World
Class Instructor
1:1 with
Industry Expert
400+
Global Hiring
55%
Avg. Salary Hike
- Overview
- Course Details
- Syllabus
- FAQ
Acquire Key Infrastructure Skills: Master IT Management, Earn Certification, Launch Your IT Infrastructure Career!
Elysium Certified IT INFRA MANAGER – Training Course offers comprehensive training to equip you with critical IT infrastructure management skills. The course includes 90 hours of CompTIA Hardware A+ and CompTIA Network+ (N10-008) training, along with 90 hours of Elynux Essentials. Our program is designed to ensure you gain the expertise needed for effective IT infrastructure management. Completing these modules provides you with 100% placement assurance, ensuring you are job-ready for a successful career in IT.
Version
Duration
Theory
Practical
Version
2.2
Duration
65 Hours
Theory
12 Hours
Practical
65 Hours
- Real-world IT Infrastructure Projects
- Personalized coordinator.
- Trainer feedback.
- Trainer availability post sessions.
- Get your staff certified.
- Certificate from governing bodies.
- Recognized worldwide
- Hands on assignment
- Master IT infrastructure fundamentals, including network administration, server management, and virtualization.
- Dive into advanced concepts such as cloud computing, IT automation, and disaster recovery.
- Learn to implement efficient and secure IT systems and networks.
- Gain expertise in infrastructure design and performance optimization.
- Understand and apply IT policies, compliance, and best practices.
- Develop practical skills through hands-on labs and real-world project simulations.
Top companies offer this course to their employees
Course was selected for our collection of top-rated courses trusted by businesses worldwide.
Salary
PER ANNUM
₹500,000
Job Growth
Current Month
15%
Offer Jobs
2026
7,000
Our comprehensive Elysium Certified Testing Expert program equips you with essential skills and knowledge for a successful career in software testing. The course includes the ISTQB Manual Tester certification (45 hours), advanced Software Test Expert training in Manual Testing (90 hours), and hands-on experience with Selenium Java and Selenium Python. Additionally, you’ll master Cucumber, Fundamentals, Soap, and Appium in 45 hours. Benefit from our 100% placement assurance upon course completion, ensuring a smooth transition into the industry.
The Certified Testing Expert course teaches you to master the concepts of software testing. Through this training, you will learn Test Planning, Test Case Design, Defect Management, Automation Testing, Performance Testing, and Test Reporting.
- Software Testing is the foundation that ensures the reliability and quality of software products.
- Testing involves comprehensive evaluation of software applications developed by various organizations.
- Test Execution is where the software is meticulously tested, identifying and eliminating defects.
- Certified Testing Experts analyze test results and derive meaningful insights to improve software quality.
- Software Testing is the essential groundwork upon which robust and secure software systems are built.
Our Training Program Benefits
- Live, interactive training by experts.
- Curriculum that focuses on the learner.
- Challenge-based, hands-on project.
- Opportunities for team building.
- Cost- saving training.
- Convenient for your employees.
- Completely tailor-made curriculum.
Chapter-1 Install And Conficure Laptop Hardware
- Battery
- Keyboard/Keys
- Random Access Memory (RAM)
- Hard Disk Drive (HDD)/Solid State Drive (SSD) Migration
- HDD/SSD Replacement
- Wireless Cards
- Biometrics
- Near-Field Scanner Features
- In-Plane Switching (IPS)
- Twisted Nematic (TN)
- Vertical Alignment (VA)
- Mobile Display Components
- WiFi Antenna Connector/Placement
- Camera/Webcam
- Microphone
- Touch Screen/Digitizer
- Inverter
Chapter-2 Conficure Accessories
- Universal Serial Bus (USB)/ USB-C/ microUSB/ miniUSB
- Lightning
- Serial Interfaces
- Near-Field Communication (NFC)
- Bluetooth
- Hotspot
- Touch Pens
- Headsets
- Speakers
- Webcam
- Docking Station
- Port Replicator
- Trackpad/Drawing Pad
Chapter-3 Mobile-Device Network Connectivity
- 2G/3G/4G/5G
- Hotspot
- Global System for Mobile Communications (GSM) vs. Code-Division Multiple Access (CDMA)
- Preferred Roaming List (PRL) Updates
- Global Positioning System (GPS) Services
- Cellular Location Services
- Corporate Email Configuration
- Two-Factor Authentication
- Corporate Applications
- Account Setup
- Microsoft 365
- Google Workspace
- iCloud
- Data to Synchronize
- Photos
- Calendar
- Contacts
- Recognizing Data Caps
Chapter-4 Transmission Control Protocol (Tcp) And User Datagram Protocol (Udp)
- 20/21 - File Transfer Protocol (FTP)
- 22 - Secure Shell (SSH)
- 23 - Telnet
- 25 - Simple Mail Transfer Protocol (SMTP)
- 53 - Domain Name System (DNS)
