It San
It San
It San
About Zoom
Zoom Technologies is a pioneer in providing network and security
solutions. Our clients are spread across the entire spectrum including
defence, space, banks, governments, financial institutions, universities,
railways, hospitals etc.
We are leaders in the field of network and security training. Since our
inception almost two decades ago, we have trained over a hundred
thousand engineers. We offer a world class learning environment with
the best lab infrastructure and faculty with real industry experience
gained by working on live projects of national importance.
If you do not have the right skills, then get them now! Choose the experts in network and security
training, an organization which has already trained over one hundred thousand engineers.
www.zoomgroup.com
MCSE-2012 Full Course
MICROSOFT CERTIFIED SOLUTIONS EXPERT
}
Practicals in real-time environment. Detailed curriculum with all 5 papers
Duration: 1 Month | 4 Hrs Per Day (starts on 15th & 30th of every month)
Batches: Morning: 8.30 to 10.30 Afternoon: 2.00 to 4.00 Evening: 7.30 to 9.30
CCNP R&S
CISCO CERTIFIED NETWORK PROFESSIONAL
}
Duration: 1 Month | 4 Hrs Per Day (starts on 15th of every month)
Batches: Morning: 7.30 or Evening: 7.00 Fees: ` 10,000/-
Labs on latest routers with IOS version 15.X Introductory Special Offer
Monitoring, Diagnostics & Troubleshooting Tools
PRTG Wireshark SolarWinds, etc. Fees: ` 6,500/-
+ 18% GST
Exam Practice Challenge Labs
CCIE R&S
CISCO CERTIFIED INTERNETWORK EXPERT
Duration: 1 Month | 4 Hrs Per Day (starts on 15th of every month)
}
Batches: Morning: 7.30 Evening: 6.00
Individual Rack For Every Student
Real time scenarios by 20+ years experienced CCIE certified industry expert who
has worked on critical projects worldwide.
MICROSOFT AZURE
Duration: 2 Weeks | 4 Hrs Per Day (starts on 15th & 30th of every month)
Fees: ` 4,500/-
+ 18% GST
Batches: (Contact the Counselors for the next available batch)
Cybersecurity Professional
Course is mapped to Cybersecurity Professional course from US-Council (www.us-council.com) Fees:`25,000/-
(Pre requisite is CCNA / MCSE / LINUX) + 18% GST
Duration: 1 Month | 4 Hrs Per Day (starts on 15th of every month)
Batches: Morning: 7.30 or Evening: 7.30
We also offer the following courses (Contact the Counselors for the next available batch)
CCNA Voice @ `7,500/- CCNA Data Center @ `7,500/-
CCNP Voice @ `9,500/- CCNP Data Center @ `9,500/- FACULTY
CCIE Collaboration @ `15,500/- CCIE Data Center @ `15,500/- All Senior Engineers of Zoom working on Live projects
Training Engineers of British Army, CISCO, CMC, GE, BSNL,
IPv6 Migration @ `5,500/-
Tata Teleservices and Several Corporates etc for 20 Years.
www.zoomgroup.com
Microsoft Certified Solutions Expert [MCSE] Server Infrastructure
Microsoft Certified Solutions Associate [MCSA]
This course is developed for IT professionals who need to design, plan, implement, manage
and support Microsoft Windows 2008 and 2012 networks or who plan to take the related MCSE
and MCSA exams. The training will be given by Senior System/Network engineers with several
Course Outline
MCSE
Designing and Implementing Server Infrastructure
Group Policies
We are not an Affiliated Institution. Trademarks are properties of the respective vendors.
Course Curriculum
Conversion of GUI to Server Core Configuring R.O.D.C using Install From Media [IFM]
Conversion of Server Core to GUI
Dynamic Host Configuration Protocol (DHCP)
Active Directory - Domain Services Introduction and Configuration of DHCP Server
IP Addressing DHCP Client Configuration
Logical Topologies, Peer to Peer & Domain Models Reservations
Introduction to Directory Services DHCP Backup
Evolution of Directory Services – LDAP Protocol
Configuring DHCP Failover
Features of Active Directory
Installing Active Directory – Domain Controller Domain Name System (DNS)
Internet Basics, Host Files
Member Servers, Clients, User Configuration DNS Naming Hierarchy
Configuring Member Servers and Clients.
Creating Users in AD-DS Lookup Zones – Forward and Reverse Lookup Zones
User Logon policies Types of Zones – Primary, Secondary and Stub Zone
Password policies Resource Records, Integration with AD-DS, SRV Records
Account Lockout policies Forwarders, Dynamic Updates
User properties
Internet Information Services (IIS)
Permissions/Access Control Lists IIS 8.0 Configuration
FileSystems Hosting Websites, Virtual Directories
Security and Sharing Permissions - Folders & Files
Redirecting Web Sites
Access Based Enumeration
Backup and Restoring Sites
www.zoomgroup.com
Windows Server 2016
In today’s rapidly changing IT marketplace, Microsoft Certifications are designed to
help the IT professional to utilize advanced technologies, fine tune troubleshooting
skills and improve job satisfaction. A certification from Microsoft also confirms your
demonstrated experience and knowledge in using Microsoft products and solutions.
Over the last many years, the Training Academy at Zoom Technologies has been a
center for training thousands of aspiring IT professionals in various Microsoft
Certifications at our state-of-the-art facility in Hyderabad. The training will be given
by Senior System / Network engineers with several years of field experience.
Course Outline
We are not an Affiliated Institution. Trademarks are properties of the respective vendors.
Course Content
www.zoomgroup.com
Micrsoft Exchange Server - 2013
Course Curriculum
Intr
This course was developed for IT Professionals who need to design, plan,
implement and support Microsoft Exchange Server 2013. This Course will be
implemented on Registered Domain names with valid Public IP addresses. This
training will be given by Senior System & Network Engineers with several years
of field experience.
Module 1: Deploying and Managing Microsoft Module 6: Planning and Implementing High Man
Exchange Server 2013 Availability
Exchange Server 2013 Prerequisites and Describe High Availability in Exchange 2013
Requirements Configure highly available databases
Course Curriculum
Introduction to Azure
Creating Azure Resource Manager virtual machines in
· Cloud technology overview Azure
· Overview of Azure · Creating virtual machines by using the Azure portal and
· Managing Azure with the Azure portal Azure PowerShell
· Managing Azure with Windows PowerShell · Validating virtual machine creation
· Overview of Azure Resource Manager
· Azure management services Deploying Azure Resource Manager virtual machines by
using Azure Resource Manager templates
Managing Microsoft Azure · Using Visual Studio and an Azure Resource Manager
· Use the Azure portals. template to deploy virtual machines
· Using Azure PowerShell and an Azure Resource
· Use Azure Resource Manager features via the Azure portal.
Manager template to deploy virtual machines
· Use Azure PowerShell
www.zoomgroup.com
Microsoft Certified Solutions Expert
Cloud Platform & Infrastructure
(Private Cloud)
This course is designed for IT professionals to implement, manage, monitor and
troubleshootData Center, Microsoft Cloud Platform and Infrastructure using Windows Server
2012 R2and System Center 2012 R2. Microsoft cloud platform and Infrastructure can
provideInfrastructure as a Service (IaaS) for Private and Public Cloud (Hybrid Cloud) with
high availability, scalability and elasticity to meet the needs of today’s – and tomorrow’s
businesses.
