Home » Programs » Skilling » Electronics » Field Technician Networking & Storage
Field Technician Networking & Storage
1436 Learners Enrolled

About Field Technician Networking & Storage
Also called “Service Technician”, the Field Technician provides after sale support services to customers, typically, at their premises.
The individual at work is responsible for attending to customer complaints, installing newly purchased products, troubleshooting system problems and, configuring hardware equipment such as servers, storage and other related networking devices

Minimum Qualifications
Diploma
Course Duration
360 hours
Course Content: Theory & Lab Sessions
Session: 1
- Introduction to Computer
- History of computer.
- Generations of computer.
- Functions of computer.
- Advantages and Disadvantages of computer.
- Hardware, Software and Firmware.
Session: 2
- Introduction to Windows OS
- Planning for Installation
- Methods of OS Installation
- OS Upgradation & Migration
Lab: 1
- Bootable Device Creation
- Installing Windows 10 Client OS
- Performing Post-Installation Task
Lab: 2
- Device Drivers Installation
- Application Software Installation
Session: 3
- Components need to assemble a computer.
- Identification of Components.
- Use of serial and parallel ports.
- Identification of ports.
- Identification of add-on cards.
- Assembling of computer.
Lab: 3
- Assembling of PC
Session: 4
- Memory
- Overview of Computer Memory
- Types of Memory
- RAM,ROM & Cache Memory
Session: 5
- Motherboard & Processor
- Evolution of
- Motherboard, BIOS, CMOS
- Mother Board types.
- Processor functions
- Types of Processors
- Latest Processors Features
Session: 6
- Storage Devices
- Hard Disk and SSD
- Hard Disk Functions and Types
- Components: Sector, Cluster, Tracks & Cylinder
- HDD Interfaces and Performance
- Comparison HDD over SSD
Lab: 4
- Configuring the Disk Partition
- Creating, Extending, Shrinking and Deletion of Partition
Session: 7
- Optical Storage Disks
- Overview of Optical Storage Devices
- Layers of Optical Storage Disks
- Discussion on Sizes, Performance and functions of CD ROM, DVD and Blu-Ray
Disks
Session: 8
- Discussion on Windows Performance Monitor Tools
- Discussion on Event Viewer logs
- Windows Update Settings
- Windows Defender Functions
Session: 9
- Understanding the System Restore Point
- Introduction to Windows Backup and Restore Feature
- Discussions on Backup Methods & Recovery Options
- Understanding about the Data Recovery
Lab: 5
- System Backup and Restore
- Data Recovery
Session: 10
- Understanding the Troubleshooting Mechanism (Diagnosis)
- Discussion on System Safe Boot Options
- Understanding about the User Accounts & Passwords Policies
- Analysing Hardware Issues (Blue-Screen & Black-Screen Error)
- Detecting and Diagnostics of Computer Hardware Issues
Lab: 6
- Enabling and Disabling the Accounts, Strong Password Configuration
- Managing User Accounts: Password Resetting
- Troubleshooting
Session: 11
- Introduction to Network
- Introduction to Network
- Components required to establish network
- Types of Network
- Types of Network Models
Session: 12
- OSI Reference Model
- The OSI Reference Model
- Data Encapsulation
- Application Layer
- Presentation Layer
- Session Layer
- Transport layer
Session: 13
- OSI Reference Model Contd.
- Network Layer
- Data Link Layer
- Physical Layer
Session: 14
- Cables
- Network Interface Adapter
- Understanding function
- Installing drivers and configuring NIC
- Network cables
- Types of cable: Co-axial cable & Twisted pairs
Lab: 7
- LAN Cable Crimping
- Straight-Through & Cross-Over Cable
Session: 15
- Cables Cont.,
- Fibre optic
- LAN technologies: Ethernet, Token ring &FDDI
- Network topologies (BUS, STAR, RING, HYBRID etc.)
Session: 16
- Network Devices
- Repeaters
- Hub, Switch, Bridge
- Router & Firewall
Session: 17
- TCP/IP Model
- Application / process layer protocol
- TCP and UDP header, IP standards function, IP header
- ICMP, ARP and RARP
Session: 18
- TCP/IP Model Contd.
