Archive for February 2016

Hardware and Networking Training in Vellore and Gudiyatham

About :
Hardware and Networking is a vast field in India. It is refers to the process of supplying data and information by linking the group of networks using hardware’s such as switches, hubs, gateways, access points, network interface cards, networking cables. To be more specific, hardware networking includes all peripherals, computers, interface cards and other tools required for communications and data processing in the network. 
Prerequisites :
  •  Any graduate with computer knowledge.
  •  Familiar in using internet.
  • Basic background knowledge of computer.

Course Highlights :
  • Customized modules crafted according to the current technology needs.
  • Exposure to use latest tools to fetch the database.
  • Expert faculty teaching
  • Facility to learn while doing college degree.
  • 100% practical learning with live projects.
  • Career assistance and guidance even after course completion.

Course Modules:
•  Introduction to PC & Operating System
•  Disk Operating System
•  Windows 95 & 98
•  Booting Sequence
•  Installing and Configuring Devices
•  Microprocessor & Advanced Processor
•  Identify purposes and characteristics of Cabling and their connectors
•  Motherboard Logics
•  Configure common IDE, SCSI and Peripheral Devices
•  Support Chips
•  PC Memory, Mother Boards & BIOS
•  Bus Standards
•  Serial Ports, Parallel & USB Interface
•  Mouse & Keyboard
•  Floppy Disk Drive & Hard disk drive
•  Backup Devices & Optical Storage Devices
•  Electrical & Electronics Concepts
•  Display Adapters & Monitors
•  Printers & Scanners
•  Special Peripherals Devices
•  Laptop & Palmtop Computers
•  Install, Configure and Upgrade Operating System
•  Interpret Common Error Codes and Start-Up Messages of the OS
•  Managing Application on Windows 98
•  Disassembly Installation and Reassembly
•  Communication & Customer Interaction
•  Identify Steps to Isolate and Troubleshoot the problems
•  Identify Basic Troubleshooting Procedures and Tools and Preventive measures
•  Troubleshoot and Optimize the Operating System
•  Multimedia & Modern
•  Identify procedures for Establishing Internet Connectivity
•  Computer Viruses & Anti Viruses
•  Preventive Measures

 •  Recognize the following logical or physical network topologies
•  Understand the networking standards
•  Ethernet Technologies
•  Identify the characteristics of different types of cables
•  Connecting devices and identification of components
•  IEEE standards
•  MAC Address
•  ISO/OSI Model
•  TCP/IP Protocol suite
•  BOOTP/DHCP/SNMP Protocols
•  IP Addressing and sub netting
•  WAN Technologies
•  Security protocols
•  Proxy servers and firewalls
•  Network operating systems
•  Windows 2000
•  Windows 2003
•  Novell Netware
•  Unix
•  Linux
•  Fault tolerance
•  Upgrades and modifications
•  Implementing the network
•  Network security & remote connectivity
•  Maintaining & trouble shooting the network

Session and Training Schedule:
Weekdays (30 days) – 5 days/week
2 Hours/day - 1 Hour Theory, 1 Hour Practical
Weekends (4 weeks) – 2 days/week
4 Hours/day - 2 Hours Theory, 2 hours Practical

Our Institute Location:
Redback IT Solutions Private Limited,
Sathuvacheri,( Near Vallalar Water Tank)
Vellore. 632602

Contact :
Training Coordinator
Friday, 19 February 2016
Posted by Siva Priya

Ethical Hacking Training

An ethical hacker is a computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit.

The Certified Professional Hacker - Redback is a revolution in the field of information security training. It goes far beyond the usual courses that talk about the same old port scanning and vulnerability assessments. It goes deep down into the depths of networking, systems, web applications and actual exploitation.

Here are top 5 reasons why the CPH Risc is the ideal choice in comparison to other ethical hacking courses.

- Training executed completely by practitioners and led by our Principal Consultant and well-renowned information security expert – RISC

- Coverage of the latest trends in information security – Advanced Persistent Threats, SCADA Hacking (analysis of Stuxnet), and Mobile Hacking

- Heavy focus on practical aspects and usage of tools and toolkits such as Backtrack, Metasploit, Burp Suite, Kismet, Air-crack Ng,

- Case studies and real-life examples to explain key concepts

- The entire training program is designed by our Principal Consultant RISC Security Team, and we can assure you that it is aimed specifically to make you an expert in ethical hacking and a much sought-after security analyst.

Training Venue : Redback Academy Training Locations


Email : | Mobile : 8189985551 , 8189985556, 8189985559

Vellore | Kanchipuram | Gudiyatham | Chennai | Hosur | Thiruvannamalai
Wednesday, 17 February 2016
Posted by Redback India

Ethical Hacking Training and Workshop in Vellore

About :
This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defences work and then be lead into scanning and attacking their own networks, no real networks is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system.

