Accord Info MatrixNo.1 Training Institute in Chennai
IAO Logo

CCNA Training in Chennai

hardware networking trainingHardware and Networking Training in Chennai..!!

  • CCNA

    Duration-2 months

    Accord Soft Offers Best CCNA Training in Chennai. We offer Internships in Real-Life Business Applications of our clients. Students are given Practical Training in the below mentioned syllabus. The syllabus can be customized according to individual needs.

    Describe How a Network works

    Describe the purpose and functions of various network devices.

    Select the components required to meet a network specification.

    Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network.

    Describe common networked applications including web applications.

    Describe the purpose and basic operation of the protocols in the OSI and TCP models.

    Describe the impact of applications (Voice Over IP and Video Over IP) on a network Interpret network diagrams.

    Determine the path between two hosts across a network.

    Describe the components required for network and Internet communications.

    Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered model approach

    Differentiate between LAN/WAN operation and features

    Configure, verify and troubleshoot a switch with VLANs and interswitch communications.

    Select the appropriate media, cables, ports, and connectors to connect switches to other network devices and hosts.

    Explain the technology and media access control method for Ethernet Networks.

    Explain network segmentation and basic traffic management concepts.

    Explain basic switching concepts and the operation of Cisco switches.

    Perform and verify initial switch configuration tasks including remote access management

    Verify network status and switch operation using basic utilities (including: ping, traceroute, telnet, SSH, arp, ipconfig),SHOW & DEBUG commands Identify, prescribe, and resolve common switched network media issues, configuration issues, auto negotiation, and switch hardware failures.

    Describe enhanced switching technologies (including: VTP, RSTP, VLAN, PVSTP, 802.1q)

    Describe how VLANs create logically separate networks and the need for routing between them Configure, verify, and troubleshoot VLANs.

    Configure, verify, and troubleshoot trunking on Cisco switches, Configure, verify, and troubleshoot interVLAN routing, Configure, verify, and troubleshoot VTP, Configure, verify, and troubleshoot RSTP operation Interpret the output of various show and debug commands to verify the operational status of a Cisco switched network.

    Implement basic switch security (including: port security, trunk access, management vlan other than vlan1, etc.)

    Implement an IP addressing scheme and IP Services to meet network requirements in a medium-size Enterprise branch office network

    Describe the operation and benefits of using private and public IP addressing.

    Explain the operation and benefits of using DHCP and DNS Configure, verify and troubleshoot DHCP and DNS operation on a router. (including: CLI/SDM) Implement static and dynamic addressing services for hosts in a LAN environment.

    Calculate and apply an addressing scheme including VLSM IP addressing design to a network.

    Determine the appropriate classless addressing scheme using VLSM and summarization to satisfy addressing requirements in a LAN/WAN environment.

    Describe the technological requirements for running IPv6 in conjunction with IPv4 (including: protocols, dual stack, tunneling, etc).

    Describe IPv6 addresses.

    Identify and correct common problems associated with IP addressing and host configurations Configure, verify, and troubleshoot basic router operation and routing on Cisco devices Describe basic routing concepts (including: packet forwarding, router lookup process).

    Describe the operation of Cisco routers (including: router bootup process, POST, router components).

    Select the appropriate media, cables, ports, and connectors to connect routers to other network devices and hosts.

    Configure, verify, and troubleshoot RIPv2 Access and utilize the router to set basic parameters. (including: CLI/SDM)

    Connect, configure, and verify operation status of a device interface

    Verify device configuration and network connectivity using ping, traceroute, telnet, SSH or other utilities.

    Perform and verify routing configuration tasks for a static or default route given specific routing requirements

    Manage IOS configuration files. (including: save, edit, upgrade, restore)

    Manage Cisco IOS Compare and contrast methods of routing and routing protocols Configure, verify, and troubleshoot OSPF

    Configure, verify, and troubleshoot EIGRP Verify network connectivity (including: using ping, traceroute, and telnet or SSH)

    Troubleshoot routing issues Verify router hardware and software operation using SHOW & DEBUG commands. Implement basic router security.

    Explain and select the appropriate administrative tasks required for a WLAN

    Describe standards associated with wireless media (including: IEEE WI-FI Alliance, ITU/FCC)

    Identify and describe the purpose of the components in a small wireless network. (Including: SSID, BSS, ESS)

    Identify the basic parameters to configure on a wireless network to ensure that devices connect to the correct access point

    Compare and contrast wireless security features and capabilities of WPA security (including: open, WEP, WPA-1/2)

    Identify common issues with implementing wireless networks. (Including: Interface, missconfiguration).

    Identify security threats to a network and describe general methods to mitigate those threats

    Describe today's increasing network security threats and explain the need to implement a comprehensive security policy to mitigate the threats

    Explain general methods to mitigate common security threats to network devices, hosts, and applications

    Describe the functions of common security appliances and applications

    Describe security recommended practices including initial steps to secure network devices.

    Implement, verify, and troubleshoot NAT and ACLs in a medium-size Enterprise branch office network

    Describe the purpose and types of ACLs Configure and apply ACLs based on network filtering requirements.(including: CLI/SDM).

    Configure and apply an ACLs to limit telnet and SSH access to the router using (including: SDM/CLI) Verify and monitor ACLs in a network environment Troubleshoot ACL issues, Explain the basic operation of NAT Configure NAT for given network requirements using (including:CLI/SDM) Troubleshoot NAT issues.

    Implement and verify WAN links

    Describe the purpose and types of ACLs Configure and apply ACLs based on network filtering requirements. (including: CLI/SDM).

    Describe different methods for connecting to a WAN Configure and verify a basic WAN serial connection

    Configure and verify Frame Relay on Cisco routers Troubleshoot WAN implementation issues Describe VPN technology (including: importance, benefits, role, impact, components) Configure and verify a PPP connection between Cisco routers.

  • CCNP

    BCMSN-Building Cisco Multilayer Switched Networks

    Accord Soft Offers Best CCNP Training in Chennai. We offer Internships in Real-Life Business Applications of our clients. Students are given Practical Training in the below mentioned syllabus. The syllabus can be customized according to individual needs.

    Introduction to BCMSN

    LAN Switching Basics

    • Ethernet, Fast Ethernet, Gig Ethernet
    • Quick Cabling Review
    • Basic Switch Operation
    • Filenames and Autorecovery

    Virtual LANs (VLANs) - Part 1 & 2

    • Why use VLANs?
    • Static and Dynamic VLANs
    • Trunking
    • ISL
    • ISL and Dot1q
    • Troubleshooting Trunks
    • The Native VLAN
    • Dynamic Trunking Protocol
    • Trunking Modes
    • VLAN Database Mode
    • Design Guidelines
    • End-To-End and Local VLANs

    VLAN Trunking Protocol (VTP)

    • Why Use VTP?
    • Configuring VTP
    • VTP Modes
    • VTP Advertisement Process
    • Synchronization & Advertisement Details
    • VTP Features & Versions
    • The VLAN.DAT file *
    • VTP Securit Mode

    Spanning Tree Protocol (STP) - Part 1

    • Switching Basics
    • BPDUs & the Root Bridge Election
    • Root Port Selection & Cost

    Spanning Tree Protocol (STP) - Part 2

    • STP Port States & Times
    • Making a Nonroot Swith the Root -Why and How
    • TCN BPDUs
    • Load Sharing with the Port-priority command
    • Extended System ID Feature

    Advanced Spanning Tree Protocol Features - Part 1 & 2

    • Portfast, Uplinkfast, Backbonefast
    • Root Guard, BPDU Guard
    • UDLD
    • Loop G uard
    • UDLD, BPDU Skew Detection
    • Rapid STP, PVST, PVST+, CST, MST

    Ether Channels

    • Introduction
    • Negotiation Protocols
    • Configuration & Verification

    Securing the Switches - Part 1, 2 & 3

    • Introduction to AAA
    • Port Security
    • Port Security & Dot1x Port-Based Authentication
    • SPAN
    • VLAN ACLs
    • Private VLANs
    • DHCP Snooping, Dynamic ARP Inspection, IP Source Guard
    • MAC Address Flooding & VLAN Hopping Attacks

    Multi Layer Switching - Part 1, 2 & 3

    • Route Caching, Cisco Express Forwarding
    • Inter-VLAN Routing & SVIs
    • Fallback Bridging
    • Router Redundancy Protocols (HSRP, IRDP, VRRP, GLBP)
    • Server Load Balancing (SLB)

    IP Telephony & Cisco IP Phones

    • IP Phone Basics
    • Voice VLANs
    • Voice QoS
    • DiffServ at L2 & L3
    • Trusting Incoming Values
    • Basics of AVVID
    • Power Over Internet

    Wireless Networking

    • Wireless Basics and Standards
    • Antena Types and Usage
    • CSMA/CA
    • CCX Program
    • The Lightweight Access Point Protocol
    • Aironet System Tray Utility

    Network Design and Models

    • Core, Distribution, Access Layers
    • Enterprise Composite Network Model
    • Server Farm Block
    • Network Management Block
    • Enterprise Edge Block
    • Service Provider Edge Block

    642-801: Building Scalable Cisco Internetworks

    Introduction to BSCI

    IP Routing

    • What is a Routing Protocol? *
    • Anatomy of a Routing Table
    • Static and Default Static Routes
    • Floating Static Routes
    • On-Demand Routing
    • Propagating Default Routes
    • DHCP and Cisco Routers
    • The IP helper-address Command

    Distance Vector Routing

    • When to Use DV Routing * Review of DV Behaviors
    • Review of DV Operation Basics
    • Administrative Distance
    • RIP v2 Routing Update Authentication

    Single-Area OSPF - Part 1

    • LS Protocol Basics, LSA Sequence Numbers, Basic show Commands
    • Designated Router/Backup Designated Router Basics
    • DR/BDR Election on Ethernet and WAN Segments
    • OSPF Router ID (RID) Selection and Commands

    Single-Area OSPF - Part 2

    • OSPF Network Types - Broadcast, Non-broadcast, Point-to-point, Point-to-Multipoint
    • Virtual Links - When to Use Them, How to Configure and Verify
    • Introduction to Multi-area OSPF
    • How OSPF Determines Port Costs
    • OSPF/RIP Comparison
    • Basic OSPF Troubleshooting and Common Mis-configurations

    Multi-Area OSPF - Part 1

    • Cisco Design Recommendations for OSPF-enabled Routers
    • Intro to Stub, Total Stub Areas
    • Extended System ID Feature

    Multi-Area OSPF - Part 2

    • Intro to OSPF E1, E2, O IA Routes
    • OSPF Router Types - Internal, Backbone, ABR, ASBR
    • OSPF Route Summarization
    • Default Routes and New Features

    EIGRP - Part 1

    • Review of EIGRP Basics
    • EIGRP Packet Types
    • Detailed EIGRP Neighbor Process
    • Troubleshooting EIGRP Adjacencies
    • Using Secondary Address for EIGRP Adjacencies

    EIGRP - Part 2

    • Stuck-In-Active (SIA) Routes
    • Successors and Feasible Successors
    • Using the variance Command Correctly
    • DUAL-queries
    • Feasible Distance vs. Advertised Distance

    EIGRP - Part 3

    • Route Summarization for EIGRP
    • Basic EIGRP Design Considerations
    • EIGRP Stub Routers
    • Calculating Bandwidth Settings

    ISIS

    • Introduction to ISIS
    • ISIS Terminology
    • Routing Levels and Router Types
    • Adjacency and Hello Types
    • Link State Packets and Sequence Number Packets
    • NSAP and NET Addressing
    • The ISIS Backbone
    • The ISIS Routing Process
    • Configuring ISIS
    • ISIS Route Summarization

    BGP - Part 1

    • Introduction to BGP
    • When to Use BGP
    • When Not to Use BGP
    • BGP Peering
    • Advertising Routes in BGP

    BGP - Part 2

    • Path Attributes: Mandatory, Discretionary, Transitive, Non-transitive
    • Origin Attribute
    • AS_PATH Attribute
    • Next-hop Attribute
    • Multi-Exit Discriminator (MED)
    • Local_Pref Attribute
    • Weight Attribute

    BGP - Part 3

    • Intro to Atomic Aggregate, Aggregator, Community, Originator ID
    • Route Aggregation with BGP *
    • Resetting Peer Connections
    • Rule of Synchronization *
    • BGP Full Mesh Dilemma
    • Route Reflectors and Clusters
    • Refreshing BGP Routes
    • Prefix-Lists

    BGP - Part 4

    • Peer Groups, Confederations, and Communities
    • ISP Concerns with BGP
    • The Perils of Redistribution
    • BGP Messages Types
    • Introduction to Regular Expressions
    • Private AS Numbers

    IP Versions 6

    • Why Use IPv6?
    • Header Fields
    • Address Format and Zero Compression * Reserved Address and Address Types
    • IPv4 - v6 Compatible Addresses
    • The Autoconfiguration Process
    • OSPF Version 3
    • IPv6 - v4 Migration Strategies

    Route Maps, Policy Routing, NAT and VLSM

    • What Are Route Maps?
    • Subnetting and Summarization
    • Using Policy Routing
    • Nat and Pat
    • Developing a VLSM Scheme
    • CIDR

    Route Redistribution - Part 1

    • What is Route Redistribution?
    • Automatic RR Scenarios
    • RIP Redistribution and the Seed Metric
    • OSPF Redistribution
    • Suboptimal Routing and Routing Loops
    • Default-Information Originate
    • Administrative Distance and Redistribution
    • EIGRP Redistribution
    • Verifying Redistribution
    • Static Route Redistribution

    Route Redistribution - Part 2

    • Controlling Redistribution
    • The IP Default-Network Command
    • Passive Interfaces
    • BGP and the NullO Interface
    • BGP Redistribution Issues
    • Changing Default Metrics
    • Distribute-Lists
    • External OSPF Routes and BGP

    Multicasting - Part 1

    • What is Multicasting?
    • Address Ranges * The RPF Check
    • Mapping IP Addresses to Multicast MAC Addresses
    • PIM Operation
    • IGMP
    • PIM Dense *
    • PIM Sparse
    • PIM Sparse-Dense

    Multicasting - Part 2

    • Rendezvous Point Discovery Methods
    • Configuring Auto-RP
    • Bootstrapping and Multicasting
    • IGMP Snooping
    • CGMP

    Networking Models

    • Cisco's Three-Layer Model
    • The Enterprise Composite Network Model
    • Cisco Service-Oriented Network Architecture
    • The Intelligent Information Network

    Implementing Secure Converged Wide Area Networks (ISCW)

    Intro to the ISCW

    • Network Modeling
    • Remote Connectivity Methods
    • Basic (and Not-So-Basic) Security
    • Authentication, Authorization, and Accounting (AAA)
    • MultiProtocol Label Switching (MPLS)
    • Virtual Private Networks (VPNs)
    • Firewalls
    • Intrusion Prevention System (IPS)

    Network Modeling

    • The Cisco Three-Layer Model
    • The Cisco Enterprise Architecture
    • Cisco IIN and SONA
    • Teleworking: Questions to Ask Before Implementing

    Remote Connectivity Method

    • Intro to Broadband
    • DSL Delivery Options
    • Cable Modem Boot Process
    • PPPoE, PPPoA, and RFC 1483/2684 Bridging
    • Basic Troubleshooting
    • Hybrid Fiber-Coaxial