- Network interface layer
- Ethernet Standards
- Physical layer specification
- Frame, Token ring & FDDI
- Physical layer components
Session: 19
- IP Addressing
- Overview of IP Addressing
- IP Address assignment and Classes
- Private and Public Addressing
- Special Addresses APIPA, Loopback
Session: 20
- IP Addressing Contd.
- Types of IP Addressing
- Subnetting: FLSM and VLSM
- Supernetting
Lab: 8
- Configuring the Static IP Address with different Subnet Mask
- Checking the Connectivity
Session: 21
- TCP / IP utilities
- Ping
- Traceroute
- Ipconfig
- Netstat, Nbtstat
- Telnet
- FTP
Session: 22
- Discussions on Remote access connection
- Remote Network Architectures, Remote Access
- Networking Implementations
Lab: 9
- RDP Connection to Remote Host
- Telnet Connection to Remote Host
- Third-Party Remote Apps (TeamViewer, AnyDesk etc)
Session: 23
- What is Email? Email-Address
- Composing and Sending a Mail
- Email-Attachments
- Large Attachments & Opening Attachments
- Receiving a Mail, Replying and Forwarding
- Organizing your Mail
- What is Unsolicited Email or Spam?
Session: 24
- What are Social Networking Websites?
- Social Media use in other Country
- Facebook, Twitter, LinkedIn
- Other useful Websites
Lab: 10
- Practice on Internet and Email
Session: 25
- Introduction to Wireless Networking
- Wireless LAN Standards
- Understanding WAP
- SSID and Password Discussions
Lab: 11
- Installing a Wireless LAN Service
- Configuring a Wireless Access Point
- Practice on Wireless Networking.
Session: 26
- Discussion on Server OS
- Comparison on Desktop & Server Hardware
- Introducing Windows Server 2016
- Planning for Server Installation
Lab: 12
- Installation of Full GUI Server OS
- Installation of Server Core
- Completing Post-Installation Tasks on Server
Session: 27
- Understanding Local Storage
- Discussion on Partition Style
- Comparison on Basic & Dynamic Disk
- Understanding Volumes in Windows Server 2016
Lab: 13
- Configuring MBR and GPT Disks
- Practice on Basic and Dynamic Disks
- Configuring Volumes in Windows Server 2016
Session: 28
- Discussion on Windows File System
- Comparison on FAT, NTFS & ReFS File Systems
- Understanding Windows Server Virtual Harddisks
Lab: 14
- Installing File Systems
- Formatting NTFS, ReFS & FAT File Systems
- Configuring Virtual Hard Disks
Session: 29
- Introduction to File Server
- Understanding file and share access
- Understanding shares permissions
- Offline files shares Discussions
Lab: 15
- Installing the File Server
- Configuring Shared Folder
- Configuring file and share access
- Create and configure shares permissions
- Configuring offline files
Session: 30
- Discussion on NTFS permissions
- NTFS quotas
- Understanding the Access-Based Enumeration
- Understanding the Encryption & Compression
Lab: 16
- Configuring NTFS permissions
- Configuring NTFS quotas
- Configuring Access-Based Enumeration
- Configuring Encryption & Compression
Session: 31
- Understanding IP Address Assignment Methods
- Introduction to DHCP Service
- Working Process of DHCP Service
- Planning DHCP Server Installation
Lab: 17
- Installing the DHCP Server
- Configuring the DHCP Scope
- Validating the DHCP Implementation
Session: 32
- Introduction to Windows Name Resolution Techniques
- Discussion on LMHOST, NETBIOS & LLMNR Technique
Lab: 18
- Verifying the Name Resolution using different Techniques
- Enabling & Disabling the LLMNR & NETBIOS Method
Session: 33
- Introduction to DNS Service
- DNS Components
- Discussions
- DNS Hierarchy
- DNS Namespace
- DNS Resolver
Session: 34
- DNS Resource Records
- Working Process of DNS Service
- Discussions on FQDN
- Understanding about DNS Zones (Primary & Secondary)
- Understanding Forward & Reverse Lookup Zone
Lab: 19
- Installing DNS Service
- Configuring DNS Zones
- Configuring Forward & Reverse Lookup Zone
- Validating the Name Resolution using DNS Technique
Session: 35
- Difference between Workgroup & Domain Model
- Overview of Active Directory
- Components of Active Directory
- Active Directory Partitions
Session: 36
- Overview of Domain Controller
- Characteristics of Active Directory
- Discussion on Active Directory Management Tools
- Active Directory Users and Computers Snap-In
- Understanding the Domain Controller Types
- AD Users and Attributes
Lab: 20
- Installing Active Directory Role
- Configuring Primary Domain Controller
Lab: 21
- Deploying Additional Domain Controller
- Managing AD User Accounts: Creation,
- Modification & Deletion of User Accounts
- Joining Workgroup Machine to ADDS Domain
- Validating the Centralized Authentication using ADDS
Session: 37
- Discussion on AD Groups
- Managing AD Group Types
- Discussion on Domain Local, Global & Universal Scopes
Lab: 22
- Creation of AD Groups, Group Types & Scopes
- Validating the Group Scopes Difference.
