Course Description

SNE+Cloud combines the latest version of A+, N+, CCNA(R&S) 200-301, RHCE & AWS Certification. There is no prerequisite for taking up the CCNA Training; however a fundamental Knowledge of IP, basic switches and routers would be added advantage. Organizations need individuals with cloud skills to help transform their business. Red Hat Enterprise Linux Automation with Ansible teaches the skills needed to manage large numbers of systems and applications efficiently and consistently. Certified Ethical Hacker(CEH) is a professional designation for a person who has obtained a qualification that allows them to perform specific services for various companies. As their name would suggest, ethical hackers are certified personnel qualified to penetrate a company’s computer systems (by their permission) in an attempt at determining whether there are any vulnerabilities. Additionally, an ethical hacker will also undertake all preventive and corrective measures needed to protect the system against any real attacks that may happen in the future.

Curriculum

Basic Terms, Concepts, and Functions of System Modules. Popular CPU Chips and their characteristics. BIOS, UEFI
Motherboards: Components and Architecture.
RAM Terminology, Ports, Cables, and Connectors.
Printer Operations and Components.
 

Internal, & External Devices. Installing and Configuring Peripheral Devices.
Preventive Maintenance and Safety Procedures. Managing Replaceable Components. Troubleshooting Procedures and Guidelines.
Operating System Functions. Major System Files and their Purpose. Managing Files and Directories. Managing Disks.
Installing and Upgrading Windows. Boot Sequences and Methods. Loading and Configuring Device Drivers. Working with Applications.
Managing Error Codes and Start-up Messages. Managing Common Problems. Windows-Based Utilities.
Networking devices, Type of Networks, Topology, Cables Types of LAN cables & colour coding Networking Protocols Virtualization fundamentals ,Addressing (Ipv4 & IPV6) Sub Netting (FLSM and VLSM)
VLAN, Interswitch connectivity CDP,LLDP and Ether channel (LACP) STP and RapidPVST+ Wireless Architecture and AP modes WLC management access Connections (Telnet, SSH etc)
Cisco hierarchical designs Cisco internal &external components of routers Router Boot Sequence and modes of router Router Security Routing (Static, Default and OSPV2) Cisco IOS Backup & Recovery Purpose of FHRP
Configuration of NAT, NTP, DHCP and DNS Configuration SNMP, Syslog, DHCP Relay, SSH, TFTP/FTP
Security Concepts and Program Elements Configuration of VPN, ACL DHCP snooping and Port Security AAA concepts, Wireless Security Protocols
Traditional networks management Network automation and uses of Automation Methods SDN, REST-based APIs Puppet, Chef, Ansible, Interpret JSON encoded data
Describe and define open source, Linux distributions, and Red Hat Enterprise Linux.
Log into a Linux system and run simple commands using the shell.
Copy, move, create, delete, and organize files while working from the bash shell.
Resolve problems by using local help systems
Manage text files from command output or in a text editor.
Create, manage, and delete local users and groups, as well as administer local password policies.
Set Linux file system permissions on files and interpret the security effects of different permission settings.
Evaluate and control processes running on a Red Hat Enterprise Linux system.
Control and monitor network services and system daemons using systemd.
Configure secure command line service on remote systems, using OpenSSH.
Locate and accurately interpret logs of system events for troubleshooting purposes.
Configure network interfaces and settings on Red Hat Enterprise Linux servers
Archive and copy files from one system to another
Download, install, update, and manage software packages from Red Hat and yum package repositories.
Access, inspect, and use existing file systems on storage attached to a Linux server. To track and manage the process in the particular linux machines
Controlling and monitoring the services of the system Masking and un-masking services To mask(start or stop) the services particularly. To check the services are running properly.
Analyze the actions done by the particular users on the linux systems
Run commands more efficiently by using advanced features of the Bash shell, shell scripts, and various utilities provided by Red Hat Enterprise Linux.
Schedule commands to run in the future, either one time or on a repeating schedule. Tune system performance Improve system performance by setting tuning parameters and adjusting scheduling priority of processes.
