Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

It San

Download as pdf or txt
Download as pdf or txt
You are on page 1of 38

TECHNOLOGIES

About Zoom
Zoom Technologies is a pioneer in providing network and security
solutions. Our clients are spread across the entire spectrum including
defence, space, banks, governments, financial institutions, universities,
railways, hospitals etc.

We are leaders in the field of network and security training. Since our
inception almost two decades ago, we have trained over a hundred
thousand engineers. We offer a world class learning environment with
the best lab infrastructure and faculty with real industry experience
gained by working on live projects of national importance.

100% Guaranteed Job Assistance


There is a high demand for network and security professionals at all times. Apart from job
opportunities in India and the Middle East, network and security administrators are also
Certified Training Partner sought-after in the US and Europe.

If you do not have the right skills, then get them now! Choose the experts in network and security
training, an organization which has already trained over one hundred thousand engineers.

Check out new job opportunities on www.zoomingcareers.com

www.zoomgroup.com
MCSE-2012 Full Course
MICROSOFT CERTIFIED SOLUTIONS EXPERT

}
Practicals in real-time environment. Detailed curriculum with all 5 papers
Duration: 1 Month | 4 Hrs Per Day (starts on 15th & 30th of every month)
Batches: Morning: 8.30 to 10.30  Afternoon: 2.00 to 4.00  Evening: 7.30 to 9.30

CCNA (V 3.0) Full Course


CISCO CERTIFIED NETWORK ASSOCIATE Complete Package
Cisco Routers with BSNL/TELCO MUX & Live Channelised E1
Duration: 1 Month | 4 Hrs Per Day (starts on 15th & 30th of every month) for Only
Batches: Morning: 8.30 to 10.30  Afternoon: 2.00 to 4.00  Evening: 7.30 to 9.30

LINUX ADMINISTRATION Fees: ` 9,900/-


+ 18% GST
COMPLETE RHCE LINUX
Practicals on Live Web Administration + Integration of Windows with Linux/Unix (Samba Server) Duration: 3 Months
Duration: 2 Weeks | 4 Hrs Per Day (starts on 15th & 30th of every month) 4 Hrs Per Day
Batches: Morning: 8.30  Afternoon: 2.00  Evening: 7.30

Ethical Hacking & Prevention


Course is mapped to Ethical Hacking & Prevention from US-Council (www.us-council.com)
(Pre requisite is CCNA / MCSE / LINUX)
Duration: 2 Weeks | 4 Hrs Per Day
Batches: Morning: 8.30 to 10.30 
(starts on 15th & 30th of every month)
Afternoon: 2.00 to 4.00  Evening: 7.30 to 9.30
100%
FREE Ethical Hacking Certification from US-Council
GUARANTEED
EMERGING TECHNOLOGIES - AN INSIGHT


E thi cal Hack i ng, C ybersecuri ty and F i rewal l
Open So urce: A gl i mpse into advance Li nux


V Mware vSphere and C lo ud Techno l ogi es
C ISC O WA N Techno l o gy & Co l l abo rati o n
JOB
Free MCSE & CCNA Exam Practice Questions ASSISTANCE

CCNP R&S
CISCO CERTIFIED NETWORK PROFESSIONAL

}
Duration: 1 Month | 4 Hrs Per Day (starts on 15th of every month)
Batches: Morning: 7.30 or Evening: 7.00 Fees: ` 10,000/-
 Labs on latest routers with IOS version 15.X Introductory Special Offer
Monitoring, Diagnostics & Troubleshooting Tools
 PRTG  Wireshark  SolarWinds, etc. Fees: ` 6,500/-
+ 18% GST
Exam Practice Challenge Labs

CCIE R&S
CISCO CERTIFIED INTERNETWORK EXPERT
Duration: 1 Month | 4 Hrs Per Day (starts on 15th of every month)

}
Batches: Morning: 7.30  Evening: 6.00
 Individual Rack For Every Student
 Real time scenarios by 20+ years experienced CCIE certified industry expert who
has worked on critical projects worldwide.

Written + Lab Exam Focus


Fees: ` 25,000/-
+ 18% GST
FREE Full Scale 8 Hours Exam Lab Included
Unlimited Lab Access For 1 Year
MCSA WINDOWS SERVER-2016
Duration: 2 Weeks | 4 Hrs Per Day (starts on 15th & 30th of every month)
Fees: ` 7,500/-
+ 18% GST
Batches: (Contact the Counselors for the next available batch)

MICROSOFT AZURE
Duration: 2 Weeks | 4 Hrs Per Day (starts on 15th & 30th of every month)
Fees: ` 4,500/-
+ 18% GST
Batches: (Contact the Counselors for the next available batch)

MICROSOFT EXCHANGE SERVER-2016 Fees: ` 2,500/-


Duration: 2 Weeks | 4 Hrs Per Day + 18% GST
Batches: (Contact the Counselors for the next available batch)

MICROSOFT OFFICE-365 (ENABLING & MANAGING) Fees: 4,500/-


Duration: 2 Weeks | 4 Hrs Per Day + 18% GST
Batches: (Contact the Counselors for the next available batch)

ADVANCED LINUX Fees: ` 3,000/-


Duration: 2 Weeks | 4 Hrs Per Day (starts on 15th & 30th of every month) + 18% GST
Batches: Morning: 8.30 or Evening: 7.30

CCNA SECURITY (Pre requisite is CCNA R&S) Fees: ` 5,500/-


Duration: 2 Weeks | 4 Hrs Per Day (starts on 15th of every month) + 18% GST
Batches: (Contact the Counselors for the next available batch)

VMware vSphere (Pre requisite is MCSE) Fees: ` 5,950/-


Duration: 1 Month | 4 Hrs Per Day (starts on 15th of every month) + 18% GST
Batches: Morning: 7.30 or Evening: 7.30

VMware vCloud (Pre requisite is VMware vSphere) Fees: ` 2,500/-


Duration: 1 Week | 4 Hrs Per Day (starts on 15th of every month) + 18% GST
Batches: (Contact the Counselors for the next available batch)

CHECKPOINT FIREWALL Fees: ` 5,500/-


Duration: 2 Weeks | 4 Hrs Per Day + 18% GST
Batches: (Contact the Counselors for the next available batch)

CISCO ASA FIREWALL+CISCO IPS Fees:`7,500/-


Duration: 2 Weeks | (starts on 15th of every month) + 18% GST
Batches: (Contact the Counselors for the next available batch)

AWS - AMAZON WEB SERVICES Fees:`4,500/-


Duration: 2 Weeks | 4 Hrs Per Day (starts on 15th and 30th of every month) + 18% GST
Batches: Morning: 8.30 am or Evening 7.30 pm

Cybersecurity Professional
Course is mapped to Cybersecurity Professional course from US-Council (www.us-council.com) Fees:`25,000/-
(Pre requisite is CCNA / MCSE / LINUX) + 18% GST
Duration: 1 Month | 4 Hrs Per Day (starts on 15th of every month)
Batches: Morning: 7.30 or Evening: 7.30

We also offer the following courses (Contact the Counselors for the next available batch)
CCNA Voice @ `7,500/- CCNA Data Center @ `7,500/-
CCNP Voice @ `9,500/- CCNP Data Center @ `9,500/- FACULTY
CCIE Collaboration @ `15,500/- CCIE Data Center @ `15,500/-  All Senior Engineers of Zoom working on Live projects
 Training Engineers of British Army, CISCO, CMC, GE, BSNL,
IPv6 Migration @ `5,500/-
 Tata Teleservices and Several Corporates etc for 20 Years.

www.zoomgroup.com
Microsoft Certified Solutions Expert [MCSE] Server Infrastructure
Microsoft Certified Solutions Associate [MCSA]
This course is developed for IT professionals who need to design, plan, implement, manage

and support Microsoft Windows 2008 and 2012 networks or who plan to take the related MCSE

and MCSA exams. The training will be given by Senior System/Network engineers with several

years of field experience.

Course Outline

 Network & Operating System Essentials

 Installing and Configuring Windows Server 2012

 Administering Windows Server 2012

MCSE
 Designing and Implementing Server Infrastructure

 Configuring Windows Server 2012 Services

 Active Directory Domain Services

 DNS, DHCP, IIS 8.0, VPN

 Configuring File Server

 File Server Resource Manager

 Configuring Shared Resources

 Implementing Microsoft Virtualization Technologies

 Server Virtualization using Hyper-V

 Configuring Advanced Storage Solutions

 iSCSI Target and Initiator

 Storage Spaces and Storage Pools and RAID

 Implementing Security Restrictions

 Group Policies

 Group Policy Preferences

We are not an Affiliated Institution. Trademarks are properties of the respective vendors.
Course Curriculum

Networking Essentials RODC and Physical Structure of AD-DS


 Networking concepts, History of Server OS  Introduction and Configuration of Read Only Domain Controller
 Introduction to Windows Server 2008 & 2012
 Sites and Global Catalog
 Features of Windows Server 2012
 Replication between the Domain Controllers
 Installation of Windows Server 2012
 Introduction and Creation of Users Accounts  AD-DS Partitions

 Conversion of GUI to Server Core  Configuring R.O.D.C using Install From Media [IFM]
 Conversion of Server Core to GUI
Dynamic Host Configuration Protocol (DHCP)
Active Directory - Domain Services  Introduction and Configuration of DHCP Server
 IP Addressing  DHCP Client Configuration
 Logical Topologies, Peer to Peer & Domain Models  Reservations
 Introduction to Directory Services  DHCP Backup
 Evolution of Directory Services – LDAP Protocol
 Configuring DHCP Failover
 Features of Active Directory
 Installing Active Directory – Domain Controller Domain Name System (DNS)
 Internet Basics, Host Files
Member Servers, Clients, User Configuration  DNS Naming Hierarchy
 Configuring Member Servers and Clients.
 Creating Users in AD-DS  Lookup Zones – Forward and Reverse Lookup Zones
 User Logon policies  Types of Zones – Primary, Secondary and Stub Zone
 Password policies  Resource Records, Integration with AD-DS, SRV Records
 Account Lockout policies  Forwarders, Dynamic Updates
 User properties
Internet Information Services (IIS)
Permissions/Access Control Lists  IIS 8.0 Configuration
 FileSystems  Hosting Websites, Virtual Directories
 Security and Sharing Permissions - Folders & Files
 Redirecting Web Sites
 Access Based Enumeration
 Backup and Restoring Sites

Profiles and File Server Resource Manager [FSRM]  FTP sites


 Typesof Profiles – Local & Roaming
 Home Folder Windows Deployment Services
 Configuring Quotas using FSRM  Introduction and Configuration of WDS Server
 Implementing File Screening using FSRM  Attended and Unattended Installation
 Configuring Storage Reports Management.
Microsoft Hyper-V
Distributed File System  Installation of Hyper-V
 Creating Organisational Unit  Configuring Virtual Machine
 Delegating Control to a User  Configuring Virtual Networks
 DFS Namespace  Configuring Virtual Hard disks
 DFS Folder
 Configuring Hyper-V Replica
 Overview of DFS Replica
Routing and Remote Access
Logical Structure of AD - DS  Routing Configuration – Static Routes
 Configuring ADC
 TreeStructure - Child Domain  NAT, DHCP Relay Agent
 Forest Structure  Remote Access Server Configuration
 VPN – PPTP
FSMO Roles of AD - DS
 Roles of AD - DS Remote Desktop Services
 Transferring of Roles  Remote Administration Mode
 Seizing of Roles
Storage Technologies
Group Policy / System Policies  Configuring iSCSI Target and Initiator
 User and Computer Policies  Introdution to Storage spaces and Storage Pools
 Scope of Policies – OU, Domain, Sites  Configuring Simple Volume (RAID – 0)
 Group Policy Modeling (RSOP)  Configuring Mirror Volume (RAID – 1)
 Software Deployment
 Configuring Parity Volume (RAID – 5)
 Scripts, Folder Redirection
 Group Policy Preferences Failover Clustering
 Auditing
 Configuring Failover on
 Hyper-V Virtual Mechines
Active Directory Trusts
 Introduction to Trust Relationship Advanced Topics
 Categories, Directions & Types of Trusts
 Windows Server Backup
 Functional Levels
 Authentication Protocols
 Overview of AD-FS, LDS, RMS, CS
 Configuring Forest Trusts between 2012 Forests  Upgrading Windows Server 2008 to 2012
 Active Directory Recyclebin  Configuring NLB cluster
 Overview of NAP

www.zoomgroup.com
Windows Server 2016
In today’s rapidly changing IT marketplace, Microsoft Certifications are designed to
help the IT professional to utilize advanced technologies, fine tune troubleshooting
skills and improve job satisfaction. A certification from Microsoft also confirms your
demonstrated experience and knowledge in using Microsoft products and solutions.

