Advanced java
ADVANCED JAVA PROGRAMMING INDEX:
- Java Database Connectivity a. JDBC Overview b. Architecture c. Drivers d. Connection Statements e. Result Sets f. Examples g. Test Paper
- Java Servlets a. Introduction to Servlet b. HTTP Servlet Basics c. Servlet Life Cycle d. Making session and cookies in servlet e. Servlet with JDBC f. Servlet Methods g. Examples h. Test Paper
- Multi-Threaded Programming a. Life Cycle of a Thread b. Using thread methods c. Thread Exception d. Thread Priority e. Thread Synchronization f. Implementing the ‘Runnable’ interface g. Examples h. Test Paper
- The Applet a. Applet Basics b. Applet Architecture c. An Applet Skeleton d. Applet Display methods e. Repainting f. Applet Tag g. Passing parameters to Applet h. Examples i. Test Paper
J2EE
J2EE Introduction J2EE Architecture,Comparison between J2EE&.NET,J2EE Application development roles.
EJB – Enterprise Java Beans
- Introduction
- Comparison between different Distributed tech (EJB, CORBA, COM/DCOM)
- EJB Architecture
- EJB Container
- Stateless Session Bean
- Statefull Session Bean
- Bean Managed Entity Bean (Container Managed Entity Bean, Bean Managed Security)
- Container Managed Security
- Bean Managed Transactions
- Container Managed Security
- Bean Managed Transactions
- Container Managed Transactions
- Clusters
- Using JDBC Connection Pool in EJB
.Net
Program structure.
Basic IO, including output to the console and messages boxes.
Data types.
Arithmetic operations and expressions.
Relational and logical operations.
Control structures. These include “if”, “while”, “do-while”, “for”, and “switch”.
Namespaces and methods supplied by the FCL. This section will only identify math methods.
Writing methods. Recursion and overloading will be considered.
Scoping rules.
Arrays and data representation.
Class definitions.
Properties, indexers, and access control..
Inheritance and polymorphism.
Delegates.
Exception handling
Testing Tools
MYTHS
Testing is Too
Testing is Time-Consuming
Only Fully Developed Products are Tested
Complete Testing is Possible
A Tested Software is Bug-Free
Missed Defects are due to Testers
Testers are Responsible for Quality of Product
Test Automation should be used Wherever Possible to Reduce Time ..
Anyone can Test a Software
QA, QC, AND Testing, Quality Assurance, and Quality Control
Audit and Inspection
Testing and Debugging \
ISO STANDARDS
ISO/IEC 9126
ISO/IEC 9241-118
ISO/IEC 25000:2005 ISO/IEC 12119 Miscellaneous
TYPES OF TESTING
Manual Testing Automation Testing
What to Automate? When to Automate?
How to Automate?
Software Testing Tools
TESTING METHODS
Black-Box Testing
White-Box Testing
Grey-Box Testing
A Comparison of Testing Methods
A+
Personal Computer Components Topics:
- Personal Computer Components •
System Unit Components •
Storage Devices •
Personal Computer Connection Methods Lesson
2: Operating System Fundamentals Topics:
- Personal Computer Operating Systems
- Windows User Interface Components
- Windows File System Management
- Windows System Management Tools Lesson
3: PC Technician Professional Best Practices Topics:
- Tools of the Trade • Electrical Safety
- Environmental Safety and Materials Handling
- Perform Preventative Maintenance
- Diagnostics and Troubleshooting
- Professionalism and Communication Lesson
4: Installing and Configuring Peripheral Components Topics:
- Install and Configure Display Devices
- Install and Configure Input Devices
- Install and Configure Adapter Cards
- Install and Configure Multimedia Devices Lesson
5: Installing and Configuring System Components Topics:
- Install and Configure Storage Devices
- Install and Configure Power Supplies
- Install and Configure Memory
- Install and Configure CPUs
- Install and Configure System Boards Lesson
6: Maintaining and Troubleshooting Peripheral Components Topics:
- Troubleshoot Display Devices • Maintain and Troubleshoot Input Devices
- Troubleshoot Adapter Cards
- Troubleshoot Multimedia Devices At the end of this course, students will be able to:
- Identify the components of standard desktop personal computers.
- Identify fundamental components and functions of personal computer operating systems.
- Identify best practices followed by professional personal computer technicians.
- Install and configure computer components.
- Install and configure system components. • Maintain and troubleshoot peripheral components.