Interpret and set access control lists (ACLs) on files to handle situations requiring complex user and group access permissions.
Protect and manage the security of a server by using SELinux.
Create and manage storage devices, partitions, file systems, and swap spaces from the command line.
Create and manage logical volumes containing file systems and swap spaces from the command line.
Manage storage using the Stratis local storage management system and use VDO volumes to optimize storage space in use.
Manage the boot process to control services offered and to troubleshoot and repair problems.
Control network connections to services using the system firewall and SELinux rules.
Install Red Hat Enterprise Linux on servers and virtual machines.
Obtain, run, and manage simple, lightweight services as containers on a single Red Hat Enterprise Linux server.
Describe Ansible concepts and install Red Hat Ansible Engine.
Configure Ansible to manage hosts and run ad hoc Ansible commands.
Write a simple Ansible Playbook and run it to automate tasks on multiple managed hosts.
Write playbooks that use variables to simplify management of the playbook
Deploy, manage, and adjust files on hosts managed by Ansible.
Write playbooks that are optimized for larger, more complex projects.
Use Ansible roles to develop playbooks more quickly and to reuse Ansible code.
Troubleshoot playbooks and managed hosts.
Automate common Linux system administration tasks with Ansible.
Introduction to Cloud Computing and AWS What is Cloud Computing? Cloud Deployment Model, Service Model and Best Cloud Computing Vendors AWS Overview, Creating an AWS Account, Free Tier Usage, Billing Budget Setup
AWS IAM (Identity and Access Management) AWS SSO (Single sign on), AWS MFA (Multifactor Authentication) AWS STS (Security Token Service) AWS SCP (Security Control Policies) AWS Cognito, AWS Guard Duty AWS Secret Manager,AWS WAF and Shield AWS Direct Connect, AWS KMS(Key Management Service) AWS Certificate Manager (ACM)
AWS API Gateway-REST API AWS Transfer Family
CDN(Content Delivery Network), Application Load Balancer AWS Fargate, AWS Lambda AWS ECS(Elastic Container Service) AWS EKS (Elastic Kubernets Service) AWS Step Functions,AWS Route 53 AWS Backup,AWS RDS proxy,AWS X-Ray
Amazon S3(Simple Storage Service) Amazon EFS (Elastic File System) Amazon EBS (Elastic Block Store) AWS Batch and EMR Amazon EC2(Elastic Compute Cloud) Amazon EC2 Auto Scaling Amazon ECS (Elastic Container Service) and EKS (Elastic Kubernets Service) AWS Elastic Cache, AWS Aurora,AWS DynamoDB, AWS Cloud Front,AWS Global Accelerator AWS VPN, Direct connect,AWS Private link AWS Athena, AWS Lake Formation AWS Quick sight, AWS Data sync AWS Storage Gateway, AWS Glue AWS Kinesis,AWS EMR
Cost Management Tools-AWS Cost Explorer,AWS Budgets, AWS cost and Usage report
Overview of ethical hacking and hacking phases
Used for collecting information from target network and system
Used for identifying target hosts, ports and services running in a network.
The process of extracting user names, machine names, network resources, shares and services from a system.
It refers to auditing hosts, ports and services in a network. Search for security loopholes.
Used for testing computers and networks
Major security threat in information security
Used by network/system administrator to monitor and troubleshoot network traffic.
It is a nontechnical method of breaking into a system or network.
It is an attack against computer or network which reduces, restricts or prevents accessibility of its system resources to authorized users.
It refers to the exploitation of a valid computer session. An attacker takes over session between two computers
An IDS is a device or software application that monitors networks and/or system for malicious activities.
It can be referred to as the hardware the software and the computer. The computer application that delivers content that can be accessed through internet.
Web application provides an interface between end users and web servers.
Used to attack a website and the most common website vulnerability on the internet.
Used in the wireless communication.
Used to allow communication between users on radio frequencies.
The need for automated devices which controls our daily tasks on fingertips is increasing day by day.
Internet based computing and handle large group of remote servers. Centralized data storage and online access to computer services or resources.
Used for hiding meaningful information in an unreadable format.
Introduction to Bug bounty and Penetration Testing Information Gathering Basics NMAP Penetration testing AD Pen Testing

