-->

POPULAR JOB GUARANTEE COURSES

Advance ICP Training (100% Job Placement Guarantee Program)

N+, MCSE, CCNA, CEH

Course Details

Minimum Qualification of candidates B.C.A. / B.TECH / M.C.A. / BSc.IT / MSc.IT

Time Duration: - 8 month (6 month Academic + 2 month project training)

Salary Package: - 15,000/- to 25,000/- Rs Per month

Training Fees: - 75,500/- Rs (Candidates can pay in thee installments)

N+

Basic Network Theory:

Network Definitions
Network Models
Connectivity
Network Addressing
Signaling Concepts.

Network Connectivity:

The Data Package
Establishing a Connection
Reliable Delivery
Network Connectivity
Noise Control
Building Codes
Connection Devices.

Advanced Network Theory:

The OSI Model
Ethernet
Network Resources
Token Ring/IEEE 802.5
FDDI
Wireless Networking.

Common Network Protocols:

Families of Protocols
NetBEUI
Bridges and Switches
The TCP/IP Protocol
Building a TCP/IP Network
The TCP/IP Suite.

TCP/IP Services:

Dynamic Host Configuration Protocol
DNS Name Resolution
NetBIOS Support
SNMP
TCP/IP Utilities
Upper Layer Services: FTP.

Alternate Network Protocols:

Introduction to IPX/SPX
AppleTalk
Introduction to Apple Open Transport
Introduction to IPv6.


Network LAN Infrastructure:

Implement LAN Protocols on a Network
IP Routing
IP Routing Tables
Router Discovery Protocols
Data Movement in a Routed Network
Virtual LANs (VLANs).

Network WAN Infrastructure:

The WAN Environment
WAN Transmission Technologies
WAN Connectivity Devices
Voice Over Data Services.

Remote Networking:

Remote Networking
Remote Access Protocols
VPN Technologies.

Network Security:

Introduction to Network Security
Virus Protection
Local Security
Network Access
Internet Security.

Disaster Recovery:

The Need for Disaster Recovery
Disaster Recovery Plan
Data Backups
Fault Tolerance.

Advanced Data Storage Techniques:

Enterprise Data Storage
Clustering
Network Attached Storage
Storage Area Networks.

Network Troubleshooting:

Using a Systematic Approach to Troubleshooting
Network Support Tools: Utilities
The Network Baseline.

Network Operating Systems:

Novell NetWare
Microsoft BackOffice
Linux History and Operation
Macintosh.

MCSE

MCSE Training Details

Over the last many years, the Training Academy at IP Solutions Technologies has been a centre for training thousands of aspiring IT professionals in various Microsoft Certifications at our state-of-the-art facility in Kanpur. The following MCSE training certification courses are offered:

a) MCSE: Microsoft Certified Solution Expert (Server Infrastructure) 
b) MCSA: Microsoft Certified Solution Associate

These MCSE certification training programs are taught by Senior System/Network engineers with several years of field experience.

MCSE Course Contents

Network & Operating System Essentials
Installing and Configuring Windows Server 2012
Administering Windows Server 2012
Designing and Implementing Server Infrastructure
Configuring Windows Server 2012 Services
Active Directory Domain Services
DNS, DHCP, IIS 8.0, VPN
Configuring File Server
File Server Resource Manager
Configuring Shared Resources
Implementing Microsoft Virtualization Technologies.
Server Virtualization using Hyper-V
Configuring Advanced Storage Solutions
iSCSI Target and Initiator
Storage Spaces and Storage Pools and RAID
Implementing Security Restrictions
Group Policies
Group Policy Preferences

Network Essentials

Networking Concepts, History of Server OS
Introduction to windows server 2008 & 2012
Features of Windows Server 2012
Installation of Windows Server 2012
Introduction and Creation of Users accounts
Conversion of GUI to Server Core
Conversion of Server Core to GUI

Active Directory - Domain Services

IP Addressing
Logical Topologies - Peer-Peer & Domain Models
Introduction to Directory Services
Evolution of Active Directory Services - LDAP Protocol
Features of Active Directory
Installing Active Directory – Domain Controller

Member Servers, Clients, User Configuration

Configuring Member Servers and Clients.
Creating Users in AD-DS
User Logon policies
Password policies
Account Lockout policies
User properties

Permissions/Access Control Lists

File Systems
Security and Sharing Permissions - Folders & Files
Offline Folders

Profiles and File Server Resource Manager [FSRM]

Types of Profiles – Local & Roaming
Home Folder
Configuring Quotas using FSRM
Implementing File Screening using FSRM
Configuring Storage Reports Management.