Course Outline
Introduction to Microsoft Cloud • Creating Clouds Managing and maintaining Private
Platform and Infrastructure • Cloud Libraries Cloudwith Configuration Manager
• Overview of Cloud Computing and • Deployvirtual machine to Cloud • Overview Configuration Manager
Types of Cloud • Configuration Manager for Client
• Advantages of Deploying a Cloud Configuring Application Services Management
• Introduction to Microsoft Cloud Delivery with App Controller • Configuration ManagerCloud
Platform and Infrastructure • Installation and configuring App Services
• Overview of System Center 2012 R2 Controller • Demo – Configuration Manager
products • User Roles and Delegation
• Accessing and managing Virtual Automation and Service Delivery using
Installing Microsoft System Center Machines using App Controller Orchestrator
Virtual Machine Manager 2012 R2 • Creating service templates with • Installation and configuring System
(SCVMM) VMM Center Orchestrator 2012 R2
• Hardware and Software • Deploying services using App • Extending Orchestrator using
requirementsSCVMM 2012 R2 Controller integration packs
• Installingprerequisites for SCVMM • Implementing runbook automation
• Installing System Center Virtual MonitorCloud Infrastructure with • Using Orchestrator runbooks with
Machine Manager 2012 R2 Operations Manager Service Manager
• Upgrading / migration from previous • Installation and Configuration of
versions System Center Operations Manger Configuring High Availability, Disaster
2012 R2 Recovery and Protection of Cloud
Deploying and Configuring Access to • Deploy Operation Manager Agents • Installation and configuring Data
Cloud Services using SCVMM • Monitoring Servers and Devices Protection Manager (DPM)
• VMM Settings and Security • Managing Management Packs • Deploying DPM agents
(User Roles and Run As account) • Integrating Operations Manager with • Configuring DPM Storage
• Understanding fabric SCVMM • Creating DPM protection groups
• Logical networks and Logical • Notifications through E-mail • Performing recovery
switches • PXE server to VMM
• Static IP Address pools Operating and Extending Private • WSUS server to VMM
• MAC Address pools Cloud with Service Manager • Managing Updates with WSUS
• VMM storage • Installation and Configuring of
• Storage Classifications System Center Service Manager 2012 Introduction to Windows Azure
• Add file server to VMM R2 Stack/Azure Pack
• VMM Library • Configuring Connectors • Introduction to Windows Azure Stack
• Profiles (Hardware, Guest OS) • Understanding and Implementing • Introduction to Windows Azure Pack
• VM Templates Service Level management • Implementing Windows Azure Pack
• Host groups and adding hosts to • Managingincidentsand problems • Demo – Windows Azure Pack (WAP)
Host Groups
We are not an Affiliated Institution. Trademarks are properties of the respective vendors.
VMware vCloud
Every Data Center today is a Software Defined Data Center (with Virtualization
Technology), VMware vSphere is the defacto Virtualization Technology in Data
Centers to implement Virtualization which is the foundation for implementing
Cloud. Organizations are implementing or using Cloud Computing Services
because of its attributes like On-demand self-service, this allows the end user
request and access a service on demand without requiring human interaction
and provides the ability to self-service. The Future belongs to Virtualization
and Cloud and there is a huge demand for skilled Virtualization and Cloud
professionals. This Course is designed to teach IT Professional the implementation
and management of Cloud Infrastructure Using VMware vCloud Director and
other Cloud Computing Softwares.
Course Curriculum
Understanding Cloud Computing Understanding How vCloud Director Works
• What is Cloud Computing • vSphere Resources
• Virtualization & Cloud Computing • Cloud Resources
• Provider Virtual Data Centers
Types of Cloud • Organization Virtual Data Centers
Services Models • vCould Director Networking
• IAAS • Organizations
• PAAS • Users & Groups
• SAAS • Catalog
Delivery Models • vApp
• Private Cloud
• Public Cloud Creating Cloud using vCloud Director
• Hybrid Cloud • Adding vSphere Resource
• Adding Cloud Resources
Understanding vCloud Director & Its • Creating & Managing Organizations
Components • Working with Catalogs
• vCloud Director Architecture • Controlling access to vCloud Director
• vCloud Director Components • Monitoring vCloud Director
• Understanding Prerequisites
vCenter Orchestrator
Installing Prerequisites for vCloud Director • Configuring vCenter Orchestrator
• Understanding vCloud Network and Security • Automation of vCloud Director using vCenter
• Deploying vCNS Manager Orchestrator
• Deploying vCNS Edge Appliance
Introduction to Different Cloud Computing
Installing vCloud Director Softwares
• Deploying vCloud Director • vCloud Automation Center
• Preparing the Management Pod • Cloud Stack
• Open QRM
vCloud Connector • Open Stack
• Installing & Configuring vCloud Connector • Eucaliptus
Appliance • implementing Cloud using one of the
• Managing a Hybrid Cloud using vCloud softwares
Connector
www.zoomgroup.com
VMware vSphere
Practical Implementation in Real Data Center Environment
With the evolution of VMware Virtualization Technology and its implementation in Data
Centers, the approach to manage IT infrastructure is not the same as it used to be in
physical environments. This course will cover all the aspects required to design, configure
and manage a Virtual Data Center environment using VMware vSphere Virtualization
Technology. The course will provide hands-on experience on Virtual Data Center
Infrastructure Administration. No Data Center/Cloud is complete without virtualization
today. The training will be given by Senior System/Network Engineers with several years
of field experience in Virtualization.
Course Outline
vSphere Replication
Host Profiles
Storage DRS
We are not an Affiliated Institution. Trademarks are properties of the respective vendors.
Course Curriculum
Introduction to Virtualization Configuring and Managing Virtual Veeam Backup
Understanding virtualization Networks Install configure Veeam
Diff types of virtualization vNetwork Standard Switches Backup / Restore VM's
Virtualization products Understanding vSwitch & port group Access and Authentication Control
Understanding components of Configuring virtual Switch & port groups Configuring ESXi Host Access and
VMware vSphere Understanding VM kernel Adaptor Authentication
Introduction to VMware ESX/ESXi ESXi Firewall, Enabling & Disabling
Configuring Standard Virtual Switch Lockdown Mode
Server Policies Integrating ESXi with AD
Understanding Datacenter Understanding Security policies Configuring Roles and Permissions
Configuring Traffic shaping policies Create a custom role in vCenter server
Infrastructure
NIC Teaming Policy Assign permissions on vCenter
Understanding Datacenter
Verify permission
Environment Install & configure vCenter Sever
Virtualization in present & future Understanding Architecture of Resource Management and
Datacenters vCenter Server Monitoring
Understanding the Role of VMware ESXi and vCenter Communication Virtual CPU and Memory Concepts
vCenter Server Components VM Memory Over commitment
Administrator Virtual SMP, CPU Load balancing
vCenter Single Sign On
Installation of ESXi Server CPU, Memory and Disk resources
Installing vCenter Server
Planning ESX/ESXi Server Establish Shares, Limits and
Configure and manage vCenter Reservations
Understanding requirements Server Appliance Understanding Resource Pools
Understanding vSphere Client Managing vCenter Server Inventory Configuring Resource Pools
Configuring ESXi Navigating vSphere Client VM Resource Usage
Adding ESXi Hosts to vCenter Server Resource Monitoring Tools
Virtual Machines Concepts vCenter Server License, Views, vCenter Performance Charts
Understanding virtual machines Events, System logs Interpreting Data from the Tools
Understanding Diff VM files
VM Migration Scheduled Task, Events & Alarms
e
Virtual Machine Hardware
Understanding types of migration Understand Task, Events & Alarms
Virtual Machine Creation and Importance of VMware vSphere Configuring SMTP
Management vMotion Configuring Alarms
Create a Virtual Machine vMotion Requirements vSphere Web Client
Deploying guest operating system Perform vMotion migration Understanding Web Client
into VM Perform Storage vMotion migration Administering vSphere using web client
Understanding VMware tools Perform Enhanced vMotion VMware vShield Endpoint
Deploying VMware tools migration Understanding vShield Endpoint
Cloning of VMs Deploying security virtual appliance
VMware Clusters High Availability Securing VM'S using vShield from
Creating Templates vSphere High Availability
Deploying VM'S from templates Virus & Malwares
Configuring vSphere HA
Modifying Virtual Machine Settings vSphere HA architecture
Advanced Topics: Distributed Switch
Creating an RDM Adding ESXi Host to a Cluster
Understanding Distributed Switch
Virtual Machine Snapshots Architecture
Test vSphere HA Functionality
Configuring Distributed Switch
Creating a vApp
Fault Tolerance Understanding VLAN Trunks
Removing a Virtual Machine Configure private VLAN Trunks &
Deploying Virtual Appliance Understanding Fault Tolerance
Configuring Fault Tolerance Private VLAN'S
Deploying OVF Templates
Testing Fault Tolerance VMware vCenter Standalone
Configuring VM'S to auto start & Converter
auto shutdown Host Scalability (DRS Cluster) Converting physical to virtual
Understanding VMware VSphere machine (p2v)
Configuring and Managing Storage DRS Cluster Converting virtual to virtual (v2v)
Storage Concepts Benefits of Enhanced VMotion
Storage Overview Upgradation of Server
Compatibility (EVC) Requirements for migration
DAS,FC SAN, iSCSI, FCoE, NAS DRS Cluster Settings Upgradation to ESXi 5.x from ESXi 4.x
Types of Datastore, VMFS, NFS Adding a Host to DRS Cluster
Test DRS Cluster functionality Managing vSphere Using command
Configuring Storage line interface
Configuring iSCSI Storage Patch Management Tools VCLI, VMA, SSH Client
Configuring NAS/NFS Storage Describe VMware VSphere Update Managing ESXi
FC SAN Storage, FCoE Manager Managing VM's
Multipathing With iSCSI, NAS, FC SAN Installing update manager Understanding ESXi Server
Configuring update manager Architecture
VMFS Datastores Remediate ESXi Hosts Understanding ESXi operating
Creating a VMFS datastore system
Increase the Size of VMFS datastore Data Protection Understanding Virtualization kernel
Deleting/Unmounting a VMFS Traditional Backup and Virtual
Infrastructure Backup Troubleshooting Virtual Infrastructure
datastore Various Real Time Troubleshooting
vSphere Data Protection
VSAN Scenarios
Components, Architecture
Troubleshooting VMs
VMware vSphere VSAN Deploying and Configuring VDP
Troubleshooting ESXi Hosts,
VSAN Benefits, Features, Architecture Virtual Machine Backup and Restore
Networking, Storage
www.zoomgroup.com
LINUX
This course will cover all aspects of Linux Certification. At the end of the course delegates
will have the skills required to administer a Linux System. The course will also cover
Internet application server configuration on live registered domain name with valid public
IP addresses. The training will be given by Senior System / Network engineers with several
Course Outline
We are not an Affiliated Institution. Trademarks are properties of the respective vendors.
