Android 4.4 Application Development


·        Android is a top niche in mobile application development sector. Android supports not just mobile platform but also tablets and many other devices.
·        The extendable application environment of Android is specifically designed to suit industry requirements to tap the mobile consumer market and offers immense scope for Android application developers.
·        Greater part of Android application development is carried out in Java and our Android Training Course focuses on Java based application development.




Why Android App Development Course?
·        Model of application development is changing to App based.
·        Android is most popular OS for smart phones and all the businesses want to have their own Apps for Android.
TOPICS COVERED:
·        Introduction to Java
·        Introduction to Android
·        My First Android Application
·        Application Structure(in detail)
·        XML Introduction to Basic UI design
·        Advanced UI Programming
·        Intents & Views (in detail)
·        Styles & Themes
·        Adapters and Widgtes
·        Tabs and TabActivity
·        Data Storage & SQLite Programming
·        Linkify & Telephony API
·        Android Security Essentials
·        Publishing Android Applications
Wednesday, 20 August 2014
Posted by Unknown
Tag :

CISCO COURSES TAKEN IN REDBACK IT ACADEMY

Cisco Certified Network Associate (CCNA) is a certification program for entry-level network engineers that helps maximize your investment in foundational networking knowledge and increase the value of your employer's network. CCNA is for Network Specialists, Network Administrators, and Network Support Engineers with 0-3 years of experience. The CCNA validates the ability to install, configure, operate, and troubleshoot medium-size routed and switched networks.




TOPICS COVERED
Configure, verify and troubleshoot a switch with VLANs and interswitch communications
·        Select the appropriate media, cables, ports, and connectors to connect switches to other network devices and hosts
·        Explain the technology and media access control method for Ethernet networks
·        Explain network segmentation and basic traffic management concepts
·        Explain basic switching concepts and the operation of Cisco switches
·        Perform and verify initial switch configuration tasks including remote access management
·        Verify network status and switch operation using basic utilities (including: ping, traceroute, telnet, SSH, arp, ipconfig), SHOW & DEBUG commands
·        Identify, prescribe, and resolve common switched network media issues, configuration issues, auto negotiation, and switch hardware failures
·        Describe enhanced switching technologies (including: VTP, RSTP, VLAN, PVSTP, 802.1q)
·        Describe how VLANs create logically separate networks and the need for routing between them
·        Configure, verify, and troubleshoot VLANs
·        Configure, verify, and troubleshoot trunking on Cisco switches
·        Configure, verify, and troubleshoot interVLAN routing
·        Configure, verify, and troubleshoot VTP

·        Implement basic switch security (including: port security, trunk access, management vlan other than vlan1, etc.)
Monday, 18 August 2014
Posted by Unknown

CHFI (Computer Hacking Forensics Investigator)

CHFI (Computer Hacking Forensics Investigator)
EC-Council releases the most advanced Computer Forensic Investigation program in the world. CHFIv8 presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation. Battles between corporations, governments, and countries are no longer fought using physical force. Cyber war has begun and the consequences can be seen in everyday life. With the onset of sophisticated cyber-attacks, the need for advanced cyber security and investigation training is a mandate in the present day. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminals, then this is the course for you.This course helps students to excel in digital evidence acquisition, handling and analysis in a forensically sound manner. Acceptable in a court of law, these skills will lead to successful prosecutions in various types of security incidents such as data breaches, corporate espionage, insider threats and other intricate cases involving computer systems.





In preparation to earn an CHFI certification, Mazenet recommends a training path based on a candidate’s background:
·         Computer Forensics in Today’s World
·         Computer Forensics Investigation Process
·         Searching and Seizing Computers
·         Digital Evidence
·         First Responder Procedures
·         Computer Forensics Lab
·         Understanding Hard Disks and File Systems
·         Windows Forensics
·         Data Acquisition and Duplication
·         Recovering Deleted Files and Deleted Partitions
·         Forensics Investigation Using AccessData FTK
·         Forensics Investigation Using EnCase
·         Steganography and Image File Forensics
·         Application Password Crackers
·         Log Capturing and Event Correlation
·         Network Forensics, Investigating Logs and Investigating Network Traffic
·         Investigating Wireless Attacks
·         Investigating Web Attacks
·         Tracking Emails and Investigating Email Crimes
·         Mobile Forensics
·         Investigative Reports

·         Becoming an Expert Witness
Thursday, 14 August 2014
Posted by Unknown

CSCU (Certified Secure Computer User)

CSCU (Certified Secure Computer User)    




The purpose of the CSCU training program is to provide students with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learnt from the class helps students take the necessary steps to mitigate their security exposure.

In preparation to earn an CSCU certification, Mazenet recommends a training path based on a candidate’s background:
Ø Foundations of Security
Ø Securing Operating Systems
Ø Protecting System Using Antiviruses
Ø Data Encryption
Ø Data Backup and Disaster Recovery
Ø Internet Security
Ø Securing Network Connections
Ø Securing Online Transactions
Ø Securing Email Communications
Ø Social Engineering and Identity Theft
Ø Security on Social Networking Sites
Ø Information Security and Legal Compliance

Ø Securing Mobile Devices
Sunday, 10 August 2014
Posted by Unknown

CCNA SECURITY

CCNA  SECURITY
Cisco Certified Network Associate Security (CCNA Security) validates associate-level knowledge and skills required to secure Cisco networks. With a CCNA Security certification, a network professional demonstrates the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. The CCNA Security curriculum emphasizes core security technologies, the installation, troubleshooting and monitoring of network devices to maintain integrity, confidentiality and availability of data and devices, and competency in the technologies that Cisco uses in its security structure.