- 67/68 - Dynamic Host Configuration Protocol (DHCP)
- 80 - Hypertext Transfer Protocol (HTTP)
- 110 - Post Office Protocol 3 (POP3)
- 137/139 - Network Basic Input/Output System (NetBIOS)/ NetBIOS over TCP/IP (NetBT)
- 143 - Internet Mail Access Protocol (IMAP)
- 161/162 - Simple Network Management Protocol (SNMP)
- 389 - Lightweight Directory Access Protocol (LDAP)
- 443 - Hypertext Transfer Protocol Secure (HTTPS)
- 445 - Server Message Block (SMB)/Common Internet File System (CIFS)
- 3389 - Remote Desktop Protocol (RDP)
- Connectionless
- Dynamic Host Configuration Protocol (DHCP)
- Trivial File Transfer Protocol (TFTP)
- Connection-Oriented
- Hypertext Transfer Protocol Secure (HTTPS)
- Secure Shell (SSH)
Chapter-5 Common Networking Hardware
- Routers
- Switches
- Managed
- Unmanaged
- Injectors
- Switch
- PoE Standards
Chapter-6 Contrast Protocols For Wireless Networking
- 2.4GHz
- 5GHz
- Regulations
- 2.4GHz vs. 5GHz
- Overview of Bluetooth
- 802.11a
- 802.11b
- 802.11g
- 802.11n
- 802.11ac (WiFi 5)
- 802.11ax (WiFi 6)
- Licensed
- Unlicensed
- Power
- Regulatory Requirements for Wireless Power
- Near-Field Communication (NFC)
- Overview of RFID
- DNS
- DHCP
- File Share
- Print Servers
- Mail Servers
- Syslog
- Web Servers
- Authentication, Authorization, and Accounting (AAA)
- Spam Gateways
- Unified Threat Management (UTM)
- Load Balancers
- Proxy Servers
- Supervisory Control and Data Acquisition (SCADA)
- Overview of IoT Devices
Chapter-7 Install And Configure ‹So>O)
- IPv4
- Private Addresses
- Public Addresses
- IPv6
- Automatic Private IP Addressing (APIPA)
- Static
- Dynamic
- Gateway
- Address A
- AAAA
- Mail Exchanger (MX)
- Text (TXT)
- Spam Management
- DomainKeys Identified Mail (DKIM)
- Sender Policy Framework (SPF)
- Domain-based Message Authentication, Reporting, and Conformance (DMARC)
- Spam Management
Chapter-8 Internet Connection And Network Types
- Satellite
- Fiber
- Cable
- DSL
- Cellular
- Wireless Internet Service Provider (WISP)
- Local Area Network (LAN)
- Wide Area Network (WAN)
- Personal Area Network (PAN)
- Metropolitan Area Network (MAN)
- Storage Area Network (SAN)
- Wireless Local Area Network (WLAN)
Chapter-9 Networking Tools
- Crimper
- Cable Stripper
- WiFi Analyzer
- Toner Probe
- Punchdown Tool
- Cable Tester
- Loopback Plug
- Network Tap
Chapter-10 Cable Types And Their Connectors
- Copper
- Cat 5
- Cat 5e
- Cat 6
- Cat 6a
- Coaxial
- Shielded Twisted Pair (STP)
- Direct Burial
- Unshielded Twisted Pair (UTP)
- Plenum
- Optical
- Fiber
- T568A/T568B
- USB 2.0
- USB 3.0
- Serial
- Thunderbolt
- High-Definition Multimedia Interface (HDMI)
- DisplayPort
- Digital Visual Interface (DVI)
- Video Graphics Array (VGA)
- Serial Advanced Technology Attachment (SATA)
- Small Computer System Interface (SCSI)
- External SATA (eSATA)
- Integrated Drive Electronics (IDE)
- Overview of Adapters
- RJ11
- RJ45
- F Type
- Straight Tip (ST)
- Subscriber Connector (SC)
- Lucent Connector (LC)
- Punchdown Block
- microUSB
- miniUSB
- USB-C
- Molex
- Lightning Port
- DB9
Chapter-11 Install The Appropriate Ram
- Virtual RAM
- Small Outline Dual Inline Memory Module (SODIMM)
- Double Data Rate 3 (DDR3)
- Double Data Rate 4 (DDR4)
- Double Data Rate 5 (DDR5)
- Error Correction Code (ECC) RAM
- Overview of Single-Channel RAM
- Overview of Dual-Channel RAM
- Overview of Triple-Channel RAM
- Overview of Quad-Channel RAM
Chapter-12 Install Storage Devices
- Speeds
- 5,400 rpm
- 7,200 rpm
- 10,000 rpm
- 15,000 rpm
- Form Factor
- 2.5
- 3.5
- Communications Interfaces
- Non-Volatile Memory Express (NVMe)
- SATA
- Peripheral Component Interconnect Express (PCIe)
- Form Factors
- M.2
- mSATA
- Redundant Array of Independent (or Inexpensive) Disks (RAID) 0, 1, 5, 10
- Flash Drives
- Memory Cards
- Optical Drives
Chapter-13 Configure Motherboards, Central Processing Units (Cpus)
- Advanced Technology eXtended (ATX)
- Information Technology eXtended (ITX)
- Peripheral Component Interconnect (PCI)
- PCI Express (PCIe)
- Power Connectors
- SATA
- eSATA
- Headers
- M.2
- CPU Sockets
- Advanced Micro Devices, Inc. (AMD)
- Intel
- Server
- Multisocket
- Desktop
- Mobile
- Boot Options
- USB Permissions
- Trusted Platform Module (TPM) Security Features
- Fan Considerations
- Secure Boot
- Boot Password
- Trusted Platform Module (TPM)
- Hardware Security Module (HSM)
- x64/x86
- Advanced RISC Machine (ARM)
- Single-Core
- Multicore
- Multithreading
- Virtualization Support
- Sound Card
- Video Card
- Capture Card
- Network Interface Card (NIC)
- Fans
- Heat Sink
- Thermal Paste/Pads
- Liquid
Chapter-14 Power Supply
- Input 110-120 VAC vs. 220-240 VAC
- Output 3.3V vs. 5V vs. 12V
- 20-pin to 24-pin Motherboard Adapter
- Redundant Power Supply
- Modular Power Supply
- Wattage Rating
Chapter-15 Printers And Settings
- Setup Location Considerations
- Printer Control Language (PCL) vs. PostScript
