Cloud Computing Microsoft Azure Outline
Trainer Name | |
---|---|
Author Name | |
Course Title | Cloud Computing / Microsoft |
Objectives and Expectations | Objectives and Expectations Employable skills and hands-on practice for Networking and Cloud Computing Networking has become one of the most attractive career profiles among candidates. From the basics of Routing and Switching to Cloud Networking, the advancements happening in the networking domain are beyond one’s imagination. Cloud computing powers modern-day industry through seamless provision of servers, storage, networking, software and analytics. Study cloud computing to develop in-demand skills and expertise in virtualization, cloud infrastructure, app development and security. This is a special course designed to address unemployment in the youth. The course aims to achieve the above objective through hands on practical training delivery by a team of dedicated professionals having rich market/work experience. This course is therefore not just for developing a theoretical understanding/back ground of the trainees. Contrary to that it is primarily aimed at equipping the trainees to perform commercially in a market space in independent capacity or as a member of a team. The course therefore is designed to impart not only technical skills but also soft skills (i.e interpersonal/communication skills; personal grooming of the trainees etc) as well as entrepreneurial skills (i.e. marketing skills; free lancing etc.). The course also seeks to inculcate work ethics to foster better citizenship in general and improve the image of Pakistani work force in particular Main Expectations: In short, the course under reference should be delivered by professional instructors in such a robust hands-on manner that the trainees are comfortably able to employ their skills for earning money (through wage/self-employment) at its conclusion. This course thus clearly goes beyond the domain of the traditional training practices in vogue and underscores an expectation that a market-centric approach will be adopted as the main driving force while delivering it. The instructors should therefore be experienced enough to be able to identify the training needs for the possible market roles available out there. Moreover, they should also know the strengths and weaknesses of each trainee to prepare them for such market roles during/after the training. i. Specially designed practical tasks to be performed by the trainees have been included in the Annexure-I to this document. The record of all tasks performed individually or in groups must be preserved by the management of the training Institute clearly labeling name, trade, session, etc so that these are ready to be physically inspected/verified through monitoring visits from time to time. The weekly distribution of tasks has also been indicated in the weekly lesson plan given in this document. ii. To materialize the main expectations, a special module on Job Search & Entrepreneurial Skills has been included in the latter part of this course (3rd month) through which, the trainees will be made aware of the Job search techniques in the local as well as international job markets (Gulf countries). Awareness around the visa process and immigration laws of the most favored pg. 2 | Networking & Cloud Computing labor destination countries also form a part of this module. Moreover, the trainees would also be encouraged to venture into self-employment and exposed to the main requirements in this regard. It is also expected that a sense of civic duties/roles and responsibilities will also be inculcated in the trainees to make them responsible citizens of the country. iii. A module on Work Place Ethics has also been included to highlight the importance of good and positive behavior in the workplace in the line with the best practices elsewhere in the world. An outline of such qualities has been given in the Appendix to this document. Its importance should be conveyed in a format that is attractive and interesting for the trainees such as through PPT slides +short video documentaries. Needless to say, that if the training provider puts his heart and soul into these otherwise non-technical components, the image of the Pakistani workforce would undergo a positive transformation in the local as well as international job markets. To maintain interest and motivation of the trainees throughout the course, modern