CCNA Training

CCNA is a professional level course and has a very good scope in the field of network configuration and trouble shooting. CNT Technologies is a best training institute in north India. We provide training by highly expert and experienced trainers.

  • Introduction to Network Devices (Hub,Switch,Router,Firewall)
  • Introduction to OSI Model
  • Ethernet LAN Cabling
  • Basics of ip addresses
  • Cisco Router Hardwae & basic router Administration
  • Cisco Router CLI basic commands
  • Protecting router access with passwords
  • Accessing Cisco router with SDM
  • Cisco router IOS Management
  • Router boot sequence
  • Backup & resore Cisco IOS
  • Backup & restore Configuration files
  • Accessing Cisco router over the network (telnet,ssh)
  • Cisco Discovery Protocol
  • Router connectivity & troubleshooting
  • TCP/IP and DoD refence model
  • IP Addressing
  • Subnetting ,VLSM Design & Summarization
  • IP Routing
  • The IP Routing Process
  • Configuring Static & Default Routing
  • Configuring RIP Routing protocol
  • Configuring EIGRP routing protocol
  • Configuring OSPF routing protocol
  • Verify & troublshooting routing protocols
  • Introduction to cisco catalyst switches
  • Cisco switch basic commands
  • Address learning & forwarding
  • Avoiding loops with spanning tree protocol(STP)
  • Rapid spanning-tree protocol(RSTP)
  • HSRP, VRRP and GLBP
  • Implement port security on switches
  • Configuring vlans
  • Implementing Trunk ports
  • Frame tagging methods
  • Configuring VLAN Trunking protocol (VTP)
  • Inter VLAN routing
  • Configuring Cisco Switches Using CNA
  • Introduction to Network security
  • Types of Security Threats
  • Configuring Access Lists (ACL)
  • Standard & Extendard ACL
  • Advanced ACL (Named, Switch Port, Time-Based ACLs)
  • Network Address Translation (NAT)
  • Need for NAT
  • Configuring Dynamic NAT & PAT
  • Configuring static NAT
  • Introduction to Wireless Technologies and Standards
  • Wireless Topologies and Security Methods
  • Configuring Wireless Internetwork
  • Introdcution to IPV6 addressing
  • Configuring IPV6 In cisco routers
  • Configuring IPV6 routing protocols
  • Using IPV6 in IPV4 networks
  • Introduction to WAN Networks
  • Understanding WAN Term
  • WAN encapsulation types (HDLC,PPP)
  • WAN Connectivity using serial dedicated networks
  • Introduction to frame-relay technologies
  • Implementing frame-relay wan network
  • Introduction to DSL technologies (ADSL,SDSL)
  • Introduction to VPN
  • Configuring IPSEC site-site VPN using SDM

MCSE Training

MCSE provides the Knowledge of Active Directory Domain Services, DNS, Hyper-V, Designing, implementation and administer infrastructures for business solutions based on Windows server platforms.

  • Windows Server 2012 Overview
  • Installation of Windows Server 2012
  • Post-Installation Configuration of Windows Server 2012
  • Overview of Windows Server 2012 Management
  • Introduction to Windows PowerShell
  • Overview of AD DS
  • Overview of Domain Controllers
  • Installing a Domain Controller
  • Managing User Accounts
  • Managing Groups
  • Managing Computer Accounts
  • Delegating Administration
  • Using Command-line Tools for AD DS Administration
  • Using Windows PowerShell for AD DS Administration
  • Performing Bulk Operations with Windows PowerShell
  • Overview of TCP/IP
  • Understanding IPv4 Addressing
  • Subnetting and Supernetting
  • Configuring and Troubleshooting IPv4
  • Overview of the DHCP Server Role
  • Configuring DHCP Scopes
  • Managing a DHCP Database
  • Securing and Monitoring DHCP
  • Name Resolution for Windows Clients and Servers
  • Installing a DNS Server
  • Managing DNS Zones
  • Overview of IPv6
  • IPv6 Addressing
  • Coexistence with IPv4
  • IPv6 Transition Technologies
  • Overview of Storage
  • Managing Disks and Volumes
  • Implementing Storage Spaces
  • Securing Files and Folders
  • Protecting Shared Files and Folders by Using Shadow Copies
  • Configuring Work Folders
  • Configuring Network Printing
  • Overview of Group Policy
  • Group Policy Processing
  • Implementing a Central Store for Administrative Templates
  • Security Overview for Windows Operating Systems
  • Configuring Security Settings
  • Restricting Software
  • Configuring Windows Firewall with Advanced Security
  • Overview of Virtualization Technologies
  • Implementing Hyper-V
  • Managing Virtual Machine Storage
  • Managing Virtual Networks
  • Upgrade & Migrate Window Server 2008

