top of page
Careers
We invest in technologies that we expect will make the most difference to our business and the IT industry. Our upstream business combines technologies and innovations for the effective use of time & resources & meet world's growing demand for IT services.

Job Applications
• Identifying personal computer components
• Motherboard types
• Motherboard components
• Identifying purpose and characteristics of processor
• Identifying purpose and characteristics of memory
• RAM
• Types of RAM
• Speed Specifications
• Physical Differentiation among RAM
• Types of ROM
• Identifying purpose and characteristics of storage devices
• Identifying purpose and characteristics of display devices
• Identifying purpose and characteristics of other components
• Essential terminology
• Defining security
• Need for security
• Cyber crime
• Information Security statistics
• IS triangle
• Security myths
• How to harden security
• >Components That Make Up Your Computer
• How To Add Random Access Memory To Speed Up Your Desktop
• Install More RAM In Your Laptop For More Speed
• How to Easily and Safely Install RAM
• How To Troubleshoot RAM Memory
• Memory Testing Software Utilities
• Get More Computer Storage By Installing A Larger Hard Drive
• How To Replace A DVD Drive In Your Laptop
• Careers in Web Technologies & Job Roles
• How the website works
• Client and server scripting languages
• Difference between web designer & web developer
• Types of websites & Web standards
• Installing Softwares & Tools
• Threats, risks, consequences
• Sources of threats
• Attacks classification
• Preventive measures, remedial measures
• Terms & concepts
• Evolution of windows operating system
• MSDOS Evolution
• The Registry
• Registry Hacking
• Booting sequence of system
• Key Boot Files
• Printers
• The four dimensions of Big Data: volume, velocity, variety, veracity
• Introducing the Storage, MapReduce and Query Stack
• Establishing the business importance of Big Data
• Addressing the challenge of extracting useful data
• Integrating Big Data with traditional data
• Object Oriented Programming (OOPS) concepts and terminology, Advantages of OOPS
• Fundamentals of OOPS, Core Java Programming Introduction of Java
• What is Java?, How to Get Java, A First Java Program, Compiling and Interpreting Applications
• The JDK Directory Structure, Using Eclipse
• Data types and Variables, Primitive Datatypes, Declarations, Variable Names
• Numeric Literals, Character Literals, String formatting and Parsing, String Literals
• Arrays,Non-Primitive Datatypes, The Dot Operator
• Methods, Calling Methods, Defining Methods, Method Parameters Scope, Why all the static?
• Operators and Expressions, Expressions, Assignment Operator, Arithmetic Operators
• Relational Operators, Logical Operators, Increment and Decrement Operators
• Operate-Assign Operators (+=, etc.), The Conditional Operator, Operator Precedence
• Implicit Type Conversions, The Cast Operator, Strict typing, Type conversion
• Control Flow Statements, Conditional (if) Statements, Data types and Variables
• Adding an else if, Conditional (switch) Statements, while and do-while Loops, for Loops
• The continue Statement, The break Statement
• Introduction to Object-Oriented Programming, Classes and Objects, Fields and Methods
• Encapsulation, Access Control, Inheritance, Polymorphism
• Using Java Objects, Printing to the Console, printf Format Strings, StringBuilder and StringBuffer
• Methods and Messages, toString, Parameter Passing, Comparing and Identifying Objects, Destroying Objects
• Inheritance in Java, Casting, Method Overriding, Polymorphism, super keyword, The Object Class
• Packages, The import Statement, Static Imports, CLASSPATH and Import, Defining Packages, Package Scope
• Interfaces and Abstract Classes, Separating Interface and Implementation, Defining Interfaces
• UML Interfaces and Realization, Implementing and Extending Interfaces, Runnable Threads, Abstract Classes
• Lambda Built-in Functional Interfaces, java.util.function package, Use primitive versions of functional interface
• Use binary versions of functional interface, Use the UnaryOperator interface
• Exception Handling, Exceptions Overview, Catching Exceptions, The finally Block, Exception Methods
• Declaring Exceptions, Defining and Throwing Exceptions, Errors and Runtime Exceptions, Assertions
• The Collections Framework, The Set Interface, Set Implementation Classes, The List Interface
• List Implementation Classes, The Map Interface, Map Implementation Classes, Utility classes, Generics
• Inner Classes, Member Classes, Local Classes, Anonymous Classes, Instance Initializers, Static Nested Classes
• Introduction to Threads, Non-Threaded Applications, Threaded Applications, Creating Threads
• Thread States, Runnable Threads, Coordinating Threads, Interrupting Threads, Runnable Interface ,ThreadGroups
• Swing, Swing GUI Components, Using Swing API
• Applet, Life Cycle of an Applet
• JDBC, Creating a Database and tables, Getting Information from Database, Obtaining Result Set Information
• Connecting a Java program to a Database, Prepared Statements & Statement Classes in Java
• Inserting, Updating & Deleting Table data
• Servlets, What is a web application, Java Servlets, What is a Servlet, Servlet Lifecycle, Servlet Context
• Session management, Building the first Servlet, Deploying the Servlet
• JSP, What is a JSP Page, Basic HTML Tags, JSP Tag library, JSP Page Life-cycle
• Creating the first Dynamic web page using JSP, MVC architecture, 3-tier architecture
• What is Cloud?
• Cloud Architecture
• Cloud benefits
• Types of cloud
• Importance of IAAS, PAAS, SAAS
• Real world example of cloud usage
• Trends in cloud computing
• Introduction to Inter networking
• OSI & TCP/IP Stack
• IP Addressing, Subnetting, VLSM
• Configuring Router & Switch
• IP Routing
• Switching, VLAN, VTP
• WAN
• Basic Network Security & ACL
• IP Services & Managing Cisco IOS
• Wireless Technology
• Firewalls & VPN
• Troubleshooting
• Information Security Overview
• Information Security Threats and Attack Vectors
• Hacking Concepts
• Hacking Phases
• Types of Attacks
• Information Security Controls
• Introduction to CCNA & Inter networking
• Network Topologies, Network Devices
• Types of Medium
• Introduction to LAN & WAN
• Motherboard types
• Motherboard components
• Computer Components Identification
• Assemble and Disassemble Computer Components
• Devices Installation and Configuration
• Popular CPU Chips
• Introduction of Programming Languages, Types of Languages, Evolution of 'C' Language
• Structure of a 'C' Program, 'C' Program development life cycle, Executing and Debugging a 'C' Program
• C' Tokens, Keywords and Identifiers, Operators, Constants, Variables, Data Types
• Precedence of Operators, Scope and Lifetime of Variables
• Control Statement and Expressions, Decision Making using if statement, Types of if …else block
• Switch case Block, Arithmetic Expressions, Evaluation of Expressions, goto statement
• Looping, Concept of Loop, For loop, While loop, Do while loop, Jumping in Loop, break and continue statement
• Algorithms and Flowchart, Algorithms and Flowcharts (Definitions,Symbols), Characteristics of an algorithm
• Arrays and String, Introduction of Array, One - D Array, Two - D Array, Mutlidimensional Array
• Dynamic Arrays, Implementing String Variables, String handling Functions
• Functions, Concept of Function, User defined Function, System Defined Function, Types of parameter passing in function
• Pointers, Need of Pointers, Types of Pointers, Pointer Expression, Arrays of Pointers, Pointers and Functions
• Structure and Unions, Need of Structure, Implementing Structure Variable, Arrays of Structure
• Structure within Structure, Introduction of Unions, Difference between Structure and Unions
• File Handling using 'C', Opening and Closing File, Input / Output operations on File
• Random Access to Files, Command Line ArgumentsDynamic Memory Allocation
• Concept of Dynamic Allocation, Implementing Malloc and Calloc Functions, Releasing the free space
• Storage Classes and Preprocessor, Introduction of Storage Class, Types of Storage Classes
• Introduction of Preprocesor, Macro Substitution, File Inclusion
• Introduction of Data Structure, Concept of Data Structure, Types of Data Structure, Implementing Stack & Linkedlist
• Graphics using C, VDU Basics, Simple library functions
• Students will perform Red Hat installation by several different methods. Problematic installations
• Troubleshooting, and post-install configuration will be addressed.
• Basic Network Terminologies
• Virtualisation & OS Setup
• Server & Linux Basics
• Introduction to HTML, Python & Webhosting
• Information Gathering & Social Reconnaissance
• Introduction to Bug Crowd & Hackerone
• Vulnerability Analysis
• Penetration testing Vs Bug Bounty
• OWASP Test Cases Check List
• Vulnerability Rating Taxonomy (VRT)
• SANS Top25 Applications Errors
• OWASP CWE Vulnerabilities
• Common Attack Pattern Enumeration and Classification(CAPEC)
• Common Vulnerabilities & Exposures (CVE) rating
• Terms & concepts
• Evolution of windows operating system
• MSDOS Evolution
• The Registry
• Registry Hacking
• Booting sequence of system
• Key Boot Files
• Printers
• Troubleshoot Common Printer Problems
• Installing, Upgrading and Migrating to windows 7
• Deploying windows
• Configuring Hardware and Applications
• Configuring Network connectivity
• Configuring Access to resources
• Configuring Mobile computing
• Monitoring and Maintaining systems that run windows 7
• Configuring Backup and Recovery option
• Motherboard types
• Motherboard components
• Computer Components Identification
• Assemble and Disassemble Computer Components
• Devices Installation and Configuration
• Popular CPU Chips
• SaaS (according to NIST)
• IaaS (according to NIST)
• CaaS (according to NIST)
• PaaS (according to NIST)
• XaaS (according to NIST)
• DaaS (according to NIST)
• BPaaS
• Accountability and responsibility based on service models
• Motherboard types
• Motherboard components
• Computer Components Identification
• Assemble and Disassemble Computer Components
• Devices Installation and Configuration
• Popular CPU Chips
• Forensics Science
• Computer Forensics
• Forensics Readiness
• Cyber Crime
• Cyber Crime Investigation
• Corporate Investigations
• Reporting a Cyber Crime
We aim to provide your company with a one stop shop solution for your corporate training requirements. First class training at your company location delivered by experts in their field, hand-picked for businesses.No two clients are the same. We do not believe in the methodology that one size fits for all. We have fixed training modules but customizable modes of training delivery. We are of the understanding that the same module can be delivered to one client by a trainer who only trains seasoned professionals while another client might want the same content to be delivered first by someone who is more into basics and then go on to higher strata concepts. Our mission is to enable corporate companies to increase productivity and performance through their manpower resources.
Experience Required - 0 To 5 Years
• Proven UI experience.
• Demonstrable UI design skills with a strong portfolio.
• Solid experience in creating wireframes, storyboards, user flows, process flows and site maps.
• Proficiency in Dreamweaver, Photoshop, Illustrator, InDesign, CorelDraw, or other visual design
• Excellent visual design skills with sensitivity to user-system interaction.
• Ability to solve problems creatively and effectively.
• Up-to-date with the latest UI trends, techniques, and technologies.
• wire-framing tools, bootstrap, Responsive HTML
• TCP/IP Analysis Checklist
• Top Causes of Performance Problems
• Get the Latest Version of Wireshark
• Capturing Traffic
• Opening Trace Files
• Processing Packets
• GTK Interface
• The Icon Toolbar
• The Changing Status Bar
• Right-Click Functionality
• General Analyst Resources
• Your First Task When You Leave Class
• Introduction to CCNA & Inter networking,
• Network Topologies, Network Devices.
• Types of Medium
• Introduction to LAN & WAN
• Forensics Science
• Computer Forensics
• Forensics Readiness
• Cyber Crime
• Cyber Crime Investigation
• Corporate Investigations
• Reporting a Cyber Crime
• Networking Devices(Layer1,2,3)
• Different types of network layer attacks
• Firewall (ACL, Packet Filtering, DMZ, Alerts and Audit Trials)
• IDS,IPS and its types (Signature based, Anomaly based, Policy based, Honeypot based)
• Design, develop and deploy cloud based solutions using AWS
• Understand the core AWS services, uses, and basic architecture best practices
• Develop and maintain applications written for Amazon Simple Storage Services (S3), Amazon DynamoDB, Amazon Simple Queue Service (SQS), Amazon Simple Notification Service (SNS), Amazon Simple Workflow Service (SWF), AWS Elastic Beanstalk, and AWS CloudFormation
• Computer Components Identification
• Assemble and Disassemble
• Computer Components
• Components in Portable Computers
• Devices Installation and Configuration
• Characteristics of Cabling and their Connectors
• Common IDE, SCSI and Peripheral Devices
• Optimize PC Operations Optimization
• Determine the Issues that must be
• Considered when upgrading a PC
• Popular CPU Chips
• Types of Memory (RAM)
• Types of Motherboards and their Components
• Printer Technologies, Interfaces and Options/Upgrades
• Troubleshoot Common Printer Problems
• Operating System Fundamentals OS Installation
• Common Error Codes Interpretation
• Networking Capabilities of Windows
• Basic Internet Protocols and Terminologies
• Procedures for Establishing Internet Connectivity
Experience Required - 0 To 5 Years
• Experience with a wide range of AndroidSDK versions, from 4.0 on up.
• Experience working with existing app code and refactoring to awesomeness.
• Knowledge of a variety of Android devices, from cheap knockoff phones to the latest hotness and everything in between.
• An understanding of REST and JSON, and knowledge of how to utilize REST on an Android.
• Experience with GitHub and git as a version control tool.
• Up-to-date with the latest UI trends, techniques and technologies related to devloping apps
• VPN and its types
• Tunneling Protocols , Tunnel and Transport Mode
• Authentication Header, Encapsulation Security Payload (ESP)
• IPSEC Protocol, Suite – IKE PHASE 1, Generic Routing Encapsulation(GRE).
• Introduction to Object Oriented Programming, Concept of OOP, Features of OOP
• Introduction of 'C++', Structure of 'C++' program, Executing and Debugging a 'C++' Program
• C++ Tokens and Type Casting, Keywords and Identifiers, Operators, Constants
• Variables, Data Types, Precedence of Operators, Scope and Lifetime of Variables
• Classes & Objects, Classes & Object specifiers, Defining data members and member functions
• Array of objects, Managing console I/O, 'C++' stream classes, Formatted and unformatted console I/O
• Function in 'C++', Call by reference, Return by reference, Function overloading and default arguments
• Inline function, Static class members, Friend functions, Virtual Functionns
• Constructors and Destructor, Concept of Constructor, Types of Constructors
• Memory allocation (new and delete), Usage of destructor
• Operator Overloading, Overloading Unary and Binary operators, Overloading using friend function
• Inheritance, Types of inheritance, Virtual base classes and abstract base classes
• Constructor and destructor in derived class
• Working with files, File operations, File pointer and their manipulation, File updation with random access
• Exception Handling, Various Exception Handling classes, Implementing try and catch block & thow keyword
• Templates, Introduction to Templates, Class templates, function templates and overloading of function templates
• Standard Template Library (STL), Run Time Type Identification (RTTI)
• Networks
• Types of network
• Network topology
• Networking Standards
• Connections for different topologies
• Connectors
• Professional experience using AWS technology
• Hands-on experience programming with AWS APIs
• Understanding of AWS Security best practices
• Understanding of automation and AWS deployment tools
• Understanding storage options and their underlying consistency models
• Excellent understanding of at least one AWS SDK
• Types of Image graphics
• Vector & Scalar graphics
• Color modes & resolution options
• Using photoshop tools - move tool, marque tool, lasso tool, quick selection, crop tool,
• image manipulation tool, brushes, patterns, gradients, pen tool, text tool
• Working with layers, grouping & smart objects
• Image adjustments
• Layer masking, layer clipping
• Using blending options
• Filetr effects and photoshop actions
• Automation tools
• Designing a logo
• Creating a business card
• Operating system
• Terms & concepts
• Evolution of windows operating system
• MSDOS Evolution
• The Registry
• Registry Hacking
• Booting sequence of system
• Key Boot Files
• Printers
• Media & topologies
• Networks
• Types of network
• Network topology
• Transmission media
• Network devices
• Network Security Devices
• Twisted Pair Cable Combinations
• Crimping RJ-45
• Network Troubleshooting with Physical Topology
• Layers in OSI Model & its working,
• Networking Protocols
• TCP/IP Protocol Stack & its associated protocols.
• TCP Header, TCP Flags, TCP Port Numbers, TCP 3 way Handshake.
• Security protocols and authentication protocols
• Network Utility Components for troubleshooting
• Networks
• Types of network
• Network topology
• Networking Standards
• Connections for different topologies
• Connectors
• Evolution
• Processor printing instruction/specification
• Processor generations
• Characteristics of Processor
• Processor Core Specification
• Evolution
• Processor printing instruction/specification
• Processor generations
• Characteristics of Processor
• Processor Core Specification
• Footprinting Concepts
• Footprinting Threats
• Footprinting Methodology
• Website Footprinting
• Email Footprinting
• Competitive Intelligence
• Footprinting using Google
• WHOIS Footprinting
• DNS Footprinting
• Network Footprinting
• Footprinting through Social Engineering
• Footprinting through
• Footprinting Tools
• Footprinting Countermeasures
• Footprinting Penetration Testing
• Basic browser security settings.
• How to restrict site access.
• Removing site from security zone.
• Secure website detection.
• Secure site and browser properties.
• Tools: Internet Filtering Software.
• Configuring Internet content access.
• Activating Content Advisor.
• How to deal with cookies.
• Using P2P networks securely.
• Choosing appropriate browser settings.
• Wireless network security features.
• Historical perspective
• Confusion vs. diffusion
• Stream ciphers vs. block ciphers
• Keys and key management
• Key exchange (peer to peer, peer - keyserver - peer)
• Diffie Helman key sharing scheme
• Symmetric key cryptography vs asymmetric key cryptography
• Trapdoor functions
Whether you’re starting out and need an introduction to a subject, or have taken on a new project or new role and need to build your knowledge and skills in a specialised area, we have the course for you at our place. Each course is taught by subject matter experts who will not only assist you throughout the course but also ensure that correct knowledge is imparted and you are able to apply the essence of the course in your own professional domain. Prompt opts for instructor-led classroom training, where every trainer is trained before he interacts for with the students to be a mentor in building the industrial skills and professional attitude what exactly the industry demands. All our trainers associate as a team in training and building the various skills, hence the students never feel the difference when they are moving between various technologies in their training path.
