Behaviour

We always …
Act with Integrity
Do what is right

Respect Others
Treat others as you would like to be treated

Put Customers First
Make every effort to exceed our customers’ expectations

Deliver on our Commitments
Take responsibility for decisions, actions and results

Work Together and Communicate
Work with others to achieve results

Drive Continuous Improvement
Strive for excellence in everything we do

PHP

  1. Introduction, Overview of Domain Name, Web Hosting and Basic Website Structuring
  2. Webpage Designing with HTML Basics using Notepad
  3. Webpage Designing using CSS and JavaScript in Adobe Dreamweaver or Microsoft Expression
  4. Designing a html-based website of Multiple Webpages with CSS and JavaScript, using Dreamweaver or Microsoft Expression
  5. Introduction to PHP
  6. Learn PHP Variables and Functions
  7. Learn PHP Arrays and Loops
  8. Design & Develop PHP based Website using Dreamweaver or Microsoft Expression
  9. Introduction to Basic Microsoft ASP.Net Development with Visual Studio and MS SQL Server
  10. Learn how to connect MS SQL database with Asp.net Web Pages
  11. Learn how to generate text area, drop downs, radio button, lists and tables, dynamically
  12. Learn How to Create, Compile and Build a .Net Web project and run it in a web browser
  13. Introduction to WordPress and Xamp.
  14. Customize WordPress Website
  15. Understand plugins & themes and how to find/install them
  16. Secure and Optimize WordPress Website
  17. Deploying WordPress Website on cloud server / web hosting
  18. Understanding and Configuration of htaccess and php.ini file at web hosting
  19. On-Page SEO
  20. 3rd Party Integration with WordPress Website
  21. E-Commerce Website designing and development in WordPress using WooCommerce

 

Web and Mobile Development with .NET

  1. Introduction to .NET& Development Env, Introduction to Debugging & User Interactions & Strings
  2. Intro, Basics Syntax and Codes of C#
  3. Char String Date Time Quiz
  4. Object Oriented Class Libraries Development
  5. Fields and Methods Constructor
  6. Relationship Types Inheritance
  7. Advanced Practical Concepts of C Sharp
  8. more C Sharp Concepts MAUI — > Android, iOS, Windows, Tizen, Linux
  9. MAUI App Android, iOS, Windows, Tizen, Linux Layouts Styles Media Fonts
  10. MAUI App Android, iOS, Windows, Tizen, Linux, MVVM Binding Model Collection
  11. MAUI App Android, iOS, Windows, Tizen, Linux, XAML
  12. MAUI App Android, iOS, Windows, Tizen, Linux, XAML
  13. MAUI App Android, iOS, Windows, Tizen, Linux, XAML C#, Project – 1 CRUD Operation
  14. MAUI App Android, iOS, Windows, Tizen, Linux, XAML C#
  15. Project-2 News App Android iOS Windows
  16. Database basics, Entity Framework
  17. Entity Framework, Blogging Project
  18. Front End Development HTML, Cascading Style Sheets (CSS)
  19. CSS Transitions and Animations Bootstrap 5
  20. Bootstrap 5, JavaScript

FortiGate Security and FortiGate Infrastructure

  • Unified Threat Management and Architecture
  • Models and Licensing / Product Matrix
  • Bootstrapping and Lab Buildup
  • Initial Configuration and access via GUI and CLI
  • Firewall Policies
  • Network Address Translation (NAT)
  • Routing
  • Layer 2 Switching
  • Application Control
  • Virtual Domains
  • High Availability
  • Transparent Mode
  • Firewall Authentication
  • Web Proxy (HA)
  • UTM Features
  1. Antivirus
  2. Web Filtering
  3. File Blocking
  4. Intrusion Prevention System
  5. Denial of Service Prevention
  • Site to Site IPSec VPN
  • SSL VPN
  • Software defined WAN
  • Security Fabric
  • Diagnostics
  • Programmability of Forti-OS using REST APIs / JSON / Ansible

 

AWS Fundamentals

If you need to learn more about Amazon Web Services or have little knowledge, this course covers everything necessary. Our instructors guide you through all the services and features AWS offers. Moreover, they also help you how to use them and build reliable and scalable applications.

AWS Architecture

This course helps you understand the architecture of AWS. This way, students can design and deploy highly available, fault-tolerant, and scalable systems.

AWS Security

This course teaches students how to identify and access management, data protection, and network security. Moreover, you can understand various security services and features AWS offers.

AWS Database

Amazon Web Services also offers Amazon DynamoDB, RDS, and Redshift. This course will cover all these database services.

AWS DevOps

AWS also has many DevOps tools and services. Some of them are AWS CodeCommit, AWS CodePipeline, and AWS CodeDeploy. You will also learn about these tools and services.

AWS Professional training is a comprehensive program designed by professionals to develop a deep understanding of AWS architectures and services.

You will be a certified AWS professional after completing this course, ready to join any organization and contribute to achieving organizational goals and objectives.

Course covers essential AWS concepts and services through which you will have maximum theoretical knowledge and practical experience. Some of these AWS technologies and tools are:

  • EC2
  • S3
  • VPC
  • Lambda
  • RDS

Network Infrastructure

Switched campus

  • Switch administration
  • Managing MAC address table
  • Err disable recovery
  • L2 MTU
  • Layer 2 protocols
  • CDP, LLDP
  • UDLD
  • VLAN technologies
  • Access ports
  • Trunk ports (802.1Q)
  • Native VLAN
  • Manual VLAN pruning
  • VLAN database
  • Normal range and extended range VLANs
  • Voice VLAN
  • VTP
  •  EtherChannel
  • LACP, static
  • Layer 2, Layer 3
  • Load balancing
  • EtherChannel Misconfiguration Guard
  • Spanning- Tree Protocol
  • PVST+, Rapid PVST+, MST
  • Switch priority, port priority, path cost, STP timers
  • Port Fast, BPDU Guard, BPDU Filter
  • Loop Guard, Root Guard

 

Routing Concepts

  • Administrative distance
  • VRF-lite
  • Static routing
  • Policy Based Routing
  • VRF aware routing with any routing protocol
  • Route filtering with any routing protocol
  • Manual summarization with any routing protocol
  • Redistribution between any pair of routing protocols
  • Routing protocol authentication
  • Bidirectional Forwarding Detection

 

EIGRP

  • Adjacencies
  • Best path selection
  • RD, FD, FC, successor, feasible successor
  • Classic Metrics and Wide Metrics
  •  Operations
  • General operations
  • Topology table
  • Packet types
  • Stuck In-Active
  • graceful shutdown
  • 3.d EIGRP load-balancing
  • Equal-cost
  • Unequal-cost
  • Add-path
  • EIGRP Named Mode
  • Optimization, convergence and scalability
  • Fast convergence requirements
  • Query propagation boundaries
  • IP FRR (single hop)
  • Leak-map with summary routes
  • EIGRP stub with leak map

 

OSPF (v2 and v3)

  • Adjacencies
  • Network types, area types
  • Path preference
  • Operations
  • General operations
  • Graceful shutdown
  • GTSM (Generic TTL Security Mechanism)
  • Optimization, convergence and scalability
  • Metrics
  • LSA throttling, SPF tuning, fast hello
  • LSA propagation control (area types)
  • Stub router
  • Loop-free alternate
  • Prefix suppression

 

BGP

  • IBGP and EBGP peer relationships
  • Peer-group/update-group, template
  • Active, passive
  • Timers
  • Dynamic neighbours
  • 4-bytes AS numbers
  • Private AS
  • Path selection
  • – Attributes
  • Best path selection algorithm
  • Load-balancing
  • Routing policies
  • Attribute manipulation
  • Conditional advertisement
  • Outbound Route Filtering
  • Standard and extended communities
  • Multi-homing
  •  AS path manipulations
  • local-AS, allowas-in, remove-private-as
  • Prepend
  • Regexp
  • Convergence and scalability
  • Route reflector
  • Aggregation, as-set
  • Other BGP features
  • Multipath, add-path
  • Soft reconfiguration, Route Refresh

 

Multicast

  • Layer 2 multicast
  • IGMPv2, IGMPv3
  • IGMP Snooping, PIM Snooping
  • IGMP Querier
  • IGMP Filter
  • MLD
  • Reverse path forwarding check
  • PIM
  • Sparse Mode
  • Static RP, BSR, AutoRP
  • Group to RP Mapping
  • Bidirectional PIM
  • Source-Specific Multicast
  • Multicast boundary, RP announcement filter
  • PIMv6 Anycast RP
  • IPv4 Anycast RP using MSDP
  • Multicast multipath

 

Software Defined Infrastructure

Cisco SD Access

  • Design a Cisco SD Access solution
  • Underlay network (IS-IS, manual/PnP)
  • Overlay fabric design (LISP, VXLAN, Cisco TrustSec)
  • Fabric domains (single-site and multi-site using SD-WAN transit)
  • Cisco SD Access deployment
  • Cisco DNA Centre device discovery and device management
  • Add fabric node devices to an existing fabric
  • Host onboarding (wired endpoints only)
  • Fabric border handoff
  • Segmentation
  • Macro-level segmentation using VNs
  • Micro-level segmentation using SGTs (using Cisco ISE)
  • Assurance
  • Network and client health (360)
  • Monitoring and troubleshooting

 

Cisco SD-WAN

  • Design a Cisco SD-WAN solution
  • Orchestration plane (vBond, NAT)
  • Management plane (vManage)
  • Control plane (vSmart, OMP)
  • Data plane (vEdge/cEdge)
  • WAN edge deployment
  • Onboarding new edge routers
  • Orchestration with zero-touch provisioning/Plug-And-Play
  • OMP
  • TLOC
  • Configuration templates
  • Localized policies
  • Centralized policies

 

Transport Technologies and Solutions

MPLS

  • Operations
  • Label stack, LSR, LSP
  • LDP
  • MPLS ping, MPLS traceroute
  • L3VPN
  • PE-CE routing
  • MP-BGP VPNv4/VPNv6
  • Extranet (route leaking)

 

DMVPN

  • Troubleshoot DMVPN Phase 3 with dual-hub
  • NHRP
  • IPsec/IKEv2 using pre-shared key
  • Per-Tunnel QoS
  • Identify use-cases for FlexVPN
  • Site-to-site, Server, Client, Spoke-to-Spoke
  • IPsec/IKEv2 using pre-shared key
  • MPLS over FlexVPN

 

Infrastructure Security and Services

  • Device Security on Cisco IOS XE
  • Control plane policing and protection
  • AAA