    Basic (and Not-So-Basic) Security

    • Password Basics
    • NTP and Router Clocks
    • Telnet and SSH
    • Banners
    • TCP Intercept
    • IP Spoofing and 3704 Filtering
    • Views and Superviews * SNMP Security Basics
    • Autosecure (CLI and SDM) * Basic Logging Commands

    Authentication, Authorization, and Accounting (AAA)

    • Authentication and Authentication Lists
    • Configuring AAA at the CLI * Configuring AAA with SDM
    • Debugging AAA
    • Authorization
    • Privilege Levels
    • Account

    MultiProtocol Label Switching (MPLS)

    • Types, Modes, and Router Roles
    • push, swap, pop
    • Labels, the Control Plane, and the Data Plane
    • The MPLS Process
    • Penultimate Hop Popping
    • The FIB, LIB, and LFIB
    • Basic MPLS Configuration
    • MPLS VPNs
    • Route Distinguishers and VRFs
    • MTU Sizing

    Virtual Private Networks (VPNs)

    • Terminology
    • Tunneling Protocols
    • Data and Key Encryption Methods
    • IPSec Architecture
    • Configuring Site-to-Site VPNs, Policies, and Transform Sets
    • Crypto ACLs
    • Configuring GRE over IPSec (Using SDM)
    • GRE Tips
    • Easy VPN Theory and Configuration
    • Stateless and Stateful VPN Failover Methods

    Firewalls

    • Intro to Firewalls
    • Stateless and Stateful Filtering
    • IOS Firewall Feature Set Components
    • Extended ACL Review
    • CBAC Operation and Benefits
    • Firewall Configuration at the CLI
    • Firewall Configuration with SDM - Basic and Advanced
    • SDM Basics
    • Direction of Your Lists * Disabling IP Inspection

    Intrusion Prevention System (IPS)

    • Comparing IPS and IDS
    • Approaches to Intrusion Prevention
    • Signatures and Signature Types
    • SDFs
    • Signature Actions * SDEE and Syslog
    • False Positives
    • Configuring IPS with SDM

    Optimizing Converged Cisco Networks (ONT)

    Introduction to Quality of Service (QoS)

    • What is QoS? Why do we use it?
    • Three Steps to a QoS Deployment
    • Delay Types (and the Network Admins who hate them)
    • QoS Model Comparison

    Queuing Methods

    • FIFO
    • Round-Robin and Weighted Round-Robin
    • Priority Queuing
    • Weighted Fair Queuing
    • Class-based WFQ
    • Low Latency Queuing

    Marking and Classifying Traffic

    • Which Comes First?
    • L2 Marking - CoS
    • L3 Marking - IP Prec, DSCP
    • DSCP and PHB
    • NBAR Theory and Operation
    • To Trust or Not To Trust (incoming markings, that is)

    Congestion Avoidance, Policing and Shaping

    • Tail Drop, RED and WRED
    • Traffic Shaping and Policing
    • Payload Compression Methods
    • Header Compression Methods
    • Intro to Link Fragmentation and Interleaving

    End-to-End QoS

    • Intro to VPN
    • QoS Preclassification
    • SLAs Defined
    • The Control Plane and CoPP

    AutoQoS

    • The 3 Basic QoS Config Methods
    • Intro to AutoQoS
    • Prerequisites
    • VoIP and Enterprise
    • Live Demo of SDM and AutoQoS Wizard

    Introduction to Wireless LANs

    • DCF and WMM
    • SSID and MAC Address Authentication
    • WEP, WPA, and WPA2
    • EAP, LEAP, and other EAPs

    WLAN Management

    • A Quick Intro to Cisco Unified Wireless Networks
    • WLAN Implementation Methods
    • CiscoWorks Wireless LAN Solution Engine (WLSE)
    • Planning for WCS Deployment (Wireless Control System)
    • WCS Versions

    Voice Over IP (VoIP)

    • Call Components
    • Analog and Digital Interface Types
    • VoIP Signaling Protocols
    • Data Conversion Processes Overhead
    • Introduction to Cisco CallManager
    • Call Admission Control
    • CallManager Deployment Models
    • Compression, Comfort Noise, and VAD
    • POTS and VOIP Dial Peer Config and Troubleshooting
  • MCSE

    MCSE-Microsoft Certified System Engineer- Syllabus

    Accord Soft Offers Best MCSE Training in Chennai. We offer Internships in Real-Life Business Applications of our clients. Students are given Practical Training in the below mentioned syllabus. The syllabus can be customized according to individual needs.

    Managing and Maintaining a Microsoft Windows Server

    • Introduction to the Windows Server Family
    • Managing Basic and Dynamic Disks
    • RAID,Utilities and Quotas
    • Managing Server Hardware
    • Managing and Troubleshooting User Accounts
    • Automating User account Management
    • Managing User Profiles
    • Managing User and Computer Accounts
    • Managing Groups
    • Managing Access to Resources
    • Share Permissions
    • NTFS Permissions
    • Managing Printers
    • IIS
    • Administration and RDP
    • Remote Desktop
    • Assistance
    • Terminal Services
    • Event Viewer and Task Manager
    • Performance Monitoring and Analysis
    • Shadow Copy and Backup
    • Restoring Data and Recovery Tools

    Implementing Managing and Maintaining Microsoft Windows Server Network Infrastructure

    • IP Addressing
    • Custom Sub Netting
    • TCP/IP Configuration
    • IP Tools
    • DHCP Configuration
    • DHCP Management
    • DNS Part 1
    • DNS Part 2
    • Security Templates Part 1
    • Security Part 1
    • IPSec Part 1
    • IP Sec Part 2
    • Kerberos
    • RRAS Part 1
    • RRAS Part 2
    • Internet Access
    • Server Services

    Planning and Maintaining a Microsoft Windows Server Network Infrstructure

    • Operating Systems and Server Roles
    • Security Settings
    • Security Settings and GPO
    • Security Templetes
    • Network Planning and Design
    • TCP/IP Planning
    • Address and Sub Netting
    • IP Configuration
    • Internet Connectivity
    • Routing Static,RIP,and OSPF
    • Remote Access Authentication and Policies
    • WINS,DNS
    • Private Key Infrastructure
    • Wireless Security
    • IPSec
    • Performance,Network Load-Balancing
    • Microsoft Baseline Security Analyzer
    • Software Update Service
    • System Recovery

    Planning,Implementing and Maintaining a Microsoft Windows Server Active Directory Infrastructure

    • Active Directory Introduction
    • Installing Active Directory
    • Functional Levels
    • The Schema
    • User Principal Names and Trusts
    • The Global Catalog and Universal Group Caching
    • Operations Master Roles
    • Replication
    • Sites
    • Active Directory Tools
    • User Authentication
    • Security Groups
    • Organizational Units
    • Group Policy Part 1
    • Group Policy Part 2

    Designing a Microsoft Windows Server Active Directory and Network Infrastructure

    • NT 4.0 Upgrade Part 1
    • NT 4.0 Upgrade Part 2
    • Functional Levels and AD Migration Tools
    • Domain Structure
    • The Global Catalog Sites
    • OU's and Group Policy Objects
    • DNS Part 1
    • DNS Part 2
    • WINS
    • DHCP
    • RRAS
    • VPN

    Implementing and Managing Microsoft Exchange Server 2003 --- MCSE 70-284

    • Introduction to Exchange Server
    • Installing Exchange Server
    • Configuring Exchange Server
    • Securing Exchange Server
    • Managing Recipients
    • Managing Active Directory Integration
    • Managing Public Folders
    • Implementing Outlook Web Access
    • Implementing a Front-End/Back-End Exchange Server Topology
    • Managing Client Connections to Exchange Server
    • Managing Message Routing
    • Managing Data Storage and Hardware Resources
    • Backing Up Exchange server
    • Planning for and Recovering from Disasters
    • Performing Preventive Maintenance

    Installing Configuring and Administering Microsoft Windows XP Professional—MCSE 70-270

    • Installing Microsoft Windows XP Professional
    • Automating an Installation of Microsoft Windows XP Professional
    • Configuring Hardware on a Computer Running Microsoft Windows XP Professional
    • Hard Disk and Removable Media Management
    • Configuring and Managing File Systems
    • Monitoring and Optimizing Performance and Reliability
    • Troubleshooting the Boot Process and Other System Issues
    • Configuring the Desktop Environment
    • Configuring TCP/IP Addressing and Name Resolution
    • Configuring Microsoft Windows XP Professional to Operate in Microsoft Windows Networks
    • Supporting Remote Users
    • Configuring Microsoft Windows XP for Mobile Computing
    • Internet connection sharing and Internet Connection Firewall
    • Internet Explorer Security Configuration
    • Share and NTFS Permission Assignment
    • Implement Monitor and Troubleshoot Security
  • MCTS

    Microsoft Certified Technology Specialist (MCTS)

    Accord Soft Offers Best MCTS Training in Chennai. We offer Internships in Real-Life Business Applications of our clients. Students are given Practical Training in the below mentioned syllabus. The syllabus can be customized according to individual needs.

