Home » Programs » Job Guaranteed Courses » Server Admin and Cloud Computing
Server Admin and Cloud Computing
Duration: 500 Hrs
387642 Learners Enrolled

About Server Admin and Cloud Computing
Under Server Administration gain skills needed for server installation and configuration, server roles, storage, Active Directory and Group Policy, file, print, web services, remote access, virtualization, application servers, troubleshooting, performance, and reliability. Under cloud computing, master cloud skills to design available, cost-efficient, fault-tolerant, and scalable distributed systems using AWS and Azure global infrastructure. Gain hands-on proficiency in using compute, networking, storage, and database services as well as cloud deployment and management services.
Key Features of Server Admin and Cloud Computing

500 Hrs of online training

LIVE mentoring & Doubt clarification sessions

100+ lab assignments

25 Hrs aptitude and logical reasoning

Interview preparation & Placement assistance

100% Money Back Guarantee

Training Options
Live-Online
Duration: 500 Hrs
Limited Time - Hurry up!
- Live-Online Instructor Led Training
- 100+ lab assignments & Quizzes
- 24/7 Lab access on Rooman Cloud Lab
- Labs Designed & Mentorship support by Industry Experts
- 5 capstone projects
- Live-Online sessions with Industry Experts & Subject Matter Expert from Rooman
- Access to Recorded Session of Live-Online Classes available 24/7
- Industry Recognized Course Completion Certificate
- Interview Preparation & Placement Support
Classroom Based
Duration: 500 Hrs
Limited Time - Hurry up!
- In-Person Classroom based Training conducted by Subject Matter Expert & Facilitated by Technical Mentors
- Flexibility to attend classes at any of our 50+ Centers PAN India
- Hands-on experience at our state-of-the-art Lab
- 100+ lab assignments & Quizzes
- 24/7 Lab access on Rooman Cloud Lab
- Labs Designed & Mentorship support by Industry Experts
- 5 Capstone & 1 real-world project
- Exclusive sessions with Industry & Subject Matter Expert
- Access to Recorded Session of Live-Online Classes available 24/7
- Industry Recognized Course Completion Certificate
- Interview Preparation & Placement Support
- Access to Campus Placement drives
- 1 year access to our LMS
Benefits of Server Admin and Cloud Computing Certification Course