Course Curriculum
Basic concepts of Operating System, Kernel, Shell & File System structure Mounting NFS exports on NFS clients
Basic commands of Linux Configuring various clients for DHCP Server (Windows & Linux)
Advanced Linux Commands DNS Server
Installation of Linux Configuration of DNS server
Interactive Installation Configuration of primary DNS server
Network Based Installation Configuration of forward lookup zone
Introduction to Graphical Environment Configuration of reverse lookup zone
Use and customize the GNOME interface Testing tool of DNS zones
Perform command tasks using the GNOME GUI Adding services in DNS
Launch applications from command line & GNOME interface Mail Server (SMTP, POP3, IMAP)
Customize X Window System Basics of Mail Servers
x
Software Package Administration Configuring SMTP service using Postfix
Installing and deleting software packages Configuring POP3 / IMAP service on Linux
Querying and updating software packages Web Server (Apache)
User and Group Administration Basics of Web Service
Creating and deleting users from the systems Introduction to Apache
Modifying users profile Configuring Apache for main site
Creating and deleting groups Configuring Apache for multiple sites using IP-based, port-
Important system files related to user administration based and name-based virtual hosting
Advanced File Permissions FTP Server (vsftp daemon)
Assigning advanced files permissions i.e. chmod, chown, chgrp &
Basics of File Transfer Protocol
Sticky bit Configuring vsftpd for anonymous ftp service
Creating, modifying and deleting ACL’s
RAID (Redundant Array of InExpensive Disks) &
Disk Partitioning and Mounting File System Logical Volume Manager
Using fdisk, disk druid utilities for disk partitioning Implementing RAID on Linux
Using mkfs, commands to create file systems RAID levels (0, 1 and 5) configuration using raid tools
Mounting various file systems Resizing the Partition using LVM
Auto mounting of file system
Web based Administration
Disk Quotas Installing Webmin on Linux
Enabling Quotas on partitions Administrating Linux machine remotely
Creating Quotas for users Using Webmin as a tool for configuring various services on Linux
Auditing Quotas limit Difference between Unix and Linux Flavors
Backup and Recovery Live Setup - Demo by Faculty
Introduction to various types of backup media
Designing, Implementing & Maintaining of
Backup and restoring using tar and cpio commands
Corporate Network
www.zoomgroup.com
Advanced Linux
Practical Implementation in Real Time Environment
Zoom Technologies brings to you the all new Advanced Linux course. This course is designed
for professionals to easily install and configure advanced Linux services like IPv6, IPsec VPN,
iptables as well as configuration of SAN, MySQL, Oracle integration of Linux and Windows
etc. The training will be conducted by senior System/Network engineers with several years
of industry experience.
Course Outline
Introduction and configuration of LDAP Server.
Advanced
linux
Configuration of Winbind Server.
x
• Explanation of SElinux Policies
• Explaining Protocols. • Configuring SElinux Permanent/SElinux for servers
• Configuring SAN Server by using SCSI Target. Remote Installation
• Making SAN Clients by using SCSI Initiator. • Configuration of PXE
SAMBA (PDC) Boot Process
• Configuration to create a Samba PDC • Booting Sequence
• To create samba PDC Administrator User • Kernel Initialization
• Add Windows workstation to Samba Domain • INIT Process
• Add & Delete users from Samba Domain Backup and Recovery
• Modify Samba passwords • Introduction to various types of backup media
Winbind • Backup and restoring data using dump / restore commands
• Introduction & Installing Samba • Automation of Jobs (Cronjob & At Job)
• Set up a basic smb.conf • Remote Backup with SCP
• Joining a Member Server to the Active Directory domain Proxy Server (Squid)
• Make Active Directory domain users/groups available locally through • Basics of proxy services
Winbind • Configuring proxy services
• Starting the daemons, Testing the winbind user/group mapping • Creating ACLs for controlling access to internet
• Login Active Directory Users from Linux clients Samba Service
Zimbra Mail Server • Basics of file sharing in Windows
• Configuration & Installation of Zimbra Mail Service • Configuring Samba service for file sharing with windows systems
• Integration of Zimbra with LDAP Troubleshooting your system
• Starting the Daemons • Recovering the super user password
• Creating users Mail Accounts/Creating Groups • Recovering the boot loader (GRUB)
• Taking backup of Mail Accounts • Troubleshooting Xserver problems
• Maintaining the Logs of Mail Accounts • Troubleshooting network related problems
Nagios Monitoring Tool Virtualization
• Installation & configuring of Nagios & Plugins • Managing Virtual machine with kvm & Qemu
• Create Nagios User & Group • Starting & stoping virtual machine
• Installation & Configuration of Web Interface for Nagios • Virtualization troubleshooting
• Starting the Service Log Server
• Login with Nagios web Interface • Configuring Analysis and logs
• Adding Multiple Servers & Clients in Nagios • Configuring Rsyslog & Saving Syslog Messages
NTP Server • Sending Syslog Message over the network
• Configuration of NTP Server • Configuring Rsyslog clients & Users log files
• Starting the service Kernel Upgradation
• NTP Synchronization • Checking existing Kernel
• Configuration of Client • Upgrading Kernel with RPM tool
Maria Database Teaming
• Installation of Maria DB on LINUX • Configuring Teaming
• Starting the service • Nic Failover
• Creating a Maria DB root Account • Maintain load balancing
• Location of Maria DB Database • Autofs
• Accessing Maria DB Command Line • Openssh
• Creating and Deleting Maria DB
www.zoomgroup.com
Amazon Web Services
Cloud hosted web sites and applications are the future of Information Technology.
Amazon Web Services (AWS) is a secure cloud services platform, offering compute
power, database storage, content delivery, highly reliable, scalable, low-cost pay-
for-what-you-use infrastructure platform on the cloud. AWS powers hundreds of
thousands of businesses around the world and offers other functionality to help
businesses scale and grow.
As Cloud Computing has become very popular, there is a great demand for
System and Cloud Administrators with AWS skills.
