Our Key Points

  • Well Equiped Lab Infrastructure.
  • Industry Experienced Faculty.
  • Additional Practice Sessions.
  • Flexible Timings for Working Professionals.
  • Demo Batches Available Before Admission.
  • 100% Placement Assistance.

Cisco Certified Network Associate (200-301)

Duration: 1&1/2 months Eligibility: Undergraduate

  • • Explain the role and function of network components
  • Routers
  • L2 and L3 switches
  • Next-generation firewalls and IPS
  • Access points
  • Controllers (Cisco DNA Center and WLC)
  • Endpoints
  • Servers
  • • Describe characteristics of network topology architectures
  • 2 tier
  • 3 tier
  • Spine-leaf
  • WAN
  • Small office/home office (SOHO)
  • On-premises and cloud
  • • Compare physical interface and cabling types
  • Single-mode fiber, multimode fiber, copper
  • Connections (Ethernet shared media and point-to-point)
  • Concepts of PoE
  • • Identify interface and cable issues (collisions, errors, mismatch duplex, and/or speed)
  • • Compare TCP to UDP
  • • Configure and verify IPv4 addressing and subnetting
  • • Describe the need for private IPv4 addressing
  • • Configure and verify IPv6 addressing and prefix
  • • Compare IPv6 address types
  • Global unicast
  • Unique local
  • Link local
  • Anycast
  • Multicast
  • Modified EUI 64
  • • Verify IP parameters for Client OS (Windows, Mac OS, and Linux)
  • • Describe wireless principles
  • Non overlapping Wi-Fi channels
  • SSID
  • RF
  • Encryption
  • • Explain virtualization fundamentals (virtual machines)
  • Describe switching concepts 1.13.a MAC learning and aging
  • Frame switching
  • Frame flooding
  • MAC address table
  • • Configure and verify VLANs (normal range) spanning multiple switches
  • • Access ports (data and voice)
  • Default VLAN
  • Connectivity
  • • Configure and verify inter switch connectivity
  • Trunk ports
  • 802.1Q
  • Native VLAN
  • • Configure and verify Layer 2 discovery protocols (Cisco Discovery Protocol and LLDP)
  • • Configure and verify (Layer 2/Layer 3) Ether Channel (LACP)
  • • Describe the need for and basic operations of Rapid PVST+ Spanning Tree Protocol and identify basic operations
  • Root port, Root Bridge (primary/secondary), and other port names
  • Port states (forwarding/blocking)
  • Port Fast benefits
  • • Compare Cisco Wireless Architectures and AP modes
  • • Describe physical infrastructure connections of WLAN components (AP,
  • • WLC, access/trunk ports, and LAG)
  • • Describe AP and WLC management access connections (Telnet, SSH, HTTP,
  • • HTTPS, console, and TACACS+/RADIUS)
  • • Configure the components of a wireless LAN access for client connectivity using GUI only such as WLAN creation, security settings, QoS profiles, and advanced WLAN settings
  • • Interpret the components of routing table
  • Routing protocol code
  • Prefix
  • Network mask
  • Next hop
  • Administrative distance
  • Metric
  • Gateway of last resort
  • • Determine how a router makes a forwarding decision by default
  • longest match
  • Administrative distance
  • Routing protocol metric
  • • Configure and verify IPv4 and IPv6 static routings
  • Default route
  • Network route
  • Host route
  • Floating static
  • • Configure and verify single area OSPFv2
  • Neighbor adjacencies
  • Point-to-point
  • Broadcast (DR/BDR selection)
  • Router ID
  • • Describe the purpose of first hop redundancy protocol
  • • Configure and verify inside source NAT using static and pools
  • • Configure and verify NTP operating in a client and server mode
  • • Explain the role of DHCP and DNS within the network
  • • Explain the function of SNMP in network operations
  • • Describe the use of syslog features including facilities and levels
  • • Configure and verify DHCP client and relay
  • • Explain the forwarding per-hop behavior (PHB) for QoS such as classification, marking, queuing, congestion, policing, shaping
  • • Configure network devices for remote access using SSH
  • • Describe the capabilities and function of TFTP/FTP in the network
  • • Define key security concepts (threats, vulnerabilities, exploits, and mitigation techniques)
  • • Describe security program elements (user awareness, training, and physical access control)
  • • Configure device access control using local passwords
  • • Describe security password policies elements, such as management, complexity, and password alternatives (multifactor authentication, certificates, and biometrics)
  • • Describe remote access and site-to-site VPNs
  • • Configure and verify access control lists
  • • Configure Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port security)
  • • Differentiate authentication, authorization, and accounting concepts
  • • Describe wireless security protocols (WPA, WPA2, and WPA3)
  • • Configure WLAN using WPA2 PSK using the GUI
  • • Explain how automation impacts network management
  • • Compare traditional networks with controller-based networking
  • • Describe controller-based and software defined architectures (overlay, underlay, and fabric)
  • Separation of control plane and data plane
  • North-bound and south-bound APIs
  • • Compare traditional campus device management with Cisco DNA
  • •Center enabled device management
  • • Describe characteristics of REST-based APIs (CRUD, HTTP verbs, and data encoding)
  • • Recognize the capabilities of configuration management mechanisms Puppet, Chef, and Ansible
  • • Interpret JSON encoded data

