Android 4.4 Application Development
·
Android is a top
niche in mobile application development sector. Android supports not just
mobile platform but also tablets and many other devices.
·
The extendable
application environment of Android is specifically designed to suit industry
requirements to tap the mobile consumer market and offers immense scope for
Android application developers.
·
Greater part of
Android application development is carried out in Java and our Android Training
Course focuses on Java based application development.
Why Android App
Development Course?
·
Model of
application development is changing to App based.
·
Android is most
popular OS for smart phones and all the businesses want to have their own Apps
for Android.
TOPICS
COVERED:
·
Introduction to
Java
·
Introduction to
Android
·
My First Android
Application
·
Application
Structure(in detail)
·
XML Introduction
to Basic UI design
·
Advanced UI
Programming
·
Intents &
Views (in detail)
·
Styles &
Themes
·
Adapters and
Widgtes
·
Tabs and
TabActivity
·
Data Storage
& SQLite Programming
·
Linkify &
Telephony API
·
Android Security
Essentials
·
Publishing
Android Applications
CISCO COURSES TAKEN IN REDBACK IT ACADEMY
Cisco Certified Network Associate (CCNA) is a
certification program for entry-level network engineers that helps maximize
your investment in foundational networking knowledge and increase the value of
your employer's network. CCNA is for Network Specialists, Network
Administrators, and Network Support Engineers with 0-3 years of experience. The
CCNA validates the ability to install, configure, operate, and troubleshoot
medium-size routed and switched networks.
TOPICS COVERED
Configure, verify and troubleshoot a switch with
VLANs and interswitch communications
·
Select the
appropriate media, cables, ports, and connectors to connect switches to other
network devices and hosts
·
Explain the
technology and media access control method for Ethernet networks
·
Explain network
segmentation and basic traffic management concepts
·
Explain basic
switching concepts and the operation of Cisco switches
·
Perform and
verify initial switch configuration tasks including remote access management
·
Verify network
status and switch operation using basic utilities (including: ping, traceroute,
telnet, SSH, arp, ipconfig), SHOW & DEBUG commands
·
Identify,
prescribe, and resolve common switched network media issues, configuration
issues, auto negotiation, and switch hardware failures
·
Describe
enhanced switching technologies (including: VTP, RSTP, VLAN, PVSTP, 802.1q)
·
Describe how
VLANs create logically separate networks and the need for routing between them
·
Configure,
verify, and troubleshoot VLANs
·
Configure, verify,
and troubleshoot trunking on Cisco switches
·
Configure,
verify, and troubleshoot interVLAN routing
·
Configure,
verify, and troubleshoot VTP
·
Implement basic
switch security (including: port security, trunk access, management vlan other
than vlan1, etc.)
CHFI (Computer Hacking Forensics Investigator)
CHFI (Computer Hacking
Forensics Investigator)
EC-Council releases the most
advanced Computer Forensic Investigation program in the world. CHFIv8 presents
a detailed methodological approach to computer forensics and evidence analysis.
It is a comprehensive course covering major forensic investigation scenarios
that enable students to acquire hands-on experience on various forensic
investigation techniques and standard tools necessary to successfully carry-out
a computer forensic investigation. Battles between corporations, governments,
and countries are no longer fought using physical force. Cyber war has begun
and the consequences can be seen in everyday life. With the onset of
sophisticated cyber-attacks, the need for advanced cyber security and
investigation training is a mandate in the present day. If you or your
organization requires the knowledge or skills to identify, track, and prosecute
the cybercriminals, then this is the course for you.This course helps students
to excel in digital evidence acquisition, handling and analysis in a
forensically sound manner. Acceptable in a court of law, these skills will lead
to successful prosecutions in various types of security incidents such as data
breaches, corporate espionage, insider threats and other intricate cases
involving computer systems.
