Cloud Computing Microsoft Azure Outline

Trainer Name
Author Name
Course TitleCloud Computing / Microsoft
Objectives and ExpectationsObjectives and Expectations Employable skills and hands-on practice for Networking and Cloud Computing


Networking has become one of the most attractive career profiles among candidates. From the basics of Routing and Switching to Cloud Networking, the advancements happening in the networking domain are beyond one’s imagination.

Cloud computing powers modern-day industry through seamless provision of servers, storage, networking, software and analytics. Study cloud computing to develop in-demand skills and expertise in virtualization, cloud infrastructure, app development and security.

This is a special course designed to address unemployment in the youth. The course aims to achieve the above objective through hands on practical training delivery by a team of dedicated professionals having rich market/work experience. This course is therefore not just for developing a theoretical understanding/back ground of the trainees. Contrary to that it is primarily aimed at equipping the trainees to perform commercially in a market space in independent capacity or as a member of a team.

The course therefore is designed to impart not only technical skills but also soft skills (i.e interpersonal/communication skills; personal grooming of the trainees etc) as well as entrepreneurial skills (i.e. marketing skills; free lancing etc.). The course also seeks to inculcate work ethics to foster better citizenship in general and improve the image of Pakistani work force in particular

Main Expectations:

In short, the course under reference should be delivered by professional instructors in such a robust hands-on manner that the trainees are comfortably able to employ their skills for earning money (through wage/self-employment) at its conclusion.

This course thus clearly goes beyond the domain of the traditional training practices in vogue and underscores an expectation that a market-centric approach will be adopted as the main driving force while delivering it. The instructors should therefore be experienced enough to be able to identify the training needs for the possible market roles available out there. Moreover, they should also know the strengths and weaknesses of each trainee to prepare them for such market roles during/after the training.



i. Specially designed practical tasks to be performed by the trainees have been included in the Annexure-I to this document. The record of all tasks performed individually or in groups must be preserved by the management of the training Institute clearly labeling name, trade, session, etc so that these are ready to be physically inspected/verified through monitoring visits from time to time. The weekly distribution of tasks has also been indicated in the weekly lesson plan given in this document.

ii. To materialize the main expectations, a special module on Job Search

& Entrepreneurial Skills has been included in the latter part of this course (3rd

month) through which, the trainees will be made aware



of the Job search techniques in the local as well as international job markets (Gulf countries). Awareness around
the visa process and immigration laws of the most favored pg. 2 | Networking & Cloud Computing

labor destination countries also form a part of this module. Moreover, the trainees would also be encouraged to venture into self-employment and exposed to the main requirements in this regard. It is also expected that a sense of civic duties/roles and responsibilities will also be inculcated in the trainees to make them responsible citizens of the country.

iii. A module on Work Place Ethics has also been included to highlight the importance of good and positive behavior in the workplace in the line with the best practices elsewhere in the world. An outline of such qualities has been given in the Appendix to this document. Its importance should be conveyed in a format that is attractive and interesting for the trainees such as through PPT slides +short video documentaries. Needless to say, that if the training provider puts his heart and soul into these otherwise non-technical components, the image of the Pakistani workforce would undergo a positive transformation in the local as well as international job markets.

To maintain interest and motivation of the trainees throughout the course, modern techniques such as:

• Motivational Lectures

• Success Stories

• Case Studies

These techniques would be employed as an additional training tool wherever possible (these are explained in the subsequent section on Training Methodology).

Lastly, evaluation of the competencies acquired by the trainees will be done objectively at various stages of the training and a proper record of the same will be maintained. Suffice to say that for such evaluations, practical tasks would be designed by the training providers to gauge the problem-solving abilities of the trainees.

(i) Motivational Lectures

The proposed methodology for the training under reference employs motivation as a tool. Hence besides the purely technical content, a trainer is required to include elements of motivation in his/her lecture. To inspire the trainees to utilize the training opportunity to the full and strive towards professional excellence. Motivational lectures may also include general topics such as the importance of moral values and civic role & responsibilities as a Pakistani. A motivational lecture should be delivered with enough zeal to produce a deep impact on the trainees. It may comprise of the following:

Clear Purpose to convey the message to trainees effectively. Personal Story to quote as an example to follow.

Trainees Fit so that the situation is actionable by trainees and not represent a just idealism.

Ending Points to persuade the trainees on changing themselves.

A good motivational lecture should help drive creativity, curiosity, and spark the desire needed for trainees to want to learn more.

The impact of a successful motivational strategy is amongst others commonly visible

in increased class participation ratios. It increases the trainees’ willingness to be engaged on the practical tasks for a longer time without boredom and loss of interest because they can see in their mind’s eye where their hard work would take them in short (1-3 years); medium (3 -10 years) and long term (more than 10 years).

pg. 3 | Networking & Cloud Computing




As this tool is expected that the training providers would make arrangements for regular well planned motivational lectures as part of a coordinated strategy interspersed throughout the training period as suggested in the weekly lesson plans in this document.

Course-related motivational lectures online link is available in Annexure-II.

(ii) Success Stories

Another effective way of motivating the trainees is using Success Stories. Its inclusion in the weekly lesson plan at regular intervals has been recommended till the end of the training.

A success story may be disseminated orally, through a presentation, or using a video/documentary of someone that has risen to fortune, acclaim, or brilliant achievement. A success story shows how a person achieved his goal through hard work, dedication, and devotion. An inspiring success story contains compelling and significant facts articulated clearly and easily comprehendible words. Moreover, it is helpful if it is assumed that the reader/listener knows nothing of what is being revealed. The optimum impact is created when the story is revealed in the form of: –

Directly in person (At least 2-3 cases must be arranged by the training institute) Through an audio/ videotaped message (2-3 high-quality videos must be arranged by the training institute)

It is expected that the training provider would collect relevant high- quality success stories for inclusion in the training as suggested in the weekly lesson plan given in this document.

Suggestive structure and sequence of a sample success story and its various shapes can be seen in Annexure III.

(iii) Case Studies

Where a situation allows, case studies can also be presented to the trainees to widen their understanding of the real-life specific problem/situation and to explore the solutions.

In simple terms, the case study method of teaching uses a real-life case example/a typical case to demonstrate a phenomenon in action and explain theoretical as well as practical aspects of the knowledge related to the same. It is an effective way to help the trainees comprehend in depth both the theoretical and practical aspects of the complex phenomenon in depth with ease. Case teaching can also stimulate the trainees to participate in discussions and thereby boost their confidence. It also makes the classroom atmosphere interesting thus maintaining the trainee interest in training till the end of the course.

Depending on suitability to the trade, the weekly lesson plan in this document may suggest case studies be presented to the trainees. The trainer may adopt a PowerPoint presentation or video format for such case studies whichever is deemed suitable but only those cases must be selected that are relevant and of a learning value.

The Trainees should be required and supervised to carefully analyze the cases. For this purpose, they must be encouraged to inquire and collect specific information/data, actively participate in the discussions, and intended solutions to the problem/situation.

Case studies can be implemented in the following ways: –

i. A good quality trade-specific documentary (At least 2- 3 documentaries must be arranged by the training

pg. 4 | Networking & Cloud Computing institute)
Entry-level of traineesFor an advanced course of Networking and cloud proposed entry level is minimum Beginner to Intermediate

· Fundamentals of Computer or not
Learning Outcomes of the courseLearning Outcomes of the course By the end of this course, the trainees should gain the following competencies:
Understanding of Networking techniques Campus Design & Enterprise Network Configuration of IP Connectivity

Configuration of Advance Routing and Routing Protocols Management of Network Security of Network Problems Solving Skills Troubleshooting Skills Network Monitoring Skills Network Designing

High Availability of Network Remote Site Management

Secure and Encrypted traffic b/w branches Implementation of Network Policies Programmability and Automation

Understanding of Cloud Computing Architecture

Distinguish between traditional and cloud computing models in terms of business value.