Session: 38
- Importance of AD Computer Objects
- Necessity of Pre-Creation of Computer Accounts
- Understanding the Computer Accounts States (Enabled & Disabled)
- Comparison of AD Group & Organizational Unit
Session: 39
- Understanding the Offline Domain Joining feature
- Overview of MMC & Types
- Necessity of Delegating the Administration Tasks
Lab: 22
- Creation of ADDS Computer Objects
- Creation of OU object
- Enabling & Disabling of Computer Accounts
Lab: 23
- Performing an Offline Domain Joining
- Creation of Custom MMC’s
- Installation of RSAT Tools on Client Machine
- Delegating the Administrative Tasks.
Session: 40
- Introduction to Local Policies & Group Policy
- Comparing Local Policies with Group Policy
- Discussions on Group Policy Setting Types
- Group Policy Settings States and the Update Interval
Lab: 24
- Configuring Local Policies
- Configuring basic Group Policies
Session: 41
- Introduction to File Server Resource Manager
- Understanding the Quota Management
- Understanding the File Screening
Lab: 25
- Installing FSRM Role
- Configuring Quota Management & File Screening
Session: 42
- Overview of Backups
- Types of Backups
- Different Backup Items in Windows Server 2016
- Understanding the System State Backup
Session: 43
- Understanding the Bare Metal Recovery
- File and Folders Backup and System Reserved Backup Options
- Importance of Backup Recovery Points
- Windows Server Backup Snap-In
Lab: 26
- Installing Windows Server Backup feature
- Performing the Files and Folders Backup in Windows Server 2016
Lab: 27
- Performing Active Directory Backup & Restore using System State Backup
Session: 44
- Introduction to Windows Server Firewall
- Understanding the Inbound & Outbound Firewall Rules
- Firewall Port and Protocol Rules necessity
Session: 45
- Understanding the Account Lockout Policies
- Discussion on Account Password Policies
- Fine Grained Password Policies
- Comparing the Local Password and Lockout Policies with Group Policy
Session: 46
- Importance of Windows Server OS
- Understanding the Server Manager & Dashboard Options
- Windows Server 2016 Performance Monitor
- Discussions on Resource Utilization and Event Logs
Session: 47
- Introduction to RHEL OS
- Understanding Red Hat Enterprise Linux Server Variants and Add-Ons
- Planning for RHEL Installation
- Discussions on Bash Shell and Kernel
Lab: 28
- Performing RHEL Server Manual Installation
Session: 48
- Getting Help in Red Hat Enterprise Linux
- Reading Documentation Using Man Command
- Reading Documentation Using Info Command
- Getting Help from Red Hat
- Viewing and Printing Help Documentation
Session: 49
- Accessing the Command-Line
- Basic Shell Skills
- Understanding the Shell Environment
- Finding the Help
Session: 50
- Working with File System Hierarchy
- Managing Files
- Using Links
- Working with Archives and Compressed Files
- Editing the Files using Vim Tool
Session: 51
- Using the Common Text File-Related Tools
- Using Grep to Analyse the Text
- Working with other useful Text Processing utilities
- Working on Local Consoles
- Using SSH and Related Utilities
Lab: 29
- Working with File System
- Creating, Viewing & Editing the Files
- Basic Commands
Lab: 30
- Creating and Managing User Accounts
- Creating and Managing Group Accounts
Session: 52
- Managing File Ownership
- Managing Basic Permission
- Managing Advanced Permission
Session: 53
- Managing ACLs
- Setting Default Permission with umask
- Working with user Extended attributes
Lab: 31
- Configuring Linux File Permission
- Practice on ACL and Default Permission with umask
- File Access Permission
Session: 54
- Networking Fundamentals
- Managing Network Addresses and Interfaces
- Validating Network Configuration
