m m2
Search Courses  in 

Get COURSE FEES & Discounts from BEST GIMS ACHNP Institutes in Ahmedabad!


My Area


My Name

My Mobile Number

My Email ID

GIMS ACHNP training in Ahmedabad - Top institutes with Course Fees

List of 3+ GIMS ACHNP training institutes located near to you in Ahmedabad on December 5, 2021. Get access to training curriculum, course fees, contact phone numbers and students reviews.


Maninagar, Ahmedabad


training institute
H & B Computer Education at Maninagar - class room	 photo_14102 H & B Computer Education at Maninagar - 	course counseling photo_14101 
Address: 35 2nd floor maninagar Rly station Maninagar,Ahmedabad-380028

Founded in the year by the name of "Tech World" group. Bascom Bridge offers training on international recognized courses like MCITP, CCNA,CCNP, Enterprise Linux. H & B Computer Education classes are GIMS ACHNP, GIMS, ACHNP course fees.
Ahmedabad City, Ahmedabad
No Reviews. Write a Review


training institute

IIHT Ashram Road classes are GIMS ACHNP, ACHNP, GIMS course fees.
First << 1  >> Last

GIMS ACHNP training institutes in ahmedabad - List by Location









Course content & topics of GIMS ACHNP Training in ahmedabad

GIMS ACHNP course content and key topics covered in ahmedabad may vary from one training institute to another training provider . However our GIMS ACHNP course training experts ahmedabad has identifed the list of topics which helps job oriented course training and most of the course content are focused on GIMS ACHNP placement training course training. The GIMS ACHNP course syllabus covers basic to advanced level course contents which is used by most of GIMS ACHNP training classes in ahmedabad.


Module I (ICHNP)

a.PC System Components
b.Storage Devices, Power Supplies and Adapters
c.Display Devices
d.Laptops and Portable Devices
e.Installing and configuring Printers
f.Operating System Features and Interfaces
g.Installing and configuring Operating Systems
h.Troubleshooting Theory and Preventive Maintenance
i.Troubleshooting Operating systems, Hardware, Printers and Laptops
j.Understanding Networking
k.Understanding Network Security Fundamentals
l.Understanding Operational Procedures
m.Installing, Maintaining and Troubleshooting Hardware
n.Installing, Configuring and Troubleshooting Laptops
o.Resolving Printer Problems
p.Operating System Structures and Commands
q.Operating System Utilities and Troubleshooting issues
r.Installing and Troubleshooting Networks
s.System Security

2.Network +
a.Compare the layers of the OSI and TCP/IP models
b.Classify how applications, devices, and protocols relate to the OSI model layers
c.Purpose and properties of IP addressing
d.Purpose and properties of routing and switching
e.TCP and UDP default ports
f.Networking protocols
g.DNS concepts and its components
h.Network troubleshooting methodology
i.Virtual network components
j.Network Installation and Configuration
k.Install and configure routers and switches.
l.Install and configure a wireless network.
m.Purpose and properties of DHCP.
n.Troubleshoot common wireless problems.
o.Troubleshoot common router and switch problems.
p.Plan and implement a basic SOHO network.
q.Network Media and Topologies
r.Categorize standard media types and associated properties.
s.Categorize standard connector types based on network media.
t.Compare and contrast different wireless standards.
u.Categorize WAN technology types and properties.
v.Different network topologies.
w.Troubleshoot common physical connectivity problems.
x.Compare and contrast different LAN technologies.
y.Identify components of wiring distribution.
z.Network Management
aa.Network Security

3.Cisco Routing and Switching
a.Basic Networking Concepts & OSI Reference Model
b.Function of Ethernet
c.Network Security
d.Wireless Network Technology
e.Ethernet Switch Configuration
g.Routers and Router Configuration
h.Different WAN Technologies
i.Advanced dynamic Routing Protocols
j.Route Summarization
k.Link State Routing Protocol
m.Advanced Switching Technology
n.VLAN and Trunks
o.Access Control List
p.Network Address Translation (NAT)
q.IP version 6
r.Wide Area Network
s.Frame Relay

4.MCSA: Installing & Configuring Windows Server 2012
a.Deploying and Managing Windows Server 2012
b.Introduction to Active Directory Domain Services
c.Managing Active Directory Domain Services Objects
d.Automating Active Directory Domain Services Administration
e.Implementing IPv4
f.Implementing DHCP
g.Implementing DNS
h.Implementing IPv6
i.Implementing Local Storage
j.Implementing File and Print Services
k.Implementing Group Policy
l.Securing Windows Servers Using Group Policy Objects
m.Implementing Server Virtualization with Hyper

