Hardware & Networking

A +


Computer Hardware:

eMind Technologies Diploma in Hardware is one of the most demanded after references in the Information Technology industry for those who are excited to learn about Computer Hardware in depth.

Prerequisites:

Well experienced in English.
Duration of the course : Part Time : 4 Months (2 hrs/day) , Full Time : 2 Months (4 hrs/day).

Key benifits:

Diploma in Hardware is a well acknowledged validation of technical knowledge require for an entry-level computer service technician

Contents:

1. Operating system Technologies:

  • Introduction to Computers.
  • Introduction to Operating System (DOS).
  • Types of Software & languages.

2. Introduction to os booting sequence:

  • Configuration of display, sound card.
  • Assembling a computer.
  • Assembling & Installation.
  • Add on card identification.
  • PC Support (Core Hardware).
  • Installation of windows operation systems.
  • Resistors, capacitors and Inductors.
  • Diodes and transistors.
  • Comparison between AC and DC Current.
  • Conductors, Insulators and semiconductors.
  • Rectifiers and voltage Regulators.

3. Digital electronics:

  • Number System and conversion .
  • Basic logic gates (NOT, AND, OR).
  • Universal gates (NAND, NOR).
  • Flip flops (RS, D and JK).
  • Counters, Shift registers.
  • Multiplexer and De-multiplexer.
  • Introduction to Integrated Circuits.

4. Microprocessor and support chips:

  • Difference between 8085,8086 and 8088.
  • Data, Address and control bus.
  • Dumb and Smart chip.

5. Advanced Microprocessor:

  • Difference between PC-XT & PC-AT.
  • DProcessor speed ratings.
  • Study on Intel 80286, 80386, 80486.
  • Study on Pentium, MMX, Pentium Pro, Celeron, PII, PIII,P4, Xeon.
  • Study on Hyperthreading and Dual-Core Technology.
  • Pipelining and superscalar execution.
  • Study on Core I3, Core I5 and Core I7 Processor.
  • Difference between RISC and CISC.
  • Discussion on Overdrive processor.
  • Processor performance tests.
  • AMD- K5, K6, K7, Athlon, Duron, Cyrix- M II, Media GX.
  • Multiprocessor configuration.

6. Using system resources and memory:

  • Managing IRQ and I/O Base addresses.
  • Configuring DMA Channels.
  • Troubleshooting resource conflicts.
  • Memory management.
  • The system and logical Memory Layouts.
  • Adapter Memory Configuration and optimization.
  • Different Memory types.
  • Discussion on Cache Memory generic.

N +


Certificate in Networking course validates competency in networking administration and support.

This program covers the training in networking administration and support on different kinds of Operating Systems like Windows 2003/8, Linux, Windows 7 etc. It also provides you the knowledge of media and topologies, protocols and standards, Storage area Network and Network Security. The demand for skilled network support professionals has been growing significantly. The technology community identifies this course as the perfect entry point into a networking career. Upon completion of this course one can work as a Field support Technician, Network Support Technician, Network Administrator etc.

Duration of the course : Part Time : 2 Months (2 hrs/day), Full Time : 1 Months (4 hrs/day).

Key benifits:

By the end of the course, students will be identified and accepted as baseline of any entry-level Network Engineer.

Course outline:

Basic network theory:

  • Network Definitions.
  • Network Models.
  • Connectivity.
  • Network Addressing.
  • Signaling Conceptss.

NETWORK CONNECTIVITY:

  • The Data Package
  • Establishing a Connection
  • Reliable Delivery
  • Network Connectivity
  • Noise Control
  • Building Codes
  • Connection Devices

ADVANCED NETWORK THEORY:

  • The OSI Model
  • Ethernet
  • Network Resources
  • Token Ring/IEEE 802.5
  • FDDI
  • Wireless Networking

COMMON NETWORK PROTOCOLS:

  • Families of Protocols
  • NetBEUI
  • Bridges and Switches
  • The TCP/IP Protocol
  • Building a TCP/IP Network
  • The TCP/IP Suite

TCP/IP SERVICES:

  • Dynamic Host Configuration Protocol
  • DNS Name Resolution
  • NetBIOS Support
  • SNMP
  • TCP/IP Utilities
  • Upper Layer Services: FTP

ALTERNATE NETWORK PROTOCOLS:

  • Introduction to IPX/SPX
  • AppleTalk
  • Introduction to Apple Open Transport
  • Introduction to IPv6

Advanced Data Storage Techniques:

  • Enterprise Data Storage
  • Clustering
  • Network Attached Storage
  • Storage Area Networks.

