{"id":6477,"date":"2024-05-04T15:11:32","date_gmt":"2024-05-04T10:11:32","guid":{"rendered":"https:\/\/corvit.com\/systems\/?page_id=6477"},"modified":"2024-05-22T12:23:51","modified_gmt":"2024-05-22T07:23:51","slug":"cloud-computing-microsoft-azure-outline","status":"publish","type":"page","link":"https:\/\/corvit.com\/systems\/navttc-courses-outlines\/cloud-computing-microsoft-azure-outline\/","title":{"rendered":"Cloud Computing Microsoft Azure Outline"},"content":{"rendered":"[vc_row type=&#8221;full_width_background&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; bg_color=&#8221;#cc3036&#8243; scene_position=&#8221;center&#8221; top_padding=&#8221;2%&#8221; bottom_padding=&#8221;2%&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; bg_image_animation=&#8221;none&#8221;][vc_custom_heading text=&#8221;Cloud Computing Microsoft Azure Outline&#8221; font_container=&#8221;tag:h1|font_size:40|text_align:left|color:%23ffffff|line_height:1.2&#8243; google_fonts=&#8221;font_family:Montserrat%3Aregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css=&#8221;.vc_custom_1714817411658{margin-bottom: 3% !important;padding-top: 4% !important;}&#8221;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; top_padding=&#8221;28&#8243; bottom_padding=&#8221;28&#8243; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; bg_image_animation=&#8221;none&#8221;][vc_column_text]<strong>Course Contents \/ Lesson Plan Course Title: <\/strong><\/p>\n<p>Cloud Computing \/ Microsoft<\/p>\n<p><strong>Duration: <\/strong>3 Months<\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"4\" width=\"699\"><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"12\"><\/td>\n<td width=\"141\"><strong>Trainer Name<\/strong><\/td>\n<td width=\"531\"><\/td>\n<td rowspan=\"4\" width=\"16\"><\/td>\n<\/tr>\n<tr>\n<td width=\"141\"><strong>Author Name<\/strong><\/td>\n<td width=\"531\"><strong>\u00a0<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"141\"><strong>Course Title<\/strong><\/td>\n<td width=\"531\"><strong>Cloud Computing \/ Microsoft<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"141\"><strong>Objectives and Expectations<\/strong><\/td>\n<td width=\"531\">Objectives and Expectations Employable skills and hands-on practice for Networking and Cloud Computing<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>Networking has become one of the most attractive career profiles among candidates. From the basics of Routing and Switching to Cloud Networking, the advancements happening in the networking domain are beyond one\u2019s imagination.<\/p>\n<p>Cloud computing powers modern-day industry through seamless provision of servers, storage, networking, software and analytics. Study cloud computing to develop in-demand skills and expertise in virtualization, cloud infrastructure, app development and security.<\/p>\n<p>This is a special course designed to address unemployment in the youth. The course aims to achieve the above objective through hands on practical training delivery by a team of dedicated professionals having rich market\/work experience. This course is therefore not just for developing a theoretical understanding\/back ground of the trainees. Contrary to that it is primarily aimed at equipping the trainees to perform commercially in a market space in independent capacity or as a member of a team.<\/p>\n<p>The course therefore is designed to impart not only technical skills but also soft skills (i.e interpersonal\/communication skills; personal grooming of the trainees etc) as well as entrepreneurial skills (i.e. marketing skills; free lancing etc.). The course also seeks to inculcate work ethics to foster better citizenship in general and improve the image of Pakistani work force in particular<\/p>\n<p>Main Expectations:<\/p>\n<p>In short, the course under reference should be delivered by professional instructors in such a robust hands-on manner that the trainees are comfortably able to employ their skills for earning money (through wage\/self-employment) at its conclusion.<\/p>\n<p>This course thus clearly goes beyond the domain of the traditional training practices in vogue and underscores an expectation that a market-centric approach will be adopted as the main driving force while delivering it. The instructors should therefore be experienced enough to be able to identify the training needs for the possible market roles available out there. Moreover, they should also know the strengths and weaknesses of each trainee to prepare them for such market roles during\/after the training.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>i.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Specially designed practical tasks to be performed by the trainees have been included in the Annexure-I to this document. The record of all tasks performed individually or in groups must be preserved by the management of the training Institute clearly labeling name, trade, session, etc so that these are ready to be physically inspected\/verified through monitoring visits from time to time. The weekly distribution of tasks has also been indicated in the weekly lesson plan given in this document.<\/p>\n<p>ii.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 To materialize the main expectations, a special module on Job Search<\/p>\n<p>&amp; Entrepreneurial Skills has been included in the latter part of this course (3rd<\/p>\n<p>month) through which, the trainees will be made aware<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"4\" width=\"699\"><\/td>\n<\/tr>\n<tr>\n<td width=\"12\"><\/td>\n<td width=\"125\"><\/td>\n<td width=\"545\">of the Job search techniques in the local as well as international job markets (Gulf countries). Awareness around<\/p>\n<p>the visa process and immigration laws of the most favored pg. 2 | Networking &amp; Cloud Computing<\/p>\n<p>labor destination countries also form a part of this module. Moreover, the trainees would also be encouraged to venture into self-employment and exposed to the main requirements in this regard. It is also expected that a sense of civic duties\/roles and responsibilities will also be inculcated in the trainees to make them responsible citizens of the country.<\/p>\n<p>iii.\u00a0 A module on Work Place Ethics has also been included to highlight the importance of good and positive behavior in the workplace in the line with the best practices elsewhere in the world. An outline of such qualities has been given in the Appendix to this document. Its importance should be conveyed in a format that is attractive and interesting for the trainees such as through PPT slides +short video documentaries. Needless to say, that if the training provider puts his heart and soul into these otherwise non-technical components, the image of the Pakistani workforce would undergo a positive transformation in the local as well as international job markets.<\/p>\n<p>To maintain interest and motivation of the trainees throughout the course, modern techniques such as:<\/p>\n<p>\u2022\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Motivational Lectures<\/p>\n<p>\u2022\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Success Stories<\/p>\n<p>\u2022\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Case Studies<\/p>\n<p>These techniques would be employed as an additional training tool wherever possible (these are explained in the subsequent section on Training Methodology).<\/p>\n<p>Lastly, evaluation of the competencies acquired by the trainees will be done objectively at various stages of the training and a proper record of the same will be maintained. Suffice to say that for such evaluations, practical tasks would be designed by the training providers to gauge the problem-solving abilities of the trainees.<\/p>\n<p>(i)\u00a0\u00a0\u00a0 Motivational Lectures<\/p>\n<p>The proposed methodology for the training under reference employs motivation as a tool. Hence besides the purely technical content, a trainer is required to include elements of motivation in his\/her lecture. To inspire the trainees to utilize the training opportunity to the full and strive towards professional excellence. Motivational lectures may also include general topics such as the importance of moral values and civic role &amp; responsibilities as a Pakistani. A motivational lecture should be delivered with enough zeal to produce a deep impact on the trainees. It may comprise of the following:<\/p>\n<p>Clear Purpose to convey the message to trainees effectively. Personal Story to quote as an example to follow.<\/p>\n<p>Trainees Fit so that the situation is actionable by trainees and not represent a just idealism.<\/p>\n<p>Ending Points to persuade the trainees on changing themselves.<\/p>\n<p>A good motivational lecture should help drive creativity, curiosity, and spark the desire needed for trainees to want to learn more.<\/p>\n<p>The impact of a successful motivational strategy is amongst others commonly visible<\/p>\n<p>in increased class participation ratios. It increases the trainees\u2019 willingness to be engaged on the practical tasks for a longer time without boredom and loss of interest because they can see in their mind&#8217;s eye where their hard work would take them in short (1-3 years); medium (3 -10 years) and long term (more than 10 years).<\/p>\n<p>pg. 3 | Networking &amp; Cloud Computing<\/td>\n<td width=\"17\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"4\" width=\"699\"><\/td>\n<\/tr>\n<tr>\n<td width=\"12\"><\/td>\n<td width=\"118\"><\/td>\n<td width=\"553\"><strong>\u00a0<\/strong><\/p>\n<p>As this tool is expected that the training providers would make arrangements for regular well planned motivational lectures as part of a coordinated strategy interspersed throughout the training period as suggested in the weekly lesson plans in this document.