Microsoft Office Specialist (MOS)
- Microsoft Word
- Microsoft Excel
- Microsoft PowerPoint
- Microsoft Outlook
- Introduction to Microsoft Access
Hardware
- Installing and Managing Various Operating Systems
- Troubleshooting of Various Operating Systems
- Installing and managing Device Driver
- Configuring and Managing Hardware Devices
- Troubleshooting of All Hardware Devices
- Assembling – Disassembling of System
Configuring Windows 10
- Installing, Updating and Migration of Windows 10
- Managing Windows 10 Environment
- Configuring and Managing Windows 10 Security
- Security and Group and police
- Troubleshooting of Windows 10 Environment
NETWORKING (N+)
- Introduction to Network
- Network Topology
- OSI Specification
- Network Specialized Devices
- Understanding of IPV6
- Understand Network Troubleshooting Steps & TIPS
Microsoft Server
- Overview of Windows Server 2012
- DHCP Server Configuration
- DNS Server Configuration
- Hyper –V (Virtualization) Management
Redhat Server
- Redhat Server
- Creating Users and Managing Permissions.
- Handling File-System, Files, Directories & Software Packages.
- Managing Logs, Networking & Network Users.
- Managing Partitions and configure various Services like HTTP, NFS, SAMBA, DNS and Postfix.
- Advance Configuration like iSCSI, MariaDB and Shell Scripting.
CCNA: Cisco Certified Network Associate
- Basic Network Concepts & Sub netting.
- Introduction to Routers, Switches & IOS
- Managing Routers and Routing Protocols like RIP, EIGRP and OSPF
- Switching : VLANs, STP & VTP
- Network Security: Access List and Network Address Translation (NAT)
- Wide Area Network (WAN) & Virtual Private Network (VPN)
- IPv6 Configurations
- Managing IP services VRRP, HSRP and GLBP
CCSA: CHECKPOINT CERTIFIED SECURITY ADMINISTRATOR
- INTRODUCTION TO CHECKPOINT
- INSTALLATION AND CONFIGURATION OF CHECKPOINT FIREWALL
- CREATING VARIOUS RULES
- CREATING VARIOUS TYPES OF SECURITY POLICIES
- PROVIDING VARIOUS TYPES OF SECURITY AUTHENTICATION
- BACKUP AND RESTORE OF CHECKPOINT AND SECURITY POLICIES
CH ( COMPUTER HACKING )
- INTRODUCTION OF COMPUTER HACKING AND LAWs OF HACKERS
- UNDERSTANDING OF GOOGLE HACKING AND LEARN SHORTCUTS
- OPERATING SYSTEM TRICKS AND TRIPS & PASSWORD CREACKING
- ANDROID OPERATING SYSTEM TRICKS AND TRIPS
- UNDERSTANDING OF DATA BACKUP PROCESS AND CONNECTIVITY
- INTRODUCTION OF HACKING OPERATING SYSTEM AND INSTALLATION
Microsoft SQL Server 2012
- Create & Modify Database objects like tables, forms, triggers
- Implement Different types of Queries and Sub Queries
- Create & Modify Procedures
- Optimize Queries
- Implement Error Handling
Cisco Certified Network Professional (CCNP)–Routing
- Routing Protocols, Remote Connectivity and Implementing RIPng
- Configure EIGRP, OSPF and BGP in both IPv4 and IPv6
- Implementing Route Redistribution using Filtering
- Implementing Path Control using PBR and IP SLA
- Implementing Enterprise Internet Connectivity
- VPN Configuration with IPv4 and IPv6 Tunnelling
Switch
- Switch Operations, Use of SDM templates, PoE and LLDP
- Implement VLANs, Trunks and VTP
- Implement and Optimize STP Mechanisms: PVSTP+, RPVSTP+ and MSTP
- Configure NTP, SNMP, IP SLA, Port Mirroring and Verify Operations
- Secure Campus Network
TSHOOT
- Troubleshooting in Routing Environment
- Troubleshooting in Switch Environment
- Large Enterprise Network Troubleshooting
CYBER SECURITY
- INTRODUCTION OF ETHICAL HACKING AND TYPES OF HACKING
- UNDERSTANDING OF FOOTPRINTING AND LAWs GUIDELINES
- INFORMATION OF SCANNING TECHNIQUE AND ENUMERATION
- UNDERSTANDING OF STEGANOGRAPHY AND CRYPTOGRAPHY
- INTRODUCTION OF SOCIAL ENGINEERING AND BUFFER OVERFLOW
- WIRELESS HACKING AND SESSION HIJACKING PROCESS