May 5, 2015

Software Training Modules

Software  Training


C,C++ Training Modules
C,C++ Training Modules
C Programming Language developed for the UNIX operating system by Dennis Ritchie in 1972 at AT&T Bell Labs in USA. The C programming language is a popular and widely used programming language for creating computer programs. It is the basic for all programming languages. It is Top Down programming approach. Program is divided into functions in C. It is the combination of two older languages BCPL and B.


Some of the features of C Programming are modular programming language,portable and recursive. If you are a programmer, or if you are interested in becoming a programmer, there are a couple of benefits you gain from learning C: You will be able to read and write code for a large number of platforms - everything from microcontrollers to the most advanced scientific systems can be written in C, and many modern operating systems are written in C. The jump to the object oriented C++ language becomes much easier. C++ is an extension of C, and it is nearly impossible to learn C++ without learning C first. By the expert guidance in learning C C++ Training in Chennai we can proudly say we are the top providers. C++ developed in 1980 at AT&T Bell Lab by Bjarne Stroustrup. C ++ is an Objected Oriented Programming Language which has features like Class, Object, Data Encapsulation, Data Abstraction, Inheritance, Polymorphism and Message Passing. C++ is a Bottom Up Approach and program is divided into objects. C++ is the basic for Object Oriented Programming Language.
The following topics are covered in our C C++ Training in Chennai.

C Training Syllabus

  • The C Language and its Advantages
  • The Structure of a C Program
  • Writing C Programs
  • Building an Executable Version of a C Program
  • Debugging a C Program
  • Examining and Running a C Application Program
Data Types and Variables
  • Data Types
  • Operands, Operators, and Arithmetic Expressions
Input/Output Management
  • The Input/Output Concept
  • Formatted Input Function
Control-Flow Statements
  • The Control-Flow Program Statements
  • Looping Statements
  • The Data-checking process
Modular Programming with Functions
  • The C Function
  • Passing Data to Functions
  • Passing an Address to Modify a Value in Memory
  • Using Functions in the Checkbook Program
  • C Standard Library Functions
Arrays, Pointers, and Strings
  • Arrays , Pointers , Strings
  • Using Arrays, Strings, and Pointers in the Checkbook Program
  • Structures
  • Arrays of Structures
  • Passing Structures to Functions
  • Nesting Structures
File Input/Output
  • Command-line Arguments
  • Combining Command-line
The following topics are covered in our C C++ Training in Chennai

C++ Training Syllabus

Introduction to C++
  • Creating a project
  • Writing, compiling and running a program
Variables and data types
  • Expressions
  • Constants
  • Operators
  • Type conversions
Looping constructs: while, do ... while, for loops
  • If ... else statements
  • Switch/case construct
  • Passing arguments
  • Function prototyping
  • Default argument initializers
  • Inline functions
  • Array initialisation
  • Multi-dimensional arrays
  • Character arrays
  • Working with character strings
Storage Classes
  • Global variables
  • Pointer and arrays
  • Pointers to character strings
  • Arrays of pointers
  • Memory slicing
  • Pointers to functions
C++ classes
  • Data members and member functions
  • Creating objects
  • The new and delete operators
  • Friends to a class
  • Class initialisation
Reference types
  • Reference type arguments
Function overloading
  • Operator overloading
Copy constructor
  • Assignment operator
Template classes
  • Static class members
  • File streams
  • Base classes and derived classes
  • Inherited member access
  • Base class initialization
  • Protected members of a class
Virtual functions
  • Virtual destructors
Virtual base classes
  • Virtual base class member access
  • Constructor and destructor ordering
Exception handling
  • try ... throw ... catch block
  • Nested catch handlers
C# Programming
C# Programming
This is a fast paced, in depth course on development with the C# .NET language. The course focuses on the fundamentals of the C#.NET language, as well as important topics such as error handling and debugging, object oriented design, and data access.
Topics Covered
The .NET Framework
  • Over view of the .NET Framework and Common language runtime
  • Class library / API
  • Assemblies
  • What's new in the C# language
The Visual Studio .NET IDE
  • Creating a new C# projects and choise of projects
  • Development envirnoment windows
  • Using control from the Toolbox
  • Using the MSDN Library Help Files
C# Fundamental
  • Properties - read only, run time only, and design - time properties discussed
  • Events - discussion on the point of lifecycle of an objects
  • Default Event & Event firing objects
  • Method - intrinsic behaviors of objects
  • .NET Language Syntax - writing proper code
  • Data Types and Casting
  • Variable Scope
Object Oriented Features
  • Overview of Windows Form
  • Encapsulation, Polymorphism, Inheritance, EXPLAINED
  • Objects Defined - Objects in C# .NET
  • The importance of the new keywords
  • Accessing member variables of an object
  • Using access modifiers
Understanding Classes in C# . NET
  • Building blocks of all .NET applications
  • Classs structure, Class definations
  • Name, access, modifier, extending another class
  • Implementing the interface of another class
  • Class body, initialization and cleanup, use of constructor
  • Objects Instances, Default Constructor, Overloading
  • Method in C# - Signature, Body, Arguments, Return Type
Error Handling and Debuging
  • Understanding C# 's integrated debugging envirnoment
  • Demonstrated use of debugging tools within IDE
  • Errors - discussions of compile, Run time and Logic Error within code
  • Error Handling - writing, creating and logging good exception handling in code
Data Access
  • History of Microsoft data access strategies
  • Rundown of ADO .NET Object Model
  • Accessing Data - Common methods for accessing and displaying data
  • Data Binding
  • Using DataSets
  • Discussion on Microsoft's Data Access Components (MDAC)
Forms Programming
  • Forms Overview
  • Forms as Objects
  • Handling Form Events
  • Using .Net Controls
  • Binding objects to forms
XML and Web Services in .NET
  • What is a Web Service and how is it used in .NET?
  • SOAP - the details on creating SOAP packages for transporting data.
  • 3 Parts to a Web Service
  • Using COM objects with Web Services
  • UDDI - Service for discovering Web Services
Advanced Project Properties and IDE
  • Administering Project Property tabs - controlling project information about .application
  • Administering IDE tabs - Setting-up the environment to be more productive
Compiling and Distributing a .NET Application
  • Deployment Options
  • Installing assemblies into the GAC
.Net Training Modules
.Net Training Modules
.Net 4.0  

In today's world of enterprise applications developments whether it is desktop or web, one of the leaders and visionary is Microsoft.NET technology. The.NET Platform enables innovation in enterprise application development and deployment. It includes wide Variety of rebuild components which allows developers to create robust and powerful applications to address the enterprise requirements. In addition, the Visual Studio.NET IDE used for rapid.NET - enabled applications development enables quick development enables quick development, trouble - free deployment, installation and security.


This program provides a strong foundation in object - oriented programming approaches and the fundamentals of C# Programming language .This program also familiarizes the student with structured Query Language (SQL) and provides sufficient knowledge to query and manage a database , using SQL Server .Student gets exposed to windows based GUI Application development using rapid Application Development (RAD) on the .NET framework . Further, one develops skills on database connectivity technologies such as ADO.NET to create data centric application on. NET platform. This program also provides an understanding to develop and Web applications using ASP.NET. It focuses on building distributed applications by using Visual Studio.

