Computer Hardware & Networking course explores the jobs in IT industry. It is a job oriented course. Computer hardware comprises the equipment, wiring, and other physical components of a computer. Through a networking course you will learn how to setup a network, the difference between a personal network and a local area network from a metropolitan or wide area network. Today, all companies and organizations run on computer networks.
• Assemble and Disassemble Computer Components
• Components in Portable Computers
• Devices Installation and Configuration
• Characteristics of Cabling and their Connectors
• Common IDE, SCSI and Peripheral Devices
• Optimize PC Operations Optimization
• Determine the Issues that must be considered when upgrading a PC
• Popular CPU Chips
• Types of Memory (RAM)
• Types of Motherboards and their Components
• Printer Technologies, Interfaces and Options/Upgrades
• Troubleshoot Common Printer Problems
• Operating System Fundamentals OS Installation
• Common Error Codes Interpretation
• Networking Capabilities of Windows
• Basic Internet Protocols and Terminologies
• Procedures for Establishing Internet Connectivity
• Networking Standards
• Characteristics of Different Types of Cables
• Different media Connectors and Describe their uses
• Purposes, Features and Functions of Network Components
• General Characteristics of the Different wireless technologies
• Different Network Protocols
• Class-full IP and their subnet masks
• Private and Public network addressing schemes
• WAN Technologies
• Security protocols and authentication protocols
• Basic capabilities of different server operating systems
• Benefits and characteristics of using a firewall and proxy services
• Main characteristics and purpose of extranets and intranets
• Fault Tolerance
• Network utility to Troubleshoot networks
• Impact of modifying, adding or removing network services
• Network Troubleshooting with Physical Topology
Components of network – router, switch, hub, bridge etc
Types of Network – LAN, MAN, WAN, VPN, PAN & Content Network
Defining Network requirements – NIC- Ethernet (CSMA/CD)
10/100/1000 mbps DUPLEX (Half/Full/Auto) – Connecting Media – Coax.
10 base 2T – UTP/STP – CAT 1/2/3..
Straight through/cross crimping (only details no practical)
Fiber optics – Single/Multimedia
100 Base TX/FX etc – wireless communication.
Ethernet cabling Standard.
Repeater – Hub – Switch – Bridge – Topology – Bus/Star/Ring
OSI – Model
7 Layers – Communication between the Layers (Encapsulation & De-encapsulation) –
Layer 2 – MAC/LLC – 802.3/802.2 (SAP/SNAP) /Ethernet II – Frames
Broadcast/Collision domain– point of -Hub/Switch/Router
L4 – 3way handshake – windowing – and about – Connectionless
Packet size [64B (mini) to 1518B (Max)]
TCP/IP Model & Ipv4 Addressing
All Layers of TCP/IP Compound with – OS
Application Layer – TFTP/FTP/SMTP/TELNET/SNMP/DNS
Transport Layer – TCP/UDP – TCP Segment Format
3 way handshake/windowing – UDP segment Format
IP datagram format – Protocol No. – TCP 6 – UDP 17
ICMP – ARP – RARP
Introduction to IP addressing – Class A/B/C/D/E
Private IP address – First OCTET range etc.
Default Subnet Mask
Class C Subnetting & Practice no. given
Class B Subnetting & problems
Class A Subnetting & problems
Introduction to IPV6
Host Address Assignment
Unicast, Multicast and other Special ipV6 Addresses
Configuring ipV6 Routing and Routing Protocols
Translations between ipV4 and ipV6
Basic of Router & Configuration
Selection of Router & Cabling a Route
When Router used – LAN with WAN connect – to connect networks of different IP
Different interface of Router – AUI /S0/S1/AUX – console / BRI etc.
Cables used in different interfaces/purpose of interfaces
WAN interface cable – EIA/TIA – 232/449/530 – 35 – X.21
Different CISCO series – modular/fixed – 10mbps/100 etc
Straight through between DTE & DCE
Different modes of operation & basic commands
ROM – POST – BSL – ROM-MONITOR PRG – MINIIOS
Different interface of Router – AUI /S0/S1/AUX – console / BRI etc.