<\/p>\n<p>Course-related motivational lectures online link is available in Annexure-II.<\/p>\n<p>(ii)\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Success Stories<\/p>\n<p>Another effective way of motivating the trainees is using Success Stories. Its inclusion in the weekly lesson plan at regular intervals has been recommended till the end of the training.<\/p>\n<p>A success story may be disseminated orally, through a presentation, or using a video\/documentary of someone that has risen to fortune, acclaim, or brilliant achievement. A success story shows how a person achieved his goal through hard work, dedication, and devotion. An inspiring success story contains compelling and significant facts articulated clearly and easily comprehendible words. Moreover, it is helpful if it is assumed that the reader\/listener knows nothing of what is being revealed. The optimum impact is created when the story is revealed in the form of: &#8211;<\/p>\n<p>Directly in person (At least 2-3 cases must be arranged by the training institute) Through an audio\/ videotaped message (2-3 high-quality videos must be arranged by the training institute)<\/p>\n<p>It is expected that the training provider would collect relevant high- quality success stories for inclusion in the training as suggested in the weekly lesson plan given in this document.<\/p>\n<p>Suggestive structure and sequence of a sample success story and its various shapes can be seen in Annexure III.<\/p>\n<p>(iii)\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Case Studies<\/p>\n<p>Where a situation allows, case studies can also be presented to the trainees to widen their understanding of the real-life specific problem\/situation and to explore the solutions.<\/p>\n<p>In simple terms, the case study method of teaching uses a real-life case example\/a typical case to demonstrate a phenomenon in action and explain theoretical as well as practical aspects of the knowledge related to the same. It is an effective way to help the trainees comprehend in depth both the theoretical and practical aspects of the complex phenomenon in depth with ease. Case teaching can also stimulate the trainees to participate in discussions and thereby boost their confidence. It also makes the classroom atmosphere interesting thus maintaining the trainee interest in training till the end of the course.<\/p>\n<p>Depending on suitability to the trade, the weekly lesson plan in this document may suggest case studies be presented to the trainees. The trainer may adopt a PowerPoint presentation or video format for such case studies whichever is deemed suitable but only those cases must be selected that are relevant and of a learning value.<\/p>\n<p>The Trainees should be required and supervised to carefully analyze the cases. For this purpose, they must be encouraged to inquire and collect specific information\/data, actively participate in the discussions, and intended solutions to the problem\/situation.<\/p>\n<p>Case studies can be implemented in the following ways: &#8211;<\/p>\n<p>i.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 A good quality trade-specific documentary (At least 2- 3 documentaries must be arranged by the training<\/p>\n<p>pg. 4 | Networking &amp; Cloud Computing institute)<\/td>\n<td width=\"16\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"4\" width=\"699\"><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"5\" width=\"10\"><\/td>\n<td width=\"129\"><\/td>\n<td width=\"546\">ii. Health &amp;Safety case studies (2 cases regarding safety and industrial accidents must be arranged by the training institute)<\/p>\n<p>Field visits (At least one visit to a trade-specific major industry\/ site must be arranged by the training institute)<\/td>\n<td rowspan=\"5\" width=\"14\"><\/td>\n<\/tr>\n<tr>\n<td width=\"129\"><strong>Entry-level of trainees<\/strong><\/td>\n<td width=\"546\">For an advanced course of Networking and cloud proposed entry level is minimum Beginner to Intermediate<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Fundamentals of Computer or not<\/td>\n<\/tr>\n<tr>\n<td width=\"129\"><strong>Learning Outcomes of the course<\/strong><\/td>\n<td width=\"546\">Learning Outcomes of the course\u00a0\u00a0\u00a0\u00a0\u00a0 By the end of this course, the trainees should gain the following competencies:<\/p>\n<p>Understanding of Networking techniques Campus Design &amp; Enterprise Network Configuration of IP Connectivity<\/p>\n<p>Configuration of Advance Routing and Routing Protocols Management of Network Security of Network Problems Solving Skills Troubleshooting Skills Network Monitoring Skills Network Designing<\/p>\n<p>High Availability of Network Remote Site Management<\/p>\n<p>Secure and Encrypted traffic b\/w branches Implementation of Network Policies Programmability and Automation<\/p>\n<p>Understanding of Cloud Computing Architecture<\/p>\n<p>Distinguish between traditional and cloud computing models in terms of business value.<\/p>\n<p>Learn fundamental concepts of cloud computing.<\/p>\n<p>Identify technical challenges and mitigation measures involved in cloud computing. Understand latest digitization trends associated with cloud computing.<\/p>\n<p>Design and build enterprise-to-carrier grade private and public cloud. Learning focus would be on following: &#8211;<\/p>\n<p>Understand various types of virtualizations (compute, storage and network) Identify leading hypervisor manufacturers.<\/p>\n<p>Learn the fundamentals concepts and deployment of vSphere virtual infrastructure. Security threats and challenges in private and public cloud buildup. Understand design principles in securing your cloud.<\/p>\n<p>Security management in cloud including identity and access management, next generation security protection and application programming interface (API) based security.<\/p>\n<p>Learn about advanced load balancing architecture in cloud. pg. 5 | Networking &amp; Cloud Computing<\/p>\n<p>Identify common cloud attack vectors and remediating controls. Learn Off the Shelf Cloud Solutions like Microsoft Azure and Amazon Web Services (AWS)<\/p>\n<p>Detailed understanding of Microsoft Azure Cloud.<\/p>\n<p>Cover the fundamentals of AWS architectural principles and services. Deep dive into individual elements like IAM, S3, Cloud front, Storage Gateway, Snowball, EC2, Cloud watch, CLI, Lambda, Route 53, RDS, Dynamo DB, Redshift, Elastic Cache, Aurora, VPC,<\/p>\n<p>SQS, SNS, Elastic Transcoder, Kinesis, API Gateway etc.<\/td>\n<\/tr>\n<tr>\n<td width=\"129\"><strong>Course Execution Plan<\/strong><\/td>\n<td width=\"546\">The total duration of the course: 3 months Theory: 20% Practical: 80%<\/p>\n<p>Total Hours of Study : 240 Hours<\/td>\n<\/tr>\n<tr>\n<td width=\"129\"><strong>Companies offering jobs in the respective trade<\/strong><\/td>\n<td width=\"546\">There are thousands of Job opportunities in the field of networking. Few of them are mentioned below:<\/p>\n<p>PTCL (Pakistan Telecommunication Company Limited) Jazz (Mobilink) Telenor Pakistan<\/p>\n<p>Zong (China Mobile Pakistan) National Data Consultants (NDC Tech) Systems Limited<\/p>\n<p>Inbox Business Technologies World Call Telecom Limited<\/p>\n<p>Vision Telecom Pvt Ltd<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"4\" width=\"699\"><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"5\" width=\"3\"><\/td>\n<td width=\"109\"><\/td>\n<td width=\"584\">COMSATS Internet Services Nokia Siemens Networks Motorola<\/p>\n<p>NSC Global Siemens<\/p>\n<p>Saif Telecom Descon Engineering Descon Mirani Presson Descon Olayan Descon<\/p>\n<p>JGC- Descon \/ DIP Etimaad<\/p>\n<p>IAEL<\/p>\n<p>ABB Automation SPEC Group Pakistan About Us<\/p>\n<p>Callmate Telips Lahore Gymkhana Royal Palm<\/p>\n<p>Serena Hotel Islamabad Sinaco Engineers Novatax Limited Hascom Business Excicom<\/p>\n<p>SB&amp;B Advertising Polaris Values<\/p>\n<p>Raaziq International Pvt Ltd OOCL Pakistan<\/p>\n<p>Exel Pakistan DHL Pakistan Yaseen Shipping<\/p>\n<p>Karachi International Terminal Ltd Intertek Pakistan<\/p>\n<p>WWF Pakistan ESBI<\/p>\n<p>Merlin International Pakistan Arbor Tech<\/p>\n<p>Hyperstar Expereo<\/p>\n<p>Pak Oasis Industries Pvt. Ltd. OMV Exploration GmbH<\/p>\n<p>M3 Tech Allcom<\/td>\n<td rowspan=\"5\" width=\"3\"><\/td>\n<\/tr>\n<tr>\n<td width=\"109\"><strong>Job Opportunities<\/strong><\/td>\n<td width=\"584\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Cloud Administrator<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Network Administrator<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 IT Support Officer<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Manager \/ Assistant Manager IT<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Network support engineer<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Cloud Analyst<\/td>\n<\/tr>\n<tr>\n<td width=\"109\"><strong>No of Students<\/strong><\/td>\n<td width=\"584\">25<\/td>\n<\/tr>\n<tr>\n<td width=\"109\"><strong>Learning Place<\/strong><\/td>\n<td width=\"584\">Classroom \/ Lab<\/td>\n<\/tr>\n<tr>\n<td width=\"109\"><strong>Instructional Resources<\/strong><\/td>\n<td width=\"584\">Video Links:<\/p>\n<p><u>https:\/\/www.youtube.com\/@iptrainers<\/u> <u>https:\/\/www.youtube.com\/@corvitsystemslahore<\/u><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>MODULES<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"78\"><strong>Schedule d Weeks<\/strong><\/td>\n<td width=\"128\"><strong>Module Title<\/strong><\/td>\n<td width=\"79\"><strong>Days<\/strong><\/td>\n<td width=\"86\"><strong>Hours<\/strong><\/td>\n<td