- Configuring Networking with nmcli & nmtui
- Editing Network Configuration Files
- Setting up Hostname & Name Resolution
Lab: 32
- Managing Red Hat Enterprise Linux Networking
- Practice on Setting up Hostname
Session: 55
- IPV6 Addressing
- Introduction to IPV6
- Benefits of IPV6 over IPv4
- IPV6 Operations
- IPv6 Addressing and Format
- IPv6 address classification
- Describe IPv6 addresses
- Global unicast, Multicast, Link local & Unique local
- Understanding stateless and stateful auto configuration
- IPV4 and IPV6 migration
Session: 56
- Assembling & Cabling Cisco Devices
- Introduction to Routers
- Router Series and models
- Router External Components
- Router Internal Components
Session: 57
- Operating & Configuring a Cisco IOS Device
- Introduction to Cisco Internetworking Devices
- Cisco Hierarchical Network Design Model
- Core Layer
- Distribution Layer
- Access Layer
- Basic Operation of Cisco IOS Software
- Cisco IOS Versions
- Understanding Universal Cisco IOS and its Licensing
Session: 58
- Keyboard Help in the Switch or Router Command Line Interface
- Commands to Get Basic Switch or Router Information
- Configuring a Switch and Router from the Command Line
- Cisco IOS commands
- Configuration Modes
- Interface configuration
- Line configuration
- Password configuration
Lab: 33
- Working with Cisco Basic Commands
- Practice on Line & Password Configuration
Session: 59
- Gathering Information about Neighbouring Devices (CDP), LLDP.
- Configuring Access to Router & Switch using SSH
- Managing multiple telnet sessions
- Documenting the Network
- Diagnostic Utilities: Ping
- Diagnostic Utilities: Trace route
Lab: 34
- Practice on Diagnostic Utilities
- Telnet and SSH Configuration
Session: 60
- Introduction to IP Routing
- Understanding Routing Process
- Discussion on Routing Table
Session: 61
- Understanding Basic Routing
- Routing & Routed Protocols
- Types of IP Routing
- Understanding the Static & Dynamic Routing
- Understanding Default IP Routing
- Configuring Floating Routes
Session: 62
- Introduction to Routing Protocol Overview
- Dynamic Routing Protocols
- Multiple Paths
- Routing Loops and Avoiding Loops
Session: 63
- Distance Vector Routing Protocols
- Introduction to RIP Protocol
- Understanding RIP Working Process
- Discussing difference between RIP & RIPv2 Protocol
Session: 64
- Understanding Router Summarization
- RIPv2 Authentication
- RIP Protocol Packets
Lab: 35
- Configuring Basic Routing
- Configuring Default Routing
Lab: 36
- Practice on Static Routing Configuration
- Dynamic Routing RIP Protocol Configuration
- RIPv2 Practice
Lab: 37
- Monitoring RIP
- Troubleshooting RIP
- RIPv2 Authentication Practice
- IPv6 Routing Practice
Session: 65
- Introduction to Switching
- Switching Process
- Switch Modes: Cut- Through, Fragment Free
- Store and Forward Switching
Session: 66
- Spanning Tree Protocol (STP)
- STP Port Roles & Port States
- Introduction to VLAN’s
- Benefits and Type of VLAN’s
Session: 67
- Introduction to Storage Solution
- DAS, NAS & SAN Storage
- RAID Types
- RAID Levels
Session: 68
- Discussion on Storage Interfaces Such as SCSI, SATA & IDE
- Storage Protocols: SCSI, iSCSI and FCP
- NAS Storage: NFS, CIFS
Session: 69
- IP Storage Networking
- Fibre Channel over IP
- Fibre Channel Products and Technology
Session: 70
- SAN Protocols
- iSCSI Overview
- iSCSI Configuration
- Overview of NVMe Over Fibre Channel
Lab: 38
- Configuring Software RAID using OS
- Configuring Hardware RAID on Server Hardware
Lab: 39
- Practice on Configuring iSCSI Storage
Lab: 40
- Practice on NAS Storage (NFS & CIFS)
Session: 71
- LAN-Free Data Movement
- Server-Free Data Movement
- Disaster Backup and Recovery
- Storage Spaces
- Storage Pooling
Session: 72
