Junior System Administrator

Junior System Administrator

Course Fee: 20000 Tk

Class Start: 01/01/2017

Overview: CCNA (Routing and Switching) New Version, RHCE, ISP Setup and Administration using MikroTik, Windows Server 2012 MCSA.


CCNA (Routing and Switching) New Version

Course Objectives

Upon completion of this course, students will be able to perform tasks related to: 

  • Entry Level task on Ethernet and TCP/IP networks
  • IP Addressing, Sub-netting, VLSM
  • Deployment IPv6 address
  • IP routing process (EIGRP, OSPFv2, OSPFv3)
  • IP services (DHCP, NAT, PAT, ACL, NTP)
  • Configure and troubleshoot Virtual LANs (VLANs), Spanning Tree Protocols (STP)
  • Network Device Security
  • Troubleshooting of various network devices, network and network protocols
  • Implement WAN Technology

Who Should Attend

This course is intended for the following audience:

  • Network Administrator
  • Network Engineer
  • Systems Engineer
  • CCNA Exam Candidates

Course Prerequisites
The knowledge and skills that you must have before attending this course are as follows:

  • Basic computer literacy
  • Windows navigation skills
  • Basic Internet usage skills
  • Fundamental understanding of data networking and IP addressing

Course Duration

  • 72 hours, 24 Classes, 3 Hours per class (weekly 2 Days)
  • 72 Hours, 18 Classes, 4 Hours per class (weekly 1 Day)

Chapter 1: Internetworking

  • Internetworking Basics
  • Internetworking Models
  • The OSI Reference Model


Chapter 2: Ethernet Networking and Data Encapsulation

  • Ethernet Networks in Review
  • Ethernet Cabling
  • Data Encapsulation
  • The Cisco Three-Layer Hierarchical Model


Chapter 3: Introduction to TCP/IP

  • Introducing TCP/IP
  • TCP/IP and DoD Model
  • IP Addressing
  • IPv4 Address Types


Chapter 4: Easy Subnetting

  • Subnetting Basics
  • Summary


Chapter 5: Variable Length Subnet Masks (VLSMs), Summarization and Troubleshooting TCP/IP

  • Variable Length Subnet Masks (VLSMs)
  • Summarization
  • Troubleshooting IP Addressing


Chapter 6: Cisco's Internetworking Operating System (IOS)

  • The IOS User Interface
  • Command-Line Interface (CLI)
  • Router and Switch Administrative Configurations
  • Router Interfaces
  • Viewing, Saving and Erasing Configurations


Chapter 7: Managing a Cisco Internetwork + Managing Cisco

Devices (book ICND II)

  • The Internal Components of a Cisco Router
  • The Router Boot Sequence
  • Managing Configuration Register
  • Backing Up and Restoring the Cisco IOS
  • Backing Up and Restoring the Cisco Configuration
  • Using Cisco Discovery Protocol (CDP)
  • Using Telnet
  • Resolving Hostnames
  • Checking Network Connectivity and Troubleshooting


Chapter 8: IP Routing

  • Routing Basics
  • The IP Routing Process
  • Configuring IP Routing in Our Network
  • Dynamic Routing
  • Distance-Vector Routing Protocols
  • Routing Information Protocol (RIP)
  • Verifying Your Configurations


Chapter 9: Enhanced IGRP (EIGRP) and Open Shortest Path First (OSPF)

  • EIGRP Features and Operation
  • Using EIGRP to Support Larger Networks
  • Configuring EIGRP
  • Load Balancing with EIGRP
  • Verifying EIGRP
  • Open Shortest Path First (OSPF) Basics
  • Configuring OSPF
  • Verifying OSPF Configuration
  • OSPF DR and BDR Elections
  • OSPF and Loopback Interfaces
  • Troubleshooting OSPF
  • Configuring EIGRP and OSPF Summary Routes
  • Chapter 10: Multi-Area OSPF


Chapter 11: Layer 2 Switching and Spanning Tree Protocol (STP)

  • Before Layer 2 Switching
  • Switching Services
  • Spanning Tree Protocol (STP)
  • Configuring Catalyst Switches


Chapter 12: Virtual LANs (VLANs) & InterVLAN Routing

  • VLAN Basics
  • VLAN Membership
  • Identifying VLANs
  • VLAN Trunking Protocols (VTP)
  • Routing between VLANs
  • Configuring VLANs
  • Configuring VTP
  • Telephony: Configuring Voice VLANs
  • RSTP
  • Ether Channels

Chapter 13: Security

  • Perimeter, Firewall and Internal Routers
  • Introduction to Access Lists
  • Standard Access Lists
  • Extended Access Lists
  • Turning Off and Configuring Network Services
  • Monitoring Access Lists


Chapter 14: Network Address Translation (NAT)

  • When Do We Use NAT?
  • Type of Network Address Translation
  • NAT Names
  • How NAT Works
  • Testing and Troubleshooting NAT


Chapter 15: Internet Protocol Version 6 (IPv6)

  • Why Do We Need IPv6?
  • The Benefits and Uses of IPv6
  • IPv6 Addressing and Expressions
  • How IPv6 Works in an Internetwork
  • IPv6 Routing Protocols
  • Migrating to IPv6


Chapter 16: IP Services

  • Client Redundancy Issues

Introducing First Hop Redundancy Protocol (FHRP)

  • Hot Standby Router Protocol (HSRP)
  • Virtual Router Redundancy Protocol
  • Syslog
  • SNMP
  • NetFlow

Chapter 17: Wide Area Networks

  • Introduction to Wide Area Networks
  • Cable and DSL
  • Cabling the Serial Wide Area Network
  • High-Level Data-Link Control (HDLC) Protocol
  • Point-to-Point Protocol (PPP)
  • Virtual Private Networks
  • GRE Tunnels

Project:  18 Hours

Exam Preparation: 24 Hours


ISP Setup and Administration using MikroTik

Overview: This training course will provide you with the skills to configure a MikroTik RouterOS Router board as a dedicated router, a bandwidth manager, a secure firewall appliance, a simple wireless access point, a VPN Server or Client or an Internet Hotspot concentrator etc. It is a course that covers the basics for those that new to MikroTik Router OS (or is struggling to understand it!) and concentrates on the basics of setting up a MikroTik device. .


Course objectives
After successfully completing the course attendees will be able to installing and upgrading the RouterOS, first login to the RouterOS using RouterBOARD, creating a simple network, static IP addressing and routing, basic dynamic routing using OSPF, creating a DHCP server and client, firewall filters and NAT rules, various VPN Tunnel types, simple queues for bandwidth control, hotspot configuration, wireless networks, web proxy for URL Filtering control and caching and The Dude.

Who should attend
This course is aimed at network administrators, integrators, managers, IT consultants and other technical users who already use or would like to start using Mikrotik RouterOS for their routing, firewall, hotspot and wireless projects. It is also a good introduction to routing and firewall systems, especially in a wireless environment.

Course Prerequisites

  • Basic knowledge of TCP/IP and routing. We will be expanding on this during the course, but we suggest that the participants have a good working knowledge of IP addressing and routing.
  • Basic knowledge of wired and wireless networking.

Course Duration
36 Hours, 12 Classes, 3 Hours per class


Course Content


  • