- Networking
- 1.Network is a collection ofcomputer and other deviceslike printers, scanners and soon. The computers in anetwork may be linked to otherdevices throughcables, telephone lines, radiowaves, satellites etc.
- 2. To share computer files. To share resources. To enable people to communicate. To reduce speed and cost of transfer.
- 3 Personal Area Networks(PANs) Local Area Networks(LANs) Campus Area Networks(CANs) Metropolitan Area Networks(MANs) Wide Area Networks(WANs)
- 4. Pans Personal Area Network is an interconnection of devices around an individual device within 5 to 10 meters. The devices that may be used in PANs are computers, printers, fax machines, PDAs etc.
- 5. What are LANs? The terminals or workstations in a LAN are confined to small areas such as a building or a group of buildings. It may be up to a kilometer. For example, department of an office.
- 6. A CAN covers a group of buildings like college campus or office campus. It is basically a collection of LANs in various buildings.
- 7. What are MANs? The MANs lies between LANs and WANs. MANs connect two or more local area networks or campus area networks together and is spread over a town or city. It does not exceed 10 kilometers. For example, MAN connects the local bank with all the branches in the city.
- 8 What are WANs? WANs spans a large area-a country or many countries or a continent. A WAN may connect a number of LANs, CANs, or MANs located in any part of world. Example, WAN is the internet which is the most popular and the largest WAN.
- 9. WIDE AREA NETWORK
- 10. It is the geometric layout of computers and other devices. The types of topologies are:- Linear bus topology Ring topology Star topology.
- 11. What is Linear Bus Topology? It has a common backbone cable to which all the nodes and peripheral devices are attached. All the devices are attached to this backbone cable. The disadvantage of the linear bus topology is that if the backbone cable fails, then the network becomes useless.
- 12. Linear Bus Topology
- 13. It connects the nodes of the network in a circular chain. The final node in the chain connects to the first to complete the ring. A computer has two adjacent neighbors. The main disadvantage is that if one cable is broken, the whole network becomes useless.
- 14. There is a central switch to which all the nodes are directly connected. Every node is indirectly connected to another node through the central hub. The failure of any node does not cause the breakdown of the network. The disadvantage is that if the central hub will cause a breakdown, the network is broken.Star topology
- 15. Star topology
Thursday, 30 January 2014
Networking
Wednesday, 29 January 2014
Hardware and Networking Courses
Hardware and Networking Courses
Rooman Technology has designed its Hardware and Networking Courses so Well that, finding a job in market after completion of the course is very easy. You Will get obvious job offers from reputed Companies in Market. We Technologies is a pioneer in career building industry for Networking and Hardware sector. We are associated with some of the major IT Companies like Wipro, HCL, Infosys, Honeywell, HP, IBM etc.
Diploma in Hardware | Certificate in Networking | Certificate in IT Security |
Monday, 27 January 2014
Training Institute For Networking
India has witnessed a phenomenal growth in the number of ATMs installed, Telecom Service Providers, Chain of Retail/Healthcare/Media, E-Governance Project, IT and BPO companies. Network Connectivity is the backbone of all these segments, which leads to tremendous employment opportunity for candidates with skills to manage Small to Large Network consisting of various Routers, Switches, Firewalls, connected through Leased Line, ISDN, MPLS, Broadband. An enterprise network connects all the isolated departmental or workgroup networks into an intra-company network. In this scenario, no user or group is an island. All systems can potentially communicate with all other systems while maintaining reasonable performance, security, and reliability. This course starts with basics of Networking and covers Establishing and Securing an Enterprise Network.Audience : Students who has completed their Diploma/Graduation in Electronics/Computer Science and have fair knowledge of Windows/Linux and Networking.
Duration of the course :
Part Time : 6 Months
Full Time : 3 Months
Full Time : 3 Months
Key Benefits :
On completion of this course, the candidate will have the opportunity to work as Network Engineer for ISP/IT/Telecom/Infrastructure Management companies Network Administrator for MNC/Retail Chain/Healthcare/Media Network Support in Technical Call Center Entrepreneurial opportunity to run your own BusinessFees in INR : 25000/-NETWORK +
•Introduction to Network
•ISO/OSI Reference Model
•Network & Cable Types
•LAN Technologies
•Networking Topology
•Networking Devices
•TCP/IP
•IP Addressing
•Subnet and Supernet
•DHCP
•DNS & WINS
•IP Routing
•TCP/IP Utilities
•WAN Technologies
•Security Protocol (IPSEC, L2TP)
•Troubleshooting network problem
•Configuring a Router
•Building a Network
•Managing CISCO in an Internetwork
•IP Routing
•Switching
•Virtual LANs
•Access Lists
•WAN Configuration
Course Overview :
•Implementing Basic EIGRP
•Implementing Advanced EIGRP
•Implementing Basic OSPF
•Implementing a Scalable Multiarea Network OSPF based Solution
•Implementing OSPF over NBMA 1 & NBMA 2
•Describing Different OSPF Area Types
•Controlling Routing Updates
•Implementing Simple Redistribution & Advanced Redistribution
•Foundation concepts and Planning of BGP Routing
•Implementing Basic BGP
•Tuning Attributes of BGP
•Configuring Path Control
•Understanding And Implementing IPv6 Addressing
•Implementing IPv6 Routing and Routing Protocols
(642-813): Implementing Cisco IP Switched Networks (SWITCH)
Course Overview :
•Analyzing Campus Network Designs
•Implementing VLANs in Campus Networks
•Implementing Spanning Tree
•Implementing Inter-VLAN Routing
•Implementing First Hop Redundancy in a Campus Environment
•Implementing a Highly Available Network
•Minimizing Service Loss and Data Theft in a Campus Network
•Integrating Wireless LANs into a Campus Network
•Accommodating Voice and Video in Campus Network
(642-832) Troubleshooting and Maintaining Cisco IP Networks (TSHOOT)
•Planning Maintenance for Complex Networks
•Selecting Maintenance and Troubleshooting Tools and Applications
•Planning Troubleshooting Processes for Complex Enterprise Networks
•Maintaining and Troubleshooting Campus Switching-Based Problems
•Maintaining and Troubleshooting Routing Based Solutions
•Maintaining and Troubleshooting Network Security Solutions
•Maintaining and Troubleshooting Integrated, Complex Enterprise Networks
•Troubleshooting Performance Problems on Switches
•Troubleshooting Wireless Connectivity
•Troubleshooting Voice over IP
•Troubleshooting Multicast
•Troubleshooting NAT and PAT
•Troubleshooting DHCP
•Troubleshooting IPv6, OSPFv3, and RIPngCCNA SECURITY
•Describe and list mitigation methods for common network attacks
•Describe and list mitigation methods for Worm, Virus, and Trojan Horse attacks
•Describe the Cisco Self Defending Network architecture
•Secure Cisco routers using the SDM Security Audit feature
•Secure Cisco routers by configuring multiple privilege levels and role based CLI
•Implement AAA on Cisco routers using local router database and external ACS
•Mitigate threats to Cisco routers and networks using ACLs
•Configure IP ACLs to prevent IP address spoofing using CLI
•Discuss the caveats to be considered when building ACLs
•Use CLI and SDM to configure SSH on Cisco routers to enable secured management access
•Use CLI and SDM to configure Cisco routers to send Syslog messages to a Syslog server
•Mitigate common Layer 2 attacks
•Describe the operational strengths and weaknesses of the different firewall technologies
•Explain stateful firewall operations and the function of the state table
•Implement Zone Based Firewall using SDM
•Define network based vs. host based intrusion detection and prevention
•Explain IPS technologies, attack responses, and monitoring options
•Enable and verify Cisco IOS IPS operations using SDM
•Explain the different methods used in cryptography
•Explain IKE protocol functionality and phases
•Describe the building blocks of IPSec and the security functions it provides
•Configure and verify an IPSec site-to-site VPN with pre-shared key authentication using SDM
OR
642-617 FIREWALL v1.0 Deploying Cisco ASA Firewall Solutions
•Introduction to the Cisco ASA Adaptive Security Appliance
•Implementation of Basic Connectivity and Device Management
•Deployment of Cisco ASA Adaptive Security Appliance Access Control Features
•Deployment of Cisco ASA Adaptive Security Appliance Network Integration Features
•Deployment of Cisco ASA Adaptive Security Appliance Virtualization and High-Availability Features
•Integration of Cisco ASA Adaptive Security Appliance Security Service Modules