Learn fundamental concepts of cloud computing.

Identify technical challenges and mitigation measures involved in cloud computing. Understand latest digitization trends associated with cloud computing.

Design and build enterprise-to-carrier grade private and public cloud. Learning focus would be on following: –

Understand various types of virtualizations (compute, storage and network) Identify leading hypervisor manufacturers.

Learn the fundamentals concepts and deployment of vSphere virtual infrastructure. Security threats and challenges in private and public cloud buildup. Understand design principles in securing your cloud.

Security management in cloud including identity and access management, next generation security protection and application programming interface (API) based security.

Learn about advanced load balancing architecture in cloud. pg. 5 | Networking & Cloud Computing

Identify common cloud attack vectors and remediating controls. Learn Off the Shelf Cloud Solutions like Microsoft Azure and Amazon Web Services (AWS)

Detailed understanding of Microsoft Azure Cloud.

Cover the fundamentals of AWS architectural principles and services. Deep dive into individual elements like IAM, S3, Cloud front, Storage Gateway, Snowball, EC2, Cloud watch, CLI, Lambda, Route 53, RDS, Dynamo DB, Redshift, Elastic Cache, Aurora, VPC,

SQS, SNS, Elastic Transcoder, Kinesis, API Gateway etc.
Course Execution PlanThe total duration of the course: 3 months Theory: 20% Practical: 80%
Total Hours of Study : 240 Hours
Companies offering jobs in the respective tradeThere are thousands of Job opportunities in the field of networking. Few of them are mentioned below:
PTCL (Pakistan Telecommunication Company Limited) Jazz (Mobilink) Telenor Pakistan

Zong (China Mobile Pakistan) National Data Consultants (NDC Tech) Systems Limited

Inbox Business Technologies World Call Telecom Limited

Vision Telecom Pvt Ltd



COMSATS Internet Services Nokia Siemens Networks Motorola
NSC Global Siemens

Saif Telecom Descon Engineering Descon Mirani Presson Descon Olayan Descon

JGC- Descon / DIP Etimaad

IAEL

ABB Automation SPEC Group Pakistan About Us

Callmate Telips Lahore Gymkhana Royal Palm

Serena Hotel Islamabad Sinaco Engineers Novatax Limited Hascom Business Excicom

SB&B Advertising Polaris Values

Raaziq International Pvt Ltd OOCL Pakistan

Exel Pakistan DHL Pakistan Yaseen Shipping

Karachi International Terminal Ltd Intertek Pakistan

WWF Pakistan ESBI

Merlin International Pakistan Arbor Tech

Hyperstar Expereo

Pak Oasis Industries Pvt. Ltd. OMV Exploration GmbH

M3 Tech Allcom
Job Opportunities· Cloud Administrator
· Network Administrator
· IT Support Officer
· Manager / Assistant Manager IT
· Network support engineer
· Cloud Analyst
No of Students25
Learning PlaceClassroom / Lab
Instructional ResourcesVideo Links:
https://www.youtube.com/@iptrainers https://www.youtube.com/@corvitsystemslahore

MODULES

Scheduled WeeksModule TitleDaysLearning UnitsHome Assignment
Weeks 1Introduction to Networking and Cloud ComputingDay 1Trainer’s Introduction
General Guidelines

Evaluation
Course Introduction
Course Scope
Evaluation
Day 2Cloud Computing Concept, History, and Definitions
Advantages of Cloud Business Model Evaluation
Day 3Differentiating types of clouds: public,
private and hybrid
Categorizing service
types
Day 4Trainer’s Introduction General Guidelines Evaluation
Course Introduction Course Scope

Basic Networking Terms Evaluation

TCP/IP & OSI Model Evaluation

Network Cables

Cross Over / Straight Through MAC Address VS IP Address MAC Addressing:

