Careers
We invest in technologies that we expect will make the most difference to our business and the IT industry. Our upstream business combines technologies and innovations for the effective use of time & resources & meet world's growing demand for IT services.

Identifying personal computer components
Motherboard types
Motherboard components
Identifying purpose and characteristics of processor
Identifying purpose and characteristics of memory
RAM
Types of RAM
Speed Specifications
Physical Differentiation among RAM
Types of ROM
Identifying purpose and characteristics of storage devices
Identifying purpose and characteristics of display devices
Identifying purpose and characteristics of other components
Essential terminology
Defining security
Need for security
Cyber crime
Information Security statistics
IS triangle
Security myths
How to harden security
>Components That Make Up Your Computer
How To Add Random Access Memory To Speed Up Your Desktop
Install More RAM In Your Laptop For More Speed
How to Easily and Safely Install RAM
How To Troubleshoot RAM Memory
Memory Testing Software Utilities
Get More Computer Storage By Installing A Larger Hard Drive
How To Replace A DVD Drive In Your Laptop
Careers in Web Technologies & Job Roles
How the website works
Client and server scripting languages
Difference between web designer & web developer
Types of websites & Web standards
Installing Softwares & Tools
Threats, risks, consequences
Sources of threats
Attacks classification
Preventive measures, remedial measures
Terms & concepts
Evolution of windows operating system
MSDOS Evolution
The Registry
Registry Hacking
Booting sequence of system
Key Boot Files
Printers
The four dimensions of Big Data: volume, velocity, variety, veracity
Introducing the Storage, MapReduce and Query Stack
Establishing the business importance of Big Data
Addressing the challenge of extracting useful data
Integrating Big Data with traditional data
Object Oriented Programming (OOPS) concepts and terminology, Advantages of OOPS
Fundamentals of OOPS, Core Java Programming Introduction of Java
What is Java?, How to Get Java, A First Java Program, Compiling and Interpreting Applications
The JDK Directory Structure, Using Eclipse
Data types and Variables, Primitive Datatypes, Declarations, Variable Names
Numeric Literals, Character Literals, String formatting and Parsing, String Literals
Arrays,Non-Primitive Datatypes, The Dot Operator
Methods, Calling Methods, Defining Methods, Method Parameters Scope, Why all the static?
Operators and Expressions, Expressions, Assignment Operator, Arithmetic Operators
Relational Operators, Logical Operators, Increment and Decrement Operators
Operate-Assign Operators (+=, etc.), The Conditional Operator, Operator Precedence
Implicit Type Conversions, The Cast Operator, Strict typing, Type conversion
Control Flow Statements, Conditional (if) Statements, Data types and Variables
Adding an else if, Conditional (switch) Statements, while and do-while Loops, for Loops
The continue Statement, The break Statement
Introduction to Object-Oriented Programming, Classes and Objects, Fields and Methods
Encapsulation, Access Control, Inheritance, Polymorphism
Using Java Objects, Printing to the Console, printf Format Strings, StringBuilder and StringBuffer
Methods and Messages, toString, Parameter Passing, Comparing and Identifying Objects, Destroying Objects
Inheritance in Java, Casting, Method Overriding, Polymorphism, super keyword, The Object Class
Packages, The import Statement, Static Imports, CLASSPATH and Import, Defining Packages, Package Scope
Interfaces and Abstract Classes, Separating Interface and Implementation, Defining Interfaces
UML Interfaces and Realization, Implementing and Extending Interfaces, Runnable Threads, Abstract Classes
Lambda Built-in Functional Interfaces, java.util.function package, Use primitive versions of functional interface
Use binary versions of functional interface, Use the UnaryOperator interface
Exception Handling, Exceptions Overview, Catching Exceptions, The finally Block, Exception Methods
Declaring Exceptions, Defining and Throwing Exceptions, Errors and Runtime Exceptions, Assertions
The Collections Framework, The Set Interface, Set Implementation Classes, The List Interface
List Implementation Classes, The Map Interface, Map Implementation Classes, Utility classes, Generics
Inner Classes, Member Classes, Local Classes, Anonymous Classes, Instance Initializers, Static Nested Classes
Introduction to Threads, Non-Threaded Applications, Threaded Applications, Creating Threads
Thread States, Runnable Threads, Coordinating Threads, Interrupting Threads, Runnable Interface ,ThreadGroups
Swing, Swing GUI Components, Using Swing API
Applet, Life Cycle of an Applet
JDBC, Creating a Database and tables, Getting Information from Database, Obtaining Result Set Information
Connecting a Java program to a Database, Prepared Statements & Statement Classes in Java
Inserting, Updating & Deleting Table data
Servlets, What is a web application, Java Servlets, What is a Servlet, Servlet Lifecycle, Servlet Context
Session management, Building the first Servlet, Deploying the Servlet
JSP, What is a JSP Page, Basic HTML Tags, JSP Tag library, JSP Page Life-cycle
Creating the first Dynamic web page using JSP, MVC architecture, 3-tier architecture
What is Cloud?
Cloud Architecture
Cloud benefits
Types of cloud
Importance of IAAS, PAAS, SAAS
Real world example of cloud usage
Trends in cloud computing
Introduction to Inter networking
OSI & TCP/IP Stack
IP Addressing, Subnetting, VLSM
Configuring Router & Switch
IP Routing
Switching, VLAN, VTP
WAN
Basic Network Security & ACL
IP Services & Managing Cisco IOS
Wireless Technology
Firewalls & VPN
Troubleshooting
Information Security Overview
Information Security Threats and Attack Vectors
Hacking Concepts
Hacking Phases
Types of Attacks
Information Security Controls
Introduction to CCNA & Inter networking
Network Topologies, Network Devices
Types of Medium
Introduction to LAN & WAN
Motherboard types
Motherboard components
Computer Components Identification
Assemble and Disassemble Computer Components
Devices Installation and Configuration
Popular CPU Chips
Introduction of Programming Languages, Types of Languages, Evolution of 'C' Language
Structure of a 'C' Program, 'C' Program development life cycle, Executing and Debugging a 'C' Program
C' Tokens, Keywords and Identifiers, Operators, Constants, Variables, Data Types
Precedence of Operators, Scope and Lifetime of Variables
Control Statement and Expressions, Decision Making using if statement, Types of if …else block
Switch case Block, Arithmetic Expressions, Evaluation of Expressions, goto statement
Looping, Concept of Loop, For loop, While loop, Do while loop, Jumping in Loop, break and continue statement
Algorithms and Flowchart, Algorithms and Flowcharts (Definitions,Symbols), Characteristics of an algorithm
Arrays and String, Introduction of Array, One - D Array, Two - D Array, Mutlidimensional Array
Dynamic Arrays, Implementing String Variables, String handling Functions
Functions, Concept of Function, User defined Function, System Defined Function, Types of parameter passing in function
Pointers, Need of Pointers, Types of Pointers, Pointer Expression, Arrays of Pointers, Pointers and Functions
Structure and Unions, Need of Structure, Implementing Structure Variable, Arrays of Structure
Structure within Structure, Introduction of Unions, Difference between Structure and Unions
File Handling using 'C', Opening and Closing File, Input / Output operations on File
Random Access to Files, Command Line ArgumentsDynamic Memory Allocation
Concept of Dynamic Allocation, Implementing Malloc and Calloc Functions, Releasing the free space
Storage Classes and Preprocessor, Introduction of Storage Class, Types of Storage Classes
Introduction of Preprocesor, Macro Substitution, File Inclusion
Introduction of Data Structure, Concept of Data Structure, Types of Data Structure, Implementing Stack & Linkedlist
Graphics using C, VDU Basics, Simple library functions
Students will perform Red Hat installation by several different methods. Problematic installations
Troubleshooting, and post-install configuration will be addressed.
Basic Network Terminologies
Virtualisation & OS Setup
Server & Linux Basics
Introduction to HTML, Python & Webhosting
Information Gathering & Social Reconnaissance
Introduction to Bug Crowd & Hackerone
Vulnerability Analysis
Penetration testing Vs Bug Bounty
OWASP Test Cases Check List
Vulnerability Rating Taxonomy (VRT)
SANS Top25 Applications Errors
OWASP CWE Vulnerabilities
Common Attack Pattern Enumeration and Classification(CAPEC)
Common Vulnerabilities & Exposures (CVE) rating
Terms & concepts
Evolution of windows operating system
MSDOS Evolution
The Registry
Registry Hacking
Booting sequence of system
Key Boot Files
Printers
Troubleshoot Common Printer Problems
Installing, Upgrading and Migrating to windows 7
Deploying windows
Configuring Hardware and Applications
Configuring Network connectivity
Configuring Access to resources
Configuring Mobile computing
Monitoring and Maintaining systems that run windows 7
Configuring Backup and Recovery option
Motherboard types
Motherboard components
Computer Components Identification
Assemble and Disassemble Computer Components
Devices Installation and Configuration
Popular CPU Chips
SaaS (according to NIST)
IaaS (according to NIST)
CaaS (according to NIST)
PaaS (according to NIST)
XaaS (according to NIST)
DaaS (according to NIST)
BPaaS
Accountability and responsibility based on service models
Motherboard types
Motherboard components
Computer Components Identification
Assemble and Disassemble Computer Components
Devices Installation and Configuration
Popular CPU Chips
Forensics Science
Computer Forensics
Forensics Readiness
Cyber Crime
Cyber Crime Investigation
Corporate Investigations
Reporting a Cyber Crime
We aim to provide your company with a one stop shop solution for your corporate training requirements. First class training at your company location delivered by experts in their field, hand-picked for businesses.No two clients are the same. We do not believe in the methodology that one size fits for all. We have fixed training modules but customizable modes of training delivery. We are of the understanding that the same module can be delivered to one client by a trainer who only trains seasoned professionals while another client might want the same content to be delivered first by someone who is more into basics and then go on to higher strata concepts. Our mission is to enable corporate companies to increase productivity and performance through their manpower resources.
Experience Required - 0 To 5 Years
Proven UI experience.
Demonstrable UI design skills with a strong portfolio.
Solid experience in creating wireframes, storyboards, user flows, process flows and site maps.
Proficiency in Dreamweaver, Photoshop, Illustrator, InDesign, CorelDraw, or other visual design
Excellent visual design skills with sensitivity to user-system interaction.
Ability to solve problems creatively and effectively.
Up-to-date with the latest UI trends, techniques, and technologies.
wire-framing tools, bootstrap, Responsive HTML
TCP/IP Analysis Checklist
Top Causes of Performance Problems
Get the Latest Version of Wireshark
Capturing Traffic
Opening Trace Files
Processing Packets
GTK Interface
The Icon Toolbar
The Changing Status Bar
Right-Click Functionality
General Analyst Resources
Your First Task When You Leave Class
Introduction to CCNA & Inter networking,
Network Topologies, Network Devices.
Types of Medium
Introduction to LAN & WAN
Forensics Science
Computer Forensics
Forensics Readiness
Cyber Crime
Cyber Crime Investigation
Corporate Investigations
Reporting a Cyber Crime
Networking Devices(Layer1,2,3)
Different types of network layer attacks
Firewall (ACL, Packet Filtering, DMZ, Alerts and Audit Trials)
IDS,IPS and its types (Signature based, Anomaly based, Policy based, Honeypot based)
Design, develop and deploy cloud based solutions using AWS
Understand the core AWS services, uses, and basic architecture best practices
Develop and maintain applications written for Amazon Simple Storage Services (S3), Amazon DynamoDB, Amazon Simple Queue Service (SQS), Amazon Simple Notification Service (SNS), Amazon Simple Workflow Service (SWF), AWS Elastic Beanstalk, and AWS CloudFormation
Computer Components Identification
Assemble and Disassemble
Computer Components
Components in Portable Computers
Devices Installation and Configuration
Characteristics of Cabling and their Connectors
Common IDE, SCSI and Peripheral Devices
Optimize PC Operations Optimization
Determine the Issues that must be
Considered when upgrading a PC
Popular CPU Chips
Types of Memory (RAM)
Types of Motherboards and their Components
Printer Technologies, Interfaces and Options/Upgrades
Troubleshoot Common Printer Problems
Operating System Fundamentals OS Installation
Common Error Codes Interpretation
Networking Capabilities of Windows
Basic Internet Protocols and Terminologies
Procedures for Establishing Internet Connectivity
Experience Required - 0 To 5 Years
Experience with a wide range of AndroidSDK versions, from 4.0 on up.
Experience working with existing app code and refactoring to awesomeness.
Knowledge of a variety of Android devices, from cheap knockoff phones to the latest hotness and everything in between.
An understanding of REST and JSON, and knowledge of how to utilize REST on an Android.
Experience with GitHub and git as a version control tool.
Up-to-date with the latest UI trends, techniques and technologies related to devloping apps
VPN and its types
Tunneling Protocols , Tunnel and Transport Mode
Authentication Header, Encapsulation Security Payload (ESP)
IPSEC Protocol, Suite – IKE PHASE 1, Generic Routing Encapsulation(GRE).
Introduction to Object Oriented Programming, Concept of OOP, Features of OOP
Introduction of 'C++', Structure of 'C++' program, Executing and Debugging a 'C++' Program
C++ Tokens and Type Casting, Keywords and Identifiers, Operators, Constants
Variables, Data Types, Precedence of Operators, Scope and Lifetime of Variables
Classes & Objects, Classes & Object specifiers, Defining data members and member functions
Array of objects, Managing console I/O, 'C++' stream classes, Formatted and unformatted console I/O
Function in 'C++', Call by reference, Return by reference, Function overloading and default arguments
Inline function, Static class members, Friend functions, Virtual Functionns
Constructors and Destructor, Concept of Constructor, Types of Constructors
Memory allocation (new and delete), Usage of destructor
Operator Overloading, Overloading Unary and Binary operators, Overloading using friend function
Inheritance, Types of inheritance, Virtual base classes and abstract base classes
Constructor and destructor in derived class
Working with files, File operations, File pointer and their manipulation, File updation with random access
Exception Handling, Various Exception Handling classes, Implementing try and catch block & thow keyword
Templates, Introduction to Templates, Class templates, function templates and overloading of function templates
Standard Template Library (STL), Run Time Type Identification (RTTI)
Networks
Types of network
Network topology
Networking Standards
Connections for different topologies
Connectors
Professional experience using AWS technology
Hands-on experience programming with AWS APIs
Understanding of AWS Security best practices
Understanding of automation and AWS deployment tools
Understanding storage options and their underlying consistency models
Excellent understanding of at least one AWS SDK
Types of Image graphics
Vector & Scalar graphics
Color modes & resolution options
Using photoshop tools - move tool, marque tool, lasso tool, quick selection, crop tool,
image manipulation tool, brushes, patterns, gradients, pen tool, text tool
Working with layers, grouping & smart objects
Image adjustments
Layer masking, layer clipping
Using blending options
Filetr effects and photoshop actions
Automation tools
Designing a logo
Creating a business card
Operating system
Terms & concepts
Evolution of windows operating system
MSDOS Evolution
The Registry
Registry Hacking
Booting sequence of system
Key Boot Files
Printers
Media & topologies
Networks
Types of network
Network topology
Transmission media
Network devices
Network Security Devices
Twisted Pair Cable Combinations
Crimping RJ-45
Network Troubleshooting with Physical Topology
Layers in OSI Model & its working,
Networking Protocols
TCP/IP Protocol Stack & its associated protocols.
TCP Header, TCP Flags, TCP Port Numbers, TCP 3 way Handshake.
Security protocols and authentication protocols
Network Utility Components for troubleshooting
Networks
Types of network
Network topology
Networking Standards
Connections for different topologies
Connectors
Evolution
Processor printing instruction/specification
Processor generations
Characteristics of Processor
Processor Core Specification
Evolution
Processor printing instruction/specification
Processor generations
Characteristics of Processor
Processor Core Specification
Footprinting Concepts
Footprinting Threats
Footprinting Methodology
Website Footprinting
Email Footprinting
Competitive Intelligence
Footprinting using Google
WHOIS Footprinting
DNS Footprinting
Network Footprinting
Footprinting through Social Engineering
Footprinting through
Footprinting Tools
Footprinting Countermeasures
Footprinting Penetration Testing
Basic browser security settings.
How to restrict site access.
Removing site from security zone.
Secure website detection.
Secure site and browser properties.
Tools: Internet Filtering Software.
Configuring Internet content access.
Activating Content Advisor.
How to deal with cookies.
Using P2P networks securely.
Choosing appropriate browser settings.
Wireless network security features.
Historical perspective
Confusion vs. diffusion
Stream ciphers vs. block ciphers
Keys and key management
Key exchange (peer to peer, peer - keyserver - peer)
Diffie Helman key sharing scheme
Symmetric key cryptography vs asymmetric key cryptography
Trapdoor functions
Whether you’re starting out and need an introduction to a subject, or have taken on a new project or new role and need to build your knowledge and skills in a specialised area, we have the course for you at our place. Each course is taught by subject matter experts who will not only assist you throughout the course but also ensure that correct knowledge is imparted and you are able to apply the essence of the course in your own professional domain. Prompt opts for instructor-led classroom training, where every trainer is trained before he interacts for with the students to be a mentor in building the industrial skills and professional attitude what exactly the industry demands. All our trainers associate as a team in training and building the various skills, hence the students never feel the difference when they are moving between various technologies in their training path.