Network Troubleshooting:

  • Using a Systematic Approach to Troubleshooting
  • Network Support Tools: Utilities
  • The Network Baseline.

Network Operating Systems:

  • Novell NetWare
  • Microsoft BackOffice
  • Linux History and Operation Macintosh.

NetWork Security:

  • Introduction to Network Security
  • Virus Protection
  • Local Security
  • Network Access
  • Internet Security.

Network LAN infrastructure:

  • Implement LAN Protocols on a Network
  • IP Routing
  • IP Routing Tables
  • Router Discovery Protocols
  • Data Movement in a Routed Network
  • Virtual LANs (VLANs).

NETWORK WAN INFRASTRUCTURE:

  • The WAN Environment
  • WAN Transmission Technologies
  • WAN Connectivity Devices
  • Voice Over Data Services.

REMOTE NETWORKING:

  • Remote Networking
  • Remote Access Protocols
  • VPN Technologies.

NETWORK SECURITY:

  • Introduction to Network Security
  • Virus Protection
  • Local Security
  • Network Access
  • Internet Security.

DISASTER RECOVERY:

  • The Need for Disaster Recovery
  • Disaster Recovery Plan
  • Data Backups
  • Fault Tolerance.

ADVANCED DATA STORAGE TECHNIQUES:

  • Enterprise Data Storage
  • Clustering
  • Network Attached Storage
  • Storage Area Networks.

NETWORK TROUBLESHOOTING:

  • Using a Systematic Approach to Troubleshooting
  • Network Support Tools: Utilities
  • The Network Baseline.

NETWORK OPERATING SYSTEMS:

  • Novell NetWare
  • Microsoft BackOffice
  • Linux History and Operation Macintosh.

Network LAN Infrastructure:

  • Implement LAN Protocols on a Network
  • IP Routing
  • IP Routing Tables
  • Router Discovery Protocols
  • Data Movement in a Routed Network
  • Virtual LANs (VLANs).

Network WAN Infrastructure:

  • The WAN Environment
  • WAN Transmission Technologies
  • WAN Connectivity Devices
  • Voice Over Data Services.

Remote Networking:

  • Remote Networking
  • Remote Access Protocols
  • VPN Technologies.

Disaster Recovery:

  • The Need for Disaster Recovery
  • Disaster Recovery Plan
  • Data Backups
  • Fault Tolerance.

STORAGE +


hardware&networking Storage+ is a vendor-neutral certification program validating the skills required of professionals working in the IT Storage industry. hardware&networking Storage+ Motorized by SNIA incorporates the global certification development and management capabilities of hardware&networking with the insight and technical leadership of the SNIA providing a references that is widely recognized as the standard for validating knowledge and skills necessary in data storage management.

hardware&networking Storage+ Powered by SNIA measures skills applicable in a variety of IT industry domains, including data storage and system administration, IT architecture, pre-sales consultancy, out-sourcing, system integrationnetwork engineering and cloud services data and system management.

Prerequisites:

A minimum of 12 months hands-on technical storage experience.The recommended pre-requisite to join hardware&networking Storage+ have prior knowledge of Computer Hardware, Networking and basic understanding of storage concepts.
Duration of the course : Part Time : 2 Months (2 hrs/day) , Full Time : 1 Months (4 hrs/day).

Course outline:

1. BASIC CONCEPTS:

  • Networks vs. Storage.
  • Capacity.
  • Network Links.
  • Storage.
  • Servers.
  • Network Devices.
  • DAS, NAS, SAN, FAN & Hybrids.
  • External vs. Internal SANs.
  • Blocks, Files & Objects Overview.
  • Storage.