Format of MAC addresses Types of MAC addresses
Day 5Introduction to Network Devices Introduction to Decimal, Binary and Hexa-Decimal Numbers
Week 2IPv4 Addressing & SubnettingDay 1Evaluation
Day 2
Day 3History of IPv4 Addressing Format of IPv4 Addressing Classification of IPv4 Addressing
Day 4
Day 5Calculating Number of Networks in Classes Calculation number of hosts per Network
Week 3Lab Setup with Cisco & Huawei DevicesDay 1Configuring and Troubleshooting Remote Access
Configuring VPN Access

Securing VPN connections with Security policies
Day 2Installing a DHCP Server Role
Configuring DHCP Scopes
Configuring Advanced DHCP Features
Day 3Deploying Additional domain controllers Plan and Implement Server Virtualization with Hyper
Plan and deploy virtual machines Design and implement Virtualization Replica solutions
Day 4Class Full and Class Less Subnetting
IPv6 Addressing:

History of IPv6 Addressing Format of IPv6 addressing Network Prefix and Interface ID Address Types of IPV6:

Global Unicast Addresses Unique Local Addresses Link Local Addresses Multicast Addresses

Basic Lab Setup with Cisco and Huawei Devices

LAN and WAN cables Practice & Evaluation
Day 5Introduction to terminal applications such as Putty, Hyper terminal and Secure CRT etc.
LAN switching operations

Physical Overview of Routers and Switches. How to access network devices locally.

Difference between local and remote access.
Week 4Advanced Configurations Of Cisco IOS and Huawei VRPDay 1Introduction to Virtualization – the Backbone Technology of Cloud Computing
Virtualization: Definition, Concepts, History, and Relationship to Cloud Computing

Virtualization: Benefits, Challenges, Risks, and Suitability to Organizations

Hypervisor: Role and Purpose in Virtualization and Various Hypervisor Types

Virtualization: Terminologies and the different Types of Virtualization
Day 2vSphere Virtual Infrastructure
Describe the benefits of using virtual machines

Explain the similarities and differences between physical architectures and virtual architectures

Define the purpose of ESXi

Define the purpose of vCenter Server
Day 3· Installing vSphere Components
· Installation of ESXi
· Configuring ESXi services
· Introduction to Compute Virtualization
· Network Architecture for Virtualization Physical Network for Virtualization
Day 4Introduction to Cisco IOS and CLI. Initial Configuration of Cisco IOS.
Introduction of different modes of Cisco IOS. Configure and verify clock Configure and verify hostname. Configure and verify user access verification or login password Configure and verify enable password Configure and verify enable secret Learn how to modify, copy, write and erase configuration.

Verify running-config and startup-config
Day 5Create username, password and their privileges
Create username, password and their privileges in Huawei VRP

How to configure and troubleshoot Ethernet and Serial interfaces.

Configure description on interfaces. Configure ipv4 and ipv6 addresses on interfaces.

Configure Keepalive, clock rate and encapsulation on interfaces.
Week 5Basic RoutingDay 1· Identify the files that make up a virtual machine
· Discuss the latest virtual machine hardware and its features
· Describe virtual machine CPU, memory, disk, and network resource usage

Explain the importance of VMware Tools™
Day 2· Overview
· Deploy and configure vCenter Server Appliance
· Use vSphere Web Client
· Backup and restore vCenter Server
· vCenter Server permissions and roles
· vSphere HA architectures and features
· vSphere authentication proxy
· Manage vCenter Server inventory objects and licenses

Access and navigate the new vSphere clients
Day 3· Use templates and cloning to deploy new virtual machines
· Modify and manage virtual machines
· Clone a virtual machine
· Upgrade virtual machine hardware to version 12
· Remove virtual machines from the vCenter Server inventory and datastore

· Customize a new virtual machine using customization specification files

· Perform vSphere vMotion and vSphere Storage vMotion migrations

· Create and manage virtual machine snapshots

· Create, clone, and export vApps

Introduce the types of content libraries and how to deploy and use them
Day 4Remote-access with TELNET and SSH. Introduction to DHCP.
How to configure DHCP on Cisco IOS Understand next hop.

Practice & Evaluation

How to configure next hop with: Outgoing interface

Next Hop IP address Practice & Evaluation
Day 5Revision & Motivational Talk
Introduction to Routing for reachability. Understand static routing.