- Troubleshoot system components. • Install and configure operating systems.
- Maintain and troubleshoot installations of Microsoft Windows. • Identify network technologies. Course Outline 2 Lesson
7: Troubleshooting System Components Topics: • Troubleshoot Storage Devices • Troubleshoot Power Supplies • Troubleshoot Memory
- Troubleshoot CPUs • Troubleshoot System Boards Lesson 8: Installing and Configuring Operating Systems Topics:
- Install Microsoft Windows • Upgrade Windows • Add Devices to Windows • Optimize Windows Lesson
9: Maintaining and Troubleshooting Microsoft Windows Topics: • Operating System Utilities • Maintain Microsoft Windows • Troubleshoot Microsoft Windows
- Recover Microsoft Windows Lesson 10: Network Technologies Topics: • Network Concepts
- Network Communications • Network Connectivity • Internet Technologies Lesson
N+
Lesson 1 – Welcome to CompTIA Network+ 2009 Training §
Lesson 2 – Basic Networking Fundamentals §
Lesson 3 – Network Media §
Lesson 4 – Network Topologies §
Lesson 5 – OSI Model §
Lesson 6 – TCP/IP §
Lesson 7 – TCP/IP Protocols §
Lesson 8 – Network Devices §
Lesson 9 – Routing §
Lesson 10 – Wireless Networking §
Lesson 11 – Networking Command Line Tools §
Lesson 12 – Network Performance Optimization §
Lesson 13 – Network Tools §
Lesson 14 – Network Monitoring §
Lesson 15 – Documentation §
Lesson 16 – Troubleshooting §
Lesson 17 – Network Security
MCSE
70-410
Installing windows server 2012 Disk Management – MBR, GPT, VHD, Basic disk, Dynamic disk, storage pool, disk pool NTFS file system and its features – file permissions, quota, VSS, offline files Hyper-V – Creating and configuring virtual machines Hyper-V – Creating and configuring virtual machine storage Hyper-V – Creating and configuring virtual networks IPv4 and IPv6 DHCP – Deployment and configuration DNS – Forward and reverse lookup, primary/secondary/stub zone, forwarders, root hints, caching only DNS, Dynamic DNS. Installing Active Directory domain controllers Active Directory user, group, OU management Create and manage Group Policy objects (GPOs) Configure security policies Configure application restriction policies Configure Windows Firewall
70-411
Deploy and manage Windows Deployment Services (WDS) Install and configure Windows Server Update Service (WSUS) Configure DCS to monitor servers, VMs, networking, real time performance Configure Distributed File system (DFS) Configure File Server Resource Manager (FSRM) Configure file and disk encryption Page 3 Paper Topic Configure routing Configure NAT Configure VPN Configure RADIUS servers Configure Network Access Protection FSMO roles Active Directory backup and restoration Active directory task delegation Active Directory object and container level recovery Advance Group Policy Object configuration and management
70-412
Configure Network Load Balancing (NLB) Configure failover clustering Manage Virtual Machine (VM) migration Configure advanced file services Implement Dynamic Access Control (DAC) Configure and optimize storage Configuring Windows server backup tool Bare metal recovery Understanding Windows booting and troubleshooting booting issues Configuring Hyper-V site level fault tolerance Advanced DHCP Advanced DNS Active Directory Forest trust relationship Active Directory sites and services Active Directory Certificate services Active Directory Rights Management Services (ADRMS)
70-413
Designing and implementing a server infrastructure’ & 70-414: ‘Implementing an Advanced Server Infrastructure’ are design papers Students are expected to come up with design solutions for various tasks and scenarios. This paper is more oriented towards practicing in the lab. Paper Topic 70-413 Design an automated server installation strategy Plan and implement a server deployment infrastructure Plan and implement server upgrade and migration Plan and deploy Virtual Machine Manager services Plan and implement file and storage services Design and maintain a Dynamic Host Configuration Protocol (DHCP) solution Design a name resolution solution strategy Design and manage an IP address management solution Design a VPN solution Design a forest and domain infrastructure Design a Group Policy strategy Design an Active Directory permission model Design an Active Directory sites topology Design a domain controller strategy