techniques such as: • Motivational Lectures • Success Stories • Case Studies These techniques would be employed as an additional training tool wherever possible (these are explained in the subsequent section on Training Methodology). Lastly, evaluation of the competencies acquired by the trainees will be done objectively at various stages of the training and a proper record of the same will be maintained. Suffice to say that for such evaluations, practical tasks would be designed by the training providers to gauge the problem-solving abilities of the trainees. (i) Motivational Lectures The proposed methodology for the training under reference employs motivation as a tool. Hence besides the purely technical content, a trainer is required to include elements of motivation in his/her lecture. To inspire the trainees to utilize the training opportunity to the full and strive towards professional excellence. Motivational lectures may also include general topics such as the importance of moral values and civic role & responsibilities as a Pakistani. A motivational lecture should be delivered with enough zeal to produce a deep impact on the trainees. It may comprise of the following: Clear Purpose to convey the message to trainees effectively. Personal Story to quote as an example to follow. Trainees Fit so that the situation is actionable by trainees and not represent a just idealism. Ending Points to persuade the trainees on changing themselves. A good motivational lecture should help drive creativity, curiosity, and spark the desire needed for trainees to want to learn more. The impact of a successful motivational strategy is amongst others commonly visible in increased class participation ratios. It increases the trainees’ willingness to be engaged on the practical tasks for a longer time without boredom and loss of interest because they can see in their mind’s eye where their hard work would take them in short (1-3 years); medium (3 -10 years) and long term (more than 10 years). pg. 3 | Networking & Cloud Computing As this tool is expected that the training providers would make arrangements for regular well planned motivational lectures as part of a coordinated strategy interspersed throughout the training period as suggested in the weekly lesson plans in this document. Course-related motivational lectures online link is available in Annexure-II. (ii) Success Stories Another effective way of motivating the trainees is using Success Stories. Its inclusion in the weekly lesson plan at regular intervals has been recommended till the end of the training. A success story may be disseminated orally, through a presentation, or using a video/documentary of someone that has risen to fortune, acclaim, or brilliant achievement. A success story shows how a person achieved his goal through hard work, dedication, and devotion. An inspiring success story contains compelling and significant facts articulated clearly and easily comprehendible words. Moreover, it is helpful if it is assumed that the reader/listener knows nothing of what is being revealed. The optimum impact is created when the story is revealed in the form of: – Directly in person (At least 2-3 cases must be arranged by the training institute) Through an audio/ videotaped message (2-3 high-quality videos must be arranged by the training institute) It is expected that the training provider would collect relevant high- quality success stories for inclusion in the training as suggested in the weekly lesson plan given in this document. Suggestive structure and sequence of a sample success story and its various shapes can be seen in Annexure III. (iii) Case Studies Where a situation allows, case studies can also be presented to the trainees to widen their understanding of the real-life specific problem/situation and to explore the solutions. In simple terms, the case study method of teaching uses a real-life case example/a typical case to demonstrate a phenomenon in action and explain theoretical as well as practical aspects of the knowledge related to the same. It is an effective way to help the trainees comprehend in depth both the theoretical and practical aspects of the complex phenomenon in depth with ease. Case teaching can also stimulate the trainees to participate in discussions and thereby boost their confidence. It also makes the classroom atmosphere interesting thus maintaining the trainee interest in training till