width=\"192\"><strong>Learning Units<\/strong><\/td>\n<td width=\"119\"><strong>Home Assignment<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"78\"><strong>Week 1<\/strong><\/td>\n<td width=\"128\"><strong>Introduction to Networking and Cloud Computing<\/strong><\/td>\n<td width=\"79\"><strong>Day 1<\/strong><\/td>\n<td colspan=\"2\" width=\"278\">Trainer\u2019s Introduction<\/p>\n<p>General Guidelines<\/td>\n<td width=\"119\"><\/td>\n<\/tr>\n<tr>\n<td width=\"78\"><\/td>\n<td width=\"128\"><\/td>\n<td width=\"79\"><\/td>\n<td colspan=\"2\" width=\"278\">Evaluation<\/td>\n<td width=\"119\"><\/td>\n<\/tr>\n<tr>\n<td width=\"78\"><\/td>\n<td width=\"128\"><\/td>\n<td width=\"79\"><\/td>\n<td colspan=\"2\" width=\"278\">Course Introduction<\/td>\n<td width=\"119\"><\/td>\n<\/tr>\n<tr>\n<td width=\"78\"><\/td>\n<td width=\"128\"><\/td>\n<td width=\"79\"><\/td>\n<td colspan=\"2\" width=\"278\">Course Scope<\/td>\n<td width=\"119\"><\/td>\n<\/tr>\n<tr>\n<td width=\"78\"><\/td>\n<td width=\"128\"><\/td>\n<td width=\"79\"><\/td>\n<td colspan=\"2\" width=\"278\">Evaluation<\/td>\n<td width=\"119\"><\/td>\n<\/tr>\n<tr>\n<td width=\"78\"><\/td>\n<td width=\"128\"><\/td>\n<td width=\"79\"><strong>Day 2<\/strong><\/td>\n<td colspan=\"2\" width=\"278\">Cloud Computing Concept, History, and Definitions<\/p>\n<p>Advantages of Cloud Business Model Evaluation<\/td>\n<td width=\"119\"><\/td>\n<\/tr>\n<tr>\n<td width=\"78\"><\/td>\n<td width=\"128\"><\/td>\n<td width=\"79\"><\/td>\n<td colspan=\"2\" width=\"278\"><\/td>\n<td width=\"119\">\u00b7 <strong>Task 1<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"78\"><\/td>\n<td width=\"128\"><\/td>\n<td width=\"79\"><\/td>\n<td colspan=\"2\" width=\"278\"><\/td>\n<td width=\"119\"><em><u>Details may be<\/u> <u>seen at<\/u> <u>Annexure-I<\/u><\/em><\/td>\n<\/tr>\n<tr>\n<td width=\"78\"><\/td>\n<td width=\"128\"><\/td>\n<td width=\"79\"><strong>Day 3<\/strong><\/td>\n<td colspan=\"2\" width=\"278\">Differentiating types of clouds: public,<\/td>\n<td width=\"119\"><\/td>\n<\/tr>\n<tr>\n<td width=\"78\"><\/td>\n<td width=\"128\"><\/td>\n<td width=\"79\"><\/td>\n<td colspan=\"2\" width=\"278\">private and hybrid<\/td>\n<td width=\"119\"><\/td>\n<\/tr>\n<tr>\n<td width=\"78\"><\/td>\n<td width=\"128\"><\/td>\n<td width=\"79\"><\/td>\n<td colspan=\"2\" width=\"278\">Categorizing service<\/td>\n<td width=\"119\"><\/td>\n<\/tr>\n<tr>\n<td width=\"78\"><\/td>\n<td width=\"128\"><\/td>\n<td width=\"79\"><\/td>\n<td colspan=\"2\" width=\"278\">types<\/td>\n<td width=\"119\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"2\" width=\"70\"><\/td>\n<td rowspan=\"2\" width=\"124\"><\/td>\n<td width=\"74\"><strong>Day 4<\/strong><\/td>\n<td width=\"298\">Trainer\u2019s Introduction General Guidelines Evaluation<\/p>\n<p>Course Introduction Course Scope<\/p>\n<p>Basic Networking Terms Evaluation<\/p>\n<p>TCP\/IP &amp; OSI Model Evaluation<\/p>\n<p>Network Cables<\/p>\n<p>Cross Over \/ Straight Through MAC Address VS IP Address MAC Addressing:<\/p>\n<p>Format of MAC addresses Types of MAC addresses<\/td>\n<td rowspan=\"2\" width=\"115\"><\/td>\n<\/tr>\n<tr>\n<td width=\"74\"><strong>Day 5<\/strong><\/td>\n<td width=\"298\">Introduction to Network Devices Introduction to Decimal, Binary and Hexa-Decimal Numbers<\/p>\n<p>Evaluation<\/p>\n<p>History of IPv4 Addressing Format of IPv4 Addressing Classification of IPv4 Addressing<\/p>\n<p>Calculating Number of Networks in Classes Calculation number of hosts per Network<\/td>\n<\/tr>\n<tr>\n<td width=\"70\"><strong>Week 2<\/strong><\/td>\n<td width=\"124\"><strong>IPv4 Addressing &amp; Subnetting<\/strong><\/td>\n<td width=\"74\"><strong>Day 1<\/strong><\/td>\n<td width=\"298\">Installing and Computing Windows Managing users accounts Managing Network settings Configuring Virtual Machines<\/td>\n<td width=\"115\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>\u00b7 <strong>Task 2<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><em><u>Details may be<\/u> <u>seen at<\/u> <u>Annexure-I<\/u><\/em><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"4\" width=\"66\"><\/td>\n<td rowspan=\"4\" width=\"120\"><\/td>\n<td width=\"80\"><strong>Day 2<\/strong><\/td>\n<td width=\"308\">Installing and Computing Windows Server Installing Active directory domain controller Managing Group Policy Disaster Recovery<\/td>\n<td rowspan=\"4\" width=\"108\"><\/td>\n<\/tr>\n<tr>\n<td width=\"80\"><strong>Day 3<\/strong><\/td>\n<td width=\"308\">Implementing File and Print Services Installing the DNS Server Role Configuring DNS Zones<\/td>\n<\/tr>\n<tr>\n<td width=\"80\"><strong>Day 4<\/strong><\/td>\n<td width=\"308\">IPV4<\/p>\n<p>Concept of Network-id and Broadcast-id Subnet Mask and Wildcard Mask Concept of Default Gateway<\/p>\n<p>Routed &amp; Non-Routed Ports<\/p>\n<p>Rules of IP addressing for Routed Ports<\/td>\n<\/tr>\n<tr>\n<td width=\"80\"><strong>Day 5<\/strong><\/td>\n<td width=\"308\">Concept of Network ID Subnetting Basics Class C<\/p>\n<p>Class B Class A<\/p>\n<p>Evaluation<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"7\" width=\"699\"><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"8\" width=\"11\"><\/td>\n<td width=\"71\"><strong>Week 3<\/strong><\/td>\n<td width=\"126\"><strong>Lab Setup with Cisco &amp; Huawei Devices<\/strong><\/td>\n<td width=\"76\"><strong>Day 1<\/strong><\/td>\n<td width=\"283\">Configuring and Troubleshooting Remote Access<\/p>\n<p>Configuring VPN Access<\/td>\n<td width=\"116\"><\/td>\n<td rowspan=\"8\" width=\"16\"><\/td>\n<\/tr>\n<tr>\n<td width=\"71\"><\/td>\n<td width=\"126\"><\/td>\n<td width=\"76\"><\/td>\n<td width=\"283\">Securing VPN connections with Security policies<\/td>\n<td width=\"116\"><\/td>\n<\/tr>\n<tr>\n<td width=\"71\"><\/td>\n<td width=\"126\"><\/td>\n<td width=\"76\"><strong>Day 2<\/strong><\/td>\n<td width=\"283\">Installing a DHCP Server Role<\/td>\n<td width=\"116\"><\/td>\n<\/tr>\n<tr>\n<td width=\"71\"><\/td>\n<td width=\"126\"><\/td>\n<td width=\"76\"><\/td>\n<td width=\"283\">Configuring DHCP Scopes<\/td>\n<td width=\"116\"><\/td>\n<\/tr>\n<tr>\n<td width=\"71\"><\/td>\n<td width=\"126\"><\/td>\n<td width=\"76\"><\/td>\n<td width=\"283\">Configuring Advanced DHCP Features<\/td>\n<td width=\"116\"><\/td>\n<\/tr>\n<tr>\n<td width=\"71\"><\/td>\n<td width=\"126\"><\/td>\n<td width=\"76\"><\/td>\n<td width=\"283\"><\/td>\n<td width=\"116\">\u00b7 <strong>Task 3<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"71\"><\/td>\n<td width=\"126\"><\/td>\n<td width=\"76\"><\/td>\n<td width=\"283\"><\/td>\n<td width=\"116\"><em><u>Details may be<\/u> <u>seen at<\/u> <u>Annexure-I<\/u><\/em><\/td>\n<\/tr>\n<tr>\n<td width=\"71\"><\/td>\n<td width=\"126\"><\/td>\n<td width=\"76\"><strong>Day 3<\/strong><\/td>\n<td width=\"283\">Deploying Additional domain controllers Plan and Implement Server Virtualization with Hyper<\/p>\n<p>Plan and deploy virtual machines Design and implement Virtualization Replica solutions<\/td>\n<td width=\"116\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"2\" width=\"70\"><\/td>\n<td rowspan=\"2\" width=\"133\"><\/td>\n<td width=\"75\"><strong>Day 4<\/strong><\/td>\n<td width=\"288\">Class Full and Class Less Subnetting<\/p>\n<p>IPv6 Addressing:<\/p>\n<p>History of IPv6 Addressing Format of IPv6 addressing Network Prefix and Interface ID Address Types of IPV6:<\/p>\n<p>Global Unicast Addresses Unique Local Addresses Link Local Addresses Multicast Addresses<\/p>\n<p>Basic Lab Setup with Cisco and Huawei Devices<\/p>\n<p>LAN and WAN cables Practice &amp; Evaluation<\/td>\n<td rowspan=\"2\" width=\"115\"><\/td>\n<\/tr>\n<tr>\n<td width=\"75\"><strong>Day 5<\/strong><\/td>\n<td width=\"288\">Introduction to terminal applications such as Putty, Hyper terminal and Secure CRT etc.<\/p>\n<p>LAN switching operations<\/p>\n<p>Physical Overview of Routers and Switches. How to access network devices locally.<\/p>\n<p>Difference between local and remote access.<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"2\" width=\"70\"><strong>Week 4<\/strong><\/td>\n<td rowspan=\"2\" width=\"133\"><strong>Advanced Configurations Of Cisco IOS and Huawei VRP<\/strong><\/td>\n<td width=\"75\"><strong>Day 1<\/strong><\/td>\n<td width=\"288\">Introduction to Virtualization &#8211; the Backbone Technology of Cloud Computing<\/p>\n<p>Virtualization: Definition, Concepts, History, and Relationship to Cloud Computing<\/p>\n<p>Virtualization: Benefits, Challenges, Risks, and Suitability to Organizations<\/p>\n<p>Hypervisor: Role and Purpose in Virtualization and Various Hypervisor Types<\/p>\n<p>Virtualization: Terminologies and the different Types of Virtualization<\/td>\n<td rowspan=\"2\" width=\"115\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>\u00b7 <strong>Task 4<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><em><u>Details may be<\/u> <u>seen at<\/u> <u>Annexure-I<\/u><\/em><\/td>\n<\/tr>\n<tr>\n<td width=\"75\"><strong>Day 2<\/strong><\/td>\n<td width=\"288\">vSphere Virtual Infrastructure<\/p>\n<p>Describe the benefits of using virtual machines<\/p>\n<p>Explain the similarities and differences between physical architectures and virtual architectures<\/p>\n<p>Define the purpose of ESXi<\/p>\n<p>Define the purpose of vCenter Server<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"3\" width=\"69\"><\/td>\n<td rowspan=\"3\" width=\"124\"><\/td>\n<td width=\"81\"><strong>Day 3<\/strong><\/td>\n<td width=\"296\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Installing vSphere Components<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Installation of ESXi<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Configuring ESXi services<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Introduction to Compute Virtualization<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Network Architecture for Virtualization Physical Network for Virtualization<\/td>\n<td rowspan=\"3\" width=\"111\"><\/td>\n<\/tr>\n<tr>\n<td width=\"81\"><strong>Day 4<\/strong><\/td>\n<td width=\"296\">Introduction to Cisco IOS and CLI. Initial Configuration of Cisco IOS.