After 12th Make your career in Infrastructure Management – Hardware, Networking and Cyber Security

Spread the love - Spread the Knowledge

Make a career in Infrastructure Management – Hardware and Networking

IANT is the biggest TechEd Company in the EdTech space, training students in IMS, Software programming, Cyber security and Disruptive technologies. CHNA-IPS 4.0, a job ready career course, designed to transform the careers of 10th, 12th, Undergraduates, Graduates (Arts, Commerce), Diploma holders, & Engineering students into a globally certified IT engineer. This 360 degree training module starts with fundamentals of Cybersecurity (Star Cyber Secure User – SCSU), Microsoft Office 365 and Star Information Technology Essentials – SITE.

Quick facts

18 months Course | 2 hours/day, 6 days a week – Hybrid Model | Classroom Training

13 course Participation Certificates | 1 IANT Certificate | 9 International Certificates

Coding | Scenario based training and practical | Access to LMS (Learning Management System)

E-books / Videos | Spoken English / Self-Enrichment

 

In NEP 2020, Coding, AI, Robotics, IoT, Cloud computing courses has been introduced from class 6th onwards. IANT was first to introduce these courses in an IMS (Infrastructure Management Services) course to make sure that the students get an opportunity to learn these technologies and become a part of the 21st Century IT Workforce. The other technologies included in this job oriented career course are: A+ (Hardware), Network+, Cisco CCNA, Star Ethical Hacking Expert, and Microsoft Windows Server Administration and Red Hat Linux – RHCSA.

The course is integrated with spoken English and self-enrichment sessions to develop soft skills. IANT is authorized training partner of CompTIA, Red Hat & Star Certification and provides international certification to the students at World’s lowest price. This CHNA-IPS 4.0 course ensures that trained students are technically competent for the IT industry jobs. After course completion, IANT provides 100% placement in association with allitjob.com. Students may get jobs in the following roles: IT Admin, System Engineer, Desktop Support Engineer, Technical Support Engineer and many more…

The course content:

Computer Fundamentals & Cyber Security

Star Cyber Secure User – SCSU (S09-001)

  • Introduction to Cyber Security
  • Understanding the need of data security
  • Implementing Data Security
  • Securing Operating Systems
  • Securing Web Browser
  • Network Security threats and solutions
  • Safeguarding mobile devices
  • Preparing for unseen threats

Office 365

  • Introduction to Office 365
  • Working with Word
  • Working with Excel
  • Working with PowerPoint
  • Working with Access
  • Working with Outlook

Star Information Technology Essentials – SITE (S789-01A)

  • Basics of Computing & Processing
  • Units of Measure: Storage, Throughput, & Speed
  • Internal computer components and their purpose
  • Connecting & Configuring peripherals
  • Troubleshooting methodology
  • Basic networking
  • Basic wireless network
  • Programming Languages
  • Database
  • Password Best Practices
  • Authentication, Authorization, Accounting, and Nonrepudiation Concepts
  • Business Continuity Concepts

Computer Hardware, Operating System, Programming and Internet of Things (h2)

CompTIA A+ CORE 1 and 2 (220-1001 – 220-1002) – Hardware

  • Supporting Operating Systems
  • Installing and Configuring PC Components
  • Installing, Configuring, and Troubleshooting Display and Multimedia Devices
  • Installing, Configuring, and Troubleshooting Storage Devices
  • Installing, Configuring, and Troubleshooting Internal System Components
  • Installing, Configuring, and Maintaining Operating Systems Maintaining and Troubleshooting Microsoft Windows
  • Network Infrastructure Concepts
  • Configuring and Troubleshooting Networks
  • Managing Users, Workstations, and Shared Resources
  • Client Virtualization and Cloud Computing
  • Security Concepts
  • Securing Workstations and Data
  • Troubleshooting Workstation Security Issues
  • Supporting and Troubleshooting Laptops
  • Supporting and Troubleshooting Mobile Devices
  • Installing, Configuring, and Troubleshooting Print Devices
  • Implementing Operational Procedures