Over the last many years, the Training Academy at Zoom Technologies has been a
center for training thousands of aspiring IT professionals in various Microsoft
Certifications at our state-of-the-art facility in Hyderabad. The training will be given
by Senior System / Network engineers with several years of field experience.

Course Outline

 Microsoft Hyper-V & Active Directory Domain Services


 Organizational Unit & Distributed File System
 Structures of Active Directory
 Active Directory Trust
 Operation Masters & Group Policies
 Dynamic Host Configuration Protocol (DHCP)
 Domain Naming System (DNS) using IPv4 & IPv6
 Windows Deployment Services (WDS)
 Windows Server Update Services (WSUS)
 Storage Management
 Routing & Remote Access Services (RRAS)
 AD Federation Services (AD-FS) & AD Lightweight Directory Services (AD-LDS)
 AD Rights Management Services (AD-RMS) & AD Certificate Services (AD-CS)
 Failover Clustering, Containers, Dockers & Microsoft Passport

We are not an Affiliated Institution. Trademarks are properties of the respective vendors.
Course Content

Operating System Operation Masters Windows Deployment Services (WDS)


- Introduction to Server 2016 Operating - Transferring Operation Masters - Introduction & Configuration of WDS
System - Seizing Operation Master Server
- History of Server Operating System - Migrating Operation Masters from - Attended & Unattended Installation
- Editions of Windows Server 2016 Windows 2012 DC to Windows 2016
- Requirements to install Windows Server DC Windows Server Update Services
2016 (WSUS)
- Installing Windows Server 2016 Group Policies - Introduction & Configuration of WSUS
Operating System - User & Computer Policies - Deploying Patches
- Upgrading Windows Server 2012 to - Scopes of Policies – OU, Domain & - Windows Server Backup
Windows Server 2016 Sites
- Introduction to Nano Server - Resultant Set of Policies (RSOP) Storage Management
- Software Deployment - Storage Types
Microsoft Hyper-V - Scripts, Folder Redirection - Introduction to Storage Spaces &
- Introduction to Virtualization - Group Policy Preferences Storage Pools
- Types of Hypervisors - Auditing - Configuring Simple Volume (RAID-0)
- Virtualization using Hyper-V - Configuring Mirrored Volume (RAID-1)
- Configuring Virtual Machines Active Directory Trust - Configuring Parity Volume (RAID-5)
- Configuring Virtual Hard Disks - Introduction to Active Directory Trust - Introduction to ISNS (Internet Storage
- Configuring Virtual Switches Relationship Name Service) & MPIO (Multipath
- Categories, Directions & Types of Trusts Input/Output)
Active Directory Domain Services - Functional Levels
- IP Addressing (IPv4 & IPv6) - Configuring Forest Trusts Routing & Remote Access Services
- Client/Server Architecture - Active Directory Recycle Bin (RRAS)
- Introduction to Active Directory - Configuring Static Routes on IPv4 &
- Features of Active Directory Read Only Domain Controller & Sites IPv6
- Installing Active Directory Domain - Active Directory Partitions - NAT, DHCP Relay Agent
Controller - Configuring Global Catalog Servers - VPN & Direct Access
- Configuring Sites, Sitelinks
Clients, Member Servers, User - Configuring RODC using Install from AD Federation Services (AD-FS) & AD
Management Media (IFM) Lightweight Directory Services
- Configuring Clients & Member Servers (AD-LDS)
- Creating Users in ADDS Dynamic Host Configuration Protocol
- Password Policies (DHCP) AD Rights Management Services
- Account Lockout Policies - Installing DHCP Service (AD-RMS) & AD Certificate Services
- Allow Log On Locally - Authorizing DHCP Server (AD-CS)
- User Properties - Creating Scopes (IPv4 & IPv6)
- Kerberos Policies - Reservations Failover Clustering
- DHCP Backup - Configuring High Availability on Virtual
Organizational Unit & Distributed File - DHCP Failover on IPv4 Machines
System - DHCP Migrations
- Permissions (Security & Sharing) Containers, Dockers & Microsoft
- Creating Organizational Units Domain Naming System (DNS) Passport
- Delegating Control to a User using IPv4 & IPv6
- Groups - Introduction to DNS
- DFS Namespaces - DNS Naming Hierarchy
- Overview of DFS Replica - Types of Lookups
- Branch Cache - Types of Zones
- Types of DNS Records
Structures of Active Directory - Forwarders
- Configuring Additional Domain - Dynamic Updates
Controller - DNS Policies
- Tree Structure – Child Domain - DNS Security (DNSSEC)
- Forest Structure – Tree Domain

www.zoomgroup.com
Micrsoft Exchange Server - 2013

Course Curriculum
Intr
This course was developed for IT Professionals who need to design, plan,
implement and support Microsoft Exchange Server 2013. This Course will be
implemented on Registered Domain names with valid Public IP addresses. This
training will be given by Senior System & Network Engineers with several years

of field experience.

Module 1: Deploying and Managing Microsoft Module 6: Planning and Implementing High Man
Exchange Server 2013 Availability
Exchange Server 2013 Prerequisites and Describe High Availability in Exchange 2013
Requirements Configure highly available databases

Exchange Server 2013 Deployment


Module 7: Planning and Implementing Imp
Managing Exchange Server 2013
Disaster Recovery
Planning for Disaster Mitigation
Module 2: Planning and Configuring Mailbox
Planning and Implementing Exchange Server
Servers Backup and Recovery
Overview of the Mailbox Server Role
Planning the Mailbox Server Deployment Module 8: Planning and Configuring Message
Configuring the Mailbox Servers Transport Usin
Overview of Message Transport and Routing netw
Module 3: Managing Recipient Objects Planning and Configuring Message Transport
Managing Exchange Server 2013 mailboxes Managing Transport Rules

Managing Other Exchange Recipients


Module 9: Planning and Configuring Message
Planning and Implementing Public Folder Mailboxes
Hygiene
Managing Address Lists and Policies
Planning Messaging Security Con
Implementing an AntiSpam Solution for Exchange Man
Module 4: Planning and Deploying Client Access Server 2013
Servers
Planning Client Access Server Deployment Module 10: Planning and Configuring
Configuring the Client Access Server Role Administrative Security and Auditing
Managing Client Access Services Configuring Role Based Access Server
Configuring Audit Logging Imp
Module 5: Planning and Configuring Messaging
Module 11: Monitoring and Troubleshooting
Client Connectivity
Microsoft Exchange Server 2013
Client Connectivity to the Client Access Server
Monitoring Exchange Server 2013
Configuring Outlook Web App
Maintaining Exchange Server 2013
Microsoft Azure Infrastructure Solutions

Course Curriculum
Introduction to Azure
Creating Azure Resource Manager virtual machines in
· Cloud technology overview Azure
· Overview of Azure · Creating virtual machines by using the Azure portal and
· Managing Azure with the Azure portal Azure PowerShell
· Managing Azure with Windows PowerShell · Validating virtual machine creation
· Overview of Azure Resource Manager
· Azure management services Deploying Azure Resource Manager virtual machines by
using Azure Resource Manager templates
Managing Microsoft Azure · Using Visual Studio and an Azure Resource Manager
· Use the Azure portals. template to deploy virtual machines
· Using Azure PowerShell and an Azure Resource
· Use Azure Resource Manager features via the Azure portal.
Manager template to deploy virtual machines
· Use Azure PowerShell

Managing Azure virtual machines


Implementing and managing Azure networking · Configuring virtual machines
· Overview of Azure networking · Configuring virtual machine disks
· Implementing and managing Azure virtual networks · Managing and monitoring Azure virtual machines
· Configuring Azure virtual networks · Managing classic virtual machines
· Configuring Azure virtual network connectivity · Configuring availability
· Overview of Azure classic networking · Implementing desired state configuration (DSC)
· Implementing storage space–based volumes
Using a deployment template to implement Azure virtual
Planning and implementing storage, backup, and
networks
recovery services
· Creating an Azure virtual network by using a deployment
· Planning storage
template
· Implementing and managing storage
· Creating a virtual network by using PowerShell
· Implementing Azure Content Delivery Networks
· Configure virtual networks · Implementing Azure Backup
· Planning for and implementing Azure Site Recovery
Configuring connectivity between classic and Azure Resource · Creating and configuring Azure storage
Manager virtual networks · Using Azure file storage
· Using a PowerShell script to connect a classic VNet and an · Protecting data with Microsoft Azure Backup
Azure Resource Manager VNet
· Configuring a point-to-site VPN Implementing Azure Active Directory
· Validating virtual network connectivity · Creating and managing Azure AD tenants
· Configuring application and resource access with Azure
AD
Implementing virtual machines
· Overview of Azure AD Premium
· Overview of Azure Resource Manager virtual machines
· Administering Active AD
· Planning for Azure virtual machines
· Configuring SSO
· Deploying Azure Resource Manager virtual machines · Configuring Multi-Factor Authentication
· Authoring Azure Resource Manager templates · Configuring SSO from a Windows 10–based computer
· Overview of classic virtual machines that is joined to Azure AD

www.zoomgroup.com
Microsoft Certified Solutions Expert
Cloud Platform & Infrastructure
(Private Cloud)
This course is designed for IT professionals to implement, manage, monitor and
troubleshootData Center, Microsoft Cloud Platform and Infrastructure using Windows Server
2012 R2and System Center 2012 R2. Microsoft cloud platform and Infrastructure can
provideInfrastructure as a Service (IaaS) for Private and Public Cloud (Hybrid Cloud) with
high availability, scalability and elasticity to meet the needs of today’s – and tomorrow’s
businesses.

This training is conducted by Senior IT Operations Engineers (systems, network and


applications) with several years of IT industry experience.

Course Outline
Introduction to Microsoft Cloud • Creating Clouds Managing and maintaining Private
Platform and Infrastructure • Cloud Libraries Cloudwith Configuration Manager
• Overview of Cloud Computing and • Deployvirtual machine to Cloud • Overview Configuration Manager
Types of Cloud • Configuration Manager for Client
• Advantages of Deploying a Cloud Configuring Application Services Management
• Introduction to Microsoft Cloud Delivery with App Controller • Configuration ManagerCloud
Platform and Infrastructure • Installation and configuring App Services
• Overview of System Center 2012 R2 Controller • Demo – Configuration Manager
products • User Roles and Delegation
• Accessing and managing Virtual Automation and Service Delivery using
Installing Microsoft System Center Machines using App Controller Orchestrator
Virtual Machine Manager 2012 R2 • Creating service templates with • Installation and configuring System
(SCVMM) VMM Center Orchestrator 2012 R2
• Hardware and Software • Deploying services using App • Extending Orchestrator using
requirementsSCVMM 2012 R2 Controller integration packs
• Installingprerequisites for SCVMM • Implementing runbook automation
• Installing System Center Virtual MonitorCloud Infrastructure with • Using Orchestrator runbooks with
Machine Manager 2012 R2 Operations Manager Service Manager
• Upgrading / migration from previous • Installation and Configuration of
versions System Center Operations Manger Configuring High Availability, Disaster
2012 R2 Recovery and Protection of Cloud
Deploying and Configuring Access to • Deploy Operation Manager Agents • Installation and configuring Data
Cloud Services using SCVMM • Monitoring Servers and Devices Protection Manager (DPM)
• VMM Settings and Security • Managing Management Packs • Deploying DPM agents
(User Roles and Run As account) • Integrating Operations Manager with • Configuring DPM Storage
• Understanding fabric SCVMM • Creating DPM protection groups
• Logical networks and Logical • Notifications through E-mail • Performing recovery
switches • PXE server to VMM
• Static IP Address pools Operating and Extending Private • WSUS server to VMM
• MAC Address pools Cloud with Service Manager • Managing Updates with WSUS
• VMM storage • Installation and Configuring of
• Storage Classifications System Center Service Manager 2012 Introduction to Windows Azure
• Add file server to VMM R2 Stack/Azure Pack
• VMM Library • Configuring Connectors • Introduction to Windows Azure Stack
• Profiles (Hardware, Guest OS) • Understanding and Implementing • Introduction to Windows Azure Pack
• VM Templates Service Level management • Implementing Windows Azure Pack
• Host groups and adding hosts to • Managingincidentsand problems • Demo – Windows Azure Pack (WAP)
Host Groups
We are not an Affiliated Institution. Trademarks are properties of the respective vendors.
VMware vCloud
Every Data Center today is a Software Defined Data Center (with Virtualization
Technology), VMware vSphere is the defacto Virtualization Technology in Data
Centers to implement Virtualization which is the foundation for implementing
Cloud. Organizations are implementing or using Cloud Computing Services
because of its attributes like On-demand self-service, this allows the end user
request and access a service on demand without requiring human interaction
and provides the ability to self-service. The Future belongs to Virtualization
and Cloud and there is a huge demand for skilled Virtualization and Cloud
professionals. This Course is designed to teach IT Professional the implementation
and management of Cloud Infrastructure Using VMware vCloud Director and
other Cloud Computing Softwares.

