Custom Search 1

Ministry of Electronics & Information Technology
Government of India
Emblem of india
Long Term

Long Term

Long-term Training Programs

1. Course-I: Diploma in Operation & Administration of Information Technology and Computer Networking

Duration: 12 Weeks

Module 1: Introduction to Information Technology, Operating System, Internet & Messaging

This module would enable the participants to understand the basic computer hardware and the peripherals which are used in daily operations, familiarizing them with the LAN Concept & Windows/Linux Operating System. It would also cover the details of Internet and E-mail functionality- thereby enabling them to use the Internet explorer and the MS-Outlook applications to leverage the Internet and E-mail functionality. It would help them understand the intricacies of the most commonly used office automation tool, which is MS-Office and gain in-depth knowledge of the same. The users would be made aware on how to use MS-Word, MS-Excel and MS-PowerPoint. This will enable users for installation, configuration and operation of NOS, Web server, Messaging server, proxy server, etc.

Outline:

  • Introduction to Computer Hardware
    Identifying key hardware components, Integration of the hardware components
  • Windows Operating System
    Overview of Windows 2000 Professional, File Management, commands, Configuring the Network Properties, Configuring windows client, Configuring IP address and related parameters, File Sharing and permissions, MS Office
  • Understanding Internet
    What is Internet, connecting to Internet, Web Browser and performing generic configurations, Performing FTP, Working with E-mail – MS Outlook
  • Overview, Installation, configuration & operation of NOS(Linux/Windows) Introduction, directory structure, file system, Hardware Requirement for Installation, Installation, Linux Commands & Shell Scripting, Configuring NFS Server for file sharing, Configuring Samba Server for connectivity with windows & other OS, Adding Removing Packages after installation, Installation of Modem
    & Dial-up Configuration, DNS Configuration, Understanding the DNS structure & different files for configuration
  • Configuring Web Server
    Understating the Web Server & different files needed for configuration, Hosting a Web Site in default location, Virtual Hosting, Adding information to DNS about the hosting, Performance tuning & Security for the web server
  • Configuring E-Mail Services
    Configuring Mail Server, Configuring Sendmail for SMTP & IMAP, Checking the mail server with Mail User Agent (MUA) like Mozilla mail, K Mail, Evolution Mail, Microsoft Outlook etc
  • Configuring Proxy Services
    Configuring Proxy Server, Setting HTTP Port, Setting Users, Creating Access

Module 2

This module would enable the participants to gain a comprehensive understanding on network designing and supervision, so as to enable them to visualize, administer, install, configure, manage and
supervise local as well as wide area data networks, and projects based on the same.

This program would help them to understand basic fundamentals of networking including the OSI layered model, IP/IPX protocols, Network addressing, Network Management, LAN/WAN technologies, Routing protocols and basic operations of Routers and Switches including WAN Services such as Point to Point, ISDN& Frame Relay Connection.

Outline:

  • Networking Overview
    What is Computer Networking, Network Components, Network Types, Applications, Protocols, OSI model review, Functions of all the seven layers
  • LAN Components
    Overview, Local Operating Systems, Network Applications, Network Interface Cards, NIC Drivers, Network Cabling Systems, Category 5/6 UTP Horizontal Cabling Overview, Category 5/6 UTP Cabling Installation, Fiber Optics Overview, Connectivity Devices, Ethernet, Gigabit Ethernet
  • Introduction to LAN/ WAN Technologies
    Introduction to Network Protocols (TCP/IP)
  • Transport Layer Protocols, TCP, UDP, IP, ICMP, ARP, RARP, IP Addressing, IP Address Classes, Subnetting Principles, Default and subnet masking
  • Operating and Configuring Networking devices
    Operation of Cisco IOS Software, Command Line Interface, Commands of Routers and Switches, Configuring Cisco Devices from CLI
  • LAN Switching Technologies
    Switching Technology, Transparent bridge loop, IEEE Spanning-Tree algorithm(STP)
  • Virtual LANs (VLANs)
    Broadcast domains, Departmentalizing networks, Port-based vs. Mac-based VLANS, Protocol-based VLANS, 802.1Q trunking, Cisco ISL Trunking, Inter-Vlan communication
  • WAN Services
    Overview of WAN technologies and media options, Configuring HDLC, Configuring PPP with PAP and CHAP Authentication, Monitoring HDLC and PPP, ISDN, Frame relay
  • Network Layer Routing
    Routing principle, Dynamic Vs Static Routing, Routable vs. non-routable protocols, Differentiation of Routing protocols, Introduction to RIP, Convergence, Optimizing Routing
  • Introduction to various LAN/WAN communication media as Lease line, VSAT, Radio, Wi-Fi, Wi-Max,etc.

Module 3 - Advanced Networking Technologies

This module would help the participants to understand the configuration and monitoring of advanced routing protocols like OSPF, EIGRP and BGP, defining policy based routing and handling large internetworks based on multiple protocols. This would also help them to plan scalability of the network infrastructure. It also aims at providing in-depth understanding of advanced technologies such as firewalls, IPS/IDS, VoIP, Wi-Fi, Wi.Max, VPNs, layer 3
switching, Quality of Service in data networks.

  • Advanced Networking concepts
    IPv6, TCP/IP in depth, Multicast, FTP/Telnet, VLSM
  • Advance Routing protocol, QoS and configuration
    RIP2, OSPF, EIGRP, BGP, Policy based routing, Deploying QoS, MPLS, RAS
  • Virtual Private Networks-VPNs
    Introduction to VPNs, VPN Functionality, VPN Technology building blocks, VPN Architectures, Tunneling Protocols – PPTP, L2TP, IPSec and SSL VPNs Intrusion Prevention/Detection System
  • Overview of IPS/IDS, Why do we need IPS/IDS, IPS/IDS Solutions, Case Studies IPS/IDS
  • Firewalls
    Perimeter security, Introduction to Firewalls, Different types of Firewalls, Architecture of firewalls, Case Studies Firewalls, Checkpoint/PIX insallation and configuration
  • NMS
    SNMP, RMON, Configuring Ciscoworks, Overview of EMS (Enterprise Management System)

2. Course-II: Diploma in Information and Network Security

Duration: 12 Weeks

Module 1: Information Technology and LAN/ WAN Technologies

This module would enable the participants review the concepts of computers, OS and various servers and to gain a comprehensive understanding on network designing and supervision, so as to enable them to visualize, administer, install, configure, manage and supervise local as well as wide area data networks, and projects based on the same.

This program would help them to understand basic fundamentals of networking including the OSI layered model, IP/IPX protocols, Network addressing, Network Management, LAN/WAN technologies, Routing protocols and basic operations of Routers and Switches including WAN Services such as Point to Point, ISDN& Frame Relay Connection.

Outline:

  • Overview, Installation, configuration & operation of NOS(Linux/Windows) Introduction, directory structure, file system, Hardware Requirement for Installation, Installation, Linux Commands & Shell Scripting, Configuring NFS Server for file sharing, Configuring Samba Server for connectivity with windows & other OS, Adding Removing Packages after installation, Installation of Modem
    & Dial-up Configuration, DNS Configuration, Understanding the DNS structure& different files for configuration Information Technology and LAN/ WAN Technologies
  • Overview of Web Server
    Understating the Web Server & different files needed for configuration, Hosting a Web Site in default location, Virtual Hosting, Adding information to DNS about the hosting, Performance tuning & Security for the web server
  • Overview of E-Mail Services
    Configuring Mail Server, Configuring Sendmail for SMTP & IMAP, Checking the mail server with Mail User Agent (MUA) like Mozilla mail, K Mail, Evolution Mail, Microsoft Outlook etc
  • Networking Overview
    What is Computer Networking, Network Components, Network Types, Applications, Protocols, OSI model review, Functions of all the seven layers
  • LAN Components 
    Overview, Local Operating Systems, Network Applications, Network Interface Cards, NIC Drivers, Network Cabling Systems, Category 5/6 UTP Horizontal Cabling Overview, Category 5/6 UTP Cabling Installation, Fiber Optics Overview, Connectivity Devices, Ethernet, Gigabit Ethernet
  • Introduction to Network Protocols (TCP/IP)
    Transport Layer Protocols, TCP, UDP, IP, ICMP, ARP, RARP, IP Addressing, IP Address Classes, Subnetting Principles, Default and subnet masking
  • Operating and Configuring Networking devices
    Operation of Cisco IOS Software, Command Line Interface, Commands of Routers and Switches, Configuring Cisco Devices from CLI
  • LAN Switching Technologies
    Switching Technology, Transparent bridge loop, IEEE Spanning-Tree algorithm (STP)
  • Virtual LANs (VLANs)
    Broadcast domains, Departmentalizing networks, Port-based vs. Mac-based VLANS, Protocol-based VLANS, 802.1Q trunking, Cisco ISL Trunking, Inter-Vlan communication
  • WAN Services
    Overview of WAN technologies and media options, Configuring HDLC, Configuring PPP with PAP and CHAP Authentication, Monitoring HDLC and PPP, ISDN, Frame relay
  • Network Layer Routing
    Routing principle, Dynamic Vs Static Routing, Routable vs. non-routable protocols, Differentiation of Routing protocols, Introduction to RIP, Convergence, Optimizing Routing
  • Introduction to various LAN/WAN communication media as Lease line, VSAT, Radio, Wi-Fi, Wi-Max,etc.

