Field Technician Networking & Storage

Become a Expert & Specialization in Networking & Storage
100% Placement Assistance | 1000+ Hiring Partners
4.5/5
1436 Learners Enrolled

About Field Technician Networking & Storage

Also called “Service Technician”, the Field Technician provides after sale support services to customers, typically, at their premises.
The individual at work is responsible for attending to customer complaints, installing newly purchased products, troubleshooting system problems and, configuring hardware equipment such as servers, storage and other related networking devices

Minimum Qualifications

Diploma

Course Duration
Course Duration

360 hours

Course Content: Theory & Lab Sessions

Session: 1

  • Introduction to Computer
  • History of computer.
  • Generations of computer.
  • Functions of computer.
  • Advantages and Disadvantages of computer.
  • Hardware, Software and Firmware.

Session: 2

  • Introduction to Windows OS
  • Planning for Installation
  • Methods of OS Installation
  • OS Upgradation & Migration

Lab: 1

  • Bootable Device Creation
  • Installing Windows 10 Client OS
  • Performing Post-Installation Task

Lab: 2

  • Device Drivers Installation
  • Application Software Installation

Session: 3

  • Components need to assemble a computer.
  • Identification of Components.
  • Use of serial and parallel ports.
  • Identification of ports.
  • Identification of add-on cards.
  • Assembling of computer.

Lab: 3

  • Assembling of PC

Session: 4

  • Memory
  • Overview of Computer Memory
  • Types of Memory
  • RAM,ROM & Cache Memory

Session: 5

  • Motherboard & Processor
  • Evolution of
  • Motherboard, BIOS, CMOS
  • Mother Board types.
  • Processor functions
  • Types of Processors
  • Latest Processors Features

Session: 6

  • Storage Devices
  • Hard Disk and SSD
  • Hard Disk Functions and Types
  • Components: Sector, Cluster, Tracks & Cylinder
  • HDD Interfaces and Performance
  • Comparison HDD over SSD

Lab: 4

  • Configuring the Disk Partition
  • Creating, Extending, Shrinking and Deletion of Partition

Session: 7

  • Optical Storage Disks
  • Overview of Optical Storage Devices
  • Layers of Optical Storage Disks
  • Discussion on Sizes, Performance and functions of CD ROM, DVD and Blu-Ray
    Disks

Session: 8

  • Discussion on Windows Performance Monitor Tools
  • Discussion on Event Viewer logs
  • Windows Update Settings
  • Windows Defender Functions

Session: 9

  • Understanding the System Restore Point
  • Introduction to Windows Backup and Restore Feature
  • Discussions on Backup Methods & Recovery Options
  • Understanding about the Data Recovery

Lab: 5

  • System Backup and Restore
  • Data Recovery

Session: 10

  • Understanding the Troubleshooting Mechanism (Diagnosis)
  • Discussion on System Safe Boot Options
  • Understanding about the User Accounts & Passwords Policies
  • Analysing Hardware Issues (Blue-Screen & Black-Screen Error)
  • Detecting and Diagnostics of Computer Hardware Issues

Lab: 6

  • Enabling and Disabling the Accounts, Strong Password Configuration
  • Managing User Accounts: Password Resetting
  • Troubleshooting

Session: 11

  • Introduction to Network
  • Introduction to Network
  • Components required to establish network
  • Types of Network
  • Types of Network Models

Session: 12

  • OSI Reference Model
  • The OSI Reference Model
  • Data Encapsulation
  • Application Layer
  • Presentation Layer
  • Session Layer
  • Transport layer

Session: 13

  • OSI Reference Model Contd.
  • Network Layer
  • Data Link Layer
  • Physical Layer

Session: 14

  • Cables
  • Network Interface Adapter
  • Understanding function
  • Installing drivers and configuring NIC
  • Network cables
  • Types of cable: Co-axial cable & Twisted pairs

Lab: 7

  • LAN Cable Crimping
  • Straight-Through & Cross-Over Cable

Session: 15

  • Cables Cont.,
  • Fibre optic
  • LAN technologies: Ethernet, Token ring &FDDI
  • Network topologies (BUS, STAR, RING, HYBRID etc.)