- USB
- Ethernet
- Wireless
- Printer Share
- Print Server
- Duplex
- Orientation
- Tray Settings
- Quality
- User Authentication
- Badging
- Audit Logs
- Secured Prints
- SMB
- Cloud Services
- Overview of ADF (Automatic Document Feeder)
- Flatbed Scanner Features
Chapter-16 Install And Replace Printer Consumables
- Components
- Imaging Drum
- Fuser Assembly
- Transfer Belt
- Transfer Roller
- Pickup Rollers
- Separation Pads
- Duplexing Assembly
- Imaging Process
- Processing
- Charging
- Exposing
- Developing
- Transferring
- Fusing
- Cleaning
- Maintenance
- Replace Toner
- Apply Maintenance Kit
- Calibrate
- Clean
- Components
- Ink Cartridge
- Print Head
- Roller
- Feeder
- Duplexing Assembly
- Carriage Belt
- Calibration
- Maintenance
- Clean Heads
- Replace Cartridges
- Calibrate
- Clear Jams
- Components
- Feed Assembly
- Heating Element
- Special Thermal Paper
- Maintenance
- Replace Paper
- Clean Heating Element
- Remove Debris
- Heat Sensitivity of Paper
- Components
- Print Head
- Ribbon
- Tractor Feed
- Impact Paper
- Maintenance
- Replace Ribbon
- Replace Print Head
- Replace Paper
- Components
- Filament
- Resin
- Print Bed
Chapter-17 Cloud-Computing Concepts
- Private Cloud
- Public Cloud
- Hybrid Cloud
- Community Cloud
- Infrastructure as a Service (IaaS)
- Software as a Service (SaaS)
- Platform as a Service (PaaS)
- Shared Resources
- Metered Utilization
- Rapid Elasticity
- High Availability
- File Synchronization
- Virtual Desktop Infrastructure (VDI) On Premises
- VDI in the Cloud
Chapter-18 Client-Side Virtualization
- Sandbox
- Test Development
- Application Virtualization
- Legacy Software/OS
- Cross-Platform Virtualization
- Overview of Resource Requirements
- Overview of Security Requirements
Chapter-19 Practice Methodology To Resolve Problems
- Identify the Problem
- Gather Information from the User
- Identify User Changes
- Perform Backups Before Making Changes
- Inquire Regarding Environmental or Infrastructure Changes
- If Necessary, Conduct External or Internal Research Based on Symptoms
- Once the Theory is Confirmed, Determine the Next Steps to Resolve the Problem
- If the Theory is Not Confirmed, Re-establish a New Theory or Escalate
- Refer to the Vendor's Instructions for Guidance
- Overview of Verification and Preventive Measures
- Overview of Documentation Process
Chapter-20 Troubleshoot Motherboards, Ram, Cpu, And Power
- Power-On Self-Test (POST) Beeps
- Proprietary Crash Screens (Blue Screen of Death [BSOD]/Pinwheel)
- Black Screen
- No Power
- Sluggish Performance
- Overheating
- Burning Smell
- Intermittent Shutdown
- Application Crashes
- Grinding Noise
- Capacitor Swelling
- Inaccurate System Date/Time
Chapter-21 Diagnose Problems With Storage Drives
- Lines Down the Printed Pages
- Garbled Print
- Toner Not Fusing to Paper
- Paper Jams
- Faded Print
- Incorrect Paper Size
- Paper Not Feeding
- Multipage Misfeed
- Multiple Prints Pending in Queue
- Speckling on Printed Pages
- Double/Echo Images on the Print
- Incorrect Color Settings
- Grinding Noise
- Finishing Issues
- Staple Jams
- Hole Punch
- Incorrect Page Orientation
Chapter-22 Troubleshoot Video, Pro3ector, And Display Issues
- Incorrect Data Source
- Physical Cabling Issues
- Burned-Out Bulb
- Fuzzy Image
- Display Burn-In
- Dead Pixels
- Flashing Screen
- Incorrect Color Display
- Audio Issues
- Dim Image
- Intermittent Projector Shutdown
Chapter-23 Troubleshoot Mobile Devices
- Poor Battery Health
- Swollen Battery
- Broken Screen
- Improper Charging
- Poor/No Connectivity
- Liquid Damage
- Overheating
- Digitizer Issues
- Physically Damaged Ports
- Malware
- Cursor Drift/Touch Calibration
Chapter-24 Troubleshoot And Resolve Printer Issues
- Lines Down the Printed Pages
- Garbled Print
- Toner Not Fusing to Paper
- Paper Jams
- Faded Print
- Incorrect Paper Size
- Paper Not Feeding
- Multipage Misfeed
- Multiple Prints Pending in Queue
- Speckling on Printed Pages
- Double/Echo Images on the Print
- Incorrect Color Settings
- Grinding Noise
- Finishing Issues
- Staple Jams
- Hole Punch
- Incorrect Page Orientation
Chapter-25 Troubleshoot Problems With Wired And Wireless Networks
- Problem understanding: Loan Approval Prediction
-  Read and preprocess data
- Data splitting
- Classification - Naïve Bayes
- Classification – Support Vector Machine
- Classification - Random Forest
- Classification - Logistic Regression
- Train the model
- Evaluate performance metrics
- Problem Understanding : Zomato Restaurant Review
- Read and preprocess data
- NLP
- Data Splitting
- Classification - Naïve Bayes (Multinomial)
- Classification - Support Vector Machine
- Classification - Random Forest
- Classification – Decision Tree
- Classification - Logistic Regression
- Train the model
- Evaluate performance metrics
- Visualization using matplotlib and seaborn