Network Security

  • Switch security features
  • VACL, PACL
  • Storm control
  • DHCP Snooping, DHCP option 82
  • IP Source Guard
  • Dynamic ARP Inspection
  • Port Security
  • Private VLAN
  • Router security features
  • Pv6 Traffic Filters
  • IPv4 Access Control Lists
  • Unicast Reverse Path Forwarding
  • IPv6 infrastructure security features
  • RA Guard
  • DHCP Guard
  • Binding table
  • Device tracking
  • ND Inspection/Snooping
  • Source Guard
  • IEEE 802.1X Port-Based Authentication
  • Device roles, port states
  • Authentication process
  • Host modes

 

System Management

  • Device management
  • Console and VTY
  • SSH, SCP
  • RESTCONF, NETCONF
  • SNMP
  • v2c
  • v3
  • Logging
  • Local logging, syslog, debugs, conditional debugs
  • Timestamps

 

Quality of Service

  • End to end L3 QoS using MQC
  • DiffServ
  • CoS and DSCP Mapping
  • Classification
  • Network Based Application Recognition (NBAR)
  • Marking using IP Precedence, DSCP, CoS
  • Policing, shaping
  • Congestion management and avoidance
  • HQoS, Sub-rate Ethernet Link

 

Network Services

  • First-Hop Redundancy Protocols
  • HSRP, GLBP, VRRP
  • Redundancy using IPv6 RS/RA
  • Network Time Protocol
  • Master, client
  • Authentication
  • DHCP on Cisco IOS
  • Client, server, relay
  • Options
  • SLAAC/DHCPv6 interaction
  • Stateful, stateless DHCPv6
  • DHCPv6 Prefix Delegation
  • IPv4 Network Address Translation
  • Static NAT, PAT
  • Dynamic NAT, PAT
  • Policy-based NAT, PAT
  • VRF aware NAT, PAT
  • IOS-XE VRF-Aware Software Infrastructure (VASI) NAT

 

Network optimization

  • IP SLA
  • ICMP probes
  • UDP probes
  • TCP probes
  • Tracking object
  • Flexible Netflow

 

Network operations

  • Traffic capture
  • SPAN
  • RSPAN
  • ERSPAN
  • Embedded Packet Capture
  • Cisco IOS-XE troubleshooting tools
  • Packet Trace
  • Conditional debugger (debug platform condition)

 

Infrastructure Automation and Programmability

  • Data encoding formats
  • JSON
  • XML

Automation and scripting

  • EEM applets
  • Guest shell
  • Linux environment
  • CLI Python module
  • EEM Python module

Programmability

  • Interaction with vManage API
  • Python requests library and Postman
  • Monitoring endpoints
  • Configuration endpoints
  • Interaction with Cisco DNA Center API
  • HTTP request (GET, PUT, POST) via Python requests library and Postman
  • Interaction with Cisco IOS XE API
  • Via NETCONF/YANG using Python ncclient library
  • Via RESTCONF/YANG using Python requests library and Postman
  • Deploy and verify model-driven telemetry. Configure on-change subscription using gRPC

Architecture

  • Explain the different design principles used in an enterprise network
  • Enterprise network design such as Tier 2, Tier 3, and Fabric Capacity planning
  • High availability techniques such as redundancy, FHRP, and SSO
  • Analyse design principles of a WLAN deployment
  • Location services in a WLAN design
  • Differentiate between on-premises and cloud infrastructure deployments

 

Virtualization, QoS and IP Services

  • Describe device virtualization technologies
  • Configure and verify data path virtualization technologies
  1. VRF
  2. Describe network virtualization concepts
  3. QoS components
  4. QoS policy
  5. Describe concepts of wired and wireless QoS
  6. IP Services
  7. Describe Network Time Protocol (NTP)
  8. Configure and verify NAT/PAT
  9. Differentiate hardware and software switching mechanism
  10. MAC address table and TCAM
  11. FIB vs. RIB

 

Infrastructure

  • Layer 2
  • Troubleshoot static and dynamic 802.1q trunking protocols
  • Troubleshoot static and dynamic EtherChannel
  • Configure and verify common Spanning Tree Protocols (RSTP and MST)
  • Configure first hop redundancy protocols, such as HSRP and VRRP
  • Layer 3
  1. 3.7 Compare routing concepts of EIGRP and OSPF (advanced distance vector vs. linked state, load balancing, path selection, path operations, metrics)
  2. 3.8 Configure and verify simple OSPF environments, including multiple normal areas, summarization, and filtering (neighbor adjacency, point-to-point and broadcast network types, and passive interface)
  3. 3.9 Configure and verify eBGP between directly connected neighbors (best path selection algorithm and neighbor relationships)

 

Wireless

  • Describe Layer 1 concepts, such as RF power, RSSI, SNR, interference noise, band and channels, and wireless client devices capabilities
  • Describe AP modes and antenna types
  • Describe access point discovery and join process (discovery algorithms, WLC selection process)
  • Describe the main principles and use cases for Layer 2 and Layer 3 roaming
  • Troubleshoot WLAN configuration and wireless client connectivity issues

 

Network Security

  • Configure and verify device access control
  • Lines and password protection
  • Authentication and authorization using AAA
  • Configure and verify infrastructure security features
  • ACLs
  • Configure and verify wireless security features
  • Web Auth, PSK
  • Describe the components of network security design
  • Threat defence
  • Describe VPN
  • Describe and configure site to site VPN, EZVPN and DMVPN

 

6.0 Automation

  • Interpret basic Python components and scripts
  • Construct valid JSON encoded file
  • Describe the high-level principles and benefits of a data modelling language, such as YANG
  • Describe APIs for Cisco DNA Centre and vManage
  • Interpret REST API response codes and results in payload using Cisco DNA Centre and RESTCONF
  • Construct EEM applet to automate configuration, troubleshooting, or data collection
  • 6.7 Compare agent vs. agentless orchestration tools, such as Chef, Puppet, Ansible, and SaltStack
  • 6.8 Explain the working principles of the Cisco SD-WAN solution
  • 6.9 SD-WAN control and data planes elements
  • 6.10 Traditional WAN and SD-WAN solutions
  • 6.11 Explain the working principles of the Cisco SD-Access solution
  • 6.12 SD-Access control and data planes elements
  • 6.13 Traditional campus interoperating with SD-Access

 

CCNP Enterprise Advanced Routing (300-410) – L3 Technologies

  • Troubleshoot administrative distance (all routing protocols)
  • Troubleshoot route map for any routing protocol (attributes, tagging, filtering)
  • Troubleshoot loop prevention mechanisms
  • Troubleshoot redistribution between any routing protocols or routing sources
  • Troubleshoot manual and auto-summarization with any routing protocol
  • Configure and verify policy-based routing
  • Configure and verify VRF-Lite
  • Describe Bidirectional Forwarding Detection
  • Troubleshoot EIGRP (classic and named mode)
  1. 9.a Address families (IPv4, IPv6)
  2. 9.b Neighbor relationship and authentication
  3. 9.c Loop-free path selections (RD, FD, FC, successor, feasible successor, stuck in active)
  4. 9.d Stubs
  5. 9.e Load balancing (equal and unequal cost)
  6. 9.f Metrics

 

Troubleshoot OSPF (v2/v3)

  • Address families (IPv4, IPv6)
  • Neighbor relationship and authentication
  • Network types, area types, and router types
  • Point-to-point, multipoint, broadcast, non broadcast
  1. Area type: backbone, normal, transit, stub, NSSA, totally stub
  2. Internal router, backbone router, ABR, ASBR
  3. Virtual link
  • Path preference

 

Troubleshoot BGP (Internal and External)

  • Address families (IPv4, IPv6)
  • Neighbor relationship and authentication (next-hop, multihop, 4-byte AS, private AS, route refresh, synchronization, operation, peer group, states and timers)
  • Path preference (attributes and best-path)
  • Route reflector (excluding multiple route reflectors, confederations, dynamic peer)
  • Policies (inbound/outbound filtering, path manipulation)
  • VPN Technologies
  • Describe MPLS operations (LSR, LDP, label switching, LSP)
  • Describe MPLS Layer 3 VPN
  • Configure and verify DMVPN (single hub)
  • GRE/mGRE
  • NHRP
  • IPsec
  • Dynamic neighbor
  • Spoke-to-spoke

 

Infrastructure Security

  • Troubleshoot device security using IOS AAA (TACACS+, RADIUS, local database)
  • Troubleshoot router security features
  • IPv4 access control lists (standard, extended, time-based)
  • IPv6 traffic filter

Module 01: Introduction to Ethical Hacking

  • Fundamentals of key issues in the information security world
  • Basics of ethical hacking, information security controls, relevant laws, and standard procedures.

 

Module 02: Foot printing and Reconnaissance

  • How to use the latest techniques and tools to perform foot printing and reconnaissance, a critical pre-attack phase of the ethical hacking process.

 

Module 03: Scanning Networks

  • Different network scanning techniques and counter measures.

 

Module 04: Enumeration

  • Various enumeration techniques, such as Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits, and associated countermeasures.

 

Module 05: Vulnerability Analysis

  • How to identify security loopholes in a target organization’s network, communication infrastructure, and end systems.
  • Different types of vulnerability assessment and vulnerability assessment tools.

 

Module 06: System Hacking

  • Various system hacking methodologies—including steganography, steganalysis attacks, and covering tracks—used to discover system and network vulnerabilities.

 

Module 07: Malware Threats

  • Different malwares (Trojan, virus, worms, etc.), APT and fileless malware, malware analysis procedure, and malware countermeasures.

 

Module 08: Sniffing

  • Packet-sniffing techniques and how to use them to discover network vulnerabilities, as well as countermeasures to defend against sniffing attacks.

 

Module 09: Social Engineering

  • Social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering counter measures.

 

Module 10: Denial-of-Service

  • Different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, as well as the tools used to audit a target and devise DoS and DDoS countermeasures and protections.

 

Module 11: Session Hijacking

  • Various session hijacking techniques used to discover network level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.

 

Module 12: Evading IDS, Firewalls, and Honeypots

  • Introduction to firewall, intrusion detection system (IDS), and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and counter measures.

 

Module 13: Hacking Web Servers

  • Web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in web server infrastructures and counter measures.

 

Module 14: Hacking Web Applications

  • Web application attacks, including a comprehensive web application hacking methodology used to audit vulnerabilities in web applications and counter measures.

 

Module 15: SQL Injection

  • SQL injection attacks, evasion techniques, and SQL injection counter measures.

 

Module 16: Hacking Wireless Networks

  • Different types of wireless technologies, including encryption, threats, hacking methodologies, hacking tools, Wi-Fi security tools, and countermeasures.

 

Module 17: Hacking Mobile Platforms

  • Mobile platform attack vector, android and iOS hacking, mobile device management, mobile security guidelines, and security tools.