Selecting data sources for analysis
Eliminating redundant data
Establishing the role of NoSQL
Footprinting Concepts
Footprinting Threats
Footprinting Methodology
Website Footprinting
Email Footprinting
Competitive Intelligence
Footprinting using Google
WHOIS Footprinting
DNS Footprinting
Network Footprinting
Footprinting through Social Engineering
Footprinting through
Footprinting Tools
Footprinting Countermeasures
Footprinting Penetration Testing
Spidering - Scanning websites and web applications
Investigating web security
Advanced manual tools
Module - Repeater | Intruder | Decoder | Comparer
Burpsuite Collaborator Client
Burpsuite Clickbandi
Install and configure servers
Configure server roles and features
Configure Hyper –V
Deploy and configure core network services
Install and administer Active Directory
Create and Manage Group policy
Open The System Unit
Installing The Sound Card
Replace The System Unit Cover
Installing a USB Sound Card in Your Laptop
Quick and Easy Sound Card Problem Solving
How To Revive A Dead Computer
Storage Technology
The Proliferation of Data
The Data Center Evolution
Storage Infrastructure
Evolution of Storage
Storage Systems Architecture
Intelligent Disk Subsystems
Storage Networking Overview
Direct – Attached Storage
Storage Area Networks
Network – Attached Storage
Emerging Technologies
Information Availability
Business Continuity Overview
Backup and Recovery
Local and Remote Replication
Disaster Recovery
Data Center Management
Security and Virtualization
Storage Infrastructure Security
Virtualization Technologies
Configuring Domain Name System (DNS) for Active Directory
Configuring Zones
Configure DNS Server settings
Conigure Zone Transfers and replication
Configuring the Active Directory Infrastructure
Configure a forest or a domain
Configure Trusts
Configure Sites
Configure Active Directory Replication
Configure Gobal Catalogue
Configure Operations Masters
Configuring Active Directory Roles and Services
Configure Active Directory Lightweight Directory Service (AD LDS)
Configure Active Directory Rights Management Service (AD RMS)
Configure the read-only domain controller (RODC)
Configure Active Directory Federation Services (AD FSv2)
Creating and Maintaing Active Directory Objects
Automate Creation of Active Directory Accounts
Maintain Active Directory Accounts
Create and apply Group policy objects (GPOs)
Configure GPO Templates
Deploy and Manage software by using GPOs
Configure account policies
Configure Audit policy using GPOs
Maintaining the Active Directory Enviroinment
Configure Backup and recovery
Perform offline maintenance
Monitor Active Directory
Configuring Active Directory Certificate Services
Install Active Directory Certificate Services
Configure CA server settings
Manage Certificate templates
Manage enroments
Manage certificate revocations
Investigating Computer Crime
Steps to Prepare for a Computer Forensics Investigation
Computer Forensics Investigation Methodology
Layers in OSI Model & its working
Networking Protocols
TCP/IP Protocol Stack & its associated protocols
TCP Header, TCP Flags, TCP Port Numbers, TCP 3 way Handshake.
Security protocols and authentication protocols
Network Utility Components for troubleshooting
Evolution
Processor printing instruction/specification
Processor generations
Characteristics of Processor
Processor Core Specification
OOPS Concept
Inheritance
Distributed fabric layer
Static Classes
Object ID
Metadata
Data/blob
Extended metadata
Policies
Replicas
Access control
Move Around Quickly: Navigation Techniques
Find a Packet Based on Various Characteristics
Build Permanent Coloring Rules
Identify a Coloring Source
Apply Temporary Coloring
Mark Packets of Interest
Types of Image graphics, Vector & Scalar graphics
Color modes & resolution options
Using photoshop tools - move tool, marque tool, lasso tool, quick selection, crop tool,
image manipulation tool, brushes, patterns, gradients, pen tool, text tool
Working with layers, grouping & smart objects
Image adjustments, Layer masking, layer clipping
Using blending options, Filter effects and photoshop actions, Automation tools
Designing a logo, Creating a business card
This class will cover RedHat’s user policies and user/group structure.
During the course of this class students will create users and user groups and customise the users’ working environment.
Hands on labs will work with file and directory permissions including shared directories.
Display Filters
Filter on Conversations/Endpoints
Build Filters Based on Packets
Display Filter Syntax
Use Comparison Operators and Advanced Filters
Filter on Text Strings
Build Filters Based on Expressions
Watch for Common Display Filter Mistakes
Manually Edit the dfilters File
Establish requirements
Maintenance scheduling
Reasons
Storage migration
Online vs. offline migrations
Physical to Virtual (P2V)
Virtual to Virtual (V2V)
Virtual to Physical (V2P)
Establish requirements
Maintenance scheduling
Reasons
Storage migration
Online vs. offline migrations
Physical to Virtual (P2V)
Virtual to Virtual (V2V)
Virtual to Physical (V2P)
Programming language Types and Paradigms.
Computer Programming Hierarchy.
How Computer Architecture Affects a Language ?
Why Java ?, Flavors of Java, Java Designing Goal.
Role of Java Programmer in Industry.
Features of Java Language.
JVM –The heart of Java, Java’s Magic Byte code.
Language Fundamentals.
Retrieving data using the SQL select statement
Restricting and sorting data
Using single row function to customise output.
Reporting aggregated data using the grout function.
Displaying data from multiple tables, Displaying data from multiple tables-II
Using sub queries to solve problems, Using set operators
Manipulating data, Using DDL statements to create and manage tables
Creating other schema objects
Managing objects with data dictionary
Controlling User access, Managing schema objects
Manipulating large data sets, Generating report by grouping related data
Managing data in different time zones, Retrieving data using sub queries
Hierarchical retrieval, Regular expression support
Guided media
Co-axial cable
Twisted pair cables
Fiber optic cables
Getting started with Corel Draw
Introduction to Corel Draw, Features of Corel Draw, Corel Draw Interface
Tool Box, Moving from Adobe Illustrator to Corel Draw, Common Tasks
Drawing and Coloring, Selecting Objects, Creating Basic Shapes, Reshaping Objects
Organising objects, Applying color fills and Outlines, Mastering with Text
Text Tool, Artistic and paragraph text, Formatting Text, Embedding Objects into text
Wrapping Text around Object, Linking Text to Objects, Applying Effects
Power of Blends, Distortion, Contour Effects, Envelopes, Lens effects
Transparency, Creating Depth Effects
Power Clips, Working with Bitmap Commands, Working with Bitmaps
Editing Bitmaps, Applying effects on Bitmaps, Printing
Corel Draw- Web resources, Internet Tool bar, Setting your webpage
Exporting files, Creating buttons with rollover effects
Configuring Addressing and Services
Configure IPv4 and IPv6 addressing
Configure Dynamic Host Configuration Protocol (DHCP)
Configure routing
Configure Windows Firewall with advanced security
Configuring Name Resolution
Configure a Domain Name System (DNS) server
Configure DNS zones
Configure DNS records
Configure DNS replication
Configure name resolution for client computers
Configuring Network Access
Configure remote access
Configure Network Access Protection (NAP)
Configure DirectAccess
Configure Network Policy Server (NPS)
Configuring File and Print Services
Configure a file server
Configure Distributed File System (DFS)
Configure backup and restore
Manage file server resources
Configure and monitor print services
Monitoring and Managing a Network Infrastructure
Configure Windows Server Update Services (WSUS) server settings
Configure performance monitoring
Configure event logs
Gather network data
Title - 1 Introduction to COBOL
Title - 2 Divisions of COBOL
Title - 3 Picture clause characteristics
Title - 4 Editing
Title - 5 Level Structure
Introduction
What is Report writing
Pre – writing activities
Finding main and supportive ideas
Cohesion and Coherence
Generating Ideas
Introduction to Citation
Writing Techniques
Summary writing
Quoting, Paraphrasing and Synthesizing
Citation and styles
Language and style in academic writing
Organize reports to make writing them easier and less time consuming using the report pyramid
Identify the information that should be included in a report and gain the readers’ attention
Present the information, as well as how to be convincing and persuasive when writing reports
Create reports that achieve their desired goal or intended impact
Write informal, semi-formal, and formal reports
Edit the reports you write
Add illustrations to reports
Create a list of references or a bibliography for a report
Create a table of contents
R Introduction
R Reserved Words
Variables and Constants
R Operators
Precedence and Associativity
R Flow Control
R Programming if...else
R ifelse() Function
R Programming for loop
R while Loop
R break & next
R repeat Loop
R Functions
R Programming Function
Function Return Value
R Environment & Scope
R Recursive Function
R Infix Operator
R Switch Function
R Data Structure
R Vectors
R Matrix
R List
R Data Frame
R Factor
R Object & Class
Object and Class
R S3 Class
R S4 Class
R Reference Class
R Inheritance
R Graphs & Charts
R Programming Bar Plot
R Programming Histogram
R Programming Pie Chart
R Box Plot
R Strip Chart
R Advanced Topics
R Programming Plot Function
R Programming Subplot
R Programming Saving Plot
R Programming Color
R Programming 3D Plot
Windows Azure Overview
Windows Azure Architecture
Components of Azure :
Windows Azure Compute 2. SQL Azure 3. The App Fabric
Fabric Controller
Need
Scope and approaches for project formulation
the structure of project report
study and analysis of sample project report
preparation of a project report
Techno- economic feasibility of the project.
Object Oriented Programming (OOPS) concepts and terminology, Advantages of OOPS
Fundamentals of OOPS, Core Java Programming Introduction of Java
What is Java?, How to Get Java, A First Java Program, Compiling and Interpreting Applications
The JDK Directory Structure, Using Eclipse
Data types and Variables, Primitive Datatypes, Declarations, Variable Names
Numeric Literals, Character Literals, String formatting and Parsing, String Literals
Arrays,Non-Primitive Datatypes, The Dot Operator
Methods, Calling Methods, Defining Methods, Method Parameters Scope, Why all the static?
Operators and Expressions, Expressions, Assignment Operator, Arithmetic Operators
Relational Operators, Logical Operators, Increment and Decrement Operators
Operate-Assign Operators (+=, etc.), The Conditional Operator, Operator Precedence
Implicit Type Conversions, The Cast Operator, Strict typing, Type conversion
Control Flow Statements, Conditional (if) Statements, Data types and Variables
Adding an else if, Conditional (switch) Statements, while and do-while Loops, for Loops
The continue Statement, The break Statement
Introduction to Object-Oriented Programming, Classes and Objects, Fields and Methods
Encapsulation, Access Control, Inheritance, Polymorphism
Using Java Objects, Printing to the Console, printf Format Strings, StringBuilder and StringBuffer
Methods and Messages, toString, Parameter Passing, Comparing and Identifying Objects, Destroying Objects
Inheritance in Java, Casting, Method Overriding, Polymorphism, super keyword, The Object Class
Packages, The import Statement, Static Imports, CLASSPATH and Import, Defining Packages, Package Scope
Interfaces and Abstract Classes, Separating Interface and Implementation, Defining Interfaces
UML Interfaces and Realization, Implementing and Extending Interfaces, Runnable Threads, Abstract Classes
Lambda Built-in Functional Interfaces, java.util.function package, Use primitive versions of functional interface
Use binary versions of functional interface, Use the UnaryOperator interface
Exception Handling, Exceptions Overview, Catching Exceptions, The finally Block, Exception Methods
Declaring Exceptions, Defining and Throwing Exceptions, Errors and Runtime Exceptions, Assertions
The Collections Framework, The Set Interface, Set Implementation Classes, The List Interface
List Implementation Classes, The Map Interface, Map Implementation Classes, Utility classes, Generics
Inner Classes, Member Classes, Local Classes, Anonymous Classes, Instance Initializers, Static Nested Classes
Introduction to Threads, Non-Threaded Applications, Threaded Applications, Creating Threads
Thread States, Runnable Threads, Coordinating Threads, Interrupting Threads, Runnable Interface ,ThreadGroups
Swing, Swing GUI Components, Using Swing API
Applet, Life Cycle of an Applet
JDBC, Creating a Database and tables, Getting Information from Database, Obtaining Result Set Information
Connecting a Java program to a Database, Prepared Statements & Statement Classes in Java
Inserting, Updating & Deleting Table data
Servlets, What is a web application, Java Servlets, What is a Servlet, Servlet Lifecycle, Servlet Context
Session management, Building the first Servlet, Deploying the Servlet
JSP, What is a JSP Page, Basic HTML Tags, JSP Tag library, JSP Page Life-cycle
Creating the first Dynamic web page using JSP, MVC architecture, 3-tier architecture
The need for a strategic approach to managing human resources
Historical development of HRM and strategic HRM
Basic concepts of strategic management
The strategic contributions of HRM
The formulation and implementation of HR strategies
Integration of HRM and business strategy
Strategic workforce planning and staffing
Strategic human resource development
Strategic performance management
Strategic career and reward practices
Strategic approaches to organisational culture and employee relations
Strategic HRM retrospect and prospects
Strategic approach to HRM
HR Planning & Recruitment
Strategic Staffing / Selection : Overview
Strategic Staffing / Selection : Diversity
Strategic Employee Training and Development
Strategic Retention
Strategic Performance Management
Strategic Compensation & Benefit
Mergers & Acquisitions
Downsizing & SHRM
Overview of Microsoft Virtualization
Overview of System Center 2012 R2 Components
Evaluating Current Environment for Virtualization
Extending Virtualization to the Cloud
Selecting the Appropriate Virtualization Method
Accessing the Environment by Using MAP
Types of memory
Error Handling in RAM
RAM
Types of RAM
Speed Specifications
Physical Differentiation among RAM
Types of ROM
Distinguish between Trainer and Teacher
Training cycle module: Analyzing the Needs (TNA)
Training Need Identification (TNI), Course Planning
Effective Delivery of Training
Best Training Practice
Precise Instructions Module
Using feedback as a tool for improvement
360 degree personality analysis of a trainer
Using varieties of ice-breakers as adult learning principles
8 Qualities of an Effective Trainer Listening skills of a trainer
Voice Modulation Techniques for effective training
Using humor, ice-breakers, games, stories to create interest in training.
Classroom & Presentation skills
Statutory complaince issues
Evaluation and assessment method
Introduction Graphical User Interface (GUI),
Programming Language (Procedural,
Object Oriented, Event Driven),
The Visual Basic Environment, How to use VB
complier to compile / debug and run the programs.
History ,Features, Setting up path
Working with Python, Basic Syntax
Variable and Data Types, Operator
Verbal Communication
Listening Skills
Non – verbal Communication
Conference cal Etiquette
Team Meeting Etiquette
Overview of Network Scanning
CEH Scanning Methodology
Scanning Beyond IDS
Banner Grabbing
Scan for Vulnerability
Draw Network Diagrams
Prepare Proxies
Scanning Pen Testing
Interview Preparation
Common Interview Questions
What Employers Want
Attitude and Effort
Body Language
Research
The Mock Interview
Phone Interviews
Behavioral Interviews
Closing the Interview
Thank You Notes
Guided media
Co-axial cable
Twisted pair cables
Fiber optic cables
Deploying and Managing Windows Server 2012
Introduction to Active Directory Domain Services
Managing Active Directory Domain Services Objects
Automating Active Directory Domain Services Administration
Implementing IPv4
Implementing DHCP
Implementing DNS
Implementing IPv6
Implementing Local Storage
Implementing File and Print Services
Implementing Group Policy
Securing Windows Servers Using Group Policy Objects
Implementing Server Virtualization with Hyper-V
Communication Process
Building Confidence
Leadership
Nonverbal Communication
Group Discussion Skills
Effective Delivery
Informative Speaking
Persuasive Speaking
Power Point and Technology
Social And Interactional Skills
Basic Writing Skills
Active Listening
Problem-Solving Models
Speaking In Professional Contexts
Effective Delivery
How To Speed Up Any Desktop Or Laptop Computer
Make Sure You Have Enough Memory
Clean Up Your Desktop
Make Sure You Have a Fast Enough CPU Chip
Uninstall Those Unneeded Applications To Free Up Memory
Get And Keep Your BIOS Fine Tuned
Patch Your Computer To Keep It Updated
Keep Your Antivirus Up to Date and Scan Your Disks
Make Sure Your Antivirus/Internet Security Programs Run at Night
Make Sure You Have no Spyware
Stop Unneeded Startup Programs
Defragment Your Hard Drive Regularly
Remove Those Unneeded Files
Move the Page File to Another Partition
Stop File Indexing
Turn Off Animations
Stop Unneeded Services
Turn Off Fancy Desktop Backgrounds, and Screensavers
ReadyBoost for Vista Speeds Boot Times and Other Operations Change Your PC Use Habits
Study with us from most places in the world, provided you're proficient in English and have a PC with broadband internet connection. We have always been inherently flexible with this mode of training.We offer two streams of content for Online Training in ALL Courses. For experienced IT professionals – aimed to update knowledge of the existing IT professionals interested to obtain a knack of latest developments in technology. For freshers – intended to teach the required skills to the freshers, where in the focus shall begin with building a strong understanding of the basics of technology and end with a complete guidance on its latest trends. Online training is known to be called as CBT (Computer based Training), IBT (Internet based training), WBT (Web-based training), eLearning across the globe. Online Training is a Software-based teaching program installed on computer network or a computer. It is a procedure of delivering training through an electronic medium or internet without the presence of instructor or trainer.
Installing, Upgrading and Migrating to windows 7
Deploying windows
Configuring Hardware and Applications
Configuring Network connectivity
Configuring Access to resources
Configuring Mobile computing
Monitoring and Maintaining systems that run windows 7
Configuring Backup and Recovery options
Searching and Seizing Computers without a Warrant
Searching and Seizing Computers with a Warrant
The Electronic Communications Privacy Act
Electronic Surveillance in Communications Networks
Introduction to Inter networking
OSI & TCP/IP Stack
IP Addressing, Subnetting, VLSM
Configuring Router & Switch
IP Routing
Switching, VLAN, VTP
WAN
Basic Network Security & ACL
IP Services & Managing Cisco IOS
Wireless Technology
Firewalls & VPN
Troubleshooting
Data models: key value, graph, document, column–family
Hadoop Distributed File System
HBase
Hive
Cassandra
Hypertable
Amazon S3
BigTable
DynamoDB
MongoDB
Redis
Riak
Neo4J
Getting started with Corel Draw
Introduction to Corel Draw, Features of Corel Draw, Corel Draw Interface
Tool Box, Moving from Adobe Illustrator to Corel Draw, Common Tasks
Drawing and Coloring, Selecting Objects, Creating Basic Shapes, Reshaping Objects
Organising objects, Applying color fills and Outlines, Mastering with Text
Text Tool, Artistic and paragraph text, Formatting Text, Embedding Objects into text
Wrapping Text around Object, Linking Text to Objects, Applying Effects
Power of Blends, Distortion, Contour Effects, Envelopes, Lens effects
Transparency, Creating Depth Effects
Power Clips, Working with Bitmap Commands, Working with Bitmaps
Editing Bitmaps, Applying effects on Bitmaps, Printing
Corel Draw- Web resources, Internet Tool bar, Setting your webpage
Exporting files, Creating buttons with rollover effects
Overview of Network Scanning
CEH Scanning Methodology
Scanning Beyond IDS
Banner Grabbing
Scan for Vulnerability
Draw Network Diagrams
Prepare Proxies
Scanning Pen Testing
IP Addressing Basis,
Network & Host bits
IP Range & Reasons
NID & BID
Gateway IP
Classes in IP Addressing,
Network & Host Bit calculation for each class
Private Addressing,
Subnet Masks & Subnetting,
VLSM.