Course Curriculum
Understanding Cloud Computing Understanding How vCloud Director Works
• What is Cloud Computing • vSphere Resources
• Virtualization & Cloud Computing • Cloud Resources
• Provider Virtual Data Centers
Types of Cloud • Organization Virtual Data Centers
Services Models • vCould Director Networking
• IAAS • Organizations
• PAAS • Users & Groups
• SAAS • Catalog
Delivery Models • vApp
• Private Cloud
• Public Cloud Creating Cloud using vCloud Director
• Hybrid Cloud • Adding vSphere Resource
• Adding Cloud Resources
Understanding vCloud Director & Its • Creating & Managing Organizations
Components • Working with Catalogs
• vCloud Director Architecture • Controlling access to vCloud Director
• vCloud Director Components • Monitoring vCloud Director
• Understanding Prerequisites
vCenter Orchestrator
Installing Prerequisites for vCloud Director • Configuring vCenter Orchestrator
• Understanding vCloud Network and Security • Automation of vCloud Director using vCenter
• Deploying vCNS Manager Orchestrator
• Deploying vCNS Edge Appliance
Introduction to Different Cloud Computing
Installing vCloud Director Softwares
• Deploying vCloud Director • vCloud Automation Center
• Preparing the Management Pod • Cloud Stack
• Open QRM
vCloud Connector • Open Stack
• Installing & Configuring vCloud Connector • Eucaliptus
Appliance • implementing Cloud using one of the
• Managing a Hybrid Cloud using vCloud softwares
Connector

Prerequisites VMware vSphere

www.zoomgroup.com
VMware vSphere
Practical Implementation in Real Data Center Environment

With the evolution of VMware Virtualization Technology and its implementation in Data
Centers, the approach to manage IT infrastructure is not the same as it used to be in
physical environments. This course will cover all the aspects required to design, configure
and manage a Virtual Data Center environment using VMware vSphere Virtualization
Technology. The course will provide hands-on experience on Virtual Data Center
Infrastructure Administration. No Data Center/Cloud is complete without virtualization
today. The training will be given by Senior System/Network Engineers with several years
of field experience in Virtualization.

Course Outline

Components of Virtual Data Center Infrastructure


Install, Configure and Manage vSphere


VM ware
vSphere

vCenter Server, vSphere Client, Web Client


Configure and Manage Virtual Networking


Configure and Manage Storage


Create and Manage Virtual Machines


Configure and Manage VMware Clusters


Install, Configure and Manage Update Manager


Backup of VMs using VDP


Veeam Backup, Acronis backup


vSphere Replication

Host Profiles

Storage DRS

Troubleshooting vSphere using CLI


We are not an Affiliated Institution. Trademarks are properties of the respective vendors.
Course Curriculum
Introduction to Virtualization Configuring and Managing Virtual Veeam Backup
 Understanding virtualization Networks  Install configure Veeam
 Diff types of virtualization  vNetwork Standard Switches  Backup / Restore VM's
 Virtualization products  Understanding vSwitch & port group Access and Authentication Control
 Understanding components of  Configuring virtual Switch & port groups  Configuring ESXi Host Access and
VMware vSphere  Understanding VM kernel Adaptor Authentication
 Introduction to VMware ESX/ESXi  ESXi Firewall, Enabling & Disabling
Configuring Standard Virtual Switch Lockdown Mode
Server Policies  Integrating ESXi with AD
Understanding Datacenter  Understanding Security policies  Configuring Roles and Permissions
 Configuring Traffic shaping policies  Create a custom role in vCenter server
Infrastructure
 NIC Teaming Policy  Assign permissions on vCenter
 Understanding Datacenter
 Verify permission
Environment Install & configure vCenter Sever
 Virtualization in present & future  Understanding Architecture of Resource Management and
Datacenters vCenter Server Monitoring
 Understanding the Role of VMware  ESXi and vCenter Communication  Virtual CPU and Memory Concepts
 vCenter Server Components  VM Memory Over commitment
Administrator  Virtual SMP, CPU Load balancing
 vCenter Single Sign On
Installation of ESXi Server  CPU, Memory and Disk resources
 Installing vCenter Server
 Planning ESX/ESXi Server  Establish Shares, Limits and
 Configure and manage vCenter Reservations
 Understanding requirements Server Appliance  Understanding Resource Pools
 Understanding vSphere Client  Managing vCenter Server Inventory  Configuring Resource Pools
 Configuring ESXi  Navigating vSphere Client  VM Resource Usage
 Adding ESXi Hosts to vCenter Server  Resource Monitoring Tools
Virtual Machines Concepts  vCenter Server License, Views,  vCenter Performance Charts
 Understanding virtual machines Events, System logs  Interpreting Data from the Tools
 Understanding Diff VM files
VM Migration Scheduled Task, Events & Alarms

e
 Virtual Machine Hardware
 Understanding types of migration  Understand Task, Events & Alarms
Virtual Machine Creation and  Importance of VMware vSphere  Configuring SMTP
Management vMotion  Configuring Alarms
 Create a Virtual Machine  vMotion Requirements vSphere Web Client
 Deploying guest operating system  Perform vMotion migration  Understanding Web Client
into VM  Perform Storage vMotion migration  Administering vSphere using web client
 Understanding VMware tools  Perform Enhanced vMotion VMware vShield Endpoint
 Deploying VMware tools migration  Understanding vShield Endpoint
 Cloning of VMs  Deploying security virtual appliance
VMware Clusters High Availability  Securing VM'S using vShield from
 Creating Templates  vSphere High Availability
 Deploying VM'S from templates Virus & Malwares
 Configuring vSphere HA
 Modifying Virtual Machine Settings  vSphere HA architecture
Advanced Topics: Distributed Switch
 Creating an RDM  Adding ESXi Host to a Cluster
 Understanding Distributed Switch
 Virtual Machine Snapshots Architecture
 Test vSphere HA Functionality
 Configuring Distributed Switch
 Creating a vApp
Fault Tolerance  Understanding VLAN Trunks
 Removing a Virtual Machine  Configure private VLAN Trunks &
 Deploying Virtual Appliance  Understanding Fault Tolerance
 Configuring Fault Tolerance Private VLAN'S
 Deploying OVF Templates
 Testing Fault Tolerance VMware vCenter Standalone
 Configuring VM'S to auto start & Converter
auto shutdown Host Scalability (DRS Cluster)  Converting physical to virtual
 Understanding VMware VSphere machine (p2v)
Configuring and Managing Storage DRS Cluster  Converting virtual to virtual (v2v)
 Storage Concepts  Benefits of Enhanced VMotion
 Storage Overview Upgradation of Server
Compatibility (EVC)  Requirements for migration
 DAS,FC SAN, iSCSI, FCoE, NAS  DRS Cluster Settings  Upgradation to ESXi 5.x from ESXi 4.x
 Types of Datastore, VMFS, NFS  Adding a Host to DRS Cluster
 Test DRS Cluster functionality Managing vSphere Using command
Configuring Storage line interface
 Configuring iSCSI Storage Patch Management  Tools VCLI, VMA, SSH Client
 Configuring NAS/NFS Storage  Describe VMware VSphere Update  Managing ESXi
 FC SAN Storage, FCoE Manager  Managing VM's
 Multipathing With iSCSI, NAS, FC SAN  Installing update manager Understanding ESXi Server
 Configuring update manager Architecture
VMFS Datastores  Remediate ESXi Hosts  Understanding ESXi operating
 Creating a VMFS datastore system
 Increase the Size of VMFS datastore Data Protection  Understanding Virtualization kernel
 Deleting/Unmounting a VMFS  Traditional Backup and Virtual
Infrastructure Backup Troubleshooting Virtual Infrastructure
datastore  Various Real Time Troubleshooting
 vSphere Data Protection
VSAN Scenarios
Components, Architecture
 Troubleshooting VMs
 VMware vSphere VSAN  Deploying and Configuring VDP
 Troubleshooting ESXi Hosts,
 VSAN Benefits, Features, Architecture  Virtual Machine Backup and Restore
Networking, Storage

www.zoomgroup.com
LINUX
This course will cover all aspects of Linux Certification. At the end of the course delegates

will have the skills required to administer a Linux System. The course will also cover

Internet application server configuration on live registered domain name with valid public

IP addresses. The training will be given by Senior System / Network engineers with several

years of industry experience.

Course Outline

 Introduction to Unix, Installation of Linux

 User, Group administration, ACL

 Disk Partitions, by using Fdisk


linux
 Mounting File Systems, Swap File System

 Backup and recovery, Tar, cpio

 Basics of NFS, Sharing data

 Disk Quotas, LVM, Raid

 DHCP, DNS, Mail, Web, FTP, YUM

We are not an Affiliated Institution. Trademarks are properties of the respective vendors.
Course Curriculum

Introduction to UNIX & LINUX NFS


 History of UNIX and LINUX  Configuring NFS server

 Basic concepts of Operating System, Kernel, Shell & File System structure  Mounting NFS exports on NFS clients

 Basic concepts of Linux Dynamic Host Configuration Protocol (DHCP)


 Differences between CentOS, Red Hat Enterprise Linux & Fedora  Configuring Linux as DHCP Server

 Basic commands of Linux  Configuring various clients for DHCP Server (Windows & Linux)
 Advanced Linux Commands DNS Server
Installation of Linux  Configuration of DNS server
 Interactive Installation  Configuration of primary DNS server
 Network Based Installation  Configuration of forward lookup zone
Introduction to Graphical Environment  Configuration of reverse lookup zone
 Use and customize the GNOME interface  Testing tool of DNS zones
 Perform command tasks using the GNOME GUI  Adding services in DNS
 Launch applications from command line & GNOME interface Mail Server (SMTP, POP3, IMAP)
 Customize X Window System  Basics of Mail Servers

x
Software Package Administration  Configuring SMTP service using Postfix
 Installing and deleting software packages  Configuring POP3 / IMAP service on Linux
 Querying and updating software packages Web Server (Apache)
User and Group Administration  Basics of Web Service
 Creating and deleting users from the systems  Introduction to Apache
 Modifying users profile  Configuring Apache for main site
 Creating and deleting groups  Configuring Apache for multiple sites using IP-based, port-

 Important system files related to user administration based and name-based virtual hosting
Advanced File Permissions FTP Server (vsftp daemon)
 Assigning advanced files permissions i.e. chmod, chown, chgrp &
 Basics of File Transfer Protocol
Sticky bit  Configuring vsftpd for anonymous ftp service
 Creating, modifying and deleting ACL’s
RAID (Redundant Array of InExpensive Disks) &
Disk Partitioning and Mounting File System Logical Volume Manager
 Using fdisk, disk druid utilities for disk partitioning  Implementing RAID on Linux
 Using mkfs, commands to create file systems  RAID levels (0, 1 and 5) configuration using raid tools
 Mounting various file systems  Resizing the Partition using LVM
 Auto mounting of file system
Web based Administration
Disk Quotas  Installing Webmin on Linux
 Enabling Quotas on partitions  Administrating Linux machine remotely
 Creating Quotas for users  Using Webmin as a tool for configuring various services on Linux
 Auditing Quotas limit Difference between Unix and Linux Flavors
Backup and Recovery Live Setup - Demo by Faculty
 Introduction to various types of backup media
Designing, Implementing & Maintaining of
 Backup and restoring using tar and cpio commands
Corporate Network

www.zoomgroup.com
Advanced Linux
Practical Implementation in Real Time Environment

Zoom Technologies brings to you the all new Advanced Linux course. This course is designed

for professionals to easily install and configure advanced Linux services like IPv6, IPsec VPN,

iptables as well as configuration of SAN, MySQL, Oracle integration of Linux and Windows

etc. The training will be conducted by senior System/Network engineers with several years

of industry experience.

Course Outline
 Introduction and configuration of LDAP Server.
Advanced
linux
 Configuration of Winbind Server.

 Integration of Active Directory Users with Linux Clients.

 Implementation of LDAP Backup Server.

 Introduction & configuration of ZIMBRA Mail Server.

 Authentication of SAMBA DOMAIN Server with WINDOWS Clients.