 

Module 18: IoT and OT Hacking

  • Different types of IoT and OT attacks, hacking methodology, hacking tools, and countermeasures.

 

Module 19: Cloud Computing

  • Different cloud computing concepts, such as container technologies and server less computing, various cloud computing threats, attacks, hacking methodology, and cloud security techniques and tools.

 

Module 20: Cryptography

  • Encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools.

Domain 1: Information System Auditing Process

  • ·The IS Audit Planning Process
  1. Understand the purpose and value of IT audits
  2. Develop an IT audit strategy and plan
  3. Conduct risk assessments
  • IT Governance and Management
  1. Evaluate IT governance structures and processes
  2. Assess IT organizational structures and responsibilities
  3. Understand IT policies, standards, and procedures
  • IS Audit Risk Assessment
  1. Identify and assess information systems vulnerabilities
  2. Evaluate the impact of vulnerabilities and threats
  3. Determine risk mitigation strategies

 

Domain 2: IT Governance and Management

  • IT Governance
  1. Understand the framework and components of IT governance
  2. Evaluate IT governance practices
  3. Assess the effectiveness of IT governance
  • IT Management and Support
  1. Evaluate IT organizational structure and responsibilities
  2. Review IT policies, standards, and procedures
  3. Assess IT human resources management
  • IT Organizational Structure and Implementation
  1. Understand IT organizational structures
  2. Evaluate the implementation of IT strategies and policies
  3. Review IT project management and support practices

 

Domain 3: Information Systems Acquisition, Development, and Implementation

  • Business Continuity Planning and Disaster Recovery Planning
  1. Understand business continuity and disaster recovery planning
  2. Assess the adequacy of business continuity and disaster recovery plans
  3. Evaluate testing and maintenance of plans
  • Information Systems Acquisition and Development
  1. Evaluate the acquisition and development of information systems
  2. Assess project management practices
  3. Review system development methodologies
  • Information Systems Maintenance and Service Management
  1. Evaluate the maintenance and support of information systems
  2. Assess data quality and data management practices
  3. Understand service level management

 

Domain 4: Information Systems Operations and Business Resilience

  • Information Systems Operations
  1. Evaluate the use of IT resources
  2. Assess IT service management practices
  3. Understand system performance management
  • Information Security Management
  1. Evaluate information security policies and procedures
  2. Assess the design and implementation of security controls
  3. Understand the principles of business continuity and disaster recovery
  • Business Resilience
  1. Assess business continuity and disaster recovery plans
  2. Understand and evaluate business impact analysis

 

Domain 5: Protection of Information Assets

  • Information Asset Security Framework and Risk Management
  1. Understand the principles of information asset security
  2. Assess information classification and ownership
  3. Evaluate information security governance and risk management
  • Information Asset Security
  1. Evaluate information security policies and standards
  2. Assess the design and implementation of information security controls
  3. Understand information security awareness and training programs

Domain 1: Security and Risk Management

  • 1.1. Security Governance Principles and Frameworks
  1. Understand and apply security governance principles.
  2. Compliance with laws, regulations, and policies.
  3. Security control frameworks and standards.
  • 1.2. Security Policy and Procedures
  1. Develop and implement comprehensive security policies, procedures, and guidelines.
  2. Understand the importance of policies in shaping security culture.
  • 1.3. Risk Management
  1. Conduct risk assessments and risk management processes.
  2. Business impact analysis (BIA) and risk mitigation strategies.
  3. Risk assessment methodologies and techniques.
  • 1.4. Ethics in Information Security
  1. Understand the code of ethics for CISSPs.
  2. Ethical decision-making and professional responsibility.

Domain 2: Asset Security

  • 2.1. Information Classification and Ownership
  1. Implement data classification schemes.
  2. Identify data owners and custodians.
  • 2.2. Protecting Privacy
  1. Privacy principles and compliance requirements.
  2. Privacy-enhancing technologies.
  3. Data handling and protection.
  • 2.3. Data Security Controls
  1. Data-at-rest, data-in-motion, and data-in-use security.
  2. Data encryption and data masking.
  3. Database security and cloud data security.

Domain 3: Security Architecture and Engineering

  • 3.1. Security Models and Architecture
  1. Security architectures (e.g., OSI model, defence-in-depth).
  2. Security models (e.g., Bell-LaPadula, Biba).
  • 3.2. Security Engineering
  1. System and application security design principles.
  2. Security evaluation models and certification.
  • 3.3. Security Evaluation Models
  1. Security assessment and testing methods.
  2. Common criteria and security certifications.
  • 3.4. Secure Development
  1. Secure coding practices.
  2. Security controls in software development.

Domain 4: Communication and Network Security

  • 4.1. Secure Network Architecture Design
  1. Network models (e.g., TCP/IP, OSI).
  2. Secure network components.
  • 4.2. Secure Communication Channels
  1. VPNs, TLS/SSL, encryption.
  2. Network access control (NAC) and network segmentation.
  • 4.3. Network Attacks
  1. Common network attacks (e.g., DoS, DDoS, MITM).
  2. Intrusion detection and prevention systems (IDPS).

Domain 5: Identity and Access Management (IAM)

  • 5.1. Identity and Access Management
  1. IAM concepts, components, and lifecycle.
  2. Authentication and authorization mechanisms.
  • 5.2. Physical and Logical Access Control
  1. Access control models (e.g., MAC, DAC, RBAC).
  2. Biometric and multifactor authentication.
  • 5.3. Identity as a Service (IDaaS)
  1. Cloud-based identity and access management.
  2. Single sign-on (SSO) and federated identity.
  • Domain 6: Security Assessment and Testing
  1. Domain 7: Security Operations
  2. Domain 8: Software Development Security

Introduction

  • IT Infrastructure
  • Waterfall Model
  • Agile Methodologies
  • Introduction to DevOps
  • DevOps Road Map

Ubuntu

  • History
  • Pros & Cons
  • Distributions
  • Virtualization
  • Shells, GUI, Terminal
  • File System
  • Directories
  • Commands
  • Permissions, User, Groups
  • Crontab
  • Text Editors, Other Essential tools
  • Backup Techniques
  • I/O Redirection
  • Partitions

Networks & Security

  • OSI Model
  • TCP/IP Fundamentals
  • DNS
  • Http/s
  • SSL
  • FTP

Cloud Computing AWS

  • Introduction to Cloud Computing
  • Private, Public and Hybrid Cloud
  • IaaS, PaaS and
  • Introduction to AWS
  • AWS Architecture
  • Domains of AWS
  • AWS Compute Services (EC2, Lambda)
  • Storage Service (S3)
  • Networking Services
  • AWS CloudFront
  • Monitoring & Management (AWS CloudWatch)
  • Auto-Scaling & Load Balancer
  • Cloud Security
  • AWS IAM
  • Amazon Redshift

Azure

  • Azure Fundamentals
  • Active Directory
  • RBAC
  • Compute Services (App Services, Function Apps, VMs, CDN)
  • Storage Services (Storage Account, Databases, )
  • Networks and App Gateway
  • Monitoring & Auto Scaling
  • Automation Account
  • Azure Analytics Workspace

Scripting Bash

  • Shell Scripting Introduction
  • Syntax
  • Variables
  • Operators
  • Conditionals
  • Loops
  • Command Substitution
  • Parameter Substitution
  • Functions

PowerShell

  • Introduction
  • Syntax
  • Examples

Python

  • Introduction
  • Syntax
  • Variables
  • Datatypes
  • Conditionals
  • Loops
  • Arrays
  • Functions
  • Classes/Objects
  • Inheritance
  • Scripting
  • Examples

YAML

  • What is YAML language
  • YAML Basic Syntax
  • Data types: Integers, Bool, Arrays, Dictionaries, Null, Set, Strings
  • Multiline Strings
  • Anchors and Extensions
  • YAML Placeholders
  • Docker Compose & Kubernetes YAML examples
  • PyYAML Python Module
  • Sample Python scripts

Version Control System

  • What is Git?
  • Different Git
  • Using Git (Command line + GUI).
  • Installing Git (Linux + Windows)
  • Configuring
  • Cloning a Repository
  • Basic Git
  • Essential

CI/CD Jenkins

  • Introduction
  • What is Continuous Integration?
  • What is Continuous Deployment?
  • What is Jenkins?
  • Jenkins Installation, Setup and Demo
  • Jenkins Master-Slave architecture
  • Jenkins Pipeline
  • What is a Jenkinsfile?
  • Pipeline Concepts
  • Create your first Pipeline

Azure DevOps

  • Introduction
  • Azure Boards
  • Azure Repos
  • Pipelines

AWS DevOps

  • Introduction
  • AWS DevOps Components
  • Building a CICD Pipeline on AWS

Containerization “Docker”

  • What is Docker?
  • What is a Container?
  • Docker vs Virtual Machine
  • Docker Installation
  • Main Docker Commands
  • Debugging a Container
  • Demo Project Overview
  • Developing with Containers
  • Docker Compose
  • Dockerfile
  • Private Docker Repository, Rrivate Registry on AWS, Azure Container Registry
  • Deploy Containerized App
  • Docker Volumes
  • Volumes Demo

Orchestration Kubernetes

  • What is K8s
  • Main K8s Components
  • K8s Architecture
  • Minikube and kubectl -Local Setup
  • Main Kubectl Commands – K8s CLI
  • K8s YAML Configuration File
  • Demo Project: MongoDB and MongoExpress
  • Organizing your components with K8s Namespaces
  • K8s Ingress explained
  • Persisting Data in K8s with Volumes
  • Deploying Stateful Apps with StatefulSet
  • K8s Services explained

Helm

  • Helm Introduction
  • Helm 2 Vs Helm 3
  • Installing Helm
  • Helm Charts
  • Helm Dependencies
  • Helm Templates
  • Helm Commands

IaC Terraform

  • Introduction
  • AWS Setup
  • Windows Setup
  • Linux Install
  • VSCode
  • Terraform Overview
  • Modifying Resources
  • Deleting Resources
  • Referencing Resources
  • Terraform Files
  • Practice Project
  • Terraform State Commands
  • Terraform Output
  • Target Resources
  • Terraform Variables

ARM Template

  • Building templates
  • Deployment options
  • Testing templates
  • Template syntax and example resources
  • Template parametrization
  • Template functions

AWS CloudFormation

  • AWS CloudFormation
  • AWS CloudFormation Components
  • Templates in CloudFormation
  • Stacks in CloudFormation
  • Direct Update
  • Update

Configuration Management “Ansible”

  • Introduction to Ansible
  • Ansible Playbook Tutorial
  • Ansible Explained
  • Writing Ansible Playbook
  • Ansible Tower Tutorial
  • Ansible vs Terraform

Monitoring & Logging Prometheus

  • Introduction
  • What is Prometheus?
  • Why Prometheus?
  • Continuous Monitoring with Prometheus
  • Prometheus Architecture
  • Prometheus Metrics and its Metrics
  • Prometheus Installation and Demo

Grafana

  • Introduction
  • Continuous Monitoring in DevOps
  • Introduction to Grafana
  • Monitoring with Grafana

Datadog

  • Introduction
  • Integrations
  • Infrastructure
  • Host Map
  • Events
  • Dashboards
  • Assigning Tags
  • Using Tags
  • Datadog Graphing

ELK

  • What is ELK stack?
  • Various ELK tools
  • Components of ELK
  • ELK Flow
  • Features of ELK
  • Installation

Servers Apache

  • What is Web Server?
  • Installation
  • Managing Service
  • Main Configuration File

IIS

  • What is IIS and how it works?
  • Installation
  • Web Platform Installer Tool?
  • Hosting
  • What are bindings?
  • What are application pools?