Session: 16

  • Network Devices
  • Repeaters
  • Hub, Switch, Bridge
  • Router & Firewall

Session: 17

  • TCP/IP Model
  • Application / process layer protocol
  • TCP and UDP header, IP standards function, IP header
  • ICMP, ARP and RARP

Session: 18

  • TCP/IP Model Contd.
  • Network interface layer
  • Ethernet Standards
  • Physical layer specification
  • Frame, Token ring & FDDI
  • Physical layer components

Session: 19

  • IP Addressing
  • Overview of IP Addressing
  • IP Address assignment and Classes
  • Private and Public Addressing
  • Special Addresses APIPA, Loopback

Session: 20

  • IP Addressing Contd.
  • Types of IP Addressing
  • Subnetting: FLSM and VLSM
  • Supernetting

Lab: 8

  • Configuring the Static IP Address with different Subnet Mask
  • Checking the Connectivity

Session: 21

  • TCP / IP utilities
  • Ping
  • Traceroute
  • Ipconfig
  • Netstat, Nbtstat
  • Telnet
  • FTP

Session: 22

  • Discussions on Remote access connection
  • Remote Network Architectures, Remote Access
  • Networking Implementations

Lab: 9

  • RDP Connection to Remote Host
  • Telnet Connection to Remote Host
  • Third-Party Remote Apps (TeamViewer, AnyDesk etc)

Session: 23

  • What is Email? Email-Address
  • Composing and Sending a Mail
  • Email-Attachments
  • Large Attachments & Opening Attachments
  • Receiving a Mail, Replying and Forwarding
  • Organizing your Mail
  • What is Unsolicited Email or Spam?

Session: 24

  • What are Social Networking Websites?
  • Social Media use in other Country
  • Facebook, Twitter, LinkedIn
  • Other useful Websites

Lab: 10

  • Practice on Internet and Email

Session: 25

  • Introduction to Wireless Networking
  • Wireless LAN Standards
  • Understanding WAP
  • SSID and Password Discussions

Lab: 11

  • Installing a Wireless LAN Service
  • Configuring a Wireless Access Point
  • Practice on Wireless Networking.

Session: 26

  • Discussion on Server OS
  • Comparison on Desktop & Server Hardware
  • Introducing Windows Server 2016
  • Planning for Server Installation

Lab: 12

  • Installation of Full GUI Server OS
  • Installation of Server Core
  • Completing Post-Installation Tasks on Server

Session: 27

  • Understanding Local Storage
  • Discussion on Partition Style
  • Comparison on Basic & Dynamic Disk
  • Understanding Volumes in Windows Server 2016

Lab: 13

  • Configuring MBR and GPT Disks
  • Practice on Basic and Dynamic Disks
  • Configuring Volumes in Windows Server 2016

Session: 28

  • Discussion on Windows File System
  • Comparison on FAT, NTFS & ReFS File Systems
  • Understanding Windows Server Virtual Harddisks

Lab: 14

  • Installing File Systems
  • Formatting NTFS, ReFS & FAT File Systems
  • Configuring Virtual Hard Disks

Session: 29

  • Introduction to File Server
  • Understanding file and share access
  • Understanding shares permissions
  • Offline files shares Discussions

Lab: 15

  • Installing the File Server
  • Configuring Shared Folder
  • Configuring file and share access
  • Create and configure shares permissions
  • Configuring offline files

Session: 30

  • Discussion on NTFS permissions
  • NTFS quotas
  • Understanding the Access-Based Enumeration
  • Understanding the Encryption & Compression

Lab: 16

  • Configuring NTFS permissions
  • Configuring NTFS quotas
  • Configuring Access-Based Enumeration
  • Configuring Encryption & Compression

Session: 31

  • Understanding IP Address Assignment Methods
  • Introduction to DHCP Service
  • Working Process of DHCP Service
  • Planning DHCP Server Installation

Lab: 17

  • Installing the DHCP Server
  • Configuring the DHCP Scope
  • Validating the DHCP Implementation

Session: 32

  • Introduction to Windows Name Resolution Techniques
  • Discussion on LMHOST, NETBIOS & LLMNR Technique

Lab: 18

  • Verifying the Name Resolution using different Techniques
  • Enabling & Disabling the LLMNR & NETBIOS Method

Session: 33

  • Introduction to DNS Service
  • DNS Components
  • Discussions
  • DNS Hierarchy
  • DNS Namespace
  • DNS Resolver