Anyone who is concerned about the integrity of the network infrastructure and significantly benefit Security officers, auditors, security Professionals, site administrators.

Our Training Method :
Train in a ready-to-learn comfortable environment
Interact with Cyber Security Specialist & Security expert instructors
Get hands-on labs, industry oriented experience
Results-oriented course content
Highest Pass Rates
Choose from Day, Evening & Weekend Classes to meet your busy schedule.
Real time  Placement assistance on successful completion of the course.

Modules :
-Introduction to Ethical Hacking
-Foot printing and Reconnaissance
-Scanning Networks
-System Hacking
-Malware Threats
-Evading IDS, Firewalls and Honey pots
-Social Engineering
-Denial of Service
-Session Hijacking
-Hacking web server's
-Hacking web applications
-SQL Injection
-Hacking Wireless Networks
-Hacking Mobile Platforms
-Cloud Computing

Session and Training Schedule:  
Weekdays (30 days) – 5 days/week  
2 Hours/day - 1 Hour Theory, 1 Hour Practical  

Weekends (4 weeks) – 2 days/week  
4 Hours/day - 2 Hours Theory, 2 hours Practical 

Our Institute Location:  

Redback IT Solutions Private Limited,  
Sathuvacheri,( Near Vallalar Water Tank)  
Vellore. 632602 

Contact :  
Training Coordinator  
+91 8189985551 

Monday, 15 February 2016
Posted by Siva Priya

CCNP Certification in Vellore

CCNP Certification:
CCNP Certification Introduction.
The CCNP (Cisco Certified Network Professional) Certification is one of the important certifications from Cisco that a networking professional must have to move ahead in their career. The CCNP certification training is now in great demand in the IT industry and over the recent years it has become a global standard for many successful IT companies.
This certification from CISCO is accepted all over the world as the best in the field of networking. It is perfect for people who wish to excel in this field, for those who are ready to advance their skills or those who have been trying to get into top positions in their networking career. The CCNP certification also equips the network engineer to work independently on complex network solutions.

CCNP Training Details

The all new CCNP Training offered by Redback Academy has 2 modules 1) CCNP ROUTE 2) CCNP Switch which validate the ability to plan, implement, verify and troubleshoot local and wide-area enterprise networks. The course covers topics like EIGRP, OSPF, BGP, IPv6, VPNs, L2 / L3 Switching, VLAN, VTP, HSRP, VRRP, GLBP, VOIP, Wireless, Troubleshooting methods.
The CCNP training is given by proven Senior Network / WAN Engineers possessing several years of field experience.

CCNP Course Details

ROUTE - (300-101)

