Computer Hardware & Networking course explores the jobs in IT industry. It is a job oriented course. Computer hardware comprises the equipment, wiring, and other physical components of a computer. Through a networking course you will learn how to setup a network, the difference between a personal network and a local area network from a metropolitan or wide area network. Today, all companies and organizations run on computer networks.


  • Computer Components Identification
  • Assemble and Disassemble Computer Components
  • Components in Portable Computers
  • Devices Installation and Configuration
  • Characteristics of Cabling and their Connectors
  • Common IDE, SCSI and Peripheral Devices
  • Optimize PC Operations Optimization
  • Determine the Issues that must be considered when upgrading a PC
  • Popular CPU Chips
  • Types of Memory (RAM)
  • Types of Motherboards and their Components
  • Printer Technologies, Interfaces and Options/Upgrades
  • Troubleshoot Common Printer Problems
  • Operating System Fundamentals OS Installation
  • Common Error Codes Interpretation
  • Networking Capabilities of Windows
  • Basic Internet Protocols and Terminologies
  • Procedures for Establishing Internet Connectivity



  • Logical or Physical Network Topologies
  • Networking Standards
  • Characteristics of Different Types of Cables
  • Different media Connectors and Describe their uses
  • Purposes, Features and Functions of Network Components
  • General Characteristics of the Different wireless technologies
  • Different Network Protocols
  • Class-full IP and their subnet masks
  • Sub-netting
  • Private and Public network addressing schemes
  • WAN Technologies
  • Security protocols and authentication protocols
  • Basic capabilities of different server operating systems
  • Benefits and characteristics of using a firewall and proxy services
  • Main characteristics and purpose of extranets and intranets
  • Fault Tolerance
  • Network utility to Troubleshoot networks
  • Impact of modifying, adding or removing network services
  • Network Troubleshooting with Physical Topology



Course Overview

As Enterprises migrate toward controller based architectures, the role and skills required of a core network engineer are evolving and more vital than ever. To prepare for this network transition, the CCNA Routing and Switching certification will not only prepare you with the knowledge of foundational technologies, but ensure you stay relevant with skill sets needed for the adoption of next generation technologies.


We recommend that you have the following knowledge and skills before taking this course:

  • Basic computer literacy
  • Basic PC operating system navigation
  • Basic Internet usage
  • Basic IP addressing
  • Good understanding of network fundamentals

Network Fundamentals

Explain the role and function of network components

  • Routers
  • L2 and L3 switches
  • Next-generation firewalls and IPS
  • Access points
  • Controllers (Cisco DNA Center and WLC)
  • Endpoints
  • Servers

Describe characteristics of network topology architectures

  • 2 tier
  • 3 tier
  • Spine-leaf
  • WAN
  • Small office/home office (SOHO)
  • On-premises and cloud

Compare physical interface and cabling types

  • Single-mode fiber, multimode fiber, copper
  • Connections (Ethernet shared media and point-to-point)
  • Concepts of PoE

Identify interface and cable issues (collisions, errors, mismatch duplex, and/or speed)

Compare TCP to UDP

Configure and verify IPv4 addressing and subnetting

Describe the need for private IPv4 addressing

Configure and verify IPv6 addressing and prefix

Compare IPv6 address types

  • Global unicast
  • Unique local
  • Link local
  • Anycast
  • Multicast
  • Modified EUI 64

Verify IP parameters for Client OS (Windows, Mac OS, and Linux)

Describe wireless principles

  • Nonoverlapping Wi-Fi channels
  • SSID
  • RF
  • Encryption

Explain virtualization fundamentals (virtual machines)

Describe switching concepts

  • MAC learning and aging
  • Frame switching
  • Frame flooding
  • MAC address table

Network Access

Configure and verify VLANs (normal range) spanning multiple switches

  • Access ports (data and voice)
  • Default VLAN
  • Connectivity

Configure and verify interswitch connectivity

  • Trunk ports
  • 1Q
  • Native VLAN

Configure and verify Layer 2 discovery protocols (Cisco Discovery Protocol and LLDP)

Configure and verify (Layer 2/Layer 3) EtherChannel (LACP)

Describe the need for and basic operations of Rapid PVST+ Spanning Tree Protocol and identify basic operations

  • Root port, Root Bridge (primary/secondary), and other port names
  • Port states (forwarding/blocking)
  • PortFast benefits

Compare Cisco Wireless Architectures and AP modes

Describe physical infrastructure connections of WLAN components (AP, WLC, access/trunk ports, and LAG)

Describe AP and WLC management access connections (Telnet, SSH, HTTP, HTTPS, console, and TACACS+/RADIUS)