Introduction to the UNIX Operating System
The Directory Structure, The vi editor, Unix Communications
Utilities and Filters, I/O redirection
Shells and controlling child processes
C-shell Shortcuts, Intro to C-shell Programming
Variables in C-shell Programming, Conditionals in C-shell Programming
Loops in C-shell Programming, Bourne Shell Programming Basics
The emacs editor, Stream Editing - sed, System Administration Intro
Text processing: nroff/troff
Text processing : LaTeX - Comparing to nroff /troff
Introduction – Web Programming
HTML and Javascript
Difference between Asp and Asp .net
ASP.Net Basics
ASP.Net Lifecycle and Lifecycle events
State Management techniques of ASP.Net
Session
ViewState
Theme and Styles
Server Controls
Validation Controls
State Management
Cookies
Application
Hidden Fields
User Control
Creation of user control
Usages of user control
Custom Control
Creation of Custom Control
Usages of Custom Control
Grid view
ASP.Net Repeater control
File Upload in ASP.net
Localization and globalization
ASP.Net Security
THEMES and Master Pages
APP.config
Global.asax
Basics of AJAX
Understating the Three tier Architecture
ADO .Net and Databound Controls
Configuring File – Web.Config.
Caching
Communication between various layers
Authentication & Authorization
Installing Windows
Preparing the Windows 7 Installation Source
User and Group Management
Password Reset Disk
Parental Control
User Profiles Management
System Images Capturing
Virtual Hard Disk Files
Application Compatibility
Windows Aero and Mouse operations
Switching Users
Disks and Device Drivers
Network Settings
IPv4/IPv6 Configuration
Network Configuration
Folder and File Access
BranchCache
Printers in Windows
Windows 7 Desktops Security
Windows 7 Client Computers
Mobile Computing and Remote Access in Windows
Types of memory
Error Handling in RAM
RAM
Types of RAM
Speed Specifications
Physical Differentiation among RAM
Types of ROM
WAN Topologies
Standard IP based Switching
CEF based Multi-Layer switching, MPLS Characteristics
Frame Mode MPLS Operation, MPLS VPN
Installation
User and Group Administration
Redhat Infrastructure
Redhat Package Manager
The Linux kernel
Rescue modes
Network Services
Security
X Window System
Routing, Forwarding, and Firewalls
File System Management
Sensitive Data Disclosure from GitHub, Google & other listings
Identifying Web Technologies & Frameworks
Map out the target
Website based enumeration
Tool based enumeration
Public disclosure
Hunt for Sensitive Directories
Subdomain Analysis
What is software Testing?
Why testing?, Defects, Failures
Principles & psychology of testing
Introduction
PHP Fundamentals
PHP Arrays
PHP Functions
PHP Forms
PHP Cookies & PHP Sessions
PHP Strings Handling
Basic MySQL, Simple SQL
Advanced SQL query building
SQL Functions
Importing , Exporting CSV data
Advanced MySQL Joins ,Full Text Search
Understanding of stateless and loosely coupled distributed applications
Familiarity developing with RESTful API interfaces
Basic understanding of relational and non-relational databases
Familiarity with messaging & queuing services
Introduction
Search Engine Optimisation (SEO)
Social Media
Content Marketing
Email Marketing
Mobile Marketing
Pay per click (PPC)
Website conversion rate optimisation
Digital Analytics
Marketing Automation
Programmatic Buying
Tools – Google analytics : Specific Techniques and reports
Tools – Googe dwords fundamentas
Tools – Facebook Marketing & Advertisement
Tools – Youtube and Video Marketing
Tools – Twitter Advertising
Online Marketing Strategy
Types of memory
Error Handling in RAM
RAM
Types of RAM
Speed Specifications
Physical Differentiation among RAM
Types of ROM
Linux file systems, RedHat’s directory hierarchy, and system start up configuration will be reviewed.
Configuration of different run levels and start up services will be discussed in detail.
Introduction to Hadoop administration
Hadoop design consideration Hadoop design consideration
Monitoring
PIG
SQOOP
HIVE
HBASE
Backup
Optimization
Troubleshooting
Security
Introduction to Accounting
Fundamentals of Accounting
GAAP – Rues of Accounting
Roles of FASB and SEC
Financial Statements
Accounting Cycles - Recording Transactions
Process of Accounting Cycles
Self Balancing Ledgers
Accounting for a Merchandising company
Short – term financial assess
Inventories
Long – term Assets – Property
Pant & Equipped and Intangible assets
Liabilities – Current and Long term
Stock holders Equity Contributed capital
Statement of Cash flows
Cash flow Analysis
Cash & fund flow Assessment
Financial Statement Analysis
Budgetary control
Standard costing
What is Incident Response?
Incidents and responses.
Trojan attack.
Boot sector virus attack.
Corrupted registry.
Automatic running of CD-ROM (autorun.inf).
Deploying and managing Exchange server 2013
Planning and configuring Mailbox Servers
Managing recipient objects
Planning and deploying client Access Servers
Planning and configuring client Messaging connectivity
Planning and Configuring Message Transport
Planning and Implementing High Availability
Planning and Implementing Disaster Recovery
Planning and Configuring Message Security Options
Planning and Configuring Administrative Security and Auditing
Monitoring and Troubleshooting Exchange Server 2013
IP Addressing Basis,
Network & Host bits
IP Range & Reasons
NID & BID
Gateway IP
Classes in IP Addressing
Private Addressing,
Subnet Masks & Subnetting,
VLSM.
Network & Host Bit calculation for each class
Experience Required - 0 To 5 Years
Skilled in CORE PHP, WORDPRESS, and ANY MVC FRAMEWORK ( *YII2,* *LARAVEL, ZEND and CODEIGNITER* )
Provide high quality solution designs/work packages from which development teams can understand and deliver
Be able to adapt, flex and change to meet new and conflicting work priorities at short notice.
Basic Under stand with HTML5,CSS3,Bootstrap
Good Knowledge With REST API
Good Knowledge to JQUREY,AJAX
Deploying and Managing Windows Server 2012
Introduction to Active Directory Domain Services
Managing Active Directory Domain Services Objects
Automating Active Directory Domain Services Administration
Implementing IPv4
Implementing DHCP
Implementing DNS
Implementing IPv6
Implementing Local Storage
Implementing File and Print Services
Implementing Group Policy
Securing Windows Servers Using Group Policy Objects
Implementing Server Virtualization with Hyper-V
Introduction to Cisco Router & Switch.
Internal & External components of Cisco Router.
Starting up with a Router & Switch.
The Command-Line Interface.
Configuration of Router & Switch.
LED signalling for routers & switches
Introduction
Declaring Variables, Writing Executable Statements
Interacting with Oracle Server, Writing Control Structures
Working with Composite Data Types, Writing Explicit Cursors
Writing Implicit Cursors, Handling Exceptions
Creating Procedures, Creating Functions
Managing Subprograms, Creating Packages
More Package concepts, Oracle supplied Packages
Manipulating Large Objects, Creating Database Triggers
More Trigger concepts, Managing Dependents
RPM, RedHat’s package management system will be discussed and demonstrated in detail.
Student knowledge of software installation, removal, and updating will be verified with hands on labs for these tasks.
Introduction to Ethical Hacking
Footprinting and Reconnaissance
Scanning Networks
Enumeration
System Hacking
Trojans and Backdoors
Viruses and Worms
Sniffers
Social Engineering
Denial of Service
Session Hijacking
Hacking Webservers
Hacking Web Applications
SQL Injection
Hacking Wireless Networks
Hacking Mobile Platforms
Evading IDS, Firewalls, and Honeypots
Cryptography
Penetration Testing
Security Services for E-mail-attacks possible through E-mail
Establishing keys, Privacy, Authentication of the source
Message Integrity, Non-repudiation
Pretty Good Privacy-S/MIME.
Clickjacking
Missing SPF/DMARC Record
Open Redirection
Lack of Email Notification & Verification
Mail Server Misconfiguration
Missing HTTP Only Cookie Flag
No Rate Limiting
Captcha Bypass
Missing Authentication
Parameter Pollution
Logical or Physical Network Topologies
Networking Standards
Characteristics of Different Types of Cables
Different media Connectors and Describetheir uses
Purposes, Features and Functions ofNetwork Components
General Characteristics of the Differentwireless technologies
Different Network Protocols
Classfull IP and Their Subnet Masks
Subnetting
Private and Public network addressing schemes
WAN Technologies
Security protocols and authentication protocols
Benefits and characteristics of using a firewalland proxy service
Main characteristics and purpose of extranetsand intranets
Antivirus software
Fault Tolerance
Network Utility to Troubleshoot Networks
Impact of modifying, adding or removingnetwork services
Network Troubleshooting with Physical Topology
Working capital assessment
Capital budgeting
Product costing and cost consciousness
Financial ratios and their significance
Break-even analysis
Credit institutions and financing procedures.
Books of accounts, financial statements & fund flow analysis.
Windows 7, Configuring (70-680)
Windows Server 2008 Active Directory, Configuring (70-640)
Windows Server 2008 Network Infrastructure, Configuring (70-642)
Windows Server 2008 Applications Infrastructure, Configuring (70-643)
Windows Server 2008, Enterprise Administrator (70-647)
Hard disk drive working
Advanced disk drive
Floppy drive
Zip drive
Tape drives
Flash memory
CD/DVD drives
Advanced digital storag
Characteristics of Effective Team
Essentias of Effective Team
Activity Team Trust
Activity Team Shape up
Handling Team Dynamics
Experience Required - 0 To 5 Years
Provide high quality solution designs/work packages from which development teams can understand and deliver.
Help to define and ensure adherence to standards and methods for design and development for the .NET environment
Be able to adapt, flex and change to meet new and conflicting work priorities at short notice.
Take responsibility and accountability in ensuring solutions are fit for purpose, scalable and modern.
Good Knowledge With Form Controls.
Network Attached Storage (NAS)
Direct Attached Storage (DAS)
Storage Area Network (SAN)
Different access protocols
Protocols and applications
Management differences
Have Your PC health Assessed for Free at PC Pitstop
How To Upgrade Your Graphics Card
Installing The Graphics Card In The System Unit
AGP Graphics Card
Graphics Card Problem Solving
Nothing on the Monitor
Monitor Works But No Display
Monitor Works But Poor Display
Easily Installing Your New Hard Drive
Repairing The Hard Drive, Hardware And Software
Title - 6 Data Movement verb: MOVE
Title - 7 Arithmetic Verbs
Title - 8 Input and Output Verbs
Title - 9 Corresponding Options
Title - 10 Programs using Arithmetic Verbs
Hard disk drive working
Advanced disk drive
Floppy drive
Zip drive
Tape drives
Flash memory
CD/DVD drives
Advanced digital storag
HTML Elements, HTML Attributes, HTML Headings, HTML Paragraphs
HTML Formatting, HTML Fonts, HTML Styles, HTML Links
HTML Images, HTML Tables, HTML Lists, HTML Forms, HTML Frames
HTML Iframes, HTML Colors, HTML Colornames, HTML Colorvalues
HTML Quick List, HTML Layout, HTML Doctypes, HTML Head
HTML Meta, HTML Scripts, HTML Entities, HTML URLs, HTML URL Encode
HTML Media, HTML Audio, HTML Object, HTML Video, HTML YouTube, HTML Media Tags
HTML5 Introduction, HTML5 New Elements, HTML5 Video, HTML5 Video/DOM
HTML5 Audio, HTML5 Drag and Drop, HTML5 Canvas, HTML5 SVG, HTML5 Canvas vs. SVG
HTML5 Geolocation, HTML5 Web Storage, HTML5 App Cache, HTML5 Web Workers
HTML5 SSE, HTML5 Tags
Introduction to Cisco Router & Switch.
Internal & External components of Cisco Router.
Starting up with a Router & Switch.
The Command-Line Interface.
Configuration of Router & Switch.
LED signalling for routers & switches
Hard disk drive working
Advanced disk drive
Floppy drive
Zip drive
Tape drives
Flash memory
CD/DVD drives
Advanced digital storage
Introduction, History, Features, Setting up path, Working with Python, Basic Syntax
Variable and Data Types, Operator, Conditional Statements, Looping
Control Statements, break, continue, pass
String Manipulation, Accessing strings, Basic Operation, String slices, Functions and methods
Lists - Accessing list, Operations, Working with lists, Function and Methods
Tuple - Accessing tuples, Operations, Working with lists, Function and Methods
Dictionaires - Accessing values in dictionaries, Working with dictionaries, Properties, Functions
Functions, Defining a function, Calling a function, Types of functions, Function Arguments
Anonymous functions, Global and local variables
Modules, Importing module, Math module, Random module, Packages, Composition
Input-Output, Printing on screen, Reading data from keyboard, Opening and closing file
Reading and writing files
Exception Handling, Exception, Except clause, Try ? finally clause, User Defined Exceptions
OOPs concept, Class and object, Attributes, Inheritance, Overloading, Overriding, Data hiding
Regular expressions, Match function, Search function, Matching VS Searching, Modifiers, Patterns
CGI - Introduction, Architecture, CGI environment variable, GET and POST methods, Cookies, File upload
Database - Introduction, Connections, Executing queries, Transactions, Handling error
Networking, Socket, Socket Module, Methods, Client and server, Internet modules
Multithreading, Thread, Starting a thread, Threading module, Synchronizing threads
Multithreaded Priority Queue
GUI Programming, Introduction, Tkinter programming, Tkinter widgets, Sending email
Network Devices
Network Security Devices
Twisted Pair Cable Combinations
Crimping RJ-45
Network Troubleshooting with Physical Topology
If, If- else, Nested if-else,
Stages & models in SDLC Verification, Validation, Process wars, System tests DevOps
DevOps
Windows Azure Web Role
Creating a cloud website using web role
Configuring Web role
Understanding Dev Fabric
Multi-instance role running in Dev Fabric
Debugging applications in Dev Fabric
Admin : Create a hosted service through Azure portal
Admin : Deploying the created application on the REAL WINDOWS AZURE CLOUD
Admin : Changing the configuration at runtime
Admin : Managing the hosted services
Admin : Upgrading the Hosted Services
DNS Overview
DNS Packet Structure
DNS Queries
Filter on DNS Traffic
Analyze Normal/Problem DNS Traffic
Properties of cryptographic hash functions
Merkle Damgard construction
md family
sha family
Digital signatures
sha3
Why do I need to worry about my computer's security?
Introduction
Hardening of Operating System
Updating the system and configuring the updates
Disable unnecessary services
Strong password creation
Deployment of antivirus and firewall
Disable guest account access
"Make Private" folders
Desktop Security:
What is file sharing?
Types of file sharing
How to share folder?
Configuring shared folder permissions.
Hiding files and folders.
File sharing tips.
File downloading tips.
How to backup data and restore?
How to encrypt and decrypt files?
How to kill suspect processes?
One-to-one delivery of training may best meet the learning needs of individuals.The training required will often be given on a one-to-one basis that provides hands-on experience,i.e.,individual training. The training is scheduled normally at a time that best suites you, we offer regular training classes (day time classes), weekend training classes, and fast track training classes. We are mainly focused on revolutionizing learning by making it interesting and motivating. we provide range of career oriented courses for different segments like students, job seekers and corporate citizens.
Digital Data
Types of Digital Data
Rules of Evidence
Electronic Devices: Types and Collecting Potential Evidence
Digital Evidence Examination Process
Electronic Crime and Digital Evidence Consideration by Crime Category
Deploying Servers
Deploy images by using Windows Deployment Services
Configure Microsoft Windows activation
Configure Windows Server Hyper-V and virtual machines
Configure high availability
Configure storage
Configuring Remote Desktop Services
Configure RemoteApp and Remote Desktop Web Access
Configure Remote Desktop Gateway (RD Gateway)
Configure Remote Desktop Connection Broker
Configure and monitor Remote Desktop resources
Configure Remote Desktop licensing
Configuring a Web Services infrastructure
Configure Web applications
Manage Web sites
Configure a File Transfer Protocol (FTP) server
Configure Simple Mail Transfer Protocol (SMTP)
Manage the Web Server (IIS) role
Configure SSL security
Textboxes, Frames, Check Boxes ,
Option Buttons, Images, Setting a Border &Styles,
The Shape Control, The line Control,
Working with multiple controls and their properties,
Designing the User Interface, Keyboard access, tab controls,
Default & Cancel property, Coding for controls.