Maped Certification

CCNA (200-301)(120min, 825/1000)
RHEL 8 – EX200(3Hrs, 210/300)
RHEL 8 – EX294(4Hrs, 210/300)
AWS (SAA-C03)(1.30Hrs, 720/1000)
CEH (312-50)-4 hours,125 @,70%,Multiple choice

Exit Profile

Cloud Administrator
System Integrator – Cloud
Linux Admin
Linux Engineer
Network Engineer
Network Support Engineer
Cloud Support Engineer
Infrastructure Engineer
System administrator
Desktop Support Engineer
Devops Engineer
IT Engineer
Security Analyst
Network Automation Engineer
Penetration Tester
 

Indra institute - Full stack pythonTraining institute in coimbatore, Full stack javaTraining institute in coimbatore, AngularTraining institute in coimbatore, Java scriptTraining institute in coimbatore, UI & UXTraining institute in coimbatore, Data scienceTraining institute in coimbatore, Mechine learningTraining institute in coimbatore, AITraining institute in coimbatore, SeleniumTestingTraining institute in coimbatore, Manual testingTraining institute in coimbatore, CCNATraining institute in coimbatore, CCNPTraining institute in coimbatore, CEHTraining institute in coimbatore, RHCETraining institute in coimbatore, AnsableTraining institute in coimbatore, AWSTraining institute in coimbatore, DevopsTraining institute in coimbatore, TallyTraining institute in coimbatore, ExcelTraining institute in coimbatore, Full stack pythonTraining institute near me, Full stack javaTraining institute near me, AngularTraining institute near me, Java scriptTraining institute near me, UI & UXTraining institute near me, Data scienceTraining institute near me, Mechine learningTraining institute near me, AITraining institute near me, SeleniumTestingTraining institute near me, Manual testingTraining institute near me, CCNATraining institute near me, CCNPTraining institute near me, CEHTraining institute near me, RHCETraining institute near me, AnsableTraining institute near me, AWSTraining institute near me, DevopsTraining institute near me, TallyTraining institute near me, ExcelTraining institute near me, Full stack pythonCoaching institutes, Full stack javaCoaching institutes, AngularCoaching institutes, Java scriptCoaching institutes, UI & UXCoaching institutes, Data scienceCoaching institutes, Mechine learningCoaching institutes, AICoaching institutes, SeleniumTestingCoaching institutes, Manual testingCoaching institutes, CCNACoaching institutes, CCNPCoaching institutes, CEHCoaching institutes, RHCECoaching institutes, AnsableCoaching institutes, AWSCoaching institutes, DevopsCoaching institutes, TallyCoaching institutes, ExcelCoaching institutes, Full stack pythonTraining institute in gandhipuram, Full stack javaTraining institute in gandhipuram, AngularTraining institute in gandhipuram, Java scriptTraining institute in gandhipuram, UI & UXTraining institute in gandhipuram, Data scienceTraining institute in gandhipuram, Mechine learningTraining institute in gandhipuram, AITraining institute in gandhipuram, SeleniumTestingTraining institute in gandhipuram, Manual testingTraining institute in gandhipuram, CCNATraining institute in gandhipuram, CCNPTraining institute in gandhipuram, CEHTraining institute in gandhipuram, RHCETraining institute in gandhipuram, AnsableTraining institute in gandhipuram, AWSTraining institute in gandhipuram, DevopsTraining institute in gandhipuram, TallyTraining institute in gandhipuram, ExcelTraining institute in gandhipuram, Full stack pythonTraining institute in hopes, Full stack javaTraining institute in hopes, AngularTraining institute in hopes, Java scriptTraining institute in hopes, UI & UXTraining institute in hopes, Data scienceTraining institute in hopes, Mechine learningTraining institute in hopes, AITraining institute in hopes, SeleniumTestingTraining institute in hopes, Manual testingTraining institute in hopes, CCNATraining institute in hopes, CCNPTraining institute in hopes, CEHTraining institute in hopes, RHCETraining institute in hopes, AnsableTraining institute in hopes, AWSTraining institute in hopes, DevopsTraining institute in hopes, TallyTraining institute in hopes, ExcelTraining institute in hopes