2. STORAGE CONCEPTS:

  • Hard Disk Drive (HDD).
  • Solid State Drive (SSD).
  • Tape.
  • JBOD.
  • Storage Arrays.
  • LUN Presentation.
  • LUN Aggregation.
  • Dynamic LUN Expansion.
  • Thick & This Provisioning.
  • Persistent Binding.
  • RAID levels.
  • Combined RAID Levels.
  • MAID.

3. STORAGE Technologies:

  • SCSI Storage Overview.
  • P-SCSI.
  • SAS.
  • SATA.
  • Networks.

4. FIBER CHANNEL Technologies:

  • FC Overview.
  • FC Topologies.
  • FC Names & Addresses.
  • FC Names & Addresses NPIV.
  • FC Architecture.
  • FC Architecture Overview.
  • FC-0.
  • FC-1.
  • FC-2.
  • FC-Services.
  • FC-3.
  • FC-4 SCSI & IP.

5. FIBRE CHANNEL COMPONENTS:

  • FC Overview.
  • FC Topologies.
  • FC Names & Addresses.
  • FC Names & Addresses NPIV.
  • FC Architecture.
  • FC Architecture Overview.
  • FC-0.
  • FC-1.
  • FC-2.
  • FC-Services.
  • FC-3.
  • FC-4 SCSI & IP.

6. IP STORAGE & I SCSI Technologies:

  • Storage Networking & IP.
  • IP over FC (IPFC).
  • Internet Fibre Channel Protocol (iFCP).
  • Metropolitan Fibre Channel Protocol (mFCP).
  • Fibre Channel over IP (FCIP).
  • Internet SCSI Protocol (iSCSI).
  • Data Center Networks - Converged Enhanced Ethernet and Data Center Bridging (CEE & DCB).
  • Data Center Networks - Fibre Channel over Ethernet (FCoE).

7. NETWORKING CONCEPTS:

  • Introduction to Networking.
  • What is a layered stack?.
  • Data Structures.
  • Physical Transport Networks.
  • Simplex and Duplex.
  • Network Models.
  • Circuit & Packet Switch.
  • Bus, Loop & Expanse.
  • Connection-Oriented vs. Connectionless.
  • Bit Rate, Bandwidth, Latency and Throughput.
  • Ports and PHYs.
  • Names & Addresses.
  • Flow Control.
  • Segmentation & Offload.

8. SYSTEM INTERFACE Technologies:

  • PCIe.
  • InfiniBand.

9. STORAGE NETWORK PERFORMANCE:

  • Performance Prelude.
  • Flow Control.
  • FC Arbitrated Loop.
  • FC Fabric.
  • Fragmentation.
  • Tools.

10. TROUBLESHOOTING:

  • Storage Networking Troubleshooting.
  • Storage Networking Environmental.
  • Storage Networking Troubleshooting Tools.
  • Applications.

11. DATA PROTECTION:

  • Backup & Recovery Overview.
  • Technologies Overview.
  • Methods & Levels.
  • Snapshots & Replication.
  • Networking.
  • Virtual Tape Library (VTL).
  • Continuous Data Protection (CDP).
  • Data DeDuplication.

SERVER +


hardware&networking's Server+ is a vendor-neutral certification that validates the competency of advanced IT technicians. The Server+ Certification proves a technician's knowledge of Industry Standard Server Architecture (ISSA) technology, Technologies such as SCSI, multiple CPUs and RAID, as well as capabilities with server problems, including disaster recovery.

hardware&networking Server+ Certification Training Course measures the necessary competencies for network administrators working in the IT industry. Students will learn the skills and knowledge required to manage multi-platform support, maintenance, setting control, changing user needs, increased server demand, and disaster planning on a variety of operating systems.

Prerequisites:

The hardware&networking Server+ certification is targeted towards individuals with 18-24 months of IT experience. Although not a Prerequisites, it is recommended that hardware&networking Server+ candidates hold should knowledge of hardware&networking A+.
Duration of the course : Part Time : 2 Months (2 hrs/day) , Full Time : 1 Months (4 hrs/day).

Course outline:

1. INTRODUCTION TO SERVERS:

  • Investigating Different Types of Servers.
  • Identifying Server Hardware.
  • Identifying Network Operating Systems and Other Software.
  • Storage.

2. INSTALLING SERVERS:

  • Planning for Server Installation.
  • Adding Server Hardware.
  • Verifying the Installation.
  • Data-Transmission Media.

3. CONFIGURING SERVERS:

  • Checking and Upgrading BIOS and Firmware Levels.
  • Configuring RAID.
  • Installing Network Operating Systems and Other Software.
  • Configuring External Peripheral Devices.
  • Installing System Monitoring Agents and Service Tools.
  • Documenting the Server.

4. MAINTAINING SERVERS:

  • Backing Up Server Data.
  • Base lining Servers and Monitoring Server Performance.
  • Setting SNMP Thresholds.
  • Keeping the Server Clean.
  • Verifying Hardware.
  • Establishing Remote Notification.

5. UPGRADING SERVER COMPONENTS:

  • Creating and Using Upgrade Check Lists.
  • Adding and Replacing Hardware.
  • Upgrading Server Software.

6. EXPLORING ENVIRONMENTAL ISSUES SURROUNDING SERVERS:

  • Evaluating the Physical Security of Servers.
  • Evaluating the Server Room Environment.

7. TROUBLESHOOTING SERVERS:

  • Reviewing General Troubleshooting Information.
  • Analyzing the Problem and its Cause.
  • Using Diagnostic Software.
  • Identifying Bottlenecks.

8. EXPLORING DISASTER RECOVERY CONCEPTS AND TECHNIQUES:

  • Ensuring Redundancy and Availability.
  • Backups.
  • Creating a Disaster Recovery Plan.

SECURITY +


hardware&networking Security+ is a vendor-neutral certification course that covers the organizations of information security across number of technology platforms. The course covers industry-wide concepts including cryptography, authentication, communication security, access control, external attack, infrastructure security and organization and operational security. The demand for skilled security professionals is growing significantly. The technology community identifies this course as the perfect way to validate your knowledge of information security. The recommended pre-requisite to join Certificate in IT Security course is to have basic knowledge of Computer Networking.

Those who have work experience of Hardware and Networking and is interested to learn about Vendor-neutral Networking security.

Prerequisites:

The recommended pre-requisite to join Certificate in IT Security course is to have prior knowledge of Computer Networking.
Duration of the course : Part Time : 2 Months (2 hrs/day) , Full Time : 1 Months (4 hrs/day).

Course outline:

MITIGATING THREATS:

  • System maintenance.
  • Application security.
  • Physical security.
  • Malware.
  • Social engineering.

CRYPTOGRAPHY:

  • Symmetric cryptography.
  • Public key cryptography.

AUTHENTICATION:

  • Authentication factors and requirements.
  • Authentication systems.
  • Authentication system vulnerabilities.

USER- AND ROLE-BASED SECURITY:

  • Baseline security policies.
  • Resource access.
  • Peripheral security.

FILE AND DISK ENCRYPTION:

  • Peripheral and component security.
  • Mobile device security.

PUBLIC KEY INFRASTRUCTURE:

  • Public key cryptography.
  • Implementing public key infrastructure.
  • Web server security with PKI.

APPLICATION AND MESSAGING SECURITY:

  • Application security.
  • E-mail security.
  • Social networking and messaging.

PORTS AND PROTOCOLS:

  • TCP/IP basics.
  • Protocol-based attacks.

NETWORK SECURITY:

  • Network devices.
  • Secure network topologies.

SECURE NETWORKING:

  • Virtualization and cloud computing.
  • Wireless security.
  • Wireless network security.
  • Mobile device security.

REMOTE ACCESS SECURITY:

  • Remote access.
  • Virtual private networks.
  • Vulnerability testing and monitoring.
  • Risk and vulnerability assessment.

AUDITING AND LOGGING:

  • Intrusion detection and prevention systems.
  • Incident response.

ORGANIZATIONAL SECURITY:

  • Organizational policies.
  • Education and training.
  • Disposal and destruction.

