Field Technician Networking & Storage

Field Technician Networking & Storage Training Provided by Rooman technologies Pvt Ltd Training Institute in Chennai,Aminijikarai

Beginner 0(0 Ratings) 0 Students enrolled
Created by Rooman technologies Pvt Ltd Training Institute staff Last updated Thu, 31-Mar-2022 English


Field Technician Networking & Storage free videos and free material uploaded by Rooman technologies Pvt Ltd Training Institute staff .

Syllabus / What will i learn?

Session: 1 to 10

Session: 1

Introduction to Computer

History of computer.

Generations of computer.

Functions of computer.

Advantages and Disadvantages of computer.

Hardware, Software and Firmware.

Session: 2

Introduction to Windows OS

Planning for Installation

Methods of OS Installation

OS Upgradation & Migration

Lab: 1

Bootable Device Creation

Installing Windows 10 Client OS

Performing Post-Installation Task

Lab: 2

Device Drivers Installation

Application Software Installation

Session: 3

Components need to assemble a computer.

Identification of Components.

Use of serial and parallel ports.

Identification of ports.

Identification of add-on cards.

Assembling of computer.

Lab: 3

Assembling of PC

Session: 4

Memory

Overview of Computer Memory

Types of Memory

RAM,ROM & Cache Memory

Session: 5

Motherboard & Processor

Evolution of

Motherboard, BIOS, CMOS

Mother Board types.

Processor functions

Types of Processors

Latest Processors Features

Session: 6

Storage Devices

Hard Disk and SSD

Hard Disk Functions and Types

Components: Sector, Cluster, Tracks & Cylinder

HDD Interfaces and Performance

Comparison HDD over SSD

Lab: 4

Configuring the Disk Partition

Creating, Extending, Shrinking and Deletion of Partition

Session: 7

Optical Storage Disks

Overview of Optical Storage Devices

Layers of Optical Storage Disks

Discussion on Sizes, Performance and functions of CD ROM, DVD and Blu-Ray
Disks

Session: 8

Discussion on Windows Performance Monitor Tools

Discussion on Event Viewer logs

Windows Update Settings

Windows Defender Functions

Session: 9

Understanding the System Restore Point

Introduction to Windows Backup and Restore Feature

Discussions on Backup Methods & Recovery Options

Understanding about the Data Recovery

Lab: 5

System Backup and Restore

Data Recovery

Session: 10

Understanding the Troubleshooting Mechanism (Diagnosis)

Discussion on System Safe Boot Options

Understanding about the User Accounts & Passwords Policies

Analysing Hardware Issues (Blue-Screen & Black-Screen Error)

Detecting and Diagnostics of Computer Hardware Issues

Lab: 6

Enabling and Disabling the Accounts, Strong Password Configuration

Managing User Accounts: Password Resetting

Troubleshooting

Session: 11 to 20

Session: 11

Introduction to Network

Introduction to Network

Components required to establish network

Types of Network

Types of Network Models

Session: 12

OSI Reference Model

The OSI Reference Model

Data Encapsulation

Application Layer

Presentation Layer

Session Layer

Transport layer

Session: 13

OSI Reference Model Contd.

Network Layer

Data Link Layer

Physical Layer

Session: 14

Cables

Network Interface Adapter

Understanding function

Installing drivers and configuring NIC

Network cables

Types of cable: Co-axial cable & Twisted pairs

Lab: 7

LAN Cable Crimping

Straight-Through & Cross-Over Cable

Session: 15

Cables Cont.,

Fibre optic

LAN technologies: Ethernet, Token ring &FDDI

Network topologies (BUS, STAR, RING, HYBRID etc.)

Session: 16

Network Devices

Repeaters

Hub, Switch, Bridge

Router & Firewall

Session: 17

TCP/IP Model

Application / process layer protocol

TCP and UDP header, IP standards function, IP header

ICMP, ARP and RARP

Session: 18

TCP/IP Model Contd.

Network interface layer

Ethernet Standards

Physical layer specification

Frame, Token ring & FDDI

Physical layer components

Session: 19

IP Addressing

Overview of IP Addressing

IP Address assignment and Classes

Private and Public Addressing

Special Addresses APIPA, Loopback

Session: 20

IP Addressing Contd.