Duration: 40hours



Visual Studio.Net Framework & C# Language:

  • Why .Net & what is .Net?
  • Introduction to .Net Framework
  • Overview of Visual Studio 2010
  • Introduction to C# Programming Language
  • Introduction to C#.Net Programming Fundamentals
  • Control Flow Structure in C#.Net
  • Working with Object Oriented Programming
  • Understanding Delegates & Events
  • Understanding Collections & Generics
  • Understanding .Net Assemblies
  • File Handling in
  • Multi-Threading in
  • Serialization

Windows Application Development using Visual Studio.Net:

  • Programming Windows Forms
  • Configuring Standard Controls
  • Building Menus
  • Working with DataBound Controls
  • Dialog Boxes & Forms Inheritance
  • Working with MDI Application
  • Customizing Forms & Controls
  • Reflection
  • Threading
  • Application Domains
  • Windows Services
  • Remoting

Data Access Applications using Visual Studio.Net:

  • Introduction to ADO.Net
  • Introduction to Transact SQL Programming
  • Connected & Disconnected Architecture
  • Working with ADO.Net Commands
  • Working with ADO.Net Datasets
  • Working with using Stored Procedure
  • Working with ADO.Net Transactions
  • Introduction to LINQ
  • Working with LINQ to Classes
  • Working with LINQ to Objects
  • Working with LINQ to SQL
  • Working with ADO.Net Entity Framework

Web Applications Development using Visual Studio.Net:

  • Overview of ASP.Net Framework
  • Working with Page Object Model
  • Working with ASP.Net Server Controls
  • Validation for ASP.Net Pages
  • Master Pages , Skins & Themes in
  • State Management in ASP.Net
  • Datagrid, DataList, & Repeater Control
  • User Control & Custom Control in
  • Data Binding in ASP.Net
  • Personalization
  • Working with XML in ASP.Net
  • State Management in
  • Caching
  • Modules & Handlers in ASP.Net
  • Configuration & Instrumentation
  • ASP.Net Security
  • ASP.Net Ajax
  • Working with Webparts in ASP.Net
  • Working with Web Services in ASP.Net
  • Deployment

Windows Foundation 3.5 Features:

  • WCF
  • WWF

.Net Framework 4.0 Features:

