Address: IIHT 5th Floor, 27/3, G T Road(s) Howrah West Bengal-711101
IIHT - Howrah classes are GIMS ACHNP, GIMS, ACHNP course fees.
Aptech Hazra classes are GIMS ACHNP, ACHNP, GIMS course fees.
Address: Ramnagar Benapur Kharagpur West Bengal-721301
Kharagpur Private Industrial Training Institute classes are GIMS ACHNP, GIMS, ACHNP course fees.
First << >> Last
Course content & topics of GIMS ACHNP Training in west-bengal
GIMS ACHNP course content and key topics covered in west-bengal may vary from one training institute to another training provider . However our GIMS ACHNP course training experts west-bengal has identifed the list of topics which helps job oriented course training and most of the course content are focused on GIMS ACHNP placement training course training. The GIMS ACHNP course syllabus covers basic to advanced level course contents which is used by most of GIMS ACHNP training classes in west-bengal.
Module I (ICHNP)
a.PC System Components
b.Storage Devices, Power Supplies and Adapters
d.Laptops and Portable Devices
e.Installing and configuring Printers
f.Operating System Features and Interfaces
g.Installing and configuring Operating Systems
h.Troubleshooting Theory and Preventive Maintenance
i.Troubleshooting Operating systems, Hardware, Printers and Laptops
k.Understanding Network Security Fundamentals
l.Understanding Operational Procedures
m.Installing, Maintaining and Troubleshooting Hardware
n.Installing, Configuring and Troubleshooting Laptops
o.Resolving Printer Problems
p.Operating System Structures and Commands
q.Operating System Utilities and Troubleshooting issues
r.Installing and Troubleshooting Networks
a.Compare the layers of the OSI and TCP/IP models
b.Classify how applications, devices, and protocols relate to the OSI model layers
c.Purpose and properties of IP addressing
d.Purpose and properties of routing and switching
e.TCP and UDP default ports
g.DNS concepts and its components
h.Network troubleshooting methodology
i.Virtual network components
j.Network Installation and Configuration
k.Install and configure routers and switches.
l.Install and configure a wireless network.
m.Purpose and properties of DHCP.
n.Troubleshoot common wireless problems.
o.Troubleshoot common router and switch problems.
p.Plan and implement a basic SOHO network.
q.Network Media and Topologies
r.Categorize standard media types and associated properties.
s.Categorize standard connector types based on network media.
t.Compare and contrast different wireless standards.
u.Categorize WAN technology types and properties.
v.Different network topologies.
w.Troubleshoot common physical connectivity problems.
x.Compare and contrast different LAN technologies.
y.Identify components of wiring distribution.
3.Cisco Routing and Switching
(CCNA – ICND I & ICND II)
a.Basic Networking Concepts & OSI Reference Model
b.Function of Ethernet
d.Wireless Network Technology
e.Ethernet Switch Configuration
g.Routers and Router Configuration
h.Different WAN Technologies
i.Advanced dynamic Routing Protocols
k.Link State Routing Protocol
m.Advanced Switching Technology
n.VLAN and Trunks
o.Access Control List
p.Network Address Translation (NAT)
q.IP version 6
r.Wide Area Network
4.MCSA: Installing & Configuring Windows Server 2012
a.Deploying and Managing Windows Server 2012
b.Introduction to Active Directory Domain Services
c.Managing Active Directory Domain Services Objects
d.Automating Active Directory Domain Services Administration
i.Implementing Local Storage
j.Implementing File and Print Services
k.Implementing Group Policy
l.Securing Windows Servers Using Group Policy Objects
m.Implementing Server Virtualization with Hyper
5.MCSA: Administering Windows Server 2012
a.Implementing a Group Policy Infrastructure
b.Managing User Desktops with Group Policy
c.Managing User and Service Accounts
