Field Technician Networking & Storage Training Provided by Rooman technologies Pvt Ltd Training Institute in Chennai,Aminijikarai
Field Technician Networking & Storage free videos and free material uploaded by Rooman technologies Pvt Ltd Training Institute staff .
Session: 1 to 10
Session: 1
Introduction to Computer
History of computer.
Generations of computer.
Functions of computer.
Advantages and Disadvantages of computer.
Hardware, Software and Firmware.
Session: 2
Introduction to Windows OS
Planning for Installation
Methods of OS Installation
OS Upgradation & Migration
Lab: 1
Bootable Device Creation
Installing Windows 10 Client OS
Performing Post-Installation Task
Lab: 2
Device Drivers Installation
Application Software Installation
Session: 3
Components need to assemble a
computer.
Identification of Components.
Use of serial and parallel ports.
Identification of ports.
Identification of add-on cards.
Assembling of computer.
Lab: 3
Assembling of PC
Session: 4
Memory
Overview of Computer Memory
Types of Memory
RAM,ROM & Cache Memory
Session: 5
Motherboard & Processor
Evolution of
Motherboard, BIOS, CMOS
Mother Board types.
Processor functions
Types of Processors
Latest Processors Features
Session: 6
Storage Devices
Hard Disk and SSD
Hard Disk Functions and Types
Components: Sector, Cluster,
Tracks & Cylinder
HDD Interfaces and Performance
Comparison HDD over SSD
Lab: 4
Configuring the Disk Partition
Creating, Extending, Shrinking and
Deletion of Partition
Session: 7
Optical Storage Disks
Overview of Optical Storage
Devices
Layers of Optical Storage Disks
Discussion on Sizes, Performance
and functions of CD ROM, DVD and Blu-Ray
Disks
Session: 8
Discussion on Windows Performance
Monitor Tools
Discussion on Event Viewer logs
Windows Update Settings
Windows Defender Functions
Session: 9
Understanding the System Restore
Point
Introduction to Windows Backup and
Restore Feature
Discussions on Backup Methods
& Recovery Options
Understanding about the Data
Recovery
Lab: 5
System Backup and Restore
Data Recovery
Session: 10
Understanding the Troubleshooting
Mechanism (Diagnosis)
Discussion on System Safe Boot
Options
Understanding about the User
Accounts & Passwords Policies
Analysing Hardware Issues
(Blue-Screen & Black-Screen Error)
Detecting and Diagnostics of
Computer Hardware Issues
Lab: 6
Enabling and Disabling the
Accounts, Strong Password Configuration
Managing User Accounts: Password
Resetting
Troubleshooting
Session: 11 to 20
Session: 11
Introduction to Network
Introduction to Network
Components required to establish
network
Types of Network
Types of Network Models
Session: 12
OSI Reference Model
The OSI Reference Model
Data Encapsulation
Application Layer
Presentation Layer
Session Layer
Transport layer
Session: 13
OSI Reference Model Contd.
Network Layer
Data Link Layer
Physical Layer
Session: 14
Cables
Network Interface Adapter
Understanding function
Installing drivers and configuring
NIC
Network cables
Types of cable: Co-axial cable
& Twisted pairs
Lab: 7
LAN Cable Crimping
Straight-Through & Cross-Over
Cable
Session: 15
Cables Cont.,
Fibre optic
LAN technologies: Ethernet, Token
ring &FDDI
Network topologies (BUS, STAR,
RING, HYBRID etc.)
Session: 16
Network Devices
Repeaters
Hub, Switch, Bridge
Router & Firewall
Session: 17
TCP/IP Model
Application / process layer
protocol
TCP and UDP header, IP standards
function, IP header
ICMP, ARP and RARP
Session: 18
TCP/IP Model Contd.
Network interface layer
Ethernet Standards
Physical layer specification
Frame, Token ring & FDDI
Physical layer components
Session: 19
IP Addressing
Overview of IP Addressing
IP Address assignment and Classes
Private and Public Addressing
Special Addresses APIPA, Loopback
Session: 20
IP Addressing Contd.
Types of IP Addressing
Subnetting: FLSM and VLSM
Supernetting
Lab: 8
Configuring the Static IP Address
with different Subnet Mask
Checking the Connectivity
Session: 21 to 30
Session: 21
TCP / IP utilities
Ping
Traceroute
Ipconfig
Netstat, Nbtstat
Telnet
FTP
Session: 22
Discussions on Remote access connection
Remote Network Architectures,
Remote Access
Networking Implementations
Lab: 9
RDP Connection to Remote Host
Telnet Connection to Remote Host
Third-Party Remote Apps
(TeamViewer, AnyDesk etc)
Session: 23
What is Email? Email-Address
Composing and Sending a Mail
Email-Attachments
Large Attachments & Opening
Attachments
Receiving a Mail, Replying and
Forwarding
Organizing your Mail
What is Unsolicited Email or Spam?
Session: 24
What are Social Networking
Websites?
Social Media use in other Country
Facebook, Twitter, LinkedIn
Other useful Websites
Lab: 10
Practice on Internet and Email
Session: 25
Introduction to Wireless
Networking
Wireless LAN Standards
Understanding WAP
SSID and Password Discussions
Lab: 11
Installing a Wireless LAN Service
Configuring a Wireless Access
Point
Practice on Wireless Networking.
Session: 26
Discussion on Server OS
Comparison on Desktop & Server
Hardware
Introducing Windows Server 2016
Planning for Server Installation
Lab: 12
Installation of Full GUI Server OS
Installation of Server Core
Completing Post-Installation Tasks
on Server
Session: 27
Understanding Local Storage
Discussion on Partition Style
Comparison on Basic & Dynamic
Disk
Understanding Volumes in Windows
Server 2016
Lab: 13
Configuring MBR and GPT Disks
Practice on Basic and Dynamic
Disks
Configuring Volumes in Windows
Server 2016
Session: 28
Discussion on Windows File System
Comparison on FAT, NTFS & ReFS
File Systems
Understanding Windows Server
Virtual Harddisks
Lab: 14
Installing File Systems
Formatting NTFS, ReFS & FAT
File Systems
Configuring Virtual Hard Disks
Session: 29
Introduction to File Server
Understanding file and share
access
Understanding shares permissions
Offline files shares Discussions
Lab: 15
Installing the File Server
Configuring Shared Folder
Configuring file and share access
Create and configure shares
permissions
Configuring offline files
Session: 30
Discussion on NTFS permissions
NTFS quotas
Understanding the Access-Based
Enumeration
Understanding the Encryption &
Compression
Lab: 16
Configuring NTFS permissions
Configuring NTFS quotas
Configuring Access-Based
Enumeration
Configuring Encryption &
Compression
Session: 31 to 40
Session: 31
Understanding IP Address
Assignment Methods
Introduction to DHCP Service
Working Process of DHCP Service
Planning DHCP Server Installation
Lab: 17
Installing the DHCP Server
Configuring the DHCP Scope
Validating the DHCP Implementation
Session: 32
Introduction to Windows Name
Resolution Techniques
Discussion on LMHOST, NETBIOS
& LLMNR Technique
Lab: 18
Verifying the Name Resolution
using different Techniques
Enabling & Disabling the LLMNR
& NETBIOS Method
Session: 33
Introduction to DNS Service
DNS Components
Discussions
DNS Hierarchy
DNS Namespace
DNS Resolver
Session: 34
DNS Resource Records
Working Process of DNS Service
Discussions on FQDN
Understanding about DNS Zones
(Primary & Secondary)
Understanding Forward &
Reverse Lookup Zone
Lab: 19
Installing DNS Service
Configuring DNS Zones
Configuring Forward & Reverse
Lookup Zone
Validating the Name Resolution
using DNS Technique
Session: 35
Difference between Workgroup &
Domain Model
Overview of Active Directory
Components of Active Directory
Active Directory Partitions
Session: 36
Overview of Domain Controller
Characteristics of Active
Directory
Discussion on Active Directory
Management Tools
Active Directory Users and
Computers Snap-In
Understanding the Domain
Controller Types
AD Users and Attributes
Lab: 20
Installing Active Directory Role
Configuring Primary Domain
Controller
Lab: 21
Deploying Additional Domain
Controller
Managing AD User Accounts:
Creation,
Modification & Deletion of
User Accounts
Joining Workgroup Machine to ADDS
Domain
Validating the Centralized
Authentication using ADDS
Session: 37
Discussion on AD Groups
Managing AD Group Types
Discussion on Domain Local, Global
& Universal Scopes
Lab: 22
Creation of AD Groups, Group Types
& Scopes
Validating the Group Scopes
Difference.
Session: 38
Importance of AD Computer Objects
Necessity of Pre-Creation of
Computer Accounts
Understanding the Computer
Accounts States (Enabled & Disabled)
Comparison of AD Group &
Organizational Unit
Session: 39
Understanding the Offline Domain
Joining feature
Overview of MMC & Types
Necessity of Delegating the
Administration Tasks
Lab: 22
Creation of ADDS Computer Objects
Creation of OU object
Enabling & Disabling of
Computer Accounts
Lab: 23
Performing an Offline Domain
Joining
Creation of Custom MMC’s
Installation of RSAT Tools on
Client Machine
Delegating the Administrative
Tasks.
Session: 40
Introduction to Local Policies
& Group Policy
Comparing Local Policies with
Group Policy
Discussions on Group Policy
Setting Types
Group Policy Settings States and
the Update Interval
Lab: 24
Configuring Local Policies
Configuring basic Group Policies
Session: 41 to 50
Session: 41
Introduction to File Server
Resource Manager
Understanding the Quota Management
Understanding the File Screening
Lab: 25
Installing FSRM Role
Configuring Quota Management &
File Screening
Session: 42
Overview of Backups
Types of Backups
Different Backup Items in Windows
Server 2016
Understanding the System State
Backup
Session: 43
Understanding the Bare Metal
Recovery
File and Folders Backup and System
Reserved Backup Options
Importance of Backup Recovery
Points
Windows Server Backup Snap-In
Lab: 26
Installing Windows Server Backup
feature
Performing the Files and Folders
Backup in Windows Server 2016
Lab: 27
Performing Active Directory Backup
& Restore using System State Backup
Session: 44
Introduction to Windows Server
Firewall
Understanding the Inbound &
Outbound Firewall Rules
Firewall Port and Protocol Rules
necessity
Session: 45
Understanding the Account Lockout
Policies
Discussion on Account Password
Policies
Fine Grained Password Policies
Comparing the Local Password and
Lockout Policies with Group Policy
Session: 46
Importance of Windows Server OS
Understanding the Server Manager
& Dashboard Options
Windows Server 2016 Performance
Monitor
Discussions on Resource
Utilization and Event Logs
Session: 47
Introduction to RHEL OS
Understanding Red Hat Enterprise
Linux Server Variants and Add-Ons
Planning for RHEL Installation
Discussions on Bash Shell and
Kernel
Lab: 28
Performing RHEL Server Manual
Installation
Session: 48
Getting Help in Red Hat Enterprise
Linux
Reading Documentation Using Man
Command
Reading Documentation Using Info
Command
Getting Help from Red Hat
Viewing and Printing Help
Documentation
Session: 49
Accessing the Command-Line
Basic Shell Skills
Understanding the Shell
Environment
Finding the Help
Session: 50
Working with File System Hierarchy
Managing Files
Using Links
Working with Archives and
Compressed Files
Editing the Files using Vim Tool
Session: 51 to 60
Session: 51
Using the Common Text File-Related
Tools
Using Grep to Analyse the Text
Working with other useful Text
Processing utilities
Working on Local Consoles
Using SSH and Related Utilities
Lab: 29
Working with File System
Creating, Viewing & Editing
the Files
Basic Commands
Lab: 30
Creating and Managing User
Accounts
Creating and Managing Group
Accounts
Session: 52
Managing File Ownership
Managing Basic Permission
Managing Advanced Permission
Session: 53
Managing ACLs
Setting Default Permission with
umask
Working with user Extended
attributes
Lab: 31
Configuring Linux File Permission
Practice on ACL and Default
Permission with umask
File Access Permission
Session: 54
Networking Fundamentals
Managing Network Addresses and
Interfaces
Validating Network Configuration
Configuring Networking with nmcli
& nmtui
Editing Network Configuration
Files
Setting up Hostname & Name
Resolution
Lab: 32
Managing Red Hat Enterprise Linux
Networking
Practice on Setting up Hostname
Session: 55
IPV6 Addressing
Introduction to IPV6
Benefits of IPV6 over IPv4
IPV6 Operations
IPv6 Addressing and Format
IPv6 address classification
Describe IPv6 addresses
Global unicast, Multicast, Link
local & Unique local
Understanding stateless and
stateful auto configuration
IPV4 and IPV6 migration
Session: 56
Assembling & Cabling Cisco
Devices
Introduction to Routers
Router Series and models
Router External Components
Router Internal Components
Session: 57
Operating & Configuring a
Cisco IOS Device
Introduction to Cisco
Internetworking Devices
Cisco Hierarchical Network Design
Model
Core Layer
Distribution Layer
Access Layer
Basic Operation of Cisco IOS
Software
Cisco IOS Versions
Understanding Universal Cisco IOS
and its Licensing
Session: 58
Keyboard Help in the Switch or
Router Command Line Interface
Commands to Get Basic Switch or
Router Information
Configuring a Switch and Router
from the Command Line
Cisco IOS commands
Configuration Modes
Interface configuration
Line configuration
Password configuration
Lab: 33
Working with Cisco Basic Commands
Practice on Line & Password
Configuration
Session: 59
Gathering Information about
Neighbouring Devices (CDP), LLDP.
Configuring Access to Router &
Switch using SSH
Managing multiple telnet sessions
Documenting the Network
Diagnostic Utilities: Ping
Diagnostic Utilities: Trace route
Lab: 34
Practice on Diagnostic Utilities
Telnet and SSH Configuration
Session: 60
Introduction to IP Routing
Understanding Routing Process
Discussion on Routing Table
Session: 61 to 70
Session: 61
Understanding Basic Routing
Routing & Routed Protocols
Types of IP Routing
Understanding the Static &
Dynamic Routing
Understanding Default IP Routing
Configuring Floating Routes
Session: 62
Introduction to Routing Protocol
Overview
Dynamic Routing Protocols
Multiple Paths
Routing Loops and Avoiding Loops
Session: 63
Distance Vector Routing Protocols
Introduction to RIP Protocol
Understanding RIP Working Process
Discussing difference between RIP
& RIPv2 Protocol
Session: 64
Understanding Router Summarization
RIPv2 Authentication
RIP Protocol Packets
Lab: 35
Configuring Basic Routing
Configuring Default Routing
Lab: 36
Practice on Static Routing
Configuration
Dynamic Routing RIP Protocol
Configuration
RIPv2 Practice
Lab: 37
Monitoring RIP
Troubleshooting RIP
RIPv2 Authentication Practice
IPv6 Routing Practice
Session: 65
Introduction to Switching
Switching Process
Switch Modes: Cut- Through,
Fragment Free
Store and Forward Switching
Session: 66
Spanning Tree Protocol (STP)
STP Port Roles & Port States
Introduction to VLAN’s
Benefits and Type of VLAN’s
Session: 67
Introduction to Storage Solution
DAS, NAS & SAN Storage
RAID Types
RAID Levels
Session: 68
Discussion on Storage Interfaces
Such as SCSI, SATA & IDE
Storage Protocols: SCSI, iSCSI and
FCP
NAS Storage: NFS, CIFS
Session: 69
IP Storage Networking
Fibre Channel over IP
Fibre Channel Products and
Technology
Session: 70
SAN Protocols
iSCSI Overview
iSCSI Configuration
Overview of NVMe Over Fibre
Channel
Lab: 38
Configuring Software RAID using OS
Configuring Hardware RAID on
Server Hardware
Lab: 39
Practice on Configuring iSCSI
Storage
Lab: 40
Practice on NAS Storage (NFS &
CIFS)
Session: 71 to 80
Session: 71
LAN-Free Data Movement
Server-Free Data Movement
Disaster Backup and Recovery
Storage Spaces
Storage Pooling
Session: 72
Introduction to Virtualization
Types of Virtualization
Introduction to VMWare
Virtualization
Benefits of VMWare Virtualization
Session: 73
Introduction to vSphere and
Software defined Data Center
Describe the topology of a
Physical Data Center
Explain the vSphere Virtual
Infrastructure
Define the Files and Components of
Virtual Machines
Describe the Benefits of Virtual
Machines
Session: 74
Explain the similarities and
differences between physical & virtual architectures
Define the purpose of ESXi
Define the purpose of vCenter
Server
Explain the software-defined data
center
Describe private, public, and
hybrid clouds
Session: 75
Introduce virtual machines,
virtual machine hardware, and virtual machine files
Identify the files that make up a
Virtual machine
Discuss the latest Virtual machine
hardware and its features
Describe Virtual machine CPU,
memory, disk, and network resource usage
Session: 76
Explain the importance of VMware
Tools
Discuss PCI pass-through, Direct
I/O, remote direct memory access, and NVMe
Deploy and configure Virtual
machines and templates
Identify the Virtual machine disk
format
Session: 77
Describe the Virtual Networks
Describe the Standard and
Distributed Switches
Describe Virtual Switch Connection
Types
Discuss the new TCP/IP Stack
Architecture
Use VLAN’s with Standard Switches
Session: 78
Introduce storage protocols and
storage device types
Discuss ESXi hosts using iSCSI,
NFS, and Fibre Channel storage
Create and manage VMFS and NFS
datastores
Describe the new features of VMFS
Introduce vSAN
Describe guest file encryption
Session: 79
Introduce virtual CPU and memory
concepts
Explain Virtual memory reclamation
techniques
Describe Virtual machine
overcommitment and resource competition
Configure and manage resource
pools
Describe methods for optimizing
CPU and memory usage
Use various tools to monitor
resource usage
Create and use alarms to report
certain conditions or events
Lab: 41
Practice on Installing VMWare
Workstation
Practice on Installing VMware ESXi
Lab: 42
Practice on Virtual Machine
Creation Using Workstation
Lab: 43
Installing the vSphere Client
Configuring Virtual Machines on
ESXi Host
Practice on Virtual Switches
Session: 80
Introduction to IT Datacenter
Infrastructure
Physical Key Elements of
Datacenter Infrastructure
Introducing the Cloud
Introduction to Cloud Computing
Technology
Session: 81 to 90
Session: 81
Benefits of Cloud Computing
Characteristics of Cloud Computing
Cloud Computing Deployment Models
(Private, Public & Hybrid)
Cloud Computing Services (IaaS,
PaaS & SaaS)
Cloud Computing Vendors
Session: 82
Introduction to Microsoft Azure
Cloud Services
Introduction to Amazon Aws Cloud
Services
Discussion on the Services Offered
by Azure & AWS
Resource Search on the Azure &
AWS Marketplace
Lab: 44
Microsoft Azure Account Creation
Amazon AWS Account Creation
Session: 83
Overview of Microsoft Azure
Managing Azure with Azure Portal
Overview of Azure Resource Manager
Azure Global Infrastructure
Regions
lab: 45
Practice on Azure Portal
Session: 84
Introduction to AWS
History of AWS
Introduction to AWS Products
Regions & Availability Zones
AWS Free Usage Tier
Introduction to AWS Management
Console
Lab: 46
Practice on AWS Portal
Session: 85
Introduction to Cyber Security
Importance of Cyber Security
Cyber Security Threats
Ransomware & Other Malwares
Email Security
Session: 86
Physical Security & Mobile
Security
Security Issues with Phones
Ways to Stay Secure
Basic Security Practices
Basic Computer Log Entries
Basic Incident Response Techniques
Identify Potential threats to
Wireless Networks
Session: 87
Identifying the Vulnerabilities of
a system
Understanding the Vulnerabilities
of a system
CVE ID, Bugtraq ID
Patch Management
Identifying the patch for a
Vulnerability
Downloading the Patch
Scanning systems for Malware
infections
Types of Anti-Malwares:
Anti-Virus, HIDS & HIPS
Session: 88
Discussion on Mobile Forensics:
How to recover deleted data from the mobile
Computer Forensics & Network
Forensics
Understanding the Recovery of the
evidences and logs
Log monitoring tools
Event viewer.
Lab: 47
Practice on Lab Tools: Zone Alarm
Firewall & XARP
Lab: 48
Protect your applications from
Antivirus
Updates Installation
Mobile/HDD Deleted
Practice on Log Monitoring tool
& Event viewer logs.
Session: 89
Cryptography
Cryptographic attacks and the
tools to ensure data integrity
Hashing, symmetric and asymmetric
encryption, and certificates
Methods of implementing
cryptography
Lab: 49
Practice on Cryptool
Session: 90
Counter Measure Techniques for
Network level attacks
Types of Firewall
Packet Filtering Firewall
Circuit-Level Gateway Firewall
Application-Level Firewall
Session: 91 to 99
Session: 91
Stateful Multilayer Inspection
Firewall
Limitations of a Firewall
Introduction to IDS & IPS
Placement of IDS in the Network
Introduction to UTM & Features
Difference between a Firewall
& a UTM
Placement of UTM in the Network
Monitoring attacks using UTM
Lab: 50
Practical Labs on IDS, IPS &
UTM
Session: 92
Introduction & Information
Security Threats and Attack Vectors
Introduction to Basics of Ethical
Hacking
Elements of Information Security
The Security, Functionality, and
Usability Triangle
Top Information Security Attack
Vectors
Latest Security Attacks
Information Security Threat
Categories & Types of Attacks on a System
Session: 93
Hacking Concepts
What is Hacking & What is
Ethical Hacking?
Hacker Classes & Ethical
Hacking is Necessity
Why Ethical Hacking is Necessary,
Scope and Limitations
Skills & Technic of an Ethical
Hacker
Session: 94
Scanning Networks
Different Kind of Information
Gathering for Different Type Of Victim: Enumeration,
System hacking, Malwares and
Threats, Sniffing Attacks, Social engineering attack
Web, Types of Web: Surface, Deep
& Darknet
Hitman Services
Hacking Services
Carding, Ripping & Phishing
Penetration Testing &
Vulnerability Auditing
Session: 95
Overview of important networking
terminologies: e.g. IP address, Network topologies
OS for different hardware
platforms, Vulnerability
Different Programming languages
for different platforms/purposes.
Hashing checksums
Php code overview
Introduction to Foot Printing
Session: 96
Finding a company’s details
Finding a company’s domain name
Finding a company’s Internal URLs
Finding a company’s Public and
Restricted URLs
Finding a company’s Server details
Finding the details of domain
registration
Finding the range of IP Address
Finding the DNS information
Finding the services running on
the server
Finding the location of servers
Traceroute analysis
Tracking e-mail communications
Lab: 51
Practice on Linux Commands
Practice on Whatismyipaddress.com
Netcraft & Hashcalc
Session: 97
Discussion on Network Scanning
Objectives of Network scanning
Finding the Live hosts in a
network
Finding Open ports on a server
Finding the services on a server
OS fingerprinting
Server Banner grabbing tools
Session: 98
Discussion on Vulnerability
Scanning
Vulnerability Scanner tools
Finding more details about a
vulnerability
Understanding Proxy Server and
Working Process
Types of Proxy Servers, finding of
Proxy servers
Why do Hackers use Proxy servers?
Discussion on TOR Network
Why hackers prefer to use TOR
network?
Session: 99
Understanding Enumeration: SNMP,
SMTP & DNS Enumeration
Introduction to Sniffing and
Sniffers
Sniffer Working Process, Types of
Sniffing (Active & Passive)
Promiscuous Mode
ARP, MAC/CAM Table
MAC Spoofing works
How to Defend against Sniffers in
Network
Introduction to Denial of Service
& DOS Attack
DDOS attack, Symptoms of a DOS
Attack
Botnet & DoS attacks
Discussion on WPS, WEP, WPA, WPA2
& WPA3
Lab: 52
Practice on NMAP tool, Anonymox,
TOR Browser
Practice on Maltego, DNSDumpster,
DOS Attack using LOIC tool
Practice on Metasploit framework,
Cain N Abel
Also called “Service Technician”, the Field Technician provides after sale support services to customers, typically, at their premises.
The individual at work is responsible for attending to customer complaints, installing newly purchased products, troubleshooting system problems and, configuring hardware equipment such as servers, storage and other related networking devices
Write a public review