Star C Programming (S07-110)

  • Programming basics and the fundamentals of C
  • Data types in C
  • Mathematical and logical operations
  • Using if statement and loops
  • Arranging data in arrays
  • Implementing pointers
  • File management and dynamic memory allocation

Star Python (S07-114)

  • Programming in Python
  • Implementing data types, statement, operators and strings
  • Implementing OOPs concept in Python
  • Creating GUI applications using Python
  • Connecting with databases
  • Implementing TCP socket connectivity

Star Expert IoT Specialist – SEIS (S08-514)

  • Fundamentals of IoT, its architecture and its applications
  • Embedded systems and IoT boards
  • Arduino and Raspberry Pi
  • Different IoT operating systems
  • Data analytics in IoT
  • IoT cloud platforms and network virtualization

Computer Networks and Communication – Networking (h2)

CompTIA Network+ N10-007

  • Networking Concepts
  • Devices, applications, protocols and services at their appropriate OSI layers
  • Routing & Switching
  • Wireless technologies and configurations
  • Cloud concepts and their purposes
  • Network services
  • Infrastructure
  • Virtualization and network storage technologies
  • Network Operations
  • Documentation and diagrams to manage the network
  • Network Security
  • Implement network device hardening
  • Network Troubleshooting and Tools
  • Troubleshoot common wired and wireless connectivity and performance issues
  • Troubleshoot common network service issues

Cisco Certified Network Associate – CCNA 200-301

  • Network Fundamentals
  • Network Access
  • IP Connectivity
  • IP Services
  • Security fundamentals
  • Automation and programmability

Cyber Security – Ethical Hacking

Star Ethical Hacking Expert – S-EHE (S09-006)

EHE 1

  • Exploring Ethical Hacking
  • Associated Protocols
  • Gathering Information about Target Computer Systems – Foot-printing and Investigation
  • Scanning Computers in the Networks
  • Vulnerabilities Associated with Systems
  • Exploring Malware Threats and Their Countermeasures
  • Enumeration – Listing the System/Users and Connecting Them
  • Gaining Access to Systems – Hacking
  • Monitoring and Capturing Data Packets Using Sniffing
  • Restricting the System Access – Denial of Service (DoS) Attack
  • Tricking People to Gather Confidential Information – Social Engineering

EHE 2

  • Web Servers and Threats Associated with It
  • Web Applications and Threats Associated with It
  • Controlling User Session with Authenticated TCP Connection – Session Hijacking
  • Injecting Code in Data Driven Applications: SQL Injection
  • Hacking Mobile Platforms and Threats Associated with It
  • Encrypting and Decrypting the Code – Cryptography and Its Types
  • Evading IDS, Firewalls and Honeypots
  • Wireless Networks and Threats Associated with It
  • Cloud Computing, Virtualisation and Threats Associated with It
  • Output Analysis and Reports
  • Economics and Laws – Passwords and Encryption

Cloud Platform and Infrastructure

Star Cloud Computing Expert – SCCE (S08-511)

  • Cloud computing basics
  • What is virtualization
  • Cloud computing as a service
  • Popular cloud computing platforms for managing the clouds
  • Different cloud computing models
  • Cloud computing security risks and cost metrics
  • Cloud backup solutions and security
  • Containerisation and cloud analytics

Red Hat – RHCSA / RHEL 8 (RH124, RH134) – Linux

Red Hat System Administration – I (RH-124)

  • Access the command line
  • Manage files from the command line
  • Get help in Red Hat Enterprise Linux
  • Create, view, and edit text files
  • Manage local Linux users and groups
  • Control access to files with Linux file system permissions
  • Monitor and manage Linux processes
  • Control services and daemons
  • Configure and secure Open SSH service
  • Analyze and store logs
  • Manage Red Hat Enterprise Linux networking
  • Archive and copy files between systems
  • Install and Keystone identity service update software packages
  • Access Linux file systems
  • Use virtualized systems

Red Hat System Administration – II (RH-134)