AWS
Course Outline
·
·
Introduction to Amazon Web Services (AWS)
Introduction to Cloud Computing
Amazon Web
· Compute Services (EC2, AMI Etc.) Services
· EC2 Instances
· Amazon Elastic Block Store (EBS)
· LOAD BALANCING & Auto Scaling
· Network & Security
· Elastic Beanstalk, Amazon Virtual Private Cloud (VPC)
· Amazon Route 53, Cloudfront
· Security & Identity Services, IAM
· Storage & Content Delivery Services, Amazon S3 & Amazon Glacier, EFS
· Database Services (RDS, NoSQL Service)
· Management Tools (Amazon Cloud watch, Cloud Formation)
· Application Services (SES, SQS, SNS)
We are not an Affiliated Institution. Trademarks are properties of the respective vendors.
Course Curriculum
Introduction to Cloud Computing Auto Scaling Security & Identity Services
• What is Cloud • What is auto scaling? • Identity Access Management (IAM)
• Why Cloud? • Auto scaling components • IAM Features
• Types of Cloud Deployment Models • Benefits of auto scaling • Getting Started With IAM
• Types of Cloud Services • Creation of launch configuration • Creation of user, groups, roles
• Future of Cloud Technologies • Configuration of auto scaling policies • Managing policies
• Advantages and Disadvantages of Cloud • Advantages of using auto scaling with ELB • Credential Report
Network & Security • IAM Console and the Sign-in Page
Introduction to Amazon Web • Security Groups
• Elastic IPs Database Services
Services (AWS) Relational Database Service (RDS)
• What is AWS? • Key Pairs
• Network Interfaces • RDS Essentials
• How to Subscribe for AWS account • Launching RDS instance
• What is the AWS Free Usage Tier Elastic Beanstalk
• Selecting the Engine
• AWS Certification • Deploy, manage, scale an application
• Configuring the Database Engine
• Introduction to the AWS management • How management complexity are reduced
• Managing RDS Database
Console • Workflow of Elastic Beanstalk
• Setting up automatic backups
• List of services given by AWS • Create Application • Authorizing access to the DB
• Launch Environment DynamoDB (NoSQL Service)
Compute Services • Manage Environment • DynamoDB overview
Elastic Compute Cloud (EC2) • Modifying the properties of the deployment • What is NoSQL database?
• What is Amazon EC2? • How It Works
• Features of Amazon EC2 Networking Services • Using the DynamoDB Console
• Managing the EC2 infrastructure Amazon Virtual Private Cloud (VPC) • Creating Tables and Loading Sample
• EC2 Dashboard • What is Amazon VPC? Data
• VPC Essentials • Query and Scan Operations in
• Pricing for Amazon EC2
• Default and Nondefault VPC DynamoDB
Regions and Availability Zone Concepts
• VPC Networking and ACL
• Describing Regions
• Security Groups Management Tools
b
• Availability Zones, and Endpoints Amazon CloudWatch
• DNS and DHCP Options Sets
• Managing instances in an Availability Zone • Amazon CloudWatch Architecture
• VPC Peering and Endpoints
Amazon Machine Images (AMI) • List of services monitored by CloudWatch
• Subnet Routing
• Managing AMIs • Collect and track metrics
• VPC Internet Gateway
• Working with Windows, Linux AMIs • Monitoring memory and disk Metrics
• Elastic IP addresses and network interfaces
• Shared and Paid AMI • Monitoring logs, Graphs
• VPC integration with many other AWS
• Making an AMI Public • Set Alarms
services
EC2 Instances Cloud Formation
• Creating a NAT instance in a VPC
• Instance Type • Building AWS infrastructure as a code
• Configuring a Web application in VPC • Design a template
• Instance life cycle
Amazon Route 53 • Create a Stack
• Differences between reboot, stop, and
• Route 53 as your DNS service • Create a Template from your Existing
terminate
• Using Traffic Flow Resources
• Building an EC2 windows and linux
• Route 53 Health Checks Cloud Trail
instances
• Configuring DNS Failover
• To install instance in public and private
• Latency Based Routing Application Services
subnet
• Weighted Routing Policies Amazon Simple Email Service (SES)
• Security via Key Pairs
Cloud Front • Simple email service overview
• EC2 Class and VPC Security Groups • Configuring Amazon email service
• Managing Elastic IP’s
Storage & Content Delivery • Amazon SES and Deliverability
• Pricing model in EC2 instances • Amazon SES Email-Sending Process
Services
• EC2 with Amazon command line interface • Email format and Limits of SES
Amazon S3
Amazon Elastic Block Store (EBS) Amazon Simple Queue Service (SQS)
• What is object Storage?
• Features of Amazon EBS • Simple Queue service overview
• Data as objects
• Amazon EBS volumes • Lifecycles of S3 • SQS for background work task
• Managing EBS volumes • Creating a Queue
• Managing Buckets
• Increasing the volume size • Confirming the Queue exists
• Accessing S3 storage via tools
• Amazon EBS snapshots • Add a permission to the Queue
• Creation of a static website using S3
Load Balancing storage
• Creating a load balancer Amazon Simple Notification
Amazon Glacier Service (SNS)
• Internal and external load balancer • Low-cost storage service Simple Notification Service overview
• Load balancing protocols • Storage for data backup and archival • Publishers and subscribers
• Security groups for the load balancer • Pricing model for Glacier storage • Subscribing to topic via Email
• Health check for the load balancer • Working with vaults and archives • Setting notification for EC2 instance
• Cross-zone load balancing EFS Elastic File System changes
• Connection Draining
www.zoomgroup.com
Cisco Certified Network Associate (CCNA)
The CCNA (Cisco certified network associate) is meant for all those looking to get a foothold
in Networking. This forms the base of the Cisco training pyramid and offers different
specializations for network engineers. The basic CCNA course is CCNA - Routing and
Switching. We also offer the CCNA Security and the CCNA Voice both of which require
the CCNA Routing and Switching as a prerequisite.
The CCNA course is taught by world class instructors in state of the art classrooms with
labs equipped with cutting edge infrastructure, including high end routers, switches and
servers. The course is taught in a hands on manner so that students can get an actual
feel of the nitty gritty of networking.
Course Outline
CCNA
CCNA Routing and Switching
Basics of IP networking
Lan Switching
IP Addressing IPv4 and IPv6
Routing Protocols
Routing & Switching
WAN Technologies
Troubleshooting
Security
Voice
CCNA Security
Common Security threats and attacks
Security on Cisco Routers
Cisco Firewall Technologies
Cisco IPS
VPN Technologies
Secure Network Management and Reporting
CCNA Voice:
Cisco Unified Communications Manager Express
Cisco IP Phone Concepts, Registration and EPhone-DNS
VoIP
PSTN and digital network convergence
Cisco unified communications
Enabling Telephony Features with CUCM
We are not an Affiliated Institution. Trademarks are properties of the respective vendors.