<\/p>\n<p>Introduction of different modes of Cisco IOS. Configure and verify clock Configure and verify hostname. Configure and verify user access verification or login password Configure and verify enable password Configure and verify enable secret Learn how to modify, copy, write and erase configuration.<\/p>\n<p>Verify running-config and startup-config<\/td>\n<\/tr>\n<tr>\n<td width=\"81\"><strong>Day 5<\/strong><\/td>\n<td width=\"296\">Create username, password and their privileges<\/p>\n<p>Create username, password and their privileges in Huawei VRP<\/p>\n<p>How to configure and troubleshoot Ethernet and Serial interfaces.<\/p>\n<p>Configure description on interfaces. Configure ipv4 and ipv6 addresses on interfaces.<\/p>\n<p>Configure Keepalive, clock rate and encapsulation on interfaces.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"2\" width=\"71\"><strong>Week 5<\/strong><\/td>\n<td rowspan=\"2\" width=\"123\"><strong>Basic Routing<\/strong><\/td>\n<td width=\"77\"><strong>Day 1<\/strong><\/td>\n<td width=\"293\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Identify the files that make up a virtual machine<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Discuss the latest virtual machine hardware and its features<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Describe virtual machine CPU, memory, disk, and network resource usage<\/p>\n<p>Explain the importance of VMware Tools\u2122<\/td>\n<td rowspan=\"2\" width=\"117\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>\u00b7 <strong>Task 5<\/strong><\/p>\n<p><em><u>Details may be<\/u> <u>seen at<\/u> <u>Annexure-I<\/u><\/em><\/td>\n<\/tr>\n<tr>\n<td width=\"77\"><strong>Day 2<\/strong><\/td>\n<td width=\"293\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Overview<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Deploy and configure vCenter Server Appliance<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Use vSphere Web Client<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Backup and restore vCenter Server<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 vCenter Server permissions and roles<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 vSphere HA architectures and features<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 vSphere authentication proxy<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Manage vCenter Server inventory objects and licenses<\/p>\n<p>Access and navigate the new vSphere clients<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"2\" width=\"68\"><\/td>\n<td rowspan=\"2\" width=\"122\"><\/td>\n<td width=\"81\"><strong>Day 3<\/strong><\/td>\n<td width=\"300\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Use templates and cloning to deploy new virtual machines<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Modify and manage virtual machines<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Clone a virtual machine<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Upgrade virtual machine hardware to version 12<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Remove virtual machines from the vCenter Server inventory and datastore<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Customize a new virtual machine using customization specification files<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Perform vSphere vMotion and vSphere Storage vMotion migrations<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Create and manage virtual machine snapshots<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Create, clone, and export vApps<\/p>\n<p>Introduce the types of content libraries and how to deploy and use them<\/td>\n<td rowspan=\"2\" width=\"110\"><\/td>\n<\/tr>\n<tr>\n<td width=\"81\"><strong>Day 4<\/strong><\/td>\n<td width=\"300\">Remote-access with TELNET and SSH. Introduction to DHCP.<\/p>\n<p>How to configure DHCP on Cisco IOS Understand next hop.<\/p>\n<p>Practice &amp; Evaluation<\/p>\n<p>How to configure next hop with: Outgoing interface<\/p>\n<p>Next Hop IP address Practice &amp; Evaluation<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"71\"><\/td>\n<td width=\"127\"><\/td>\n<td width=\"77\"><strong>Day 5<\/strong><\/td>\n<td width=\"289\">Revision &amp; Motivational Talk<\/p>\n<p>Introduction to Routing for reachability. Understand static routing.<\/p>\n<p>Configure and verify static routing for IPv4 Introduction to Dynamic Routing<\/p>\n<p>Types of routing protocols Evaluation<\/p>\n<p>Define IGP &amp; EGP<\/p>\n<p>Evaluation<\/td>\n<td width=\"117\"><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"2\" width=\"71\"><strong>Week 6<\/strong><\/td>\n<td rowspan=\"2\" width=\"127\"><strong>Mid Term Exam Network Services and IOS Features Routing Protocols<\/strong><\/td>\n<td width=\"77\"><strong>Day 1<\/strong><\/td>\n<td width=\"289\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Explain the vSphere HA architecture<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Configure and manage a vSphere HA cluster<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Use vSphere HA advanced parameters<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Define cluster-wide restart ordering capabilities<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Enforce infrastructural or intra-app dependencies during failover<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Describe vSphere HA heartbeat networks and datastore heartbeats<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Introduce vSphere Fault Tolerance<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Enable vSphere Fault Tolerance on virtual machines<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Examine enhanced consolidation of vSphere Fault Tolerance virtual machines<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Introduce vSphere Replication<\/p>\n<p>Use vSphere Data Protection to back up and restore data<\/td>\n<td rowspan=\"2\" width=\"117\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>\u00b7\u00a0 <strong>Task 6<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><em><u>Details may be<\/u> <u>seen at<\/u> <u>Annexure-I<\/u><\/em><\/td>\n<\/tr>\n<tr>\n<td width=\"77\"><strong>Day 2<\/strong><\/td>\n<td width=\"289\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Identity and Access Management<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Data Classification<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Data Security Lifecycle<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Motivational Talk<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Describe cloud security reference architecture<\/p>\n<p>Understand design principles of secure cloud computing<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"68\"><\/td>\n<td width=\"122\"><\/td>\n<td width=\"81\"><strong>Day 3<\/strong><\/td>\n<td width=\"302\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Review Traditional Computing Challenges and Concerns<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Cloud Computing Concept, History, and Definitions<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Cloud Reference Architecture<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Advantages of Cloud Business Model<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Introduction of Public cloud<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Public cloud Vendors Public cloud types<\/td>\n<td width=\"109\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"2\" width=\"68\"><\/td>\n<td rowspan=\"2\" width=\"123\"><\/td>\n<td width=\"81\"><strong>Day 4<\/strong><\/td>\n<td width=\"299\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Interior gateway protocols:<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 RIP: Routing Information Protocol OSPF: Open Shortest Path First<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 IS-IS: Intermediate System to Intermediate System Evaluation<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Exterior Gateway protocols:<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 BGP: Border Gateway Protocol<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Evaluation<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Administrative Distance or preference of routing methods.