Program Features of Industrial Training

The programs envisage for Engineering 4th to 8th Semester, have been developed on the fulfil the practical/ industrial exposure along with latest software techniques. The programs are uniquely designed and in fact only in India, to achieve a specialisation in a particular field of engineering. The Key features that make it the best Winter training are as follows :

  • Practical based working
  • Industrial/ Site visit
  • Reverse Engineering
  • Live projects
  • Latest CAD/IT software learning
  • Training by experienced Faculties
  • Winter Internship Certificate
  • Software Training Certificate
  • Training Available at Lalkothi & Sitabari, Jaipur Locations.


some contents

Advanced Web developement

Cyber Forensic Training

Cloud Computing Advanced Training

Advanced Mobile App Development

Network Administraion Training

Advanced Digital Marketing


  • Front-End Language

    Syllabus Covered (HTML) Introduction of different Web Technology Introduction HTML Elements HTML Attributes HTML Headings HTML Paragraphs HTML Formatting HTML Fonts HTML Styles HTML Links HTML Images HTML Tables HTML Lists HTML Forms HTML Frames HTML Iframes HTML Colors HTML Colornames HTML Colorvalues HTML Quick List HTML Layout HTML Doctypes HTML Head HTML Meta HTML Scripts HTML Entities HTML URLs HTML URL Encode HTML Media HTML Audio HTML Object HTML Video HTML YouTube HTML Media Tags HTML Summary Syllabus Covered (HTML5) HTML5 Introduction HTML5 New Elements HTML5 Video HTML5 Video/DOM HTML5 Audio HTML5 Drag and Drop HTML5 Canvas HTML5 SVG HTML5 Canvas vs. SVG HTML5 Geolocation HTML5 Web Storage HTML5 App Cache HTML5 Web Workers HTML5 SSE HTML5 Tags Syllabus Covered (CSS) CSS Introduction CSS Syntax CSS Id & Class CSS Styling Styling Backgrounds Styling Text Styling Fonts Styling Links Styling Lists Styling Tables CSS Box Model CSS Box Model CSS Border CSS Outline CSS Margin CSS Padding CSS Advanced CSS Grouping/Nesting CSS Dimension CSS Display CSS Positioning CSS Floating CSS Align CSS Navigation Bar CSS Image Gallery CSS Image Opacity CSS Image Sprites CSS Media Types CSS hacking CSS Summary JavaScript Tutorial JavaScript Introduction JavaScript Example External JavaScript JavaScript Basics JavaScript Comment JavaScript Variable JavaScript Global Variable JavaScript Data Types JavaScript Operators JavaScript If Statement JavaScript Switch JavaScript Loop JavaScript Function JavaScript Objects JavaScript Object JavaScript Array JavaScript String JavaScript Date JavaScript Math JavaScript Number JavaScript Boolean JavaScript DataView JavaScript Function JavaScript handler JavaScript JSON JavaScript Number JavaScript Reflect JavaScript RegExp JavaScript Symbol JavaScript BOM Browser Objects 1) Window Object 2) History Object 3) Navigator Object 4) Screen Object JavaScript DOM 5) Document Object getElementById getElementsByName getElementsByTagName JavaScript innerHTML property JavaScript innerText property JavaScript Validation JavaScript form validation JavaScript email validation JavaScript OOPs JavaScript Class JavaScript Object JavaScript Prototype JavaScript constructor Method JavaScript static Method JavaScript Encapsulation JavaScript Inheritance JavaScript Polymorphism JavaScript Abstraction JavaScript Cookies JavaScript Cookies Cookie Attributes Cookie with multiple Name Deleting Cookies JavaScript Events HTML/DOM Events JavaScript Misc JavaScript this Keyword JavaScript Debugging JavaScript Hoisting JavaScript Strict Mode JavaScript Advance JavaScript TypedArray JavaScript Set JavaScript Map JavaScript WeakSet JavaScript WeakMap Bootstrap Tutorial Bootstrap Introduction What is Bootstrap Bootstrap Example Bootstrap Container Bootstrap Examples Bootstrap Jumbotron Bootstrap Button Bootstrap Grid Bootstrap Table Bootstrap Form Bootstrap Alert Bootstrap Wells Bootstrap Badge & Label Bootstrap Panels Bootstrap Pagination Bootstrap Pager Bootstrap Image Bootstrap Glyphicon Bootstrap Carousel Bootstrap Progress Bar Bootstrap List Group Bootstrap Dropdown Bootstrap Collapse jQuery Tutorial jQuery HOME jQuery Intro jQuery Get Started jQuery Syntax jQuery Selectors jQuery Events jQuery Effects jQuery Hide/Show jQuery Fade jQuery Slide jQuery Animate jQuery stop() jQuery Callback jQuery Chaining jQuery HTML jQuery Get jQuery Set jQuery Add jQuery Remove jQuery CSS Classes jQuery css() jQuery Dimensions jQuery Traversing jQuery Traversing jQuery Ancestors jQuery Descendants jQuery Siblings jQuery Filtering What is AJAX? Asynchronous Ajax Technologies XMLHttpRequest How AJAX Works?
  • Back-End Language