d.Maintaining Active Directory Domain Services
e.Configuring and Troubleshooting DNS
f.Configuring and Troubleshooting Remote Access
g.Installing, Configuring, and Troubleshooting the Network Policy Server Role
6.Implementing Network Access Protection
a.Optimizing File Services
b.Configuring Encryption and Advanced Auditing
c.Deploying and Maintaining Server Images
d.Deploying and Maintaining Server Images
e.Monitoring Windows Server 2012
7.Red Hat System Administration I (RH 124)
a.Get Started with the GNOME Graphical Desktop
b.Manage Files Graphically with Nautilus
c.Get Help in a Graphical Environment
d.Configure Local Services
e.Manage Physical Storage I
f.Manage Logical Volumes
g.Monitor System Resources
h.Manage System Software
i.Get Started with Bash
j.Get Help in a Textual Environment
k.Establish Network Connectivity
l.Administer Users and Groups
m.Manage Files from the Command Line
n.Secure Linux File Access
o.Administer Remote Systems
p.Configure General Services
q.Manage Physical Storage II
r.Install Linux Graphically
s.Manage Virtual Machines
t.Control the Boot Process
u.Deploy File Sharing Services
v.Secure Network Services
Module 2 ACHNP
1.Red Hat System Administration II (RH135)
a.Automated Installations of Red Hat Enterprise Linux
b.Accessing the Command Line
c.Intermediate Command Line Tools
d.Regular Expressions, Pipelines, and I/O Redirection
e.Network Configuration and Troubleshooting
f.Managing Simple Partitions and Filesystems
g.Managing Flexible Storage with Logical Volumes
h.Access Network File Sharing Services
i.Managing User Accounts
j.Controlling Access to Files
l.Installing and Managing Software
m.Managing Installed Services
n.Analyzing and Storing Logs
p.Tuning and Maintaining the Kernel
q.System Recovery Techniques
2.Red Hat System Administration III (RH 255)
a.Enhance User Security
b.Bash Scripting and Tools
c.File Security with GnuPG
f.Advanced Network Configuration
g.Secure Network Traffic
h.NTP Server Configuration
i.System Monitoring and Logs
j.Centralized and Secure Storage
k.SSL?encapsulated Web Services
l.Web Server Additional Configuration
m.Basic SMTP Configuration
n.Caching?Only DNS Server
o.File Sharing with NFS, CIFS & FTP
p.Troubleshooting Boot Process
3.MCSA: Configuring Advanced Windows Server 2012 Services
a.Implementing Advanced Network Services
b.Implementing Advanced File Services
c.Implementing Dynamic Access Control
d.Implementing Network Load Balancing
e.Implementing Failover Clustering
f.Implementing Failover Clustering with Hyper?V
g.Implementing Disaster Recovery
h.Implementing Distributed Active Directory Domain Services Deployments
i.Implementing Active Directory Domain Services Sites and Replication
j.Implementing Active Directory Certificate Services
k.Implementing Active Directory Rights Management Services
l.Implementing Active Directory Federation Services
4.Implementing Cisco IP Routing (ROUTE)
a.Implement an EIGRP based solution, given a network design and a set of requirements
b.Implement a multi?area OSPF Network, given a network design and a set of requirements
c.Implement an EBGP based solution, given a network design and a set of requirements
d.Implement an IPv6 based solution, given a network design and a set of requirements
e.Implement an IPv4 or IPv6 based redistribution solution, given a network design and a set of requirements
f.Implement Layer 3 Path Control Solution
5.Implementing Cisco IP Switched Networks (SWITCH)
a.Implement High Availability, given a network design and a set of requirements
b.Implement a Security Extension of a Layer 2 solution, given a network design and a set of requirements
c.Implement Switch based Layer 3 services, given a network design and a set of requirements
d.Prepare infrastructure to support advanced services
e.Implement VLAN based solution, given a network design and a set of requirements