Session: 34

  • DNS Resource Records
  • Working Process of DNS Service
  • Discussions on FQDN
  • Understanding about DNS Zones (Primary & Secondary)
  • Understanding Forward & Reverse Lookup Zone

Lab: 19

  • Installing DNS Service
  • Configuring DNS Zones
  • Configuring Forward & Reverse Lookup Zone
  • Validating the Name Resolution using DNS Technique

Session: 35

  • Difference between Workgroup & Domain Model
  • Overview of Active Directory
  • Components of Active Directory
  • Active Directory Partitions

Session: 36

  • Overview of Domain Controller
  • Characteristics of Active Directory
  • Discussion on Active Directory Management Tools
  • Active Directory Users and Computers Snap-In
  • Understanding the Domain Controller Types
  • AD Users and Attributes

Lab: 20

  • Installing Active Directory Role
  • Configuring Primary Domain Controller

Lab: 21

  • Deploying Additional Domain Controller
  • Managing AD User Accounts: Creation,
  • Modification & Deletion of User Accounts
  • Joining Workgroup Machine to ADDS Domain
  • Validating the Centralized Authentication using ADDS

Session: 37

  • Discussion on AD Groups
  • Managing AD Group Types
  • Discussion on Domain Local, Global & Universal Scopes

Lab: 22

  • Creation of AD Groups, Group Types & Scopes
  • Validating the Group Scopes Difference.

Session: 38

  • Importance of AD Computer Objects
  • Necessity of Pre-Creation of Computer Accounts
  • Understanding the Computer Accounts States (Enabled & Disabled)
  • Comparison of AD Group & Organizational Unit

Session: 39

  • Understanding the Offline Domain Joining feature
  • Overview of MMC & Types
  • Necessity of Delegating the Administration Tasks

Lab: 22

  • Creation of ADDS Computer Objects
  • Creation of OU object
  • Enabling & Disabling of Computer Accounts

Lab: 23

  • Performing an Offline Domain Joining
  • Creation of Custom MMC’s
  • Installation of RSAT Tools on Client Machine
  • Delegating the Administrative Tasks.

Session: 40

  • Introduction to Local Policies & Group Policy
  • Comparing Local Policies with Group Policy
  • Discussions on Group Policy Setting Types
  • Group Policy Settings States and the Update Interval

Lab: 24

  • Configuring Local Policies
  • Configuring basic Group Policies

Session: 41

  • Introduction to File Server Resource Manager
  • Understanding the Quota Management
  • Understanding the File Screening

Lab: 25

  • Installing FSRM Role
  • Configuring Quota Management & File Screening

Session: 42

  • Overview of Backups
  • Types of Backups
  • Different Backup Items in Windows Server 2016
  • Understanding the System State Backup

Session: 43

  • Understanding the Bare Metal Recovery
  • File and Folders Backup and System Reserved Backup Options
  • Importance of Backup Recovery Points
  • Windows Server Backup Snap-In

Lab: 26

  • Installing Windows Server Backup feature
  • Performing the Files and Folders Backup in Windows Server 2016

Lab: 27

  • Performing Active Directory Backup & Restore using System State Backup

Session: 44

  • Introduction to Windows Server Firewall
  • Understanding the Inbound & Outbound Firewall Rules
  • Firewall Port and Protocol Rules necessity

Session: 45

  • Understanding the Account Lockout Policies
  • Discussion on Account Password Policies
  • Fine Grained Password Policies
  • Comparing the Local Password and Lockout Policies with Group Policy

Session: 46

  • Importance of Windows Server OS
  • Understanding the Server Manager & Dashboard Options
  • Windows Server 2016 Performance Monitor
  • Discussions on Resource Utilization and Event Logs

Session: 47

  • Introduction to RHEL OS
  • Understanding Red Hat Enterprise Linux Server Variants and Add-Ons
  • Planning for RHEL Installation
  • Discussions on Bash Shell and Kernel

Lab: 28

  • Performing RHEL Server Manual Installation

Session: 48

  • Getting Help in Red Hat Enterprise Linux
  • Reading Documentation Using Man Command
  • Reading Documentation Using Info Command
  • Getting Help from Red Hat
  • Viewing and Printing Help Documentation

Session: 49

  • Accessing the Command-Line
  • Basic Shell Skills
  • Understanding the Shell Environment
  • Finding the Help