<\/p>\n<p>Configure and verify Default Routing<\/td>\n<td rowspan=\"2\" width=\"110\"><\/td>\n<\/tr>\n<tr>\n<td width=\"81\"><strong>Day 5<\/strong><\/td>\n<td width=\"299\"><strong>Configure and verify CDP Evaluation<\/strong><\/p>\n<p><strong>Configure and verify NTP: Network Time Protocol<\/strong><\/p>\n<p><strong>Evaluation Password Recovery Evaluation<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>MID Term<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"3\" width=\"71\"><strong>Week 7<\/strong><\/td>\n<td rowspan=\"3\" width=\"133\"><strong>IP Traffic Management &amp; Security<\/strong><\/p>\n<p><strong>On Cisco &amp; Huawei<\/strong><\/td>\n<td width=\"76\"><strong>Day 1<\/strong><\/td>\n<td width=\"287\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Introduction to Microsoft Office365 &amp; Azure Cloud<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Introduction to Office 365 Plans Provisioning Tenants<\/td>\n<td rowspan=\"3\" width=\"116\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>\u00b7\u00a0 <strong>Task 7<\/strong><\/p>\n<p><em><u>Details may be<\/u> <u>seen at<\/u> <u>Annexure-I<\/u><\/em><\/td>\n<\/tr>\n<tr>\n<td width=\"76\"><strong>Day 2<\/strong><\/td>\n<td width=\"287\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Managing Users, Groups, and Licenses<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 by Using the Administration Center<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Manage Security and Distribution Groups Manage Security and Distribution Groups<\/td>\n<\/tr>\n<tr>\n<td width=\"76\"><strong>Day 3<\/strong><\/td>\n<td width=\"287\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Manage Administrator Roles in Office 365<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Configure Password Management<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Manage IT Deployments of Office 365 Pro Plus<\/p>\n<p>Add and Configure Custom Domains<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"2\" width=\"71\"><\/td>\n<td rowspan=\"2\" width=\"133\"><\/td>\n<td width=\"76\"><strong>Day 4<\/strong><\/td>\n<td width=\"286\">Configure and verify CDP Evaluation<\/p>\n<p>Configure and verify NTP: Network Time Protocol<\/p>\n<p>Evaluation Password Recovery Evaluation<\/td>\n<td rowspan=\"2\" width=\"116\"><\/td>\n<\/tr>\n<tr>\n<td width=\"76\"><strong>Day 5<\/strong><\/td>\n<td width=\"286\">Introduction to Access Control List Evaluation<\/p>\n<p>Configure and verify standard ACL Configure and verify extended ACL Evaluation<\/p>\n<p>Contiguous and dis-contiguous wildcard mask Implement named and numbered ACL<\/td>\n<\/tr>\n<tr>\n<td width=\"71\"><strong>Week 8<\/strong><\/td>\n<td width=\"133\"><strong>Job Search &amp; Entrepreneurial Skills (Search Jobs in at least two labor marketplace countries)<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Deep Dive into Dynamic Routing<\/strong><\/td>\n<td width=\"76\"><strong>Day 1<\/strong><\/td>\n<td width=\"286\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Prepare On-premises Active Directory for DirSync<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Manage Active Directory Users and Groups with DirSync In Place<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Prepare on-premises Active Directory for DirSync<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Set up DirSync<\/p>\n<p>Manage Active Directory Users and Groups with DirSync in place<\/td>\n<td width=\"116\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>\u00b7\u00a0 <strong>Task 8<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><em><u>Details may be<\/u> <u>seen at<\/u> <u>Annexure-I<\/u><\/em><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"2\" width=\"68\"><\/td>\n<td rowspan=\"2\" width=\"122\"><\/td>\n<td width=\"81\"><strong>Day 2<\/strong><\/td>\n<td width=\"300\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Introduction to Microsoft Azure Cloud<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Azure Foundations<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Azure Marketplace<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Azure Portal<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Azure CLI<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Cloud Shell<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Footprint and Structure<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Azure Services<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Compute<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Networking<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Storage<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Web and Mobile<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Databases<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Data and Analytics<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Enterprise Integration<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Security and Identity Monitoring and Management<\/td>\n<td rowspan=\"2\" width=\"110\"><\/td>\n<\/tr>\n<tr>\n<td width=\"81\"><strong>Day 3<\/strong><\/td>\n<td width=\"300\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Introduction<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Regions and Availability Zones<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Resource Groups and Azure Resource Manager<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Lab: Creating Azure Resources<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Compute \u2013 Azure<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Introduction<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Virtual Machines<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Scale Sets<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 App Service<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Azure Container Instances<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Azure Kubernetes Service<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Functions<\/p>\n<p>Lab: Azure App Services<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"2\" width=\"68\"><\/td>\n<td rowspan=\"2\" width=\"123\"><\/td>\n<td width=\"81\"><strong>Day 4<\/strong><\/td>\n<td width=\"298\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Introduction to public and private IP addresses<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Evaluation<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Introduction to NAT and PAT. Configure and verify network address translation<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Evaluation<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Configure and verify PAT\/NAT- overloading<\/td>\n<td rowspan=\"2\" width=\"111\"><\/td>\n<\/tr>\n<tr>\n<td width=\"81\"><strong>Day 5<\/strong><\/td>\n<td width=\"298\">OSPF: Open Shortest Path First Link State Algorithm Evaluation<\/p>\n<p>OSPF Process-id. OSPF Router-id.<\/p>\n<p>Configure Loopback Interfaces OSPF Area-id.<\/p>\n<p>OSPF contiguous wildcard mask OSPF Metric: cost<\/p>\n<p>OSPF Tables:<\/p>\n<p>Evaluation<\/p>\n<p>Configure and verify single area OSPF<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"2\" width=\"69\"><strong>Week 9<\/strong><\/td>\n<td rowspan=\"2\" width=\"125\"><strong>OSPF &amp; Policy Based Routing<\/strong><\/td>\n<td width=\"73\"><strong>Day 1<\/strong><\/td>\n<td width=\"300\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Networking -Azure<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Introduction<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Virtual Network<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Load Balancer<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 VPN Gateway<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Application Gateway<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Content Delivery Network<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Creating a Virtual Network Connection<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Create Network in Azure Portal<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 IP Addressing Motivational Talk<\/td>\n<td rowspan=\"2\" width=\"114\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>\u00b7\u00a0 <strong>Task 9<\/strong><\/p>\n<p><em><u>Details may be<\/u> <u>seen at<\/u> <u>Annexure-I<\/u><\/em><\/td>\n<\/tr>\n<tr>\n<td width=\"73\"><strong>Day 2<\/strong><\/td>\n<td width=\"300\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Private DNS<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Demo: Public DNS<\/p>\n<p>Demo: Static Private and Public IP<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"3\" width=\"68\"><\/td>\n<td rowspan=\"3\" width=\"123\"><\/td>\n<td width=\"81\"><strong>Day 3<\/strong><\/td>\n<td width=\"299\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Introduction<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Securing Network Connectivity<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Azure Security Center<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Key Vault<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Azure Information Protection<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0 \u00a0 Advanced Threat Protection Azure Key Vault<\/td>\n<td rowspan=\"3\" width=\"110\"><\/td>\n<\/tr>\n<tr>\n<td width=\"81\"><strong>Day 4<\/strong><\/td>\n<td width=\"299\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Design and implement multiple area OSPF.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Regular and transit area.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Evaluation<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Define Internal Router, Backbone Router, Backbone Internal Router, Area Border Router and ASBR.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Practice &amp; Evaluation<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Introduce and configure redistribution. Define seed\/external metric.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Type 1 and Type 2 seed metric.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Evaluation<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Static routes with null-0 for testing. Practice &amp; Evaluation<\/td>\n<\/tr>\n<tr>\n<td width=\"81\"><strong>Day 5<\/strong><\/td>\n<td width=\"299\">Revision &amp; Motivational Talk Introduction to PBR tools: Route-map<\/p>\n<p>IP prefix-list Distribute-list ACL OSPF neighbor states<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"3\" width=\"67\"><strong>Week 10<\/strong><\/td>\n<td rowspan=\"3\" width=\"131\"><strong>Introduction to Azure<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>AZure Design constraints and Managing<\/strong><\/td>\n<td width=\"70\"><strong>Day 1<\/strong><\/td>\n<td width=\"300\">Introduction Internet of Things Big Data<\/p>\n<p>Artificial Intelligence Serverless<\/p>\n<p>DevOps Using Azure AI<\/td>\n<td rowspan=\"3\" width=\"113\"><strong>\u00a0<\/strong><\/p>\n<p>\u00b7 <strong>Task 10<\/strong><\/p>\n<p><em><u>Details may be<\/u> <u>seen at<\/u> <u>Annexure-I<\/u><\/em><\/td>\n<\/tr>\n<tr>\n<td width=\"70\"><strong>Day 2<\/strong><\/td>\n<td width=\"300\">Introduction Identity Services<\/p>\n<p>Azure Active Directory Multi-Factor Authentication Azure Active Directory Create Azure AD Tenant Create Users and Groups<\/p>\n<p>Self-Service Password Reset<\/td>\n<\/tr>\n<tr>\n<td width=\"70\"><strong>Day 3<\/strong><\/td>\n<td width=\"300\">Database &#8211; Azure Introduction Cosmos DB Azure SQL<\/p>\n<p>Azure Database for MySQL Azure Database for PostgreSQL Database Migration Services<\/p>\n<p>Creating Cosmos DB<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"2\" width=\"69\"><\/td>\n<td rowspan=\"2\" width=\"131\"><\/td>\n<td width=\"74\"><strong>Day 4<\/strong><\/td>\n<td width=\"291\">OSPF over multi-access networks<\/p>\n<p>DR, BDR and DRO roles in multi-access networks<\/p>\n<p>Evaluation<\/p>\n<p>Introducing OSPF LSA types 1 to 7.<\/p>\n<p>Practice &amp; Evaluation<\/td>\n<td rowspan=\"2\" width=\"116\"><\/td>\n<\/tr>\n<tr>\n<td width=\"74\"><strong>Day 5<\/strong><\/td>\n<td width=\"291\">Regular area types:<\/p>\n<p>Stub Area<\/p>\n<p>Totally Stubby area Evaluation<\/p>\n<p>NSSA: Not So Stubby Area Totally NSSA<\/p>\n<p>Configure and verify OSPF Virtual Links. Practice and Evaluation<\/td>\n<\/tr>\n<tr>\n<td width=\"69\"><strong>Week 11<\/strong><\/td>\n<td width=\"131\"><strong>Storage \u2013 Azure<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Azure Operations<\/strong><\/td>\n<td width=\"74\"><strong>Day 1<\/strong><\/td>\n<td width=\"291\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Introduction<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Blob<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Disk<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 File<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Archive<\/p>\n<p>Creating a Storage Account<\/td>\n<td width=\"116\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>\u00b7 <strong>Task 11 <\/strong><em><u>Details may be<\/u> <u>seen at<\/u> <u>Annexure-I<\/u><\/em><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"2\" width=\"68\"><\/td>\n<td rowspan=\"2\" width=\"123\"><\/td>\n<td width=\"81\"><strong>Day 2<\/strong><\/td>\n<td width=\"299\">Introduction<\/p>\n<p>Manage Azure VM Storage VM Storage Overview Demo: Add Disk<\/p>\n<p>Manage disks Practice &amp; Evaluation<\/td>\n<td rowspan=\"2\" width=\"110\"><\/td>\n<\/tr>\n<tr>\n<td width=\"81\"><strong>Day 3<\/strong><\/td>\n<td width=\"299\">Creating azure storage for Local and cloud users<\/p>\n<p>Manage private network disk setups Configure online and on site network drives<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td rowspan=\"2\" width=\"69\"><\/td>\n<td rowspan=\"2\" width=\"127\"><\/td>\n<td width=\"74\"><strong>Day 4<\/strong><\/td>\n<td width=\"286\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Configure and verify OSPF Virtual Links. Practice and Evaluation<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Continuous and discontinuous OSPF backbones.<\/p>\n<p>Practice and Evaluation<\/td>\n<td rowspan=\"2\" width=\"125\"><\/td>\n<\/tr>\n<tr>\n<td width=\"74\"><strong>Day 5<\/strong><\/td>\n<td width=\"286\">OSPF filters:<\/p>\n<p>IP prefix-lists Evaluation Area filters Evaluation Passive interface<\/p>\n<p>Evaluation<\/p>\n<p>Route summarization Evaluation authentication<\/td>\n<\/tr>\n<tr>\n<td width=\"69\"><strong>Week 12<\/strong><\/td>\n<td width=\"127\"><strong>Connectivity <\/strong><strong>between Virtual Networks \u2013 Azure<\/strong><\/td>\n<td width=\"74\"><strong>Day 1<\/strong><\/td>\n<td width=\"286\">Connectivity between Virtual Networks \u2013 Azure Hybrid Connectivity Options<\/p>\n<p>Routes and VNET Peering Routing and Peering Hybrid Scenarios<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>LAB &amp; Evaluation<\/td>\n<td width=\"125\"><strong>\u00a0<\/strong><\/p>\n<p>\u00b7 <strong>Task 12<\/strong><\/p>\n<p><em><u>Details may be<\/u> <u>seen at<\/u> <u>Annexure-I<\/u><\/em><\/p>\n<p><strong>Final Project<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"7\" width=\"699\"><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"12\"><\/td>\n<td rowspan=\"4\" width=\"64\"><\/td>\n<td rowspan=\"4\" width=\"114\"><\/td>\n<td width=\"78\"><strong>Day 2<\/strong><\/td>\n<td width=\"312\">Create and Configure Network Security Group (NSG) \u2013 Azure<\/p>\n<p>Create Network Security Groups Configure Network Security Groups ncy<\/td>\n<td rowspan=\"4\" width=\"103\"><\/td>\n<td rowspan=\"4\" width=\"16\"><\/td>\n<\/tr>\n<tr>\n<td width=\"78\"><strong>Day 3<\/strong><\/td>\n<td width=\"312\">Privacy, Compliance and Trust<\/p>\n<p>Introduction Governance Azure Monitor<\/p>\n<p>Azure Service Health Compliance<\/p>\n<p>Privacy Trust<\/p>\n<p>Lab: Using Azure Monitor<\/p>\n<p>Evaluation<\/td>\n<\/tr>\n<tr>\n<td width=\"78\"><strong>Day 4<\/strong><\/td>\n<td width=\"312\">Revision &amp; Motivational Talk Introduction to EGP<\/p>\n<p>Evaluation<\/p>\n<p>Historical Background Introduction to Multihoming Evaluation<\/p>\n<p>BGP fundamentals. Internal and External BGP. Evaluation<\/p>\n<p>BGP attributes: Weight Practice &amp; Evaluation<\/td>\n<\/tr>\n<tr>\n<td width=\"78\"><strong>Day 5<\/strong><\/td>\n<td width=\"312\">Local preference<\/p>\n<p>Evaluation As-path Evaluation Router-id BGP route-summarization<\/p>\n<p>PBR with BGP attributes and PBR tools Evaluation<\/p>\n<p>Full Mesh i-BGP<\/p>\n<p>Route-reflector configuration BGP configuration best practices Evaluation<\/p>\n<p>BGP authentication<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong><u>Tasks for Certificate in AI (Robotics)<\/u><\/strong><\/p>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"59\"><strong>Task No.<\/strong><\/td>\n<td width=\"179\"><strong>Task<\/strong><\/td>\n<td width=\"361\"><strong>Description<\/strong><\/td>\n<td width=\"82\"><strong>Week<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"59\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>1.<\/strong><\/td>\n<td width=\"179\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Cisco Binary Game Link is given on Page4.<\/strong><\/p>\n<p><strong>Revise OSI and TCP\/IP Models<\/strong><\/p>\n<p><strong>Cloud subscriptions<\/strong><\/td>\n<td width=\"361\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>\u00b7<\/td>\n<td width=\"82\"><\/td>\n<\/tr>\n<tr>\n<td width=\"59\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>2.<\/strong><\/td>\n<td width=\"179\"><strong>Solve IPv4 Addressing MCQs IPv6 Question will be given to identify their types Candidates are required to<\/strong><\/p>\n<p><strong>identify types of MAC addresses in the class Creation of public accounts<\/strong><\/p>\n<p><strong>Managing cloud users<\/strong><\/td>\n<td width=\"361\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 PDF file will be given in the class containing 20 questions to practice IP addressing.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Creation of public accounts Managing cloud users Installation &amp; Virtualization and Various Hypervisor Types<\/td>\n<td width=\"82\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Week 2<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"59\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>3.<\/strong><\/td>\n<td width=\"179\"><strong>Basic Configuration Installation of ESXi Configuring ESXi services<\/strong><\/td>\n<td width=\"361\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Configure and verify clock Configure and verify hostname.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Configure and verify user access verification or login password<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Configure and verify enable password Configure and verify enable secret<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Learn how to modify, copy, write and erase configuration.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Verify running-config and startup-config<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Create username, password and their privileges Configure banners:<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 motd login exec<\/p>\n<p>Installation of ESXi Configuring ESXi services<\/td>\n<td width=\"82\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Week 3<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"59\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>4.<\/strong><\/td>\n<td width=\"179\"><strong>Advanced<\/strong><\/p>\n<p><strong>Configurations <\/strong><strong>Of Cisco IOS and Huawei VRP Create<\/strong><\/p>\n<p><strong>Centralized Storage vs. Distributed Storage<\/strong><\/td>\n<td width=\"361\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 configure and troubleshoot Ethernet and Serial interfaces.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Configure description on interfaces.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Configure ipv4 and ipv6 addresses on interfaces. Configure Keepalive, clock rate and encapsulation on interfaces.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Verify connectivity with test traffic.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Use of ping command and understand output. Impact of round-trip time.