6.Troubleshooting and Maintaining Cisco IP Switched Networks (TSHOOT)
a.Maintain and monitor network performance
b.Troubleshoot Multi Protocol system networks
c.Troubleshoot EIGRP, OSPF, EBGP
d.Troubleshoot routing redistribution solution & a DHCP client and server solution
f.Troubleshoot IPv6 routing & IPv6 and IPv4 interoperability
g.Troubleshoot switch?to?switch connectivity for the VLAN based solution
h.Troubleshoot private VLANS
i.Troubleshoot port security & general switch security
j.Troubleshoot VACL and PACL
k.Troubleshoot switch virtual interfaces (SVIs)
7.Troubleshoot switch support of advanced services (i.e., Wireless, VOIP and Video)
a.Troubleshoot a VoIP support solution & a video support solution
b.Troubleshoot Layer 3 Security
c.Troubleshoot configuration issues related to accessing the AAA server for authentication purposes
d.Troubleshoot security issues related to IOS services
a.Introduction to Ethical Hacking
b.Footprinting and Scanning
d.System Hacking and Trojans
e.Denial of Service and Sniffers
f.Session Hijacking and Hacking Web Servers
g.Web Application Vulnerabilities and Web Techniques Based Password Cracking
h.Injection and Hacking Wireless Networks
i.Viruses, Worms and Physical Security
k.Evading IDS and Firewalls
l.Buffer Overflows and Cryptography
n.Exploit Writing and Reverse Engineering
a.Introduction to Checkpoint
b.Installing and Configuring
c.Working With Graphical Interface
e.Applying Network Address Translation
f.User Client and Session Authentication
g.Open Security (OPSEC) and Content Filtering
h.Managing Policies and Logs
i.Tracking and Alerts
j.Tracking and Alerts
10.Exchange Server 2010
a.Install and deploy Exchange Server 2010.
b.Configure Mailbox servers and Mailbox server components.
c.Manage recipient objects.
d.Configure the Client Access server role.
e.Manage message transport.
f.Configure the secure flow of messages between the Exchange Server organization and the Internet.
g.Implement a high availability solution for Mailbox servers and other server roles.
h.Plan and implement backup and restore for the server roles.
i.Plan and configure messaging policy and compliance.
j.Configure Exchange Server permissions and security for internal and external access.
k.Monitor and maintain the messaging system.
l.Transition an Exchange Server 2003 or Exchange Server 2007 organization to Exchange Server 2010.
m.Configure the Unified Messaging server role and Unified Messaging components.
n.Implement High Availability across multiple sites and implement Federated Sharing.
a.Introduction to Information Storage and Management
b.Storage System Environment
c.Data Protection: RAID
d.Intelligent Storage Systems
e.Direct Attached Storage and Introduction to SCSI
f.Storage Area Network
i.Content Addressed Storage
k.Introduction to Business Continuity
l.Backup and Recovery
o.Securing the Storage Infrastructure
p.Managing the Storage Infrastructure
a.Grasping the Fundamentals
b.Discovering the Value of the Cloud for Business
c.Getting Inside the Cloud
d.Developing Your Cloud Strategy
e.Seeing the Advantages of the Highly Scaled Data Center
f.Exploring the Technical Foundation for Scaling Computer Systems
g.Checking the Cloud’s Workload Strategy
i.Discovering Private and Hybrid Clouds
j.Seeing Infrastructure as a Service
k.Exploring Platform as a Service
l.Using Software as a Service
m.Understanding Massively Scaled Applications and Business
o.Setting Some Standards
p.Managing and Securing Cloud Services
q.Governing the Cloud
r.Virtualization and the Cloud
s.Managing Desktops and Devices in the Cloud
t.Service Oriented Architecture and the Cloud
u.Managing the Cloud Environment
v.Banking on Cloud Economics
w.Starting Your Journey to the Cloud
x.Ten (Plus One) Swell Cloud Computing Resources
y.Ten Cloud Dos and Don’ts