Configure the components of a wireless LAN access for client connectivity using GUI only such as WLAN creation, security settings, QoS profiles, and advanced WLAN settings

IP Connectivity

Interpret the components of routing table

  • Routing protocol code
  • Prefix
  • Network mask
  • Next hop
  • Administrative distance
  • Metric
  • Gateway of last resort

Determine how a router makes a forwarding decision by default

  • Longest match
  • Administrative distance
  • Routing protocol metric

Configure and verify IPv4 and IPv6 static routing

  • Default route
  • Network route
  • Host route
  • Floating static

Configure and verify single area OSPFv2

  • Neighbor adjacencies
  • Point-to-point
  • Broadcast (DR/BDR selection)
  • Router ID

IP Services

  • Configure and verify inside source NAT using static and pools
  • Configure and verify NTP operating in a client and server mode
  • Explain the role of DHCP and DNS within the network
  • Explain the function of SNMP in network operations
  • Describe the use of syslog features including facilities and levels
  • Configure and verify DHCP client and relay
  • Explain the forwarding per-hop behavior (PHB) for QoS such as classification, marking, queuing, congestion, policing, shaping
  • Configure network devices for remote access using SSH
  • Describe the capabilities and function of TFTP/FTP in the network

Security Fundamentals

  • Define key security concepts (threats, vulnerabilities, exploits, and mitigation techniques)
  • Describe security program elements (user awareness, training, and physical access control)
  • Configure device access control using local passwords
  • Describe security password policies elements, such as management, complexity, and password alternatives (multifactor authentication, certificates, and biometrics)
  • Describe remote access and site-to-site VPNs
  • Configure and verify access control lists
  • Configure Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port security)
  • Differentiate authentication, authorization, and accounting concepts
  • Describe wireless security protocols (WPA, WPA2, and WPA3)
  • Configure WLAN using WPA2 PSK using the GUI

Automation and Programmability

  • Explain how automation impacts network management
  • Compare traditional networks with controller-based networking
  • Describe controller-based and software defined architectures (overlay, underlay, and fabric)
  1. Separation of control plane and data plane
  2. North-bound and south-bound APIs
  • Compare traditional campus device management with Cisco DNA Center enabled device management
  • Describe characteristics of REST-based APIs (CRUD, HTTP verbs, and data encoding)
  • Recognize the capabilities of configuration management mechanisms Puppet, Chef, and Ansible
  • Interpret JSON encoded data



Module 1: Windows Server Administration Overview

  • Introducing Windows Server 2019
  • Windows Server Core Overview
  • Windows Server administration principles and tools overview

Module 2: Identity Services in Windows Server

  • AD DS Overview
  • Deploying Windows Server domain controllers
  • Azure AD overview
  • Implementing Group Policy
  • Active Directory Certificate Services overview

Module 3: Network Infrastructure services in Windows Server

  • Deploying and managing DHCP
  • Deploying and managing DNS service
  • Deploying and managing IPAM
  • Remote Access Services in Windows Server

Module 4: File Servers and Storage management in Windows Server

  • Volumes and File Systems in Windows Server
  • Implementing sharing in Windows Server
  • Implementing Storage Spaces in Windows Server
  • Implementing Data Deduplication
  • Implementing iSCSI
  • Deploying Distributed File System

Module 5: Hyper-V virtualization and containers in Windows Server

  • Hyper-V in Windows Server
  • Configuring VMs
  • Securing virtualization in Windows Server
  • Containers in Windows Server
  • Overview of Kubernetes

Module 6: High Availability in Windows Server

  • Planning for failover clustering implementation
  • Creating and configuring failover cluster
  • Overview of stretch clusters
  • High availability and disaster recovery solutions with Hyper-V VMs

Module 7: Disaster recovery in Windows Server

  • Hyper-V Replica
  • Backup and restore infrastructure in Windows Server

Module 8: Windows Server security

  • Credentials and privileged access protection
  • Hardening Windows Server
  • JEA in Windows Server
  • Securing and analyzing SMB traffic
  • Windows Server update management

Module 9: RDS in Windows Server

  • Overview of RDS
  • Configuring a session-based desktop deployment
  • Overview of personal and pooled virtual desktops

Module 10: Remote access and web services in Windows Server

  • Implementing VPNs
  • Implementing Always On VPN
  • Implementing NPS
  • Implementing Web Server in Windows Server

Module 11: Server and performance monitoring in Windows Server

  • Overview of Windows Server monitoring tools
  • Using Performance Monitor
  • Monitoring event logs for troubleshooting

Module 12: Upgrade and migration in Windows Server

  • AD DS migration
  • Storage Migration Service
  • Windows Server migration tools



Paper 1: RH124

Unit 1: Accessing the Command Line

  • Recognize the BASH shell based on the default prompt.
  • Use Linux efficiently by switching between virtual consoles.
  • Display usage messages and be able to interpret a command’s syntax.

Unit 2: Managing Files from the Command Line

  • Recognize and Find Familiarity in a File-system Tree,
  • Learn Terms Like “root” Directory and Subdirectory.
  • Introduction to Different types of Data in Separate System Directories.

Unit 3: Getting Help in Red Hat Enterprise Linux

  • Learn “man” Terminology, Including Topics and Sections.
  • Become Aware of The importance of less-noticed man sections.

Unit 4: Creating, Viewing and Editing Text Files

  • Control Output to Files.
  • Use Pipe to Control Output to Other Programs.

Unit 5: Manage Local Linux Users and Groups

  • Explain the Role of Users and Groups on a Linux System and How They are understood by the Computer.

Unit 6: Controlling Access to Files with Linux File-system Permissions

  • Explain How the Linux File Permissions Model Works.

Unit 7: Monitoring and Managing Linux Processes

  • Learn the Processes Lifecycle, in Order to better Comprehend Process States.

Unit 8: Controlling Services and Daemons

  • List System Daemons and Network Services Started by System services and Socket units.

Unit 9: Configuring And Securing Open-ssh Service

  • Log into a Remote System Using ssh to Run Commands From a Shell Prompt.

Unit 10: Analyzing and Storing Logs

  • Describe the Basic “syslog” Architecture in RHEL7

Unit 11: Managing RHEL Networking

  • Explain Fundamental Concepts of Computer Networking.

Unit 12: Archiving and Copying Files between Systems To Create Backups and Transfer Files Over The Network..

Unit 13: Installing and Updating Software Packages

  • Register System With Your Red Hat Account and Entitle Them to Software Updates for Installed Products.

Unit 14: Accessing Linux File-systems

  • Determine which Directories in the File-system Hierarchy are Stored on Which Storage Devices.

Unit 15: Using Virtualized Systems

  • Recognize the Consistent Use of KVM Architecture Throughout of Red Hat Product Line.

Unit 16: Accessing the Command Line

Paper 1: RH134

Unit 1: Automating Installation with Kickstart

  • Explain Kickstart Concepts and Architecture
  • Install and configure Linux using Kickstart

Unit 2: Using Regular Expressions with “grep”

  • Create a Regular Expressions that match desired data.

Unit 3: Creating and Editing Text files with vim

  • Explain the three main modes of “vim”.

Unit 4: Scheduling Future Linux Tasks

  • Scheduling tasks using at and cron.

Unit 5: Managing Priority of Linux Processes

  • Explain about Linux Processes and nice values.

Unit 6: Controlling Access to Files with Access Control Lists (ACL)

  • Describe ACL’s and file system mount options..

Unit 7: Managing SELinux Security

  • Explain the Basics of Se-Linux permissions and Context Transitions.
  • Display Current Se-Linux Modes.
  • Correctly Interpret the Se-Linux Context of a File.
  • Identify Current Se-Linux Boolean Settings.

Unit 8: Connecting to Network-Defined Users and Groups

  • User authentication using centralized Identity Management Services.

Unit 9: Adding Disks, Partitions, and File Systems to a Linux System

  • Create and Delete disk Partitions on disks with an MBR Partitioning Scheme Using “fdisk”.
  • Create and Delete disk Partitions on disks with an GPT Partitioning Scheme Using “gdisk”.
  • Format Devices Using “mkfs”
  • Mount File System into the Directory Tree

Unit 10: Managing Logical Volume Management (LVM) Storage

  • How to manage high performance LVM storage.

Unit 11: Accessing Network Attached Storage with Network File System (NFS)

  • Access, Mount and unmount NFS Shares .

Unit 12: Accessing Network Storage with SMB

  • How to mount and unmount smb file-system using the command line.

Unit 13: Controlling and Troubleshooting the Red Hat Enterprise Linux Boot Process

  • Describe and Influence the RHEL Boot Process..

Unit 14: Limiting Network Communication with Firewalled

  • Configure the Basic Firewall Using “firewalld”, “firewalld-config”and “firewalld-cmd”.

Unit 15: Comprehensive Review

  • Comprehensive Review of System Administration 2

Paper 3: RH254

Unit 1: Controlling Services and Daemons

  • Control System Daemons and Services Using System ctl.

Unit 2: Managing IPV6 Networking

  • Configure and troubleshoot IPv6 address on Red Hat Enterprise Linux systems

Unit 3: Configuring Link Aggregation and Bridging

  • Configure and Troubleshoot Network Bonding and Teaming on RHEL

Unit 4: Network Port Security

  • Implement a Secure Network Using Firewall

Unit 5: Managing DNS for Servers

  • A Brief Study about DNS Records and how to Configure a Secure Caching DNS.

Unit 6: Configuring Email Transmission

  • Configure RHEL Server to Transmit all E-mail through an Unauthenticated SMTP Gateway.

Unit 7: Providing Remote Block Storage

  • How to Access Remote Storage Space Using ISCSI.
  • Unit 8: Providing File Based Storage
  • Export File System to Client Systems Using NFS and Providing Security.

Unit 9: Configuring MariaDB Databases

  • Install and Configure Mariadb Database.

Unit 10: Providing Apache HTTPD Web Service

  • Configure a Secure Apache HTTPD Web-service..

Unit 11: Writing Bash Scripts

  • Write simple shell scripts using Bash.

Unit 12: Bash Conditionals and Control Structures

  • Bash Conditionals and Other Control Structure.

Unit 13: Configuring the Shell Environment

  • Use Bash Startup Scripts to Define Environment Variables, Aliases and Functions.

Unit 14: Linux Containers and Docker

  • Details about Linux Containers and Dockers..

Unit 15: Comprehensive Review

  • Comprehensive Review of System Administration 3



Course Overview

Amazon Web Services (AWS) Certification is fast becoming the must have certificates for any IT professional working with AWS. This course is designed to help you pass the AWS Certified Solutions Architect (CSA) – Associate Exam. Even if you have never logged in to the AWS platform before, by the end of our AWS training you will be able to take the CSA exam.

Introduction to Cloud Computing

Learning Objectives – In this module, you will learn what Cloud Computing is and what are the different models of Cloud Computing along with the key differentiation of different models. We will also introduce you to virtual world of AWS along with AWS key vocabulary, services and concepts.

Amazon EC2 and Amazon EBS

Learning Objectives – In this module, you will learn about the introduction to compute offering from AWS called EC2. We will cover different instance types and Amazon AMIs. A demo on launching an AWS EC2 instance, connect with an instance and hosting a website on AWS EC2 instance. We will also cover EBS storage Architecture (AWS persistent storage) and the concepts of AMI and snapshots.

Topics – Amazon EC2, Amazon EBS, Demo of AMI Creation, Backup, Restore, EC2 Services and EBS persistent storage.

Amazon Storage Services: S3, RRS, CloudWatch

Learning Objectives – In this modules, you will learn how AWS provides various kind of scalable storage services. In this module, we will cover different storage services like S3, RRS and learn how to host a static website on AWS. This session also covers monitoring AWS resources and setting up alerts and notifications for AWS resources and AWS usage billing with AWS Cloud Watch.

Topics – AWS Storage Services: S3, RRS & Glacier, Amazon Cloud Watch, Alerts, Notification.

Scaling and Load Distribution in AWS

Learning Objectives – In this module, you will learn about ‘Scaling’ and ‘Load distribution techniques’ in AWS. This module also includes a demo of Load distribution & Scaling your resources horizontally based on time or activity.

Topics – Amazon Scaling Service: ELB and Auto Scaling.

AWS VPC & Route 53

Learning Objectives – In this module, you will learn introduction to Amazon Virtual Private Cloud. We will cover how you can make public and private subnet with AWS VPC.  A demo on creating VPC.  We will also cover overview of AWS Route 53.

Topics – Amazon VPC with subnets, Gateways, Route tables and Amazon Route 53 overview.

Identity and Access Management Techniques (IAM) and Amazon Managed Relational Database (RDS)

Learning Objectives – In this module, you will learn how to achieve distribution of access control with AWS using IAM. We will talk about the managed relational database service of AWS called RDS.

Topics – Amazon IAM Overview, Amazon RDS.

Multiple AWS Services and Managing the Resources’ Lifecycle

Learning Objectives – In this module, you will get an overview of multiple AWS services. We will talk about how do you manage life cycle of AWS resources and follow the DevOps model in AWS. We will also talk about notification and email service of AWS along with Content Distribution Service in this module.

Topics – AWS CloudFront, AWS DynamoDB, AWS Import / Export, Overview of AWS Products such as Elastic Beanstalk, Cloud Formation, AWS OpsWorks, SES.

AWS Architecture and Design

Learning Objectives – In this module, you will cover various architecture and design aspects of AWS. We will also cover the cost planning and optimization techniques along with AWS security best practices, High Availability (HA) and Disaster Recovery (DR) in AWS.