the end of the course. Depending on suitability to the trade, the weekly lesson plan in this document may suggest case studies be presented to the trainees. The trainer may adopt a PowerPoint presentation or video format for such case studies whichever is deemed suitable but only those cases must be selected that are relevant and of a learning value. The Trainees should be required and supervised to carefully analyze the cases. For this purpose, they must be encouraged to inquire and collect specific information/data, actively participate in the discussions, and intended solutions to the problem/situation. Case studies can be implemented in the following ways: – i. A good quality trade-specific documentary (At least 2- 3 documentaries must be arranged by the training pg. 4 | Networking & Cloud Computing institute) |
Entry-level of trainees | For an advanced course of Networking and cloud proposed entry level is minimum Beginner to Intermediate · Fundamentals of Computer or not |
Learning Outcomes of the course | Learning Outcomes of the course By the end of this course, the trainees should gain the following competencies: Understanding of Networking techniques Campus Design & Enterprise Network Configuration of IP Connectivity Configuration of Advance Routing and Routing Protocols Management of Network Security of Network Problems Solving Skills Troubleshooting Skills Network Monitoring Skills Network Designing High Availability of Network Remote Site Management Secure and Encrypted traffic b/w branches Implementation of Network Policies Programmability and Automation Understanding of Cloud Computing Architecture Distinguish between traditional and cloud computing models in terms of business value. Learn fundamental concepts of cloud computing. Identify technical challenges and mitigation measures involved in cloud computing. Understand latest digitization trends associated with cloud computing. Design and build enterprise-to-carrier grade private and public cloud. Learning focus would be on following: – Understand various types of virtualizations (compute, storage and network) Identify leading hypervisor manufacturers. Learn the fundamentals concepts and deployment of vSphere virtual infrastructure. Security threats and challenges in private and public cloud buildup. Understand design principles in securing your cloud. Security management in cloud including identity and access management, next generation security protection and application programming interface (API) based security. Learn about advanced load balancing architecture in cloud. pg. 5 | Networking & Cloud Computing Identify common cloud attack vectors and remediating controls. Learn Off the Shelf Cloud Solutions like Microsoft Azure and Amazon Web Services (AWS) Detailed understanding of Microsoft Azure Cloud. Cover the fundamentals of AWS architectural principles and services. Deep dive into individual elements like IAM, S3, Cloud front, Storage Gateway, Snowball, EC2, Cloud watch, CLI, Lambda, Route 53, RDS, Dynamo DB, Redshift, Elastic Cache, Aurora, VPC, SQS, SNS, Elastic Transcoder, Kinesis, API Gateway etc. |
Course Execution Plan | The total duration of the course: 3 months Theory: 20% Practical: 80% Total Hours of Study : 240 Hours |
Companies offering jobs in the respective trade | There are thousands of Job opportunities in the field of networking. Few of them are mentioned below: PTCL (Pakistan Telecommunication Company Limited) Jazz (Mobilink) Telenor Pakistan Zong (China Mobile Pakistan) National Data Consultants (NDC Tech) Systems Limited Inbox Business Technologies World Call Telecom Limited Vision Telecom Pvt Ltd COMSATS Internet Services Nokia Siemens Networks Motorola NSC Global Siemens Saif Telecom Descon Engineering Descon Mirani Presson Descon Olayan Descon JGC- Descon / DIP Etimaad IAEL ABB Automation SPEC Group Pakistan About Us Callmate Telips Lahore Gymkhana Royal Palm Serena Hotel Islamabad Sinaco Engineers Novatax Limited Hascom Business Excicom SB&B Advertising Polaris Values Raaziq International Pvt Ltd OOCL Pakistan Exel Pakistan DHL Pakistan Yaseen Shipping Karachi International Terminal Ltd Intertek Pakistan WWF Pakistan ESBI Merlin International Pakistan Arbor Tech Hyperstar Expereo Pak Oasis Industries Pvt. Ltd. OMV Exploration GmbH M3 Tech Allcom |
Job Opportunities | · Cloud Administrator · Network Administrator · IT Support Officer · Manager / Assistant Manager IT · Network support engineer · Cloud Analyst |