70-414
Plan and implement failover clustering Plan and implement highly available network services Plan and implement highly available storage solution Plan and implement highly available server roles Plan and implement a business continuity and disaster recovery solution Plan and implement virtualization hosts Plan and implement virtualization guests Page 5 Paper Topic Plan and implement virtualization networking Plan and implement virtualization storage Plan and implement virtual guest movement
CCNA R & S
Day-1
1. Concept of Networking
Identifying Characteristics of a Network
Servers, Workstations, and Hosts
WANs, LANs, and MANs
Types of Networks
Internet, Intranet, and Extranet
Identifying Network Topologies
Bus Topologies
Star Topologies
Mesh Topologies
Ring Topologies
Hybrid Topologies
Wireless Topologies
Point-to-Point and Multipoint
Segments and Backbones
Network Media and Connectors
Coaxial Cable
Twisted-Pair Cable
Fiber Optic Cable
Connector Types
Access Methods
CSMA/CD
CSMA/CA
Token Passing
2. Networking Devices
Network Interface Cards
Transceivers
MAC Address
Determining your Local Machine MAC Address
Troubleshooting Network Cards
Hubs, MAUs, and Repeaters
Hubs
Multistation Access Units
Repeaters
Bridges and Switches
Bridges
Switches
Routers and Brouters
Routers
Brouters
Gateways and Security Devices
Gateways
Firewalls
Intrusion Detection Systems
Other Networking Devices
Wireless Access Points
CSU/DSU
ISDN
Day-2
3. ISO and TCPIP Model in Network
OSI Layers
TCP/IP Protocol Suite
The TCP/IP Model
Application-Layer Protocols
TCP/IP Fundamentals
TCP/IP Settings
TCP/IP Addressing
Understanding Binary
Address Classes
Loopback Address
Private Addresses
Addressing Schemes
TCP/IP Configuration Concepts
Manual Configuration
DHCP
APIPA
DNS
4. IP Addressing and Subnetting
IP Addressing Review
Distinguishing Between Classes of IP Address
IP Addresses Components
Subnetting
Subnet Masks
Subnet Masks Value
Subetting Scenarios
Given a Network Address & Subnet mask, how many subnets can you have and
have and how many Hosts per subnet
Given a Network Address & Needs, provide a Subnet mask
Given a network address & subnet mask, list the valid subnet addresses
Given an IP Address & Subnet mask, find the Subnet Addresses,
Broadcast Addresses and Valid Host Range
Day-3
5. Routing Fundamentals
Routing Introduction
Types of Routes
Autonomous Systems
Administrative Distance
Dynamic Routing Protocols
Routing Metrics
Distance Vector Protocols
Link-State Protocols
Hybrid Protocols
Distance Vector Protocols Problems & Solutions
Problem: Convergence
Problem: Routing Loops
Router Booting Process
Router Initial Configuration
Static Routes
Static Route Configuration
Static Route Verification & Troubleshooting
Show Commands
Default Route Configuration
Basic IP and Routing Troubleshooting
RIP
RIP Operations
RIP Configuration
RIP Verification & Troubleshooting
RIP Show Commands
Configuring RIPv2
Day-4
6. Configure, Verify and Troubleshoot, OSPF and EIGRP
OSPF Overview
Hierarchical Design Areas
Metric Structure
OSPF Operations
Router Identities
Finding Neighbors
Designated and Backup Designated Routers
Sharing Routing Information
OSPF Configuration
Loopback Interface
Default Route Propagation
OSPF Metrics Values
OSPF Authentication
OSPF Troubleshooting
OSPF Show Commands
EIGRP Routing
EIGRP Overview
Metrics and Interpretability
Routing Tables and Updates
EIGRP Operation
Building Neighbors Relationships
Choosing the Routes
EIGRP Configuration
EIGRP Configuration
EIGRP Troubleshooting
EIGRP Show Commands
Day-5
- Types of ACLs, Configuring and Applying ACLs
ACL Overview
Definitions
Types
Processing
Basic ACL Configuration
Creating an ACL
Matching on Address: Wildcard Mask
Activating an ACL
ACL Types
Standard Number ACLs
Configuration Standards
Numbered ACLs
Extended Numbered ACLs
Named ACLs
8. Implementing Basic Router Security
- Setting up Console Password
- Setting up Enable Password
- Setting up Telnet Password
- Setting up Auxiliary Password
Day-6
- Switching Fundamentals
Switch booting process
Basic Switch Configuration
IP Addresses and Default Gateway
Basic Switch Operation and Verification
MAC Address Table
Static MAC Address
Layer 2 Redundancy
Layer 2 Issues
STP
Bridge Protocol Data Unit
Root Switch
Root Port
Designated Port
Port States
Layer 2 Convergence
10. Configure, Verify and Troubleshoot VLANs and VTPs
VLAN Overview
VLAN and Traffic Types
VLAN Membership
VLAN Connections
Access-Link Connections
Trunk Connections
VLAN Configuration
Configuring Trunks
VLAN Trunk Protocol
VTP Modes
VTP Messages
VTP Pruning
VTP Configuration
Basic Troubleshooting of VLANs and Trunks
Port Security Features
Port Security Configuration
Port Security Verification
Day-7
11. Basic operation of NAT, Configure NAT
Address Translation Overview
Running Out of address
Private Address
Address Translation
Address Translation Types
Terms and Definitions
Network Address Translation
Port Address Translation
Advantages and Disadvantages of Address Translation
Address Translation Configuration
NAT Configuration
12. Verify Device Configuration and Network Connectivity
13. IP Traffic Management
14. Standards used in Wireless Media
Wireless LAN Technologies
Narrowband, Broadband, and Packet Data Solutions
CSMA/CA
Radio Frequency Transmission Factors
WLAN Standards
RF Bands
802.11 Standards
- PPP Connections
Point-to-Point
PPP Components
Configuring PPP
Troubleshooting PPP
PPP Authentication
16. Frame Relay Connections
Virtual Circuits
Fully meshed Design
Advantages of VCs
Types of VCs
Supported Serial Connections
Frame Relay Terms
LMI
DLCIs
VC Data Rates
Congestion Control
Frame Relay Configuration
Encapsulation Configuration
LMI Configuration
17. Basic of VPN Technology
Virtual Private Networks
Benefits
VPN Types
IPSec
CCNP R & S
1.0 Network Principles
1.1 Identify Cisco Express Forwarding concepts
1.1.a FIB
1.1.b Adjacency table
1.2 Explain general network challenges
1.2.a Unicast
1.2.b Out-of-order packets
1.2.c Asymmetric routing
1.3 Describe IP operations
1.3.a ICMP Unreachable and Redirects
1.3.b IPv4 and IPv6 fragmentation
1.3.c TTL
1.4 Explain TCP operations
1.4.a IPv4 and IPv6 (P)MTU
1.4.b MSS
1.4.c Latency
1.4.d Windowing
1.4.e Bandwidth-delay product
1.4.f Global synchronization
1.5 Describe UDP operations
1.5.a Starvation
1.5.b Latency
1.6 Recognize proposed changes to the network
1.6.a Changes to routing protocol parameters
1.6.b Migrate parts of the network to IPv6
1.6.c Routing protocol migration
10% 2.0 Layer 2 Technologies
2.1 Configure and verify PPP
2.1.a Authentication (PAP, CHAP)
2.1.bPPPoE (client side only)
2.2 Explain Frame Relay
2.2.a Operations
2.2.b Point-to-point
2.2.c Multipoint
40% 3.0 Layer 3 Technologies
3.1 Identify, configure, and verify IPv4 addressing and subnetting
3.1.a Address types (Unicast, broadcast, multicast, and VLSM)
3.1.b ARP
3.1.c DHCP relay and server
3.1.d DHCP protocol operations
3.2 Identify IPv6 addressing and subnetting
3.2.a Unicast
3.2.b EUI-64
3.2.c ND, RS/RA
3.2.dAutoconfig (SLAAC)
3.2.e DHCP relay and server
3.2.f DHCP protocol operations
3.3 Configure and verify static routing
3.4 Configure and verify default routing
3.5 Evaluate routing protocol types
3.5.a Distance vector
3.5.b Link state
3.5.c Path vector
3.6 Describe administrative distance
3.7 Troubleshoot passive interfaces
3.8 Configure and verify VRF lite
3.9 Configure and verify filtering with any protocol
3.10 Configure and verify redistribution between any routing protocols or routing sources
2013 Cisco Systems, Inc. This document is Cisco Public. Page 3
3.11 Configure and verify manual and autosummarization with any routing protocol
