OVERVIEW : This course will provide 100 % Assured Job in top company (LIKE WIPRO,HCL,INFOSYS,CTS  ..,) as a System Engineer .This course designed include 4 international certification (A+,N+,MCITP,CCNA ) and also Ethical Hacking

 OBJECTIVES: Computer assembling, managing ans maintenance hardware and operating system, configuring outlook and printer, network cabling, configuring ADS, DNS, DHCP, WDS, subnetting and routing, trouble shooting BSOD, LAN issue, booting issue, OS issue, Internet issue,   server and also router issue.

 TARGET AUDIENCE: job seeker

BRIDGE CERTIFIED IT INFRASTRUCTURE SECURITY MANAGEMENT(BC-IT-ISM)

 

Module 1 : A+

  • Identify fundamental components and functions of personal computer operating systems.
  • Identify best practices followed by professional personal computer technicians.
  • Install and configure computer components.
  • Install and configure system components.
  • Maintain and troubleshoot peripheral components.
  • Troubleshoot system components.
  • Install and configure operating systems.
  • Maintain and troubleshoot installations of Microsoft Windows.

 

 

 

Module 2 : N+

  • Describe bounded network media.
  • Describe unbounded network media.
  • Identify the major types of network implementations.
  • Identify TCP/IP addressing and data delivery methods.
  • Analyze routing and switching technologies.
  • Identify the components of a TCP/IP implementation.
  • Analyze network security.
  • Implement network security.
  • Identify the components of a WAN implementation.
  • Identify the components used in cloud computing and virtualization.
  • Identify the components of a remote network implementation.
  • Manage networks.
  • Troubleshoot network issues
  • Maintain and troubleshoot installations of Microsoft Windows.

 

Module 3 : SERVER 2008

  • explain Windows Server 2008 and Active Directory problems
  • install Windows Server 2008 and Active Directory
  • complete system configuration
  • create user accounts, perform administrative duties
  • add computers and groups using the Active Directory system
  • manage users, groups and computers in a network
  • manage access to shared network resources and individual users
  • secure the computer from network attacks, create a Fire Wall and make a backup copy.
  • DNS configuration with forward lookup zone and reverse lookup zone.
  • DHCP working principle , DORA process, add rules
  • Creating scope, ip reservation.
  • Windows Deployment Services, working of WDS deployment of WDS?

 

Module 4 : CCNA

  • Router introduction.
  • Subnetting: CIDR, Network method, Host method, New subnet mask method.
  • Routing protocol: static routing protocol, dynamic routing protocol.
  • Distance vector routing protocol RIP, IGRP, EIGRP, OSPF.
  • Router security , mode password and interface password.
  • Remote accessing router by telnet protocol.
  • Frame relay configuration.
  • Switch configuration, virtual local area network (VLAN).
  • Access control list, standard ACL, extended ACL, named ACL.
  • Integrated service digital network, dialup configuration.
  • Encapsulation ,PAP, CHAP.

 

 

Module 5 : Ethical hacking 

  • Types of hackers white, black, gray hat hackers.
  • How HTTP and HTTPS works different request methods.
  • HTTP request /response examples spyware, malware, adware, Trojan horse, rootkit,botware
  • Types of Password Attacks,Offline cracking,Dictionary attack,Brute force attack,
  • Phishing,Social engineering,Malware.
  • Cryptography, finger print reader, port lock.
  • Wireless network attack, social engineering attack.