Nginx

  • What is Nginx?
  • Nginx Architecture
  • Why should we use Nginx?
  • How to Install Nginx?
  • Hands-On: Deploying a Web Application on Nginx

Case studies for DevOps implemented Projects

  • Monolithic vs Micro-Services Architecture
  • Deployment Models
  • Case Study for Monolithic
  • Case study for Containerized Application
  • Case Study for the Architecture managed through
  • Case Study for a completely managed Deployment Model through CI/CD
  • Basic principles of data communication and O&M of IP networks.
  • Plan and design IP addresses.
  • Performing Basic VRP Operations.
  • Functions and working principles of the switching equipment.
  • Set up an efficient switching network by configuring switching devices and running the STP/RSTP protocol.
  • Basic principles of routing and routing protocols.
  • Configuration of OSPF to build an efficient routing network.
  • Configuration of common services on enterprise networks, such as DHCP, FTP, and Telnet
  • Efficient usage and management of the network.
  • Configuration of link aggregation, VLAN to enhance the performance of Layer 2 networks.
  • Configuration of DLC, PPP, PPPoE to implement WAN interconnection.
  • Performing NAT Configuration.
  • Configuration of ACL, AAA, and IPSec/GRE to provide security solutions for IP networks.
  • Configuration of SNMP to manage networks in a unified manner.
  • Principles of MPLS and Segment Routing.

SECTION-1

1. Introduction to SEO

  • What is SEO and why is it important?
  • Types of SEO
  • Difference between on-page & off-page SEO
  • How search engines work?
  • Google SERP
  • Crawling, indexing, and ranking

 

2. What are keywords?

  • Types of keywords
  • Long-tail and LSI keywords
  • How to do keyword research?
  • Keyword research tools

 

3. On Page SEO

  • Keyword optimization
  • Title tag
  • Meta description
  • How to use heading tags?
  • Role of keyword density in content
  • Anchor text
  • What is the bounce rate?
  • What is keyword stuffing?
  • Plagiarism checker
  • Keyword prominence, proximity, and cannibalization
  • Image optimization (alt tag, title, compression)
  • How permalinks matter in SEO?
  • SEO-friendly URLs and structure
  • Subdomains
  • Breadcrumbs
  • Golden rule for first-page ranking
  • Practical assignment

 

4. Technical SEO

  • Introduction to technical SEO
  • HTML sitemap vs XML sitemap
  • Sitemap creation
  • Robots.txt file
  • Canonical tag optimization
  • Best practices for 404 error pages
  • 301/302 URL redirection
  • Schema markup and structured data
  • Role of Open Graph tags in SEO
  • W3C validation
  • JavaScript and CSS optimization
  • How to increase page loading time?

 

5. SEO audit of a website

6. Off-Page SEO

  • Introduction to off-page SEO
  • What are backlinks?
  • Importance of backlinks in SEO
  • Inbound vs outbound links
  • What is link juice?
  • Do follow vs no follow backlinks
  • How to build quality backlinks?
  • What is Domain Authority (DA) and page authority (PA)?
  • Search Engine Submission
  • Free classified submission
  • Image submission
  • PDF submission
  • Social bookmarking
  • Forum posting
  • Guest blogging
  • Social bookmarking
  • Press release submission
  • Infographic submission
  • Web 2.0
  • Article submission
  • Video submission
  • Q&A submission
  • Practical Assignment

 

SECTION-2

Introduction to digital marketing

Module 1: Fundamentals of Digital Marketing

Understanding the digital marketing landscape

This module provides an overview of the digital marketing ecosystem, including the different channels, platforms, and technologies involved. It explores the evolution of digital marketing and its impact on consumer behaviour.

 

Key concepts and terminology in digital marketing

To effectively communicate and implement digital marketing strategies, it is essential to understand the terminology and concepts commonly used in the field. This section covers key terms such as SEO, PPC, CTR, conversion rate, and more.

 

Building a digital marketing strategy

A successful digital marketing campaign starts with a well-defined strategy. This module delves into the process of developing a comprehensive digital marketing strategy that aligns with business goals and target audience.

 

Target audience identification and segmentation

Understanding the target audience is crucial for effective marketing. Participants will learn how to identify their target audience, conduct market research, and segment their audience based on demographics, interests, and behaviour.

 

Module 2: Website Design and Development

Importance of a well-designed website

A website serves as the online face of a business. This section emphasizes the significance of a well-designed website in creating a positive user experience and driving conversions.

 

User experience (UX) and user interface (UI) design principles

Participants will learn about UX and UI design principles that optimize website usability and enhance user satisfaction. Topics covered include intuitive navigation, responsive design, and visual hierarchy.

 

Website structure and navigation

An organized and intuitive website structure is essential for easy navigation and information discovery. This module covers techniques for creating a logical website structure and designing user-friendly navigation menus.

 

Mobile optimization and responsive design

With the increasing use of smartphones, mobile optimization is crucial for delivering a seamless user experience. Participants will learn how to create responsive websites that adapt to different screen sizes and devices.

 

Module 3: Search Engine Optimization (SEO)

Introduction to SEO and its benefits

SEO plays a vital role in driving organic traffic to websites. This module provides an introduction to SEO, its benefits, and its role in improving website visibility on search engines.

 

Keyword research and analysis

Keywords are the foundation of SEO. Participants will learn how to conduct keyword research, identify relevant keywords for their business, and analyse keyword competitiveness.

 

On-page optimization techniques

Optimizing web pages for search engines is essential for higher rankings. This section covers on-page optimization techniques such as meta tag optimization, keyword placement, and content optimization.

 

Off-page optimization strategies

Off-page SEO focuses on building quality backlinks and improving a website’s reputation. Participants will explore various off-page optimization strategies, including link building, social bookmarking, and influencer outreach.

 

Technical SEO

Website Structure, XML Sitemaps, and Page Speed Optimization

 

SEO analytics and reporting

Measuring the effectiveness of SEO efforts is crucial for ongoing optimization. This module introduces participants to SEO analytics tools and provides insights into tracking key performance indicators (KPIs) and generating reports.

 

Module 4: Pay-Per-Click (PPC) Advertising

Introduction to PPC advertising

PPC advertising allows businesses to display ads on search engine results pages and other online platforms. This section explains the basics of PPC advertising and its role in driving targeted traffic.

 

Google Ads and Bing Ads platforms

Participants will learn how to set up and manage PPC campaigns using popular platforms like Google Ads and Bing Ads. They will explore features such as ad creation, keyword bidding, and campaign optimization.

 

Creating effective ad campaigns

Crafting compelling and relevant ad campaigns is crucial for maximizing ROI. This module provides insights into creating attention-grabbing ad copy, selecting appropriate keywords, and targeting the right audience.

 

Keyword bidding and budget management

Bidding on keywords requires strategic planning to optimize ad visibility and control costs. Participants will learn how to set keyword bids, allocate budgets effectively, and monitor campaign performance.

 

Ad performance tracking and optimization

To improve campaign performance, continuous monitoring and optimization are necessary. This section covers tracking ad performance metrics, analysing data, and making data-driven optimizations.

 

Module 5: Social Media Marketing

Leveraging social media for business

Social media platforms offer a vast opportunity for businesses to connect with their target audience. This module explores the benefits of social media marketing and how to leverage different platforms effectively.

 

Social media platforms and their unique features

Participants will be introduced to popular social media platforms such as Facebook, Instagram, Twitter, LinkedIn, and YouTube. They will learn about each platform’s unique features and best practices for content creation.

 

Creating engaging social media content

Engaging content is key to capturing the attention and interest of social media users. This section covers strategies for creating compelling visuals, writing captivating captions, and leveraging user-generated content.

 

Building and managing a social media community

Participants will learn how to build an active and engaged social media community. Topics covered include community management, responding to comments and messages, and handling customer feedback.

 

Social media analytics and measuring ROI

Measuring the success of social media marketing efforts is crucial for evaluating ROI. This module introduces participants to social media analytics tools and teaches them how to track key metrics and assess performance.

 

Module 6: Email Marketing

Basics of email marketing

Email marketing remains a highly effective way to reach and engage with customers. This module covers the fundamentals of email marketing, including building an email list, designing effective email templates, and understanding email deliverability.

 

Building an email list and segmentation

Participants will learn strategies for building an engaged and targeted email list. They will also explore segmentation techniques to tailor email campaigns based on customer preferences and behaviour.

 

Designing effective email campaigns

Creating visually appealing and persuasive email campaigns is crucial for driving conversions. This section covers best practices for email design, including layout, colors, fonts, and CTAs (call-to-action).

 

A/B testing and optimizing email campaigns

Testing and optimizing email campaigns can significantly improve their performance. Participants will learn how to conduct A/B tests, analyse results, and make data-driven decisions to optimize email campaigns.

 

Email automation and personalization

Automation and personalization can enhance the effectiveness of email marketing. This module explores the use of automation tools to send targeted and personalized emails based on customer behaviour and preferences.

 

Module 7: Content Marketing

Understanding the importance of content marketing Content marketing involves creating and distributing valuable content to attract and engage a target audience. This section explores the benefits of content marketing and its role in building brand authority and driving conversions.

 

Creating a content marketing strategy

A well-defined content marketing strategy is essential for consistent and effective content creation. Participants will learn how to develop a content marketing strategy aligned with business goals and audience needs.

 

Developing high-quality and engaging content

This module covers techniques for creating high-quality content that resonates with the target audience. Participants will explore different content formats, storytelling techniques, and content distribution channels.