Cisco Enterprise Advanced Routing and Services (300-410)

Duration: 1&1/2 months Eligibility: Graduate (Technical/Non-Technical)

  • • Troubleshoot administrative distance (all routing protocols)
  • • Troubleshoot route map for any routing protocol (attributes, tagging, filtering)
  • • Troubleshoot loop prevention mechanisms (filtering, tagging, split horizon, route poisoning)
  • • Troubleshoot redistribution between any routing protocols or routing sources
  • •Troubleshoot manual and auto-summarization with any routing protocol
  • • Configure and verify policy-based routing
  • • Configure and verify VRF-Lite
  • • Describe Bidirectional Forwarding Detection
  • • Troubleshoot EIGRP (classic and named mode)
  • Address families (IPv4, IPv6)
  • Neighbor relationship and authentication
  • Loop-free path selections (RD, FD, FC, successor, feasible successor, stuck in active)
  • Stubs
  • Load balancing (equal and unequal cost)
  • Metrics
  • • Troubleshoot OSPF (v2/v3)
  • Address families (IPv4, IPv6)
  • Neighbor relationship and authentication
  • Network types, area types, and router types
  • ---- Point-to-point, multipoint, broadcast, nonbroadcast
  • ---- Area type: backbone, normal, transit, stub, NSSA, totally stub
  • ---- Internal router, backbone router, ABR, ASBR
  • ---- Virtual link
  • • Path preference
  • • Troubleshoot BGP (Internal and External)
  • Address families (IPv4, IPv6)
  • Neighbor relationship and authentication (next-hop, mulithop, 4-byte AS, private AS, route refresh, synchronization, operation, peer group, states and timers)
  • Path preference (attributes and best-path)
  • Route reflector (excluding multiple route reflectors, confederations, dynamic peer)
  • Policies (inbound/outbound filtering, path manipulation)
  • • Describe MPLS operations (LSR, LDP, label switching, LSP)
  • • Describe MPLS Layer 3 VPN
  • • Configure and verify DMVPN (single hub)
  • • GRE/mGRE
  • • NHRP
  • • IPsec
  • • Dynamic neighbor
  • • Spoke-to-spoke
  • • Troubleshoot device security using IOS AAA (TACACS+, RADIUS, local database)
  • • Troubleshoot router security features
  • • IPv4 access control lists (standard, extended, time-based)
  • • IPv6 traffic filter
  • •Unicast reverse path forwarding (uRPF)
  • • Troubleshoot control plane policing (CoPP) (Telnet, SSH, HTTP(S), SNMP, EIGRP, OSPF, BGP)
  • • Describe IPv6 First Hop security features (RA guard, DHCP guard, binding table, ND inspection/snooping, source guard)
  • • Troubleshoot device management
  • Console and VTY
  • Telnet, HTTP, HTTPS, SSH, SCP
  • (T)FTP
  • • Troubleshoot SNMP (v2c, v3)
  • • Troubleshoot network problems using logging (local, syslog, debugs, conditional debugs, timestamps)
  • • Troubleshoot IPv4 and IPv6 DHCP (DHCP client, IOS DHCP server, DHCP relay, DHCP options)
  • • Troubleshoot network performance issues using IP SLA (jitter, tracking objects, delay, connectivity)
  • • Troubleshoot NetFlow (v5, v9, flexible NetFlow)
  • • Troubleshoot network problems using Cisco DNA Center assurance (connectivity, monitoring, device health, network health)