 Introduction & configuration of Oracle Database Server.

 Introduction & configuration of Maria Database Server.

 Implementation of HTTPS Service. Proxy Server, Booting Process.

 Implementation of Nagios Monitoring Tool Service.

 Introduction & configuration of SAN, Virtualization, Dump, Automation of Jobs

 Explanation & configuration of CLUSTER Servers.

 Importance & configuration of NTP Server. IP Bonding logserver.

 Introduction & configuration of VPN (PPTP & IPsec).

 Introduction & configuration of Apache Tomcat.

 Implementation of all Servers on IPv6 LDAP, WEB & MAIL etc.,

 Securing Network with Firewall (Iptables & SELinux)


We are not an Affiliated Institution. Trademarks are properties of the respective vendors.
Course Curriculum
LDAP Server Oracle
• Introduction of LDAP. • Installation & Configuration of Oracle 11g
• Structure of LDAP Schema & Features • Create users & groups
• Comparison between NIS & LDAP. • Assign the passwords
• Configuring LDAP Server Creating of LDAP Domain Database. • Create Database Directory
• LDAP Users and Groups • Provide Permission for Database
• Adding, Modifying and Deleting Users from LDAP Database. • Access Oracle Database for Web Interface
• Configuring LDAP SLAVE Server as a Backup Server. • Login with Oracle users from Web Interface
• Explaining the Data Replication in Between Master and Slave. APACHE TOMCAT
W E B Server (A p a c h e ) • Installation & Configuration of Tomcat & JDK
• Introduction of Apache. • Creating users & groups
• Comparison between HTTP And HTTPS. • Assigning the Password
• Generating SSL keys & Creating CA. • Integration of Tomcat with Apache
• Configuring HTTPS Clients. • Access Tomcat with web Interface
Clustering (Web Based) IPv6 Configuration
• Types of CLUSTER. • Check For Ipv6 Support In the current running Kernel
• Explanation of Load Balancing & LVS Components. • Adding, Checking and Removing IPv6, Gateway, and DNS IP
• Configuring Real and Backup Servers. • Bringing Interface up/down
• Checking Load Balancing in CLUSTER Server. Configuration of All Servers on IPv6
IPsecVPN • LDAP, DNS, DHCP, APACHE, MAIL, and FTP etc,.
• Introduction of VPN. Security with Iptables and SElinux, Firewall d
• Types of VPN & VPN Protocols. • Introduction of iptables chains and tables
• Installing Graphical Tool of VPN. • Configuration of iptables rules
• Configuring the Setup of VPN in Multiple Networks. • Activating the iptables rules
SAN • Configuring iptables for servers
• Introduction of SAN, DAS and NAS.

x
• Explanation of SElinux Policies
• Explaining Protocols. • Configuring SElinux Permanent/SElinux for servers
• Configuring SAN Server by using SCSI Target. Remote Installation
• Making SAN Clients by using SCSI Initiator. • Configuration of PXE
SAMBA (PDC) Boot Process
• Configuration to create a Samba PDC • Booting Sequence
• To create samba PDC Administrator User • Kernel Initialization
• Add Windows workstation to Samba Domain • INIT Process
• Add & Delete users from Samba Domain Backup and Recovery
• Modify Samba passwords • Introduction to various types of backup media
Winbind • Backup and restoring data using dump / restore commands
• Introduction & Installing Samba • Automation of Jobs (Cronjob & At Job)
• Set up a basic smb.conf • Remote Backup with SCP
• Joining a Member Server to the Active Directory domain Proxy Server (Squid)
• Make Active Directory domain users/groups available locally through • Basics of proxy services
Winbind • Configuring proxy services
• Starting the daemons, Testing the winbind user/group mapping • Creating ACLs for controlling access to internet
• Login Active Directory Users from Linux clients Samba Service
Zimbra Mail Server • Basics of file sharing in Windows
• Configuration & Installation of Zimbra Mail Service • Configuring Samba service for file sharing with windows systems
• Integration of Zimbra with LDAP Troubleshooting your system
• Starting the Daemons • Recovering the super user password
• Creating users Mail Accounts/Creating Groups • Recovering the boot loader (GRUB)
• Taking backup of Mail Accounts • Troubleshooting Xserver problems
• Maintaining the Logs of Mail Accounts • Troubleshooting network related problems
Nagios Monitoring Tool Virtualization
• Installation & configuring of Nagios & Plugins • Managing Virtual machine with kvm & Qemu
• Create Nagios User & Group • Starting & stoping virtual machine
• Installation & Configuration of Web Interface for Nagios • Virtualization troubleshooting
• Starting the Service Log Server
• Login with Nagios web Interface • Configuring Analysis and logs
• Adding Multiple Servers & Clients in Nagios • Configuring Rsyslog & Saving Syslog Messages
NTP Server • Sending Syslog Message over the network
• Configuration of NTP Server • Configuring Rsyslog clients & Users log files
• Starting the service Kernel Upgradation
• NTP Synchronization • Checking existing Kernel
• Configuration of Client • Upgrading Kernel with RPM tool
Maria Database Teaming
• Installation of Maria DB on LINUX • Configuring Teaming
• Starting the service • Nic Failover
• Creating a Maria DB root Account • Maintain load balancing
• Location of Maria DB Database • Autofs
• Accessing Maria DB Command Line • Openssh
• Creating and Deleting Maria DB

www.zoomgroup.com
Amazon Web Services
Cloud hosted web sites and applications are the future of Information Technology.
Amazon Web Services (AWS) is a secure cloud services platform, offering compute
power, database storage, content delivery, highly reliable, scalable, low-cost pay-
for-what-you-use infrastructure platform on the cloud. AWS powers hundreds of
thousands of businesses around the world and offers other functionality to help
businesses scale and grow.

As Cloud Computing has become very popular, there is a great demand for
System and Cloud Administrators with AWS skills.

This course is taught by industry experts with several years of experience.

AWS
Course Outline

·
·
Introduction to Amazon Web Services (AWS)
Introduction to Cloud Computing
Amazon Web
· Compute Services (EC2, AMI Etc.) Services
· EC2 Instances
· Amazon Elastic Block Store (EBS)
· LOAD BALANCING & Auto Scaling
· Network & Security
· Elastic Beanstalk, Amazon Virtual Private Cloud (VPC)
· Amazon Route 53, Cloudfront
· Security & Identity Services, IAM
· Storage & Content Delivery Services, Amazon S3 & Amazon Glacier, EFS
· Database Services (RDS, NoSQL Service)
· Management Tools (Amazon Cloud watch, Cloud Formation)
· Application Services (SES, SQS, SNS)
We are not an Affiliated Institution. Trademarks are properties of the respective vendors.
Course Curriculum
Introduction to Cloud Computing Auto Scaling Security & Identity Services
• What is Cloud • What is auto scaling? • Identity Access Management (IAM)
• Why Cloud? • Auto scaling components • IAM Features
• Types of Cloud Deployment Models • Benefits of auto scaling • Getting Started With IAM
• Types of Cloud Services • Creation of launch configuration • Creation of user, groups, roles
• Future of Cloud Technologies • Configuration of auto scaling policies • Managing policies
• Advantages and Disadvantages of Cloud • Advantages of using auto scaling with ELB • Credential Report
Network & Security • IAM Console and the Sign-in Page
Introduction to Amazon Web • Security Groups
• Elastic IPs Database Services
Services (AWS) Relational Database Service (RDS)
• What is AWS? • Key Pairs
• Network Interfaces • RDS Essentials
• How to Subscribe for AWS account • Launching RDS instance
• What is the AWS Free Usage Tier Elastic Beanstalk
• Selecting the Engine
• AWS Certification • Deploy, manage, scale an application
• Configuring the Database Engine
• Introduction to the AWS management • How management complexity are reduced
• Managing RDS Database
Console • Workflow of Elastic Beanstalk
• Setting up automatic backups
• List of services given by AWS • Create Application • Authorizing access to the DB
• Launch Environment DynamoDB (NoSQL Service)
Compute Services • Manage Environment • DynamoDB overview
Elastic Compute Cloud (EC2) • Modifying the properties of the deployment • What is NoSQL database?
• What is Amazon EC2? • How It Works
• Features of Amazon EC2 Networking Services • Using the DynamoDB Console
• Managing the EC2 infrastructure Amazon Virtual Private Cloud (VPC) • Creating Tables and Loading Sample
• EC2 Dashboard • What is Amazon VPC? Data
• VPC Essentials • Query and Scan Operations in
• Pricing for Amazon EC2
• Default and Nondefault VPC DynamoDB
Regions and Availability Zone Concepts
• VPC Networking and ACL
• Describing Regions
• Security Groups Management Tools

b
• Availability Zones, and Endpoints Amazon CloudWatch
• DNS and DHCP Options Sets
• Managing instances in an Availability Zone • Amazon CloudWatch Architecture
• VPC Peering and Endpoints
Amazon Machine Images (AMI) • List of services monitored by CloudWatch
• Subnet Routing
• Managing AMIs • Collect and track metrics
• VPC Internet Gateway
• Working with Windows, Linux AMIs • Monitoring memory and disk Metrics
• Elastic IP addresses and network interfaces
• Shared and Paid AMI • Monitoring logs, Graphs
• VPC integration with many other AWS
• Making an AMI Public • Set Alarms
services
EC2 Instances Cloud Formation
• Creating a NAT instance in a VPC
• Instance Type • Building AWS infrastructure as a code
• Configuring a Web application in VPC • Design a template
• Instance life cycle
Amazon Route 53 • Create a Stack
• Differences between reboot, stop, and
• Route 53 as your DNS service • Create a Template from your Existing
terminate
• Using Traffic Flow Resources
• Building an EC2 windows and linux
• Route 53 Health Checks Cloud Trail
instances
• Configuring DNS Failover
• To install instance in public and private
• Latency Based Routing Application Services
subnet
• Weighted Routing Policies Amazon Simple Email Service (SES)
• Security via Key Pairs
Cloud Front • Simple email service overview
• EC2 Class and VPC Security Groups • Configuring Amazon email service
• Managing Elastic IP’s
Storage & Content Delivery • Amazon SES and Deliverability
• Pricing model in EC2 instances • Amazon SES Email-Sending Process
Services
• EC2 with Amazon command line interface • Email format and Limits of SES
Amazon S3
Amazon Elastic Block Store (EBS) Amazon Simple Queue Service (SQS)
• What is object Storage?
• Features of Amazon EBS • Simple Queue service overview
• Data as objects
• Amazon EBS volumes • Lifecycles of S3 • SQS for background work task
• Managing EBS volumes • Creating a Queue
• Managing Buckets
• Increasing the volume size • Confirming the Queue exists
• Accessing S3 storage via tools
• Amazon EBS snapshots • Add a permission to the Queue
• Creation of a static website using S3
Load Balancing storage
• Creating a load balancer Amazon Simple Notification
Amazon Glacier Service (SNS)
• Internal and external load balancer • Low-cost storage service Simple Notification Service overview
• Load balancing protocols • Storage for data backup and archival • Publishers and subscribers
• Security groups for the load balancer • Pricing model for Glacier storage • Subscribing to topic via Email
• Health check for the load balancer • Working with vaults and archives • Setting notification for EC2 instance
• Cross-zone load balancing EFS Elastic File System changes
• Connection Draining

www.zoomgroup.com
Cisco Certified Network Associate (CCNA)
The CCNA (Cisco certified network associate) is meant for all those looking to get a foothold
in Networking. This forms the base of the Cisco training pyramid and offers different
specializations for network engineers. The basic CCNA course is CCNA - Routing and
Switching. We also offer the CCNA Security and the CCNA Voice both of which require
the CCNA Routing and Switching as a prerequisite.

The CCNA course is taught by world class instructors in state of the art classrooms with
labs equipped with cutting edge infrastructure, including high end routers, switches and
servers. The course is taught in a hands on manner so that students can get an actual
feel of the nitty gritty of networking.