CCNA Routing & Switching
Course Curriculum
1.0 Network Fundamentals Configure, verify & troubleshoot EIGRP for IPv4 & IPv6
Compare & contrast OSI & TCP/IP models (excluding authentication, filtering, manual summarization,
Compare & contrast TCP & UDP protocols redistribution, stub)
Impact of infrastructure components in a network Configure, verify, and troubleshoot RIPv2 for IPv4
Firewalls, Access points, Wireless controllers (excluding authentication, filtering, manual summarization,
Effects of cloud resources on network architecture redistribution)
Traffic path to internal and external cloud services Troubleshoot basic Layer 3 end-to-end connectivity issues
Virtual services 4.0 WAN Technologies
Basic virtual network infrastructure Configure & verify PPP and MLPPP on WAN interfaces using local
Compare & contrast collapsed core and three-tier architecture authentication
Compare & contrast network topologies Configure, verify, & troubleshoot PPPoE client-side interfaces using
Star, Mesh, Hybrid local authentication
Select the appropriate cabling type (Straight & Cross) Configure, verify, & troubleshoot GRE tunnel connectivity
Apply troubleshooting methodologies to resolve problems Describe WAN topology options
Perform and document fault isolation Point-to-point, Hub and spoke, Full mesh, Single vs dual-homed
Resolve or escalate Describe WAN access connectivity options
Verify & monitor resolution MPLS, Metro Ethernet, Broadband PPPoE, Internet VPN (DMVPN,
Configure, verify & troubleshoot IPv4 addressing & subnetting site-to-site VPN, client VPN)
Compare & contrast IPv4 address types Configure and verify single-homed branch connectivity using eBGP
Unicast, Broadcast, Multicast IPv4 (limited to peering and route advertisement using Network
Describe the need for private IPv4 addressing command only)
Identify IPv6 addressing to use in LAN/WAN environment Describe basic QoS concepts
Configure, verify & troubleshoot IPv6 addressing Marking, Device trust, Prioritization, (Voice, Video & Data)
Configure & verify IPv6 Stateless Address Auto Configuration Shaping, Policing, Congestion management
A
Compare & contrast IPv6 address types 5.0 Infrastructure Services
Global unicast, Unique local, Link local, Multicast, Modified Describe DNS lookup operation
EUI 64, Autoconfiguration, Anycast Troubleshoot client connectivity issues involving DNS
2.0 LAN Switching Technologies Configure and verify DHCP on a router (excluding static reservations)
Describe & verify switching concepts Server, Relay, Client, TFTP, DNS, & gateway options
MAC learning & aging, Frame switching, Frame flooding, Troubleshoot client- and router-based DHCP connectivity issues
MAC address table Configure, verify, and troubleshoot basic HSRP
Interpret Ethernet frame format Priority, Pre-emption, Version
Troubleshoot interface & cable issues (collisions, errors, Configure, verify, and troubleshoot inside source NAT
duplex, speed) Static, Pool, PAT
www.zoomgroup.com
CCNA Security
Course Curriculum
Common Security Threats Common Layer 2 Attacks Cisc
Esse
Describe common security threats Describe Layer 2 security using Cisco switches
Describe VLAN security
Security and Cisco Routers
Implement VLANs and trunking
Implement security on Cisco routers
Implement spanning tree
Securing the control, data, and management plane Bas
Describe Cisco Security Manager Cisco IPS
Describe IPv4 to IPv6 transition Cisco Intrusion Prevention System (IPS)
deployment
AAA on Cisco Devices
Describe IPS technologies
AAA (authentication, authorization and
Configure Cisco IOS IPS using CCP Net
accounting)
Describe TACACS+ VPN Technologies
Describe RADIUS Describe the different methods used in
Describe AAA cryptography
Verify AAA functionality Describe VPN technologies
Describe the building blocks of IPSec Cisc
IOS ACLs
IPSec site-to-site VPN with pre-shared key
Describe ACL Filtering
Verify VPN operations
Standard
Secure Sockets Layer (SSL) VPN using ASA device
Extended
Named ACL Intro to Cisco ASA
Implement the Cisco Adaptive Security Appliance
Describe considerations when building ACLs
Cisc
Implement IP ACLs to mitigate threats in a network Virt
Secure Network Management and Reporting
Describe secure network management
Implement secure network management
Cisco Firewall Technologies
Operational strengths and weaknesses of firewall Cisc
Com
Describe stateful firewalls
Describe the types of NAT used in firewall
Implement zone-based policy firewall using CCP
Implement Network Address Translation (NAT)
Implement Port Address Translation (PAT) Cisc
Acce
We are not an Affiliated Institution. Trademarks are properties of the respective vendors.
Cisco ASA Firewall + Cisco IPS
Course Curriculum
Cisco ASA Adaptive Security Appliance Cisco Any Connect Remote Access SSL Solutions
Essentials Deploying a Basic Cisco AnyConnect Full-Tunnel SSL VPN Solution
Evaluating Cisco ASA Adaptive Security
Deploying an Advanced Cisco AnyConnect Full-Tunnel SSL
Appliance Technologies
VPN Solution
Identifying Cisco ASA Adaptive Security
Cisco ASA Adaptive Security Appliance Remote Access IPsec VPNs
Appliance Families
Deploying Cisco Remote Access VPN Clients
Identifying Cisco ASA Adaptive Security
Appliance Licensing Options Deploying Basic Cisco Remote Access IPsec VPN Solutions
Basic Connectivity and Device Management Cisco ASA Adaptive Security Appliance Site-to-Site IPsec VPN
Solutions
Preparing the Cisco ASA Adaptive Security
Appliance for Network Integration Deploying Basic Site-to-Site IPsec VPNs
Managing Basic Cisco ASA Adaptive Security Deploying Advanced Site-to-Site IPsec VPNs
Appliance Network Settings Deploying Cisco IOS Software Site-to-Site Transmission Security
Configuring Cisco ASA Adaptive Security Site-to-Site VPN Architectures and Technologies
Appliance Device Management Features
Deploying GRE over IPsec VPNs
Network Integration
Deploying VTI-Based Site-to-Site IPsec VPNs
Configuring Cisco ASA Adaptive Security
Deploying Scalable Authentication in Site-to-Site IPsec VPNs
Appliance NAT Features
Deploying DMVPNs
Configuring Cisco ASA Adaptive Security
Appliance Basic Access Control Features Deploying Secure Remote Access with Cisco IOS Software
Configuring Cisco ASA Adaptive Security Remote Access VPN Architectures and Technologies
Appliance Routing Features Deploying Remote Access Solutions Using SSL VPN
Configuring the Cisco ASA Adaptive Security Deploying Remote Access Solutions Using Cisco Easy VPN
Appliance Transparent Firewall Introduction to Intrusion Prevention and Detection, Cisco IPS
Cisco ASA Adaptive Security Appliance Policy Control Software, and Supporting Devices
Defining the Cisco ASA Adaptive Security Evaluating Intrusion Prevention and Intrusion Detection Systems
Appliance MPF Choosing Cisco IPS Software, Hardware, and Supporting
Configuring Cisco ASA Adaptive Security Applications
Appliance Connection Policy and QoS Settings Evaluating Network IPS Traffic Analysis Methods, Evasion
Configuring Cisco ASA Adaptive Security Possibilities, and Anti-Evasive Countermeasures
Appliance Advanced Application Inspections Choosing a Network IPS and IDS Deployment Architecture
Configuring Cisco ASA Adaptive Security Installing and Maintaining Cisco IPS Sensors
Appliance User-Based Policies
Integrating the Cisco IPS Sensor into a Network
Cisco ASA Adaptive Security Appliance High Availability and
Performing the Cisco IPS Sensor Initial Setup
Virtualization
Managing Cisco IPS Devices
Configuring Cisco ASA Adaptive Security
Appliance Interface Redundancy Features Applying Cisco IPS Security Policies
Configuring Cisco ASA Adaptive Security Configuring Basic Traffic Analysis
Appliance Active/Standby High Availability Implementing Cisco IPS Signatures and Responses
Configuring Security Contexts on the Cisco ASA Configuring Cisco IPS Signature Engines and the Signature
Adaptive Security Appliance Database
Configuring Cisco ASA Adaptive Security Deploying Anomaly-Based Operation
Appliance Active/Active High Availability
Adapting Traffic Analysis and Response to the Environment
Cisco ASA Adaptive Security Appliance VPN Architecture and
Customizing Traffic Analysis
Common Components
Managing False Positives and False Negatives
Evaluating the Cisco ASA Adaptive Security Appliance VPN
Subsystem Architecture Improving Alarm and Response Quality
Evaluating the Cisco ASA Adaptive Security Appliance Managing and Analyzing Events
Software Architecture Installing and Integrating Cisco IPS Manager Express with
Implementing Profiles, Group Policies, and User Policies Cisco IPS Sensors
Implementing PKI Services Managing and Investigating Events Using Cisco IPS Manager
Express
Cisco ASA Adaptive Security Appliance Clientless Remote
Access SSL VPN Solutions Using Cisco IME Reporting and Notifications
Deploying Basic Clientless VPN Solutions
Deploying Advanced Application Access for Clientless SSL VPNs
Customizing the Clientless SSL VPN User Interface and Portal
www.zoomgroup.com
Cisco Certified Network Professional (CCNP)
CCNP - Cisco Certified Network professional. This is the advanced level certification program
from Cisco. This is meant for professionals who want to gain a deeper understanding of
networking technologies with an emphasis on planning and implementing LANs and WANs.
The CCNP program helps the engineer bring together technologies like wireless, VoIP,
security into a comprehensive whole.