Cisco Enterprise Network Core Technologies (350-401)

Duration: 1&1/2 months Eligibility: Graduate (Technical/Non-Technical)

  • Explain the different design principles used in an enterprise network
  • Enterprise network design such as Tier 2, Tier 3, and Fabric Capacity planning
  • High availability techniques such as redundancy, FHRP, and SSO
  • Wireless deployment models (centralized, distributed, controller-less, controller based, cloud, remote branch)
  • Location services in a WLAN design
  • • Explain the working principles of the Cisco SD-WAN solution
  • SD-WAN control and data planes elements
  • Traditional WAN and SD-WAN solutions
  • SD-Access control and data planes elements
  • Traditional campus interoperating with SD-Access
  • Process and CEF
  • MAC address table and TCAM
  • FIB vs. RIB.
  • • Describe device virtualization technologies
  • ---- Hypervisor type 1 and 2
  • ---- Virtual machine
  • ---- Virtual switching
  • • Layer 2
  • Troubleshoot static and dynamic 802.1q trunking protocols
  • Troubleshoot static and dynamic EtherChannels
  • Configure and verify common Spanning Tree Protocols (RSTP and MST)
  • • Layer 3
  • Compare routing concepts of EIGRP and OSPF (advanced distance vector vs. linked state, load balancing, path selection, path operations, metrics)
  • Configure and verify simple OSPF environments, including multiple normal areas, summarization, and filtering (neighbour adjacency, point-to-point and broadcast network types, and passive interface)
  • Configure and verify eBGP between directly connected neighbours (best path selection algorithm and neighbour relationships)
  • Describe Layer 1 concepts, such as RF power, RSSI, SNR, interference noise, band and channels, and wireless client devices capabilities
  • Describe AP modes and antenna types
  • Describe access point discovery and join process (discovery algorithms, WLC selection process)
  • Describe the main principles and use cases for Layer 2 and Layer 3 roaming
  • Troubleshoot WLAN configuration and wireless client connectivity issues
  • Describe Network Time Protocol (NTP)
  • Configure and verify NAT/PAT
  • Configure first hop redundancy protocols, such as HSRP and VRRP
  • Describe multicast protocols, such as PIM and IGMP v2/v3
  • Diagnose network problems using tools such as debugs, conditional debugs, trace route, ping, SNMP, and syslog
  • Configure and verify device monitoring using syslog for remote logging
  • • Configure and verify device access control
  • Lines and password protection
  • Authentication and authorization using AAA
  • • Configure and verify infrastructure security features
  • ACLs
  • CoPP
  • Threat defence
  • Endpoint security
  • Next-generation firewall
  • TrustSec, MACsec
  • Network access control with 802.1X, MAB, and WebAuth
  • Interpret basic Python components and scripts
  • Construct valid JSON encoded file
  • Describe the high-level principles and benefits of a data modelling language, such as YANG
  • Describe APIs for Cisco DNA Center and vManage
  • Interpret REST API response codes and results in payload using Cisco DNA Center and RESTCONF
  • Construct EEM applet to automate configuration, troubleshooting, or data collection
  • Compare agent vs. agentless orchestration tools, such as Chef, Puppet, Ansible, and SaltStack

