images (AMI)

  • Managing AMIs
  • Working with Windows, Linux AMIs
  • Shared and Paid AMI
  • Making an AMI Public

EC2 Instances

  • Instance Type
  • Instance life cycle
  • Differences between reboot, stop, and terminate
  • Building an EC2 windows and linux instances
  • To install instance in public and private subnet
  • Security via Key Pairs
  • EC2 Class and VPC Security Groups
  • Managing Elastic IP’s
  • Pricing model in EC2 instances
  • EC2 with Amazon command line interface

Amazon Elastic Block Store (EBS)

  • Features of Amazon EBS
  • Amazon EBS volumes
  • Managing EBS volumes
  • Increasing the volume size
  • AmazonEBS snapshots

Load Balancing

  • Creating a load balancer
  • Internal and external load balancer
  • Load balancing protocols
  • Security groups for the load balancer
  • Health check for the load balancer
  • Cross-zone load balancing
  • Connection Draining

Auto Scaling

  • What is auto scaling?
  • Auto scaling components
  • Benefits of auto scaling
  • Creation of launch configuration
  • Configuration of auto scaling policies
  • Advantages of using auto scaling with ELB

Network & Security

  • Security Groups
  • Elastic IPs
  • Placement Groups
  • Key Pairs
  • Network Interfaces

Elastic Beanstalk

  • Deploy, manage, scale an application
  • How management complexity are reduced
  • Workflow of Elastic Beanstalk
  • Create Application
  • Launch Environment
  • Manage Environment
  • Creating application source bundle
  • Modifying the properties of the deployment

Networking Services

Amazon Virtual Private Cloud (VPC)

  • What is Amazon VPC?
  • VPC Essentials
  • Default and Nondefault VPC
  • VPC Networking and ACL
  • Security Groups
  • DNS and DHCP Options Sets
  • VPC Peering and Endpoints
  • Subnet Routing
  • VPC Internet Gateway
  • Elastic IP addresses and network interfaces
  • VPC integration with many other AWS services
  • Creating a NAT instance in a VPC
  • Configuring a Web application in VPC
  • Pricing for Amazon VPC

Amazon Route 53

  • Route 53 as your DNS service
  • Using Traffic Flow
  • Route 53 Health Checks
  • Configuring DNS Failover
  • Latency Based Routing
  • Weighted Routing Policies

Security & Identity Services

Identity Access Management (IAM)

  • IAM Features
  • Getting Started With IAM
  • Creation of user, groups, roles
  • Managing policies
  • Credential Report
  • IAM Console and the Sign-in Page

Storage & Content Delivery Services

Amazon S3

  • What is object Storage?
  • Data as objects
  • Lifecycles of S3
  • Managing Buckets
  • Accessing S3 storage via tools
  • Creation of a static website using S3 storage

Amazon Glacier

  • Low-cost storage service
  • Storage for data backup and archival
  • Pricing model for Glacier storage
  • Working with vaults and archives

Database Services

Relational Database Service (RDS)

  • RDS Essentials
  • Launching RDS instance
  • Selecting the Engine
  • Configuring the Database Engine
  • Managing RDS Database
  • Setting up automatic backups
  • Authorizing access to the DB

DynamoDB (NoSQL Service)

  • DynamoDB overview
  • What is NoSQL database?
  • How It Works
  • Using the DynamoDB Console
  • Creating Tables and Loading Sample Data
  • Query and Scan Operations in DynamoDB

Management Tools

Amazon CloudWatch

  • Amazon CloudWatch Architecture
  • List of services monitored by CloudWatch
  • Collect and track metrics
  • Monitoring memory and disk Metrics
  • Monitoring logs, Graphs
  • Set Alarms

Cloud Formation

  • Building AWS infrastructure as a code
  • Design a template
  • Create a Stack
  • Create a Template from your Existing Resources
  • Introduction to JSON

Application Services

Amazon Simple Email Service (SES)

  • Simple email service overview
  • Configuring Amazon email service
  • Amazon SES and Deliverability
  • Amazon SES Email-Sending Process
  • Email format and Limits of SES

Amazon Simple Queue Service (SQS)

  • Simple Queue service overview
  • SQS for background work task
  • Creating a Queue
  • Confirming the Queue exists
  • Add a permission to the Queue

Amazon Simple Notification Service (SNS)

  • Simple Notification Service overview
  • SNS architecture
  • Publishers and subscribers
  • Creation of a topic
  • Subscribing to topic via Email
  • Setting notification for EC2 instance changes
Microsoft Azure

Microsoft Azure

Course Detail

Introduction to Azure

  • Cloud technology overview
  • Overview of Azure
  • Managing Azure with the Azure portal
  • Managing Azure with Windows PowerShell
  • Overview of Azure Resource Manager
  • Azure management services