5.MCSA: Administering Windows Server 2012
a.Implementing a Group Policy Infrastructure
b.Managing User Desktops with Group Policy
c.Managing User and Service Accounts
d.Maintaining Active Directory Domain Services
e.Configuring and Troubleshooting DNS
f.Configuring and Troubleshooting Remote Access
g.Installing, Configuring, and Troubleshooting the Network Policy Server Role

6.Implementing Network Access Protection
a.Optimizing File Services
b.Configuring Encryption and Advanced Auditing
c.Deploying and Maintaining Server Images
d.Deploying and Maintaining Server Images
e.Monitoring Windows Server 2012

7.Red Hat System Administration I (RH 124)
a.Get Started with the GNOME Graphical Desktop
b.Manage Files Graphically with Nautilus
c.Get Help in a Graphical Environment
d.Configure Local Services
e.Manage Physical Storage I
f.Manage Logical Volumes
g.Monitor System Resources
h.Manage System Software
i.Get Started with Bash
j.Get Help in a Textual Environment
k.Establish Network Connectivity
l.Administer Users and Groups
m.Manage Files from the Command Line
n.Secure Linux File Access
o.Administer Remote Systems
p.Configure General Services
q.Manage Physical Storage II
r.Install Linux Graphically
s.Manage Virtual Machines
t.Control the Boot Process
u.Deploy File Sharing Services
v.Secure Network Services

Module 2 ACHNP

1.Red Hat System Administration II (RH135)
a.Automated Installations of Red Hat Enterprise Linux
b.Accessing the Command Line
c.Intermediate Command Line Tools
d.Regular Expressions, Pipelines, and I/O Redirection
e.Network Configuration and Troubleshooting
f.Managing Simple Partitions and Filesystems
g.Managing Flexible Storage with Logical Volumes
h.Access Network File Sharing Services
i.Managing User Accounts
j.Controlling Access to Files
k.Managing SELinux
l.Installing and Managing Software
m.Managing Installed Services
n.Analyzing and Storing Logs
o.Managing Processes
p.Tuning and Maintaining the Kernel
q.System Recovery Techniques

2.Red Hat System Administration III (RH 255)
a.Enhance User Security
b.Bash Scripting and Tools
c.File Security with GnuPG
d.Package Management
e.Network Monitoring
f.Advanced Network Configuration
g.Secure Network Traffic
h.NTP Server Configuration
i.System Monitoring and Logs
j.Centralized and Secure Storage
k.SSL?encapsulated Web Services
l.Web Server Additional Configuration
m.Basic SMTP Configuration
n.Caching?Only DNS Server
o.File Sharing with NFS, CIFS & FTP
p.Troubleshooting Boot Process

3.MCSA: Configuring Advanced Windows Server 2012 Services
a.Implementing Advanced Network Services
b.Implementing Advanced File Services
c.Implementing Dynamic Access Control
d.Implementing Network Load Balancing
e.Implementing Failover Clustering
f.Implementing Failover Clustering with Hyper?V
g.Implementing Disaster Recovery
h.Implementing Distributed Active Directory Domain Services Deployments
i.Implementing Active Directory Domain Services Sites and Replication
j.Implementing Active Directory Certificate Services
k.Implementing Active Directory Rights Management Services
l.Implementing Active Directory Federation Services

4.Implementing Cisco IP Routing (ROUTE)
a.Implement an EIGRP based solution, given a network design and a set of requirements
b.Implement a multi?area OSPF Network, given a network design and a set of requirements
c.Implement an EBGP based solution, given a network design and a set of requirements
d.Implement an IPv6 based solution, given a network design and a set of requirements
e.Implement an IPv4 or IPv6 based redistribution solution, given a network design and a set of requirements
f.Implement Layer 3 Path Control Solution

5.Implementing Cisco IP Switched Networks (SWITCH)
a.Implement High Availability, given a network design and a set of requirements
b.Implement a Security Extension of a Layer 2 solution, given a network design and a set of requirements
c.Implement Switch based Layer 3 services, given a network design and a set of requirements
d.Prepare infrastructure to support advanced services
e.Implement VLAN based solution, given a network design and a set of requirements

