• earn from home in nashik

Our Courses

AITS - CCNA | MCSA | RHCE | Hardware & Networking Training Institute

Career Course

The products and end results of information technology are a part of our daily lives, whether it's the operating systems on mobile phone or the computer networks that automate everyday financial transactions, or the reams of information sought and found on the Internet. So it should come as no surprise that careers in the IT field are expected to grow significantly in the next decade.
If you are searching career opportunity in CCNA | MCSA | RHCE | Hardware | Networking then our career course will be full stop. To Your searching in nashik !!!
we are the best Computer Hardware & Networking institute in Nashik.
Course Duration : 1 Years

computer Hardware

  • Fundamental Of Computer
  • Type Of Computer
  • PC Components, Features & Systems
  • Memory Basics
  • Memory Standards
  • Memory Types
  • Memory Troubleshooting
  • Processor Specifications
  • Cache Memory
  • Processor Hierarchy
  • Multitasking & Multiprocessing
  • Processor Cooling
  • Over Clocking
  • Processor Troubleshooting Techniques
  • Motherboard Basics
  • Types Of Motherboard
  • Identification Of Motherboard Components
  • Chipsets
  • VRM Section
  • Motherboard Troubleshooting Techniques
  • Bios Basics
  • Upgrading Bios
  • Bios Setup
  • Bios Errors
  • Storage Device Basics
  • Types Of Storage Devices
  • Understand Working Of Storage Devices
  • Storage Device Troubleshooting Techniques
  • Data Recovery
  • Printer Basics
  • Types Of Printer
  • Understand Working Of Printer & Scanner
  • Printer Troubleshooting Techniques
  • Cartridge & Toner Refilling
  • SMPS Basics
  • Identify SMPS Connectors
  • Measure Voltage Of Each Wire
  • SMPS Troubleshooting Techniques
  • I/O Devices Basics
  • Types Of I/O Devices
  • Functioning & Specification Of I/O Devices
  • I/O Device Troubleshooting Techniques
  • Display Devices Basics
  • Types Of Display Devices
  • Functioning & Specification Of display Devices
  • Display Devices Troubleshooting Techniques
  • Identification the issue Of Hardware Device
  • Different Ways To Troubleshoot Hardware Issue
  • Disassemble Desktop & Laptop
  • Assemble Desktop & Laptop
  • Configure Fingerprint Attendance System
  • installation & Configuration of CCTV Camera

Operating System

  • Perform a clean installation
  • Upgrade to Windows 10 from previous versions of Windows
  • Migrate user profiles
  • Capture a system image
  • Prepare a system image for deployment
  • Deploy a system image
  • Configure a VHD
  • Configure devices
  • Configure application compatibility
  • Configure application restrictions
  • Configure Internet Explorer
  • Configure IPv4 network settings
  • Configure IPv6 network settings
  • Configure networking settings
  • Configure Windows Firewall
  • Configure remote management
  • Configure shared resources
  • Configure file and folder access
  • Configure user account control (UAC)
  • Configure authentication and authorisation
  • Configure BranchCache
  • Configure BitLocker and BitLocker To Go
  • Configure DirectAccess
  • Configure mobility options
  • Configure remote connections
  • Configure updates to Windows 7
  • Manage disks
  • Monitor systems
  • Configure performance settings
  • Configure backup
  • Configure system recovery options
  • Configure file recovery options

Networking +

  • Networking Basics
  • Types Of Network
  • OSI Model Basics
  • TCP / IP Model Basics
  • Brief Introduction Of OSI Layers
  • Brief Introduction Of TCP / IP Layers
  • Networking Devices Basics
  • Physical Layer Devices
  • Data Link Layer Devices
  • Network Layer Devices
  • Transport Layer Devices

  • Ethernet / Fast Ethernet / Giga Ethernet
  • Communications Mode
  • Token-Ring
  • Wireless Networks
  • Basics Of IP Address
  • IP Address Space Mapping
  • IP Address Operations
  • Troubleshooting IP Address Issues
  • Basics Of TCP/IP Protocols
  • Standard TCP/IP Services
  • Name Services
  • Application Layer Protocols
  • Transport Layer Protocols
  • Network Layer Protocols
  • Data Link Layer Protocols
  • Network Cable Basics
  • Structured Cabling Equipments
  • Installation Of I/O Box
  • Installation Of Patch Panel
  • Ms-Outlook Basics
  • Configure Email Account With Outlook
  • Secure Email Account In Outlook
  • Backup Methods Of Outlook
  • Modem Basics
  • Internet Connection & Sharing
  • Types Of Modem & Technical Specification
  • Always On Connection Configuration
  • Dial-Up Connection Configuration
  • Wireless Network Basics
  • Add-Hoc Configuration
  • Infrastructure Mode Configuration
  • Security Configuration
  • Hotspot configuration
  • N-Computing Basics
  • N-computing Device Configuration
  • N-computing Software Configuration
  • N-computing Troubleshooting

CCNA

  • Recognize the purpose and functions of various network devices such as routers, switches, bridges and hubs
  • Select the components required to meet a given network specification
  • Identify common applications and their impact on the network
  • Describe the purpose and basic operation of the protocols in the OSI and TCP/IP models
  • Predict the data flow between two hosts across a network
  • Identify the appropriate media, cables, ports, and connectors to connect Cisco network
  • devices to other network devices and hosts in a LAN
  • Determine the technology and media access control method for Ethernet networks
  • Identify basic switching concepts and the operation of Cisco switches
  • Configure and verify initial switch configuration including remote access management
  • Verify network status and switch operation using basic utilities such as
  • Describe how VLANs create logically separate networks and the need for routing between them
  • Configure and verify VLANs
  • Configure and verify trunking on Cisco switches
  • Identify enhanced switching technologies
  • Configure and verify PVSTP operation
  • Describe the operation and necessity of using private and public IP addresses for IPv4 addressing
  • Identify the appropriate IPv6 addressing scheme to satisfy addressing requirements in a
  • LAN/WAN environment
  • Identify the appropriate IPv4 addressing scheme using VLSM and summarization to satisfy addressing requirements in a LAN/WAN environment.
  • Describe the technological requirements for running IPv6 in conjunction with IPv4
  • Describe IPv6 addresses
  • Describe basic routing concepts
  • Configure and verify utilizing the CLI to set basic Router configuration
  • Configure and verify operation status of a device interface
  • Verify router configuration and network connectivity using
  • Configure and verify routing configuration for a static or default route given specific routing requirements
  • Differentiate methods of routing and routing protocols
  • Configure and verify OSPF
  • Configure and verify interVLAN routing (Router on a stick)
  • Configure SVI interfaces
  • Manage Cisco IOS Files
  • Configure and verify EIGRP (single AS)
  • Configure and verify DHCP (IOS Router)
  • Describe the types, features, and applications of ACLs
  • Configure and verify ACLs in a network environment
  • Identify the basic operation of NAT
  • Configure and verify NAT for given network requirements
  • Configure and verify NTP as a client.
  • Recognize High availability (FHRP)
  • Configure and verify syslog
  • Describe SNMP v2 and v3
  • Configure and verify network device security features
  • Configure and verify Switch Port Security
  • Configure and verify ACLs to filter network traffic
  • Configure and verify ACLs to limit telnet and SSH access to the router
  • Troubleshoot and correct common problems associated with IP addressing and host configurations
  • Troubleshoot and resolve VLAN problems
  • Troubleshoot and resolve trunking problems on Cisco switches
  • Troubleshoot and resolve ACL issues
  • Troubleshoot and resolve Layer 1 problems
  • Identify and correct common network problems
  • Troubleshoot and resolve spanning tree operation issues
  • Troubleshoot and resolve routing issues
  • Troubleshoot and resolve OSPF problems
  • Troubleshoot and resolve EIGRP problems
  • Troubleshoot and resolve interVLAN routing problems
  • Troubleshoot and resolve WAN implementation issues
  • Monitor NetFlow statistics
  • TS EtherChannel problems
  • 8.1 Identify different WAN technologies
    • 8.1.a Metro ethernet
    • 8.1.b VSAT
    • 8.1.c Cellular 3g/4g
    • 8.1.d MPLS
    • 8.1.e T1/E1
    • 8.1.f ISDN
    • 8.1.g DSL
    • 8.1.h Frame relay
    • 8.1.i Cable
    • 8.1.j VPN
  • 8.2 Configure and verify a basic WAN serial connection
    • 8.2.a Configure and verify a PPP connection between Cisco routers
    • 8.2.b Configure and verify Frame Relay on Cisco routers
    • 8.2.c Implement and troubleshoot PPPoE
  • PC Componants, Features & Systems

Required Exam 70-740

  • Install servers
  • Configure servers
  • Configure local storage
  • Configure file and share access
  • Configure print and document services
  • Configure servers for remote management
  • Create and configure virtual machine settings
  • Create and configure virtual machine storage
  • Create and configure virtual networks
  • Configure IPv4 and IPv6 addressing
  • Deploy and configure Dynamic Host Configuration Protocol (DHCP) service
  • Deploy and configure DNS service
  • Install domain controllers
  • Create and manage Active Directory users and computers
  • Create and manage Active Directory groups and organisational units (OUs)
  • Create Group Policy objects (GPOs)
  • Configure security policies
  • Configure application restriction policies
  • Configure Windows Firewall

Required Exam 70-741

  • Deploy and manage server images
  • Implement patch management
  • Monitor servers
  • Configure Distributed File System (DFS)
  • Configure File Server Resource Manager (FSRM)
  • Configure file and disk encryption
  • Configure advanced audit policies
    Configure DNS zones
  • Configure DNS records
  • Configure virtual private networks (VPN) and routing
  • Configure DirectAccess
  • Configure Network Policy Server
  • Configure NPS policies
  • Configure Network Access Protection (NAP)
  • Configure service authentication
  • Configure domain controllers
  • Maintain Active Directory
  • Configure account policies
  • Configure Group Policy processing
  • Configure Group Policy settings
  • Manage Group Policy objects (GPOs)
  • Configure Group Policy preferences (GPP)

Required Exam 70-742

  • Configure Network Load Balancing (NLB)
  • Configure failover clustering
  • Manage failover clustering roles
  • Manage VM movement
  • Configure advanced file services
  • Implement Dynamic Access Control (DAC)
  • Configure and optimise storage
  • Configure and manage backups
  • Recover servers
  • Configure site-level fault tolerance
  • Implement an advanced Dynamic Host Configuration Protocol (DHCP) solution
  • Implement an advanced DNS solution
  • Deploy and manage IP Address Management (IPAM)
  • Configure a forest or a domain
  • Configure trusts
  • Configure sites
  • Manage Active Directory and SYSVOL replication
  • Implement Active Directory Federation Services (AD FS)
  • Install and configure Active Directory Certificate Services (AD CS)
  • Manage certificates
  • Install and configure Active Directory Rights Management Services (AD RMS)

RHCSA

  • Access a shell prompt and issue commands with correct syntax
  • Use input-output redirection (>, >>, |, 2>, etc.)
  • Use grep and regular expressions to analyze text
  • Access remote systems using ssh
  • Log in and switch users in multiuser targets
  • Archive, compress, unpack, and uncompress files using tar, star, gzip, and bzip2
  • Create and edit text files
  • Create, delete, copy, and move files and directories
  • Create hard and soft links
  • List, set, and change standard ugo/rwx permissions
  • Locate, read, and use system documentation including man, info, and files in /usr/share/doc
  • Boot, reboot, and shut down a system normally
  • Boot systems into different targets manually
  • Interrupt the boot process in order to gain access to a system
  • Identify CPU/memory intensive processes, adjust process priority with renice, and kill processes
  • Locate and interpret system log files and journals
  • Access a virtual machine's console
  • Start and stop virtual machines
  • Start, stop, and check the status of network services
  • Securely transfer files between systems
  • List, create, delete partitions on MBR and GPT disks
  • Create and remove physical volumes, assign physical volumes to volume groups, and create and delete logical volumes
  • Configure systems to mount file systems at boot by Universally Unique ID (UUID) or label
  • Add new partitions and logical volumes, and swap to a system non-destructively
  • Create, mount, unmount, and use vfat, ext4, and xfs file systems
  • Mount and unmount CIFS and NFS network file systems
  • Extend existing logical volumes
  • Create and configure set-GID directories for collaboration
  • Create and manage Access Control Lists (ACLs)
  • Diagnose and correct file permission problems
  • Configure networking and hostname resolution statically or dynamically
  • Schedule tasks using at and cron
  • Start and stop services and configure services to start automatically at boot
  • Configure systems to boot into a specific target automatically
  • Install Red Hat Enterprise Linux automatically using Kickstart
  • Configure a physical machine to host virtual guests
  • Install Red Hat Enterprise Linux systems as virtual guests
  • Configure systems to launch virtual machines at boot
  • Configure network services to start automatically at boot
  • Configure a system to use time services
  • Install and update software packages from Red Hat Network, a remote repository, or from the local file system
  • Update the kernel package appropriately to ensure a bootable system
  • Modify the system bootloader
  • Create, delete, and modify local user accounts
  • Change passwords and adjust password aging for local user accounts
  • Create, delete, and modify local groups and group memberships
  • Configure a system to use an existing authentication service for user and group information
  • Configure firewall settings using firewall-config, firewall-cmd, or iptables
  • Configure key-based authentication for SSH
  • Set enforcing and permissive modes for SELinux
  • List and identify SELinux file and process context
  • Restore default file contexts
  • Use boolean settings to modify system SELinux settings
  • Diagnose and address routine SELinux policy violations

RHCE

  • Use network teaming or bonding to configure aggregated network links between two Red Hat Enterprise Linux systems
  • Configure IPv6 addresses and perform basic IPv6 troubleshooting
  • Route IP traffic and create static routes
  • Use firewalld and associated mechanisms such as rich rules, zones and custom rules, to implement packet filtering and configure network address translation (NAT)
  • Use /proc/sys and sysctl to modify and set kernel runtime parameters
  • Configure a system to authenticate using Kerberos
  • Configure a system as either an iSCSI target or initiator that persistently mounts an iSCSI target
  • Produce and deliver reports on system utilization (processor, memory, disk, and network)
  • Use shell scripting to automate system maintenance tasks
  • Install the packages needed to provide the service
  • Configure SELinux to support the service
  • Use SELinux port labeling to allow services to use non-standard ports
  • Configure the service to start when the system is booted
  • Configure the service for basic operation
  • Configure host-based and user-based security for the service
  • Configure a virtual host
  • Configure private directories
  • Deploy a basic CGI application
  • Configure group-managed content
  • Configure TLS security
  • Configure a caching-only name server
  • Troubleshoot DNS client issues
  • Provide network shares to specific clients
  • Provide network shares suitable for group collaboration
  • Use Kerberos to control access to NFS network shares
  • Provide network shares to specific clients
  • Provide network shares suitable for group collaboration
  • Configure a system to forward all email to a central mail server
  • Configure key-based authentication
  • Configure additional options described in documentation
  • Synchronize time using other NTP peers
  • Install and configure MariaDB
  • Backup and restore a database
  • Create a simple database schema
  • Perform simple SQL queries against a database
ccna training enquiry nashik