Managing Microsoft Azure

  • Use the Azure portals
  • Use Azure Resource Manager features via the Azure portal.
  • Use Azure PowerShell

Implementing and managing Azure networking

  • Overview of Azure networking
  • Implementing and managing Azure virtual networks
  • Configuring Azure virtual networks
  • Configuring Azure virtual network connectivity
  • Overview of Azure classic networking

Using a deployment template to implement Azure virtual networks

  • Creating an Azure virtual network by using a deployment template
  • Creating a virtual network by using PowerShell
  • Configure virtual networks

Configuring connectivity between classic and Azure Resource Manager virtual networks

  • Using a PowerShell script to connect a classic VNet and an Azure Resource Manager VNet
  • Configuring a point-to-site VPN
  • Validating virtual network connectivity

Implementing virtual machines

  • Overview of Azure Resource Manager virtual machines
  • Planning for Azure virtual machines
  • Deploying Azure Resource Manager virtual machines
  • Authoring Azure Resource Manager templates
  • Overview of classic virtual machines

Creating Azure Resource Manager virtual machines in Azure

  • Creating virtual machines by using the Azure portal and Azure PowerShell
  • Validating virtual machine creation

Deploying Azure Resource Manager virtual machines by using Azure Resource Manager templates

  • Using Visual Studio and an Azure Resource Manager template to deploy virtual machines
  • Using Azure PowerShell and an Azure Resource Manager template to deploy virtual machines

Managing Azure virtual machines

  • Configuring virtual machines
  • Configuring virtual machine disks
  • Managing and monitoring Azure virtual machines
  • Managing classic virtual machines
  • Configuring availability
  • Implementing desired state configuration (DSC)
  • Implementing storage space–based volumes

Planning and implementing storage, backup, and recovery services

  • Planning storage
  • Implementing and managing storage
  • Implementing Azure Content Delivery Networks
  • Implementing Azure Backup
  • Planning for and implementing Azure Site Recovery
  • Creating and configuring Azure storage
  • Using Azure file storage
  • Protecting data with Microsoft Azure Backup

Implementing Azure Active Directory

  • Creating and managing Azure AD tenants
  • Configuring application and resource access with Azure AD
  • Overview of Azure AD Premium
  • Administering Active AD
  • Configuring SSO
  • Configuring Multi-Factor Authentication
  • Configuring SSO from a Windows 10–based computer that is joined to Azure AD

 

This course focuses on skills required for IT Professionals who take part in evaluating, planning, deploying Office 365 services and set up an Office 365 tenant including its identities, dependencies, requirements and supporting technologies.

Office 365

Office 365

Course Outline

  1. Overview of Office 365, plan an Office 365 pilot deployment
  2. Creating the Office 365 tenant
  3. Manage Organization settings and user settings
  4. Manage Office 365 users, groups, and licenses, and configure delegated administration
  5. Plan and configure client connectivity to Office 365
  6. Plan and implement the deployment of Office 365 ProPlus
  7. Plan and configure directory synchronization between Azure AD and on-premises AD DS
  8. Plan and manage Exchange Online recipients and permissions
  9. Plan and configure Exchange Online services
  10. Plan and configure SharePoint Online
  11. Plan and configure Yammer Enterprise, OneDrive for Business
  12. Plan and configure Microsoft Teams
  13. Plan and configure Security and compliance features in Office 365
  14. Monitor and review Office 365 services, and troubleshoot Office 365 issues

Course Detail

Module 1: Planning and provisioning Office 365

  • Overview of Office 365
  • Provisioning an Office 365 tenant
  • Planning a pilot deployment
  • Creating Office 365 tenant.

Module 2: Managing Office 365 Organizational and users settings

  • Configuring user settings
  • Configuring Organization settings

Module 3: Managing Office 365 users and groups

  • Managing user accounts and licenses
  • Managing passwords and authentication
  • Managing security groups in Office 365
  • Configuring Roles and administrative access
  • Managing Office 365 users and groups with Windows PowerShell

Module 4: Configuring client connectivity to Microsoft Office 365

  • Planning for Office 365 clients
  • Planning connectivity for Office 365 clients
  • Configuring connectivity for Office 365 clients

Module 5: Planning and deploying Office 365 ProPlus

  • Overview of Office 365 ProPlus
  • Planning and managing user-driven Office 365 ProPlus deployments
  • Planning and managing centralized deployments of Office 365 ProPlus
  • Office telemetry and reporting

Module 6: Planning and configuring directory synchronization

  • Planning and preparing for directory synchronization
  • Implementing directory synchronization by using Azure AD Connect
  • Managing Office 365 identities with directory synchronization

Module 7: Planning and managing Exchange Online recipients and permissions

  • Overview of Exchange Online
  • Managing Exchange Online recipients
  • Planning and configuring Exchange Online permissions