DRAM -Running Config
NVRAM – Startup Config
Flash MEM – IOS
ROM Monitor – Reboot Mode – Setup – Exec Model
User -Privilege – Global – Sub-configuration mode
Syntax/command to switch between modes
Assigning IP address for -E0-S0-S1
Enabling/disabling – console/privilege / vty password
Mold – command
Show Config / start / run / version / flash
Basic commands practice
Changing between modes – (user-privilege- Global-etc)
IP address configuration-E0-S0-S1
Password – enabling – encrypting it
Practice – motd – show commands – editing commands
Assigning host name (for Router)
Registervalue – X2102 – boot field value/purpose ROM monitor made – password breaking 8th/6th/13th bit of register value importance
Boot system flash/network/ROM – config-register (Changing register value) – etc command purpose Booting sequence – Backup & Recovery – CDP
Practice an above commands as well as following
Telnet – [ctrl+shift+6]x – disconnect – sh users /Sessions
Clear lines resume – [hostname resolving in telnet domain Enabling/disabling etc – no practical for this alone]
Overview of Cisco SDM (Security Device Manager)
IP Routing, Static Routing & Default Routing
IP routing – static routing – default- dynamic routing
Providing clock rate to up the link after identifying DCE by “Sh controllers” command
Commands/syntax – Static/default routing
Static Routing & Default Routing
Practical-session for Static & default routing
Dynamic Routing and RIP
Dynamic Routing – IGP & EGP.
IGP – RIP-OSPF – EGRP – EIGRP
Classes of Routing Protocol – Distance vector – Link State – Balanced hybrid
Role of Routing Protocol – builds/updates/selects & Routes the packet
Soluting for Routing loops – Max. loop count – split horizon – Route poison Reverse – Hold down Timer
Features of RIP – distance vector algorithm – RIP V1/V2 – load sharing – metric (depends – loop count)
Metric value depends – loop count – Ticks – delay – Reliability – cost – MTU – Bandwidth
Command – Router RIP Network
Sh IP route
Timer value for RIP– Update/Invalid/ hold down/flush Timer
Dynamic Routing – RIP Practical
Dynamic Routing EIGRP & OSPF
Limitations of distance vector algorithm
Features of EIGRP and its operations
Configuring EIGRP – “Auto-redistribution”
Verify and troubleshooting EIGRP
Features of OSPF and its operation
Configuring single area OSPF
Verify and troubleshoot OSPF
Purpose/advantage of Access-list
IP [-for a host – for a network/sub network].
Std IP access-list – wild card calculation
Extd IP access list
Switch port ACL,.
Step involved in creating access list
Applying access list at the interface – (inbound/outbound)
Named access-list for IP
Access-list in Telnet sessiont
IP standard Access List
IP Std access-list
IP Extended Access List
IP Extd access-list, named access lists
Implement, Verify & Troubleshoot NAT
Explain the Basic Operation Of NAT
Using (including CLI/SDM)
Practicals on Static NAT, Dynamic NAT and PAT
Troubleshoot NAT issues
WAN Technologies- Leased Line
P to P communication
HDLC & PPP protocol-features
Enabling HDLC & PPP
PPP layer & its explanation/role
Configuring PAP/CHAP using commands
Describe VPN technology
Importance Of VPN
Benefits & Role
Impact & Components
Packet Switched Network
Virtual circuit – DLCI – Access-link – CRI – FECN – BECN – LMI
Configuring frame-relay for
Combination of above two
Switching Operation and Configuration
Function –add-learning / Forward-filters the Frame / loop avoidance
Redundant path and its problems
Spanning Tree Protocol – purpose – its different state (blocking/listening/learning/forwarding)
Modes of operation of switch/Bridge
Switch & hub – half duplex
Switch & Server – full duplex
CISCO catalyst switch 1912 & 1924 interface details
Basic and advanced commands
Enabling & configuring MAC address table
VLAN – ISL – Trunking
Assigning VLAN No. & name
Configuring ports to a specific VLAN
VTP modes of operation
Switching Technologies (including VTP , RSTP , PVSTP, 802.1q)
Implement Basic Switch Security (including Port Security , Trunk access .etc )
Wireless Intro & Operation
Standards associated with Wireless Media (including WI-FI Alliance, ITU/FCC)
Ad-hoc mode, infrastructure mode