Enumeration Concepts
NetBIOS Enumeration
SNMP Enumeration
UNIX/Linux Enumeration
LDAP Enumeration
NTP Enumeration
SMTP Enumeration
DNS Enumeration
Enumeration Concepts
NetBIOS Enumeration
SNMP Enumeration
UNIX/Linux Enumeration
LDAP Enumeration
NTP Enumeration
SMTP Enumeration
DNS Enumeration
How to design cloud services
Database concepts
Planning and design
Familiarity with architectural trade-off decisions (high availability vs. cost, Amazon Relational Database Service (RDS) vs. installing your own database on Amazon Elastic Compute Cloud (EC2))
Amazon S3, Amazon Simple Workflow Service (SWF), and Messaging
DynamoDB, AWS Elastic Beanstalk, AWS CloudFormationv
Elasticity and scalability
Introduction to SQL constructs, Basic Structure, DDL Commands, DML Commands
Simple Queries, Nested Queries, Aggregate Functions, Clauses, Triggers and Views
Joining Oracle tables, Equi join, Outer Join, Hiding joins by creating views
SQL access methods, Merge join, Hash Join, Nested Loop join
Advanced SQL operators, Using IN, NOT IN, EXISTS and NOT EXISTS
Between operator, EXISTS clause, Using wildcards in queries (LIKE operator)
Subqueries, Correlated subqueries, Non - correlated subqueries
SQL Tuning - Introduction to rule based optimization, Introduction to cost based optimization
Collecting table and index statistics, Using column histograms, Changing the default optimizer modes
Using TKPROF, Using SQL*Trace, SQL reusability within the library cache
Table high water mark, Table striping and table partitions
Choosing the correct data stores based on your data characteristics
Moving code to data
Implementing polyglot data store solutions
Aligning business goals to the appropriate data store
Network Devices
Network Security Devices
Twisted Pair Cable Combinations
Crimping RJ-45
Network Troubleshooting with Physical Topology
Shell Basics, Types of shells, Shell functionality
Environment, Writing first script
Writing script & executing basic script
Debugging script, Making interactive scripts
Variables (default variables)
Mathematical expressions, Conditional statements
If-else- elif, Test command
Logical operators-AND,OR,NOT, ase –esac. Loops
While, For, Until, Break & continue
Command line arguments
Positional parameters
Set & shift
IFS, Break & continue
Functions & file manipulations
Processing file line by line
Functions, Regular Expression & Filters
What is regular expression
Grep,cut ,sort commands
Grep patterns, SED & AWK, Processes
Concept of process in Unix
Background processes
Scheduling processes -At, batch & Cron
Misc, Trapping signals
String substitutions / manipulations
System Hacking
Network Hacking
Email hacking
Website Hacking
Wireless Hacking
Web-Application Hacking
Server Hacking
Bluetooth Hacking
Mobile Hacking
This training is delivered by our organisations, IT consultants at our workplace that includes the industrial training. The course will be taken exclusively by the employees of the organisation. Students who are willing to visit our company, know our work culture, learn about technologies that are being implemented and other things can choose this training. Along with this will be the Internship training where students who are pursuing their degree can opt for training in various domains and get trained. After training, they can attend interviews with us and get hired as interns which will further proceed to working with us in our projects.
Mapping data to the programming framework
Connecting and extracting data from storage
Transforming data for processing
Subdividing data in preparation for Hadoop MapReduce
Configuring Domain Name System (DNS) for Active Directory
Configuring Zones
Configure DNS Server settings
Conigure Zone Transfers and replication
Configuring the Active Directory Infrastructure
Configure a forest or a domain
Configure Trusts
Configure Sites
Configure Active Directory Replication
Configure Gobal Catalogue
Configure Operations Masters
Configuring Active Directory Roles and Services
Configure Active Directory Lightweight Directory Service (AD LDS)
Configure Active Directory Rights Management Service (AD RMS)
Configure the read-only domain controller (RODC)
Configure Active Directory Federation Services (AD FSv2)
Creating and Maintaing Active Directory Objects
Automate Creation of Active Directory Accounts Maintain Active Directory Accounts
Create and apply Group policy objects (GPOs)
Configure GPO Templates
Deploy and Manage software by using GPOs
Configure account policies
Configure Audit policy using GPOs
Maintaining the Active Directory Enviroinment
Configure Backup and recovery
Perform offline maintenance
Monitor Active Directory
Configuring Active Directory Certificate Services
Install Active Directory Certificate Services Configure CA server settings
Manage Certificate templates
Manage enroments
Manage certificate revocations
Information at Hand Before System Hacking Stage
System Hacking: Goals
CEH Hacking Methodology (CHM)
CEH System Hacking Steps
Escalating Privileges
Executing Applications
Hiding Files
Covering Tracks
Penetration Testing
NAT
PAT
Subnetting/Supernetting
VLAN and VLAN tagging
Network port configurations
Switching and routing in physical and virtual environments
Configure an Amazon Machine Image (AMI)
Programming with AWS APIs
Path traversal
Information Disclosure
Information Exposure Through an Error Message
Information Exposure Through Debug Information
Privilege Escalation
Improper Access Control
Improper Authentication
Disallowed Robots file Access
Routing Basics
Managing static & dynamic routes
Configuring static IP Routing.
Introduction to Dynamic Routing using RIP.
Managing & Configuring OSPF & EIGRP.
Using Same & Different AS numbers.
Avoiding routing loops using Split Horizon, Route poisoning.
BGP Configuration .
Planning Network and Application Services
Plan for name resolution and IP addressing
Design for network access
Plan for Remote Desktop Services
Design core identity and access management components
Design Active Directory forests and domains
Design the Active Directory physical topology
Design the Active Directory administrative model
Design the enterprise-level group policy strategy
Designing Support identity and access management components
Plan for domain or forest migration, upgrade, and restructuring
Design the branch office deployment
Design and implement public key infrastructure
Designing for business continuity and data availability
Design for software updates and compliance management
Design the operating system virtualization strategy
SSL/TLS Basic Protocol, Computing the keys
Client authentication, PKI as deployed by SSL Attacks fixed in v3
Exportability-Encoding-Secure Electronic
Transaction (SET), Kerberos.
Installing the Hyper-V Server Role
Managing Hyper-V
Configuring Hyper-V Settings
Hyper-V Host Storage and Networking
Installing the Hyper-V Server Role
Configuring Hyper-V Settings
Accessing and Managing Hyper-V Remotely
Introduction To Network Security
Virtual Private Networks
MPLS And MPLS VPN
E-Mail Security
Web Security
Incident And Incident Response
Initial Response And Forensic Duplication
Storage And Evidence Handling
Network Forensics
Systems Investigation And Ethical Issues
Mobile And Digital Forensics
Security Framework For Mobile Systems
Mobile Phone Forensics
Introduction To Digital Forensics
Analysis Of Digital Forensic Techniques
Mobile And Wireless Security
Mobile Security
Securing Wireless Networks
Adhoc Network Security
V-Rfid Security
Malware Analysis
Implementationof Covert Channel
Virus Design And Its Implications
Malware Design Using Open Source
Virus And Worm Analysys
Penetration Testing And Vulnerability Assessment
Foot Printing & Social Engineering
Scanning & Enumeration
System Hacking
Sniffers & Sql Injection
Myths Of Information Security Management
Information Security Assessments
Security Management Concepts And Principles
Configuration Management
Security Management Planning
Risk Assessment & Security Audit
Data Collection
Data Analysis
Risk Assessment
Security Audit Process
Storage Management & Security
Storage Area Networking
Backup And Recovery Mechanisms
Storage Security
Storage Infrastructure Management
Cloud Computing Fundamentals
Cloud Applications
Securing The Cloud
Virtualization Security
Cloud Security Management
Fundamentals Of Cyber Security
Issues In Cyber Security
Intellectual Property Rights
Procedural Issues
Legal Aspects Of Cyber Security
Introduction to SQL constructs, Basic Structure, DDL Commands, DML Commands
Simple Queries, Nested Queries, Aggregate Functions, Clauses, Triggers and Views
Joining Oracle tables, Equi join, Outer Join, Hiding joins by creating views
SQL access methods, Merge join, Hash Join, Nested Loop join
Advanced SQL operators, Using IN, NOT IN, EXISTS and NOT EXISTS
Between operator, EXISTS clause, Using wildcards in queries (LIKE operator)
Subqueries, Correlated subqueries, Non - correlated subqueries
SQL Tuning - Introduction to rule based optimization, Introduction to cost based optimization
Collecting table and index statistics, Using column histograms, Changing the default optimizer modes
Using TKPROF, Using SQL*Trace, SQL reusability within the library cache
Table high water mark, Table striping and table partitions
Basics of PL/SQL - Introduction, Overview and benefits of PL/SQL, PL/SQL architecture
PL/SQL wrapper utility, PL/SQL Structures, Simple blocks, Control structures
PL/SQL records, Declaring Variables and Constants, Loops in PL/SQL, Executing a PL/SQL Block
PL/SQL tables, Defining PL/SQL tables, Reasons to use PL/SQL tables, Populating a PL/SQL table
Retrieving from a PL/SQL table, Triggers in PL/SQL, Triggers and database events
Defining a trigger, Timing a trigger, Enabling and disabling a trigger
Stored procedures and functions, Basics of stored procedures, Basics of functions
Defining stored procedures & functions, Function and stored procedures prototypes
Passing arguments to functions and stored procedures, Recompiling functions and stored procedures
This class will cover configuration of the Linux kernel, Red Hat kernel upgrade procedures,
Control and configuration of kernel modules,
Discussion of the /proc file system,
Understand how it can be used to change the operation of certain kernel configuration aspects on the fly without rebooting the OS
Variables, Variables Public, Private, Static, Constants, Data Types,
Naming rules/conventions, Constants, Named & intrinsic,
Declaring variables, Scope of variables, Val Function,
Arithmetic Operations, Formatting Data.
Key Terms
Image quality of monitor
Evolution of Displays
Video technologies
Types of monitor
Resource management – men, material, money, and machines,
Personnel management
Office management
E-Commerce
For, While , Nested loops,
Basic Networking Concepts & OSI Reference
Model
Function of Ethernet
Network Security
Wireless Network Technology
Ethernet Switch Configuration
Subnetting
Routers and Router Configuration
Different WAN Technologies
Advanced dynamic Routing Protocols
Route Summarization
Link State Routing Protocol
EIGRP
Advanced Switching Technology
VLAN and Trunks
Access Control List
Network Address Translation (NAT)
IP version 6
Wide Area Network
Frame Relay
Overview of Exchange Server 2013 Unified Messaging
Designing and implementing Exchange Server 2013 Unified Messaging
Designing and implementing site resiliency
Planning virtualization for Exchange Server 2013
Designing and implementing message transport security
Designing and implementing message retention
Designing and implementing messaging compliance
Designing and implementing administrative security and auditing
Managing Exchange Server 2013 with Exchange Management Shell
Designing and implementing integration with Exchange Online
Designing and implementing messaging coexistence
Designing and implementing Exchange Server migrations and upgrades
Overview of GPG
Commands and CLI
GPG trust model
GUI – KGPG, Seahorse
Frontends – Kleopatra, enigmail
Javascript Introduction, What is JavaScript?, Pre Requirements
Creating a JavaScript file, Tools Required, Basics of Javascript
Structure of a JavaScript Code, DataTypes, Variables & Operators
Looping & Conditional Statements, Functions, Types & Objects
Arrays, Numbers, Strings, Dates, Objects
DOM (Document object model), What is DOM?, Element Nodes
Getting Element Nodes, Changing DOM Content, Creating DOM Elements
Events & Listeners, Events Overview, Responding to Mouse Events
Form Events, Timers, Debugging Javascripts, Common Mistakes
Using Firebug, Debugging a page, Application of Javascripts
Smarter Forms, UI Enhancements, Countdown, Resizing web pages
Javascript Libraries, Libraries Overview, JQuery and more
Install and configure servers
Configure server roles and features
Configure Hyper –V
Deploy and configure core network services
Install and administer Active Directory
Create and Manage Group policy
Key Terms
Image quality of monitor
Evolution of Displays
Video technologies
Types of monitor
Implement a Group Policy infrastructure
Manage user desktops with Group Policy
Manage user and service accounts
Maintain Active Directory Domain Services (AD DS)
Configure and troubleshoot domain name system (DNS)
Configure and troubleshoot remote access
Install, configure, and troubleshoot the network policy server (NPS) role
Implement network access protection (NAP)
Optimize file services
Configure encryption and advanced auditing
Deploy and maintain server images Implement
Title - 11 Conditions
Title - 12 Conditionals Statements
Title - 13 PERFORM statements
Title - 14 RENAMES & REDEFINES Clauses
Title - 15 Programs
Introduction
Installing the Oracle Database Structure, Creating an Oracle Instance
Managing the Oracle Instance, Managing Database Storage Structure
Oracle managed file(OMF), Creating a table space
Administering security, Managing Schema Objects
Types of Indexes, Managing Data and Concurrency
Locking Mechanism, Managing Undo Data
Implementing Oracle Database Security
Configuring the Oracle Network environment
Proactive Maintenance, ADDM
Performance Management, Backup and Recovery Concept
Hot Backup • Cold Backup, Hands on practice
Performing Database Backups
Performing Database Recovery
Performing Flashback, Hands on practice
Flashback version query, Moving Data
Importance of Time Management
Prioritizing tasks
Personal Goal setting
Delegation and Time Management
Barriers to Time Management
Identifying and Handling Time Consuming Tasks
General Hard Drive Troubleshooting
Use Operating System Utilities
Check Drive Cables and Connections
If the Drive Will Not Boot Up
If the Drive Boots but Hangs Up at Boot
Hard Drive Software Troubleshooting
Hard Drive Software Problems and Solutions
Computer Boots but with Many Errors or Hangs
Your Hard Drive may have an IRQ Conflict
Your Hard Drive Device Drives Causing Problems
What To Do When Windows Won't Boot
Won't Boot-Up At All
Making a Windows XP Bootable Floppy, if You Still Have a Floppy Drive
If The PC Won't Boot Past Windows
Reports
Process improvement, Static techniques
Routing Basics.
Managing static & dynamic routes.
Configuring static IP Routing.
Introduction to Dynamic Routing using RIP.
Managing & Configuring OSPF & EIGRP.
Using Same & Different AS numbers
Avoiding routing loops using Split Horizon, Route poisoning.
BGP Configuration
Precepts of Security
Knowing Encryption
Digital Certificate
Digital Signature
Working with e-mail (web based)
Working with e-mail (mail client)
Working with File Transfer - FTP
Working with File Transfer - Web Folders
ICMP Overview
ICMP Packet Structure
Filter on ICMP Traffic
Analyze Normal/Problem ICMP Traffic
Introduction to XML, Why XML?, XML history and origins,An XML document is a well- formed document.
XHTML, The XML universe, Validation & B2B, Collapse Namespaces, Sharing knowledge
The problem and the solution, Default namespaces, Collapse Validation and DTD Schema
External & Internal DTDs, DTD syntax: elements and attributes, Freedom vs. structure.
Internal & external XML entities, Collapse Schema, Much more than an alternative to DTD
Namespaces in Schema (default namespace, target namespace, Schema namespace)
Built-in data types, Simple and complex types, Elements and attributes groups, Unions and lists
Inheritance, User-defined types, Include and import of external Schemas, The key, keyref and unique elements
Collapse XPath, XPath Expressions, Operators and Special Characters, Filters and Filter Patterns
Comparisons, Location Paths, XPath Functions, Collapse XSL, XSL versions, The XSL processor: client & server side.
Extracting the data from XML tree, Sorting, XSL numbers, Xpath, Creating new elements & attributes.
Creating new documents, XSL functions, Making choices, Collapse XML Application, XML programming.
System.XML, SAX 2.0./XMLReader, XMLSerializer, The Document Object Model.
.Net XML tools/The Apache tools set, Validating XML in Code, XSL Transformation in code
Key Terms
Image quality of monitor
Evolution of Displays
Video technologies
Types of monitor
Installing Java.
Java Program Development, Java Source File Structure
Compilation, Executions.
Basic Language Elements: Lexical Tokens, Identifiers
Keywords, Literals, Comments
Primitive Datatypes, Operators, Assignments.
Experience Required - 0 To 5 Years
Collaborate with cross-functional teams to define, design, and ship new features.
Help to define and ensure adherence to standards and methods for design and development for the .NET environment
Be able to adapt, flex and change to meet new and conflicting work priorities at short notice.
Take responsibility and accountability in ensuring solutions are fit for purpose, scalable and modern.
Good Knowledge With Form Controls.
Implement a Group Policy infrastructure
Manage user desktops with Group Policy
Manage user and service accounts
Maintain Active Directory Domain Services (AD DS)
Configure and troubleshoot domain name system (DNS)
Configure and troubleshoot remote access
Install, configure, and troubleshoot the network policy server (NPS) role
Implement network access protection (NAP)
Optimize file services
Configure encryption and advanced auditing
Deploy and maintain server images Implement
Information at Hand Before System Hacking Stage
System Hacking: Goals
CEH Hacking Methodology (CHM)
CEH System Hacking Steps
Escalating Privileges
Executing Applications
Hiding Files
Covering Tracks
Penetration Testing
Windows Azure worker Role
Creating a Worker role
Configuration of worker role
Communications between Worker role and Webrole
Difference between worker role and web role
Debugging in the dev fabric
Limitations of the dev Fabric
Electronic Evidence
First Responder
Roles of First Responder
Electronic Devices: Types and Collecting Potential Evidence
First Responder Toolkit
First Response Basics
Securing and Evaluating Electronic Crime Scene
Conducting Preliminary Interviews
Documenting Electronic Crime Scene
Collecting and Preserving Electronic Evidence
Packaging and Transporting Electronic Evidence
Reporting the Crime Scene
Note Taking Checklist
First Responder Common Mistakes
Setting a Computer Forensics Lab
Investigative Services in Computer Forensics
Computer Forensics Hardware
Computer Forensics Software
Creating and Configuring Virtual Hard Disks
Creating and Configuring Virtual Machines
Installing and Importing Virtual Machines
Managing Virtual Machine Checkpoints
Monitoring Hyper-V
Designing and Managing Virtual Machines
Creating and Managing Virtual Hard Disks
Creating and Managing Virtual Machines
Importing Virtual Machines and Working with Checkpoints
Monitoring Hyper-V
Adapter cards
Peripheral port connector types
Common IDE, SCSI and Peripheral Devices
Common Error Codes Interpretation
Cooling systems
Introduction to the Unix Operating System
Unix Basic Commands
Redirection and Pipes
Introduction to The vi Editor
Searching and Replacing Text
Recalling and Editing Commands
File Permissions and Access Control
Processes
Creating the components of Hadoop MapReduce jobs
Distributing data processing across server farms
Executing Hadoop MapReduce jobs
Monitoring the progress of job flows
Adapter cards
Peripheral port connector types
Common IDE, SCSI and Peripheral Devices
Common Error Codes Interpretation
Cooling systems
Trunk ports
Port binding/aggregation
Common ports
Common protocols
Types of networks
Introduction
Oracle managed files, Configuring recovery manager
Using recovery manager, RMAN backup types
Hands on practice, Recovering from non critical loses
Database recovery, Types of incomplete recovery
Flashback, Dealing with database corruption
Hands on practice, Monitoring and managing memory
Automatic shared memory management, Automatic performance management
Automatic workload repository, Managed schema objects
Hands on practice, Clusters, Managing storage
Automatic storage management, ASM disk group
Portioning a disk, Managing resources
Automatic task with scheduler, Database security
Transparent data encryption, Using globalization support
Hands on practice
Students will discuss and practice troubleshooting and system rescue procedures utilising hands on labs.
