Home | Courses | Alma | Master Diploma Courses | Master Diploma In Computer Ethical Hacker & Server Administrator

Master Diploma In Computer Ethical Hacker & Server Administrator

By
Font size: Decrease font Enlarge font

COURSE CODE : MS-04

ELIGIBILITY : 12th 

DURATION : 1 Year

SYLLABUS

 

 

Basic of Networking

 

  • An Introduction to Networking , Networking Standards and the OSI Model , Transmission Basics and Networking Media , Introduction to TCP/IP Protocols , Topologies and Ethernet Standards , Network Hardware , WANs and Remote Connectivity , Wireless Networking ,Network Operating Systems , In-Depth TCP/IP Networking , Voice and Video Over IP ,Network Security , Troubleshooting Network Problems , Ensuring Integrity and Availability ,Network Management .

 

Server Administrator

 

Application components

  • Know what operations can be performed with each client tool (Repository Manager, Designer, Workflow Manager, Workflow Monitor).
  • Know the purpose and uses for each of the windows in the client tools (Output window, Details window, Navigator window, Task View, Gantt Chart View, etc).
  • Be able to specify which components are necessary to perform various development and maintenance operations.

Nomenclature

  • Be able to define all object types and properties used by the client and server tools.
  • Be familiar with the properties of the Repository server and the Informatics server.
  • Know the meaning of the terms used to describe development and maintenance operations.
  • Know how to work with server variables.
  • Understand the relationships between all Power Center object types.
  • Know which tools are used to create and modify all objects.

 

Repository server

 

  • Know how each client and server component communicates with relational databases.
  • Be familiar with the connectivity options that are available for the different tools.
  • Know the requirements for using various types of ODBC drivers with the client tools.
  • Know the meaning of all database connection properties.
  • Be familiar with the sequence of events involving starting the Repository server.
  • Know which repository operations can be preformed from the command line.

Installation

 

  • Understand the basic procedure for installing the client and server software.
  • Know what non-Informatics hardware and software is required for installation.
  • Be familiar with network related requirements and limitations.
  •  Know which components are needed to perform a repository upgrade.
  •  Be familiar with the data movement mode options.      

 

 

Security

 

  • Be familiar with the security permissions for application users.
  • Be familiar with the meaning of the various user types for an Informatics system.
  • Know the basic steps for creating and configuring application users.
  • Understand how user security affects folder operations.
  • Know what passwords are needed to install new client software.

Object sharing

 

  • Understand the differences between copies and shortcuts.
  • Know which object properties are inherited in shortcuts.
  • Know the rules associated with transferring and sharing objects between folders.
  • Know the rules associated with transferring and sharing objects between repositories.

 

Repository organization and migration

 

  • Understand the various options for organizing a repository.
  • Be familiar with how a repository stores information about its own properties.
  • Be familiar with metadata extensions.
  • Know the capabilities and limitations of folders and other repository objects.
  • Know what type of information is stored in the repository.

 

Designing Security for Microsoft Networks

 

Introduction to Designing Security :-- Introduction to Designing Security for Microsoft Networks Creating a Plan for Network Security  :-- Introduction to Security Policies , Defining a Process for Designing Network Security , Creating a Security Design Team

Identifying Threats to Network Security :-- Introduction to Security Threats , Predicting Threats to Security

Analyzing Security Risks  :-- Introduction to Risk Management , Creating a Risk Management Plan

Creating a Security Design for Physical Resources  :-- Determining Threats and Analyzing Risks to Physical Resources , Designing Security for Physical Resources

Creating a Security Design for Computers :-- Determining Threats and Analyzing Risks to Computers , Designing Security for Computers

Creating a Security Design for Accounts :-- Determining Threats and Analyzing Risks to Accounts , Designing Security for Accounts

Creating a Security Design for Authentication :-- Determining Threats and Analyzing Risks to Authentication , Designing Security for Authentication

Creating a Security Design for Data :-- Determining Threats and Analyzing Risks to Data , Designing Security for Data

Creating a Security Design for Data Transmission :-- Determining Threats and Analyzing Risks to Data Transmission , Designing Security for Data Transmission

Creating a Security Design for Network Perimeters :-- Determining Threats and Analyzing Risks to Network Perimeters , Designing Security for Network Perimeters

 

The Business & Legal Issues Of Ethical Hacking :-- Introduction to Ethical Hacking , System Hacking , Hacking WebServers , Email Hacking , PART XXIII – Cyber Forensics Basics , The Pre Attack Phases

 

DOWNLOAD SYLLABUS

Editor's Desk

Fundamental Success scripts being true to your word is easy

  Say you’re going to do something and then do it. If you make plans to meet your friend, don’t ditch him for some random date. Likewise, if you commit to go on a date with someone, don’t back out at the last minute for no good reason. If you don’t want to commit, don’t commit. If you’re not sure whether you can, check and see. If circumstances change and you have to adapt or postpone the arrangement, that’s fine too. If someone doesn’t want to make an appointment and then realize he’d rather chill instead. He doesn’t want to give ... Read More

  • Email to a friend Email to a friend
  • Print version Print version