  • Automate installation with Kick-start
  • Use regular expressions with grep command
  • Create and Edit text files with vim
  • Schedule future Linux tasks
  • Manage priority of Linux processes
  • Control access to files with access control lists (ACL)
  • Manage Linux security
  • Connect to network-defined users and groups
  • Add disks, partitions, and file systems to a Linux system
  • Manage logical volume management (LVM) storage
  • Access networked attached storage with network file system (NFS)
  • Access networked storage with SMB
  • Control and troubleshoot the Red Hat Enterprise Linux boot process
  • Limit network communication with firewall

Microsoft – Installation, Storage and Compute with Windows Server – 70-740

  • Installing, upgrading, and migrating servers and workloads
  • Configuration local storage this module explains how to manage disks and volumes in Windows Server 2016
  • Implementing enterprise storage solutions
  • Implementing Storage Spaces and Data Deduplication
  • Installing and configuring Hyper-V and virtual machines
  • Deploying and managing Windows and Hyper-V
  • Overview of high availability and disaster recovery
  • Implementing failover clustering
  • Implementing failover clustering with Windows Server 2016 Hyper-V
  • Implementing Network Load Balancing
  • Creating and managing deployment images
  • Managing, monitoring, and maintaining virtual machine installations

Disruptive Technologies

Robotics & AI Overview

  • Basics of robots and robotics
  • Classification of robots and their applications
  • Components of a robot – sensors, actuators, control systems, etc.
  • Mechanical design of a robot
  • Fundamentals of artificial intelligence
  • Data, algorithms and hardware in AI
  • Basics of machine learning and deep learning
  • Application areas of AI
  • Robotics, drones and driving cars
  • Future of AI

Skilling 360 Degree – Job ready (h2)

Scratch Coding Learner (10 Sessions) (Online Sessions)

  • Learn logic with Scratch Coding

Block Coding Learner (40 Sessions) (Online Sessions)

  • Learn logic with Sprite Lab
  • Developing Apps with App Lab
  • Apply GUI in Turtle programming App
  • Build Chat-bot Assistant in App Lab

Self-Enrichment (50 Sessions)

  • Break free
  • My Job Roles & Responsibilities
  • Goal Setting
  • Web Browser, Antivirus and Third-party Applications
  • Why International Certifications
  • Crossword Puzzle
  • Resume making
  • Excel Project
  • PowerPoint Presentation
  • Create your own website
  • Latest Hardware in Computer Technology
  • Latest Software in Different Fields
  • Talk to stranger
  • Make a short instructional video
  • Favourite Sports Personality
  • Make a collage
  • Word Search
  • Collect quotation of PC and Laptop from 3 vendors
  • Releasing purchase order
  • Make a model of PC with its components
  • Favourite IT Personality
  • Compose a rap or other song
  • Troubleshooting Challenge – Hardware
  • Create a route map from your home to IANT
  • Design a Network
  • Review your Long Term Goal
  • Design IT Infra of your company
  • Troubleshooting Challenge – OS & Networking
  • Call for AMC from 3 vendors
  • Sell your AMC Service to a company
  • Video Resume
  • Mock Interview – SCSU/Office 365/SITE/CompTIA A+
  • Project on C
  • Talking about a topic not in course
  • Being responsible social media user
  • Teach a topic you like the most to 2 people in your community
  • Blog writing
  • Debate – Python or C
  • Project on Python – Utility App
  • You are CTO in an IT Company
  • You are CM for a Day
  • You are Sundar Pichai. You will be interviewed by media
  • Create a text message related to topic
  • Create an Utility App
  • Find out different types of cyber crime
  • How to raise a cyber-fraud complaint
  • Mock interviews
  • Tie tying day
  • Make a list of companies you want to work at
  • Write an email to HR asking for job

Spoken English

Official communication is mostly done in English Language and therefore one must learn to speak and write in English. The spoken English course includes basic sentence formation to scenario based communication to help students in developing interview skills.

2 thoughts on “After 12th Make your career in Infrastructure Management – Hardware, Networking and Cyber Security”

Leave a Reply

Your email address will not be published. Required fields are marked *