Types of IP Addressing

Subnetting: FLSM and VLSM

Supernetting

Lab: 8

Configuring the Static IP Address with different Subnet Mask

Checking the Connectivity

Session: 21 to 30

Session: 21

TCP / IP utilities

Ping

Traceroute

Ipconfig

Netstat, Nbtstat

Telnet

FTP

Session: 22

Discussions on Remote access connection

Remote Network Architectures, Remote Access

Networking Implementations

Lab: 9

RDP Connection to Remote Host

Telnet Connection to Remote Host

Third-Party Remote Apps (TeamViewer, AnyDesk etc)

Session: 23

What is Email? Email-Address

Composing and Sending a Mail

Email-Attachments

Large Attachments & Opening Attachments

Receiving a Mail, Replying and Forwarding

Organizing your Mail

What is Unsolicited Email or Spam?

Session: 24

What are Social Networking Websites?

Social Media use in other Country

Facebook, Twitter, LinkedIn

Other useful Websites

Lab: 10

Practice on Internet and Email

Session: 25

Introduction to Wireless Networking

Wireless LAN Standards

Understanding WAP

SSID and Password Discussions

Lab: 11

Installing a Wireless LAN Service

Configuring a Wireless Access Point

Practice on Wireless Networking.

Session: 26

Discussion on Server OS

Comparison on Desktop & Server Hardware

Introducing Windows Server 2016

Planning for Server Installation

Lab: 12

Installation of Full GUI Server OS

Installation of Server Core

Completing Post-Installation Tasks on Server

Session: 27

Understanding Local Storage

Discussion on Partition Style

Comparison on Basic & Dynamic Disk

Understanding Volumes in Windows Server 2016

Lab: 13

Configuring MBR and GPT Disks

Practice on Basic and Dynamic Disks

Configuring Volumes in Windows Server 2016

Session: 28

Discussion on Windows File System

Comparison on FAT, NTFS & ReFS File Systems

Understanding Windows Server Virtual Harddisks

Lab: 14

Installing File Systems

Formatting NTFS, ReFS & FAT File Systems

Configuring Virtual Hard Disks

Session: 29

Introduction to File Server

Understanding file and share access

Understanding shares permissions

Offline files shares Discussions

Lab: 15

Installing the File Server

Configuring Shared Folder

Configuring file and share access

Create and configure shares permissions

Configuring offline files

Session: 30

Discussion on NTFS permissions

NTFS quotas

Understanding the Access-Based Enumeration

Understanding the Encryption & Compression

Lab: 16

Configuring NTFS permissions

Configuring NTFS quotas

Configuring Access-Based Enumeration

Configuring Encryption & Compression

Session: 31 to 40

Session: 31

Understanding IP Address Assignment Methods

Introduction to DHCP Service

Working Process of DHCP Service

Planning DHCP Server Installation

Lab: 17

Installing the DHCP Server

Configuring the DHCP Scope

Validating the DHCP Implementation

Session: 32

Introduction to Windows Name Resolution Techniques

Discussion on LMHOST, NETBIOS & LLMNR Technique

Lab: 18

Verifying the Name Resolution using different Techniques

Enabling & Disabling the LLMNR & NETBIOS Method

Session: 33

Introduction to DNS Service

DNS Components

Discussions

DNS Hierarchy

DNS Namespace

DNS Resolver

Session: 34

DNS Resource Records

Working Process of DNS Service

Discussions on FQDN

Understanding about DNS Zones (Primary & Secondary)

Understanding Forward & Reverse Lookup Zone

Lab: 19

Installing DNS Service

Configuring DNS Zones

Configuring Forward & Reverse Lookup Zone

Validating the Name Resolution using DNS Technique

Session: 35

Difference between Workgroup & Domain Model

Overview of Active Directory

Components of Active Directory

Active Directory Partitions

Session: 36

Overview of Domain Controller

Characteristics of Active Directory

Discussion on Active Directory Management Tools

Active Directory Users and Computers Snap-In

Understanding the Domain Controller Types

AD Users and Attributes

Lab: 20

Installing Active Directory Role

Configuring Primary Domain Controller

Lab: 21

Deploying Additional Domain Controller

Managing AD User Accounts: Creation,

Modification & Deletion of User Accounts

Joining Workgroup Machine to ADDS Domain

Validating the Centralized Authentication using ADDS

Session: 37

Discussion on AD Groups

Managing AD Group Types

Discussion on Domain Local, Global & Universal Scopes

Lab: 22

Creation of AD Groups, Group Types & Scopes

Validating the Group Scopes Difference.

