Click any of the above phases to find out more. Or click here to jump straight to the section on fees.
PM Session
(2pm – 7pm+)
Join us on campus as we get hands on with real-life networking and server equipment.
Explaining the OSI Model and TCP/IP Models
Explain OSI Model Layers
Explain the TCP/IP Suite
Explaining Properties of Network Traffic
Explain Media Types and Access Methods
Deploy Ethernet Standards
Configure and Monitor Network Interfaces
Installing and Configuring Switched Networks
Install and Configure Hubs and Bridges
Install and Configure Switches
Compare and Contrast Network Topologies
Compare and Contrast Network Types
Configuring IP Networks
Configure IPv4 Addressing Components
Test IP Interfaces with Command Line Utilities
Configure IPv4 Addressing Components
Configure Private and Public IPv4 Addressing Schemes
Configure IPv6 Addressing Components
Configure DHCP Services
Installing and Configuring Routed Networks
Explain Characteristics of Routing
Install and Configure Routers
Configuring and Monitoring Ports and Protocols
Explain the Uses of Ports and Protocols
Use Port Scanners and Protocol Analyzers
Explain the Use of Name Resolution Services
Configure DNS and IPAM Services
Explaining Network Applications and Storage Services
Explain the Uses of Network Applications
Explain the Uses of Voice Services and Advanced Networking Devices
Explain the Uses of Virtualization and Network Storage Services
Summarize the Concepts of Cloud Services
Monitoring and Troubleshooting Networks
Monitor Network Interfaces and Logs
Explain Network Troubleshooting Methodology
Troubleshoot Common Network Services Issues
Explaining Networking Attacks and Mitigations
Summarize Common Networking Attacks
Explain the Characteristics of VLANs
Explain the Characteristics of NAT and Port Forwarding
Installing and Configuring Security Devices
Install and Configure Firewalls and Proxies
Explain the Uses of IDS/IPS and UTM
Explaining Authentication and Access Controls
Explain Authentication Controls and Attacks
Explain the Uses of Authentication Protocols and Directory Services
Explain the Uses of Port Security and NAC
Implement Network Device Hardening
Explain Patch Management and Vulnerability Scanning Processes
Deploying and Troubleshooting Cabling Solutions
Deploy Structured Cabling Systems
Deploy Twisted-pair Cabling Solutions
Test and Troubleshoot Twisted-pair Cabling Solutions
Deploy Coax and Fiber Optic Cabling Solutions
Implementing and Troubleshooting Wireless Technologies
Install and Configure Wireless Technologies
Troubleshoot Wireless Performance Issues
Secure and Troubleshoot Wireless Connectivity
Comparing and Contrasting WAN Technologies
Compare and Contrast WAN Core Service Types
Compare and Contrast WAN Subscriber Service Types
Compare and Contrast WAN Framing Service Types
Compare and Contrast Wireless and IoT WAN Technologies
Using Remote Access Methods
Use Remote Access VPNs
Use Remote Access Management and File Transfer Methods
Identifying Site Policies and Best Practices
Manage Networks with Documentation and Diagrams
Summarize the Purposes of Physical Security Devices
Compare and Contrast Business Continuity and Disaster Recovery Concepts
Identify Policies and Best Practices
Lesson Managing Server Hardware
Server Components
Server Power
Server Cooling
Asset Management
Lesson Installing a Server
Prepare an Installation Plan
Prepare the Server Hardware
Set Up the Server Hardware
Install an Operating System
Lesson Configuring Network: Manage Network Cabling
Configure Network Interface Cards
Implement IP Addressing and Network
Infrastructure Services
Lesson Creating a Virtual Environment
Create Virtual Servers
Create Virtual Switches
Lesson Performing Basic Server Configuration
Configure Local Server Properties
Configure Server Roles
Set Up IP Addressing Service Roles
Lesson Administering the Server
Update the Server
Server Administration Access and Control
Methods
Create Service Level Agreements
Monitor Server Performance
Lesson Implementing Storage Solutions
Perform Capacity Planning
Deploy Primary Storage Devices
Storage Technologies
Configure RAID
Lesson Securing the Server
Configure Firewalls
Configure Security Protocols
Implement Intrusion Detection Systems
Implement Logical Access Control Methods
Implement Data Security Methods
Apply Server Hardening Techniques
Implement Physical Security
Create Virtual Networks
