Custom Search 1

Ministry of Electronics & Information Technology
Government of India
Emblem of india
Short Term

Short Term

Short-term Training Programs

Course I - Introduction to LAN/ WAN Technologies
Course II - Advanced Networking Technologies for Administrators
Course III - Introduction to Computer Networking, Administration, Internet & Messaging for IT Users
Course IV - Computer Security Fundamentals for IT Users
Course V - Computer and Network Security for Administrators: Advanced level - I
Course VI- Computer and Network Security for Administrators: Advanced level - II
Course VII - Data Center Implementation and Management
Course VIII - IT Law & Forensics

Course I -  Introduction to LAN/ WAN Technologies

 Duration: 5 days

This module would enable the network project managers/administrators to  gain a comprehensive understanding on network designing and supervision, so  as to enable them to visualize, administer, install, configure, manage and  supervise local as well as wide area data networks, and projects based on  the same.

This program would help them to understand basic fundamentals of networking  including the OSI layered model, IP/IPX protocols, Network addressing, Network Management, LAN/WAN technologies, Routing protocols and basic operations of Routers  and Switches including WAN Services such as Point to Point, ISDN & Frame Relay Connection.

Course Outline: 

  • Networking Overview

    What is Computer Networking, Network Components, Network Types, Applications, Protocols, OSI model review, Functions of all the seven layers 

  • LAN Components

    Overview, Local Operating Systems, Network Applications, Network Interface Cards, NIC Drivers, Network Cabling Systems, Category 5/6 UTP Horizontal Cabling Overview, Category 5/6 UTP Cabling Installation, Fiber Optics Overview, Connectivity Devices, Ethernet, Gigabit Ethernet

  • Introduction to Network Protocols (TCP/IP)

    Transport Layer Protocols, TCP, UDP, IP, ICMP, ARP, RARP, IP Addressing, IP Address Classes, Subnetting Principles, Default and subnet masking

  • Operating and Configuring Networking devices

    Operation of Cisco IOS Software, Command Line Interface, Commands of Routers and Switches, Configuring Cisco Devices from CLI

  • LAN Switching Technologies

    Switching Technulogy, Transparent bridge loop, IEEE Spanning-Tree algorithm (STP)/li>

  • Virtual LANs (VLANs)

    Broadcast domains, Departmentalizing networks, Port-based vs. Mac-based VLANS, Protocul-based VLANS, 802.1Q trunking, Cisco ISL Trunking, Inter-Vlan communication

  • WAN Services

    Overview of WAN technologies and media options, Configuring HDLC, Configuring PPP with PAP and CHAP Authentication, Monitoring HDLC and PPP, ISDN, Frame relay

  • Network Layer Routing

    Routing principle, Dynamic Vs Static Routing, Routable vs. non-routable protocols, Differentiation of Routing protocols, Introduction to RIP, Convergence, Optimizing Routing

  • Introduction to various LAN/WAN communication media as Lease line, VSAT, Radio, Wi-Fi, Wi-Max,etc.

Course II - Advanced Networking Technologies for Administrators

Duration: 5 days

This module would help the participants to understand the configuration and monitoring of advanced routing protocols like OSPF, EIGRP and BGP, defining pulicy based routing and handling large internetworks based on multiple protocols. This would also help them to plan scalability of the network infrastructure. It also aims at providing in-depth understanding of advanced technologies such as firewalls, IPS/IDS, VoIP, Wi-Fi, Wi.Max, VPNs, layer 3 switching, Quality of Service in data networks.

  • Advanced Networking concepts
    IPv6, TCP/IP in depth, Multicast, FTP/Telnet, VLSM
  • Advance Routing protocul, QoS and configuration
    RIP2, OSPF, EIGRP, BGP, Pulicy based routing, Deploying QoS, MPLS, RAS
  • Virtual Private Networks-VPNs
    Introduction to VPNs, VPN Functionality, VPN Technulogy building blocks, VPN Architectures, Tunneling Protocols – PPTP, L2TP, IPSec and SSL VPNs
  • Intrusion Prevention/Detection System
    Overview of IPS/IDS, Why do we need IPS/IDS, IPS/IDS Sulutions, Case Studies IPS/IDS
  • Firewalls
    Perimeter security, Introduction to Firewalls, Different types of Firewalls, Architecture of firewalls, Case Studies Firewalls, Checkpoint/PIX insallation and configuration
  • NMS
    SNMP, RMON, Configuring Ciscoworks, Overview of EMS (Enterprise Management System)
  • Mobile & Wireless Network Technologies
    GSM, GPRS, 2G, LTE, Wi-Fi, Wi-Max, their standards and protocols