- Introduction to Virtualization
- Types of Virtualization
- Introduction to VMWare Virtualization
- Benefits of VMWare Virtualization
Session: 73
- Introduction to vSphere and Software defined Data Center
- Describe the topology of a Physical Data Center
- Explain the vSphere Virtual Infrastructure
- Define the Files and Components of Virtual Machines
- Describe the Benefits of Virtual Machines
Session: 74
- Explain the similarities and differences between physical & virtual architectures
- Define the purpose of ESXi
- Define the purpose of vCenter Server
- Explain the software-defined data center
- Describe private, public, and hybrid clouds
Session: 75
- Introduce virtual machines, virtual machine hardware, and virtual machine files
- Identify the files that make up a Virtual machine
- Discuss the latest Virtual machine hardware and its features
- Describe Virtual machine CPU, memory, disk, and network resource usage
Session: 76
- Explain the importance of VMware Tools
- Discuss PCI pass-through, Direct I/O, remote direct memory access, and NVMe
- Deploy and configure Virtual machines and templates
- Identify the Virtual machine disk format
Session: 77
- Describe the Virtual Networks
- Describe the Standard and Distributed Switches
- Describe Virtual Switch Connection Types
- Discuss the new TCP/IP Stack Architecture
- Use VLAN’s with Standard Switches
Session: 78
- Introduce storage protocols and storage device types
- Discuss ESXi hosts using iSCSI, NFS, and Fibre Channel storage
- Create and manage VMFS and NFS datastores
- Describe the new features of VMFS
- Introduce vSAN
- Describe guest file encryption
Session: 79
- Introduce virtual CPU and memory concepts
- Explain Virtual memory reclamation techniques
- Describe Virtual machine overcommitment and resource competition
- Configure and manage resource pools
- Describe methods for optimizing CPU and memory usage
- Use various tools to monitor resource usage
- Create and use alarms to report certain conditions or events
Lab: 41
- Practice on Installing VMWare Workstation
- Practice on Installing VMware ESXi
Lab: 42
- Practice on Virtual Machine Creation Using Workstation
Lab: 43
- Installing the vSphere Client
- Configuring Virtual Machines on ESXi Host
- Practice on Virtual Switches
Session: 80
- Introduction to IT Datacenter Infrastructure
- Physical Key Elements of Datacenter Infrastructure
- Introducing the Cloud
- Introduction to Cloud Computing Technology
Session: 81
- Benefits of Cloud Computing
- Characteristics of Cloud Computing
- Cloud Computing Deployment Models (Private, Public & Hybrid)
- Cloud Computing Services (IaaS, PaaS & SaaS)
- Cloud Computing Vendors
Session: 82
- Introduction to Microsoft Azure Cloud Services
- Introduction to Amazon Aws Cloud Services
- Discussion on the Services Offered by Azure & AWS
- Resource Search on the Azure & AWS Marketplace
Lab: 44
- Microsoft Azure Account Creation
- Amazon AWS Account Creation
Session: 83
- Overview of Microsoft Azure
- Managing Azure with Azure Portal
- Overview of Azure Resource Manager
- Azure Global Infrastructure Regions
lab: 45
- Practice on Azure Portal
Session: 84
- Introduction to AWS
- History of AWS
- Introduction to AWS Products
- Regions & Availability Zones
- AWS Free Usage Tier
- Introduction to AWS Management Console
Lab: 46
- Practice on AWS Portal
Session: 85
- Introduction to Cyber Security
- Importance of Cyber Security
- Cyber Security Threats
- Ransomware & Other Malwares
- Email Security
Session: 86
- Physical Security & Mobile Security
- Security Issues with Phones
- Ways to Stay Secure
- Basic Security Practices
- Basic Computer Log Entries
- Basic Incident Response Techniques
- Identify Potential threats to Wireless Networks