    MCSE with Microsoft Windows Vista Client Administration (MCSE: 70-620)

    Installation : Hardware Requirements, Editions – Windows Vista Installation – Windows Vista Migration and Windows Easy Transfer – Anytime Upgrade, Troubleshooting Installation – Install and Configure Drivers – Troubleshooting Post Installation Configuration Issues, Windows Aero – Configuring Internet Explorer, Configure and Troubleshoot Parental Controls – Security: Configure and Troubleshoot User Account Control – Security: Windows Defender – Dynamic Security for IE 7 – Security: Configure Security Settings in Windows Firewall – Configuring Networking by using the Network and Sharing Center – Sharing Resources and Securing Wireless Access Points – Remote Access: Remote Desktop – Network Troubleshooting – Configure Windows Mail – Configure Windows Calendar , Meeting Space – Configure Windows Sidebar, Media Applications – Optimizing Windows Vista – Data Protection and Windows Update.

  • MCITP

    MCITP: Server Administrator (Exams 70-640, 70-642, 70-646)

    Accord Soft Offers Best MCITP Training in Chennai. We offer Internships in Real-Life Business Applications of our clients. Students are given Practical Training in the below mentioned syllabus. The syllabus can be customized according to individual needs.

    Exam 70-640: Active Directory Configuring on Server 2008

    Configure zones

    May include but is not limited to: Dynamic DNS (DDNS), Non-dynamic DNS (NDDNS), and Secure Dynamic DNS(SDDNS), Time to Live (TTL), GlobalNames, Primary, Secondary, Active Directory Integrated, Stub, SOA, zone scavenging, forward lookup, reverse lookup

    Configure DNS server settings

    May include but is not limited to: forwarding, root hints, configure zone delegation, round robin, disable recursion, debug logging, server scavenging

    Configure zone transfers and replication

    May include but is not limited to: configure replication scope(forest DNSzone, domainDNSzone), incremental zone transfers, DNS Notify, secure zone transfers, configure name servers, application directory partitions

    Configuring the Active Directory infrastructure

    Configure a forest or a domain

    May include but is not limited to: remove a domain, perform an unattended installation, Active Directory Migration Tool (ADMT) v3 (pruning and grafting), raise forest and domain functional levels, interoperability with previous versions of Active Directory, alternate user principal name (UPN) suffix, forestprep, domainprep.

    Configure trusts

    May include but is not limited to: forest trust, selective authentication versus forest-wide authentication, transitive trust, external trust, shortcut trust, SID filtering

    Configure sites

    May include but is not limited to: create Active Directory subnets, configure site links, configure site link costing, configure sites infrastructure

    Configure Active Directory replication

    May include but is not limited to: Distributed File System, one-way replication, bridgehead server, replication scheduling, configure replication protocols, force intersite replication

    Configure the global catalog

    May include but is not limited to: Universal Group Membership Caching (UGMC), partial attribute set, promote to global catalog

    Configure operations masters

    May include but is not limited to: seize and transfer, backup operations master, operations master placement, Schema Master, extending the schema, time service

    Configuring additional Active Directory server roles

    Configure Active Directory Lightweight Directory Service (AD LDS)

    May include but is not limited to: migration to AD LDS, configure data within AD LDS, configure an authentication server, server core, Windows Server 2008 Hyper-V

    Configure Active Directory Rights Management Service (AD RMS)

    May include but is not limited to: certificate request and installation, self-enrollments, delegation, Active Directory Metadirectory Services (AD MDS), Windows Server virtualization

    Configure the read-only domain controller(RODC)

    May include but is not limited to: unidirectional replication, Administrator role separation, read-only DNS, BitLocker, credential caching, password replication, syskey, Windows Server virtualization.

    Configure Active Directory Federation Services (AD FS)

    May include but is not limited to: install AD FS server role, exchange certificate with AD FS agents, configure trust policies, configure user and group claim mapping, Windows Server virtualization.

    Creating and maintaining Active Directory objects

    Automate creation of Active Directory accounts

    May include but is not limited to: bulk import, configure the UPN, create computer, user, and group accounts (scripts, import, migration), template accounts, contacts, distribution lists

    Maintain Active Directory accounts

    May include but is not limited to: configure group membership, account resets, delegation, AGDLP/AGGUDLP, deny domain local group, local versus domain, Protected Admin, disabling accounts versus deleting accounts, deprovisioning, contacts, creating organizational units (OUs), delegation of control.

    Create and apply Group Policy objects (GPOs)

    May include but is not limited to: enforce, OU hierarchy, block inheritance, and enabling user objects, Group Policy processing priority, WMI, Group Policy filtering, Group Policy loopback

    Configure GPO templates

    May include but is not limited to: user rights, ADMX Central Store, administrative templates, security templates, restricted groups, security options, starter GPOs, shell access policies

    Configure Account Policies

    May include but is not limited to: domain password policy, account lockout policy, fine-grain password policies

    Configure audit policy by using GPOs

    May include but is not limited to: audit logon events, audit account logon events, audit policy change, audit access privilege use, audit directory service access, audit object access

    Maintaining the Active Directory environment

    Configure backup and recovery

    May include but is not limited to: using Windows Server Backup, backup files and system state data to media, backup and restore by using removable media, perform an authoritative or non-authoritative Active Directory restore, linked value replication, Directory Services Recovery Mode (DSRM) (reset admin password), back up and restore GPOs

    Perform offline maintenance

    May include but is not limited to: offline defragmentation and compaction, Restartable Active Directory, Active Directory database storage allocation

    Monitor Active Directory

    May include but is not limited to: Network Monitor, Task Manager, Event Viewer, ReplMon, RepAdmin, Windows System Resource Manager, Reliability and Performance Monitor, Server Performance Advisor, RSOP

    Configuring Active Directory Certificate Services

    Install Active Directory Certificate Services

    May include but is not limited to: standalone versus enterprise, CA hierarchies—root versus subordinate, certificate requests, certificate practice statement

    Configure CA server settings

    May include but is not limited to: key archival, certificate database backup and restore, assigning administration roles

    Manage certificate templates

    May include but is not limited to: certificate template types, securing template permissions, managing different certificate template versions, key recovery agent

    Manage enrollments

    May include but is not limited to: network device enrollment service (NDES), autoenrollment, Web enrollment, smart card enrollment, creating enrollment agents

    Manage certificate revocations

    May include but is not limited to: configure Online Responders, Certificate Revocation List (CRL), CRL Distribution Point (CDP), Authority Information Access (AIA)