•Configuring Routing on the Cisco ASA Adaptive Security Appliance
•Lab (Optional): Configuring Dynamic Routing
•ISO/OSI Reference Model
•Network & Cable Types
•LAN Technologies
•Networking Topology
•Networking Devices
•TCP/IP
•IP Addressing
•Subnet and Supernet
•DHCP
•DNS & WINS
•IP Routing
•TCP/IP Utilities
•WAN Technologies
•Security Protocol (IPSEC, L2TP)
•Troubleshooting network problem
CCNA (CISCO CERTIFIED NETWORK ASSOCIATE)
•Configuring a Router
•Building a Network
•Managing CISCO in an Internetwork
•IP Routing
•Switching
•Virtual LANs
•Access Lists
•WAN Configuration
CCNP
(642-902): Implementing Cisco IP Routing(ROUTE)Course Overview :
•Implementing Basic EIGRP
•Implementing Advanced EIGRP
•Implementing Basic OSPF
•Implementing a Scalable Multiarea Network OSPF based Solution
•Implementing OSPF over NBMA 1 & NBMA 2
•Describing Different OSPF Area Types
•Controlling Routing Updates
•Implementing Simple Redistribution & Advanced Redistribution
•Foundation concepts and Planning of BGP Routing
•Implementing Basic BGP
•Tuning Attributes of BGP
•Configuring Path Control
•Understanding And Implementing IPv6 Addressing
•Implementing IPv6 Routing and Routing Protocols
(642-813): Implementing Cisco IP Switched Networks (SWITCH)
Course Overview :
•Analyzing Campus Network Designs
•Implementing VLANs in Campus Networks
•Implementing Spanning Tree
•Implementing Inter-VLAN Routing
•Implementing First Hop Redundancy in a Campus Environment
•Implementing a Highly Available Network
•Minimizing Service Loss and Data Theft in a Campus Network
•Integrating Wireless LANs into a Campus Network
•Accommodating Voice and Video in Campus Network
(642-832) Troubleshooting and Maintaining Cisco IP Networks (TSHOOT)
•Planning Maintenance for Complex Networks
•Selecting Maintenance and Troubleshooting Tools and Applications
•Planning Troubleshooting Processes for Complex Enterprise Networks
•Maintaining and Troubleshooting Campus Switching-Based Problems
•Maintaining and Troubleshooting Routing Based Solutions
•Maintaining and Troubleshooting Network Security Solutions
•Maintaining and Troubleshooting Integrated, Complex Enterprise Networks
•Troubleshooting Performance Problems on Switches
•Troubleshooting Wireless Connectivity
•Troubleshooting Voice over IP
•Troubleshooting Multicast
•Troubleshooting NAT and PAT
•Troubleshooting DHCP
•Troubleshooting IPv6, OSPFv3, and RIPngCCNA SECURITY
•Describe and list mitigation methods for common network attacks
•Describe and list mitigation methods for Worm, Virus, and Trojan Horse attacks
•Describe the Cisco Self Defending Network architecture
•Secure Cisco routers using the SDM Security Audit feature
•Secure Cisco routers by configuring multiple privilege levels and role based CLI
•Implement AAA on Cisco routers using local router database and external ACS
•Mitigate threats to Cisco routers and networks using ACLs
•Configure IP ACLs to prevent IP address spoofing using CLI
•Discuss the caveats to be considered when building ACLs
•Use CLI and SDM to configure SSH on Cisco routers to enable secured management access
•Use CLI and SDM to configure Cisco routers to send Syslog messages to a Syslog server
•Mitigate common Layer 2 attacks
•Describe the operational strengths and weaknesses of the different firewall technologies
•Explain stateful firewall operations and the function of the state table
•Implement Zone Based Firewall using SDM
•Define network based vs. host based intrusion detection and prevention
•Explain IPS technologies, attack responses, and monitoring options
•Enable and verify Cisco IOS IPS operations using SDM
•Explain the different methods used in cryptography
•Explain IKE protocol functionality and phases
•Describe the building blocks of IPSec and the security functions it provides
•Configure and verify an IPSec site-to-site VPN with pre-shared key authentication using SDM
OR
642-617 FIREWALL v1.0 Deploying Cisco ASA Firewall Solutions
•Introduction to the Cisco ASA Adaptive Security Appliance
•Implementation of Basic Connectivity and Device Management
•Deployment of Cisco ASA Adaptive Security Appliance Access Control Features
•Deployment of Cisco ASA Adaptive Security Appliance Network Integration Features
•Deployment of Cisco ASA Adaptive Security Appliance Virtualization and High-Availability Features
•Integration of Cisco ASA Adaptive Security Appliance Security Service Modules
•Configuring Routing on the Cisco ASA Adaptive Security Appliance
•Lab (Optional): Configuring Dynamic Routing
Friday, 24 January 2014
Networking
“IT SupportDesk has Microsoft, CISCO, Checkpoint, Ec-Council, VMWARE, EMC certified technical team dedicated to address all your network related requirements.”
