IT Infrastrucure Management

Network Engineering - Routing & Switching:A computer network (LAN or WAN) operates by connecting computers and the peripherals (like printers and scanners) using two pieces of equipment: switches and routers. The switches enable the devices in a local network to talk to each other, while the routers enable the devices to connect with external networks.

Network Security: Network security is concerned with granting access to a network to the authorized users, and denying access to a network by the unauthorized users. It encompasses the actions to prevent attacks from viruses, worms, and Trojan horses; spyware and adware; zero-day/zero-hour attacks; hacker attacks; denial of service attacks; data interception and theft, and identity theft. A network security consists of many hardware and software components.

LINUX - System / Server Administration: Linux is an operating system like MS Windows, which allow software programs ("application software") to interact with the computer. An operating system makes the computer hardware (say, a microprocessor) understand the commands of application software and gets the job done.

Windows Server Associate:The Windows Server Associate tests the skills required to manage specific Windows Server operating system, client-server structure, network infrastructure, virtualization, etc. The Windows Server Associate certification is a mid-level certification and is a prerequisite to achieving Microsoft Certified Solutions Expert Certification.

Windows Server Expert: Windows Server Expert is a globally recognised standard for IT professionals. Windows Server Expert credential holders are recognized industry-wide as possessing the technical skills, expertise and knowledge necessary to perform the Microsoft Windows NT operating system, related desktop systems, networking, and Microsoft's BackOffice server products.

Datacenter Virtualization: Virtualization is about creating virtual (rather than actual) versions of computer hardware, operating systems, storage devices, and computer network resources. This enables users to run multiple operating systems and multiple applications on the same server at the same time. Virtualization can be categorized into different layers: desktop, server, file, storage and network.

Ethical Hacking: Ethical Hacking is the process of breaking into an organization's IT networks and systems to test their weakness and vulnerabilities. There are five phases in hacking. They include reconnaissance, gaining access, enumeration, maintaining access, and covering tracks. Hackers use various hacking tools and techniques in each of these phases.

Cloud Computing: The cloud is just a metaphor for the Internet. It is simply about storing and accessing data and programs over the Internet. Cloud computing is an IT discipline growing in popularity. The subject deals with designing, building and implementing three types of cloud environments: public, private and hybrid.

CompTIA N+: CompTIA (The Computing Technology Industry Association) is a non-profit association. It offers vendor neutral networking certification to validate the essential knowledge and skills needed to confidently design, configure, manage and troubleshoot any wired and wireless networks. CompTIA certifications are trusted around the world. The CompTIA certified individuals are in-demand worldwide.

Network Simulator (NS2): A computer network is a telecommunications network that allows computers to exchange data. The connections between computers are established using either cable or a wireless media. The best-known computer network is the Internet. Today, the computer networks - including LAN and WAN - have become too complex that we need software tools to understand their behavior.