• Selecting data sources for analysis
• Eliminating redundant data
• Establishing the role of NoSQL
• Footprinting Concepts
• Footprinting Threats
• Footprinting Methodology
• Website Footprinting
• Email Footprinting
• Competitive Intelligence
• Footprinting using Google
• WHOIS Footprinting
• DNS Footprinting
• Network Footprinting
• Footprinting through Social Engineering
• Footprinting through
• Footprinting Tools
• Footprinting Countermeasures
• Footprinting Penetration Testing
• Spidering - Scanning websites and web applications
• Investigating web security
• Advanced manual tools
• Module - Repeater | Intruder | Decoder | Comparer
• Burpsuite Collaborator Client
• Burpsuite Clickbandi
• Install and configure servers
• Configure server roles and features
• Configure Hyper –V
• Deploy and configure core network services
• Install and administer Active Directory
• Create and Manage Group policy
• Open The System Unit
• Installing The Sound Card
• Replace The System Unit Cover
• Installing a USB Sound Card in Your Laptop
• Quick and Easy Sound Card Problem Solving
• How To Revive A Dead Computer
• Storage Technology
• The Proliferation of Data
• The Data Center Evolution
• Storage Infrastructure
• Evolution of Storage
• Storage Systems Architecture
• Intelligent Disk Subsystems
• Storage Networking Overview
• Direct – Attached Storage
• Storage Area Networks
• Network – Attached Storage
• Emerging Technologies
• Information Availability
• Business Continuity Overview
• Backup and Recovery
• Local and Remote Replication
• Disaster Recovery
• Data Center Management
• Security and Virtualization
• Storage Infrastructure Security
• Virtualization Technologies
Configuring Domain Name System (DNS) for Active Directory
• Configuring Zones
• Configure DNS Server settings
• Conigure Zone Transfers and replication
Configuring the Active Directory Infrastructure
• Configure a forest or a domain
• Configure Trusts
• Configure Sites
• Configure Active Directory Replication
• Configure Gobal Catalogue
• Configure Operations Masters
Configuring Active Directory Roles and Services
• Configure Active Directory Lightweight Directory Service (AD LDS)
• Configure Active Directory Rights Management Service (AD RMS)
• Configure the read-only domain controller (RODC)
• Configure Active Directory Federation Services (AD FSv2)
Creating and Maintaing Active Directory Objects
• Automate Creation of Active Directory Accounts
• Maintain Active Directory Accounts
• Create and apply Group policy objects (GPOs)
• Configure GPO Templates
• Deploy and Manage software by using GPOs
• Configure account policies
• Configure Audit policy using GPOs
Maintaining the Active Directory Enviroinment
• Configure Backup and recovery
• Perform offline maintenance
• Monitor Active Directory
Configuring Active Directory Certificate Services
• Install Active Directory Certificate Services
• Configure CA server settings
• Manage Certificate templates
• Manage enroments
• Manage certificate revocations
• Investigating Computer Crime
• Steps to Prepare for a Computer Forensics Investigation
• Computer Forensics Investigation Methodology
• Layers in OSI Model & its working
• Networking Protocols
• TCP/IP Protocol Stack & its associated protocols
• TCP Header, TCP Flags, TCP Port Numbers, TCP 3 way Handshake.
• Security protocols and authentication protocols
• Network Utility Components for troubleshooting
• Evolution
• Processor printing instruction/specification
• Processor generations
• Characteristics of Processor
• Processor Core Specification
• OOPS Concept
• Inheritance
• Distributed fabric layer
• Static Classes
• Object ID
• Metadata
• Data/blob
• Extended metadata
• Policies
• Replicas
• Access control
• Move Around Quickly: Navigation Techniques
• Find a Packet Based on Various Characteristics
• Build Permanent Coloring Rules
• Identify a Coloring Source
• Apply Temporary Coloring
• Mark Packets of Interest
• Types of Image graphics, Vector & Scalar graphics
• Color modes & resolution options
• Using photoshop tools - move tool, marque tool, lasso tool, quick selection, crop tool,
• image manipulation tool, brushes, patterns, gradients, pen tool, text tool
• Working with layers, grouping & smart objects
• Image adjustments, Layer masking, layer clipping
• Using blending options, Filter effects and photoshop actions, Automation tools
• Designing a logo, Creating a business card
• This class will cover RedHat’s user policies and user/group structure.
• During the course of this class students will create users and user groups and customise the users’ working environment.
• Hands on labs will work with file and directory permissions including shared directories.
• Display Filters
• Filter on Conversations/Endpoints
• Build Filters Based on Packets
• Display Filter Syntax
• Use Comparison Operators and Advanced Filters
• Filter on Text Strings
• Build Filters Based on Expressions
• Watch for Common Display Filter Mistakes
• Manually Edit the dfilters File
• Establish requirements
• Maintenance scheduling
• Reasons
• Storage migration
• Online vs. offline migrations
• Physical to Virtual (P2V)
• Virtual to Virtual (V2V)
• Virtual to Physical (V2P)
• Establish requirements
• Maintenance scheduling
• Reasons
• Storage migration
• Online vs. offline migrations
• Physical to Virtual (P2V)
• Virtual to Virtual (V2V)
• Virtual to Physical (V2P)
• Programming language Types and Paradigms.
• Computer Programming Hierarchy.
• How Computer Architecture Affects a Language ?
• Why Java ?, Flavors of Java, Java Designing Goal.
• Role of Java Programmer in Industry.
• Features of Java Language.
• JVM –The heart of Java, Java’s Magic Byte code.
• Language Fundamentals.
• Retrieving data using the SQL select statement
• Restricting and sorting data
• Using single row function to customise output.
• Reporting aggregated data using the grout function.
• Displaying data from multiple tables, Displaying data from multiple tables-II
• Using sub queries to solve problems, Using set operators
• Manipulating data, Using DDL statements to create and manage tables
• Creating other schema objects
• Managing objects with data dictionary
• Controlling User access, Managing schema objects
• Manipulating large data sets, Generating report by grouping related data
• Managing data in different time zones, Retrieving data using sub queries
• Hierarchical retrieval, Regular expression support
• Guided media
• Co-axial cable
• Twisted pair cables
• Fiber optic cables
• Getting started with Corel Draw
• Introduction to Corel Draw, Features of Corel Draw, Corel Draw Interface
• Tool Box, Moving from Adobe Illustrator to Corel Draw, Common Tasks
• Drawing and Coloring, Selecting Objects, Creating Basic Shapes, Reshaping Objects
• Organising objects, Applying color fills and Outlines, Mastering with Text
• Text Tool, Artistic and paragraph text, Formatting Text, Embedding Objects into text
• Wrapping Text around Object, Linking Text to Objects, Applying Effects
• Power of Blends, Distortion, Contour Effects, Envelopes, Lens effects
• Transparency, Creating Depth Effects
• Power Clips, Working with Bitmap Commands, Working with Bitmaps
• Editing Bitmaps, Applying effects on Bitmaps, Printing
• Corel Draw- Web resources, Internet Tool bar, Setting your webpage
• Exporting files, Creating buttons with rollover effects
Configuring Addressing and Services
• Configure IPv4 and IPv6 addressing
• Configure Dynamic Host Configuration Protocol (DHCP)
• Configure routing
• Configure Windows Firewall with advanced security
Configuring Name Resolution
• Configure a Domain Name System (DNS) server
• Configure DNS zones
• Configure DNS records
• Configure DNS replication
• Configure name resolution for client computers
Configuring Network Access
• Configure remote access
• Configure Network Access Protection (NAP)
• Configure DirectAccess
• Configure Network Policy Server (NPS)
Configuring File and Print Services
• Configure a file server
• Configure Distributed File System (DFS)
• Configure backup and restore
• Manage file server resources
• Configure and monitor print services
Monitoring and Managing a Network Infrastructure
• Configure Windows Server Update Services (WSUS) server settings
• Configure performance monitoring
• Configure event logs
• Gather network data
• Title - 1 Introduction to COBOL
• Title - 2 Divisions of COBOL
• Title - 3 Picture clause characteristics
• Title - 4 Editing
• Title - 5 Level Structure
• Introduction
• What is Report writing
• Pre – writing activities
• Finding main and supportive ideas
• Cohesion and Coherence
• Generating Ideas
• Introduction to Citation
• Writing Techniques
• Summary writing
• Quoting, Paraphrasing and Synthesizing
• Citation and styles
• Language and style in academic writing
• Organize reports to make writing them easier and less time consuming using the report pyramid
• Identify the information that should be included in a report and gain the readers’ attention
• Present the information, as well as how to be convincing and persuasive when writing reports
• Create reports that achieve their desired goal or intended impact
• Write informal, semi-formal, and formal reports
• Edit the reports you write
• Add illustrations to reports
• Create a list of references or a bibliography for a report
• Create a table of contents
• R Introduction
• R Reserved Words
• Variables and Constants
• R Operators
• Precedence and Associativity
• R Flow Control
• R Programming if...else
• R ifelse() Function
• R Programming for loop
• R while Loop
• R break & next
• R repeat Loop
• R Functions
• R Programming Function
• Function Return Value
• R Environment & Scope
• R Recursive Function
• R Infix Operator
• R Switch Function
• R Data Structure
• R Vectors
• R Matrix
• R List
• R Data Frame
• R Factor
• R Object & Class
• Object and Class
• R S3 Class
• R S4 Class
• R Reference Class
• R Inheritance
• R Graphs & Charts
• R Programming Bar Plot
• R Programming Histogram
• R Programming Pie Chart
• R Box Plot
• R Strip Chart
• R Advanced Topics
• R Programming Plot Function
• R Programming Subplot
• R Programming Saving Plot
• R Programming Color
• R Programming 3D Plot
• Windows Azure Overview
• Windows Azure Architecture
• Components of Azure :
• Windows Azure Compute 2. SQL Azure 3. The App Fabric
• Fabric Controller
• Need
• Scope and approaches for project formulation
• the structure of project report
• study and analysis of sample project report
• preparation of a project report
• Techno- economic feasibility of the project.
• Object Oriented Programming (OOPS) concepts and terminology, Advantages of OOPS
• Fundamentals of OOPS, Core Java Programming Introduction of Java
• What is Java?, How to Get Java, A First Java Program, Compiling and Interpreting Applications
• The JDK Directory Structure, Using Eclipse
• Data types and Variables, Primitive Datatypes, Declarations, Variable Names
• Numeric Literals, Character Literals, String formatting and Parsing, String Literals
• Arrays,Non-Primitive Datatypes, The Dot Operator
• Methods, Calling Methods, Defining Methods, Method Parameters Scope, Why all the static?
• Operators and Expressions, Expressions, Assignment Operator, Arithmetic Operators
• Relational Operators, Logical Operators, Increment and Decrement Operators
• Operate-Assign Operators (+=, etc.), The Conditional Operator, Operator Precedence
• Implicit Type Conversions, The Cast Operator, Strict typing, Type conversion
• Control Flow Statements, Conditional (if) Statements, Data types and Variables
• Adding an else if, Conditional (switch) Statements, while and do-while Loops, for Loops
• The continue Statement, The break Statement
• Introduction to Object-Oriented Programming, Classes and Objects, Fields and Methods
• Encapsulation, Access Control, Inheritance, Polymorphism
• Using Java Objects, Printing to the Console, printf Format Strings, StringBuilder and StringBuffer
• Methods and Messages, toString, Parameter Passing, Comparing and Identifying Objects, Destroying Objects
• Inheritance in Java, Casting, Method Overriding, Polymorphism, super keyword, The Object Class
• Packages, The import Statement, Static Imports, CLASSPATH and Import, Defining Packages, Package Scope
• Interfaces and Abstract Classes, Separating Interface and Implementation, Defining Interfaces
• UML Interfaces and Realization, Implementing and Extending Interfaces, Runnable Threads, Abstract Classes
• Lambda Built-in Functional Interfaces, java.util.function package, Use primitive versions of functional interface
• Use binary versions of functional interface, Use the UnaryOperator interface
• Exception Handling, Exceptions Overview, Catching Exceptions, The finally Block, Exception Methods
• Declaring Exceptions, Defining and Throwing Exceptions, Errors and Runtime Exceptions, Assertions
• The Collections Framework, The Set Interface, Set Implementation Classes, The List Interface
• List Implementation Classes, The Map Interface, Map Implementation Classes, Utility classes, Generics
• Inner Classes, Member Classes, Local Classes, Anonymous Classes, Instance Initializers, Static Nested Classes
• Introduction to Threads, Non-Threaded Applications, Threaded Applications, Creating Threads
• Thread States, Runnable Threads, Coordinating Threads, Interrupting Threads, Runnable Interface ,ThreadGroups
• Swing, Swing GUI Components, Using Swing API
• Applet, Life Cycle of an Applet
• JDBC, Creating a Database and tables, Getting Information from Database, Obtaining Result Set Information
• Connecting a Java program to a Database, Prepared Statements & Statement Classes in Java
• Inserting, Updating & Deleting Table data
• Servlets, What is a web application, Java Servlets, What is a Servlet, Servlet Lifecycle, Servlet Context
• Session management, Building the first Servlet, Deploying the Servlet
• JSP, What is a JSP Page, Basic HTML Tags, JSP Tag library, JSP Page Life-cycle
• Creating the first Dynamic web page using JSP, MVC architecture, 3-tier architecture
• The need for a strategic approach to managing human resources
• Historical development of HRM and strategic HRM
• Basic concepts of strategic management
• The strategic contributions of HRM
• The formulation and implementation of HR strategies
• Integration of HRM and business strategy
• Strategic workforce planning and staffing
• Strategic human resource development
• Strategic performance management
• Strategic career and reward practices
• Strategic approaches to organisational culture and employee relations
• Strategic HRM retrospect and prospects
• Strategic approach to HRM
• HR Planning & Recruitment
• Strategic Staffing / Selection : Overview
• Strategic Staffing / Selection : Diversity
• Strategic Employee Training and Development
• Strategic Retention
• Strategic Performance Management
• Strategic Compensation & Benefit
• Mergers & Acquisitions
• Downsizing & SHRM
• Overview of Microsoft Virtualization
• Overview of System Center 2012 R2 Components
• Evaluating Current Environment for Virtualization
• Extending Virtualization to the Cloud
• Selecting the Appropriate Virtualization Method
• Accessing the Environment by Using MAP
• Types of memory
• Error Handling in RAM
• RAM
• Types of RAM
• Speed Specifications
• Physical Differentiation among RAM
• Types of ROM
• Distinguish between Trainer and Teacher
• Training cycle module: Analyzing the Needs (TNA)
• Training Need Identification (TNI), Course Planning
• Effective Delivery of Training
• Best Training Practice
• Precise Instructions Module
• Using feedback as a tool for improvement
• 360 degree personality analysis of a trainer
• Using varieties of ice-breakers as adult learning principles
• 8 Qualities of an Effective Trainer Listening skills of a trainer
• Voice Modulation Techniques for effective training
• Using humor, ice-breakers, games, stories to create interest in training.
• Classroom & Presentation skills
• Statutory complaince issues
• Evaluation and assessment method
• Introduction Graphical User Interface (GUI),
• Programming Language (Procedural,
• Object Oriented, Event Driven),
• The Visual Basic Environment, How to use VB
• complier to compile / debug and run the programs.
• History ,Features, Setting up path
• Working with Python, Basic Syntax
• Variable and Data Types, Operator
• Verbal Communication
• Listening Skills
• Non – verbal Communication
• Conference cal Etiquette
• Team Meeting Etiquette
• Overview of Network Scanning
• CEH Scanning Methodology
• Scanning Beyond IDS
• Banner Grabbing
• Scan for Vulnerability
• Draw Network Diagrams
• Prepare Proxies
• Scanning Pen Testing
• Interview Preparation
• Common Interview Questions
• What Employers Want
• Attitude and Effort
• Body Language
• Research
• The Mock Interview
• Phone Interviews
• Behavioral Interviews
• Closing the Interview
• Thank You Notes
• Guided media
• Co-axial cable
• Twisted pair cables
• Fiber optic cables
• Deploying and Managing Windows Server 2012
• Introduction to Active Directory Domain Services
• Managing Active Directory Domain Services Objects
• Automating Active Directory Domain Services Administration
• Implementing IPv4
• Implementing DHCP
• Implementing DNS
• Implementing IPv6
• Implementing Local Storage
• Implementing File and Print Services
• Implementing Group Policy
• Securing Windows Servers Using Group Policy Objects
• Implementing Server Virtualization with Hyper-V
• Communication Process
• Building Confidence
• Leadership
• Nonverbal Communication
• Group Discussion Skills
• Effective Delivery
• Informative Speaking
• Persuasive Speaking
• Power Point and Technology
• Social And Interactional Skills
• Basic Writing Skills
• Active Listening
• Problem-Solving Models
• Speaking In Professional Contexts
• Effective Delivery
• How To Speed Up Any Desktop Or Laptop Computer
• Make Sure You Have Enough Memory
• Clean Up Your Desktop
• Make Sure You Have a Fast Enough CPU Chip
• Uninstall Those Unneeded Applications To Free Up Memory
• Get And Keep Your BIOS Fine Tuned
• Patch Your Computer To Keep It Updated
• Keep Your Antivirus Up to Date and Scan Your Disks
• Make Sure Your Antivirus/Internet Security Programs Run at Night
• Make Sure You Have no Spyware
• Stop Unneeded Startup Programs
• Defragment Your Hard Drive Regularly
• Remove Those Unneeded Files
• Move the Page File to Another Partition
• Stop File Indexing
• Turn Off Animations
• Stop Unneeded Services
• Turn Off Fancy Desktop Backgrounds, and Screensavers
• ReadyBoost for Vista Speeds Boot Times and Other Operations Change Your PC Use Habits
Study with us from most places in the world, provided you're proficient in English and have a PC with broadband internet connection. We have always been inherently flexible with this mode of training.We offer two streams of content for Online Training in ALL Courses. For experienced IT professionals – aimed to update knowledge of the existing IT professionals interested to obtain a knack of latest developments in technology. For freshers – intended to teach the required skills to the freshers, where in the focus shall begin with building a strong understanding of the basics of technology and end with a complete guidance on its latest trends. Online training is known to be called as CBT (Computer based Training), IBT (Internet based training), WBT (Web-based training), eLearning across the globe. Online Training is a Software-based teaching program installed on computer network or a computer. It is a procedure of delivering training through an electronic medium or internet without the presence of instructor or trainer.
• Installing, Upgrading and Migrating to windows 7
• Deploying windows
• Configuring Hardware and Applications
• Configuring Network connectivity
• Configuring Access to resources
• Configuring Mobile computing
• Monitoring and Maintaining systems that run windows 7
• Configuring Backup and Recovery options
• Searching and Seizing Computers without a Warrant
• Searching and Seizing Computers with a Warrant
• The Electronic Communications Privacy Act
• Electronic Surveillance in Communications Networks
• Introduction to Inter networking
• OSI & TCP/IP Stack
• IP Addressing, Subnetting, VLSM
• Configuring Router & Switch
• IP Routing
• Switching, VLAN, VTP
• WAN
• Basic Network Security & ACL
• IP Services & Managing Cisco IOS
• Wireless Technology
• Firewalls & VPN
• Troubleshooting
• Data models: key value, graph, document, column–family
• Hadoop Distributed File System
• HBase
• Hive
• Cassandra
• Hypertable
• Amazon S3
• BigTable
• DynamoDB
• MongoDB
• Redis
• Riak
• Neo4J
• Getting started with Corel Draw
• Introduction to Corel Draw, Features of Corel Draw, Corel Draw Interface
• Tool Box, Moving from Adobe Illustrator to Corel Draw, Common Tasks
• Drawing and Coloring, Selecting Objects, Creating Basic Shapes, Reshaping Objects
• Organising objects, Applying color fills and Outlines, Mastering with Text
• Text Tool, Artistic and paragraph text, Formatting Text, Embedding Objects into text
• Wrapping Text around Object, Linking Text to Objects, Applying Effects
• Power of Blends, Distortion, Contour Effects, Envelopes, Lens effects
• Transparency, Creating Depth Effects
• Power Clips, Working with Bitmap Commands, Working with Bitmaps
• Editing Bitmaps, Applying effects on Bitmaps, Printing
• Corel Draw- Web resources, Internet Tool bar, Setting your webpage
• Exporting files, Creating buttons with rollover effects
• Overview of Network Scanning
• CEH Scanning Methodology
• Scanning Beyond IDS
• Banner Grabbing
• Scan for Vulnerability
• Draw Network Diagrams
• Prepare Proxies
• Scanning Pen Testing
• IP Addressing Basis,
• Network & Host bits
• IP Range & Reasons
• NID & BID
• Gateway IP
• Classes in IP Addressing,
• Network & Host Bit calculation for each class
• Private Addressing,
• Subnet Masks & Subnetting,
• VLSM.
• Introduction to the UNIX Operating System
• The Directory Structure, The vi editor, Unix Communications
• Utilities and Filters, I/O redirection
• Shells and controlling child processes
• C-shell Shortcuts, Intro to C-shell Programming
• Variables in C-shell Programming, Conditionals in C-shell Programming
• Loops in C-shell Programming, Bourne Shell Programming Basics
• The emacs editor, Stream Editing - sed, System Administration Intro
• Text processing: nroff/troff
• Text processing : LaTeX - Comparing to nroff /troff
• Introduction – Web Programming
• HTML and Javascript
• Difference between Asp and Asp .net
• ASP.Net Basics
• ASP.Net Lifecycle and Lifecycle events
• State Management techniques of ASP.Net
• Session
• ViewState
• Theme and Styles
• Server Controls
• Validation Controls
• State Management
• Cookies
• Application
• Hidden Fields
• User Control
• Creation of user control
• Usages of user control
• Custom Control
• Creation of Custom Control
• Usages of Custom Control
• Grid view
• ASP.Net Repeater control
• File Upload in ASP.net
• Localization and globalization
• ASP.Net Security
• THEMES and Master Pages
• APP.config
• Global.asax
• Basics of AJAX
• Understating the Three tier Architecture
• ADO .Net and Databound Controls
• Configuring File – Web.Config.
• Caching
• Communication between various layers
• Authentication & Authorization
• Installing Windows
• Preparing the Windows 7 Installation Source
• User and Group Management
• Password Reset Disk
• Parental Control
• User Profiles Management
• System Images Capturing
• Virtual Hard Disk Files
• Application Compatibility
• Windows Aero and Mouse operations
• Switching Users
• Disks and Device Drivers
• Network Settings
• IPv4/IPv6 Configuration
• Network Configuration
• Folder and File Access
• BranchCache
• Printers in Windows
• Windows 7 Desktops Security
• Windows 7 Client Computers
• Mobile Computing and Remote Access in Windows
• Types of memory
• Error Handling in RAM
• RAM
• Types of RAM
• Speed Specifications
• Physical Differentiation among RAM
• Types of ROM
• WAN Topologies
• Standard IP based Switching
• CEF based Multi-Layer switching, MPLS Characteristics
• Frame Mode MPLS Operation, MPLS VPN
• Installation
• User and Group Administration
• Redhat Infrastructure
• Redhat Package Manager
• The Linux kernel
• Rescue modes
• Network Services
• Security
• X Window System
• Routing, Forwarding, and Firewalls
• File System Management
Sensitive Data Disclosure from GitHub, Google & other listings
• Identifying Web Technologies & Frameworks
• Map out the target
• Website based enumeration
• Tool based enumeration
• Public disclosure
• Hunt for Sensitive Directories
• Subdomain Analysis
• What is software Testing?
• Why testing?, Defects, Failures
• Principles & psychology of testing
• Introduction
• PHP Fundamentals
• PHP Arrays
• PHP Functions
• PHP Forms
• PHP Cookies & PHP Sessions
• PHP Strings Handling
• Basic MySQL, Simple SQL
• Advanced SQL query building
• SQL Functions
• Importing , Exporting CSV data
• Advanced MySQL Joins ,Full Text Search
• Understanding of stateless and loosely coupled distributed applications
• Familiarity developing with RESTful API interfaces
• Basic understanding of relational and non-relational databases
• Familiarity with messaging & queuing services
• Introduction
• Search Engine Optimisation (SEO)
• Social Media
• Content Marketing
• Email Marketing
• Mobile Marketing
• Pay per click (PPC)
• Website conversion rate optimisation
• Digital Analytics
• Marketing Automation
• Programmatic Buying
• Tools – Google analytics : Specific Techniques and reports
• Tools – Googe dwords fundamentas
• Tools – Facebook Marketing & Advertisement
• Tools – Youtube and Video Marketing
• Tools – Twitter Advertising
• Online Marketing Strategy
• Types of memory
• Error Handling in RAM
• RAM
• Types of RAM
• Speed Specifications
• Physical Differentiation among RAM
• Types of ROM
• Linux file systems, RedHat’s directory hierarchy, and system start up configuration will be reviewed.
• Configuration of different run levels and start up services will be discussed in detail.
• Introduction to Hadoop administration
• Hadoop design consideration Hadoop design consideration
• Monitoring
• PIG
• SQOOP
• HIVE
• HBASE
• Backup
• Optimization
• Troubleshooting
• Security
• Introduction to Accounting
• Fundamentals of Accounting
• GAAP – Rues of Accounting
• Roles of FASB and SEC
• Financial Statements
• Accounting Cycles - Recording Transactions
• Process of Accounting Cycles
• Self Balancing Ledgers
• Accounting for a Merchandising company
• Short – term financial assess
• Inventories
• Long – term Assets – Property
• Pant & Equipped and Intangible assets
• Liabilities – Current and Long term
• Stock holders Equity Contributed capital
• Statement of Cash flows
• Cash flow Analysis
• Cash & fund flow Assessment
• Financial Statement Analysis
• Budgetary control
• Standard costing
• What is Incident Response?
• Incidents and responses.
• Trojan attack.
• Boot sector virus attack.
• Corrupted registry.
• Automatic running of CD-ROM (autorun.inf).
• Deploying and managing Exchange server 2013
• Planning and configuring Mailbox Servers
• Managing recipient objects
• Planning and deploying client Access Servers
• Planning and configuring client Messaging connectivity
• Planning and Configuring Message Transport
• Planning and Implementing High Availability
• Planning and Implementing Disaster Recovery
• Planning and Configuring Message Security Options
• Planning and Configuring Administrative Security and Auditing
• Monitoring and Troubleshooting Exchange Server 2013
• IP Addressing Basis,
• Network & Host bits
• IP Range & Reasons
• NID & BID
• Gateway IP
• Classes in IP Addressing
• Private Addressing,
• Subnet Masks & Subnetting,
• VLSM.
• Network & Host Bit calculation for each class
Experience Required - 0 To 5 Years
• Skilled in CORE PHP, WORDPRESS, and ANY MVC FRAMEWORK ( *YII2,* *LARAVEL, ZEND and CODEIGNITER* )
• Provide high quality solution designs/work packages from which development teams can understand and deliver
• Be able to adapt, flex and change to meet new and conflicting work priorities at short notice.
• Basic Under stand with HTML5,CSS3,Bootstrap
• Good Knowledge With REST API
• Good Knowledge to JQUREY,AJAX
• Deploying and Managing Windows Server 2012
• Introduction to Active Directory Domain Services
• Managing Active Directory Domain Services Objects
• Automating Active Directory Domain Services Administration
• Implementing IPv4
• Implementing DHCP
• Implementing DNS
• Implementing IPv6
• Implementing Local Storage
• Implementing File and Print Services
• Implementing Group Policy
• Securing Windows Servers Using Group Policy Objects
• Implementing Server Virtualization with Hyper-V
• Introduction to Cisco Router & Switch.
• Internal & External components of Cisco Router.
• Starting up with a Router & Switch.
• The Command-Line Interface.
• Configuration of Router & Switch.
• LED signalling for routers & switches
• Introduction
• Declaring Variables, Writing Executable Statements
• Interacting with Oracle Server, Writing Control Structures
• Working with Composite Data Types, Writing Explicit Cursors
• Writing Implicit Cursors, Handling Exceptions
• Creating Procedures, Creating Functions
• Managing Subprograms, Creating Packages
• More Package concepts, Oracle supplied Packages
• Manipulating Large Objects, Creating Database Triggers
• More Trigger concepts, Managing Dependents
• RPM, RedHat’s package management system will be discussed and demonstrated in detail.
• Student knowledge of software installation, removal, and updating will be verified with hands on labs for these tasks.
• Introduction to Ethical Hacking
• Footprinting and Reconnaissance
• Scanning Networks
• Enumeration
• System Hacking
• Trojans and Backdoors
• Viruses and Worms
• Sniffers
• Social Engineering
• Denial of Service
• Session Hijacking
• Hacking Webservers
• Hacking Web Applications
• SQL Injection
• Hacking Wireless Networks
• Hacking Mobile Platforms
• Evading IDS, Firewalls, and Honeypots
• Cryptography
• Penetration Testing
• Security Services for E-mail-attacks possible through E-mail
• Establishing keys, Privacy, Authentication of the source
• Message Integrity, Non-repudiation
• Pretty Good Privacy-S/MIME.
• Clickjacking
• Missing SPF/DMARC Record
• Open Redirection
• Lack of Email Notification & Verification
• Mail Server Misconfiguration
• Missing HTTP Only Cookie Flag
• No Rate Limiting
• Captcha Bypass
• Missing Authentication
• Parameter Pollution
• Logical or Physical Network Topologies
• Networking Standards
• Characteristics of Different Types of Cables
• Different media Connectors and Describetheir uses
• Purposes, Features and Functions ofNetwork Components
• General Characteristics of the Differentwireless technologies
• Different Network Protocols
• Classfull IP and Their Subnet Masks
• Subnetting
• Private and Public network addressing schemes
• WAN Technologies
• Security protocols and authentication protocols
• Benefits and characteristics of using a firewalland proxy service
• Main characteristics and purpose of extranetsand intranets
• Antivirus software
• Fault Tolerance
• Network Utility to Troubleshoot Networks
• Impact of modifying, adding or removingnetwork services
• Network Troubleshooting with Physical Topology
• Working capital assessment
• Capital budgeting
• Product costing and cost consciousness
• Financial ratios and their significance
• Break-even analysis
• Credit institutions and financing procedures.
• Books of accounts, financial statements & fund flow analysis.
• Windows 7, Configuring (70-680)
• Windows Server 2008 Active Directory, Configuring (70-640)
• Windows Server 2008 Network Infrastructure, Configuring (70-642)
• Windows Server 2008 Applications Infrastructure, Configuring (70-643)
• Windows Server 2008, Enterprise Administrator (70-647)
• Hard disk drive working
• Advanced disk drive
• Floppy drive
• Zip drive
• Tape drives
• Flash memory
• CD/DVD drives
• Advanced digital storag
• Characteristics of Effective Team
• Essentias of Effective Team
• Activity Team Trust
• Activity Team Shape up
• Handling Team Dynamics
Experience Required - 0 To 5 Years
• Provide high quality solution designs/work packages from which development teams can understand and deliver.
• Help to define and ensure adherence to standards and methods for design and development for the .NET environment
• Be able to adapt, flex and change to meet new and conflicting work priorities at short notice.
• Take responsibility and accountability in ensuring solutions are fit for purpose, scalable and modern.
• Good Knowledge With Form Controls.
• Network Attached Storage (NAS)
• Direct Attached Storage (DAS)
• Storage Area Network (SAN)
• Different access protocols
• Protocols and applications
• Management differences
• Have Your PC health Assessed for Free at PC Pitstop
• How To Upgrade Your Graphics Card
• Installing The Graphics Card In The System Unit
• AGP Graphics Card
• Graphics Card Problem Solving
• Nothing on the Monitor
• Monitor Works But No Display
• Monitor Works But Poor Display
• Easily Installing Your New Hard Drive
• Repairing The Hard Drive, Hardware And Software
• Title - 6 Data Movement verb: MOVE
• Title - 7 Arithmetic Verbs
• Title - 8 Input and Output Verbs
• Title - 9 Corresponding Options
• Title - 10 Programs using Arithmetic Verbs
• Hard disk drive working
• Advanced disk drive
• Floppy drive
• Zip drive
• Tape drives
• Flash memory
• CD/DVD drives
• Advanced digital storag
• HTML Elements, HTML Attributes, HTML Headings, HTML Paragraphs
• HTML Formatting, HTML Fonts, HTML Styles, HTML Links
• HTML Images, HTML Tables, HTML Lists, HTML Forms, HTML Frames
• HTML Iframes, HTML Colors, HTML Colornames, HTML Colorvalues
• HTML Quick List, HTML Layout, HTML Doctypes, HTML Head
• HTML Meta, HTML Scripts, HTML Entities, HTML URLs, HTML URL Encode
• HTML Media, HTML Audio, HTML Object, HTML Video, HTML YouTube, HTML Media Tags
• HTML5 Introduction, HTML5 New Elements, HTML5 Video, HTML5 Video/DOM
• HTML5 Audio, HTML5 Drag and Drop, HTML5 Canvas, HTML5 SVG, HTML5 Canvas vs. SVG
• HTML5 Geolocation, HTML5 Web Storage, HTML5 App Cache, HTML5 Web Workers
• HTML5 SSE, HTML5 Tags
• Introduction to Cisco Router & Switch.
• Internal & External components of Cisco Router.
• Starting up with a Router & Switch.
• The Command-Line Interface.
• Configuration of Router & Switch.
• LED signalling for routers & switches
• Hard disk drive working
• Advanced disk drive
• Floppy drive
• Zip drive
• Tape drives
• Flash memory
• CD/DVD drives
• Advanced digital storage
• Introduction, History, Features, Setting up path, Working with Python, Basic Syntax
• Variable and Data Types, Operator, Conditional Statements, Looping
• Control Statements, break, continue, pass
• String Manipulation, Accessing strings, Basic Operation, String slices, Functions and methods
• Lists - Accessing list, Operations, Working with lists, Function and Methods
• Tuple - Accessing tuples, Operations, Working with lists, Function and Methods
• Dictionaires - Accessing values in dictionaries, Working with dictionaries, Properties, Functions
• Functions, Defining a function, Calling a function, Types of functions, Function Arguments
• Anonymous functions, Global and local variables
• Modules, Importing module, Math module, Random module, Packages, Composition
• Input-Output, Printing on screen, Reading data from keyboard, Opening and closing file
• Reading and writing files
• Exception Handling, Exception, Except clause, Try ? finally clause, User Defined Exceptions
• OOPs concept, Class and object, Attributes, Inheritance, Overloading, Overriding, Data hiding
• Regular expressions, Match function, Search function, Matching VS Searching, Modifiers, Patterns
• CGI - Introduction, Architecture, CGI environment variable, GET and POST methods, Cookies, File upload
• Database - Introduction, Connections, Executing queries, Transactions, Handling error
• Networking, Socket, Socket Module, Methods, Client and server, Internet modules
• Multithreading, Thread, Starting a thread, Threading module, Synchronizing threads
• Multithreaded Priority Queue
• GUI Programming, Introduction, Tkinter programming, Tkinter widgets, Sending email
• Network Devices
• Network Security Devices
• Twisted Pair Cable Combinations
• Crimping RJ-45
• Network Troubleshooting with Physical Topology
• If, If- else, Nested if-else,
• Stages & models in SDLC Verification, Validation, Process wars, System tests DevOps
• DevOps
• Windows Azure Web Role
• Creating a cloud website using web role
• Configuring Web role
• Understanding Dev Fabric
• Multi-instance role running in Dev Fabric
• Debugging applications in Dev Fabric
• Admin : Create a hosted service through Azure portal
• Admin : Deploying the created application on the REAL WINDOWS AZURE CLOUD
• Admin : Changing the configuration at runtime
• Admin : Managing the hosted services
• Admin : Upgrading the Hosted Services
• DNS Overview
• DNS Packet Structure
• DNS Queries
• Filter on DNS Traffic
• Analyze Normal/Problem DNS Traffic
• Properties of cryptographic hash functions
• Merkle Damgard construction
• md family
• sha family
• Digital signatures
• sha3
• Why do I need to worry about my computer's security?
• Introduction
• Hardening of Operating System
• Updating the system and configuring the updates
• Disable unnecessary services
• Strong password creation
• Deployment of antivirus and firewall
• Disable guest account access
• "Make Private" folders
• Desktop Security:
• What is file sharing?
• Types of file sharing
• How to share folder?
• Configuring shared folder permissions.
• Hiding files and folders.
• File sharing tips.
• File downloading tips.
• How to backup data and restore?
• How to encrypt and decrypt files?
• How to kill suspect processes?
One-to-one delivery of training may best meet the learning needs of individuals.The training required will often be given on a one-to-one basis that provides hands-on experience,i.e.,individual training. The training is scheduled normally at a time that best suites you, we offer regular training classes (day time classes), weekend training classes, and fast track training classes. We are mainly focused on revolutionizing learning by making it interesting and motivating. we provide range of career oriented courses for different segments like students, job seekers and corporate citizens.
• Digital Data
• Types of Digital Data
• Rules of Evidence
• Electronic Devices: Types and Collecting Potential Evidence
• Digital Evidence Examination Process
• Electronic Crime and Digital Evidence Consideration by Crime Category
Deploying Servers
• Deploy images by using Windows Deployment Services
• Configure Microsoft Windows activation
• Configure Windows Server Hyper-V and virtual machines
• Configure high availability
• Configure storage
Configuring Remote Desktop Services
• Configure RemoteApp and Remote Desktop Web Access
• Configure Remote Desktop Gateway (RD Gateway)
• Configure Remote Desktop Connection Broker
• Configure and monitor Remote Desktop resources
• Configure Remote Desktop licensing
Configuring a Web Services infrastructure
• Configure Web applications
• Manage Web sites
• Configure a File Transfer Protocol (FTP) server
• Configure Simple Mail Transfer Protocol (SMTP)
• Manage the Web Server (IIS) role
• Configure SSL security
• Textboxes, Frames, Check Boxes ,
• Option Buttons, Images, Setting a Border &Styles,
• The Shape Control, The line Control,
• Working with multiple controls and their properties,
• Designing the User Interface, Keyboard access, tab controls,
• Default & Cancel property, Coding for controls.