Our service offerings include all the activities, procedures, policies, best practices and tools to ensure the optimal Operation, Administration, Maintenance, Support and Provisioning of our Customer’s network environment and management. We provide a wide range of consulting services to all our customers including identifying their critical businesses, technical and operational requirements. We obtain a thorough understanding of the company's needs in order to recommend and plan for the most effective solution.
Networking Design
IT SupportDesk works in close partnership with clients to design their Network infrastructure that is specific to their organization and their evolving needs.
Whether you are setting up a new IT infrastructure, replacing an ageing network or expanding network capacity, you can rely on IT SupportDesk to provide the design and delivery skills required to partner you from initial briefing through to final handover. We have experience of installing and managing literally hundreds of differently configured IT environments for a wide range of clients in different sectors, and at different stages of business maturity. Above all, we understand that there is a balance to be struck between leveraging investment in existing infrastructure and new investment in an optimal solution. Our focus is on the creation of a robust, scalable, flexible environment upon which business applications and solutions can be built cost effectively. The right network will neatly mirror your business and its operational requirements. The right solution is as individual as your business and your brand. Defining, designing and delivering such individualized solutions is a core IT SupportDesk skill.
Tuesday, 21 January 2014
What is an ethical hacker and how can you become one?
Ever had thoughts of becoming a hacker, an ethical one that is? The EC-Council has released a certification called Certified Ethical Hacker (CEH). Its goal is to certify security practitioners in the methodology of ethical hacking. This vendor neutral certification covers the standards and language involved in common exploits, vulnerabilities, and countermeasures.
If you have been to a bookstore lately, you've most likely seen that there is an abundance of books on hacking and "how to hack." Until now, few organizations have worked toward quantifying ethical hacking, defining its legalities, or specifying its useful role in modern organizations. This is what the EC-Council is attempting to do with this certification. Keep reading if you want to learn more.
Why Must We Have Ethical Hackers?
Organizations must secure their IT infrastructure and networks. Just as corporations employ auditors to routinely examine financial records, so should corporations audit security policy. We have all seen the havoc that a lack of real financial audits can cause. Just as accountants perform bookkeeping audits, ethical hackers perform security audits. Without security audits and compliance controls, no real security exists. This is a big problem. There are plenty of individuals waiting to test and probe your organization's security stance. These individuals range from government and corporate spies, to hackers, crackers, script kiddies, or those who write and release malicious code into the wild. Their presence in your network in not a good thing!
Who Are Ethical Hackers?
An ethical hacker is most similar to a penetration tester. The ethical hacker is an individual who is employed or contracted to undertake an attempted penetration test. These individuals use the same methods employed by hackers. In case you were unsure; hacking is a felony in the United States. Ethical hackers have written authorization to probe a network. Only then is this attempted hack legal, as there is a contract between the ethical hacker and the organization. In 1995, long before today's more stringent guidelines, one individual received 3 felony counts, 5 years probation, 480 hours of community service, and a $68,000 legal bill for failing to insure proper authorization. Don't let this happen to you!
Monday, 20 January 2014
Windows/Linux Server Maintenance
Windows/Linux Server Maintenance
The complexity and integration requirements of Microsoft Windows Servers and RedHat Linux calls for an IT consulting firm with hands-on expertise and broad knowledge in designing and building cohesive end-to-end business technology solutions. The experience of IT SupportDesk's Microsoft and RedHat certified consulting team, with an average of over 10 years of background in Windows and Linux integration, assures you success configuring Windows and Linux servers, in ways that align optimally with your business goals. IT SupportDesk can help you with planning, deploying, managing and troubleshooting Server solutions that maximize the business value of your IT network.