We offer the CCNP as three specialized courses-Routing and Switching, Security and Voice.
The prerequisite for each is a CCNA in the respective specializations. The CCNP program
is taught by senior network engineers in a world class environment with state of the art
labs and infrastructure.
Course Outline
CCNP - Routing and Switching
Implementing Cisco IP Routing (ROUTE)
Implementing Cisco IP Switched Networks (SWITCH)
Troubleshooting and Maintaining Cisco IP Networks (TSHOOT)
CCNP
Routing & Switching
Security
Voice
CCNP - Security
Deploying Cisco ASA Firewall solutions
Deploying Cisco VPN solutions
Implementing Cisco Intrusion Prevention System
CCNP – Voice
Implementing Cisco Voice Communications and QoS (CVOICE )
Implementing Cisco Unified Communications Manager, Part 1 (CIPT1 )
Implementing Cisco Unified Communications Manager, Part 2 (CIPT2 )
Troubleshooting Cisco Unified Communications (TVOICE )
Integrating Cisco Unified Communications Applications (CAPPS )
We are not an Affiliated Institution. Trademarks are properties of the respective vendors.
CCNP Routing & Switching
Course Curriculum
ROUTE- (300-101) Infrastructure Security
Introduction to Router and Routing Protocols: IPv4 ACL (Standard, Extended, Time-based)
Static Routing, Dynamic Routing, Default Routing IPV6 Traffic Filter
IP Addressing, Summarization (Auto and Manual) Unicast RPF
P
Configuring and Verifying Voice VLAN
Route Summarization, Default Route in OSPF
Special Areas (Stub, Totally Stubby, NSSA, Totally NSSA) Aggregating Switch Link
OSPF Virtual Link with Authentication / No Authentication Switch Port Aggregating with Ether Channel,
Manipulating Hello and Dead Intervals Ether Channel Load Balancing,
Route Redistribution Ether Channel Negotiation Protocol (PAgP, LACP)
Redistribution Concepts and Process Spanning Tree Protocol
Redistributing into EIGRP / OSPF / RIP STP Concept, BPDU (CBPDU, TCN BPDU)
Advance Redistribution: STP States, STP Timers
www.zoomgroup.com
Cisco Certified Internetwork Expert (CCIE)
The CCIE is the crème-de-la-crème of Networking certifications, and there are less
than 50,000 CCIEs worldwide across all specializations. To get into this exclusive
club, you need to get trained with the very best people who have decades of
expertise in teaching, implementing and managing enterprise class networking
projects. ZOOM provides the highest quality of CCIE Mapped training, with world
class professionals and state of the art lab infrastructure. We offer the CCIE
across three specializations - Routing and Switching, Security and Collaboration
(which replaces CCIE Voice).
We also offer something which no other training institute does - a full scale,
8 hour challenge lab which replicates the lab exam, bundled for FREE with our
CCIE course.
CCIE
Layer 2 Technologies
Layer 3 Technologies
VPN Technologies
Infrastructure Security
Infrastructure Services
Routing & Switching
CCIE Security Security
Infrastructure, Connectivity, Communications,
and Network Security
Voice
Security Protocols
Application and Infrastructure Security
Threats, Vulnerability Analysis, and Mitigation
Cisco Security Products, Features, and Management
Cisco Security Technologies and Solutions
Security Policies and Procedures, Best Practices, and Standards
1.2 Network implementation and operation 3.8 ISIS (for IPv4 and IPv6)
Describe basic ISIS network
Evaluate proposed changes to a network
Single area, single topology
1.3 Network troubleshooting
Neibor relationship, Network types, Levels and router types
Use IOS troubleshooting tools
NSAP addressing
Apply troubleshooting methodologies
Point-to-point, broadcast
2.0 Layer 2 Technologies Describe operations & optimization features
Metrics
2.1 LAN switching technologies
Switch administration 4.0 VPN Technologies
Layer 2 protocols, VLAN & trunking
4.1 Tunneling
Spanning-tree & EtherChannel MPLS, Basic MPLS L3VPN, Encapsulation, DMVPN (single hub)
Other LAN switching technologies SPAN, RSPAN, ERSPAN Describe IPv6 tunneling techniques
Chassis virtualization and aggregation technologies Describe basic layer 2 VPN-wireline/L2VPN-LAN services
Describe spanning-tree concepts 4.2 Encryption
2.2 Layer 2 multicast IPsec with preshared key
Implement and troubleshoot IGMP IPv4 site to IPv4 site & IPv6 in IPv4 tunnels
Explain MLD & PIM snooping Virtual tunneling Interface (VTI)
Layer 2 WAN circuit technologies Describe GET VPN
Implement and troubleshoot HDLC/PPP
Describe WAN rate-based Ethernet circuits
5.0 Infrastructure Security
5.1 Device security
3.0 Layer 3 Technologies IOS AAA using local database
3.1 Addressing technologies Device access control/control plane policing
IPv4/IPv6 addressing and subnetting Device security using IOS AAA with TACACS+ & RADIUS
Implement EIGRP (multi-address) named mode Describe IPv6 network address translation
Network optimization
EIGRP convergence and scalability
IP SLA, Tracking object, Netflow
3.6 OSPF (v2 and v3)
Embedded event manager
Describe packet types
Identify performance routing (PfR)
Neighbour relationship/OSPFv3 address-family support
Network types, area types and router types 7.0 Evolving Technologies
Path preference/operations
7.1 Cloud
Implement, t-shoot & optimize OSPF convergence & scalability
7.2 SDN
7.3 Internet of Things
www.zoomgroup.com
DevOps
Course Curriculum
DEVOPS COURSE CONTENT PUPPET CHEF
• Introduction of DEVOPS • Introduction of PUPPET • Overview of Chef
• Use of PUPPET • Workstation setup
• Introduction of DEVOPS TOOLS
• How PUPPET Works
• Introduction of CONFIGURATION MANAGEMENT • Bootstrapping your first node
• Explanation of PUPPET Architectures
TOOLS • Understanding PUPPET Components • Dissecting your first Chef run
• Difference Between ANSIBLE CHEF SALT & • Explanation of PUPPET Master & Agent • Introducing the node object
PUPPET • Understanding PUPPET Catalog • Using Chef Resource to build your first cookbook
• Understanding PUPPET Manifests files • Knife tool configuration, Chef solo configuration
• Introduction of VERSION CONTROL SYSTEM
• Creating & Explanation PUPPET Resource and chef-run
• Introduction of CONTAINER service Types
• Writing role and data-bag using knife command.
• Difference between Virtualization & • Explanation of PUPPET Resources Types
• Understanding of PUPPET Classes • Using node and cookbook attributes and
Containerization
• Creating Repository on PUPPET Master & templates to make your recipes dynamic
• Introduction & Configuration of GIT
Agent • Adding cookbook dependencies to leverage
• Configuration of GITHUB • Installation of Required Applications Puppet existing functionality
• Introduction & Configuration of ANSIBLE Master & Agent • Experimenting with template variables,
• Installation of ANSIBLE Server & Client with SSH • Generating Certificates on PUPPET Master &
notifications, and controlling idempotency
• Introduction of ANSIBLE Agent
• Using recipe inclusion to keep your recipes easy
• Sign Certificates to be Signed Puppet Master
ROLES,GALAXY,PLAYBOOK,MODULES & VAULT to read and manage
• Verify Certificates Signed from Puppet Master
• Introduction & Configuration of PUPPET • Configuration files of PUPPET Master & Agent • Bringing server-side resources into your recipes
• Installation of PUPPET Master & Agent with • Starting Up Service on PUPPET MASTER & with data bags and search
certificates AGENT • Writing an Apache cookbook
• Adding PUPPET Agents to PUPPET Master • Refactoring the Apache Cookbook
• Introduction of PUPPET MODULES & MANIFEAST
• PUPPET Usefull Tools
Files • Writing a User’s Cookbook
• Introduction of Configuration of SALT ANSIBLE • Uploading cookbook in git and chef-server.