 

Content distribution and promotion

Creating great content is only the first step; it also needs to be effectively distributed and promoted. This section covers strategies for content distribution, including social media, email marketing, guest blogging, and influencer outreach.

 

Measuring content marketing success

Measuring the success of content marketing efforts helps refine strategies and achieve better results. Participants will learn how to track key metrics such as website traffic, engagement, and conversions, and use data to optimize future content marketing campaigns.

 

Module 8: Affiliate Marketing

  • Introduction to Affiliate Marketing and its Role in Digital Marketing
  • Understanding Affiliate Networks and Programs
  • Affiliate Program Setup and Management
  • Affiliate Recruitment and Relationship Building
  • Affiliate Marketing Analytics and Performance Tracking

 

Module 9: Influencer Marketing

  • The Power of Influencer Marketing in Digital Marketing Strategy
  • Identifying and Connecting with Influencers in Your Niche
  • Negotiating and Establishing Successful Influencer Partnerships
  • Measuring the Impact of Influencer Marketing Campaigns
  • Ethical Considerations and Guidelines for Influencer Marketing

 

Module 10: Mobile Marketing

  • The Rise of Mobile Marketing and its Importance
  • Mobile Advertising Strategies and Formats
  • Mobile App Marketing and Optimization
  • Location-Based Marketing and Geotargeting
  • Mobile Analytics and Tracking

 

Module 11: E-commerce and Online Sales

  • Understanding E-commerce and its Impact on Digital Marketing
  • Setting up and Optimizing E-commerce Websites
  • Conversion Optimization for E-commerce Platforms
  • Online Payment Systems and Security Considerations
  • Customer Relationship Management (CRM) for E-commerce

 

Module 12: Analytics and Reporting

Introduction to web analytics tools

Web analytics tools provide valuable insights into website performance and user behaviour. This module introduces popular web analytics platforms such as Google Analytics and explores their features and capabilities.

 

Setting up and tracking website analytics

Participants will learn how to set up web analytics tools and track essential metrics such as website traffic, bounce rate, conversion rate, and user demographics. They will also explore the implementation of event tracking and goal tracking.

 

Analysing and interpreting data for insights

Data analysis is crucial for identifying trends, opportunities, and areas for improvement. This section covers techniques for analysing web analytics data and extracting actionable insights to optimize digital marketing strategies.

 

Reporting on key performance indicators (KPIs)

Effective reporting helps stakeholders understand the impact of digital marketing efforts. Participants will learn how to create comprehensive and visually appealing reports that highlight key performance indicators (KPIs) and demonstrate the value of digital marketing campaigns.

 

Continuous optimization based on data analysis

Data analysis should inform ongoing optimization efforts. This module emphasizes the importance of continuously reviewing data, identifying areas for improvement, and implementing data-driven optimizations to achieve better results.

 

Module 13: Digital Marketing Ethics and Privacy

  • Ethical Considerations in Digital Marketing Practices
  • Privacy Regulations and Compliance (e.g., GDPR, CCPA)
  • Data Collection, Handling, and Security
  • Transparency and Consumer Trust in Digital Marketing
  • Responsible Digital Marketing Strategies for Long-Term Success

Module 1: Layer 2 Technologies

STP

  • STP (Huawei Documentation: STP)
  • RSTP (Huawei Documentation: STP/RSTP Configuration)
  • MSTP (Huawei Documentation: MSTP Configuration)
  • Loop guard (Huawei Documentation: Configuring Loop Protection on a Port)
  • Root guard
  • BPDU guard (Huawei Documentation: BPDU Protection)
  • TC-BPDU attack guard

VLAN

  • Access port (Huawei Documentation: Configuring a VLAN Based on Ports)
  • Trunk port
  • Hybrid port (Huawei Documentation: Hybrid Port)
  • QinQ (Huawei Documentation: QinQ Configuration)
  • Vlan Aggregation (Huawei Documentation: VLAN Aggregation Configuration)
  • Mux VLAN (Huawei Documentation: MUX VLAN Configuration)
  • Voice VLAN (Huawei Documentation: Voice VLAN Configuration)
  • Transparent bridge
  • Local Bridging (Huawei Documentation: Local Bridging)
  • Remote Bridging (Huawei Documentation: Remote Bridging)
  • Integrated Bridging and Routing (Huawei Documentation: Integrated Bridging and Routing)
  • VLAN ID Transparent Transmission (Huawei Documentation: VLAN ID Transparent Transmission)
  • Link Aggregation, Eth-Trunk and IP-Trunk, Load-balance, LACP
  • Link Aggregation (Huawei Documentation: Link Aggregation Configuration)
  • LACP (Huawei Documentation: LACP)
  • Ethernet technologies
  • Speed and duplex (Huawei Documentation: Configuring the Duplex Mode)
  • Ethernet, Fast Ethernet, Gigabit Ethernet, 10GE, 40GE, 100GE
  • Auto MDI/MDIX (Huawei Documentation: Configuring the MDI Type)
  • Auto negotiation (Huawei Documentation: Configuring Auto-Negotiation)
  • Storm control (Huawei Documentation: Storm Control, Configuring Storm Control)
  • Unicast flooding control
  • Smart link (Huawei Documentation: Smart Link Configuration)
  • DLDP (Huawei Documentation: Overview of DLDP)
  • Switched Port Analyzer (port-mirroring) (Huawei Documentation: Mirroring)
  • CSS/ iStack
  • HDLC/IP-Trunk and PPP/MP (Huawei Documentation: Configuring an IP-Trunk Interface, HDLC and IP-Trunk Configurations)

 

PPPoE (Huawei Documentation: PPPoE Configuration)

Module 2: IPv4/v6 Unicast

  • IPv4 addressing, subnetting, and VLSM (Huawei Documentation: Subnetting, IPv4)
  • IPv4 tunnelling and GRE (Huawei Documentation: Configure an IPv6 over IPv4 GRE Tunnel)
  • IPv6 addressing (Huawei Documentation: IPv6 Addresses)
  • ICMPv6 (Huawei Documentation: ICMPv6)
  • IPv6 functionality protocols (Huawei Documentation: Basic IPv6 Configuration)
  • Migration techniques
  • Tunnel techniques (Huawei Documentation: Configuring a Tunnel Interface)
  • Translation techniques
  • IPv4/v6 OSPF
  1. Standard OSPF areas (Huawei Documentation: OSPF)
  2. Stub area (Huawei Documentation: Configuring an OSPF Stub Area)
  3. Totally stubby area
  4. NSSA (Huawei Documentation: OSPF NSSA)
  5. Totally NSSA
  6. LSA types (Huawei Documentation: OSPF LSA Format)
  7. Adjacency on a point-to-point and on a multi-access network
  • Virtual-Link (Huawei Documentation: OSPF Virtual Link)
  • LSA Filter (Huawei Documentation: ospf filter-lsa-out)
  • IPv4/v6 IS-IS
  • NSAP (Huawei Documentation: Basic Concepts of IS-IS)
  • IS-IS Link-state packets (Huawei Documentation: Basic Protocols of IS-IS)
  • IS-IS area type
  • IS-IS circuit type (Huawei Documentation: is-is circuit-type)
  • IS-IS TLV (Huawei Documentation: IS-IS Wide Metric)
  • IS-IS DIS and Pseudo node (Huawei Docs: Configuring IS-IS DIS Election)
  • IS-IS SPF
  • IS-IS LSP
  • IS-IS Metric (Huawei Documentation: IS-IS Wide Metric)
  • IS-IS Route Leaking (Huawei Documentation: IS-IS Route Leaking)
  • IS-IS MT (Huawei Documentation: IS-IS MT)
  • IS-IS Fast Convergence (Huawei Documentation: IS-IS Fast Convergence)
  • IS-IS LDP Synchronization (Huawei Docs: Configure LDP-IGP Synchronization)
  • IS-IS Authentication (Huawei Documentation: is-is authentication-mode)
  • IPv4/v6 BGP
  • IBGP and EBGP (Huawei Documentation: Commissioning IBGP Routes)
  • BGP attributes (Huawei Documentation: Configuring BGP Route Attributes)
  • BGP synchronization (Huawei Documentation: OSPF-BGP Synchronization)
  • BGP routes Summarization (Huawei Docs: Configure BGP Route)
  • Route Dampening (Huawei Documentation: Route Dampening)
  • BGP route reflector (Huawei Documentation: Route Reflector)
  • BGP Community (Huawei Docs: Community Attribute Applications in BGP)
  • BGP Peer Groups (Huawei Documentation: Configuring a BGP Peer Group)
  • BGP Security (Huawei Documentation: BGP Security)
  • Principles of Route Selection (Huawei Docs: Routers and Routing Principles)
  • Route Control
  • Filtering (Huawei Documentation: Configuring a Route-Filter)
  • IP Prefix list (Huawei Documentation: IP Prefix List)
  • Route Import(redistribution)
  • Route policy (Huawei Documentation: Configuring a Route-Policy)
  • Summarization (Huawei Docs: Configuring BGP Route Summarization)
  • Preference
  • Other advanced features

Module 3: MPLS VPN

  • MPLS network component (P, PE, CE) (Huawei Documentation: Commissioning Multicast VPN)
  • MPLS label format (Huawei Documentation: MPLS Label)
  • MPLS label encapsulation
  • MPLS label stack
  • MPLS label operation
  • Forwarding Equivalence Class (Huawei Documentation: MPLS Label)
  • LDP (Huawei Documentation: MPLS LDP Configuration)
  • Label advisement model
  • MPLS LDP—Local Label Allocation Filtering
  • MPLS LDP Inbound/outbound Label Binding Filtering (Huawei Documentation: Outbound and Inbound LDP Policies)
  • MPLS Layer 3 VPN
  • MP-IBGP VPNv4 peering (Huawei Documentation: Configuring Route Reflection for BGP VPNv4 Routes)
  • VPN-instance (Huawei Documentation: Configuring a VPN Instance)
  • Route Distinguisher (Huawei Documentation: route-distinguisher)
  • Route Target (Huawei Documentation: Configuring a Route Target Set)
  • Route Target import/export
  • PE-CE–Dynamic Routes (Huawei Documentation: Configuring Route Exchange Between PE and CE Devices)
  • PE-CE–Static Routes
  • Redistributing PE-CE routes into VPNv4
  • Inter-AS MPLS BGP VPN (Huawei Documentation: Configuring Inter-AS BGP/MPLS IP VPN in Option C Mode)