Adapter cards
Peripheral port connector types
Common IDE, SCSI and Peripheral Devices
Common Error Codes Interpretation
Cooling systems
Multi –Dimensional Array, Operation on String
Practicals - Mutable & Immutable String, Using Collection Bases Loop for String
Tokenizing a String, Creating Strings using StringBuffer
If Statement, If ?then-else Statement, Comparing Strings, Compound
Conditions(And, Or, Not), Nested If Statements,
Case Structure ,Using If statements with Option Buttons & Check Boxes,
Displaying Message in Message Box, Testing whether Input is valid or not.
Using Call Statement to call a procedure.
Baseline "NormalTraffic
Use Color
Look Who's Talking: Examine Conversations and Endpoints
Focus by Filtering
Create Basic IO Graphs
Examine Delta Time Values
Examine the Expert System
Follow the Streams
Graph Bandwidth Use, Round Trip Time, and TCP Time/Sequence Information
Watch Refusals and Redirections
This training is organized away from workplace - in colleges, institutions and delivers wide range of technical workshops and seminars ensuring best placement activities for students. We have been training all NIT's, IIT's and IIM's across India providing various awareness sessions and technical seminars with latest technologies. We have revised syllabus and course content for each kind of training required with the best duration offers and placement offers. We take placement as our core process in training the students on various aspects that the industry requires.
How to use the event viewer?
How to enable auditing in windows?
How to read logs on your system?
How to close ports?
Overview of the windows registry.
How to restore the registry?
How to close a port?
Common internal commands.
How to find services and ports they listen on?
Hadoop: Basic Concepts, What is Hadoop?, The Hadoop Distributed File System
How Hadoop Map Reduce Works, Anatomy of a Hadoop Cluster
Setting Up a Hadoop cluster, Make a fully Distributed Hadoop Cluster
Cluster Specification, Network Topology, Cluster Specification and Installation, Hadoop Configuraton
Hadoop Daemons, Master Daemons, Name Node, Job Tracker, Secondary Name Node
Slave Daemons, Data Node, Task Tracker
HDFS ( Hadoop Distributed File System ), Blocks and Splits, Input Splits, HDFS Splits
Methods of Accessing HDFS, Java Approach, CLI Approach
Writing a MapReduce Program, Examining a Sample MapReduce Program With several examples
Basic API Concepts, The Driver Code, The Mapper, The Reducer, Hadoop's Streaming API
The configure and close Methods, Sequence Files, Record Reader, Record Writer
Role of Reporter, Output Collector, Directly Accessing HDFS, ToolRunner
Internal IP Disclosure
Path Disclosure
Token Disclosure in URL
EXIF Geolocation Data
User Enumeration
Server Configuration
Private API key Disclosure
Sensitive Configuration Files
Block cipher principles
Feistel networks
S boxes and P boxes
Block cipher modes of operation
DES
3DES
AES
Hard disk drive working
Advanced disk drive
Floppy drive
Zip drive
Tape drives
Flash memory
CD/DVD drives
Advanced digital storage
Introduction to Incident
Incident Response Methodology Steps
Activities in Initial Response Phase after detection of an incident
Windows Server 2008 Active Directory
Organizational Units and Domain Controllers
Global Catalog
Operations Masters and Server Manager
Global Catalog Servers
RID Master
Transferring and Seizing of Operations Master Roles
Active Directory and DNS
Command-Line DNS Server Administration
Zone Transfers and Replication
Active Directory Sites and Replication
Active Directory Sites
Active Directory Lightweight Directory Services (AD LDS)
Active Directory Rights Management Services (AD RMS)
Read-Only Domain Controllers
Active Directory Federation Services (ADFS)
Windows Server 2008 Virtualization
Active Directory Objects and Trusts
Organizational Units
Group Membership
Shell Access Policies
Group Policy to Deploy Software
Backing Up and Recovering Active Directory
Use of Windows Server Backup
Active Directory Certificate Services
Installing Active Directory Certificate Services
Certificate Templates and Revocation
HTML Elements, HTML Attributes, HTML Headings, HTML Paragraphs
HTML Formatting, HTML Fonts, HTML Styles, HTML Links
HTML Images, HTML Tables, HTML Lists, HTML Forms, HTML Frames
HTML Iframes, HTML Colors, HTML Colornames, HTML Colorvalues
HTML Quick List, HTML Layout, HTML Doctypes, HTML Head
HTML Meta, HTML Scripts, HTML Entities, HTML URLs, HTML URL Encode
HTML Media, HTML Audio, HTML Object, HTML Video, HTML YouTube, HTML Media Tags
HTML5 Introduction, HTML5 New Elements, HTML5 Video, HTML5 Video/DOM
HTML5 Audio, HTML5 Drag and Drop, HTML5 Canvas, HTML5 SVG, HTML5 Canvas vs.SVG
HTML5 Geolocation, HTML5 Web Storage, HTML5 App Cache, HTML5 Web Workers
HTML5 SSE, HTML5 Tags
Title - 16 Sequential Files
Title - 17 Direct Access Files
Title - 18 Indexed Sequential Files
Title - 19 Sorting and Merging of Files
Title - 20 Programs
Break, Continue, Pass,
Trojan Concepts
Trojan Infection
Types of Trojans
Trojan Detection
Countermeasures
Anti-Trojan Software
Pen Testing for Trojans and Backdoors
Javascript Introduction, What is JavaScript?, Pre Requirements
Creating a JavaScript file, Tools Required, Basics of Javascript
Structure of a JavaScript Code, DataTypes, Variables & Operators
Looping & Conditional Statements, Functions, Types & Objects
Arrays, Numbers, Strings, Dates, Objects
DOM (Document object model), What is DOM?, Element Nodes
Getting Element Nodes, Changing DOM Content, Creating DOM Elements
Events & Listeners, Events Overview, Responding to Mouse Events
Form Events, Timers, Debugging Javascripts, Common Mistakes
Using Firebug, Debugging a page, Application of Javascripts
Smarter Forms, UI Enhancements, Countdown, Resizing web pages
Javascript Libraries, Libraries Overview, JQuery and more
Here's How To Replace A DVD Drive In Your Laptop
How To Repair Cable, DSL, And Dial-Up Modem Problems
How To Setup Cable Modem With A Router
A Direct Subscriber Line ( DSL ) Modem
Troubleshooting DSL Modems-Internet Access Needed
An Older Dial-Up Modem
Tips On Surviving An Operating System Crash
What is a Hard Drive Crash
Steps To Recover Your Hard Drive
Introduction to Switching Technology.chnologies
Broadcast Domain & Collision Domain
Packet Forwarding Techniques .
Access Modes .
Spanning Tree Protocol .
VTP.
ISL Routing & Frame Tagging.
Port Security.
ARP.
Introduction to Switching Technology.
Broadcast Domain & Collision Domain
Packet Forwarding Techniques
Access Modes
Spanning Tree Protocol.
VLAN
VTP
ISL Routing & Frame Tagging.
Port Security
ARP
Interview Preparation
Common Interview Questions
What Employers Want
Attitude and Effort
Body Language
Research
The Mock Interview
Phone Interviews
Behavioral Interviews
Closing the Interview
Thank You Notes
Trojan Concepts
Trojan Infection
Types of Trojans
Trojan Detection
Countermeasures
Anti-Trojan Software
Pen Testing for Trojans and Backdoors
Experience Required - 0 To 5 Years
.NET Developer skilled in C#, .NET MVC, AJAX, JQuery, Web API, Entity Framework, LINQ, Angular JS
To define and ensure adherence to standards and methods for design and development for the .NET environment Be able to adapt, flex and change to meet new and conflicting work priorities at short notice.
Development experience using .NET, C#, Javascript, AJAX , SQL and MVC framework
.Net Software Developer, C# Developer, .NET Software Engineer. Agile, continuous integration experience.
Configuring Addressing and Services
Configure IPv4 and IPv6 addressing
Configure Dynamic Host Configuration Protocol (DHCP)
Configure routing
Configure Windows Firewall with advanced
Security Configuring Name Resolution
Configure a Domain Name System (DNS) server
Configure DNS zones
Configure DNS records
Configure DNS replication
Configure name resolution for client
Computers Configuring Network Access
Configure remote access
Configure Network Access Protection (NAP)
Configure DirectAccess
Configure Network Policy Server (NPS)
Configuring File and Print Services
Configure a file server
Configure Distributed File System (DFS)
Configure backup and restore
Manage file server resources
Configure and monitor print services
Monitoring and Managing a Network Infrastructure
Configure Windows Server Update Services (WSUS) server settings
Configure performance monitoring
Configure event logs
Gather network data
Introduction to Cisco Router & Switch.
Internal & External components of Cisco Router.
Starting up with a Router & Switch.
The Command-Line Interface.
Configuration of Router & Switch.
LED signalling for routers & switches
Class Fundamentals, Object & Object reference, Object Life time & Garbage Collection.
Creating and Operating Objects.
Constructor & initialization code block Access Control, Modifiers, methods
Nested , Inner Class &Anonymous Classes, Abstract Class & Interfaces
White box Testing, Black box Testing
Alpha Testing, Beta Testing
Gama Testing
Cloud Security Best Practices
Shared Security Responsibility Model
AWS Platform Compliance
AWS security attributes (customer workloads down to physical layer)
Security Services
AWS Identity and Access Management (IAM)
Amazon Virtual Private Cloud (VPC)
CIA and AAA models, ingress vs. egress filtering, and which AWS services and features fit
Functional Testing, Regression Testing
End-to- end Testing, Testing levels
Unit Testing, Integration Testing
System Testing, Acceptance Testing
Virus and Worms Concepts
Types of Viruses
Computer Worms
Malware Analysis
Counter-measures
Penetration Testing for Virus
Virus and Worms Concepts
Types of Viruses
Computer Worms
Malware Analysis
Counter-measures
Penetration Testing for Virus
Introduction to CSS: Why Use CSS?
CSS Syntax, HTML 5 and CSS, Set Up Web Pages with CSS
Styling Text, Font, and Properties, Styling Page Backgrounds
Styling Lists in CSS, Using CSS Classes and IDs
Types of style sheet, Types of CSS selector
Css Properties, Using Css for realtime practical works
CSS Rounder corners, CSS Gradients and background properties
Text-shadow and text-stroke properties
Using Borders and Height and Width CSS Properties, Border images and shadows
CSS Pseudo Elements, Positioning Elements, Validating CSS and HTML
Get Started with the GNOME Graphical Desktop
Manage Files Graphically with Nautilus
Get Help in a Graphical Environment
Configure Local Services
Manage Physical Storage I
Manage Logical Volumes
Monitor System Resources
Manage System Software
Get Started with Bash
Get Help in a Textual Environment
Establish Network Connectivity
Administer Users and Groups
Manage Files from the Command Line
Secure Linux File Access
Administer Remote Systems
Configure General Services
Manage Physical Storage II
Install Linux Graphically
Manage Virtual Machines
Control the Boot Process
Deploy File Sharing Services
Secure Network Services
Checksum Issues at Capture
Analyze Switched Networks
Walk-Through a Sample SPAN Configuration
Analyze Full-Duplex Links with a Network TAP
Analyze Wireless Networks
Initial Analyzing Placement
Remote Capture Techniques
Available Capture Interfaces
Save Directly to Disk
Capture File Configurations
Limit Your Capture with Capture Filters
Examine Key Capture Filters
Admin : Configuring the storage account
Admin : Explore the storage account settings
Accessing queues using Azure Client library
Programming using queues
Exploring the queue API’s
Communication between webrole and worker role using queues
Limitations of the queues
Advantages of using queues
Blob Storage
Programming with Blobs using Azure Client library
Tables
Create and use tables in Windows Azure.
Design entities that are stored in table storage.
Use case of queue, table and blob storage.
Installation
User and Group Administration
Redhat Infrastructure
Redhat Package Manager
The Linux kernel
Rescue modes
Network Services
Security
X Window System
Routing, Forwarding, and Firewalls
File System Management
Method Overloading, Recursion.
Dealing with Static Members. Finalize() Method.
Native Method. Use of “this “ reference, Use of Modifiers with Classes & Methods..
Design of Accessors and Mutator Methods.
Cloning Objects, shallow and deep cloning, Generic Class Types
Extending Classes and Inheritance
Use and Benefits of Inheritance in OOP, Types of Inheritance in Java
Inheriting Data Members and Methods
Role of Constructors in inheritance, Overriding Super Class Methods.
Use of “super”, Polymorphism in inheritance.
Type Compatibility and Conversion, Implementing interfaces.
Rues & Regulations
Licensing and Registration procedure
Appreciation of important provisions of Factory Act.
Shops & Commercial Establishment Act.
Sales of Goods Act, Partnership Act.
Contract Act; Income Tax, SalesTax and Excise rules.
Insurance.
Defining / Creating and Modifying a Menu, Using common dialog box,
Creating a new sub-procedure, Passing Variables to Procedures,
Passing Argument ByVal or ByRef, Writing a Function Procedure,
Deploying Servers
Deploy images by using Windows Deployment Services Configure Microsoft Windows activation
Configure Windows Server Hyper-V and virtual machines
Configure high availability
Configure storage
Configuring Remote Desktop Services
Configure RemoteApp and Remote Desktop Web
Access Configure Remote Desktop Gateway (RD Gateway)
Configure Remote Desktop Connection
Broker Configure and monitor Remote Desktop
resources Configure Remote Desktop licensing
Configuring a Web Services infrastructure
Configure Web applications
Manage Web sites
Configure a File Transfer Protocol (FTP) server
Configure Simple Mail Transfer Protocol
(SMTP) Manage the Web Server (IIS) role
Configure SSL security
Understanding stress
Managing stress
Stress management techniques
Improper Authorization & Authentication
Insufficient Session Expiration & Session Fixation
Issues with OAuth Redirection & Permissions
Insecure Direct Object Reference (IDOR)
Misconfigured Login pages
Bypass Single factor & Two factor Authentication
Account Take Over
Account Lockout
Cross Site Request Forgery (CSRF)
Server Side Request Forgery (SSRF)
DNS Zone Transfer
Distinguishing Hadoop daemons
Investigating the Hadoop Distributed File System
Selecting appropriate execution modes: local, pseudo–distributed and fully
Creating and Using Hyper-V Virtual Switches
Advanced Hyper-V Networking Features
Configuring and Using Hyper-V Network Virtualization
Creating and Using Hyper-V Virtual Switches
Configuring and Using Advanced Virtual Switch Features
Configuring Hyper-V Network Virtualization
What is JSON:API?, Overview of the JSON:API Specification
Why JSON:API makes your life better, Content Negotiation
Elegantly evolving level 3 REST APIs without breaking existing clients
JSON API Server Responsibilities, Header content type, Status Codes
Variants, JSON API Client Responsibilities, Specifying Media Types
Parameters, Variants, Document structure, Resources
Compound objects, Links, Metadata, Fetching Data
Fetching resources, Relationships, Sparse fieldsets, pagination & filtering
Mandatory, Optional & Recommended parameters
CRUD design with JSON-API, Resource Creation, Relationship Objects
Accepting Client-Generated IDs, Query parameters, Error Handling
Title - 21 Table Handling
Title - 22 Indexed Tables & Index Names
Title - 23 Search & Start Verbs
Title - 24 Programs using OCCURS & Screen Section
Title - 25 List of Programs
General troubleshooting information and questions
Best Practices in debugging
Phishing and its counter-measures
Virus
Trojan Horse
Worms
Spyware
Adware
Keylogger
Social engineering
Denial of Service
Spamming
Port Scanning
Password cracking
Basic security measures
Initial Response & Volatile Data Collection from Windows system
Initial Response & Volatile Data Collection from Unix system
Forensic duplication:Forensic Duplicates as Admissible Evidence
Forensic Duplication Tool Requirements
Creating a Forensic Duplicate/Qualified Forensic, Duplicate of a Hard Drive
Introduction to WAN.
WAN Types.
WAN Protocols & HDLC.
Configuring & troubleshooting PPP.
Configuring & troubleshooting Frame Relay.
Introduction to XML, Why XML?, XML history and origins,An XML document is a well-formed document.
XHTML, The XML universe, Validation & B2B, Collapse Namespaces, Sharing knowledge
The problem and the solution, Default namespaces, Collapse Validation and DTD Schema
External & Internal DTDs, DTD syntax: elements and attributes, Freedom vs. structure.
Internal & external XML entities, Collapse Schema, Much more than an alternative to DTD
Namespaces in Schema (default namespace, target namespace, Schema namespace)
Built-in data types, Simple and complex types, Elements and attributes groups, Unions and lists
Inheritance, User-defined types, Include and import of external Schemas, The key,keyref and unique elements
Collapse XPath, XPath Expressions, Operators and Special Characters, Filters and Filter Patterns
Comparisons, Location Paths, XPath Functions, Collapse XSL, XSL versions, The XSL processor: client & server side.