Configure and verify static routing for IPv4 Introduction to Dynamic Routing

Types of routing protocols Evaluation

Define IGP & EGP

Evaluation
Week 6Mid Term Exam Network Services and IOS Features Routing ProtocolsDay 1· Explain the vSphere HA architecture
· Configure and manage a vSphere HA cluster
· Use vSphere HA advanced parameters
· Define cluster-wide restart ordering capabilities
· Enforce infrastructural or intra-app dependencies during failover
· Describe vSphere HA heartbeat networks and datastore heartbeats
· Introduce vSphere Fault Tolerance
· Enable vSphere Fault Tolerance on virtual machines

· Examine enhanced consolidation of vSphere Fault Tolerance virtual machines

· Introduce vSphere Replication

Use vSphere Data Protection to back up and restore data
Day 2· Identity and Access Management
· Data Classification
· Data Security Lifecycle
· Motivational Talk
· Describe cloud security reference architecture

Understand design principles of secure cloud computing
Day 3· Review Traditional Computing Challenges and Concerns
· Cloud Computing Concept, History, and Definitions
· Cloud Reference Architecture
· Advantages of Cloud Business Model
· Introduction of Public cloud
· Public cloud Vendors Public cloud types
Day 4· Interior gateway protocols:
· RIP: Routing Information Protocol OSPF: Open Shortest Path First
· IS-IS: Intermediate System to Intermediate System Evaluation
· Exterior Gateway protocols:
· BGP: Border Gateway Protocol
· Evaluation
· Administrative Distance or preference of routing methods.

Configure and verify Default Routing
Day 5Configure and verify CDP Evaluation
Configure and verify NTP: Network Time Protocol

Evaluation Password Recovery Evaluation





MID Term
Week 7IP Traffic Management & Security
On Cisco & Huawei
Day 1· Introduction to Microsoft Office365 & Azure Cloud
· Introduction to Office 365 Plans Provisioning Tenants
Day 2· Managing Users, Groups, and Licenses
· by Using the Administration Center
· Manage Security and Distribution Groups Manage Security and Distribution Groups
Day 3· Manage Administrator Roles in Office 365
· Configure Password Management
· Manage IT Deployments of Office 365 Pro Plus
Add and Configure Custom Domains
Day 4Configure and verify CDP Evaluation
Configure and verify NTP: Network Time Protocol

Evaluation Password Recovery Evaluation
Day 5Introduction to Access Control List Evaluation
Configure and verify standard ACL Configure and verify extended ACL Evaluation

Contiguous and dis-contiguous wildcard mask Implement named and numbered ACL
Week 8Job Search & Entrepreneurial Skills (Search Jobs in at least two labor marketplace countries)Day 1· Prepare On-premises
Active Directory for
DirSync
· Manage Active
Directory Users and
Groups with DirSync
In Place
· Prepare on-premises
Active Directory for
DirSync
· Set up DirSync

Manage Active Directory Users and Groups with DirSync in place
Day 2· Introduction to Microsoft Azure Cloud
· Azure Foundations
· Azure Marketplace
· Azure Portal
· Azure CLI
· Cloud Shell
· Footprint and Structure
· Azure Services
· Compute
· Networking
· Storage
· Web and Mobile
· Databases
· Data and Analytics
· Enterprise Integration
· Security and Identity Monitoring and Management
Day 3· Introduction
· Regions and Availability Zones
· Resource Groups and Azure Resource Manager
· Lab: Creating Azure Resources
· Compute – Azure
· Introduction
· Virtual Machines
· Scale Sets
· App Service
· Azure Container Instances
· Azure Kubernetes Service
· Functions

Lab: Azure App Services
Day 4· Introduction to public
and private IP addresses
· Evaluation
· Introduction to NAT and
PAT. Configure and
verify network address
translation
· Evaluation
· Configure and verify
PAT/NAT- overloading
Day 5OSPF: Open Shortest Path First Link State Algorithm Evaluation
OSPF Process-id. OSPF Router-id.