• Installation of SALT Master & Minion • Introduction of ANSIBLE • Defining roles to group similar functionality
• Introduction & Configuration CHEF • Use of ANSIBLE • Defining environments to use the same structural
• How ANSIBLE Works configuration across operational environments
• Installation of CHEF Server, Workstation & Node
• Overview of ANSIBLE Components • (like development, Q/A, and production)
• Introduction & Creating of CHEF CookBook, • Explanation of ANSIBLE Inventory
• Using Chef Supermarket and community
Recipes, Attributes & Roles • Explanation of ANSIBLE Dynamic Inventory
• Understanding ANSIBLE Patterns cookbooks
• Configuration of CHEF Environment & DataBags
• Introduction of Ad-Hoc Commands • Bookshelf and berks tool in chef
• Managing CHEF environment with KNIFE tools
• Explanation of Various ANSIBLE Configuration
• Delpoying instances on AWS Cloud from CHEF Files JENKINS
• Introduction & Configuration of Jenkins • Creating Repository of ANSIBLE Server • Overview
• Introduction & Configuration of Docker • Installation of ANSIBLE Require Applications
• Installation
• Introduction of DockerHub DockerHost • Configuration of ANSIBLE Server Files
• Setting up authentication
• Adding Clients to ANSIBLE Server
DockerEngine & Swarn • Creating the Ansible Inventory • Manage plugins from console
• Adding Host & Groups to ANSIBLE Inventory • Installing github plugin from repository
COURSE DETAILS • Configuration of SSH server • Adding Ant/Maven support
GIT • Generating SSH certificates • Configuring email notifications
• Copy SSH Key From ANSIBLE SERVER to • Continuous deployments using Jenkins
• Introduction of Version Control System
Clients
• Types of Version Control System • Explore Jenkins system configuration
• Explanation of ANSIBLE PLAYBOOK GLAXAY
• Introduction of GIT & VAULT • Analyzing system logs
• Difference Between Centralized & Distributed VC
• Installation of GIT SALT DOCKER
• Introduction of SALT • Introduction of Docker
• Introduction of GIT Server • Use of SALT • Creating the Repository
• Introduction of GITHUB • How SALT Work
• Installation of Docker Applications
• Structure of GIT • Components of SALT
• Introduction of SALT MASTER & MINION • Configuration of Docker
• Creation of Username, Password & Email in GIT
• Create Repository on SALT MASTER & MINION • Starting the Docker Services
• Creating GIT Repository
• Installation of SALT MASTER & MINION • Downloading the Docker Images
• Add & Commit to Version Control • Explanation of Key Base Authentication • Installation of Docker Images
• Checking Git Logs • Checking SALT Key Status • Start & Shutdown Docker Images
• Subcommands of GIT • Accepting SALT Key
• Creating the Docker Images
• Adding Linux Minion to SALT Master
• Introduction of GIT Branches • Uploading the Docker Images to DockerHub
• Adding Windows Minion to SALT Master
• Creating GIT Branches • Explanation of DevOps Library SlatStack • Introduction of DockerHub
• Registration of ID in GITHUB • Introduction & Implementation of Slat • Registration of DockerHub
• Cloning, Pulling & Pushing branches to GITHUB Targeting • Explanation & Configuration Docker Host
• Configuration of Slat States • Explanation & Configuration Docker Engine
Checkpoint Firewall
Today with the evolution of Internet and Information Technologies the serious concern is
to protect the valuable content (Data) present and developed in our Personal Computers
and Corporate Networks from various threats like Viruses, Trojans, Spyware, Spam etc.
As a Network Administrator or even as a user the need for management of these threats
has become a major challenge in the Industry.
ok
n
The Firewall Course offered by Zoom Technologies will enable you to handle these
d.
challenges with ease and protect your valuable data content and information.
Course Outline
y Introduction to Checkpoint firewall
Discussion on the modular nature of Checkpoint firewall
s
Functionalities of Management, FW-1 & GUI modules
Types of Checkpoint installation
Hardware platform
Checkpoint Rule base
IP spoofing
ral
Installation of Checkpoint R77 GAIA
s Initial configuration of R77 GAIA
Web access to Checkpoint
Download & Installation of smart console
Accessing Checkpoint through smart dashboard
Checkpoint objects description
Anti-spoofing configuration
Network Address Translation
Hide NAT
Static NAT
Filter Configuration
Monitoring Traffic and Connections
URL Filtering
Antivirus inspection
Content Analysis
Identity Awareness
User Management and Authentication User Authentication
User Authentication
Session Authentication
Client Authentication
IPSEC VPN
Intrusion Prevention System
Backup & Restore of configuration
Advanced and in-depth explanation of Check Point firewall technology
Key tips and techniques for troubleshooting Check Point firewall
technology
Advanced upgrading concepts and practices
Reporting tools, deployment options and features
www.zoomgroup.com
Cybersecurity Professional
This course is mapped to the popular Cybersecurity Professional course from the
US-Council (www.us-council.com). Zoom Technologies are the official training partners
of US-Council.
This course is meant for those professionals who are looking for comprehensive
and total knowledge in the network security domain. This is the only course which teach-
es both hacking and countermeasure techniques. And in keeping with Zoom's standards,
this course is entirely hands on and real time oriented. And need we say, the instructors
are network security and intrusion specialists with several years of experience. This
course consists of three modules viz
Course Contents
Ethical
Security Risk Assessment
Cybersecurity
H
Dos and DDos Attacks
Professional
C
Attack Mitigation Techniques
Expert (
Firewalls, IDS, IPS
Cryptography
Log Analysis
Forensics
We are not an Affiliated Institution. Trademarks are properties of the respective vendors.
Course Curriculum
)
Phishing • Incident Handling
• What is Phishing • Forensics of Incident response
• Phishing Techniques • Inside Threat
• Phishing Tools • Incident Recovery
Malware • Malware Analysis
• What is malware Mobile Forensics
• Types of malware • Forensic Acquisition of Smartphones
• Malware creation Tools 1. Logical Acquisition
• USB password stealers 2. File System Acquisition
Wireless Hacking 3. Physical Acquisition
• Types of wireless networks • Android Forensics
• Wireless Hacking Techniques • Retrieving User Activity Information from Android Devices
• Wireless Hacking Tools • iOS (iPhone) Forensics
Kali Linux • Retrieving User Activity Information iOS Devices
• What is Kali Linux
• Kali Linux Tools
Module 2: Proactive Defence and Countermeasures
Introduction to Security
• What is security?
• Layer 1 Security
• Layer 2 Security
• Layer 3 security
www.zoomgroup.com
Ethical Hacking and Prevention
This course is meant for those professionals who are looking for comprehensive and total
knowledge in the network security domain. This is the only course which teaches both
hacking and prevention techniques. And in keeping with Zoom's standards, this course is
entirely hands on and real time oriented. And need we say, the instructors are network
security and intrusion specialists with several years of experience.