Extracting the data from XML tree, Sorting, XSL numbers, Xpath, Creating new elements & attributes.
Creating new documents, XSL functions, Making choices, Collapse XML Application, XML programming.
System.XML, SAX 2.0./XMLReader, XMLSerializer, The Document Object Model.
.Net XML tools/The Apache tools set, Validating XML in Code, XSL Transformation in code PHP
Introduction PHP and MySQL, Benefits of using PHP MySQL
Setup of PHP Environment, Testing the Page, Troubleshooting Installation Errors
PHP Programming Concepts, Write your First PHP Program, Embed PHP in HTML / HTML in PHP
PHP Data Types, Variables in PHP, SuperGlobal Variables, Operators in PHP
Conditional Statements, Loops (For, While, Do While, Foreach), PHP Functions
Using Functions in PHP, Userdefined Functions, Predefined Functions, Common Functions
String Functions, File Functions, Date Functions, Hash Functions, Mail Function
MySQL Database Training, What is Database ?, Understanding an RDBMS
Understanding Tables, Records, and Fields, SQL Language, Using the MySQL Command-Line Client
Working with MySQL Admin, Working with PHP MyAdmin
Creating Databases, Types of Databases, Creating Tables in Database, Specifying Field Data Types
Selecting the Most Appropriate Data Type, Adding Field Modifiers and Keys, Selecting a Table Type Altering Tables
Altering Table and Field Names, Altering Field Properties, Adding and Removing Fields and Keys
Altering Table Types, Backing Up and Restoring Databases and Tables, Backing Up Databases and Tables
Restoring Databases and Tables from Backup, Dropping Databases and Tables
Viewing Database, Table, and Field Information, SQL Queries
Inserting Records, Editing and Deleting Records, Performing Queries, Retrieving Specific Columns
Filtering Records with a WHERE Clause, Using Operators, Sorting Records and Eliminating Duplicates
Limiting Results, Using Built-In Functions, Grouping Records, Joining Tables
Using Subqueries, Using Table and Column Aliases, Arrays and Array Functions
Why use Arrays, Types of Arrays, Creating, ArraysAccessing Arrays, Array Functions, Using Array Functions
Introduction to WAN
WAN Types
WAN Protocols & HDLC
Configuring & troubleshooting PPP.
Configuring & troubleshooting Frame Relay.
Hard Disk Drive Overview
Disk Partitions and Boot Process
Understanding File Systems
RAID Storage System
File System Analysis Using The Sleuth Kit (TSK)
Public key crypto systems
RSA algorithm
Elliptic Curve cryptography
Introduction to Visual Basic, Introduction Graphical User Interface (GUI)
Programming Language (Procedural Object Oriented, Event Driven)
The Visual Basic Environment, How to use VB complier to compile / debug and run the programs.
Introduction to VB Controls, Textboxes, Frames, Check Boxes
Option Buttons, Images, Setting a Border &Styles,The Shape Control, The line Control
Working with multiple controls and their properties,Designing the User Interface
Keyboard access, tab controls,Default & Cancel property, Coding for controls
Variables, Constants, and Calculations, Naming rules/conventions, Constants, Named & intrinsic
Decision & Conditions, Menus, Sub-Procedures and Sub-functions
Multiple Forms, Creating , adding, removing Forms in project, Hide
Show Method, Load, Unload, Statement, Me Keyword
Referring to Objects on a Different Forms, List, Loops and Printing
List Boxes & Combo Boxes, Filling the List using Property window / AddItem Method
Clear Method, List box Properties, Removing an item from a list
List Box/ Combo Box, Do/Loops, For/Next Loops, Using MsgBox Function
Using String Function, Printing to printer using Print Method, Arrays
OOP in VB, Classes, Creating a new Class,Creating a new object using a class
The Initialize & Terminate events, Data Files, Opening and Closing Data Files, The Free File Function
Viewing the data in a file, Sequential File Organization (Writing Data to a sequential Disk File
The Err Object, Random Data File Opening a random file,Reading and writing a random file(Get, Put, LOF, Seek).
Accessing Database File, Creating the database files for use by Visual Basic ( Using MS- Access)
Using the Data Control ,setting its property, Using Data Control with forms, navigating the database in code
Using listboxes & comboboxes as data bound controls, updating a database file ( adding, deleting records ) .
Displaying data in grids ( grid control, properties of grid )
Accessing Strings, Basic Operations , String slices
Function and Methods,
Memory
CPU
Storage and network allocation
Entitlement/quotas (shares)
Reservations
Licensing
Resource pooling
Common network services, such as Apache, BIND, DHCP, and email will be reviewed, demonstrated, and practiced using hands on labs.
Introduction PHP and MySQL, Benefits of using PHP MySQL
Setup of PHP Environment, Testing the Page, Troubleshooting Installation Errors
PHP Programming Concepts, Write your First PHP Program, Embed PHP in HTML / HTML in PHP
PHP Data Types, Variables in PHP, SuperGlobal Variables, Operators in PHP
Conditional Statements, Loops (For, While, Do While, Foreach), PHP Functions
Using Functions in PHP, Userdefined Functions, Predefined Functions, Common Functions
String Functions, File Functions, Date Functions, Hash Functions, Mail Function
MySQL Database Training, What is Database ?, Understanding an RDBMS
Understanding Tables, Records, and Fields, SQL Language, Using the MySQL Command- Line Client
Working with MySQL Admin, Working with PHP MyAdmin
Creating Databases, Types of Databases, Creating Tables in Database, Specifying Field Data Types
Selecting the Most Appropriate Data Type, Adding Field Modifiers and Keys, Selecting a Table Type Altering Tables
Altering Table and Field Names, Altering Field Properties, Adding and Removing Fields and Keys
Altering Table Types, Backing Up and Restoring Databases and Tables, Backing Up Databases and Tables
Restoring Databases and Tables from Backup, Dropping Databases and Tables
Viewing Database, Table, and Field Information, SQL Queries
Inserting Records, Editing and Deleting Records, Performing Queries, Retrieving Specific Columns
Filtering Records with a WHERE Clause, Using Operators, Sorting Records and Eliminating Duplicates
Limiting Results, Using Built-In Functions, Grouping Records, Joining Tables
Using Subqueries, Using Table and Column Aliases, Arrays and Array Functions
Why use Arrays, Types of Arrays, Creating, ArraysAccessing Arrays, Array Functions, Using Array Functions
Comparing real–time processing models
Leveraging Storm to extract live events
Lightning–fast processing with Spark and Shark
Providing High Availability and Redundancy for Virtualization
Implementing Virtual Machine Movement
Implementing and Managing Hyper-V Replica
Moving Hyper-V Storage and Virtual Machines
Configuring and Managing Hyper-V Replica
ACLs
VPNs
IDS/IPS hardware/software-based firewalls
DMZ
Review / audit logs
Attacks
Creating , adding, removing Forms in project, Hide,
Show Method, Load, Unload
Statement, Me Keyword, Referring to Objects on a Different Forms.
PKI, CA. X509 certificates
SSL/TLS, HTTPS
IPV6 and IPSEC
Proxies and Firewalls
Testing tools, QTP
Selenium, Automated Testing, Manual Testing
Planning Network and Application Services
Plan for name resolution and IP addressing
Design for network access
Plan for Remote Desktop Services
Design core identity and access management components
Design Active Directory forests and domains
Design the Active Directory physical topology
Design the Active Directory administrative model
Design the enterprise-level group policy strategy
Designing Support identity and access management components
Plan for domain or forest migration, upgrade, and restructuring
Design the branch office deployment
Design and implement public key infrastructure
Designing for business continuity and data availability
Design for software updates and compliance management
Design the operating system virtualization strategy
Implement advanced network services
Implement advanced file services
Implement dynamic access control
Implement network load balancing
Implement failover clustering
Implement failover clustering with Hyper-V
Implement disaster recovery
Implement distributed Active Directory Domain Services (AD DS) deployments
Implement AD DS sites and replication
Implement Active Directory Certificate Services (AD CS)
Implement Active Directory Rights Management Services (AD RMS
Implement Active Directory Federation Services (AD FS)
Collecting Volatile Information
Collecting Non-Volatile Information
Windows Memory Analysis
Windows Registry Analysis
Cache, Cookie, and History Analysis
MD5 Calculation
Windows File Analysis
Metadata Investigation
Text Based Logs
Other Audit Events
Forensic Analysis of Event Logs
Windows Password Issues
Forensic Tools
Utility Methods for Arrays, Observable and Observer Objects, Date & Times
Practicals - Using Scanner, Regular Expression, Streams and the new I/O Capabilities
The Classes for Input and Output, The Standard Streams, File I/O Basics
Reading and Writing to Files, Buffer and Buffer Management,Serializing Objects
Working with Credit Cards
Working with Instant Messengers
Working across File Sharing Networks
Working on Dial-in Networks
Working with Portable Devices
Working with Wireless Devices
Working with USB devices
Working with Media Files
Working with 3rd party software
Basic security issues and best-practice security measures will be described and tested.
Configuration of TCP wrappers and utilisation of configuration files will be discussed and utilised in hands on labs
SQL
PL/SQL
Admin I
Oracle Data pump Admin II
Accessing list, Operations, Working with lists
Function and Method,
Basics of Network Security
Introduction to Access Control Lists
Types of ACL
Wildcard Implementation on ACL
Standard & Extended ACL
Improper Certificate Validation
Cleartext Transmission of Session Token
Encrypted Cookies
Cleartext Storage of Sensitive Information
Missing Encryption of Sensitive Data
Cryptographic Issue (Generic)
Essentials of Cisco ASA
Basic connectivity and device management
Network integration
Configure common features of the Cisco ASA OS
Cisco ASA policy control
Core Cisco ASA VPN common components
Main VPN components
Cisco clientless VPN solutions
Cisco AnyConnect full tunnel VPN solution
Cisco ASA high availability and virtualization options
Features of Cisco ASA 5500-X Series Next-Generation Firewalls
Basics of Network Security
Introduction to Access Control Lists
Types of ACL
Wildcard Implementation on ACL
Standard & Extended ACL
OverView, CLR,CLS, MSIL, Assemblies, NameSpaces, .NET Languages, Dll’s(Vs)Exe’s
BASICS - Using Variables and Arrays,Methods and Parameters,Decision Structures and Loops
Handling Errors and Exceptions, Object oriented programming
Classes, structures and enums, Constructors, Destructors, Properties, Inheritance
Shadowing(new methods), Overriding, Method Overloading, this and base Keyword
Sealed classes, Interfaces, Abstract Classes, Working with Delegates, Designing
Implementing Events, Generics, Sealed classes and Partial classes
C#.NET Application Architecture, Compiling, Debugging and Running in IDE
Introduction to gui programming, System.Windows.Forms Assembly, System.Drawing,
The Form Class, Win Forms, Visual Inheritance, Programming with Controls, User Controls
System.IO, Readers and Writers, Streams, System.Collections
Hashtable, ArrayList, Serialization, Formatters, Binary Serialization
Formatters, Binary Formatter, SOAP Serialization, XML Serialization
ADO.NET I - Introduction, Architecture, System.Data.Dll, System.Data.Oledb,System.Data.SqlClient
Data Readers, Command Object, Procedure Execution (PL/SQL)
ADO.NET II - Data Adapters and DataSets, Data Tables, Data Relations, Data Views, Assemblies,
Strong Names, GAC, Private and Shared Assemblies, SFA, MFA, Multithreading
Threading Introduction, System.Thrading NameSpaces, Thread Members, Thread States
Implement advanced network services
Implement advanced file services
Implement dynamic access control
Implement network load balancing
Implement failover clustering
Implement failover clustering with Hyper-V
Implement disaster recovery
Implement distributed Active Directory Domain Services (AD DS) deployments
Implement AD DS sites and replication
Implement Active Directory Certificate Services (AD CS)
Implement Active Directory Rights Management Services (AD RMS
Implement Active Directory Federation Services (AD FS)
Examine the Delta Time (End-of-Packet to End-of-Packet)
Set a Time Reference
Compare Timestamp Values
Compare Timestamps of Filtered Traffic
Enable and Use TCP Conversation Timestamps
Compare TCP Conversation Timestamp Values
Troubleshooting Example Using Time
Analyze Delay Types
Understanding Conflict
Persuasion
Negotiation
Group Discussion
Interviews & Presentation
Entrepreneurial Skill Development
Applying soft skills to work place
Sniffing Concepts
MAC Attacks
DHCP Attacks
ARP Poisoning
Spoofing Attack
DNS Poisoning
Sniffing Tools
Counter measures
Sniffing Pen Testing
Sniffing Concepts
MAC Attacks
DHCP Attacks
ARP Poisoning
Spoofing Attack
DNS Poisoning
Sniffing Tools
Counter measures
Sniffing Pen Testing
File Systems-FAT,NTFS, Forensic Analysis of File Systems
Storage Fundamentals-Storage Layer
Hard Drives Evidence Handling
Types of Evidence, Challenges in evidence handling
Overview of evidence handling procedure
Organizing Classes and Interfaces in Packages.
Package as Access Protection, Defining Package.
CLASSPATH Setting for Packages.
Making JAR Files for Library Packages, Import and Static Import.
Naming Convention For Packages, Exception Handling, The Idea behind Exception.
Cloud programming guidelines
Cloud Designing guidelines
Layered pattern
Idem potency problem
The Map Reduce Pattern
Introduction to Bootstrap, Goals of Bootstrap, Obtaining Bootstrap
Overview of how to use Bootstrap in a Web app, The Bootstrap Grid System
Overview of Grids in Bootstrap, The role of Media Queries, Grid options
Targeting different devices (Desktop / Mobile), Column techniques, CSS Techniques
HTML5 doctype and viewport meta-tags, Containers, Responsive images, Normalization
Typography, Headings, Inline Headings, Emphasis, Abbreviations, Lists
Additional techniques, Tables, Displaying basic Tables, Striped Tables, Hover Tables
Condensed Tables, Contextual Tables, Responsive Tables, Additional techniques
Forms Overview, Vertical Forms, Inline Forms, Horizontal Forms, Form Input Controls
Form Control States, Panels, Additional UI Techniques, Labels, Badges
Buttons and Button Groups, Dropdowns, Button Dropdowns, Images and Thumbnails
Alerts, Progress bars, Input Groups, List Groups, Navigation, Tabular Navigati
on
Tabs, Pills, Dropdowns, Navbar, Breadcrumbs, Additional Techniques
Responsive utilities, Glyphicons, Pagination, Media Objects, Using the Modal Plugin
Social Engineering Concepts
Social Engineering Techniques
Imperso-nation on Social Networking Sites
Identity Theft
Social Engineering Countermeasures
Social Engineering Pen Testing
Role-based administration
Mandatory access controls
Discretionary access controls
Multifactor authentication
Single sign-on
Federation
Overview of Failover Clustering
Configuring and Using Shared Storage
Implementing and Managing Failover Clustering with Hyper-V
Creating Hyper-V Failover Cluster
Managing Hyper-V Failover Cluster
List Boxes & Combo Boxes, Filling the List using Property window / AddItem Method,
Clear Method, List box Properties, Removing an item from a list,
List Box/ Combo Box, Do/Loops, For/Next Loops, Using MsgBox Function,
Using String Function, Printing to printer using Print Method,
Client-Side Template Injection
Server-Side Template Injection
SQL Injection
OS Command Injection
XML Injection
XML RPC
PHP Code Injection
HTML Injection
This class will cover Red Hat’s graphical user environment, its features and its configuration.
Remote display configuration will be discussed and practiced using hands on labs
Types of Exception, Control Flow In Exceptions.
JVM reaction to Exceptions.
Use of try, catch, finally, throw, throws in Exception Handling.
In-built and User Defined Exceptions, Checked and Un-Checked Exceptions.
Naming Convention For Packages, Exception Handling, The Idea behind Exception.
Customization of the Test Process
Budgeting, Scheduling
NAT
DHCP
Managing Cisco IOS
IPv6
Communicating with Hadoop in Pig Latin
Executing commands using the Grunt Shell
Streamlining high–level processing
Social Engineering Concepts
Social Engineering Techniques
Imperso-nation on Social Networking Sites
Identity Theft
Social Engineering Countermeasures
Social Engineering Pen Testing
Planning a Server Upgrade and Migration
Planning and Implementing a Server Deployment Infrastructure
Designing and Maintaining an IP Configuration and Address Management Solution
Designing and Implementing Name Resolution
Designing and Implementing an Active Directory Domain Services Forest and Domain Infrastructure
Designing and Implementing an Active Directory Organizational Unit Infrastructure
Designing and Implementing a Group Policy Object Strategy
Designing and Implementing an Active Directory Domain Services Topology
Planning and Implementing Storage
Planning and Implementing File Services
Designing and Implementing Network Access Services
Designing and Implementing Network Protection
Introduction to Android architecture
Overview of Android's Linux origins, Android Application architecture / framework
UI subsystem key features, Overview of Android Runtime (ART)
Overview of Android SDK / Development tools
Android Studio, Android.jar, Android Emulator
Hello World, Quick review of Java, Manifest file, Declaring Layout
Packaging and running your app on the Android Emulator
Android Components, Activities & lifecycle, Services, Content Providers, Broadcast Receivers
User Interfaces (UIs), Views and layouts, Android Studio Layout Editor & Live Layouts
UI components, Action Bar and Navigation, Event Handling, Selection components
Lists and Adapters, Menus and Dialogs, Simple graphics & animations, RecyclerView
Data Binding using Layouts, Custom Controls, Material Design
Data Persistence, Overview of Data Persistence Options (SQL, ORMS...)