RHCSA

  • Red Hat Certified System Administrator SA1

Duration: 1&1/2 months Eligibility: Graduate (Technical/Non-Technical)

  • Red Hat System Administration I.
  • Orientation to the Classroom Environment
  • Controlling Your Systems
  • Internationalization.
  • Accessing the Command Line.
  • Accessing the Command Line Using the Desktop.
  • Executing Commands Using the Bash Shell.
  • Describing Linux File System Hierarchy Concepts
  • Specifying Files by Name.
  • Managing Files Using Command-line Tools.
  • Making Links Between Files.
  • Matching File Names with Shell Expansions.
  • Reading Manual Pages Reading Info Documentation
  • Reading Info Documentation
  • Redirecting Output to a File or Program
  • Editing Text Files from the Shell Prompt
  • Changing the Shell Environment.
  • Describing User and Group Concepts
  • Gaining Superuser Access
  • Managing Local User Accounts
  • Managing Local Group Accounts
  • Managing User Passwords.
  • Interpreting Linux File System Permissions
  • Managing File System Permissions from the Command Line
  • Managing Default Permissions and File Access.
  • Listing Processes
  • Controlling Jobs
  • Killing Processes
  • Monitoring Process Activity
  • Controlling Services and Daemons
  • Identifying Automatically Started System Processes
  • Controlling System Services
  • Accessing the Remote Command Line with SSH
  • Configuring SSH Key-based Authentication
  • Customizing OpenSSH Service Configuration
  • Describing System Log Architecture
  • Reviewing Syslog Files
  • Reviewing System Journal Entries
  • Preserving the System Journal
  • Maintaining Accurate Time
  • Describing Networking Concepts
  • Validating Network Configuration
  • Configuring Networking from the Command Line
  • Editing Network Configuration Files Configuring Host Names and Name Resolution
  • Configuring Host Names and Name Resolution
  • Managing Compressed tar Archive.
  • Transferring Files Between Systems Securely.
  • Synchronizing Files Between Systems Securely
  • Registering Systems for Red Hat Support
  • Explaining and Investigating RPM Software Packages
  • Installing and Updating Software Packages with Yum
  • Enabling Yum Software Repositories.
  • Managing Package Module Streams
  • Identifying File Systems and Devices
  • Mounting and Unmounting File Systems
  • Locating Files on the System
  • Analysing and Managing Remote Servers.
  • Getting Help from Red Hat Customer Portal
  • Detecting and Resolving issues with Red Hat Insights.

RHCE : Red Hat Certified Engineer

  • Automation with Ansible - SA 3

Duration: 1&1/2 months Eligibility: Graduate (Technical/Non-Technical)

  • Automating Linux Administration with Ansible
  • Installing Ansible
  • Building an Ansible Inventory
  • Managing Ansible Configuration Files
  • Running Ad Hoc Commands
  • Writing and Running Playbooks
  • Implementing Multiple Play
  • Managing Variables
  • Managing Secrets
  • Managing Facts
  • Writing Loops and Conditional Tasks
  • Implementing Handlers
  • Handling Task Failure
  • Modifying and Copying Files to Hosts
  • Deploying Custom Files with Jinja2 Templates
  • Selecting Hosts with Host Patterns
  • Managing Dynamic Inventories
  • Configuring Parallelism
  • Including and Importing Files
  • Describing Role Structure
  • Reusing Content with System Roles
  • Creating Roles
  • Deploying Roles with Ansible Galaxy
  • Troubleshooting Playbooks
  • Troubleshooting Ansible Managed Hosts
  • Managing Software and Subscriptions
  • Managing Users and Authentication
  • Managing the Boot Process and Scheduled Processes
  • Managing Storage
  • Managing Network Configuration
  • Examining Ansible Configuration Options
  • Ansible Light Bulb Licensing
  • Roles