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Remote-access with TELNET and SSH. Configure DNS. Configure DHCP on Cisco IOS and Huawei VRP Creat<\/p>\n<p>Centralized Storage vs. Distributed Storage<\/td>\n<td width=\"82\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Week 4<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"59\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>5.<\/strong><\/td>\n<td width=\"179\">Basic Routing<\/p>\n<p>Create Backup and restore Backup<\/td>\n<td width=\"361\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Configure next hop with: Outgoing interface<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Next Hop IP address<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Configure and verify static routing for IPv4 Configure and verify Default Routing.<\/p>\n<p>Configure and verify DHCP Relay Agent.<\/td>\n<td width=\"82\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Week 5<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"60\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>6.<\/strong><\/td>\n<td width=\"168\"><\/td>\n<td width=\"369\">IOS and Configuration Backup with TFTP Configure and verify CDP<\/p>\n<p>Configure and verify LLDP<\/p>\n<p>Configure and verify NTP: Network Time Protocol Password Recovery<\/p>\n<p>Configure and verify Embedded Event Manager: EEM Configure KRON Scheduler Configure and verify SYSLOG<\/p>\n<p>Creating virtual machine, Clone &amp; templates<\/td>\n<td width=\"85\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Week 6<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"60\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>7.<\/strong><\/td>\n<td width=\"168\"><strong>Network Services and IOS Features<\/strong><\/p>\n<p><strong>Creating virtual machine, Clone &amp; templates<\/strong><\/p>\n<p><strong>IP Traffic Management &amp; Security On Cisco &amp; Huawei<\/strong><\/p>\n<p><strong>Describe vSphere architecture &amp; vSphere<\/strong><\/p>\n<p><strong>cluster<\/strong><\/td>\n<td width=\"369\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Configure and verify standard ACL Configure and verify extended ACL Implement named and numbered ACL Configure and verify network address translation Configure and verify PAT\/NAT-overloading Describe vSphere architecture &amp; vSphere cluster<\/td>\n<td width=\"85\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Week 7<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"60\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>8.<\/strong><\/td>\n<td width=\"168\"><strong>Deep Dive into Dynamic<\/strong><\/p>\n<p><strong>Routing Creating &amp; Managing Virtual Machine in Azure Portal<\/strong><\/td>\n<td width=\"369\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Configure and verify single area OSPF. Design and<\/p>\n<p>implement multiple area OSPF. Introduce and configure redistribution.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Configure seed\/external metric. Configure Type 1 and Type 2 seed metric.<\/p>\n<p>Configure Static routes with null-0 for testing. Creating &amp;<\/p>\n<p>Managing Virtual Machine in Azure Portal<\/td>\n<td width=\"85\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Week 8<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"60\"><strong>\u00a0<\/strong><\/p>\n<p><strong>9.<\/strong><\/td>\n<td width=\"168\"><strong>OSPF &amp; Policy Based Routing Create azure<\/strong><\/p>\n<p><strong>firewall<\/strong><\/td>\n<td width=\"369\">Industry Scenario-1 to implement PBR Industry Scenario-2 to implement PBR Create azure firewall<\/td>\n<td width=\"85\"><strong>\u00a0<\/strong><\/p>\n<p><strong>Week 9<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"60\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>10.<\/strong><\/td>\n<td width=\"168\"><strong>AWS login and feature explore<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>AWS<\/strong><\/p>\n<p><strong>Operation on Portal Project<\/strong><\/td>\n<td width=\"369\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 . Create free login on AWS Web Portal Explore EC2 instance Explore EC2 Load Balancing on Amazon Web portal Dynamic scaling and policies of autoscaling Implement a Project<\/p>\n<p>as per instructor<\/td>\n<td width=\"85\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Week10<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"60\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>11.<\/strong><\/td>\n<td width=\"168\"><strong>AWS<\/strong><\/p>\n<p><strong>Storage Management AWS Basic Security Features Create VPC and Database management<\/strong><\/td>\n<td width=\"369\">\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Explore how to create, delete, Mounting and unmounting EBS<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 volume. Practices on AWS Storage management.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Protect the cloud by implementing the different techniques, like Identity Access Management (IAM) Creating Users and Groups, Applying policies, Password Policy, Roles, AWS Security Management, Security Practices for<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Cloud Deployment and AWS Responsibilities and Securities.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Crete VPC Cloud on AWS and implement the all technique of database<\/td>\n<td width=\"85\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Week11<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"60\"><strong>\u00a0<\/strong><\/p>\n<p><strong>12.<\/strong><\/td>\n<td width=\"168\"><strong>AWS<\/strong><\/p>\n<p><strong>Managerial tools Disaster Management Policies<\/strong><\/td>\n<td width=\"369\">Explore all management tools on by one in AWS Implement the different disaster management policies like How to manage Disaster Recovery and Backups, DR and Backups, AWS High<\/p>\n<p>Availability Design<\/td>\n<td width=\"85\"><strong>\u00a0<\/strong><\/p>\n<p><strong>Week12<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>\u00a0<\/strong><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;full_width_content&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; equal_height=&#8221;yes&#8221; content_placement=&#8221;top&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; top_padding=&#8221;4%&#8221; bottom_padding=&#8221;4%&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; class=&#8221;contact-form-with-img&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_color=&#8221;#406f5b&#8221; shape_divider_position=&#8221;bottom&#8221; shape_divider_height=&#8221;100&#8243; shape_divider_bring_to_front=&#8221;true&#8221; bg_image_animation=&#8221;none&#8221; shape_type=&#8221;waves&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; zindex=&#8221;-999999999&#8243; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;5\/12&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; bg_image_animation=&#8221;none&#8221;][image_with_animation image_url=&#8221;2806&#8243; animation=&#8221;Fade In&#8221; hover_animation=&#8221;none&#8221; alignment=&#8221;&#8221; border_radius=&#8221;none&#8221; box_shadow=&#8221;none&#8221; image_loading=&#8221;default&#8221; max_width=&#8221;100%&#8221; max_width_mobile=&#8221;default&#8221; el_class=&#8221;img-side-contact&#8221;][\/vc_column][vc_column column_padding=&#8221;padding-6-percent&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;left-right&#8221; top_margin_phone=&#8221;4%&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;7\/12&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; bg_image_animation=&#8221;none&#8221;][vc_custom_heading text=&#8221;Quick Inquiry&#8221; font_container=&#8221;tag:h2|font_size:36|text_align:left|color:%23000000|line_height:1.2&#8243; google_fonts=&#8221;font_family:Montserrat%3Aregular%2C700|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css=&#8221;.vc_custom_1677876449507{margin-bottom: 3% !important;padding-top: 4% !important;}&#8221; el_id=&#8221;contact&#8221;][vc_column_text]\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f121-o1\" lang=\"en-US\" dir=\"ltr\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/systems\/wp-json\/wp\/v2\/pages\/6477#wpcf7-f121-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<div style=\"display: none;\">\n<input type=\"hidden\" name=\"_wpcf7\" value=\"121\" \/>\n<input type=\"hidden\" name=\"_wpcf7_version\" value=\"5.9.8\" \/>\n<input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/>\n<input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f121-o1\" \/>\n<input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/>\n<input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/div>\n<div class=\"col-2\">\n\t<p><i class=\"fa fa-user-o\" aria-hidden=\"true\"><\/i><span class=\"wpcf7-form-control-wrap\" data-name=\"full-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Enter Full Name\" value=\"\" type=\"text\" name=\"full-name\" \/><\/span><i class=\"fa fa-envelope\"><\/i><span class=\"wpcf7-form-control-wrap\" data-name=\"email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Enter Full Email\" value=\"\" type=\"email\" name=\"email\" \/><\/span>\n\t<\/p>\n<\/div>\n<div class=\"col-2\">\n\t<p><i class=\"fa fa-volume-control-phone\" aria-hidden=\"true\"><\/i><span class=\"wpcf7-form-control-wrap\" data-name=\"Phone\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Enter Your Phone\" value=\"\" type=\"tel\" name=\"Phone\" \/><\/span><i class=\"fa fa-comment-o\" aria-hidden=\"true\"><\/i><span class=\"wpcf7-form-control-wrap\" data-name=\"services\"><select class=\"wpcf7-form-control wpcf7-select wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" name=\"services\"><option value=\"Choose Course\">Choose Course<\/option><option value=\"CCNA\">CCNA<\/option><option value=\"CCNP\">CCNP<\/option><option value=\"CCIE\">CCIE<\/option><option value=\"HCIA\">HCIA<\/option><option