Post Graduate Certificate in Hardware & Networking
– You will be shipped SecurityBox Pentester Stick FREE OF COST to your doorstep.
Course Modules
Module 1. CIU Certified Network Associate
Module 2. CIU Certified Network Professional
Module 3. CIU Certified Network Engineer
The sooner the undergoing student completes all three modules successfully, the student will be awarded “Post Graduate Certificate in Hardware and Networking”
CIU Certified Network Associate
Modules | Chapters |
---|---|
Introduction | What is Network |
Overview of Network | |
Basic Networking | Network Requirements |
Network Models | |
Physical Topologies | |
Logical Topologies | |
Network Categories | |
Network Connectivity | Network Addressing |
Segments vs Subnets | |
Data Transmission | |
Types of Connections | |
Reliable Delivery | |
The OSI Model | Upper Layers |
Lower Layers | |
Network Media | IPX/SPX |
NetBEUI | |
AppleTalk | |
TCP/IP – I | |
TCP/IP – II | |
The TCP/IP Suite | Introduction |
IP Addressing – I | |
IP Addressing – II | |
IP Address Assignment – I | |
IP Address Assignment – II | |
NetBIOS Name Resolution | |
SNMP | |
Command Line Utilities – I | |
Command Line Utilities – II | |
Protocols – I | |
Protocols – II | |
Network Appliances | Introduction |
Classifying IP Addresses | |
Non-Classful Addressing | |
Hubs & Repeaters | |
Switches | |
Routers | |
Routing Protocols | |
NAT | |
Proxies | |
VLAN | |
Wireless Networking | Introduction |
Radio Frequency Networking | |
RF Standards | |
RF Modes | |
Security | |
Reliability | |
Infrared | |
Bluetooth | |
WAN Technologies | Introduction |
Virtual Circuits | |
Cell Switching vs Packet Switching | |
ISDN | |
FDDI | |
T1/T3 | |
POTS | |
DSL vs Cable Internet | |
Wireless | |
Remote Access | RAS |
VPN | |
PPP vs SLIP | |
PPTP vs L2TP | |
RDP | |
Security | Aspects of Security |
PAP vs CHAP | |
DES vs 3DES | |
Kerberos | |
IPSEC | |
Certificate Servers | |
Public Key Encryption | |
SSL | |
Network Operating Systems | Introduction |
Linux | |
Mac OS X | |
Novel Netware | |
Microsoft Windows | |
Network Storage | File Severs |
Storage Area Neworks | |
NAS | |
Permissions | |
Fault Tolerance | UPS vs Surge Protector |
Network Fault Tolerance | |
Clustering | |
RAID | |
Backup & Restore | Backup & Restore |
Good Practices | |
Hot, Warm & Cold Sites | |
Troubleshooting | Methodology |
Hardware Tools | |
Software Tools | |
Using the OSI Model |
Sun Solaris Administration SyllabusÂ
Modules | Chapters |
---|---|
Introduction | Introduction to Sun Solaris |
The Sun Microsystems Certifications | |
Sun Certification Exams for Solaris | |
Taking the Exams | |
Overview of Sun Solaris | An Overview of Solaris Operating System |
An Overview of Sun Hardware | |
A Brief History of Solaris | |
Preparing for Installation | Installing from CD/DVD and What You Need |
Terminology and System Requirements | |
Installation Types and Methods | |
Installation Disk Layout Planning | |
Installation of Solaris | Beginning Installation Emergency Booting |
Text Console Installation I | |
Text Console Installation II | |
Text Console Installation III | |
Upgrading Solaris | |
Packages and Patches | An Overview of Packages |
Installing a Package | |
Viewing Installed Packages | |
Checking Packages | |
Removing Installed Packages | |
An Overview of Patches | |
Adding a Patch | |
Checking for Installed Patches | |
Removing a Patch | |
Booting a SPARC System | |
The SPARC Boot Process | An Overview of the OpenBoot PROM |
The OpenBoot PROM Commands | |
Working with NVRAM Variables | |
OpenBoot Devices and Device Aliases | |
Booting and Shutting Down the System | |
Resetting a Hung System | |
System Diagnostics | |
OpenBoot PROM Security | |
System Run Levels | |
The Run Control Scripts | |
Managing System Processes | An Overview of Solaris Management Tools |
The Role of Processes and Process Types | |