Course Outline

CCNA
 CCNA Routing and Switching
 Basics of IP networking
 Lan Switching
 IP Addressing IPv4 and IPv6
 Routing Protocols
Routing & Switching
 WAN Technologies
 Troubleshooting
Security
Voice
 CCNA Security
 Common Security threats and attacks
 Security on Cisco Routers
 Cisco Firewall Technologies
 Cisco IPS
 VPN Technologies
 Secure Network Management and Reporting

 CCNA Voice:
 Cisco Unified Communications Manager Express
 Cisco IP Phone Concepts, Registration and EPhone-DNS
 VoIP
 PSTN and digital network convergence
 Cisco unified communications
 Enabling Telephony Features with CUCM

We are not an Affiliated Institution. Trademarks are properties of the respective vendors.
CCNA Routing & Switching
Course Curriculum
1.0 Network Fundamentals  Configure, verify & troubleshoot EIGRP for IPv4 & IPv6
 Compare & contrast OSI & TCP/IP models (excluding authentication, filtering, manual summarization,
 Compare & contrast TCP & UDP protocols redistribution, stub)
 Impact of infrastructure components in a network  Configure, verify, and troubleshoot RIPv2 for IPv4
 Firewalls, Access points, Wireless controllers (excluding authentication, filtering, manual summarization,
 Effects of cloud resources on network architecture redistribution)
 Traffic path to internal and external cloud services  Troubleshoot basic Layer 3 end-to-end connectivity issues
 Virtual services 4.0 WAN Technologies
 Basic virtual network infrastructure  Configure & verify PPP and MLPPP on WAN interfaces using local
 Compare & contrast collapsed core and three-tier architecture authentication
 Compare & contrast network topologies  Configure, verify, & troubleshoot PPPoE client-side interfaces using
 Star, Mesh, Hybrid local authentication
 Select the appropriate cabling type (Straight & Cross)  Configure, verify, & troubleshoot GRE tunnel connectivity
 Apply troubleshooting methodologies to resolve problems  Describe WAN topology options
 Perform and document fault isolation  Point-to-point, Hub and spoke, Full mesh, Single vs dual-homed
 Resolve or escalate  Describe WAN access connectivity options
 Verify & monitor resolution  MPLS, Metro Ethernet, Broadband PPPoE, Internet VPN (DMVPN,
 Configure, verify & troubleshoot IPv4 addressing & subnetting site-to-site VPN, client VPN)
 Compare & contrast IPv4 address types  Configure and verify single-homed branch connectivity using eBGP
 Unicast, Broadcast, Multicast IPv4 (limited to peering and route advertisement using Network
 Describe the need for private IPv4 addressing command only)
 Identify IPv6 addressing to use in LAN/WAN environment  Describe basic QoS concepts
 Configure, verify & troubleshoot IPv6 addressing  Marking, Device trust, Prioritization, (Voice, Video & Data)
 Configure & verify IPv6 Stateless Address Auto Configuration  Shaping, Policing, Congestion management

A
 Compare & contrast IPv6 address types 5.0 Infrastructure Services
 Global unicast, Unique local, Link local, Multicast, Modified  Describe DNS lookup operation
EUI 64, Autoconfiguration, Anycast  Troubleshoot client connectivity issues involving DNS
2.0 LAN Switching Technologies  Configure and verify DHCP on a router (excluding static reservations)
 Describe & verify switching concepts  Server, Relay, Client, TFTP, DNS, & gateway options
 MAC learning & aging, Frame switching, Frame flooding,  Troubleshoot client- and router-based DHCP connectivity issues
MAC address table  Configure, verify, and troubleshoot basic HSRP
 Interpret Ethernet frame format  Priority, Pre-emption, Version
 Troubleshoot interface & cable issues (collisions, errors,  Configure, verify, and troubleshoot inside source NAT
duplex, speed)  Static, Pool, PAT

ng  Configure, verify, and troubleshoot VLANs (normal/extended


range) spanning multiple switches
 Configure and verify NTP operating in a client/server mode
6.0 Infrastructure Services
 Access ports (data & voice), Default VLAN  Configure, verify, and troubleshoot port security
 Configure, verify, and troubleshoot interswitch connectivity  Static, Dynamic, Sticky, Max MAC addresses, Violation actions &
 Trunk ports, Add & remove VLANs on a trunk Err-disable recovery
 DTP, VTP (v1&v2), and 802.1Q Native VLAN  Describe common access layer threat mitigation techniques
 Configure, verify, & troubleshoot STP protocols  802.1x, DHCP snooping, Nondefault native VLAN
 STP mode (PVST+ and RPVST+), STP root bridge selection  Configure, verify, and troubleshoot IPv4 and IPv6 access list for
 Configure, verify & troubleshoot STP related optional features traffic filtering
 PortFast, BPDU guard  Standard, Extended, Named
 Configure & verify Layer 2 protocols  Verify ACLs using the APIC-EM Path Trace ACL analysis tool
 Cisco Discovery Protocol, LLDP  Configure, verify, and troubleshoot basic device hardening
 Configure, verify, & troubleshoot (Layer 2/Layer 3)  Local authentication, Secure password, Access to device
EtherChannel (Source address & Telnet/SSH)
 Static, PAGP, LACP  Login banner
 Describe the benefits of switch stacking & chassis aggregation  Describe device security using AAA with TACACS+ and RADIUS
3.0 Routing Technologies 7.0 Infrastructure Management
 Describe the routing concepts  Configure and verify device-monitoring protocols
 Packet handling along the path through a network  SNMPv2, SNMPv3 & Syslog
 Forwarding decision based on route lookup  Troubleshoot network connectivity issues using ICMP echo-based IP SLA
 Frame rewrite  Configure and verify device management
 Interpret the components of a routing table  Backup and restore device configuration
 Prefix, Network mask, Next hop, Routing protocol code  Using CDP or LLDP for device discovery
 Administrative distance, Metric  Licensing, Logging, Timezone & Loopback
 Gateway of last resort & Admin distance  Configure and verify initial device configuration
 Configure, verify, & troubleshoot inter-VLAN routing  Perform device maintenance
 Router on a stick & SVI  Cisco IOS upgrades and recovery (SCP, FTP, TFTP, and MD5 verify)
 Compare & contrast static routing & dynamic routing  Password recovery and configuration register & File system
 Compare & contrast distance vector and link state routing management
protocols  Use Cisco IOS tools to troubleshoot and resolve problems
 Compare & contrast interior and exterior routing protocols  Ping & traceroute with extended option
 Configure, verify & troubleshoot IPv4 and IPv6 static routing  Terminal monitor, Log events, Local SPAN
 Default route, Network route, Host route, Floating static  Describe network programmability in enterprise network architecture
 Configure, verify & troubleshoot single area & multi-area  Function of a controller
OSPFv2 for IPv4 & IPv6 (excluding authentication, filtering,  Separation of control plane and data plane
anual summarization, redistribution, stub, virtual-link, and  Northbound and southbound APIs
LSAs)

www.zoomgroup.com
CCNA Security
Course Curriculum
Common Security Threats Common Layer 2 Attacks Cisc
Esse
 Describe common security threats  Describe Layer 2 security using Cisco switches 

Describe VLAN security


Security and Cisco Routers
 Implement VLANs and trunking
 Implement security on Cisco routers 
 Implement spanning tree
 Securing the control, data, and management plane Bas
 Describe Cisco Security Manager Cisco IPS 

 Describe IPv4 to IPv6 transition  Cisco Intrusion Prevention System (IPS)

deployment
AAA on Cisco Devices 
 Describe IPS technologies
 AAA (authentication, authorization and
 Configure Cisco IOS IPS using CCP Net
accounting) 

 Describe TACACS+ VPN Technologies

 Describe RADIUS  Describe the different methods used in

 Describe AAA cryptography
 Verify AAA functionality  Describe VPN technologies 

 Describe the building blocks of IPSec Cisc
IOS ACLs
 IPSec site-to-site VPN with pre-shared key 
 Describe ACL Filtering
 Verify VPN operations 
 Standard
 Secure Sockets Layer (SSL) VPN using ASA device
 Extended 

 Named ACL Intro to Cisco ASA 
Implement the Cisco Adaptive Security Appliance
 Describe considerations when building ACLs 
Cisc
 Implement IP ACLs to mitigate threats in a network Virt

Secure Network Management and Reporting

 Describe secure network management

 Implement secure network management


Cisco Firewall Technologies
 Operational strengths and weaknesses of firewall Cisc
Com
 Describe stateful firewalls 

 Describe the types of NAT used in firewall

 Implement zone-based policy firewall using CCP

 Implement Network Address Translation (NAT)

 Implement Port Address Translation (PAT) Cisc
Acce


We are not an Affiliated Institution. Trademarks are properties of the respective vendors.
Cisco ASA Firewall + Cisco IPS
Course Curriculum
Cisco ASA Adaptive Security Appliance Cisco Any Connect Remote Access SSL Solutions
Essentials  Deploying a Basic Cisco AnyConnect Full-Tunnel SSL VPN Solution
 Evaluating Cisco ASA Adaptive Security
 Deploying an Advanced Cisco AnyConnect Full-Tunnel SSL
Appliance Technologies
VPN Solution
 Identifying Cisco ASA Adaptive Security
Cisco ASA Adaptive Security Appliance Remote Access IPsec VPNs
Appliance Families
 Deploying Cisco Remote Access VPN Clients
 Identifying Cisco ASA Adaptive Security
Appliance Licensing Options  Deploying Basic Cisco Remote Access IPsec VPN Solutions
Basic Connectivity and Device Management Cisco ASA Adaptive Security Appliance Site-to-Site IPsec VPN
Solutions
 Preparing the Cisco ASA Adaptive Security
Appliance for Network Integration  Deploying Basic Site-to-Site IPsec VPNs
 Managing Basic Cisco ASA Adaptive Security  Deploying Advanced Site-to-Site IPsec VPNs
Appliance Network Settings Deploying Cisco IOS Software Site-to-Site Transmission Security
 Configuring Cisco ASA Adaptive Security  Site-to-Site VPN Architectures and Technologies
Appliance Device Management Features
 Deploying GRE over IPsec VPNs
Network Integration
 Deploying VTI-Based Site-to-Site IPsec VPNs
 Configuring Cisco ASA Adaptive Security
 Deploying Scalable Authentication in Site-to-Site IPsec VPNs
Appliance NAT Features
 Deploying DMVPNs
 Configuring Cisco ASA Adaptive Security
Appliance Basic Access Control Features Deploying Secure Remote Access with Cisco IOS Software
 Configuring Cisco ASA Adaptive Security  Remote Access VPN Architectures and Technologies
Appliance Routing Features  Deploying Remote Access Solutions Using SSL VPN
 Configuring the Cisco ASA Adaptive Security  Deploying Remote Access Solutions Using Cisco Easy VPN
Appliance Transparent Firewall Introduction to Intrusion Prevention and Detection, Cisco IPS
Cisco ASA Adaptive Security Appliance Policy Control Software, and Supporting Devices
 Defining the Cisco ASA Adaptive Security  Evaluating Intrusion Prevention and Intrusion Detection Systems
Appliance MPF  Choosing Cisco IPS Software, Hardware, and Supporting
 Configuring Cisco ASA Adaptive Security Applications
Appliance Connection Policy and QoS Settings  Evaluating Network IPS Traffic Analysis Methods, Evasion
 Configuring Cisco ASA Adaptive Security Possibilities, and Anti-Evasive Countermeasures
Appliance Advanced Application Inspections  Choosing a Network IPS and IDS Deployment Architecture
 Configuring Cisco ASA Adaptive Security Installing and Maintaining Cisco IPS Sensors
Appliance User-Based Policies
 Integrating the Cisco IPS Sensor into a Network
Cisco ASA Adaptive Security Appliance High Availability and
 Performing the Cisco IPS Sensor Initial Setup
Virtualization
 Managing Cisco IPS Devices
 Configuring Cisco ASA Adaptive Security
Appliance Interface Redundancy Features Applying Cisco IPS Security Policies
 Configuring Cisco ASA Adaptive Security  Configuring Basic Traffic Analysis
Appliance Active/Standby High Availability  Implementing Cisco IPS Signatures and Responses
 Configuring Security Contexts on the Cisco ASA  Configuring Cisco IPS Signature Engines and the Signature
Adaptive Security Appliance Database
 Configuring Cisco ASA Adaptive Security  Deploying Anomaly-Based Operation
Appliance Active/Active High Availability
Adapting Traffic Analysis and Response to the Environment
Cisco ASA Adaptive Security Appliance VPN Architecture and
 Customizing Traffic Analysis
Common Components
 Managing False Positives and False Negatives
 Evaluating the Cisco ASA Adaptive Security Appliance VPN
Subsystem Architecture  Improving Alarm and Response Quality
 Evaluating the Cisco ASA Adaptive Security Appliance Managing and Analyzing Events
Software Architecture  Installing and Integrating Cisco IPS Manager Express with
 Implementing Profiles, Group Policies, and User Policies Cisco IPS Sensors
 Implementing PKI Services  Managing and Investigating Events Using Cisco IPS Manager
Express
Cisco ASA Adaptive Security Appliance Clientless Remote
Access SSL VPN Solutions  Using Cisco IME Reporting and Notifications
 Deploying Basic Clientless VPN Solutions
 Deploying Advanced Application Access for Clientless SSL VPNs
 Customizing the Clientless SSL VPN User Interface and Portal

www.zoomgroup.com
Cisco Certified Network Professional (CCNP)
CCNP - Cisco Certified Network professional. This is the  advanced level certification program
from Cisco. This is meant for professionals who want to gain a deeper understanding of
networking technologies with an emphasis on planning and implementing LANs and WANs.
The CCNP  program helps the engineer bring together technologies like wireless, VoIP,
security into a comprehensive whole.