    PHP HOME PHP Intro PHP Install PHP Syntax PHP Comments PHP Variables PHP Echo / Print PHP Data Types PHP Strings PHP Numbers PHP Constants PHP Operators PHP If...Else...Elseif PHP Switch PHP Loops PHP Functions PHP Arrays PHP Superglobals PHP Forms PHP Form Handling PHP Form Validation PHP Form Required PHP Form URL/E-mail PHP Form Complete PHP Advanced PHP Date and Time PHP Include PHP File Handling PHP File Open/Read PHP File Create/Write PHP File Upload PHP Cookies PHP Sessions PHP Filters PHP Filters Advanced PHP JSON PHP OOP PHP What is OOP PHP Classes/Objects PHP Constructor PHP Destructor PHP Access Modifiers PHP Inheritance PHP Constants PHP Abstract Classes PHP Traits PHP Static Methods PHP Static Properties MySQL Database MySQL Database MySQL Connect MySQL Create DB MySQL Create Table MySQL Insert Data MySQL Get Last ID MySQL Insert Multiple MySQL Prepared MySQL Select Data MySQL Where MySQL Order By MySQL Delete Data MySQL Update Data MySQL Limit Data Python HOME Python Intro Python Get Started Python Syntax Python Comments Python Variables Python Data Types Python Numbers Python Casting Python Strings Python Booleans Python Operators Python Lists Python Tuples Python Sets Python Dictionaries Python If...Else Python While Loops Python For Loops Python Functions Python Lambda Python Arrays Python Classes/Objects Python Inheritance Python Iterators Python Scope Python Modules Python Dates Python JSON Python RegEx Python PIP Python Try...Except Python User Input Python String Formatting File Handling Python File Handling Python Read Files Python Write/Create Files Python Delete Files Python MySQL MySQL Get Started MySQL Create Database MySQL Create Table MySQL Insert MySQL Select MySQL Where MySQL Order By MySQL Delete MySQL Drop Table MySQL Update MySQL Limit MySQL Join WebPages Intro WebPages Razor WebPages Layout WebPages Folders WebPages Global WebPages Forms WebPages Objects WebPages Files WebPages Databases WebPages Helpers WebPages WebGrid WebPages Charts WebPages Email WebPages Security WebPages Publish WebPages Examples WebPages Classes ASP.NET Razor Razor Intro Razor Syntax Razor C# Variables Razor C# Loops Razor C# Logic Razor VB Variables Razor VB Loops Razor VB Logic ASP Classic ASP Intro ASP Syntax ASP Variables ASP Procedures ASP Conditionals ASP Looping ASP Forms ASP Cookies ASP Session ASP Application ASP #include ASP Global.asa ASP AJAX ASP e-mail ASP Examples ASP Reference ASP VB Functions ASP VB Keywords ASP Response ASP Request ASP Application ASP Session ASP Server ASP Error ASP FileSystem ASP TextStream ASP Drive ASP File ASP Folder ASP Dictionary ASP AdRotator ASP BrowserCap ASP Content Linking ASP Content Rotator ASP Quick Ref ADO Intro ADO Connect ADO Recordset ADO Display ADO Query ADO Sort ADO Add ADO Update ADO Delete ADO Demo ADO Speed Up ADO Objects ADO Command ADO Connection ADO Error ADO Field ADO Parameter ADO Property ADO Record ADO Recordset ADO Stream ADO DataTypes Java HOME Java Intro Java Get Started Java Syntax Java Comments Java Variables Java Data Types Java Type Casting Java Operators Java Strings Java Math Java Booleans Java If...Else Java Switch Java While Loop Java For Loop Java Break/Continue Java Arrays Java Methods Java Methods Java Method Parameters Java Method Overloading Java Classes Java OOP Java Classes/Objects Java Class Attributes Java Class Methods Java Constructors Java Modifiers Java Encapsulation Java Packages / API Java Inheritance Java Polymorphism Java Inner Classes Java Abstraction Java Interface Java Enums Java User Input Java Date Java ArrayList Java HashMap Java Wrapper Classes Java Exceptions Java File Handling Java Files Java Create/Write Files Java Read Files Java Delete Files C# HOME C# Intro C# Get Started C# Syntax C# Comments C# Variables C# Data Types C# Type Casting C# User Input C# Operators C# Math C# Strings C# Booleans C# If...Else C# Switch C# While Loop C# For Loop C# Break/Continue C# Arrays C# Methods C# Methods C# Method Parameters C# Method Overloading C# Classes C# OOP C# Classes/Objects C# Class Members C# Constructors C# Access Modifiers C# Properties C# Inheritance C# Polymorphism C# Abstraction C# Interface C# Enums C# Files C# Exceptions
  • Database Server & Language

  • SQL PL/SQL MongoDB
    SQL HOME SQL Intro SQL Syntax SQL Select SQL Select Distinct SQL Where SQL And, Or, Not SQL Order By SQL Insert Into SQL Null Values SQL Update SQL Delete SQL Select Top SQL Min and Max SQL Count, Avg, Sum SQL Like SQL Wildcards SQL In SQL Between SQL Aliases SQL Joins SQL Inner Join SQL Left Join SQL Right Join SQL Full Join SQL Self Join SQL Union SQL Group By SQL Having SQL Exists SQL Any, All SQL Select Into SQL Insert Into Select SQL Case SQL Null Functions SQL Stored Procedures SQL Comments SQL Database SQL Create DB SQL Drop DB SQL Backup DB SQL Create Table SQL Drop Table SQL Alter Table SQL Constraints SQL Not Null SQL Unique SQL Primary Key SQL Foreign Key SQL Check SQL Default SQL Index SQL Auto Increment SQL Dates SQL Views SQL Injection SQL Hosting Part I: Programming in PL/SQL  Introduction to PL/SQL  What Is PL/SQL?  The Origins of PL/SQL  About PL/SQL Versions  Resources for PL/SQL Developers 19. Creating and Running PL/SQL Code  SQL*Plus  Performing Essential PL/SQL Tasks  Calling PL/SQL from Other Languages  Language Fundamentals  PL/SQL Block Structure  The PL/SQL Character Set  Identifiers  Literals  The Semicolon Delimiter  Comments  The PRAGMA Keyword  Labels Part II: PL/SQL Program Structure  Conditional and Sequential Control  IF Statements  CASE Statements and Expressions  The GOTO Statement  The NULL Statement  Iterative Processing with Loops 20. Loop Basics  The Simple Loop  The WHILE Loop  The Numeric FOR Loop  The Cursor FOR Loop  Loop Labels  Tips for Iterative Processing 21. Exception Handlers  Exception-Handling Concepts and Terminology  Defining Exceptions  Raising Exceptions  Handling Exceptions  Building an Effective Error Management Architecture  Making the Most of PL/SQL Error Management Part III: PL/SQL Program Data  Working with Program Data  Naming Your Program Data  Overview of PL/SQL Datatypes  Declaring Program Data  Programmer-Defined Subtypes  Conversion Between Datatypes 22. Strings  String Datatypes  Working with Strings  String Function Quick Reference 23. Numbers  Numeric Datatypes  Number Conversions  Numeric Functions 24. Records  Records in PL/SQL 25. Collections  Collections Overview  Collection Methods (Built-Ins)  Working with Collections  Nested Table Multiset Operations  Maintaining Schema-Level Collections 26. Miscellaneous Datatypes  The BOOLEAN Datatype  The RAW Datatype  The UROWID and ROWID Datatypes  The LOB Datatypes  Working with LOBs  Predefined Object Types Part IV: SQL in PL/SQL  DML and Transaction Management  DML in PL/SQL  Bulk DML with the FORALL Statement  Transaction Management  Autonomous Transactions 27. Data Retrieval  Cursor Basics  Working with Implicit Cursors  Working with Explicit Cursors  BULK COLLECT  SELECT ... FOR UPDATE  Cursor Variables and REF CURSORs  Cursor Expressions 28. Procedures, Functions, and Parameters  Procedures  Functions  Parameters  Local Modules  Module Overloading  Forward Declarations  Advanced Topics  Go Forth and Modularize! 29. Packages  Why Packages?  Rules for Building Packages  Rules for Calling Packaged Elements  Working with Package Data  When to Use Packages  Packages and Object Types 30. Triggers  DML Triggers  DDL Triggers  Database Event Triggers  INSTEAD OF Triggers  AFTER SUSPEND Triggers  Maintaining Triggers 31. Managing PL/SQL Code  Managing Code in the Database  Using Native Compilation  Using the Optimizing Compiler and Compile-Time Warnings  Conditional Compilation  Testing PL/SQL Programs  Debugging PL/SQL Programs  Tuning PL/SQL Programs  Protecting Stored Code 32. I/O and PL/SQL  Displaying Information  Reading and Writing Files  Sending Email  Working with Web-Based Data (HTTP)  Other Types of I/O Available in PL/SQL What Is MongoDB? Installation and Configuration MongoDB Advantages MongoDB Data Modelling MongoDB Tools, Collection and Documents CRUD and the MongoDB Shell Introduction to CRUD Introduction to the MongoDB API Creating a Database, Collection and Documents Data Modelling and Schema Design MongoDB Database References Model Tree Structures MongoDB Analysing Queries MongoDB Atomic Operations MongoDB Map Reduce MongoDB Text Search MongoDB Regular Expression MongoDB Capped Collections Administration MongoDB Deployment and Cluster setup MongoDB GridFS Trident Spout Working with Replica Sets MongoDB Sharding MongoDB Create Backup Indexing Indexing and Aggregation Indexing, query profiling and the query optimizer GeoSpatial Indexes Index types, Index Properties MongoDB Advanced Indexing MongoDB Indexing Limitations Aggregation Introduction
  • With Framework