  • Types & Members
  • MVC 3
JAVA Programming
JAVA Programming
Java is platform independent, reliable Programming language introduced by sun systems, used mainly to Develop Internet applications and applets. Java is used to create web-based applications and allows user interaction on the Internet. Java allows us to have animation, audio and video clippings in our web page. Java Programming helps in writing Programs using which one can connect to any computer on the Internet.
  • Introduction to Object Oriented Programming.
  • Java Basic: Data types, Object, Arrays, Strings, Operators, Statements, Exception Handling (try-catch-finally).
  • Classes & Objects in Java: Constructors, destructors, class methods, extending a class, overriding methods, visibility modifiers, abstract classes and interfaces.
  • Applets & Event Handling: Drawing graphics, reading apple parameters, animation.
  • Graphical User Interface: Introduction to GUI components and event handling
  • Introduction to Swing Package.
  • Input & Output: File operations like creating, reading and modifying a file.
  • Database Connectivity ( JDBC ).
  • Advanced Graphics: Smooth Animation and keeping track of images.
  • Network Engineering: URL contents downloading, using URL connection, Introduction to sockets and Client & Server Programming using connection objects.
MySql for Database Administrators
MySql for Database Administrators Modules
MySql for Database Administrators Modules
The MySQL for Database Administrators training is designed for DBAs and other database professionals. Expert Oracle University instructors will teach you how to install and configure the MySQL Server, set up replication and security, perform database backups and performance tuning and protect MySQL databases.
  • MySQL Overview, Products, Services
  • MySQL Services and Support
  • Supported Operating Services
  • MySQL Certification Program
  • Training Curriculum Paths
  • MySQL Documentation Resources
MySQL Architecture
  • The client/server model
  • Communication protocols
  • The SQL Layer
  • The Storage Layer
  • How the server supports storage engines
  • How MySQL uses memory and disk space
  • The MySQL plug-in interface
System Administration
  • Choosing between types of MySQL distributions
  • Installing the MySQL Server
  • The MySQL Server installation file structure
  • Starting and stopping the MySQL server
  • Upgrading MySQL
  • Running multiple MySQL servers on a single host
Server Configuration
  • MySQL server configuration options
  • System variables
  • SQL Modes
  • Available log files
  • Binary logging
Clients and Tools
  • Available clients for administrative tasks
  • MySQL administrative clients
  • The mysql command-line client
  • The mysqladmin command-line client
  • The MySQL Workbench graphical client
  • MySQL tools
  • Available APIs (drivers and connectors)
Data Types
  • Major categories of data types
  • Meaning of NULL
  • Column attributes
  • Character set usage with data types
  • Choosing an appropriate data type
Obtaining Metadata
  • Available metadata access methods
  • Using the available commands to view metadata
  • Differences between SHOW statements and INFORMATION_SCHEMA tables
  • The mysqlshow client program
  • Using INFORMATION_SCHEMA queries to create shell commands and SQL statements
Transactions and Locking
  • Using transaction control statement to run multiple SQL statements concurrently
  • The ACID properties of transactions
  • Transaction isolation levels
  • Using locking to protect transactions
Storage Engines
  • Storage engines in MySQL
  • InnoDB storage engine
  • InnoDB system and file-per-table tablespaces
  • NoSQL and the Memcached API
  • Configuring tablespaces efficiently
  • Using foreign keys to attain referential integrity
  • InnoDB locking
  • Features of available storage engines
  • Partitioning and its use in MySQL
  • Reasons for using partitioning
  • Types of partitioning
  • Creating partitioned tables
  • Subpartitioning
  • Obtaining partition metadata
  • Modifying partitions to improve performance
  • Storage Engine Support of Partitioning
User Management
  • Requirements for user authentication
  • Using SHOW PROCESSLIST to show which threads are running
  • Creating, modifying and dropping user accounts
  • Alternative authentication plugins
  • Requirements for user authorization
  • Levels of access privileges for users
  • Types of privileges
  • Granting, modifying and revoking user privileges
  • Recognizing common security risks
  • Security risks specific to the MySQL installation
  • Security problems and counter-measures for network, operating system, filesystem and users
  • Protecting your data
  • Using SSL for secure MySQL server connections
  • How SSH enables a secure remote connection to the MySQL server
  • Finding additional information for common security issues
Table Maintenance
  • Types of table maintenance operations
  • SQL statements for table maintenance
  • Client and utility programs for table maintenance
  • Maintaining tables for other storage engines
Exporting and Importing Data
  • Exporting Data
  • Importing Data
Programming Inside MySQL
  • Creating and executing Stored Routines
  • Describing stored routine execution security
  • Creating and executing triggers
  • Creating, altering and dropping events
  • Event execution scheduling
MySQL Backup and Recovery
  • Backup basics
  • Types of backup
  • Backup tools and utilities
  • Making binary and text backups
  • Role of log and status files in backups
  • Data Recovery
  • Managing the MySQL Binary Log
  • MySQL replication threads and files
  • Setting up a MySQL Replication Environment
  • Designing Complex Replication Topologies
  • Multi-Master and Circular Replication
  • Performing a Controlled Switchover
  • Monitoring and Troubleshooting MySQL Replication
  • Replication with Global Transaction Identifiers (GTIDs)
Introduction to Performance Tuning
  • Using EXPLAIN to Analyze Queries
  • General Table Optimizations
  • Monitoring status variables that affect performance
  • Setting and Interpreting MySQL server Variables
  • Overview of Performance Schema
  • Course Overview
  • MySQL Curriculum
  • Course Evaluation
  • Thank You!
  • Q&A Session
SQL Server Database Administration
SQL Server Database Administration Modules
SQL Server Database Administration Modules
The History of SQL Server and relational databases
  • Relational database history
  • The evolution of SQL Server
  • SQL Server and ANSI standards
Installing and configuring SQL Server
  • Pre-installation steps
  • Installing SQL Server
  • Configuring the run-time SQL Server system
  • Patching SQL Server - Service packs
SQL Server data storage management
  • SQL Server file management architecture
  • Creating database files
  • Creating SQL Server log files
  • Using SQL Server file groups
Managing data with the DTS utility
  • Using DTS to export and import SQL Server table data
SQL Server Security management
  • Windows security management for the server
  • Windows authentication mode
  • SQL Server rights and role management
SQL Server Backup & Recovery
  • Overview of SQL Server backup & recovery
  • Incremental backups
  • Restoring a SQL Server database
  • Standby database overview
  • Shipping SQL Server log files to standby databases
SQL Server database Replication
  • Microsoft replication architectures
  • Creating a replication topology
  • Configuring SQL Server replication
SQL Server Job scheduling
  • Common database scheduled jobs
  • Configuring SQLMail
  • Setting SQL Server and server alert thresholds
  • Creating customized error conditions
  • Scheduling multi-step job streams
  VIII. Ratio Analysis - Techniques for quickly getting a bird's eye view of performance  Key performance ratios can quickly help a SQL Server DBA understand how well their overall system is performing. This chapter provides details on what ratios a DBA needs to monitor, along with recommendations for what to do when key performance metrics are out of line.  
  1. PLM Steps 3 and 4 - Using History to Prepare for the Future
  Many SQL Server DBAs work in a reactive mode, which means they do little to plan for the future needs of the databases they oversee. This chapter discusses the importance of historical trend analysis, what key metrics should be tracked, and how to use historical data to forecast future needs.   Performance Tuning for the SQL Server DBA
  • SQL Server monitoring for performance
  • SQL Server startup parameter tuning
  • T-SQL tuning
  • SQL tuning for SQL Server
  • Diagnosing storage and system problems
  • Diagnosing session and O/S issues
Oracle 11g DBA Certified Associate
Oracle 11g DBA Certified Associate Modules
Oracle 11g DBA Certified Associate Modules
Oracle 11g Certified Associate Exploring the Oracle Database Architecture
  • Oracle Database Architecture Overview
  • Interacting with an Oracle Database
  • Process Architecture
  • Database Storage Architecture
  • Logical and Physical Database Structures
  • Tablespaces and Data Files
  • SYSTEM and SYSAUX Tablespaces
  • Segments, Extents, and Blocks
Preparing the Database Environment
  • Tasks of an Oracle Database Administrator
  • Tools Used to Administer an Oracle Database
  • Installation: System Requirements
  • Optimal Flexible Architecture (OFA)
  • Setting Environment Variables
  • Oracle Universal Installer (OUI)
  • Database Configuration Options
  • Advanced Installation Options
Creating an Oracle Database
  • Planning the Database
  • Configuring the Listener
  • Using the DBCA to Create a Database
  • Password Management
  • Creating a Database Design Template
  • Using the DBCA to Delete a Database
  • Using DBCA For Additional Tasks
Managing the Oracle Instance
  • Management Framework
  • Oracle Enterprise Manager
  • Initialization Parameter
  • Database Startup and Shutdown
  • Shutdown Modes
  • Viewing the Alert History
  • Using Trace Files
  • Data Dictionary: Overview
Configuring the Oracle Network Environment
  • Oracle Net Services & Listener
  • Establishing Net Connections
  • Tools for Configuring and Managing the Oracle Network
  • Net Services Administration Pages
  • Naming Methods
  • Directory Naming
  • SGA and PGA
  • When Not to Use a Shared Server
Managing Database Storage Structures
  • Storage Structures
  • How Table Data Is Stored
  • Anatomy of a Database Block
  • Space Management in Tablespaces
  • Tablespaces in the Preconfigured Database
  • Actions with Tablespaces
  • Oracle Managed Files (OMF)
  • ASM: Concepts
Administering User Security
  • Database User Accounts
  • Predefined Accounts: SYS and SYSTEM
  • Administrator Authentication
  • Benefits of Roles
  • Predefined Roles
  • Implementing Password Security Features
  • Assigning Quota to Users
Managing Schema Objects
  • What Is a Schema?
  • Accessing Schema Objects
  • Specifying Data Types in Tables
  • Creating and Modifying Tables
  • Understanding Data Integrity
  • Indexes & Views
  • Sequences
  • Temporary Tables
Managing Data and Concurrency
  • Manipulating Data Through SQL
  • PL/SQL
  • Administering PL/SQL Objects
  • Functions, Procedures, Packages & Triggers
  • Data Concurrency
  • Enqueue Mechanism
  • Resolving Lock Conflicts Using SQL
  • Deadlocks
Managing Undo Data
  • Data Manipulation
  • Transactions and Undo Data
  • Undo Data Versus Redo Data
  • Configuring Undo Retention
  • Guaranteeing Undo Retention
  • Using the Undo Advisor
  • Viewing System Activity
Implementing Oracle Database Security
  • Industry Security Requirements
  • Principle of Least Privilege
  • Monitoring for Compliance
  • Value-Based Auditing
  • Fine-Grained Auditing
  • DBA Auditing
  • Security Updates
  • Applying Security Patches
Database Maintenance
  • Introducing Terminology
  • Optimizer Statistics
  • Automatic Workload Repository (AWR)
  • Automatic Database Diagnostic Monitor (ADDM)
  • Advisory Framework
  • Automated Maintenance Tasks
  • Server-Generated Alerts
  • Reacting to Alerts
Performance Management
  • Performance Monitoring
  • Managing Memory Components
  • Enabling Automatic Memory Management (AMM)
  • Automatic Shared Memory Advisor
  • Using Memory Advisors
  • Dynamic Performance Statistics
  • Troubleshooting and Tuning Views
  • Invalid and Unusable Objects
Backup and Recovery Concepts
  • Part of Your Job
  • Statement Failure
  • User Error
  • Understanding Instance Recovery
  • Phases of Instance Recovery
  • Using the MTTR Advisor
  • Media Failure
  • Archive Log Files
Performing Database Backups
  • Backup Solutions: Overview
  • Oracle Secure Backup
  • User-Managed Backup
  • Terminology
  • Recovery Manager (RMAN)
  • Configuring Backup Settings
  • Backing Up the Control File to a Trace File
  • Monitoring the Flash Recovery Area
Performing Database Recovery
  • Opening a Database
  • Data Recovery Advisor
  • Loss of a Control File
  • Loss of a Redo Log File
  • Data Recovery Advisor
  • Data Failures
  • Listing Data Failures
  • Data Recovery Advisor Views
Moving Data
  • Moving Data: General Architecture
  • Directory Object: Overview
  • SQL*Loader: Overview