    Exam 70-640: Active Directory Configuring on Server 2008

    Configuring IP Addressing and Services

    Configure IPv4 and IPv6 addressing. May include but is not limited to: configure IP options, subnetting, supernetting, alternative configuration Configure Dynamic Host Configuration Protocol (DHCP). May include but is not limited to: DHCP options, creating new options, PXE boot, default user profiles, DHCP relay agents, exclusions, authorize server in Active Directory, scopes, server core, Windows Server Hyper-V Configure routing. May include but is not limited to: static routing, persistent routing, Routing Internet Protocol (RIP), Open Shortest Path First (OSPF) Configure IPsec. May include but is not limited to: create IPsec policy, IPsec Authentication Header (AH), IPsec Encapsulating Security Payload (ESP)

    Configuring Name Resolution

    Configure a Domain Name System (DNS) server. May include but is not limited to: conditional forwarding, external forwarders, root hints, cache-only, server core, WINS and DNS integration, Windows Server virtualization

    Configure DNS zones. May include but is not limited to: DNS Refresh no-refresh, intervals, DNS listserv address (NSLOOKUP), primary/secondary zones, Active Directory integration, Dynamic Domain Name System (DDNS), GlobalNames, SOA refresh

    Configure DNS records. May include but is not limited to: record types, host, pointer, MX, SRV, NS, dynamic updates, Time to Live (TTL)

    Configure DNS replication. May include but is not limited to: DNS secondary zones, DNS stub zones, DNS scavenging interval, replication scope

    Configure name resolution for client computers. May include but is not limited to: DNS and WINS integration, configuring HOSTS file, LMHOSTS, node type, Link-Local

    Multicast Name Resolution (LLMNR), broadcasting, resolver cache, DNS Server list, Suffix Search order, manage client settings by using group policy

    Configuring File and Print Services

    Configure a file server. May include but is not limited to: file share publishing, Offline Files, share permissions, NTFS permissions, encrypting file system (EFS)Configure Distributed File System (DFS). May include but is not limited to: DFS namespace, DFS configuration and application, creating and configuring targets, DFS replication

    Configure shadow copy services. May include but is not limited to: recover previous versions, set schedule, set storage locations

    Configure backup and restore. May include but is not limited to: backup types, backup schedules, managing remotely, restoring data

    Manage disk quotas. May include but is not limited to: quota by volume or quota by user, quota entries, quota templates

    Configure and monitor print services. May include but is not limited to: printer share, publish printers to Active Directory, printer permissions, deploy printer connections, install printer drivers, export and import print queues and printer settings, add counters to Reliability and Performance Monitor to monitor print servers, print pooling, print priority

    Monitoring and Managing a Network Infrastructure

    Configure Windows Server Update Services (WSUS) server settings. May include but is not limited to: update type selection, client settings, Group Policy object (GPO), client targeting, software updates, test and approval, disconnected networks

    Capture performance data. May include but is not limited to: Data Collector Sets, Performance Monitor, Reliability Monitor, monitoring System Stability Index

    Monitor event logs. May include but is not limited to: custom views, application and services logs, subscriptions, DNS log

    Gather network data. May include but is not limited to: Simple Network Management Protocol (SNMP), Baseline Security Analyzer, Network Monitor

    Exam 70-646: Server 2008 Administration

    Planning for Server Deployment

    Plan server installations and upgrades. May include but is not limited to: Windows Server 2008 edition selection, rollback planning, Bitlocker implementation requirements

    Plan for automated server deployment. May include but is not limited to: standard server image, automation and scheduling of server deployments

    Plan infrastructure services server roles. May include but is not limited to: address assignment, name resolution, network access control, directory services, application services, certificate services

    Plan application servers and services. May include but is not limited to: virtualization server planning, availability, resilience, and accessibility

    Plan file and print server roles. May include but is not limited to: access permissions, storage quotas, replication, indexing, file storage policy, availability, printer publishing

    Planning for Server Management

    Plan server management strategies. May include but is not limited to: remote administration, remote desktop, server management technologies, Server Manager and ServerManagerCMD, delegation policies and procedures

    Plan for delegated administration. May include but is not limited to: delegate authority, delegate Active Directory objects, application management

    Plan and implement group policy strategy. May include but is not limited to: GPO management, GPO backup and recovery, group policy troubleshooting, group policy planning

    Monitoring and Maintaining Servers

    Implement patch management strategy. May include but is not limited to: operating system patch level maintenance, Windows Server Update Services (WSUS), application patch level maintenance

    Monitor servers for performance evaluation and optimization. May include but is not limited to: server and service monitoring, optimization, event management, trending and baseline analysis

    Monitor and maintain security and policies. May include but is not limited to: remote access, monitor and maintain NPAS, network access, server security, firewall rules and policies, authentication and authorization, data security, auditing

    Planning for Server Management

    Plan server management strategies. May include but is not limited to: remote administration, remote desktop, server management technologies, Server Manager and ServerManagerCMD, delegation policies and procedures

    Plan for delegated administration. May include but is not limited to: delegate authority, delegate Active Directory objects, application management

    Plan and implement group policy strategy. May include but is not limited to: GPO management, GPO backup and recovery, group policy troubleshooting, group policy planning

    Planning Application and Data Provisioning

    Provision applications. May include but is not limited to: presentation virtualization, terminal server infrastructure, resource allocation, application virtualization alternatives, application deployment, System Center Configuration Manager

    Provision data. May include but is not limited to: shared resources, offline data access

    Planning for Business Continuity and High Availability

    Plan storage. May include but is not limited to: storage solutions, storage management

    Plan high availability. May include but is not limited to: service redundancy, service availability

    Plan for backup and recovery. May include but is not limited to: data recovery strategy, server recovery strategy, directory service recovery strategy, object level recovery

    MCITP: Enterprise Administrator (Exams 70-640, 70-642, 70-643, 70-647 & 70-620)

    Exam 70-643: Applications Infrastructure, Configuring on Server 2008

    Deploying Servers

    Deploy images by using Windows Deployment Services. May include but is not limited to: Install from media (IFM), configure Windows Deployment Services, capture Windows Deployment Services images, deploy Windows Deployment Services images, server core

    Configure Windows Server Hyper-V and virtual machines

    May include but is not limited to: virtual networking, virtualization hardware requirements, Virtual Hard Disks, migrate from physical to virtual, VM additions, backup, optimization, server core

    Configure high availability

    May include but is not limited to: failover clustering, Network Load Balancing, hardware redundancy

    Configure storage

    May include but is not limited to: RAID types, Virtual Disk Specification (VDS) API, Network Attached Storage, iSCSI and Fibre Channel storage area networks, mount points

    Configuring Terminal Services

    Configure Windows Server 2008 Terminal Services RemoteApp (TS RemoteApp). May include but is not limited to: Configuring Terminal Services Web Access, configuring Terminal Services Remote Desktop Web Connection

    Configure Terminal Services Gateway

    May include but is not limited to: certificate configuration, Terminal Services Gateway Manager (TS Gateway Manager), specifying resources that users can access through TS Gateway by using Terminal Services resource authorization policy (TS RAP) and Terminal Services connection authorization policy (TS CAP), Terminal Services group policy

    Configure Terminal Services load balancing

    May include but is not limited to: Terminal Services Session Broker redirection modes, DNS registration, setting through group policy

    Configure and monitor Terminal Services resources

    May include but is not limited to: allocate resources by using Windows Server Resource Manager, configure application logging

    Configure Terminal Services licensing

    May include but is not limited to: deploy licensing server, connectivity between terminal servers and Terminal Services licensing server, recovering Terminal Services licensing server, managing Terminal Services client access licenses (TS CALs)

    Configure Terminal Services client connections

    May include but is not limited to: connecting local devices and resources to a session, Terminal Services profiles, Terminal Services home folders, Remote Desktop Connection (RDC), single sign-on, Remote Desktop Snap-In, MSTSC.exe

    Configure Terminal Services server options

    May include but is not limited to: logoff, disconnect, reset, remote control, monitor, Remote Desktop Protocol (RDP) permissions, connection limits, session time limits, managing by using GPOs, viewing processes, session permissions, display data prioritization

    Configuring a Web Services Infrastructure

    Configure Web applications.

