ITMS (Infrastructure Management Services)

IIHT - Kalkaji
In New Delhi

Rs20001-30000
You can also call the Study Centre
98910... More
Compare this course with other similar courses
See all

Important information

  • Diploma
  • New delhi
  • Duration:
    6 Months
  • When:
    Flexible
Description

Become expert in IT.Learn Hardware,Networking, Server 2012 and Linux and get 100% placement assistance from IIHT.

Important information
Venues

Where and when

Starts Location Timetable
Flexible
New Delhi
IIHT, E-153,2nd floor, Kalkaji, Near KFC, New Delhi-110019. D: +91 11 49064172 | www.iiht.com, 110019, Delhi, India
See map
4 days in a week , weekend batches are also available

Frequent Asked Questions

· What are the objectives of this course?

To get expert in Hardware networking course

· Who is it intended for?

Candidate should be 12th passed and who wants to make there career in IT Industry

· Qualification

Candidate should be 12th passed

What you'll learn on the course

Module I Unserstanding Computer Hardware CompTIA - A+ S. No Course Outline 1 Hardware Fundamentals 1.1 Computer System Components 1.2 Configure and apply BIOS Settings 1.3 Storage Devices 1.4 Power Supply and its Specifications 1.5 Device Connections and

Teachers and trainers (1)