Course III - Introduction to Computer Networking, Administration, Internet & Messaging for IT Users

Duration:  5 Days

This module would enable the users to understand the basic computer hardware and the peripherals which are used in daily operations, familiarizing them with the LAN Concept & Windows/Linux Operating System. It would also cover the details of Internet and E-mailfunctionality- thereby enabling them to use the Internet explorer and the MS-Outlook applications to leverage the Internet and E-mail functionality.  It would help them understand the intricacies of the most commonly used office automation toul, which is MS-Office and gain indepth knowledge of the same. The users would be made aware on how to use MS-Word, MS-Excel and MS-PowerPoint. This will enable users for installation, configuration and operation of NOS, Web server, Messaging server, proxy server, etc. 

Course Outline:

  • Introduction to Computer Hardware
    Identifying key hardware components, Integration of the hardware components
  • Windows Operating System
    Overview of Windows 2000 Professional, File Management, commands, Configuring the Network Properties, Configuring windows client, Configuring IP address and related parameters, File Sharing and permissions, MS Office
  • Understanding Internet
    What is Internet, connecting to Internet, Web Browser and performing generic configurations, Performing FTP, Working with E-mail – MS Outlook
  • Overview, Installation, configuration & operation of NOS(Linux/Windows) Introduction, directory structure, file system, Hardware Requirement for Installation, Installation, Linux Commands & Shell Scripting, Configuring NFS Server for file sharing, Configuring Samba Server for connectivity with windows& other OS, Adding Removing Packages after installation, Installation of Modem & Dial-up Configuration, DNS Configuration, Understanding the DNS structure& different files for configuration
  • Configuring Web Server
    Understating the Web Server & different files needed for configuration, Hosting a Web Site in default location, Virtual Hosting, Adding information to DNS about the hosting, Performance tuning & Security for the web server
  • Configuring E-Mail Services
    Configuring Mail Server, Configuring Sendmail for SMTP & IMAP, Checking the mail server with Mail User Agent (MUA) like Mozilla mail, K Mail, Evolution Mail, Microsoft Outlook etc
  • Configuring Proxy Services
    Configuring Proxy Server, Setting HTTP Port, Setting Users, Creating Access

Course IV - Computer Security Fundamentals for IT Users

Duration: 5 Days

This module would enable the users to understand basic concepts of Computer Security and threats. This familiarize the participants to General Networking and Security Concepts, Identifying Threats, Intrusion Points, defense, TCP/ IP Basics & Vulnerabilities, Certificate Basics, Cryptography, Public Key Infrastructure, Understanding CA Trust Model, Network Infrastructure Security, Communications Security. It would also cover Application Security( Mail, Web, File Transfer), User Security, Hardening of Network devices, OS, Server Application. It will provide awareness about Operational & Organizational Security and Incident Detection and Response.

Course Outline:

  • General Networking and Security Concepts
    Understanding the goal of Security, Identifying Threats,Intrusion Points, Defending Against Threats, Organisational and Operational Security, TCP/IP Basics, Basic TCP/IP Principles, TCP/IP Layers and Vulnerabilities
  • Certificate Basics
    Understanding Cryptography, Using Cryptography, Identifying the components
    of a Public Key Infrastructure, Understanding CA Trust Model, Understanding
    Certificate Life Cycle and Key Management
  • Network Infrastructure Security
  • Understanding Network Infrastructure Security, Securing Network Cabling, Securing Connectivity Devices, Exploring Secure Topologies, Securing and Monitoring Network Resources
  • Communications, Application, User Security
    Understanding Remote Access Connectivity, Providing Secure Remote Access, Understanding Wireless Standards and Protocols, E-Mail Security, Web Security, File Transfer, Understanding Authentication, Understanding Access Control Models
  • Security Baselines
    Network Device and Operating System Hardening, Server Application Hardening
  • Operational and organizational Security
    Physical Security, Privilege Management, Removable Media, Protecting Business Continuity, Documentation, Risk Assessment, Security Education
  • Incident Detection and Response
    Attacks and Malicious code, Intrusion Detection Systems, Incident Response


Course V - Computer and Network Security for Administrators: Advanced level - I

Duration: 5 Days

This module would enable the network project managers/administrators to gain a comprehensive understanding on designing and enforcing network security system so as to enable them to visualize, administer, install, configure, manage and supervise such data networks, and projects based on the same.