Session: 87
- Identifying the Vulnerabilities of a system
- Understanding the Vulnerabilities of a system
- CVE ID, Bugtraq ID
- Patch Management
- Identifying the patch for a Vulnerability
- Downloading the Patch
- Scanning systems for Malware infections
- Types of Anti-Malwares: Anti-Virus, HIDS & HIPS
Session: 88
- Discussion on Mobile Forensics: How to recover deleted data from the mobile
- Computer Forensics & Network Forensics
- Understanding the Recovery of the evidences and logs
- Log monitoring tools
- Event viewer.
Lab: 47
- Practice on Lab Tools: Zone Alarm Firewall & XARP
Lab: 48
- Protect your applications from Antivirus
- Updates Installation
- Mobile/HDD Deleted
- Practice on Log Monitoring tool & Event viewer logs.
Session: 89
- Cryptography
- Cryptographic attacks and the tools to ensure data integrity
- Hashing, symmetric and asymmetric encryption, and certificates
- Methods of implementing cryptography
Lab: 49
- Practice on Cryptool
Session: 90
- Counter Measure Techniques for Network level attacks
- Types of Firewall
- Packet Filtering Firewall
- Circuit-Level Gateway Firewall
- Application-Level Firewall
Session: 91
- Stateful Multilayer Inspection Firewall
- Limitations of a Firewall
- Introduction to IDS & IPS
- Placement of IDS in the Network
- Introduction to UTM & Features
- Difference between a Firewall & a UTM
- Placement of UTM in the Network
- Monitoring attacks using UTM
Lab: 50
- Practical Labs on IDS, IPS & UTM
Session: 92
- Introduction & Information Security Threats and Attack Vectors
- Introduction to Basics of Ethical Hacking
- Elements of Information Security
- The Security, Functionality, and Usability Triangle
- Top Information Security Attack Vectors
- Latest Security Attacks
- Information Security Threat Categories & Types of Attacks on a System
Session: 93
- Hacking Concepts
- What is Hacking & What is Ethical Hacking?
- Hacker Classes & Ethical Hacking is Necessity
- Why Ethical Hacking is Necessary, Scope and Limitations
- Skills & Technic of an Ethical Hacker
Session: 94
- Scanning Networks
- Different Kind of Information Gathering for Different Type Of Victim: Enumeration,
- System hacking, Malwares and Threats, Sniffing Attacks, Social engineering attack
- Web, Types of Web: Surface, Deep & Darknet
- Hitman Services
- Hacking Services
- Carding, Ripping & Phishing
- Penetration Testing & Vulnerability Auditing
Session: 95
- Overview of important networking terminologies: e.g. IP address, Network topologies
- OS for different hardware platforms, Vulnerability
- Different Programming languages for different platforms/purposes.
- Hashing checksums
- Php code overview
- Introduction to Foot Printing
Session: 96
- Finding a company’s details
- Finding a company’s domain name
- Finding a company’s Internal URLs
- Finding a company’s Public and Restricted URLs
- Finding a company’s Server details
- Finding the details of domain registration
- Finding the range of IP Address
- Finding the DNS information
- Finding the services running on the server
- Finding the location of servers
- Traceroute analysis
- Tracking e-mail communications
Lab: 51
- Practice on Linux Commands
- Practice on Whatismyipaddress.com
- Netcraft & Hashcalc
Session: 97
- Discussion on Network Scanning
- Objectives of Network scanning
- Finding the Live hosts in a network
- Finding Open ports on a server
- Finding the services on a server
- OS fingerprinting
- Server Banner grabbing tools
Session: 98
- Discussion on Vulnerability Scanning
- Vulnerability Scanner tools
- Finding more details about a vulnerability
- Understanding Proxy Server and Working Process
- Types of Proxy Servers, finding of Proxy servers
- Why do Hackers use Proxy servers?
