DevLustro Certified IT Infra Manager – Training Course

What the specialist says

This program is structured so you can actually apply it on client or company projects.

Mahima R Senior Technical Mentor

Acquire Key Infrastructure Skills: Master IT Management, Earn Certification, Launch Your IT Infrastructure Career! DevLustro Certified IT INFRA MANAGER – Training Course offers comprehensive training to equip you with critical IT infrastructure management skills. The course includes CompTIA Hardware A+ and CompTIA Network+ (N10-008) training. Our program is designed to ensure you gain the expertise needed for effective IT infrastructure management. Completing these modules provides you with 100% placement assurance , ensuring you are job-ready for a successful career in IT. Course was selected for our collection of top-rated courses trusted by businesses worldwide.

Our Core Highlights

World Class Instructor
World Class Instructor Mentorship from global experts
1:1 with Industry Expert
1:1 with Industry Expert Personalised coaching tailored to you
Global Hiring Network
Global Hiring Network 400+ hiring partners around the world
Average Salary Hike
Average Salary Hike 55% average hike for our alumni

Course Description

Acquire Key Infrastructure Skills: Master IT Management, Earn Certification, Launch Your IT Infrastructure Career! Elysium Certified IT INFRA MANAGER – Training Course offers comprehensive training to equip you with critical IT infrastructure management skills. The course includes CompTIA Hardware A+ and CompTIA Network+ (N10-008) training. Our program is designed to ensure you gain the expertise needed for effective IT infrastructure management. Completing these modules provides you with 100% placement assurance , ensuring you are job-ready for a successful career in IT. Course was selected for our collection of top-rated courses trusted by businesses worldwide.

Software Development Training Course

Course Details

Gain expertise in infrastructure design and performance optimization.

Understand and apply IT policies, compliance, and best practices.

Develop practical skills through hands-on labs and real-world project simulations.

Software Testing is the foundation that ensures the reliability and quality of software products.

Test Execution is where the software is meticulously tested, identifying and eliminating defects.

Software Testing is the essential groundwork upon which robust and secure software systems are built.

Course Goals

  • Master IT infrastructure fundamentals, including network administration, server management, and virtualization.
  • Dive into advanced concepts such as cloud computing, IT automation, and disaster recovery.
  • Learn to implement efficient and secure IT systems and networks.

Future Scope of this Course

  • Recognized worldwide

Our Career Service

  • Elysium Certified IT Infra Manager – Training Course
  • Personalized coordinator.
  • Trainer feedback.
  • Trainer availability post sessions.
  • Get your staff certified.
  • Certificate from governing bodies.
  • Certified Testing Experts analyze test results and derive meaningful insights to improve software quality.

Our Training Program Benefits

  • Real-world IT Infrastructure Projects
  • Hands on assignment
  • Curriculum that focuses on the learner.
  • Live, interactive training by DevLustro experts.
  • Curriculum aligned with current industry practices.
  • Portfolio / project support for real-world use.
01Chapter-1 Install And Conficure Laptop Hardware
  • 01.01Battery
  • 01.02Keyboard/Keys
  • 01.03Random Access Memory (RAM)
  • 01.04Hard Disk Drive (HDD)/Solid State Drive (SSD) Migration
  • 01.05HDD/SSD Replacement
  • 01.06Wireless Cards
  • 01.07Biometrics
  • 01.08Near-Field Scanner Features
  • 01.09In-Plane Switching (IPS)
  • 01.10Twisted Nematic (TN)
  • 01.11Vertical Alignment (VA)
  • 01.12Mobile Display Components
  • 01.13WiFi Antenna Connector/Placement
  • 01.14Camera/Webcam
  • 01.15Microphone
  • 01.16Touch Screen/Digitizer
  • 01.17Inverter
02Chapter-2 Conficure Accessories
  • 02.01Universal Serial Bus (USB)/ USB-C/ microUSB/ miniUSB
  • 02.02Lightning
  • 02.03Serial Interfaces
  • 02.04Near-Field Communication (NFC)
  • 02.05Bluetooth
  • 02.06Hotspot
  • 02.07Touch Pens
  • 02.08Headsets
  • 02.09Speakers
  • 02.10Webcam
  • 02.11Docking Station
  • 02.12Port Replicator
  • 02.13Trackpad/Drawing Pad
03Chapter-3 Mobile-Device Network Connectivity
  • 03.012G/3G/4G/5G
  • 03.02Hotspot
  • 03.03Global System for Mobile Communications (GSM) vs. Code-Division Multiple Access (CDMA)
  • 03.04Preferred Roaming List (PRL) Updates
  • 03.05Global Positioning System (GPS) Services
  • 03.06Cellular Location Services
  • 03.07Corporate Email Configuration
  • 03.08Two-Factor Authentication
  • 03.09Corporate Applications
  • 03.10Account Setup Microsoft 365 Google Workspace iCloud
  • 03.11Microsoft 365
  • 03.12Google Workspace
  • 03.13iCloud
  • 03.14Data to Synchronize Mail Photos Calendar Contacts Recognizing Data Caps
  • 03.15Mail
  • 03.16Photos
  • 03.17Calendar
  • 03.18Contacts
  • 03.19Recognizing Data Caps
04Chapter-4 Transmission Control Protocol (Tcp) And User Datagram Protocol (Udp)
  • 04.0120/21 - File Transfer Protocol (FTP)
  • 04.0222 - Secure Shell (SSH)
  • 04.0323 - Telnet
  • 04.0425 - Simple Mail Transfer Protocol (SMTP)
  • 04.0553 - Domain Name System (DNS)
  • 04.0667/68 - Dynamic Host Configuration Protocol (DHCP)
  • 04.0780 - Hypertext Transfer Protocol (HTTP)
  • 04.08110 - Post Office Protocol 3 (POP3)
  • 04.09137/139 - Network Basic Input/Output System (NetBIOS)/ NetBIOS over TCP/IP (NetBT)
  • 04.10143 - Internet Mail Access Protocol (IMAP)
  • 04.11161/162 - Simple Network Management Protocol (SNMP)
  • 04.12389 - Lightweight Directory Access Protocol (LDAP)
  • 04.13443 - Hypertext Transfer Protocol Secure (HTTPS)
  • 04.14445 - Server Message Block (SMB)/Common Internet File System (CIFS)
  • 04.153389 - Remote Desktop Protocol (RDP)
  • 04.16Connectionless Dynamic Host Configuration Protocol (DHCP) Trivial File Transfer Protocol (TFTP)
  • 04.17Dynamic Host Configuration Protocol (DHCP)
  • 04.18Trivial File Transfer Protocol (TFTP)
  • 04.19Connection-Oriented Hypertext Transfer Protocol Secure (HTTPS) Secure Shell (SSH)
  • 04.20Hypertext Transfer Protocol Secure (HTTPS)
  • 04.21Secure Shell (SSH)
05Chapter-5 Common Networking Hardware
  • 05.01Routers
  • 05.02Switches
  • 05.03Managed
  • 05.04Unmanaged
  • 05.05Access Points
  • 05.06Patch Panel
  • 05.07/i>Firewall
  • 05.08Power over Ethernet (PoE) Injectors Switch PoE Standards
  • 05.09Injectors
  • 05.10Switch
  • 05.11PoE Standards
  • 05.12Cable Modem
  • 05.13Digital Subscriber Line (DSL)
  • 05.14Optical Network Terminal (ONT)
  • 05.15Network Interface Card (NIC)
  • 05.16Software-Defined Networking (SDN)
06Chapter-6 Contrast Protocols For Wireless Networking
  • 06.012.4GHz
  • 06.025GHz
  • 06.03Regulations
  • 06.042.4GHz vs. 5GHz
  • 06.05Overview of Bluetooth
  • 06.06802.11a
  • 06.07802.11b
  • 06.08802.11g
  • 06.09802.11n
  • 06.10802.11ac (WiFi 5)
  • 06.11802.11ax (WiFi 6)
  • 06.12Licensed
  • 06.13Unlicensed
  • 06.14Power
  • 06.15Regulatory Requirements for Wireless Power
  • 06.16Near-Field Communication (NFC)
  • 06.17Overview of RFID
  • 06.18DHCP
  • 06.19File Share
  • 06.20Print Servers
  • 06.21Mail Servers
  • 06.22Syslog
  • 06.23Web Servers
  • 06.24Authentication, Authorization, and Accounting (AAA)
  • 06.25Spam Gateways
  • 06.26Unified Threat Management (UTM)
  • 06.27Load Balancers
  • 06.28Proxy Servers
  • 06.29Supervisory Control and Data Acquisition (SCADA)
  • 06.30Overview of IoT Devices
07Chapter-7 Install And Configure ‹So>O)
  • 07.01IPv4 Private Addresses Public Addresses
  • 07.02Private Addresses
  • 07.03Public Addresses
  • 07.04IPv6
  • 07.05Automatic Private IP Addressing (APIPA)
  • 07.06Static
  • 07.07Dynamic
  • 07.08Gateway
  • 07.09Address A AAAA
  • 07.10AAAA
  • 07.11Mail Exchanger (MX)
  • 07.12Text (TXT) Spam Management DomainKeys Identified Mail (DKIM) Sender Policy Framework (SPF) Domain-based Message Authentication, Reporting, and Conformance (DMARC)
  • 07.13Spam Management DomainKeys Identified Mail (DKIM) Sender Policy Framework (SPF) Domain-based Message Authentication, Reporting, and Conformance (DMARC)
  • 07.14DomainKeys Identified Mail (DKIM)
  • 07.15Sender Policy Framework (SPF)
  • 07.16Domain-based Message Authentication, Reporting, and Conformance (DMARC)
08Chapter-8 Internet Connection And Network Types
  • 08.01Satellite
  • 08.02Fiber
  • 08.03Cable
  • 08.04Cellular
  • 08.05Wireless Internet Service Provider (WISP)
  • 08.06Local Area Network (LAN)
  • 08.07Wide Area Network (WAN)
  • 08.08Personal Area Network (PAN)
  • 08.09Metropolitan Area Network (MAN)
  • 08.10Storage Area Network (SAN)
  • 08.11Wireless Local Area Network (WLAN)
09Chapter-9 Networking Tools
  • 09.01Crimper
  • 09.02Cable Stripper
  • 09.03WiFi Analyzer
  • 09.04Toner Probe
  • 09.05Punchdown Tool
  • 09.06Cable Tester
  • 09.07Loopback Plug
  • 09.08Network Tap
10Chapter-10 Cable Types And Their Connectors
  • 10.01Copper Cat 5 Cat 5e Cat 6 Cat 6a Coaxial Shielded Twisted Pair (STP) Direct Burial Unshielded Twisted Pair (UTP)
  • 10.02Cat 5
  • 10.03Cat 5e
  • 10.04Cat 6
  • 10.05Cat 6a
  • 10.06Coaxial
  • 10.07Shielded Twisted Pair (STP) Direct Burial
  • 10.08Direct Burial
  • 10.09Unshielded Twisted Pair (UTP)
  • 10.10Plenum
  • 10.11Optical Fiber
  • 10.12Fiber
  • 10.13T568A/T568B
  • 10.14USB 2.0
  • 10.15USB 3.0
  • 10.16Serial
  • 10.17Thunderbolt
  • 10.18High-Definition Multimedia Interface (HDMI)
  • 10.19DisplayPort
  • 10.20Digital Visual Interface (DVI)
  • 10.21Video Graphics Array (VGA)
  • 10.22Serial Advanced Technology Attachment (SATA)
  • 10.23Small Computer System Interface (SCSI)
  • 10.24External SATA (eSATA)
  • 10.25Integrated Drive Electronics (IDE)
  • 10.26Overview of Adapters
  • 10.27RJ11
  • 10.28RJ45
  • 10.29F Type
  • 10.30Straight Tip (ST)
  • 10.31Subscriber Connector (SC)
  • 10.32Lucent Connector (LC)
  • 10.33Punchdown Block
  • 10.34microUSB
  • 10.35miniUSB
  • 10.36USB-C
  • 10.37Molex
  • 10.38Lightning Port
11Chapter-11 Install The Appropriate Ram
  • 11.01Virtual RAM
  • 11.02Small Outline Dual Inline Memory Module (SODIMM)
  • 11.03Double Data Rate 3 (DDR3)
  • 11.04Double Data Rate 4 (DDR4)
  • 11.05Double Data Rate 5 (DDR5)
  • 11.06Error Correction Code (ECC) RAM
  • 11.07Overview of Single-Channel RAM
  • 11.08Overview of Dual-Channel RAM
  • 11.09Overview of Triple-Channel RAM
  • 11.10Overview of Quad-Channel RAM
12Chapter-12 Install Storage Devices
  • 12.01Speeds 5,400 rpm 7,200 rpm 10,000 rpm 15,000 rpm
  • 12.025,400 rpm
  • 12.037,200 rpm
  • 12.0410,000 rpm
  • 12.0515,000 rpm
  • 12.06Form Factor 2.5 3.5
  • 12.07Communications Interfaces Non-Volatile Memory Express (NVMe) SATA Peripheral Component Interconnect Express (PCIe)
  • 12.08Non-Volatile Memory Express (NVMe)
  • 12.09SATA
  • 12.10Peripheral Component Interconnect Express (PCIe)
  • 12.11Form Factors M.2 mSATA
  • 12.12mSATA
  • 12.13Redundant Array of Independent (or Inexpensive) Disks (RAID) 0, 1, 5, 10
  • 12.14Flash Drives
  • 12.15Memory Cards
  • 12.16Optical Drives
13Chapter-13 Configure Motherboards, Central Processing Units (Cpus)
  • 13.01Advanced Technology eXtended (ATX)
  • 13.02Information Technology eXtended (ITX)
  • 13.03Peripheral Component Interconnect (PCI)
  • 13.04PCI Express (PCIe)
  • 13.05Power Connectors
  • 13.06SATA
  • 13.07eSATA
  • 13.08Headers
  • 13.09CPU Sockets Advanced Micro Devices, Inc. (AMD) Intel
  • 13.10Advanced Micro Devices, Inc. (AMD)
  • 13.11Intel
  • 13.12Server
  • 13.13Multisocket
  • 13.14Desktop
  • 13.15Mobile
  • 13.16Boot Options
  • 13.17USB Permissions
  • 13.18Trusted Platform Module (TPM) Security Features
  • 13.19Fan Considerations
  • 13.20Secure Boot
  • 13.21Boot Password
  • 13.22Trusted Platform Module (TPM)
  • 13.23Hardware Security Module (HSM)
  • 13.24x64/x86
  • 13.25Advanced RISC Machine (ARM)
  • 13.26Single-Core
  • 13.27Multicore
  • 13.28Multithreading
  • 13.29Virtualization Support
  • 13.30Sound Card
  • 13.31Video Card
  • 13.32Capture Card
  • 13.33Network Interface Card (NIC)
  • 13.34Fans
  • 13.35Heat Sink
  • 13.36Thermal Paste/Pads
  • 13.37Liquid
14Chapter-14 Power Supply
  • 14.01Input 110-120 VAC vs. 220-240 VAC
  • 14.02Output 3.3V vs. 5V vs. 12V
  • 14.0320-pin to 24-pin Motherboard Adapter
  • 14.04Redundant Power Supply
  • 14.05Modular Power Supply
  • 14.06Wattage Rating
15Chapter-15 Printers And Settings
  • 15.01Setup Location Considerations
  • 15.02Printer Control Language (PCL) vs. PostScript
  • 15.03Ethernet
  • 15.04Wireless
  • 15.05Printer Share
  • 15.06Print Server
  • 15.07Duplex
  • 15.08Orientation
  • 15.09Tray Settings
  • 15.10Quality
  • 15.11User Authentication
  • 15.12Badging
  • 15.13Audit Logs
  • 15.14Secured Prints
  • 15.15Email
  • 15.16Cloud Services
  • 15.17Overview of ADF (Automatic Document Feeder)
  • 15.18Flatbed Scanner Features
16Chapter-16 Install And Replace Printer Consumables
  • 16.01Components Imaging Drum Fuser Assembly Transfer Belt Transfer Roller Pickup Rollers Separation Pads Duplexing Assembly
  • 16.02Imaging Drum
  • 16.03Fuser Assembly
  • 16.04Transfer Belt
  • 16.05Transfer Roller
  • 16.06Pickup Rollers
  • 16.07Separation Pads
  • 16.08Duplexing Assembly
  • 16.09Imaging Process Processing Charging Exposing Developing Transferring Fusing Cleaning
  • 16.10Processing
  • 16.11Charging
  • 16.12Exposing
  • 16.13Developing
  • 16.14Transferring
  • 16.15Fusing
  • 16.16Cleaning
  • 16.17Maintenance
  • 16.18Replace Toner
  • 16.19Apply Maintenance Kit
  • 16.20Calibrate
  • 16.21Clean
  • 16.22Components
  • 16.23Ink Cartridge
  • 16.24Print Head
  • 16.25Roller
  • 16.26Feeder
  • 16.27Duplexing Assembly
  • 16.28Carriage Belt
  • 16.29Calibration
  • 16.30Maintenance
  • 16.31Clean Heads
  • 16.32Replace Cartridges
  • 16.33Calibrate
  • 16.34Clear Jams
  • 16.35Components
  • 16.36Feed Assembly
  • 16.37Heating Element
  • 16.38Special Thermal Paper
  • 16.39Maintenance
  • 16.40Replace Paper
  • 16.41Clean Heating Element
  • 16.42Remove Debris
  • 16.43Heat Sensitivity of Paper
  • 16.44Components Print Head Ribbon Tractor Feed
  • 16.45Print Head
  • 16.46Ribbon
  • 16.47Tractor Feed
  • 16.48Impact Paper
  • 16.49Maintenance Replace Ribbon Replace Print Head Replace Paper
  • 16.50Replace Ribbon
  • 16.51Replace Print Head
  • 16.52Replace Paper
  • 16.53Components Filament Resin Print Bed
  • 16.54Filament
  • 16.55Resin
  • 16.56Print Bed
17Chapter-17 Cloud-Computing Concepts
  • 17.01Private Cloud
  • 17.02Public Cloud
  • 17.03Hybrid Cloud
  • 17.04Community Cloud
  • 17.05Infrastructure as a Service (IaaS)
  • 17.06Software as a Service (SaaS)
  • 17.07Platform as a Service (PaaS)
  • 17.08Shared Resources
  • 17.09Metered Utilization
  • 17.10Rapid Elasticity
  • 17.11High Availability
  • 17.12File Synchronization
  • 17.13Virtual Desktop Infrastructure (VDI) On Premises
  • 17.14VDI in the Cloud
18Chapter-18 Client-Side Virtualization
  • 18.01Sandbox
  • 18.02Test Development
  • 18.03Application Virtualization Legacy Software/OS Cross-Platform Virtualization
  • 18.04Legacy Software/OS
  • 18.05Cross-Platform Virtualization
  • 18.06Overview of Resource Requirements
  • 18.07Overview of Security Requirements
19Chapter-19 Practice Methodology To Resolve Problems
  • 19.01Identify the Problem Gather Information from the User Identify User Changes Perform Backups Before Making Changes Inquire Regarding Environmental or Infrastructure Changes
  • 19.02Gather Information from the User
  • 19.03Identify User Changes
  • 19.04Perform Backups Before Making Changes
  • 19.05Inquire Regarding Environmental or Infrastructure Changes
  • 19.06If Necessary, Conduct External or Internal Research Based on Symptoms
  • 19.07Once the Theory is Confirmed, Determine the Next Steps to Resolve the Problem
  • 19.08If the Theory is Not Confirmed, Re-establish a New Theory or Escalate
  • 19.09Refer to the Vendor's Instructions for Guidance
  • 19.10Overview of Verification and Preventive Measures
  • 19.11Overview of Documentation Process
20Chapter-20 Troubleshoot Motherboards, Ram, Cpu, And Power
  • 20.01Power-On Self-Test (POST) Beeps
  • 20.02Proprietary Crash Screens (Blue Screen of Death [BSOD]/Pinwheel)
  • 20.03Black Screen
  • 20.04No Power
  • 20.05Sluggish Performance
  • 20.06Overheating
  • 20.07Burning Smell
  • 20.08Intermittent Shutdown
  • 20.09Application Crashes
  • 20.10Grinding Noise
  • 20.11Capacitor Swelling
  • 20.12Inaccurate System Date/Time
21Chapter-21 Diagnose Problems With Storage Drives
  • 21.01Lines Down the Printed Pages
  • 21.02Garbled Print
  • 21.03Toner Not Fusing to Paper
  • 21.04Paper Jams
  • 21.05Faded Print
  • 21.06Incorrect Paper Size
  • 21.07Paper Not Feeding
  • 21.08Multipage Misfeed
  • 21.09Multiple Prints Pending in Queue
  • 21.10Speckling on Printed Pages
  • 21.11Double/Echo Images on the Print
  • 21.12Incorrect Color Settings
  • 21.13Grinding Noise
  • 21.14Finishing Issues Staple Jams Hole Punch
  • 21.15Staple Jams
  • 21.16Hole Punch
  • 21.17Incorrect Page Orientation
22Chapter-22 Troubleshoot Video, Pro3ector, And Display Issues
  • 22.01Incorrect Data Source
  • 22.02Physical Cabling Issues
  • 22.03Burned-Out Bulb
  • 22.04Fuzzy Image
  • 22.05Display Burn-In
  • 22.06Dead Pixels
  • 22.07Flashing Screen
  • 22.08Incorrect Color Display
  • 22.09Audio Issues
  • 22.10Dim Image
  • 22.11Intermittent Projector Shutdown
23Chapter-23 Troubleshoot Mobile Devices
  • 23.01Poor Battery Health
  • 23.02Swollen Battery
  • 23.03Broken Screen
  • 23.04Improper Charging
  • 23.05Poor/No Connectivity
  • 23.06Liquid Damage
  • 23.07Overheating
  • 23.08Digitizer Issues
  • 23.09Physically Damaged Ports
  • 23.10Malware
  • 23.11Cursor Drift/Touch Calibration
24Chapter-24 Troubleshoot And Resolve Printer Issues
  • 24.01Lines Down the Printed Pages
  • 24.02Garbled Print
  • 24.03Toner Not Fusing to Paper
  • 24.04Paper Jams
  • 24.05Faded Print
  • 24.06Incorrect Paper Size
  • 24.07Paper Not Feeding
  • 24.08Multipage Misfeed
  • 24.09Multiple Prints Pending in Queue
  • 24.10Speckling on Printed Pages
  • 24.11Double/Echo Images on the Print
  • 24.12Incorrect Color Settings
  • 24.13Grinding Noise
  • 24.14Finishing Issues Staple Jams Hole Punch
  • 24.15Staple Jams
  • 24.16Hole Punch
  • 24.17Incorrect Page Orientation
25Chapter-25 Troubleshoot Problems With Wired And Wireless Networks
  • 25.01Problem understanding: Loan Approval Prediction
  • 25.02&nbspRead and preprocess data
  • 25.03Data splitting
  • 25.04Classification - Naïve Bayes
  • 25.05Classification – Support Vector Machine
  • 25.06Classification - Random Forest
  • 25.07Classification - Logistic Regression
  • 25.08Train the model
  • 25.09Evaluate performance metrics
  • 25.10Problem Understanding : Zomato Restaurant Review
  • 25.11Read and preprocess data
  • 25.12Data Splitting
  • 25.13Classification - Naïve Bayes (Multinomial)
  • 25.14Classification - Support Vector Machine
  • 25.15Classification - Random Forest
  • 25.16Classification – Decision Tree
  • 25.17Classification - Logistic Regression
  • 25.18Train the model
  • 25.19Evaluate performance metrics
  • 25.20Visualization using matplotlib and seaborn
  • 25.21Problem Understanding : Product Recommendation
  • 25.22Read and preprocess data
  • 25.23Collaborative filtering
  • 25.24Content based filtering
  • 25.25Recommend the product
  • 25.26Evaluate metrics
26Chapter-26 Network Fundamentals
  • 26.01Definition and Overview
  • 26.02Data Networking
  • 26.03Communication Process
  • 26.04Overview of OSI Model
  • 26.05Overview of TCP Model
  • 26.06Data Encapsulation and Decapsulation within the OSI Model Context
  • 26.07Ethernet Header
  • 26.08Internet Protocol (IP) Header
  • 26.09Transmission Control Protocol (TCP) / User Datagram Protocol (UDP) Headers
  • 26.10TCP Flags
  • 26.11Payload
  • 26.12Maximum Transmission Unit (MTU)
27Chapter-27 Network Topologies And Network Types
  • 27.01Star / Hub-and-Spoke
  • 27.02Mesh
  • 27.03Ring
  • 27.04Hybrid
  • 27.05Peer-to-Peer
  • 27.06Client-Server
  • 27.07Local Area Network (LAN)
  • 27.08Metropolitan Area Network (MAN)
  • 27.09Wide Area Network (WAN)
  • 27.10Wireless Local Area Network (WLAN)
  • 27.11Personal Area Network (PAN)
  • 27.12Campus Area Network (CAN)
  • 27.13Storage Area Network (SAN)
  • 27.14Software-Defined Wide Area Network (SDWAN)
  • 27.15Multiprotocol Label Switching (MPLS)
  • 27.16Multipoint Generic Routing Encapsulation (MGRE)
  • 27.17V-Switch
  • 27.18Virtual Network Interface Card (VNIC)
  • 27.19Network Function Virtualization (NFV)
  • 27.20Hypervisor
  • 27.21Satellite
  • 27.22Digital Subscriber Line (DSL)
  • 27.23Cable
  • 27.24Leased Line
  • 27.25Metro-Optical
28Chapter-28 Network Topologies And Network Types
  • 28.01Twisted Pair
  • 28.02CAT 5
  • 28.03CAT 5e
  • 28.04CAT 6
  • 28.05CAT 6A
  • 28.06CAT 7
  • 28.07CAT 8
  • 28.08Coaxial / RG-6
  • 28.09Twin Axial
  • 28.10Termination Standards
  • 28.11TIA / EIA — 568A
  • 28.12TIA / EIA — 568B
  • 28.13Single-Mode
  • 28.14Multimode
  • 28.15Local Connector (LC)
  • 28.16Straight Tip (ST)
  • 28.17Subscriber Connector (SC)
  • 28.18Mechanical Transfer (MT)
  • 28.19Registered Jack (RJ)
  • 28.20Angled Physical Contact (APC)
  • 28.21Ultra-Physical Contact (UPC)
  • 28.22100 BASE-FX
  • 28.23100 BASE-SX
  • 28.241000 BASE-SX
  • 28.251000 BASE-LX
  • 28.2610 GBASE-SR
  • 28.2710 GBASE-LR
  • 28.28Coarse Wavelength Division Multiplexing (CWDM)
  • 28.29Dense Wavelength Division Multiplexing (DWDM)
  • 28.30Bidirectional Wavelength Division Multiplexing (WDM)
29Chapter-29 Configure A Subnet And Use Appropriate Ip Addressing Schemes
  • 29.01TFC1918
  • 29.02Network Address Translation (NAT)
  • 29.03Port Address Translation (PAT)
  • 29.04Automatic Private IP Addressing (APIPA)
  • 29.05Extended Unique Identifier (EUI-64)
  • 29.06Multicast
  • 29.07Unicast
  • 29.08Anycast
  • 29.09Broadcast
  • 29.10Link Local
  • 29.11Loop Back
  • 29.12Default Gateway
  • 29.13Classless (Variable-Length Subnet Mask)
  • 29.14Classful Class A Class B Class C Class D Class E
  • 29.15Class A
  • 29.16Class B
  • 29.17Class C
  • 29.18Class D
  • 29.19Class E
  • 29.20Classless Inter-Domain Routing (CIDR) Notation
  • 29.21Tunneling
  • 29.22Dual Stack
  • 29.23Shorthand Notation
  • 29.24Router Advertisement
  • 29.25Stateless Address Auto Configure (SLAAC)
  • 29.26Overview of Virtual IP
  • 29.27Overview of Sub-Interfaces
  • 29.28Explain Common Ports and Protocols, Their Application, and Encrypted Alternatives
  • 29.29Internet Control Message Protocol (ICMP)
  • 29.30Generic Routing Encapsulation (GRE)
  • 29.31Internet Protocol Security (IPSec)
  • 29.32Authentication Header (AH) / Encapsulation Security Payload (ESP)
  • 29.33Connectionless vs. Connection-Oriented
30Chapter-30 Use And Purpose Of Network Services
  • 30.01Scope
  • 30.02Exclusion Ranges
  • 30.03Reservation
  • 30.04Dynamic Assignment
  • 30.05Static Assignment
  • 30.06Lease Time
  • 30.07Scope Options
  • 30.08Available Leases
  • 30.09DHCP Relay
  • 30.10IP Helper / UDP Forwarding
  • 30.11Record Types Address (A vs. AAAA) Canonical Name (CNAME) Mail Exchange (MX) Start of Authority (SOA) Pointer (PTR) Text (TXT) Service (SRV) Name Server (NS)
  • 30.12Address (A vs. AAAA)
  • 30.13Canonical Name (CNAME)
  • 30.14Mail Exchange (MX)
  • 30.15Start of Authority (SOA)
  • 30.16Pointer (PTR)
  • 30.17Text (TXT)
  • 30.18Service (SRV)
  • 30.19Name Server (NS)
  • 30.20Global Hierarchy
  • 30.21Root DNS Server
  • 30.22Internal vs. External
  • 30.23Zone Transfers
  • 30.24Authoritative Name Servers
  • 30.25Time to Live (TTL)
  • 30.26DNS Caching
  • 30.27Reverse DNS / Reverse Lookup / Forward Lookup
  • 30.28Recursive Lookup / Iterative Lookup
  • 30.29Stratum
  • 30.30Clients
  • 30.31Servers
31Chapter-31 Basic Corporate And Datacenter Network
  • 31.01Core
  • 31.02Distribution/Aggregation Layer
  • 31.03Access/Edge
  • 31.04Application Layer
  • 31.05Control Layer
  • 31.06Infrastructure Layer
  • 31.07Management Plane
  • 31.08Software-Defined Network
  • 31.09Top-of-Rack Switching
  • 31.10Backbone
  • 31.11North-South
  • 31.12East-West
  • 31.13Branch Office
  • 31.14On-Premises Datacenter
  • 31.15Colocation
  • 31.16Connection Types
  • 31.17Fibre Channel over Ethernet (FCoE)
  • 31.18Fibre Channel
  • 31.19Internet Small Computer Systems Interface (iSCSI)
32Chapter-32 Cloud Concepts And Connectivity
  • 32.01Public
  • 32.02Private
  • 32.03Hybrid
  • 32.04Community
  • 32.05Software as a Service (SaaS)
  • 32.06Infrastructure as a Service (IaaS)
  • 32.07Platform as a Service (PaaS)
  • 32.08Desktop as a Service (DaaS)
  • 32.09Automation/Orchestration
  • 32.10Virtual Private Network (VPN)
  • 32.11Private-Direct Connection to Cloud Provider
  • 32.12Overview of Multitenancy
  • 32.13Overview of Elasticity
  • 32.14Overview of Scalability
  • 32.15Overview of Security Implications
33Chapter-33 Contrast Various Devices, Appropriate Placement On The Network
  • 33.01Layer 2 Switch
  • 33.02Layer 3 Capable Switch
  • 33.03Router
  • 33.04Access Point
  • 33.05Bridge
  • 33.06Wireless LAN Controller
  • 33.07Load Balancer
  • 33.08Proxy Server
  • 33.09Cable Modem
  • 33.10DSL Modem
  • 33.11Repeater
  • 33.12Voice Gateway
  • 33.13Media Converter
  • 33.14Intrusion Prevention System (IPS) / Intrusion Detection System (IDS) Device