Session: 50

  • Working with File System Hierarchy
  • Managing Files
  • Using Links
  • Working with Archives and Compressed Files
  • Editing the Files using Vim Tool

Session: 51

  • Using the Common Text File-Related Tools
  • Using Grep to Analyse the Text
  • Working with other useful Text Processing utilities
  • Working on Local Consoles
  • Using SSH and Related Utilities

Lab: 29

  • Working with File System
  • Creating, Viewing & Editing the Files
  • Basic Commands

Lab: 30

  • Creating and Managing User Accounts
  • Creating and Managing Group Accounts

Session: 52

  • Managing File Ownership
  • Managing Basic Permission
  • Managing Advanced Permission

Session: 53

  • Managing ACLs
  • Setting Default Permission with umask
  • Working with user Extended attributes

Lab: 31

  • Configuring Linux File Permission
  • Practice on ACL and Default Permission with umask
  • File Access Permission

Session: 54

  • Networking Fundamentals
  • Managing Network Addresses and Interfaces
  • Validating Network Configuration
  • Configuring Networking with nmcli & nmtui
  • Editing Network Configuration Files
  • Setting up Hostname & Name Resolution

Lab: 32

  • Managing Red Hat Enterprise Linux Networking
  • Practice on Setting up Hostname

Session: 55

  • IPV6 Addressing
  • Introduction to IPV6
  • Benefits of IPV6 over IPv4
  • IPV6 Operations
  • IPv6 Addressing and Format
  • IPv6 address classification
  • Describe IPv6 addresses
  • Global unicast, Multicast, Link local & Unique local
  • Understanding stateless and stateful auto configuration
  • IPV4 and IPV6 migration

Session: 56

  • Assembling & Cabling Cisco Devices
  • Introduction to Routers
  • Router Series and models
  • Router External Components
  • Router Internal Components

Session: 57

  • Operating & Configuring a Cisco IOS Device
  • Introduction to Cisco Internetworking Devices
  • Cisco Hierarchical Network Design Model
  • Core Layer
  • Distribution Layer
  • Access Layer
  • Basic Operation of Cisco IOS Software
  • Cisco IOS Versions
  • Understanding Universal Cisco IOS and its Licensing

Session: 58

  • Keyboard Help in the Switch or Router Command Line Interface
  • Commands to Get Basic Switch or Router Information
  • Configuring a Switch and Router from the Command Line
  • Cisco IOS commands
  • Configuration Modes
  • Interface configuration
  • Line configuration
  • Password configuration

Lab: 33

  • Working with Cisco Basic Commands
  • Practice on Line & Password Configuration

Session: 59

  • Gathering Information about Neighbouring Devices (CDP), LLDP.
  • Configuring Access to Router & Switch using SSH
  • Managing multiple telnet sessions
  • Documenting the Network
  • Diagnostic Utilities: Ping
  • Diagnostic Utilities: Trace route

Lab: 34

  • Practice on Diagnostic Utilities
  • Telnet and SSH Configuration

Session: 60

  • Introduction to IP Routing
  • Understanding Routing Process
  • Discussion on Routing Table

Session: 61

  • Understanding Basic Routing
  • Routing & Routed Protocols
  • Types of IP Routing
  • Understanding the Static & Dynamic Routing
  • Understanding Default IP Routing
  • Configuring Floating Routes

Session: 62

  • Introduction to Routing Protocol Overview
  • Dynamic Routing Protocols
  • Multiple Paths
  • Routing Loops and Avoiding Loops

Session: 63

  • Distance Vector Routing Protocols
  • Introduction to RIP Protocol
  • Understanding RIP Working Process
  • Discussing difference between RIP & RIPv2 Protocol

Session: 64

  • Understanding Router Summarization
  • RIPv2 Authentication
  • RIP Protocol Packets

Lab: 35

  • Configuring Basic Routing
  • Configuring Default Routing

Lab: 36

  • Practice on Static Routing Configuration
  • Dynamic Routing RIP Protocol Configuration
  • RIPv2 Practice

Lab: 37

  • Monitoring RIP
  • Troubleshooting RIP
  • RIPv2 Authentication Practice
  • IPv6 Routing Practice

Session: 65

  • Introduction to Switching
  • Switching Process
  • Switch Modes: Cut- Through, Fragment Free
  • Store and Forward Switching