    Introduction to PHP Framework Introduction to Laravel Laravel Installation Routing in Laravel MVC in Laravel Caching in Laravel Event subscribers in Laravel Package Development Templates Creating an Application Testing in Laravel Database Configuration Helpers in Laravel Laravel Pagination Laravel Security Authentication Facade Validation in Laravel Eloquent ORM Artisan Command Line Interface Deploy Application using Laravel Introduction to HTML Introduction to XML Introduction to J2EE Server Programming JSP Technology Java Database Connectivity (JDBC) Enterprise Java Beans (EJB) Javamail API Annotations in Java Frameworks in Java Model View Controlller Struts Framework Spring Framework Hibernate Framework Introduction to PHP Framework Introduction to CodeIgniter CodeIgniter Installation Understanding CodeIgniter MVC Creating a Controller in CodeIgniter Creating a Model in CodeIgniter Creating a View in CodeIgniter CodeIgniter Pagination CodeIgniter Routing CodeIgniter Forms setup CodeIgniter Helpers Code Igniter Integrated File Upload Image resizing in CodeIgniter Database Configuration Active record in CodeIgniter Mailing List Creation Shopping cartSetup Working with Smarty Introduction to HTML Introduction to XML Introduction to J2EE Server Programming JSP Technology Java Database Connectivity (JDBC) Enterprise Java Beans (EJB) Javamail API Annotations in Java Frameworks in Java Model View Controlller Struts Framework Spring Framework Hibernate Framework