Introduction to Router and Routing Protocols:
ü  Static Routing, Dynamic Routing, Default Routing
ü  IP Addressing, Summarization (Auto and Manual)
Enhanced Interior Gateway Routing Protocol
ü  EIGRP Features, EIGRP Update Process
ü  Configuration and Verification of EIGRP Tables
ü  EQUAL and UNEQUAL Metric Route Load Sharing
ü  Summarization, EIGRP Metric Tuning
ü  Manipulating Hello and Hold Timer, Static Neighbor configuration
ü  Static Neighbor configuration
ü  Passive Interfaces, Authentication
ü  Neighbor ship over WAN, EIGRP Stub features
ü  Default Route with EIGRP
ü  Route Filtering by using ACL, IP Prefix-list and Route-Map
ü  OSPF Link State Features, Packet Types
ü  OSPF Neighbors and Adjacencies on LAN and WAN
ü  LSA TYPES, OSPF Metric Calculation and Tuning
ü  OSPF Network Types (Point-to-Point, BMA, NBMA)
ü  OSPF Configuration and Verification, Route Filtering
ü  Route Summarization, Default Route in OSPF
ü  Special Areas (Stub, Totally Stubby, NSSA, Totally NSSA)
ü  OSPF Virtual Link with Authentication / No Authentication
ü  Manipulating Hello and Dead Intervals
Route Redistribution
ü  Redistribution Concepts and Process
ü  Redistributing into EIGRP / OSPF / RIP
Advance Redistribution:
ü  PBR function and configuration
ü  Redistribution with Route-Map / Distribute-list
ü  Issues with Multiple Redistribution Points
ü  IP Service Level Agreement
Border Gateway Protocol
ü  Basics of Internet Routing and Addressing
ü  Internet Route Aggregation, BGP ASNs (Public and Private ASNs)
ü  BGP ASNs (Public and Private ASNs)
ü  Single Homed, Dual Homed
ü  Single Multi homed, Dual Multi homed
ü  Internal BGP: Next-hop Issue with IBGP
ü  Split-Horizon, IBGP Mesh
ü  Clearing BGP Peers (Inbound and Outbound Filtering)
ü  IBGP Neighbors with Loopback Address
ü  External BGP: EBGP Neighbors with Loopback Address
ü  BGP Update Messages and BGP States
ü  Effect of Auto Summarization in BGP
ü  BGP Path Attributes: Weight, Local Preference, As-path Pre-pend
ü  Origin Codes, Multi Exit Discriminator
ü  BGP Route Filtering and BGP PATH Selection Process
IP Version 6 Addressing
ü  IPV6 Address Representation, Types of IPV6 Addresses
ü  Global Route Aggregation, Static IPV6 Address Configuration
ü  Stateful DHCP, Stateless Auto Configuration
ü  Multicast and other Special IPV6 Addresses, DAD
ü  IPV6 Routing Protocols and IGP Redistribution
ü  IPV4 and IPV6 Co-existence: Dual Stack / Tunneling / NAT-PT
ü  Static Point-to-Point IPV6 Tunneling
ü  Dynamic Multipoint IPV6 Tunnel:
ü  Auto and Manual 6 to 4 Tunnel, ISATAP Tunnel
Routing over Branch Internet Connection
ü  Broadband Internet Access
ü  DSL Concepts, DSL types, PPPoE / PPPoA
ü  Virtual Private Network:
ü  Site-to-Site VPN
ü  IPSEC Tunnel, GRE Tunnel
SWITCH - (300-115)
Enterprise Campus Network Design
ü  Hierarchical Network Design
ü  Multi Layer Switch Operation, Types of Multi Layer Switch
ü  Switching Tables: CAM / TCAM
ü  Switch Port Cables and Connectors
ü  Switch Port Configuration: Port Speed & Port Duplex Mode
ü  VLAN and TRUNKS: VLAN Membership and Deployment
ü  Trunk Encapsulation (ISL/Dotlq), DTP
ü  VLAN Trunking Protocol: VTP Domain / Modes / Advertisement
ü  VTP Version and VTP Pruning
Aggregating Switch Link
ü  Switch Port Aggregating with Ether Channel
ü  Ether Channel Load Balancing
ü  Ether Channel Negotiation Protocol (PAgP, LACP)
Spanning Tree Protocol
ü  STP States, STP Timers
ü  Types of STP: CST/PVST /PVST+
ü  STP Root Bridge Placement and Configuration
ü  STP Customization, Modifying STP Timers
Advance Spanning Tree Protocol
ü  Rapid Spanning Tree Protocol:
ü  BPDU & Convergence in RSTP
ü  Multiple Spanning Tree Protocol:
ü  MST Region, Instances with MST
ü  Type of Interfaces in MLS, Inter VLAN Routing in MLS
ü  Multi Layer Switching with CEF, DHCP within a MLS
ü  Routing Configuration in MLS
Layer 3 High Availability
ü  Supervisor and Route Processor Redundancy
ü  Configuring Redundancy Modes & Supervisor Synchronization
ü  Non Stop Forwarding
Wireless LAN
ü  WLAN Basics and WLAN Standards
ü  WLAN Architecture and Functions
ü  Light Weight Access Point Operation
Securing Switched Network
ü  Port Security / 802.1x Authentication, Port Based Authentication
ü  Mitigating Spoofing Attacks, DHCP Snooping, IP Source Guard
ü  Dynamic ARP Inspection, VLAN ACL, Securing VLAN Trunk,
ü  VLAN Hopping, Private-VLAN Concept
TSHOOT - (300-135)
ü  Introduction to Network Maintenance
ü  Introduction to Troubleshooting Process
ü  Maintenance & Troubleshooting
ü  Basic & Adv. Cisco Catalyst Switch Troubleshooting
ü  Introduction to Troubleshooting Routing Protocols
ü  Security Troubleshooting
ü  IP Services Troubleshooting
ü  IP Communications Troubleshooting
ü  Network Monitoring tools PRTG, SolarWinds
ü  Packet Analyzing & Sniffing tools Wirelshark

Our Institute Location:
Redback IT Solutions Private Limited,
Sathuvacheri,( Near Vallalar Water Tank)
Vellore. 632602

Contact :
Training Coordinator
+91 8189985551
Wednesday, 10 February 2016
Posted by Siva Priya

Follow by Email

Google+ Followers


Cloud Label

Blogumulus by Roy Tanck and Amanda Fazani

- Copyright © 2013 Redback IT Academy -- Powered by Redback - Designed by @ Redback Studio -