We offer the CCNP as three specialized courses-Routing and Switching, Security and Voice.
The prerequisite for each is a CCNA in the respective specializations. The CCNP program
is taught by senior network engineers in a world class environment with state of the art
labs and infrastructure.

Course Outline



CCNP - Routing and Switching


Implementing Cisco IP Routing (ROUTE)
Implementing Cisco IP Switched Networks (SWITCH)
Troubleshooting and Maintaining Cisco IP Networks (TSHOOT)
CCNP
Routing & Switching

Security
Voice
CCNP - Security

 Deploying Cisco ASA Firewall solutions
 Deploying Cisco VPN solutions
 Implementing Cisco Intrusion Prevention System

 CCNP – Voice
 Implementing Cisco Voice Communications and QoS (CVOICE )
 Implementing Cisco Unified Communications Manager, Part 1 (CIPT1 )
 Implementing Cisco Unified Communications Manager, Part 2 (CIPT2 )
 Troubleshooting Cisco Unified Communications (TVOICE )
 Integrating Cisco Unified Communications Applications (CAPPS )

We are not an Affiliated Institution. Trademarks are properties of the respective vendors.
CCNP Routing & Switching
Course Curriculum
ROUTE- (300-101) Infrastructure Security
Introduction to Router and Routing Protocols:  IPv4 ACL (Standard, Extended, Time-based)
 Static Routing, Dynamic Routing, Default Routing  IPV6 Traffic Filter
 IP Addressing, Summarization (Auto and Manual)  Unicast RPF

Enhanced Interior Gateway Routing Protocol Infrastructure Services


 EIGRP Features, EIGRP Update Process  Configure and Verfify IPV4 NAT
 Configuration and Verification of EIGRP Tables  Static, Dynamic, PAT
 EQUAL and UNEQUAL Metric Route Load Sharing  IPV6 NAT
 Summarization, EIGRP Metric Tuning SWITCH – (300-115)
 Manipulating Hello and Hold Timer
 Static Neighbor configuration Enterprise Campus Network Design
 Passive Interfaces, Authentication  Hierarchical Network Design
 Neighbor ship over WAN, EIGRP Stub features  Multi Layer Switch Operation, Types of Multi Layer Switch
 Default Route with EIGRP  Switching Tables: CAM / TCAM
 Route Filtering by using ACL, IP Prefix-list and Route-Map  Switch Port Cables and Connectors
 Switch Port Configuration: Port Speed & Port Duplex Mode
OPEN SHORTEST PATH FIRST  VLAN and TRUNKS: VLAN Membership and Deployment
 OSPF Link State Features, Packet Types  Trunk Encapsulation (ISL/Dot1q), DTP
 OSPF Neighbors and Adjacencies on LAN and WAN  VLAN Trunking Protocol: VTP Domain / Modes / Advertisement
 LSA TYPES, OSPF Metric Calculation and Tuning  VTP Version and VTP Pruning
 OSPF Network Types (Point-to-Point, BMA, NBMA)
 Power over Ethernet: Configuring and Verifying PoE
 OSPF Configuration and Verification, Route Filtering

P
 Configuring and Verifying Voice VLAN
 Route Summarization, Default Route in OSPF
 Special Areas (Stub, Totally Stubby, NSSA, Totally NSSA) Aggregating Switch Link
 OSPF Virtual Link with Authentication / No Authentication  Switch Port Aggregating with Ether Channel,
 Manipulating Hello and Dead Intervals  Ether Channel Load Balancing,
Route Redistribution  Ether Channel Negotiation Protocol (PAgP, LACP)
 Redistribution Concepts and Process Spanning Tree Protocol
 Redistributing into EIGRP / OSPF / RIP  STP Concept, BPDU (CBPDU, TCN BPDU)
Advance Redistribution:  STP States, STP Timers

ng  PBR function and configuration,  Types of STP: CST/PVST /PVST+


 Redistribution with Route-Map / Distribute-list  STP Root Bridge Placement and Configuration
 Issues with Multiple Redistribution Points  STP Customization, Modifying STP Timers
 IP Service Level Agreement  PORTFAST / UPLINKFAST / BACKBONEFAST
 Protecting STP: ROOTGUARD/ BPDUGUARD/ LOOPGUARD/UDLD
BORDER GATEWAY PROTOCOL
 Basics of Internet Routing and Addressing Advance Spanning Tree Protocol
 Internet Route Aggregation  Rapid Spanning Tree Protocol
 BGP ASNs (Public and Private ASNs)  BPDU & Convergence in RSTP
 Single Homed, Dual Homed  Multiple Spanning Tree Protocol
 Single Multi homed, Dual Multi homed  MST Region, Instances with MST
 Internal BGP: Next-hop Issue with IBGP  Type of Interfaces in MLS, Inter VLAN Routing in MLS
 Split-Horizon, IBGP Mesh  Multi Layer Switching with CEF, DHCP within a MLS
 Clearing BGP Peers (Inbound and Outbound Filtering)  Routing Configuration in MLS
 IBGP Neighbors with Loopback Address
 External BGP: EBGP Neighbors with Loopback Address Layer 3 High Availability
 BGP Update Messages and BGP States  HSRP / VRRP / GLBP
 Effect of Auto Summarization in BGP  Supervisor and Route Processor Redundancy
 BGP Path Attributes: weight, Local Preference,  Configuring Redundancy Modes & Supervisor Synchronization
As-path Pre-pend  Non Stop Forwarding
 Origin Codes, Multi Exit Discriminator
 BGP Route Filtering and BGP PATH Selection Process Securing Switched Network
 Port Security, 802.1x Authentication, Port Based Authentication
IP Version 6 Addressing  Mitigating Spoofing Attacks, DHCP Snooping, IP Source Guard
 IPV6 Address Representation, Types of IPV6 Addresses  Dynamic ARP Inspection, VLAN ACL, Securing VLAN Trunk,
 Global Route Aggregation, Static IPV6 Address Configuration  VLAN Hopping, Private-VLAN Concept
 Stateful DHCP, Stateless Auto Configuration
 Multicast and other Special IPV6 Addresses, DAD TSHOOT – (300-135)
 IPV6 Routing Protocols and IGP Redistribution  Introduction to Network Maintenance
 IPV4 and IPV6 Co-existence: Dual Stack, Tunneling, NAT-PT  Introduction to Troubleshooting Process
 Static Point-to-Point IPV6 Tunneling  Maintenance & Troubleshooting
 Dynamic Multipoint IPV6 Tunnel:  Basic & Adv. Cisco Catalyst Switch Troubleshooting
 Auto and Manual 6 to 4 Tunnel, ISATAP Tunnel  Introduction to Troubleshooting Routing Protocols
 Security Troubleshooting
VPN Technologies
 IP Services Troubleshooting
 VPN/MPLS
 IP Communications Troubleshooting
 DMVPN (Single Hub)
 Network Monitoring tools PRTG, SolarWinds
 PPPoE (Client Side)
 Packet Analyzing & Sniffing tools Wireshark

www.zoomgroup.com
Cisco Certified Internetwork Expert (CCIE)
The CCIE is the crème-de-la-crème of Networking certifications, and there are less
than 50,000 CCIEs worldwide across all specializations. To get into this exclusive
club, you need to get trained with the very best people who have decades of
expertise in teaching, implementing and managing enterprise class networking
projects. ZOOM provides the highest quality of CCIE Mapped training, with world
class professionals and state of the art lab infrastructure. We offer the CCIE
across three specializations - Routing and Switching, Security and Collaboration
(which replaces CCIE Voice).

We also offer something which no other training institute does - a full scale,
8 hour challenge lab which replicates the lab exam, bundled for FREE with our
CCIE course.

 CCIE Routing and Switching:


 Network Principles

CCIE

 Layer 2 Technologies
 Layer 3 Technologies
 VPN Technologies
 Infrastructure Security
 Infrastructure Services
Routing & Switching
 CCIE Security Security
 Infrastructure, Connectivity, Communications,
and Network Security
Voice
 Security Protocols
 Application and Infrastructure Security
Threats, Vulnerability Analysis, and Mitigation
 Cisco Security Products, Features, and Management
 Cisco Security Technologies and Solutions
 Security Policies and Procedures, Best Practices, and Standards

 CCIE Collaboration (replaces CCIE Voice)


 Telephony Standards and Protocols
 Cisco Unified Communications Manager (CUCM)
 Cisco IOS UC Applications and Features
 Quality of Service and Security in Cisco Collaboration Solutions
 Cisco Unity Connection
 Cisco Unified Contact Center Express
 Cisco Unified IM and Presence
We are not an Affiliated Institution. Trademarks are properties of the respective vendors.
CCIE Routing & Switching V-5.0
Course Curriculum
3.7 BGP
1.0 Network Principles  Peer relationships
1.1 Network theory  IBGP and EBGP
 Software architecture differences between IOS and IOS XE  Explain attributes and best-path selection
 Identify Cisco express forwarding concepts  Routing policies
 Explain general network challenges  Scalability/multiprotocol BGP/AS path manipulations

 Explain IP/TCP/UDP operations  Describe BGP fast convergence features

1.2 Network implementation and operation 3.8 ISIS (for IPv4 and IPv6)
 Describe basic ISIS network
 Evaluate proposed changes to a network
 Single area, single topology
1.3 Network troubleshooting
 Neibor relationship, Network types, Levels and router types
 Use IOS troubleshooting tools
 NSAP addressing
 Apply troubleshooting methodologies
 Point-to-point, broadcast
2.0 Layer 2 Technologies  Describe operations & optimization features
 Metrics
2.1 LAN switching technologies
 Switch administration 4.0 VPN Technologies
 Layer 2 protocols, VLAN & trunking
4.1 Tunneling
 Spanning-tree & EtherChannel  MPLS, Basic MPLS L3VPN, Encapsulation, DMVPN (single hub)
 Other LAN switching technologies SPAN, RSPAN, ERSPAN  Describe IPv6 tunneling techniques
 Chassis virtualization and aggregation technologies  Describe basic layer 2 VPN-wireline/L2VPN-LAN services
 Describe spanning-tree concepts 4.2 Encryption
2.2 Layer 2 multicast  IPsec with preshared key
 Implement and troubleshoot IGMP  IPv4 site to IPv4 site & IPv6 in IPv4 tunnels
 Explain MLD & PIM snooping  Virtual tunneling Interface (VTI)
 Layer 2 WAN circuit technologies  Describe GET VPN
 Implement and troubleshoot HDLC/PPP
 Describe WAN rate-based Ethernet circuits
5.0 Infrastructure Security
5.1 Device security
3.0 Layer 3 Technologies  IOS AAA using local database
3.1 Addressing technologies  Device access control/control plane policing

 IPv4/IPv6 addressing and subnetting  Device security using IOS AAA with TACACS+ & RADIUS

ng 3.2 Layer 3 multicast


 Troubleshoot reverse path forwarding
5.2 Network security
 Switch security features/router security features
 802.1x, EAP, RADIUS
 IPv4 protocol independent multicast
 Multicast source discovery protocol 6.0 Infrastructure Services
3.3 Fundamental routing concepts
6.1 System management
 Static routing/default routing
 Implement and troubleshoot device management
 Compare routing protocol types
 Console and VTY, telnet, HTTP, HTTPS, SSH (T) FTP
 Administrative distance
 SNMP/v2c, v3, logging, Local logging
 Passive interface/VRF lite
 Syslog, debug, conditional debug
 Filtering with any routing protocol
6.2 Quality of service
 Redistribution between any routing protocol  End-to-End QoS, CoS and DSCP mapping
 Manual & auto summarization with any routing protocol  QoS using MQC, Classification
 Policy base routing  Network based application recognition (NBAR)
 Identify and troubleshoot sub-optimal routing  Marking using IP precedence, DSCP, CoS
 Bidirectional forwarding detection/loop prevention  Policing, shaping
 Routing protocol authentication  Congestion management (queuing)
3.4 RIP (v2 and v6)  Congestion avoidance (WRED)
 RIPv2  Describe layer 2 QoS
 Describe RIPv6 (RIPng)  Queuing, scheduling, Classification & marking
3.5 EIGRP (for IPv4 and IPv6) 6.3 Network services
 Describe packet types  First-hop redundancy protocols
 Implement and troubleshoot  HSRP, GLBP, VRRP
 Neighbor relationship/free path selection/operations  Network time protocol/IPv4 and IPv6 DHCP