    Introduction to Ethical Hacking Footprinting and Reconnaissance System Hacking Malware Threats Scanning Networks Enumeration Denial of Service Session Hijacking Sniffing Social Engineering Hacking Web servers Hacking Web Applications Hacking Mobile Platforms Evading IDS, Firewalls, and Honeypots SQL Injection Hacking Wireless Networks Cloud Computing Cryptography

  • AWS
    After the completion of this course, attendees will be able to; • Build and manage applications in AWS. • Formulate solution plans and provide guidance on architectural best practices • Design and deploy scalable, highly available, and fault tolerant systems on AWS • Identify the lift and shift of an existing on-premises application to AWS • Decipher the ingress and egress of data to and from AWS o Select the appropriate AWS service based on data, compute, database, or security requirements o Identify appropriate use of AWS architectural best practices o Estimate AWS costs and identifying cost control mechanisms Pre-Requisites for the course Basic understanding of server’s and IP networks Introduction to AWS • Setting up of AWS account • AWS free tier- Limits and usages • Introduction to AWS Management Console Elastic compute cloud Essentials • Regions and availability zones • Amazon Machine Images • Pricing Model in EC2 Instances • Deciding between on-demand instances, spot instances, reserved instances, scheduled instances& dedicated Hosts. • EC2 Reserved instances Market Place EC2 Instances • Building EC2 windows & Linux Instances • Working with Security Groups • Assigning Elastic IP’s • Creating your own AMI • Placement Groups Elastic Block Store (EBS) • Creating and deleting Volumes • Attaching and detaching volumes and increasing the volume size • Mounting and un-mounting the attached volume • Creating snapshots Elastic Load Balancer • Creating a Load Balancer • Internal and External Load Balancer • Security groups for the load Balancer • Configure health check for the Load Balancer • Adding multiple instance for the Load Balancer • Cross zone Load Balancing • Connection Draining Auto Scaling • What is Auto Scaling • Auto Scaling components • Creation of Launch Configuration • Configuration of Auto scaling policies based on the Load on EC2 Instance • Advantages of Auto Scaling with Elastic Load Balancer (ELB) Simple Storage Service (S3) • Creating and deleting buckets • Adding objects into buckets • Getting objects and deleting objects • Creation of Static website using S3 Storage • Working with permissions of S3 • Life-cycles in S3 Chatter API • What is Chatter API? • Introduction to Chatter with API • Introduction to Chatter with REST API? • What are the Chatter REST API Resources? • Example of Chatter API. Glacier Storage • Creating Vaults • Accessing the Glacier Vault using tools • Using Glacier for backups • Retrieval period Identity and Access Management Creation of User accounts in AWS • Setting up Multi factor Authentication • Roles in IAM • Groups in IAM • Delegation of permission for users • Creation of custom polices for delegation IVirtual Private Cloud (VPC) • Creating a New VPC • Subnets & Route Tables • ACL & Security Groups • Creation of Internet Gateway • Connecting to instances in the gateway • VPN & Direct Connect Amazon Route53 Hosted Zones • Records • Failover using Route53 • Algorithms Rational Database Service (RDS) • Discussion on types of Databases available in AWS • Creating Database Engine • Redshift • Multi-AZ configuration • Setting up automatic backup’s Cloud Watch • Monitoring the AWS Service Health Dashboard • Debugging Cloud related issues • Getting Statistics for specific EC2 Instance • Setting up notifications Cloud Watch • Monitoring the AWS Service Health Dashboard • Debugging Cloud related issues • Getting Statistics for specific EC2 Instance • Setting up notifications Simple Notification Service • Creation of topic • Subscribing to topic via email • Setting notification for EC2 instance changes Simple Queue Service • Creation of Queue • Sending messages to the queue • Setting SNS to SQS • Retrieving messages from SQS Simple Email Service • Setting up email domain • Limits of SES • Test Email Setup Cloud Formation • Building AWS infrastructure as a code • Utilization of sample templates • Introduction to Json
  • Android