- Problem Understanding : Product Recommendation
- Read and preprocess data
- Collaborative filtering
- Content based filtering
- Recommend the product
- Evaluate metrics
Chapter-26 Network Fundamentals
- Definition and Overview
- Data Networking
- Communication Process
- Overview of OSI Model
- Overview of TCP Model
- Data Encapsulation and Decapsulation within the OSI Model Context
- Ethernet Header
- Internet Protocol (IP) Header
- Transmission Control Protocol (TCP) / User Datagram Protocol (UDP) Headers
- TCP Flags
- Payload
- Maximum Transmission Unit (MTU)
Chapter-27 Network Topologies And Network Types
- Star / Hub-and-Spoke
- Mesh
- Bus
- Ring
- Hybrid
- Peer-to-Peer
- Client-Server
- Local Area Network (LAN)
- Metropolitan Area Network (MAN)
- Wide Area Network (WAN)
- Wireless Local Area Network (WLAN)
- Personal Area Network (PAN)
- Campus Area Network (CAN)
- Storage Area Network (SAN)
- Software-Defined Wide Area Network (SDWAN)
- Multiprotocol Label Switching (MPLS)
- Multipoint Generic Routing Encapsulation (MGRE)
- V-Switch
- Virtual Network Interface Card (VNIC)
- Network Function Virtualization (NFV)
- Hypervisor
- Satellite
- Digital Subscriber Line (DSL)
- Cable
- Leased Line
- Metro-Optical
Chapter-28 Network Topologies And Network Types
- Twisted Pair
- CAT 5
- CAT 5e
- CAT 6
- CAT 6A
- CAT 7
- CAT 8
- Coaxial / RG-6
- Twin Axial
- Termination Standards
- TIA / EIA — 568A
- TIA / EIA — 568B
- Single-Mode
- Multimode
- Local Connector (LC)
- Straight Tip (ST)
- Subscriber Connector (SC)
- Mechanical Transfer (MT)
- Registered Jack (RJ)
- Angled Physical Contact (APC)
- Ultra-Physical Contact (UPC)
- 100 BASE-FX
- 100 BASE-SX
- 1000 BASE-SX
- 1000 BASE-LX
- 10 GBASE-SR
- 10 GBASE-LR
- Coarse Wavelength Division Multiplexing (CWDM)
- Dense Wavelength Division Multiplexing (DWDM)
- Bidirectional Wavelength Division Multiplexing (WDM)
Chapter-29 Configure A Subnet And Use Appropriate Ip Addressing Schemes
- TFC1918
- Network Address Translation (NAT)
- Port Address Translation (PAT)
- Automatic Private IP Addressing (APIPA)
- Extended Unique Identifier (EUI-64)
- Multicast
- Unicast
- Anycast
- Broadcast
- Link Local
- Loop Back
- Default Gateway
- Classless (Variable-Length Subnet Mask)
- Classful
- Class A
- Class B
- Class C
- Class D
- Class E
- Classless Inter-Domain Routing (CIDR) Notation
- Tunneling
- Dual Stack
- Shorthand Notation
- Router Advertisement
- Stateless Address Auto Configure (SLAAC)
- Overview of Virtual IP
- Overview of Sub-Interfaces
- Explain Common Ports and Protocols, Their Application, and Encrypted Alternatives
- Internet Control Message Protocol (ICMP)
- TCP
- UDP
- Generic Routing Encapsulation (GRE)
- Internet Protocol Security (IPSec)
- Authentication Header (AH) / Encapsulation Security Payload (ESP)
- Connectionless vs. Connection-Oriented
Chapter-30 Use And Purpose Of Network Services
- Scope
- Exclusion Ranges
- Reservation
- Dynamic Assignment
- Static Assignment
- Lease Time
- Scope Options
- Available Leases
- DHCP Relay
- IP Helper / UDP Forwarding
- Record Types
- Address (A vs. AAAA)
- Canonical Name (CNAME)
- Mail Exchange (MX)
- Start of Authority (SOA)
- Pointer (PTR)
- Text (TXT)
- Service (SRV)
- Name Server (NS)
- Global Hierarchy
- Root DNS Server
- Internal vs. External
- Zone Transfers
- Authoritative Name Servers
- Time to Live (TTL)
- DNS Caching
- Reverse DNS / Reverse Lookup / Forward Lookup
- Recursive Lookup / Iterative Lookup
- Stratum
- Clients
- Servers
Chapter-31 Basic Corporate And Datacenter Network
- Core
- Distribution/Aggregation Layer
- Access/Edge
- Application Layer
- Control Layer
- Infrastructure Layer
- Management Plane
- Software-Defined Network
- Top-of-Rack Switching
- Backbone
- North-South
- East-West
- Branch Office
- On-Premises Datacenter
- Colocation
- Connection Types
- Fibre Channel over Ethernet (FCoE)
- Fibre Channel
- Internet Small Computer Systems Interface (iSCSI)
Chapter-32 Cloud Concepts And Connectivity
- Public
- Private
- Hybrid
- Community
- Software as a Service (SaaS)
- Infrastructure as a Service (IaaS)
- Platform as a Service (PaaS)
- Desktop as a Service (DaaS)
- Automation/Orchestration
- Virtual Private Network (VPN)
- Private-Direct Connection to Cloud Provider
- Overview of Multitenancy
- Overview of Elasticity
- Overview of Scalability
- Overview of Security Implications
Chapter-33 Contrast Various Devices, Appropriate Placement On The Network
- Layer 2 Switch
- Layer 3 Capable Switch
- Router
- Hub
- Access Point
- Bridge
- Wireless LAN Controller
- Load Balancer
- Proxy Server
- Cable Modem
- DSL Modem
- Repeater
- Voice Gateway
- Media Converter
- Intrusion Prevention System (IPS) / Intrusion Detection System (IDS) Device
- Firewall
- VPN Headend
- Voice over Internet Protocol (VoIP) Phone
- Printer
- Physical Access Control Devices
- Cameras