Abhitabh Ahirwar
Abhitabh Ahirwar
IT Manager

Course programme

Module I Unserstanding Computer Hardware CompTIA - A+ S. No Course Outline 1 Hardware Fundamentals 1.1 Computer System Components 1.2 Configure and apply BIOS Settings 1.3 Storage Devices 1.4 Power Supply and its Specifications 1.5 Device Connections and Interfaces Connectore and their types 2 Peripheral Components 2.1 Install and Configure Display Devices 2.2 Install and Configure Input Devices 2.3 Install and Configure Expansion Cards 2.4 Install and Configure Multimedia Devices 3 Managing System Components 3.1 Motherboards 3.2 CPUs and Cooling Systems 3.3 Select and Install Power Supplies 3.4 RAM Types and Features 3.5 Install and Configure Storage Devices 3.6 RAID and its various types 3.7 Diffrentiate Various CPU Types. 3.8 Compare Various Connection Interface 3.9 Configure the System BIOS 4 Supporting Printers 4.1 Printer Technologies 4.2 Install, Configure, and Maintain Printers 4.3 Troubleshooting Printers 5 Troubleshooting System-Wide Issues 5.1 Troubleshoot Operating Systems 5.2 Troubleshoot Wired and Wireless Networks 5.3 Troubleshoot Common Security Issues 6 Networking 6.1 Understanding Networking 6.2 Types of Network Cables and Connector 6.3 Explain TCP and UDP ports.protocols and their purpose 6.4 Properties and Characteristics of TCP/IP 6.5 Wireless networking Standards and encryption 6.6 Internet connection type and features 7 SOHO Wireless/wired Router 7.1 Install , configure and Deploy SOHO 7.2 MAC Filtering 7.3 Port forwarding anf port triggering 7.4 SSID Broadcast 7.5 Wireless encryption 7.6 DHCP 7.7 DMZ 8 Laptops 8.1 Install and Configure Laptop Hardware and Components 8.2 Compare and Contrast components within the Display of Laptop 8.3 Compare and Contrast Laptop features 9 Opearational Procedures 9.1 Safety Procedures 9.2 Environmental Impact 9.3 Proper Communication and Professionalism 9.4 Deal with Prohibitted content Understanding Windows Client OS infrastructure Windows 8.1 Administration S. No Course Outline 1 Windows 8.1 in an Enterprise Environment 1.1 Managing Windows 8.1 in an Enterprise Environment 1.2 Overview of Windows 8.1 2 Installing and Deploying Windows 8.1 2.1 Preparing to Install and Deploy Windows 8.1 2.2 Installing Windows 8.1 2.3 Customizing and Preparing a Windows 8.1 Image for Deployment 2.4 Volume Activation for Windows 8.1 3 Tools Used for Configuring and Managing Windows 8.1 3.1 Tools Used to Perform Local and Remote Management of Windows 8.1 3.2 Using Windows PowerShell to Configure and Manage Windows 8.1 3.3 Using Group Policy to Manage Windows 8.1 4 Managing Profiles and User State in Windows 8.1 4.1 Managing User Profiles 4.2 Configuring User State Virtualization 4.3 Migrating User State and Settings 5 Managing Disks and Device Drivers 5.1 Managing Disks, Partitions, and Volumes 5.2 Maintaining Disks, Partitions, and Volumes 5.3 Working with Virtual Hard Disks 5.4 Installing and Configuring Device Drivers 6 Configuring Network Connectivity 6.1 Configuring IPv4 Network Connectivity 6.2 Configuring IPv6 Network Connectivity 6.3 Implementing Automatic IP Address Allocation 6.4 Implementing Name Resolution 6.5 Implementing Wireless Network Connectivity 7 Configuring File Access and Printers on Windows 8.1 Clients 7.1 Managing File Access 7.2 Managing Shared Folders 7.3 Configuring File Compression 7.4 Configuring File Access 7.5 Managing Printers 8 Implementing Network Security 8.1 Overview of Threats to Network Security 8.2 Configuring Windows Firewall 8.3 Securing Network Traffic by Using IPsec 8.4 Guarding Windows 8.1 Against Malware 9 Configuring Resource Access for Domain-Joined Devices and Devices That Are Not Domain Members 9.1 Configuring Domain Access for Windows 8.1 Devices 9.2 Configuring Resource Access for Devices That Are Not Domain Members 9.3 Configuring Workplace Join 9.4 Configuring Work Folders 10 Securing Windows 8.1 Devices 10.1 Authentication and Authorization in Windows 8.1 10.2 Applying Security Settings by Using Group Policy 10.3 Securing Data with EFS and BitLocker 10.4 Configuring and Testing UAC 11 Configuring Applications for Windows 8.1 11.1 Application Deployment Options in Windows 8.1 11.2 Managing Windows Store Apps 11.3 Configuring Internet Explorer Settings 11.4 Configuring Application Restrictions 12 Optimizing and Maintaining Windows 8.1 Computers 12.1 Optimizing Performance in Windows 8.1 12.2 Managing the Reliability of Windows 8.1 12.3 Managing Software Updates in Windows 8.1 13 Configuring Mobile Computing and Remote Access 13.1 Configuring Mobile Computers and Device Settings 13.2 Overview of DirectAccess 13.3 Configuring VPN Access 13.4 Configuring Remote Desktop and Remote Assistance 14 Recovering Windows 8.1 14.1 Backing Up and Restoring Files in Windows 8.1 14.2 Recovery Options in Windows 8.1 15 Configuring Client Hyper-V 15.1 Overview of Client Hyper-V Understanding Local Area Network Infrastructure CCNA S. No Course Outline 1 Building a Simple Network 1.1 Exploring the Functions of Networking 1.2 Securing the Network 1.3 Understanding the Host-to-Host