3.12 Configure and verify policy-based routing
3.13 Identify suboptimal routing
3.14 Explain ROUTE maps
3.15 Configure and verify loop prevention mechanisms
3.15.a Route tagging and filtering
3.15.b Split-horizon
3.15.c Route poisoning
3.16 Configure and verify RIPv2
3.17 Describe RIPng
3.18 Describe EIGRP packet types
3.19 Configure and verify EIGRPneighbor relationship and authentication
3.20 Configure and verify EIGRP stubs
3.21 Configure and verify EIGRP load balancing
3.21.a Equal cost
3.21.b Unequal cost
3.22 Describe and optimize EIGRP metrics
3.23 Configure and verify EIGRP for IPv6
3.24 Describe OSPF packet types
3.25 Configure and verify OSPF neighbor relationship and authentication
3.26 Configure and verify network types, area types, and router types
3.26.a Point-to-point, multipoint, broadcast, nonbroadcast
3.26.b LSA types, area type: backbone, normal, transit, stub, NSSA, totally stub
3.26.c Internal router, backbone router, ABR, ASBR
3.26.d Virtual link
3.27 Configure and verify OSPF path preference
3.28 Configure and verify OSPF operations
3.29 Configure and verify OSPF for IPv6
2013 Cisco Systems, Inc. This document is Cisco Public. Page 4
3.30 Describe, configure, and verify BGP peer relationships and authentication
3.30.a Peer group
3.30.b Active, passive
3.30.c States and timers
3.31 Configure and verify eBGP (IPv4 and IPv6 address families)
3.31.aeBGP
3.31.b 4-byte AS number
3.31.c Private AS
3.32 Explain BGP attributes and best-path selection
10% 4.0 VPN Technologies
4.1 Configure and verify GRE
4.2 Describe DMVPN (single hub)
4.3 Describe Easy Virtual Networking (EVN)
10% 5.0 Infrastructure Security
5.1 Describe IOS AAA using local database
5.2 Describe device security using IOS AAA with TACACS+ and RADIUS
5.2.a AAA with TACACS+ and RADIUS
5.2.b Local privilege authorization fallback
5.3 Configure and verify device access control
5.3.a Lines (VTY, AUX, console)
5.3.b Management plane protection
5.3.c Password encryption
5.4 Configure and verify router security features
5.4.a IPv4 access control lists (standard, extended, time-based)
5.4.b IPv6 traffic filter
5.4.c Unicast reverse path forwarding
20% 6.0 Infrastructure Services
6.1 Configure and verify device management
6.1.a Console and VTY
6.1.b Telnet, HTTP, HTTPS, SSH, SCP
6.1.c (T)FTP
6.2 Configure and verify SNMP
6.2.a v2
6.2.b v3
6.3 Configure and verify logging
6.3.a Local logging, syslog, debugs, conditional debugs
6.3.b Timestamps
6.4 Configure and verify Network Time Protocol (NTP)
6.4.a NTP master, client, version 3, version 4
6.4.b NTP authentication
6.5 Configure and verify IPv4 and IPv6 DHCP
6.5.a DHCP client, IOS DHCP server, DHCP relay
6.5.b DHCP options (describe)
6.6 Configure and verify IPv4 Network Address Translation (NAT)
6.6.a Static NAT, dynamic NAT, PAT
6.7 Describe IPv6 NAT
6.7.a NAT64
6.7.b NPTv6
6.8 Describe SLA architecture
6.9 Configure and verify IP SLA
6.9.a ICMP
6.10 Configure and verify tracking objects
6.10.a Tracking objects
6.10.b Tracking different entities (for example, interfaces, IPSLA results)
6.11 Configure and verify Cisco NetFlow
6.11.aNetFlow v5, v9
6.11.b Local retrieval
6.11.c Export (configuration only)
PC Hardware and Networking
1st. Semester
Fundamentals
Data & Information, Computer Architecture , CPU & Memory Organization, History of Computer, Generation of Computer, I/O Devices, Number System, Logic Gates, LAN System.
Operating System
DOS , Windows
MS Office
Word
Excel
Power Point
Access
Tally
Account Fundamentals
Manual Accounts
Computer Accounting
Internet & HTML
Fundamental, Browsing, Creating E-mail Account, Sending/Receiving E-mail etc.
2nd Semester
DTP
Page Maker, Corel Draw, Photoshop
Programming Languages
VB
C, C++
3rd Semester
Introduction All internal devices
Mother Board, MB Types, Expansion Slots, Processor, Memory, Hard Disk, CD-R,RW, DVD-RW. SMPS.
Introduction of Expansion Card Assembling of Personal Computer.
Installation of O/S and Application Software.
Complete introduction & Troubleshooting.
Monitor, LCD, Keyboard, Mouse, UPS.
4th Semester
Introduction to Networking Components.
Network Components
Types of Network,
Troubleshooting of Network.
Diagnostic Tools of Internet & Networking.
Downloading the Drivers from Internet
Installation Of Drivers
Amazon Web Services Course Syllabus (Total Duration: 45:00:00)
Linux Fundamentals (Duration : 05:00:00)
Installation and Initialization:
- Installation, Package Selection
- Anatomy of a Kickstart File, Command line
- Introduction to Bash Shell
- System Initialization, Starting the Boot Process: GRUB
Boot and Package Management:
- Configuring services to run at boot
- Securing single-user mode (SU login)
- Shutting down and rebooting the system
- RPM Package Manager, Installing and Removing Software, Updating a Kernel RPM
- Yum Command set, Install packages by using yum
- Apt-get command set, Apt-cache package management
User Administration:
- Understanding different types of groups and creation of groups
- Creation of users in different groups
- Understanding Passwd, Shadow Files
- Understanding password aging
- Creation of quotas for users, groups and file systems
- Understanding users security files
- The different commands for Monitoring the users
- TROUBLESHOOTING
- Automation of jobs – Cron, at
Run levels:
- Understanding the different types of run-levels
- Understanding different types of shutdown commands
- Understanding run control scripts
- Understanding the different types
Overview of the Service Protocols:
- FTP
- DHCP
- DNS
- Apache
- Samba
- LVM
AWS Sysops Administrator Certification
Cloud Computing (Duration: 01:00:00)
- Introduction to Cloud Computing
- Why Cloud Computing?
- Benefits of Cloud Computing
- Types of Cloud Computing
- Public Cloud
- Private Cloud
- Hybrid Cloud
- Community Cloud
- Software as a Service
- Platform as a Service
- Horizontal vs vertical scaling
- Cloud Computing Issues
- Security
- Costing Model
What is virtualization? (Duration: 01:00:00)
- Virtualization and cloud computing
- Types of virtualization
- Virtualization terminologies
- Hypervisor
- Benefits
- Vendors
AWS Platform (Duration: 01:00:00)
- Introduction to AWS Elastic computing
- Introduction to the AWS products
- Regions and Availability Zones
- Signing up for AWS
- AWS Free usage tier
- Introduction AWS management console
EC2 Instance (Duration: 04:00:00)
- Understanding AMI
- Launching your first AWS instance
- On-demand Instance pricing
- Reserved Instance pricing
- Spot instance pricing
- Setting up security
- Security groups
- Choosing & Creating a new AMI
- Public and Private IP’s
- Deploying a new instance from the created AMI
- Key Pairs
- Elastic IP’s
Load Balancing (Duration: 04:00:00)
- Introduction to Scaling
- ELB(Elastic Load Balancer)
- Components and types of load balancing
Auto-scaling (Duration: 00:60:00)
- Get Started with Auto Scaling Using the Console
- Maintain a Fixed Number of Running EC2 Instances
- Dynamic Scaling
- The lifecycle of autoscaling
- Policies of autoscaling
EBS (Elastic Block Storage) (Duration: 01:00:00)
- Create EBS volumes
- Delete EBS Volumes
- Attach and detach EBS volumes
- Mounting and unmounting EBS volume
- Creating and deleting snapshots
- Creating volumes from snapshots S3(Simple Storage Service)
Storage in Cloud (Duration: 03:00:00)
- S3 durability and redundancy
- S3 Buckets
- S3 Uploading Downloading
- S3 Permissions
- S3 Object Versioning
- S3 Lifecycle Policies
- Storage Gateway
- Import Export
- S3 Transfer Acceleration
- Glacier storage
Cloud Front (Duration: 01:30:00)
- Use of cloud front
- Creating a cloud front distribution
- Hosting a website of cloud front distribution
- Implementing restrictions
- Configuring origins and behaviors
Route53 (Duration: 01:30:00)
- Creating Zones
- Hosting a website
- Understanding routing policies
- Weighted simple and failover policies
Identity Access Management (IAM) (Duration: 01:00:00)
- Creating Users and Groups
- Applying policies
- Password Policy
- Roles
AWS Security Management (Duration: 01:00:00)
- Security Practices for Cloud Deployment
- AWS Responsibilities and Securities
- Cloud Trail
- Trust advisor
Amazon Virtual Private Cloud (VPC) (Duration: 01:30:00)
- Introduction to Amazon Virtual Private Cloud (VPC)
- VPC Advantages
- Default and Non-default VPC
- Components of VPC
- Direct Connect
- Describe, create, and manage Amazon Virtual Private Cloud
- Amazon VPC, Private Subnet, and Public Subnet
- AWS Networking, Security Groups, and Network ACLs
- Configuration and management of VPN connectivity
- Subnet and Subnet Mask
Relational Database Service (RDS) (Duration: 02:30:00)
- Introduction to RDS
- Different database services of AWS: Amazon RDS, Dynamo DB, Redshift etc.
- Configuring the database
- Configuring backups
- Configuring the maintenance windows
- Connecting to the database
Dynamo DB (Duration: 01:30:00)
- Creating a dynamo dB
- Configuring alarms
- Adding data manually
Management Tools (Duration: 01:30:00)
- Cloud watch dashboard
- Configuring Monitoring services
- Setting thresholds
- Configuring actions
- Creating a cloud watch alarm
- Getting statistics for ec2 instances
- Monitoring other AWS services
- Configuring Notifications
- Integrating cloud watch with Autoscaling
- Cloud Trail
Application Services (Duration: 03:00:00)
- What is SNS
- Creating a topic
- Create subscription
- Subscribed to the subscription
- SQS
- SES
- Lambda and Elastic Beanstalk
AWS Troubleshooting (Duration: 02:00:00)
- Troubleshooting EC2 instance
- Troubleshooting using Cloud watch
- Troubleshooting using ELB
- Troubleshooting by using Cloud trail
- Troubleshooting by using Cloud front
AWS Architecture and Design (Duration: 01:30:00)
Backup and Disaster Recovery
- How to manage Disaster Recovery and Backups
- Best Practice for DR and Backups
- AWS High Availability Design
Troubleshooting and Price Calculator
- AWS Best Practices (Cost +Security)
- AWS Calculator & Consolidated Billing
DevOps Fundamentals (Duration: 05:00:00)
- An understanding of DevOps and the modern DevOps toolsets
- The ability to automate all aspects of a modern code delivery and deployment pipeline using:
- Source code management tools – CVS, Git
- Build tools – Apache ant, Maven
- Test automation tools – JUnit
- Continuous Integration Tools – Jenkins, Team city
- Configuration management tools – Chef, Puppet, Ansible
- Monitoring tools – Nagios
Robotic Process Automation training Course Objectives
It is the best Robotic Process Automation training organization which delivers the blue prism classes through instructor LED-Online training, classroom training and through Self-Paced Video learning. Our RPA specialist instructor will lead you till the end of the Blue Prism course and our specialists will help the organization and individual learners to gain required and practical knowledge of every module in Blue Prism. Blue Prism training material is prepared as per the industry standards and expectations, everyone can get best career opportunities by taking our Blue Prism online training. And we are also providing Blue Prism training in Bangalore.
Self-Paced Video Learning
Its provide the finest Blue Prism tutorial videos all the way through our Blue Prism Self-Paced course. These Blue Prism training videos are organized by industry veteran instructors who have sound knowledge in the Robotic Process Automation training industry. By taking Blue Prism self-paced training you can be trained the total course at your individual pace. Blue Prism tutorial videos are integrated with real-time scenarios by the skilled instructors.
By the end of the course you can able to do:
- Able to create and maintain automated marketing campaigns.
- You can track the customer behaviors using analytics.
- You can consistently bring the requirements of organization functions and you can meet the targets of an organization.
- You can work in any sectors like finance, banking, BPO, Retails etc.
- You will gain the total practical knowledge of each and every module in the Blue Prism.
Blue Prism Training in Bangalore
In our RPA Blue Prism Training in Bangalore, aspirants will undergo practical training which increases the commanding skill on the tool. In this training period, candidates will undergo complete real-time experience through practical examples and live projects, In this program candidates, get support for resume preparation, interview preparation, and mockinterviews. Join the It is Blue prism training in Hyderabadand become a professional expert and get placed in top MNC’s after completion of the course.
Big Data Course
- What is Big Data
- Dimensions of Big Data
- Big Data in Advertising
- Big Data in Banking
- Big Data in Telecom
- Big Data in eCommerce
- Big Data in Healthcare
- Big Data in Defense
- Processing options of Big Data
- Hadoop as an option
Hadoop
- What is Hadoop
- How Hadoop 1.0 Works
- How Hadoop 2.0 Works
- HDFS
- MapReduce
- What is YARN
- How YARN Works
- Advantages of YARN
- How Hadoop has an edge
Hadoop Ecosystem
- Sqoop
- Oozie
- Pig
- Hive
- Flume
Hadoop Hands On
- Running HDFS commands
- Running your MapReduce program on Hadoop 1.0
- Running your MapReduce Program on Hadoop 2.0
- Running Sqoop Import and Sqoop Export
- Creating Hive tables directly from Sqoop
- Creating Hive tables
- Querying Hive tables
Salesforce Training
Salesforce in a nutshell, is a customer relationship management software that is essential for a working professional dealing with customers on a daily basis. The software is a constitution of Sales Cloud, Service Cloud, Marketing Cloud, Commerce Cloud, Analytics Cloud, IoT Cloud, App Cloud, Health Cloud, Financial Services Cloud, Force.com, and Chatter.
With the growing incorporation of Salesforce in companies, the number of students seeking the course has escalated. But, the problem that’s lingering is choosing a reliable partner for your career pursuit
Why Salesforce training?
Salesforce technology is rapidly transforming the way companies operate, it is transforming job profiles and careers. Obtaining a Salesforce certification from the best training institute is essential as it can provide the initial launch pad for your career. A certification also provides the candidate with an upper hand among peers.
The Salesforce training in Hyderabad offered by QS Technologies is provided either through the cloud or in-person by proven instructors.
Scope of Salesforce Training
Salesforce training has rapidly gained popularity among professionals looking to enhance their skills for job promotions. People from various job profiles seek the course and we recommend the Salesforce training course in Hyderabadfor IT Professionals, Administrators, Developers, Implementers, Project managers, Graduates, SAS Enterprise Miner, and end users.
The training provided by QS Technologies teaches you to design, implement, and make custom apps that would make you adept at cracking the Salesforce certification. A professional trained at our institute can expect one of these professional roles.
Administrator: It is the responsibility of a Salesforce administrator to manage users, data, and security. They also manage sales cloud and Service Cloud applications. As a Salesforce administrator, you will be expected to prepare reports, build dashboards, etc. on the Salesforce CRM.
Application Builder: As an app developer, you will have to make a custom application with the use of declarative customization capabilities of Force.com. Presenting it plainly, an app builder would be required to build user interface, data model, security for application developed, and business logic. You will also be required to design applications for the mobile.
Developer: A Salesforce developer uses custom tools such as Apex and Visual Force to build custom applications. Some aspects of the job profile also include testing and deployment of software applications. Therefore, for the best Salesforce training in Hyderabadwith 100% placement assistance, seek the training from Besant Technologies. Salesforce Developer Course Syllabus.
CRM – Customer Relationship Management
- What is CRM (Customer Relationship Management)?
- CRM Basic entities
- Sub Modules of CRM
- Existing CRMs
Salesforce.com Introduction
- What is Salesforce.com?
- Why Salesforce.com?
- Different editions in Salesforce.com
- How to sign up for Developer Edition?
Salesforce.com Basic Navigations
- What are Records?
- What are Related Lists?
- Action Column
- Help Links
Development in Salesforce.com
- Custom Settings
- Visualforce Components
- Difference between Developer, Configuration only and Full Sandboxes.
- Adding controller to Visualforce page
- Apex Classes
- Custom Labels
- Adding Error message in Visualforce page
- Triggers
- Unit testing
- Batch Apex
- SavePoint and Database.Rollback
- com IDE installation
- Salesforce to Salesforce connection
- Calling Apex method from Custom Button
- Java to Salesforce connection
- Fetching data from another Salesforce organization
- Date Picker in Visualforce page
- With Sharing and Without Sharing in Apex Classes
- List, Set and Map collection data types
- Moving Components from one organization to another organization
- Creating table in VF using apex:panelGrid
- Standard Controller, Custom Controller and Extensions
- How to create a Sandbox in Salesforce?
- How to login into Sandbox in Salesforce?
- How to create Inbound Change set?
- How to create Outbound Change set?
- Adding help text for apex:inputText
- Debugging Apex code
- Try and Catch block
- Governor Limits in Salesforce.com
- Hide and Show in Visualforce page
- Date and Datetime
- SOQL
- Coding Standard in Salesforce