Server/Cloud Administrator
Annual Salary

Career Prospects
- Network Engineer
- Network Admin
- Network analyst
- Network consultant
- Storage Engineer
- Virtualization Engineer
- Cloud network Engineer
- Network Design Engineer
- Azure Developer
- Azure Administrator
- Azure Architect
- AWS Cloud Administrator
- Cloud Professional
- Cloud Architect Professional
- IoT Consultant
- IOT Architect
- VMware Support Engineer
- VMware Architect
- VMware Consultant
- IT Manager
Course Curriculum
Windows Server Administration
- Windows Server 2019 Editions
- Hardware Requirements
- Installation of Windows Server 2019
- Understanding Windows Admin Centre
- Basic Storage devices, Partition Table, File System
- Dynamic Disk and Volumes
- Active Directory Overview
- Workgroup vs Domain Environments
- Active Directory Installation
- Active Directory Objects
- Organizational Units and Containers
- Introduction to Group policy
- Implementing and administering GPOs
- Group Policy scope and Group policy processing
- Implementing administrative templates
- DHCP Overview
- Install and Configure DHCP
- DHCP High Availability
- Overview of DNS
- DNS Components
- DNS Records
- DNS Zones
- NTFS and Share Permissions
- Advanced Permissions
- File Server Resource Manager (FSRM)
- FSRM Quota
- Understanding Storage Pools
- Data Deduplication
- Planning and Deploying Data Deduplication
- Managing DFS Namespace and DFS Replication
- Understanding DFS Namespace
- Understanding DFS Replication
- Understanding Hyper-V
- Hyper-V Installation
- Hyper-V Manager
- Nested Virtualization
- Configuring Virtual Machines
- VM Operating System Installation
- Storage Options
- Virtual Switches
- VM State and Checkpoints
- iSCSI SAN Overview
- iSCSI SAN Implementation
- Understanding Failover Clustering
- Failover Cluster Components
- Configuring Failover Clustering
- Overview of Windows Server Backup
- Hyper-V Backup
- Backup Demo
- VPN Scenarios
- Tunnelling Protocols
- Authentication Protocols
- Remote Access Configuration
- VPN Client
- Monitoring Tools
- Resource Monitor
- Data Collector Sets
- Reliability Monitor
- Event Viewer
- Monitoring using Windows Admin Centre
Red Hat Enterprise Linux
- Introduction to Linux
- UNIX and Linux
- Open Source vs Closed Source
- Linux Distributions
- Linux Kernel, Shell and GUI
- Basic Commands
- File System Hierarchy
- Navigating Paths
- File Management
- Link Files
- Pattern Matching
- Getting Help
- Man, info, pinfo
- Output Redirection
- Pipelines
- Tee
- Vim
- Environment Variables
- Users and Groups
- Switching Users
- Sudo
- Password Aging Policy
- File Permissions
- Special Permissions
- Default File Permissions
- Linux Process States
- Process Management
- Process Priority
- Controlling Jobs
- Logging Users Out
- Monitoring Process Activity
- Service States
- Controlling Services and Daemons
- Secure Shell
- SSH Key Management
- Access Control List
- Log Files
- Syslog Priorities
- Journalctl
- Network Time Protocol
- Network Manager
- IP Address Configuration
- Hostname Config
- Tar and gzip
- Secure Copy
- SFTP
- RSYNC
- Package Management
- Repository Config
- RPM, yum, dnf
- Red Hat Subscription Management
- Mount
- Df, du, fdisk
- Lsblk, blkid, lsof
- Locate and find
- Grep and Echo
- Wildcards and Multipliers
- Bash shell Scripting
- Job Scheduling
- At and Cron
- Systemd Timer
- SELinux
- SELinux Booleans
- SELinux Port Labelling
- Partition Table
- File System
- Partition Management
- Temporary and Permanent Mount
- Swap File System
- Introduction to LVM
- Create a new LVM
- Resize an existing LVM
- Managing Thin-provisioned File system
- Virtual Data Optimizer (VDO)
- NFS Client
- NFS Server
- Automounting
- Boot Process
- Targets Management
- Reset Root Password
- Inspect Boot log
- Early Debug Shell
- Configuring firewall
- Creating Firewall rules
- Installing RHEL
- Troubleshooting Installation
- Installation using Kickstart
- Introduction to Containers
Running Containers Images Using Podman Command
Auto Starting Container Images under Systemd Service
Adding Persistent Storage to Containers Images
AWS Certified Solutions Architect Associate
- Introduction – AWS Certified Solutions Architect Associate
- Creating an AWS Account
- AWS Cloud Overview – Regions & AZ
- IAM Introduction: Users, Groups, Policies
- IAM MFA Overview
- AWS Access Keys, CLI and SDK
- AWS CloudShell
- IAM Roles for AWS Services
- IAM Security Tools
- IAM Best Practices
- IAM Roles and Policies Hands On
- AWS Policy Simulator
- EC2 Instance Connect
- EC2 Instance Roles Demo
- EC2 Instance Purchasing Options
- Spot Instances & Spot Fleet
- Private vs Public vs Elastic IP
- EC2 Placement Groups
- Elastic Network Interfaces (ENI)
- EC2 Hibernate
- EC2 – Advanced Concepts (Nitro, vCPU, Capacity Reservations)
- EBS Overview
- EBS Snapshots
- AMI Overview
- EC2 Instance Store
- EBS Volume Types
- EBS Multi-Attach
- EBS Encryption
- Amazon EFS
- High Availability and Scalability
- Elastic Load Balancing (ELB) Overview
- Classic Load Balancer (CLB)
- Application Load Balancer (ALB)
- Network Load Balancer (NLB)