Communications Model 1.4 Understanding the TCP/IP Internet Layer 1.5 Understanding the TCP/IP Transport Layer 1.6 Exploring the Packet Delivery Process 1.7 Understanding Ethernet 1.8 Connecting to an Ethernet LAN 2 Ethernet Local Area Networks 2.1 Understanding the Challenges of Shared LANs 2.2 Solving Network Challenges with Switched LAN Technology 2.3 Exploring the Packet Delivery Process 2.4 Operating Cisco IOS Software 2.5 Starting a Switch 2.6 Understanding Switch Security 2.7 Maximizing the Benefits of Switching 2.8 Troubleshooting Switch Issues 3 Wireless Local Area Networks 3.1 Exploring Wireless Networking 3.2 Understanding WLAN Security 3.3 Implementing a WLAN 4 Local Area Network Connections 4.1 Exploring the Functions of Routing 4.2 Understanding Binary Basics 4.3 Constructing a Network Addressing Scheme 4.4 Starting a Cisco Router 4.5 Configuring a Cisco Router 4.6 Exploring the Packet Delivery Process 4.7 Understanding Cisco Router Security 4.8 Using Cisco SDM 4.9 Using a Cisco Router as a DHCP Server 4.10 Accessing Remove Devices 5 Wide Area Networks Connections 5.1 Understanding WAN Technologies 5.2 Enabling the Internet Connection 5.3 Enabling Static Routing 5.4 Configuring Serial Encapsulation 5.5 Enabling RIP 6 Network Environment Management 6.1 Discovering Neighbours on the Network 6.2 Managing Cisco Router Start-up and Configuration 6.3 Managing Cisco Devices 7 Medium-Sized Switched Network Construction 7.1 Implementing VLANs and Trunks 7.2 Improving Performance with Spanning Tree 7.3 Routing Between VLANs 7.4 Securing the Expanded Network 7.5 Troubleshooting Switched Networks 8 Medium-Sized Routed Network Construction 8.1 Reviewing Routing Operations 8.2 Implementing VLSM 9 Single Area OSPF Implementation 9.1 Implementing OSPF 9.2 Troubleshooting OSPF 10 Access Control Lists 10.1 Introducing ACL Operation 10.2 Configuring and Troubleshooting ACLs 11 Address Space Management 11.1 Scaling the Network with NAT and PAT 11.2 Transitioning to IPv6 Module II 0 Managing Windows Server Infrastructure in an Organization Installing and Configuring Windows Server 2012 - 20410 S.No Course Outline 1 Deploying and Managing Windows Server 2012 1.1 Windows Server 2012 Overview 1.2 Installing Windows Server 2012 1.3 Post-Installation Configuration of Windows Server 2012 1.4 Overview of Windows Server 2012 Management 1.5 Introduction to Windows PowerShell 2 Introduction to Active Directory Domain Services 2.1 Overview of AD DS 2.2 Overview of Domain Controllers 2.3 Installing a Domain Controller 3 Managing Active Directory Domain Services Objects 3.1 Managing User Accounts 3.2 Managing Groups 3.3 Managing Computer Accounts 3.4 Delegating Administration 4 Automating Active Directory Domain Services Administration 4.1 Using Command-line Tools for AD DS Administration 4.2 Using Windows PowerShell for AD DS Administration 4.3 Performing Bulk Operations with Windows PowerShell 5 Implementing IPv4 5.1 Overview of TCP/IP 5.2 Understanding IPv4 Addressing 5.3 Subnetting and Supernetting 5.4 Configuring and Troubleshooting IPv4 6 Implementing Dynamic Host Configuration Protocol 6.1 Overview of the DHCP Server Role 6.2 Configuring DHCP Scopes 6.3 Managing a DHCP Database 6.4 Securing and Monitoring DHCP 7 Implementing DNS 7.1 Name Resolution for Windows Clients and Servers 7.2 Installing a DNS Server 7.3 Managing DNS Zones 8 Implementing IPv6 8.1 Overview of IPv6 8.2 IPv6 Addressing 8.3 Coexistence with IPv4 8.4 IPv6 Transition Technologies 9 Implementing Local Storage 9.1 Overview of Storage 9.2 Managing Disks and Volumes 9.3 Implementing Storage Spaces 10 Implementing File and Print Services 10.1 Securing Files and Folders 10.2 Protecting Shared Files and Folders by Using Shadow Copies 10.3 Configuring Work Folders 10.4 Configuring Network Printing 11 Implementing Group Policy 11.1 Overview of Group Policy 11.2 Group Policy Processing 11.3 Implementing a Central Store for Administrative Templates 12 Securing Windows Servers Using Group Policy Objects 12.1 Security Overview for Windows Operating Systems 12.2 Configuring Security Settings 12.3 Restricting Software 12.4 Configuring Windows Firewall with Advanced Security 13 Implementing Server Virtualization with Hyper-V 13.1 Overview of Virtualization Technologies 13.2 Implementing Hyper-V 13.3 Managing Virtual Machine Storage 13.4 Managing Virtual Networks Administering Windows Server 2012 - 20411 S.No Course Outline 1 Configuring and Troubleshooting Domain Name System 1.1 Configuring the DNS Server Role 1.2 Configuring DNS Zones 1.3 Configuring DNS Zone Transfers 1.4 Managing and Troubleshooting DNS 2 Maintaining Active Directory Domain Services 2.1 Overview of AD DS 2.2 Implementing Virtualized Domain Controllers 2.3 Implementing RODCs 2.4 Administering AD DS 2.5 Managing the AD DS Database 3 Managing User and Service Accounts 3.1 Configuring Password Policy and User Account Lockout Settings 3.2 Configuring Managed Service Accounts 4 Implementing a Group Policy Infrastructure 4.1 Introducing Group Policy 4.2 Implementing and Administering GPOs 4.3 Group Policy Scope