BUSINESS CONTINUITY:

  • Business continuity planning.
  • Disaster recovery.
  • Environmental controls.

CLOUD +


Cloud technology makes new opportunities and job roles. By enhancing your current skill set to include cloud computing, enhancing proficient in delivering applications and files over the Internet. With information technology on the move to the cloud, stay in front of the pack; make sure you have the cloud services skills you need to endure to be the IT professional.

This course analyzes the advantages of moving to the cloud and outlines the detailed skill sets IT professional will want to acquire. It describes what the cloud offers and how it applies to and impacts existing infrastructure, including issues such as data control, integrity, cost, and security.

System, Network engineers and cloud providers.

Prerequisites:

Basic knowledge of Networking, Virtualization and System administration.
Duration of the course : Part Time : 2 Months (2 hrs/day) , Full Time : 1 Months (4 hrs/day).

Course outline:

Compare and contrast cloud services:

  • SaaS (according to NIST)
  • IaaS (according to NIST)
  • CaaS (according to NIST)
  • PaaS (according to NIST)
  • XaaS (according to NIST)
  • DaaS (according to NIST)
  • BPaaS
  • Accountability and responsibility based on service models

Compare and contrast cloud delivery models and services:

  • Private
  • Public
  • Hybrid
  • Community
  • On-premise vs. Off-premise hosting
  • Accountability and responsibility based on delivery models
  • Security differences between models
  • Functionality and performance validation based on chosen delivery model
  • Orchestration platforms

Summarize cloud characteristics and terms:

  • Elasticity
  • On-demand self serve/just in time service
  • Pay-as-you-grow
  • Chargeback
  • Ubiquitous access
  • Metering resource pooling
  • Multitenancy
  • Cloud bursting
  • Rapid deployment
  • Automation

Explain object storage concepts:

  • Object ID
  • Metadata
  • Data/blob
  • Extended metadata
  • Policies
  • Replicas
  • Access control

Explain the differences between hypervisor types:

  • Type I and Type II
  • Proprietary vs. open source
  • Consumer vs. enterprise use

Install, configure, and manage virtual machines and devices:

  • Creating, importing, and exporting template and virtual machines
  • Install guest tools
  • Snapshots and cloning
  • Image backups vs. file backups
  • Virtual NIC
  • Virtual disks
  • Virtual switches
  • VLAN
  • VSAN

Given a scenario, perform virtual resource migration:

  • Establish requirements
  • Maintenance scheduling
  • Reasons
  • Storage migration
  • Online vs. offline migrations
  • Physical to Virtual (P2V)
  • Virtual to Virtual (V2V)
  • Virtual to Physical (V2P)

Explain the benefits of virtualization in a cloud environment:

  • Shared resources
  • Elasticity
  • Network and application isolation
  • Infrastructure consolidation
  • Virtual datacenter creation

Compare and contrast virtual components used to construct a cloud environment:

  • Virtual network components
  • Shared memory
  • Virtual CPU
  • Storage Virtualization

Compare and contrast various storage Technologies:

  • Network Attached Storage (NAS)
  • Direct Attached Storage (DAS)
  • Storage Area Network (SAN)
  • Different access protocols
  • Protocols and applications
  • Management differences

Explain storage configuration concepts:

  • Disk types
  • Tiering
  • RAID levels
  • File system types

Execute storage provisioning:

  • Creating LUNs
  • Creating network shares
  • Zoning and LUN masking
  • Multipathing
  • Implications of adding capacity to a NAS and SAN

Given a scenario, implement appropriate network configurations:

  • NAT
  • PAT
  • Subnetting/Supernetting
  • VLAN and VLAN tagging
  • Network port configurations
  • Switching and routing in physical and virtual environments

Explain the importance of network optimization:

  • WAN
  • LAN
  • MAN
  • Bandwidth
  • Latency
  • Compression
  • Caching
  • Load balancing
  • Devices on the same subnet

Given a scenario, troubleshoot basic network connectivity issues:

  • Tools
  • Review documentation and device configuration settings
  • Review system logs