    May include but is not limited to: directory-dependent, publishing, URL-specified configuration, Microsoft .NET components, for example, .NET and .aspx, configure application pools

    Manage Web sites

    May include but is not limited to: migrate sites and Web applications, publish IIS Web sites, configure virtual directories

    Configure a File Transfer Protocol (FTP) server

    May include but is not limited to: configure for extranet users, configure permissions

    Configure Simple Mail Transfer Protocol (SMTP)

    May include but is not limited to: setting up smart hosts, configuring size limitations, setting up security and authentication to the delivering server, creating proper service accounts, authentication, SMTP relay

    Manage Internet Information Services (IIS)

    May include but is not limited to: Web site content backup and restore, IIS configuration backup, monitor IIS, configure logging, delegation of administrative rights

    Configure SSL security

    May include but is not limited to: configure certificates, requesting SSL certificate, renewing SSL certificate, exporting and importing certificates

    Configure Web site authentication and permissions

    May include but is not limited to: configure site permissions and authentication, configure application permissions, client certificate mappings

    Configuring a Network Application Services

    Configure Windows Media server

    May include but is not limited to: on-demand replication, configure time-sensitive content, caching and proxy

    Configuring a Network Application Services

    Configure Windows Media server

    May include but is not limited to: on-demand replication, configure time-sensitive content, caching and proxy

    Configure Digital Rights Management (DRM)

    May include but is not limited to: encryption, sharing business rules, configuring license delivery, configuring policy templates

    Configure Microsoft Windows SharePoint Services server options

    May include but is not limited to: site permissions, backup, antivirus, configuring Windows SharePoint Services service accounts

    Configure Windows SharePoint Services e-mail integration

    May include but is not limited to: configuring a document library to receive e-mail, configuring incoming versus outgoing e-mail

    Exam 70-647: Server 2008 Enterprise Administrator

    Planning network and application services

    Plan for name resolution and IP addressing. May include but is not limited to: internal and external naming strategy, naming resolution support for legacy clients, naming resolution for directory services, IP addressing scheme, TCP/IP version coexistence

    Design for network access. May include but is not limited to: network access policies, remote access strategy, perimeter networks, server and domain isolation

    Plan for application delivery. May include but is not limited to: application virtualization, presentation virtualization, locally installed software, Web-based applications

    Plan for Terminal Services. May include but is not limited to: Terminal Services licensing, Terminal Services infrastructure

    Designing core identity and access management components (25 percent)

    Design Active Directory forests and domains. May include but is not limited to: forest structure, forest and domain functional levels, intra-organizational authorization and authentication, schema modifications

    Design the Active Directory physical topology. May include but is not limited to: placement of servers, site and replication topology, printer location policies

    Design the Active Directory administrative model. May include but is not limited to: delegation, group strategy, compliance auditing, group administration, organizational structure

    Design the enterprise-level group policy strategy. May include but is not limited to: group policy hierarchy and scope filtering, control device installation, authentication and authorization

    Designing support identity and access management components

    Plan for domain or forest migration, upgrade, and restructuring. May include but is not limited to: cross-forest authentication, backward compatibility, object migration, migration planning, implementation planning, environment preparation,Design the branch office deployment. May include but is not limited to: authentication strategy, server security

    Design and implement public key infrastructure. May include but is not limited to: certificate services, PKI operations and maintenance, certificate life cycle management

    Plan for interoperability. May include but is not limited to: inter-organizational authorization and authentication, application authentication interoperability, cross-platform interoperability

    Designing for business continuity and data availability

    Plan for business continuity. May include but is not limited to: service availability, directory service recovery

    Design for software updates and compliance management. May include but is not limited to: patch management and patch management compliance, Microsoft Update and Windows Update, security baselines, system health models

    Design the operating system virtualization strategy. May include but is not limited to: server consolidation, application compatibility, virtualization management, placement of servers

    Design for data management and data access. May include but is not limited to: data security, data accessibility and redundancy, data collaboration

    Exam 70-620: Configuring Microsoft Windows Vista Client

    • Installing and upgrading Windows Vista
    • Identify hardware requirements.
    • Perform a clean installation.
    • Upgrade to Windows Vista from previous versions of Windows.
    • Upgrade from one edition of Windows Vista to another edition.
    • Troubleshoot Windows Vista installation issues.
    • Install and configure Windows Vista drivers.
    • Installing and upgrading Windows Vista

    Configuring and troubleshooting Post-installation system settings

    • Troubleshoot post-installation configuration issues.
    • Configure and troubleshoot Windows Aero.
    • Configure and troubleshoot parental controls.
    • Configure Microsoft Internet Explorer

    Configuring Windows security features

    • Configure and troubleshoot User Account Control.
    • Configure Windows Defender.
    • Configure Dynamic Security for Microsoft Internet Explorer 7.
    • Configure security settings in Windows Firewall

    Configuring network connectivity

    • Configure and troubleshoot User Account Control.
    • Configuring networking by using the Network and Sharing Center.
    • Troubleshoot connectivity issues.
    • Configure remote access.

    Configuring applications included with Windows Vista

    • Configure and troubleshoot media applications.
    • Configure Windows Mail.
    • Configure Windows Meeting Space.
    • Configure Windows Calendar.
    • Configure Windows Fax and Scan.
    • Configure Windows Sidebar.

    Maintaining and optimizing systems that run Windows Vista

    • Troubleshoot performance issues.
    • Troubleshoot reliability issues by using built-in diagnostic tools.
    • Configure Windows Update.
    • Configure data protection.

    Configuring and troubleshooting mobile computing

    • Configure mobile display settings.
    • Configure mobile devices.
    • Configure Tablet PC software.
    • Configure power options.
  • A+/N+/S+

    Microsoft Certified Technology Specialist (MCTS)

    Accord Soft Offers Best A+/N+/S+ Training in Chennai. We offer Internships in Real-Life Business Applications of our clients. Students are given Practical Training in the below mentioned syllabus. The syllabus can be customized according to individual needs.

    Comptia A+

    Introduction to Computers

    A Brief History of Computers - Desktop Computer System Components and Their Functions - Software and Firmware - Numbering Systems

    Setting Up a Personal Computer

    Install Video Output Devices - Install PS/2 Devices - Install Parallel Devices - Install Serial Devices - Install Game and Sound Devices Install USB Devices - Install FireWire Devices - Connect Wireless Devices

    Installing or Removing Internal Hardware

    Establish an ESD-free Work Area - Install or Remove Adapter Cards - Install a Network Adapter and Cable - Install or Remove IDE Drives - Install or Remove Internal SCSI Drives - Install External SCSI Devices – RAID

    Upgrading System Components

    Add Memory - Upgrade the CPU - Add a CPU - Upgrade the System BIOS - Upgrade the Power Supply - Upgrade the System Board - Decide When to Upgrade

    Supporting Portable Computing Devices

    Connect External Peripherals to a Portable Computer - Install or Remove Portable Computing Device Drives - Install or Remove PCMCIA Cards - Install or Remove Mini-PCI Cards - Install or Add Memory to a Portable Computing Device - Connect PDAs to Computers

    Performing Preventative Maintenance

    Hard Disk Maintenance - Perform Printer Maintenance - Use a UPS - Clean Peripheral Components - Clean Internal System Components - Dispose of Computer Equipment

    Troubleshooting Device Problems

    Correct Monitor Problems - Correct Input Device Problems - Correct Adapter Card and PC Card Problems - Correct Hard Drive Problems - Correct Internal Removable Media Drive Problems - Correct CD or DVD Drive Problems - Correct Printer Problems