- Heating, Ventilation, and Air Conditioning (HVAC) Sensors
- Internet of Things (IoT)
- Refrigerator
- Smart Speakers
- Smart Thermostats
- Smart Doorbells
- Industrial Control Systems / Supervisory Control and Data Acquisition (SCADA)
Chapter-34 Routing Technologies And Bandwidth Management
- Dynamic Routing
- Protocols
- Routing Information Protocol (RIP)
- Open Shortest Path First (OSPF)
- Enhanced Interior Gateway Routing Protocol (EIGRP)
- Border Gateway Protocol (BGP)
- Link State vs. Distance Vector vs. Hybrid
- Static Routing
- Default Route
- Administrative Distance
- Exterior vs. Interior
- Time to Live (TTL)
- Traffic Shaping
- Quality of Service (QoS)
Chapter-35 Install And Configure Wireless Standards And Technologies
- Dynamic Routing
- Protocols
- Routing Information Protocol (RIP)
- Open Shortest Path First (OSPF)
- Enhanced Interior Gateway Routing Protocol (EIGRP)
- Border Gateway Protocol (BGP)
- Link State vs. Distance Vector vs. Hybrid
- Static Routing
- Default Route
- Administrative Distance
- Exterior vs. Interior
- Time to Live (TTL)
- Traffic Shaping
- Quality of Service (QoS)
Chapter-36 Statistics And Sensors To Ensure Network Availability
- Device/Chassis
- Temperature
- Central Processing Unit (CPU) Usage
- Memory
- Network Metrics
- Bandwidth
- Latency
- Jitter
- Traps
- Object Identifiers (OIDs)
- Management Information Bases (MIBs)
- Log Reviews
- Traffic Logs
- Audit Logs
- Syslog
- Logging Levels/Severity Levels
- Link State (Up/Down)
- Speed/Duplex
- Send/Receive Traffic
- Cyclic Redundancy Checks (CRCs)
- Protocol Packet and Byte Counts
- CRC Errors
- Giants
- Runts
- Encapsulation Errors
- Temperature
- Humidity
- Electrical
- Flooding
- Overview of Baselines
- Overview of NetFlow Data
- Overview of Uptime/Downtime
Chapter-37 Purpose Of Organizational Documents And Policies
- Change Management
- Incident Response Plan
- Disaster Recovery Plan
- Business Continuity Plan
- System Life Cycle
- Standard Operating Procedures
- Password Policy
- Acceptable Use Policy
- Bring Your Own Device (BYOD) Policy
- Remote Access Policy
- Onboarding and Offboarding Policy
- Security Policy
- Data Loss Prevention
- Physical Network Diagram
- Floor Plan
- Rack Diagram
- Intermediate Distribution Frame (IDF) / Main Distribution Frame (MDF) Documentation
- Logical Network Diagram
- Wiring Diagram
- Site Survey Report
- Audit and Assessment Report
- Baseline Configurations
- Non-Disclosure Agreement (NDA)
- Service-Level Agreement (SLA)
- Memorandum of Understanding (MOU)
Chapter-38 High Availability And Disaster Recovery Concepts
- Overview of Load Balancing
- Overview of Multipathing
- Overview of NIC Teaming
- Switches
- Routers
- Firewalls
- Uninterruptible Power Supply (UPS)
- Power Distribution Units (PDUs)
- Generator
- Heating, Ventilation, and Air Conditioning (HVAC)
- Fire Suppression
- Cold Site
- Warm Site
- Hot Site
- Cloud Site
- Active-Active vs. Active-Passive
- Multiple Internet Service Providers (ISPs)/Diverse Paths
- Virtual Router Redundancy Protocol (VRRP) / First Hop Redundancy Protocol (FHRP)
- Mean Time to Repair (MTTR)
- Mean Time Between Failure (MTBF)
- Recovery Time Objective (RTO)
- Recovery Point Objective (RPO)
- State
- Configuration
Chapter-39 Common Security Concepts
- Overview of CIA Triad
- Internal
- External
- Common Vulnerabilities and Exposures (CVE)
- Zero-Day
- Overview of Exploits
- Overview of Least Privilege
- Overview of Role-Based Access
- Overview of Zero Trust
- Network Segmentation Enforcement
- Perimeter Network (Previously Known as Demilitarized Zone [DMZ])
- Separation of Duties
- Network Access Control
- Honeypot
- Multifactor
- Terminal Access Controller Access-Control System Plus (TACACS+)
- Single Sign-On (SSO)
- Remote Authentication Dial-In User Service (RADIUS)
- LDAP
- Kerberos
- Local Authentication
- 802.1X
- Extensible Authentication Protocol (EAP)
- Security Risk Assessments
- Threat Assessment
- Vulnerability Assessment
- Penetration Testing
- Posture Assessment
- Business Risk Assessments
- Process Assessment
- Vendor Assessment
- Overview of SIEM
Chapter-40 Contrast Common Types Of Attacks
- Denial-of-Service (DoS) / Distributed Denial-of-Service (DDoS)
- Botnet / Command and Control
- On-Path Attack (Previously Known as Man-in-the-Middle Attack)
- DNS Poisoning
- VLAN Hopping
- ARP Spoofing
- Rogue DHCP
- Rogue Access Point (AP)
- Evil Twin
- Ransomware
- Password Attacks
- Brute-Force
- Dictionary
- MAC Spoofing
- IP Spoofing
- Deauthentication
- Malware
- Social Engineering
- Phishing
- Tailgating
- Piggybacking
- Shoulder Surfing
Chapter-41 Network HardeningTechniqUes
- Secure SNMP
- Router Advertisement (RA) Guard
- Port Security
- Dynamic ARP Inspection
- Control Plane Policing
- Private VLANs
- Disable Unneeded Switchports
- Disable Unneeded Network Services
- Change Default Passwords