Configure Loopback Interfaces OSPF Area-id.

OSPF contiguous wildcard mask OSPF Metric: cost

OSPF Tables: Evaluation
Configure and verify single area OSPF
Week 9OSPF & Policy Based RoutingDay 1· Networking -Azure
· Introduction
· Virtual Network
· Load Balancer
· VPN Gateway
· Application Gateway
· Content Delivery Network
· Creating a Virtual Network Connection
· Create Network in Azure Portal
· IP Addressing Motivational Talk
Day 2· Private DNS
· Demo: Public DNS
Demo: Static Private and Public IP
Day 3· Introduction
· Securing Network Connectivity
· Azure Security Center
· Key Vault
· Azure Information Protection
· Advanced Threat Protection Azure Key Vault
Day 4· Design and implement multiple area OSPF.
· Regular and transit area.
· Evaluation
· Define Internal Router, Backbone Router, Backbone Internal Router, Area Border Router and ASBR.
· Practice & Evaluation
· Introduce and configure redistribution. Define seed/external metric.
· Type 1 and Type 2 seed metric.
· Evaluation
· Static routes with null-0 for testing. Practice & Evaluation
Day 5Revision & Motivational Talk Introduction to PBR tools: Route-map
IP prefix-list Distribute-list ACL OSPF neighbor states
Week 10Introduction to AzureDay 1Introduction Internet of Things Big Data
Artificial Intelligence Serverless

DevOps Using Azure AI
Day 2Introduction Identity Services
Azure Active Directory Multi-Factor Authentication Azure Active Directory Create Azure AD Tenant Create Users and Groups

Self-Service Password Reset
Day 3Database – Azure Introduction Cosmos DB Azure SQL
Azure Database for MySQL Azure Database for PostgreSQL Database Migration Services

Creating Cosmos DB
Day 4OSPF over multi-access networks
DR, BDR and DRO roles in multi-access networks

Evaluation

Introducing OSPF LSA types 1 to 7.

Practice & Evaluation
Day 5Regular area types:
Stub Area

Totally Stubby area Evaluation

NSSA: Not So Stubby Area Totally NSSA

Configure and verify OSPF Virtual Links. Practice and Evaluation
Week 11Storage – AzureDay 1· Introduction
· Blob
· Disk
· File
· Archive

Creating a Storage Account
Day 2Introduction
Manage Azure VM Storage VM Storage Overview Demo: Add Disk

Manage disks Practice & Evaluation
Day 3Creating azure storage for Local and cloud users
Manage private network disk setups Configure online and on site network drives
Day 4· Configure and verify OSPF Virtual Links. Practice and Evaluation
· Continuous and discontinuous OSPF backbones.

Practice and Evaluation
Day 5OSPF filters:
IP prefix-lists Evaluation Area filters Evaluation Passive interface

Evaluation

Route summarization Evaluation authentication
Week 12Connectivity between Virtual Networks – AzureDay 1Connectivity between Virtual Networks – Azure Hybrid Connectivity Options
Routes and VNET Peering Routing and Peering Hybrid Scenarios

LAB & Evaluation
Day 2Create and Configure Network Security Group (NSG) – Azure
Create Network Security Groups Configure Network Security Groups ncy
Day 3Privacy, Compliance and Trust
Introduction Governance Azure Monitor

Azure Service Health Compliance

Privacy Trust

Lab: Using Azure Monitor

Evaluation
Day 4Revision & Motivational Talk Introduction to EGP
Evaluation

Historical Background Introduction to Multihoming Evaluation

BGP fundamentals. Internal and External BGP. Evaluation

BGP attributes: Weight Practice & Evaluation
Day 5Local preference
Evaluation As-path Evaluation Router-id BGP route-summarization

PBR with BGP attributes and PBR tools Evaluation

Full Mesh i-BGP

Route-reflector configuration BGP configuration best practices Evaluation

BGP authentication
Tasks for Certificate in AI (Robotics)
Task No.TaskDescriptionWeek
1Cisco Binary Game Link is given on Page4.

