- (5.0 Star)
CloudNet Certified IMS Pro
Advance Diploma Training
We provide Online Instructor And Classroom Instructor led Live virtual classroom by certified trainers/ industry professionals
- Get Up to 25% discount
About Course
CloudNet Certified IMS Pro is a best Advance Diploma IT Hardware Networking Course, design to equip trainee engineers with updated technical skill and experience in the lab. This course aimed to develop trainee engineers into highly employable, industry ready professional. This ambitious program is design by technology expert from different niche of IT industries to bridge the gap between supply of skilled manpower and increasing demand for same. This a best Hardware, Networking, Security and Cloud Computing course covers today’s topmost Global IT Certification including Hardware – A+, Networking – N+, Ubuntu Linux Administration, CCNA , CCNP Enterprise, Python - For Network Engineer, Windows Server 2019 Administration, RHCE - RHEL Enterprise Linux 9, CCSA - R80, Ethical Hacking - CEHv11, AWS Solution Architect Associate and Azure Administrator Associate certification training and associate technologies. This program empowers and prepares you for your dream career, on successfully completion of this program trainee engineers will get opportunity as a Desktop Support Engineer, Hardware Network Engineer, Network Administrator, System Administrator, Security Expert, Cloud Administrator and likes.
Key Features
You will get 100% job Assurance and life time e-placement support
classed taken by globally certified trainers
You will get 3 year Dedicated placement support
Courses are globally recognized & accredited
Course Type:
Advance Diploma Training
Live virtual classroom:
55,000/- Per Module
70,000/-
Regular classroom:
55,000/- Per Module
70,000/-
- Duration:
24 Months
- Enrolled:
89 Learners
- Eligibility:
10+2 / Graduate any
- 5 Star:
42 Reviews
MODULE - I (Core)
- Computer Hardware and Software
- PC Components and Peripheral
- Input, Output and Processing Devices
- Binary, Decimal, Hexadecimal and Octal
- Digital Signal, Electronics Components
- Circuit and Logic Gates
- SMPS and UPS
- Motherboard Components and Form Factor (sizes)
- Busses, Expansion Slots and Chipsets
- BIOS vs CMOS
- BIOS Components and BIOS Configuration
- Flashing BIOS, UEFI
- Memory Classification
- Volatile vs Non-Volatile
- Types of RAM and ROM
- 32 bit vs 64 bit, CPU Cores and CPU Cache
- Hyper-Threading and Virtualization Support
- CPU Cooling System
- Hard Disk Components
- Type of Hard Drive
- IDE, EIDE, ATA, PATA, SATA, SCSI and SSD
- Hard Disk Cables and Connectors
- Optical Discs and Drive
- CD, DVD, Blue-ray
- Peripherals and Device Drivers
- Input and Output Devices
- Expansion Cards
- Display Devices – CRT, LCD and LED
- Connector Types – VGA, HDMI and DVI
- Type of Printers – Inkjet, Thermal, Impact and Laser
- Printers Components
- Print Spooler
- Common Laptop Feature
- Conserving Power
- Laptop Hardware Component
- Tablets vs. Laptops, Accelerometers and Gyroscopes
- Comparing Operating Systems and Connectivity
- Communication and Professionalism
- Identify the Problem and Customer Needs
- Workstation Design
- Comparing 32bit vs 64 bit
- Windows Versions and Editions
- Clean Install, Dual Boot, Upgrade and Migrate
- Exploring Windows Features and Management Tools
- Internal and External Commands Line
- Creating Batch file
- Device Manager
- System Protection and System Restore
- Backup and Restore
- Disk, Partition and Volume
- Static Disk vs Dynamic Disk
- Dynamic Disk and RAID
- File System – FAT, NTFS and CDFS
- Disk Management Tools
- The Boot Process and Advance Boot Option
- Windows Troubleshooting Tools
- Type of Network – LAN, CAN, MAN and WAN
- Network Hardware Components – NIC, HUB
- Bridge, Switch, Router, Modem
- Workgroup vs. Domain
- Internet Connection
- Network Cables – Coaxial, Copper and Fiber Optic
- Connector – RJ45, RJ11, BNC
- Network Topology
- Common TCP/IP Protocols and Ports
- COMPARING IPV4 AND IPV6
- IPv4 Classes, Private vs. Public
- Unicast, Multicast and Broadcast
- IPv6
- Firewall, DMZ, Port Forwarding
- Proxy Server and QoS
- EXPLORING WIRELESS NETWORKING
- Access Point and Wireless Router
- Configure Wireless
- Installing and Configuring Network
- Troubleshooting Tools
- User and Group
- Local vs. Administrator Users
- Authentication and Authorization
- NTFS security and Local Security Policy
- Bit Locker and Parental Control
- Malwarv, Virus, Warms and Spyware
- Antivirus Software
Networking N+
Duration: 50 Hrs. Eligibility: 10+2/Graduate with Computing Skills
Networking N+ N10-008 is the foundation course to develop your skill in TCP/ IP Network, to implement TCP/IP data network you must be learn Fundamentals of Networking Media & Topology, Network Devices – Hub, Switch, Router, Access Point, IP Addressing (IPV4 and IPV6), Common Networking Service such as DNS, DHCP, HTTP, HTTPS, FTP, Telnet, SSH, Network Implementation, Network Security, Network Operation and Cloud. IT Networking is one of the best career scope in domain of Information Technology, this program help to achieve your dream career in IT Networking. Networking N+ is the prerequisite or recommended for higher level networking certification such CCNA, Windows Hybrid Administrator, RHCE, CEH, Cloud Computing and many more. Successfully completion of Networking N+ you act as a Network Technician, LAN Installer and Network Support Engineer.
COURSE KEY HIGHLIGHT:
- You will prepare based on newly designed Network+ N10-008
- Networking N+ Training in Kolkata will also come with great job opportunity
- Networking N+ course at CloudNet, will assure you 100% quality learning experience.
- Networking N+ Certification course in Kolkata conducted by Highly Experienced and Certified Trainer.
- Successfully completion of course you will earn a course completion certificate
- After completion of Networking N+ Training at CloudNet you will get 3 years dedicated placement support.
- Our Networking N+ program come with life time eLearning and placement Support
Lesson 1: Networking Models
- An Overview of CompTIA N10-008 Network+.
This lesson introduces how the network system works. The OSI and TCP/IP (DoD) models are explained in details to each layers job role and Functions
Lesson 2: Network Components
The Components used to build a network begin with switches and routers, but nowadays are quickly enhanced with the use of wireless networking, Network load distribution, security devices, and many more components. In This lesson we discuss foundational concepts of the most common network components used in today’s modern network.
Lesson 3: Network Topologies
If you are building a new network or with an existing network you will need to understand the advantages and disadvantages of common network designs. This lesson teaches both physical wiring topologies as well as logical topology using modern networks.
Lesson 4: Network Services
- To work with any networks including remote networks you must understand the concept of different network protocols. In this lesson, we explore many common communication protocols including network, transport and application layer protocols to begin the journey of TCP/IP Networks protocols suite.
Lesson 5: LAN Technologies
- The Local Area Network is the backbone of any network. In this lesson we will learn ethernet LAN standard, duplexing and media components.
Lesson 6: WAN Technologies
- If you wish to connect to two remote sites the WAN technologies are key components and responsible for providing long distance communications. In this module, we explore technologies leveraged by service providers (ISP), which provide wide area connectivity.
Lesson 7: Network Cabling and Connectors
- To implement wired based LAN we need to have the proper cabling and supporting adapter. In this Lesson, we explore different types of network cabling and their advantages and disadvantages of cabling types and also discuss the tools required for cabling.
Lesson 8: Ethernet Switch Operations
- Switching is one of the most important topics we understand to build a network. In this section, we discuss how a switch works and perform operations including loop prevention mechanisms. After building a basic concept, we explore advanced tuning options that you might be able to perform to enhance the speed up and reliability of your network.
Lesson 9: Wireless LAN
- Wireless networking has become more famous in the current age. Wireless devices are used to extend the edge to user devices as well as perform bridging between separate physical locations. Lesson 8 discusses wireless communication standards, antenna types, security implementations, and more.
Lesson 10: IP Addressing
- IP addressing is the core component of networking. In this lesson, we discover the importance and use case of the IP Address and subnet mask. After learning the basics of IP address type, class and subnet mask, later we discuss how to create custom subnets to enhance security, improve performance, and aid in administrative needs.
Lesson 11: IP Version 6 Networks
- IPv6 was created to be the successor of IPv4. In this lesson, you learn the need of IPv6 addresses and how IPv6 addressing works, IPv6 address types and how the protocol header is a bit different than in IPv4, and the new roles of ICMPv6.
Lesson 12: IP Routing
- IP Routing is a process to build a routing table, IP Packets are forwarded based on their destination IP addresses matches in the route table, this forwarding called ip routing. We can build a route table through both static and dynamic routing. We must understand and explore Interior Gateway Protocols (IGP), as well as Exterior Gateway Protocols (EGP).
Lesson 13: Unified Communications Fundamentals
- What is Unified communications, Basics of QoS and classification and marking, congestion management, traffic shaping and policing and so on.
Lesson 14: Virtualization Fundamentals
- Virtualization technology is nowadays becoming more famous and every network engineer has to be involved with it. With the rapid adoption of virtualization networks and servers, engineers are now required to understand how virtualized networks work. We learn the basics of virtualization technologies, type of virtualization and the networking aspects of virtualized environments.
Lesson 15: Cloud Fundamentals
- The term cloud computing is used everywhere these days, even by those who have no idea what it means. In This Lesson We will discuss cloud computing models, type of cloud and services.
Lesson 16: Network Security
- Nowadays profit-driven cyber attacks are on the rise, its very necessary that network engineers understand different types of attack methods and security controls tools that can be used to protect network infrastructure. In this lesson we introduce offensive techniques used by attackers, as well as defensive countermeasures that can be deployed by network administrators.
Lesson 17: Network Troubleshooting
In this lesson we learn how to troubleshoot a network and steps to follow to identify the problem including design error, connectivity and hardware and software troubleshooting. We also learn tools mostly used to troubleshoot networks.
UBUNTU LINUX ADMINISTRATION
Duration: 30 Hrs. Eligibility: 10+2/Graduate with Computing Skills
This course is designed to path explore everything you need to know about installing and managing Ubuntu Linux administration. To Start learning Linux Administration using Ubuntu Server. This course is based on hands-on Practice system commands with easy steps for beginners.
How to install and configure Ubuntu Linux Server
To works CLI Environment and GUI
Work with Linux services, files, users and basic network administration
Lesson 1: Introduction to Linux
Linux History, What is Ubuntu and CLI Environment
Lesson 2: Introduction to CLI and Basic linux concepts
Linux Basic Commands, GUI vs CLI and CLI Environment
Lesson 3: Linux File Editors and File Permission
VIM File Editor and Nano, Change Permission using Chmod and ACL
Lesson 4: Linux filesystem hierarchy and Storage
Linux FSH and purpose, Hard disk and SSD Partitioning, Mount Partition
Lesson 5: Linux Users and Group
Create user account and Group Account, Modify user account and group properties
Lesson 6: Introduction Networking
Basic Networking, Configure IP address and others host configuration
Lesson 7: Administration basics
Process management, Software management and Installation of Ubuntu
Lesson 8: Final Preparation of Linux Administration
Discuss about Linux Server real time uses and advantage and disadvantages.
CCNA (200-301)
Duration: 70 Hrs. Eligibility: 10+2/Graduate with Fundamental Networking SkillS
CCNA program design to prepare you for today’s associate-level job roles in IT Networking technologies. The New CCNA 200-301 now covers broad aspects of IT job roles including Network Fundamental, IP Routing, Switching, IP Services, Security, Automation and Programmability. The program has one certification that covers a broad range of fundamentals for IT careers, with one exam and one training course to help you prepare.
The newly CCNA training course in CloudNet Kolkata and exam preparation give you the foundation you need to take your career in any direction. CCNA certification training in Kolkata covers a breadth of topics, including:
- Network fundamentals
- Network access
- IP connectivity
- IP services
- Security fundamentals
- Automation and programmability
WHO Should Enroll:
This course is designed for anyone seeking CCNA certification. The course also provides foundational knowledge for all support technicians involved in the basic installation, operation, and verification of Mid size Cisco networks. The job roles best suited to the material in this course are:
- Entry-level network engineer
- Network administrator
- Network support technician
- Help desk technician
COURSE KEY HIGHLIGHT:
- You will prepare based on newly designed CCNA 200-301
- CCNA Training in Kolkata will also come with great job opportunity
- CCNA course at CloudNet, will assure you 100% quality learning experience.
- CCNA Certification course in Kolkata conducted by Highly Experienced and Certified Trainer.
- Successfully completion of course you will earn a course completion certificate
- After completion of CCNA Training at CloudNet you will get 3 years dedicated placement support.
- Our CCNA program come with life time eLearning and placement Support
Course Objectives:
NETWORK FUNDAMENTALS
- Explain the role and function of network components
- Describe characteristics of network topology architectures
- Compare physical interface and cabling types
- Identify interface and cable issues (collisions, errors, mismatch duplex, and/or speed)
- Compare TCP to UDP
- Configure and verify IPv4 addressing and subnetting
- Describe the need for private IPv4 addressing
- Configure and verify IPv6 addressing and prefix
- Compare IPv6 address types
- Verify IP parameters for Client OS (Windows, Mac OS, Linux)
Describe wireless principles - Explain virtualization fundamentals (virtual machines)
- Describe switching concepts
NETWORK ACCESS
- Configure and verify VLANs (normal range) spanning multiple switches
- Configure and verify interswitch connectivity
- Configure and verify Layer 2 discovery protocols (Cisco Discovery Protocol and LLDP)
- Configure and verify (Layer 2/Layer 3) EtherChannel (LACP)
- Describe the need for and basic operations of Rapid PVST+ Spanning Tree
- Protocol and identify basic operations
- Compare Cisco Wireless Architectures and AP modes
- Describe physical infrastructure connections of WLAN components (AP, WLC, access/trunk ports, and LAG)
- Describe AP and WLC management access connections (Telnet, SSH, HTTP, HTTPS, console, and TACACS+/RADIUS)
- Configure the components of a wireless LAN access for client connectivity using GUI only such as WLAN creation, security settings, QoS profiles, and advanced WLAN settings
IP CONNECTIVITY
- Interpret the components of routing table
- Determine how a router makes a forwarding decision by default
- Configure and verify IPv4 and IPv6 static routing
- Configure and verify single area OSPFv2
- Describe the purpose of first hop redundancy protocol
IP SERVICES
- Configure and verify inside source NAT using static and pools
- Configure and verify NTP operating in a client and server mode
- Explain the role of DHCP and DNS within the network
- Explain the function of SNMP in network operations
- Describe the use of syslog features including facilities and levels
- Configure and verify DHCP client and relay
- Explain the forwarding per-hop behavior (PHB) for QoS such as classification, marking, queuing, congestion, policing, shaping
- Configure network devices for remote access using SSH
- Describe the capabilities and function of TFTP/FTP in the network
SECURITY FUNDAMENTALS
- Define key security concepts (threats, vulnerabilities, exploits, and mitigation techniques)
- Describe security program elements (user awareness, training, and physical access control)
- Configure device access control using local passwords
- Describe security password policies elements, such as management, complexity, and password alternatives (multifactor authentication, certificates, and biometrics)
- Describe remote access and site-to-site VPNs
- Configure and verify access control lists
- Configure Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port security)
- Differentiate authentication, authorization, and accounting concepts
- Describe wireless security protocols (WPA, WPA2, and WPA3)
- Configure WLAN using WPA2 PSK using the GUI
AUTOMATION AND PROGRAMMABILITY
- Explain how automation impacts network management
- Compare traditional networks with controller-based networking
- Describe controller-based and software defined architectures (overlay, underlay, and fabric)
a Separation of control plane and data plane
b North-bound and south-bound APIs - Compare traditional campus device management with Cisco DNA Center enabled device management
- Describe characteristics of REST-based APIs (CRUD, HTTP verbs, and data encoding)
- Recognize the capabilities of configuration management mechanisms Puppet, Chef, and Ansible
- Interpret JSON encoded data
CCNA Course Curriculum
Part I: Introduction to Networking
- Introduction to Cisco Certification
- Introduction to TCP/IP Networking
- Fundamentals of Ethernet LANs
- Fundamentals of WANs and IP Routing,
■ Part II: Implementing Ethernet LANs
- Using the Command-Line Interface
- Analyzing Ethernet LAN Switching
- Configuring Basic Switch Management
- Configuring and Verifying Switch Interfaces
■ Part III: Implementing VLANs and STP
- Implementing Ethernet Virtual LANs
- Spanning Tree Protocol Concepts
- RSTP and EtherChannel Configuration
■ Part IV: IPv4 Addressing
- Perspectives on IPv4 Addressing & Subnetting
- Analyzing Classful IPv4 Networks
- Analyzing Subnet Masks
- Analyzing Existing Subnets
- IP Subnet: FLSM and VLSM
■ Part V: IPv4 Routing
- Operating Cisco Routers
- Configuring IPv4 Addressing and Static Routes
- IP Routing in the LAN (InterVLAN Routing)
- Troubleshooting IPv4 Routing
■ Part VI: OSPF
- Understanding OSPF Concepts
- Implementing OSPF
- OSPF Network Types and Neighbors
■ Part VII: IP Version 6
- Fundamentals of IP Version 6
- IPv6 Addressing and Subnetting
- Implementing IPv6 Addressing on Routers
- Implementing IPv6 Routing
■ Part VIII: Wireless LANs
- Fundamentals of Wireless Networks
- Analyzing Cisco Wireless Architectures
- Securing Wireless Networks
- Building a Wireless LAN
■ Part IX: IP Access Control Lists
- Introduction to TCP/IP Transport and Applications
- Basic IPv4 Access Control Lists
- Advanced IPv4 Access Control Lists
■ Part X: Security Services
- Security Architectures
- Securing Network Devices
- Implementing Switch Port Security
- Implementing DHCP
- DHCP Snooping and ARP Inspection
■ Part XI: IP Services
- Device Management Protocols
- Network Address Translation
- Quality of Service (QoS)
- Miscellaneous IP Services
■ Part XII: Network Architecture
- LAN Architecture
- WAN Architecture
- Cloud Architecture
■ Part XIII: Network Automation
- Introduction to Controller-Based Networking
- Cisco Software-Defined Access (SDA)
- Understanding REST and JSON
- Understanding Ansible, Puppet, and Chef
COURSE KEY HIGHLIGHT:
- You will prepare based on newly designed CCNP Enterprise
- CCNP Enterprise Training in Kolkata will also come with great job opportunity
- CCNP course at CloudNet, will assure you 100% quality learning experience.
- CCNP Certification course in Kolkata conducted by Highly Experienced and Certified Trainer.
- Successfully completion of course you will earn a course completion certificate
- After completion of CCNP Training at CloudNet you will get 3 years dedicated placement support.
- Our CCNP Enterprise program come with life time eLearning and placement Support
IMPLEMENTING CISCO ENTERPRISE NETWORK CORE TECHNOLOGIES V1.0 (300-401)
ARCHITECTURE- Explain the different design principles used in an enterprise network
- Analyze design principles of a WLAN deployment
- Differentiate between on-premises and cloud infrastructure deployments
- Explain the working principles of the Cisco SD-WAN solution
- Explain the working principles of the Cisco SD-Access solution
- Describe concepts of wired and wireless QoS
- Differentiate hardware and software switching mechanisms
- Describe device virtualization technologies
- Configure and verify data path virtualization technologies
- Describe network virtualization concepts
- Layer 2 Technology:
- Troubleshoot static and dynamic 802.1q trunking protocols
- Troubleshoot static and dynamic EtherChannels
- Configure and verify common Spanning Tree Protocols (RSTP and MST)
- Layer 3 Technology:
- Compare routing concepts of EIGRP and OSPF (advanced distance vector vs. linked state, load balancing, path selection, path operations, metrics)
- Configure and verify simple OSPF environments, including multiple normal areas, summarization, and filtering (neighbor adjacency, point-to-point and broadcast network types, and passive interface)
- Configure and verify eBGP between directly connected neighbors (best path selection algorithm and neighbor relationships)
- Wireless Technology
- Describe Layer 1 concepts, such as RF power, RSSI, SNR, interference noise,
- band and channels, and wireless client devices capabilities
- Describe AP modes and antenna types
- Describe access point discovery and join process (discovery algorithms,
- WLC selection process)
- Describe the main principles and use cases for Layer 2 and Layer 3 roaming
- Troubleshoot WLAN configuration and wireless client connectivity issues
- IP Services
- Describe Network Time Protocol (NTP)
- Configure and verify NAT/PAT
- Configure first hop redundancy protocols, such as HSRP and VRRP
- Describe multicast protocols, such as PIM and IGMP v2/v3
- Diagnose network problems using tools such as debugs, conditional debugs, trace route, ping, SNMP, and syslog
- Configure and verify device monitoring using syslog for remote logging 2019
- Cisco Systems, Inc. This document is Cisco Public. Page 3
- Configure and verify NetFlow and Flexible NetFlow
- Configure and verify SPAN/RSPAN/ERSPAN
- Configure and verify IPSLA
- Describe Cisco DNA Center workflows to apply network configuration, monitoring, and management
- Configure and verify NETCONF and RESTCONF
- Configure and verify device access control
- Configure and verify infrastructure security features
- Describe REST API security
- Configure and verify wireless security features
- Describe the components of network security design
- Interpret basic Python components and scripts
- Construct valid JSON encoded file
- Describe the high-level principles and benefits of a data modeling language, such as YANG
- Describe APIs for Cisco DNA Center and vManage
- Interpret REST API response codes and results in payload using Cisco DNA
- Center and RESTCONF
- Construct EEM applet to automate configuration, troubleshooting, or data collection
- Compare agent vs. agentless orchestration tools, such as Chef, Puppet,
- Ansible, and SaltStack
IMPLEMENTING CISCO ENTERPRISE ADVANCED ROUTING AND SERVICES V1.0 (300-410)
LAYER 3 TECHNOLOGIES- Layer 3 Technologies
- Troubleshoot administrative distance (all routing protocols)
- Troubleshoot route map for any routing protocol (attributes, tagging, filtering)
- Troubleshoot loop prevention mechanisms (filtering, tagging, split horizon, route poisoning)
- Troubleshoot redistribution between any routing protocols or routing sources
- Troubleshoot manual and auto-summarization with any routing protocol
- Configure and verify policy-based routing
- Configure and verify VRF-Lite
- Describe Bidirectional Forwarding Detection
- Address families (IPv4, IPv6)
- Neighbor relationship and authentication
- Loop-free path selections (RD, FD, FC, successor, feasible successor, stuck in active)
- Stubs
- Load balancing (equal and unequal cost)
- Metrics
- Address families (IPv4, IPv6)
- Neighbor relationship and authentication
- Network types, area types, and router types
- Path preference
- Address families (IPv4, IPv6)
- Neighbor relationship and authentication (next-hop, mulithop, 4-byte AS, private AS, route refresh, synchronization, operation, peer group, states and timers)
- Path preference (attributes and best-path)
- Route reflector (excluding multiple route reflectors, confederations, dynamic peer)
- Policies (inbound/outbound filtering, path manipulation)
- Describe MPLS operations (LSR, LDP, label switching, LSP)
- Describe MPLS Layer 3 VPN
- Configure and verify DMVPN (single hub)
- Troubleshoot device security using IOS AAA (TACACS+, RADIUS, local database)
- Troubleshoot router security features
- Troubleshoot control plane policing (CoPP) (Telnet, SSH, HTTP(S), SNMP,
- EIGRP, OSPF, BGP)
- Describe IPv6 First Hop security features (RA guard, DHCP guard, binding table, ND inspection/snooping, source guard)
- Troubleshoot device management
- Troubleshoot SNMP (v2c, v3)
- Troubleshoot network problems using logging (local, syslog, debugs, conditional debugs, timestamps)
- Troubleshoot IPv4 and IPv6 DHCP (DHCP client, IOS DHCP server, DHCP relay, DHCP options)
- Troubleshoot network performance issues using IP SLA (jitter, tracking objects, delay, connectivity)
- Troubleshoot NetFlow (v5, v9, flexible NetFlow)
- Troubleshoot network problems using Cisco DNA Center assurance (connectivity, monitoring, device health, network health)
Python – For Network Engineer
Duration: 30 Hrs. Eligibility: 10+2/Graduate with Computing and Cisco Networking Skills
Learn Network Programmability and Network Automation using GNS3 and Python version 3.
Do you wish to automate your networks using Python, but not sure where to start? Well, this course will show you how you can start programming Cisco networks using Python with GNS3.
This course is designed based on Python 3.
Thiscourse is designed for network engineers.. This course is practical based on Python3 and GNS3.We will show you how you can quickly and easily start network programming by using GNS3, Cisco IOS and Python3.
You will see demonstrations of the configuration of both Cisco routers and switches in GNS3. For example, how to configure multiple VLANs, VTP on multiple switches, or how to configure Routing Protocols on a router and more.
This course is based on practical examples of using Python to programmatically configure Cisco network devices. Traditionally Cisco networks including Switches and Routers configure by only with the command line interface (CLI), But Nowadays network automation essential for network engineers and you need to add network programmability using Python to your skill set.
Learn how to automate networks using: Telnet, SSH, Paramiko, Netmiko and NAPALM
NAPALM and Netmiko are tools which help you to make it easy to configure and interact with network devices using an API such as NETCONF or using SSH.
Introduction to Python
Python Installation
Print Function
Variables
Data Types
User Input
String Split() Method
Slice() Function
Python Operators
If, Elif, Else
Loops
Function
Scope
Modules
PIP
Read and Write Files
Python Try Except
Comments
Integrated Development Environment (IDE)
JSON
Connect with SSH
Connect with API
MODULE - II (Advance)
WINDOWS SERVER 2016/2019 ADMINISTRATION
Duration: 90 Hrs. Eligibility: 10+2/Graduate with Fundamentals Networking Skills
The Windows Server 2016 / 2019 Administration course is designed based on Previous Microsoft Certification Microsoft Certified Solutions Associate (MCSA): Windows Server 2016 / 2019 Training and Certification Course is an intermediate level certification that enables candidates to implement, monitor and manage Windows Server 2016 / 2019 operating system. The (MCSA): Windows Server 2016 / 2019 certification is designed to prove mastery of the skills required to administer Windows Server 2016 / 2019, including installation and implementation of storage solutions, Hyper-V, and Windows containers; networking with DNS, DHCP, IP address management, and advanced infrastructure; and administration of Active Directory Domain Services, group policy, Nano Server, and more. This course is the first step towards your path to becoming a Microsoft Certified Solutions Expert (MCSE). CloudNet Hands-on instructor led classroom and online class designed to give real-time exposer lab training in Kolkata to get ready for next generation IT Professional.
70-740: INSTALLATION, STORAGE, AND COMPUTE WITH WINDOWS SERVER 2016 / 2019
- Installing, upgrading, and migrating servers and workloads
- Configuring local storage
- Implementing enterprise storage solutions
- Implementing Storage Spaces and Data Deduplication
- Installing and configuring Hyper-V and virtual machines
- Deploying and managing Windows and Hyper-V containers
- Overview of high availability and disaster recovery
- Implementing failover clustering
- Implementing failover clustering with Windows Server 2016 Hyper-V
- Implementing Network Load Balancing
- Creating and managing deployment images
- Managing, monitoring, and maintaining virtual machine installations
70-741: NETWORKING WITH WINDOWS SERVER 2016 / 2019
- Planning and implementing an IPv4 network
- Implementing DHCP
- Implementing IPv6
- Implementing DNS
- Implementing and managing IPAM
- Remote access in Windows Server 2016
- Implementing Direct Access
- Implementing VPNs
- Implementing networking for branch offices
- Configuring advanced networking features
- Implementing Software Defined Networking
70-742: IDENTITY WITH WINDOWS SERVER 2016 / 2019
- Installing and configuring domain controllers
- Managing objects in AD DS
- Advanced AD DS infrastructure management
- Implementing and administering AD DS sites and replication
- Implementing Group Policy
- Managing user settings with Group Policy/a>
- Securing Active Directory Domain Services
- Deploying and managing AD CS
- Deploying and managing certificates
- Implementing and administering AD FS
- Implementing and administering AD RMS
- Implementing AD DS synchronization with Microsoft Azure AD
- Monitoring, managing, and recovering AD DS
LINUX ENGINEER: ENTERPRISE LINUX 8
Duration: 70 Hrs. Eligibility: 10+2/Graduate with Fundamentals Networking SkillsTo learn Redhat enterprise linux administration in kolkata, we qre one of the premier training institute to offer global learning solution on enterprise linux. This course is design based on latest technologies solution to learn most essential to advanced linux topic to become certified enterprise linux engineer. This Course traning will delivered by highly experienced and certified trainer with real time solutions. This course designed to test and validate the skills and knowledge necessary to work as a senior-level linux system administrator. Topics covered include system administration command, Manage software using DNF, storage and file system, advanced ip routing and services, managing runtime kernel behavior, Control the boot process and system services, Manage storage devices, logical volumes, and file systems, working with iscsi, networking services, Run containers, Install & Configure Ansible Automation Platform with Ansible and more. Red Hat Enterprise Linux administration & Automation with Ansible is designed for Linux administrators and developers who need to automate repeatable and error-prone steps for system provisioning, configuration, application deployment, and orchestration. COURSE KEY HIGHLIGHT:
- You will prepare based on newly designed Redhat Enterprise Linux – RHCE
- Redhat Enterprise Linux – RHCE Training in Kolkata will also come with great job opportunity
- Redhat Enterprise Linux – RHCE course at CloudNet, will assure you 100% quality learning experience.
- Redhat Enterprise Linux – RHCE Certification course in Kolkata conducted by Highly Experienced and Certified Trainer.
- Successfully completion of course you will earn a course completion certificate After completion of Redhat Enterprise Linux – RHCE
- Training at CloudNet you will get 3 years dedicated placement support.
- Our Redhat Enterprise Linux – RHCE program come with life time eLearning and placement Support
- To Learn Enterprise Linux Administration In Kolkata, We Are One Of The Premier Training Institute To Offer Global Learning Solution On Enterprise Linux.
- This Course Is Design Based On Latest Technologies Solution To Learn Most Essential To Advanced Linux Topic To Become Certified Enterprise Linux Engineer. Course Will Delivered By Highly Experienced And Certified Trainer With Real Time Solutions. This Course Designed To Test And Validate The Skills And Knowledge Necessary To Work As A Senior-Level Linux System Administrator. Topics Covered Include System Administration Command, Storage And File System, Advanced Ip Routing And Services, Managing Runtime Kernel Behavior, Working With iSCSI, Networking Services And More.
- Get started with Red Hat Enterprise Linux
- Access the command line
- Manage files from the command line
- Get help in Red Hat Enterprise Linux
- Create, view, and edit text files
- Manage local users and groups
- Control access to files
- Monitor and manage Linux processes
- Control services and daemons
- Configure and secure SSH
- Analyze and store logs
- Manage networking
- Archive and transfer files
- Install and update software packages
- Access Linux files systems
- Analyze servers and get support
- Improve command line productivity
- Schedule future tasks
- Tune system performance
- Manage SELinux security
- Manage logical volumes
- Access network-attached storage
- Control the boot process
- Manage network security
- Install Red Hat Enterprise Linux
- Run Containers
- Introduce Ansible
- Implement an Ansible playbook
- Manage variables and facts
- Implement task control
- Deploy files to managed hosts
- Manage complex plays and playbooks
- Simplify playbooks with roles
- Troubleshoot Ansible
- Automate Linux administration tasks
CCSA: CHECKPOINT R80
Duration: 60 Hrs. Eligibility: 10+2 /Graduate with Fundamentals Networking Skills
Advance your knowledge on the GAiA operating system. This course covers everything you need to start-up, configure and manage daily operations of Check Point Security Gateway and Management Software Blades systems on the GAiA operating system. Check Point R80 is advance Firewall widely using in modern data center and enterprise security solution. Before going to start your learning skill in Check Point R80, you must be have the skill in Linux or Windows Server administration and also having good knowledge about TCP/IP network. After successfully completion you get skill in Install the security gateway in a distributed environment, Configure rules on Web and Gateway servers, Create a basic rule base in Smart Dashboard and assign permissions, Schedule backups and seamless upgrades with minimal downtime, Monitor and troubleshoot IPS and common network traffic.
COURSE KEY HIGHLIGHT:
- You will prepare based on newly designed CCSA-R80
- CCSA-R80 Training in Kolkata will also come with great job opportunity
- CCSA-R80 course at CloudNet, will assure you 100% quality learning experience.
- CCSA-R80 Certification course in Kolkata conducted by Highly Experienced and Certified Trainer.
- Successfully completion of course you will earn a course completion certificate
- After completion of CCSA-R80 Training at CloudNet you will get 3 years dedicated placement support.
- Our CCSA-R80 program come with life time eLearning and placement Support
Check Point Certified Security Administrator who must have The skills and knowledge:
- Install R80 management and a security gateway in a distributed environment
- Configure objects, rules, and settings to define a security policy
- Work with multiple concurrent administrators and define permission profiles
- Configure a Virtual Private Network and work with Check Point clustering
- Perform periodic administrator tasks as specified in administrator job descriptions
- Describe Check Point’s unified approach to network management and its key elements
- Design a distributed environment
- Install the Security Gateway in a distributed environment
- Perform a backup and restore the current Gateway installation from the command line
- Identify critical files needed to purge (or backup), import and export users and groups, and add (or delete) administrators from the command line
- Deploy Gateways using the Gaia web interface
- Create and configure network, host, and gateway objects
- Verify SIC establishment between the Security Management Server and the Gateway using SmartDashboard
- Create a basicRule Base in SmartDashboard that includes permissions for administrative users, external services, and LAN outbound use
- Configure NAT rules on Web and Gateway servers
- Evaluate existing policies and optimize the rules based on corporate requirements
- Maintain the Security Management Server with scheduled backups and policy versions to ensure seamless upgrades with minimal downtime
- Use Queries in SmartView Tracker to monitor IPS and common network traffic and troubleshoot events using packet data
- Use packet data to generate reports, troubleshoot system and security issues, and ensure network functionality
- Using SmartView Monitor, configure alerts and traffic counters, view a
- Gateway’s status, monitor suspicious activity rules, analyze tunnel activity, and monitor remote user access
- Monitor remote gateways using SmartUpdate to evaluate the need for upgrades, new installations, and license modifications
- Use SmartUpdate to apply upgrade packages to single or multiple VPN-1 Gateways
- Upgrade and attach product licenses using SmartUpdate
- Centrally manage users to ensure only authenticated users securely access the corporate network either locally or remotely
- Manage users to access the corporate LAN by using external databases
- Use Identity Awareness to provide granula- level access to network resources
- Acquire user information used by the Security Gateway to control access
- Define access roles for use in an Identity Awareness rule
- Implement Identity Awareness in the Firewall Rule Base
- Configure a pre-shared secret site-to-site VPN with partner sites
- Configure permanent tunnels for remote access to corporate resources
- Configure VPN tunnel sharing, given the difference between host-based, subunit-based, and gateway- based tunnels
ETHICAL HACKER – CEHV12
Duration : 70 Hrs. Eligibility: 10+2 / Graduate with Fundamentals Network SkillsThe definition of an Ethical Hacker is very similar to a Penetration Tester. The Ethical Hacker is an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods and techniques as a Hacker. This is the worlds most advanced ethical hacking course with 20 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization. The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with hacking skills that are highly in demand, as well as the internationally recognized certified ethical hacker certification.
COURSE KEY HIGHLIGHT:- You will prepare based on newly designed CEH-v12
- Ethical Hacking Training in Kolkata will also come with great job opportunity
- Ethical Hacking course at CloudNet, will assure you 100% quality learning experience.
- Ethical Hacking Certification course in Kolkata conducted by Highly Experienced and Certified Trainer.
- Successfully completion of course you will earn a course completion certificate
- After completion of Ethical Hacking Training at CloudNet you will get 3 years dedicated placement support.
- Our Ethical Hacking program come with life time eLearning and placement Support
AWS SOLUTION ARCHITECT – ASSOCIATE
Duration: 70 Hrs. Eligibility: 10+2/Graduate with Fundamentals Networking Skills Cloud computing is the on-demand delivery of IT resources over the Internet with pay-as-you-go pricing. Instead of buying, owning, and maintaining physical data centers and servers, you can access technology services, such as computing power, storage, and databases, on an as-needed basis from a cloud provider like Amazon Web Services (AWS). Cloud computing market is dominated by two big players: Amazon Web Services (AWS) and Azure. Of the two, AWS has a significantly larger market share, with a approximately 47 percent share of the cloud computing. Presentably AWS offer 170+ services. Since AWS is by far the largest cloud computing service provider and offer also offer largest services in the world today, a job as an AWS Solutions Architect is one with plenty of promises and pay. The AWS Certified Solutions Architect – Associate examination is intended for individuals who perform a solutions architect role and have one or more years of hands-on experience designing available, cost-efficient, fault-tolerant, and scalable distributed systems on AWS. To learning Cloud Computing in Kolkata, CloudNet is one of the premier training intuition offered different level of AWS certification course in Kolkata by 15+ years rich experienced and certified trainers.AWS Solution Architect Course Curriculum
- INTRODUCTION TO CLOUD COMPUTING
- WHAT IS CLOUD COMPUTING?
- ON PREMISE INFRASTRUCTURE VS CLOUD INFRASTRUCTURE
- WHAT IS VIRTUALIZATION?
- PHYSICAL SERVER VS VIRTUAL MACHINE
- ADVANTAGE OF CLOUD INFRASTRUCTURE
- DISADVANTAGE OF CLOUD INFRASTRUCTURE
- SERVICE MODELS(SAAS, PAAS, IAAS)
- CLOUD COMPUTING PRIVATE, PUBLIC, HYBRIDCLOUD
- WHAT IS AMAZON WEB SERVICE (AWS)
- CLOUD PROVIDERS
- WHY AMAZON WEB SERVICE (AWS)?
- AWS GLOBAL INFRASTRUCTURE
- REGIONS, AVAILABILITY ZONES & EDGE LOCATIONS
- AWS FREE TIER AND ACCOUNT SING UP
- AWS CERTIFICATION TRACK
- ELASTIC COMPUTE CLOUD [EC2]
- LAUNCH EC2 INSTANCE
- VPC, AVAILABILITY ZONE, SUBNET, PUBLIC, AND PRIVATE IP
- LAUNCH WINDOWS & LINUX INSTANCES
- AMAZON MACHINE IMAGE (AMI)
- LAUNCH TEMPLATE
- ELASTIC LOAD BALANCING
- CLASSIC LOAD BALANCING
- APPLICATION LOAD BALANCING
- NETWORK LOAD BALANCING
- LAUNCH CONFIGURATIONS
- AWS AUTOSCALING
- LIFECYCLE OF AUTO-SCALING
- AUTO-SCALING POLICY
- AUTO SCALING WITH ELASTIC LOAD BALANCER
- AWS CLI TOOL
- SIMPLE STORAGE SERVICE [S3]
- S3 BUCKET
- STORAGE CLASSES IN S3
- S3 POLICY
- S3 PERFORMANCE OPTIMIZATION
- ELASTIC BLOCK STORAGE [EBS]
- DIFFERENCE BETWEEN S3, EBS AND EFS
- AMAZON CLOUDFRONT
- GLACIER
- AWS IMPORT/EXPORT SNOWBALL
- STORAGE GATEWAY
- IDENTITY AND ACCESS MANAGEMENT (IAM)
- KEY MANAGEMENT SERVICE
- AWS SECURITY & ENCRYPTION: KMS, CLOUDHSM, SHEILD, AND WAF
- POLICIES ACROSS AWS SERVICES
- ACCESS BILLING AND CREATE ALERTS ON BILLING
- DOCKER
- DOCKER ENGINE VS DOCKER HUB
- CONTAINERS
- ELASTIC CONTAINER REGISTRY [ECR]
- ELASTIC CONTAINER SERVICE [ECS]
- ELASTIC KUBERNETES SERVICE [EKS]
- VIRTUAL PRIVATE CLOUD (VPC)
- ROUTE TABLE
- LOCAL GATEWAY VS INTERNET GATEWAY
- CIDR NOTATIONS & SUBNET
- SECURITY GROUPS VS NETWORK ACCESS CONTROL LIST
- NETWORK ADDRESS TRANSLATION (NAT)
- NAT DEVICES, NAT GATEWAY AND NAT INSTANCE
- VPC PEERING
- DIRECT CONNECT
- PRIVATE LINK VS CLASSIC LINK
- ROUTE 53
- ROUTE 53 ZONE TYPES
- ROUTE 53 PUBLIC ZONE VS PRIVATE ZONE
- RECORD TYPES
- SUB DOMAIN
- AWS CLOUDWATCH
- AWS CLOUDTRAIL
- TRUSTED ADVISOR
- INFRASTRUCTURE AS CODE
- CLOUDFORMATION
- COMPONENT OF CLOUDFORMATION
- TEMPLATES IN CLOUDFORMATION
- INTRODUCTION TO AWS OPSWORKS
- AWS OPSWORKS SERVICES
- COMPONENTS OF AWS OPSWORKS STACK
- OPSWORKS LIFECYCLE EVENTS AND DEPLOYMENT COMMANDS
- OPSWORKS FOR CHEF AUTOMATE
- AWS OPSWORKS FOR PUPPET ENTERPRISE
- AUTO HEALING
- ELASTIC BEANSTALK
- COMPONENTS OF ELASTIC BEANSTALK
- BEANSTALK V/S OPSWORKS V/S CLOUDFORMATION
- AMAZON AURORARELATIONAL DATABASE SERVICE [RDS]
- DYNAMODB
- ELASTICACHE
- REDSHIFT
- AMAZON SESAMAZON SNS
- WS SIMPLE WORK FLOW (SWF)
- AWS LAMBDA
- AWS SERVERLESS APPLICATION MODEL
MICROSOFT AZURE ADMINISTRATOR (AZ-104)
Duration: 70 Hrs. Eligibility: 10+2/Graduate with Fundamentals Networking Skills Cloud computing is the on-demand delivery of IT resources over the Internet with pay-as-you-go pricing. Instead of buying, owning, and maintaining physical data centers and servers, you can access technology services, such as computing power, storage, and databases, on an as-needed basis from a cloud provider like Microsoft Azure. The Azure cloud platform offering more than 200 products and cloud services designed to help business bring new solutions to life—to solve today’s IT challenges and create the future. Azure cloud solution give the freedom to build, run, and manage applications across multiple clouds, on-premises, and at the edge, with the tools and frameworks of your choice. This Azure cloud course teaches IT Professionals how to manage their Azure subscriptions, secure identities, administer the infrastructure, configure virtual networking, connect Azure and on-premises sites, manage network traffic, implement storage solutions, create and scale virtual machines, implement web apps and containers, back up and share data, and monitor your solution. This course is design for best solution to Implement, manage & monitor the azure cloud administration task. To learning Cloud Computing in Kolkata, CloudNet is one of the premier training intuition offered different level of Microsoft Azure certification course in Kolkata by 15+ years rich experienced and certified trainers.Microsoft Azure Administrator Course Curriculum
- INTRODUCTION TO CLOUD COMPUTING
- WHAT IS CLOUD COMPUTING?
- ON PREMISE INFRASTRUCTURE VS CLOUD INFRASTRUCTURE
- WHAT IS VIRTUALIZATION?
- PHYSICAL SERVER VS VIRTUAL MACHINE
- ADVANTAGE OF CLOUD INFRASTRUCTURE
- DISADVANTAGE OF CLOUD INFRASTRUCTURE
- SERVICE MODELS(SAAS, PAAS, IAAS)
- CLOUD COMPUTING PRIVATE, PUBLIC, HYBRID CLOUD
- WHAT IS MICROSOFT AZURE
- MICROSOFT AZURE SERVICES
- AZURE SUBSCRIPTIONS
- MANAGEMENT GROUPS
- AZURE RESOURCE MANAGER
- AZURE PORTAL AND POWERSHELL
- AZURE RESOURCE MANAGER POLICIES
- AZURE POLICY DEFINITION STRUCTURE
- RESOURCE MANAGEMENT LOCKS
- ORGANIZING AZURE RESOURCES
- JENKINS MANAGEMENT PREVIEW
- ADDING A SLAVE NODE TO JENKINS
- BUILDING DELIVERY PIPELINE
- PIPELINE AS A CODE
- IMPLEMENTATION OF
- JENKINS IN THE CLOUDNET’S PROJECT
- VIRTUAL MACHINE EXTENSIONS
- CONFIGURATION MANAGEMENT USING POWERSHELL DSC
- RUN CUSTOM SCRIPTS USING CUSTOM SCRIPT EXTENSION
- AZURE KUBERNETES SERVICE (AKS)
- APP SERVICE
- APP SERVICE PLANS
- AZURE VIRTUAL MACHINE & CONTAINER
- AZURE VIRTUAL MACHINES
- CREATE AZURE VM WITH WINDOWS & LINUX
- AZURE RESOURCE MANAGER VM
- INTRODUCTION TO ARM TEMPLATES
- CREATE A CUSTOM IMAGE OF AZURE VM
- CREATE A MANAGED IMAGE OF A GENERALIZED VM
- CREATE AN IMAGE FROM VM SNAPSHOTS
- VPC
- INTRODUCTION TO AZURE VIRTUAL NETWORKS
- IP ADDRESSES – PUBLIC AND PRIVATE
- SUBNETS
- CLASSLESS INTER-DOMAIN ROUTING (CIDR)
- NETWORK INTERFACE CARDS (NICS)
- NETWORK SECURITY GROUPS (NSGS)
- NETWORK SECURITY GROUP RULES
- VIRTUAL NETWORK SERVICE ENDPOINTS
- SERVICE ENDPOINT POLICIES
- AZURE LOAD BALANCER
- AZURE DNS
- AZURE FIREWALL
- AZURE BASTION SERVICE
- AZURE STORAGE
- AZURE STORAGE REPLICATION
- AZURE STORAGE EXPLORER
- ATTACH OR DETACH AN EXTERNAL STORAGE ACCOUNT
- SHARED ACCESS SIGNATURES (SAS)
- ATTACH A STORAGE ACCOUNT USING SAS
- AZURE BLOB STORAGE
- AZURE FILE STORAGE
- AZURE QUEUE & TABLE STORAGE
- INTRODUCTION TO AZURE BACKUP SERVICES
- WHY USE AZURE BACKUP?
- FILES, FOLDER AND APPLICATION BACKUP
- AZURE FILE SHARE & SYNC
- CONTENT DELIVERY NETWORK (CDN)
- AZURE IMPORT/EXPORT SERVICE
- AZURE DATA BOX
- AZURE VIRTUAL MACHINE STORAGE
- AZURE VIRTUAL MACHINE AVAILABILITY
- FAULT AND UPDATE DOMAINS
- AZURE LOAD BALANCER
- AUTOMATIC SCALING OF AZURE VMS
- VM SCALE SETS
- AZURE VM BACKUP
- AZURE VM MONITORING WITH AZURE DIAGNOSTICS EXTENSION
- AZURE ADVISOR
- AZURE TRAFFIC MANAGER
- AZURE APPLICATION GATEWAY
- AZURE VIRTUAL NETWORK ROUTING
- AZURE VIRTUAL NETWORK CONNECTIVITY
- AZURE VPN GATEWAY
- BGP WITH VPN GATEWAY
- VIRTUAL NETWORK PEERING
- AZURE INTER-SITE VPN CONNECTIVITY METHODS
- SITE-TO-SITE VPN GATEWAY CONNECTION
- POINT-TO-SITE VPN GATEWAY CONNECTION
- VNET-TO-VNET CONNECTIONS
- AZURE EXPRESSROUTE
- AZURE VIRTUAL WAN
- AZURE NETWORK WATCHER
- RESOURCE TROUBLESHOOTING IN AZURE NETWORK WATCHER
- OVERVIEW OF ROLE BASED ACCESS CONTROL
- AZURE MONITOR
- LOG ANALYTICS
- AZURE ACTIVITY LOG
- ALERTS IN AZURE MONITOR
- CUSTOM ROLES IN AZURE
- PROVIDE ACCESS TO AZURE RESOURCES BY ASSIGNING ROLES
- MANAGE MULTIPLE DIRECTORIES
- IDENTITY ACCESS MANAGEMENT
- AZURE ACTIVE DIRECTORY
- MULTI FACTOR AUTHENTICATION
- SELF-SERVICE PASSWORD RESET
- AZURE AD IDENTITY PROTECTION
- AZURE AD CONDITIONAL ACCESS
- AZURE AD DOMAINS AND TENANTS
- AZURE AD DOMAIN SERVICES
- AZURE AD JOIN
- AZURE AD SINGLE SIGN-ON
- MANAGE AZURE AD OBJECTS
- AZURE AD CONNECT
- HYBRID IDENTITY
- PASSWORD HASH SYNCHRONIZATION (PHS)
- PASS-THROUGH AUTHENTICATION (PTA)
- FEDERATED AUTHENTICATION
- AZURE AD SEAMLESS SINGLE SIGN-ON (SSO)
- AZURE AD APPLICATION PROXY
CloudNet Certified IMS Pro - 24 Advance Diploma Program
After completion of course candidate must complete Project Preparation
Sent Us a Message