Module 2 - Computer Security Fundamentals

This module would enable the participants to understand basic concepts of Computer Security and threats. This familiarize the participants to General Networking and Security Concepts, Identifying Threats, Intrusion Points, defense, TCP/IP Basics & Vulnerabilities, Certificate Basics, Cryptography, Public Key Infrastructure, Understanding CA Trust Model, Network Infrastructure Security, Communications Security. It would also cover Application Security( Mail, Web, File Transfer), User Security, Hardening of Network devices, OS, Server Application. It will provide awareness about Operational & Organizational Security and Incident Detection and Response.

Outline:

  • General Networking and Security Concepts
    Understanding the goal of Security, Identifying Threats,Intrusion Points, Defending Against Threats, Organisational and Operational Security, TCP/IP Basics, Basic TCP/IP Principles, TCP/IP Layers and Vulnerabilities
  • Certificate Basics
    Understanding Cryptography, Using Cryptography, Identifying the components of a Public Key Infrastructure, Understanding CA Trust Model, Understanding Certificate Life Cycle and Key Management
  • Network Infrastructure Security
  • Understanding Network Infrastructure Security, Securing Network Cabling, Securing Connectivity Devices, Exploring Secure Topologies, Securing and Monitoring Network Resources Communications, Application, User Security Understanding Remote Access Connectivity, Providing Secure Remote Access, Understanding Wireless Standards and Protocols, E-Mail Security, Web Security, File Transfer, Understanding Authentication, Understanding Access Control Models
  • Security Baselines
    Network Device and Operating System Hardening, Server Application Hardening
  • Operational and organizational Security
    Physical Security, Privilege Management, Removable Media, Protecting Business Continuity, Documentation, Risk Assessment, Security Education
  • Incident Detection and Response
    Attacks and Malicious code, Intrusion Detection Systems, Incident Response

Module 3 – Information and Network Security

This module would enable the participants to gain a comprehensive understanding on designing and enforcing network security system so as to enable them to visualize, administer, install, configure,
manage and supervise such data networks, and projects based on the same.

Course Outline:

  • Basic Networking and TCP/IP Refresher
    Network Fundamentals, IP Concepts, IOS and Router Filters
  • Information Security Management System
    Security Essentials, International Security Standards, Risk Analysis, Security Organization, Information and System Classification, Security Policies, Disaster Recovery Planning, Security Mechanisms, Physical Security of IS related Issues.
  • Internet Vulnerabilities and Hacker Exploits
    Internet Vulnerabilities, Types of Attacks, Target Identification and Reconnaissance, Risk Assessment Techniques, Gaining Control Over the System, Cracking Passwords, Recording Keystrokes, Hiding Evidence of Attack, SANS Top 20 Vulnerabilities
  • Designing and Configuring Firewalls
    Introduction, Firewall Components, Firewall Policy, Selection Criteria, Installing and Configuring Firewalls, Monitoring Firewall, Installing and Configuring ISA Server, Monitoring ISA Server, IP Tables Concepts and Implementation
  • Designing and Configuring IPS 
    IDS Goals and Roles, IDS Technologies and Techniques, IDS Designs, Identifying IDS Signatures, IDS Deployment, IDS Limitations, Configuring IDS
  • Configuring Secure VPNs
    VPN Scenarios, VPN Technologies, Security Requirements, Comparing Tunneling Type, Implementing Site-to-Site Tunnels, Creating Tunnels for Access VPNs, Implementing IP Security, VPN Security
  • Securing Windows
    Windows Security Goals, Implementing the Latest Technologies, Extending Authentication Security, Securing Resources with NTFS Permissions, Deploying the Encrypting File System (EFS), Exposing Native NTFS Vulnerabilities, Protecting Active Directory Objects, Building and Deploying Templates to Secure your Environment, Ensuring the Integrity and Confidentiality of Data Transmission, Encryption Architectures, Managing Windows PKI Components Securing Linux Achieving Linux Security, Protecting Data and Systems with Cryptography, Establishing Secure Account Usage, Monitoring and Disabling Accounts, Logging in Across the Network, Controlling Root Access, Auditing Super User Activity, Role Based Access Control (RBAC), Directory Structure and Partitioning for Security, Backup and Integrity Testing, The Network File System, Hardening Linux systems, Risks from Unwanted Program Execution, Issues with Scripts TCP/IP and its Security Loopholes, Securing Internal Network Services, Safely Connecting to External Networks, Securing FTP, e-mail and Web Access
  • Contingency Planning
    Fundamental Contingency Planning, Creation of the Contingency Plan, Technologies of Power, Backing up the Operating System
  • Security on the Internet and the WWW
    Define the Weak points in the structure of the Internet, Web Site Attack Techniques, Attack techniques of Web Users, Hardening Internet Access Points
  • Tools and Techniques
    Network Scanning and Discovery Methods, Virus, Trojans, and Worms, Social Engineering techniques, Privilege Escalation, Keystroke Logging, Concepts of DoS, Password Weaknesses Performance A Risk Analysis Concept of Risk Analysis, Methods/Process of Risk Analysis, Techniques to Minimize Risk, Continual Risk Analysis
  • Security Auditing, Attacks and Threat Analysis
    Security Auditing, Discovery Methods, Auditing Server Penetration and Attack Techniques, Security Auditing and the Control Phase, Intrusion Detection, Auditing and Log Analysis, Audit Results
  • Overview of Cyber Crime and IT Law
    Types of cyber crime, International case studies, fundamentals of Cyber Law, Jurisprudence of Cyber Law, E-commerce-Legal issues. Cyber crime and Digital Evidence, Penalties & Offences under the IT Act, Offences under the Indian Penal Code, Investigation & adjudication issues, Digital evidence

3. Course-III: Advance Diploma in Information Communication Technology and its Security

Duration: 24 Weeks

Module 1: Introduction to Information Technology, Operating System, Internet & Messaging

This module would enable the participants to understand the basic computer hardware and the peripherals which are used in daily operations, familiarizing them with the LAN Concept & Windows/Linux Operating System. It would also cover the details of Internet and E-mail functionality- thereby enabling them to use the Internet explorer and the MS-Outlook applications to leverage the Internet and E-mail functionality. It would help them understand the intricacies of the most commonly used office automation tool, which is MS-Office and gain indepth knowledge of the same. The users would be made aware on how to use MS-Word, MS-Excel and MS-PowerPoint. This will enable users for installation, configuration and operation of NOS, Web server, Messaging server, proxy server, etc.