value=\"HCIP\">HCIP<\/option><option value=\"HCIE\">HCIE<\/option><option value=\"MCSA\">MCSA<\/option><option value=\"MCITP\">MCITP<\/option><option value=\"MCSE\">MCSE<\/option><option value=\"Hyper-V\">Hyper-V<\/option><option value=\"Microsoft Azure\">Microsoft Azure<\/option><option value=\"AWS Associate\">AWS Associate<\/option><option value=\"AWS Professional\">AWS Professional<\/option><option value=\"Dev Ops\">Dev Ops<\/option><option value=\"JNCIA ENT\">JNCIA ENT<\/option><option value=\"JNCIP ENT\">JNCIP ENT<\/option><option value=\"Juniper Firewall\">Juniper Firewall<\/option><option value=\"VCP Data Center Virtualization\">VCP Data Center Virtualization<\/option><option value=\"RHCE\">RHCE<\/option><option value=\"RHCSA\">RHCSA<\/option><option value=\"RHCSA in OpenStack\">RHCSA in OpenStack<\/option><option value=\"RHCVA\">RHCVA<\/option><option value=\"SEO\">SEO<\/option><option value=\"Graphic Designing\">Graphic Designing<\/option><option value=\"Structured Cabling\">Structured Cabling<\/option><option value=\"Ethical Hacking\">Ethical Hacking<\/option><option value=\"Optical Fiber Networking\">Optical Fiber Networking<\/option><option value=\"Web Development\">Web Development<\/option><option value=\"Mobile App Development\">Mobile App Development<\/option><option value=\"ITIL\">ITIL<\/option><option value=\"CISSP\">CISSP<\/option><option value=\"Digital Marketing\">Digital Marketing<\/option><option value=\"CISA\">CISA<\/option><option value=\"CEH\">CEH<\/option><option value=\"Palo Alto Firewall\">Palo Alto Firewall<\/option><option value=\"Artificial Intelligence\">Artificial Intelligence<\/option><option value=\"F5 BIG-IP LTM\">F5 BIG-IP LTM<\/option><option value=\"Advance Python\">Advance Python<\/option><option value=\"Fortinet Firewall\">Fortinet Firewall<\/option><\/select><\/span>\n\t<\/p>\n<\/div>\n<div>\n\t<p><i class=\"fas fa-comment-alt-lines\" aria-hidden=\"true\"><\/i><span class=\"wpcf7-form-control-wrap\" data-name=\"message\"><textarea cols=\"40\" rows=\"10\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea\" aria-invalid=\"false\" placeholder=\"Would you like to add more?\" name=\"message\"><\/textarea><\/span>\n\t<\/p>\n<\/div>\n<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"inquire now\" \/>\n<\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n[\/vc_column_text][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;full_width_background&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; bg_color=&#8221;#cc3036&#8243; scene_position=&#8221;center&#8221; top_padding=&#8221;2%&#8221; bottom_padding=&#8221;2%&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221;&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":6325,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cloud Computing Microsoft Azure Outline | Corvit Systems<\/title>\n<meta name=\"description\" content=\"Explore our comprehensive Cloud Computing with Microsoft Azure course outline. Gain expertise in Azure services, networking, and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/corvit.com\/systems\/navttc-courses-outlines\/cloud-computing-microsoft-azure-outline\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud Computing Microsoft Azure Outline | Corvit Systems\" \/>\n<meta property=\"og:description\" content=\"Explore our comprehensive Cloud Computing with Microsoft Azure course outline. Gain expertise in Azure services, networking, and more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/corvit.com\/systems\/navttc-courses-outlines\/cloud-computing-microsoft-azure-outline\/\" \/>\n<meta property=\"og:site_name\" content=\"Corvit\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corvittraining\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-22T07:23:51+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"22 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/corvit.com\/systems\/navttc-courses-outlines\/cloud-computing-microsoft-azure-outline\/\",\"url\":\"https:\/\/corvit.com\/systems\/navttc-courses-outlines\/cloud-computing-microsoft-azure-outline\/\",\"name\":\"Cloud Computing Microsoft Azure Outline | Corvit Systems\",\"isPartOf\":{\"@id\":\"https:\/\/corvit.com\/systems\/#website\"},\"datePublished\":\"2024-05-04T10:11:32+00:00\",\"dateModified\":\"2024-05-22T07:23:51+00:00\",\"description\":\"Explore our comprehensive Cloud Computing with Microsoft Azure course outline. Gain expertise in Azure services, networking, and more.\",\"breadcrumb\":{\"@id\":\"https:\/\/corvit.com\/systems\/navttc-courses-outlines\/cloud-computing-microsoft-azure-outline\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/corvit.com\/systems\/navttc-courses-outlines\/cloud-computing-microsoft-azure-outline\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/corvit.com\/systems\/navttc-courses-outlines\/cloud-computing-microsoft-azure-outline\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/corvit.com\/systems\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NAVTTC Course Outlines\",\"item\":\"https:\/\/corvit.com\/systems\/navttc-courses-outlines\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cloud Computing Microsoft Azure Outline\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/corvit.com\/systems\/#website\",\"url\":\"https:\/\/corvit.com\/systems\/\",\"name\":\"Corvit Systems\",\"description\":\"Best IT Certification Training Institute in Lahore\",\"publisher\":{\"@id\":\"https:\/\/corvit.com\/systems\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/corvit.com\/systems\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/corvit.com\/systems\/#organization\",\"name\":\"Corvit Systems\",\"url\":\"https:\/\/corvit.com\/systems\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/corvit.com\/systems\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Corvit Systems\"},\"image\":{\"@id\":\"https:\/\/corvit.com\/systems\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/corvittraining\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud Computing Microsoft Azure Outline | Corvit Systems","description":"Explore our comprehensive Cloud Computing with Microsoft Azure course outline. Gain expertise in Azure services, networking, and more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/corvit.com\/systems\/navttc-courses-outlines\/cloud-computing-microsoft-azure-outline\/","og_locale":"en_US","og_type":"article","og_title":"Cloud Computing Microsoft Azure Outline | Corvit Systems","og_description":"Explore our comprehensive Cloud Computing with Microsoft Azure course outline. Gain expertise in Azure services, networking, and more.","og_url":"https:\/\/corvit.com\/systems\/navttc-courses-outlines\/cloud-computing-microsoft-azure-outline\/","og_site_name":"Corvit","article_publisher":"https:\/\/www.facebook.com\/corvittraining","article_modified_time":"2024-05-22T07:23:51+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"22 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/corvit.com\/systems\/navttc-courses-outlines\/cloud-computing-microsoft-azure-outline\/","url":"https:\/\/corvit.com\/systems\/navttc-courses-outlines\/cloud-computing-microsoft-azure-outline\/","name":"Cloud Computing Microsoft Azure Outline | Corvit Systems","isPartOf":{"@id":"https:\/\/corvit.com\/systems\/#website"},"datePublished":"2024-05-04T10:11:32+00:00","dateModified":"2024-05-22T07:23:51+00:00","description":"Explore our comprehensive Cloud Computing with Microsoft Azure course outline. Gain expertise in Azure services, networking, and more.","breadcrumb":{"@id":"https:\/\/corvit.com\/systems\/navttc-courses-outlines\/cloud-computing-microsoft-azure-outline\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/corvit.com\/systems\/navttc-courses-outlines\/cloud-computing-microsoft-azure-outline\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/corvit.com\/systems\/navttc-courses-outlines\/cloud-computing-microsoft-azure-outline\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/corvit.com\/systems\/"},{"@type":"ListItem","position":2,"name":"NAVTTC Course Outlines","item":"https:\/\/corvit.com\/systems\/navttc-courses-outlines\/"},{"@type":"ListItem","position":3,"name":"Cloud Computing Microsoft Azure Outline"}]},{"@type":"WebSite","@id":"https:\/\/corvit.com\/systems\/#website","url":"https:\/\/corvit.com\/systems\/","name":"Corvit Systems","description":"Best IT Certification Training Institute in Lahore","publisher":{"@id":"https:\/\/corvit.com\/systems\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/corvit.com\/systems\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/corvit.com\/systems\/#organization","name":"Corvit Systems","url":"https:\/\/corvit.com\/systems\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/corvit.com\/systems\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Corvit Systems"},"image":{"@id":"https:\/\/corvit.com\/systems\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corvittraining"]}]}},"_links":{"self":[{"href":"https:\/\/corvit.com\/systems\/wp-json\/wp\/v2\/pages\/6477"}],"collection":[{"href":"https:\/\/corvit.com\/systems\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/corvit.com\/systems\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/corvit.com\/systems\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/corvit.com\/systems\/wp-json\/wp\/v2\/comments?post=6477"}],"version-history":[{"count":0,"href":"https:\/\/corvit.com\/systems\/wp-json\/wp\/v2\/pages\/6477\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/corvit.com\/systems\/wp-json\/wp\/v2\/pages\/6325"}],"wp:attachment":[{"href":"https:\/\/corvit.com\/systems\/wp-json\/wp\/v2\/media?parent=6477"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}