Distributed File System

Creating Organisational Unit
Delegating Control to a User
Active Directory Recycle Bin
DFS Namespace
DFS Folders

Logical Structure of AD - DS

Configuring ADC
Tree Structure - Child Domain
Forest Structure

FSMO Roles of AD - DS

Roles of AD - DS
Transferring of Roles
Seizing of Roles

Group Policy / System Policies

User and Computer Policies
Scope of Policies - OU, Domain, Sites
Group Policy Modeling (RSOP)
Software Deployment
Scripts, Folder Redirection
Group Policy Preferences

Active Directory Trusts

Introduction to Trust Relationship
Categories, Directions & Types of Trusts
Functional Levels
Authentication Protocols
Configuring Forest Trusts between 2012 Forests

RODC & Physical Structure of AD-DS

Introduction & Configuration of Read-Only Domain Controller
SITES and Global Catalog
Backup Strategies
Replication between the Domain Controllers
AD-DS Partitions
Configuring A.D.C using Install From Media [IFM]

Dynamic Host Configuration Protocol (DHCP)

Introduction and Configuration of DHCP Server
DHCP Client Configuration
Reservations
BOOTP Server
DHCP Backup
Configuring DHCP Failover

Domain Name System (DNS)

Internet Basics, Host & LM Host Files
DNS Naming Hierarchy
Lookup Zones - Forward and Reverse lookup Zones
Types of Zones – Primary, Secondary & Stub Zone
Resource Records, Integration with ADS, SRV Records
Forwarders, Dynamic Updates

Internet Information Services(IIS)

IIS 8.0 Configuration
Hosting Websites, Virtual Directories
Redirecting Web Sites
Backup & Restoring Sites
FTP Server Configuration

Windows Deployment Services

Introduction and Configuration of WDS Server
Attended and Unattended Installation

Microsoft Hyper -V

Installation of Hyper – V
Configuring Virtual Machine
Configuring Virtual Networks
Configuring Virtual Hard disks

Routing & Remote Access

Routing Configuration - Static Routes
NAT, DHCP Relay Agent
Remote Access Server Configuration
VPN - PPTP

Remote Desktop Services

Remote Administration Mode

Advanced Topics

Windows Server Backup
Introduction to print server
Upgrading Windows Server 2008 to 2012
Overview of AD- FS, LDS, RMS, CS

Storage Technologies

Configuring iSCSI Target and Initiator
Introdution to Storage spaces and Storage Pools
Configuring Simple Volume (RAID – 0)
Configuring Mirror Volume (RAID – 1)
Configuring Parity Volume (RAID – 5)






CCNA

Operation of IP Data Networks

Functions of Routers, Switches, Bridges and Hubs
OSI and TCP/IP models
Data flow between two hosts across a network

LAN Switching Technologies

Identify basic switching concepts
-Types of Switching 
-Collision / Broadcast Domains
-CAM Table
Configure and verify initial switch configuration
Switch operation (ping, telnet and ssh)
Identify enhanced switching technologies
-RSTP / PVSTP
-Ether channels

Configure and verify VLANs / Trunking
-DTP / Auto negotiation
Configure and verify PVSTP operation
-Root bridge election / STP Modes

IP Routing Technologies

Describe basic routing concepts
- C E F
- Packet forwarding
- Router lookup process
Describe the boot process of Cisco IOS routers
Configure and verify basic Router configuration
Configure and verify interface (serial and Ethernet)
Configure and verify Static & Default routing
Manage Cisco IOS Files
- Boot preferences / Cisco IOS image(s)
- Licensing
Differentiate methods of routing and routing protocols
- Static vs. Dynamic
- Link state vs. Distance Vector
- Administrative distance
Configure and verify OSPF (single area)
- Benefit of single area
- neighbor adjacencies
- OSPF states, Multi area
- Configure OSPF v2 & OSPF v3
- Router ID, Passive interface, LSA types
Configure and verify EIGRP (single AS)
- Feasible Distance / Feasible Successors
- Administrative distance
- Feasibility condition
- Metric composition
- Router ID, Auto summary, Path selection
- Load balancing (Equal & Unequal)
- Passive interface
InterVLAN routing (Router on a stick)
- sub interfaces, encapsulation
Configure SVI interfaces