- Gateway Load Balancer (GWLB)
- Elastic Load Balancer – Sticky Sessions
- Elastic Load Balancer – Cross Zone Load Balancing
- Elastic Load Balancer – SSL Certificates
- Elastic Load Balancer – Connection Draining
- Auto Scaling Groups (ASG) Overview
- High Availability & Scalability
- Amazon RDS Overview
- RDS Read Replicas vs Multi AZ
- RDS Encryption + Security
- Amazon Aurora
- ElastiCache
- Athena Overview
- Choosing the right database
- RDS, Aurora, ElastiCache
- DynamoDB, S3, Athena
- Redshift, Glue, Neptune
- Amazon ElasticSearch is now OpenSearch
- DNS working
- Route 53 Overview
- Route 53 – Registering a domain
- Route 53 – Creating our first records
- Route 53 – EC2 Setup
- Route 53 – TTL
- Route 53 CNAME vs Alias
- Route 53 – Health Checks
- Routing Policy
- Amazon S3
- S3 Buckets and Objects
- S3 Versioning
- S3 Encryption
- S3 Security & Bucket Policies
- S3 Websites
- S3 CORS
- S3 Consistency Model
- S3 MFA Delete
- S3 Default Encryption
- S3 Access Logs
- S3 Replication (Cross Region and Same Region)
- S3 Pre-signed URLs
- S3 Storage Classes + Glacier
- S3 Lifecycle Rules
- S3 Analytics
- S3 Performance
- S3 Select & Glacier Select
- S3 Event Notifications
- S3 Requester Pays
- AWS EC2 Instance Metadata
- AWS SDK Overview
- Beanstalk Overview
- Classic Solutions Architecture Discussions
- CloudFront Overview
- CloudFront with S3 – Hands On
- CloudFront Signed URL / Cookies
- CloudFront Advanced Concepts
- AWS Global Accelerator – Overview
- AWS Global Accelerator – Hands On
- AWS Monitoring
- CloudWatch Metrics
- CloudWatch Logs
- CloudWatch Agent &
- CloudWatch Logs Agent
- CloudWatch Alarms
- EC2 Instance Recovery with CloudWatch Alarms
- AWS CloudWatch Events
- Amazon EventBridge
- CloudTrail Overview
- AWS Config – Overview
- CloudTrail vs CloudWatch vs Config
- AWS Snow Family Overview
- Architecture: Snowball into Glacier
- Amazon FSx
- Storage Gateway Overview
- Amazon FSx File Gateway
- AWS Transfer Family
- Introduction to Messaging
- Amazon SQS – Standard Queues Overview
- SQS – Standard Queue
- Amazon Simple Notification Service (AWS SNS)
- Amazon Kinesis
- Data Ordering for Kinesis vs SQS FIFO
- SQS vs SNS vs Kinesis
- Amazon MQ
- Docker Introduction
- Amazon ECS
- Amazon ECS – Auto Scaling
- Amazon ECS – Rolling Updates
- Amazon ECR
- EKS Overview
- Serverless Introduction
- Lambda Overview
- Lambda Limits
- Amazon DynamoDB
- Amazon DynamoDB – Advanced Features
- API Gateway Overview
- API Gateway Security
- AWS Cognito Overview
- Serverless Application Model (SAM) Overview
- AWS Security
- Encryption 101
- KMS Overview
- KMS Key Rotation
- SSM Parameter Store
- AWS Secrets Manager
- CloudHSM
- Shield – DDoS Protection
- Web Application Firewall (WAF)
- Amazon GuardDuty
- Amazon Inspector
- Macie
Shared Responsibility Model
- CIDR, Private vs Public IP
- VPC Overview
- Subnet Overview
- Internet Gateways & Route Tables
- Bastion Hosts
- NAT Instances
- NAT Gateways
- DNS Resolution Options & Route 53 Private Zones
- NACL & Security Groups
- VPC Reachability Analyzer
- VPC Peering
- VPC Endpoints
- VPC Flow Logs
- Site to Site VPN, Virtual Private Gateway & Customer Gateway
- Direct Connect & Direct Connect Gateway
- AWS PrivateLink – VPC Endpoint Services
- AWS ClassicLink
- Transit Gateway
- VPC Traffic Mirroring
- IPv6 for VPC
- Egress Only Internet Gateway
- Networking Costs in AWS
- Disaster Recovery in AWS
- Database Migration Service (DMS)
- On-Premises Strategies with AWS
- DataSync – Overview
- Transferring Large Datasets into AWS
- AWS Backup
- Other Services Section Introduction
- CICD Introduction
- CloudFormation Intro
- CloudFormation – Extras
- Step Functions & SWF
- EMR
- OpsWorks
- AWS Workspaces
- AppSync
- Cost Explorer
Microsoft Azure Administrator
- Overview of Azure
- Azure Free Account
- NEW – Creating an Azure Free Account
- Concepts in Azure
- Tour of the Azure Portal
- Security Defaults
- The Virtual Machine Service
- Deploying a virtual machine
- Building a Windows virtual machine
- Common issues when deploying a virtual machine
- Connecting to the Virtual Machine
- Installing Internet Information Services
- Costs Associated with the Virtual Machine
- State of the Virtual Machine
- Build a Linux Virtual Machine
- Deploying a web server on the
- Linux virtual machine
- Linux machine – SSH keys
- Adding data disks
- Linux Virtual Machines – Cloud init
- Virtual Machine – Boot Diagnostics
- Virtual Machine – Serial Console
- Virtual Machine – Run command
- Azure Bastion Service
- Redeploying a virtual machine
- Understanding virtual machine images
- Creating a specialized image
- Creating VM’s out of the images
- Resizing a virtual machine
- Server-side encryption – Azure Disk Storage
- Encryption with customer managed keys
- Creating a VM with Premium Disks
- Understanding IOPS and Throughput
- Data Disks Snapshot
- Azure Shared Disks
- Un-managed disks
- Custom Script Extensions
- Availability Sets
- Availability Zones
- Azure Virtual Machine Scale Sets
- Azure Flexible Orchestration Mode
- Proximity Placement Groups
- Azure Web App