Module 4: IPv4/v6 Multicast

  • Multicast distribution tree (Huawei Documentation: Multicast Route Management (IPv4) Configuration)
  • Multicast forwarding (Huawei Documentation: Multicast Routing and Forwarding)
  • Multicast RPF (Huawei Documentation: RPF Check)
  • sparse mode (Huawei Documentation: Configuring IPv4 PIM-SM)
  • IGMP/MLD (Huawei Documentation: Overview of MLD)
  • IGMP Snooping/MLD Snooping (Huawei Documentation: Overview of MLD Snooping)
  • PIM RP, and BSR (Huawei Documentation: Configuring a BSR RP)
  • Multicast tools, features, and source-specific multicast (Huawei Documentation: PIM-SM (SSM Model))

Module 5: Network Security

  • 5.1 Access lists (Huawei Documentation: Access Control List)
  • 5.2 uRPF (Huawei Documentation: Overview of URPF)
  • 5.3 IP Source Guard (Huawei Docs: IP Source Guard Configuration Commands)
  • 5.4 AAA (Huawei Documentation: AAA Configuration)
  • 5.5 802.1x / NAC (Huawei Documentation: 802.1X Authentication)
  • 5.6 NAT
  • 5.6.1 Static NAT/NAPT (Huawei Documentation: NAT)
  • 5.6.2 Dynamic NAT/PAT
  • 5.6.3 Easy IP (Huawei Documentation: Configuring Easy IP for NAT)
  • 5.6.4 NAT Server
  • 5.6.5 Twice NAT (Huawei Documentation: Configuring Twice NAT)
  • 5.6.6 ALG (Huawei Documentation: NAT ALG)
  • 5.6.7 NAT Mapping (Huawei Documentation: NAT Filtering and NAT Mapping)
  • 5.7 Device access control (Huawei Documentation: Access Control List)
  • 5.8 IPsec (Huawei Documentation: Basic Concepts of IPSec)
  • 5.9 Traffic Suppression (Huawei Documentation: Traffic Suppression Configuration)
  • 5.10 Local Attack Defence (Huawei Documentation: Local Attack Defence)
  • 5.11 IP Address Anti-spoofing (Huawei Documentation: IP Address Anti-spoofing)
  • 5.12 ARP Security (Huawei Documentation: ARP Security Configuration)
  • 5.13 DHCP Security (Huawei Documentation: DHCP Security)

Module 6: QoS

  • Classification (Huawei Documentation: Quality of Service (QoS))
  • Traffic Policing (Huawei Documentation: Traffic Policing)
  • Traffic Shaping (Huawei Documentation: Traffic Shaping)
  • Congestion Avoidance (Huawei Documentation: Congestion Avoidance)
  • Congestion Management (Huawei Documentation: Congestion Management)

Module 7: Network Management

  • Syslog
  • IP Service Level Agreement SLA (Huawei Documentation: SLA Management)
  • NetStream (Huawei Documentation: Overview of NetStream)
  • NQA (Huawei Documentation: NQA Configuration)
  • SNMP (Huawei Documentation: SNMP)
  • FTP
  • Telnet (Huawei Documentation: Configuring Telnet Login, Telnet and SSH)
  • SSH (Huawei Documentation: Enabling the SSH Server Function, Telnet and SSH)

Module 8: Features

  • VRRP (Huawei Documentation: Overview of VRRP)
  • VGMP
  • Interface Backup (Huawei Documentation: Interface Backup)
  • NTP (Huawei Documentation: NTP Configuration)
  • DHCP (Huawei Documentation: DHCP Configuration)
  • BFD (Huawei Documentation: BFD Configuration)
  • NSF/GR
  • NSR (Huawei Documentation: Overview of NSR

Module 9: SDN

  • Strategy of SDN/NFV
  • SDN architecture
  • VXLAN (Huawei Documentation: VXLAN)
  • EVPN (Huawei Documentation: EVPN Configuration)

Module 1-Network Planning

  • The content of network planning
  • The method of network planning
  • Perform network planning properly

 

Module 2-Network Design

  • Common network types
  • Each layer of the network design
  • Common products and technologies
  • Advantages and disadvantages of common protocols
  • Comprehensive applications of each technical module
  • The network design methodology

 

Module 3-Network Implementation

  • The project delivery process
  • The risky operation implementation process
  • The engineer service standards

 

Module 4-Network Maintenance

  • Routine maintenance tasks
  • Use network management software to maintain networks
  • Methods of upgrading device software
  • The formats of routine maintenance reports

 

Module 5-Network Troubleshooting

  • A structured network troubleshooting process
  • Network troubleshooting methods based on paths that service traffic passes through
  • Methods of troubleshooting common network faults
  • The skills to flexibly use network troubleshooting methods based on practices

 

Module 6-Network Optimization

  • The contents of the professional network optimization service
  • Network optimization principles
  • Methods of improving network security
  • Methods of improving user experience
  • The contents of a network optimization solution

 

Module 7-Network Migration

  • The project delivery process
  • The risky operation implementation process
  • The engineer service standards
  • Training Methods
  • Lecture, Hands-on exercise
  • WLAN Overview
  • WLAN Technology Basics
  • WLAN Networking Model
  • Introduction to Wi-Fi 6 Technologies and Products
  • Working Principles of WLAN
  • WLAN Survey
  • WLAN Design
  • WLAN access authentication
  • WLAN Access Configuration
  • WLAN Antenna Technology
  • WLAN Deployment Overview
  • WLAN Troubleshooting

Installing and Computing Windows Server

Designing and Implementing an AD DS Domain Infrastructure Managing Active Directory

 

Domain Services Objects

  • Installing Active directory domain controller
  • Managing Active Directory Account
  • Creating organizational units

 

Automating Active Directory Domain Services Administration

  • Using Command-Line Tool for Administration
  • Using Windows Scripts for Administration
  • Performing Bulk Operations with Windows PowerShell Managing Group Policy Objects
  • Managing Custom Starter Group Policy Objects
  • Managing Group Policy Disaster Recovery
  • Implementing Resultant Set of Policies Creating and Managing Additional Domain Controllers
  • Managing Operation Masters
  • Designing solution for Operation Master Disasters Designing solutions for Active Directory Branch Office
  • Implementing Read Only Domain Controller Implementing File and Print Services
  • Securing Files and Folders
  • Protecting Shared Files and Folders Using Shadow Copies
  • Configuring local and Network Printing Implementing Local Storage
  • Managing Disks and Volumes

 

Networking with Windows Server

  • Optimizing File Services
  • Overview of FSRM
  • Using FSRM to Disk Quotas, File Screens, and Storage Reports, Drive Maps
  • Configuring Quotas, and File Screening Using FSRM Deploying and Maintaining Server Images
  • Overview of Windows Deployments Services
  • Implementing Windows Deployment Services Implementing Update Management
  • Overview of WSUS
  • Deploying Updates with WSUS

 

Configuring and Troubleshooting Domain Name System

  • Installing the DNS Server Role
  • Configuring the DNS Server Role
  • Configuring DNS Zones

Configuring and Troubleshooting Remote Access

  • Configuring VPN Access
  • Securing VPN connections with Security policies

 

Implementing Networking Services

  • Overview of DHCP
  • Installing a DHCP Server Role
  • Configuring DHCP Scopes
  • Overview of DNS
  • Installing DNS Server Role Implementing Advanced Network Services
  • Configuring Advanced DHCP Features
  • Configuring Advanced DNS Settings

 

Implementing Advanced File Services

  • Overview Distributed File System
  • Configuring Distributed File System
  • Implementing File Server

 

Implementing Network Load Balancing

Implementing Failover Clustering

Implementing Disaster Recovery

Plan Solution for Active Directory Disasters Recovery

Designing and Implementing AD DS Disasters using AD Recycle Bin

Securing Windows Server

  • Plan and Deploy a Server Infrastructure
  • Design and Implement an Active Directory Infrastructure (Logical)
  • Design and Implement an Active Directory Infrastructure (Physical)
  • Designing and Implementing an AD DS Topology
  • Designing AD DS Replication
  • Deploying Additional domain controllers
  • Designing the Placement of Domain Controllers
  • Designing and Implementing an AD DS Sites
  • Deploying child domains and tree domains
  • Implementing of Sites (Forest) Trust Relationship
  • Plan and Implement Server Virtualization with Hyper
  • Plan and deploy virtual
  • Manage a virtual machine
  • Create and Manage Virtualization Host Checkpoints
  • Design and implement Virtualization Replica solutions
  • Plan Solution for managing Multiple Servers Services Remotely

Manage Azure AD objects

  • create users and groups
  • manage user and group properties
  • manage device settings
  • perform bulk user updates
  • manage guest accounts
  • configure Azure AD Join
  • configure self-service password reset
  • NOT: Azure AD Connect; PIM

 

Manage role-based access control (RBAC)

Create a custom role

  • provide access to Azure resources by assigning roles
  1. subscriptions
  2. resource groups
  3. Resources (VM, disk,)
  • interpret access assignments
  • manage multiple directories

 

Manage subscriptions and governance

  • configure Azure policies
  • configure resource locks
  • apply tags
  • create and manage resource groups
  1. move resources
  2. remove RGs
  • manage subscriptions
  • configure Cost Management
  • configure management groups

 

Implement and manage storage

Manage storage accounts

  • configure network access to storage accounts
  • create and configure storage accounts
  • generate shared access signature
  • manage access keys
  • implement Azure storage replication
  • configure Azure AD Authentication for a storage account

 

Manage data in Azure Storage

  • export from Azure job
  • import into Azure job
  • install and use Azure Storage Explorer
  • copy data by using AZCopy

 

Configure Azure files and Azure blob storage

  • create an Azure file share
  • create and configure Azure File Sync service
  • configure Azure blob storage
  • configure storage tiers for Azure blobs

 

Deploy and manage Azure compute resources

Configure VMs for high availability and scalability

  • configure high availability
  • deploy and configure scale sets

 

Automate deployment and configuration of VMs

  • modify Azure Resource Manager (ARM) template
  • configure VHD template
  • deploy from template
  • save a deployment as an ARM template
  • automate configuration management by using custom script extensions

 

Create and configure VMs

  • configure Azure Disk Encryption
  • move VMs from one resource group to another
  • manage VM sizes
  • add data discs
  • configure networking
  • redeploy VMs

 

Create and configure containers

  • create and configure Azure Kubernetes Service (AKS)
  • create and configure Azure Container Instances (ACI)
  • NOT: selecting a container solution architecture or product; container registry settings

 

Create and configure Web Apps

  • create and configure App Service
  • create and configure App Service Plans
  • NOT: Azure Functions; Logic Apps; Event Grid

 

Configure and manage virtual networking

Implement and manage virtual networking

  • create and configure VNET peering
  • configure private and public IP addresses, network routes, network interface, subnets, and virtual network

Configure name resolution

  • configure Azure DNS
  • configure custom DNS settings
  • configure a private or public DNS zone