    Introduction to Android Android Architecture Development Tools · JRE · Eclipse · SDK Creating an Android Application Deploying an Android application File Examination Activities · Life Cycle of an Activity · Creating a Shell Activity · Communication Between Activities Introduction to GUI Programming · Layouts · Adapters · Dialogs · Fragments · Action Bar · Notifications XML-based GUI Programming Android on Linux Windows CLI and Android Emulator Multimedia Programming Using Intents and Phone Dialer Lists, Menus and Other Views Developing a Custom Web Browser Testing and Debugging Android Application Sensors and Deployment Using the GPS Functionality Using Google API SQLite Database Interaction File Management Serialization Preferences Android Real Device Experience Mobile Device Security App Store and Google Play
  • CCNA

  • CCNA
    1.0 Network Fundamentals 1.1. Compare and contrast OSI and TCP/IP models 1.2. Compare and contrast TCP and UDP protocols 1.3. Describe the impact of infrastructure components in an enterprise network 1.3.1. Firewalls 1.3.2. Access points 1.3.3. Wireless controllers 1.4. Describe the effects of cloud resources on enterprise network architecture 1.4.1. Traffic path to internal and external cloud services 1.4.2. Virtual services 1.4.3. Basic virtual network infrastructure 1.5. Compare and contrast collapsed core and three-tier architectures 1.6. Compare and contrast network topologies 1.6.1. Star 1.6.2. Mesh 1.6.3. Hybrid 1.7. Select the appropriate cabling type based on implementation requirements 1.8. Apply troubleshooting methodologies to resolve problems 1.8.1. Perform and document fault isolation 1.8.2. Resolve or escalate 1.8.3. Verify and monitor resolution 1.9. Configure, verify, and troubleshoot IPv4 addressing and subnetting 1.10. Compare and contrast IPv4 address types 1.10.1. Unicast 1.10.2. Broadcast 1.10.3. Multicast 1.11. Describe the need for private IPv4 addressing 1.12. Identify the appropriate IPv6 addressing scheme to satisfy addressing requirements in a LAN/WAN environment 1.13. Configure, verify, and troubleshoot IPv6 addressing 1.14. Configure and verify IPv6 Stateless Address Auto Configuration 1.15. Compare and contrast IPv6 address types 1.15.1. Global unicast 1.15.2. Unique local 1.15.3. Link local 1.15.4. Multicast 1.15.5. Modified EUI 64 1.15.6. Autoconfiguration 1.15.7. Anycast 2.0 LAN Switching Technologies 2.1. Describe and verify switching concepts 2.1.1. MAC learning and aging 2.1.2. Frame switching 2.1.3. Frame flooding 2.1.4. MAC address table 2.2. Interpret Ethernet frame format 2.3. Troubleshoot interface and cable issues (collisions, errors, duplex, speed) 2.4. Configure, verify, and troubleshoot VLANs (normal/extended range) spanning multiple switches 2.4.1. Access ports (data and voice) 2.4.2. Default VLAN 2.5. Configure, verify, and troubleshoot interswitch connectivity 2.5.1. Trunk ports 2.5.2. Add and remove VLANs on a trunk 2.5.3. DTP, VTP (v1&v2), and 802.1Q 2.5.4. Native VLAN 2.6. Configure, verify, and troubleshoot STP protocols 2.6.1. STP mode (PVST+ and RPVST+) 2.6.2. STP root bridge selection 2.7. Configure, verify and troubleshoot STP related optional features 2.7.1. PortFast 2.7.2. BPDU guard 2.8. Configure and verify Layer 2 protocols 2.8.1. Cisco Discovery Protocol 2.8.2. LLDP 2.9. Configure, verify, and troubleshoot (Layer 2/Layer 3) EtherChannel 2.9.1. Static 2.9.2. PAGP 2.9.3. LACP 2.10. Describe the benefits of switch stacking and chassis aggregation 3.0 Routing Technologies 3.1. Describe the routing concepts 3.1.1. Packet handling along the path through a network 3.1.2. Forwarding decision based on route lookup 3.1.3. Frame rewrite 3.2. Interpret the components of a routing table 3.2.1. Prefix 3.2.2. Network mask 3.2.3. Next hop 3.2.4. Routing protocol code 3.2.5. Administrative distance 3.2.6. Metric 3.2.7. Gateway of last resort 3.3. Describe how a routing table is populated by different routing information sources 3.3.1. Admin distance 3.4. Configure, verify, and troubleshoot inter-VLAN routing 3.4.1. Router on a stick 3.4.2. SVI 3.5. Compare and contrast static routing and dynamic routing 3.6. Compare and contrast distance vector and link state routing protocols 3.7. Compare and contrast