Outline:

  • Introduction to Computer Hardware
    Identifying key hardware components, Integration of the hardware components
  • Windows Operating System
    Overview of Windows 2000 Professional, File Management, commands, Configuring the Network Properties, Configuring windows client, Configuring IP address and related parameters, File Sharing and permissions, MS Office
  • Understanding Internet
    What is Internet, connecting to Internet, Web Browser and performing generic configurations, Performing FTP, Working with E-mail – MS Outlook Overview, Installation, configuration & operation of NOS(Linux/Windows) Introduction, directory structure, file system, Hardware Requirement for Installation, Installation, Linux Commands & Shell Scripting, Configuring NFS Server for file sharing, Configuring Samba Server for connectivity with windows& other OS, Adding Removing Packages after installation, Installation of Modem & Dial-up Configuration, DNS Configuration, Understanding the DNS structure & different files for configuration
  • Configuring Web Server
    Understating the Web Server & different files needed for configuration, Hosting a Web Site in default location, Virtual Hosting, Adding information to DNS about the hosting, Performance tuning & Security for the web server
  • Configuring E-Mail Services
    Configuring Mail Server, Configuring Sendmail for SMTP & IMAP, Checking the mail server with Mail User Agent (MUA) like Mozilla mail, K Mail, Evolution Mail, Microsoft Outlook etc
  • Configuring Proxy Services
    Configuring Proxy Server, Setting HTTP Port, Setting Users, Creating Access

Module 2

This module would enable the participants to gain a comprehensive understanding on network designing and supervision, so as to enable them to visualize, administer, install, configure, manage and supervise local as well as wide area data networks, and projects based on the same.

This program would help them to understand basic fundamentals of networking including the OSI layered model, IP/IPX protocols, Network addressing, Network Management, LAN/WAN technologies, Routing protocols and basic operations of Routers and Switches including WAN Services such as Point to Point, ISDN & Frame Relay Connection.

Introduction to LAN/ WAN Technologies

Outline:

  • Networking Overview
    What is Computer Networking, Network Components, Network Types, Applications, Protocols, OSI model review, Functions of all the seven layers
  • LAN Components
    Overview, Local Operating Systems, Network Applications, Network Interface Cards, NIC Drivers, Network Cabling Systems, Category 5/6 UTP Horizontal Cabling Overview, Category 5/6 UTP Cabling Installation, Fiber Optics Overview, Connectivity Devices, Ethernet, Gigabit Ethernet
  • Introduction to Network Protocols (TCP/IP)
    Transport Layer Protocols, TCP, UDP, IP, ICMP, ARP, RARP, IP Addressing, IP Address Classes, Subnetting Principles, Default and subnet masking
  • Operating and Configuring Networking devices
    Operation of Cisco IOS Software, Command Line Interface, Commands of Routers and Switches, Configuring Cisco Devices from CLI
  • LAN Switching Technologies
    Switching Technology, Transparent bridge loop, IEEE Spanning-Tree algorithm (STP)
  • Virtual LANs (VLANs)
    Broadcast domains, Departmentalizing networks, Port-based vs. Mac-based VLANS, Protocol-based VLANS, 802.1Q trunking, Cisco ISL Trunking, Inter-Vlan communication
  • WAN Services
    Overview of WAN technologies and media options, Configuring HDLC, Configuring PPP with PAP and CHAP Authentication, Monitoring HDLC and PPP, ISDN, Frame relay
  • Network Layer Routing
    Routing principle, Dynamic Vs Static Routing, Routable vs. non-routable protocols, Differentiation of Routing protocols, Introduction to RIP, Convergence, Optimizing Routing Introduction to various LAN/WAN communication media as Lease line, VSAT, Radio, Wi-Fi, Wi-Max,etc.

Module 3 - Advanced Networking Technologies

This module would help the participants to understand the configuration and monitoring of advanced routing protocols like OSPF, EIGRP and BGP, defining policy based routing and handling large internetworks based on multiple protocols. This would also help them to plan scalability of the network infrastructure. It also aims at providing in-depth understanding of advanced technologies such as firewalls, IPS/IDS, VoIP, Wi-Fi, Wi.Max, VPNs, layer 3 switching, Quality of Service in data networks.