Session: 38

Importance of AD Computer Objects

Necessity of Pre-Creation of Computer Accounts

Understanding the Computer Accounts States (Enabled & Disabled)

Comparison of AD Group & Organizational Unit

Session: 39

Understanding the Offline Domain Joining feature

Overview of MMC & Types

Necessity of Delegating the Administration Tasks

Lab: 22

Creation of ADDS Computer Objects

Creation of OU object

Enabling & Disabling of Computer Accounts

Lab: 23

Performing an Offline Domain Joining

Creation of Custom MMC’s

Installation of RSAT Tools on Client Machine

Delegating the Administrative Tasks.

Session: 40

Introduction to Local Policies & Group Policy

Comparing Local Policies with Group Policy

Discussions on Group Policy Setting Types

Group Policy Settings States and the Update Interval

Lab: 24

Configuring Local Policies

Configuring basic Group Policies

Session: 41 to 50

Session: 41

Introduction to File Server Resource Manager

Understanding the Quota Management

Understanding the File Screening

Lab: 25

Installing FSRM Role

Configuring Quota Management & File Screening

Session: 42

Overview of Backups

Types of Backups

Different Backup Items in Windows Server 2016

Understanding the System State Backup

Session: 43

Understanding the Bare Metal Recovery

File and Folders Backup and System Reserved Backup Options

Importance of Backup Recovery Points

Windows Server Backup Snap-In

Lab: 26

Installing Windows Server Backup feature

Performing the Files and Folders Backup in Windows Server 2016

Lab: 27

Performing Active Directory Backup & Restore using System State Backup

Session: 44

Introduction to Windows Server Firewall

Understanding the Inbound & Outbound Firewall Rules

Firewall Port and Protocol Rules necessity

Session: 45

Understanding the Account Lockout Policies

Discussion on Account Password Policies

Fine Grained Password Policies

Comparing the Local Password and Lockout Policies with Group Policy

Session: 46

Importance of Windows Server OS

Understanding the Server Manager & Dashboard Options

Windows Server 2016 Performance Monitor

Discussions on Resource Utilization and Event Logs

Session: 47

Introduction to RHEL OS

Understanding Red Hat Enterprise Linux Server Variants and Add-Ons

Planning for RHEL Installation

Discussions on Bash Shell and Kernel

Lab: 28

Performing RHEL Server Manual Installation

Session: 48

Getting Help in Red Hat Enterprise Linux

Reading Documentation Using Man Command

Reading Documentation Using Info Command

Getting Help from Red Hat

Viewing and Printing Help Documentation

Session: 49

Accessing the Command-Line

Basic Shell Skills

Understanding the Shell Environment

Finding the Help

Session: 50

Working with File System Hierarchy

Managing Files

Using Links

Working with Archives and Compressed Files

Editing the Files using Vim Tool

Session: 51 to 60

Session: 51

Using the Common Text File-Related Tools

Using Grep to Analyse the Text

Working with other useful Text Processing utilities

Working on Local Consoles

Using SSH and Related Utilities

Lab: 29

Working with File System

Creating, Viewing & Editing the Files

Basic Commands

Lab: 30

Creating and Managing User Accounts

Creating and Managing Group Accounts

Session: 52

Managing File Ownership

Managing Basic Permission

Managing Advanced Permission

Session: 53

Managing ACLs

Setting Default Permission with umask

Working with user Extended attributes

Lab: 31

Configuring Linux File Permission

Practice on ACL and Default Permission with umask

File Access Permission

Session: 54

Networking Fundamentals

Managing Network Addresses and Interfaces

Validating Network Configuration

Configuring Networking with nmcli & nmtui

Editing Network Configuration Files

Setting up Hostname & Name Resolution

Lab: 32

Managing Red Hat Enterprise Linux Networking

Practice on Setting up Hostname

Session: 55

IPV6 Addressing

Introduction to IPV6

Benefits of IPV6 over IPv4

IPV6 Operations

IPv6 Addressing and Format

IPv6 address classification

Describe IPv6 addresses

Global unicast, Multicast, Link local & Unique local

Understanding stateless and stateful auto configuration

IPV4 and IPV6 migration

Session: 56

Assembling & Cabling Cisco Devices

Introduction to Routers

Router Series and models

Router External Components

Router Internal Components

Session: 57

Operating & Configuring a Cisco IOS Device

Introduction to Cisco Internetworking Devices

Cisco Hierarchical Network Design Model

Core Layer

Distribution Layer

Access Layer

Basic Operation of Cisco IOS Software

Cisco IOS Versions

Understanding Universal Cisco IOS and its Licensing

Session: 58

Keyboard Help in the Switch or Router Command Line Interface

Commands to Get Basic Switch or Router Information

Configuring a Switch and Router from the Command Line

Cisco IOS commands

Configuration Modes

Interface configuration

Line configuration

Password configuration

Lab: 33

Working with Cisco Basic Commands

Practice on Line & Password Configuration

Session: 59

Gathering Information about Neighbouring Devices (CDP), LLDP.

Configuring Access to Router & Switch using SSH

Managing multiple telnet sessions

Documenting the Network

Diagnostic Utilities: Ping

Diagnostic Utilities: Trace route

Lab: 34

Practice on Diagnostic Utilities

Telnet and SSH Configuration

Session: 60

Introduction to IP Routing

Understanding Routing Process

Discussion on Routing Table

Session: 61 to 70

Session: 61

Understanding Basic Routing

Routing & Routed Protocols

Types of IP Routing

Understanding the Static & Dynamic Routing

Understanding Default IP Routing

Configuring Floating Routes

Session: 62

Introduction to Routing Protocol Overview

Dynamic Routing Protocols

Multiple Paths

Routing Loops and Avoiding Loops

Session: 63

Distance Vector Routing Protocols

Introduction to RIP Protocol

Understanding RIP Working Process

Discussing difference between RIP & RIPv2 Protocol

Session: 64

Understanding Router Summarization

RIPv2 Authentication

RIP Protocol Packets

Lab: 35

Configuring Basic Routing

Configuring Default Routing

Lab: 36

Practice on Static Routing Configuration

Dynamic Routing RIP Protocol Configuration

RIPv2 Practice

Lab: 37

Monitoring RIP

Troubleshooting RIP

RIPv2 Authentication Practice

IPv6 Routing Practice

Session: 65

Introduction to Switching

Switching Process

Switch Modes: Cut- Through, Fragment Free

Store and Forward Switching

Session: 66

Spanning Tree Protocol (STP)

STP Port Roles & Port States

Introduction to VLAN’s

Benefits and Type of VLAN’s

Session: 67

Introduction to Storage Solution

DAS, NAS & SAN Storage

RAID Types

RAID Levels

Session: 68

Discussion on Storage Interfaces Such as SCSI, SATA & IDE

Storage Protocols: SCSI, iSCSI and FCP

NAS Storage: NFS, CIFS

Session: 69

IP Storage Networking

Fibre Channel over IP

Fibre Channel Products and Technology

Session: 70

SAN Protocols

iSCSI Overview

iSCSI Configuration

Overview of NVMe Over Fibre Channel

Lab: 38

Configuring Software RAID using OS

Configuring Hardware RAID on Server Hardware

Lab: 39

Practice on Configuring iSCSI Storage

Lab: 40

Practice on NAS Storage (NFS & CIFS)

Session: 71 to 80

Session: 71

LAN-Free Data Movement

Server-Free Data Movement

Disaster Backup and Recovery

Storage Spaces

Storage Pooling

Session: 72

Introduction to Virtualization

Types of Virtualization

Introduction to VMWare Virtualization

Benefits of VMWare Virtualization

Session: 73

Introduction to vSphere and Software defined Data Center

Describe the topology of a Physical Data Center

Explain the vSphere Virtual Infrastructure

Define the Files and Components of Virtual Machines

Describe the Benefits of Virtual Machines

Session: 74

Explain the similarities and differences between physical & virtual architectures

Define the purpose of ESXi

Define the purpose of vCenter Server

Explain the software-defined data center

Describe private, public, and hybrid clouds

Session: 75

Introduce virtual machines, virtual machine hardware, and virtual machine files

Identify the files that make up a Virtual machine

Discuss the latest Virtual machine hardware and its features

Describe Virtual machine CPU, memory, disk, and network resource usage

Session: 76

Explain the importance of VMware Tools

Discuss PCI pass-through, Direct I/O, remote direct memory access, and NVMe

Deploy and configure Virtual machines and templates

Identify the Virtual machine disk format

Session: 77

Describe the Virtual Networks

Describe the Standard and Distributed Switches

Describe Virtual Switch Connection Types

Discuss the new TCP/IP Stack Architecture

Use VLAN’s with Standard Switches

Session: 78

Introduce storage protocols and storage device types

Discuss ESXi hosts using iSCSI, NFS, and Fibre Channel storage

Create and manage VMFS and NFS datastores

Describe the new features of VMFS

Introduce vSAN

Describe guest file encryption

Session: 79

Introduce virtual CPU and memory concepts

Explain Virtual memory reclamation techniques

Describe Virtual machine overcommitment and resource competition

Configure and manage resource pools

Describe methods for optimizing CPU and memory usage

Use various tools to monitor resource usage

Create and use alarms to report certain conditions or events

Lab: 41

Practice on Installing VMWare Workstation

Practice on Installing VMware ESXi

Lab: 42

Practice on Virtual Machine Creation Using Workstation

Lab: 43

Installing the vSphere Client

Configuring Virtual Machines on ESXi Host

Practice on Virtual Switches

Session: 80

Introduction to IT Datacenter Infrastructure

Physical Key Elements of Datacenter Infrastructure

Introducing the Cloud

Introduction to Cloud Computing Technology

Session: 81 to 90

Session: 81

Benefits of Cloud Computing

Characteristics of Cloud Computing

Cloud Computing Deployment Models (Private, Public & Hybrid)

Cloud Computing Services (IaaS, PaaS & SaaS)

Cloud Computing Vendors

Session: 82

Introduction to Microsoft Azure Cloud Services

Introduction to Amazon Aws Cloud Services

Discussion on the Services Offered by Azure & AWS

Resource Search on the Azure & AWS Marketplace

Lab: 44

Microsoft Azure Account Creation

Amazon AWS Account Creation

Session: 83

Overview of Microsoft Azure

Managing Azure with Azure Portal

Overview of Azure Resource Manager

Azure Global Infrastructure Regions

lab: 45

Practice on Azure Portal

Session: 84

Introduction to AWS

History of AWS

Introduction to AWS Products

Regions & Availability Zones

AWS Free Usage Tier

Introduction to AWS Management Console

Lab: 46

Practice on AWS Portal

Session: 85

Introduction to Cyber Security

Importance of Cyber Security

Cyber Security Threats

Ransomware & Other Malwares

Email Security

Session: 86

Physical Security & Mobile Security

Security Issues with Phones

Ways to Stay Secure

Basic Security Practices

Basic Computer Log Entries

Basic Incident Response Techniques

Identify Potential threats to Wireless Networks

Session: 87

Identifying the Vulnerabilities of a system

Understanding the Vulnerabilities of a system

CVE ID, Bugtraq ID

Patch Management

Identifying the patch for a Vulnerability

Downloading the Patch

Scanning systems for Malware infections

Types of Anti-Malwares: Anti-Virus, HIDS & HIPS

Session: 88

Discussion on Mobile Forensics: How to recover deleted data from the mobile

Computer Forensics & Network Forensics

Understanding the Recovery of the evidences and logs

Log monitoring tools

Event viewer.

Lab: 47

Practice on Lab Tools: Zone Alarm Firewall & XARP

Lab: 48

Protect your applications from Antivirus

Updates Installation

Mobile/HDD Deleted

Practice on Log Monitoring tool & Event viewer logs.

Session: 89

Cryptography

Cryptographic attacks and the tools to ensure data integrity

Hashing, symmetric and asymmetric encryption, and certificates

Methods of implementing cryptography

Lab: 49

Practice on Cryptool

Session: 90

Counter Measure Techniques for Network level attacks

Types of Firewall

Packet Filtering Firewall

Circuit-Level Gateway Firewall

Application-Level Firewall

Session: 91 to 99

Session: 91

Stateful Multilayer Inspection Firewall

Limitations of a Firewall

Introduction to IDS & IPS

Placement of IDS in the Network

Introduction to UTM & Features

Difference between a Firewall & a UTM

Placement of UTM in the Network

Monitoring attacks using UTM

Lab: 50

Practical Labs on IDS, IPS & UTM

Session: 92

Introduction & Information Security Threats and Attack Vectors

Introduction to Basics of Ethical Hacking

Elements of Information Security

The Security, Functionality, and Usability Triangle

Top Information Security Attack Vectors

Latest Security Attacks

Information Security Threat Categories & Types of Attacks on a System

Session: 93

Hacking Concepts

What is Hacking & What is Ethical Hacking?

Hacker Classes & Ethical Hacking is Necessity

Why Ethical Hacking is Necessary, Scope and Limitations

Skills & Technic of an Ethical Hacker

Session: 94

Scanning Networks

Different Kind of Information Gathering for Different Type Of Victim: Enumeration,

System hacking, Malwares and Threats, Sniffing Attacks, Social engineering attack

Web, Types of Web: Surface, Deep & Darknet

Hitman Services

Hacking Services

Carding, Ripping & Phishing

Penetration Testing & Vulnerability Auditing

Session: 95

Overview of important networking terminologies: e.g. IP address, Network topologies

OS for different hardware platforms, Vulnerability

Different Programming languages for different platforms/purposes.

Hashing checksums

Php code overview

Introduction to Foot Printing

Session: 96

Finding a company’s details

Finding a company’s domain name

Finding a company’s Internal URLs

Finding a company’s Public and Restricted URLs

Finding a company’s Server details

Finding the details of domain registration

Finding the range of IP Address

Finding the DNS information

Finding the services running on the server

Finding the location of servers

Traceroute analysis

Tracking e-mail communications

Lab: 51

Practice on Linux Commands

Practice on Whatismyipaddress.com

Netcraft & Hashcalc

Session: 97

Discussion on Network Scanning

Objectives of Network scanning

Finding the Live hosts in a network

Finding Open ports on a server

Finding the services on a server

OS fingerprinting

Server Banner grabbing tools

Session: 98

Discussion on Vulnerability Scanning

Vulnerability Scanner tools

Finding more details about a vulnerability

Understanding Proxy Server and Working Process

Types of Proxy Servers, finding of Proxy servers

Why do Hackers use Proxy servers?

Discussion on TOR Network

Why hackers prefer to use TOR network?

Session: 99

Understanding Enumeration: SNMP, SMTP & DNS Enumeration

Introduction to Sniffing and Sniffers

Sniffer Working Process, Types of Sniffing (Active & Passive)

Promiscuous Mode

ARP, MAC/CAM Table

MAC Spoofing works

How to Defend against Sniffers in Network

Introduction to Denial of Service & DOS Attack

DDOS attack, Symptoms of a DOS Attack

Botnet & DoS attacks

Discussion on WPS, WEP, WPA, WPA2 & WPA3

Lab: 52

Practice on NMAP tool, Anonymox, TOR Browser

Practice on Maltego, DNSDumpster, DOS Attack using LOIC tool

Practice on Metasploit framework, Cain N Abel

 



Curriculum for this course
0 Lessons 00:00:00 Hours
+ View more
Description

Also called “Service Technician”, the Field Technician provides after sale support services to customers, typically, at their premises.

The individual at work is responsible for attending to customer complaints, installing newly purchased products, troubleshooting system problems and, configuring hardware equipment such as servers, storage and other related networking devices

You need online training / explanation for this course?

1 to 1 Online Training contact instructor for demo :


+ View more

Other related courses
About the instructor
  • 0 Reviews
  • 1 Students
  • 25 Courses
Student feedback
0
Average rating
  • 0%
  • 0%
  • 0%
  • 0%
  • 0%
Reviews

Material price :

Free

1:1 Online Training Fee: 10000 /-
Contact instructor for demo :