  • 33.15Firewall
  • 33.16VPN Headend
  • 33.17Voice over Internet Protocol (VoIP) Phone
  • 33.18Printer
  • 33.19Physical Access Control Devices
  • 33.20Cameras
  • 33.21Heating, Ventilation, and Air Conditioning (HVAC) Sensors
  • 33.22Internet of Things (IoT) Refrigerator Smart Speakers Smart Thermostats Smart Doorbells Industrial Control Systems / Supervisory Control and Data Acquisition (SCADA)
  • 33.23Refrigerator
  • 33.24Smart Speakers
  • 33.25Smart Thermostats
  • 33.26Smart Doorbells
  • 33.27Industrial Control Systems / Supervisory Control and Data Acquisition (SCADA)
34Chapter-34 Routing Technologies And Bandwidth Management
  • 34.01Dynamic Routing
  • 34.02Protocols Routing Information Protocol (RIP) Open Shortest Path First (OSPF) Enhanced Interior Gateway Routing Protocol (EIGRP) Border Gateway Protocol (BGP)
  • 34.03Routing Information Protocol (RIP)
  • 34.04Open Shortest Path First (OSPF)
  • 34.05Enhanced Interior Gateway Routing Protocol (EIGRP)
  • 34.06Border Gateway Protocol (BGP)
  • 34.07Link State vs. Distance Vector vs. Hybrid
  • 34.08Static Routing
  • 34.09Default Route
  • 34.10Administrative Distance
  • 34.11Exterior vs. Interior
  • 34.12Time to Live (TTL)
  • 34.13Traffic Shaping
  • 34.14Quality of Service (QoS)
35Chapter-35 Install And Configure Wireless Standards And Technologies
  • 35.01Dynamic Routing
  • 35.02Protocols Routing Information Protocol (RIP) Open Shortest Path First (OSPF) Enhanced Interior Gateway Routing Protocol (EIGRP) Border Gateway Protocol (BGP)
  • 35.03Routing Information Protocol (RIP)
  • 35.04Open Shortest Path First (OSPF)
  • 35.05Enhanced Interior Gateway Routing Protocol (EIGRP)
  • 35.06Border Gateway Protocol (BGP)
  • 35.07Link State vs. Distance Vector vs. Hybrid
  • 35.08Static Routing
  • 35.09Default Route
  • 35.10Administrative Distance
  • 35.11Exterior vs. Interior
  • 35.12Time to Live (TTL)
  • 35.13Traffic Shaping
  • 35.14Quality of Service (QoS)
36Chapter-36 Statistics And Sensors To Ensure Network Availability
  • 36.01Device/Chassis
  • 36.02Temperature
  • 36.03Central Processing Unit (CPU) Usage
  • 36.04Memory
  • 36.05Network Metrics
  • 36.06Bandwidth
  • 36.07Latency
  • 36.08Jitter
  • 36.09Traps
  • 36.10Object Identifiers (OIDs)
  • 36.11Management Information Bases (MIBs)
  • 36.12Log Reviews
  • 36.13Traffic Logs
  • 36.14Audit Logs
  • 36.15Syslog
  • 36.16Logging Levels/Severity Levels
  • 36.17Link State (Up/Down)
  • 36.18Speed/Duplex
  • 36.19Send/Receive Traffic
  • 36.20Cyclic Redundancy Checks (CRCs)
  • 36.21Protocol Packet and Byte Counts
  • 36.22CRC Errors
  • 36.23Giants
  • 36.24Runts
  • 36.25Encapsulation Errors
  • 36.26Temperature
  • 36.27Humidity
  • 36.28Electrical
  • 36.29Flooding
  • 36.30Overview of Baselines
  • 36.31Overview of NetFlow Data
  • 36.32Overview of Uptime/Downtime
37Chapter-37 Purpose Of Organizational Documents And Policies
  • 37.01Change Management
  • 37.02Incident Response Plan
  • 37.03Disaster Recovery Plan
  • 37.04Business Continuity Plan
  • 37.05System Life Cycle
  • 37.06Standard Operating Procedures
  • 37.07Password Policy
  • 37.08Acceptable Use Policy
  • 37.09Bring Your Own Device (BYOD) Policy
  • 37.10Remote Access Policy
  • 37.11Onboarding and Offboarding Policy
  • 37.12Security Policy
  • 37.13Data Loss Prevention
  • 37.14Physical Network Diagram
  • 37.15Floor Plan
  • 37.16Rack Diagram
  • 37.17Intermediate Distribution Frame (IDF) / Main Distribution Frame (MDF) Documentation
  • 37.18Logical Network Diagram
  • 37.19Wiring Diagram
  • 37.20Site Survey Report
  • 37.21Audit and Assessment Report
  • 37.22Baseline Configurations
  • 37.23Non-Disclosure Agreement (NDA)
  • 37.24Service-Level Agreement (SLA)
  • 37.25Memorandum of Understanding (MOU)
38Chapter-38 High Availability And Disaster Recovery Concepts
  • 38.01Overview of Load Balancing
  • 38.02Overview of Multipathing
  • 38.03Overview of NIC Teaming
  • 38.04Switches
  • 38.05Routers
  • 38.06Firewalls
  • 38.07Uninterruptible Power Supply (UPS)
  • 38.08Power Distribution Units (PDUs)
  • 38.09Generator
  • 38.10Heating, Ventilation, and Air Conditioning (HVAC)
  • 38.11Fire Suppression
  • 38.12Cold Site
  • 38.13Warm Site
  • 38.14Hot Site
  • 38.15Cloud Site
  • 38.16Active-Active vs. Active-Passive
  • 38.17Multiple Internet Service Providers (ISPs)/Diverse Paths
  • 38.18Virtual Router Redundancy Protocol (VRRP) / First Hop Redundancy Protocol (FHRP)
  • 38.19Mean Time to Repair (MTTR)
  • 38.20Mean Time Between Failure (MTBF)
  • 38.21Recovery Time Objective (RTO)
  • 38.22Recovery Point Objective (RPO)
  • 38.23State
  • 38.24Configuration
39Chapter-39 Common Security Concepts
  • 39.01Overview of CIA Triad
  • 39.02Internal
  • 39.03External
  • 39.04Common Vulnerabilities and Exposures (CVE)
  • 39.05Zero-Day
  • 39.06Overview of Exploits
  • 39.07Overview of Least Privilege
  • 39.08Overview of Role-Based Access
  • 39.09Overview of Zero Trust
  • 39.10Network Segmentation Enforcement
  • 39.11Perimeter Network (Previously Known as Demilitarized Zone [DMZ])
  • 39.12Separation of Duties
  • 39.13Network Access Control
  • 39.14Honeypot
  • 39.15Multifactor
  • 39.16Terminal Access Controller Access-Control System Plus (TACACS+)
  • 39.17Single Sign-On (SSO)
  • 39.18Remote Authentication Dial-In User Service (RADIUS)
  • 39.19LDAP
  • 39.20Kerberos
  • 39.21Local Authentication
  • 39.22802.1X
  • 39.23Extensible Authentication Protocol (EAP)
  • 39.24Security Risk Assessments
  • 39.25Threat Assessment
  • 39.26Vulnerability Assessment
  • 39.27Penetration Testing
  • 39.28Posture Assessment
  • 39.29Business Risk Assessments
  • 39.30Process Assessment
  • 39.31Vendor Assessment
  • 39.32Overview of SIEM
40Chapter-40 Contrast Common Types Of Attacks
  • 40.01Denial-of-Service (DoS) / Distributed Denial-of-Service (DDoS)
  • 40.02Botnet / Command and Control
  • 40.03On-Path Attack (Previously Known as Man-in-the-Middle Attack)
  • 40.04DNS Poisoning
  • 40.05VLAN Hopping
  • 40.06ARP Spoofing
  • 40.07Rogue DHCP
  • 40.08Rogue Access Point (AP)
  • 40.09Evil Twin
  • 40.10Ransomware
  • 40.11Password Attacks Brute-Force Dictionary
  • 40.12Brute-Force
  • 40.13Dictionary
  • 40.14MAC Spoofing
  • 40.15IP Spoofing
  • 40.16Deauthentication
  • 40.17Malware
  • 40.18Social Engineering
  • 40.19Phishing
  • 40.20Tailgating
  • 40.21Piggybacking
  • 40.22Shoulder Surfing
41Chapter-41 Network HardeningTechniqUes
  • 41.01Secure SNMP
  • 41.02Router Advertisement (RA) Guard
  • 41.03Port Security
  • 41.04Dynamic ARP Inspection
  • 41.05Control Plane Policing
  • 41.06Private VLANs
  • 41.07Disable Unneeded Switchports
  • 41.08Disable Unneeded Network Services
  • 41.09Change Default Passwords
  • 41.10Password Complexity/Length
  • 41.11Enable DHCP Snooping
  • 41.12Change Default VLAN
  • 41.13Patch and Firmware Management
  • 41.14Access Control List
  • 41.15Role-Based Access
  • 41.16Firewall Rules
  • 41.17Explicit Deny
  • 41.18Implicit Deny
  • 41.19MAC Filtering
  • 41.20Antenna Placement
  • 41.21Power Levels
  • 41.22Wireless Client Isolation
  • 41.23Guest Network Isolation
  • 41.24Pre-Shared Keys (PSKs)
  • 41.25Geofencing
  • 41.26Captive Portal
  • 41.27Overview of IoT Access Considerations
  • 41.28Site-to-Site VPN
  • 41.29Client-to-Site VPN Clientless VPN Split Tunnel vs. Full Tunnel
  • 41.30Clientless VPN
  • 41.31Split Tunnel vs. Full Tunnel
  • 41.32Remote Desktop Connection
  • 41.33Remote Desktop Gateway
  • 41.34Virtual Network Computing (VNC)
  • 41.35Virtual Desktop
  • 41.36Authentication and Authorization Considerations
  • 41.37In-Band vs. Out-of-Band Management
42Chapter-42 Importance Of Physical Security
  • 42.01Camera
  • 42.02Motion Detection
  • 42.03Asset Tags
  • 42.04Tamper Detection
  • 42.05Employee Training
  • 42.06Access Control Hardware
  • 42.07Badge Readers
  • 42.08Biometrics
  • 42.09Locking Racks
  • 42.10Locking Cabinets
  • 42.11Access Control Vestibule (Previously Known as a Mantrap)
  • 42.12Smart Lockers
  • 42.13Factory Reset/Wipe Configuration
  • 42.14Sanitize Devices for Disposal
43Chapter-43 Network Troubleshooting
  • 43.01Gather Information
  • 43.02Question Users
  • 43.03Identify Symptoms
  • 43.04Determine if Anything Has Changed
  • 43.05Duplicate the Problem, if Possible
  • 43.06Approach Multiple Problems Individually
  • 43.07Question the Obvious
  • 43.08Consider Multiple Approaches
  • 43.09Top-to-Bottom/Bottom-to-Top OSI Model
  • 43.10Divide and Conquer
  • 43.11If the Theory is Confirmed, Determine the Next Steps to Resolve the Problem
  • 43.12If the Theory is Not Confirmed, Reestablish a New Theory or Escalate
  • 43.13Overview of Action Plan
  • 43.14Implement the Solution
  • 43.15Escalate as Necessary
  • 43.16Verify Full System Functionality
  • 43.17Implement Preventive Measures
  • 43.18Overview of Documentation
44Chapter-44 Troubleshoot Common Cable Connectivity
  • 44.01Throughput
  • 44.02Speed
  • 44.03Distance
  • 44.04Shielded and Unshielded
  • 44.05Plenum and Riser-Rated
  • 44.06Rollover Cable/Console Cable
  • 44.07Crossover Cable
  • 44.08Power over Ethernet (PoE)
  • 44.09Attenuation
  • 44.10Interference
  • 44.11Decibel (dB) Loss
  • 44.12Incorrect Pinout
  • 44.13Bad Ports
  • 44.14Open/Short
  • 44.15Light-Emitting Diode (LED) Status Indicators
  • 44.16Incorrect Transceivers
  • 44.17Duplexing Issues
  • 44.18Transmit and Receive (TX/RX) Reversed
  • 44.19Dirty Optical Cables
  • 44.20Cable Crimper
  • 44.21Punchdown Tool
  • 44.22Tone Generator
  • 44.23Loopback Adapter
  • 44.24Optical Time-Domain Reflectometer (OTDR)
  • 44.25Multimeter
  • 44.26Cable Tester
  • 44.27Wire Map
  • 44.28Fusion Splicers
  • 44.29Spectrum Analyzers
  • 44.30Snips/Cutters
  • 44.31Cable Stripper
  • 44.32Fiber Light Meter
45Chapter-45 Network Software Tools And Commands
  • 45.01WiFi Analyzer
  • 45.02Protocol Analyzer/Packet Capture
  • 45.03Bandwidth Speed Tester
  • 45.04Port Scanner
  • 45.05iperf
  • 45.06NetFlow Analyzers
  • 45.07Trivial File Transfer Protocol (TFTP) Server
  • 45.08Terminal Emulator
  • 45.09IP Scanner
  • 45.10ping
  • 45.11ipconfig/ifconfig/ip
  • 45.12nslookup/dig
  • 45.13traceroute/tracert
  • 45.14netstat
  • 45.15hostname
  • 45.16route
  • 45.17telnet
  • 45.18tcpdump
  • 45.19nmap
  • 45.20show interface
  • 45.21show config
  • 45.22show route
46Chapter-46 Troubleshoot Common Wireless Connectivity Issues
  • 46.01Throughput
  • 46.02Speed
  • 46.03Distance
  • 46.04Received Signal Strength Indication (RSSI) Signal Strength
  • 46.05Effective Isotropic Radiated Power (EIRP)/Power Settings
  • 46.06Antennas
  • 46.07Placement
  • 46.08Type
  • 46.09Polarization
  • 46.10Channel Utilization
  • 46.11AP Association Time
  • 46.12Site Survey
  • 46.13Interference
  • 46.14Channel Overlap
  • 46.15Antenna Cable Attenuation/Signal Loss
  • 46.16RF Attenuation/Signal Loss
  • 46.17Wrong SSID
  • 46.18Incorrect Passphrase
  • 46.19Encryption Protocol Mismatch
  • 46.20Insufficient Wireless Coverage
  • 46.21Captive Portal Issues
  • 46.22Client Disassociation Issues
  • 46.23Device Configuration Review
  • 46.24Routing Tables
  • 46.25Interface Status
  • 46.26VLAN Assignment
  • 46.27Network Performance Baselines
  • 46.28Collisions
  • 46.29Broadcast Storm
  • 46.30Duplicate MAC Address
  • 46.31Duplicate IP Address
  • 46.32Multicast Flooding
  • 46.33Asymmetrical Routing
  • 46.34Switching Loops
  • 46.35Routing Loops
  • 46.36Rogue DHCP Server
  • 46.37DHCP Scope Exhaustion
  • 46.38IP Setting Issues
  • 46.39Incorrect Gateway
  • 46.40Incorrect Subnet Mask
  • 46.41Incorrect IP Address
  • 46.42Incorrect DNS
  • 46.43Missing Route
  • 46.44Low Optical Link Budget
  • 46.45Certificate Issues
  • 46.46Hardware Failure
  • 46.47Host-Based/Network-Based Firewall Settings
  • 46.48Blocked Services, Ports, or Addresses
  • 46.49Incorrect VLAN
  • 46.50DNS Issues
  • 46.51NTP Issues
  • 46.52BYOD Challenges
  • 46.53Licensed Feature Issues
  • 46.54Network Performance Issues
47Chapter-47 Introduction To Linux
  • 47.01What is an Operating System?
  • 47.02What is Linux OS?
  • 47.03History of Linux
  • 47.04Linux vs. Unix
  • 47.05Linux Flavors / Distributions
  • 47.06Linux Users
  • 47.07Linux vs. Windows
48Chapter-48 Download, install and Configure
  • 48.01Overview of VirtualBox
  • 48.02Steps to Download Oracle VirtualBox
  • 48.03Installation Guide for Oracle VirtualBox
  • 48.04Differences between Ubuntu Server and Ubuntu Desktop
  • 48.05Steps to Create a Virtual Machine in VirtualBox
  • 48.06Downloading Ubuntu/CentOS Server
  • 48.07Installation Guide for Ubuntu/CentOS Server
  • 48.08Downloading Ubuntu/CentOS Desktop
  • 48.09Installation Guide for Ubuntu/CentOS Desktop
49Chapter-49 System Access & File System
  • 49.01Installing Putty or any Other SSH Client
  • 49.02Comparison of Other OS Clients
  • 49.03Overview of Linux Command Prompts
  • 49.04What is File System?
  • 49.05Different Types of File Systems
  • 49.06How to Find File System Type in Linux and Windows
  • 49.07Overview of File System Structure
  • 49.08Overview of File or Directory Properties
  • 49.09Regular Files (‘-’)
  • 49.10Directory Files (‘d’)
  • 49.11Special Files
  • 49.12Block File(‘b’)
  • 49.13Character Device File (‘c’)
  • 49.14Named Pipe File or Just a Pipe File (‘p’)
  • 49.15Symbolic Link File (‘l’)
  • 49.16Socket File(‘s’)
  • 49.17What is Root User / Super User
  • 49.18What is Root Directory
  • 49.19What is Root Home Directory
  • 49.20Change Password for Root User
  • 49.21Change Password for Standard User
  • 49.22Absolute Path
  • 49.23Relative Path
  • 49.24Navigating to File System Using Both Paths
  • 49.25touch
  • 49.26mkdir
  • 49.27Overview of Copying Directories
  • 49.28Find
  • 49.29Locate
  • 49.30Overview of Differences
  • 49.31Overview of Wildcard Commands
  • 49.32Soft Links
  • 49.33Hard Links
50Chapter-50 Linux Fundamentals
  • 50.01Overview of Linux Command Syntax
  • 50.02First Dash or Bit Identifies the File Type
  • 50.03Second 3 Bits Define the Permission for User (File or Directory Owner)
  • 50.04Third 3 Bits Define the Permission for Group
  • 50.05Fourth 3 Bits Define the Permission for Everyone Else
  • 50.06File Permissions Using Numeric Mode (Chmod 777 file)
  • 50.07File Ownership Commands (Chown, Chgrp)
  • 50.08Overview of ACL
  • 50.09whatis
  • 50.10command --help
  • 50.11Overview of TAB Completion and Up Arrow Keys
  • 50.12echo
  • 50.13Redirects > and >>
  • 50.14Overview of Input and Output Redirects
  • 50.15Overview of tee Command
  • 50.16Overview of Linux Pipes
  • 50.17mkdir
  • 50.18rmdir or rm -rf
  • 50.19chgrp
  • 50.20chown
  • 50.21more
  • 50.22less
  • 50.23head
  • 50.24tail
  • 50.25cut - Text Processing Commands
  • 50.26awk - Text Processing Commands
  • 50.27grep and egrep - Text Processing Commands
  • 50.28sort / uniq - Text Processing Commands
  • 50.29wc - Text Processing Commands
  • 50.30Overview of diff and cmp
  • 50.31Overview of tar, gzip, and gunzip
  • 50.32Overview of truncate Command
  • 50.33Overview of Combining and Splitting Files
  • 50.34Comparison of Linux and Windows Commands
51Chapter-51 System Administration In Linux
  • 51.01I - Insert Mode
  • 51.02a - Insert and Move Cursor
  • 51.03zz or :wq! - Save File and Quit vi Editor
  • 51.04:q! - Quit vi Editor Without Saving
  • 51.05Up, Down, Left, and Right Keys - To Navigate Within vi Editor
  • 51.06o - To Start Inserting from a New Line
  • 51.07Shift G - Takes You to the End of a File While in vi
  • 51.08/ - Searches for a Pattern While in vi Mode
  • 51.09Overview of Differences
  • 51.10Overview of sed Command
  • 51.11useradd
  • 51.12userdel
  • 51.13groupdel
  • 51.14usermod /etc/passwd /etc/shadow /etc/group
  • 51.15/etc/passwd
  • 51.16/etc/shadow
  • 51.17/etc/group
  • 51.18Overview of Password Aging
  • 51.19su or su -
  • 51.20sudo Commands
  • 51.21last
  • 51.22users
  • 51.23wall
  • 51.24write
  • 51.25Overview of Account Authentication
  • 51.26Overview of Differences
  • 51.27date
  • 51.28uptime
  • 51.29hostname
  • 51.30uname
  • 51.31which
  • 51.32systemctl Command
  • 51.33ps Command
  • 51.34top Command
  • 51.35kill Command
  • 51.36crontab Command
  • 51.37at Command
  • 51.38Additional Cron Jobs (Hourly, Daily, Weekly, Monthly)
  • 51.39Process Management (bg, fg, nice)
  • 51.40dmesg
  • 51.41iostat
  • 51.42netstat
  • 51.43free
  • 51.44cat /proc/cpuinfo
  • 51.45cat /proc/meminfo
  • 51.46/var/log
  • 51.47/var/log/messages
  • 51.48dmesg
  • 51.49mail
  • 51.50shutdown
  • 51.51reboot
  • 51.52init 0-6
  • 51.53halt
  • 51.54Overview of hostnamectl Command
  • 51.55uname
  • 51.56cat /etc/redhat-release
  • 51.57cat /etc/*-release
  • 51.58dmidecode
  • 51.59Overview of arch Command
  • 51.60Overview of Terminal Control Keys
  • 51.61clear
  • 51.62exit
  • 51.63script
  • 51.64Restart the System or Type Reboot
  • 51.65Catch the GRUB Screen
  • 51.66Stop at Your Kernel Line and Press "e" to Enter the Editing Mode
  • 51.67Find the Line that Starts with Linux and Go to the End of the Line and Type
  • 51.68rd.break
  • 51.69Press ctrl+x to Enter into the Rescue Mode
  • 51.70#mount -o remount, rw /sysroot
  • 51.71#chroot /sysroot
  • 51.72#passwd
  • 51.73#touch /.autorelabel
  • 51.74#exit
  • 51.75#exit
  • 51.76Overview of SOS Report
  • 51.77Overview of Special Permissions
52Chapter-52 System Maintenance Commands in Linux
  • 52.01Overview of Linux Kernel
  • 52.02Definition and Function of Shell
  • 52.03Bash
  • 52.04Overview of Shell Scripting
  • 52.05#b!/bin/bash
  • 52.06echo "Hello DevLustro"
  • 52.07Overview of Input and Output
  • 52.08#B!/bin/bash
  • 52.09if [ -e /home/iofzol/veronico ]
  • 52.10then
  • 52.11echo "File exists"
  • 52.12else
  • 52.13echo "File does not exist"
  • 52.14#i/bin/bash
  • 52.15if [ -e /home/iofzol/check ]
  • 52.16then
  • 52.17echo "File exists"
  • 52.18else
  • 52.19echo "File does not exist"
  • 52.20#!/bin/bash
  • 52.21count=0
  • 52.22num=10
  • 52.23while [ $count -lt 10 ]
  • 52.24echo
  • 52.25echo $num seconds left to stop this process
  • 52.26echo
  • 52.27sleep 1
  • 52.28num=$(expr $num - 1)
  • 52.29count=$(expr $count + 1)
  • 52.30done
  • 52.31echo
  • 52.32echo "Process is stopped!!!"
  • 52.33echo
  • 52.34#!/bin/bash
  • 52.35echo "Please enter the letter next to the command that you want to select:"
  • 52.36echo 'a. date'
  • 52.37echo 'b. ls'
  • 52.38echo 'c. who'
  • 52.39echo 'd. hostname'
  • 52.40read choice
  • 52.41case $choice in
  • 52.42a) date;;
  • 52.43b) ls;;
  • 52.44c) who;;
  • 52.45d) hostname;;
  • 52.46*) echo "Invalid choice - Bye.";;
  • 52.47esac
  • 52.48Overview of Checking Remote Servers Connectivity
  • 52.49Overview of Setting up Aliases
  • 52.50Overview of User and Global Aliases
  • 52.51Overview of Shell History
53Chapter-53 Networking , Services,& System Updates
  • 53.01Open VirtualBox Manager
  • 53.02Select the Machine You Cannot Get Internet on in the Left Pane
  • 53.03Click the Settings Button in the Top Menu
  • 53.04Click Network in the Left Pane in the Settings Window
  • 53.05Switch to Bridged Adapter in the Attached to Drop-Down Menu
  • 53.06Hit OK to Save Your Changes
  • 53.07Start Your VM
  • 53.08Subnet Mask
  • 53.09Gateway
  • 53.10Static vs. DHCP
  • 53.11Interface
  • 53.12Interface MAC
  • 53.13Network Files and Commands in Linux etc/hosts Version 6 - /etc/sysconfig/network Version 7 - /etc/hostname /etc/sysconfig/network-scripts/ifcfg-nic /etc/resolv.conf /etc/nsswitch.conf
  • 53.14etc/hosts
  • 53.15Version 6 - /etc/sysconfig/network
  • 53.16Version 7 - /etc/hostname
  • 53.17/etc/sysconfig/network-scripts/ifcfg-nic
  • 53.18/etc/resolv.conf
  • 53.19/etc/nsswitch.conf
  • 53.20Network Commands
  • 53.21ping
  • 53.22ifconfig
  • 53.23ifup or ifdown
  • 53.24netstat
  • 53.25tcpdump
  • 53.26Overview of NIC Information Using ethtool
  • 53.27Overview of NIC or Port Bonding
  • 53.28nmtui
  • 53.29nmcli
  • 53.30nm-connection-editor
  • 53.31GNOME Settings
  • 53.32Overview of wget Command
  • 53.33Overview of curl Command
  • 53.34Overview of ping Command
  • 53.35Overview of FTP
  • 53.36Overview of SCP
  • 53.37Overview of rsync
  • 53.38Overview of System Upgrade and Patch Management
  • 53.39Overview of Creating Local Repository
  • 53.40Overview of Advanced Package Management
  • 53.41Overview of Rolling Back Patches and Updates
  • 53.42SSH and Telnet in Linux
  • 53.43SSH vs. Telnet in Linux
  • 53.44Overview of DNS Configuration
  • 53.45nslookup Command
  • 53.46dig Command
  • 53.47Linux Network Time Protocol
  • 53.48Linux chronyd (New Version of NTP)
  • 53.49New System Utility Command (timedatectl)
  • 53.50Overview of Linux Sendmail
  • 53.51Setting Up a Simple Apache Web Server
  • 53.52Overview of Central Logging with rsyslog
  • 53.53Overview of OS Hardening
  • 53.54Overview of Open LDAP Installation
  • 53.55Overview of traceroute Command
  • 53.56Steps to Configure and Secure SSH
  • 53.57Overview of SSH Keys
  • 53.58Overview of Cockpit for Web-Based Administration
  • 53.59Overview of Firewall Configuration
  • 53.60Overview of System Performance Tuning
  • 53.61Overview of Running Containers with Docker and Podman
  • 53.62Overview of Kickstart for Automated Installation
  • 53.63Overview of DHCP Server Configuration
54Chapter-54 Disk Manacgment And Run Levels
  • 54.01Overview of System Run Levels
  • 54.02Steps in Computer Boot Process
  • 54.03Stages of Linux Boot Process
  • 54.04What is Message of the Day (MOTD)?
  • 54.05Steps to Customize MOTD
  • 54.06Overview of Storage Types and Concepts
  • 54.07Using df Command
  • 54.08Using fdisk Command
  • 54.09Steps to Add Disk and Create Partition
  • 54.10Overview of Logical Volume Management (LVM)
  • 54.11Steps for LVM Configuration During Installation
  • 54.12Using pvcreate Command
  • 54.13Using vgcreate Command
  • 54.14Using lvcreate Command
  • 54.15Steps to Extend Disk Using LVM
  • 54.16Steps to Add Swap Space
  • 54.17Overview of Stratis for Advanced Storage Management
  • 54.18Introduction to RAID
  • 54.19Using fsck Command
  • 54.20Using xfs_repair Command
  • 54.21Steps for System Backup Using dd Command
  • 54.22Overview of NFS Installation and Configuration
  • 54.23Steps for Samba Installation and Configuration
  • 54.24Setting Up NAS Drive for NFS or Samba
  • 54.25Overview of SATA and SAS Technologies

What is the duration of the DevLustro Certified IT Infra Manager course?

The course duration is typically 12 weeks, with flexible learning options to fit different schedules.

Do I need any prior experience in IT infrastructure management to enroll in this course?

No prior experience is required. This course is designed for both beginners and professionals looking to enhance their skills.

What certification will I receive upon completing the course?

Upon successful completion, you will receive the DevLustro Certified IT Infra Manager certification, which is recognized globally.

Are there any prerequisites for enrolling in this course?

Basic knowledge of IT systems and networking is beneficial but not mandatory.

How is the course delivered?

The course is delivered through a combination of online lectures, hands-on labs, real-world projects, and interactive sessions with instructors.

Will I have access to course materials after the course is completed?

Yes, you will have lifetime access to all course materials, including video lectures, assignments, and additional resources.

What kind of support is available during the course?

You will have access to a dedicated coordinator, regular feedback from trainers, and post-session support to address any questions or challenges.

Are there any real-world projects included in the course?

Yes, the course includes several real-world projects to provide practical experience and help you apply the concepts learned.

Can I get my team certified through this course?

Yes, we offer customized training programs for teams. Please contact our support team for more details on group certifications.

How can I enroll in the DevLustro Certified IT Infra Manager course?

You can enroll through our website by completing the registration form and selecting your preferred course schedule. For assistance, our support team is always available.

Ready to begin?

DevLustro Certified IT Infra Manager – Training Course

Duration: 180 Hours

Enroll in

DevLustro Certified IT Infra Manager – Training Course

Want to know more?