This Course is for those who are interested in Network Administration
In this Hi-tech age, huge networks play a very vital role. The need to understand the prevalent networking technologies is therefore essential for any IT professional. This course caters to the existing and ever evolving requirements of the IT Industry. In simple words, this course helps you to understand networking technologies in a very sound manner. This Course caters to the needs of small to large industry like Telecom,Banks,Insurance,etc which usualy are having the requirement to administer their LAN and WAN Networks.
About this Course
Network Engineering(NE) training program is composed of several key core courses and electives which gears you towards your chosen goal. NE is designed to provide you with a course content offered by Microsoft and Cisco added with a lot of notable enhancements. Together with subject matter which is theoretical in nature the essential practical sessions are the highlights of this industry centric course. It is general enough to give a broad overview of today’s technologies and trends, while detailed enough for you to see the inner workings of modern networking. Successful completion of Logic’s Network Engineering program would mean an assured career since you would be equipped for taking certifications such as MCSE, CCNA, CCNP.
Importance of Network Engineering Program
As a Computer Professional, you undoubtedly recognize that there is no substitute for adequate training. In our discussion with several Network Administrators, we were amazed to note that there was a certain lack on in-depth knowledge that existed within the networking domain. Most LAN, WAN and Firewall personnel have had to train themselves for the most part, pulling themselves up by the boot straps, foraging through large manuals to fight the everyday fires. Many have not had the opportunity of intensive training, and this leads to a certain gap in knowledge. On Completion of the Network Engineering program you would have attained a certain level of competence, enabling you to successfully pursue a career in networking. In short we want you to step on our shoulders to reach great heights of success.
Network Engineering Prerequisites & Course Objectives
We recommend this course for B.Tech, MCA, M.Sc, Degree and Diploma holders. This course will provide training on a host of networking topics. At Logic, we strive to make every student who has successfully completed the training capable of handling the following areas :-
Module-I : Personal Computer Technology and Assembling a PC
The Importance of Skill in Managing and Troubleshooting PCs, How the PC Works – Input, Processing, Output, Storage, The Complete PC – External Connections, Devices and Their Connectors, System Case, CPU, RAM, Motherboard, Power Supply, Floppy Drive, Hard Drive, Optical Media, Microprocessors – CPU Core Components ( CU, ALU, Cache, Registers, Clock, External Data Bus), Memory ( Memory and RAM, Address Bus), Random Access Memory (RAM) – Understanding DRAM (Organizing DRAM, Practical DRAM, DRAM Sticks), Types of RAM (SDRAM, RDRAM, DDR SDRAM, DDR2 & DDR3), BIOS & CMOS – Power-On Self-Test ( The Beep Codes, Text Errors), The Boot Process, Clearing CMOS, Flashing ROM, Expansion BUS – Structure and Function of the Expansion Bus (PC Bus, ISA, PCI), System Resources (I/O Addresses, IRQ, Direct Memory Access, Memory Addresses), Motherboard – How Motherboards Work, Form Factors (AT/ATX), Chipset, Motherboard Components, Diff. types of Ports, Power Sup plies – SMPS Components and wire arrangements, UPS, Hard Drive Technologies – HDD Components, PATA, SATA, SCSI, Intro . RAID, Removable Media and Assembling / De assembling the PC
Module-II : Installing, Up grading, Maintaining and Troubleshooting the Operating System
Functions of the Operating System – Operating System Traits, Communicating with Hardware, Creating a User Interface, Accessing and Supporting Programs, Organizing and Manipulating Programs and Data, Today’s Operating Systems, Installing/Upgrading Windows – Preparing for Installation or Upgrade, Performing the Installation or Upgrade, Post-Installation Tasks, Troubleshooting Installation Problems – Text Mode Errors, Graphical Mode Errors, Lockups during Install, Post Installation errors, Maintaining and Troubleshooting Windows – Maintaining Windows ( Patches, Updates, and Service Packs, Managing User Accounts and Groups, Error-Checking and Disk Defragmentation, Temporary File Management with Disk Cleanup, Registry Maintenance, Security: Spyware/Anti-Virus/Firewall, Optimizing Windows – Installing and Removing Software, Installing/Optimizing a Device, Resource Tracking, Troubleshooting Windows, Failure to Boot, Failure to Load the GUI, Troubleshooting Tools in the GUI
Module III:- Configuring Windows 8(Exam:70-687)
Installing Windows 8 :-Introducing Windows 8,Preparing to Install Windows 8,Installing Windows 8,Automating the Installation of Windows 8,Activating Windows 8. Managing Disks and Device Drivers-Managing Disks, Partitions, and Volumes,Maintaining Disks, Partitions, and Volumes,Working with Virtual Hard Disks,Installing and Configuring Device Drivers. Implementing Network Security-Overview of Threats to Network Security,Configuring Windows Firewall,Securing Network Traffic,Configuring Windows Defender.Securing Windows 8 Desktops-Securing Data with EFS and BitLocker,Configuring User Account Control. Optimizing and Maintaining Windows 8 Client Computers-Optimizing the Performance of Windows 8,Managing the Reliability of Windows 8,Managing Windows 8 Updates. Configuring Mobile Computing and Remote Access-Configuring Remote Desktop and Remote Assistance. Implementing Hyper-V-Overview of Hyper-V. Troubleshooting and Recovering Windows 8-Backing Up and Restoring Files in Windows 8,Recovery Options in Windows 8
Module IV:- Installing and Configuring Windows Server 2012 (Exam:70-410)
Deploying and Managing Windows Server 2012-Windows Server 2012 Overview,Overview of Windows Server 2012 Management,Installing Windows Server 2012,Post-Installation Configuration of Windows Server 2012.Introduction to Active Directory Domain Services –Overview of AD DS,Overview of Domain Controllers. Managing Active Directory Domain Services Objects-Managing User Accounts ,Managing Group Accounts ,Managing Computer Accounts,Delegating Administration. Automating Active Directory Domain Services Administration-Using Command-line Tools for AD DS Administration,Using Windows PowerShell for AD DS Administration,Performing Bulk Operations with Windows PowerShell. Implementing IPv4-Overview of TCP/IP,Understanding IPv4 Addressing,Subnetting and Supernetting,Configuring and Troubleshooting IPv4. Implementing Dynamic Host Configuration Protocol-Installing a DHCP Server Role ,Configuring DHCP Scopes,Managing a DHCP Database,Securing and Monitoring DHCP. Implementing Domain Name System-Name Resolution for Windows Client and Servers,Installing and Managing a DNS Server,Managing DNS Zones. Implementing IPv6-Overview of IPv6,IPv6 Addressing, Coexistence with IPv6,IPv6 Transition Technologies. Implementing Local Storage-Overview of Storage,Managing Disks and Volumes,Implementing Storage Spaces. Implementing File and Print Services-Securing Files and Folders,Protecting Shared Files and Folders by Using Shadow Copies,Configuring Network Printing. Implementing Group Policy-Overview of Group Policy,Group Policy Processing,Implementing a Central Store for Administrative Templates. Securing Windows Servers Using Group Policy Objects-Windows Operating Systems Security Overview,Configuring Security Settings,Restricting Software,Configuring Windows Firewall with Advanced Security.Implementing Server Virtualization with Hyper-V-Overview of Virtualization Technologies ,Implementing Hyper-V,Managing Virtual Machine Storage,Managing Virtual Networks
Module V:- Administering Windows Server 2012( Exam : 70-411)
Deploying and Maintaining Server Images-Overview of Windows Deployment Services,Implementing Deployment with Windows Deployment Services. Configuring and Troubleshooting Domain Name System-Installing the DNS Server Role,Configuring the DNS Server Role,Configuring DNS Zones,Configuring DNS Zone Transfers,Managing and Troubleshooting DNS.Maintaining Active Directory Domain Services-Overview of AD DS,Implementing Virtualized Domain Controllers,Implementing RODC,Administering AD DS,Managing the AD DS Database. Managing User and Service Accounts-Automating User Account Management,Configuring Password-Policy and User-Account Lockout Settings, Configuring Managed Service Accounts. Implementing a Group Policy Infrastructure-Introducing Group Policy,Implementing and Administering Group Policy Objects (GPOs),Group Policy Scope and Group Policy Processing,Troubleshooting the Application of GPOs.Managing User Desktops with Group Policy-Implementing Administrative Templates,Configuring Folder Redirection and Scripts,Configuring Group Policy Preferences,Managing Software with Group Policy- Configuring