SSID, BSS, ESS
Basic Parameters to configure on a Wireless Network
Wireless Security Feature’s (WEP, WPA 1 / 2 )
Implementing Wireless Networks
• Windows Server 2012
• Installing Windows Server 2012
• Post-Installation Configuration of Windows Server 2012
• Overview of Windows Server 2012 Management
• Windows PowerShell
• Deploy and Manage Windows Server 2012
• Active Directory Domain Services (AD DS) Administration
• Implement a Dynamic Host Configuration Protocol (DHCP)
• Implement Domain Name System (DNS)
• Implement IPv6 for simple scenarios
• Configure local storage on a server
• Implement file and print services
• Implement Group Policy
• Implement server virtualization using Hyper-V
70-411: Administering Windows Server 2012
• Manage user desktops with Group Policy
• Manage user and service accounts
• Maintain Active Directory Domain Services (AD DS)
• Configure and troubleshoot remote access
• Install, configure, and troubleshoot the network policy server (NPS)
• Implement network access protection (NAP)
• Optimize file services
• Configure encryption and advanced auditing
• Implement update management
• Monitor Windows Server 2012
70-412: Configuring Advanced Windows Server 2012 Services
• Configure and manage iSCSI, BranchCache, and File Server Resource Manager (FSRM)
• Implement dynamic access control
• Implement network load balancing
• Implement failover clustering with Hyper-V
• Implement distributed Active Directory Domain Services (AD DS) deployments
• Implement AD DS sites and replication
• Implement Active Directory Certificate Services (AD CS)
• Implement Active Directory Rights Management Services (AD RMS)
• Implement Active Directory Federation Services (AD FS)
Learning Objectives – In this module, you will learn what Cloud Computing is and what are the different models of Cloud Computing along with the key differentiators of different models. We will also introduce you to virtual world of AWS along with AWS key vocabulary, services and concepts.
Topics – Introduction to Cloud Computing, AWS Architecture, AWS Management Console, Setting up of the AWS Account.
2. Amazon EC2 and Amazon EBS
Learning Objectives – In this module, you will learn about the introduction to compute offering from AWS called EC2. We will cover different instance types and Amazon AMIs. A demo on launching an AWS EC2 instance, connect with an instance and hosting a website on AWS EC2 instance. We will also cover EBS storage Architecture (AWS persistent storage) and the concepts of AMI and snapshots.
Topics – Amazon EC2, Amazon EBS, Demo of AMI Creation, Backup, Restore, EC2 Services and EBS persistent storage.
3. Amazon Storage Services: S3, RRS, CloudWatch
Learning Objectives – In this modules, you will learn how AWS provides various kind of scalable storage services. In this module, we will cover different storage services like S3, RRS and learn how to host a static website on AWS. This session also covers monitoring AWS resources and setting up alerts and notifications for AWS resources and AWS usage billing with AWS CloudWatch.
Topics – AWS Storage Services: S3, RRS & Glacier, Amazon Cloud Watch, Alerts, Notification.
4. Scaling and Load Distribution in AWS
Learning Objectives – In this module, you will learn about ‘Scaling’ and ‘Load distribution techniques’ in AWS. This module also includes a demo of Load distribution & Scaling your resources horizontally based on time or activity.
Topics – Amazon Scaling Service: ELB and Auto Scaling.
5. AWS VPC & Route 53
Learning Objectives – In this module, you will learn introduction to Amazon Virtual Private Cloud. We will cover how you can make public and private subnet with AWS VPC. A demo on creating VPC. We will also cover overview of AWS Route 53.
Topics – Amazon VPC with subnets , Gateways , Route tables and Amazon Route 53 overview.
6. Identity and Access Management Techniques (IAM) and Amazon Managed Relational Database (RDS)
Learning Objectives – In this module, you will learn how to achieve distribution of access control with AWS using IAM. We will talk about the managed relational database service of AWS called RDS.