Revise OSI and TCP/IP Models

Cloud subscriptions
Week 1
2Solve IPv4 Addressing MCQs IPv6 Question will be given to identify their types Candidates are required to identify types of MAC addresses in the class Creation of public accounts Managing cloud users· PDF file will be given in the class containing 20 questions to practice IP addressing.
·Creation of public accounts Managing cloud users Installation & Virtualization and Various Hypervisor Types
Week 2
3Basic Configuration Installation of ESXi Configuring ESXi services· Configure and verify clock Configure and verify hostname.
· Configure and verify user access verification or login password
· Configure and verify enable password Configure and verify enable secret
· Learn how to modify, copy, write and erase configuration.
· Verify running-config and startup-config
· Create username, password and their privileges Configure banners:

· motd login exec

Installation of ESXi Configuring ESXi services
Week 3
4Advanced
Configurations Of Cisco IOS and Huawei VRP Create

Centralized Storage vs. Distributed Storage
· configure and troubleshoot Ethernet and Serial interfaces.
· Configure description on interfaces.
· Configure ipv4 and ipv6 addresses on interfaces. Configure Keepalive, clock rate and encapsulation on interfaces.
· Verify connectivity with test traffic.
· Use of ping command and understand output. Impact of round-trip time.
· Remote-access with TELNET and SSH. Configure DNS. Configure DHCP on Cisco IOS and Huawei VRP Creat

Centralized Storage vs. Distributed Storage
Week 4
5Basic Routing
Create Backup and restore Backup
· Configure next hop with: Outgoing interface
· Next Hop IP address
· Configure and verify static routing for IPv4 Configure and verify Default Routing.

Configure and verify DHCP Relay Agent.
Week 5
6IOS and Configuration Backup with TFTP Configure and verify CDP
Configure and verify LLDP

Configure and verify NTP: Network Time Protocol Password Recovery

Configure and verify Embedded Event Manager: EEM Configure KRON Scheduler Configure and verify SYSLOG

Creating virtual machine, Clone & templates
Week 6
7Network Services and IOS Features
Creating virtual machine, Clone & templates

IP Traffic Management & Security On Cisco & Huawei

Describe vSphere architecture & vSphere

cluster
Configure and verify standard ACL Configure and verify extended ACL Implement named and numbered ACL Configure and verify network address translation Configure and verify PAT/NAT-overloading Describe vSphere architecture & vSphere clusterWeek 7
8Deep Dive into Dynamic
Routing Creating & Managing Virtual Machine in Azure Portal
· Configure and verify single area OSPF. Design and
implement multiple area OSPF. Introduce and configure redistribution.
· Configure seed/external metric. Configure Type 1 and Type 2 seed metric.

Configure Static routes with null-0 for testing. Creating &

Managing Virtual Machine in Azure Portal
Week 8
9OSPF & Policy Based Routing Create azure
firewall
Industry Scenario-1 to implement PBR Industry Scenario-2 to implement PBR Create azure firewallWeek 9
10AWS login and feature explore
AWS
Operation on Portal Project
Create free login on AWS Web Portal Explore EC2 instance Explore EC2 Load Balancing on Amazon Web portal Dynamic scaling and policies of autoscaling Implement a Project
as per instructor
Week 10
11AWS
Storage Management AWS Basic Security Features Create VPC and Database management
· Explore how to create, delete, Mounting and unmounting EBS
· volume. Practices on AWS Storage management.
· Protect the cloud by implementing the different techniques, like Identity Access Management (IAM) Creating Users and Groups, Applying policies, Password Policy, Roles, AWS Security Management, Security Practices for
· Cloud Deployment and AWS Responsibilities and Securities.
· Crete VPC Cloud on AWS and implement the all technique of database
Week 11
12AWS
Managerial tools Disaster Management Policies
Explore all management tools on by one in AWS Implement the different disaster management policies like How to manage Disaster Recovery and Backups, DR and Backups, AWS High
Availability Design
Week 12