6.Troubleshooting and Maintaining Cisco IP Switched Networks (TSHOOT)
a.Maintain and monitor network performance
b.Troubleshoot Multi Protocol system networks
c.Troubleshoot EIGRP, OSPF, EBGP
d.Troubleshoot routing redistribution solution & a DHCP client and server solution
e.Troubleshoot NAT
f.Troubleshoot IPv6 routing & IPv6 and IPv4 interoperability
g.Troubleshoot switch?to?switch connectivity for the VLAN based solution
h.Troubleshoot private VLANS
i.Troubleshoot port security & general switch security
j.Troubleshoot VACL and PACL
k.Troubleshoot switch virtual interfaces (SVIs)

7.Troubleshoot switch support of advanced services (i.e., Wireless, VOIP and Video)
a.Troubleshoot a VoIP support solution & a video support solution
b.Troubleshoot Layer 3 Security
c.Troubleshoot configuration issues related to accessing the AAA server for authentication purposes
d.Troubleshoot security issues related to IOS services

8.Ethical Hacking
a.Introduction to Ethical Hacking
b.Footprinting and Scanning
d.System Hacking and Trojans
e.Denial of Service and Sniffers
f.Session Hijacking and Hacking Web Servers
g.Web Application Vulnerabilities and Web Techniques Based Password Cracking
h.Injection and Hacking Wireless Networks
i.Viruses, Worms and Physical Security
j.Linux Hacking
k.Evading IDS and Firewalls
l.Buffer Overflows and Cryptography
m.Penetrating Testing
n.Exploit Writing and Reverse Engineering

a.Introduction to Checkpoint
b.Installing and Configuring
c.Working With Graphical Interface
d.Using Policy
e.Applying Network Address Translation
f.User Client and Session Authentication
g.Open Security (OPSEC) and Content Filtering
h.Managing Policies and Logs
i.Tracking and Alerts
j.Tracking and Alerts

10.Exchange Server 2010
a.Install and deploy Exchange Server 2010.
b.Configure Mailbox servers and Mailbox server components.
c.Manage recipient objects.
d.Configure the Client Access server role.
e.Manage message transport.
f.Configure the secure flow of messages between the Exchange Server organization and the Internet.
g.Implement a high availability solution for Mailbox servers and other server roles.
h.Plan and implement backup and restore for the server roles.
i.Plan and configure messaging policy and compliance.
j.Configure Exchange Server permissions and security for internal and external access.
k.Monitor and maintain the messaging system.
l.Transition an Exchange Server 2003 or Exchange Server 2007 organization to Exchange Server 2010.
m.Configure the Unified Messaging server role and Unified Messaging components.
n.Implement High Availability across multiple sites and implement Federated Sharing.

11.Storage Fundamentals
a.Introduction to Information Storage and Management
b.Storage System Environment
c.Data Protection: RAID
d.Intelligent Storage Systems
e.Direct Attached Storage and Introduction to SCSI
f.Storage Area Network
g.Network?Attached Storage
i.Content Addressed Storage
j.Storage Virtualization
k.Introduction to Business Continuity
l.Backup and Recovery
m.Local Replication
n.Remote Replication
o.Securing the Storage Infrastructure
p.Managing the Storage Infrastructure

12.Cloud Fundamentals
a.Grasping the Fundamentals
b.Discovering the Value of the Cloud for Business
c.Getting Inside the Cloud
d.Developing Your Cloud Strategy
e.Seeing the Advantages of the Highly Scaled Data Center
f.Exploring the Technical Foundation for Scaling Computer Systems
g.Checking the Cloud’s Workload Strategy
h.Managing Data
i.Discovering Private and Hybrid Clouds
j.Seeing Infrastructure as a Service
k.Exploring Platform as a Service
l.Using Software as a Service
m.Understanding Massively Scaled Applications and Business
o.Setting Some Standards
p.Managing and Securing Cloud Services
q.Governing the Cloud
r.Virtualization and the Cloud
s.Managing Desktops and Devices in the Cloud
t.Service Oriented Architecture and the Cloud
u.Managing the Cloud Environment
v.Banking on Cloud Economics
w.Starting Your Journey to the Cloud
x.Ten (Plus One) Swell Cloud Computing Resources
y.Ten Cloud Dos and Don’ts



High Technologies Solutions - Delhi,Noida,Gurgaon

TrainerDesk Training Jobs


Training course fee & Discounts