    Troubleshooting System Problems

    Correct Network Connection Problems - Correct Modem Problems - Correct Power Problems - Correct Boot Problems - Correct Memory Problems - Correct System Board Problems - Correct Portable System Problems - Diagnose System Problems

    Comptia N+

    Basic Network Theory

    Network Definitions - Network Models - Connectivity - Network Addressing - Signaling Concepts

    Network Connectivity

    The Data Package - Establishing a Connection - Reliable Delivery - Network Connectivity - Noise Control - Building Codes - Connection Devices

    Advanced Network Theory

    The OSI Model - Ethernet - Network Resources - Token Ring/IEEE 802.5 - FDDI - Wireless Networking

    Common Network Protocols

    Families of Protocols - NetBEUI - Bridges and Switches - The TCP/IP Protocol - Building a TCP/IP Network - The TCP/IP Suite

    TCP/IP Services>

    Dynamic Host Configuration Protocol - DNS Name Resolution - NetBIOS Support - SNMP - TCP/IP Utilities - Upper Layer Services: FTP

    Alternate Network Protocols

    Introduction to IPX/SPX - AppleTalk - Introduction to Apple Open Transport - Introduction to IPv6

    Network LAN Infrastructure

    Implement LAN Protocols on a Network - IP Routing - IP Routing Tables - Router Discovery Protocols - Data Movement in a Routed Network - Virtual LANs (VLANs)

    Network WAN Infrastructure

    The WAN Environment - WAN Transmission Technologies - WAN Connectivity Devices - Voice Over Data Services

    Remote Networking

    Remote Networking - Remote Access Protocols - VPN Technologies

    Network Security

    Introduction to Network Security - Virus Protection - Local Security - Network Access - Internet Security

    Disaster Recovery

    The Need for Disaster Recovery - Disaster Recovery Plan - Data Backups - Fault Tolerance

    Advanced Data Storage Techniques

    Enterprise Data Storage - Clustering - Network Attached - Storage - Storage Area Networks

    Network Operating Systems

    Novell NetWare- Microsoft BackOffice - Linux History and Operation - Macintosh

    ITSY 1091 Security+ (1 Month)

    Lesson 1: Security Fundamentals

    Topic 1A:

    • Security Building Blocks
    • Security Goals - The CIA Triad Security Factors - The Four A's
    • Threats
    • Vulnerabilities
    • Access Control Methods Access Control Principles
    • Privilege Management

    Topic 1B:

    • Security Building Blocks
    • Authentication Methods
    • Authentication Factors
    • User Name/Password Authentication
    • Challenge Handshake Authentication Protocol (CHAP)
    • Kerberos
    • Tokens
    • Biometrics
    • Multi-Factor Authentication
    • Mutual Authentication

    Topic 1C:

    • Cryptography Fundamentals
    • Encryption
    • Encryption Algorithms
    • Keys
    • Hashing Encryption
    • Hashing Encryption Algorithms
    • Symmetric Encryption
    • Asymmetric Encryption
    • Cipher Types
    • Symmetric Encryption Algorithms Asymmetric Encryption Algorithms
    • Digital Signatures

    Topic 1D:

    • Security Policy Fundamentals
    • Policies
    • Security Policy Components
    • Security Policy Issues
    • Common Security Policy Types Security Document Categories
    • Documentation Handling Measures

    Lesson2 : Security Threats

    Topic 2A:

    • Social Engineering
    • Social Engineering Attacks
    • Social Engineering Types
    • Hackers, Crackers, and Attackers
    • Attacker Types

    Topic 2B:

    • Software-Based Threats
    • Software Attacks
    • Malicious Code Attacks
    • Types of Malicious Code Default Security Attacks
    • Software Exploitation Attacks
    • Types of Software Exploitation Attacks
    • Misuse of Privilege Attacks
    • Password Attacks
    • Types of Password Attacks
    • Backdoor Attacks

    Topic 2C:

    • Network-based Threats
    • Port Scanning Attacks Eavesdropping Attacks
    • IP Spoofing Attacks
    • Hijacking Attacks
    • Replay Attacks
    • Man-in-the-Middle Attacks
    • Denial of Service (DoS) Attacks
    • Distributed Denial of Service (DDoS) Attacks
    • Types of DoS Attacks Domain Name Kiting
    • DNS and ARP Poisoning

    Topic 2D:

    • Hardware-Based Threats
    • Hardware Attacks
    • Specific Device Vulnerabilities Storage Media Vulnerabilities

    Lesson3 : Hardening Internal Systems and Services

    Topic 3A:

    • Harden Operating Systems
    • System Vulnerabilities
    • System Vulnerability Categories
    • Hardening
    • Security Baselines
    • System Updates
    • Windows Security Policies
    • Patches
    • Windows Auditing
    • Service, NLM, and Daemon Vulnerabilities
    • Security Templates Anti-Virus Software
    • Virtualization Technology

    Topic 3B:

    • Harden Directory Services
    • Directory Services
    • Common Directory Services
    • Lightweight Directory Access Protocol (LDAP)
    • Directory Service Vulnerabilities

    Topic 3C:

    • Harden DHCP Servers
    • Dynamic Host Configuration Protocol (DHCP)
    • DHCP Vulnerabilities

    Topic 3D:

    • Harden File and Print Servers
    • File and Print Server Vulnerabilities
    • The Server Message Block (SMB) Protocol
    • SMB Signing

    Lesson4 : Hardening Internal Systems and Services

    Topic 4A:

    • Secure the IP Infrastructure
    • Sub-netting
    • Network Address Translation (NAT)
    • IP Vulnerabilities
    • Vampire Taps

    Topic 4B:

    • Harden the Network Infrastructure
    • Internetwork Devices
    • Unnecessary Network Protocols
    • Network Access Control (NAC)
    • Firmware Updates
    • Internetwork Device Vulnerabilities
    • Demilitarized Zones (DMZs)
    • Intranets Extranets
    • Virtual LANs (VLANs)
    • Network Media
    • Network Media Vulnerabilities

    Topic 4C:

    • Harden DNS and BIND Servers
    • DNS
    • DNS and BIND Vulnerabilities

    Topic 4D:

    • Harden Web Servers
    • HTTP
    • Web Server Authentication
    • Web Server Authentication Methods
    • Web Server Vulnerabilities

    Topic 4E:

    • Harden File Transfer Protocol (FTP) Servers
    • FTP & FTP Vulnerabilities Secure Shell (SSH) Secure FTP (SFTP)

    Topic 4F:

    • Harden Network News Transfer Protocol(NNTP) Servers NNTP
    • NNTP Vulnerabilities

    Topic 4G:

    • Harden Email Servers
    • Simple Mail Transfer Protocol (SMTP)
    • Email Vulnerabilities
    • Pretty Good Privacy (PGP)
    • Secure Multipurpose Internet Mail Extensions (S/MIME
    • SPAM
    • Anti-SPAM Software

    Topic 4H:

    • Harden Conferencing and Messaging Servers
    • Conferencing and Messaging Vulnerabilities

    Lesson5 : Securing Network Communications

    Topic 5A:

    • Protect Network Traffic with IP Security (IPSec)
    • IPSec
    • IPSec Algorithms
    • IPSec Transport Protocols
    • Internet Key Exchange (IKE) Security Associations (SAs)
    • IPSec Policies
    • Default IPSec Policies
    • IPSec Policy Rules

    Topic 5B:

    • Secure Wireless Traffic
    • Wireless Protocol Standards
    • Wireless Protocol Implementations
    • Wireless Security Protocols
    • Wireless Vulnerabilities

    Topic 5C:

    • Harden a Web Browser
    • Browser Vulnerabilities
    • Internet Explorer Security Settings
    • Mozilla Firefox Security Settings
    • Apple Safari Security Settings
    • Pop-up Blockers
    • Ad Blockers

    Topic 5D:

