Network Engineer Training thirumazhisai

Network Engineer Job Training Institute in thirumazhisai & Network Engineer Job Training in thirumazhisai with Placement & Network Engineer Job Traini

IICT, thirumazhisai provides real-time and placement focused computer Network Engineer training in thirumazhisai . Our Network Engineer Job course includes basic to advanced level and our computer Network Engineer course is designed to get the placement in good MNC companies in thirumazhisai as quickly as once you complete the networking LAN, WAN training course. Our computer Network Engineer trainer is Comptia A+, N+, CCNA, CCNP, MCITP certified expert and experienced working professionals with hands on real time multiple Network Engineer projects knowledge. We have designed our Computer Network Engineer course content and syllabus based on students requirement to achieve everyone's career goal. In our computer Network Engineer training program, you will learn Network Engineer Basics, Harware comcepts, Computer Assembling, OS Installtion, BIOS, CMOS, Networking concepts, Local Area Network, WAN, Wireless Networking, Network Security, networking access control, troubleshooting, computer networking real time project and Network Engineer Job placement training

Introduction of Computer
Generation of Computers
Classification of Computers
Parts of Computer(Units)
Parts of Motherboard
  • Chipset
  • Expansion Slot
  • Memory Module
  • Processor Socket
  • Drive Connectors
  • BIOS
  • CMOS
  • Front Panel Connectors
  • Port Connectors
  • Power Connectors
  • Assembling Notes
    Jumper Settings
    Assembling Practical
    Practice
    DOS Introduction
    BIOS Setups
    DOS Commands
  • File
  • Directory
  • Attribute Commands
  • Practice
  • Files System (FAT & NTFS)
  • Boot Process
  • XP OS Installation
    User Creation
    XP Features
  • Firewall
  • Disk Management
  • Add or Remove Program
  • Driver Finding with Software
  • Method of Device Drivers Configuration
  • Application Software Installation
  • Practice
  • Dual OS Installtion XP with windows 7/8
    OS Upgrade
    OS Edition
    OS Bits (32 & 64)
    Practice
    XP 1st & 2nd Repair
    Reg edit (D Word Value)
    GP Edit
    Restore
    Disk Clean Up
    Disk Defragmentation
    OS Management
  • SAFE MODE Configuration
  • MS-Config
  • Temp
  • %temp%
  • Prefetch
  • Virtual Memory
  • OS Activation
  • Windows 7 & 8 Features
  • Windows 7 & 8 Updates
  • Recovery (Repair)
  • Updates and Patches
  • E-mail Configuration
  • Difference B/W Outlook Express & Outlook
  • E-mail Creation
  • Mail Backup
  • Multiple E-mail Account Configuration
  • NewPST Creation
  • Set PWD for the PST
  • Change Sync. Time duration
  • Add Contact & Group
  • Rule Creation
  • NT Backup
    OS Backup (Norton Ghost)
    HirenBoot opions
    Virus
    Antivirus
    Practice
    Test - Hardware Module and Troubleshooting

    Network Module and Trouble shooting

    Network Introduction
    Types of Network
    How do we Network ?
    Diff OS Family
    Workgroup and Domain Network
    Types of Topology
    Types of Media
  • NIC
  • Hub
  • Switch
  • Router
  • OSI Model
  • Cables
  • Cable Crimping Methods
    Protocols
    IP Address
    Crimping Practice
    XP with XP - Workgroup NW Configuration
    IP Configuration
    Files and Folder Sharing & Permission
    Workgroup User Management
  • User Creation
  • User Level files access permission
  • Practice
  • Remote Desktop
    Remote Assistance
    Net Meeting
    Offline File Sharing
    Practice
    2003 Server OS
  • ADS Configuration
  • DHCP Configuration
  • Client Configuration
  • User Management
  • Files and Folder Sharing
  • Profiles
  • Practice
  • User and Folder Level Permission
  • User or Group Configuration
  • Sharing Permission
  • Logon locally
  • Complicity Password
  • Profiles
  • Default Profile
  • Roaming Profile
  • NT Backup
  • Practice
  • Terminal Server
    IIS Server
    FTP Server Configuration
    NT Backup & Restore
    2008 Server OS
  • ADS Configuration
  • DHCP Configuration
  • Client Configuration
  • User Management
    Files and Folder Sharing
    Profiles
    Practice
    Group Policy
  • Changing Default Password Policy
  • Enabling Password Lock out Policy
  • Complicity Policy (Password Length)
  • Changing Allow Logon Locally Policy
  • Test - Network Module
    1.0 Operation of IP Data Networks
    2.0 LAN Switching Technologies
    3.0 IP Addressing (IPv4/IPv6)
    4.0 IP Routing Technologies
    5.0 IP Services
    6.0 Network Device Security
    7.0 Troubleshooting
    8.0 WAN Technologies
    1.0 Operation of IP Data Networks
  • 1.1 Recognize the purpose and functions of various network devices such as routers, switches, bridges and hubs
  • 1.2 Select the components required to meet a given network specification
  • 1.3 Identify common applications and their impact on the network
  • 1.4 Describe the purpose and basic operation of the protocols in the OSI and TCP/IP models
  • 1.5 Predict the data flow between two hosts across a network
  • 1.6 Identify the appropriate media, cables, ports, and connectors to connect Cisco network devices to other network devices and hosts in a LAN
  • 2.0 LAN Switching Technologies
  • 2.1 Determine the technology and media access control method for Ethernet networks
  • 2.2 Identify basic switching concepts and the operation of Cisco switches
  • 2.2.a Collision Domains
  • 2.2.b Broadcast Domains
  • 2.2.c Ways to switch
  • 2.2.c [i] Store
  • 2.2.c [ii] Forward
  • 2.2.c [iii] Cut through
  • 2.2.d CAM Table
  • 2.3 Configure and verify initial switch configuration including remote access management
  • 2.3.a hostname
  • 2.3.b mgmt IP address
  • 2.3.c IP default-gateway
  • 2.3.d local user and password
  • 2.3.e enable secret password
  • 2.3.f console and VTY logins
  • 2.3.g exec-timeout
  • 2.3.h service password encryption
  • 2.3.i copy run start
  • 2.4 Verify network status and switch operation using basic utilities such as
  • 2.4.a ping
  • 2.4.b telnet
  • 2.4.c SSH
  • 2.5 Describe how VLANs create logically separate networks and the need for routing between them
  • 2.5.a Explain network segmentation and basic traffic management concepts
  • 2.6 Configure and verify VLANs
  • 2.7 Configure and verify trunking on Cisco switches
  • 2.7.a dtp (topic)
  • 2.7.b auto-negotiation
  • 2.8 Identify enhanced switching technologies
  • 2.8.a RSTP
  • 2.8.b PVSTP
  • 2.8.c Etherchannels
  • 2.9 Configure and verify PVSTP operation
  • 2.9.a Describe root bridge election
  • 2.9.b Spanning tree mode
  • 3.0 IP Addressing (IPv4/IPv6)
  • 3.1 Describe the operation and necessity of using private and public IP addresses for IPv4 addressing
  • 3.2 Identify the appropriate IPv6 addressing scheme to satisfy addressing requirements in a LAN/WAN environment
  • 3.3 Identify the appropriate IPv4 addressing scheme using VLSM and summarization to satisfy addressing requirements in a LAN/WAN environment.
  • 3.4 Describe the technological requirements for running IPv6 in conjunction with IPv4
  • 3.4.a dual stack
  • 3.5 Describe IPv6 addresses
  • 3.5.a global unicast
  • 3.5.b multicast
  • 3.5.c link local
  • 3.5.d unique local
  • 3.5.e eui 64
  • 3.5.f auto-configuration
  • 4.0 IP Routing Technologies
  • 4.1 Describe basic routing concepts
  • 4.1.a packet forwarding
  • 4.1.b router lookup process
  • 4.1.c Process Switching/Fast Switching/CEF
  • 4.2 Configure and verify utilizing the CLI to set basic Router configuration
  • 4.2.a hostname
  • 4.2.b local user and password
  • 4.2.c enable secret password
  • 4.2.d console and VTY logins
  • 4.2.e exec-timeout
  • 4.2.f service password encryption
  • 4.2.g Interface IP Address
  • 4.2.g [i] loopback
  • 4.2.h banner
  • 4.2.i motd
  • 4.2.j copy run start
  • 4.3 Configure and verify operation status of a device interface
  • 4.3.a Serial
  • 4.3.b Ethernet
  • 4.4 Verify router configuration and network connectivity using
  • 4.4.a ping
  • 4.4.a [i] extended
  • 4.4.b traceroute
  • 4.4.c telnet
  • 4.4.d SSH
  • 4.4.e sh cdp neighbors
  • 4.5 Configure and verify routing configuration for a static or default route given specific routing requirements
  • 4.6 Differentiate methods of routing and routing protocols
  • 4.6.a Static versus Dynamic
  • 4.6.b Link state versus Distance Vector
  • 4.6.c next hop
  • 4.6.d ip routing table
  • 4.6.e Passive Interfaces (how they work)
  • 4.6.f Admin Distance
  • 4.6.g split horizon
  • 4.6.h metric
  • 4.7 Configure and verify OSPF
  • 4.7.a Benefit of single area
  • 4.7.b Configure OSPv2
  • 4.7.c Configure OSPv3
  • 4.7.d Router ID
  • 4.7.e Passive Interface
  • 4.7.f Discuss multi-area OSPF
  • 4.7.g Understand LSA types and purpose
  • 4.8 Configure and verify interVLAN routing (Router on a stick)
  • 4.8.a sub interfaces
  • 4.8.b upstream routing
  • 4.8.c encapsulation
  • 4.9 Configure SVI interfaces
  • 4.10 Manage Cisco IOS Files
  • 4.10.a Boot Preferences
  • 4.10.b Cisco IOS Images (15)
  • 4.10.c Licensing
  • 4.10.c [i] Show license
  • 4.10.c [ii] Change license
  • 4.11 Configure and verify EIGRP (single AS)
  • 4.11.a Feasible Distance/Feasible Successors/Administrative distance
  • 4.11.b Feasibility condition
  • 4.11.c Metric composition
  • 4.11.d Router ID
  • 4.11.e auto summary
  • 4.11.f Path Selection
  • 4.11.g Load Balancing
  • 4.11.g [i] Unequal
  • 4.11.g [ii] Equal
  • 5.0 IP Services
  • 5.1 Configure and verify DHCP (IOS Router)
  • 5.1.a Configuring router interfaces to use DHCP
  • 5.1.b DHCP options (basic overview and functionality)
  • 5.1.c Excluded addresses
  • 5.1.d Lease time
  • 5.2 Describe the types, features, and applications of ACLs
  • 5.2.a standard (editing and sequence numbers)
  • 5.2.b extended
  • 5.2.c named
  • 5.2.d numbered
  • 5.2.e Log option
  • 5.3 Configure and verify ACLs in a network environment
  • 5.3.a named
  • 5.3.b numbered
  • 5.3.c Log option
  • 5.4 Identify the basic operation of NAT
  • 5.4.a purpose
  • 5.4.b pool
  • 5.4.c static
  • 5.4.d 1 to 1
  • 5.4.e overloading
  • 5.4.f source addressing
  • 5.4.g one way NAT
  • 5.5 Configure and verify NAT for given network requirements
  • 5.6 Configure and verify NTP as a client.
  • 5.7 Recognize High availability (FHRP)
  • 5.7.a VRRP
  • 5.7.b HSRP
  • 5.7.c GLBP
  • 5.8 Configure and verify syslog
  • 5.8.a Utilize Syslog Output
  • 5.9 Describe SNMP v2 and v3
  • 6.0 Network Device Security
  • 6.1 Configure and verify network device security features
  • 6.1.a Device password security
  • 6.1.b enable secret versus enable
  • 6.1.c Transport
  • 6.1.c.1 disable telnet
  • 6.1.c.2 SSH
  • 6.1.d VTYs
  • 6.1.e physical security
  • 6.1.f service password
  • 6.1.g Describe external authentication methods
  • 6.2 Configure and verify Switch Port Security
  • 6.2.a Sticky mac
  • 6.2.b MAC address limitation
  • 6.2.c static/dynamic
  • 6.2.d violation modes
  • 6.2.d [i] err disable
  • 6.2.d [ii] shutdown
  • 6.2.d [iii] protect restrict
  • 6.2.e shutdown unused ports
  • 6.2.f err disable recovery
  • 6.2.g assign unused ports in unused VLANs
  • 6.2.h putting Native VLAN to other than VLAN 1
  • 6.3 Configure and verify ACLs to filter network traffic
  • 6.4 Configure and verify ACLs to limit telnet and SSH access to the router
  • 7.0 Troubleshooting
  • 7.1 Troubleshoot and correct common problems associated with IP addressing and host configurations
  • 7.2 Troubleshoot and resolve VLAN problems
  • 7.2.a Identify that VLANs are configured
  • 7.2.b Verify port membership correct
  • 7.2.c Correct IP address configured
  • 7.3 Troubleshoot and resolve trunking problems on Cisco switches
  • 7.3.a Verify correct trunk states
  • 7.3.b Verify correct encapsulation configured
  • 7.3.c Correct VLANs allowed
  • 7.4 Troubleshoot and resolve ACL issues
  • 7.4.a Verify statistics
  • 7.4.b Verify permitted networks
  • 7.4.c Verify direction
  • 7.4.c [i] Interface
  • 7.5 Troubleshoot and resolve Layer 1 problems
  • 7.5.a Framing
  • 7.5.b CRC
  • 7.5.c Runts
  • 7.5.d Giants
  • 7.5.e Dropped packets
  • 7.5.f Late collisions
  • 7.5.g Input/output errors
  • 7.6 Identify and correct common network problems
  • 7.7 Troubleshoot and resolve spanning tree operation issues
  • 7.7.a Verify root switch
  • 7.7.b Verify priority
  • 7.7.c Verify mode is correct
  • 7.7.d Verify port states
  • 7.8 Troubleshoot and resolve routing issues
  • 7.8.a Verify routing is enabled (sh IP protocols)
  • 7.8.b Verify routing table is correct
  • 7.8.c Verify correct path selection
  • 7.9 Troubleshoot and resolve OSPF problems
  • 7.9.a Verify neighbor adjacencies
  • 7.9.b Verify Hello and Dead timers
  • 7.9.c Verify OSPF area
  • 7.9.d Verify interface MTU
  • 7.9.e Verify network types
  • 7.9.f Verify neighbor states
  • 7.9.g Review OSPF topology table
  • 7.10 Troubleshoot and resolve EIGRP problems
  • 7.10.a Verify neighbor adjacencies
  • 7.10.b Verify AS number
  • 7.10.c Verify load balancing
  • 7.10.d Split horizon
  • 7.11 Troubleshoot and resolve interVLAN routing problems
  • 7.11.a Verify connectivity
  • 7.11.b Verify encapsulation
  • 7.11.c Verify subnet
  • 7.11.d Verify native VLAN
  • 7.11.e Port mode trunk status
  • 7.12 Troubleshoot and resolve WAN implementation issues
  • 7.12.a Serial interfaces
  • 7.12.b Frame relay
  • 7.12.c PPP
  • 7.13 Monitor NetFlow statistics
  • 7.14 TS EtherChannel problems
  • 8.0 WAN Technologies
  • 8.1 Identify different WAN technologies
  • 8.1.a Metro ethernet
  • 8.1.b VSAT
  • 8.1.c Cellular 3g/4g
  • 8.1.d MPLS
  • 8.1.e T1/E1
  • 8.1.f ISDN
  • 8.1.g DSL
  • 8.1.h Frame relay
  • 8.1.i Cable
  • 8.1.j VPN
  • 8.2 Configure and verify a basic WAN serial connection
  • 8.3 Configure and verify a PPP connection between Cisco routers
  • 8.4 Configure and verify Frame Relay on Cisco routers
  • 8.5 Implement and troubleshoot PPPoE
  • REGISTER NOW

    FAQS

    Frequenty Asked Questions

    System & Networking Course at IICT is designed & conducted by System & Networking experts with 10+ years of experience in the System & Networking domain Only institution in Chennai with the right blend of theory & practical sessions In-depth Course coverage for 45+ Hours More than 15,000+ students trust IICT Affordable fees keeping students and IT working professionals in mind Course timings designed to suit working professionals and students Interview tips and training Resume building support Real-time projects and case studies.
    We are proud to state that in the last 10+ years of our operations we have trained over 25,000+ aspirants to well-employed IT professionals in various IT companies.
    Our courseware is designed to give a hands-on approach to the students in System & Networking. The course is made up of theoretical classes that teach the basics of each module followed by high-intensity practical sessions reflecting the current challenges and needs of the industry that will demand the students’ time and commitment.
    More than 10 years we are into System & Networking Training domain. We are doing training across Chennai.
    We at IICT believe in giving individual attention to students so that they will be in a position to clarify all the doubts that arise in complex and difficult topics. Therefore, we restrict the size of each Selenium batch to 5 or 6 members.
    We are happy and proud to say that we have strong relationship with over 600+ small, mid-sized and MNCs. Many of these companies have openings for System & Networking Specialist. Moreover, we have a very active placement cell that provides 100% placement assistance to our students. The cell also contributes by training students in mock interviews and discussions even after the course completion.
    Our System & Networking faculty members are industry experts who have extensive experience in the field handing real-time application and completing mega real-time projects in System & Networking in different sectors of the industry. The students can rest assured that they are being taught by the best of the best from the System & Networking industry.
    We accept Cash, Card, Bank transfer and G Pay.
    You will receive IICT globally recognized course completion certification.
    Yes, IICT provides group discounts for its training programs. To get more details, visit our website and contact our support team via Call, Email, Live Chat option or drop a Quick Enquiry. Depending on the group size, we offer discounts as per the terms and conditions.

    Testimonials

    Training Experiences with Us