• Enumeration Concepts
• NetBIOS Enumeration
• SNMP Enumeration
• UNIX/Linux Enumeration
• LDAP Enumeration
• NTP Enumeration
• SMTP Enumeration
• DNS Enumeration
• Enumeration Concepts
• NetBIOS Enumeration
• SNMP Enumeration
• UNIX/Linux Enumeration
• LDAP Enumeration
• NTP Enumeration
• SMTP Enumeration
• DNS Enumeration
• How to design cloud services
• Database concepts
• Planning and design
• Familiarity with architectural trade-off decisions (high availability vs. cost, Amazon Relational Database Service (RDS) vs. installing your own database on Amazon Elastic Compute Cloud (EC2))
• Amazon S3, Amazon Simple Workflow Service (SWF), and Messaging
• DynamoDB, AWS Elastic Beanstalk, AWS CloudFormationv
• Elasticity and scalability
• Introduction to SQL constructs, Basic Structure, DDL Commands, DML Commands
• Simple Queries, Nested Queries, Aggregate Functions, Clauses, Triggers and Views
• Joining Oracle tables, Equi join, Outer Join, Hiding joins by creating views
• SQL access methods, Merge join, Hash Join, Nested Loop join
• Advanced SQL operators, Using IN, NOT IN, EXISTS and NOT EXISTS
• Between operator, EXISTS clause, Using wildcards in queries (LIKE operator)
• Subqueries, Correlated subqueries, Non - correlated subqueries
• SQL Tuning - Introduction to rule based optimization, Introduction to cost based optimization
• Collecting table and index statistics, Using column histograms, Changing the default optimizer modes
• Using TKPROF, Using SQL*Trace, SQL reusability within the library cache
• Table high water mark, Table striping and table partitions
• Choosing the correct data stores based on your data characteristics
• Moving code to data
• Implementing polyglot data store solutions
• Aligning business goals to the appropriate data store
• Network Devices
• Network Security Devices
• Twisted Pair Cable Combinations
• Crimping RJ-45
• Network Troubleshooting with Physical Topology
• Shell Basics, Types of shells, Shell functionality
• Environment, Writing first script
• Writing script & executing basic script
• Debugging script, Making interactive scripts
• Variables (default variables)
• Mathematical expressions, Conditional statements
• If-else- elif, Test command
• Logical operators-AND,OR,NOT, ase –esac. Loops
• While, For, Until, Break & continue
• Command line arguments
• Positional parameters
• Set & shift
• IFS, Break & continue
• Functions & file manipulations
• Processing file line by line
• Functions, Regular Expression & Filters
• What is regular expression
• Grep,cut ,sort commands
• Grep patterns, SED & AWK, Processes
• Concept of process in Unix
• Background processes
• Scheduling processes -At, batch & Cron
• Misc, Trapping signals
• String substitutions / manipulations
1. System Hacking
2. Network Hacking
3. Email hacking
4. Website Hacking
5. Wireless Hacking
6. Web-Application Hacking
7. Server Hacking
8. Bluetooth Hacking
9. Mobile Hacking
This training is delivered by our organisations, IT consultants at our workplace that includes the industrial training. The course will be taken exclusively by the employees of the organisation. Students who are willing to visit our company, know our work culture, learn about technologies that are being implemented and other things can choose this training. Along with this will be the Internship training where students who are pursuing their degree can opt for training in various domains and get trained. After training, they can attend interviews with us and get hired as interns which will further proceed to working with us in our projects.
• Mapping data to the programming framework
• Connecting and extracting data from storage
• Transforming data for processing
• Subdividing data in preparation for Hadoop MapReduce
• Configuring Domain Name System (DNS) for Active Directory
• Configuring Zones
• Configure DNS Server settings
• Conigure Zone Transfers and replication
• Configuring the Active Directory Infrastructure
• Configure a forest or a domain
• Configure Trusts
• Configure Sites
• Configure Active Directory Replication
• Configure Gobal Catalogue
• Configure Operations Masters
• Configuring Active Directory Roles and Services
• Configure Active Directory Lightweight Directory Service (AD LDS)
• Configure Active Directory Rights Management Service (AD RMS)
• Configure the read-only domain controller (RODC)
• Configure Active Directory Federation Services (AD FSv2)
• Creating and Maintaing Active Directory Objects
• Automate Creation of Active Directory Accounts Maintain Active Directory Accounts
• Create and apply Group policy objects (GPOs)
• Configure GPO Templates
• Deploy and Manage software by using GPOs
• Configure account policies
• Configure Audit policy using GPOs
• Maintaining the Active Directory Enviroinment
• Configure Backup and recovery
• Perform offline maintenance
• Monitor Active Directory
• Configuring Active Directory Certificate Services
• Install Active Directory Certificate Services Configure CA server settings
• Manage Certificate templates
• Manage enroments
• Manage certificate revocations
• Information at Hand Before System Hacking Stage
• System Hacking: Goals
• CEH Hacking Methodology (CHM)
• CEH System Hacking Steps
• Escalating Privileges
• Executing Applications
• Hiding Files
• Covering Tracks
• Penetration Testing
• NAT
• PAT
• Subnetting/Supernetting
• VLAN and VLAN tagging
• Network port configurations
• Switching and routing in physical and virtual environments
• Configure an Amazon Machine Image (AMI)
• Programming with AWS APIs
• Path traversal
• Information Disclosure
• Information Exposure Through an Error Message
• Information Exposure Through Debug Information
• Privilege Escalation
• Improper Access Control
• Improper Authentication
• Disallowed Robots file Access
• Routing Basics
• Managing static & dynamic routes
• Configuring static IP Routing.
• Introduction to Dynamic Routing using RIP.
• Managing & Configuring OSPF & EIGRP.
• Using Same & Different AS numbers.
• Avoiding routing loops using Split Horizon, Route poisoning.
• BGP Configuration .
Planning Network and Application Services
• Plan for name resolution and IP addressing
• Design for network access
• Plan for Remote Desktop Services
Design core identity and access management components
• Design Active Directory forests and domains
• Design the Active Directory physical topology
• Design the Active Directory administrative model
• Design the enterprise-level group policy strategy
Designing Support identity and access management components
• Plan for domain or forest migration, upgrade, and restructuring
• Design the branch office deployment
• Design and implement public key infrastructure
Designing for business continuity and data availability
• Design for software updates and compliance management
• Design the operating system virtualization strategy
• SSL/TLS Basic Protocol, Computing the keys
• Client authentication, PKI as deployed by SSL Attacks fixed in v3
• Exportability-Encoding-Secure Electronic
• Transaction (SET), Kerberos.
• Installing the Hyper-V Server Role
• Managing Hyper-V
• Configuring Hyper-V Settings
• Hyper-V Host Storage and Networking
• Installing the Hyper-V Server Role
• Configuring Hyper-V Settings
• Accessing and Managing Hyper-V Remotely
• Introduction To Network Security
• Virtual Private Networks
• MPLS And MPLS VPN
• E-Mail Security
• Web Security
• Incident And Incident Response
• Initial Response And Forensic Duplication
• Storage And Evidence Handling
• Network Forensics
• Systems Investigation And Ethical Issues
• Mobile And Digital Forensics
• Security Framework For Mobile Systems
• Mobile Phone Forensics
• Introduction To Digital Forensics
• Analysis Of Digital Forensic Techniques
• Mobile And Wireless Security
• Mobile Security
• Securing Wireless Networks
• Adhoc Network Security
• V-Rfid Security
• Malware Analysis
• Implementationof Covert Channel
• Virus Design And Its Implications
• Malware Design Using Open Source
• Virus And Worm Analysys
• Penetration Testing And Vulnerability Assessment
• Foot Printing & Social Engineering
• Scanning & Enumeration
• System Hacking
• Sniffers & Sql Injection
• Myths Of Information Security Management
• Information Security Assessments
• Security Management Concepts And Principles
• Configuration Management
• Security Management Planning
• Risk Assessment & Security Audit
• Data Collection
• Data Analysis
• Risk Assessment
• Security Audit Process
• Storage Management & Security
• Storage Area Networking
• Backup And Recovery Mechanisms
• Storage Security
• Storage Infrastructure Management
• Cloud Computing Fundamentals
• Cloud Applications
• Securing The Cloud
• Virtualization Security
• Cloud Security Management
• Fundamentals Of Cyber Security
• Issues In Cyber Security
• Intellectual Property Rights
• Procedural Issues
• Legal Aspects Of Cyber Security
• Introduction to SQL constructs, Basic Structure, DDL Commands, DML Commands
• Simple Queries, Nested Queries, Aggregate Functions, Clauses, Triggers and Views
• Joining Oracle tables, Equi join, Outer Join, Hiding joins by creating views
• SQL access methods, Merge join, Hash Join, Nested Loop join
• Advanced SQL operators, Using IN, NOT IN, EXISTS and NOT EXISTS
• Between operator, EXISTS clause, Using wildcards in queries (LIKE operator)
• Subqueries, Correlated subqueries, Non - correlated subqueries
• SQL Tuning - Introduction to rule based optimization, Introduction to cost based optimization
• Collecting table and index statistics, Using column histograms, Changing the default optimizer modes
• Using TKPROF, Using SQL*Trace, SQL reusability within the library cache
• Table high water mark, Table striping and table partitions
• Basics of PL/SQL - Introduction, Overview and benefits of PL/SQL, PL/SQL architecture
• PL/SQL wrapper utility, PL/SQL Structures, Simple blocks, Control structures
• PL/SQL records, Declaring Variables and Constants, Loops in PL/SQL, Executing a PL/SQL Block
• PL/SQL tables, Defining PL/SQL tables, Reasons to use PL/SQL tables, Populating a PL/SQL table
• Retrieving from a PL/SQL table, Triggers in PL/SQL, Triggers and database events
• Defining a trigger, Timing a trigger, Enabling and disabling a trigger
• Stored procedures and functions, Basics of stored procedures, Basics of functions
• Defining stored procedures & functions, Function and stored procedures prototypes
• Passing arguments to functions and stored procedures, Recompiling functions and stored procedures
• This class will cover configuration of the Linux kernel, Red Hat kernel upgrade procedures,
• Control and configuration of kernel modules,
• Discussion of the /proc file system,
• Understand how it can be used to change the operation of certain kernel configuration aspects on the fly without rebooting the OS
• Variables, Variables Public, Private, Static, Constants, Data Types,
• Naming rules/conventions, Constants, Named & intrinsic,
• Declaring variables, Scope of variables, Val Function,
• Arithmetic Operations, Formatting Data.
• Key Terms
• Image quality of monitor
• Evolution of Displays
• Video technologies
• Types of monitor
• Resource management – men, material, money, and machines,
• Personnel management
• Office management
• E-Commerce
• For, While , Nested loops,
• Basic Networking Concepts & OSI Reference
• Model
• Function of Ethernet
• Network Security
• Wireless Network Technology
• Ethernet Switch Configuration
• Subnetting
• Routers and Router Configuration
• Different WAN Technologies
• Advanced dynamic Routing Protocols
• Route Summarization
• Link State Routing Protocol
• EIGRP
• Advanced Switching Technology
• VLAN and Trunks
• Access Control List
• Network Address Translation (NAT)
• IP version 6
• Wide Area Network
• Frame Relay
• Overview of Exchange Server 2013 Unified Messaging
• Designing and implementing Exchange Server 2013 Unified Messaging
• Designing and implementing site resiliency
• Planning virtualization for Exchange Server 2013
• Designing and implementing message transport security
• Designing and implementing message retention
• Designing and implementing messaging compliance
• Designing and implementing administrative security and auditing
• Managing Exchange Server 2013 with Exchange Management Shell
• Designing and implementing integration with Exchange Online
• Designing and implementing messaging coexistence
• Designing and implementing Exchange Server migrations and upgrades
• Overview of GPG
• Commands and CLI
• GPG trust model
• GUI – KGPG, Seahorse
• Frontends – Kleopatra, enigmail
• Javascript Introduction, What is JavaScript?, Pre Requirements
• Creating a JavaScript file, Tools Required, Basics of Javascript
• Structure of a JavaScript Code, DataTypes, Variables & Operators
• Looping & Conditional Statements, Functions, Types & Objects
• Arrays, Numbers, Strings, Dates, Objects
• DOM (Document object model), What is DOM?, Element Nodes
• Getting Element Nodes, Changing DOM Content, Creating DOM Elements
• Events & Listeners, Events Overview, Responding to Mouse Events
• Form Events, Timers, Debugging Javascripts, Common Mistakes
• Using Firebug, Debugging a page, Application of Javascripts
• Smarter Forms, UI Enhancements, Countdown, Resizing web pages
• Javascript Libraries, Libraries Overview, JQuery and more
• Install and configure servers
• Configure server roles and features
• Configure Hyper –V
• Deploy and configure core network services
• Install and administer Active Directory
• Create and Manage Group policy
• Key Terms
• Image quality of monitor
• Evolution of Displays
• Video technologies
• Types of monitor
• Implement a Group Policy infrastructure
• Manage user desktops with Group Policy
• Manage user and service accounts
• Maintain Active Directory Domain Services (AD DS)
• Configure and troubleshoot domain name system (DNS)
• Configure and troubleshoot remote access
• Install, configure, and troubleshoot the network policy server (NPS) role
• Implement network access protection (NAP)
• Optimize file services
• Configure encryption and advanced auditing
• Deploy and maintain server images Implement
• Title - 11 Conditions
• Title - 12 Conditionals Statements
• Title - 13 PERFORM statements
• Title - 14 RENAMES & REDEFINES Clauses
• Title - 15 Programs
• Introduction
• Installing the Oracle Database Structure, Creating an Oracle Instance
• Managing the Oracle Instance, Managing Database Storage Structure
• Oracle managed file(OMF), Creating a table space
• Administering security, Managing Schema Objects
• Types of Indexes, Managing Data and Concurrency
• Locking Mechanism, Managing Undo Data
• Implementing Oracle Database Security
• Configuring the Oracle Network environment
• Proactive Maintenance, ADDM
• Performance Management, Backup and Recovery Concept
• Hot Backup • Cold Backup, Hands on practice
• Performing Database Backups
• Performing Database Recovery
• Performing Flashback, Hands on practice
• Flashback version query, Moving Data
• Importance of Time Management
• Prioritizing tasks
• Personal Goal setting
• Delegation and Time Management
• Barriers to Time Management
• Identifying and Handling Time Consuming Tasks
• General Hard Drive Troubleshooting
• Use Operating System Utilities
• Check Drive Cables and Connections
• If the Drive Will Not Boot Up
• If the Drive Boots but Hangs Up at Boot
• Hard Drive Software Troubleshooting
• Hard Drive Software Problems and Solutions
• Computer Boots but with Many Errors or Hangs
• Your Hard Drive may have an IRQ Conflict
• Your Hard Drive Device Drives Causing Problems
• What To Do When Windows Won't Boot
• Won't Boot-Up At All
• Making a Windows XP Bootable Floppy, if You Still Have a Floppy Drive
• If The PC Won't Boot Past Windows
• Reports
• Process improvement, Static techniques
• Routing Basics.
• Managing static & dynamic routes.
• Configuring static IP Routing.
• Introduction to Dynamic Routing using RIP.
• Managing & Configuring OSPF & EIGRP.
• Using Same & Different AS numbers
• Avoiding routing loops using Split Horizon, Route poisoning.
• BGP Configuration
• Precepts of Security
• Knowing Encryption
• Digital Certificate
• Digital Signature
• Working with e-mail (web based)
• Working with e-mail (mail client)
• Working with File Transfer - FTP
• Working with File Transfer - Web Folders
• ICMP Overview
• ICMP Packet Structure
• Filter on ICMP Traffic
• Analyze Normal/Problem ICMP Traffic
• Introduction to XML, Why XML?, XML history and origins,An XML document is a well- formed document.
• XHTML, The XML universe, Validation & B2B, Collapse Namespaces, Sharing knowledge
• The problem and the solution, Default namespaces, Collapse Validation and DTD Schema
• External & Internal DTDs, DTD syntax: elements and attributes, Freedom vs. structure.
• Internal & external XML entities, Collapse Schema, Much more than an alternative to DTD
• Namespaces in Schema (default namespace, target namespace, Schema namespace)
• Built-in data types, Simple and complex types, Elements and attributes groups, Unions and lists
• Inheritance, User-defined types, Include and import of external Schemas, The key, keyref and unique elements
• Collapse XPath, XPath Expressions, Operators and Special Characters, Filters and Filter Patterns
• Comparisons, Location Paths, XPath Functions, Collapse XSL, XSL versions, The XSL processor: client & server side.
• Extracting the data from XML tree, Sorting, XSL numbers, Xpath, Creating new elements & attributes.
• Creating new documents, XSL functions, Making choices, Collapse XML Application, XML programming.
• System.XML, SAX 2.0./XMLReader, XMLSerializer, The Document Object Model.
• .Net XML tools/The Apache tools set, Validating XML in Code, XSL Transformation in code
• Key Terms
• Image quality of monitor
• Evolution of Displays
• Video technologies
• Types of monitor
• Installing Java.
• Java Program Development, Java Source File Structure
• Compilation, Executions.
• Basic Language Elements: Lexical Tokens, Identifiers
• Keywords, Literals, Comments
• Primitive Datatypes, Operators, Assignments.
Experience Required - 0 To 5 Years
• Collaborate with cross-functional teams to define, design, and ship new features.
• Help to define and ensure adherence to standards and methods for design and development for the .NET environment
• Be able to adapt, flex and change to meet new and conflicting work priorities at short notice.
• Take responsibility and accountability in ensuring solutions are fit for purpose, scalable and modern.
• Good Knowledge With Form Controls.
• Implement a Group Policy infrastructure
• Manage user desktops with Group Policy
• Manage user and service accounts
• Maintain Active Directory Domain Services (AD DS)
• Configure and troubleshoot domain name system (DNS)
• Configure and troubleshoot remote access
• Install, configure, and troubleshoot the network policy server (NPS) role
• Implement network access protection (NAP)
• Optimize file services
• Configure encryption and advanced auditing
• Deploy and maintain server images Implement
• Information at Hand Before System Hacking Stage
• System Hacking: Goals
• CEH Hacking Methodology (CHM)
• CEH System Hacking Steps
• Escalating Privileges
• Executing Applications
• Hiding Files
• Covering Tracks
• Penetration Testing
• Windows Azure worker Role
• Creating a Worker role
• Configuration of worker role
• Communications between Worker role and Webrole
• Difference between worker role and web role
• Debugging in the dev fabric
• Limitations of the dev Fabric
• Electronic Evidence
• First Responder
• Roles of First Responder
• Electronic Devices: Types and Collecting Potential Evidence
• First Responder Toolkit
• First Response Basics
• Securing and Evaluating Electronic Crime Scene
• Conducting Preliminary Interviews
• Documenting Electronic Crime Scene
• Collecting and Preserving Electronic Evidence
• Packaging and Transporting Electronic Evidence
• Reporting the Crime Scene
• Note Taking Checklist
• First Responder Common Mistakes
• Setting a Computer Forensics Lab
• Investigative Services in Computer Forensics
• Computer Forensics Hardware
• Computer Forensics Software
• Creating and Configuring Virtual Hard Disks
• Creating and Configuring Virtual Machines
• Installing and Importing Virtual Machines
• Managing Virtual Machine Checkpoints
• Monitoring Hyper-V
• Designing and Managing Virtual Machines
• Creating and Managing Virtual Hard Disks
• Creating and Managing Virtual Machines
• Importing Virtual Machines and Working with Checkpoints
• Monitoring Hyper-V
• Adapter cards
• Peripheral port connector types
• Common IDE, SCSI and Peripheral Devices
• Common Error Codes Interpretation
• Cooling systems
• Introduction to the Unix Operating System
• Unix Basic Commands
• Redirection and Pipes
• Introduction to The vi Editor
• Searching and Replacing Text
• Recalling and Editing Commands
• File Permissions and Access Control
• Processes
• Creating the components of Hadoop MapReduce jobs
• Distributing data processing across server farms
• Executing Hadoop MapReduce jobs
• Monitoring the progress of job flows
• Adapter cards
• Peripheral port connector types
• Common IDE, SCSI and Peripheral Devices
• Common Error Codes Interpretation
• Cooling systems
• Trunk ports
• Port binding/aggregation
• Common ports
• Common protocols
• Types of networks
• Introduction
• Oracle managed files, Configuring recovery manager
• Using recovery manager, RMAN backup types
• Hands on practice, Recovering from non critical loses
• Database recovery, Types of incomplete recovery
• Flashback, Dealing with database corruption
• Hands on practice, Monitoring and managing memory
• Automatic shared memory management, Automatic performance management
• Automatic workload repository, Managed schema objects
• Hands on practice, Clusters, Managing storage
• Automatic storage management, ASM disk group
• Portioning a disk, Managing resources
• Automatic task with scheduler, Database security
• Transparent data encryption, Using globalization support
• Hands on practice
Students will discuss and practice troubleshooting and system rescue procedures utilising
hands on labs.