- Azure App Service Plans
- Making simple changes to the Web App
- Azure Web App logging
- Azure Web Apps – Deployment Slots
- Azure Web Apps – Autoscaling
- Azure Web App – Virtual Network Integration
- Installing Visual Studio 2022
- Azure Web App – Custom Domains
- Azure Web App – SSL
- Azure App Service Backup
- Introduction to Docker
- Deploying Docker on a virtual machine
- Running the NGINX container on the Linux VM
- The need for an image registry
- Publishing to the Azure Container Registry
- Azure Container Instances
- Primer on Azure Kubernetes
- Deploying an Azure Kubernetes cluster
- Primer on Azure Kubernetes
- Deploying an Azure Kubernetes cluster
- Introduction to Virtual Networks in Azure
- The network interfaces
- The CIDR Notation
- Working with Azure virtual networks
- Attaching a secondary network interface
- Network Security Groups
- The Azure Load Balancer Service
- Virtual Network Peering
- Point-to-Site VPN Connections
- Site to Site VPN Connection
- Azure VPN Gateway – High Availability
- Azure Virtual WAN
- Creating the Azure virtual WAN resource
- Azure ExpressRoute
- Azure Application Gateway
- Open Systems Interconnection Model
- Azure Application Gateway
- Network Watcher
- User Defined Routes
- Azure Firewall
- What is the Domain Name System?
- Routing a domain to a virtual machine
- Local DNS – Setting up the domain
- Azure Private DNS
- Azure Public DNS
- What are storage accounts
- Different types of storage accounts
- Creating an Azure storage account
- Azure Blob service
- Azure Storage Accounts – Different authorization techniques
- Using Azure Storage Explorer
- Using Access keys
- Shared Access Signatures – Blob Level
- Shared Access Signatures – At the Storage Account Level
- Azure Storage Accounts – Stored Access Policy
- Azure Storage Accounts – Active Directory Authentication
- Azure Storage Accounts – Data Redundancy
- Storage Accounts – Access Tiers
- Azure Storage Accounts – Lifecycle policies
- Azure Storage Accounts – Object Replication
- Azure File shares
- Azure File Sync
- AzCopy Tool
- Azure Subscriptions
- What is Azure Active Directory
- Trust between Azure Subscription and Azure AD
- Introduction to Role Based Access Control
- Role-based assignments – Reader Role
- Role-based assignments – Resource group level
- Role-based assignments – Subscription level
- Role-based assignments – Contributor Role
- Role-based assignments – User Access Administrator Role
- Azure AD
- Dynamic Device Groups
- Self-service password reset
- Inviting guest users
- Users – Bulk create and delete
- Multi-Factor Authentication
- Conditional Access Policies
- Administrative Units
- Resource tags
- Moving resources across resource groups
- Azure Policy service
- Quick look at Azure Monitor
- Azure Monitor – Alerts
- Log Analytics Workspace
- Connecting virtual machine to the workspace
- Log Analytics Queries
- Sending custom logs
- Application Insights
- Azure Backup feature
- Azure Virtual Machine – Backup
- Deleting your recovery services vault
- Azure Backup retention
- Azure Backup – MARS agent – Backup
- Azure Backup reports
- Azure Site Recovery
- Azure File share backup – Enabling backup
- Azure File share backup – Trigger backup
- Azure File share backup – Restoring share
- Installing Azure PowerShell
- Quick look at a couple of commands
- Setting up Visual Studio Code
- Running PowerShell scripts in Azure Cloud Shell
- Azure Resource Manager templates
- ARM Template structure
- Azure Storage Account – Building the template
- Azure Storage Account – Deploying the template
- Multiple copies of a resource
- Attaching the Network Security Group
- Parameters – Secure String
- Secure string – Key vault
- Azure Availability Set
- Creating a data disk
- Attaching an existing data disk
- Azure VM – Azure AD Join
Request more information?

Please, fill out the Enquiry Form
Form fields marked with a red asterisk * are required.
Supporting Enterprises Around the Globe
Our programs are designed to give you the skills you need to be successful in your career.

GET IN TOUCH WITH OUR EXPERTS
Let us know your areas of interest so that we can serve you better.
*Refund Policy For Online Courses
At Rooman, we value the trust of our students immensely. If you feel that a course does not meet your expectations, we offer a 7-day money-back guarantee. Just send us a refund request via email within 7 days of purchase and we will refund 100% of your payment, no questions asked!
To claim a refund, kindly follow the below procedure:
- Drop an email on refund@rooman.net with a subject “Online course refund | Course name”. (Please do not forget to send it from the registered email id)
- Give a valid reason for the refund. [for our internal purpose only]
- Ensure that the email is received within seven days of batch start date. [Example: if batch starts on 28 th Oct’20, you should send the refund email on or before 04th Nov’20 midnight]
- Refund amount calculation: 100% refund of what you have paid.
- Refund will be processed within 10 working days of receiving the refund email.