IP Services

Configure and verify DHCP (IOS Router)
- Configuring router interfaces to use DHCP
- DHCP options
- Excluded addresses, Lease time
ACL (Types, Features & Applications of ACLs)
- Standard, Extended, Named & Numbered
- Log option
Configure and verify ACL
Identify the basic operation of NAT
- Purpose, Pool, Static, 1 to 1 & Overloading
- Source addressing & One way NAT
Configure and verify NAT
Configure and verify NTP as a client
Recognize High availability (FHRP, VRRP, HSRP & GLBP)
Configure and verify Syslog.
Describe SNMP v2 & v3





IP addressing (IPv4 / IPv6)

Private and public IP addresses for IPv4
IPv6 addressing scheme
IPv4 addressing scheme using VLSM and summarization
IPv6 in conjunction with IPv4 such as (dual stack)
Describe IPv6 addresses
- Global unicast
- Multicast
- Link local
- Unique local
- eui 64
- auto configuration

Network Device Security

Configure and verify network device security
- Enable secret vs enable
- Disable telnet
- SSH / VTYs
- Physical security
- Service password
Configure and verify Switch Port Security
- Sticky MAC / MAC address limitation
- Static / dynamic
- Violation modes(Err disable/Shutdown)
- Protect restrict
- Err disable recovery

Troubleshooting

Identify and correct common network problems
Utilize netflow data
Troubleshoot and Resolve VLAN problems
- Identify that VLANs are configured
- port membership correct
- IP address configured
Troubleshoot and Resolve trunking problems
- correct trunk states
- correct encapsulation configured
- correct vlans allowed
Troubleshoot and Resolve STP
- Root switch
- Priority
- Mode is correct
- Port states
Troubleshoot and Resolve routing issues
- Routing is enabled
- Routing table is correct
- Correct path selection
Troubleshoot and Resolve OSPF problems
- Neighbor advances
- Hello and Dead timers
- OSPF area
- Interface MTU
- Network types
- Neighbor states
- OSPF topology database
Troubleshoot and Resolve EIGRP problems
- Neighbor adjancies
- AS number
- Load balancing
Troubleshoot and Resolve interVLAN
- Connectivity
- Encapsulation
- Subnet
- Native VLAN
- Port mode trunk status
Troubleshoot and Resolve ACL issues
- Statistics, Permitted networks, Direction
Troubleshoot and Resolve WAN implementation issues
- Serial interfaces, PPP, Frame relay
Monitor NetFlow statistics
Troubleshoot etherchannel problems

WAN Technologies

Identify different WAN Technologies 
- Metro Ethernet, VSAT, Cellular 3G & 4G
- ISDN, DSL, Frame relay, MPLS, VPN & Cable
Configure and verify Frame Relay on Cisco routers

CEH

CEH Syllabus V7 AND V8

Module 01: Introduction to Ethical Hacking
Module 02: Footprinting and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: System Hacking
Module 06: Trojans and Backdoors
Module 07: Viruses and Worms
Module 08: Sniffers
Module 09: Social Engineering
Module 10: Denial of Service
Module 11: Session Hijacking
Module 12: Hacking Webservers
Module 13: Hacking Web Applications
Module 14: SQL Injection
Module 15: Hacking Wireless Networks
Module 16: Evading IDS, Firewalls, and Honeypots
Module 17: Buffer Overflown
Module 18: Cryptography
Module 19: Penetration Testing


ICP


ICNP


Advance ICP


Quick Links

....................................................................................

CONNECT WITH SOCIAL MEDIA


      

....................................................................................

 Contact Us

  Kanpur Office:

117/2, 'O' Block, Geeta Nagar,

Near Gumti No. 9, Kanpur-208025, Uttar Pradesh, India.

If you wish to directly speak to us, please contact to the below number at any time.

      +91-512- 2500004

      +91-9792591164

      +91-9648991177


      mkumar@ipst.in

      umesh@ipst.in

      pramila@ipst.in

View Photo Gallery