Course Contents
Cryptography
Wireless hacking
Linux Hacking
Phishing
Countermeasures
www.zoomgroup.com
Course Curriculum
Introduction to Ethical Hacking Vulnerability Scanner tools
What is Hacking Finding more details about a vulnerability
Who is a Hacker What is a proxy server
Skills of a Hacker How does proxy server work
Types of Hackers Types of proxy servers
Reasons for Hacking How to find proxy servers
Why do hackers use proxy servers
Who are at the risk of Hacking attacks
What is a TOR network
Effects of Computer Hacking on an
organization Why hackers prefer to use TOR
networks
Network Security Challenges
Elements of Information Security Hacking Web Servers & Web Applications
The Security, Functionality & Usability What is a web server
Triangle Different webserver applications in use
What is Ethical Hacking Why are webservers hacked & its
Why Ethical Hacking is Necessary consequences
Scope & Limitations of Ethical Hacking Directory traversal attacks
What is Penetration Testing Website defacement
What is Vulnerability Auditing Website password brute forcing
How to defend against web server
Foot Printing hacking
What is Foot Printing Session Hijacking
Objectives of Foot Printing What is session hijacking
Finding a company’s details Dangers of session hijacking attacks
Finding a company’s domain name Session hijacking techniques
Finding a company’s Internal URLs Cross-Site scripting attack
Finding a company’s Public and Restricted Session hijacking tools
URLs How to defend against session hijacking
Finding a company’s Server details
Finding the details of domain registration SQL Injection
Finding the range of IP Address What is SQL Injection
Finding the DNS information Effects of SQL Injection attacks
Finding the services running on the server
Types of SQL Injection attacks
SQL Injection detection tools
Finding the location of servers
Traceroute analysis Evading Firewalls, IDS & Honeypots
Tracking e-mail communications What is a Firewall
What are the functions of a Firewall
Scanning What is an IDS
What is network scanning How does an IDS work
Objectives of network scanning SPAN
Finding the live hosts in a network IDS tools
SNMP Enumeration
What is a honeypot
Types of honeypots
SMTP Enumeration
Honeypot tools
DNS Enumeration Honeypot detection tools
Finding open ports on a server
Finding the services on a server Buffer Overflow
OS fingerprinting What is a buffer
Understanding usage of buffers in
Server Banner grabbing tools
applications
What is a Vulnerability Scanning What is buffer overflow
Simple buffer overflow in C programming
How to detect a buffer overflow
How to defend against buffer overflow
attacks
www.zoomgroup.com
Denial of Service Phishing
What is a DoS attack What is Phishing
What is a DDoS attack How Phishing website is hosted
Symptoms of a Dos attack How victims are tricked to access
DoS attack techniques Phishing websites
What is a Botnet How to differentiate a Phishing webpage
Defending DoS attacks from the original webpage
How to defend against Phishing attacks
Cryptography
What is Cryptography Malware
Types of cryptography What is malware
Cipher algorithms Types of malware
Public key infrastructure o Virus
What is a Hash What is a virus program
Cryptography attacks What are the properties of a
virus program
System Hacking How does a computer get
What is system Hacking infected by virus
Goals of System Hacking Types of virus
Password Cracking Virus making tools
Password complexity How to defend against virus
Finding the default passwords of network attacks
devices and softwares o Worm
Password cracking methods What is a worm program
o Online password cracking How worms are different from
Man-in-the-middle attack virus
Password guessing Trojan
o Offline password cracking What is a Trojan horse
Brute force cracking How does a Trojan operate
Dictionary based cracking Types of Trojans
Hybrid attack
Identifying Trojan infections
USB password stealers
How to defend against Trojans
Elcomsoft Distributed password recovery
tools
o Spyware
Active password changer
What is a spyware
What is a keylogger
Types of spywares
How to deploy a keylogger to a remote pc How to defend against spyware
How to defend against a keylogger Rootkits
Sniffers What is a Rootkit
What is a sniffer
Types of Rootkits
How does Rootkit operate
How sniffer works
How to defend against Rootkits
Types of sniffing
o Active sniffing
Kali Linux
o Passive Sniffing
What is promiscuous mode What is Kali Linux
How to put a PC into promiscuous mode How Kali Linux is different from other
What is ARP Linux distributions
ARP poison attack What are the uses of Kali Linux
Threats of ARP poison attack Tools for Footprinting, Scanning &
How MAC spoofing works Sniffing
MAC Flooding What is Metasploit framework
What is a CAM Table Using Metasploit framework to attack
How to defend against MAC Spoofing Wiindows machines
attacks Using Metasploit framework to attack
How to defend against Sniffers in network Android devices
www.zoomgroup.com
Wireless Hacking IDS / IPS
Types of wireless networks o What is an IDS
o What is a IPS
Wi-Fi usage statistics o Difference between IDS & IPS
Finding a Wi-Fi network o Placement of IDS in the
Types of Wi-Fi authentications Network
o Configuring an IDS in the
o Using a centralized authentication Network
server o Placement of IPS in the
o Using local authentication Network
Types of Wi-Fi encryption methods o Configuring an IPS in the
o WEP Network
o WPA UTM / Next-Generation Firewall
o WPA2 o What is a UTM
o Features of UTM
How does WEP work
o Difference between a Firewall &
Weakness of WEP encryption a UTM
How does WPA work o Placement of UTM in the
Network
How does WPA2 work o Configuring a UTM in the
Hardware and software required to crack Network
Wi-Fi networks o Monitoring attacks using UTM
How to crack WEP encryption o Configuring IPS module in UTM
to detect and stop attacks
How to crack WPA encryption
How to crack WPA2 encryption Counter Measure Techniques for Local
How to defend against Wi-Fi cracking Systems
attacks Identifying the Vulnerabilities of a system
Understanding the Vulnerabilities of a
system
o CVE ID
Penetration Testing
o Bugtraq ID
What is Penetration Testing Patch Management
Types of Penetration Testing o Identifying the patch for a
What is to be tested Vulnerability
o Downloading the Patch
o Testing the network devices for mis- o Testing the patch for stability in
configuration test environment
o Testing the servers and hosting o Deploying the patch to Live
applications for mis-configuration Network
o Testing the servers and hosting Finding the missing updates in an
applications for vulnerabilities Operating System
o Testing wireless networks o Microsoft Baseline Security
o Testing for Denial of Service attacks Analyzer
o Belarc Advisor
Counter Measure Techniques for Network level Counter Measure Techniques for Malware
attacks Attacks
Types of Firewall Scanning systems for Malware infections
o Packet Filtering Firewall Types of anti-malwares
o Circuit-Level Gateway Firewall o Anti-Virus
o Application-Level Firewall o Anti-Worm
o Stateful Multilayer Inspection o Anti-Trojan
Firewall o Anti-Rootkit
o Internet Security Suites
o Limitations of a Firewall
HIDS
HIPS
www.zoomgroup.com
Mobile Forensics Expert
This course is mapped to the popular Mobile Forensics Expert course from
the US-Council (www.us-council.com). Zoom Technologies are the official
training partners of US-Council.
Course Contents
Ethical
Mobile
H
Forensics
Forensic Acquisition of Smartphones
Android Forensics
C
Expert
We are not an Affiliated Institution. Trademarks are properties of the respective vendors.
Course Curriculum
)
o E-mail and Web Browsing o E-mail and Web Browsing
o Location Information o Location Information
o Third-Party Applications o Third-Party Applications
Retrieving Deleted SQLite Records Retrieving Deleted SQLite Records
Retrieving Deleted Data from Raw Images on Retrieving Deleted Data from Raw Images
Android Devices
Handling Locked iOS Devices
Handling Locked Android Devices Security Options on iOS
Security Options on Android Current Acquisition Issues
Methods for Bypassing Locked Android Bypassing iOS Security
Devices
Bypassing Android Security and Encryption
www.zoomgroup.com
Important note
TECHNOLOGIES
www.zoomgroup.com
1. Laptop, CDs, Pendrive, Bags are not allowed
inside (class or lab), to be kept outside at your own risk. CIN No.: U72200TG1997PTC028550
2. Fees once paid will not be refunded and no batch shifting allowed.
3. Rights of admission reserved. No New ID Card will be issued if you lose it.
4. Vehicles to be parked outside at your own risk.
5. If anyone is found to be disturbing the class, he/she will be debarred and
no refund of fees will be given whatsoever.
Online Training
6. Foreign students should provide Residential Permit (RP) of Hyderabad as
per Police guidelines and Government Regulations. Online Training at Zoom is a cost effective
method of learning new networking skills from
7. Please submit your Personal Photo ID proof & Residence proof at the the convenience of your home or workplace.
time of admission.
Taking an online training course has many advantages
8. Placement assistance will be provided. Candidates can register on for everyone (Freshers / Working Professionals). Zoom
www.zoomgroup.com/careers. offers online training for the highly coveted CCNA,
9. ZOOM will provide the Course completion CCNP and CCIE courses as well as MCSE, Linux,
after the completion of your course VMware, Ethical Hacking and Firewalls, Cybersecurity
Professional, AWS, Azure as well as Mobile Forensics.
Check our website (www.zoomgroup.com) for our
latest course offerings. These are live instructor
Subject to Hyderabad led courses, using Cisco WebEX. Check out our
online course offerings at:
jurisdiction only. www.zoomgroup.com/online
A.P.
Corporate Office: ZOOM House, #8-2-681/A/1/A, Road No. 12, Banjara Hills, Hyderabad-034, T.S., India. Tel: +91-40-2339 4150