Session: 66

  • Spanning Tree Protocol (STP)
  • STP Port Roles & Port States
  • Introduction to VLAN’s
  • Benefits and Type of VLAN’s

Session: 67

  • Introduction to Storage Solution
  • DAS, NAS & SAN Storage
  • RAID Types
  • RAID Levels

Session: 68

  • Discussion on Storage Interfaces Such as SCSI, SATA & IDE
  • Storage Protocols: SCSI, iSCSI and FCP
  • NAS Storage: NFS, CIFS

Session: 69

  • IP Storage Networking
  • Fibre Channel over IP
  • Fibre Channel Products and Technology

Session: 70

  • SAN Protocols
  • iSCSI Overview
  • iSCSI Configuration
  • Overview of NVMe Over Fibre Channel

Lab: 38

  • Configuring Software RAID using OS
  • Configuring Hardware RAID on Server Hardware

Lab: 39

  • Practice on Configuring iSCSI Storage

Lab: 40

  • Practice on NAS Storage (NFS & CIFS)

Session: 71

  • LAN-Free Data Movement
  • Server-Free Data Movement
  • Disaster Backup and Recovery
  • Storage Spaces
  • Storage Pooling

Session: 72

  • Introduction to Virtualization
  • Types of Virtualization
  • Introduction to VMWare Virtualization
  • Benefits of VMWare Virtualization

Session: 73

  • Introduction to vSphere and Software defined Data Center
  • Describe the topology of a Physical Data Center
  • Explain the vSphere Virtual Infrastructure
  • Define the Files and Components of Virtual Machines
  • Describe the Benefits of Virtual Machines

Session: 74

  • Explain the similarities and differences between physical & virtual architectures
  • Define the purpose of ESXi
  • Define the purpose of vCenter Server
  • Explain the software-defined data center
  • Describe private, public, and hybrid clouds

Session: 75

  • Introduce virtual machines, virtual machine hardware, and virtual machine files
  • Identify the files that make up a Virtual machine
  • Discuss the latest Virtual machine hardware and its features
  • Describe Virtual machine CPU, memory, disk, and network resource usage

Session: 76

  • Explain the importance of VMware Tools
  • Discuss PCI pass-through, Direct I/O, remote direct memory access, and NVMe
  • Deploy and configure Virtual machines and templates
  • Identify the Virtual machine disk format

Session: 77

  • Describe the Virtual Networks
  • Describe the Standard and Distributed Switches
  • Describe Virtual Switch Connection Types
  • Discuss the new TCP/IP Stack Architecture
  • Use VLAN’s with Standard Switches

Session: 78

  • Introduce storage protocols and storage device types
  • Discuss ESXi hosts using iSCSI, NFS, and Fibre Channel storage
  • Create and manage VMFS and NFS datastores
  • Describe the new features of VMFS
  • Introduce vSAN
  • Describe guest file encryption

Session: 79

  • Introduce virtual CPU and memory concepts
  • Explain Virtual memory reclamation techniques
  • Describe Virtual machine overcommitment and resource competition
  • Configure and manage resource pools
  • Describe methods for optimizing CPU and memory usage
  • Use various tools to monitor resource usage
  • Create and use alarms to report certain conditions or events

Lab: 41

  • Practice on Installing VMWare Workstation
  • Practice on Installing VMware ESXi

Lab: 42

  • Practice on Virtual Machine Creation Using Workstation

Lab: 43

  • Installing the vSphere Client
  • Configuring Virtual Machines on ESXi Host
  • Practice on Virtual Switches

Session: 80

  • Introduction to IT Datacenter Infrastructure
  • Physical Key Elements of Datacenter Infrastructure
  • Introducing the Cloud
  • Introduction to Cloud Computing Technology

Session: 81

  • Benefits of Cloud Computing
  • Characteristics of Cloud Computing
  • Cloud Computing Deployment Models (Private, Public & Hybrid)
  • Cloud Computing Services (IaaS, PaaS & SaaS)
  • Cloud Computing Vendors

Session: 82

  • Introduction to Microsoft Azure Cloud Services
  • Introduction to Amazon Aws Cloud Services
  • Discussion on the Services Offered by Azure & AWS
  • Resource Search on the Azure & AWS Marketplace

