One Semester Certificate Course

Certificate

In New Delhi

Price on request

Description

  • Type

    Certificate

  • Location

    New delhi

  • Duration

    1 Day

Facilities

Location

Start date

New Delhi (Delhi)
See map
Electronics Niketan, 6, CGO Complex, Lodhi Road,, 110003

Start date

On request

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Course programme

Computer Fundamentals and Computer Networks
The main contents of the program are as follows:

• General idea of P.C. structural design
• Diverse bus standards (I.S.A., P.C.I., P.C.M.C.I.A.)
• Diverse Add on Cards as- memory, Graphics etc.
• O.S. structural design
• Processing administration
• File system organization
• Preface to Network O.S.
• General concept of Communication Systems, Matters in Computer Network
• Transmission Media
• OSI, TCP/IP Models
• LAN
• WAN
Network Protocols
• I.P. addressing PLUS Routing
• Understand & recognize T.C.P.,I.P., U.D.P., I.C.M.P., Ethernet Packets
• Inter network Devices (Hub, Switching, Router etc.)
• Wireless Network
Operating System Administration

The main contents of the program are as follows:
Windows OS
• Preface to Windows O.S.
• Preface to the Administrative Tasks plus Equipments
• Installing plus Configuring of the Windows O.S.
• Implement plus Manage the Windows Networking Infrastructure
• Disk plus File System organization
• Plan, Implement, plus Maintain an Active Directory Infrastructure
• Configure the I.I.S. Web Server, S.Q.L. Server plus Exchange Server
• Performance Tuning
• Troubleshooting plus Maintaining
Linux OS
• Systems fundamentals
• Boot Processing on Linux plus Solaris
• Installing of Sun Solaris plus Linux
• Initialization plus Shut down rudiments
• -Linux user organization
• Configuring of A.P.A.C.H.E., S.A.M.B.A., N.F.S., D.N.S.
• F.T.P. services plus N.I.S. Configuring
• Systems, Disk management, printing services
• X server configuring
• Performance Tuning
• Trouble shooting plus Maintaining

Information Security Concepts

The main contents of the program are as follows:
• Background, Significance Statistics
• National & intercontinental situation
• Safety Threatening, Vulnerability plus Counter measures
• Malevolent Coding
• Objectives of Safety Preventing, Detecting plus Recovering
• Cryptography: Kinds of Encryptions, P.K.I. plus Certification Authority, etc.
• Identifying plus verification
• Networking Safety Protocols: S.S.L., I.P.S.E.C., Kerberos, etc.
• Safety Equipments
• Wire less Safety
• Adversity Management
• Computer Forensics
• Information Safety Legal Provisions
Securing the Systems

The main contents of the program are as follows:
• Designing of Safe OS, Trusted OS
• OS Hardening
• OS controlling
• Internet Protocols plus safety
• Application safety W.W.W. safety S.H.T.T.P., S.M.I.M.E., P.G.P., S.E.T., Electronic-mail plus I.M. safety
• Accessing Control Physical plus Logical Biometrics preface
• Internet safety protocols
• Manage Private Firewall plus Anti virus
• Remote Accessing Safety
• Safe Configuring of Applications: Web Server, Data base Server, Electronic-mail Server, etc.
Network Perimeter Security

The main contents of the program are as follows:
• Understand Networking Safety Perimeter
• Secured Router Configuring
• Design, Implement plus Manage the Firewall
• Virtual Personal Networking
• Intrusion Detecting System
• Vulnerabilities Assessing
• Penetrating for Test
• Intrusion Preventing System
• Network Address Translation
Security Standards, Auditing and Best Practices

The main contents of the program are as follows:
• Safety Policy plus Proceedings
• D.R.P./B.C.P.- Business effect analyzing, Risk assessing Methods, Risk Classifying
• Asset classifying, Information Classifying Association stage plan, Procedure phase Planning
• Resource revival plan, Crisis administration plan event mgmt, communicating, P.R. plus media Policies, structure, auditing, benchmarking, compliance
• Excellent Practices Guidelines on Data fortification for System Designers
• Safety Test plus Evaluating Criteria
• IS (C.C./B.S.7799/I.T.S.E.C./G.L.B./H.I.P.A.A./C.O.B.I.T.)
• Log plus Analysis
• Data Backing plus recovering
• OS plus Application Specification Audit
• Presenting a Risk Analyzing plus Recovering
• Develop Safety Policies

One Semester Certificate Course

Price on request