No of Students | 25 |
Learning Place | Classroom / Lab |
Instructional Resources | Video Links: https://www.youtube.com/@iptrainers https://www.youtube.com/@corvitsystemslahore |
MODULES
Scheduled Weeks | Module Title | Days | Learning Units | Home Assignment |
---|---|---|---|---|
Weeks 1 | Introduction to Networking and Cloud Computing | Day 1 | Trainer’s Introduction General Guidelines Evaluation Course Introduction Course Scope Evaluation | |
Day 2 | Cloud Computing Concept, History, and Definitions Advantages of Cloud Business Model Evaluation | |||
Day 3 | Differentiating types of clouds: public, private and hybrid Categorizing service types | |||
Day 4 | Trainer’s Introduction General Guidelines Evaluation Course Introduction Course Scope Basic Networking Terms Evaluation TCP/IP & OSI Model Evaluation Network Cables Cross Over / Straight Through MAC Address VS IP Address MAC Addressing: Format of MAC addresses Types of MAC addresses | |||
Day 5 | Introduction to Network Devices Introduction to Decimal, Binary and Hexa-Decimal Numbers | |||
Week 2 | IPv4 Addressing & Subnetting | Day 1 | Evaluation | |
Day 2 | ||||
Day 3 | History of IPv4 Addressing Format of IPv4 Addressing Classification of IPv4 Addressing | |||
Day 4 | ||||
Day 5 | Calculating Number of Networks in Classes Calculation number of hosts per Network | |||
Week 3 | Lab Setup with Cisco & Huawei Devices | Day 1 | Configuring and Troubleshooting Remote Access Configuring VPN Access Securing VPN connections with Security policies | |
Day 2 | Installing a DHCP Server Role Configuring DHCP Scopes Configuring Advanced DHCP Features | |||
Day 3 | Deploying Additional domain controllers Plan and Implement Server Virtualization with Hyper Plan and deploy virtual machines Design and implement Virtualization Replica solutions | |||
Day 4 | Class Full and Class Less Subnetting IPv6 Addressing: History of IPv6 Addressing Format of IPv6 addressing Network Prefix and Interface ID Address Types of IPV6: Global Unicast Addresses Unique Local Addresses Link Local Addresses Multicast Addresses Basic Lab Setup with Cisco and Huawei Devices LAN and WAN cables Practice & Evaluation | |||
Day 5 | Introduction to terminal applications such as Putty, Hyper terminal and Secure CRT etc. LAN switching operations Physical Overview of Routers and Switches. How to access network devices locally. Difference between local and remote access. | |||
Week 4 | Advanced Configurations Of Cisco IOS and Huawei VRP | Day 1 | Introduction to Virtualization – the Backbone Technology of Cloud Computing Virtualization: Definition, Concepts, History, and Relationship to Cloud Computing Virtualization: Benefits, Challenges, Risks, and Suitability to Organizations Hypervisor: Role and Purpose in Virtualization and Various Hypervisor Types Virtualization: Terminologies and the different Types of Virtualization | |
Day 2 | vSphere Virtual Infrastructure Describe the benefits of using virtual machines Explain the similarities and differences between physical architectures and virtual architectures Define the purpose of ESXi Define the purpose of vCenter Server | |||
Day 3 | · Installing vSphere Components · Installation of ESXi · Configuring ESXi services · Introduction to Compute Virtualization · Network Architecture for Virtualization Physical Network for Virtualization | |||
Day 4 | Introduction to Cisco IOS and CLI. Initial Configuration of Cisco IOS. Introduction of different modes of Cisco IOS. Configure and verify clock Configure and verify hostname. Configure and verify user access verification or login password Configure and verify enable password Configure and verify enable secret Learn how to modify, copy, write and erase configuration. Verify running-config and startup-config | |||
Day 5 | Create username, password and their privileges Create username, password and their privileges in Huawei VRP How to configure and troubleshoot Ethernet and Serial interfaces. Configure description on interfaces. Configure ipv4 and ipv6 addresses on interfaces. Configure Keepalive, clock rate and encapsulation on interfaces. | |||
Week 5 | Basic Routing | Day 1 | · Identify the files that make up a virtual machine · Discuss the latest virtual machine hardware and its features · Describe virtual machine CPU, memory, disk, and network resource usage Explain the importance of VMware Tools™ | |