Lab: 44

  • Microsoft Azure Account Creation
  • Amazon AWS Account Creation

Session: 83

  • Overview of Microsoft Azure
  • Managing Azure with Azure Portal
  • Overview of Azure Resource Manager
  • Azure Global Infrastructure Regions

lab: 45

  • Practice on Azure Portal

Session: 84

  • Introduction to AWS
  • History of AWS
  • Introduction to AWS Products
  • Regions & Availability Zones
  • AWS Free Usage Tier
  • Introduction to AWS Management Console

Lab: 46

  • Practice on AWS Portal

Session: 85

  • Introduction to Cyber Security
  • Importance of Cyber Security
  • Cyber Security Threats
  • Ransomware & Other Malwares
  • Email Security

Session: 86

  • Physical Security & Mobile Security
  • Security Issues with Phones
  • Ways to Stay Secure
  • Basic Security Practices
  • Basic Computer Log Entries
  • Basic Incident Response Techniques
  • Identify Potential threats to Wireless Networks

Session: 87

  • Identifying the Vulnerabilities of a system
  • Understanding the Vulnerabilities of a system
  • CVE ID, Bugtraq ID
  • Patch Management
  • Identifying the patch for a Vulnerability
  • Downloading the Patch
  • Scanning systems for Malware infections
  • Types of Anti-Malwares: Anti-Virus, HIDS & HIPS

Session: 88

  • Discussion on Mobile Forensics: How to recover deleted data from the mobile
  • Computer Forensics & Network Forensics
  • Understanding the Recovery of the evidences and logs
  • Log monitoring tools
  • Event viewer.

Lab: 47

  • Practice on Lab Tools: Zone Alarm Firewall & XARP

Lab: 48

  • Protect your applications from Antivirus
  • Updates Installation
  • Mobile/HDD Deleted
  • Practice on Log Monitoring tool & Event viewer logs.

Session: 89

  • Cryptography
  • Cryptographic attacks and the tools to ensure data integrity
  • Hashing, symmetric and asymmetric encryption, and certificates
  • Methods of implementing cryptography

Lab: 49

  • Practice on Cryptool

Session: 90

  • Counter Measure Techniques for Network level attacks
  • Types of Firewall
  • Packet Filtering Firewall
  • Circuit-Level Gateway Firewall
  • Application-Level Firewall

Session: 91

  • Stateful Multilayer Inspection Firewall
  • Limitations of a Firewall
  • Introduction to IDS & IPS
  • Placement of IDS in the Network
  • Introduction to UTM & Features
  • Difference between a Firewall & a UTM
  • Placement of UTM in the Network
  • Monitoring attacks using UTM

Lab: 50

  • Practical Labs on IDS, IPS & UTM

Session: 92

  • Introduction & Information Security Threats and Attack Vectors
  • Introduction to Basics of Ethical Hacking
  • Elements of Information Security
  • The Security, Functionality, and Usability Triangle
  • Top Information Security Attack Vectors
  • Latest Security Attacks
  • Information Security Threat Categories & Types of Attacks on a System

Session: 93

  • Hacking Concepts
  • What is Hacking & What is Ethical Hacking?
  • Hacker Classes & Ethical Hacking is Necessity
  • Why Ethical Hacking is Necessary, Scope and Limitations
  • Skills & Technic of an Ethical Hacker

Session: 94

  • Scanning Networks
  • Different Kind of Information Gathering for Different Type Of Victim: Enumeration,
  • System hacking, Malwares and Threats, Sniffing Attacks, Social engineering attack
  • Web, Types of Web: Surface, Deep & Darknet
  • Hitman Services
  • Hacking Services
  • Carding, Ripping & Phishing
  • Penetration Testing & Vulnerability Auditing

Session: 95

  • Overview of important networking terminologies: e.g. IP address, Network topologies
  • OS for different hardware platforms, Vulnerability
  • Different Programming languages for different platforms/purposes.
  • Hashing checksums
  • Php code overview
  • Introduction to Foot Printing

Session: 96

  • Finding a company’s details
  • Finding a company’s domain name
  • Finding a company’s Internal URLs
  • Finding a company’s Public and Restricted URLs
  • Finding a company’s Server details
  • Finding the details of domain registration
  • Finding the range of IP Address
  • Finding the DNS information
  • Finding the services running on the server
  • Finding the location of servers
  • Traceroute analysis
  • Tracking e-mail communications