Topics – Amazon IAM Overview, Amazon RDS.
7. Multiple AWS Services and Managing the Resources’ Lifecycle
Learning Objectives – In this module, you will get an overview of multiple AWS services. We will talk about how do you manage life cycle of AWS resources and follow the DevOps model in AWS. We will also talk about notification and email service of AWS along with Content Distribution Service in this module.
Topics – AWS CloudFront, AWS DynamoDB, AWS Import / Export , Overview of AWS Products such as Elastic Beanstalk, Cloud Formation, AWS OpsWorks, SES.
8. AWS Architecture and Design
Learning Objectives – In this module, you will cover various architecture and design aspects of AWS. We will also cover the cost planning and optimization techniques along with AWS security best practices, High Availability (HA) and Disaster Recovery (DR) in AWS.
Topics – AWS Backup and DR Setup, AWS High availability Design, AWS Best Practices (Cost +Security), AWS Calculator & Consolidated Billing.
9. Migrating to Cloud & AWS Case Study
Learning Objectives – In this module, you will learn how to migrate to cloud. Also we discuss a case study for AWS Implementation.
Topics – AWS Cloud Migration guidelines. AWS Case Study.
Module 1: Managing Azure Subscriptions and Resources
Module 2: Implementing and Managing Storage
Module 3: Deploying and Managing Virtual Machines (VMs)
Module 4: Configuring and Managing Virtual Networks
Module 5: Managing Identities
2. Implementing Workloads and Security
Module 1: Evaluating and Performing Server Migration to Azure
Module 2: Implementing and Managing Application Services
Module 3: Implementing Advanced Virtual Networking
Module 4: Securing Identities
3. Understanding Cloud Architect Technology Solutions
Module 1: Selecting Compute and Storage Solutions
Module 2: Hybrid Networking
Module 3: Measuring Throughput and Structure of Data Access
4. Creating and Deploying Apps
Module 1: Creating Web Applications using PaaS
Module 2: Creating Apps and Services Running on Service Fabric
Module 3: Using Azure Kubernetes Service
5. Developing for the Cloud
Module 1: Developing Long-Running Tasks and Distributed Transactions
Module 2: Configuring a Message-Based Integration Architecture
Module 3: Developing for Asynchronous Processing
Module 4: Developing for Autoscaling
Module 5: Developing Azure Cognitive Services Solutions
Unit 1: Accessing the Command Line
• Recognize the BASH shell based on the default prompt.
• Use Linux efficiently by switching between virtual consoles.
• Display usage messages and be able to interpret a command’s syntax.
Unit 2: Managing Files from the Command Line
• Recognize and Find Familiarity in a File-system Tree,
• Learn Terms Like “root” Directory and Subdirectory.
• Introduction to Different types of Data in Separate System Directories.
Unit 3: Getting Help in Red Hat Enterprise Linux
• Learn “man” Terminology, Including Topics and Sections.
• Become Aware of The importance of less-noticed man sections.
Unit 4: Creating, Viewing and Editing Text Files
• Control Output to Files.
• Use Pipe to Control Output to Other Programs.
Unit 5: Manage Local Linux Users and Groups
• Explain the Role of Users and Groups on a Linux System and How They are understood by the Computer.
Unit 6: Controlling Access to Files with Linux File-system Permissions
• Explain How the Linux File Permissions Model Works.
Unit 7: Monitoring and Managing Linux Processes
• Learn the Processes Lifecycle, in Order to better Comprehend Process States.
Unit 8: Controlling Services and Daemons
• List System Daemons and Network Services Started by System services and Socket units.
Unit 9: Configuring And Securing Open-ssh Service
• Log into a Remote System Using ssh to Run Commands From a Shell Prompt.
Unit 10: Analyzing and Storing Logs
• Describe the Basic “syslog” Architecture in RHEL7
Unit 11: Managing RHEL Networking
• Explain Fundamental Concepts of Computer Networking.