and Group Policy Processing 4.4 Troubleshooting the Application of GPOs 5 Managing User Desktops with Group Policy 5.1 Implementing Administrative Templates 5.2 Configuring Folder Redirection and Scripts 5.3 Configuring Group Policy Preferences 5.4 Managing Software with Group Policy 6 Installing, Configuring, and Troubleshooting the Network Policy Server Role 6.1 Installing and Configuring a Network Policy Server 6.2 Configuring RADIUS Clients and Servers 6.3 NPS Authentication Methods 6.4 Monitoring and Troubleshooting a Network Policy Server 7 Implementing Network Access Protection 7.1 Overview of Network Access Protection 7.2 Overview of NAP Enforcement Processes 7.3 Configuring NAP 7.4 Configuring IPSec Enforcement for NAP 7.5 Monitoring and Troubleshooting NAP 8 Implementing Remote Access 8.1 Overview of Remote Access 8.2 Implementing DirectAccess by Using the Getting Started Wizard 8.3 Implementing and Managing an Advanced DirectAccess Infrastructure 8.4 Implementing VPN 8.5 Implementing Web Application Proxy 9 Optimizing File Services 9.1 Overview of FSRM 9.2 Using FSRM to Manage Quotas, File Screens, and Storage Reports 9.3 Implementing Classification and File Management Tasks 9.4 Overview of DFS 9.5 Configuring DFS Namespaces 9.6 Configuring and Troubleshooting DFS Replication 10 Configuring Encryption and Advanced Auditing 10.1 Encrypting Drives by Using BitLocker 10.2 Encrypting Files by Using EFS 10.3 Configuring Advanced Auditing 11 Deploying and Maintaining Server Images 11.1 Overview of Windows Deployment Services 11.2 Managing Images 11.3 Implementing Deployment with Windows Deployment Services 11.4 Administering Windows Deployment Services 12 Implementing Update Management 12.1 Overview of WSUS 12.2 Deploying Updates with WSUS 13 Monitoring Windows Server 2012 13.1 Monitoring Tools 13.2 Using Performance Monitor 13.3 Monitoring Event Logs Configuring Advanced Windows Server 2012 Services - 20412 S.No Course Outline 1 Implementing Advanced Network Services 1.1 Configuring Advanced DHCP Features 1.2 Configuring Advanced DNS Settings 1.3 Implementing IPAM 1.4 Managing IP Address Spaces with IPAM 2 Implementing Advanced File Services 2.1 Configuring iSCSI Storage 2.2 Configuring BranchCache 2.3 Optimizing Storage Usage 3 Implementing Dynamic Access Control 3.1 Overview of DAC 3.2 Implementing DAC Components 3.3 Implementing DAC for Access Control 3.4 Implementing Access Denied Assistance 3.5 Implementing and Managing Work Folders 4 Implementing Distributed Active Directory Domain Services Deployments 4.1 Overview of Distributed AD DS Deployments 4.2 Deploying a Distributed AD DS Environment 4.3 Configuring AD DS Trusts 5 Implementing Active Directory Domain Services Sites and Replication 5.1 AD DS Replication Overview 5.2 Configuring AD DS Sites 5.3 Configuring and Monitoring AD DS Replication 6 Implementing AD CS 6.1 Using Certificates in a Business Environment 6.2 PKI Overview 6.3 Deploying CAs 6.4 Deploying and Managing Certificate Templates 6.5 Implementing Certificate Distribution and Revocation 6.6 Managing Certificate Recovery 7 Implementing Active Directory Rights Management Services 7.1 AD RMS Overview 7.2 Deploying and Managing an AD RMS Infrastructure 7.3 Configuring AD RMS Content Protection 7.4 Configuring External Access to AD RMS 8 Implementing and Administering AD FS 8.1 Overview of AD FS 8.2 Deploying AD FS 8.3 Implementing AD FS for a Single Organization 8.4 Deploying AD FS in a Business-to-Business Federation Scenario 8.5 Extending AD FS to External Clients 9 Implementing Network Load Balancing 9.1 Overview of NLB 9.2 Configuring an NLB Cluster 9.3 Planning an NLB Implementation 10 Implementing Failover Clustering 10.1 Overview of Failover Clustering 10.2 Implementing a Failover Cluster 10.3 Configuring Highly Available Applications and Services on a Failover Cluster 10.4 Maintaining a Failover Cluster 10.5 Implementing a Multi-Site Failover Cluster 11 Implementing Failover Clustering with Hyper-V 11.1 Overview of Integrating Hyper-V with Failover Clustering 11.2 Implementing Hyper-V Virtual Machines on Failover Clusters 11.3 Implementing Hyper-V Virtual Machine Movement 12 Implementing Business Continuity and Disaster Recovery 12.1 Data Protection Overview 12.2 Implementing Windows Server Backup 12.3 Implementing Server and Data Recovery Managing Linux OS Infrastructure in an Enterprise RHCSA RH200 S.No Course Outline 1 Red Hat System Administration 1.1 Access the command line 1.2 Manage files from the command line 1.3 Manage local Linux users and groups 1.4 Control access to files with Linux file system permissions 1.5 Monitor and manage Linux processes 1.6 Control services and daemons 1.7 Managing SELinux Security 1.8 Managing Storage and File System 1.9 Install and update software packages 1.10 Analyze and store logs 1.11 Manage Red Hat Enterprise Linux networking 1.12 Install and update software packages 1.13 Mounting Network File System 1.14 Limit network communication with firewall 1.15 Virtualization and kickstart

Compare this course with other similar courses
See all