Day 2 | · Overview · Deploy and configure vCenter Server Appliance · Use vSphere Web Client · Backup and restore vCenter Server · vCenter Server permissions and roles · vSphere HA architectures and features · vSphere authentication proxy · Manage vCenter Server inventory objects and licenses Access and navigate the new vSphere clients | |||
Day 3 | · Use templates and cloning to deploy new virtual machines · Modify and manage virtual machines · Clone a virtual machine · Upgrade virtual machine hardware to version 12 · Remove virtual machines from the vCenter Server inventory and datastore · Customize a new virtual machine using customization specification files · Perform vSphere vMotion and vSphere Storage vMotion migrations · Create and manage virtual machine snapshots · Create, clone, and export vApps Introduce the types of content libraries and how to deploy and use them | |||
Day 4 | Remote-access with TELNET and SSH. Introduction to DHCP. How to configure DHCP on Cisco IOS Understand next hop. Practice & Evaluation How to configure next hop with: Outgoing interface Next Hop IP address Practice & Evaluation | |||
Day 5 | Revision & Motivational Talk Introduction to Routing for reachability. Understand static routing. Configure and verify static routing for IPv4 Introduction to Dynamic Routing Types of routing protocols Evaluation Define IGP & EGP Evaluation | |||
Week 6 | Mid Term Exam Network Services and IOS Features Routing Protocols | Day 1 | · Explain the vSphere HA architecture · Configure and manage a vSphere HA cluster · Use vSphere HA advanced parameters · Define cluster-wide restart ordering capabilities · Enforce infrastructural or intra-app dependencies during failover · Describe vSphere HA heartbeat networks and datastore heartbeats · Introduce vSphere Fault Tolerance · Enable vSphere Fault Tolerance on virtual machines · Examine enhanced consolidation of vSphere Fault Tolerance virtual machines · Introduce vSphere Replication Use vSphere Data Protection to back up and restore data | |
Day 2 | · Identity and Access Management · Data Classification · Data Security Lifecycle · Motivational Talk · Describe cloud security reference architecture Understand design principles of secure cloud computing | |||
Day 3 | · Review Traditional Computing Challenges and Concerns · Cloud Computing Concept, History, and Definitions · Cloud Reference Architecture · Advantages of Cloud Business Model · Introduction of Public cloud · Public cloud Vendors Public cloud types | |||
Day 4 | · Interior gateway protocols: · RIP: Routing Information Protocol OSPF: Open Shortest Path First · IS-IS: Intermediate System to Intermediate System Evaluation · Exterior Gateway protocols: · BGP: Border Gateway Protocol · Evaluation · Administrative Distance or preference of routing methods. Configure and verify Default Routing | |||
Day 5 | Configure and verify CDP Evaluation Configure and verify NTP: Network Time Protocol Evaluation Password Recovery Evaluation MID Term | |||
Week 7 | IP Traffic Management & Security On Cisco & Huawei | Day 1 | · Introduction to Microsoft Office365 & Azure Cloud · Introduction to Office 365 Plans Provisioning Tenants | |
Day 2 | · Managing Users, Groups, and Licenses · by Using the Administration Center · Manage Security and Distribution Groups Manage Security and Distribution Groups | |||
Day 3 | · Manage Administrator Roles in Office 365 · Configure Password Management · Manage IT Deployments of Office 365 Pro Plus Add and Configure Custom Domains | |||
Day 4 | Configure and verify CDP Evaluation Configure and verify NTP: Network Time Protocol Evaluation Password Recovery Evaluation | |||
Day 5 | Introduction to Access Control List Evaluation Configure and verify standard ACL Configure and verify extended ACL Evaluation Contiguous and dis-contiguous wildcard mask Implement named and numbered ACL | |||
Week 8 | Job Search & Entrepreneurial Skills (Search Jobs in at least two labor marketplace countries) | Day 1 | · Prepare On-premises Active Directory for DirSync · Manage Active Directory Users and Groups with DirSync In Place · Prepare on-premises Active Directory for DirSync · Set up DirSync Manage Active Directory Users and Groups with DirSync in place | |
Day 2 | · Introduction to Microsoft Azure Cloud · Azure Foundations · Azure Marketplace · Azure Portal · Azure CLI · Cloud Shell · Footprint and Structure · Azure Services · Compute · Networking · Storage · Web and Mobile · Databases · Data and Analytics · Enterprise Integration · Security and Identity Monitoring and Management | |||