- Password Complexity/Length
- Enable DHCP Snooping
- Change Default VLAN
- Patch and Firmware Management
- Access Control List
- Role-Based Access
- Firewall Rules
- Explicit Deny
- Implicit Deny
- MAC Filtering
- Antenna Placement
- Power Levels
- Wireless Client Isolation
- Guest Network Isolation
- Pre-Shared Keys (PSKs)
- EAP
- Geofencing
- Captive Portal
- Overview of IoT Access Considerations
- Site-to-Site VPN
- Client-to-Site VPN
- Clientless VPN
- Split Tunnel vs. Full Tunnel
- Remote Desktop Connection
- Remote Desktop Gateway
- SSH
- Virtual Network Computing (VNC)
- Virtual Desktop
- Authentication and Authorization Considerations
- In-Band vs. Out-of-Band Management
Chapter-42 Importance Of Physical Security
- Camera
- Motion Detection
- Asset Tags
- Tamper Detection
- Employee Training
- Access Control Hardware
- Badge Readers
- Biometrics
- Locking Racks
- Locking Cabinets
- Access Control Vestibule (Previously Known as a Mantrap)
- Smart Lockers
- Factory Reset/Wipe Configuration
- Sanitize Devices for Disposal
Chapter-43 Network Troubleshooting
- Gather Information
- Question Users
- Identify Symptoms
- Determine if Anything Has Changed
- Duplicate the Problem, if Possible
- Approach Multiple Problems Individually
- Question the Obvious
- Consider Multiple Approaches
- Top-to-Bottom/Bottom-to-Top OSI Model
- Divide and Conquer
- If the Theory is Confirmed, Determine the Next Steps to Resolve the Problem
- If the Theory is Not Confirmed, Reestablish a New Theory or Escalate
- Overview of Action Plan
- Implement the Solution
- Escalate as Necessary
- Verify Full System Functionality
- Implement Preventive Measures
- Overview of Documentation
Chapter-44 Troubleshoot Common Cable Connectivity
- Throughput
- Speed
- Distance
- Shielded and Unshielded
- Plenum and Riser-Rated
- Rollover Cable/Console Cable
- Crossover Cable
- Power over Ethernet (PoE)
- Attenuation
- Interference
- Decibel (dB) Loss
- Incorrect Pinout
- Bad Ports
- Open/Short
- Light-Emitting Diode (LED) Status Indicators
- Incorrect Transceivers
- Duplexing Issues
- Transmit and Receive (TX/RX) Reversed
- Dirty Optical Cables
- Cable Crimper
- Punchdown Tool
- Tone Generator
- Loopback Adapter
- Optical Time-Domain Reflectometer (OTDR)
- Multimeter
- Cable Tester
- Wire Map
- Tap
- Fusion Splicers
- Spectrum Analyzers
- Snips/Cutters
- Cable Stripper
- Fiber Light Meter
Chapter-45 Network Software Tools And Commands
- WiFi Analyzer
- Protocol Analyzer/Packet Capture
- Bandwidth Speed Tester
- Port Scanner
- iperf
- NetFlow Analyzers
- Trivial File Transfer Protocol (TFTP) Server
- Terminal Emulator
- IP Scanner
- ping
- ipconfig/ifconfig/ip
- nslookup/dig
- traceroute/tracert
- arp
- netstat
- hostname
- route
- telnet
- tcpdump
- nmap
- show interface
- show config
- show route
Chapter-46 Troubleshoot Common Wireless Connectivity Issues
- Throughput
- Speed
- Distance
- Received Signal Strength Indication (RSSI) Signal Strength
- Effective Isotropic Radiated Power (EIRP)/Power Settings
- Antennas
- Placement
- Type
- Polarization
- Channel Utilization
- AP Association Time
- Site Survey
- Interference
- Channel Overlap
- Antenna Cable Attenuation/Signal Loss
- RF Attenuation/Signal Loss
- Wrong SSID
- Incorrect Passphrase
- Encryption Protocol Mismatch
- Insufficient Wireless Coverage
- Captive Portal Issues
- Client Disassociation Issues
- Device Configuration Review
- Routing Tables
- Interface Status
- VLAN Assignment
- Network Performance Baselines
- Collisions
- Broadcast Storm
- Duplicate MAC Address
- Duplicate IP Address
- Multicast Flooding
- Asymmetrical Routing
- Switching Loops
- Routing Loops
- Rogue DHCP Server
- DHCP Scope Exhaustion
- IP Setting Issues
- Incorrect Gateway
- Incorrect Subnet Mask
- Incorrect IP Address
- Incorrect DNS
- Missing Route
- Low Optical Link Budget
- Certificate Issues
- Hardware Failure
- Host-Based/Network-Based Firewall Settings
- Blocked Services, Ports, or Addresses
- Incorrect VLAN
- DNS Issues
- NTP Issues
- BYOD Challenges
- Licensed Feature Issues
- Network Performance Issues
Chapter-47 Introduction To Linux
- What is an Operating System?
- What is Linux OS?
- History of Linux
- Linux vs. Unix
- Linux Flavors / Distributions
- Linux Users
- Linux vs. Windows
Chapter-48 Download, install and Configure
- Overview of VirtualBox
- Steps to Download Oracle VirtualBox
- Installation Guide for Oracle VirtualBox
- Differences between Ubuntu Server and Ubuntu Desktop
- Steps to Create a Virtual Machine in VirtualBox
- Downloading Ubuntu/CentOS Server
- Installation Guide for Ubuntu/CentOS Server
- Downloading Ubuntu/CentOS Desktop
- Installation Guide for Ubuntu/CentOS Desktop
Chapter-49 System Access & File System
- Installing Putty or any Other SSH Client
- Comparison of Other OS Clients
- Overview of Linux Command Prompts
- What is File System?