Graphical Tools for Viewing Processes | |
Command Line Tools for Viewing Processes | |
Deciphering the Process Command Output | |
Vulnerability Assessment | Controlling Processes with Signals |
Process Scheduling and Schedulers | |
Priorities Using nice and priocntl | |
Scheduled Jobs and Beginning cron | |
Editing a crontab | |
Cron and at Access Control | |
Using the at command | |
Managing File Systems | File Systems Explained |
Disks/ Drivers/ and Device Names | |
Disk Geometry and File Systems Overview | |
Partitioning Using format | |
Creating UFS File Systems | |
Checking and Repairing a UFS File System | |
The Default Solaris File System Layout | |
Mounting and Unmounting File Systems | |
File System Links | |
Viewing Disk Usage Information | |
Working with Floppy Disks and CD-ROMs | |
User and Security Administration | About User Accounts and Groups |
Working with User Accounts and Groups | |
Shell Initialization Files | |
System Access Control | |
File Access Control Through Permissions | |
su/ Special Permissions/ and File Types | |
Basic User Auditing | |
Managing Network Printers | Printing in Solaris |
Configuring a Printer | |
Printer Classes and Client Defaults | |
Performing System Backups and Restores | Solaris Backup and Restore Utilities |
Solaris Type Device | |
Using tar for Backup and Restore | |
Using dd | |
Backup Procedures and ufsdump | |
File System Snapshots with fssnap | |
Backing Up with ufsdump | |
Restoring with ufsrestore |
CISCO WAN Technologies SyllabusÂ
Modules | Chapters |
---|---|
Introduction | Overview – I |
Overview – II | |
The OSI Model | Development & Reason for Model |
Overview of Layered Architecture | |
The Application Layer | |
The Presentation Layer | |
The Session Layer | |
The Transport Layer | |
The Network Layer | |
The Data Link Layer | |
The Physical Layer | |
Collision vs Broadcast Domains | Ethernet & CSMA/CD |
Collision Domains | |
Broadcast Domains | |
Hubs/Bridges/Switches | Hubs |
Bridges | |
Switches | |
The Spanning Tree Protocol (STP) | Purpose of STP |
Election of a Root Bridge | |
Bridge Protocol Data Units & Port States | |
Local Area Network Protocols | The TCP/IP Protocol Suite |
Packet Terminology | |
IP Address Classes | |
IP Addressing | |
Subnet Masks & Anding | |
Custom Length Subnet Masks | |
Subnetting | |
Configuring IP Addresses on a Router | |
IPX Addresses | |
Encapsulation of Packets | |
The Concept of a VLAN | |
Wide Area Network Protocols | The Concept of Frame Relay |
Configuring Frame Relay | |
ISDN Defined | |
ISDN Reference Points | |
Dial on Demand Routing | |
PPP Defined | |
PPP with CHAP Authentication | |
HDLC Encapsulation | |
Routing | Routing Defined |
Configuring Static Routes | |
Routing Information Protocol | |
Internet Gateway Routing Protocol | |
Enhanced Internet Gateway Routing Protocol | |
Link State Routing Protocols | |
Distance Vector vs Link State | |
Configuring RIP | |
Configuring IGRP | |
The Concepts of NAT & PAT | |
The CDP Protocol | CDP Protocol Commands |
Discovering Your Topology with CDP | |
LAN Design | Full Duplex vs Half Duplex |
Understanding CSMA/CD | |
Ethernet/Fast Ethernet/Gigabit Ethernet | |
The Cisco IOS | Overview of the Cisco IOS |
Boot System Configurations | |
Interpreting the IOS Image File | |
Backing Up the IOS Image | |
The Cisco Command Line | Command Line Modes |
Initial Setup & Configuration | |
Passwords Console & Secret | |
Passwords Virtual Terminal | |
Naming & Adding a Banner | |
Context Sensitive Help & History | |
Network Mgmt Commands | Network Management Overview |
Show Commands | |
Debugging Commands | |
Interface Configuration | |
Access Lists | The Concept of an Access List |
How Access Lists are Used | |
Setting Up a Standard Access List | |
Setting up an Extended Access List | |
Telnet | The Concept of Telnet |
Telnet for Remote Administration |
Real customer reviews