Day 3 | · Introduction · Regions and Availability Zones · Resource Groups and Azure Resource Manager · Lab: Creating Azure Resources · Compute – Azure · Introduction · Virtual Machines · Scale Sets · App Service · Azure Container Instances · Azure Kubernetes Service · Functions Lab: Azure App Services | |||
Day 4 | · Introduction to public and private IP addresses · Evaluation · Introduction to NAT and PAT. Configure and verify network address translation · Evaluation · Configure and verify PAT/NAT- overloading | |||
Day 5 | OSPF: Open Shortest Path First Link State Algorithm Evaluation OSPF Process-id. OSPF Router-id. Configure Loopback Interfaces OSPF Area-id. OSPF contiguous wildcard mask OSPF Metric: cost OSPF Tables: Evaluation Configure and verify single area OSPF | |||
Week 9 | OSPF & Policy Based Routing | Day 1 | · Networking -Azure · Introduction · Virtual Network · Load Balancer · VPN Gateway · Application Gateway · Content Delivery Network · Creating a Virtual Network Connection · Create Network in Azure Portal · IP Addressing Motivational Talk | |
Day 2 | · Private DNS · Demo: Public DNS Demo: Static Private and Public IP | |||
Day 3 | · Introduction · Securing Network Connectivity · Azure Security Center · Key Vault · Azure Information Protection · Advanced Threat Protection Azure Key Vault | |||
Day 4 | · Design and implement multiple area OSPF. · Regular and transit area. · Evaluation · Define Internal Router, Backbone Router, Backbone Internal Router, Area Border Router and ASBR. · Practice & Evaluation · Introduce and configure redistribution. Define seed/external metric. · Type 1 and Type 2 seed metric. · Evaluation · Static routes with null-0 for testing. Practice & Evaluation | |||
Day 5 | Revision & Motivational Talk Introduction to PBR tools: Route-map IP prefix-list Distribute-list ACL OSPF neighbor states | |||
Week 10 | Introduction to Azure | Day 1 | Introduction Internet of Things Big Data Artificial Intelligence Serverless DevOps Using Azure AI | |
Day 2 | Introduction Identity Services Azure Active Directory Multi-Factor Authentication Azure Active Directory Create Azure AD Tenant Create Users and Groups Self-Service Password Reset | |||
Day 3 | Database – Azure Introduction Cosmos DB Azure SQL Azure Database for MySQL Azure Database for PostgreSQL Database Migration Services Creating Cosmos DB | |||
Day 4 | OSPF over multi-access networks DR, BDR and DRO roles in multi-access networks Evaluation Introducing OSPF LSA types 1 to 7. Practice & Evaluation | |||
Day 5 | Regular area types: Stub Area Totally Stubby area Evaluation NSSA: Not So Stubby Area Totally NSSA Configure and verify OSPF Virtual Links. Practice and Evaluation | |||
Week 11 | Storage – Azure | Day 1 | · Introduction · Blob · Disk · File · Archive Creating a Storage Account | |
Day 2 | Introduction Manage Azure VM Storage VM Storage Overview Demo: Add Disk Manage disks Practice & Evaluation | |||
Day 3 | Creating azure storage for Local and cloud users Manage private network disk setups Configure online and on site network drives | |||
Day 4 | · Configure and verify OSPF Virtual Links. Practice and Evaluation · Continuous and discontinuous OSPF backbones. Practice and Evaluation | |||
Day 5 | OSPF filters: IP prefix-lists Evaluation Area filters Evaluation Passive interface Evaluation Route summarization Evaluation authentication | |||
Week 12 | Connectivity between Virtual Networks – Azure | Day 1 | Connectivity between Virtual Networks – Azure Hybrid Connectivity Options Routes and VNET Peering Routing and Peering Hybrid Scenarios LAB & Evaluation | |
Day 2 | Create and Configure Network Security Group (NSG) – Azure Create Network Security Groups Configure Network Security Groups ncy | |||
Day 3 | Privacy, Compliance and Trust Introduction Governance Azure Monitor Azure Service Health Compliance Privacy Trust Lab: Using Azure Monitor Evaluation | |||
Day 4 | Revision & Motivational Talk Introduction to EGP Evaluation Historical Background Introduction to Multihoming Evaluation BGP fundamentals. Internal and External BGP. Evaluation BGP attributes: Weight Practice & Evaluation | |||
Day 5 | Local preference Evaluation As-path Evaluation Router-id BGP route-summarization PBR with BGP attributes and PBR tools Evaluation Full Mesh i-BGP Route-reflector configuration BGP configuration best practices Evaluation BGP authentication |
