Enter your keyword

HCSE-2

By the end of the course, students will be able to :

Have an In depth Knowledge of Computer Hardware, LAN, WAN, Wireless & Hacking Technologies (MCSE, RHCE, CCNA, CWNA & CEH)

Course Duration – 14 Months

Course Content

Hardware (A+ Core)

  • Basics of Computer
  • DOS, Windows 98, 2000, XP, 2003, Vista & 2008.
  • Assembling & Installation.
  • Digital Electronics.
  • Microprocessor and Support chips
  • Motherboards
  • Storage Devices
  • VIRUSES
  • Interrupts and Ports
  • Modem and Internet
  • Troubleshooting

MCSE ON WINDOWS-2003

  • Exam 70-270 : Installing, Configuring and Administering Microsoft Windows® XP Professional.
  • Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003
  • Exam 70-291: Implementing, Managing and maintaining a Microsoft Windows Server 2003 Network Infrastructure.
  • Exam 70-293 : Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure.
  • Exam 70-294 : Planning, Implementing and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
  • Exam 70-298 : Designing Security for a Microsoft Windows Server 2003 Network.
  • Exam 70-284 : Implementing and Managing Microsoft Exchange Server 2003.
  • Microsoft Exchange Server 2007

CCNA (Cisco Certified Network Associate)

  • Networking Essentials
  • TCP/IP
  • Installing & Configuring A Router
  • CISCO IOS Commands
  • Managing CISCO in an Internetwork
  • IP and IPX Routing
  • Security Using ACCESS LIST
  • Connect ot Internet & Remote Office Using WAN
  • Installing & Configuring CISCO Catalyst Switch
  • Creating and Managing VLANS
  • CISCO ISO Security
  • VPN
  • SDM

CWNA (Certified Wireless Network Admin)

  • Radio Technologies
  • Antenna Concepts
  • Wireless LAN Hardware and Software
  • Network Design, Installation and Management
  • Wireless Standards and Organizations
  • 802.11 Network Architecture
  • Wireless LAN Security
  • Troubleshooting
  • Performance Tuning
  • How to Perform Site Surveys

CEH ( Certified Ethical Hacker)

  • Module 1 : Ethics and Legality
  • Module 2 : Foot Printing
  • Module 3 : Scanning
  • Module 4 : Enumeration
  • Module 5 : System Hacking
  • Module 6 : Trojans and Back doors
  • Module 7 : Sniffers
  • Module 8 : Denial of Service
  • Module 9 : Social Engineering
  • Module 10 : Session Hijacking
  • Module 11 : Hacking Web Servers
  • Module 12 : Web Application Vulnerabilities
  • Module 13 : Web Based Password Cracking Techniques
  • Module 14 : SQL Injection
  • Module 15 : Hacking Wireless Networking
  • Module 16 : Virus and Worms
  • Module 17 : Novell Hacking
  • Module 18 : Linux Hacking
  • Module 19 : IDS, Firewalls and Honey Pots
  • Module 20 : Buffer Overflows
  • Module 21 : Cryptography
  • Module 22 : Penetration Testing Methodologies