  • Advanced Networking concepts
    IPv6, TCP/IP in depth, Multicast, FTP/Telnet, VLSM
  • Advance Routing protocol, QoS and configuration
    RIP2, OSPF, EIGRP, BGP, Policy based routing, Deploying QoS, MPLS, RAS
  • NMS
    SNMP, RMON, Configuring Ciscoworks, Overview of EMS (Enterprise Management System)

Module 4 - Computer Security Fundamentals

This module would enable the participants to understand basic concepts of Computer Security and threats. This familiarize the participants to General Networking and Security Concepts, Identifying Threats, Intrusion Points, defense, TCP/IP Basics & Vulnerabilities, Certificate Basics, Cryptography, Public Key Infrastructure, Understanding CA Trust Model, Network Infrastructure Security, Communications Security. It would also cover Application Security( Mail, Web, File Transfer), User Security, Hardening of Network devices, OS, Server Application. It will provide awareness about Operational & Organizational Security and Incident Detection and Response.

Outline:

  • General Networking and Security Concepts
    Understanding the goal of Security, Identifying Threats,Intrusion Points, Defending Against Threats, Organisational and Operational Security, TCP/IP Basics, Basic TCP/IP Principles, TCP/IP Layers and Vulnerabilities
  • Certificate Basics
    Understanding Cryptography, Using Cryptography, Identifying the components of a Public Key Infrastructure, Understanding CA Trust Model, Understanding Certificate Life Cycle and Key Management
  • Network Infrastructure Security
    Understanding Network Infrastructure Security, Securing Network Cabling, Securing Connectivity Devices, Exploring Secure Topologies, Securing and Monitoring Network Resources
  • Communications, Application, User Security
    Understanding Remote Access Connectivity, Providing Secure Remote Access, Understanding Wireless Standards and Protocols, E-Mail Security, Web Security, File Transfer, Understanding Authentication, Understanding Access Control Models
  • Security Baselines
    Network Device and Operating System Hardening, Server Application Hardening
  • Operational and organizational Security
    Physical Security, Privilege Management, Removable Media, Protecting Business Continuity, Documentation, Risk Assessment, Security Education
  • Incident Detection and Response
    Attacks and Malicious code, Intrusion Detection Systems, Incident Response

Module 5 - Computer and Network Security

This module would enable the participants to gain a comprehensive understanding on designing and enforcing network security system so as to enable them to visualize, administer, install, configure,
manage and supervise such data networks, and projects based on the same. Course Outline:

  • Basic Networking and TCP/IP Refresher
    Network Fundamentals, IP Concepts, IOS and Router Filters
  • Information Security Management System
    Security Essentials, International Security Standards, Risk Analysis, Security Organization, Information and System Classification, Security Policies, Disaster Recovery Planning, Security Mechanisms, Physical Security of IS related Issues.
  • Internet Vulnerabilities and Hacker Exploits
    Internet Vulnerabilities, Types of Attacks, Target Identification and Reconnaissance, Risk Assessment Techniques, Gaining Control Over the System, Cracking Passwords, Recording Keystrokes, Hiding Evidence of Attack, SANS Top 20 Vulnerabilities
  • Designing and Configuring Firewalls
    Introduction, Firewall Components, Firewall Policy, Selection Criteria, Installing and Configuring Firewalls, Monitoring Firewall, Installing and Configuring ISA Server, Monitoring ISA Server, IP Tables Concepts and Implementation
  • Designing and Configuring IPS
    IDS Goals and Roles, IDS Technologies and Techniques, IDS Designs, Identifying IDS Signatures, IDS Deployment, IDS Limitations, Configuring IDS Configuring Secure VPNs
  • VPN Scenarios, VPN Technologies, Security Requirements, Comparing Tunneling Type, Implementing Site-to-Site Tunnels, Creating Tunnels for Access VPNs, Implementing IP Security, VPN Security
  • Securing Windows
    Windows Security Goals, Implementing the Latest Technologies, Extending Authentication Security, Securing Resources with NTFS Permissions, Deploying the Encrypting File System (EFS), Exposing Native NTFS Vulnerabilities, Protecting Active Directory Objects, Building and Deploying Templates to Secure your Environment, Ensuring the Integrity and Confidentiality of Data Transmission, Encryption Architectures, Managing Windows PKI Components
  • Securing Linux
    Achieving Linux Security, Protecting Data and Systems with Cryptography, Establishing Secure Account Usage, Monitoring and Disabling Accounts, Logging in Across the Network, Controlling Root Access, Auditing Super User Activity, Role Based Access Control (RBAC), Directory Structure and Partitioning for Security, Backup and Integrity Testing, The Network File System, Hardening Linux systems, Risks from Unwanted Program Execution, Issues with Scripts TCP/IP and its Security Loopholes, Securing Internal Network Services, Safely Connecting to External Networks, Securing FTP, e-mail and Web Access
  • Contingency Planning
    Fundamental Contingency Planning, Creation of the Contingency Plan, Technologies of Power, Backing up the Operating System
  • Security on the Internet and the WWW 
    Define the Weak points in the structure of the Internet, Web Site Attack Techniques, Attack techniques of Web Users, Hardening Internet Access Points
  • Tools and Techniques
    Network Scanning and Discovery Methods, Virus, Trojans, and Worms, Social Engineering techniques, Privilege Escalation, Keystroke Logging, Concepts of DoS, Password Weaknesses
  • Performance A Risk Analysis Concept of Risk Analysis, Methods/Process of Risk Analysis, Techniques to Minimize Risk, Continual Risk Analysis
  • Security Auditing, Attacks and Threat Analysis
    Security Auditing, Discovery Methods, Auditing Server Penetration and Attack Techniques, Security Auditing and the Control Phase, Intrusion Detection, Auditing and Log Analysis, Audit Results
  • Overview of Cyber Crime and IT Law
    Types of cyber crime, International case studies, fundamentals of Cyber Law, Jurisprudence of Cyber Law, E-commerce-Legal issues.
    Cyber crime and Digital Evidence, Penalties & Offences under the IT Act, Offences under the Indian Penal Code, Investigation & adjudication issues, Digital evidence