    • Secure the Network Telephony Infrastructure
    • Telephony Components
    • Telecommunications Vulnerabilities

    Topic 5E:

    • Secure the Remote Access Channel
    • Remote Access Methods
    • Tunneling
    • Virtual Private Networks (VPNs)
    • VPN Protocols
    • VPN Security Protocols
    • Remote Access Vulnerabilities

    Topic 5F:

    • Secure Network Applications
    • Scripting Methods
    • Buffer Overflows
    • Cookies
    • SMTP Open Relays
    • P2P
    • Input Validation

    Lesson6 : Managing Public Key Infrastructure (PKI)

    Topic 6A:

    • Install a Certificate Authority (CA) Hierarchy
    • Digital Certificates
    • Certificate Authentication
    • Single vs. Dual Certificates
    • Public Key Infrastructure (PKI)
    • PKI Components
    • CA Hierarchies (Trust Models)
    • The Root CA
    • Public and Private Roots
    • Subordinate CAs
    • Centralized and Decentralized CA Hierarchies

    Topic 6B:

    • Harden a Certificate Authority
    • Certificate Policies
    • Multiple and Dual Key Pairs
    • The Certificate Life Cycle
    • CA Vulnerabilities

    Topic 6C:

    Back Up a CA

    Topic 6D:

    Restore a CA

    Lesson7 : Managing Certificates

    Topic 7A:

    Enroll Certificates

    The Certificate Enrollment Process

    Topic 7B:

    • Secure Network Traffic by Using Certificates
    • Secure Sockets Layer (SSL)
    • HTTPS
    • Transport Layer Security (TLS)

    Topic 7C:

    Renew Certificates

    Topic 7D:

    • Revoke Certificates
    • Certificate Revocation
    • The Certificate Revocation List (CRL)

    Topic 7E:

    • Back Up Certificates and Private Keys
    • Private Key Protection Methods

    Topic 7F:

    • Restore Certificates and Private Keys
    • Private Key Restoration Methods
    • Private Key Replacement

    Lesson8 : Enforcing Organizational Security Policies

    Topic 8A:

    • Perform Risk Assessment
    • What is Risk?
    • Risk Identification
    • The Risk Analysis Process
    • Risk Types
    • Vulnerability Assessment

    Topic 8B:

    • Enforce Corporate Security Policy Compliance
    • Due Care
    • Due Diligence
    • Due Process

    Topic 8C:

    • Enforce Legal Compliance
    • Legal Requirements
    • Forensic Requirements
    • Human Resources (HR) Policies

    Topic 8D:

    • Enforce Physical Security Compliance
    • Physical Security Vulnerabilities
    • Physical Security Measures
    • Environmental Controls

    Topic 8E:

    • Educate Users
    • The Employee Education Process
    • User Security Responsibilities

    Topic 8F:

    • Plan for Disaster Recovery
    • Business Continuity Plans (BCPs)
    • Disaster Recovery Plans (DRPs) Service Level Agreements (SLAs)
    • Alternate Sites
    • Secure Backups Secure Recovery
    • Backup Storage Locations
    • Single Point of Failure Redundancy Measures

    Topic 8G:

    • Conduct a Security Audit
    • Security Audit Process User Access Monitoring
    • Storage and Retention Policies
    • Group Policies

    Lesson9 :Monitoring the Security Infrastructure

    Topic 9A:

    • Scan for Vulnerabilities
    • The Hacking Process
    • Ethical Hacking
    • Vulnerability Assessment Tools
    • Security Utilities
    • Types of Vulnerability Scans
    • Port Ranges

    Topic 9B:

    • Monitor for Security Anomalies
    • Monitoring Methodologies
    • Network Monitoring Utilities
    • Intrusion Detection Systems (IDSs)
    • Host, Network, and Application-based IDS
    • Passive and Active IDS
    • Signature and Anomaly IDS Analysis
    • Intrusion Prevention Systems (IPS)

    Topic 9C:

    • Set Up a Honeypot
    • Honeypots
    • Types of Honeypots

    Topic 9D:

    • Respond to Security Incidents
    • Incident Response Policies (IRPs)
  • CCSA

    Duration-40 Hours

    Accord Soft Offers Best CCSA Training in Chennai. We offer Internships in Real-Life Business Applications of our clients. Students are given Practical Training in the below mentioned syllabus. The syllabus can be customized according to individual needs.

    SYLLABUS

    Configuring Client Authentication- Configuring LDAP authentication with SmartDirectory-Backing up and restoring a Security Gateway and SmartCenter Server

    Defining a Firewall

    • What is a Firewall?
    • Type of the Firewall (Packet Filtering - Application Layer Gateway (Proxy)- Check Point's Stateful Inspection Technology)

    Check Point Firewall-1 Architecture

    • How Check Point Firewall-1 Works?
    • Check Point Firewall-1 Components and Modules
    • Check Point Firewall-1 Kernel
    • Check Point Firewall-1 Daemon

    Security Policy

    • Security Policy definition
    • SmartDashboard
    • Access control for administrators
    • Creating the Rule Base
    • Implicit and explicit rules
    • Command-line options for the Security Policy

    FireWall-1 Setup and Installation

    • Pre-installation Configuration
    • System Requirement
    • How to install license
    • Install additional firewall module

    Working with the SmartDashboard

    • Masking and disabling rules
    • Uninstalling a Security PolicyI
    • mproving VPN-1/FireWall-1 performance

    SmartDefense

    • Active defense
    • SmartDefense in action
    • SmartDefense Storm Center

    Understanding RuleBase Order

    • What is a RuleBase
    • How to create RuleBase
    • Important of the Rule Base Order

    Implicit and Explicit Rules

    • FW1 Control Connections
    • Outgoing Packets
    • Additional Settings
    • Implicit Drop Rule

    Troubleshooting the Security Policy

    • Maximum number of rules and objects
    • Deleting Administrator accounts
    • Any, Any, Any, Accept Rule not accepting traffic

    Detecting Hacking Method - Spoofing

    • What is Spoofing
    • Anti-Spoofing Configuration
    Advanced Security Policy
    • Masking Rules
    • Disabling Rules
    • Uninstalling a Security Policy
    • Security Policy File
    • Command Line Options for the Security Policy

    Log Management

    • Log Viewer GUI
    • Log Viewer Modes
    • Creating and Selecting Selection Criteria
    • Blocking Connections
    • Block Intruder

    System Status GUI

    • System Status Logon
    • Log Viewer Modes
    • Creating and Selecting Selection Criteria
    • Blocking Connections
    • Block Intruder

    Authentication and Authentication Parameters

    • Understanding Authentication
    • How User Authentication Works
    • Type of Authentication ( User Authentication - Client Authentication - Session Authentication )
    • Authentication Schemes
    • Defining a User Template
    • Defining Users and Groups

    Network Address Translation (NAT)

    • How NAT Works
    • Type of NAT (Static NAT- Hide NAT)
    • Address Resolution Protocol (ARP)
    • NAT Routing
    • Static NAT and Anti-Spoofing
    • Troubleshooting NAT

A CCNA can be the initial step of a successful journey toward a new, highly rewarding, and sustainable career.

The CCNA program was created to provide a solid introduction not only to the Cisco Internetwork Operating System (IOS) and Cisco hardware, but also to internetworking in general, making it helpful to you in areas that are not exclusively Cisco’s.

What Skills Do you need to become a CCNA?

To meet the CCNA certification skill level, you must be able to understand or do the following:

  • Install, configure, and operate LAN, WAN and wireless access services securely as well as troubleshoot and configure small to medium networks for performance.
  • Use the protocols IP, IPV6, EIGRP, RIP, RIPv2 and OSPF as well as understand serial connections, Frame Relay, VPN, cable, DSL, PPPoE, LAN switching, VLANs, VTP, STP, Ethernet, security and access lists.