- Different Types of File Systems
- How to Find File System Type in Linux and Windows
- Overview of File System Structure
- cd
- pwd
- ls
- Overview of File or Directory Properties
- Regular Files (‘-’)
- Directory Files (‘d’)
- Special Files
- Block File(‘b’)
- Character Device File (‘c’)
- Named Pipe File or Just a Pipe File (‘p’)
- Symbolic Link File (‘l’)
- Socket File(‘s’)
- What is Root User / Super User
- What is Root Directory
- What is Root Home Directory
- Change Password for Root User
- Change Password for Standard User
- Absolute Path
- Relative Path
- Navigating to File System Using Both Paths
- touch
- cp
- vi
- mkdir
- Overview of Copying Directories
- Find
- Locate
- Overview of Differences
- Overview of Wildcard Commands
- Soft Links
- Hard Links
Chapter-50 Linux Fundamentals
- Overview of Linux Command Syntax
- First Dash or Bit Identifies the File Type
- Second 3 Bits Define the Permission for User (File or Directory Owner)
- Third 3 Bits Define the Permission for Group
- Fourth 3 Bits Define the Permission for Everyone Else
- File Permissions Using Numeric Mode (Chmod 777 file)
- File Ownership Commands (Chown, Chgrp)
- Overview of ACL
- man
- whatis
- command --help
- Overview of TAB Completion and Up Arrow Keys
- echo
- Redirects > and >>
- vi
- Overview of Input and Output Redirects
- Overview of tee Command
- Overview of Linux Pipes
- cp
- rm
- mv
- mkdir
- rmdir or rm -rf
- chgrp
- chown
- cat
- more
- less
- head
- tail
- vi
- cut - Text Processing Commands
- awk - Text Processing Commands
- grep and egrep - Text Processing Commands
- sort / uniq - Text Processing Commands
- wc - Text Processing Commands
- Overview of diff and cmp
- Overview of tar, gzip, and gunzip
- Overview of truncate Command
- Overview of Combining and Splitting Files
- Comparison of Linux and Windows Commands
Chapter-51 System Administration In Linux
- I - Insert Mode
- a - Insert and Move Cursor
- zz or :wq! - Save File and Quit vi Editor
- :q! - Quit vi Editor Without Saving
- Up, Down, Left, and Right Keys - To Navigate Within vi Editor
- o - To Start Inserting from a New Line
- Shift G - Takes You to the End of a File While in vi
- / - Searches for a Pattern While in vi Mode
- Overview of Differences
- Overview of sed Command
- useradd
- userdel
- groupdel
- usermod
- /etc/passwd
- /etc/shadow
- /etc/group
- Overview of Password Aging
- su or su -
- sudo Commands
- who
- last
- w
- id
- users
- wall
- write
- Overview of Account Authentication
- Overview of Differences
- date
- uptime
- hostname
- uname
- which
- cal
- bc
- systemctl Command
- ps Command
- top Command
- kill Command
- crontab Command
- at Command
- Additional Cron Jobs (Hourly, Daily, Weekly, Monthly)
- Process Management (bg, fg, nice)
- top
- df
- dmesg
- iostat
- netstat
- free
- cat /proc/cpuinfo
- cat /proc/meminfo
- /var/log
- /var/log/messages
- dmesg
- shutdown
- reboot
- init 0-6
- halt
- Overview of hostnamectl Command
- uname
- cat /etc/redhat-release
- cat /etc/*-release
- dmidecode
- Overview of arch Command
- Overview of Terminal Control Keys
- clear
- exit
- script
- Restart the System or Type Reboot
- Catch the GRUB Screen
- Stop at Your Kernel Line and Press "e" to Enter the Editing Mode
- Find the Line that Starts with Linux and Go to the End of the Line and Type
- rd.break
- Press ctrl+x to Enter into the Rescue Mode
- #mount -o remount, rw /sysroot
- #chroot /sysroot
- #passwd
- #touch /.autorelabel
- #exit
- #exit
- Overview of SOS Report
- Overview of Special Permissions
Chapter-52 System Maintenance Commands in Linux
- Overview of Linux Kernel
- Definition and Function of Shell
- Bash
- Sh
- Csh
- Ksh
- Zsh
- Overview of Shell Scripting
- #b!/bin/bash
- echo "Hello Elysium"
- Overview of Input and Output
- #B!/bin/bash
- if [ -e /home/iofzol/veronico ]
- then
- echo "File exists"
- else
- echo "File does not exist"
- fi
- #i/bin/bash
- if [ -e /home/iofzol/check ]
- then
- echo "File exists"
- else
- echo "File does not exist"
- fi
- #!/bin/bash
- count=0
- num=10
- while [ $count -lt 10 ]
- do
- echo
- echo $num seconds left to stop this process
- echo
- sleep 1
- num=$(expr $num - 1)
- count=$(expr $count + 1)
- done
- echo
- echo "Process is stopped!!!"
- echo
- #!/bin/bash
- echo "Please enter the letter next to the command that you want to select:"
- echo 'a. date'
- echo 'b. ls'
- echo 'c. who'
- echo 'd. hostname'
- read choice
- case $choice in
- a) date;;
- b) ls;;
- c) who;;
- d) hostname;;
- *) echo "Invalid choice - Bye.";;
- esac
- Overview of Checking Remote Servers Connectivity
- Overview of Setting up Aliases
- Overview of User and Global Aliases
- Overview of Shell History
Chapter-53 Networking , Services,& System Updates
- Open VirtualBox Manager
- Select the Machine You Cannot Get Internet on in the Left Pane
- Click the Settings Button in the Top Menu
- Click Network in the Left Pane in the Settings Window
- Switch to Bridged Adapter in the Attached to Drop-Down Menu
- Hit OK to Save Your Changes
- Start Your VM
- IP
- Subnet Mask
- Gateway
- Static vs. DHCP
- Interface
- Interface MAC
- Network Files and Commands in Linux
- etc/hosts
- Version 6 - /etc/sysconfig/network
- Version 7 - /etc/hostname
- /etc/sysconfig/network-scripts/ifcfg-nic
- /etc/resolv.conf
- /etc/nsswitch.conf
- Network Commands
- ping
- ifconfig
- ifup or ifdown
- netstat
- tcpdump
- Overview of NIC Information Using ethtool
- Overview of NIC or Port Bonding
- nmtui
- nmcli
- nm-connection-editor
- GNOME Settings
- Overview of wget Command
- Overview of curl Command
- Overview of ping Command
- Overview of FTP
- Overview of SCP
- Overview of rsync
- rpm
- yum
- Overview of System Upgrade and Patch Management
- Overview of Creating Local Repository
- Overview of Advanced Package Management
- Overview of Rolling Back Patches and Updates
- SSH and Telnet in Linux
- SSH vs. Telnet in Linux
- Overview of DNS Configuration
- nslookup Command
- dig Command
- Linux Network Time Protocol
- Linux chronyd (New Version of NTP)
- New System Utility Command (timedatectl)
- Overview of Linux Sendmail
- Setting Up a Simple Apache Web Server
- Overview of Central Logging with rsyslog
- Overview of OS Hardening
- Overview of Open LDAP Installation
- Overview of traceroute Command
- Steps to Configure and Secure SSH
- Overview of SSH Keys
- Overview of Cockpit for Web-Based Administration
- Overview of Firewall Configuration
- Overview of System Performance Tuning
- Overview of Running Containers with Docker and Podman
- Overview of Kickstart for Automated Installation
- Overview of DHCP Server Configuration
Chapter-54 Disk Manacgment And Run Levels
- Overview of System Run Levels
- Steps in Computer Boot Process
- Stages of Linux Boot Process
- What is Message of the Day (MOTD)?