Course Outline:

  • Basic Networking and TCP/IP Refresher
    Network Fundamentals, IP Concepts, IOS and Router Filters
  • Information Security Management System
    Security Essentials, International Security Standards, Risk Analysis, Security Organization, Information and System Classification, Security Policies, Disaster Recovery Planning, Security Mechanisms, Physical Security of IS related Issues.
  • Internet Vulnerabilities and Hacker Exploits
    Internet Vulnerabilities, Types of Attacks, Target Identification and Reconnaissance, Risk Assessment Techniques, Gaining Control Over the System, Cracking Passwords, Recording Keystrokes, Hiding Evidence of Attack, SANS Top 20 Vulnerabilities
  • Designing and Configuring Firewalls
    Introduction, Firewall Components, Firewall Policy, Selection Criteria, Installing and Configuring Firewalls, Monitoring Firewall, Installing and Configuring ISA Server, Monitoring ISA Server, IP Tables Concepts and Implementation
  • Designing and Configuring IPS
    Goals and Roles,  Technologies and Techniques,  Designs, Identifying Signatures,  Deployment,  Limitations, Configuring
  • Configuring Secure VPNs
    VPN Scenarios, VPN Technologies, Security Requirements, Comparing Tunnelling Type, Implementing Site-to-Site Tunnels, Creating Tunnels for Access VPNs, Implementing IP Security, VPN Security
  • Securing Windows
    Windows Security Goals, Implementing the Latest Technologies, Extending Authentication Security, Securing Resources with NTFS Permissions, Deploying the Encrypting File System (EFS), Exposing Native NTFS Vulnerabilities, Protecting Active Directory Objects, Building and Deploying Templates to Secure your Environment, Ensuring the Integrity and Confidentiality of Data
    Transmission, Encryption Architectures, Managing Windows PKI Components
  • Securing Linux
    Achieving Linux Security, Protecting Data and Systems with Cryptography, Establishing Secure Account Usage, Monitoring and Disabling Accounts, Logging in Across the Network, Controlling Root Access, Auditing Super User Activity, Role Based Access Control (RBAC), Directory Structure and Partitioning for Security, Backup and Integrity Testing, The Network File System, Hardening Linux systems, Risks from Unwanted Program Execution, Issues with Scripts TCP/IP and its Security Loopholes, Securing Internal Network Services, Safely Connecting to External Networks, Securing FTP, e-mail and Web Access.


Course VI- Computer and Network Security for Administrators: Advanced level - II

Duration: 5 Days

Course Outline:

  • Contingency Planning
    Fundamental Contingency Planning, Creation of the Contingency Plan, Technologies of Power, Backing up the Operating System
  • Security on the Internet and the WWW
    Define the Weak points in the structure of the Internet, Web Site Attack Techniques, Attack techniques of Web Users, Hardening Internet Access Points
  • Tools and Techniques
    Network Scanning and Discovery Methods, Virus, Trojans, and Worms, Social Engineering techniques, Privilege Escalation, Keystroke Logging, Concepts of DoS, Password Weaknesses
  • Router Security
    Implementation of Fundamental Cisco Router Security, Describe the Routing Process, Removing Unwanted Protocols and Services, Creation and Implementation of Access Control Lists, Configuring Cisco Router Logging
  • Network Defense
    Network Defense / Defensive Technologies, Objectives of Access Control/Impact of Defense, Network Auditing Concepts
  • Performance A Risk Analysis
    Concept of Risk Analysis, Methods/Process of Risk Analysis, Techniques to Minimize Risk, Continual Risk Analysis
  • Security Auditing, Attacks and Threat Analysis
    Security Auditing, Discovery Methods, Auditing Server Penetration and Attack Techniques, Security Auditing and the Control Phase, Intrusion Detection, Auditing and Log Analysis, Audit Results

Course VII - Data Center Implementation and Management

Duration: 5 days

This module would enable the IT Managers/Project Managers to gain understanding about the best practice for the design, construction and operation of computer rooms and data centres. It consists of a number of subsections that address the fundamental requirements of a successful design such as electrical power supply, air conditioning and data cabling.

It also covers the different networks and trends such as Virtualization etc to make them understand the relevance of the same.

Course Outline

  • Introduction
    • Introduction to Data Centre
    • Role of Data Centre in a Network
    • DC stadards
    • The hierarchical model
  • Facilities and location
    • Recommendations for location, size, heights, floor loading, lighting and raised floors
    • Emergency lighting and signage
    • Services and facilities
    • Raised floor design recommendations
  • Rack location recommendations
    • Hot aisle/cold aisle model
    • Air distribution
    • What makes a rack a server rack?
    • 4-post and 2-post systems
    • Using tools like Vision
  • Power supplies
    • Electrical principles (volts, amps, watts, kVA)
    • Power factor and three phase
    • The meaning of N, N+1 2(N+1) etc
    • Estimating power requirements
    • Uninterruptible Power Supply (UPS) options
    • Power distribution to and in a rack
    • Power Distribution Units
  • Cooling
    • Basics of air conditioning principles
    • Comfort vs. precision air conditioning
    • Fresh air and ventilation requirements
    • Power consumption of air conditioning
    • Air conditioning options
  • Earthing
    • Applicable standards
    • Requirements
  • Cable containment
    • Applicable standards
    • Separation of power and data cables
    • Types of conduit, trunking, tray
    • Cable management in and to a rack
  • Fire Design
    • Fire detection and suppression requirements of TIA 942
    • Pre-action sprinkler system
    • Smoke detector selection
  • Cabling components
    • Copper and Fibre optic cable standards
    • Components of Cabling
    • Different considerations
    • Trends
  • Security & Access Control
    • Fire detection and monitoring
    • Security and access control
    • CCTV
    • Building management systems
    • TIA 942 requirements for security and monitoring
    • IP networks that integrate security and monitoring
    • Rack level monitoring systems
  • Network designs & Requirements
    • LAN
    • SAN/NAS
    • Typical requirements
    • Important Considerations
  • Virtualization
    • Need for server consolidation
    • What is Virtualization
    • Tools & Technologies
    • Issues and Challenges
    • Benefits
  • DC Management
    • Tools required and options available
    • Integration of various tools
    • ITIL – introduction
    • BCP and Disaster Recovery
  • DC Operations
    • 24x7 operational requirements
    • Staffing arrangements
    • Legal compliance
    • Support functions
    • Reporting
  • Green IT
    • What is Green IT?
    • Impact on DC

Course VIII - IT Law & Forensics

Duration: 3 days

This module would enable the IT security Managers to gain understanding about the cyber crime, IT Law and Computer Forensics. It provides an insight to cyber crime and the details of IT Law enabling them to implement the same in their respective organizations. This also talks about use of computer forensics as a tool to capture, evaluate evidence and establish the cyber crime.

  • An Introduction to Cyber Crime
    • Types of cyber crime
    • International case studies
  • Fundamentals of Cyber Law
    • Jurisprudence of Cyber Law
    • Overview of Computer and Web Technology
    • Introduction to Indian Cyber Law
    • Overview of General Laws and Procedures in India
  • E-commerce-Legal issues
    • Electronic Commerce
    • Digital Signatures - technical issues
    • Digital Signatures - legal issues
    • Electronic Contracts
  • IPR and Cyberspace
    • Overview of Intellectual Property related Legislation
    • Copyright law & Cyberspace
    • Trademark law & Cyberspace
  • Cyber crime and Digital Evidence
    • Penalties & Offences under the IT Act
    • Offences under the Indian Penal Code
    • Investigation & adjudication issues
    • Oigital evidence
  • Computer Forensics
    • What is Computer Forensics
    • Relevance and Implementation
    • Tools available
      • i. Encase
      • ii.Access Data
  • Computer Hardware, Networks and Internet
    • Hardware Devices
    • File Systems
    • Bios & Boot Process
    • Computer Networks
    • Understanding Computer Software
    • Practical Issues.
  • Understanding Cyber Forensics
    • What is digital evidence?
    • Investigation Methodology
    • Confiscation and Seizure
    • Cloning a disk
    • Mathematical authentication of data
    • Recovering deleted files
  • Advanced Cyber Forensics
    • Wiping
    • Disk cloning & Imaging
    • Using data from data files
    • Using data from operating systems
    • Best Practices