Secure access to virtual networks

  • create security rules
  • associate an NSG to a subnet or network interface
  • evaluate effective security rules
  • deploy and configure Azure Firewall
  • deploy and configure Azure Bastion Service
  • NOT: Implement Application Security Groups; DDoS

Configure load balancing

  • configure Application Gateway
  • configure an internal load balancer
  • configure load balancing rules
  • configure a public load balancer
  • troubleshoot load balancing
  • NOT: Traffic Manager and FrontDoor and PrivateLink

Monitor and troubleshoot virtual networking

  • monitor on-premises connectivity
  • use Network Performance Monitor
  • use Network Watcher
  • troubleshoot external networking
  • troubleshoot virtual network connectivity

Integrate an on-premises network with an Azure virtual network

  • create and configure Azure VPN Gateway
  • create and configure VPNs
  • configure ExpressRoute
  • configure Azure Virtual WAN

Monitor resources by using Azure Monitor

  • configure and interpret metrics
  1. analyse metrics across subscriptions
  • configure Log Analytics
  1. implement a Log Analytics workspace
  2. configure diagnostic settings
  • query and analyse logs
  1. create a query
  2. save a query to the dashboard
  3. interpret graphs
  • set up alerts and actions
  1. create and test alerts
  2. create action groups
  3. view alerts in Azure Monitor
  4. analyse alerts across subscriptions
  • configure Application Insights
  • NOT: Network monitoring

Implement backup and recovery

  • configure and review backup reports
  • perform backup and restore operations by using Azure Backup Service
  • create a Recovery Services Vault
  1. use soft delete to recover Azure VMs
  • create and configure backup policy
  • perform site-to-site recovery by using Azure Site

Azure DevOps is a set of tools and services provided by Microsoft that helps organizations plan, build, test, and deploy software. It includes the following main components:

  1. Azure Boards: A tool for tracking work items, bugs, and issues.
  2. Azure Repos: A tool for managing source code and collaborating with others.
  3. Azure Artifacts: A tool for managing packages, artifacts, and dependencies.
  4. Azure Test Plans: A tool for testing and quality assurance.
  5. Azure Pipelines: A tool for automating the build, test, and deployment process.
  6. Azure Deployment Centre: A tool for deploying code to various environments.
  7. Azure Monitor: A tool for monitoring and diagnosing the performance of applications.
  8. Azure DevOps Server: On-premises version of Azure DevOps for organizations that prefer to host their own instances.

Projects

  • Build and Push Docker Image
  • CI/CD/IAAC Azure Kubernetes Cluster

Implementing DevOps Development Processes

  • Designing a version control strategy
  • Implementing and integrating source control
  • Implementing and managing build infrastructure
  • Managing application configurations and secrets

Implementing Continuous Integration and Continuous Delivery

  • Managing code quality and security policies
  • Implementing a build strategy
  • Managing build triggers and dependencies
  • Implementing deployment patterns
  • Implementing deployment groups and release management workflows

Implementing Dependency Management

  • Designing and implementing dependency management strategies
  • Managing security and compliance

Implementing Application Infrastructure

  • Designing and implementing infrastructure as code
  • Managing Azure Kubernetes Service infrastructure
  • Managing Azure App Service infrastructure
  • Managing Azure Functions infrastructure

Implementing Continuous Feedback

  • Designing and implementing feedback mechanisms
  • Implementing monitoring and logging solutions
  • Implementing telemetry
  • Analysing telemetry data

Designing a DevOps Strategy

  • Developing a DevOps adoption plan
  • Planning for migrating and consolidating artifacts and source control
  • Implementing and managing Continuous Integration and Continuous Delivery pipelines
  • Implementing dependency management strategies
  • Next Generation Firewall (NGFW) Concepts
  • Palo Alto Networks Portfolio and Architecture
  • Initial Configuration (Access, Management and Account administration)
  • Interface Configuration (Security Zones, Interface types, DHCP and Virtual Routers)
  • Security Policies: Concept, Components, Verification and Traffic Logs
  • Network Address Translation ( Source-based, Destination-based, U-Turn NAT )
  • DMZ Buildup & Accessing DMZ servers
  • Routing (Static/OSPF/BGP)
  • Policy Based Forwarding
  • Virtual Wire
  • App-ID (Overview, Application Groups and Filters)
  • Content-ID (Antivirus, Anti-Spyware, Vulnerability and URL Filtering)
  • Decryption (Certificate Management, Inbound/Outbound SSL)
  • File Blocking and Data Filtering
  • Wildfire
  • User-ID (Mapping Users to IP Addresses, User-ID agent)
  • Global Protect
  • Site to Site VPNs
  • Zone/DOS Protection
  • Monitoring and Reporting
  • Packet Capture
  • High Availability (Active/Passive, Active/Active)
  • Programmability of PAN OS using REST APIs / JSON / Ansible
  • Panorama Overview
  • SDWAN concept

VIM Editor:

  • Explain the three main modes of “vim”
  • Vim Editing and Modification Options

 

Network services:

  • Network Bonding (NIC Teaming)
  • Install the packages needed to provide the service
  • Configure Selinux
  • Configure the service to start when the system is booted
  • Configure the service for basic operation
  • Configure host-based and user-based security for the service

 

System Management:

  • Alias
  • Data Searching
  • Disk Quota for Multiple File System
  • Routing

 

Database Management:

  • Installation and Configuration of MariaDB
  • Backup and Restore

 

Storage Management:

  • ISCSI Terminology
  • Management of ISCSI on Linux with Linux and Windows Client

 

NTP (Network Time Protocol):

Network Time Protocol (NTP) is a protocol used to synchronize computer clock times in a network. It belongs to and is one of the oldest parts of the TCP/IP protocol suite. The term NTP applies to both the protocol and the client-server programs that run on computers.

  • Install and Configuration of NTP Server
  • Synchronize time using other NTP Peers
  • Configure Windows and Linux Client as NTP Peer

 

NFS (Network File Service):

The Network File System (NFS) is client/server application that lets a computer user view and optionally store and update files on a remote computer as though they were on the user’s own computer.

  • Installation and configuration of NFS Server
  • Creating Share for Linux and Unix Machines
  • Access the share on Client Machine
  • Access, Mount and unmount NFS Shares

 

LAMP (Network File Service):

LAMP is an open-source Web development platform that uses Linux as the operating system, Apache as the Web server, MySQL as the relational database management system and PHP as the object-oriented scripting language. (Sometimes Perl or Python is used instead of PHP.)

  • Installation and configuration
  • Installation of Appache Server
  • Installation of MariaDB
  • Installation of PHP
  • Install and Configure PHP My Admin

 

FTP (File Transfer Protocol):

An FTP Server is a piece of software that is running on a computer and uses the File Transfer Protocol to store and share files. Remote computers can connect anonymously, if allowed, or with a user name and password in order to download files from this server using a piece of software called a FTP Client.

  • Installing and Configuration
  • Anonymous User
  • Real User
  • Access with Browser and Client Software
  • Create FTP Repository

 

SAMBA:

An open-source implementation of the SMB file sharing protocol that provides file and print services to SMB/CIFS clients. Samba allows a non-Windows server to communicate with the same networking protocol as the Windows products.

  • Installation and Configuration Samba Server & Client to share
  • Creating samba Share
  • Access Samba Share with win98 & WinNT, 2000, Windows 7,8,8.1,10
  • Access Samba Share with Linux Client
  • Windows As SMB Share Servers
  • Policies Implementation on samba share
  • Sharing printer through samba
  • SWAT (Samba Web Administration tool)
  • Permissions Implementation
  • Provide network shares to specific clients
  • Provide network shares suitable for group collaboration
  • Install Antivirus for Samba Share Scanning
  • Create Auto Script / Command for Samba Share Scanning By Antivirus
  • FTP And SAMBA Integration

 

DNS (Domain Name Server):

The Internet’s system for converting alphabetic names into numeric IP addresses. The main function of DNS is to translate domain names into IP Addresses, which computers can understand.

  • How DNS Works and Learn DNS Route
  • Installation and configuration
  • DNS Record Types
  • DNS Types
  • Ayana Major 13 Root Servers
  • Forwarder DNS
  • Cashing Only DNS
  • Create Forward and Reverse Zones
  • Slave DNS Concept
  • Configure a caching-only name server
  • Configure a caching-only name server to forward DNS queries

 

DHCP (Dynamic Host Configuration Protocol):

DHCP (Dynamic Host Configuration Protocol) is a protocol used to provide quick, automatic, and central management for the distribution of IP addresses within a network. DHCP is also used to configure the proper subnet mask, default gateway, and DNS server information on the device.

  • Understand DHCP DORA Process
  • How DHCP Works
  • Installation and configuration
  • DHCP Relay Agent

 

Proxy Server Squid:

Squid is a full-featured web proxy cache server application which provides proxy and cache services for Hyper Text Transport Protocol (HTTP), File Transfer Protocol (FTP), and other popular network protocols. Squid can implement caching and Proxying of Secure Sockets Layer (SSL) requests and caching of Domain Name Server (DNS) lookups, and perform transparent caching. Squid also supports a wide variety of caching protocols, such as Internet Cache Protocol (ICP), the Hyper Text Caching Protocol (HTCP), the Cache Array Routing Protocol (CARP), and the Web Cache Coordination Protocol (WCCP).

  • Internet Sharing Using NAT
  • Installation and configuration
  • ACL (Access Control List)
  • Transparent Proxy
  • Blocking URL’s
  • Viewing of Logs
  • Installation and Configuration of SARG Squid Analyzer and Report Generator
  • Squid Authentication

 

Web Server Apache:

Apache is the most popular Web server software. It enables a computer to host one or more websites that can be accessed over the Internet using a Web browser. Apache Web Server is an open-source web server creation, deployment and management software. Initially developed by a group of software programmers, it is now maintained by the Apache Software Foundation.

  • Installation and configuration
  • Configure a virtual host
  • Configure private directories
  • Discuss windows and Linux Web Server Flavors
  • Discuss the steps to host a web site on the web server
  • Password on Website
  • Multiple Websites Hosting / Virtual Hosting
  • Enterprise solution of Web hosting

 

Mail Server:

An email server, or simply mail server, is an application or computer in a network whose sole purpose is to act as a virtual post office. The server stores incoming mail for distribution to local users and sends out outgoing messages. This uses a client-server application model to send and receive messages using Simple Mail Transfer Protocol (SMTP). An email server may also be known as a mail or message transfer agent.