and Troubleshooting Remote Access-Configuring Network Access,Configuring Virtual Private Network (VPN) Access,Overview of Network Policies, Troubleshooting Routing and Remote Access,Configuring DirectAccess. Installing, Configuring, and Troubleshooting the Network Policy Server Role-Installing and Configuring a NPS,Configuring Remote Authentication Dial-In User Service (RADIUS) Clients and Servers,NPS Authentication Methods,Monitoring and Troubleshooting a NPS. Implementing Network Access Protection-Overview of Network Access Protection,Overview of NAP Enforcement Processes,Configuring NAP,Monitoring and Troubleshooting NAP. Optimizing File Services-Overview of FSRM,Using FSRM to Manage Quotas, File Screens, and Storage Reports,Implementing Classification and File Management Tasks,Overview of Distributed File System (DFS),Configuring DFS Namespaces,Configuring and Troubleshooting Distributed File System Replication (DFS-R). Configuring Encryption and Advanced Auditing-Encrypting Files by Using Encrypting File System,Configuring Advanced Auditing. Implementing Update Management-Overview of WSUS,Deploying Updates with WSUS. Monitoring Windows Server 2012-Monitoring Tools,Using Performance Monitor,Monitoring Event Logs.
Module VI:- Configuring Advanced Windows Server 2012 Services( Exam: 70-412)
Implementing Advanced Network Services-Configuring Advanced DHCP Features,Configuring Advanced DNS Settings,Implementing IPAM. Implementing Advanced File Services-Configuring iSCSI Storage,Configuring BranchCache,Optimizing Storage Usage. Implementing Dynamic Access Control-Overview of Dynamic Access Control,Planning for Dynamic Access Control,Deploying Dynamic Access Control. Implementing Distributed Active Directory Domain Services Deployments –Overview of Distributed AD DS Deployments,Deploying a Distributed AD DS Environment,Configuring AD DS Trusts. Implementing Active Directory Domain Services Sites and Replication-Overview of AD DS Replication,Configuring AD DS Sites,Configuring and Monitoring AD DS Replication. Implementing Active Directory Certificate Services –PKI Overview,Deploying CAs,Deploying and Configuring CA Hierarchy,Deploying and Managing Certificate Templates,Implementing Certificate Distribution and Revocation,Managing Certificate Recovery. Implementing Active Directory Rights Management Services-AD RMS Overview,Deploying and Managing an AD RMS Infrastructure,Configuring AD RMS Content Protection, Configuring External Access to AD RMS. Implementing Active Directory Federation Services-Overview of AD FS,Deploying AD FS,Implementing AD FS for a Single Organization,Deploying AD FS in a B2B Federation Scenario.Implementing Network Load Balancing-Overview of NLB,Configuring an NLB Cluster,Planning an NLB Implementation. Implementing Failover Clustering-Overview of Failover Clustering,Implementing a Failover Cluster,Configuring Highly Available Applications and Services on a Failover Cluster,Maintaining a Failover Cluster,Implementing a Multi-Site Failover Cluster. Implementing Failover Clustering with Hyper-V-Overview of Integrating Hyper-V with Failover Clustering,Implementing Hyper-V Virtual Machines on Failover Clusters, Implementing Hyper-V Virtual Machine Movement,Managing Hyper-V Virtual Environments by Using VMM. Implementing Disaster Recovery-Overview of Disaster Recovery,Implementing Windows Server Backup,Implementing Server and Data Recovery
Module VII:- Designing and Implementing a Server Infrastructure(Exam: 70-413))
Planning Server Upgrade and Migration-Upgrade and Migration Considerations,Creating a Server Upgrade and Migration Plan,Planning for Virtualization. Planning and Implementing a Server Deployment Infrastructure-Selecting an Appropriate Server Imaging Strategy,Selecting a Deployment Automation Strategy,Implementing an Automated Deployment Strategy. Designing and Maintaining an IP Configuration and Address Management Solution-Designing and Implementing DHCP,Planning and Implementing DHCP Scopes,Planning and Implementing an IPAM Provisioning Strategy.Designing and Implementing Name Resolution-Designing a DNS Server Implementation Strategy,Designing the DNS Namespace,Designing and Implementing DNS Zones,Designing and Configuring DNS Zone Replication and Delegation,Optimizing DNS Servers,Designing DNS for High Availability and Security. Designing and Implementing an Active Directory Domain Services Forest and Domain Infrastructure-Designing an AD DS Forest,Designing and Implementing AD DS Forest Trusts,Designing and Implementing