Unit 12: Archiving and Copying Files between Systems To
• Create Backups and Transfer Files Over The Network.. Unit
13: Installing and Updating Software Packages
• Register System With Your Red Hat Account and Entitle Them to Software Updates for Installed Products.
Unit 14: Accessing Linux File-systems
• Determine which Directories in the File-system Hierarchy are Stored on Which Storage Devices.
Unit 15: Using Virtualized Systems
• Recognize the Consistent Use of KVM Architecture Throughout of Red Hat Product Line.
Unit 16: Accessing the Command Line
Unit 1: Automating Installation with Kickstart
• Explain Kickstart Concepts and Architecture
• Install and configure Linux using Kickstart
Unit 2: Using Regular Expressions with “grep”
• Create a Regular Expressions that match desired data.
Unit 3: Creating and Editing Text files with vim
• Explain the three main modes of “vim”.
Unit 4: Scheduling Future Linux Tasks
• Scheduling tasks using at and cron.
Unit 5: Managing Priority of Linux Processes
• Explain about Linux Processes and nice values.
Unit 6: Controlling Access to Files with Access Control Lists (ACL)
• Describe ACL’s and file system mount options..
Unit 7:Managing SELinux Security
• Explain the Basics of Se-Linux permissions and Context Transitions.
• Display Current Se-Linux Modes.
• Correctly Interpret the Se-Linux Context of a File.
• Identify Current Se-Linux Boolean Settings.
Unit 8: Connecting to Network-Defined Users and Groups
• User authentication using centralized Identity Management Services.
Unit 9: Adding Disks, Partitions, and File Systems to a Linux System
• Create and Delete disk Partitions on disks with an MBR Partitioning Scheme Using “fdisk”.
• Create and Delete disk Partitions on disks with an GPT Partitioning Scheme Using “gdisk”.
• Format Devices Using “mkfs”
• Mount File System into the Directory Tree
Unit 10: Managing Logical Volume Management (LVM) Storage
• How to manage high performance LVM storage.
Unit 11: Accessing Network Attached Storage with Network File System (NFS)
• Access, Mount and unmount NFS Shares .
Unit 12: Accessing Network Storage with SMB
• How to mount and unmount smb file-system using the command line.
Unit 13: Controlling and Troubleshooting the Red Hat Enterprise Linux Boot Process
• Describe and Influence the RHEL Boot Process..
Unit 14: Limiting Network Communication with Firewalled
• Configure the Basic Firewall Using “firewalld”, “firewalld-config”and “firewalld-cmd”.
Unit 15: Comprehensive Review
• Comprehensive Review of System Administration 2
Unit 1: Controlling Services and Daemons
• Control System Daemons and Services Using System ctl.
Unit 2: Managing IPV6 Networking
• Configure and troubleshoot IPv6 address on Red Hat Enterprise Linux systems
Unit 3: Configuring Link Aggregation and Bridging
• Configure and Troubleshoot Network Bonding and Teaming on RHEL
Unit 4: Network Port Security
• Implement a Secure Network Using Firewall
Unit 5: Managing DNS for Servers
• A Brief Study about DNS Records and how to Configure a Secure Caching DNS.
Unit 6: Configuring Email Transmission
• Configure RHEL Server to Transmit all E-mail through an Unauthenticated SMTP Gateway.
Unit 7: Providing Remote Block Storage
• How to Access Remote Storage Space Using ISCSI.
Unit 8: Providing File Based Storage
• Export File System to Client Systems Using NFS and Providing Security.
Unit 9: Configuring MariaDB Databases
• Install and Configure Mariadb Database.
Unit 10: Providing Apache HTTPD Web Service
• Configure a Secure Apache HTTPD Web-service..
Unit 11: Writing Bash Scripts
• Write simple shell scripts using Bash.
Unit 12: Bash Conditionals and Control Structures
• Bash Conditionals and Other Control Structure.
Unit 13: Configuring the Shell Environment
• Use Bash Startup Scripts to Define Environment Variables, Aliases and Functions.
Unit 14: Linux Containers and Docker
• Details about Linux Containers and Dockers..
Unit 15: Comprehensive Review
• Comprehensive Review of System Administration 3