  • Installation and configuration
  • Route
  • Configure a mail transfer agent (MTA) to accept inbound email from other systems
  • Configure an MTA to forward (relay) email through a smart host
  • Basic Sendmail Configuration
  • POP, SMTP, IMAP
  • Install Web mailer
  • Mail Forwarding
  • Postfix

 

Security:

  • Xinetd
  • PAM
  • TCP Wrappers
  • Firewall-d
  • Create Own Services Files against Firewall-d
  • Firewall-d Direct Rules
  • Firewall-d Rich Rules
  • Configure NAT using Firewall-d
  • Configure Port-Forwarding using Firewall-d

SECTION-1

Introduction to Linux:

  • What is Linux
  • Linux History
  • Linux use in global world
  • Difference between Windows, Linux and Unix
  • Linux Distributions
  • File System and Swap

 

Selection of Hardware:

  • Ram
  • Hard disk
  • CPU
  • Motherboard

 

Installation planning:

  • Hard disk size
  • Hard disk Type

 

Linux Installation:

  • Installation with Bootable Device / DVD
  • Installation by Kikstart Method

 

SECTION-2

Linux Structure:

  • Linux directory structure
  • Linux Partition Name
  • Boot loader
  • Kernel
  • File Systems
  • Shell
  • Difference between Redhat 6 and Redhat 7/8

 

Linux Commands:

  • Basic Commands
  • Linux Shells
  • Administrative commands
  • Boot, reboot, and shut down the system normally

 

Input / Output Redirectors:

  • >
  • >>
  • 2>
  • &>
  • 2>

 

Getting Help in Red Hat Enterprise Linux

  • Learn “man” Terminology
  • Learn Find Syntax and how to use Find
  • Become Aware of the importance of less-noticed man section

 

User Management:

  • Create, Delete and Modify Users
  • Policies Implement on users
  • Password Implement
  • Password Aging, User login shell, User Home Directory, User Expiry

 

Group Management:

  • Create, Delete and Modify Groups
  • Put the Users on Primary and Secondary Groups
  • Policies implement on Groups

 

Permissions:

  • Local Permissions
  • Admin Permissions
  • Sudo
  • Special Permission
  • Ownership
  • Attributes
  • Permission on Groups
  • List, Interpret, Change ugo / rwx

 

SECTION-3

Backup Management:

  • System Backup
  • Backup compression and decompression
  • Backup with date and time
  • Backup and Restore

 

Network Configuration:

  • Types of Interfaces
  • NIC Management
  • Old Naming Scheme of Interfaces
  • Diagnose and correct misconfigured networking settings
  • Diagnose and correct hostname resolution problems
  • Use SSH and VNC to access remote systems

 

Software Management:

  • Install and Remove the Software with RPM
  • Management with the YUM Technology
  • Repositories Concepts
  • Repositories Management
  • Create Local YUM Repository

 

Cron Job Management:

  • Automation
  • Scheduling the Programs and tasks
  • Backdoor Jobs execute and modify

 

Security Management:

  • Linux Process Management
  • ACL
  • Boot Process
  • Grub Password
  • Run Levels
  • Password Break and Grub Password
  • Use single-user mode to gain access to a system if Root Password Forgot
  • Boot systems into different run levels for troubleshooting
  • Trouble Shoot of Linux with Linux Rescue
  • Selinux Introduction
  • Modes of Selinux
  • Selinux Bolions
  • Selinux Context
  • Selinux Errors
  • Firewall-d Configuration
  • Firewall-d Services addition
  • Securely Transfer Files Between Machines

 

Virtualization:

  • Types of Hypervisors
  • Add Module of Virtualization in Linux
  • Installation of KVM
  • Access KVM from GUI as well as from CMD

 

Shortcuts:

  • Difference between Soft and Hard Link
  • Soft Link
  • Hard Link

 

Process Management:

  • Usable commands
  • Configure and Understand Netdata
  • Configure and Understand Monit
  • Process Priority
  • Logs

 

Disk Management:

  • Partition Tables
  • Standard Partition
  • LVM
  • Create and Resize PV,VG,LV
  • Disk Quota
  • Partition Table
  • Install bootloader and modify the system bootloader
  • Understand MBR-Style Partitions (Primary, Extended, Logical) list/create/delete partitions

 

LDAP Authentication:

  • Understand LDAP Authentication
  • Understand and Installation of Free IPA
  • Configure Client for Free IPA

AWS DevOps Associate

Module 1: Cloud Computing Fundamentals

  •  Introduction to Cloud Computing
  • Why Cloud Computing? 
  • Benefits of Cloud Computing 
  • Cloud Computing Deployment Models: –
  • Public Cloud
  • Private Cloud
  • Hybrid Cloud
  • Community Cloud
  • Cloud Computing Service Models: –
  • Infrastructure as a Service
  • Software as a Service
  • Platform as a Service
  • Cloud Computing Issues / Challenges
  • Security & Costing Model

 

Module 2: Amazon Web Services (AWS) Cloud

  • Introduction to AWS
  • AWS Marketplace / Why AWS?
  • History of AWS
  • AWS Global Infrastructure
  • Availability Zones
  • Regions
  • AWS Local Zones
  • Edge Locations
  • Factors Impacting Region Selection
  • Signing up for AWS
  • AWS Free usage tier
  • Introduction to AWS management console

 

Module 3: Identity Access Management (IAM)

  • Creating Users and Groups
  • IAM policies
  • IAM Roles
  • Methods to Access AWS resources (CLI, AWS Management Console, SDK)
  • AWS Command Line Interface (CLI) setup
  • AWS Cloud Shell

 

Module 4: Virtualization

  • Virtualization and cloud computing
  • Types of virtualization
  • Virtualization terminologies Hypervisor
  • Benefits
  • Vendors

 

Module 5: Compute Services

  • Evolution of AWS Compute EC2 Basics, Sizing & Configuration Options
  • Launching your first EC2 instance (with Apache Server) User Data Script
  • Security Groups
  • Understanding AMI
  • EC2 Instance Types
  • Public IP vs Private IP vs Elastic IP
  • AWS marketplace
  • EC2 Pricing Options
  • Amazon Machine Images (AMIs)
  • EC2 Placement Groups
  • Elastic Network Interfaces (ENIs)
  • EC2 Hibernate

 

Module 6: Storage Services

  • Cloud Storage Overview
  • Elastic Block Storage (EBS)
  • EBS Snapshots / Multi-Attach
  • EC2 Instance Store
  • Elastic File System (EFS)
  • Simple Storage Service (S3) S3 Overview / Components
  • S3 Security

 

Module 7: Load Balancing & Auto Scaling

  • Scalability vs Elasticity vs Agility
  • ELB (Elastic Load Balancer) – Concept & Components
  • Types of load balancers: –
  • Application Load Balancer
  • Network Load Balancer
  • Gateway Load Balancer
  • Autoscaling – Concept
  • Autoscaling with Load Balancer
  • Autoscaling policies

 

Module 8: Advanced S3

  • S3 Static Website Hosting
  • S3 Versioning
  • Storage Classes
  • Cross Region Replication
  • S3 Lifecycle Policies
  • S3 Encryption
  • S3 Event Notifications
  • S3 Cross Origin Resource Sharing (CORS)
  • S3 Multi-Part upload
  • S3 Transfer Acceleration
  • AWS Snow Family

 

Module 9: Route53

  • DNS Terminologies
  • Basic DNS Work Flow
  • Amazon Route53 Hosted Zones
  • Public Hosted Zone
  • Private Hosted Zone
  • Routing Policies:
  • Simple
  • Weighted
  • Failover
  • Latency Based
  • Geo-Location
  • Multi-value answer
  • Geo-proximity
  • Route53 as Domain Registrar and DNS provider for static Website hosting using S3

 

Module 10: Networking Services

  • Introduction to Amazon Virtual Private Cloud (VPC)
  • VPC Advantages
  • Default and Non-default VPC
  • Components of VPC (Subnets, Route Tables, Internet Gateway)
  • Bastion Host
  • NAT Gateway
  • VPC Peering
  • Hybrid Networking (Direct Connect & Site to Site VPN)

 

Module 11: Database Services

  • Databases Overview (Relational vs Non-relational)
  • Factors for choosing the right database
  • Amazon Relational Database Service (RDS)
  • RDS Read-Replicas
  • RDS Multi-AZ
  • Different database services of AWS: Amazon Aurora, Dynamo DB, Redshift etc.
  • Amazon ElastiCache

 

Module 12: Cloud Front

  • Cloud Front – Overview / Use
  • Edge Locations & Regional Edge Caches
  • CloudFront Components
  • CloudFront Geo Restrictions Creating a cloud front distribution
  • CloudFront vs S3 Cross Region Replication

 

Module 13: Dockers / Kubernetes in AWS (ECS, ECR, EKS & Fargate)

  • Introduction to Dockers & Microservices
  • Amazon Elastic Container Service (ECS)
  • ECS Cluster
  • ECS Service
  • Auto Scaling
  • Rolling Updates
  • Task Definitions
  • Elastic Container Registry ( ECR )
  • Amazon EKS

 

Module 14: AWS Elastic Beanstalk

  • Elastic Beanstalk Overview
  • Deployment Modes
  • Beanstalk Lifecycle policy

 

Module 15: AWS CloudFormation

  • Infrastructure as a Code
  • CloudFormation – Overview Benefits of AWS CloudFormation
  • CloudFormation Resources / Intrinsic Functions
  • Stacks, ChangeSets, Nested Stacks & StackSet
  • Stack Policies
  • Mock Exercise: Write infrastructure as code using AWS CloudFormation

 

Module 16: AWS CICD

  • Introduction to CICD in AWS
  • Technology Stack for CICD
  • CodeCommit
  • CodePipeline
  • CodeBuild
  • CodeDeploy
  • Mock Exercises:-
  • Create CI/CD pipelines using AWS CodePipeline to automate your deployments to Amazon EC2, ECS and S3
  • Build your Docker images with CodeBuild and deploy them to ECS as rolling deployments with CodePipeline
  • Use AWS CloudFormation with AWS CodePipeline to create and delete stacks automatically in each execution.
  • Deploying an application using Elastic Beanstalk and AWS CICD tools with full automation

 

Module 17: AWS Monitoring & Audit

  • AWS CloudWatch
  • Amazon EventBridge
  • CloudTrail

 

Module 18: AWS Integration & Messaging

  • Amazon SQS
  • Amazon SNS
  • Kinesis

 

Module 19: AWS Serverless

  • AWS Lambda
  • API Gateway
  • Cognito
  • Step Functions
  • AppSync

 

Module 20: AWS Security Management

  • Security Practices for Cloud Deployment
  • AWS Responsibilities and Securities
  • KMS
  • SSM Parameter Store
  • Amazon Certificate Manager (ACM)