LINUX Training

Linux is a UNIX-base operating system. Its original creator was a Finnish student name Linus Torvalds, although being ‘open source’ it has change a great deal since its original conception. It belongs to nobody, and is free to download and use. Any changes to it are open for all to adopt, and as a result it has developed into a very powerful OS that is rapidly gaining in popularity worldwide, particularly among those seeking an alternative to Windows.

  • An Introduction to Linux and Open Source
  • Linux Usage Basics
  • Browsing the File System
  • Users, Groups and Permissions
  • Using the bash Shell
  • Standard I/O and Pipes
  • Text Processing Tools
  • vim: An Advanced Text Editor
  • Investigating and Managing Processes
  • Basic System Configuration Tools
  • Finding and Processing Files
  • Network Clients
  • Advanced Topics in Users, Groups and Permissions
  • The Linux Filesystem In-Depth
  • Administrative Access
  • Package Management
  • System Services and Security
  • Configure and manage system logging, time syn
  • System Initialization
  • Kernel Monitoring and Configuration
  • Network Configuration
  • Filesystem Administration
  • Additional Storage
  • User Administration
  • File systems for Group Collaboration
  • Centralized User Administration
  • Software RAID
  • Logical Volume Management
  • Virtualization and Automated Installation
  • Troubleshooting with Rescue Mode
  • Course Outline
  • System Performance and Security
  • System Service Access Controls
  • Securing Data
  • Network Resource Access Controls
  • Organizing Networked Systems
  • Network File Sharing Services
  • Web Services
  • Electronic Mail Services
  • Account Management
  • RH300 RHCE Rapid Track Course and RHCE Exam

Cloud Computing

This course aims at an introduction to the advance concepts of Networking and Server for the development, implementation and wide range of Cloud Computing topics providing you with a solid foundation of understanding of the global server.

  • Grasping the Fundamentals
  • Check out Cloud Service Delivery Models
  • Viewing the Cloud Holistically
  • Developing Your Cloud Strategy
  • Seeing the Advantages of the Highly Scaled Data Center
  • Comparing Technology Costs: Cloud versus Traditional Data Center
  • Checking the Cloud's Workload Strategy
  • Managing Data
  • Discovering Private and Hybrid Clouds
  • Seeing Infrastructure as a Service
  • Exploring Platform as a Service
  • Using Software as a Service
  • Understanding Massively Scaled Applications and Business Processes
  • Setting some Standards
  • Managing and Securing Cloud Services
  • Governing the Cloud
  • Virtualization and the Cloud
  • Managing Desktops and Devices in the Cloud
  • Service Oriented Architecture and the Cloud
  • Managing the Cloud Environment
  • Banking on Cloud Economics
  • Starting Your Journey to the Cloud
  • The Part of Tens Ten (Plus One) Swell Cloud Computing Resources Ten Cloud Dos and Don'ts

VMWARE

In the old days data centers were full of physical servers doing nothing or at most running at only 10% capacity, this was a waste of money (power, cooling, support contracts, etc) and space. Companies are always looking to reduce the overall costs and that is were virtualization comes in.