In preparation to earn an CCNA Security, Mazenet recommends the following training courses:
Common Security Threats
·         Describe common security threats
Security and Cisco Routers
·         Implement security on Cisco routers
·         Describe securing the control, data, and management plane
·         Describe Cisco Security Manager
·         Describe IPv4 to IPv6 transition
AAA on Cisco Devices
·         Implement AAA (authentication, authorization, and accounting)
·         Describe TACACS+
·         Describe RADIUS
·         Describe AAA
·         Verify AAA functionality
IOS ACLs
·         Describe standard, extended, and named IP IOS access control lists (ACLs) to filter packets
·         Describe considerations when building ACLs
·         Implement IP ACLs to mitigate threats in a network
Secure Network Management and Reporting
·         Describe secure network management
·         Implement secure network management
Common Layer 2 Attacks
·         Describe Layer 2 security using Cisco switches
·         Describe VLAN security
·         Implement VLANs and trunking
·         Implement spanning tree
Cisco Firewall Technologies
·         Describe operational strengths and weaknesses of the different firewall technologies
·         Describe stateful firewalls
·         Describe the types of NAT used in firewall technologies
·         Implement zone-based policy firewall using CCP
·         Implement the Cisco Adaptive Security Appliance (ASA)
·         Implement Network Address Translation (NAT) and Port Address Translation (PAT)
Cisco IPS
·         Describe Cisco Intrusion Prevention System (IPS) deployment considerations
·         Describe IPS technologies
·         Configure Cisco IOS IPS using CCP
VPN Technologies
·         Describe the different methods used in cryptography
·         Describe VPN technologies
·         Describe the building blocks of IPSec
·         Implement an IOS IPSec site-to-site VPN with pre-shared key authentication
·         Verify VPN operations

·         Implement Secure Sockets Layer (SSL) VPN using ASA device manager
Wednesday, 6 August 2014
Posted by Unknown

RHCE on Red Hat Enterprise Linux 7

Red Hat Certified Engineer (RHCE) v.7

A Red Hat® Certified Engineer (RHCE®) is a Red Hat Certified System Administrator (RHCSA) who possesses additional skills, knowledge, and abilities required of a senior system administrator responsible for Red Hat Enterprise Linux® systems.
Get ready for world’s no. 1 Open Source - Linux certification on Red Hat Enterprise Linux 7. This course is also covering the RHCSA on Red Hat Enterprise Linux 7 certification exams!



Courses Outline
Control services and daemons
Review how to manage services and the boot-up process using systemctl.
Manage IPv6 networking
Configure and troubleshoot basic IPv6 networking on Red Hat Enterprise Linux systems.
Configure link aggregation and bridging
Configure and troubleshoot advanced network interface functionality including bonding, teaming, and local software bridges.
Control network port security
Permit and reject access to network services using advanced SELinux and firewalld filtering techniques.
Manage DNS for servers
Set and verify correct DNS records for systems and configure secure DNS caching.
Configure email delivery
Relay all email sent by the system to an SMTP gateway for central delivery.
Provide block-based storage
Provide and use networked iSCSI block devices as remote disks.
Provide file-based storage
Provide NFS exports and SMB file shares to specific systems and users.
Configure MariaDB databases
Provide a MariaDB SQL database for use by programs and database administrators.
Provide Apache HTTPD web service
Configure Apache HTTPD to provide Transport Layer Security (TLS)-enabled websites and virtual hosts.
Write Bash scripts
Write simple shell scripts using Bash.
Bash conditionals and control structures
Use Bash conditionals and other control structures to write more sophisticated shell commands and scripts.
Configure the shell environment
Customize Bash startup and use environment variables, Bash aliases, and Bash functions.
Linux containers preview

Preview the capabilities of Linux containers, Docker, and other related technologies in Red Hat Enterprise Linux 7.
Monday, 4 August 2014
Posted by Unknown
Tag :

Microsoft Exchange Server 2013

 Microsoft Exchange Server is the World's top selling email server solution.
In this course, students who are new to Microsoft Exchange Server will learn how to install, configure, manage and troubleshoot Exchange Server.




MCSE: Messaging training
This course is based on the Microsoft official syllabus for required for the  MCSE:Messaging certification exams.
S.No
Details
1
Plan, Install, Configure, and Manage Transport

Plan a high availability solution for common scenarios

Design a transport solution

Configure and manage transport

Troubleshoot and monitor transport

Configure and manage hygiene
2
Install, Configure, and Manage the Mailbox Role

Plan the mailbox role

Configure and manage the mailbox role

Deploy and manage high availability solutions for the mailbox role

Monitor and troubleshoot the mailbox role

Develop backup and recovery solutions for the mailbox role and public folders

Create and configure mail-enabled objects

Manage mail-enabled object permissions
3
Plan, Install, Configure, and Manage Client Access

Plan, deploy, and manage a Client Access Server (CAS)

Plan and configure namespaces and client services

Deploy and manage mobility solutions

Implement load balancing

Troubleshoot client connectivity
4
Design and Manage an Exchange Infrastructure

Plan for impact of Exchange on Active Directory directory services

Administer Exchange Workload Management

Plan and manage Role Based Access Control (RBAC)

Design an appropriate Exchange solution for a given SLA


Friday, 1 August 2014
Posted by Unknown

widget

Pageviews

Cloud Label

Blogumulus by Roy Tanck and Amanda Fazani

- Copyright © 2013 Redback IT Academy -- Powered by Redback - Designed by @ Redback Studio -