Windows/Linux services supported by IT SupportDesk include:
- Migration to Windows Server 2008
- Consultation on Windows Server 2000, 2003, 2008 and Linux Server implementation
- Designing Network Infrastructure and Active Directory.
- Creating and managing User and Group policy
- Configuring Services and applications on server such as DNS, DHCP, IIS etc
- Backup & restore, RAID Configuration for Disaster Recovery
Friday, 17 January 2014
Certificate in Networking
Certificate in Networking course validates competency in networking administration and support.
This program covers the training in networking administration and support on various kinds of Operating Systems like Windows 7, Windows 2003/8, Linux etc. It also provides you the knowledge of media and topologies, protocols and standards, Network Security and Storage area Network. The demand for skilled network support professionals has grown significantly. The technology community identifies this course as the perfect entry point into a networking career. Upon completion of this course one can work as a Network Administrator, Field support Technician, Network Support Technicain etc.
Audience : Those who are interested in learning about Computer Networking.
Prerequisite : Basics of computer hardware and Well Conversant in English.
This program covers the training in networking administration and support on various kinds of Operating Systems like Windows 7, Windows 2003/8, Linux etc. It also provides you the knowledge of media and topologies, protocols and standards, Network Security and Storage area Network. The demand for skilled network support professionals has grown significantly. The technology community identifies this course as the perfect entry point into a networking career. Upon completion of this course one can work as a Network Administrator, Field support Technician, Network Support Technicain etc.
Audience : Those who are interested in learning about Computer Networking.
Prerequisite : Basics of computer hardware and Well Conversant in English.
Duration of the course :
Part Time : 2 Months (2 hrs/day)
Full Time : 1 Months (4 hrs/day)
Full Time : 1 Months (4 hrs/day)
Key Benefits : By the end of the course, students will be identified and accepted as baseline of any entry-level Network Engineer.
Basic Network Theory:
Network Connectivity:
Advanced Network Theory:
Common Network Protocols:
TCP/IP Services:
Alternate Network Protocols:
- •Network Definitions
- •Network Models
- •Connectivity
- •Network Addressing
- •Signaling Concepts
Network Connectivity:
- •The Data Package
- •Establishing a Connection
- •Reliable Delivery
- •Network Connectivity
- •Noise Control
- •Building Codes
- •Connection Devices
Advanced Network Theory:
- •The OSI Model
- •Ethernet
- •Network Resources
- •Token Ring/IEEE 802.5
- •FDDI
- •Wireless Networking
Common Network Protocols:
- •Families of Protocols
- •NetBEUI
- •Bridges and Switches
- •The TCP/IP Protocol
- •Building a TCP/IP Network
- •The TCP/IP Suite
TCP/IP Services:
- •Dynamic Host Configuration Protocol
- •DNS Name Resolution
- •NetBIOS Support
- •SNMP
- •TCP/IP Utilities
- •Upper Layer Services: FTP
Alternate Network Protocols:
- •Introduction to IPX/SPX
- •AppleTalk
- •Introduction to Apple Open Transport
- •Introduction to IPv6
Network LAN Infrastructure:
Network WAN Infrastructure:
Remote Networking:
NetWork Security:
Disaster Recovery:
Advanced Data Storage Techniques:
Network Troubleshooting:
Network Operating Systems:
- •Implement LAN Protocols on a Network
- •IP Routing
- •IP Routing Tables
- •Router Discovery Protocols
- •Data Movement in a Routed Network
- •Virtual LANs (VLANs).
Network WAN Infrastructure:
- •The WAN Environment
- •WAN Transmission Technologies
- •WAN Connectivity Devices
- •Voice Over Data Services.
Remote Networking:
- •Remote Networking
- •Remote Access Protocols
- •VPN Technologies.
NetWork Security:
- •Introduction to Network Security
- •Virus Protection
- •Local Security
- •Network Access
- •Internet Security.
Disaster Recovery:
- •The Need for Disaster Recovery
- •Disaster Recovery Plan
- •Data Backups
- •Fault Tolerance.