Topics – AWS Backup and DR Setup, AWS High availability Design, AWS Best Practices (Cost +Security), AWS Calculator & Consolidated Billing.

Migrating to Cloud & AWS Case Study

Learning Objectives – In this module, you will learn how to migrate to cloud. Also we discuss a case study for AWS Implementation.

Topics – AWS Cloud Migration guidelines. AWS Case Study.


Learning Objectives – In this module, Instructor will give demo of an AWS Project using a real life case study. This module will also have a Question and Answer session to prepare associates for AWS certifications.

Topics – Hands on Workshop, Q/A, Overview of AWS Certification.



Deploying and Configuring Infrastructure

Module 1: Managing Azure Subscriptions and Resources

Module 2: Implementing and Managing Storage

Module 3: Deploying and Managing Virtual Machines (VMs)

Module 4: Configuring and Managing Virtual Networks

Module 5: Managing Identities

Implementing Workloads and Security

Module 1: Evaluating and Performing Server Migration to Azure

Module 2: Implementing and Managing Application Services

Module 3: Implementing Advanced Virtual Networking

Module 4: Securing Identities

Understanding Cloud Architect Technology Solutions

Module 1: Selecting Compute and Storage Solutions

Module 2: Hybrid Networking

Module 3: Measuring Throughput and Structure of Data Access

Creating and Deploying Apps

Module 1: Creating Web Applications using PaaS

Module 2: Creating Apps and Services Running on Service Fabric

Module 3: Using Azure Kubernetes Service

Developing for the Cloud

Module 1: Developing Long-Running Tasks and Distributed Transactions

Module 2: Configuring a Message-Based Integration Architecture

Module 3: Developing for Asynchronous Processing

Module 4: Developing for Autoscaling

Module 5: Developing Azure Cognitive Services Solutions



Introduction to DevOps

What is DevOps?

History of DevOps

  • Dev and Ops
  • DevOps definitions, Software Development Life Cycle and main objectives of the DevOps
  • Infrastructure As A Code
  • Prerequisites for DevOps
  • Tools (Jenkins, Chef, Docker, Vagrant and so on.)
  • Continuous Integration and Development

Linux Concepts

  • Linux Installation
  • User Management
  • Package Management
  • Networking

Automation Concepts

  • OS Basics
  • Scripting Introduction
  • Learn Shell Scripting
  • Database Concepts
  • Shell Variable, Decision Making and Shell Test Conditions
  • Shell Loops, Re-directors, Exit status

Revision Controls System

  • Subversion Controls/Git
  • Working with local repositories, remote repositories
  • branching
  • merging
  • cloning
  • fetch/pull
  • Installation of Git Server

Configuration Management

  • Chef/Puppet/Ansible Introduction
  • Chef server Hands-on, workstation setup, Chef Distribution Kit and Concepts


  • Attributes
  • Resources
  • Cookbook
  • Run list
  • Recipes
  • Supermarket

Build Automation

  • Introduction with Maven
  • Maven structure and Phases
  • Installation of Maven
  • Configuration
  • jar/war project structure

Tomcat Web Server

  • Installation and Configuration
  • Tomcat Manager
  • Application Management
  • App Deployment Methods

Nexus Artifacts/Proxy Tool

  • Introduction to Nexus
  • Installation and Configuration
  • Repository Management
  • Proxy Management  Integration with Maven

Jenkins Framework

  • Introduction to Jenkins
  • Jenkins Installation
  • User Profile and Management
  • Security and Plugins Management
  • Builds Setup
  • Integration with Git, Maven, Tomcat

LAMP Setup

Apache/HTTPD Web Service

  • Installation of Apache
  • Configuration of Apache
  • Static Pages
  • Dynamic Pages
  • PHP Integration

MySQL Database

  • Working with Database
  • Introduction to MySQL Database
  • Configuration
  • User management
  • Permission management
  • Creating Database
  • Data insertion/update
  • MySQL Data Backup, Hands-on and MySQL GUI Tools

Installation of Word Press with LAMP

  • Vagrant
  • Introduction to Vagrant
  • Vagrant Terminologies
  • Installation of Vagrant
  • Vagrant Proxy Project and hands-on

Working with Dockers

  • Introduction to Docker
  • Docker Terminologies
  • Installation of Docker
  • Docker image creation and Docker hands-on

System Monitoring

  • Introduction to Nagios
  • Concepts behind Nagios
  • Nagios Installation

Leave a Reply

Your email address will not be published. Required fields are marked *


Give us a call or fill in the form below and we will contact you. We endeavor to answer all inquiries within 24 hours on business days.