Lab: 51

  • Practice on Linux Commands
  • Practice on Whatismyipaddress.com
  • Netcraft & Hashcalc

Session: 97

  • Discussion on Network Scanning
  • Objectives of Network scanning
  • Finding the Live hosts in a network
  • Finding Open ports on a server
  • Finding the services on a server
  • OS fingerprinting
  • Server Banner grabbing tools

Session: 98

  • Discussion on Vulnerability Scanning
  • Vulnerability Scanner tools
  • Finding more details about a vulnerability
  • Understanding Proxy Server and Working Process
  • Types of Proxy Servers, finding of Proxy servers
  • Why do Hackers use Proxy servers?
  • Discussion on TOR Network
  • Why hackers prefer to use TOR network?

Session: 99

  • Understanding Enumeration: SNMP, SMTP & DNS Enumeration
  • Introduction to Sniffing and Sniffers
  • Sniffer Working Process, Types of Sniffing (Active & Passive)
  • Promiscuous Mode
  • ARP, MAC/CAM Table
  • MAC Spoofing works
  • How to Defend against Sniffers in Network
  • Introduction to Denial of Service & DOS Attack
  • DDOS attack, Symptoms of a DOS Attack
  • Botnet & DoS attacks
  • Discussion on WPS, WEP, WPA, WPA2 & WPA3

Lab: 52

  • Practice on NMAP tool, Anonymox, TOR Browser
  • Practice on Maltego, DNSDumpster, DOS Attack using LOIC tool
  • Practice on Metasploit framework, Cain N Abel

Course Outline

  • Interact with the customer prior to visit
  • Understand customer’s requirements on visit or prior to visit
  • Suggest possible solutions
  • Complete the documentation
  • Achieve productivity and quality as per company”s norms
  • Understand the installation requirement and install the hardware
  • Configure and setup the network, servers and storage system
  • Check system functionality
  • Set up the software
  • Complete the installation task and report
  • Interact with customer
  • Interact with superior
  • Achieve productivity and quality as per company”s norms
  • Recognizing of OSI model
  • Recognizing of TCP/IP model
  • Identify the Network Technologies.
  • Recognize Types of application used
  • Identify the types devices
  • Identify the Protocols used
  • Understanding device functionalities at different layers
  • IP Routing Static and dynamic routing
  • Remote desktop and remote assistance
  • Switching and Virtual LAN’s
  • List and define criteria involved with network planning and management
  • Analyze the network topology for identifying the issues
  • Using network diagnostic tools
  • Monitoring network activity
  • Computer Security’s
  • Troubleshooting network related issues
  • Disk types, components, and features
  • Removable media types, components, and features
  • To describe the characteristics of internal and external storage devices including RAID
  • To identify differences between connector types
  • Understand the nature of the problems and perform initial diagnosis
  • To resolve common peripheral device issues and errors
  • Utilize your time effectively
  • Use resources correctly and efficiently
  • Treat confidential information correctly
  • Work in line with your organization’s policies and procedures
  • Ensure your work meets the agreed requirements
  • Comply with your organization’s current health, safety
  • Report any identified breaches in health, safety, and security policies
  • Identify and correct any hazards
  • Identifying the problems with Storage
  • Monitoring and reporting storage usage
  • Troubleshooting storage issues
  • Receive and understand the customer complaint registered at customer care
  • Identify system problems on field visit
  • Replace faulty module after diagnosis
  • Coordinate with Remote Technical Helpdesk for assistance
  • Interact with customer
  • Report to Superior
  • Interact with supervisor or superior
  • Coordinate with colleagues
  • Support customers remotely
  • Record, prioritize and categorize service requests/incidents
  • Understand the nature of the problems and perform initial diagnosis
  • Organization’s tools and processes for incident management
  • Monitor problems to keep customers informed
  • Importance of Monitoring, Measuring and Reporting ,CSFs, KPIs, and Activity Metrics , Quantity Based Activity Measures , Service Desk and Process Metricse
  • Service Level Agreement, Timeliness of Response and Resolution data, Problem Management Process Flow (ITIL), Problem Determination, Resolution, tracking, report, control, measures.

Supporting Enterprises Around the Globe

Our programs are designed to give you the skills you need to be successful in your career.

GET IN TOUCH WITH OUR EXPERTS

Let us know your areas of interest so that we can serve you better.

Scroll to Top