Explain common network protocols, ports, and topologies:

  • Trunk ports
  • Port binding/aggregation
  • Common ports
  • Common protocols
  • Types of networks

Explain common hardware resources and features used to enable virtual environments:

  • BIOS/firmware configurations
  • Minimum memory capacity and configuration
  • Number of CPUs
  • Number of Cores
  • NICs quantity, speeds, and configurations
  • Internal hardware compatibility
  • HBAs
  • Storage media

Given a scenario, implement and use proper resource monitoring techniques:

  • Protocols
  • Alert methods
  • Establish baselines and thresholds
  • Automated responses to specific events
  • Examine processes usage / resource usage

Given a scenario, appropriately allocate physical (host) resources using best practices.:

  • Memory
  • CPU
  • Storage and network allocation
  • Entitlement/quotas (shares)
  • Reservations
  • Licensing
  • Resource pooling

Given a scenario, appropriately allocate virtual (guest) resources using best practices:

  • Virtual CPU
  • Memory
  • Storage and network allocation
  • Entitlement/quotas (shares)
  • Hard limit, soft limit
  • Reservations, licensing
  • Dynamic resource allocation
  • Resource pooling
  • CPU affinity
  • Physical resource redirection and mapping to virtual resources

Given a scenario, use appropriate tools for remote access:

  • Remote hypervisor access
  • RDP
  • SSH
  • Console port
  • HTTP

Explain network security concepts, tools, and best practices:

  • ACLs
  • VPNs
  • IDS/IPS hardware/software-based firewalls
  • DMZ
  • Review / audit logs
  • Attacks

Explain storage security concepts, methods, and best practices:

  • Obfuscation
  • Access Control Lists
  • Zoning
  • LUN masking
  • User and host authentication
  • Review/audit logs

Compare contrast different encryption Technologies and methods:

  • PKI
  • IPSEC
  • SSL/TLS
  • Ciphers
  • Encryption for data in transit and encryption for data at rest

Identify access control methods:

  • Role-based administration
  • Mandatory access controls
  • Discretionary access controls
  • Multifactor authentication
  • Single sign-on
  • Federation

Implement guest and host hardening techniques:

  • Disabling unneeded ports and services
  • User credentials
  • Host-based/software firewalls
  • Antivirus software
  • Patching
  • Deactivating default accounts

Explain policies and procedures as they relate to a cloud environment:

  • Network and IP planning/documentation
  • Configuration standardization and documentation
  • Change management best practices
  • Configuration management
  • Capacity management
  • Systems life cycle management
  • Maintenance windows

Given a scenario, diagnose, remediate and optimize physical host performance:

  • Disk performance
  • Disk tuning
  • Disk latency
  • Swap disk space
  • I/O tuning
  • Performance management and monitoring tools
  • Establish baseline and create documentation with appropriate tools
  • Hypervisor configuration best practices
  • Impact of configuration changes to the virtual environment
  • Common issues

Explain common performance concepts as they relate to the host and the guest:

  • IOPS
  • Read vs. write files
  • File system performance
  • Metadata performance
  • Caching
  • Bandwidth
  • Throughput (bonding/teaming)
  • Jumbo frames
  • Network latency
  • Hop counts
  • QoS
  • Multpathing
  • Load balancing
  • Scaling

Implement appropriate testing techniques when deploying cloud services:

  • Test replication
  • Test latency
  • Test bandwidth
  • Test load balancing
  • Test application servers
  • Test storage
  • Test application delivery
  • Service performance testing and application performance testing
  • Penetration testing
  • Vulnerability assessment
  • Separation of duties during testing

Compare and contrast disaster recovery methods and concepts:

  • Redundancy
  • Failover
  • Geographical diversity
  • Failback
  • Replication
  • Site mirroring
  • Hot site
  • Cold site
  • Warm site
  • Backup and recovery
  • Archiving and offsite storage
  • Replication types
  • RTO
  • RPO
  • MTBF
  • MTTR
  • Mission critical requirements

Deploy solutions to meet availability requirements:

  • Fault tolerance
  • Multipathing
  • Load balancing