 EIGRP stub/load-balancing  IPv4 network address translation

 Implement EIGRP (multi-address) named mode  Describe IPv6 network address translation
 Network optimization
 EIGRP convergence and scalability
 IP SLA, Tracking object, Netflow
3.6 OSPF (v2 and v3)
 Embedded event manager
 Describe packet types
 Identify performance routing (PfR)
 Neighbour relationship/OSPFv3 address-family support
 Network types, area types and router types 7.0 Evolving Technologies
 Path preference/operations
7.1 Cloud
 Implement, t-shoot & optimize OSPF convergence & scalability
7.2 SDN
7.3 Internet of Things

www.zoomgroup.com
DevOps
Course Curriculum
DEVOPS COURSE CONTENT PUPPET CHEF
• Introduction of DEVOPS • Introduction of PUPPET • Overview of Chef
• Use of PUPPET • Workstation setup
• Introduction of DEVOPS TOOLS
• How PUPPET Works
• Introduction of CONFIGURATION MANAGEMENT • Bootstrapping your first node
• Explanation of PUPPET Architectures
TOOLS • Understanding PUPPET Components • Dissecting your first Chef run
• Difference Between ANSIBLE CHEF SALT & • Explanation of PUPPET Master & Agent • Introducing the node object
PUPPET • Understanding PUPPET Catalog • Using Chef Resource to build your first cookbook
• Understanding PUPPET Manifests files • Knife tool configuration, Chef solo configuration
• Introduction of VERSION CONTROL SYSTEM
• Creating & Explanation PUPPET Resource and chef-run
• Introduction of CONTAINER service Types
• Writing role and data-bag using knife command.
• Difference between Virtualization & • Explanation of PUPPET Resources Types
• Understanding of PUPPET Classes • Using node and cookbook attributes and
Containerization
• Creating Repository on PUPPET Master & templates to make your recipes dynamic
• Introduction & Configuration of GIT
Agent • Adding cookbook dependencies to leverage
• Configuration of GITHUB • Installation of Required Applications Puppet existing functionality
• Introduction & Configuration of ANSIBLE Master & Agent • Experimenting with template variables,
• Installation of ANSIBLE Server & Client with SSH • Generating Certificates on PUPPET Master &
notifications, and controlling idempotency
• Introduction of ANSIBLE Agent
• Using recipe inclusion to keep your recipes easy
• Sign Certificates to be Signed Puppet Master
ROLES,GALAXY,PLAYBOOK,MODULES & VAULT to read and manage
• Verify Certificates Signed from Puppet Master
• Introduction & Configuration of PUPPET • Configuration files of PUPPET Master & Agent • Bringing server-side resources into your recipes
• Installation of PUPPET Master & Agent with • Starting Up Service on PUPPET MASTER & with data bags and search
certificates AGENT • Writing an Apache cookbook
• Adding PUPPET Agents to PUPPET Master • Refactoring the Apache Cookbook
• Introduction of PUPPET MODULES & MANIFEAST
• PUPPET Usefull Tools
Files • Writing a User’s Cookbook
• Introduction of Configuration of SALT ANSIBLE • Uploading cookbook in git and chef-server.
• Installation of SALT Master & Minion • Introduction of ANSIBLE • Defining roles to group similar functionality
• Introduction & Configuration CHEF • Use of ANSIBLE • Defining environments to use the same structural
• How ANSIBLE Works configuration across operational environments
• Installation of CHEF Server, Workstation & Node
• Overview of ANSIBLE Components • (like development, Q/A, and production)
• Introduction & Creating of CHEF CookBook, • Explanation of ANSIBLE Inventory
• Using Chef Supermarket and community
Recipes, Attributes & Roles • Explanation of ANSIBLE Dynamic Inventory
• Understanding ANSIBLE Patterns cookbooks
• Configuration of CHEF Environment & DataBags
• Introduction of Ad-Hoc Commands • Bookshelf and berks tool in chef
• Managing CHEF environment with KNIFE tools
• Explanation of Various ANSIBLE Configuration
• Delpoying instances on AWS Cloud from CHEF Files JENKINS
• Introduction & Configuration of Jenkins • Creating Repository of ANSIBLE Server • Overview
• Introduction & Configuration of Docker • Installation of ANSIBLE Require Applications
• Installation
• Introduction of DockerHub DockerHost • Configuration of ANSIBLE Server Files
• Setting up authentication
• Adding Clients to ANSIBLE Server
DockerEngine & Swarn • Creating the Ansible Inventory • Manage plugins from console
• Adding Host & Groups to ANSIBLE Inventory • Installing github plugin from repository
COURSE DETAILS • Configuration of SSH server • Adding Ant/Maven support
GIT • Generating SSH certificates • Configuring email notifications
• Copy SSH Key From ANSIBLE SERVER to • Continuous deployments using Jenkins
• Introduction of Version Control System
Clients
• Types of Version Control System • Explore Jenkins system configuration
• Explanation of ANSIBLE PLAYBOOK GLAXAY
• Introduction of GIT & VAULT • Analyzing system logs
• Difference Between Centralized & Distributed VC
• Installation of GIT SALT DOCKER
• Introduction of SALT • Introduction of Docker
• Introduction of GIT Server • Use of SALT • Creating the Repository
• Introduction of GITHUB • How SALT Work
• Installation of Docker Applications
• Structure of GIT • Components of SALT
• Introduction of SALT MASTER & MINION • Configuration of Docker
• Creation of Username, Password & Email in GIT
• Create Repository on SALT MASTER & MINION • Starting the Docker Services
• Creating GIT Repository
• Installation of SALT MASTER & MINION • Downloading the Docker Images
• Add & Commit to Version Control • Explanation of Key Base Authentication • Installation of Docker Images
• Checking Git Logs • Checking SALT Key Status • Start & Shutdown Docker Images
• Subcommands of GIT • Accepting SALT Key
• Creating the Docker Images
• Adding Linux Minion to SALT Master
• Introduction of GIT Branches • Uploading the Docker Images to DockerHub
• Adding Windows Minion to SALT Master
• Creating GIT Branches • Explanation of DevOps Library SlatStack • Introduction of DockerHub
• Registration of ID in GITHUB • Introduction & Implementation of Slat • Registration of DockerHub
• Cloning, Pulling & Pushing branches to GITHUB Targeting • Explanation & Configuration Docker Host
• Configuration of Slat States • Explanation & Configuration Docker Engine
Checkpoint Firewall
Today with the evolution of Internet and Information Technologies the serious concern is
to protect the valuable content (Data) present and developed in our Personal Computers
and Corporate Networks from various threats like Viruses, Trojans, Spyware, Spam etc.
As a Network Administrator or even as a user the need for management of these threats
has become a major challenge in the Industry.
ok
n

The Firewall Course offered by Zoom Technologies will enable you to handle these
d.
challenges with ease and protect your valuable data content and information.

Course Outline
y  Introduction to Checkpoint firewall
 Discussion on the modular nature of Checkpoint firewall
s
 Functionalities of Management, FW-1 & GUI modules
 Types of Checkpoint installation
 Hardware platform
 Checkpoint Rule base
 IP spoofing
ral
 Installation of Checkpoint R77 GAIA
s  Initial configuration of R77 GAIA
 Web access to Checkpoint
 Download & Installation of smart console
 Accessing Checkpoint through smart dashboard
 Checkpoint objects description
 Anti-spoofing configuration
 Network Address Translation
 Hide NAT
 Static NAT
 Filter Configuration
 Monitoring Traffic and Connections
 URL Filtering
 Antivirus inspection
 Content Analysis
 Identity Awareness
 User Management and Authentication User Authentication
 User Authentication
 Session Authentication
 Client Authentication
 IPSEC VPN
 Intrusion Prevention System
 Backup & Restore of configuration
 Advanced and in-depth explanation of Check Point firewall technology
 Key tips and techniques for troubleshooting Check Point firewall
technology
 Advanced upgrading concepts and practices
 Reporting tools, deployment options and features

www.zoomgroup.com
Cybersecurity Professional

This course is mapped to the popular Cybersecurity Professional course from the
US-Council (www.us-council.com). Zoom Technologies are the official training partners
of US-Council.

This course is meant for those professionals who are looking for comprehensive
and total knowledge in the network security domain. This is the only course which teach-
es both hacking and countermeasure techniques. And in keeping with Zoom's standards,
this course is entirely hands on and real time oriented. And need we say, the instructors
are network security and intrusion specialists with several years of experience. This
course consists of three modules viz

1. Security Risk Assessment (Ethical Hacking)


2. Proactive Defense and Countermeasures
3. Incident Response and Management

Course Contents

Ethical
 Security Risk Assessment
Cybersecurity
H
 Dos and DDos Attacks
Professional
C
 Attack Mitigation Techniques
Expert (
 Firewalls, IDS, IPS

 Cryptography

 Incident Response and Management

 Log Analysis

 Forensics

We are not an Affiliated Institution. Trademarks are properties of the respective vendors.
Course Curriculum

Module 1: Security Risk Assessment (Ethical Hacking) Firewalls


• What is a Firewall?
Introduction to Ethical Hacking • Types of firewalls
• What is Hacking • Designing Security with Firewalls
• What is Ethical Hacking • NAT
• What is Penetration Testing • Security Policy
• What is Vulnerability Auditing • Logs Management
Footprinting • Application Security
• What is FootPrinting • Content / Web Security
• Footprinting Techniques • Authentication
• Footprinting Website & Tools Virtual Private Networks
Scanning • What is VPNs
• What is Network scanning • Type of VPNs
• Types of Scanners • GRE
• Vulnerability Scanner Tools • IPSEC
Proxy • SSL
• What is a proxy server Intrusion Prevention Systems
• Types of proxies • What is an Intrusion Detection System?
• What is a Darkweb • What is an Intrusion Prevention System?
• Why hackers prefer to use Darkweb High Availability
Hacking Web Servers & Web Applications Virtual / Cloud Devices Security
• What is a web server Host Security
• Types of web attacks • OS Hardening
Session Hijacking • Patch management
• What is session hijacking • Antivirus
• Session hijacking Techniques • Endpoint Security
• Session hijacking Tools
Denial of Service Module 3: Incident Response and Management
• What is a DoS and DDoS attack
• DoS attack techniques SIEM
• DoS attack Tools • Introduction to SIEM
System Hacking • SIEM Architecture
• What is System Hacking • Events and Logs
• What is Password Cracking • Event Correlation and Event Collection
• Password Cracking techniques • Correlation Rules
• Password Cracking Website & Tools • Forensic Data
Sniffers • SIEM Deployment
• What is a sniffer Incident Response
• Sniffing Techniques • Introduction Incident Response
• Sniffing Tools • Incident Response Policy

)
Phishing • Incident Handling
• What is Phishing • Forensics of Incident response
• Phishing Techniques • Inside Threat
• Phishing Tools • Incident Recovery
Malware • Malware Analysis
• What is malware Mobile Forensics
• Types of malware • Forensic Acquisition of Smartphones
• Malware creation Tools 1. Logical Acquisition
• USB password stealers 2. File System Acquisition
Wireless Hacking 3. Physical Acquisition
• Types of wireless networks • Android Forensics
• Wireless Hacking Techniques • Retrieving User Activity Information from Android Devices
• Wireless Hacking Tools • iOS (iPhone) Forensics
Kali Linux • Retrieving User Activity Information iOS Devices
• What is Kali Linux
• Kali Linux Tools
Module 2: Proactive Defence and Countermeasures
Introduction to Security
• What is security?
• Layer 1 Security
• Layer 2 Security
• Layer 3 security

www.zoomgroup.com
Ethical Hacking and Prevention

This course is meant for those professionals who are looking for comprehensive and total
knowledge in the network security domain. This is the only course which teaches both
hacking and prevention techniques. And in keeping with Zoom's standards, this course is
entirely hands on and real time oriented. And need we say, the instructors are network
security and intrusion specialists with several years of experience.