Tasks for Certificate in AI (Robotics)
Task No. | Task | Description | Week |
---|---|---|---|
1 | Cisco Binary Game Link is given on Page4. Revise OSI and TCP/IP Models Cloud subscriptions | Week 1 | |
2 | Solve IPv4 Addressing MCQs IPv6 Question will be given to identify their types Candidates are required to identify types of MAC addresses in the class Creation of public accounts Managing cloud users | · PDF file will be given in the class containing 20 questions to practice IP addressing. ·Creation of public accounts Managing cloud users Installation & Virtualization and Various Hypervisor Types | Week 2 |
3 | Basic Configuration Installation of ESXi Configuring ESXi services | · Configure and verify clock Configure and verify hostname. · Configure and verify user access verification or login password · Configure and verify enable password Configure and verify enable secret · Learn how to modify, copy, write and erase configuration. · Verify running-config and startup-config · Create username, password and their privileges Configure banners: · motd login exec Installation of ESXi Configuring ESXi services | Week 3 |
4 | Advanced Configurations Of Cisco IOS and Huawei VRP Create Centralized Storage vs. Distributed Storage | · configure and troubleshoot Ethernet and Serial interfaces. · Configure description on interfaces. · Configure ipv4 and ipv6 addresses on interfaces. Configure Keepalive, clock rate and encapsulation on interfaces. · Verify connectivity with test traffic. · Use of ping command and understand output. Impact of round-trip time. · Remote-access with TELNET and SSH. Configure DNS. Configure DHCP on Cisco IOS and Huawei VRP Creat Centralized Storage vs. Distributed Storage | Week 4 |
5 | Basic Routing Create Backup and restore Backup | · Configure next hop with: Outgoing interface · Next Hop IP address · Configure and verify static routing for IPv4 Configure and verify Default Routing. Configure and verify DHCP Relay Agent. | Week 5 |
6 | IOS and Configuration Backup with TFTP Configure and verify CDP Configure and verify LLDP Configure and verify NTP: Network Time Protocol Password Recovery Configure and verify Embedded Event Manager: EEM Configure KRON Scheduler Configure and verify SYSLOG Creating virtual machine, Clone & templates | Week 6 | |
7 | Network Services and IOS Features Creating virtual machine, Clone & templates IP Traffic Management & Security On Cisco & Huawei Describe vSphere architecture & vSphere cluster | Configure and verify standard ACL Configure and verify extended ACL Implement named and numbered ACL Configure and verify network address translation Configure and verify PAT/NAT-overloading Describe vSphere architecture & vSphere cluster | Week 7 |
8 | Deep Dive into Dynamic Routing Creating & Managing Virtual Machine in Azure Portal | · Configure and verify single area OSPF. Design and implement multiple area OSPF. Introduce and configure redistribution. · Configure seed/external metric. Configure Type 1 and Type 2 seed metric. Configure Static routes with null-0 for testing. Creating & Managing Virtual Machine in Azure Portal | Week 8 |
9 | OSPF & Policy Based Routing Create azure firewall | Industry Scenario-1 to implement PBR Industry Scenario-2 to implement PBR Create azure firewall | Week 9 |
10 | AWS login and feature explore AWS Operation on Portal Project | Create free login on AWS Web Portal Explore EC2 instance Explore EC2 Load Balancing on Amazon Web portal Dynamic scaling and policies of autoscaling Implement a Project as per instructor | Week 10 |
11 | AWS Storage Management AWS Basic Security Features Create VPC and Database management | · Explore how to create, delete, Mounting and unmounting EBS · volume. Practices on AWS Storage management. · Protect the cloud by implementing the different techniques, like Identity Access Management (IAM) Creating Users and Groups, Applying policies, Password Policy, Roles, AWS Security Management, Security Practices for · Cloud Deployment and AWS Responsibilities and Securities. · Crete VPC Cloud on AWS and implement the all technique of database | Week 11 |
12 | AWS Managerial tools Disaster Management Policies | Explore all management tools on by one in AWS Implement the different disaster management policies like How to manage Disaster Recovery and Backups, DR and Backups, AWS High Availability Design | Week 12 |