Advanced Data Storage Techniques:
- •Enterprise Data Storage
- •Clustering
- •Network Attached Storage
- •Storage Area Networks.
Network Troubleshooting:
- •Using a Systematic Approach to Troubleshooting
- •Network Support Tools: Utilities
- •The Network Baseline.
Network Operating Systems:
- •Novell NetWare
- •Microsoft BackOffice
- •Linux History and Operation Macintosh.
Thursday, 16 January 2014
infrastructure-requirements
infrastructure-requirements
CLASS-A | CLASS-B | CLASS-C | |
FLOOR AREA | Min. 2000 SQFT | Min. 1200 SQFT | Min. 900 SQFT |
MANPOWER | 1 Centre Head
1 Student Counselor
2 Marketing Executive
1 Marketing Manager
2 Senior Faculty
3 Junior Faculty
1 Lab Coordinator
1 Receptionist
1 Office Boy
| 1 Centre Head
1 Student Counselor
2 Marketing Executive
2 Senior Faculty
2 Junior Faculty
1 Receptionist
1 Office Boy
| 1 Centre Head
1 Student Counselor
1 Marketing Executive
1 Senior Faculty
2 Junior Faculty
1 Office Boy
|
CLASSROOM | 5 LAB & 1 Theory Room | 3 LAB & 1 Theory Room | 2 LAB & 1 Theory Room |
Lab-1 (CCNA/CCNP)
6 x Quad core/i3 computer
4 x 3640 Router
3 x 2620 Router
4 x 2800 Router
3 x 2950 Switch
3 x 3550 Switch
| Lab-1 (MCSE) 6 x Quad core/ i3 computers
1 x Modem
1 x 8 Port switch
| Lab-1 (MCSE/RHCE) 6 x Quad core/i3 computers
1 x Modem
1 x 8 Port switch
| |
Lab-2 (MCSE) 6 x Quad core/i3 computers
1 x Modem
1 x 8 Port switch
| Lab-2 (RHCE/CCNA) 6 x Quad core/ i3 computers
2 x 3640 Router
1 x 2620 Router
3x 2950 Switch
| Lab-2 (HARDWARE) 1 x Quad core/i3 computer
3 x PIV Computer
1 x Celeron
1 x PII
1 x Modem
1 x All in one Printer
| |
Lab-3 (RHCE) 6 x Quad core/i3 computers
1 x 8 Port switch
| Lab-3 (HARDWARE) 1 x Quad core/ i3 computer
3 x PIV Computer
1 x Celeron
1 x PII
1 x Modem
1 x All in one Printer
| ||
Lab-4 (HARDWARE) 1 x Quad core/ i3 computer
3 x PIV Computer
1 x Celeron
1 x PII
1 x Modem
1 x All in one Printer
| |||
Lab-5 (Checkpoint/CEH) 6 x Quad core/ i3 computers
1 x 16 Port switch
| |||
RECEPTION | 1 Desk
1 Chair
2 x 2 Seater Sofa
1 Corner Piece
2 Telephones with EPABX
| 1 Desk
1 Chair
1 x 3 Seater Sofa
2 Telephones with EPABX
| 1 Desk
1 Chair
1 x 3 Seater Sofa
1 Telephone
|
COUNSELING ROOM | 1 Desk
3 Chairs
1 x Storage Cabinet
1 Telephone Extension
| 1 Desk
3 Chairs
1 x Storage Cabinet
1 Telephone Extension
| 1 Desk
3 Chairs
1 x Storage Cabinet
|
LIBRARY | 1 Desk
6 Chairs
2 Book Storage Rack
| 1 Desk
6 Chairs
1 Book Storage Rack
| Not a must |
STAFF ROOM | 8 Chairs
8 Cupboards
| 6 Chairs
6 Cupboards
| 4 Chairs
6 Cupboards
|
CENTER HEAD ROOM | 1 Computer
1 Storage Cabinet
1 Desk
3 Chairs
1 Telephone
| 1 Storage Cabinet
1 Desk
3 Chairs
1 Telephone
| 1 Storage Cabinet
1 Desk
3 Chairs
1 Telephone
|
Subscribe to:
Posts (Atom)