interior and exterior routing protocols 3.8. Configure, verify, and troubleshoot IPv4 and IPv6 static routing 3.8.1. Default route 3.8.2. Network route 3.8.3. Host route 3.8.4. Floating static 3.9. Configure, verify, and troubleshoot single area and multi-area OSPFv2 for IPv4 (excluding authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs) 3.10. Configure, verify, and troubleshoot single area and multi-area OSPFv3 for IPv6 (excluding authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs) 3.11. Configure, verify, and troubleshoot EIGRP for IPv4 (excluding authentication, filtering, manual summarization, redistribution, stub) 3.12. Configure, verify, and troubleshoot EIGRP for IPv6 (excluding authentication, filtering, manual summarization, redistribution, stub) 3.13. Configure, verify, and troubleshoot RIPv2 for IPv4 (excluding authentication, filtering, manual summarization, redistribution) 3.14. Troubleshoot basic Layer 3 end-to-end connectivity issues 4.0 WAN Technologies 4.1. Configure and verify PPP and MLPPP on WAN interfaces using local Authentication 4.2. Configure, verify, and troubleshoot PPPoE client-side interfaces using local Authentication 4.3. Configure, verify, and troubleshoot GRE tunnel connectivity 4.4. Describe WAN topology options 4.4.1. Point-to-point 4.4.2. Hub and spoke 4.4.3. Full mesh 4.4.4. Single vs dual-homed 4.5. Describe WAN access connectivity options 4.5.1. MPLS 4.5.2. Metro Ethernet 4.5.3. Broadband PPPoE 4.5.4. Internet VPN (DMVPN, site-to-site VPN, client VPN) 4.6. Configure and verify single-homed branch connectivity using eBGP IPv4 (limited to peering and route advertisement using Network command only) 4.7. Describe basic QoS concepts 4.7.1. Marking 4.7.2. Device trust 4.7.3. Prioritization Voice Video Data 4.7.4. Shaping 4.7.5. Policing 4.7.6. Congestion management 5.0 Infrastructure Services 5.1. Describe DNS lookup operation 5.2. Troubleshoot client connectivity issues involving DNS 5.3. Configure and verify DHCP on a router (excluding static reservations) 5.3.1. Server 5.3.2. Relay 5.3.3. Client 5.3.4. TFTP, DNS, and gateway options 5.4. Troubleshoot client- and router-based DHCP connectivity issues 5.5. Configure, verify, and troubleshoot basic HSRP 5.5.1. Priority 5.5.2. Preemption 5.5.3. Version 5.6. Configure, verify, and troubleshoot inside source NAT 5.6.1. Static 5.6.2. Pool 5.6.3. PAT 5.7. Configure and verify NTP operating in a client/server mode 6.0 Infrastructure Security 6.1. Configure, verify, and troubleshoot port security 6.1.1. Static 6.1.2. Dynamic 6.1.3. Sticky 6.1.4. Max MAC addresses 6.1.5. Violation actions 6.1.6. Err-disable recovery 6.2. Describe common access layer threat mitigation techniques 6.2.1. 802.1x 6.2.2. DHCP snooping 6.2.3. Nondefault native VLAN 6.3. Configure, verify, and troubleshoot IPv4 and IPv6 access list for traffic filtering 6.3.1. Standard 6.3.2. Extended 6.3.3. Named 6.4. Verify ACLs using the APIC-EM Path Trace ACL Analysis tool 6.5. Configure, verify, and troubleshoot basic device hardening 6.5.1. Local authentication 6.5.2. Secure password 6.5.3. Access to device Source address Telnet/SSH 6.5.4. Login banner 6.5.5. Describe device security using AAA with TACACS+ and RADIUS 7.0 Infrastructure Management 7.1. Configure and verify device-monitoring protocols 7.1.1. SNMPv2 7.1.2. SNMPv3 7.1.3. Syslog 7.2. Troubleshoot network connectivity issues using ICMP echo-based IP SLA 7.3. Configure and verify device management 7.3.1. Backup and restore device configuration 7.3.2. Using Cisco Discovery Protocol or LLDP for device discovery 7.3.3. Licensing 7.3.4. Logging 7.3.5. Timezone 7.3.6. Loopback 7.4. Configure and verify initial device configuration 7.5. Perform device maintenance 7.5.1. Cisco IOS upgrades and recovery (SCP, FTP, TFTP, and MD5 verify) 7.5.2. Password recovery and configuration register 7.5.3. File system management 7.6. Use Cisco IOS tools to troubleshoot and resolve problems 7.6.1. Ping and traceroute with extended option 7.6.2. Terminal monitor 7.6.3. Log events 7.6.4. Local SPAN 7.7. Describe network programmability in enterprise network architecture 7.7.1. Function of a controller 7.7.2. Separation of control plane and data plane 7.7.3. Northbound and southbound APIs