In
preparation to earn an CHFI certification, Mazenet recommends a training path
based on a candidate’s background:
·
Computer
Forensics in Today’s World
·
Computer
Forensics Investigation Process
·
Searching
and Seizing Computers
·
Digital
Evidence
·
First
Responder Procedures
·
Computer
Forensics Lab
·
Understanding
Hard Disks and File Systems
·
Windows
Forensics
·
Data
Acquisition and Duplication
·
Recovering
Deleted Files and Deleted Partitions
·
Forensics
Investigation Using AccessData FTK
·
Forensics
Investigation Using EnCase
·
Steganography
and Image File Forensics
·
Application
Password Crackers
·
Log
Capturing and Event Correlation
·
Network
Forensics, Investigating Logs and Investigating Network Traffic
·
Investigating
Wireless Attacks
·
Investigating
Web Attacks
·
Tracking
Emails and Investigating Email Crimes
·
Mobile
Forensics
·
Investigative
Reports
·
Becoming
an Expert Witness
CSCU (Certified Secure Computer User)
CSCU
(Certified Secure Computer User)
The purpose of the CSCU training program is to
provide students with the necessary knowledge and skills to protect their
information assets. This class will immerse students into an interactive
environment where they will acquire fundamental understanding of various
computer and network security threats such as identity theft, credit card
fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex
offenders lurking online, loss of confidential information, hacking attacks and
social engineering. More importantly, the skills learnt from the class helps
students take the necessary steps to mitigate their security exposure.
In preparation to earn
an CSCU certification, Mazenet recommends a training path based on a
candidate’s background:
Ø Foundations of Security
Ø Securing Operating Systems
Ø Protecting System Using Antiviruses
Ø Data Encryption
Ø Data Backup and Disaster Recovery
Ø Internet Security
Ø Securing Network Connections
Ø Securing Online Transactions
Ø Securing Email Communications
Ø Social Engineering and Identity Theft
Ø Security on Social Networking Sites
Ø Information Security and Legal Compliance
Ø Securing Mobile Devices
CCNA SECURITY
CCNA SECURITY
Cisco
Certified Network Associate Security (CCNA Security) validates associate-level
knowledge and skills required to secure Cisco networks. With a CCNA Security
certification, a network professional demonstrates the skills required to
develop a security infrastructure, recognize threats and vulnerabilities to
networks, and mitigate security threats. The CCNA Security curriculum
emphasizes core security technologies, the installation, troubleshooting and
monitoring of network devices to maintain integrity, confidentiality and
availability of data and devices, and competency in the technologies that Cisco
uses in its security structure.
In
preparation to earn an CCNA Security, Mazenet recommends the following training
courses:
Common Security Threats
·
Describe
common security threats
Security and Cisco Routers
·
Implement
security on Cisco routers
·
Describe
securing the control, data, and management plane
·
Describe
Cisco Security Manager
·
Describe
IPv4 to IPv6 transition
AAA on Cisco Devices
·
Implement
AAA (authentication, authorization, and accounting)
·
Describe
TACACS+
·
Describe
RADIUS
·
Describe
AAA
·
Verify
AAA functionality
IOS ACLs
·
Describe
standard, extended, and named IP IOS access control lists (ACLs) to filter
packets
·
Describe
considerations when building ACLs
·
Implement
IP ACLs to mitigate threats in a network
Secure Network Management and
Reporting
·
Describe
secure network management
·
Implement
secure network management
Common Layer 2 Attacks
·
Describe
Layer 2 security using Cisco switches
·
Describe
VLAN security
·
Implement
VLANs and trunking
·
Implement
spanning tree
Cisco Firewall Technologies
·
Describe
operational strengths and weaknesses of the different firewall technologies
·
Describe
stateful firewalls
·
Describe
the types of NAT used in firewall technologies
·
Implement
zone-based policy firewall using CCP
·
Implement
the Cisco Adaptive Security Appliance (ASA)
·
Implement
Network Address Translation (NAT) and Port Address Translation (PAT)
Cisco IPS
·
Describe
Cisco Intrusion Prevention System (IPS) deployment considerations
·
Describe
IPS technologies
·
Configure
Cisco IOS IPS using CCP
VPN Technologies
·
Describe
the different methods used in cryptography
·
Describe
VPN technologies
·
Describe
the building blocks of IPSec
·
Implement
an IOS IPSec site-to-site VPN with pre-shared key authentication
·
Verify
VPN operations
·
Implement
Secure Sockets Layer (SSL) VPN using ASA device manager
RHCE on Red Hat Enterprise Linux 7
Red Hat Certified
Engineer (RHCE) v.7
A Red Hat® Certified Engineer (RHCE®) is
a Red Hat Certified System Administrator (RHCSA) who possesses additional
skills, knowledge, and abilities required of a senior system administrator
responsible for Red Hat Enterprise Linux® systems.
Get ready for world’s no. 1 Open
Source - Linux certification on Red Hat Enterprise Linux 7. This course is also
covering the RHCSA on Red Hat Enterprise Linux 7 certification exams!
Courses Outline
Control services and daemons
Review
how to manage services and the boot-up process using systemctl.
Manage IPv6 networking
Configure
and troubleshoot basic IPv6 networking on Red Hat Enterprise Linux systems.
Configure link aggregation and bridging
Configure
and troubleshoot advanced network interface functionality including bonding,
teaming, and local software bridges.
Control network port security
Permit
and reject access to network services using advanced SELinux and firewalld
filtering techniques.
Manage DNS for servers
Set and
verify correct DNS records for systems and configure secure DNS caching.
Configure email delivery
Relay
all email sent by the system to an SMTP gateway for central delivery.
Provide block-based storage
Provide
and use networked iSCSI block devices as remote disks.
Provide file-based storage
Provide
NFS exports and SMB file shares to specific systems and users.
Configure MariaDB databases
Provide
a MariaDB SQL database for use by programs and database administrators.
Provide Apache HTTPD web service
Configure
Apache HTTPD to provide Transport Layer Security (TLS)-enabled websites and
virtual hosts.
Write Bash scripts
Write
simple shell scripts using Bash.
Bash conditionals and control structures
Use Bash
conditionals and other control structures to write more sophisticated shell
commands and scripts.
Configure the shell environment
Customize
Bash startup and use environment variables, Bash aliases, and Bash functions.
Linux containers preview
Preview
the capabilities of Linux containers, Docker, and other related technologies in
Red Hat Enterprise Linux 7.
Microsoft Exchange Server 2013
Microsoft
Exchange Server is the World's top selling email server solution.
In this
course, students who are new to Microsoft Exchange Server will learn how to
install, configure, manage and troubleshoot Exchange Server.
MCSE:
Messaging training
This
course is based on the Microsoft official syllabus for required for the MCSE:Messaging certification exams.
S.No
|
Details
|
1
|
Plan, Install,
Configure, and Manage Transport
|
|
Plan a high
availability solution for common scenarios
|
|
Design a
transport solution
|
|
Configure and
manage transport
|
|
Troubleshoot and
monitor transport
|
|
Configure and
manage hygiene
|
2
|
Install,
Configure, and Manage the Mailbox Role
|
|
Plan the mailbox
role
|
|
Configure and
manage the mailbox role
|
|
Deploy and manage
high availability solutions for the mailbox role
|
|
Monitor and
troubleshoot the mailbox role
|
|
Develop backup
and recovery solutions for the mailbox role and public folders
|
|
Create and
configure mail-enabled objects
|
|
Manage
mail-enabled object permissions
|
3
|
Plan, Install,
Configure, and Manage Client Access
|
|
Plan, deploy, and
manage a Client Access Server (CAS)
|
|
Plan and
configure namespaces and client services
|
|
Deploy and manage
mobility solutions
|
|
Implement load
balancing
|
|
Troubleshoot
client connectivity
|
4
|
Design and Manage
an Exchange Infrastructure
|
|
Plan for impact
of Exchange on Active Directory directory services
|
|
Administer
Exchange Workload Management
|
|
Plan and manage
Role Based Access Control (RBAC)
|
|
Design an
appropriate Exchange solution for a given SLA
|