Inserting, Updating & Deleting records, Realm for Android
Content Providers, Content files, MIME types, Creating, editing & deleting content
Searching content, Audio / Video capabilities, Supported audio / video formats
Initiating media playback
Intent Objects & Filters, Intent Objects, Intent Filters, Using Intent matching
Controlling / Consuming Data from Device Hardware, Telephony, Camera
GPS / Location Services, Sensors, Internet Connectivity - Data / WiFi, Bluetooth
Android App Development - Next Steps, Testing & Debugging Android Apps
How to use Open Source components via Gradle, Custom Content Providers
Broadcast Receivers, System Broadcasts, Networking & Web Services, JSON
Collecting Network Based Evidence
Investigating Routers
Network Protocols
Email Tracing, Internet Fraud
Access Control Service(ACS)
Admin :Configuring ACS
Admin: Identity providers.
Service Bus features
Admin: Provisioning Service bus namespace.
Need for service bus and ACS
NAT
DHCP
Managing Cisco IOS
IPv6
Operations, Working, Functions and Methods,
Data Acquisition and Duplication Concepts
Data Acquisition Types
Disk Acquisition Tool Requirements
Validation Methods
RAID Data Acquisition
Acquisition Best Practices
Data Acquisition Software Tools
Data Acquisition Hardware Tools
Encryption using non-cryptographic tools (vi, zip)
Authentication principles and methods
Passwords, two-factor authentication
One-way encryption
Steganography
Hamming
Chaffing and Winnowing
TShark and Dumpcap Command-Line Tools
Capinfos Command-Line Tool
Editcap Command-Line Tool
Mergecap Command-Line Tool
Text2pcap Command-Line Tool
Split and Merge Trace Files
Prerequisites to test planning
Understand the Characteristics of the Software Being Developed
Build the Test Plan, Write the Test Plan
Introduction to Cisco WLAN
RF Technology
Wireless Standards.
Configuring Wireless LAN.
Wireless LAN Security.
Introduction to AngularJS, What it is and why you should use it
Obtaining and installing AngularJS, Core AngularJS Concepts
Single-Page Applications, Bootstrapping with ng-app Directives
Templates, Repeaters, Data Binding, Tool Dependencies
Installing Node.js, npm Scripts, Managing your Source Code, AngularJS MVC
MVC Design Pattern, Models, Views, Controllers, Scope
Inversion of Control / Dependency Injection with AngularJS
Data Binding in AngularJS, Passing Data from a Controller to a View
Feeding HTML inputs back to the Controller, Retrieving data from the server
The Angular $digest Cycle, Debugging Data Bindings
…using AngularJS Batarang, …using browser console log
AngularJS Forms, The Form Controller, Form Submission, AngularJS form validation
Debugging Form validation, Angular's form validation CSS classes, AngularJS Filters
Using AngularJS Filters, Out-of-the-box & custom Angular filters, AngularJS Directives
Consolidating HTML with a Directive, Scope, Templates, Parameters, Functions – Link & Compile
Complex directives, Communicating between directives, AngularJS Services
Defining Services, Consolidating shared code, Using Services to share common data
Building our own Services, RESTful Services with AngularJS
AngularJS Routing, Improving the User Experience with Routing, Routing Modules
ngRoute:ngRoute and ui-router, $routeProvider, The $route service, Nested Routing
TDD & Unit Testing with AngularJS, Separation of Concern, TDD with Jasmine
Testing Controllers, Testing Filters, Testing Directives, End-to-End Testing AngularJS Applications
Introduction, Accessing values in dictionaries
Working with dictionaries, Properties,
Red Hat’s approach to packet routing and forwarding will be reviewed.
Firewall theory, tools, and procedures will be covered in detail in both lecture and hands on labs.
ARP Overview
ARP Packet Structure
Filter on ARP Traffic
Analyze Normal/Problem ARP Traffic
Access Control Service(ACS)
Admin :Configuring ACS
Admin: Identity providers.
Service Bus features
Admin: Provisioning Service bus namespace.
Need for service bus and ACS
Data Acquisition and Duplication Concepts
Data Acquisition Types
Disk Acquisition Tool Requirements
Validation Methods
RAID Data Acquisition
Acquisition Best Practices
Data Acquisition Software Tools
Data Acquisition Hardware Tools
System Administration policies
Security audit
Penetration testing and ethical hacking
Mandatory Access control, Discretionary Access Control
Monitoring and logging tools
Legal aspects
DoS/DDoS Concepts
DoS Attack Techniques
Botnet
DDoS Case Study
DoS Attack Tools
Counter-measures
DoS/DDoS Protection Tools
Denial-of-Service (DoS) Attack Penetration Testing
Single-Dimension Arrays, Initializing an Array using for Each,
User-Defined Data Types, Accessing Information with User-Defined Data Types,
Using List Boxes with Array, Two dimensional arrays.
SQLite Overview
Installation, Commands, Syntax,Data Types
Create Database, Attach Database, Detach Database
Create Table, Drop Table, Insert Query, Select Query
Operators, Expressions, Where Clause, AND & OR Clauses
Update Query, Delete Query, Like Clause
Glob Clause, Limit Clause, Order By, Group By
Having Clause, Distinct Keyword
Cross site scripting
JSONHijacking
Wordpress | Joomla | Drupal Bugs
CMS Vulnerability Analysis
Remote Code Execution
Critical File Found
File Inclusion (LFI /RFI)
File Upload Vulnerabilities
Directory Traversal
CORS
Script Source Code Disclosure
HTTP Parameter Pollution Attack
Subdomain Takeover
Documenting & Reporting Vulnerability
Data Analysis Techniques
Investigating Live Systems (Windows &Unix)
Investigating Hacker Tools
Ethical Issues
Cyber Crime
Overview of Management in an Enterprise Data Center
Planning and Implementing a Server Virtualization Strategy
Planning and Implementing Networks and Storage for Virtualization
Planning and Deploying Virtual Machines
Planning and Implementing a Virtualization Administration Solution
Planning and Implementing a Server Monitoring Strategy
Planning and Implementing High Availability for File Services and Applications
Planning and Implementing a High Availability Infrastructure Using Failover Clustering
Planning and Implementing Server Update Infrastructure
Planning and Implementing a Business Continuity Strategy
Planning and Implementing an Public Key Infrastructure
Planning and Implementing an Identity Federation Infrastructure
Planning and Implementing an Information Rights Management Infrastructure
Persisting data in the Hive MegaStore
Performing queries with HiveQL
Investigating Hive file formats
Introduction to Cisco WLAN
RF Technology
Wireless Standards
Configuring Wireless LAN
Wireless LAN Security.
Redundancy
Failover
Geographical diversity
Failback
Replication
Site mirroring
Hot site
Cold site
Warm site
Backup and recovery
Archiving and offsite storage
Replication types
RTO
RPO
MTBF
MTTR
Mission critical requirements
DoS/DDoS Concepts
DoS Attack Techniques
Botnet
DDoS Case Study
DoS Attack Tools
Counter-measures
DoS/DDoS Protection Tools
Denial-of-Service (DoS) Attack Penetration Testing
Integrating System Center and Server Virtualization
Overview of System Center 2012 Virtual Machine Manager
Installing System Center 2012 R2 Virtual Machine Manager
Adding Hosts and Managing Host Groups
Installing and Configuring System Center 2012 VMM SP1
Managing Hosts and Host Groups
Defining an Array, Initializing & Accessing Array.
Multi –Dimensional Array, Operation on String.
Mutable & Immutable String, Using Collection Bases Loop for String.
Tokenizing a String, Creating Strings using StringBuffer.
Introduction to jQuery, jQuery and JavaScript
jQuery and AJAX, Flavours of jQuery, Consistent UX with jQuery
Obtaining / Accessing the jQuery library, The jQuery Event Model
Binding event handlers, Removing event handlers, User Interface / Mouse events
Event Manipulation Methods, jQuery Selectors, Identifying DOM elements
Constructing jQuery Selectors, Basic CSS selectors, Positional selectors
Custom jQuery selectors, Chaining jQuery operations, Escaping meta-characters
The ready() handler, Tweaking DOM objects with jQuery, Getting objects by ID, Class, Tag
Modifying object and attributes on-the-fly, Changing an object’s Inner Text
Styles and CSS Classes, Handling Events with jQuery, jQuery and AJAX calls, Using the ajax() API
Loading data with GET & POST, Working with JSON data, Serialising your form handling with serialize()
Handling a completed AJAX request, Security considerations, Simple jQuery animations
Sliding, Toggling, Fading, Easing, Dealing with Durations, Creating custom jQuery animations
Binding animations to Events & Callbacks, Intro to jQuery Mobile, Overview of jQuery Mobile
Touch-optimized layouts & UI widgets
Defining an Array, Initializing & Accessing Array.
Multi –Dimensional Array, Operation on String.
Mutable & Immutable String, Using Collection Bases Loop for String.
Tokenizing a String, Creating Strings using StringBuffer.
Disk performance
Disk tuning
Disk latency
Swap disk space
I/O tuning
Performance management and monitoring tools
Establish baseline and create documentation with appropriate tools
Hypervisor configuration best practices
Impact of configuration changes to the virtual environment
Common issues
UDP Overview
Watch for Service Refusals
UDP Packet Structure
Filter on UDP Traffic
Follow UDP Streams to Reassemble Data
Analyze Normal/Problem UDP Traffic
Mining data with Mahout
Visualising processed results with reporting tools
Querying in real time with Impala
Managing Networking Infrastructure
Managing Storage Infrastructure
Managing Infrastructure Updates
Implementing a Network Infrastructure
Implementing a Storage Infrastructure
Managing Infrastructure Updates
Classes, Creating a new Class,
Creating a new object using a class, choosing when to create New Objects,
The Initialize & Terminate events.
Overview of wireless technologies and security
Personal Area Networks, Wireless Local Area Networks
Metropolitan Area Networks, Wide Area Networks
Wireless threats, vulnerabilities and security
Wireless LANs, War Driving, War Chalking, War Flying
Common Wi-fi security recommendations, PDA Security
Cell Phones and Security, Wireless DoS attacks, GPS Jamming, Identity theft
Introduction to Firewall & VPN
Device Types
Basic configuration & usage.
Creating network utilities with security devices .
Security Concerns on cloud
Comparison of security on cloud to premise at Hardware layer
Comparison of security on cloud to premise at operating system layer
Application Security on the cloud
Services to enhance cloud security
Disk Partitioning & Managing Partitions
Managing Data: File System Creatio
Session Hijacking Concepts
Network-level Session Hijacking
Session Hijacking Tools
Counter-measuresSession Hijacking Pen Testing
Introduction to Firewall & VPN
Device Types
Basic configuration & usage
Creating network utilities with security devices
Session Hijacking Concepts
Network-level Session Hijacking
Session Hijacking Tools
Counter-measuresSession Hijacking Pen Testing
Password Cracking Concepts
Types of Password Attacks
Classification of Cracking Software
Systems Software vs. Applications Software
System Software Password Cracking
Application Software Password Cracking
Password Cracking Tools
Creating , adding, removing Forms in project, Hide,
Show Method, Load, Unload
Statement, Me Keyword, Referring to Objects on a Different Forms,
Webserver Concepts
Webserver Attacks
Attack Methodology
Webserver Attack Tools
Counter-measures
Patch Management
Webserver Security Tools
Webserver Pen Testing
Private
Public
Hybrid
Community
On-premise vs. Off-premise hosting
Accountability and responsibility based on delivery models
Security differences between models
Functionality and performance validation based on chosen delivery model
Orchestration platforms
Establishing your Big Data needs
Meeting business goals with timely data
Evaluating commercial Big Data tools
Managing organisational expectations
DApplet & Application, Applet Architecture.
Parameters to Applet, Embedding Applets in Web page.
Applet Security Policies, A Collection of Useful Classes.
Utility Methods for Arrays, Observable and Observer Objects.
Date & Times, Using Scanner, Regular Expression
Input/Output Operation in Java(java.io Package)
Streams and the new I/O Capabilities, Understanding Streams
The Classes for Input and Output, The Standard Streams
Working with File Object
Overview of Backup and Restore Options for Virtual Machines
Protecting Virtualization Infrastructure by Using Data Protection Manager
Using System Center Operations Manager for Monitoring and Reporting
Integrating Virtual Machine Manager with Operations Manager
Implementing System Center 2012 R2 Operations Manager Agent
Configuring Operations Manager Monitoring Components
Configuring Operations Manager Integration with Virtual Machine Manager
Webserver Concepts
Webserver Attacks
Attack Methodology
Webserver Attack Tools
Counter-measures
Patch Management
Webserver Security Tools
Webserver Pen Testing
CIA triad in mobile phones-Voice
SMS and Identification data interception in GSM
Introduction, practical setup and tools
implementation- Software and Hardware Mobile phone tricks
Netmonitor, GSM network service codes, Mobile phone codes
Catalog tricks and AT command set- SMS security issues
Identify and correct common network problems
Utilize Netflow data
Troubleshoot and correct common problems associated with IP addressing and host configurations
Troubleshoot and Resolve VLAN problems.
Troubleshoot and Resolve Trunking problems on Cisco switches..
Troubleshoot and Resolve Spanning Tree operation issues
Troubleshoot and Resolve routing issues.
Troubleshoot and Resolve OSPF problems.
Troubleshoot and Resolve EIGRP problems
Troubleshoot and Resolve Inter VLAN routing problems.
Troubleshoot and Resolve ACL issues.
Troubleshoot and Resolve WAN implementation issues.
Troubleshoot and Resolve Layer 1 problems.
Monitor NetFlow statistics
Troubleshoot Etherchannel pro
HTTP Overview
HTTP Packet Structure
Filter on HTTP Traffic
Reassembling HTTP Objects
HTTP Statistics
Analyze Normal/Problem HTTP Traffic
Opening and Closing Data Files, The Free File Function, Viewing the data in a file,
Sequential File Organization (Writing Data to a sequential Disk File,
Creating a sequential data file, Reading the Data in a sequential file,
Finding the end of a Data file, Locating a file). Trapping Program Errors,
The Err Object, Random Data File Opening a random file,
Reading and writing a random file(Get, Put, LOF, Seek).
Network Forensics
Network Attacks
Log Injection Attacks
Investigating and Analyzing Logs
Investigating Network Traffic
Traffic Capturing and Analysis Tools
Documenting the Evidence Gathered on a Network
Identify and correct common network problems.
Utilize Netflow data.
Troubleshoot and correct common problems associated with IP addressing and host configurations.
Troubleshoot and Resolve VLAN problems.
Troubleshoot and Resolve Trunking problems on Cisco switches.
Troubleshoot and Resolve Spanning Tree operation issues.
Troubleshoot and Resolve routing issues.
Troubleshoot and Resolve OSPF problems.
Troubleshoot and Resolve EIGRP problems.
Troubleshoot and Resolve Inter VLAN routing problems.
Troubleshoot and Resolve ACL issues.
Troubleshoot and Resolve WAN implementation issues.
Troubleshoot and Resolve Layer 1 problems.
Monitor NetFlow statistics.
Troubleshoot Etherchannel problems.
App fabric Caching Architecture
Admin : Provisioning the cache
Admin : Upgrading the cache
Admin : Cache security using the ACS
Exploring API’s of app fabric caching
Performance improvement using cache
Test case Design, Building test cases
Test data mining, Test execution
Test Reporting, Defect Management
Test Coverage – Traceability matrix
Test Metrics – Guidelines and usage
Cloud Migration requirements
How to Migrate applications to cloud
Web App Concepts
Web App Threats
Web App Hacking Methodology
Analyze Web Applications
Attack Authentication Mechanism
Authorization Attack Schemes
Attack Session Management Mechanism
Perform Injection Attacks
Attack Data Connectivity
Attack Web App Client
Attack Web Services
Web Application Hacking Tools
Countermeasures
Security Tools
Web App Pen Testing
Type I and Type II
Proprietary vs. open source
Consumer vs. enterprise use
Web App Concepts
Web App Threats
Web App Hacking Methodology
Analyze Web Applications
Attack Authentication Mechanism
Authorization Attack Schemes
Attack Session Management Mechanism
Perform Injection Attacks
Attack Data Connectivity
Attack Web App Client
Attack Web Services
Web Application Hacking Tools
Countermeasures
Security Tools
Web App Pen Testing
Calling a function, Types of functions, Function Arguments, Anonymous functions
Global and local variables,
Crime and mobile phones
Evidences, Forensic procedures, Files present in SIM card
Device data, External memory dump, Evidences in memory card
Operators systems, Android forensics, Procedures for handling an android device
Imaging android USB mass storage devices, Logical and physical techniques
Guidelines for writing test reports
Test Tools used to Build Test Reports, Managing Change
Software Configuration Management, Change Management
Risks – Risk Analysis and Management with examples
User Acceptance testing – in detail explanation with details
Case Study: How to test web, stand alone and database applications – with examples.