Module 8: Planning and configuring Exchange Online services

  • Planning and configuring email flow in Office 365
  • Planning and configuring email protection in Office 365
  • Planning and configuring client access policies

Module 9: Planning and configuring SharePoint Online

  • Configuring SharePoint Online services
  • Planning and configuring SharePoint site collections
  • Planning and configuring external user sharing

Module 10: Planning and configuring a Office 365 collaboration solution

  • Planning and configuring OneDrive for Business
  • Planning and managing Yammer Enterprise

Module 11: Planning and deploying Microsoft Teams

  • Overview of Microsoft Teams
  • Planning and creating Teams
  • Managing Microsoft Teams

Module 12: Security and compliance in Office 365

  • Overview of the Security and compliance features in Office 365
  • Managing the Security and compliance in Office 365

Module 13: Monitoring and troubleshooting Microsoft Office 365

  • Monitoring Office 365 service health
  • Troubleshooting Office 365
Openstack

OpenStack

The OpenStack Foundation has developed the Certified OpenStack Administrator exam which offers a career-path based Certification for OpenStack professionals. The exam is performance-based and will test the baseline skills of an OpenStack Administrator, a person with at least 6 months of OpenStack experience who provides day-to-day operation and management of an OpenStack cloud.

Below are the specific content areas (Domains) and the specific tasks on which candidates may be expected to demonstrate their knowledge.

Course Detail

Getting to know OpenStack

  • Understand the components that make up the cloud
  • Use the OpenStack API/CLI

Identity management

  • Manage Keystone catalogue services and endpoints
  • Manage/Create domains, groups, projects, users, and roles
  • Create roles for the environment
  • Manage the identity service
  • Verify operation of the Identity service

Dashboard

  • Verify operation of the Dashboard

Compute

  • Manage flavors
  • Manage compute instance actions (e.g. launch, shutdown, terminate)
  • Manage Nova user keypairs
  • Launch a new instance
  • Shutdown an Instance
  • Terminate Instance
  • Configure an Instance with a Floating IP address
  • Manage project security group rules
  • Assign security group to Instance
  • Assign floating IP address to Instance
  • Detach floating IP address from Instance
  • Manage Nova host consoles (rdp, spice, tty)
  • Access an Instance using a keypair
  • Manage instance snapshots
  • Manage Nova compute servers
  • Manage quotas
  • Get Nova stats (hosts, services, tenants
  • Verify operation of the Compute service

Object Storage

  • Manage access to object storage
  • Manage expiring objects
  • Manage storage policies
  • Monitor space available for object store
  • Verify operation of Object Storage
  • Manage permissions on a container in object storage

Block Storage

  • Manage volume
  • Create volume group for block storage
  • Create a new Block Storage Volume and mount it to a Nova Instance
  • Manage quotas
  • Manage volumes quotas
  • Manage volumes backups
  • Backup and restore volumes
  • Manage volume snapshots (e.g, take, list, recover)
  • Verify that block storage can perform snapshotting function
  • Snapshot volume
  • Manage volumes encryption
  • Set up storage pools
  • Monitor reserve capacity of block storage devices
  • Analyze discrepancies in reported volume sizes

Networking

  • Manage network resources (e.g., routers, subnets)
  • Create external networks
  • Create project networks
  • Create project routers
  • Manage network services for a virtual environment
  • Manage project security group rules
  • Manage quotas
  • Verify operation of network service
  • Manage network interfaces on compute instances
  • Troubleshoot network issues for a tenant network (enter namespace, run tcpdump, etc)

Heat/Orchestration

  • Launch a stack using a Heat/Orchestration template (e.g., storage, network, and compute
  • Use Heat/Orchestration CLI and Dashboard
  • Verify Heat/Orchestration stack is working
  • Verify operation of Heat/Orchestration
  • Create a Heat/Orchestration template that matches a specific scenario
  • Update a stack
  • Obtain detailed information about a stack

Troubleshooting

  • Analyze log files
  • Backup the database(s) used by an OpenStack instance
  • Centralize and analyze logs (e.g.,/var/log/COMPONENT_NAME, Database Server, Messaging Server, Web Server, syslog)
  • Analyze database servers
  • Analyze Host/Guest OS and Instance status
  • Analyze messaging servers
  • Analyze meta data servers
  • Analyze network status (physical & virtual)
  • Analyze storage status (local, block & object)
  • Manage OpenStack Services
  • Diagnose service incidents
  • Digest OpenStack environment (Controller, Compute, Storage and Network nodes)
  • Direct logging files through centralized logging system
  • Backup and restore an OpenStack instance
  • Troubleshoot network performance

Image management

  • Deploy a new image to an OpenStack instance
  • Manage image types and backends
  • Manage images (e.g. add, update, remove)
  • Verify operation of the Image Service