Module 6 - Data Center Implementation and Management

This module would enable the IT Managers/Project Managers to gain

understanding about the best practice for the design, construction and operation of computer rooms and data centres. It consists of a number of subsections that address the fundamental requirements of a successful design such as electrical power supply, air conditioning and data cabling.

It also covers the different networks and trends such as Virtualization etc to make them understand the relevance of the same.

Course Outline

Introduction

  • Introduction to Data Centre
  • Role of Data Centre in a Network
  • DC standards
  • The hierarchical model

Facilities and location

  • Recommendations for location, size, heights, floor loading, lighting and raised floors
  • Emergency lighting and signage
  • Services and facilities
  • Raised floor design recommendations

Rack location recommendations

  • Hot aisle/cold aisle model
  • Air distribution
  • What makes a rack a server rack?
  • 4-post and 2-post systems
  • Using tools like Vision

Power supplies

  • Electrical principles (volts, amps, watts, kVA)
  • Power factor and three phase
  • The meaning of N, N+1 2(N+1) etc
  • Estimating power requirements
  • Uninterruptible Power Supply (UPS) options
  • Power distribution to and in a rack
  • Power Distribution Units

Cooling

  • Basics of air conditioning principles
  • Comfort vs. precision air conditioning
  • Fresh air and ventilation requirements
  • Power consumption of air conditioning
  • Air conditioning options

Earthing

  • Applicable standards
  • Requirements

Cable containment

  • Applicable standards
  • Separation of power and data cables
  • Types of conduit, trunking, tray
  • Cable management in and to a rack

Fire design

  • Fire detection and suppression requirements of TIA 942
  • Pre-action sprinkler system
  • Smoke detector selection

Cabling components

  • Copper and Fibre optic cable standards
  • Components of Cabling
  • Different considerations
  • Trends

Security & Access Control

  • Fire detection and monitoring
  • Security and access control
  • CCTV
  • Building management systems
  • TIA 942 requirements for security and monitoring
  • IP networks that integrate security and monitoring
  • Rack level monitoring systems

Network designs & Requirements

  • LAN
  • SAN/NAS
  • Typical requirements
  • Important Considerations

Virtualization

  • Need for server consolidation
  • What is Virtualization
  • Tools & Technologies
  • Issues and Challenges
  • Benefits

DC Management

  • Tools required and options available
  • Integration of various tools
  • ITIL – introduction
  • BCP and Disaster Recovery

DC Operations

  • 24x7 operational requirements
  • Staffing arrangements
  • Legal compliance
  • Support functions
  • Reporting

Green IT

  • What is Green IT?
  • Impact on DC