  • Components of the software-defined data center
  • vSphere Client Installation
  • ESXi Description
  • virtual machines, virtual machine hardware, and virtual machine files
  • Create and work with virtual machines and templates
  • vCenter Server architecture
  • Deploy and configure vCenter Server Appliance
  • Manage vCenter Server inventory objects and licenses
  • Describe, create, and manage standard switches
  • Configure virtual switch security and load-balancing policies
  • Create, configure, and manage vSphere distributed switches, connections, and port groups
  • Storage protocols and storage device types
  • Create and manage VMFS and NFS datastores
  • VMware Virtual SAN
  • Virtual Volumes
  • Modify and manage virtual machines
  • vSphere vMotion, Storage and migrations
  • Creating vApps
  • Virtual CPU and memory concepts
  • Configure and manage resource pools
  • Use various tools to monitor resource usage
  • Identify and troubleshoot virtual machine resource issues
  • vRealize Operations Manager for data center monitoring and management
  • vSphere HA architecture, Configuration and management
  • vSphere Fault Tolerance
  • vSphere Replication
  • vSphere back up and data protection
  • Configure and manage a vSphere DRS cluster
  • Install vSphere Update Manager and the vSphere Update Manager plug-in
  • Use host profiles to manage host configuration compliance
  • Scan and remediate hosts
  • Install ESXi
  • Introduce vCenter Server deployment options
  • Describe vCenter Server hardware, software, and database requirements
  • Discuss installation of vCenter Server Appliance and a vCenter Server instance
  • Demonstrate vCenter Server installation

IT SECURITY/ETHICAL HACKING

Information security assessments can be effective for identifying and fixing issues in your enterprise's policies. Expert Kevin Beaver explains the key components of the process.

  • Protocols and Available Vulnerabilities
  • Introduction to Ethical Hacking
  • Internet Threats Available
  • Countermeasures against Cyber Threats
  • Information Gathering Techniques
  • Social Networking and Privacy Issues
  • Google Hacking Hackers Best Friend
  • Firewall and Honeypots
  • Becoming Anonymous on Cyber Space
  • Fake Electronic Mail
  • Email Hacking and Countermeasures
  • Social Engineering / Get Smart in Cyber World
  • Introduction to Cryptography / Encryption
  • Steganography Art of Hiding Secret data
  • Introduction to Virtual Machine Concepts
  • Network and Information Security
  • System Security and Vulnerability Patching
  • Virus and Worms Attacks
  • Introduction to Sniffing and Wireless Security
  • Website Hacking and Countermeasures
  • Cyber Laws in India
  • Underground Hacking World
  • Hacking Communities all around the world
  • A Small Guide to Networking
  • Black and White Box Information Gathering
  • Advance Google Hacking
  • Trojan and RATing Attacks
  • NBinders and Cryptors
  • Firewall Policy implementations at Corporate Level
  • Spamming Attacks
  • Advance Email Hacking Techniques
  • Introduction to Backtrack Operating System R1
  • Protocols Vulnerabilities and Exploiting through Sniffers
  • Steganography Terrorist Love
  • Website Hacking Techniques and Countermeasures
  • Virus - Worm -Zombies in Depth
  • Digital Forensics
  • Buffer Overflow Attacks
  • Be Anonymous in Cyber World VPN and Proxy Servers
  • Hacking Mobile Phone Operating Systems Available
  • Cyber Law in India and Abroad
  • Network Security & Information Security
  • Exploit Writing
  • Exploiting With Metasploit Framework 4.0
  • Session Hijacking with Android Applications
  • Denial of Services Attacks
  • A Close eye on Cryptography and RSA
  • Hacking Home routers and Countermeasures
  • USB Hacking Technique / Switch blades
  • Social Engineering
  • Understanding ATM Security
  • Introduction to Penetration testing
  • Penetration Operating Systems available
  • Installing Backtrack 5 R1 on HDD
  • Virtual Machine Concept and Limitations
  • Networking Basics and Protocol Analyzing
  • Exploring Tools in Backtrack 5 R1
  • Information Gathering Techniques in Depth
  • Infrastructure Fingerprinting Web servers
  • Fingerprinting Framework and Applications
  • Enumerating Resources available
  • Web Server misconfiguration Vulnerabilities
  • Google Hacking
  • Metasploit Framework 4.0
  • Social Engineering Toolkit
  • Vulnerability Assessment VS Penetration testing
  • Finding Vulnerabilities with Nessus Tool
  • Introduction to Nikto
  • Cross Site Scripting Attacks
  • SQL Injection
  • Advance Web Attacks
  • Firewall Implementation and Policy Making
  • Network Security Testing in Depth
  • Browsing anonymously
  • Tunneling for anonymity
  • Cleaning traces
  • Social Engineering types
  • Social Networking Backbone of Social Engineering
  • Cryptography and Password Cracking
  • Buffer Overflow Attacks
  • Introduction to Rootkit
  • Wireless Attacks Penetration Testing