Course Contents

 Introduction to Ethical Hacking


Ethical
 Footprinting, Scanning, and Enumeration
Hacking and
 Hacking Web servers and Web applications
Prevention
 DoS, SQL injection, Buffer overflow attacks

 Cryptography

 Wireless hacking

 Linux Hacking

 Phishing

 Countermeasures

www.zoomgroup.com
Course Curriculum
Introduction to Ethical Hacking  Vulnerability Scanner tools
 What is Hacking  Finding more details about a vulnerability
 Who is a Hacker  What is a proxy server
 Skills of a Hacker  How does proxy server work
 Types of Hackers  Types of proxy servers
 Reasons for Hacking  How to find proxy servers
 Why do hackers use proxy servers
 Who are at the risk of Hacking attacks
 What is a TOR network
 Effects of Computer Hacking on an
organization  Why hackers prefer to use TOR
networks
 Network Security Challenges
 Elements of Information Security Hacking Web Servers & Web Applications
 The Security, Functionality & Usability  What is a web server
Triangle  Different webserver applications in use
 What is Ethical Hacking  Why are webservers hacked & its
 Why Ethical Hacking is Necessary consequences
 Scope & Limitations of Ethical Hacking  Directory traversal attacks
 What is Penetration Testing  Website defacement
 What is Vulnerability Auditing  Website password brute forcing
 How to defend against web server
Foot Printing hacking
 What is Foot Printing Session Hijacking
 Objectives of Foot Printing  What is session hijacking
 Finding a company’s details  Dangers of session hijacking attacks
 Finding a company’s domain name  Session hijacking techniques
 Finding a company’s Internal URLs  Cross-Site scripting attack
 Finding a company’s Public and Restricted  Session hijacking tools
URLs  How to defend against session hijacking
 Finding a company’s Server details
 Finding the details of domain registration SQL Injection
 Finding the range of IP Address  What is SQL Injection
 Finding the DNS information  Effects of SQL Injection attacks
 Finding the services running on the server
 Types of SQL Injection attacks
 SQL Injection detection tools
 Finding the location of servers
 Traceroute analysis Evading Firewalls, IDS & Honeypots
 Tracking e-mail communications  What is a Firewall
 What are the functions of a Firewall
Scanning  What is an IDS
 What is network scanning  How does an IDS work
 Objectives of network scanning  SPAN
 Finding the live hosts in a network  IDS tools
 SNMP Enumeration
 What is a honeypot
 Types of honeypots
 SMTP Enumeration
 Honeypot tools
 DNS Enumeration  Honeypot detection tools
 Finding open ports on a server
 Finding the services on a server Buffer Overflow
 OS fingerprinting  What is a buffer
 Understanding usage of buffers in
 Server Banner grabbing tools
applications
 What is a Vulnerability Scanning  What is buffer overflow
  Simple buffer overflow in C programming
 How to detect a buffer overflow
 How to defend against buffer overflow
attacks

www.zoomgroup.com
Denial of Service Phishing
 What is a DoS attack  What is Phishing
 What is a DDoS attack  How Phishing website is hosted
 Symptoms of a Dos attack  How victims are tricked to access
 DoS attack techniques Phishing websites
 What is a Botnet  How to differentiate a Phishing webpage
 Defending DoS attacks from the original webpage
 How to defend against Phishing attacks
Cryptography
 What is Cryptography Malware
 Types of cryptography  What is malware
 Cipher algorithms  Types of malware
 Public key infrastructure o Virus
 What is a Hash  What is a virus program
 Cryptography attacks  What are the properties of a
virus program
System Hacking  How does a computer get
 What is system Hacking infected by virus
 Goals of System Hacking  Types of virus
 Password Cracking  Virus making tools
 Password complexity  How to defend against virus
 Finding the default passwords of network attacks
devices and softwares o Worm
 Password cracking methods  What is a worm program
o Online password cracking  How worms are different from
 Man-in-the-middle attack virus
 Password guessing  Trojan
o Offline password cracking  What is a Trojan horse
 Brute force cracking  How does a Trojan operate
 Dictionary based cracking  Types of Trojans
 Hybrid attack
 Identifying Trojan infections
 USB password stealers
 How to defend against Trojans
 Elcomsoft Distributed password recovery
tools
o Spyware
 Active password changer
 What is a spyware
 What is a keylogger
 Types of spywares
 How to deploy a keylogger to a remote pc  How to defend against spyware
 How to defend against a keylogger  Rootkits
Sniffers  What is a Rootkit
 What is a sniffer
 Types of Rootkits
 How does Rootkit operate
 How sniffer works
 How to defend against Rootkits
 Types of sniffing
o Active sniffing
Kali Linux
o Passive Sniffing
 What is promiscuous mode  What is Kali Linux
 How to put a PC into promiscuous mode  How Kali Linux is different from other
 What is ARP Linux distributions
 ARP poison attack  What are the uses of Kali Linux
 Threats of ARP poison attack  Tools for Footprinting, Scanning &
 How MAC spoofing works Sniffing
 MAC Flooding  What is Metasploit framework
 What is a CAM Table  Using Metasploit framework to attack
 How to defend against MAC Spoofing Wiindows machines
attacks  Using Metasploit framework to attack
 How to defend against Sniffers in network Android devices

www.zoomgroup.com
Wireless Hacking IDS / IPS
 Types of wireless networks o What is an IDS
o What is a IPS
 Wi-Fi usage statistics o Difference between IDS & IPS
 Finding a Wi-Fi network o Placement of IDS in the
 Types of Wi-Fi authentications Network
o Configuring an IDS in the
o Using a centralized authentication Network
server o Placement of IPS in the
o Using local authentication Network
 Types of Wi-Fi encryption methods o Configuring an IPS in the
o WEP Network
o WPA  UTM / Next-Generation Firewall
o WPA2 o What is a UTM
o Features of UTM
 How does WEP work
o Difference between a Firewall &
 Weakness of WEP encryption a UTM
 How does WPA work o Placement of UTM in the
Network
 How does WPA2 work o Configuring a UTM in the
 Hardware and software required to crack Network
Wi-Fi networks o Monitoring attacks using UTM
 How to crack WEP encryption o Configuring IPS module in UTM
to detect and stop attacks
 How to crack WPA encryption
 How to crack WPA2 encryption Counter Measure Techniques for Local
 How to defend against Wi-Fi cracking Systems
attacks  Identifying the Vulnerabilities of a system
 Understanding the Vulnerabilities of a
system
o CVE ID
Penetration Testing
o Bugtraq ID
 What is Penetration Testing  Patch Management
 Types of Penetration Testing o Identifying the patch for a
 What is to be tested Vulnerability
o Downloading the Patch
o Testing the network devices for mis- o Testing the patch for stability in
configuration test environment
o Testing the servers and hosting o Deploying the patch to Live
applications for mis-configuration Network
o Testing the servers and hosting  Finding the missing updates in an
applications for vulnerabilities Operating System
o Testing wireless networks o Microsoft Baseline Security
o Testing for Denial of Service attacks Analyzer
o Belarc Advisor

Counter Measure Techniques for Network level Counter Measure Techniques for Malware
attacks Attacks
 Types of Firewall  Scanning systems for Malware infections
o Packet Filtering Firewall  Types of anti-malwares
o Circuit-Level Gateway Firewall o Anti-Virus
o Application-Level Firewall o Anti-Worm
o Stateful Multilayer Inspection o Anti-Trojan
Firewall o Anti-Rootkit
o Internet Security Suites
o Limitations of a Firewall
 HIDS

 HIPS

www.zoomgroup.com
Mobile Forensics Expert

This course is mapped to the popular Mobile Forensics Expert course from
the US-Council (www.us-council.com). Zoom Technologies are the official
training partners of US-Council.

This course is designed for forensic investigation professionals and deals


with Mobile forensics. The course assumes a prerequisite knowledge of
computer security and digital data structures as well as the legal aspects of
admissibility of evidence in court. It covers the essentials of Mobile File
Structures, Data Extraction, Analysis and Reporting. This course will teach
investigators the tools and techniques to perform Mobile Data Extraction,
Mobile Data Analysis and Evidence Reporting on different mobile devices.

Course Contents

Ethical
Mobile
H
Forensics
 Forensic Acquisition of Smartphones

Android Forensics
C
Expert

 Android File System Structures


Expert (
 Retrieving User Activity Information from Android Devices

 Handling Locked Android Devices

 iOS (iPhone) Forensics

 iOS File System Structures

 iOS Evidentiary Locations

 Retrieving User Activity Information iOS Devices

 Handling Locked iOS Devices

We are not an Affiliated Institution. Trademarks are properties of the respective vendors.
Course Curriculum

Forensic Acquisition of Smartphones  NAND Flash Memory in iOS Devices


 Logical Acquisition  iOS File Systems
 File System Acquisition  iOS Versions
 Physical Acquisition  iOS Encryption
 Advanced Methods
iOS File System Structures
Android Forensics  Data Structure Layout
 Android Architecture o Physical
 Android Components o File System
 NAND Flash Memory in Android Devices o Logical
 Android File System Overview  Data Storage Formats
 Physical and Logical Keyword Searches
Android File System Structures
 Data Structure Layout iOS Evidentiary Locations
o Physical  Primary Evidentiary Locations
o File system  Unique File Recovery
o Logical  Parsing SQLite Database Files
 Data Storage Formats  Manual Decoding of iOS Data
 Physical and Logical Keyword Searches
Retrieving User Activity Information iOS
Retrieving User Activity Information from Devices
Android Devices  iOS Applications
 Android Applications  Deep Dive into Data Structures on iOS
 Data Structures on Android Smartphones Devices
o SMS/MMS o SMS/MMS
o Calls, Contacts, and Calendars o Calls, Contacts, and Calendar

)
o E-mail and Web Browsing o E-mail and Web Browsing
o Location Information o Location Information
o Third-Party Applications o Third-Party Applications
 Retrieving Deleted SQLite Records  Retrieving Deleted SQLite Records
 Retrieving Deleted Data from Raw Images on  Retrieving Deleted Data from Raw Images
Android Devices
Handling Locked iOS Devices
Handling Locked Android Devices  Security Options on iOS
 Security Options on Android  Current Acquisition Issues
 Methods for Bypassing Locked Android  Bypassing iOS Security
Devices
 Bypassing Android Security and Encryption

iOS (iPhone) Forensics


 iOS Architecture
 iOS Components

www.zoomgroup.com
Important note
TECHNOLOGIES
www.zoomgroup.com
1. Laptop, CDs, Pendrive, Bags are not allowed
inside (class or lab), to be kept outside at your own risk. CIN No.: U72200TG1997PTC028550
2. Fees once paid will not be refunded and no batch shifting allowed.
3. Rights of admission reserved. No New ID Card will be issued if you lose it.
4. Vehicles to be parked outside at your own risk.
5. If anyone is found to be disturbing the class, he/she will be debarred and
no refund of fees will be given whatsoever.
Online Training
6. Foreign students should provide Residential Permit (RP) of Hyderabad as
per Police guidelines and Government Regulations. Online Training at Zoom is a cost effective
method of learning new networking skills from
7. Please submit your Personal Photo ID proof & Residence proof at the the convenience of your home or workplace.
time of admission.
Taking an online training course has many advantages
8. Placement assistance will be provided. Candidates can register on for everyone (Freshers / Working Professionals). Zoom
www.zoomgroup.com/careers. offers online training for the highly coveted CCNA,
9. ZOOM will provide the Course completion CCNP and CCIE courses as well as MCSE, Linux,
after the completion of your course VMware, Ethical Hacking and Firewalls, Cybersecurity
Professional, AWS, Azure as well as Mobile Forensics.
Check our website (www.zoomgroup.com) for our
latest course offerings. These are live instructor
Subject to Hyderabad led courses, using Cisco WebEX. Check out our
online course offerings at:
jurisdiction only. www.zoomgroup.com/online

TELANGANA ANDHRA PRADESH GUJARAT


Hyderabad Vijayawada Surat
Ameerpet # 64-9-2, Second Floor, # 40/A, 3rd Floor,
# 203 to 206, 2nd Floor, SBH Building, Patamata, River Front Building,
HUDA Maitrivanam. NTR Circle. Opp. Dutch Garden,
Tel: +91-40-2374 5252 / 2374 5259 Cell: +91 733 744 5253 Nanpura.
eMail: ameerpet@zoomgroup.com 733 744 5254 Tel: +91-261-247 2695 / 3695
eMail: vijayawada@zoomgroup.com +91 82387 77483
Banjara Hills
eMail: surat@zoomgroup.com
Above HDFC Bank, Road No. 12.
Tel: +91-40-2339 4150 / 2330 3160
eMail: banjara@zoomgroup.com

A.P.
Corporate Office: ZOOM House, #8-2-681/A/1/A, Road No. 12, Banjara Hills, Hyderabad-034, T.S., India. Tel: +91-40-2339 4150

You might also like