  • Data Pump: Overview
  • Performance Initialization Parameters
  • Using Enterprise Manager to Monitor Data Pump Jobs
  • Data Dictionary
Enhancing Database Capabilities
  • Using EM Support Workbench
  • Create a Service Request
  • Package and upload diagnostic data to Oracle Support
  • Track the SR and Implement Repairs
  • Incident Packaging Configuration
  • Working with Oracle Support
  • MetaLink Integration
  • Managing Patches
Oracle 11g DBA Certified Professional
Oracle 11g DBA Certified Professional Modules
Oracle 11g DBA Certified Professional Modules
Database Architecture and ASM
  • Oracle Database Architecture Overview
  • ASM General Architecture
  • Creating an ASM Instance
  • Using Enterprise Manager to Manage ASM Users
  • ASM Storage Concepts
  • The ASMCMD Utility
  • ASM Scalability and Performance
Configuring for Recoverability
  • Purpose of Backup and Recovery Functionality
  • Typical Backup and Recovery Tasks
  • Oracle Backup and Recovery Solutions
  • Using Recovery Manager (RMAN)
  • Using a Flash Recovery Area
  • Flash Recovery Area Space Management
Using the RMAN Recovery Catalog
  • RMAN Repository Data Storage: Comparison of Options
  • Storing Information in the Recovery Catalog
  • Registering a Database in the Recovery Catalog
  • Recovery Catalog Resynchronization: Concepts
  • Using RMAN Stored Scripts
  • Backing Up and Recovering the Recovery Catalog
  • Using a Virtual Private Catalog
Configuring Backup Specifications
  • Using RMAN to Create Backups
  • Configuring Persistent Settings for RMAN
  • Using Enterprise Manager to Configure RMAN Settings
  • Control File Auto-backups
  • Managing Persistent Settings
  • Configuring Devices for Backup
  • Configuring and Allocating Channels for Use in Backups
  • Configuring Backup Optimization
Creating Backups
  • Creating an Oracle-Suggested Backup
  • Creating Backup Sets & Image Copies
  • Creating a Whole Database Backup
  • RMAN Backup Types
  • Monitoring Block Change Tracking
  • Creating Duplex Backup Sets
  • Archival Backups: Concepts
  • Encrypting Backups
Performing User-Managed Backup and Recovery
  • Restoring and Recovering
  • Causes of File Loss
  • Critical Versus Non-critical
  • Recovering from a TEMPFILE Loss
  • Re-creating Indexes
  • Recovering from a Lost Index Tablespace
  • Authentication Methods for Database Administrators
  • Recovering a Read-Only Tablespace
Using RMAN to Perform Recovery
  • Using RMAN RESTORE and RECOVER Commands
  • Performing Recovery Using Enterprise Manager
  • Recovery Using Incrementally Updated Backups
  • Perform a Fast Switch to Image Copies
  • Restoring and Recovering the Database on a New Host
  • Performing Disaster Recovery
Using RMAN to Duplicate a Database
  • Using RMAN to Create a Duplicate Database
  • Creating a Duplicate Database
  • Creating an Initialization Parameter File for the Auxiliary Instance
  • Allocating Auxiliary Channels
  • Understanding the RMAN Duplication Operation
  • Using EM to Clone a Database
  • Cloning a Running Database
Performing Tablespace Point-in-time Recovery
  • Tablespace Point-in-Time Recovery (TSPITR) Concepts
  • Tablespace Point-in-Time Recovery: Architecture
  • Understanding When to Use TSPITR
  • Determining the Tablespaces for the Recovery Set
  • Using Enterprise Manager to Perform TSPITR
  • Understanding TSPITR Processing
  • Troubleshooting RMAN TSPITR
Monitoring and Tuning RMAN
  • Parallelization of Backup Sets
  • Monitoring RMAN Sessions
  • Interpreting RMAN Message Output
  • Using the DEBUG Option
  • Tuning RMAN
  • RMAN Multiplexing
  • Comparing Synchronous and Asynchronous I/O
  • Tape Subsystem Performance Rules
Using Flashback Technology
  • Flashback Technology
  • Transactions and Undo
  • Guaranteeing Undo Retention
  • Preparing Your Database for Flashback
  • Flashback Drop and the Recycle Bin
  • Using Flashback Technology to Query Data
  • Possible Workflow
  • Flashback Transaction Wizard
Using Flashback Database
  • Flashback Table
  • Enabling Row Movement on a Table
  • Enabling Row Movement on a Table
  • Flashback Database Architecture
  • Configuring Flashback Database
  • Performing Flashback Database Using EM
  • Flashback Database Considerations
  • Flashback Data Archive
Diagnosing the Database
  • Automatic Diagnostic Workflow & Repository
  • Location for Diagnostic Traces
  • Viewing the Alert Log Using Enterprise Manager
  • The Support Workbench and Oracle Configuration Manager
  • Create a Service Request
  • Package and upload diagnostic data to Oracle Support
  • Incident Packaging Configuration
  • Health Monitor Overview & Data Recovery Advisor
Managing Memory
  • Oracle Memory Structures
  • Automatic Memory Management Overview
  • Oracle Database Memory Parameters
  • Auto Memory Parameter Dependency
  • Automatic Shared Memory Management: Overview
  • Automatic PGA Memory Management
  • Using the Memory Advisor to Size the SGA
  • Memory Tuning Guidelines for the Library Cache
Managing Database Performance
  • Tuning Activities
  • Performance Planning & Performance Tuning Methodology
  • Instance Tuning
  • Troubleshooting and Tuning Views
  • Automatic Workload Repository
  • SQL Tuning & SQL Advisors
  • Using the SQL Tuning Advisor
  • SQL Access Advisor: Overview
Using the Segment Advisor
  • Space Management: Overview
  • Proactive Tablespace Monitoring
  • Thresholds and Resolving Space Problems
  • Monitoring Tablespace Space Usage
  • Shrinking Segments
  • Space Reclamation with ASSM
  • Automatic Segment Advisor
  • Minimum Compatibility Level
Managing Resources
  • Database Resource Manager: Overview
  • Database Resource Manager Concepts
  • Accessing Resource Plans
  • Default Maintenance Resource Manager Plan
  • Creating Consumer Groups
  • Resource Allocation Methods for Resource Plans
  • Resource Allocation Methods for Resource Plans
  • Monitoring the Resource Manager
Automating Tasks with the Scheduler
  • Simplifying Management Tasks
  • Key Components and Steps
  • Creating an Event-Based Schedule
  • Creating Complex Schedules
  • Creating Job Chains
  • Creating Job Chains
Administering the Scheduler
  • Advanced Scheduler Concepts
  • Job Classes
  • Windows
  • Prioritizing Jobs Within a Window
  • Remote Jobs
  • Installing the Scheduler Agent
  • Dictionary Views Supporting Remote Jobs
  • Globalization Support Features
  • What Every DBA Needs to Know
  • Understanding Unicode
  • Database Character Sets and National Character Sets
  • Language- and Territory-Dependent Parameters
  • Linguistic Searching and Sorting
  • Case- and Accent-Insensitive Search and Sort
  • NLS Data Conversion with Oracle Utilities
Oracle 11g RAC Administration
Oracle 11g RAC Administration Modules
Oracle 11g RAC Administration Modules
RAC Installation  
  • Installing Automatic Storage Management
  • Configure ASM Storage
  • Install the Database Software
Database Creation
  • Management Agent Installation
  • Storage Options for Database Files
  • Create the Database
  • Single Instance to RAC Conversion
RAC DB Administration
  • Cluster Database Instance Administration
  • Topology Viewer
  • Automatic Undo Management and RAC
  • Quiescing RAC Databases
  • Transparent Data Encryption and Wallets in RAC
  • ASM Instance and Crash Recovery in RAC
Backup and Recover a RAC DB
  • Protecting Against Media Failure
  • Oracle Recovery Manager
RAC DB Monitoring and Tuning
  • CPU and Wait Time Tuning Dimensions
  • Dynamic Reconfiguration
  • ADDM Analysis
  • Workload Dispatching
  • High Availability of Services in RAC
  • Services and Resource Manager with EM
  • Change Service Thresholds
  • Using Distributed Transactions with RAC
High Availability of Connections
  • Fast Application Notification
  • Load Balancing Advisory
  • Transparent Application Failover
Oracle Clusterware Administration
  • Controlling the Oracle Clusterware Stack
  • Back Up and Recover Your Voting Disks
  • Back Up and Recover Oracle Cluster Registry
  • Prevent Automatic Instance Restarts
Diagnosing the Oracle Clusterware components
  • Oracle Clusterware Main Log Files
  • RAC Diagnostic Infrastructure
Node Addition/Removal
  • Add and Delete Nodes and Instances
  • Clone Oracle Clusterware
Design for High Availability
  • Maximum Availability Architecture
  • RAC and Data Guard Topologies
  • Extended RAC Connectivity
  • Extended RAC disk mirroring
  • Patch your RAC system in a rolling fashion
  • Extend your cluster using Grid Control
Patch Oracle Clusterware
MySql for Database Developers
MySql for Developer Modules
MySql for Developer Modules
This MySQL for Developers training teaches developers how to plan, design and implement applications using MySQL. Expert Oracle University instructors will teach you through realistic examples, interactive instruction and hands-on exercises using Java and PHP languages.
  • MySQL Overview, Products, Services
  • MySQL Services and Support
  • Supported Operating Services
  • MySQL Certification Program
  • Training Curriculum Paths
  • MySQL Documentation Resources
Client and Server Concepts
  • The MySQL client/server model
  • Communication protocols
  • Storage engines
  • How MySQL uses memory and disk space
  • The mysql command line client
  • Using SQL scripts
  • How MySQL uses databases
  • Installing and populating the class database
MySQL Clients
  • Invoking client programs
  • Features of the mysql client
  • Modifying client behavior with options
  • Configuring client behaviour with option files
  • MySQL Workbench
  • MySQL Utilities
MySQL Connectors and APIs
  • MySQL connectors
  • Oracle and community connectors
  • Why write custom programs?
  • Connecting to MySQL server by using Java and PHP
  • Embedding a MySQL database in a program
  • MySQL and NoSQL
  • InnoDB integration with memcached
Data Types
  • The major categories of data types
  • Character sets and collation
  • Choosing the correct data type
  • The spatial data type extensions
SQL Expressions
  • Components of expressions
  • Applying numeric, string, spatial, and temporal values in expressions
  • Pattern matching for string expressions
  • The properties of NULL values
  • Functions in expressions
  • Combining result sets from multiple queries
  • Comments in SQL statements
Obtaining Metadata
  • Metadata access methods
  • Metadata commands
  • SHOW statements
  • The MySQL data directory
  • Database design best practices
  • Normalization
  • Choosing identifiers for database entities
  • Creating a database
  • Modifying a database
  • Removing a database
  • Table properties
  • Column options
  • Creating a table
  • Modifying a table
  • Displaying table information
  • Renaming a table
  • Removing a table
  • Foreign Keys
Manipulating Table Data
  • Inserting data into a table
  • Deleting data from a table
  • Updating data in a table
  • Replacing data in a table
  • Truncating table data
  • Using transactions for concurrent updates
  • The ACID transaction rules
  • Isolating transactions
Joining Tables
  • Table join concepts
  • The different join methods
  • Cartesian joins
  • Outer and inner joins
  • Joining a table to itself
  • Column references and table aliases
  • Multi-table UPDATE and DELETE statements
  • Nesting queries
  • Correct positioning of subqueries
  • Using the appropriate type of subquery
  • Using the correct SQL syntax to create subqueries
  • Quantifiers for subquery comparisons
  • What are views?
  • Reasons for using views
  • Creating a view
  • Checking a view
  • Changing and removing a view
  • Setting view privileges
Prepared Statements
  • Reasons for using prepared statements
  • Using prepared statements from the mysql command-line client
  • Preparing, executing, and deallocating prepared statements
  • Using prepared statements in code, with Connectors
Stored Routines
  • Stored procedures and stored functions
  • Creating and executing stored routines
  • Examining an existing stored routine
  • Deleting an existing stored routine
  • Assigning variables in stored routines
  • Flow control statements
  • Cursor usage and limitations
  • Limitations of stored routines and stored functions
  • What are triggers?
  • When to use triggers
  • Creating triggers
  • Deleting triggers
  • Scheduling events
Handling Errors and Warnings
  • The effect of SQL modes on error output
  • Dealing with missing or invalid data values
  • Interpreting error messages
  • Using the SHOW WARNINGS and SHOW ERRORS statements
  • MySQL diagnostic information
  • The perror utility program
  • Handling errors when coding with Connectors
  • The role of the query optimizer
  • Strategies available for optimizing queries
  • Using the EXPLAIN statement to predict query performance
  • Using indexes for optimization
  • Describing the role of MySQL Enterprise Monitor in query optimization
  • Course Overview
  • MySQL Curriculum
  • Course Evaluation
  • Thank You!
  • Q&A Session
Oracle 11g PL/Sql
Oracle PL/SQL Developer Modules
Oracle PL/SQL Developer Modules
  • PL/SQL Environment
  • Benefits of PL/SQL
  • Stored Procedures, Functions, and Triggers
  • Stored Procedures and SQL Scripts