AD DS Domains,Designing DNS Namespaces in AD DS Environments,Designing AD DS Domain Trusts.Designing and Implementing an OU Infrastructure and AD DS Permissions Model-Planning the AD DS Administrative Tasks Delegation Model,Designing the OU Structure,Designing and Implementing an AD DS Group Strategy. Designing and Implementing a Group Policy Object Strategy-Gathering the Information Required for a GPO Design,Designing and Implementing GPOs,Designing GPO Processing, Planning Group Policy Management. Designing and Implementing an AD DS Physical Topology-Designing and Implementing AD DS Sites,Designing AD DS Replication,Designing the Placement of Domain Controllers, Virtualization Considerations for Domain Controllers,Designing Highly-Available Domain Controllers. Planning and Implementing Storage-Storage Considerations,Planning and Implementing iSCSI SANs. Planning and Implementing File Services-Planning and Implementing a Distributed File System,Planning and Implementing BranchCache,Planning and Implementing Dynamic Access Control. Designing and Implementing Network Access Services-Designing and Implementing Remote Access Services,Designing RADIUS Authentication by Using a Network Policy Server,Designing a Perimeter Network,Planning and Implementing DirectAccess. Designing and Implementing Network ProtectionThis module explains how to design and implement network protection.Lessons –Overview of Network Security Design,Identifying and Mitigating Common Network Security Threats,Designing and Implementing a Windows Firewall Strategy,Designing and Implementing a Network Access Protection Infrastructure.
ModuleVIII:- Implementing an Advanced Server Infrastructure(Exam:70-414)
Planning and Implementing a Server Virtualization Strategy-Overview of System Center 2012 Components,Integrating System Center 2012 and Server Virtualization,Planning and Implementing a Server Virtualization Host Environment. Planning and Implementing Networks and Storage for Virtualization-Planning a Storage Infrastructure for Virtualization,Implementing a Storage Infrastructure for Virtualization, Planning and Implementing a Network Infrastructure for Virtualization. Planning and Deploying Virtual Machines-Planning Virtual Machine Configuration,Preparing for Virtual Machine Deployments with VMM,Deploying Virtual Machines. Planning and Implementing a Virtualization Administration Solution-Planning and Implementing Microsoft System Center Administration,Planning and Implementing Self-Service with System Center,Planning and Implementing Automation with System Center. Planning and Implementing a Server Monitoring Strategy-Planning Monitoring in Windows Server 2012,Overview of System Center Operations Manager,Planning and Configuring Monitoring Components,Configuring Integration with VMM. Planning and Implementing High Availability for File Services and Applications-Planning and Implementing Storage Spaces,Planning and Implementing DFS,Planning and Implementing Network Load Balancing Planning and Implementing a Highly Available Infrastructure Using Failover Clustering-Planning a Failover Clustering Infrastructure,Implementing Failover Clustering,Integrating Failover Clustering with Server Virtualization,Planning a Multi-Site Failover Cluster. Planning and Implementing an Server Updates Infrastructure-Planning and Implementing a Windows Server UpdaTte Services (WSUS) Deployment,Planning Software Updates with System Center 2012 Configuration Manager,Planning and ITmplementing Updates in a Server Virtualization Infrastructure.Planning and Implementing a Business Continuity Strategy-Overview of Business Continuity Planning,Planning and Implementing Backup Strategies,Planning and Implementing Recovery,Planning and Implementing Virtual Machine Backup and Recovery. Planning and Implementing an Public Key Infrastructure-Planning and Implementing a Certification Authority Deployment,Planning and Implementing Certificate Templates, Planning and Implementing Certificate Distribution and Revocation,Planning and Implementing Key Archival and Recovery. Planning and Implementing an Identity Federation Infrastructure-Planning and Implementing an AD FS Server Infrastructure,Planning and Implementing AD FS Claim Providers and Relying Parties,Planning and Implementing AD FS Claims and Claim Rules. Planning and Implementing an Information Rights Management Infrastructure-Planning and Implementing an AD RMS Cluster,Planning and Implementing AD RMS TeMS Integration with Dynamic Access Control (DAC).