Creating the database files for use by Visual Basic ( Using MS-Access),
Using the Data Control ,setting its property, Using Data Control with forms,
navigating the database in code , checking for BOF & EOF,
Using listboxes & comboboxes as data bound controls,
updating a database file ( adding, deleting records )
Examining SSL/HTTPS Traffic
Wireshark v1.6.0 Bug Alert #201106
Filter on SSL
Reading and Writing to Files, Buffer and Buffer Management
Read/Write Operations with File Channel, Serializing Objects
GUI Programming, Designing Graphical User Interfaces in Java
Components and Containers, Basics of Components
Using Containers, Layout Managers
Focusing on business importance
Framing the problem
Selecting the correct tools
Achieving timely results
Wireless Technologies
Wireless Attacks
Investigating Wireless Attacks
Features of a Good Wireless Forensics Tool
Wireless Forensics Tools
Introduction to Web Applications and Webservers
Web Logs
Web Attacks
Web Attack Investigation
Web Attack Detection Tools
Tools for Locating IP Address
Email System Basics
Email Crimes
Email Headers
Steps to Investigate
Email Forensics Tools
Laws and Acts against Email Crimes
SQL Injection Concepts
Testing for SQL Injection
Types of SQL Injection
Blind SQL Injection
SQL Injection Methodology
Advanced SQL Injection
SQL Injection Tools
Evasion Techniques
Counter-measures
First Step: Create a Troubleshooting Profile
Customize the User Interface
Add Custom Columns for the Packet List Pane
Set Your Global Capture Preferences
Define Name Resolution Preferences
Configure Individual Protocol Preferences
SQL Injection Concepts
Testing for SQL Injection
Types of SQL Injection
Blind SQL Injection
SQL Injection Methodology
Advanced SQL Injection
SQL Injection Tools
Evasion Techniques
Counter-measures
Digital forensics
Introduction – Evidential potential of digital devices
Closed vs. open systems
Evaluating digital evidence potential, Device handling
Seizure issues, device identification
Networked devices and contamination
Mobile Phone
Mobile Operating Systems
Mobile Forensics
Mobile Forensic Process
Mobile Forensics Software Tools
Mobile Forensics Hardware Tools
Random module, Packages, Composition,
Adding a Menu to Window
Extending GUI Features Using Swing Components
Java Utilities (java.util Package), The Collection Framework
Collections of Objects, Collection Types, Sets, Sequence, Map, Understanding Hashing
Use of ArrayList & Vector, Event Handling, Event-Driven Programming in Java
Event- Handling Process, Event-Handling Mechanism
The Delegation Model of Event Handling, Event Classes, Event Sources, Event Listeners
Adapter Classes as Helper Classes in Event Handling
Anonymous Inner classes a Short –cut to Event Handling
Avoiding Deadlocks in GUI Code, Event Types & Classes, Networking Programming
Networking Basics, Client-Server Architecture, Socket Overview
Networking Classes and Interfaces, Network Protocols, Developing Networking Applications in Java
Shared resources
Elasticity
Network and application isolation
Infrastructure consolidation
Virtual datacenter creation
Selecting suitable vendors and hosting options
Balancing costs against business value
Keeping ahead of the curve
Basics of automation testing – why, when and how to perform automation testing
Factors for choosing a particular tool
An overview for the major functional testing tools
Overview of Test management and bug tracking tools
Displaying data in grids ( grid control, properties of grid ) ,
Displaying the record no & record count, opening the database,
Validation & error trappings ( locking text boxes, trap errors with On Error,
File open errors ) , Recordset , searching for a specific record ,
Seek method, working with database fields, creating a new dynaset.
Introduction to JDBC, JDBC Drivers & Architecture
CURD operation Using JDBC, Connecting to non-conventional Databases.
Mail API, Introduction to Email Technical Internals
Understanding of POP and SMTP framework, Complete understanding the email API
Mass mailer Application development
Disk types
Tiering
RAID levels
File system types
Examine Trace File Summary Information
View Active Protocols
Graph Throughput to Spot Performance Problems Quickly
Locate the Most Active Conversations and Endpoints
Other Conversation Options
Graph the Traffic Flows for a More Complete View
Numerous Other Statistics are Available
Quick Overview of VoIP Traffic Analysis Tools
Wireless Concepts
Wireless Encryption
Wireless Threats
Wireless Hacking Methodology
GPS Mapping
Wireless Traffic Analysis
Launch Wireless Attacks
Crack Wi-Fi Encryption
Wireless Hacking Tools
Bluetooth Hacking
Wireless Security ToolsWi-Fi Pen Testing
Printing on screen, Reading data from keyboard, Opening and closing file
Reading and writing files, Functions,
Digital forensics examination principles
Previewing, imaging, continuity, hashing and evidence locations
Seven element security model, Developmental model of digital systems
Audit and logs, Evidence interpretation, Data content and context
Wireless Concepts
Wireless Encryption
Wireless Threats
Wireless Hacking Methodology
GPS Mapping
Wireless Traffic Analysis
Launch Wireless Attacks
Crack Wi-Fi Encryption
Wireless Hacking Tools
Bluetooth Hacking
Wireless Security ToolsWi-Fi Pen Testing
TCP/IP Functionality
When Everything Goes Right
The Multi-Step Resolution Process
Resolution Helped Build the Packet
Where Faults Can Occur
Typical Causes of Slow Performance
Web Application Basics, Architecture and challenges of Web Application.
Introduction to servlet, Servlet life cycle, Developing and Deploying Servlets
Exploring Deployment Descriptor (web.xml)., Handling Request and Response
Initializing a Servlet, Accessing Database, Servlet Chaining
Session Tracking & Management, Dealing with cookies, Transferring Request
Accessing Web Context, Passing INIT and CONTEXT Parameter
Sharing information using scope object, Controlling concurrent access
User Authentication, Filtering Request and Response, Programming Filter
Filter Mapping, Servlet Listener
Mobile Platform Attack Vectors
Hacking Android OS
Hacking iOS
Hacking Windows Phone OS
Hacking BlackBerry
Mobile Device Management (MDM)
Mobile Security Guidelines and Tools
Mobile Platform Attack Vectors
Hacking Android OS
Hacking iOS
Hacking Windows Phone OS
Hacking BlackBerry
Mobile Device Management (MDM)
Mobile Security Guidelines and Tools
Exception
Exception Handling, Except clause, Try ? finally clause,
User Defined Exceptions
WAN
LAN
MAN
Bandwidth
Latency
Compression
Caching
Load balancing
Devices on the same subnet
Security and Privacy for Mobile and Wireless Networks
Introduction- State of the Art, Areas for Future Research
General Recommendation for Research, Pervasive Systems
Enhancing Trust Negotiation with Privacy Support
Trust Negotiation, Weakness of Trust Negotiation
Extending Trust Negotiation to Support Privacy
Basic JSP Architecture, Life Cycle of JSP (Translation, compilation)
JSP Tags and Expressions, Role of JSP in MVC-2
JSP with Database, JSP Implicit Objects, Tag Libraries
JSP Expression Language (EL), Using Custom Tag, JSP Capabilities:
Exception Handling, Session Management, Directives, JSP with Java Bean
Mobile system architectures, Overview of mobile cellular systems
GSM and UMTS Security & Attacks, Vulnerabilities in Cellular Services
Cellular Jamming Attacks & Mitigation, Security in Cellular VoIP Services
Mobile application security
IPv4 Overview
IPv4 Packet Structure
Analyze Broadcast/Multicast Traffic
Filter on IPv4 Traffic
IP Protocol Preferences
Analyze Normal/Problem IP Traffic
Class and object, Attributes, Inheritance, Overloading
Overriding, Data hiding
IDS, Firewall and Honeypot Concepts
IDS, Firewall and Honeypot System
Evading IDS
Evading Firewalls
Detecting Honeypots
Firewall Evading Tools
Countermeasures
Penetration Testing
IDS, Firewall and Honeypot Concepts
IDS, Firewall and Honeypot System
Evading IDS
Evading Firewalls
Detecting Honeypots
Firewall Evading Tools
Countermeasures
Penetration Testing
BIOS/firmware configurations
Minimum memory capacity and configuration
Number of CPUs
Number of Cores
NICs quantity, speeds, and configurations
Internal hardware compatibility
HBAs
Storage media
Overview of Wireless security, Scanning and Enumerating 802.11 Networks
Attacking 802.11 Networks, Attacking WPA protected 802.11 Networks
Bluetooth Scanning and Reconnaissance, Bluetooth Eavesdropping
Attacking and Exploiting Bluetooth, Zigbee Security, Zigbee Attacks
Memory
CPU
Storage and network allocation
Entitlement/quotas (shares)
Reservations
Licensing
Resource pooling
TCP Overview
The TCP Connection Process
TCP Handshake Problem
Watch Service Refusals
TCP Packet Structure
The TCP Sequencing/Acknowledgment Process
Packet Loss Detection in Wireshark
Fast Recovery/Fast Retransmission Detection in Wireshark
Retransmission Detection in Wireshark
Out-of-Order Segment Detection in Wireshark
Selective Acknowledgement (SACK)
Window Scaling
Window Size Issue: Receive Buffer Problem
Window Size Issue: Unequal Window Size Beliefs
TCP Sliding Window Overview
Troubleshoot TCP Quickly with Expert Info
Filter on TCP Traffic and TCP Problems
Properly Set TCP Preferences
Follow TCP Streams to Reassemble Data
Cryptography Concepts
Encryption Algorithms
Cryptography Tools
Public Key Infrastructure(PKI)
Email Encryption
Disk Encryption
Cryptography Attacks
Cryptanalysis Tools
RMI overview, RMI architecture, Example demonstrating RMI
Enterprise JAVA Beans, Enterprise Bean overview, Types of enterprise beans
Advantages of enterprise beans, The Life Cycles of Enterprise Beans
Working with Session Beans, Statefull vs. Stateless Session Beans
Working with Entity Beans, Message Driven Beans
JNDI (Java Naming and Directory Interface), JNDI overview
JNDI API, Context operations, Using JNDI in J2EE applications
Cryptography Concepts
Encryption Algorithms
Cryptography Tools
Public Key Infrastructure(PKI)
Email Encryption
Disk Encryption
Cryptography Attacks
Cryptanalysis Tools
Match function, Search function
Matching VS Searching, Modifiers, Patterns,
Obfuscation
Access Control Lists
Zoning
LUN masking
User and host authentication
Review/audit logs
Pen Testing Concepts
Types of Pen Testing
Pen Testing Techniques
Pen Testing Phases
Pen Testing Roadmap
Outsourcing Pen Testing Services
Security in Ad Hoc Wireless Networks, Network Security Requirements
Issues and Challenges in Security Provisioning, Network Security Attacks
Key Management in Adhoc Wireless Networks, Secure Routing in Adhoc Wireless Network
Introduction, Architecture CGI environment variable,
GET and POST methods
Cookies, File upload,
Pen Testing Concepts
Types of Pen Testing
Pen Testing Techniques
Pen Testing Phases
Pen Testing Roadmap
Outsourcing Pen Testing Services
Introduction, RFID Security and privacy, RFID chips Techniques and Protocols
RFID anti-counterfeiting, Man-in-the-middle attacks on RFID systems
Digital Signature Transponder
Combining Physics and Cryptography to Enhance Privacy in RFID Systems
Scalability Issues in Large-Scale Applications
An Efficient and Secure RFID Security Method with Ownership Transfer
Policy-based Dynamic Privacy Protection Framework leveraging Globally Mobile RFIDs
User-Centric Security for RFID based Distributed Systems
Optimizing RFID protocols for Low Information Leakage
RFID: an anti-counterfeiting tool
Introduction, Connections, Executing queries
Transactions, Handling error,
Disabling unneeded ports and services
User credentials
Host-based/software firewalls
Antivirus software
Patching
Deactivating default accounts
Computer Infection Program, Life cycle of malware
Virus nomenclature, Worm nomenclature, Tools used in computer virology
Non self-reproducing Malware, Working principle of Trojan Horse
Implementation of Remote access and file transfer
Working principle of Logical Bomb, Case Study: Conflicker C worm
Trigger Mechanisms, Testing virus codes, Case Study: Brute force logical bomb
Socket, Socket Module, Methods
Client and server, Internet modules,
IOPS
Read vs. write files
File system performance
Metadata performance
Caching
Bandwidth
Throughput (bonding/teaming)
Jumbo frames
Network latency
Hop counts
QoS
Multpathing
Load balancing
Scaling
Thread, Starting a thread
Threading module, Synchronizing threads,
Multithreaded Priority Queue
Overview of Wireless security, Scanning and Enumerating 802.11 Networks
Attacking 802.11 Networks, Attacking WPA protected 802.11 Networks
Bluetooth Scanning and Reconnaissance, Bluetooth Eavesdropping
Attacking and Exploiting Bluetooth, Zigbee Security, Zigbee Attacks
Fault tolerance
Multipathing
Load balancing
Introduction,
Tkinter programming,
Tkinter widgets
Computer Virus in Interpreted programming language
Designing Shell bash virus under Linux, Fighting over infection
Antiviral fighting, Polymorphism, Case study: Companion virus
Klez Virus, Clone Virus, Doom Virus, Black wolf worm, Sassar worm, Happy worm 99
Elasticity
On-demand self serve/just in time service
Pay-as-you-grow
Chargeback
Ubiquitous access
Metering resource pooling
Multitenancy
Cloud bursting
Rapid deployment
Automation
Creating, importing, and exporting template and virtual machines
Install guest tools
Snapshots and cloning
Image backups vs. file backups
Virtual NIC
Virtual disks
Virtual switches
VLAN
VSAN
Ethical Hacking terminology, Five stages of hacking, Vulnerability Research
Legal implication of hacking, Impact of hacking, Foot Printing & Social Engineering
Information gathering methodologies, Competitive Intelligence
DNS Enumerations, Social Engineering attacks
Virtual network components
Shared memory
Virtual CPU
Storage Virtualization
Port Scanning-Network Scanning, Vulnerability Scanning, NMAP scanning tool
OS Fingerprinting, Enumeration, Password cracking techniques, Key loggers
Escalating privileges, Hiding Files, Steganography technologies, Countermeasures
Active and passive sniffing, ARP Poisoning, Session Hijacking, DNS Spoofing
Conduct SQL Injection attack, Countermeasures
Creating LUNs
Creating network shares
Zoning and LUN masking
Multipathing
Implications of adding capacity to a NAS and SAN
The big picture, Learning from experience, Weaknesses in Information Security
The extent of crime in cyberspace, The cyberspace crimoid syndrome
Policies and technologies, A new framework for information security
Risk assessment, Richard Baskerville’s risk assessment methodology
Generations of risk assessment techniques, Quantitative approach to risk assessment
Problems with Quantitative approach, NIST ALE- Baseline approach
Tools
Review documentation and device configuration settings
Review system logs
Measuring ROI on security, Security patch management
Purposes of Information Security management,the building blocks of information security
Human side of information security,Security management,Securing new technology
Overview of SSE CMM- SSE CMM relationship to other initiatives- Capability
levels- Security Engineering- Security Engineering process overview- Basic
process areas- Configuration management- Base practices- Establish
Configuration management. Maintaining information security during downsizing
Business case for Information Security,Information Security Management in industry
Protecting high tech trade secrets, Outsourcing Security
Protocols
Alert methods
Establish baselines and thresholds
Automated responses to specific events
Examine processes usage / resource usage
What is Risk?, Information Security Risk Assessment Overview
Drivers, Laws and Regulations,Risk Assessment Frame work,Practical Approach
Data Collection,The Sponsors,The Project Team,Data Collection Mechanisms
Executive Interviews,Document Requests,IT Assets Inventories,Profile & Control Survey
Data Analysis,Compiling Observations,Preparation of catalogs,System Risk Computation
Impact Analysis Scheme,Final Risk Score,Risk Assessment, System Risk Analysis
Risk Prioritization,System Specific Risk Treatment,Issue Registers,Methodology Result
Risk Registers,Security Audit Process,Pre-planning audit,Audit Risk Assessment
Performing Audit,Internal Controls,Audit Evidence,Audit Testing,Audit Finding
Remote hypervisor access
RDP
SSH
Console port
HTTP
Storage System, Introduction to Information Storage and Management
Storage System Environment, Data Protection Raid,Intelligent Storage System
Storage Networking Technologies and Virtualization, Storage Networks
Network Attached Storage, IP SAN, Content Addressed Storage, Storage Virtualization
Backup & Recovery,Local Replication,Remote Replication,Securing storage Infrastructure
Storage Security Framework,Risk Triad,Storage Security Domains
Security Implementation in Storage Networking
Managing & Monitoring the Storage Infrastructure,Storage Management Activities
Developing an Ideal Solution
PKI
IPSEC
SSL/TLS
Ciphers
Encryption for data in transit and encryption for data at rest
Cloud Computing definition,Private, public and hybrid cloud,Cloud types,IaaS,PaaS,SaaS
Benefits and challenges of cloud computing,Public vs private clouds
Role of virtualization in enabling the cloud,Business Agility,Benefits & challenges to Cloud
Technologies and the processes required when deploying web services
Deploying a web service from inside and outside a cloud architecture
Advantages and Disadvantages,Development environments for service development
Amazon, Azure, Google App,Security Concepts,Confidentiality, privacy, integrity
Authentication,non- repudiation,Availability,accesscontrol,defence in depth Least privilege
How these concepts apply in the cloud and their importance in PaaS, IaaS and SaaS.
Multi-tenancy Issue,Isolation of users/VMs from each other,How the cloud provide this
Virtualization System Security Issues,ESX and ESXi Security, ESX file system security
Storage considerations, backup and recovery,Virtualization System Vulnerabilities
Security management in the cloud,Security management standards
SaaS, PaaS, IaaS availability management,Access control
Data security and storage in cloud
Fundamentals Of Cyber Security, Introduction-Cyber Security and its problem
Intervention Strategies, edundancy, Diversity and Autarchy,Issues In Cyber Security
Private ordering solutions,Regulation and Jurisdiction for global Cyber security
Copy Right-source of risks,Pirates, Internet Infringement, Postings, Criminal liability
First Amendments, Data Loss,Intellectual Property Rights,Copy Right-source of risks
Pirates, Internet Infringement,Fair Use, Postings, Criminal liability
First Amendments, Data Loss,Trademarks, Defamation,Privacy-Common Law Privacy
Constitutional law, Federal Statutes,Anonymity, Technology expanding privacy rights
Procedural Issues,Duty of Care,Criminal Liability,Electronic Contracts & Digital Signatures
Misappropriation of information,Civil Rights, Tax, Evidence
Legal Aspects Of Cyber Security, Ethics, Legal Developments
Late 1990 to 2000, Cyber security in Society,Security in cyber laws case
Studies, General law and Cyber Law, A Swift Analysis
Network and IP planning/documentation
Configuration standardization and documentation
Change management best practices
Configuration management
Capacity management
Systems life cycle management
Maintenance windows
Test replication
Test latency
Test bandwidth
Test load balancing
Test application servers
Test storage
Test application delivery
Service performance testing and application performance testing
Penetration testing
Vulnerability assessment
Separation of duties during testing