• Adapter cards
• Peripheral port connector types
• Common IDE, SCSI and Peripheral Devices
• Common Error Codes Interpretation
• Cooling systems
• Multi –Dimensional Array, Operation on String
• Practicals - Mutable & Immutable String, Using Collection Bases Loop for String
• Tokenizing a String, Creating Strings using StringBuffer
• If Statement, If ?then-else Statement, Comparing Strings, Compound
• Conditions(And, Or, Not), Nested If Statements,
• Case Structure ,Using If statements with Option Buttons & Check Boxes,
• Displaying Message in Message Box, Testing whether Input is valid or not.
• Using Call Statement to call a procedure.
• Baseline "NormalTraffic
• Use Color
• Look Who's Talking: Examine Conversations and Endpoints
• Focus by Filtering
• Create Basic IO Graphs
• Examine Delta Time Values
• Examine the Expert System
• Follow the Streams
• Graph Bandwidth Use, Round Trip Time, and TCP Time/Sequence Information
• Watch Refusals and Redirections
This training is organized away from workplace - in colleges, institutions and delivers wide range of technical workshops and seminars ensuring best placement activities for students. We have been training all NIT's, IIT's and IIM's across India providing various awareness sessions and technical seminars with latest technologies. We have revised syllabus and course content for each kind of training required with the best duration offers and placement offers. We take placement as our core process in training the students on various aspects that the industry requires.
• How to use the event viewer?
• How to enable auditing in windows?
• How to read logs on your system?
• How to close ports?
• Overview of the windows registry.
• How to restore the registry?
• How to close a port?
• Common internal commands.
• How to find services and ports they listen on?
• Hadoop: Basic Concepts, What is Hadoop?, The Hadoop Distributed File System
• How Hadoop Map Reduce Works, Anatomy of a Hadoop Cluster
• Setting Up a Hadoop cluster, Make a fully Distributed Hadoop Cluster
• Cluster Specification, Network Topology, Cluster Specification and Installation, Hadoop Configuraton
• Hadoop Daemons, Master Daemons, Name Node, Job Tracker, Secondary Name Node
• Slave Daemons, Data Node, Task Tracker
• HDFS ( Hadoop Distributed File System ), Blocks and Splits, Input Splits, HDFS Splits
• Methods of Accessing HDFS, Java Approach, CLI Approach
• Writing a MapReduce Program, Examining a Sample MapReduce Program With several examples
• Basic API Concepts, The Driver Code, The Mapper, The Reducer, Hadoop's Streaming API
• The configure and close Methods, Sequence Files, Record Reader, Record Writer
• Role of Reporter, Output Collector, Directly Accessing HDFS, ToolRunner
• Internal IP Disclosure
• Path Disclosure
• Token Disclosure in URL
• EXIF Geolocation Data
• User Enumeration
• Server Configuration
• Private API key Disclosure
• Sensitive Configuration Files
• Block cipher principles
• Feistel networks
• S boxes and P boxes
• Block cipher modes of operation
• DES
• 3DES
• AES
• Hard disk drive working
• Advanced disk drive
• Floppy drive
• Zip drive
• Tape drives
• Flash memory
• CD/DVD drives
• Advanced digital storage
• Introduction to Incident
• Incident Response Methodology Steps
• Activities in Initial Response Phase after detection of an incident
• Windows Server 2008 Active Directory
• Organizational Units and Domain Controllers
• Global Catalog
• Operations Masters and Server Manager
• Global Catalog Servers
• RID Master
• Transferring and Seizing of Operations Master Roles
• Active Directory and DNS
• Command-Line DNS Server Administration
• Zone Transfers and Replication
• Active Directory Sites and Replication
• Active Directory Sites
• Active Directory Lightweight Directory Services (AD LDS)
• Active Directory Rights Management Services (AD RMS)
• Read-Only Domain Controllers
• Active Directory Federation Services (ADFS)
• Windows Server 2008 Virtualization
• Active Directory Objects and Trusts
• Organizational Units
• Group Membership
• Shell Access Policies
• Group Policy to Deploy Software
• Backing Up and Recovering Active Directory
• Use of Windows Server Backup
• Active Directory Certificate Services
• Installing Active Directory Certificate Services
• Certificate Templates and Revocation
• HTML Elements, HTML Attributes, HTML Headings, HTML Paragraphs
• HTML Formatting, HTML Fonts, HTML Styles, HTML Links
• HTML Images, HTML Tables, HTML Lists, HTML Forms, HTML Frames
• HTML Iframes, HTML Colors, HTML Colornames, HTML Colorvalues
• HTML Quick List, HTML Layout, HTML Doctypes, HTML Head
• HTML Meta, HTML Scripts, HTML Entities, HTML URLs, HTML URL Encode
• HTML Media, HTML Audio, HTML Object, HTML Video, HTML YouTube, HTML Media Tags
• HTML5 Introduction, HTML5 New Elements, HTML5 Video, HTML5 Video/DOM
• HTML5 Audio, HTML5 Drag and Drop, HTML5 Canvas, HTML5 SVG, HTML5 Canvas vs.SVG
• HTML5 Geolocation, HTML5 Web Storage, HTML5 App Cache, HTML5 Web Workers
• HTML5 SSE, HTML5 Tags
• Title - 16 Sequential Files
• Title - 17 Direct Access Files
• Title - 18 Indexed Sequential Files
• Title - 19 Sorting and Merging of Files
• Title - 20 Programs
• Break, Continue, Pass,
• Trojan Concepts
• Trojan Infection
• Types of Trojans
• Trojan Detection
• Countermeasures
• Anti-Trojan Software
• Pen Testing for Trojans and Backdoors
• Javascript Introduction, What is JavaScript?, Pre Requirements
• Creating a JavaScript file, Tools Required, Basics of Javascript
• Structure of a JavaScript Code, DataTypes, Variables & Operators
• Looping & Conditional Statements, Functions, Types & Objects
• Arrays, Numbers, Strings, Dates, Objects
• DOM (Document object model), What is DOM?, Element Nodes
• Getting Element Nodes, Changing DOM Content, Creating DOM Elements
• Events & Listeners, Events Overview, Responding to Mouse Events
• Form Events, Timers, Debugging Javascripts, Common Mistakes
• Using Firebug, Debugging a page, Application of Javascripts
• Smarter Forms, UI Enhancements, Countdown, Resizing web pages
• Javascript Libraries, Libraries Overview, JQuery and more
• Here's How To Replace A DVD Drive In Your Laptop
• How To Repair Cable, DSL, And Dial-Up Modem Problems
• How To Setup Cable Modem With A Router
• A Direct Subscriber Line ( DSL ) Modem
• Troubleshooting DSL Modems-Internet Access Needed
• An Older Dial-Up Modem
• Tips On Surviving An Operating System Crash
• What is a Hard Drive Crash
• Steps To Recover Your Hard Drive
• Introduction to Switching Technology.chnologies
• Broadcast Domain & Collision Domain
• Packet Forwarding Techniques .
• Access Modes .
• Spanning Tree Protocol .
• VTP.
• ISL Routing & Frame Tagging.
• Port Security.
• ARP.
Introduction to Switching Technology.
Broadcast Domain & Collision Domain
Packet Forwarding Techniques
Access Modes
Spanning Tree Protocol.
VLAN
VTP
ISL Routing & Frame Tagging.
Port Security
ARP
• Interview Preparation
• Common Interview Questions
• What Employers Want
• Attitude and Effort
• Body Language
• Research
• The Mock Interview
• Phone Interviews
• Behavioral Interviews
• Closing the Interview
• Thank You Notes
• Trojan Concepts
• Trojan Infection
• Types of Trojans
• Trojan Detection
• Countermeasures
• Anti-Trojan Software
• Pen Testing for Trojans and Backdoors
Experience Required - 0 To 5 Years
• .NET Developer skilled in C#, .NET MVC, AJAX, JQuery, Web API, Entity Framework, LINQ, Angular JS
• To define and ensure adherence to standards and methods for design and development for the .NET environment Be able to adapt, flex and change to meet new and conflicting work priorities at short notice.
• Development experience using .NET, C#, Javascript, AJAX , SQL and MVC framework
• .Net Software Developer, C# Developer, .NET Software Engineer. Agile, continuous integration experience.
• Configuring Addressing and Services
• Configure IPv4 and IPv6 addressing
• Configure Dynamic Host Configuration Protocol (DHCP)
• Configure routing
• Configure Windows Firewall with advanced
• Security Configuring Name Resolution
• Configure a Domain Name System (DNS) server
• Configure DNS zones
• Configure DNS records
• Configure DNS replication
• Configure name resolution for client
• Computers Configuring Network Access
• Configure remote access
• Configure Network Access Protection (NAP)
• Configure DirectAccess
• Configure Network Policy Server (NPS)
• Configuring File and Print Services
• Configure a file server
• Configure Distributed File System (DFS)
• Configure backup and restore
• Manage file server resources
• Configure and monitor print services
• Monitoring and Managing a Network Infrastructure
• Configure Windows Server Update Services (WSUS) server settings
• Configure performance monitoring
• Configure event logs
• Gather network data
• Introduction to Cisco Router & Switch.
• Internal & External components of Cisco Router.
• Starting up with a Router & Switch.
• The Command-Line Interface.
• Configuration of Router & Switch.
• LED signalling for routers & switches
• Class Fundamentals, Object & Object reference, Object Life time & Garbage Collection.
• Creating and Operating Objects.
• Constructor & initialization code block Access Control, Modifiers, methods
• Nested , Inner Class &Anonymous Classes, Abstract Class & Interfaces
• White box Testing, Black box Testing
• Alpha Testing, Beta Testing
• Gama Testing
• Cloud Security Best Practices
• Shared Security Responsibility Model
• AWS Platform Compliance
• AWS security attributes (customer workloads down to physical layer)
• Security Services
• AWS Identity and Access Management (IAM)
• Amazon Virtual Private Cloud (VPC)
• CIA and AAA models, ingress vs. egress filtering, and which AWS services and features fit
• Functional Testing, Regression Testing
• End-to- end Testing, Testing levels
• Unit Testing, Integration Testing
• System Testing, Acceptance Testing
• Virus and Worms Concepts
• Types of Viruses
• Computer Worms
• Malware Analysis
• Counter-measures
• Penetration Testing for Virus
• Virus and Worms Concepts
• Types of Viruses
• Computer Worms
• Malware Analysis
• Counter-measures
• Penetration Testing for Virus
• Introduction to CSS: Why Use CSS?
• CSS Syntax, HTML 5 and CSS, Set Up Web Pages with CSS
• Styling Text, Font, and Properties, Styling Page Backgrounds
• Styling Lists in CSS, Using CSS Classes and IDs
• Types of style sheet, Types of CSS selector
• Css Properties, Using Css for realtime practical works
• CSS Rounder corners, CSS Gradients and background properties
• Text-shadow and text-stroke properties
• Using Borders and Height and Width CSS Properties, Border images and shadows
• CSS Pseudo Elements, Positioning Elements, Validating CSS and HTML
• Get Started with the GNOME Graphical Desktop
• Manage Files Graphically with Nautilus
• Get Help in a Graphical Environment
• Configure Local Services
• Manage Physical Storage I
• Manage Logical Volumes
• Monitor System Resources
• Manage System Software
• Get Started with Bash
• Get Help in a Textual Environment
• Establish Network Connectivity
• Administer Users and Groups
• Manage Files from the Command Line
• Secure Linux File Access
• Administer Remote Systems
• Configure General Services
• Manage Physical Storage II
• Install Linux Graphically
• Manage Virtual Machines
• Control the Boot Process
• Deploy File Sharing Services
• Secure Network Services
• Checksum Issues at Capture
• Analyze Switched Networks
• Walk-Through a Sample SPAN Configuration
• Analyze Full-Duplex Links with a Network TAP
• Analyze Wireless Networks
• Initial Analyzing Placement
• Remote Capture Techniques
• Available Capture Interfaces
• Save Directly to Disk
• Capture File Configurations
• Limit Your Capture with Capture Filters
• Examine Key Capture Filters
• Admin : Configuring the storage account
• Admin : Explore the storage account settings
• Accessing queues using Azure Client library
• Programming using queues
• Exploring the queue API’s
• Communication between webrole and worker role using queues
• Limitations of the queues
• Advantages of using queues
• Blob Storage
• Programming with Blobs using Azure Client library
• Tables
• Create and use tables in Windows Azure.
• Design entities that are stored in table storage.
• Use case of queue, table and blob storage.
• Installation
• User and Group Administration
• Redhat Infrastructure
• Redhat Package Manager
• The Linux kernel
• Rescue modes
• Network Services
• Security
• X Window System
• Routing, Forwarding, and Firewalls
• File System Management
• Method Overloading, Recursion.
• Dealing with Static Members. Finalize() Method.
• Native Method. Use of “this “ reference, Use of Modifiers with Classes & Methods..
• Design of Accessors and Mutator Methods.
• Cloning Objects, shallow and deep cloning, Generic Class Types
• Extending Classes and Inheritance
• Use and Benefits of Inheritance in OOP, Types of Inheritance in Java
• Inheriting Data Members and Methods
• Role of Constructors in inheritance, Overriding Super Class Methods.
• Use of “super”, Polymorphism in inheritance.
• Type Compatibility and Conversion, Implementing interfaces.
• Rues & Regulations
• Licensing and Registration procedure
• Appreciation of important provisions of Factory Act.
• Shops & Commercial Establishment Act.
• Sales of Goods Act, Partnership Act.
• Contract Act; Income Tax, SalesTax and Excise rules.
• Insurance.
• Defining / Creating and Modifying a Menu, Using common dialog box,
• Creating a new sub-procedure, Passing Variables to Procedures,
• Passing Argument ByVal or ByRef, Writing a Function Procedure,
• Deploying Servers
• Deploy images by using Windows Deployment Services Configure Microsoft Windows activation
• Configure Windows Server Hyper-V and virtual machines
• Configure high availability
• Configure storage
• Configuring Remote Desktop Services
• Configure RemoteApp and Remote Desktop Web
• Access Configure Remote Desktop Gateway (RD Gateway)
• Configure Remote Desktop Connection
• Broker Configure and monitor Remote Desktop
• resources Configure Remote Desktop licensing
• Configuring a Web Services infrastructure
• Configure Web applications
• Manage Web sites
• Configure a File Transfer Protocol (FTP) server
• Configure Simple Mail Transfer Protocol
• (SMTP) Manage the Web Server (IIS) role
• Configure SSL security
• Understanding stress
• Managing stress
• Stress management techniques
• Improper Authorization & Authentication
• Insufficient Session Expiration & Session Fixation
• Issues with OAuth Redirection & Permissions
• Insecure Direct Object Reference (IDOR)
• Misconfigured Login pages
• Bypass Single factor & Two factor Authentication
• Account Take Over
• Account Lockout
• Cross Site Request Forgery (CSRF)
• Server Side Request Forgery (SSRF)
• DNS Zone Transfer
• Distinguishing Hadoop daemons
• Investigating the Hadoop Distributed File System
• Selecting appropriate execution modes: local, pseudo–distributed and fully
• Creating and Using Hyper-V Virtual Switches
• Advanced Hyper-V Networking Features
• Configuring and Using Hyper-V Network Virtualization
• Creating and Using Hyper-V Virtual Switches
• Configuring and Using Advanced Virtual Switch Features
• Configuring Hyper-V Network Virtualization
• What is JSON:API?, Overview of the JSON:API Specification
• Why JSON:API makes your life better, Content Negotiation
• Elegantly evolving level 3 REST APIs without breaking existing clients
• JSON API Server Responsibilities, Header content type, Status Codes
• Variants, JSON API Client Responsibilities, Specifying Media Types
• Parameters, Variants, Document structure, Resources
• Compound objects, Links, Metadata, Fetching Data
• Fetching resources, Relationships, Sparse fieldsets, pagination & filtering
• Mandatory, Optional & Recommended parameters
• CRUD design with JSON-API, Resource Creation, Relationship Objects
• Accepting Client-Generated IDs, Query parameters, Error Handling
• Title - 21 Table Handling
• Title - 22 Indexed Tables & Index Names
• Title - 23 Search & Start Verbs
• Title - 24 Programs using OCCURS & Screen Section
• Title - 25 List of Programs
• General troubleshooting information and questions
• Best Practices in debugging
• Phishing and its counter-measures
• Virus
• Trojan Horse
• Worms
• Spyware
• Adware
• Keylogger
• Social engineering
• Denial of Service
• Spamming
• Port Scanning
• Password cracking
• Basic security measures
• Initial Response & Volatile Data Collection from Windows system
• Initial Response & Volatile Data Collection from Unix system
• Forensic duplication:Forensic Duplicates as Admissible Evidence
• Forensic Duplication Tool Requirements
• Creating a Forensic Duplicate/Qualified Forensic, Duplicate of a Hard Drive
• Introduction to WAN.
• WAN Types.
• WAN Protocols & HDLC.
• Configuring & troubleshooting PPP.
• Configuring & troubleshooting Frame Relay.
• Introduction to XML, Why XML?, XML history and origins,An XML document is a well-formed document.
• XHTML, The XML universe, Validation & B2B, Collapse Namespaces, Sharing knowledge
• The problem and the solution, Default namespaces, Collapse Validation and DTD Schema
• External & Internal DTDs, DTD syntax: elements and attributes, Freedom vs. structure.