Cloud Computing

  • AWS Solution Architect Associate

Duration: 1&1/2 months Eligibility: Graduate (Technical/Non-Technical)

  • Understanding of Cloud Computing and AWS Overview
  • What is Cloud Computing
  • AWS Fundamentals
  • AWS Platform & Services
  • AWS Regions & Availability Zones
  • Setup of AWS Account
  • Principles
  • Creating Users
  • Roles
  • Enabling Credentials
  • Access Keys & Secret Keys
  • Security & Policies
  • EC2 Types
  • Launching EC2 Instances
  • EBS Volumes & Types
  • EBS Encryption
  • Creating AMIs
  • EBS Snapshots & AMIs
  • Summary of EC2 Services
  • LB Types: Classic & Application LB
  • Load Balancer Configurations
  • Launch Configurations
  • Bootstrapping
  • Scaling Groups
  • Scaling Policies
  • Building Fault Tolerant & Highly available Applications
  • Summary of Auto scaling and Cloud watch
  • Virtual Private Cloud Basics
  • Subnets
  • Route Tables
  • Security Groups (ACLs & NACL)
  • Internet Gateways
  • Bastion Host/NAT Instances
  • NAT Gateways
  • Lab Exercise Create a NAT Gateway and associate it with EC2 instances.
  • EIP & ENIs
  • VPG, CGW, VPN
  • VPC Peering
  • AWS Direct Connect
  • Object Vs Block Storage
  • S3 Basics
  • Bucket Policies & Access Control Lists
  • Versioning & Transfer Acceleration
  • Static Web Hosting
  • S3 Advanced Features
  • Versioning
  • Cross Region Replication
  • Transfer Acceleration
  • Multipart Upload
  • Lifecycle Policies
  • AWS Glacier
  • AWS Cloud Front (CDN)
  • AWS RDS
  • Read Replica
  • Snapshots
  • Restoring Snapshots
  • Multi-AZ Deployment
  • AWS Dynamo DB (NoSQL DB)
  • AWS RedShift
  • AWS EFS
  • Summary of Database Services
  • Domain Name Services
  • Amazons Route53 Overview
  • Hosted Zones
  • Record Sets
  • Routing Policies
  • DNS Failover with S3 and CDN
  • AAWS Other Services
  • AWS SQS
  • AWS SNS
  • AWS Cloud Trail
  • AWS Cloud Formation

Python

  • Python Syllabus

Duration: 1&1/2 months Eligibility: Graduate (Technical/Non-Technical)

  • What is Python and History of Python
  • Unique features of Python
  • Differences between Python2 and Python3
  • Install Python and Environment Setup
  • Print Function, Escape sequence and comments
  • Variables
  • Python as a calculator
  • Integers, Float
  • String, user input
  • List
  • Tuples
  • Dictionary
  • Set
  • Python as a calculator
  • If-else
  • If-elif-else
  • Pass, Break, Continue Statement
  • While Loop
  • For Loop
  • Dry Principle
  • Python built-in functions
  • Python user defined functions
  • Defining and calling functions
  • Introduction to *args and **kwargs
  • Lambda expression
  • Enumerate function
  • Map function
  • Filter function
  • Zip function
  • Any and All function
  • If-else
  • List Comprehension
  • List Comprehension
  • Introduction to class and objects
  • Instance Methods
  • Class Variables
  • Class Methods
  • Static Methods
  • Encapsulation and Abstraction
  • Inheritance
  • Multilevel and multiple Inheritance
  • Compile time, Run time and Logical Errors
  • Exception
  • Try---except---else
  • Custom Exception
  • Raising an exception
  • User defined exceptions
  • Reading and writing different type of files

Students Testimonials

Our Students Are Working in: