syllabus - rooman
TRANSCRIPT
Rooman Technologies Pvt Ltd
#30, 12th Main, 1st Stage Rajajinagar,
Bangalore – 560010
E-mail: [email protected]
Phone: 7022020000
SYLLABUS
(FTNS)Field Technician
Networking & Storage
FTNS (Field Technician Networking & Storage)
Course Duration: 300 Hours
Course Content: Theory & Lab Sessions
Session: 1
Introduction to Computer
History of computer.
Generations of computer.
Functions of computer.
Advantages and Disadvantages of computer.
Hardware, Software and Firmware.
Session: 2
Introduction to Windows OS
Planning for Installation
Methods of OS Installation
OS Upgradation & Migration
Lab: 1
Bootable Device Creation
Installing Windows 10 Client OS
Performing Post-Installation Task
Lab: 2
Device Drivers Installation
Application Software Installation
Session: 3
Components need to assemble a computer.
Identification of Components.
Use of serial and parallel ports.
Identification of ports.
Identification of add-on cards.
Assembling of computer.
Lab: 3
Assembling of PC
Session: 4
Memory
Overview of Computer Memory
Types of Memory
RAM,ROM & Cache Memory
Session: 5
Motherboard & Processor
FTNS (Field Technician Networking & Storage)
Evolution of Motherboard, BIOS, CMOS
Mother Board types.
Processor functions
Types of Processors
Latest Processors Features
Session: 6
Storage Devices
Hard Disk and SSD
Hard Disk Functions and Types
Components: Sector,Cluster,Tracks & Cylinder
HDD Interfaces and Performance
Comparison HDD over SSD
Lab: 4
Configuring the Disk Partition
Creating, Extending, Shrinking and Deletion of Partition
Session: 7
Optical Storage Disks
Overview of Optical Storage Devices
Layers of Optical Storage Disks
Discussion on Sizes, Performance and functions of CD ROM, DVD and Blu-Ray
Disks
Session: 8
Discussion on Windows Performance Monitor Tools
Discussion on Event Viewer logs
Windows Update Settings
Windows Defender Functions
Session: 9
Understanding the System Restore Point
Introduction to Windows Backup and Restore Feature
Discussions on Backup Methods & Recovery Options
Understanding about the Data Recovery
Lab: 5
System Backup and Restore
Data Recovery
Session: 10
Understanding the Troubleshooting Mechanism (Diagnosis)
Discussion on System Safe Boot Options
Understanding about the User Accounts & Passwords Policies
Analysing Hardware Issues (Blue-Screen & Black-Screen Error)
Detecting and Diagnostics of Computer Hardware Issues
FTNS (Field Technician Networking & Storage)
Lab: 6
Enabling and Disabling the Accounts, Strong Password Configuration
Managing User Accounts: Password Resetting
Troubleshooting
Session: 11
Introduction to Network
Introduction to Network
Components required to establish network
Types of Network
Types of Network Models
Session: 12
OSI Reference Model
The OSI Reference Model
Data Encapsulation
Application Layer
Presentation Layer
Session Layer
Transport layer
Session: 13
OSI Reference Model Contd.
Network Layer
Data Link Layer
Physical Layer
Session: 14
Cables
Network Interface Adapter
Understanding function
Installing drivers and configuring NIC
Network cables
Types of cable: Co-axial cable & Twisted pairs
Lab: 7
LAN Cable Crimping
Straight-Through & Cross-Over Cable
Session: 15
Cables Cont.,
Fibre optic
LAN technologies: Ethernet, Token ring &FDDI
FTNS (Field Technician Networking & Storage)
Network topologies (BUS, STAR, RING, HYBRID etc.)
Session: 16
Network Devices
Repeaters
Hub, Switch, Bridge
Router & Firewall
Session: 17
TCP/IP Model
TCP/IP model
Application / process layer protocol
TCP and UDP header, IP standards function, IP header
ICMP, ARP and RARP
Session: 18
TCP/IP Model Contd.
Network interface layer
Ethernet Standards
Physical layer specification
Frame, Token ring & FDDI
Physical layer components
Session: 19
IP Addressing
Overview of IP Addressing
IP Address assignment and Classes
Private and Public Addressing
Special Addresses APIPA, Loopback
Session: 20
IP Addressing Contd.
Types of IP Addressing
Subnetting: FLSM and VLSM
Supernetting
Lab: 8
Configuring the Static IP Address with different Subnet Mask
Checking the Connectivity
FTNS (Field Technician Networking & Storage)
Session: 21
TCP / IP utilities
Ping
Traceroute
Ipconfig
Netstat, Nbtstat
Telnet
FTP
Session: 22
Discussions on Remote access connection
Remote Network Architectures, Remote Access
Networking Implementations
Lab: 9
RDP Connection to Remote Host
Telnet Connection to Remote Host
Third-Party Remote Apps (TeamViewer, AnyDesk etc)
Session: 23
What is Email? Email-Address
Composing and Sending a Mail
Email-Attachments
Large Attachments & Opening Attachments
Receiving a Mail, Replying and Forwarding
Organizing your Mail
What is Unsolicited Email or Spam?
Session: 24
What are Social Networking Websites?
Social Media use in other Country
Facebook, Twitter, LinkedIn
Other useful Websites
Lab: 10
Practice on Internet and Email
Session: 25
Introduction to Wireless Networking
Wireless LAN Standards
Understanding WAP
SSID and Password Discussions
FTNS (Field Technician Networking & Storage)
Lab: 11
Installing a Wireless LAN Service
Configuring a Wireless Access Point
Practice on Wireless Networking.
Session: 26
Discussion on Server OS
Comparison on Desktop & Server Hardware
Introducing Windows Server 2016
Planning for Server Installation
Lab: 12
Installation of Full GUI Server OS
Installation of Server Core
Completing Post-Installation Tasks on Server
Session: 27
Understanding Local Storage
Discussion on Partition Style
Comparison on Basic & Dynamic Disk
Understanding Volumes in Windows Server 2016
Lab: 13
Configuring MBR and GPT Disks
Practice on Basic and Dynamic Disks
Configuring Volumes in Windows Server 2016
Session: 28
Discussion on Windows File System
Comparison on FAT, NTFS & ReFS File Systems
Understanding Windows Server Virtual Harddisks
Lab: 14
Installing File Systems
Formatting NTFS, ReFS & FAT File Systems
Configuring Virtual Hard Disks
FTNS (Field Technician Networking & Storage)
Session: 29
Introduction to File Server
Understanding file and share access
Understanding shares permissions
Offline files shares Discussions
Lab: 15
Installing the File Server
Configuring Shared Folder
Configuring file and share access
Create and configure shares permissions
Configuring offline files
Session: 30
Discussion on NTFS permissions
NTFS quotas
Understanding the Access-Based Enumeration
Understanding the Encryption & Compression
Lab: 16
Configuring NTFS permissions
Configuring NTFS quotas
Configuring Access-Based Enumeration
Configuring Encryption & Compression.
Session: 31
Understanding IP Address Assignment Methods
Introduction to DHCP Service
Working Process of DHCP Service
Planning DHCP Server Installation
Lab: 17
Installing the DHCP Server
Configuring the DHCP Scope
Validating the DHCP Implementation
Session: 32
Introduction to Windows Name Resolution Techniques
Discussion on LMHOST, NETBIOS & LLMNR Technique
FTNS (Field Technician Networking & Storage)
Lab: 18
Verifying the Name Resolution using different Techniques
Enabling & Disabling the LLMNR & NETBIOS Method
Session: 33
Introduction to DNS Service
DNS Components Discussions
DNS Hierarchy
DNS Namespace
DNS Resolver
Session: 34
DNS Resource Records
Working Process of DNS Service
Discussions on FQDN
Understanding about DNS Zones (Primary & Secondary)
Understanding Forward & Reverse Lookup Zone
Lab: 19
Installing DNS Service
Configuring DNS Zones
Configuring Forward & Reverse Lookup Zone
Validating the Name Resolution using DNS Technique
Session: 35
Difference between Workgroup & Domain Model
Overview of Active Directory
Components of Active Directory
Active Directory Partitions
Session: 36
Overview of Domain Controller
Characteristics of Active Directory
Discussion on Active Directory Management Tools
Active Directory Users and Computers Snap-In
Understanding the Domain Controller Types
AD Users and Attributes
Lab: 20
Installing Active Directory Role
Configuring Primary Domain Controller
Lab: 21
Deploying Additional Domain Controller
Managing AD User Accounts: Creation,
FTNS (Field Technician Networking & Storage)
Modification & Deletion of User Accounts
Joining Workgroup Machine to ADDS Domain
Validating the Centralized Authentication using ADDS
Session: 37
Discussion on AD Groups
Managing AD Group Types
Discussion on Domain Local, Global & Universal Scopes
Lab: 22
Creation of AD Groups, Group Types & Scopes
Validating the Group Scopes Difference.
Session: 38
Importance of AD Computer Objects
Necessity of Pre-Creation of Computer Accounts
Understanding the Computer Accounts States (Enabled & Disabled)
Comparison of AD Group & Organizational Unit
Session: 39
Understanding the Offline Domain Joining feature
Overview of MMC & Types
Necessity of Delegating the Administration Tasks
Lab: 22
Creation of ADDS Computer Objects
Creation of OU object
Enabling & Disabling of Computer Accounts
Lab: 23
Performing an Offline Domain Joining
Creation of Custom MMC’s
Installation of RSAT Tools on Client Machine
Delegating the Administrative Tasks.
Session: 40
Introduction to Local Policies & Group Policy
Comparing Local Policies with Group Policy
Discussions on Group Policy Setting Types
Group Policy Settings States and the Update Interval
Lab: 24
Configuring Local Policies
Configuring basic Group Policies
FTNS (Field Technician Networking & Storage)
Session: 41
Introduction to File Server Resource Manager
Understanding the Quota Management
Understanding the File Screening
Lab: 25
Installing FSRM Role
Configuring Quota Management & File Screening
Session: 41
Overview of Backups
Types of Backups
Different Backup Items in Windows Server 2016
Understanding the System State Backup
Session: 42
Understanding the Bare Metal Recovery
File and Folders Backup and System Reserved Backup Options
Importance of Backup Recovery Points
Windows Server Backup Snap-In
Lab: 26
Installing Windows Server Backup feature
Performing the Files and Folders Backup in Windows Server 2016
Lab: 27
Performing Active Directory Backup & Restore using System State Backup
Session: 43
Introduction to Windows Server Firewall
Understanding the Inbound & Outbound Firewall Rules
Firewall Port and Protocol Rules necessity
Session: 44
Understanding the Account Lockout Policies
Discussion on Account Password Policies
Fine Grained Password Policies
Comparing the Local Password and Lockout Policies with Group Policy
Session: 45
Importance of Windows Server OS
Understanding the Server Manager & Dashboard Options
Windows Server 2016 Performance Monitor
Discussions on Resource Utilization and Event Logs
FTNS (Field Technician Networking & Storage)
Session: 46
Introduction to RHEL OS
Understanding Red Hat Enterprise Linux Server Variants and Add-Ons
Planning for RHEL Installation
Discussions on Bash Shell and Kernel
Lab: 28
Performing RHEL Server Manual Installation
Session: 47
Getting Help in Red Hat Enterprise Linux
Reading Documentation Using Man Command
Reading Documentation Using Info Command
Getting Help from Red Hat
Viewing and Printing Help Documentation
Session: 48
Accessing the Command-Line
Basic Shell Skills
Understanding the Shell Environment
Finding the Help
Session: 49
Working with File System Hierarchy
Managing Files
Using Links
Working with Archives and Compressed Files
Editing the Files using Vim Tool
Session: 50
Using the Common Text File-Related Tools
Using Grep to Analyse the Text
Working with other useful Text Processing utilities
Working on Local Consoles
Using SSH and Related Utilities
Lab: 29
Working with File System
Creating, Viewing & Editing the Files
Basic Commands
Lab: 30
Creating and Managing User Accounts
Creating and Managing Group Accounts
FTNS (Field Technician Networking & Storage)
Session: 51
Managing File Ownership
Managing Basic Permission
Managing Advanced Permission
Session: 52
Managing ACLs
Setting Default Permission with umask
Working with user Extended attributes
Lab: 31
Configuring Linux File Permission
Practice on ACL and Default Permission with umask
File Access Permission
Session: 53
Networking Fundamentals
Managing Network Addresses and Interfaces
Validating Network Configuration
Configuring Networking with nmcli & nmtui
Editing Network Configuration Files
Setting up Hostname & Name Resolution
Lab: 32
Managing Red Hat Enterprise Linux Networking
Practice on Setting up Hostname
Session: 54
IPV6 Addressing
Introduction to IPV6
Benefits of IPV6 over IPv4
IPV6 Operations
IPv6 Addressing and Format
IPv6 address classification
Describe IPv6 addresses
Global unicast, Multicast, Link local & Unique local
Understanding stateless and stateful auto configuration
IPV4 and IPV6 migration
Session: 55
Assembling & Cabling Cisco Devices
Introduction to Routers
Router Series and models
Router External Components
Router Internal Components
FTNS (Field Technician Networking & Storage)
Session: 56
Operating & Configuring a Cisco IOS Device
Introduction to Cisco Internetworking Devices
Cisco Hierarchical Network Design Model
Core Layer
Distribution Layer
Access Layer
Basic Operation of Cisco IOS Software
Cisco IOS Versions
Understanding Universal Cisco IOS and its Licensing
Session: 57
Keyboard Help in the Switch or Router Command Line Interface
Commands to Get Basic Switch or Router Information
Configuring a Switch and Router from the Command Line
Cisco IOS commands
Configuration Modes
Interface configuration
Line configuration
Password configuration
Lab: 33
Working with Cisco Basic Commands
Practice on Line & Password Configuration
Session: 58
Gathering Information about Neighbouring Devices (CDP), LLDP.
Configuring Access to Router & Switch using SSH
Managing multiple telnet sessions
Documenting the Network
Diagnostic Utilities: Ping
Diagnostic Utilities: Trace route
Lab: 34
Practice on Diagnostic Utilities
Telnet and SSH Configuration
Session: 59
Introduction to IP Routing
Understanding Routing Process
Discussion on Routing Table
Session: 60
Understanding Basic Routing
Routing & Routed Protocols
FTNS (Field Technician Networking & Storage)
Types of IP Routing
Understanding the Static & Dynamic Routing
Understanding Default IP Routing
Configuring Floating Routes
Session: 61
Introduction to Routing Protocol Overview
Dynamic Routing Protocols
Multiple Paths
Routing Loops and Avoiding Loops
Session: 62
Distance Vector Routing Protocols
Introduction to RIP Protocol
Understanding RIP Working Process
Discussing difference between RIP & RIPv2 Protocol
Session: 63
Understanding Router Summarization
RIPv2 Authentication
RIP Protocol Packets
Lab: 35
Configuring Basic Routing
Configuring Default Routing
Lab: 36
Practice on Static Routing Configuration
Dynamic Routing RIP Protocol Configuration
RIPv2 Practice
Lab: 37
Monitoring RIP
Troubleshooting RIP
RIPv2 Authentication Practice
IPv6 Routing Practice
Session: 64
Introduction to Switching
Switching Process
Switch Modes: Cut- Through, Fragment Free
Store and Forward Switching
FTNS (Field Technician Networking & Storage)
Session: 65
Spanning Tree Protocol (STP)
STP Port Roles & Port States
Introduction to VLAN’s
Benefits and Type of VLAN’s
Session: 66
Introduction to Storage Solution
DAS, NAS & SAN Storage
RAID Types
RAID Levels
Session: 67
Discussion on Storage Interfaces Such as SCSI, SATA & IDE
Storage Protocols: SCSI, iSCSI and FCP
NAS Storage: NFS, CIFS
Session: 68
IP Storage Networking
Fibre Channel over IP
Fibre Channel Products and Technology
Session: 69
SAN Protocols
iSCSI Overview
iSCSI Configuration
Overview of NVMe Over Fibre Channel
Lab: 38
Configuring Software RAID using OS
Configuring Hardware RAID on Server Hardware
Lab: 39
Practice on Configuring iSCSI Storage
Lab: 40
Practice on NAS Storage (NFS & CIFS)
Session: 70
LAN-Free Data Movement
Server-Free Data Movement
Disaster Backup and Recovery
FTNS (Field Technician Networking & Storage)
Storage Spaces
Storage Pooling
Session: 71
Introduction to Virtualization
Types of Virtualization
Introduction to VMWare Virtualization
Benefits of VMWare Virtualization
Session: 72
Introduction to vSphere and Software defined Data Center
Describe the topology of a Physical Data Center
Explain the vSphere Virtual Infrastructure
Define the Files and Components of Virtual Machines
Describe the Benefits of Virtual Machines
Session: 73
Explain the similarities and differences between physical & virtual architectures
Define the purpose of ESXi
Define the purpose of vCenter Server
Explain the software-defined data center
Describe private, public, and hybrid clouds
Session: 74
Introduce virtual machines, virtual machine hardware, and virtual machine files
Identify the files that make up a Virtual machine
Discuss the latest Virtual machine hardware and its features
Describe Virtual machine CPU, memory, disk, and network resource usage
Session: 75
Explain the importance of VMware Tools
Discuss PCI pass-through, Direct I/O, remote direct memory access, and NVMe
Deploy and configure Virtual machines and templates
Identify the Virtual machine disk format
Session: 76
Describe the Virtual Networks
Describe the Standard and Distributed Switches
Describe Virtual Switch Connection Types
Discuss the new TCP/IP Stack Architecture
Use VLAN’s with Standard Switches
FTNS (Field Technician Networking & Storage)
Session: 77
Introduce storage protocols and storage device types
Discuss ESXi hosts using iSCSI, NFS, and Fibre Channel storage
Create and manage VMFS and NFS datastores
Describe the new features of VMFS
Introduce vSAN
Describe guest file encryption
Session: 78
Introduce virtual CPU and memory concepts
Explain Virtual memory reclamation techniques
Describe Virtual machine overcommitment and resource competition
Configure and manage resource pools
Describe methods for optimizing CPU and memory usage
Use various tools to monitor resource usage
Create and use alarms to report certain conditions or events
Lab: 41
Practice on Installing VMWare Workstation
Practice on Installing VMware ESXi
Lab: 42
Practice on Virtual Machine Creation Using Workstation
Lab: 43
Installing the vSphere Client
Configuring Virtual Machines on ESXi Host
Practice on Virtual Switches
Session: 79
Introduction to IT Datacenter Infrastructure
Physical Key Elements of Datacenter Infrastructure
Introducing the Cloud
Introduction to Cloud Computing Technology
Session: 80
Benefits of Cloud Computing
Characteristics of Cloud Computing Cloud Computing Deployment Models (Private, Public & Hybrid)
Cloud Computing Services (IaaS, PaaS & SaaS) Cloud Computing Vendors
FTNS (Field Technician Networking & Storage)
Session: 81
Introduction to Microsoft Azure Cloud Services Introduction to Amazon Aws Cloud Services
Discussion on the Services Offered by Azure & AWS Resource Search on the Azure & AWS Marketplace
Lab: 44
Microsoft Azure Account Creation
Amazon AWS Account Creation
Session: 82
Overview of Microsoft Azure
Managing Azure with Azure Portal
Overview of Azure Resource Manager
Azure Global Infrastructure Regions
Lab: 45
Practice on Azure Portal
Session: 83
Introduction to AWS
History of AWS
Introduction to AWS Products
Regions & Availability Zones
AWS Free Usage Tier
Introduction to AWS Management Console
Lab: 46
Practice on AWS Portal
Session: 84
Introduction to Cyber Security
Importance of Cyber Security
Cyber Security Threats
Ransomware & Other Malwares
Email Security
Session: 85
Physical Security & Mobile Security
Security Issues with Phones
Ways to Stay Secure
Basic Security Practices
Basic Computer Log Entries
Basic Incident Response Techniques
Identify Potential threats to Wireless Networks
FTNS (Field Technician Networking & Storage)
Session: 86
Identifying the Vulnerabilities of a system
Understanding the Vulnerabilities of a system
CVE ID, Bugtraq ID
Patch Management
Identifying the patch for a Vulnerability
Downloading the Patch
Scanning systems for Malware infections
Types of Anti-Malwares: Anti-Virus, HIDS & HIPS
Session: 87
Discussion on Mobile Forensics: How to recover deleted data from the mobile
Computer Forensics & Network Forensics
Understanding the Recovery of the evidences and logs
Log monitoring tools
Event viewer.
Lab: 47
Practice on Lab Tools: Zone Alarm Firewall & XARP
Lab: 48
Protect your applications from Antivirus
Updates Installation
Mobile/HDD Deleted
Practice on Log Monitoring tool & Event viewer logs.
Session: 88
Cryptography
Cryptographic attacks and the tools to ensure data integrity
Hashing, symmetric and asymmetric encryption, and certificates
Methods of implementing cryptography
Lab: 49
Practice on Cryptool
Session: 89
Counter Measure Techniques for Network level attacks
Types of Firewall
Packet Filtering Firewall
Circuit-Level Gateway Firewall
Application-Level Firewall
FTNS (Field Technician Networking & Storage)
Session: 90
Stateful Multilayer Inspection Firewall
Limitations of a Firewall
Introduction to IDS & IPS
Placement of IDS in the Network
Introduction to UTM & Features
Difference between a Firewall & a UTM
Placement of UTM in the Network
Monitoring attacks using UTM
Lab: 50
Practical Labs on IDS, IPS & UTM
Session: 91
Introduction & Information Security Threats and Attack Vectors
Introduction to Basics of Ethical Hacking
Elements of Information Security
The Security, Functionality, and Usability Triangle
Top Information Security Attack Vectors
Latest Security Attacks
Information Security Threat Categories & Types of Attacks on a System
Session: 92
Hacking Concepts
What is Hacking & What is Ethical Hacking?
Hacker Classes & Ethical Hacking is Necessity
Why Ethical Hacking is Necessary, Scope and Limitations
Skills & Technic of an Ethical Hacker
Session: 93
Scanning Networks
Different Kind of Information Gathering for Different Type Of Victim: Enumeration,
System hacking, Malwares and Threats, Sniffing Attacks, Social engineering attack
Web, Types of Web: Surface, Deep & Darknet
Hitman Services
Hacking Services
Carding, Ripping & Phishing
Penetration Testing & Vulnerability Auditing
FTNS (Field Technician Networking & Storage)
Session: 94
Overview of important networking terminologies: e.g. IP address, Network topologies
OS for different hardware platforms, Vulnerability
Different Programming languages for different platforms/purposes.
Hashing checksums
Php code overview
Introduction to Foot Printing
Session: 95
Finding a company’s details
Finding a company’s domain name
Finding a company’s Internal URLs
Finding a company’s Public and Restricted URLs
Finding a company’s Server details
Finding the details of domain registration
Finding the range of IP Address
Finding the DNS information
Finding the services running on the server
Finding the location of servers
Traceroute analysis
Tracking e-mail communications
Lab: 51
Practice on Linux Commands
Practice on Whatismyipaddress.com
Netcraft & Hashcalc
Session: 96
Discussion on Network Scanning
Objectives of Network scanning
Finding the Live hosts in a network
Finding Open ports on a server
Finding the services on a server
OS fingerprinting
Server Banner grabbing tools
Session: 97
Discussion on Vulnerability Scanning
Vulnerability Scanner tools
Finding more details about a vulnerability
Understanding Proxy Server and Working Process
Types of Proxy Servers, finding of Proxy servers
Why do Hackers use Proxy servers?
FTNS (Field Technician Networking & Storage)
Discussion on TOR Network
Why hackers prefer to use TOR network?
Session: 98
Understanding Enumeration: SNMP, SMTP & DNS Enumeration
Introduction to Sniffing and Sniffers
Sniffer Working Process, Types of Sniffing (Active & Passive)
Promiscuous Mode
ARP, MAC/CAM Table
MAC Spoofing works
How to Defend against Sniffers in Network
Introduction to Denial of Service & DOS Attack
DDOS attack, Symptoms of a DOS Attack
Botnet & DoS attacks
Discussion on WPS, WEP, WPA, WPA2 & WPA3
Lab: 52
Practice on NMAP tool, Anonymox, TOR Browser
Practice on Maltego, DNSDumpster, DOS Attack using LOIC tool
Practice on Metasploit framework, Cain N Abel