    Basic Digital Marketing Course Social Media Optimization BENEFITS of Social Media Marketing Advanced Digital Marketing Course Search Engine Optimization future Scope Webmaster Tool. Social Media Marketing Google Adwords (PPC) Google Analytics training Affiliate Marketing course E-mail Marketing Campaign trainings Mobile Marketing Learning Online Marketing Strategy E-commerce Marketing Infographics Content Marketing App Store Optimization Certified Digital Marketing Course Syllabus Principles of Internet Marketing Website Development Search Engine Optimization (SEO) Google Adsense and Affiliate Marketing Search Engine Marketing (SEM) Social Media Optimization Email Marketing Online Reputation Management Google Analytics In-depth Professional SEO Expert coaching Keyword Research and Analysis Search Engine Optimization Training for the wordpress website to gain top ranking in google, yahoo, and bing search engines Dynamic Optimization of the website Clear Basics of SEO friendly website design Website architecture analysis Search Engine Submissions Google Algorithms – Panda and Penguin Directory Submissions on The Web Learn SEO training with Advanced Link Building and concept of Link Popularity to gain more DA/PA authority Posting on Forums, Blogs, Guestbooks and Free Classifieds Competitor Analysis LSI (Latent Semantic Indexing) Google Sandbox Effect Search Engine Spam Webmaster and Google Analytics Best advanced 2017 SEM PPC Training for Optimizing For Google, Yahoo, and Bing by experienced trainers Social Media Marketing Course Social networking, and social media marketing defined Blogging and microblogging Social networking Facebook marketing classes Video sharing Social shopping and opinions Social events and Wikis Coaching for Tech Support PPC with Approved Ad copy and guide Social news and social bookmarking Digital marketing training institute with placement assurances with handsome salary package. Google+ Marketing Twitter Marketing LinkedIn Marketing Video Marketing Blogging ORM coaching

Our Skills

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Graphic Design








Why People like us?

Adipisicing elit

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore

Anim pariatur cliche reprehenderit, enim eiusmod high life accusamus terry richardson ad squid. 3 wolf moon officia aute, non cupidatat skateboard dolor brunch. Food truck quinoa nesciunt laborum eiusmod. Brunch 3 wolf moon tempor.
Anim pariatur cliche reprehenderit, enim eiusmod high life accusamus terry richardson ad squid. 3 wolf moon officia aute, non cupidatat skateboard dolor brunch. Food truck quinoa nesciunt laborum eiusmod. Brunch 3 wolf moon tempor.
Anim pariatur cliche reprehenderit, enim eiusmod high life accusamus terry richardson ad squid. 3 wolf moon officia aute, non cupidatat skateboard dolor brunch. Food truck quinoa nesciunt laborum eiusmod. Brunch 3 wolf moon tempor.


ITDESK Assure It's Students To Provide The Best Quality Training And To Make Them Industry Ready.


IT DESK has new developed and updated courseware and exercise books, that are provided to every students. These books have ease to learn approach.



Key Chain



Tutorial DVD

Referral Coupon

Kit Folder





Our Partners