CloudNet Certified IMS Pro

Advance Diploma Training

We provide Online Instructor And Classroom Instructor led Live virtual classroom by certified trainers/ industry professionals

About Course

CloudNet Certified IMS Pro is a best Advance Diploma IT Hardware Networking Course, design to equip trainee engineers with updated technical skill and experience in the lab. This course aimed to develop trainee engineers into highly employable, industry ready professional. This ambitious program is design by technology expert from different niche of IT industries to bridge the gap between supply of skilled manpower and increasing demand for same. This a best Hardware, Networking, Security and Cloud Computing course covers today’s topmost Global IT Certification including Hardware – A+, Networking – N+, Ubuntu Linux Administration, CCNA , CCNP Enterprise, Python - For Network Engineer, Windows Server 2019 Administration, RHCE - RHEL Enterprise Linux 9, CCSA - R80, Ethical Hacking - CEHv11, AWS Solution Architect Associate and Azure Administrator Associate certification training and associate technologies. This program empowers and prepares you for your dream career, on successfully completion of this program trainee engineers will get opportunity as a Desktop Support Engineer, Hardware Network Engineer, Network Administrator, System Administrator, Security Expert, Cloud Administrator and likes.

Key Features

You will get 100% job Assurance and life time e-placement support

classed taken by globally certified trainers

You will get 3 year Dedicated placement support

Courses are globally recognized & accredited

MODULE - I (Core)

Hardware A+ Duration: 80 Hrs. Eligibility: 10+2/Graduate The Computer Hardware A+ course is the first step of your professional IT Career. IT’s the ideal foundation course to get started on a career working with Computer Hardware, Operating System, Data Security, and Basic Networking on Desktop, Laptop, Tablets, Mobile device and many more. This course provide strong foundation on Core Hardware, Operating System (Windows, Linux, Apple and Android Platform), Printer, Security issue and Essential Networking installation, configuration, maintenance & computer assembling. This course is design based on latest industry trend to build a successful career to become an IT Support Engineer, Desktop Support Engineer, Computer Hardware Engineer, Help Desk Support Engineer etc. INTRODUCTION TO PC
  • Computer Hardware and Software
  • PC Components and Peripheral
  • Input, Output and Processing Devices
UNDERSTANDING NUMBER SYSTEM
  • Binary, Decimal, Hexadecimal and Octal
UNDERSTANDING LOGIC GATES
  • Digital Signal, Electronics Components
  • Circuit and Logic Gates
POWER SUPPLY
  • SMPS and UPS
UNDERSTANDING MOTHERBOARD
  • Motherboard Components and Form Factor (sizes)
  • Busses, Expansion Slots and Chipsets
UNDERSTANDING BIOS
  • BIOS vs CMOS
  • BIOS Components and BIOS Configuration
  • Flashing BIOS, UEFI
UNDERSTANDING MEMORY
  • Memory Classification
  • Volatile vs Non-Volatile
  • Types of RAM and ROM
UNDERSTANDING CPU
  • 32 bit vs 64 bit, CPU Cores and CPU Cache
  • Hyper-Threading and Virtualization Support
  • CPU Cooling System
COMPARING STORAGE DEVICES
  • Hard Disk Components
  • Type of Hard Drive
  • IDE, EIDE, ATA, PATA, SATA, SCSI and SSD
  • Hard Disk Cables and Connectors
  • Optical Discs and Drive
  • CD, DVD, Blue-ray
EXPLORING PERIPHERALS AND EXPANSION
  • Peripherals and Device Drivers
  • Input and Output Devices
  • Expansion Cards
EXPLORING VIDEO AND DISPLAY DEVICES
  • Display Devices – CRT, LCD and LED
  • Connector Types – VGA, HDMI and DVI
EXPLORING PRINTERS
  • Type of Printers – Inkjet, Thermal, Impact and Laser
  • Printers Components
  • Print Spooler
WORKING WITH LAPTOP
  • Common Laptop Feature
  • Conserving Power
  • Laptop Hardware Component
UNDERSTANDING MOBILE DEVICES
  • Tablets vs. Laptops, Accelerometers and Gyroscopes
  • Comparing Operating Systems and Connectivity
WORKING WITH CUSTOMERS
  • Communication and Professionalism
  • Identify the Problem and Customer Needs
  • Workstation Design
INTRODUCING WINDOWS OPERATING SYSTEMS
  • Comparing 32bit vs 64 bit
  • Windows Versions and Editions
INSTALL AND UPDATING WINDOWS OPERATING SYSTEMS
  • Clean Install, Dual Boot, Upgrade and Migrate
USING WINDOWS OPERATING SYSTEMS
  • Exploring Windows Features and Management Tools
USING COMMAND PROMPT
  • Internal and External Commands Line
  • Creating Batch file
CONFIGURING WINDOWS OPERATING SYSTEMS
  • Device Manager
  • System Protection and System Restore
  • Backup and Restore
UNDERSTANDING DISK AND FILE SYSTEM
  • Disk, Partition and Volume
  • Static Disk vs Dynamic Disk
  • Dynamic Disk and RAID
  • File System – FAT, NTFS and CDFS
  • Disk Management Tools
TROUBLESHOOTING WINDOWS OPERATING SYSTEM
  • The Boot Process and Advance Boot Option
  • Windows Troubleshooting Tools
INTRODUCING NETWORKING COMPONENTS
  • Type of Network – LAN, CAN, MAN and WAN
  • Network Hardware Components – NIC, HUB
  • Bridge, Switch, Router, Modem
  • Workgroup vs. Domain
  • Internet Connection
EXPLORING CABLES AND CONNECTIVITY
  • Network Cables – Coaxial, Copper and Fiber Optic
  • Connector – RJ45, RJ11, BNC
  • Network Topology
UNDERSTANDING PROTOCOLS
  • Common TCP/IP Protocols and Ports
  • COMPARING IPV4 AND IPV6
  • IPv4 Classes, Private vs. Public
  • Unicast, Multicast and Broadcast
  • IPv6
NETWORK SECURITY DEVICES
  • Firewall, DMZ, Port Forwarding
  • Proxy Server and QoS
  • EXPLORING WIRELESS NETWORKING
  • Access Point and Wireless Router
  • Configure Wireless
CONNECTING AND TROUBLESHOOTING A NETWORK
  • Installing and Configuring Network
  • Troubleshooting Tools
UNDERSTANDING IT SECURITY
  • User and Group
  • Local vs. Administrator Users
  • Authentication and Authorization
  • NTFS security and Local Security Policy
  • Bit Locker and Parental Control
RECOGNIZING MALWARE AND OTHER THREATS
  • Malwarv, Virus, Warms and Spyware
  • Antivirus Software

Networking N+

Duration: 50 Hrs. Eligibility: 10+2/Graduate with Computing Skills

Networking N+ N10-008 is the foundation course to develop your skill in TCP/ IP Network, to implement TCP/IP data network you must be learn Fundamentals of Networking Media & Topology, Network Devices – Hub, Switch, Router, Access Point, IP Addressing (IPV4 and IPV6), Common Networking Service such as DNS, DHCP, HTTP, HTTPS, FTP, Telnet, SSH, Network Implementation, Network Security, Network Operation and Cloud. IT Networking is one of the best career scope in domain of Information Technology, this program help to achieve your dream career in IT Networking. Networking N+ is the prerequisite or recommended for higher level networking certification such CCNA, Windows Hybrid Administrator, RHCE, CEH, Cloud Computing and many more. Successfully completion of Networking N+ you act as a Network Technician, LAN Installer and Network Support Engineer.

COURSE KEY HIGHLIGHT:

    • You will prepare based on newly designed Network+ N10-008
    • Networking N+ Training in Kolkata will also come with great job opportunity
    • Networking N+ course at CloudNet, will assure you 100% quality learning experience.
    • Networking N+ Certification course in Kolkata conducted by Highly Experienced and Certified Trainer.
    • Successfully completion of course you will earn a course completion certificate
    • After completion of Networking N+ Training at CloudNet you will get 3 years dedicated placement support.
    • Our Networking N+ program come with life time eLearning and placement Support

Lesson 1: Networking Models

  • An Overview of CompTIA N10-008 Network+.

    This lesson introduces how the network system works. The OSI and TCP/IP (DoD) models are explained in details to each layers job role and Functions

Lesson 2: Network Components

  • The Components used to build a network begin with switches and routers, but nowadays are quickly enhanced with the use of wireless networking, Network load distribution, security devices, and many more components. In This lesson we discuss foundational concepts of the most common network components used in today’s modern network.

Lesson 3: Network Topologies

  • If you are building a new network or with an existing network you will need to understand the advantages and disadvantages of common network designs. This lesson teaches both physical wiring topologies as well as logical topology using modern networks.

Lesson 4: Network Services

  • To work with any networks including remote networks you must understand the concept of different network protocols. In this lesson, we explore many common communication protocols including network, transport and application layer protocols to begin the journey of TCP/IP Networks protocols suite.

Lesson 5: LAN Technologies

  • The Local Area Network is the backbone of any network. In this lesson we will learn ethernet LAN standard, duplexing and media components.

Lesson 6: WAN Technologies

  • If you wish to connect to two remote sites the WAN technologies are key components and responsible for providing long distance communications. In this module, we explore technologies leveraged by service providers (ISP), which provide wide area connectivity.

Lesson 7: Network Cabling and Connectors

  • To implement wired based LAN we need to have the proper cabling and supporting adapter. In this Lesson, we explore different types of network cabling and their advantages and disadvantages of cabling types and also discuss the tools required for cabling.

Lesson 8: Ethernet Switch Operations

  • Switching is one of the most important topics we understand to build a network. In this section, we discuss how a switch works and perform operations including loop prevention mechanisms. After building a basic concept, we explore advanced tuning options that you might be able to perform to enhance the speed up and reliability of your network.

Lesson 9: Wireless LAN

  • Wireless networking has become more famous in the current age. Wireless devices are used to extend the edge to user devices as well as perform bridging between separate physical locations. Lesson 8 discusses wireless communication standards, antenna types, security implementations, and more.

Lesson 10: IP Addressing

  • IP addressing is the core component of networking. In this lesson, we discover the importance and use case of the IP Address and subnet mask. After learning the basics of IP address type, class and subnet mask, later we discuss how to create custom subnets to enhance security, improve performance, and aid in administrative needs.

Lesson 11: IP Version 6 Networks

  • IPv6 was created to be the successor of IPv4. In this lesson, you learn the need of IPv6 addresses and how IPv6 addressing works, IPv6 address types and how the protocol header is a bit different than in IPv4, and the new roles of ICMPv6.

Lesson 12: IP Routing

  • IP Routing is a process to build a routing table, IP Packets are forwarded based on their destination IP addresses matches in the route table, this forwarding called ip routing. We can build a route table through both static and dynamic routing. We must understand and explore Interior Gateway Protocols (IGP), as well as Exterior Gateway Protocols (EGP).

Lesson 13: Unified Communications Fundamentals

  • What is Unified communications, Basics of QoS and classification and marking, congestion management, traffic shaping and policing and so on.

Lesson 14: Virtualization Fundamentals

  • Virtualization technology is nowadays becoming more famous and every network engineer has to be involved with it. With the rapid adoption of virtualization networks and servers, engineers are now required to understand how virtualized networks work. We learn the basics of virtualization technologies, type of virtualization and the networking aspects of virtualized environments.

Lesson 15: Cloud Fundamentals

  • The term cloud computing is used everywhere these days, even by those who have no idea what it means. In This Lesson We will discuss cloud computing models, type of cloud and services.

Lesson 16: Network Security

  • Nowadays profit-driven cyber attacks are on the rise, its very necessary that network engineers understand different types of attack methods and security controls tools that can be used to protect network infrastructure. In this lesson we introduce offensive techniques used by attackers, as well as defensive countermeasures that can be deployed by network administrators.

Lesson 17: Network Troubleshooting

  • In this lesson we learn how to troubleshoot a network and steps to follow to identify the problem including design error, connectivity and hardware and software troubleshooting. We also learn tools mostly used to troubleshoot networks.

UBUNTU LINUX ADMINISTRATION

Duration: 30 Hrs. Eligibility: 10+2/Graduate with Computing Skills

This course is designed to path explore everything you need to know about installing and managing Ubuntu Linux administration. To Start learning Linux Administration using Ubuntu Server. This course is based on hands-on Practice system commands with easy steps for beginners.

How to install and configure Ubuntu Linux Server

To works CLI Environment and GUI

Work with Linux services, files, users and basic network administration

Lesson 1: Introduction to Linux  

  Linux History, What is Ubuntu and CLI Environment 

Lesson 2: Introduction to CLI and Basic linux concepts  

  Linux Basic Commands, GUI vs CLI and CLI Environment 

Lesson 3: Linux File Editors and File Permission

  VIM File Editor and Nano, Change Permission using Chmod and ACL

Lesson 4: Linux filesystem hierarchy and Storage 

  Linux FSH and purpose, Hard disk and SSD Partitioning, Mount Partition

Lesson 5: Linux Users and Group

  Create user account and Group Account, Modify user account and group properties

Lesson 6: Introduction Networking 

  Basic Networking,  Configure IP address and others host configuration

 Lesson 7: Administration basics  

  Process management, Software management and Installation of Ubuntu

 Lesson 8: Final Preparation of Linux Administration

  Discuss about Linux Server real time uses and advantage and disadvantages.

CCNA (200-301)

Duration: 70 Hrs. Eligibility: 10+2/Graduate with Fundamental Networking SkillS

CCNA program design to prepare you for today’s associate-level job roles in IT Networking technologies. The New CCNA 200-301 now covers broad aspects of IT job roles including Network Fundamental, IP Routing, Switching, IP Services, Security, Automation and Programmability. The program has one certification that covers a broad range of fundamentals for IT careers, with one exam and one training course to help you prepare.
The newly CCNA training course in CloudNet Kolkata and exam preparation give you the foundation you need to take your career in any direction. CCNA certification training in Kolkata covers a breadth of topics, including:

  • Network fundamentals
  • Network access
  • IP connectivity
  • IP services
  • Security fundamentals
  • Automation and programmability

WHO Should Enroll:
This course is designed for anyone seeking CCNA certification. The course also provides foundational knowledge for all support technicians involved in the basic installation, operation, and verification of Mid size Cisco networks. The job roles best suited to the material in this course are:

  • Entry-level network engineer
  • Network administrator
  • Network support technician
  • Help desk technician

COURSE KEY HIGHLIGHT:

  • You will prepare based on newly designed CCNA 200-301
  • CCNA Training in Kolkata will also come with great job opportunity
  • CCNA course at CloudNet, will assure you 100% quality learning experience.
  • CCNA Certification course in Kolkata conducted by Highly Experienced and Certified Trainer.
  • Successfully completion of course you will earn a course completion certificate
  • After completion of CCNA Training at CloudNet you will get 3 years dedicated placement support.
  • Our CCNA program come with life time eLearning and placement Support

Course Objectives: 

NETWORK FUNDAMENTALS

  • Explain the role and function of network components
  • Describe characteristics of network topology architectures
  • Compare physical interface and cabling types
  • Identify interface and cable issues (collisions, errors, mismatch duplex, and/or speed)
  • Compare TCP to UDP
  • Configure and verify IPv4 addressing and subnetting
  • Describe the need for private IPv4 addressing
  • Configure and verify IPv6 addressing and prefix
  • Compare IPv6 address types
  • Verify IP parameters for Client OS (Windows, Mac OS, Linux)
    Describe wireless principles
  • Explain virtualization fundamentals (virtual machines)
  • Describe switching concepts

NETWORK ACCESS 

  • Configure and verify VLANs (normal range) spanning multiple switches
  • Configure and verify interswitch connectivity
  • Configure and verify Layer 2 discovery protocols (Cisco Discovery Protocol and LLDP)
  • Configure and verify (Layer 2/Layer 3) EtherChannel (LACP)
  • Describe the need for and basic operations of Rapid PVST+ Spanning Tree
  • Protocol and identify basic operations
  • Compare Cisco Wireless Architectures and AP modes
  • Describe physical infrastructure connections of WLAN components (AP, WLC, access/trunk ports, and LAG)
  • Describe AP and WLC management access connections (Telnet, SSH, HTTP, HTTPS, console, and TACACS+/RADIUS)
  • Configure the components of a wireless LAN access for client connectivity using GUI only such as WLAN creation, security settings, QoS profiles, and advanced WLAN settings

IP CONNECTIVITY 

  • Interpret the components of routing table
  • Determine how a router makes a forwarding decision by default
  • Configure and verify IPv4 and IPv6 static routing
  • Configure and verify single area OSPFv2
  • Describe the purpose of first hop redundancy protocol

IP SERVICES 

  • Configure and verify inside source NAT using static and pools
  • Configure and verify NTP operating in a client and server mode
  • Explain the role of DHCP and DNS within the network
  • Explain the function of SNMP in network operations
  • Describe the use of syslog features including facilities and levels
  • Configure and verify DHCP client and relay
  • Explain the forwarding per-hop behavior (PHB) for QoS such as classification, marking, queuing, congestion, policing, shaping
  • Configure network devices for remote access using SSH
  • Describe the capabilities and function of TFTP/FTP in the network

SECURITY FUNDAMENTALS 

  • Define key security concepts (threats, vulnerabilities, exploits, and mitigation techniques)
  • Describe security program elements (user awareness, training, and physical access control)
  • Configure device access control using local passwords
  • Describe security password policies elements, such as management, complexity, and password alternatives (multifactor authentication, certificates, and biometrics)
  • Describe remote access and site-to-site VPNs
  • Configure and verify access control lists
  • Configure Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port security)
  • Differentiate authentication, authorization, and accounting concepts
  • Describe wireless security protocols (WPA, WPA2, and WPA3)
  • Configure WLAN using WPA2 PSK using the GUI

AUTOMATION AND PROGRAMMABILITY 

  • Explain how automation impacts network management
  • Compare traditional networks with controller-based networking
  • Describe controller-based and software defined architectures (overlay, underlay, and fabric)
    a Separation of control plane and data plane
    b North-bound and south-bound APIs
  • Compare traditional campus device management with Cisco DNA Center enabled device management
  • Describe characteristics of REST-based APIs (CRUD, HTTP verbs, and data encoding)
  • Recognize the capabilities of configuration management mechanisms Puppet, Chef, and Ansible
  • Interpret JSON encoded data

CCNA Course Curriculum

 Part I: Introduction to Networking 

  •  Introduction to Cisco Certification
  •  Introduction to TCP/IP Networking
  • Fundamentals of Ethernet LANs
  • Fundamentals of WANs and IP Routing,

■ Part II: Implementing Ethernet LANs

  • Using the Command-Line Interface
  • Analyzing Ethernet LAN Switching
  • Configuring Basic Switch Management
  • Configuring and Verifying Switch Interfaces

■ Part III: Implementing VLANs and STP 

  • Implementing Ethernet Virtual LANs
  • Spanning Tree Protocol Concepts
  • RSTP and EtherChannel Configuration

■ Part IV: IPv4 Addressing 

  • Perspectives on IPv4 Addressing & Subnetting
  • Analyzing Classful IPv4 Networks
  • Analyzing Subnet Masks
  • Analyzing Existing Subnets
  • IP Subnet: FLSM and VLSM

■ Part V: IPv4 Routing 

  • Operating Cisco Routers
  • Configuring IPv4 Addressing and Static Routes
  • IP Routing in the LAN (InterVLAN Routing)
  • Troubleshooting IPv4 Routing

■ Part VI: OSPF 

  • Understanding OSPF Concepts
  • Implementing OSPF
  • OSPF Network Types and Neighbors

■ Part VII: IP Version 6  

  • Fundamentals of IP Version 6
  • IPv6 Addressing and Subnetting
  • Implementing IPv6 Addressing on Routers
  • Implementing IPv6 Routing

■ Part VIII: Wireless LANs 

  • Fundamentals of Wireless Networks
  • Analyzing Cisco Wireless Architectures
  • Securing Wireless Networks
  • Building a Wireless LAN

■ Part IX: IP Access Control Lists 

  • Introduction to TCP/IP Transport and Applications
  • Basic IPv4 Access Control Lists
  • Advanced IPv4 Access Control Lists

■ Part X: Security Services 

  • Security Architectures
  • Securing Network Devices
  • Implementing Switch Port Security
  • Implementing DHCP
  • DHCP Snooping and ARP Inspection

■ Part XI: IP Services

  • Device Management Protocols
  • Network Address Translation
  • Quality of Service (QoS)
  • Miscellaneous IP Services

■ Part XII: Network Architecture 

  • LAN Architecture
  • WAN Architecture
  • Cloud Architecture

■ Part XIII: Network Automation

  • Introduction to Controller-Based Networking
  • Cisco Software-Defined Access (SDA)
  • Understanding REST and JSON
  • Understanding Ansible, Puppet, and Chef
CCNP (200-301) Duration: 90 Hrs. Eligibility: 10+2/Graduate with Fundamental Networking SkillS The new CCNP Enterprise program design to prepare you for today’s professional-level job roles in enterprise networking technologies. CCNP Enterprise now cover broad area of networking includes Routing, Switching, Security, Automation and Programmability to help you scale your networking infrastructure. One of the industry’s most respected certifications, CCNP validates the core knowledge you need while giving you the flexibility to choose a focus area. And now every exam in the CCNP Enterprise program earns an individual Specialist certification, so you get recognized for your accomplishments along the way.

COURSE KEY HIGHLIGHT:

Python – For Network Engineer

Duration: 30 Hrs. Eligibility: 10+2/Graduate with Computing and Cisco Networking Skills

Learn Network Programmability and Network Automation using GNS3 and Python version 3.
Do you wish to automate your networks using Python, but not sure where to start? Well, this course will show you how you can start programming Cisco networks using Python with GNS3.

This course is designed based on Python 3.
Thiscourse is designed for network engineers.. This course is practical based on Python3 and GNS3.We will show you how you can quickly and easily start network programming by using GNS3, Cisco IOS and Python3.
You will see demonstrations of the configuration of both Cisco routers and switches in GNS3. For example, how to configure multiple VLANs, VTP on multiple switches, or how to configure Routing Protocols on a router and more.
This course is based on practical examples of using Python to programmatically configure Cisco network devices. Traditionally Cisco networks including Switches and Routers configure by only with the command line interface (CLI), But Nowadays network automation essential for network engineers and you need to add network programmability using Python to your skill set.
Learn how to automate networks using: Telnet, SSH, Paramiko, Netmiko and NAPALM
NAPALM and Netmiko are tools which help you to make it easy to configure and interact with network devices using an API such as NETCONF or using SSH.

Introduction to Python
Python Installation
Print Function
Variables
Data Types
User Input
String Split() Method
Slice() Function
Python Operators
If, Elif, Else
Loops

Function
Scope
Modules
PIP
Read and Write Files
Python Try Except
Comments
Integrated Development Environment (IDE)
JSON
Connect with SSH
Connect with API

MODULE - II (Advance)

WINDOWS SERVER 2016/2019 ADMINISTRATION

Duration: 90 Hrs. Eligibility: 10+2/Graduate with Fundamentals Networking Skills

The Windows Server 2016 / 2019 Administration course is designed based on Previous Microsoft Certification Microsoft Certified Solutions Associate (MCSA): Windows Server 2016 / 2019 Training and Certification Course is an intermediate level certification that enables candidates to implement, monitor and manage Windows Server 2016 / 2019 operating system. The (MCSA): Windows Server 2016 / 2019 certification is designed to prove mastery of the skills required to administer Windows Server 2016 / 2019, including installation and implementation of storage solutions, Hyper-V, and Windows containers; networking with DNS, DHCP, IP address management, and advanced infrastructure; and administration of Active Directory Domain Services, group policy, Nano Server, and more. This course is the first step towards your path to becoming a Microsoft Certified Solutions Expert (MCSE). CloudNet Hands-on instructor led classroom and online class designed to give real-time exposer lab training in Kolkata to get ready for next generation IT Professional.

70-740: INSTALLATION, STORAGE, AND COMPUTE WITH WINDOWS SERVER 2016 / 2019

  • Installing, upgrading, and migrating servers and workloads
  • Configuring local storage
  • Implementing enterprise storage solutions
  • Implementing Storage Spaces and Data Deduplication
  • Installing and configuring Hyper-V and virtual machines
  • Deploying and managing Windows and Hyper-V containers
  • Overview of high availability and disaster recovery
  • Implementing failover clustering
  • Implementing failover clustering with Windows Server 2016 Hyper-V
  • Implementing Network Load Balancing
  • Creating and managing deployment images
  • Managing, monitoring, and maintaining virtual machine installations

70-741: NETWORKING WITH WINDOWS SERVER 2016 / 2019

  • Planning and implementing an IPv4 network
  • Implementing DHCP
  • Implementing IPv6
  • Implementing DNS
  • Implementing and managing IPAM
  • Remote access in Windows Server 2016
  • Implementing Direct Access
  • Implementing VPNs
  • Implementing networking for branch offices
  • Configuring advanced networking features
  • Implementing Software Defined Networking

70-742: IDENTITY WITH WINDOWS SERVER 2016 / 2019

  • Installing and configuring domain controllers
  • Managing objects in AD DS
  • Advanced AD DS infrastructure management
  • Implementing and administering AD DS sites and replication
  • Implementing Group Policy
  • Managing user settings with Group Policy/a>
  • Securing Active Directory Domain Services
  • Deploying and managing AD CS
  • Deploying and managing certificates
  • Implementing and administering AD FS
  • Implementing and administering AD RMS
  • Implementing AD DS synchronization with Microsoft Azure AD
  • Monitoring, managing, and recovering AD DS

LINUX ENGINEER: ENTERPRISE LINUX 8

Duration: 70 Hrs. Eligibility: 10+2/Graduate with Fundamentals Networking Skills
To learn Redhat enterprise linux administration in kolkata, we qre one of the premier training institute to offer global learning solution on enterprise linux. This course is design based on latest technologies solution to learn most essential to advanced linux topic to become certified enterprise linux engineer. This Course traning will delivered by highly experienced and certified trainer with real time solutions. This course designed to test and validate the skills and knowledge necessary to work as a senior-level linux system administrator. Topics covered include system administration command, Manage software using DNF, storage and file system, advanced ip routing and services, managing runtime kernel behavior, Control the boot process and system services, Manage storage devices, logical volumes, and file systems, working with iscsi, networking services, Run containers, Install & Configure Ansible Automation Platform with Ansible and more.​ Red Hat Enterprise Linux administration & Automation with Ansible is designed for Linux administrators and developers who need to automate repeatable and error-prone steps for system provisioning, configuration, application deployment, and orchestration. COURSE KEY HIGHLIGHT:
  • You will prepare based on newly designed Redhat Enterprise Linux – RHCE
  • Redhat Enterprise Linux – RHCE Training in Kolkata will also come with great job opportunity
  • Redhat Enterprise Linux – RHCE course at CloudNet, will assure you 100% quality learning experience.
  • Redhat Enterprise Linux – RHCE Certification course in Kolkata conducted by Highly Experienced and Certified Trainer.
  • Successfully completion of course you will earn a course completion certificate After completion of Redhat Enterprise Linux – RHCE
  • Training at CloudNet you will get 3 years dedicated placement support.
  • Our Redhat Enterprise Linux – RHCE program come with life time eLearning and placement Support
  • To Learn Enterprise Linux Administration In Kolkata, We Are One Of The Premier Training Institute To Offer Global Learning Solution On Enterprise Linux.
  • This Course Is Design Based On Latest Technologies Solution To Learn Most Essential To Advanced Linux Topic To Become Certified Enterprise Linux Engineer. Course Will Delivered By Highly Experienced And Certified Trainer With Real Time Solutions. This Course Designed To Test And Validate The Skills And Knowledge Necessary To Work As A Senior-Level Linux System Administrator. Topics Covered Include System Administration Command, Storage And File System, Advanced Ip Routing And Services, Managing Runtime Kernel Behavior, Working With iSCSI, Networking Services And More.
Red Hat System Administration – I 
  • Get started with Red Hat Enterprise Linux
Describe and define open source, Linux distributions, and Red Hat Enterprise Linux.
  • Access the command line
Log into a Linux system and run simple commands using the shell.
  • Manage files from the command line
Copy, move, create, delete, and organize files while working from the bash shell.
  • Get help in Red Hat Enterprise Linux
Resolve problems by using local help systems.
  • Create, view, and edit text files
Manage text files from command output or in a text editor.
  • Manage local users and groups
Create, manage, and delete local users and groups, as well as administer local password policies.
  • Control access to files
Set Linux file system permissions on files and interpret the security effects of different permission settings.
  • Monitor and manage Linux processes
Evaluate and control processes running on a Red Hat Enterprise Linux system.
  • Control services and daemons
Control and monitor network services and system daemons using systemd.
  • Configure and secure SSH
Configure secure command line service on remote systems, using OpenSSH.
  • Analyze and store logs
Locate and accurately interpret logs of system events for troubleshooting purposes.
  • Manage networking
Configure network interfaces and settings on Red Hat Enterprise Linux servers.
  • Archive and transfer files
Archive and copy files from one system to another.
  • Install and update software packages
Download, install, update, and manage software packages from Red Hat and DNF package repositories.
  • Access Linux files systems
Access, inspect, and use existing file systems on storage attached to a Linux server.
  • Analyze servers and get support
Investigate and resolve issues in the web-based management interface, getting support from Red Hat to help solve problems.
Red Hat System Administration – II
  • Improve command line productivity
Run commands more efficiently by using advanced features of the Bash shell, shell scripts, and various utilities provided by Red Hat Enterprise Linux.
  • Schedule future tasks
Schedule commands to run in the future, either one time or on a repeating schedule.
  • Tune system performance
Improve system performance by setting tuning parameters and adjusting scheduling priority of processes.
  • Manage SELinux security
Protect and manage the security of a server by using SELinux.
  • Manage logical volumes
Create and manage logical volumes containing file systems and swap spaces from the command line.
  • Access network-attached storage
Use the NFS protocol to administer network-attached storage.
  • Control the boot process
Manage the boot process to control services offered and to troubleshoot and repair problems.
  • Manage network security
Control network connections to services using the system firewall and SELinux rules.
  • Install Red Hat Enterprise Linux
Install Red Hat Enterprise Linux on servers and virtual machines.
  • Run Containers
Obtain, run, and manage simple, lightweight services as containers on a single Red Hat Enterprise Linux server. Red Hat Enterprise Linux Automation with Ansible
  • Introduce Ansible
Describe the fundamental concepts of Red Hat Ansible Automation Platform and how it is used, and install Red Hat Ansible Automation Platform.
  • Implement an Ansible playbook
Create an inventory of managed hosts, write a simple Ansible playbook, and run the playbook to automate tasks on those hosts.
  • Manage variables and facts
Write playbooks that use variables to simplify management of the playbook and facts to reference information about managed hosts.
  • Implement task control
Manage task control, handlers, and task errors in Ansible Playbooks.
  • Deploy files to managed hosts
Deploy, manage, and adjust files on hosts managed by Ansible.
  • Manage complex plays and playbooks
Write playbooks that are optimized for larger,  more complex plays and playbooks.
  • Simplify playbooks with roles
Use Ansible roles to develop playbooks more quickly and to reuse Ansible code.
  • Troubleshoot Ansible
Troubleshoot playbooks and managed hosts.
  • Automate Linux administration tasks
Automate common Linux system administration tasks with Ansible.

CCSA: CHECKPOINT R80

Duration: 60 Hrs. Eligibility: 10+2 /Graduate with Fundamentals Networking Skills

Advance your knowledge on the GAiA operating system. This course covers everything you need to start-up, configure and manage daily operations of Check Point Security Gateway and Management Software Blades systems on the GAiA operating system. Check Point R80 is advance Firewall widely using in modern data center and enterprise security solution. Before going to start your learning skill in Check Point R80, you must be have the skill in Linux or Windows Server administration and also having good knowledge about TCP/IP network. After successfully completion you get skill in Install the security gateway in a distributed environment, Configure rules on Web and Gateway servers, Create a basic rule base in Smart Dashboard and assign permissions, Schedule backups and seamless upgrades with minimal downtime, Monitor and troubleshoot IPS and common network traffic.

COURSE KEY HIGHLIGHT:

  • You will prepare based on newly designed CCSA-R80
  • CCSA-R80 Training in Kolkata will also come with great job opportunity
  • CCSA-R80 course at CloudNet, will assure you 100% quality learning experience.
  • CCSA-R80 Certification course in Kolkata conducted by Highly Experienced and Certified Trainer.
  • Successfully completion of course you will earn a course completion certificate
  • After completion of CCSA-R80 Training at CloudNet you will get 3 years dedicated placement support.
  • Our CCSA-R80 program come with life time eLearning and placement Support

Check Point Certified Security Administrator  who must have The skills and knowledge:

  • Install R80 management and a security gateway in a distributed environment
  • Configure objects, rules, and settings to define a security policy
  • Work with multiple concurrent administrators and define permission profiles
  • Configure a Virtual Private Network and work with Check Point clustering
  • Perform periodic administrator tasks as specified in administrator job descriptions
  • Describe Check Point’s unified approach to network management and its key elements
  • Design a distributed environment
  • Install the Security Gateway in a distributed environment
  • Perform a backup and restore the current Gateway installation from the command line
  • Identify critical files needed to purge (or backup), import and export users and groups, and add (or delete) administrators from the command line
  • Deploy Gateways using the Gaia web interface
  • Create and configure network, host, and gateway objects
  • Verify SIC establishment between the Security Management Server and the Gateway using SmartDashboard
  • Create a basicRule Base in SmartDashboard that includes permissions for administrative users, external services, and LAN outbound use
  • Configure NAT rules on Web and Gateway servers
  • Evaluate existing policies and optimize the rules based on corporate requirements
  • Maintain the Security Management Server with scheduled backups and policy versions to ensure seamless upgrades with minimal downtime
  • Use Queries in SmartView Tracker to monitor IPS and common network traffic and troubleshoot events using packet data
  • Use packet data to generate reports, troubleshoot system and security issues, and ensure network functionality
  • Using SmartView Monitor, configure alerts and traffic counters, view a
  • Gateway’s status, monitor suspicious activity rules, analyze tunnel activity, and monitor remote user access
  • Monitor remote gateways using SmartUpdate to evaluate the need for upgrades, new installations, and license modifications
  • Use SmartUpdate to apply upgrade packages to single or multiple VPN-1 Gateways
  • Upgrade and attach product licenses using SmartUpdate
  • Centrally manage users to ensure only authenticated users securely access the corporate network either locally or remotely
  • Manage users to access the corporate LAN by using external databases
  • Use Identity Awareness to provide granula- level access to network resources
  • Acquire user information used by the Security Gateway to control access
  • Define access roles for use in an Identity Awareness rule
  • Implement Identity Awareness in the Firewall Rule Base
  • Configure a pre-shared secret site-to-site VPN with partner sites
  • Configure permanent tunnels for remote access to corporate resources
  • Configure VPN tunnel sharing, given the difference between host-based, subunit-based, and gateway- based tunnels

ETHICAL HACKER – CEHV12

Duration : 70 Hrs. Eligibility: 10+2 / Graduate with Fundamentals Network Skills

The definition of an Ethical Hacker is very similar to a Penetration Tester. The Ethical Hacker is an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods and techniques as a Hacker. This is the worlds most advanced ethical hacking course with 20 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization. The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with hacking skills that are highly in demand, as well as the internationally recognized certified ethical hacker certification.

COURSE KEY HIGHLIGHT:
  • You will prepare based on newly designed CEH-v12
  • Ethical Hacking Training in Kolkata will also come with great job opportunity
  • Ethical Hacking course at CloudNet, will assure you 100% quality learning experience.
  • Ethical Hacking Certification course in Kolkata conducted by Highly Experienced and Certified Trainer.
  • Successfully completion of course you will earn a course completion certificate
  • After completion of Ethical Hacking  Training at CloudNet you will get 3 years dedicated placement support.
  • Our Ethical Hacking program come with life time eLearning and placement Support
Lesson 01: Introduction to Ethical Hacking Key topics covered: Elements of Information Security, Cyber Kill Chain Methodology, MITRE ATT&CK Framework, Hacker Classes, Ethical Hacking, Information Assurance (IA), Risk Management, Incident Management, PCI DSS, HIPPA, SOX, GDPR Lesson 02: Foot Printing and Reconnaissance Key topics covered: Perform foot printing on the target network using search engines, web services, and social networking sites Perform website, email, whois, DNS, and network foot printing on the target network Lesson 03: Scanning Networks Key topics covered: Perform host, port, service, and OS discovery on the target network Perform scanning on the target network beyond IDS and firewall Key topics covered: Perform NetBIOS, SNMP, LDAP, NFS, DNS, SMTP, RPC, SMB, and FTP Enumeration Lesson 04: Enumeration Key topics covered: Perform vulnerability research using vulnerability scoring systems and databases Perform vulnerability assessment using various vulnerability assessment tools Lesson 05: Vulnerability Analysis Key topics covered: Perform vulnerability research using vulnerability scoring systems and databases Perform vulnerability assessment using various vulnerability assessment tools Lesson 06: System Hacking Key topics covered: Perform Online active online attack to crack the system’s password Perform buffer overflow attack to gain access to a remote system Escalate privileges using privilege escalation tools Escalate privileges in linux machine Hide data using steganography Clear Windows and Linux machine logs using various utilities Hiding artifacts in Windows and Linux machines Lesson 07: Malware Threats Key topics covered: Malware, Components of Malware, APT, Trojan, Types of Trojans, Exploit Kits, Virus, Virus Lifecycle, Types of Viruses, Ransomware, Computer Worms, Fileless Malware, Malware Analysis, Static Malware Analysis, Dynamic Malware Analysis, Virus Detection Methods, Trojan Analysis, Virus Analysis, Fileless Malware Analysis, Anti-Trojan Software, Antivirus Software, Fileless Malware Detection Tools Lesson 08: Sniffing Key topics covered: Network Sniffing, Wiretapping, MAC Flooding, DHCP Starvation Attack, ARP Spoofing Attack, ARP Poisoning, ARP Poisoning Tools, MAC Spoofing, STP Attack, DNS Poisoning, DNS Poisoning Tools, Sniffing Tools, Sniffer Detection Techniques, Promiscuous Detection Tools Lesson 09: Social Engineering Key topics covered: Social Engineering, Types of Social Engineering, Phishing, Phishing Tools, Insider Threats/Insider Attacks, Identity Theft Lesson 10: Denial-of-Service Key topics covered: DoS Attack, DDoS Attack, Botnets, DoS/DDoS Attack Techniques, DoS/DDoS Attack Tools, DoS/DDoS Attack Detection Techniques, DoS/DDoS Protection Tools Lesson 11: Session Hijacking Key topics covered: Session Hijacking, Types of Session Hijacking, Spoofing, Application-Level Session Hijacking, Man-in-the-Browser Attack, Client-side Attacks, Session Replay Attacks, Session Fixation Attack, CRIME Attack, Network Level Session Hijacking, TCP/IP Hijacking, Session Hijacking Tools, Session Hijacking Detection Methods, Session Hijacking Prevention Tools Lesson 12: Evading IDS, Firewalls, and Honeypots Key topics covered: Bypass Windows Firewall Bypass firewall rules using tunneling Bypass antivirus Lesson 13: Hacking Web Servers Key topics covered: Web Server Operations, Web Server Attacks, DNS Server Hijacking, Website Defacement, Web Cache Poisoning Attack, Web Server Attack Methodology, Web Server Attack Tools, Web Server Security Tools, Patch Management, Patch Management Tools Lesson 14: Hacking Web Applications Key topics covered: Web Application Architecture, Web Application Threats, OWASP Top 10 Application Security Risks – 2021, Web Application Hacking Methodology, Web API, Webhooks, and Web Shell, Web API Hacking Methodology, Web Application Security Lesson 15: SQL Injection Key topics covered: SQL Injection, Types of SQL injection, Blind SQL Injection, SQL Injection Methodology, SQL Injection Tools, Signature Evasion Techniques, SQL Injection Detection Tools Lesson 16: Hacking Wireless Networks Key topics covered: Wireless Terminology, Wireless Networks, Wireless Encryption, Wireless Threats, Wireless Hacking Methodology, Wi-Fi Encryption Cracking, WEP/WPA/WPA2 Cracking Tools, Bluetooth Hacking, Bluetooth Threats, Wi-Fi Security Auditing Tools, Bluetooth Security Tools Lesson 17: Hacking Mobile Platforms Key topics covered: Mobile Platform Attack Vectors, OWASP Top 10 Mobile Risks, App Sandboxing, SMS Phishing Attack (SMiShing), Android Rooting, Hacking Android Devices, Android Security Tools, Jailbreaking iOS, Hacking iOS Devices, iOS Device Security Tools, Mobile Device Management (MDM), OWASP Top 10 Mobile Controls, Mobile Security Tools. Lesson 18: IoT and OT Hacking Key topics covered: IoT Architecture, IoT Communication Models, OWASP Top 10 IoT Threats, IoT Vulnerabilities, IoT Hacking Methodology, IoT Hacking Tools, IoT Security Tools, IT/OT Convergence (IIOT), ICS/SCADA, OT Vulnerabilities, OT Attacks, OT Hacking Methodology, OT Hacking Tools, OT Security Tools Lesson 19: Cloud Computing Key topics covered: Cloud Computing, Types of Cloud Computing Services, Cloud Deployment Models, Fog and Edge Computing, Cloud Service Providers, Container, Docker, Kubernetes, Serverless Computing, OWASP Top 10 Cloud Security Risks, Container and Kubernetes Vulnerabilities, Cloud Attacks, Cloud Hacking, Cloud Network Security, Cloud Security Controls, Cloud Security Tools Lesson 20: Cryptography Key topics covered: Cryptography, Encryption Algorithms, MD5 and MD6 Hash Calculators, Cryptography Tools, Public Key Infrastructure (PKI), Email Encryption, Disk Encryption, Cryptanalysis, Cryptography Attacks, Key Stretching

AWS SOLUTION ARCHITECT – ASSOCIATE

Duration: 70 Hrs. Eligibility: 10+2/Graduate with Fundamentals Networking Skills Cloud computing is the on-demand delivery of IT resources over the Internet with pay-as-you-go pricing. Instead of buying, owning, and maintaining physical data centers and servers, you can access technology services, such as computing power, storage, and databases, on an as-needed basis from a cloud provider like Amazon Web Services (AWS). Cloud computing market is dominated by two big players: Amazon Web Services (AWS) and Azure. Of the two, AWS has a significantly larger market share, with a approximately 47 percent share of the cloud computing. Presentably AWS offer 170+ services. Since AWS is by far the largest cloud computing service provider and offer also offer largest services in the world today, a job as an AWS Solutions Architect is one with plenty of promises and pay. The AWS Certified Solutions Architect – Associate examination is intended for individuals who perform a solutions architect role and have one or more years of hands-on experience designing available, cost-efficient, fault-tolerant, and scalable distributed systems on AWS. To learning Cloud Computing in Kolkata, CloudNet is one of the premier training intuition offered different level of AWS certification course in Kolkata by 15+ years rich experienced and certified trainers.

AWS Solution Architect Course Curriculum

FUNDAMENTAL OF CLOUD COMPUTING
  • INTRODUCTION TO CLOUD COMPUTING
  • WHAT IS CLOUD COMPUTING?
  • ON PREMISE INFRASTRUCTURE VS CLOUD INFRASTRUCTURE
  • WHAT IS VIRTUALIZATION?
  • PHYSICAL SERVER VS VIRTUAL MACHINE
  • ADVANTAGE OF CLOUD INFRASTRUCTURE
  • DISADVANTAGE OF CLOUD INFRASTRUCTURE
  • SERVICE MODELS(SAAS, PAAS, IAAS)
  • CLOUD COMPUTING PRIVATE, PUBLIC, HYBRIDCLOUD
INTRODUCTION TO AWS
  • WHAT IS AMAZON WEB SERVICE (AWS)
  • CLOUD PROVIDERS
  • WHY AMAZON WEB SERVICE (AWS)?
  • AWS GLOBAL INFRASTRUCTURE
  • REGIONS, AVAILABILITY ZONES & EDGE LOCATIONS
  • AWS FREE TIER AND ACCOUNT SING UP
  • AWS CERTIFICATION TRACK
COMPUTE SERVICES
  • ELASTIC COMPUTE CLOUD [EC2]
  • LAUNCH EC2 INSTANCE
  • VPC, AVAILABILITY ZONE, SUBNET, PUBLIC, AND PRIVATE IP
  • LAUNCH WINDOWS & LINUX INSTANCES
  • AMAZON MACHINE IMAGE (AMI)
  • LAUNCH TEMPLATE
  • ELASTIC LOAD BALANCING
  • CLASSIC LOAD BALANCING
  • APPLICATION LOAD BALANCING
  • NETWORK LOAD BALANCING
  • LAUNCH CONFIGURATIONS
  • AWS AUTOSCALING
  • LIFECYCLE OF AUTO-SCALING
  • AUTO-SCALING POLICY
  • AUTO SCALING WITH ELASTIC LOAD BALANCER
  • AWS CLI TOOL
STORAGE
  • SIMPLE STORAGE SERVICE [S3]
  • S3 BUCKET
  • STORAGE CLASSES IN S3
  • S3 POLICY
  • S3 PERFORMANCE OPTIMIZATION
  • ELASTIC BLOCK STORAGE [EBS]
  • DIFFERENCE BETWEEN S3, EBS AND EFS
  • AMAZON CLOUDFRONT
  • GLACIER
  • AWS IMPORT/EXPORT SNOWBALL
  • STORAGE GATEWAY
SECURITY AND IDENTITY
  • IDENTITY AND ACCESS MANAGEMENT (IAM)
  • KEY MANAGEMENT SERVICE
  • AWS SECURITY & ENCRYPTION: KMS, CLOUDHSM, SHEILD, AND WAF
  • POLICIES ACROSS AWS SERVICES
  • ACCESS BILLING AND CREATE ALERTS ON BILLING
CONTAINERS
  • DOCKER
  • DOCKER ENGINE VS DOCKER HUB
  • CONTAINERS
  • ELASTIC CONTAINER REGISTRY [ECR]
  • ELASTIC CONTAINER SERVICE [ECS]
  • ELASTIC KUBERNETES SERVICE [EKS]
NETWORKING & MONITORING SERVICES
  • VIRTUAL PRIVATE CLOUD (VPC)
  • ROUTE TABLE
  • LOCAL GATEWAY VS INTERNET GATEWAY
  • CIDR NOTATIONS & SUBNET
  • SECURITY GROUPS VS NETWORK ACCESS CONTROL LIST
  • NETWORK ADDRESS TRANSLATION (NAT)
  • NAT DEVICES, NAT GATEWAY AND NAT INSTANCE
  • VPC PEERING
  • DIRECT CONNECT
  • PRIVATE LINK VS CLASSIC LINK
  • ROUTE 53
  • ROUTE 53 ZONE TYPES
  • ROUTE 53 PUBLIC ZONE VS PRIVATE ZONE
  • RECORD TYPES
  • SUB DOMAIN
  • AWS CLOUDWATCH
  • AWS CLOUDTRAIL
  • TRUSTED ADVISOR
SYSTEM OPERATION & AUTOMATION
  • INFRASTRUCTURE AS CODE
  • CLOUDFORMATION
  • COMPONENT OF CLOUDFORMATION
  • TEMPLATES IN CLOUDFORMATION
  • INTRODUCTION TO AWS OPSWORKS
  • AWS OPSWORKS SERVICES
  • COMPONENTS OF AWS OPSWORKS STACK
  • OPSWORKS LIFECYCLE EVENTS AND DEPLOYMENT COMMANDS
  • OPSWORKS FOR CHEF AUTOMATE
  • AWS OPSWORKS FOR PUPPET ENTERPRISE
  • AUTO HEALING
  • ELASTIC BEANSTALK
  • COMPONENTS OF ELASTIC BEANSTALK
  • BEANSTALK V/S OPSWORKS V/S CLOUDFORMATION
DATABASE
  • AMAZON AURORARELATIONAL DATABASE SERVICE [RDS]
  • DYNAMODB
  • ELASTICACHE
  • REDSHIFT
AWS LAMBDA & APPLICATION SERVICES
  • AMAZON SESAMAZON SNS
  • WS SIMPLE WORK FLOW (SWF)
  • AWS LAMBDA
  • AWS SERVERLESS APPLICATION MODEL

MICROSOFT AZURE ADMINISTRATOR (AZ-104)

Duration: 70 Hrs. Eligibility: 10+2/Graduate with Fundamentals Networking Skills Cloud computing is the on-demand delivery of IT resources over the Internet with pay-as-you-go pricing. Instead of buying, owning, and maintaining physical data centers and servers, you can access technology services, such as computing power, storage, and databases, on an as-needed basis from a cloud provider like Microsoft Azure. The Azure cloud platform offering more than 200 products and cloud services designed to help business bring new solutions to life—to solve today’s IT challenges and create the future. Azure cloud solution give the freedom to build, run, and manage applications across multiple clouds, on-premises, and at the edge, with the tools and frameworks of your choice. This Azure cloud course teaches IT Professionals how to manage their Azure subscriptions, secure identities, administer the infrastructure, configure virtual networking, connect Azure and on-premises sites, manage network traffic, implement storage solutions, create and scale virtual machines, implement web apps and containers, back up and share data, and monitor your solution. This course is design for best solution to Implement, manage & monitor the azure cloud administration task. To learning Cloud Computing in Kolkata, CloudNet is one of the premier training intuition offered different level of Microsoft Azure certification course in Kolkata by 15+ years rich experienced and certified trainers.

Microsoft Azure Administrator Course Curriculum

FUNDAMENTAL OF CLOUD COMPUTING
  • INTRODUCTION TO CLOUD COMPUTING
  • WHAT IS CLOUD COMPUTING?
  • ON PREMISE INFRASTRUCTURE VS CLOUD INFRASTRUCTURE
  • WHAT IS VIRTUALIZATION?
  • PHYSICAL SERVER VS VIRTUAL MACHINE
  • ADVANTAGE OF CLOUD INFRASTRUCTURE
  • DISADVANTAGE OF CLOUD INFRASTRUCTURE
  • SERVICE MODELS(SAAS, PAAS, IAAS)
  • CLOUD COMPUTING PRIVATE, PUBLIC, HYBRID CLOUD
INTRODUCTION TO MICROSOFT AZURE
  • WHAT IS MICROSOFT AZURE
  • MICROSOFT AZURE SERVICES
  • AZURE SUBSCRIPTIONS
  • MANAGEMENT GROUPS
  • AZURE RESOURCE MANAGER
  • AZURE PORTAL AND POWERSHELL
  • AZURE RESOURCE MANAGER POLICIES
  • AZURE POLICY DEFINITION STRUCTURE
  • RESOURCE MANAGEMENT LOCKS
  • ORGANIZING AZURE RESOURCES
INTEGRATION USING JENKINS – ADVANCED
  • JENKINS MANAGEMENT PREVIEW
  • ADDING A SLAVE NODE TO JENKINS
  • BUILDING DELIVERY PIPELINE
  • PIPELINE AS A CODE
  • IMPLEMENTATION OF
  • JENKINS IN THE CLOUDNET’S PROJECT
  • VIRTUAL MACHINE EXTENSIONS
  • CONFIGURATION MANAGEMENT USING POWERSHELL DSC
  • RUN CUSTOM SCRIPTS USING CUSTOM SCRIPT EXTENSION
AZURE CONTAINER INSTANCES (ACI)
  • AZURE KUBERNETES SERVICE (AKS)
  • APP SERVICE
  • APP SERVICE PLANS
  • AZURE VIRTUAL MACHINE & CONTAINER
  • AZURE VIRTUAL MACHINES
  • CREATE AZURE VM WITH WINDOWS & LINUX
  • AZURE RESOURCE MANAGER VM
  • INTRODUCTION TO ARM TEMPLATES
  • CREATE A CUSTOM IMAGE OF AZURE VM
  • CREATE A MANAGED IMAGE OF A GENERALIZED VM
  • CREATE AN IMAGE FROM VM SNAPSHOTS
AZURE NETWORKING & SECURITY
  • VPC
  • INTRODUCTION TO AZURE VIRTUAL NETWORKS
  • IP ADDRESSES – PUBLIC AND PRIVATE
  • SUBNETS
  • CLASSLESS INTER-DOMAIN ROUTING (CIDR)
  • NETWORK INTERFACE CARDS (NICS)
  • NETWORK SECURITY GROUPS (NSGS)
  • NETWORK SECURITY GROUP RULES
  • VIRTUAL NETWORK SERVICE ENDPOINTS
  • SERVICE ENDPOINT POLICIES
  • AZURE LOAD BALANCER
  • AZURE DNS
  • AZURE FIREWALL
  • AZURE BASTION SERVICE
AZURE STORAGE – IMPLEMENT, MANAGE & SECURE
  • AZURE STORAGE
  • AZURE STORAGE REPLICATION
  • AZURE STORAGE EXPLORER
  • ATTACH OR DETACH AN EXTERNAL STORAGE ACCOUNT
  • SHARED ACCESS SIGNATURES (SAS)
  • ATTACH A STORAGE ACCOUNT USING SAS
  • AZURE BLOB STORAGE
  • AZURE FILE STORAGE
  • AZURE QUEUE & TABLE STORAGE
  • INTRODUCTION TO AZURE BACKUP SERVICES
  • WHY USE AZURE BACKUP?
  • FILES, FOLDER AND APPLICATION BACKUP
  • AZURE FILE SHARE & SYNC
  • CONTENT DELIVERY NETWORK (CDN)
  • AZURE IMPORT/EXPORT SERVICE
  • AZURE DATA BOX
AZURE HIGH AVAILABILITY
  • AZURE VIRTUAL MACHINE STORAGE
  • AZURE VIRTUAL MACHINE AVAILABILITY
  • FAULT AND UPDATE DOMAINS
  • AZURE LOAD BALANCER
  • AUTOMATIC SCALING OF AZURE VMS
  • VM SCALE SETS
  • AZURE VM BACKUP
  • AZURE VM MONITORING WITH AZURE DIAGNOSTICS EXTENSION
  • AZURE ADVISOR
AZURE TRAFFIC & CONNECTIVITY MANAGEMENT
  • AZURE TRAFFIC MANAGER
  • AZURE APPLICATION GATEWAY
  • AZURE VIRTUAL NETWORK ROUTING
  • AZURE VIRTUAL NETWORK CONNECTIVITY
  • AZURE VPN GATEWAY
  • BGP WITH VPN GATEWAY
  • VIRTUAL NETWORK PEERING
INTEGRATE ON-PREMISES NETWORK WITH AZURE VIRTUAL NETWORK
  • AZURE INTER-SITE VPN CONNECTIVITY METHODS
  • SITE-TO-SITE VPN GATEWAY CONNECTION
  • POINT-TO-SITE VPN GATEWAY CONNECTION
  • VNET-TO-VNET CONNECTIONS
  • AZURE EXPRESSROUTE
  • AZURE VIRTUAL WAN
  • AZURE NETWORK WATCHER
  • RESOURCE TROUBLESHOOTING IN AZURE NETWORK WATCHER
AZURE MONITORING & ACCESS MANAGEMENT
  • OVERVIEW OF ROLE BASED ACCESS CONTROL
  • AZURE MONITOR
  • LOG ANALYTICS
  • AZURE ACTIVITY LOG
  • ALERTS IN AZURE MONITOR
  • CUSTOM ROLES IN AZURE
  • PROVIDE ACCESS TO AZURE RESOURCES BY ASSIGNING ROLES
  • MANAGE MULTIPLE DIRECTORIES
MANAGE AZURE ACTIVE DIRECTORY (AD)
  • IDENTITY ACCESS MANAGEMENT
  • AZURE ACTIVE DIRECTORY
  • MULTI FACTOR AUTHENTICATION
  • SELF-SERVICE PASSWORD RESET
  • AZURE AD IDENTITY PROTECTION
  • AZURE AD CONDITIONAL ACCESS
  • AZURE AD DOMAINS AND TENANTS
  • AZURE AD DOMAIN SERVICES
  • AZURE AD JOIN
  • AZURE AD SINGLE SIGN-ON
  • MANAGE AZURE AD OBJECTS
  • AZURE AD CONNECT
  • HYBRID IDENTITY
  • PASSWORD HASH SYNCHRONIZATION (PHS)
  • PASS-THROUGH AUTHENTICATION (PTA)
  • FEDERATED AUTHENTICATION
  • AZURE AD SEAMLESS SINGLE SIGN-ON (SSO)
  • AZURE AD APPLICATION PROXY
CloudNet Certified IMS Pro - 24 Advance Diploma Program

After completion of course candidate must complete Project Preparation

Sent Us a Message