- Steps to Customize MOTD
- Overview of Storage Types and Concepts
- Using df Command
- Using fdisk Command
- Steps to Add Disk and Create Partition
- Overview of Logical Volume Management (LVM)
- Steps for LVM Configuration During Installation
- Using pvcreate Command
- Using vgcreate Command
- Using lvcreate Command
- Steps to Extend Disk Using LVM
- Steps to Add Swap Space
- Overview of Stratis for Advanced Storage Management
- Introduction to RAID
- Using fsck Command
- Using xfs_repair Command
- Steps for System Backup Using dd Command
- Overview of NFS Installation and Configuration
- Steps for Samba Installation and Configuration
- Setting Up NAS Drive for NFS or Samba
- Overview of SATA and SAS Technologies
What is the duration of the Elysium Certified IT Infra Manager course?
The course duration is typically 12 weeks, with flexible learning options to fit different schedules.
Do I need any prior experience in IT infrastructure management to enroll in this course?
No prior experience is required. This course is designed for both beginners and professionals looking to enhance their skills.
What certification will I receive upon completing the course?
Upon successful completion, you will receive the Elysium Certified IT Infra Manager certification, which is recognized globally.
Are there any prerequisites for enrolling in this course?
Basic knowledge of IT systems and networking is beneficial but not mandatory.
How is the course delivered?
The course is delivered through a combination of online lectures, hands-on labs, real-world projects, and interactive sessions with instructors.
Will I have access to course materials after the course is completed?
Yes, you will have lifetime access to all course materials, including video lectures, assignments, and additional resources.
What kind of support is available during the course?
You will have access to a dedicated coordinator, regular feedback from trainers, and post-session support to address any questions or challenges.
Are there any real-world projects included in the course?
Yes, the course includes several real-world projects to provide practical experience and help you apply the concepts learned.
Can I get my team certified through this course?
Yes, we offer customized training programs for teams. Please contact our support team for more details on group certifications.
How can I enroll in the Elysium Certified IT Infra Manager course?
You can enroll through our website by completing the registration form and selecting your preferred course schedule. For assistance, our support team is always available.
- Elysium Certified IT INFRA MANAGER - Training Course TESBO
- Duration: 180 Hours
- Level: Beginner
- Days: 180 Days
- Chapters: 54
- Language: English
- Certifications: Yes
- Code: EAPL/TESBO/TSTC07
- Course Code: EATIT
- Sub Category: Cyber Security And Networking Training Course
Thank you!
We will contact you soon.
Elysium Certified IT INFRA MANAGER Features
IT Infrastructure Curriculum
Master the full spectrum of IT infrastructure management, from network administration to cloud computing. Our course covers all essential aspects of IT infrastructure.
Hands-On IT INFRA Experience
Engage in practical exercises and real-world projects. Develop your skills through interactive labs and simulations, preparing you for real-world scenarios.
Certification Exam Preparation
Get fully prepared for the Elysium Certified IT Infra Manager exam. Access practice tests, study materials, and expert tips to enhance your exam readiness.
Expert Instructors
Learn from industry leaders and experienced IT professionals. Our instructors provide valuable insights and personalized guidance to ensure your success.
Flexible Learning Options
Choose between online and in-person classes to suit your schedule. Our flexible approach ensures you can learn at your own pace and convenience.
Career Support
Enhance your resume and professional profile with our certification. Receive job placement assistance, career counseling, and networking opportunities.
What Will You Learn?
Our Latest Blogs
Best 7 Reasons Fullstack Academy is the Best Choice for Aspiring Developers
In today’s technology-driven world, the demand for full-stack developers has skyrocketed as companies look for professionals who can handle both…
Top 10 React Native Training Programs to Elevate Your Mobile Development Skills
In the rapidly growing world of mobile app development, React Native has emerged as one of the most powerful frameworks…
Top 10 Azure Training Courses to Boost Your Cloud Skills
As businesses increasingly migrate their operations to the cloud, the demand for professionals skilled in cloud computing platforms like Microsoft…
Related Courses
Elysium Certified Digital Marketing – Training Course
Master the art of digital marketing with comprehensive training, covering SEO, SEM, content marketing, and more, to boost your career.
Elysium Certified Cloud Architect – Training Course
Gain in-depth knowledge and practical skills to develop design, implement, and manage robust cloud solutions, preparing you for a future.
Elysium Certified IT Infra Manager – Training Course
Equip yourself with the expertise to efficiently manage IT infrastructure, ensuring seamless operations and optimal performance in IT.
Recommend your friends/colleagues and earn gift vouchers worth up to INR 1000/-!
Invite friends to join our community, and receive valuable gift vouchers as a token of appreciation for each successful referral. Spread the word about our referral program today and start earning rewards!