• Internal & external XML entities, Collapse Schema, Much more than an alternative to DTD
• Namespaces in Schema (default namespace, target namespace, Schema namespace)
• Built-in data types, Simple and complex types, Elements and attributes groups, Unions and lists
• Inheritance, User-defined types, Include and import of external Schemas, The key,keyref and unique elements
• Collapse XPath, XPath Expressions, Operators and Special Characters, Filters and Filter Patterns
• Comparisons, Location Paths, XPath Functions, Collapse XSL, XSL versions, The XSL processor: client & server side.
• Extracting the data from XML tree, Sorting, XSL numbers, Xpath, Creating new elements & attributes.
• Creating new documents, XSL functions, Making choices, Collapse XML Application, XML programming.
• System.XML, SAX 2.0./XMLReader, XMLSerializer, The Document Object Model.
• .Net XML tools/The Apache tools set, Validating XML in Code, XSL Transformation in code PHP
• Introduction PHP and MySQL, Benefits of using PHP MySQL
• Setup of PHP Environment, Testing the Page, Troubleshooting Installation Errors
• PHP Programming Concepts, Write your First PHP Program, Embed PHP in HTML / HTML in PHP
• PHP Data Types, Variables in PHP, SuperGlobal Variables, Operators in PHP
• Conditional Statements, Loops (For, While, Do While, Foreach), PHP Functions
• Using Functions in PHP, Userdefined Functions, Predefined Functions, Common Functions
• String Functions, File Functions, Date Functions, Hash Functions, Mail Function
• MySQL Database Training, What is Database ?, Understanding an RDBMS
• Understanding Tables, Records, and Fields, SQL Language, Using the MySQL Command-Line Client
• Working with MySQL Admin, Working with PHP MyAdmin
• Creating Databases, Types of Databases, Creating Tables in Database, Specifying Field Data Types
• Selecting the Most Appropriate Data Type, Adding Field Modifiers and Keys, Selecting a Table Type Altering Tables
• Altering Table and Field Names, Altering Field Properties, Adding and Removing Fields and Keys
• Altering Table Types, Backing Up and Restoring Databases and Tables, Backing Up Databases and Tables
• Restoring Databases and Tables from Backup, Dropping Databases and Tables
• Viewing Database, Table, and Field Information, SQL Queries
• Inserting Records, Editing and Deleting Records, Performing Queries, Retrieving Specific Columns
• Filtering Records with a WHERE Clause, Using Operators, Sorting Records and Eliminating Duplicates
• Limiting Results, Using Built-In Functions, Grouping Records, Joining Tables
• Using Subqueries, Using Table and Column Aliases, Arrays and Array Functions
• Why use Arrays, Types of Arrays, Creating, ArraysAccessing Arrays, Array Functions, Using Array Functions
• Introduction to WAN
• WAN Types
• WAN Protocols & HDLC
• Configuring & troubleshooting PPP.
• Configuring & troubleshooting Frame Relay.
• Hard Disk Drive Overview
• Disk Partitions and Boot Process
• Understanding File Systems
• RAID Storage System
• File System Analysis Using The Sleuth Kit (TSK)
• Public key crypto systems
• RSA algorithm
• Elliptic Curve cryptography
• Introduction to Visual Basic, Introduction Graphical User Interface (GUI)
• Programming Language (Procedural Object Oriented, Event Driven)
• The Visual Basic Environment, How to use VB complier to compile / debug and run the programs.
• Introduction to VB Controls, Textboxes, Frames, Check Boxes
• Option Buttons, Images, Setting a Border &Styles,The Shape Control, The line Control
• Working with multiple controls and their properties,Designing the User Interface
• Keyboard access, tab controls,Default & Cancel property, Coding for controls
• Variables, Constants, and Calculations, Naming rules/conventions, Constants, Named & intrinsic
• Decision & Conditions, Menus, Sub-Procedures and Sub-functions
• Multiple Forms, Creating , adding, removing Forms in project, Hide
• Show Method, Load, Unload, Statement, Me Keyword
• Referring to Objects on a Different Forms, List, Loops and Printing
• List Boxes & Combo Boxes, Filling the List using Property window / AddItem Method
• Clear Method, List box Properties, Removing an item from a list
• List Box/ Combo Box, Do/Loops, For/Next Loops, Using MsgBox Function
• Using String Function, Printing to printer using Print Method, Arrays
• OOP in VB, Classes, Creating a new Class,Creating a new object using a class
• The Initialize & Terminate events, Data Files, Opening and Closing Data Files, The Free File Function
• Viewing the data in a file, Sequential File Organization (Writing Data to a sequential Disk File
• The Err Object, Random Data File Opening a random file,Reading and writing a random file(Get, Put, LOF, Seek).
• Accessing Database File, Creating the database files for use by Visual Basic ( Using MS- Access)
• Using the Data Control ,setting its property, Using Data Control with forms, navigating the database in code
• Using listboxes & comboboxes as data bound controls, updating a database file ( adding, deleting records ) .
• Displaying data in grids ( grid control, properties of grid )
• Accessing Strings, Basic Operations , String slices
• Function and Methods,
• Memory
• CPU
• Storage and network allocation
• Entitlement/quotas (shares)
• Reservations
• Licensing
• Resource pooling
Common network services, such as Apache, BIND, DHCP, and email will be reviewed, demonstrated, and practiced using hands on labs.
• Introduction PHP and MySQL, Benefits of using PHP MySQL
• Setup of PHP Environment, Testing the Page, Troubleshooting Installation Errors
• PHP Programming Concepts, Write your First PHP Program, Embed PHP in HTML / HTML in PHP
• PHP Data Types, Variables in PHP, SuperGlobal Variables, Operators in PHP
• Conditional Statements, Loops (For, While, Do While, Foreach), PHP Functions
• Using Functions in PHP, Userdefined Functions, Predefined Functions, Common Functions
• String Functions, File Functions, Date Functions, Hash Functions, Mail Function
• MySQL Database Training, What is Database ?, Understanding an RDBMS
• Understanding Tables, Records, and Fields, SQL Language, Using the MySQL Command- Line Client
• Working with MySQL Admin, Working with PHP MyAdmin
• Creating Databases, Types of Databases, Creating Tables in Database, Specifying Field Data Types
• Selecting the Most Appropriate Data Type, Adding Field Modifiers and Keys, Selecting a Table Type Altering Tables
• Altering Table and Field Names, Altering Field Properties, Adding and Removing Fields and Keys
• Altering Table Types, Backing Up and Restoring Databases and Tables, Backing Up Databases and Tables
• Restoring Databases and Tables from Backup, Dropping Databases and Tables
• Viewing Database, Table, and Field Information, SQL Queries
• Inserting Records, Editing and Deleting Records, Performing Queries, Retrieving Specific Columns
• Filtering Records with a WHERE Clause, Using Operators, Sorting Records and Eliminating Duplicates
• Limiting Results, Using Built-In Functions, Grouping Records, Joining Tables
• Using Subqueries, Using Table and Column Aliases, Arrays and Array Functions
• Why use Arrays, Types of Arrays, Creating, ArraysAccessing Arrays, Array Functions, Using Array Functions
• Comparing real–time processing models
• Leveraging Storm to extract live events
• Lightning–fast processing with Spark and Shark
• Providing High Availability and Redundancy for Virtualization
• Implementing Virtual Machine Movement
• Implementing and Managing Hyper-V Replica
• Moving Hyper-V Storage and Virtual Machines
• Configuring and Managing Hyper-V Replica
• ACLs
• VPNs
• IDS/IPS hardware/software-based firewalls
• DMZ
• Review / audit logs
• Attacks
• Creating , adding, removing Forms in project, Hide,
• Show Method, Load, Unload
• Statement, Me Keyword, Referring to Objects on a Different Forms.
• PKI, CA. X509 certificates
• SSL/TLS, HTTPS
• IPV6 and IPSEC
• Proxies and Firewalls
• Testing tools, QTP
• Selenium, Automated Testing, Manual Testing
• Planning Network and Application Services
• Plan for name resolution and IP addressing
• Design for network access
• Plan for Remote Desktop Services
• Design core identity and access management components
• Design Active Directory forests and domains
• Design the Active Directory physical topology
• Design the Active Directory administrative model
• Design the enterprise-level group policy strategy
• Designing Support identity and access management components
• Plan for domain or forest migration, upgrade, and restructuring
• Design the branch office deployment
• Design and implement public key infrastructure
• Designing for business continuity and data availability
• Design for software updates and compliance management
• Design the operating system virtualization strategy
• Implement advanced network services
• Implement advanced file services
• Implement dynamic access control
• Implement network load balancing
• Implement failover clustering
• Implement failover clustering with Hyper-V
• Implement disaster recovery
• Implement distributed Active Directory Domain Services (AD DS) deployments
• Implement AD DS sites and replication
• Implement Active Directory Certificate Services (AD CS)
• Implement Active Directory Rights Management Services (AD RMS
• Implement Active Directory Federation Services (AD FS)
• Collecting Volatile Information
• Collecting Non-Volatile Information
• Windows Memory Analysis
• Windows Registry Analysis
• Cache, Cookie, and History Analysis
• MD5 Calculation
• Windows File Analysis
• Metadata Investigation
• Text Based Logs
• Other Audit Events
• Forensic Analysis of Event Logs
• Windows Password Issues
• Forensic Tools
• Utility Methods for Arrays, Observable and Observer Objects, Date & Times
• Practicals - Using Scanner, Regular Expression, Streams and the new I/O Capabilities
• The Classes for Input and Output, The Standard Streams, File I/O Basics
• Reading and Writing to Files, Buffer and Buffer Management,Serializing Objects
• Working with Credit Cards
• Working with Instant Messengers
• Working across File Sharing Networks
• Working on Dial-in Networks
• Working with Portable Devices
• Working with Wireless Devices
• Working with USB devices
• Working with Media Files
• Working with 3rd party software
• Basic security issues and best-practice security measures will be described and tested.
• Configuration of TCP wrappers and utilisation of configuration files will be discussed and utilised in hands on labs
• SQL
• PL/SQL
• Admin I
• Oracle Data pump Admin II
• Accessing list, Operations, Working with lists
• Function and Method,
• Basics of Network Security
• Introduction to Access Control Lists
• Types of ACL
• Wildcard Implementation on ACL
• Standard & Extended ACL
• Improper Certificate Validation
• Cleartext Transmission of Session Token
• Encrypted Cookies
• Cleartext Storage of Sensitive Information
• Missing Encryption of Sensitive Data
• Cryptographic Issue (Generic)
• Essentials of Cisco ASA
• Basic connectivity and device management
• Network integration
• Configure common features of the Cisco ASA OS
• Cisco ASA policy control
• Core Cisco ASA VPN common components
• Main VPN components
• Cisco clientless VPN solutions
• Cisco AnyConnect full tunnel VPN solution
• Cisco ASA high availability and virtualization options
• Features of Cisco ASA 5500-X Series Next-Generation Firewalls
• Basics of Network Security
• Introduction to Access Control Lists
• Types of ACL
• Wildcard Implementation on ACL
• Standard & Extended ACL
• OverView, CLR,CLS, MSIL, Assemblies, NameSpaces, .NET Languages, Dll’s(Vs)Exe’s
• BASICS - Using Variables and Arrays,Methods and Parameters,Decision Structures and Loops
• Handling Errors and Exceptions, Object oriented programming
• Classes, structures and enums, Constructors, Destructors, Properties, Inheritance
• Shadowing(new methods), Overriding, Method Overloading, this and base Keyword
• Sealed classes, Interfaces, Abstract Classes, Working with Delegates, Designing
• Implementing Events, Generics, Sealed classes and Partial classes
• C#.NET Application Architecture, Compiling, Debugging and Running in IDE
• Introduction to gui programming, System.Windows.Forms Assembly, System.Drawing,
• The Form Class, Win Forms, Visual Inheritance, Programming with Controls, User Controls
• System.IO, Readers and Writers, Streams, System.Collections
• Hashtable, ArrayList, Serialization, Formatters, Binary Serialization
• Formatters, Binary Formatter, SOAP Serialization, XML Serialization
• ADO.NET I - Introduction, Architecture, System.Data.Dll, System.Data.Oledb,System.Data.SqlClient
• Data Readers, Command Object, Procedure Execution (PL/SQL)
• ADO.NET II - Data Adapters and DataSets, Data Tables, Data Relations, Data Views, Assemblies,
• Strong Names, GAC, Private and Shared Assemblies, SFA, MFA, Multithreading
• Threading Introduction, System.Thrading NameSpaces, Thread Members, Thread States
• Implement advanced network services
• Implement advanced file services
• Implement dynamic access control
• Implement network load balancing
• Implement failover clustering
• Implement failover clustering with Hyper-V
• Implement disaster recovery
• Implement distributed Active Directory Domain Services (AD DS) deployments
• Implement AD DS sites and replication
• Implement Active Directory Certificate Services (AD CS)
• Implement Active Directory Rights Management Services (AD RMS
• Implement Active Directory Federation Services (AD FS)
• Examine the Delta Time (End-of-Packet to End-of-Packet)
• Set a Time Reference
• Compare Timestamp Values
• Compare Timestamps of Filtered Traffic
• Enable and Use TCP Conversation Timestamps
• Compare TCP Conversation Timestamp Values
• Troubleshooting Example Using Time
• Analyze Delay Types
• Understanding Conflict
• Persuasion
• Negotiation
• Group Discussion
• Interviews & Presentation
• Entrepreneurial Skill Development
• Applying soft skills to work place
• Sniffing Concepts
• MAC Attacks
• DHCP Attacks
• ARP Poisoning
• Spoofing Attack
• DNS Poisoning
• Sniffing Tools
• Counter measures
• Sniffing Pen Testing
• Sniffing Concepts
• MAC Attacks
• DHCP Attacks
• ARP Poisoning
• Spoofing Attack
• DNS Poisoning
• Sniffing Tools
• Counter measures
• Sniffing Pen Testing
• File Systems-FAT,NTFS, Forensic Analysis of File Systems
• Storage Fundamentals-Storage Layer
• Hard Drives Evidence Handling
• Types of Evidence, Challenges in evidence handling
• Overview of evidence handling procedure
• Organizing Classes and Interfaces in Packages.
• Package as Access Protection, Defining Package.
• CLASSPATH Setting for Packages.
• Making JAR Files for Library Packages, Import and Static Import.
• Naming Convention For Packages, Exception Handling, The Idea behind Exception.
• Cloud programming guidelines
• Cloud Designing guidelines
• Layered pattern
• Idem potency problem
• The Map Reduce Pattern
• Introduction to Bootstrap, Goals of Bootstrap, Obtaining Bootstrap
• Overview of how to use Bootstrap in a Web app, The Bootstrap Grid System
• Overview of Grids in Bootstrap, The role of Media Queries, Grid options
• Targeting different devices (Desktop / Mobile), Column techniques, CSS Techniques
• HTML5 doctype and viewport meta-tags, Containers, Responsive images, Normalization
• Typography, Headings, Inline Headings, Emphasis, Abbreviations, Lists
• Additional techniques, Tables, Displaying basic Tables, Striped Tables, Hover Tables
• Condensed Tables, Contextual Tables, Responsive Tables, Additional techniques
• Forms Overview, Vertical Forms, Inline Forms, Horizontal Forms, Form Input Controls
• Form Control States, Panels, Additional UI Techniques, Labels, Badges
• Buttons and Button Groups, Dropdowns, Button Dropdowns, Images and Thumbnails
• Alerts, Progress bars, Input Groups, List Groups, Navigation, Tabular Navigati
• on
• Tabs, Pills, Dropdowns, Navbar, Breadcrumbs, Additional Techniques
• Responsive utilities, Glyphicons, Pagination, Media Objects, Using the Modal Plugin
• Social Engineering Concepts
• Social Engineering Techniques
• Imperso-nation on Social Networking Sites
• Identity Theft
• Social Engineering Countermeasures
• Social Engineering Pen Testing
• Role-based administration
• Mandatory access controls
• Discretionary access controls
• Multifactor authentication
• Single sign-on
• Federation
• Overview of Failover Clustering
• Configuring and Using Shared Storage
• Implementing and Managing Failover Clustering with Hyper-V
• Creating Hyper-V Failover Cluster
• Managing Hyper-V Failover Cluster
• List Boxes & Combo Boxes, Filling the List using Property window / AddItem Method,
• Clear Method, List box Properties, Removing an item from a list,
• List Box/ Combo Box, Do/Loops, For/Next Loops, Using MsgBox Function,
• Using String Function, Printing to printer using Print Method,
• Client-Side Template Injection
• Server-Side Template Injection
• SQL Injection
• OS Command Injection
• XML Injection
• XML RPC
• PHP Code Injection
• HTML Injection
• This class will cover Red Hat’s graphical user environment, its features and its configuration.
• Remote display configuration will be discussed and practiced using hands on labs
• Types of Exception, Control Flow In Exceptions.
• JVM reaction to Exceptions.
• Use of try, catch, finally, throw, throws in Exception Handling.
• In-built and User Defined Exceptions, Checked and Un-Checked Exceptions.
• Naming Convention For Packages, Exception Handling, The Idea behind Exception.
• Customization of the Test Process
• Budgeting, Scheduling
• NAT
• DHCP
• Managing Cisco IOS
• IPv6
• Communicating with Hadoop in Pig Latin
• Executing commands using the Grunt Shell
• Streamlining high–level processing
• Social Engineering Concepts
• Social Engineering Techniques
• Imperso-nation on Social Networking Sites
• Identity Theft
• Social Engineering Countermeasures
• Social Engineering Pen Testing
• Planning a Server Upgrade and Migration
• Planning and Implementing a Server Deployment Infrastructure
• Designing and Maintaining an IP Configuration and Address Management Solution
• Designing and Implementing Name Resolution
• Designing and Implementing an Active Directory Domain Services Forest and Domain Infrastructure
• Designing and Implementing an Active Directory Organizational Unit Infrastructure
• Designing and Implementing a Group Policy Object Strategy
• Designing and Implementing an Active Directory Domain Services Topology
• Planning and Implementing Storage
• Planning and Implementing File Services
• Designing and Implementing Network Access Services
• Designing and Implementing Network Protection
• Introduction to Android architecture
• Overview of Android's Linux origins, Android Application architecture / framework
• UI subsystem key features, Overview of Android Runtime (ART)
• Overview of Android SDK / Development tools
• Android Studio, Android.jar, Android Emulator
• Hello World, Quick review of Java, Manifest file, Declaring Layout
• Packaging and running your app on the Android Emulator
• Android Components, Activities & lifecycle, Services, Content Providers, Broadcast Receivers
• User Interfaces (UIs), Views and layouts, Android Studio Layout Editor & Live Layouts
• UI components, Action Bar and Navigation, Event Handling, Selection components
• Lists and Adapters, Menus and Dialogs, Simple graphics & animations, RecyclerView
• Data Binding using Layouts, Custom Controls, Material Design
• Data Persistence, Overview of Data Persistence Options (SQL, ORMS...)
• Inserting, Updating & Deleting records, Realm for Android
• Content Providers, Content files, MIME types, Creating, editing & deleting content
• Searching content, Audio / Video capabilities, Supported audio / video formats
• Initiating media playback
• Intent Objects & Filters, Intent Objects, Intent Filters, Using Intent matching
• Controlling / Consuming Data from Device Hardware, Telephony, Camera
• GPS / Location Services, Sensors, Internet Connectivity - Data / WiFi, Bluetooth
• Android App Development - Next Steps, Testing & Debugging Android Apps
• How to use Open Source components via Gradle, Custom Content Providers
• Broadcast Receivers, System Broadcasts, Networking & Web Services, JSON
• Collecting Network Based Evidence
• Investigating Routers
• Network Protocols
• Email Tracing, Internet Fraud
• Access Control Service(ACS)
• Admin :Configuring ACS
• Admin: Identity providers.
• Service Bus features
• Admin: Provisioning Service bus namespace.
• Need for service bus and ACS
• NAT
• DHCP
• Managing Cisco IOS
• IPv6
• Operations, Working, Functions and Methods,
• Data Acquisition and Duplication Concepts
• Data Acquisition Types
• Disk Acquisition Tool Requirements
• Validation Methods
• RAID Data Acquisition
• Acquisition Best Practices
• Data Acquisition Software Tools
• Data Acquisition Hardware Tools
• Encryption using non-cryptographic tools (vi, zip)
• Authentication principles and methods
• Passwords, two-factor authentication
• One-way encryption
• Steganography
• Hamming
• Chaffing and Winnowing
• TShark and Dumpcap Command-Line Tools
• Capinfos Command-Line Tool
• Editcap Command-Line Tool
• Mergecap Command-Line Tool
• Text2pcap Command-Line Tool
• Split and Merge Trace Files
• Prerequisites to test planning
• Understand the Characteristics of the Software Being Developed
• Build the Test Plan, Write the Test Plan
• Introduction to Cisco WLAN
• RF Technology
• Wireless Standards.
• Configuring Wireless LAN.
• Wireless LAN Security.
• Introduction to AngularJS, What it is and why you should use it
• Obtaining and installing AngularJS, Core AngularJS Concepts
• Single-Page Applications, Bootstrapping with ng-app Directives
• Templates, Repeaters, Data Binding, Tool Dependencies
• Installing Node.js, npm Scripts, Managing your Source Code, AngularJS MVC
• MVC Design Pattern, Models, Views, Controllers, Scope
• Inversion of Control / Dependency Injection with AngularJS
• Data Binding in AngularJS, Passing Data from a Controller to a View
• Feeding HTML inputs back to the Controller, Retrieving data from the server
• The Angular $digest Cycle, Debugging Data Bindings
• …using AngularJS Batarang, …using browser console log
• AngularJS Forms, The Form Controller, Form Submission, AngularJS form validation
• Debugging Form validation, Angular's form validation CSS classes, AngularJS Filters
• Using AngularJS Filters, Out-of-the-box & custom Angular filters, AngularJS Directives
• Consolidating HTML with a Directive, Scope, Templates, Parameters, Functions – Link & Compile
• Complex directives, Communicating between directives, AngularJS Services
• Defining Services, Consolidating shared code, Using Services to share common data
• Building our own Services, RESTful Services with AngularJS
• AngularJS Routing, Improving the User Experience with Routing, Routing Modules
• ngRoute:ngRoute and ui-router, $routeProvider, The $route service, Nested Routing
• TDD & Unit Testing with AngularJS, Separation of Concern, TDD with Jasmine
• Testing Controllers, Testing Filters, Testing Directives, End-to-End Testing AngularJS Applications
• Introduction, Accessing values in dictionaries
• Working with dictionaries, Properties,
• Red Hat’s approach to packet routing and forwarding will be reviewed.
• Firewall theory, tools, and procedures will be covered in detail in both lecture and hands on labs.
• ARP Overview
• ARP Packet Structure
• Filter on ARP Traffic
• Analyze Normal/Problem ARP Traffic
• Access Control Service(ACS)
• Admin :Configuring ACS
• Admin: Identity providers.
• Service Bus features
• Admin: Provisioning Service bus namespace.
• Need for service bus and ACS
• Data Acquisition and Duplication Concepts
• Data Acquisition Types
• Disk Acquisition Tool Requirements
• Validation Methods
• RAID Data Acquisition
• Acquisition Best Practices
• Data Acquisition Software Tools
• Data Acquisition Hardware Tools
• System Administration policies
• Security audit
• Penetration testing and ethical hacking
• Mandatory Access control, Discretionary Access Control
• Monitoring and logging tools
• Legal aspects
• DoS/DDoS Concepts
• DoS Attack Techniques
• Botnet
• DDoS Case Study
• DoS Attack Tools
• Counter-measures
• DoS/DDoS Protection Tools
• Denial-of-Service (DoS) Attack Penetration Testing
• Single-Dimension Arrays, Initializing an Array using for Each,
• User-Defined Data Types, Accessing Information with User-Defined Data Types,
• Using List Boxes with Array, Two dimensional arrays.
• SQLite Overview
• Installation, Commands, Syntax,Data Types
• Create Database, Attach Database, Detach Database
• Create Table, Drop Table, Insert Query, Select Query
• Operators, Expressions, Where Clause, AND & OR Clauses
• Update Query, Delete Query, Like Clause
• Glob Clause, Limit Clause, Order By, Group By
• Having Clause, Distinct Keyword
• Cross site scripting
• JSONHijacking
• Wordpress | Joomla | Drupal Bugs
• CMS Vulnerability Analysis
• Remote Code Execution
• Critical File Found
• File Inclusion (LFI /RFI)
• File Upload Vulnerabilities
• Directory Traversal
• CORS
• Script Source Code Disclosure
• HTTP Parameter Pollution Attack
• Subdomain Takeover
• Documenting & Reporting Vulnerability
• Data Analysis Techniques
• Investigating Live Systems (Windows &Unix)
• Investigating Hacker Tools
• Ethical Issues
• Cyber Crime
• Overview of Management in an Enterprise Data Center
• Planning and Implementing a Server Virtualization Strategy
• Planning and Implementing Networks and Storage for Virtualization
• Planning and Deploying Virtual Machines
• Planning and Implementing a Virtualization Administration Solution
• Planning and Implementing a Server Monitoring Strategy
• Planning and Implementing High Availability for File Services and Applications
• Planning and Implementing a High Availability Infrastructure Using Failover Clustering
• Planning and Implementing Server Update Infrastructure
• Planning and Implementing a Business Continuity Strategy
• Planning and Implementing an Public Key Infrastructure
• Planning and Implementing an Identity Federation Infrastructure
• Planning and Implementing an Information Rights Management Infrastructure
• Persisting data in the Hive MegaStore
• Performing queries with HiveQL
• Investigating Hive file formats
• Introduction to Cisco WLAN
• RF Technology
• Wireless Standards
• Configuring Wireless LAN
• Wireless LAN Security.
• Redundancy
• Failover
• Geographical diversity
• Failback
• Replication
• Site mirroring
• Hot site
• Cold site
• Warm site
• Backup and recovery
• Archiving and offsite storage
• Replication types
• RTO
• RPO
• MTBF
• MTTR
• Mission critical requirements
• DoS/DDoS Concepts
• DoS Attack Techniques
• Botnet
• DDoS Case Study
• DoS Attack Tools
• Counter-measures
• DoS/DDoS Protection Tools
• Denial-of-Service (DoS) Attack Penetration Testing
• Integrating System Center and Server Virtualization
• Overview of System Center 2012 Virtual Machine Manager
• Installing System Center 2012 R2 Virtual Machine Manager
• Adding Hosts and Managing Host Groups
• Installing and Configuring System Center 2012 VMM SP1
• Managing Hosts and Host Groups
• Defining an Array, Initializing & Accessing Array.
• Multi –Dimensional Array, Operation on String.
• Mutable & Immutable String, Using Collection Bases Loop for String.
• Tokenizing a String, Creating Strings using StringBuffer.
• Introduction to jQuery, jQuery and JavaScript
• jQuery and AJAX, Flavours of jQuery, Consistent UX with jQuery
• Obtaining / Accessing the jQuery library, The jQuery Event Model
• Binding event handlers, Removing event handlers, User Interface / Mouse events
• Event Manipulation Methods, jQuery Selectors, Identifying DOM elements
• Constructing jQuery Selectors, Basic CSS selectors, Positional selectors
• Custom jQuery selectors, Chaining jQuery operations, Escaping meta-characters
• The ready() handler, Tweaking DOM objects with jQuery, Getting objects by ID, Class, Tag
• Modifying object and attributes on-the-fly, Changing an object’s Inner Text
• Styles and CSS Classes, Handling Events with jQuery, jQuery and AJAX calls, Using the ajax() API
• Loading data with GET & POST, Working with JSON data, Serialising your form handling with serialize()
• Handling a completed AJAX request, Security considerations, Simple jQuery animations
• Sliding, Toggling, Fading, Easing, Dealing with Durations, Creating custom jQuery animations
• Binding animations to Events & Callbacks, Intro to jQuery Mobile, Overview of jQuery Mobile
• Touch-optimized layouts & UI widgets
• Defining an Array, Initializing & Accessing Array.
• Multi –Dimensional Array, Operation on String.
• Mutable & Immutable String, Using Collection Bases Loop for String.
• Tokenizing a String, Creating Strings using StringBuffer.
• Disk performance
• Disk tuning
• Disk latency
• Swap disk space
• I/O tuning
• Performance management and monitoring tools
• Establish baseline and create documentation with appropriate tools
• Hypervisor configuration best practices
• Impact of configuration changes to the virtual environment
• Common issues
• UDP Overview
• Watch for Service Refusals
• UDP Packet Structure
• Filter on UDP Traffic
• Follow UDP Streams to Reassemble Data
• Analyze Normal/Problem UDP Traffic
• Mining data with Mahout
• Visualising processed results with reporting tools
• Querying in real time with Impala
• Managing Networking Infrastructure
• Managing Storage Infrastructure
• Managing Infrastructure Updates
• Implementing a Network Infrastructure
• Implementing a Storage Infrastructure
• Managing Infrastructure Updates
• Classes, Creating a new Class,
• Creating a new object using a class, choosing when to create New Objects,
• The Initialize & Terminate events.
• Overview of wireless technologies and security
• Personal Area Networks, Wireless Local Area Networks
• Metropolitan Area Networks, Wide Area Networks
• Wireless threats, vulnerabilities and security
• Wireless LANs, War Driving, War Chalking, War Flying
• Common Wi-fi security recommendations, PDA Security
• Cell Phones and Security, Wireless DoS attacks, GPS Jamming, Identity theft
• Introduction to Firewall & VPN
• Device Types
• Basic configuration & usage.
• Creating network utilities with security devices .
• Security Concerns on cloud
• Comparison of security on cloud to premise at Hardware layer
• Comparison of security on cloud to premise at operating system layer
• Application Security on the cloud
• Services to enhance cloud security
• Disk Partitioning & Managing Partitions
• Managing Data: File System Creatio
• Session Hijacking Concepts
• Network-level Session Hijacking
• Session Hijacking Tools
• Counter-measuresSession Hijacking Pen Testing
• Introduction to Firewall & VPN
• Device Types
• Basic configuration & usage
• Creating network utilities with security devices
• Session Hijacking Concepts
• Network-level Session Hijacking
• Session Hijacking Tools
• Counter-measuresSession Hijacking Pen Testing
• Password Cracking Concepts
• Types of Password Attacks
• Classification of Cracking Software
• Systems Software vs. Applications Software
• System Software Password Cracking
• Application Software Password Cracking
• Password Cracking Tools
• Creating , adding, removing Forms in project, Hide,
• Show Method, Load, Unload
• Statement, Me Keyword, Referring to Objects on a Different Forms,
• Webserver Concepts
• Webserver Attacks
• Attack Methodology
• Webserver Attack Tools
• Counter-measures
• Patch Management
• Webserver Security Tools
• Webserver Pen Testing
• Private
• Public
• Hybrid
• Community
• On-premise vs. Off-premise hosting
• Accountability and responsibility based on delivery models
• Security differences between models
• Functionality and performance validation based on chosen delivery model
• Orchestration platforms
• Establishing your Big Data needs
• Meeting business goals with timely data
• Evaluating commercial Big Data tools
• Managing organisational expectations
• DApplet & Application, Applet Architecture.
• Parameters to Applet, Embedding Applets in Web page.
• Applet Security Policies, A Collection of Useful Classes.
• Utility Methods for Arrays, Observable and Observer Objects.
• Date & Times, Using Scanner, Regular Expression
• Input/Output Operation in Java(java.io Package)
• Streams and the new I/O Capabilities, Understanding Streams
• The Classes for Input and Output, The Standard Streams
• Working with File Object
• Overview of Backup and Restore Options for Virtual Machines
• Protecting Virtualization Infrastructure by Using Data Protection Manager
• Using System Center Operations Manager for Monitoring and Reporting
• Integrating Virtual Machine Manager with Operations Manager
• Implementing System Center 2012 R2 Operations Manager Agent
• Configuring Operations Manager Monitoring Components
• Configuring Operations Manager Integration with Virtual Machine Manager
• Webserver Concepts
• Webserver Attacks
• Attack Methodology
• Webserver Attack Tools
• Counter-measures
• Patch Management
• Webserver Security Tools
• Webserver Pen Testing
• CIA triad in mobile phones-Voice
• SMS and Identification data interception in GSM
• Introduction, practical setup and tools
• implementation- Software and Hardware Mobile phone tricks
• Netmonitor, GSM network service codes, Mobile phone codes
• Catalog tricks and AT command set- SMS security issues
• Identify and correct common network problems
• Utilize Netflow data
• Troubleshoot and correct common problems associated with IP addressing and host configurations
• Troubleshoot and Resolve VLAN problems.
• Troubleshoot and Resolve Trunking problems on Cisco switches..
• Troubleshoot and Resolve Spanning Tree operation issues
• Troubleshoot and Resolve routing issues.
• Troubleshoot and Resolve OSPF problems.
• Troubleshoot and Resolve EIGRP problems
• Troubleshoot and Resolve Inter VLAN routing problems.
• Troubleshoot and Resolve ACL issues.
• Troubleshoot and Resolve WAN implementation issues.
• Troubleshoot and Resolve Layer 1 problems.
• Monitor NetFlow statistics
• Troubleshoot Etherchannel pro
• HTTP Overview
• HTTP Packet Structure
• Filter on HTTP Traffic
• Reassembling HTTP Objects
• HTTP Statistics
• Analyze Normal/Problem HTTP Traffic
• Opening and Closing Data Files, The Free File Function, Viewing the data in a file,
• Sequential File Organization (Writing Data to a sequential Disk File,
• Creating a sequential data file, Reading the Data in a sequential file,
• Finding the end of a Data file, Locating a file). Trapping Program Errors,
• The Err Object, Random Data File Opening a random file,
• Reading and writing a random file(Get, Put, LOF, Seek).
• Network Forensics
• Network Attacks
• Log Injection Attacks
• Investigating and Analyzing Logs
• Investigating Network Traffic
• Traffic Capturing and Analysis Tools
• Documenting the Evidence Gathered on a Network
• Identify and correct common network problems.
• Utilize Netflow data.
• Troubleshoot and correct common problems associated with IP addressing and host configurations.
• Troubleshoot and Resolve VLAN problems.
• Troubleshoot and Resolve Trunking problems on Cisco switches.
• Troubleshoot and Resolve Spanning Tree operation issues.
• Troubleshoot and Resolve routing issues.
• Troubleshoot and Resolve OSPF problems.
• Troubleshoot and Resolve EIGRP problems.
• Troubleshoot and Resolve Inter VLAN routing problems.
• Troubleshoot and Resolve ACL issues.
• Troubleshoot and Resolve WAN implementation issues.
• Troubleshoot and Resolve Layer 1 problems.
• Monitor NetFlow statistics.
• Troubleshoot Etherchannel problems.
• App fabric Caching Architecture
• Admin : Provisioning the cache
• Admin : Upgrading the cache
• Admin : Cache security using the ACS
• Exploring API’s of app fabric caching
• Performance improvement using cache
• Test case Design, Building test cases
• Test data mining, Test execution
• Test Reporting, Defect Management
• Test Coverage – Traceability matrix
• Test Metrics – Guidelines and usage
• Cloud Migration requirements
• How to Migrate applications to cloud
• Web App Concepts
• Web App Threats
• Web App Hacking Methodology
• Analyze Web Applications
• Attack Authentication Mechanism
• Authorization Attack Schemes
• Attack Session Management Mechanism
• Perform Injection Attacks
• Attack Data Connectivity
• Attack Web App Client
• Attack Web Services
• Web Application Hacking Tools
• Countermeasures
• Security Tools
• Web App Pen Testing
• Type I and Type II
• Proprietary vs. open source
• Consumer vs. enterprise use
• Web App Concepts
• Web App Threats
• Web App Hacking Methodology
• Analyze Web Applications
• Attack Authentication Mechanism
• Authorization Attack Schemes
• Attack Session Management Mechanism
• Perform Injection Attacks
• Attack Data Connectivity
• Attack Web App Client
• Attack Web Services
• Web Application Hacking Tools
• Countermeasures
• Security Tools
• Web App Pen Testing
• Calling a function, Types of functions, Function Arguments, Anonymous functions
• Global and local variables,
• Crime and mobile phones
• Evidences, Forensic procedures, Files present in SIM card
• Device data, External memory dump, Evidences in memory card
• Operators systems, Android forensics, Procedures for handling an android device
• Imaging android USB mass storage devices, Logical and physical techniques
• Guidelines for writing test reports
• Test Tools used to Build Test Reports, Managing Change
• Software Configuration Management, Change Management
• Risks – Risk Analysis and Management with examples
• User Acceptance testing – in detail explanation with details
• Case Study: How to test web, stand alone and database applications – with examples.
• Creating the database files for use by Visual Basic ( Using MS-Access),
• Using the Data Control ,setting its property, Using Data Control with forms,
• navigating the database in code , checking for BOF & EOF,
• Using listboxes & comboboxes as data bound controls,
• updating a database file ( adding, deleting records )
• Examining SSL/HTTPS Traffic
• Wireshark v1.6.0 Bug Alert #201106
• Filter on SSL
• Reading and Writing to Files, Buffer and Buffer Management
• Read/Write Operations with File Channel, Serializing Objects
• GUI Programming, Designing Graphical User Interfaces in Java
• Components and Containers, Basics of Components
• Using Containers, Layout Managers
• Focusing on business importance
• Framing the problem
• Selecting the correct tools
• Achieving timely results
• Wireless Technologies
• Wireless Attacks
• Investigating Wireless Attacks
• Features of a Good Wireless Forensics Tool
• Wireless Forensics Tools
• Introduction to Web Applications and Webservers
• Web Logs
• Web Attacks
• Web Attack Investigation
• Web Attack Detection Tools
• Tools for Locating IP Address
• Email System Basics
• Email Crimes
• Email Headers
• Steps to Investigate
• Email Forensics Tools
• Laws and Acts against Email Crimes
• SQL Injection Concepts
• Testing for SQL Injection
• Types of SQL Injection
• Blind SQL Injection
• SQL Injection Methodology
• Advanced SQL Injection
• SQL Injection Tools
• Evasion Techniques
• Counter-measures
• First Step: Create a Troubleshooting Profile
• Customize the User Interface
• Add Custom Columns for the Packet List Pane
• Set Your Global Capture Preferences
• Define Name Resolution Preferences
• Configure Individual Protocol Preferences
• SQL Injection Concepts
• Testing for SQL Injection
• Types of SQL Injection
• Blind SQL Injection
• SQL Injection Methodology
• Advanced SQL Injection
• SQL Injection Tools
• Evasion Techniques
• Counter-measures
• Digital forensics
• Introduction – Evidential potential of digital devices
• Closed vs. open systems
• Evaluating digital evidence potential, Device handling
• Seizure issues, device identification
• Networked devices and contamination
• Mobile Phone
• Mobile Operating Systems
• Mobile Forensics
• Mobile Forensic Process
• Mobile Forensics Software Tools
• Mobile Forensics Hardware Tools
• Random module, Packages, Composition,
• Adding a Menu to Window
• Extending GUI Features Using Swing Components
• Java Utilities (java.util Package), The Collection Framework
• Collections of Objects, Collection Types, Sets, Sequence, Map, Understanding Hashing
• Use of ArrayList & Vector, Event Handling, Event-Driven Programming in Java
• Event- Handling Process, Event-Handling Mechanism
• The Delegation Model of Event Handling, Event Classes, Event Sources, Event Listeners
• Adapter Classes as Helper Classes in Event Handling
• Anonymous Inner classes a Short –cut to Event Handling
• Avoiding Deadlocks in GUI Code, Event Types & Classes, Networking Programming
• Networking Basics, Client-Server Architecture, Socket Overview
• Networking Classes and Interfaces, Network Protocols, Developing Networking Applications in Java
• Shared resources
• Elasticity
• Network and application isolation
• Infrastructure consolidation
• Virtual datacenter creation
• Selecting suitable vendors and hosting options
• Balancing costs against business value
• Keeping ahead of the curve
• Basics of automation testing – why, when and how to perform automation testing
• Factors for choosing a particular tool
• An overview for the major functional testing tools
• Overview of Test management and bug tracking tools
• Displaying data in grids ( grid control, properties of grid ) ,
• Displaying the record no & record count, opening the database,
• Validation & error trappings ( locking text boxes, trap errors with On Error,
• File open errors ) , Recordset , searching for a specific record ,
• Seek method, working with database fields, creating a new dynaset.
• Introduction to JDBC, JDBC Drivers & Architecture
• CURD operation Using JDBC, Connecting to non-conventional Databases.
• Mail API, Introduction to Email Technical Internals
• Understanding of POP and SMTP framework, Complete understanding the email API
• Mass mailer Application development
• Disk types
• Tiering
• RAID levels
• File system types
• Examine Trace File Summary Information
• View Active Protocols
• Graph Throughput to Spot Performance Problems Quickly
• Locate the Most Active Conversations and Endpoints
• Other Conversation Options
• Graph the Traffic Flows for a More Complete View
• Numerous Other Statistics are Available
• Quick Overview of VoIP Traffic Analysis Tools
• Wireless Concepts
• Wireless Encryption
• Wireless Threats
• Wireless Hacking Methodology
• GPS Mapping
• Wireless Traffic Analysis
• Launch Wireless Attacks
• Crack Wi-Fi Encryption
• Wireless Hacking Tools
• Bluetooth Hacking
• Wireless Security ToolsWi-Fi Pen Testing
• Printing on screen, Reading data from keyboard, Opening and closing file
• Reading and writing files, Functions,
• Digital forensics examination principles
• Previewing, imaging, continuity, hashing and evidence locations
• Seven element security model, Developmental model of digital systems
• Audit and logs, Evidence interpretation, Data content and context
• Wireless Concepts
• Wireless Encryption
• Wireless Threats
• Wireless Hacking Methodology
• GPS Mapping
• Wireless Traffic Analysis
• Launch Wireless Attacks
• Crack Wi-Fi Encryption
• Wireless Hacking Tools
• Bluetooth Hacking
• Wireless Security ToolsWi-Fi Pen Testing
• TCP/IP Functionality
• When Everything Goes Right
• The Multi-Step Resolution Process
• Resolution Helped Build the Packet
• Where Faults Can Occur
• Typical Causes of Slow Performance
• Web Application Basics, Architecture and challenges of Web Application.
• Introduction to servlet, Servlet life cycle, Developing and Deploying Servlets
• Exploring Deployment Descriptor (web.xml)., Handling Request and Response
• Initializing a Servlet, Accessing Database, Servlet Chaining
• Session Tracking & Management, Dealing with cookies, Transferring Request
• Accessing Web Context, Passing INIT and CONTEXT Parameter
• Sharing information using scope object, Controlling concurrent access
• User Authentication, Filtering Request and Response, Programming Filter
• Filter Mapping, Servlet Listener
• Mobile Platform Attack Vectors
• Hacking Android OS
• Hacking iOS
• Hacking Windows Phone OS
• Hacking BlackBerry
• Mobile Device Management (MDM)
• Mobile Security Guidelines and Tools
• Mobile Platform Attack Vectors
• Hacking Android OS
• Hacking iOS
• Hacking Windows Phone OS
• Hacking BlackBerry
• Mobile Device Management (MDM)
• Mobile Security Guidelines and Tools
• Exception
• Exception Handling, Except clause, Try ? finally clause,
• User Defined Exceptions
• WAN
• LAN
• MAN
• Bandwidth
• Latency
• Compression
• Caching
• Load balancing
• Devices on the same subnet
• Security and Privacy for Mobile and Wireless Networks
• Introduction- State of the Art, Areas for Future Research
• General Recommendation for Research, Pervasive Systems
• Enhancing Trust Negotiation with Privacy Support
• Trust Negotiation, Weakness of Trust Negotiation
• Extending Trust Negotiation to Support Privacy
• Basic JSP Architecture, Life Cycle of JSP (Translation, compilation)
• JSP Tags and Expressions, Role of JSP in MVC-2
• JSP with Database, JSP Implicit Objects, Tag Libraries
• JSP Expression Language (EL), Using Custom Tag, JSP Capabilities:
• Exception Handling, Session Management, Directives, JSP with Java Bean
• Mobile system architectures, Overview of mobile cellular systems
• GSM and UMTS Security & Attacks, Vulnerabilities in Cellular Services
• Cellular Jamming Attacks & Mitigation, Security in Cellular VoIP Services
• Mobile application security
• IPv4 Overview
• IPv4 Packet Structure
• Analyze Broadcast/Multicast Traffic
• Filter on IPv4 Traffic
• IP Protocol Preferences
• Analyze Normal/Problem IP Traffic
• Class and object, Attributes, Inheritance, Overloading
• Overriding, Data hiding
• IDS, Firewall and Honeypot Concepts
• IDS, Firewall and Honeypot System
• Evading IDS
• Evading Firewalls
• Detecting Honeypots
• Firewall Evading Tools
• Countermeasures
• Penetration Testing
• IDS, Firewall and Honeypot Concepts
• IDS, Firewall and Honeypot System
• Evading IDS
• Evading Firewalls
• Detecting Honeypots
• Firewall Evading Tools
• Countermeasures
• Penetration Testing
• BIOS/firmware configurations
• Minimum memory capacity and configuration
• Number of CPUs
• Number of Cores
• NICs quantity, speeds, and configurations
• Internal hardware compatibility
• HBAs
• Storage media
• Overview of Wireless security, Scanning and Enumerating 802.11 Networks
• Attacking 802.11 Networks, Attacking WPA protected 802.11 Networks
• Bluetooth Scanning and Reconnaissance, Bluetooth Eavesdropping
• Attacking and Exploiting Bluetooth, Zigbee Security, Zigbee Attacks
• Memory
• CPU
• Storage and network allocation
• Entitlement/quotas (shares)
• Reservations
• Licensing
• Resource pooling
• TCP Overview
• The TCP Connection Process
• TCP Handshake Problem
• Watch Service Refusals
• TCP Packet Structure
• The TCP Sequencing/Acknowledgment Process
• Packet Loss Detection in Wireshark
• Fast Recovery/Fast Retransmission Detection in Wireshark
• Retransmission Detection in Wireshark
• Out-of-Order Segment Detection in Wireshark
• Selective Acknowledgement (SACK)
• Window Scaling
• Window Size Issue: Receive Buffer Problem
• Window Size Issue: Unequal Window Size Beliefs
• TCP Sliding Window Overview
• Troubleshoot TCP Quickly with Expert Info
• Filter on TCP Traffic and TCP Problems
• Properly Set TCP Preferences
• Follow TCP Streams to Reassemble Data
• Cryptography Concepts
• Encryption Algorithms
• Cryptography Tools
• Public Key Infrastructure(PKI)
• Email Encryption
• Disk Encryption
• Cryptography Attacks
• Cryptanalysis Tools
• RMI overview, RMI architecture, Example demonstrating RMI
• Enterprise JAVA Beans, Enterprise Bean overview, Types of enterprise beans
• Advantages of enterprise beans, The Life Cycles of Enterprise Beans
• Working with Session Beans, Statefull vs. Stateless Session Beans
• Working with Entity Beans, Message Driven Beans
• JNDI (Java Naming and Directory Interface), JNDI overview
• JNDI API, Context operations, Using JNDI in J2EE applications
• Cryptography Concepts
• Encryption Algorithms
• Cryptography Tools
• Public Key Infrastructure(PKI)
• Email Encryption
• Disk Encryption
• Cryptography Attacks
• Cryptanalysis Tools
• Match function, Search function
• Matching VS Searching, Modifiers, Patterns,
• Obfuscation
• Access Control Lists
• Zoning
• LUN masking
• User and host authentication
• Review/audit logs
• Pen Testing Concepts
• Types of Pen Testing
• Pen Testing Techniques
• Pen Testing Phases
• Pen Testing Roadmap
• Outsourcing Pen Testing Services
• Security in Ad Hoc Wireless Networks, Network Security Requirements
• Issues and Challenges in Security Provisioning, Network Security Attacks
• Key Management in Adhoc Wireless Networks, Secure Routing in Adhoc Wireless Network
• Introduction, Architecture CGI environment variable,
• GET and POST methods
• Cookies, File upload,
• Pen Testing Concepts
• Types of Pen Testing
• Pen Testing Techniques
• Pen Testing Phases
• Pen Testing Roadmap
• Outsourcing Pen Testing Services
• Introduction, RFID Security and privacy, RFID chips Techniques and Protocols
• RFID anti-counterfeiting, Man-in-the-middle attacks on RFID systems
• Digital Signature Transponder
• Combining Physics and Cryptography to Enhance Privacy in RFID Systems
• Scalability Issues in Large-Scale Applications
• An Efficient and Secure RFID Security Method with Ownership Transfer
• Policy-based Dynamic Privacy Protection Framework leveraging Globally Mobile RFIDs
• User-Centric Security for RFID based Distributed Systems
• Optimizing RFID protocols for Low Information Leakage
• RFID: an anti-counterfeiting tool
• Introduction, Connections, Executing queries
• Transactions, Handling error,
• Disabling unneeded ports and services
• User credentials
• Host-based/software firewalls
• Antivirus software
• Patching
• Deactivating default accounts
• Computer Infection Program, Life cycle of malware
• Virus nomenclature, Worm nomenclature, Tools used in computer virology
• Non self-reproducing Malware, Working principle of Trojan Horse
• Implementation of Remote access and file transfer
• Working principle of Logical Bomb, Case Study: Conflicker C worm
• Trigger Mechanisms, Testing virus codes, Case Study: Brute force logical bomb
• Socket, Socket Module, Methods
• Client and server, Internet modules,
• IOPS
• Read vs. write files
• File system performance
• Metadata performance
• Caching
• Bandwidth
• Throughput (bonding/teaming)
• Jumbo frames
• Network latency
• Hop counts
• QoS
• Multpathing
• Load balancing
• Scaling
• Thread, Starting a thread
• Threading module, Synchronizing threads,
• Multithreaded Priority Queue
• Overview of Wireless security, Scanning and Enumerating 802.11 Networks
• Attacking 802.11 Networks, Attacking WPA protected 802.11 Networks
• Bluetooth Scanning and Reconnaissance, Bluetooth Eavesdropping
• Attacking and Exploiting Bluetooth, Zigbee Security, Zigbee Attacks
• Fault tolerance
• Multipathing
• Load balancing
• Introduction,
• Tkinter programming,
• Tkinter widgets
• Computer Virus in Interpreted programming language
• Designing Shell bash virus under Linux, Fighting over infection
• Antiviral fighting, Polymorphism, Case study: Companion virus
• Klez Virus, Clone Virus, Doom Virus, Black wolf worm, Sassar worm, Happy worm 99
• Elasticity
• On-demand self serve/just in time service
• Pay-as-you-grow
• Chargeback
• Ubiquitous access
• Metering resource pooling
• Multitenancy
• Cloud bursting
• Rapid deployment
• Automation
• Creating, importing, and exporting template and virtual machines
• Install guest tools
• Snapshots and cloning
• Image backups vs. file backups
• Virtual NIC
• Virtual disks
• Virtual switches
• VLAN
• VSAN
• Ethical Hacking terminology, Five stages of hacking, Vulnerability Research
• Legal implication of hacking, Impact of hacking, Foot Printing & Social Engineering
• Information gathering methodologies, Competitive Intelligence
• DNS Enumerations, Social Engineering attacks
• Virtual network components
• Shared memory
• Virtual CPU
• Storage Virtualization
• Port Scanning-Network Scanning, Vulnerability Scanning, NMAP scanning tool
• OS Fingerprinting, Enumeration, Password cracking techniques, Key loggers
• Escalating privileges, Hiding Files, Steganography technologies, Countermeasures
• Active and passive sniffing, ARP Poisoning, Session Hijacking, DNS Spoofing
• Conduct SQL Injection attack, Countermeasures
• Creating LUNs
• Creating network shares
• Zoning and LUN masking
• Multipathing
• Implications of adding capacity to a NAS and SAN
• The big picture, Learning from experience, Weaknesses in Information Security
• The extent of crime in cyberspace, The cyberspace crimoid syndrome
• Policies and technologies, A new framework for information security
• Risk assessment, Richard Baskerville’s risk assessment methodology
• Generations of risk assessment techniques, Quantitative approach to risk assessment
• Problems with Quantitative approach, NIST ALE- Baseline approach
• Tools
• Review documentation and device configuration settings
• Review system logs
• Measuring ROI on security, Security patch management
• Purposes of Information Security management,the building blocks of information security
• Human side of information security,Security management,Securing new technology
• Overview of SSE CMM- SSE CMM relationship to other initiatives- Capability
• levels- Security Engineering- Security Engineering process overview- Basic
• process areas- Configuration management- Base practices- Establish
• Configuration management. Maintaining information security during downsizing
• Business case for Information Security,Information Security Management in industry
• Protecting high tech trade secrets, Outsourcing Security
• Protocols
• Alert methods
• Establish baselines and thresholds
• Automated responses to specific events
• Examine processes usage / resource usage
• What is Risk?, Information Security Risk Assessment Overview
• Drivers, Laws and Regulations,Risk Assessment Frame work,Practical Approach
• Data Collection,The Sponsors,The Project Team,Data Collection Mechanisms
• Executive Interviews,Document Requests,IT Assets Inventories,Profile & Control Survey
• Data Analysis,Compiling Observations,Preparation of catalogs,System Risk Computation
• Impact Analysis Scheme,Final Risk Score,Risk Assessment, System Risk Analysis
• Risk Prioritization,System Specific Risk Treatment,Issue Registers,Methodology Result
• Risk Registers,Security Audit Process,Pre-planning audit,Audit Risk Assessment
• Performing Audit,Internal Controls,Audit Evidence,Audit Testing,Audit Finding
• Remote hypervisor access
• RDP
• SSH
• Console port
• HTTP
• Storage System, Introduction to Information Storage and Management
• Storage System Environment, Data Protection Raid,Intelligent Storage System
• Storage Networking Technologies and Virtualization, Storage Networks
• Network Attached Storage, IP SAN, Content Addressed Storage, Storage Virtualization
• Backup & Recovery,Local Replication,Remote Replication,Securing storage Infrastructure
• Storage Security Framework,Risk Triad,Storage Security Domains
• Security Implementation in Storage Networking
• Managing & Monitoring the Storage Infrastructure,Storage Management Activities
• Developing an Ideal Solution
• PKI
• IPSEC
• SSL/TLS
• Ciphers
• Encryption for data in transit and encryption for data at rest
• Cloud Computing definition,Private, public and hybrid cloud,Cloud types,IaaS,PaaS,SaaS
• Benefits and challenges of cloud computing,Public vs private clouds
• Role of virtualization in enabling the cloud,Business Agility,Benefits & challenges to Cloud
• Technologies and the processes required when deploying web services
• Deploying a web service from inside and outside a cloud architecture
• Advantages and Disadvantages,Development environments for service development
• Amazon, Azure, Google App,Security Concepts,Confidentiality, privacy, integrity
• Authentication,non- repudiation,Availability,accesscontrol,defence in depth Least privilege
• How these concepts apply in the cloud and their importance in PaaS, IaaS and SaaS.
• Multi-tenancy Issue,Isolation of users/VMs from each other,How the cloud provide this
• Virtualization System Security Issues,ESX and ESXi Security, ESX file system security
• Storage considerations, backup and recovery,Virtualization System Vulnerabilities
• Security management in the cloud,Security management standards
• SaaS, PaaS, IaaS availability management,Access control
• Data security and storage in cloud
• Fundamentals Of Cyber Security, Introduction-Cyber Security and its problem
• Intervention Strategies, edundancy, Diversity and Autarchy,Issues In Cyber Security
• Private ordering solutions,Regulation and Jurisdiction for global Cyber security
• Copy Right-source of risks,Pirates, Internet Infringement, Postings, Criminal liability
• First Amendments, Data Loss,Intellectual Property Rights,Copy Right-source of risks
• Pirates, Internet Infringement,Fair Use, Postings, Criminal liability
• First Amendments, Data Loss,Trademarks, Defamation,Privacy-Common Law Privacy
• Constitutional law, Federal Statutes,Anonymity, Technology expanding privacy rights
• Procedural Issues,Duty of Care,Criminal Liability,Electronic Contracts & Digital Signatures
• Misappropriation of information,Civil Rights, Tax, Evidence
• Legal Aspects Of Cyber Security, Ethics, Legal Developments
• Late 1990 to 2000, Cyber security in Society,Security in cyber laws case
• Studies, General law and Cyber Law, A Swift Analysis
• Network and IP planning/documentation
• Configuration standardization and documentation
• Change management best practices
• Configuration management
• Capacity management
• Systems life cycle management
• Maintenance windows
• Test replication
• Test latency
• Test bandwidth
• Test load balancing
• Test application servers
• Test storage
• Test application delivery
• Service performance testing and application performance testing
• Penetration testing
• Vulnerability assessment
• Separation of duties during testing
bottom of page
