One Semester Certificate Course

Department of Information Technology
In New Delhi

Price on request
You can also call the Study Centre
11243... More

Important information

  • Certificate
  • New delhi
  • Duration:
    1 Day
Description

Important information
Venues

Where and when

Starts Location
On request
New Delhi
Electronics Niketan, 6, CGO Complex, Lodhi Road,, 110003, Delhi, India
See map

Course programme

Computer Fundamentals and Computer Networks
The main contents of the program are as follows:

• General idea of P.C. structural design
• Diverse bus standards (I.S.A., P.C.I., P.C.M.C.I.A.)
• Diverse Add on Cards as- memory, Graphics etc.
• O.S. structural design
• Processing administration
• File system organization
• Preface to Network O.S.
• General concept of Communication Systems, Matters in Computer Network
• Transmission Media
• OSI, TCP/IP Models
• LAN
• WAN
Network Protocols
• I.P. addressing PLUS Routing
• Understand & recognize T.C.P.,I.P., U.D.P., I.C.M.P., Ethernet Packets
• Inter network Devices (Hub, Switching, Router etc.)
• Wireless Network
Operating System Administration

The main contents of the program are as follows:
Windows OS
• Preface to Windows O.S.
• Preface to the Administrative Tasks plus Equipments
• Installing plus Configuring of the Windows O.S.
• Implement plus Manage the Windows Networking Infrastructure
• Disk plus File System organization
• Plan, Implement, plus Maintain an Active Directory Infrastructure
• Configure the I.I.S. Web Server, S.Q.L. Server plus Exchange Server
• Performance Tuning
• Troubleshooting plus Maintaining
Linux OS
• Systems fundamentals
• Boot Processing on Linux plus Solaris
• Installing of Sun Solaris plus Linux
• Initialization plus Shut down rudiments
• -Linux user organization
• Configuring of A.P.A.C.H.E., S.A.M.B.A., N.F.S., D.N.S.
• F.T.P. services plus N.I.S. Configuring
• Systems, Disk management, printing services
• X server configuring
• Performance Tuning
• Trouble shooting plus Maintaining

Information Security Concepts

The main contents of the program are as follows:
• Background, Significance Statistics
• National & intercontinental situation
• Safety Threatening, Vulnerability plus Counter measures
• Malevolent Coding
• Objectives of Safety Preventing, Detecting plus Recovering
• Cryptography: Kinds of Encryptions, P.K.I. plus Certification Authority, etc.
• Identifying plus verification
• Networking Safety Protocols: S.S.L., I.P.S.E.C., Kerberos, etc.
• Safety Equipments
• Wire less Safety
• Adversity Management
• Computer Forensics
• Information Safety Legal Provisions
Securing the Systems

The main contents of the program are as follows:
• Designing of Safe OS, Trusted OS
• OS Hardening
• OS controlling
• Internet Protocols plus safety
• Application safety W.W.W. safety S.H.T.T.P., S.M.I.M.E., P.G.P., S.E.T., Electronic-mail plus I.M. safety
• Accessing Control Physical plus Logical Biometrics preface
• Internet safety protocols
• Manage Private Firewall plus Anti virus
• Remote Accessing Safety
• Safe Configuring of Applications: Web Server, Data base Server, Electronic-mail Server, etc.
Network Perimeter Security

The main contents of the program are as follows:
• Understand Networking Safety Perimeter
• Secured Router Configuring
• Design, Implement plus Manage the Firewall
• Virtual Personal Networking
• Intrusion Detecting System
• Vulnerabilities Assessing
• Penetrating for Test
• Intrusion Preventing System
• Network Address Translation
Security Standards, Auditing and Best Practices

The main contents of the program are as follows:
• Safety Policy plus Proceedings
• D.R.P./B.C.P.- Business effect analyzing, Risk assessing Methods, Risk Classifying
• Asset classifying, Information Classifying Association stage plan, Procedure phase Planning
• Resource revival plan, Crisis administration plan event mgmt, communicating, P.R. plus media Policies, structure, auditing, benchmarking, compliance
• Excellent Practices Guidelines on Data fortification for System Designers
• Safety Test plus Evaluating Criteria
• IS (C.C./B.S.7799/I.T.S.E.C./G.L.B./H.I.P.A.A./C.O.B.I.T.)
• Log plus Analysis
• Data Backing plus recovering
• OS plus Application Specification Audit
• Presenting a Risk Analyzing plus Recovering
• Develop Safety Policies