Module-IX : Redhat 7 Course
Linux powers supercomputers, most of the servers powering the Internet, the majority of financial trades worldwide and a billion Android devices. In short, Linux is everywhere. It appears in many different architectures, from mainframes to server to desktop to mobile and on a staggeringly wide variety of hardware. This course will teach you how to develop a good working knowledge of Linux using both the graphical interface and command line.
Introduction To Linux, System configurations and graphical interface of Linux,Basic command line operations,Users, Groups & Permissions ,Network Administrations, Managing Packages
Module-X : WAN & Enterprise Networking
Components, Booting, configuration of CISCO devices.(Routers & Switches), IP Routing Overview – Static Routing and path manipulation with Floating and Backup interface, Dynamic Routing – Distance Vector (RIP v1,v2, Loop avoidance), Link state (OSPF – Adjacencies, Network Types, Areas, Virtual-Links) and Cisco Proprietary Routing (EIGRP – Terminology, DUAL, and Exterior Gateway Protocol (BGP – Multi AS, Route Decision Process, Attributes, Peer Group, Multi-homing) along with Summarization, Authentication, Load balancing and fine tuning and Default Route Generation.
IPV6 Addressing (Address types, Routing Protocol versions, tunneling, Translation Mechanisms, Implementing the Network with IPv4 and IPv6 Domain, Network Security, Advanced Layer 3 Network Traffic Manipulation along with Routing Update Control and monitoring through Distribute List, Access-List, Route-map, Traditional and Emerging WAN technologies, Virtual Private Networks, Campus Network Design, Virtual Private Networks and Inter VLAN Routing Loop Avoidance Mechanisms, Multi layer switching Technologies, Implement security in switched Network, WLAN, Voice, Video support to LAN.
Module-XI : Configuring and Troubleshooting Enterprise Networks
Trouble shoot the Routing Related Issues.. EIGRP OSPF BGP.etc, Routing redistribution solutions, Gateway load Balancing Mechanisms and Troubleshooting, troubleshooting VLAN based configuration(trunk – ieee 802.1q and ISL, VACL, Private VLANS, PACL etc ), Link Aggregation using PAgP or LACP VTP, Spanning Tree Protocol (RSTP, PVSTP, MSTP), Inter VLAN Routing , SVI and Routed Ports, Configure and Verify UDLD and Loop Guard Gateway Redundancy Protocols (HSRP, VRRP, GLBP) , WLAN Access-Point Configuration, Centralized security mechanism for Network devices (AAA) and monitoring, Overall Network Monitoring and Logging Industry standard monitoring tools.
Free Networking Project Work on Windows Server 2012 & Routing and Switching
Fees: Fees can be paid in 12 Installments.For details Contact us.
For More Details Contact:
Ms. Angel /Mr. Akhil
9744166610 / 9947422200
No Reviews found for this course.
Placed As Network Engineer