- Discussion on TOR Network
- Why hackers prefer to use TOR network?
Session: 99
- Understanding Enumeration: SNMP, SMTP & DNS Enumeration
- Introduction to Sniffing and Sniffers
- Sniffer Working Process, Types of Sniffing (Active & Passive)
- Promiscuous Mode
- ARP, MAC/CAM Table
- MAC Spoofing works
- How to Defend against Sniffers in Network
- Introduction to Denial of Service & DOS Attack
- DDOS attack, Symptoms of a DOS Attack
- Botnet & DoS attacks
- Discussion on WPS, WEP, WPA, WPA2 & WPA3
Lab: 52
- Practice on NMAP tool, Anonymox, TOR Browser
- Practice on Maltego, DNSDumpster, DOS Attack using LOIC tool
- Practice on Metasploit framework, Cain N Abel
Course Outline
- Interact with the customer prior to visit
- Understand customer’s requirements on visit or prior to visit
- Suggest possible solutions
- Complete the documentation
- Achieve productivity and quality as per company”s norms
- Understand the installation requirement and install the hardware
- Configure and setup the network, servers and storage system
- Check system functionality
- Set up the software
- Complete the installation task and report
- Interact with customer
- Interact with superior
- Achieve productivity and quality as per company”s norms
- Recognizing of OSI model
- Recognizing of TCP/IP model
- Identify the Network Technologies.
- Recognize Types of application used
- Identify the types devices
- Identify the Protocols used
- Understanding device functionalities at different layers
- IP Routing Static and dynamic routing
- Remote desktop and remote assistance
- Switching and Virtual LAN’s
- List and define criteria involved with network planning and management
- Analyze the network topology for identifying the issues
- Using network diagnostic tools
- Monitoring network activity
- Computer Security’s
- Troubleshooting network related issues
- Disk types, components, and features
- Removable media types, components, and features
- To describe the characteristics of internal and external storage devices including RAID
- To identify differences between connector types
- Understand the nature of the problems and perform initial diagnosis
- To resolve common peripheral device issues and errors
- Utilize your time effectively
- Use resources correctly and efficiently
- Treat confidential information correctly
- Work in line with your organization’s policies and procedures
- Ensure your work meets the agreed requirements
- Comply with your organization’s current health, safety
- Report any identified breaches in health, safety, and security policies
- Identify and correct any hazards
- Identifying the problems with Storage
- Monitoring and reporting storage usage
- Troubleshooting storage issues
- Receive and understand the customer complaint registered at customer care
- Identify system problems on field visit
- Replace faulty module after diagnosis
- Coordinate with Remote Technical Helpdesk for assistance
- Interact with customer
- Report to Superior
- Interact with supervisor or superior
- Coordinate with colleagues
- Support customers remotely
- Record, prioritize and categorize service requests/incidents
- Understand the nature of the problems and perform initial diagnosis
- Organization’s tools and processes for incident management
- Monitor problems to keep customers informed
- Importance of Monitoring, Measuring and Reporting ,CSFs, KPIs, and Activity Metrics , Quantity Based Activity Measures , Service Desk and Process Metricse
- Service Level Agreement, Timeliness of Response and Resolution data, Problem Management Process Flow (ITIL), Problem Determination, Resolution, tracking, report, control, measures.
Request more information?
If you have any questions, please don't hesitate to ask, fill the enquiry form or call 9019002622

Request more information?
If you have any questions, please don't hesitate to ask, fill the enquiry form or call 08040445566

Supporting Enterprises Around the Globe
Our programs are designed to give you the skills you need to be successful in your career.

GET IN TOUCH WITH OUR EXPERTS
Let us know your areas of interest so that we can serve you better.