Structure of a PL/SQL Block

  • Header Section
  • Declaration Section
  • Execution Section

Creating a PL/SQL Procedure Creating a PL/SQL Function PL/SQL Variables and Constants

  • Declaring PL/SQL Variables
  • Declaring PL/SQL Constants
  • Assigning Values to Variables
  • Using Variables

Control Structures in PL/SQL

  • IF Statement
  • Loops
  • Cursors
  • Nested Loops

Error Handling

  • Exceptions
  • System Defined Exceptions
  • Programmer Defined Exceptions

Other PL/SQL Tools

  • PL/SQL Packages
  • Triggers
  • Views used with PL/SQL
PHP Scripting
PHP is a widely-used general-purpose scripting language that is especially suited for web development and can be embedded into HTML. PHP's language syntax is similar to C's and Perl's. It generally runs on a web server like Apache which is configured to take PHP code as input and create web page content as output. It can be deployed on most web servers and on almost every operating system and platform free of charge. PHP is installed on more than 20 million websites and 1 million web servers.
Topics Covered
Getting Started with PHP-Variables Assigning Simple Variables within a Script
  • Delimiting strings
  • Assigning arrays within a script
  • Assigning two-dimensional arrays in a script
Accessing Variables Passed from the Browser
  • HTML forms variables
  • Passing arrays
  • Cookies
  • Sessions
Testing Variables
  • isset0
  • empty0
  • is_null0
  • is_int0
  • is_double0
  • is_string0
  • is_array0
  • is_bool0
  • is_object0
  • is_resource0
  • is_scalar0
  • gettype0
Changing Variable Types
  • Variable Variables
Control Structures The if Statement
  • Determining true or false in PHP
  • Comparison operators
  • Logical operators
  • Complex if statement
  • if…else statements
  • if…elseif statements
  • Loops
  • White…
  • do…while
  • for
  • foreach
  • continue and break
PHP’s Built-in Functions
  • Function Basics
  • Arguments
  • Return values
Function Documentation
  • Important PHP Functions
  • String handling functions
Writing Organized and Readable Code
  • Indenting
  • Code blocks
  • Function calls
  • SQL statements
  • Include0 and Require0
  • Include_once0 and Require_once0
User-Defined Functions
  • Function basics
  • Returning values
  • Using a variable number of arguments
  • Variable scope
Object-Oriented Programming
  • Classes, Continued
  • Object cloning
  • Destructors
  • Exceptions
HTML CSS Designer
  • What is internet ?
  • Overview of Web Browser
  • URLs (Uniform Resource Locator)
  • World Wide Web (www)
  • HTML Tools
HTML Document And Basic Tags
  • Writing Tools
  • Structure of an HTML document
  • Basic tags and Attributes
  • Body Attributes
Text editing
  • Text attributes
  • Marquee tag & its attributes
  • Headings
  • Font
  • Paragraph, Line Break
  • Ordered and Unordered Lists
  • Blockquote
  • Image formats
  • Image attributes
  • Alignment of images
  • Image mapping
  • Create a table
  • Combine cells in a row or column
  • Create a form
  • Accept input and Submit
  • Create a frame
  • Working with frames
Special Things
  • Special Characters
  • Different graphic formats
  • Interlacing/Progresive Display
  • Putting your site Online
Working smart with HTML
JAVA2 Enterprise Edition (J2EE)
J2EE Training
J2EE Training
Module 1- Core Java
  • Introduction to Java
  • Installation and Architecture of JVM
  • OOPS
  • Eclipse IDE
  • Packages
  • Util Package
  • Collections Framework
  • IO Streams
  • Multi Threading
  • Networking
  • Overview of SCJP
Module 2- J2EE
  • Introduction DBMS,RDBMS,ORDBMS and JDBC
  • Introduction to WebServers and Application Servers(Weblogic,Websphere,Tomcat)
  • Servlets
  • JSP
  • MVC with Struts
  • RMI
  • EJB 3.0
  • JMS
  • XML and Webservices
  • Java Mail
  • Design Patterns
  • Over view of SCWCD
Module 3- Hiberante and Spring
  • Introduction to ORM mapping
  • Features of Hibernate
  • Configuration
  • Persistant classes
  • Basic O-R Mappings
  • Association Mappings
  • HQL(Hibernate Query Language)
  • Caching in Hibernate
  • Introduction to Spring Framework
  • Design Patterns used in Spring Framework
  • Modules in Spring Framework
  • Implementation of each module
  • Integration with struts
  • Integration with servlets & jsp's
  • Integration with Hibernate
Data Center Solutions


Red System Administration I
Red Hat System Administration I Modules
Red Hat System Administration I Modules
Access the command line
Log in to a Linux system and run simple commands using the shell.
Manage files from the command line
Copy, move, create, delete, and organize files from the bash shell prompt.
Get help in Red Hat Enterprise Linux
Resolve problems by using online help systems and Red Hat support utilities.
Create, view, and edit text files
Create, view, and edit text files from command output or in an editor.
Manage local Linux users and groups
Manage local Linux users and groups, and administer local password policies.
Control access to files with Linux file system permissions
Set Linux file system permissions on files and interpret the security effects of different permission settings.
Monitor and manage Linux processes
Obtain information about the system, and control processes running on it.
Control services and daemons
Control and monitor network services and system daemons using systemd
Configure and secure OpenSSH service
Access and provide access to the command line on remote systems securely using OpenSSH
Analyze and store logs
Locate and accurately interpret relevant system log files for troubleshooting purposes.
Manage Red Hat Enterprise Linux networking
Configure basic IPv4 networking on Red Hat Enterprise Linux systems.
Archive and copy files between systems
Archive files and copy them from one system to another.
Install and update software packages
Download, install, update, and manage software packages from Red Hat and yum package repositories.
Access Linux file systems
Access and inspect existing file systems on a Red Hat Enterprise Linux system.
Use virtualized systems
Create and use Red Hat Enterprise Linux virtual machines with KVM and libvirt.
Comprehensive review
Practice and demonstrate the knowledge and skills learned in this course.
Red System Administration II RHCSA
Red Hat System Administration III Modules
Red Hat System Administration III Modules
Control services and daemons
Review how to manage services and the boot-up process using systemctl
Manage IPv6 networking
Configure and troubleshoot basic IPv6 networking on Red Hat Enterprise Linux systems
Configure link aggregation and bridging
Configure and troubleshoot advanced network interface functionality including bonding, teaming, and local software bridges
Control network port security
Permit and reject access to network services using advanced SELinux and firewalld filtering techniques
Manage DNS for servers
Set and verify correct DNS records for systems and configure secure DNS caching
Configure email delivery
Relay all email sent by the system to an SMTP gateway for central delivery
Provide block-based storage
Provide and use networked iSCSI block devices as remote disks
Provide file-based storage
Provide NFS exports and SMB file shares to specific systems and users
Configure MariaDB databases
Provide a MariaDB SQL database for use by programs and database administrators
Provide Apache HTTPD web service
Configure Apache HTTPD to provide Transport Layer Security (TLS)-enabled websites and virtual hosts
Write Bash scripts
Write simple shell scripts using Bash
Bash conditionals and control structures
Use Bash conditionals and other control structures to write more sophisticated shell commands and scripts
Configure the shell environment
Customize Bash startup and use environment variables, Bash aliases, and Bash functions
Linux containers preview
Preview the capabilities of Linux containers, Docker, and other related technologies in Red Hat Enterprise Linux 7
Comprehensive review
Practice and demonstrate knowledge and skills learned in Red Hat System Administration III
Red System Administration III RHCE
Red Hat System Administration II Mudules
Red Hat System Administration II Mudules
Automate installation with Kickstart
Automate the installation of Red Hat Enterprise Linux systems with Kickstart.
Use regular expressions with grep
Write regular expressions that, when partnered with grep, will allow you to quickly isolate or locate content within text files.
Create and Edit text files with vim
Introduce the vim text editor, with which you can open, edit, and save text files.
Schedule future Linux tasks
Schedule tasks to automatically execute in the future.
Manage priority of Linux processes
Influence the relative priorities at which Linux processes run.
Control access to files with access control lists (ACL)
Manage file security using POSIX access control lists.
Manage SELinux security
Manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise.
Connect to network-defined users and groups
Configure systems to use central identity management services.
Add disks, partitions, and file systems to a Linux system
Manage simple partitions and file systems.
Manage logical volume management (LVM) storage
Manage logical volumes from the command line.
Access networked attached storage with network file system (NFS)
Access (secure) NFS shares.
Access networked storage with SMB
Use autofs and the command line to mount and unmount SMB file systems.
Control and troubleshoot the Red Hat Enterprise Linux boot process
Limit network communication with firewall
Configure a basic firewall.
Comprehensive review
Practice and demonstrate knowledge and skills learned in this course.
Oracle Solaris Certified Associate
Oracle Solaris Certified Associate Modules
Oracle Solaris Certified Associate Modules
Section 1 View and Use Components of a Solaris System
  • Perform the login process using the command line and change the password
  • Use command-line features to construct and execute basic commands from the command line
  • Access online documentation and resources in the Solaris environment
Section 2 View Files and Directories
  • Use commands to create, move, copy, rename, and remove files and directories
  • Perform fundamental operations using the vi editor to edit files and customize a vi session
  • Use commands within the Shell, including metacharacters, and describe the Korn shell variables and the purpose of user initialization files
  • Given a scenario, view and change permissions on files and directories, determine file and directory access, and modify the default permissionsExplain access control lists, view, configure and delete access control lists on files and directories
Section 3 Search Files and Directories
  • Use commands to search for directories and files on the system, and search for content within files
  • Describe a process and perform basic process control, including view a process, search for a specific process, and terminate a process
Section 4 Advanced Shell Functionality
  • Perform advanced Korn shell functionality, including manage a job, use aliases and functions, configure the Shell environment and settings, and run shell scripts
Section 5 Archive Files and Remote Transfers
  • Use commands to create, view, and retrieve file archives
  • Use commands to compress, view, and uncompress files and perform remote file transfers
  • Perform remote connections to establish a remote login session, copy files and directories to and from another system, and transfer files between systems
Unix Shell Scripting
Unix Shell Scripting Modules
Unix Shell Scripting Modules
Shell Scripting Course is specifically designed to develop skills required for   automation on Unix / Linux Environment. This course focuses on the basic and intermediate level of Scripting. It provides training with hands on session to administer the UNIX shell.   Suitable for:
  • Linux Administrators
  • UNIX programmers
  • Database (Oracle/Sybase)developers working on UNIX platforms
  • Database (Oracle/Sybase)Administrators
Prerequisites :
  • Knowledge in Unix / Linux Platform
  • Basic Knowledge in Shell Commands
  • Any Programming language
  Course Contents:  
  • Bash and Bash scripts
o        Common shell programs o        Advantages of the Shell o        Executing commands o        Building blocks o        Developing good scripts  
  • Writing and debugging scripts
  o        Creating and running a script o        Script basics o        Debugging Bash scripts  
  • The Bash environment
o        Shell initialization files o        Variables o        Quoting characters o        Shell expansion o        Aliases o        More Bash options  Regular expression
    • Regular expression
    • Examples using grep
    • Pattern matching using Bash features
Important Shell Utilities   o        cut o        sed, tr o        find o        sort o        grep, egrep, fgrep o        awk    Conditional statements   o        Introduction to “if” o        More advanced “if” usage o        Using case statements  Writing interactive scripts   o        Displaying user messages o        Catching user input Repetitive tasks
  •         The for loop
  •         The while loop
  •         The until loop
  •         I/O redirection and loops
  •         Break and continue
  •         Making menus with the select built –in
  •         The shift built in
More on variables o        Types of variables o        Array variables o        Operation on variables Function o        Introduction o        Examples of function in scripts o        Passing arguments to functions o        Scope of variable in functions - local & global Catching signals  o        Signals o        Traps  
Python Scripting
Python Scripting Modules
Python Scripting Modules
1. Introduction to Python
  • Python – The Universal Language
2. Getting Started
  • Installing Python
  • Python - "Hello World"
  • Using the Interpreter
  • iPython - a better Python interpreter
3. Language Basics
  • Types
    • Dynamic v/s Static Typing
    • Strong v/s Weak Typing
  • Numbers
  • Strings
  • Unicode
  • Complex types
  • Operators
    • Operator Overloading
  • Variables
  • Scoping and Expressions
  • Use of tabs and whitespaces as indent
  • Conditionals
    • for...else
4. Functions
  • The general syntax
  • Default values for arguments
  • Returning and receiving multiple values
  • Variable number of arguments – args, kwargs
  • Scope revisited
5. Collections
  • Primitive v/s Composite Types
  • Lists
  • Tuples
  • Maps (or Dictionaries)
  • Sets
  • Enums
  • Looping Techniques
6. Modularisation of code
  • Global and Local namespace
  • Introduction to modules
  • Using modules
  • Creating your own modules
  • Working with a third-party library
7. Regular Expressions
  • Matching v/s Searching
  • Regular Expression Objects
  • Match Objects
  • Examples
8. Files and Directories
  • Reading Files
  • Writing Files
  • Handling I/O Errors
  • Higher level file operations
  • File and Directory comparisons
9. Exception Handling
  • Exception handling basics
  • try...except
  • Examples
10. Socket Programming
  • Introduction to networking concepts
  • Creating a socket
  • Using a socket
  • Disconnecting
  • Non-blocking sockets
11. Object Oriented Programming Basics
  • Introduction to OOP
  • Classes and Objects
  • Instance methods and data
  • Initialization of objects
  • Inheritance
  • Multiple and Multilevel Inheritance
  • Method overriding
  • Classes and Types
Microsoft Certified Technology Specialist Modules
Microsoft Certified Technology Specialist Modules
This certification course module provides a strong foundation in the Microsoft Windows Professional operating software systems. MCTS gives the student an overview of Microsoft Windows operating system including hands-on exercises and real world examples of how Windows is used in large and small computer network systems.
Module Detail:
Windows 7 Configuration (Exam 70-680)
Installing, Upgrading, and Migrating to Windows 7
Deploying Windows 7
Configuring Hardware and Applications
Configuring Network Connectivity
Configuring Access to Resources
Configuring Mobile Computing
Monitoring and Maintaining Systems that Run Windows 7
Configuring Access to Resources
Configuring Backup and Recovery Options
Microsoft Certified Software Engineer Modules
Microsoft Certified Software Engineer Modules
Installing, Configuring, Troubleshooting, and Maintaining Windows Vista®
•   Module 1: Installing, Upgrading and Deploying Windows Vista •   Module 2: Troubleshooting Windows Vista Startup
•   Module 3: Configuring and Troubleshooting Hardware and Devices
•   Module 4: Configuring and Troubleshooting Networking
•   Module 5: Configuring and Troubleshooting Security
•   Module 6: Maintaining and Optimizing Windows Vista
Configuring Windows Vista Mobile Computing and Applications
  •   Module 1: Maintaining and Optimizing Windows Vista Systems
    •   Module 2: Configuring Windows Vista Media Applications
    •   Module 3:Configuring Windows Vista Productivity Applications
    •   Module 4: Configuring Mobile Computers
    •   Module 5: Configuring Tablet PC Settings
    •   Module 6:Networking Mobile Computers

 Managing and Maintaining a Microsoft Windows Server 2003 Environment

  •   Module 1:Introduction to Administering Accounts and Resources
    •   Module 2: Managing User and Computer Accounts
    •   Module 3: Managing Groups
    •   Module 4: Managing Access to Resources
    •   Module 5: Managing Access to Objects in Organizational Units
    •   Module 6: Implementing Group Policy
    •   Module 7: Managing the User Environment by Using Group Policy
    •   Module 8:Implementing Administrative Templates and Audit Policy
    •   Module 9: Preparing to Administer a Server
    •   Module 10: Preparing to Monitor Server Performance
    •   Module 11: Managing Data Storage
    •   Module 12: Managing Disaster Recovery
    •   Module 13: Software Maintenance Using Windows Server Update Services
    •   Module 14: Securing Windows Server 2003

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services

  •   Module 1: Allocating IP Addressing by Using Dynamic Host Configuration Protocol (DHCP)
    •   Module 2: Managing and Monitoring Dynamic Host Configuration Protocol (DHCP)
    •   Module 3: 
    Resolving Names
    •   Module 4: Resolving Host Names by Using Domain Name System (DNS)
    •   Module 5:Integrating Domain Name System and Active Directory
    •   Module 6: Managing and Monitoring Domain Name System (DNS)
    •   Module 7: Resolving NetBIOS Names by Using Windows Internet Name Service (WINS)
    •   Module 8: Configuring Routing by Using Routing and Remote Access
    •   Module 9: Securing Network Traffic by Using IPSec and Certificates
    •   Module 10: Configuring Network Access
    •   Module 11:Managing and Monitoring Network Access

  Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
•   Module 1: Introducing Windows Server 2003 Network Infrastructure Planning, Tools, and Documentation
•   Module 2: Planning and Optimizing a TCP/IP Physical and Logical Network
•   Module 3: Planning and Troubleshooting Routing and Switching
•   Module 4: Planning, Optimizing, and Troubleshooting DHCP
•   Module 5: Planning a DNS Strategy
•   Module 6: Optimizing and Troubleshooting DNS
•   Module 7: Planning and Optimizing WINS
•   Module 8: Planning and Troubleshooting IPSec
•   Module 9: Planning Network Access
•   Module 10: Troubleshooting Network Access
•   Module 11: Planning a Windows Server 2003 Network Infrastructure
Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure

  •   Module 1:Introduction to Active Directory Infrastructure
    •   Module 2:Implementing an Active Directory Forest and Domain Structure
    •   Module 3: Implementing an Organizational Unit Structure
    •   Module 4: Implementing User, Group, and Computer Accounts
    •   Module 5: Implementing Group Policy
    •   Module 6: Deploying and Managing Software by Using Group Policy
    •   Module 7: Implementing Sites to Manage Active Directory Replication
    •   Module 8: Implementing the Placement of Domain Controllers
    •   Module 9: Managing Operations Masters
    •   Module 10: Maintaining Active Directory Availability
    •   Module 11: Planning and Implementing an Active Directory Infrastructure

Designing Security for Microsoft Networks
•   Module 1: Introduction to Designing Security
•   Module 2: Creating a Plan for Network Security
•   Module 3: Identifying Threats to Network Security
•   Module 4: Analyzing Security Risks
•   Module 5: Designing Physical Security for Network Resources
•   Module 6: Designing Security for Network Hosts
•   Module 7: Designing Security for Accounts and Services
•   Module 8: Designing Security for Authentication
•   Module 9: Designing Security for Data
•   Module 10: Designing Security for Data Transmission
•   Module 11: Designing Security for Network Perimeters
•   Module 12: Responding to Security Incidents
Introduction to Installing and Managing Microsoft Exchange Server 2007

  •   Module 1: Overview of Exchange and Active Directory
    •   Module 2:Installing Exchange
    •   Module 3: Configuring Mailbox Server Roles
    •   Module 4: Managing Recipient Objects
    •   Module 5: Managing E-Mail Addresses and Address Lists
    •   Module 6: Managing Client Access
    •   Module 7: Managing Messaging Transport and Handling
    •   Module 8: Managing Availability, Backup and Recovery
    •   Module 9: Maintaining the Messaging System

Course 5049A Managing Messaging Security
  •   Module 1: Maintaining Antivirus and Anti-spam Systems
    •   Module 2: Configuring Edge Transport Servers
    •   Module 3:Implementing Messaging Policies

Recovering Messaging Servers and Databases using Microsoft Exchange Server 2007

•   Module 1: Recovering Messaging Databases
•   Module 2: Preparing for and Recovering from Mailbox Server Failures
•   Module 3: Preparing for and Recovering from Non-Mailbox Server Failures
Monitoring and Troubleshooting Microsoft Exchange Server 2007

  •   Unit 1:Introduction to Exchange Server Monitoring and Troubleshooting
    •   Unit 2: Monitoring and Troubleshooting Client Performance and Connectivity
    •   Unit 3:Troubleshooting Access to Resources and Messages
    •   Unit 4: Monitoring and Troubleshooting Mail Flow
    •   Unit 5: Monitoring and Troubleshooting Mailbox Servers
    •   Unit 6: Monitoring and Troubleshooting External and Additional Services
    •   Unit 7: Identifying Trends in a Messaging System

Implementing Microsoft Internet Security and Acceleration Server 2004
  •   Module 1:Overview of Microsoft ISA Server 2004
    •   Module 2:Installing and Maintaining ISA Server 2004
    •   Module 3: Enabling Access to Internet Resources
    •   Module 4: Configuring ISA Server 2004 as a Firewall
    •   Module 5: Configuring Access to Internal Resources
    •   Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server
    •   Module 7: Advanced Application and Web Filtering
    •   Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks
    •   Module 9: Implementing Caching to Improve Browsing Performance
    •   Module 10: Monitoring ISA Server 2004
    •   Module 11: Implementing ISA Server 2004 Enterprise Edition
    •   Module 12: Implementing ISA Server 2004 Enterprise Edition: Back-to-Back Firewall Scenario
    •   Module 13: Implementing ISA Server 2004 Enterprise Edition: Site-to-Site VPN Scenario

CCNA Training Modules
CCNA Training Modules
Session 1 Session 2
Internetworking with TCP/IP, IP Subnetting and VLSMs
  • TCP/IP and the DoD Model
  • Binary, Decimal Hexadecimal
  • IP Addressing, Subnetting and VLSMs
Lab 1: Logging into a Router Ccna training in chennai
Cisco IOS and Security Device Manger (SDM)
  • The IOS User Interface
  • Command-Line Interface
  • Cisco’s Security Device Manager (SDM)
Lab 2: Configuring a router, setting passwords Ccna training in chennai
Session 3 Session 4
Managing a Cisco Internetwork
  • Managing Configuration Register
  • Backing Up and Restoring
  • Using Cisco Discovery Protocol (CDP) Ccna training in chennai
Lab 3: Backing up and Restoring the configurations
IP Routing, Dynamic Routing, RIP and IGRP
  • IP Routing
  • Routing Protocol Basics
  • Routing Information Protocol (RIP)
  • Interior Gateway Routing Protocol (IGRP) Ccna training in chennai
Lab 4: Configuring and verifying Static route, RIP and IGRP
Session 5 Session 6
Enhanced IGRP, OSPF
  • Enhanced IGRP (EIGRP) Features and Operation
  • Open Shortest Path First (OSPF) Basics Ccna training in chennai
Lab 5: Configuring and verifying EIGRP and OSPF
Switching and Spanning Tree Protocols
  • Switching Services
  • Spanning Tree Protocol (STP)
  • LAN Switch Types
  • Catalyst 1900/2950 Switches
Lab 6: Administering and Verifying Switch Configurations
Session 7 Session 8
Virtual LANs (VLANs)
  • VLAN Memberships
  • Identifying VLANs
  • VLAN Trunking Protocol (VTP)
  • Routing between VLANs
Lab 7: Configuring VLANs and Trunk Ports Ccna training in Chennai adyar
  • DHCPl Router Configuration
  • Standard/Extended/Named Access Lists Ccna training in Chennai adyar
  • Monitoring Access Lists
  • Configuring Access Lists Using SDM
Lab 8: Configuring Access Lists
Session 9 Session 10
NAT and Wireless Technology
  • Types of Network Address Translation
  • Configuring NAT on Our Internetwork
  • The 802.11 Standards
  • Cisco’s Unified Wireless Solution
  • VPN Ccna training in Chennai adyar
Lab 9: Configuring NAT and Wireless Network
IPv6 and Wide Area Network
  • IPv6 Routing Protocols
  • Migrating to IPv6
  • Wide Area Network Basics
  • HDLC Protocol, PPP, Frame Relay
  • VOIP Ccna training in Chennai adyar
Lab 10: Configuring IPv6, PPP, HDLC and Frame Relay
CCNP Training Modules
CCNP Training Modules
CIT 2241, ROUTE, 3 credit hours ROUTE Course Content Includes:
  • Scalable internetwork requirements
  • Enhanced Interior Gateway Routing Protocol (EIGRP) operation and support
  • Border Gateway Protocol (BGP) operation and support
  • BGP, Open Shortest Path First (OSPF), and EIGRP configuration
  • Standard and extended access lists
  • Route redistribution
  • Routing update traffic
  • Policy-based routing
  • IP private addresses
  • Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6)
  • Layer 3 path control
CIT 2243, SWITCH, 3 credit hours SWITCH Course Content Includes:
  • Local Area Network (LAN) media types
  • Basic switch configurations
  • Virtual Local Area Network (VLAN) implementation
  • Routing between VLANs
  • Multilayer switching
  • Hot Standby Routing Protocol (HSRP) configuration
  • Virtual Router Redundancy Protocol (VRRP) configuration
  • Multicasting
  • Basic Quality of Service (QoS)
  • Switch security
  • Network access restriction
  • Campus switched networks
  • Wireless access
  • Voice over Internet Protocol (VOIP)
CIT 2244, TSHOOT, 3 credit hours TSHOOT Course Content Includes:
  • Troubleshooting EIGRP, OSPF, BGP
  • Troubleshooting routing redistribution solutions
  • Troubleshooting Ipv6 routing
  • Troubleshooting Ipv6 and Ipv4 interoperability
  • Troubleshooting switch-to-switch connectivity for the VLAN based solution
  • Troubleshooting general switch security
  • Troubleshooting switch virtual interfaces (SVIs)
  • Troubleshooting Wireless
  • Troubleshooting a VoIP support solution
  • Troubleshooting layer 3 security
EMC Certified Storage Administrator Modules
EMC Certified Storage Administrator Modules

Course Outline

1. Unisphere Security and Basic Management

  • Unisphere Security Features and Implementation
  • Unisphere and CLI Interface
  • Unisphere Authentication using LDAP
  • Control Station Auditing
  • Notifications Methods and Event Monitoring

2. Storage System Provisioning and Management

  • SP Networking and Cache
  • VNX Storage Objects

3. Host Integration and Access to Block Storage

  • Access Logix
  • Network Topologies and Requirements
  • PowerPath and other Host Utilities

4. Host Installation and Integration for Block

  • Implementing Windows, Linux, and ESXi FC and iSCSI Connectivity

5. Advanced Storage Concepts

  • FAST VP and FAST Cache

6. VNX Block Local Replication Solutions

  • Replication Terminology and Operations
  • Configuring and Managing SnapView Snapshot, SnapView Clone, and VNX Snapshot

7. Data Mover Networking

  • Data Mover Network Devices
  • Implementing DNS and Time Services
  • 8. File System Components and Features

8. Configuring CIFS

  • Create and Join a CIFS Server to a Windows Domain
  • File System Access Via CIFS
  • CIFS Operational Considerations
  • Usermapper

9. Virtual Data Movers

  • Virtual Data Mover Overview
  • Create and Manager Virtual Data Movers

10. VNX SnapSure

  • VNX SnapSure Theory and Operations
  • Configuring SnapSure
  • Managing Checkpoints
  • Planning SnapSure

11. Data Mover Failover

  • Configuring Data Mover Failover
  • Testing Data Mover Failover and Failback


In addition to lecture and demonstrations, this course includes labs designed to allow practical experience for the participant.