Lesson Planning and Testing Disaster Recovery
Implement Environmental Controls
Manage Documentation for the
Server and the Network
Create A Disaster Recovery Plan
Perform Backup and Restoration
Lesson Troubleshooting Server Issues
Troubleshoot Theory and Methods
Troubleshoot Hardware Issues
Troubleshoot Software Issues
Troubleshoot Networking Issues
Troubleshoot Storage Issues
Troubleshoot Security Issues
Preparing to Deploy Cloud Solutions
Describe Interaction of Cloud Components
and Services
Describe Interaction of
Non-cloud Components and Services
Evaluate Existing Components and Services
for Cloud Deployment
Evaluate Automation
and Orchestration Options
Prepare for Cloud Deployment
Deploying a Pilot Project
Manage Change in a Pilot Project
Execute Cloud Deployment Workflow
Complete Post-Deployment Configuration
Testing Pilot Project Deployments
Identify Cloud Service Components for Testing
Test for High Availability and
Accessibility
Perform Deployment Load Testing
Analyze Test Results
Designing a Secure and Compliant Cloud
Infrastructure
Design Cloud Infrastructure for Security
Determine Organizational Compliance Needs
Designing and Implementing a Secure Cloud
Environment
Design Virtual Network for Cloud Deployment
Determine Network Access Requirements
Secure Networks for Cloud Interaction
Manage Cloud Component Security
Implement Security Technologies
Planning Identity and Access Management
for Cloud Deployments
Determine Identity Management and
Authentication Technologies
Plan Account Management Policies for the
Network and Systems
Control Access to Cloud Objects
Provision Accounts
Determining CPU and Memory Sizing for
Cloud Deployments
Determine CPU Size for Cloud Deployment
Determine Memory Size for Cloud
Deployment
Determining Storage Requirements for
Cloud Deployments
Determine Storage Technology Requirements
Select Storage Options for Deployment
Determine Storage Access and Provisioning
Requirements
Determine Storage Security Options
Analyzing Workload Characteristics to
Ensure Successful Migration
Determine the Type of Cloud Deployment to
Perform
Manage Virtual Machine and Container
Migration
Manage Network, Storage, and Data Migration
Maintaining Cloud Systems
Patch Cloud Systems
Design and Implement Automation and
Orchestration for Maintenance
Implementing Backup, Restore, Disaster
Recovery, and Business Continuity Measures
Back Up and Restore Cloud Data
Implement Disaster Recovery Plans
Implement Business Continuity Plans
Analyzing Cloud Systems for Performance
Monitor Cloud Systems to Measure Performance
Optimize Cloud Systems to Meet Performance
Criteria
Analyzing Cloud Systems for Anomalies
and Growth Forecasting
Monitor for Anomalies and Resource Needs
Plan for Capacity
Create Reports on Cloud System Metrics
Troubleshooting Deployment, Capacity,
Automation, and Orchestration Issues
Troubleshoot Deployment Issues
Troubleshoot Capacity Issues
Troubleshoot Automation and Orchestration
Issues
Troubleshooting Connectivity Issues
Identify Connectivity Issues
Troubleshoot Connectivity Issues
Troubleshooting Security Issues
Troubleshoot Identity and Access Issues
Troubleshoot Attacks
Troubleshoot Other Security Issues
Brief Outline of Topics Covered
How tech-staff are interviewed
What to expect when getting hired
Making sure your CV meets expectations
Typical tech-staff work weeks
Handling stressful situations
Communicating with non-tech workers
Career-progression in tech and what to expect
Finding and landing new opportunities
interview and job-selection related topics are handled through our partners who are job placements experts.
career related topics are led by our panel of professionals who are in the tech industry and will be able to share from their own first-hand experience.Â
we also design our practical assessments around real-life scenarios. at advanced stages you will also need to complete the same task with real life limitations of time, resources and surprise factors.
This is a training course. But at the same time it is 100% focused on securing you a tech-role in networking and cloud. From the first day that you set foot on campus, you and us will have a singular objective – gainful employment.Â
For ideal candidates, you should have employment offers by the last month of the course so there is no gap between course and work.
after each interview that you attend you will receive a report on how you performed.
LOANS AVAILABLE: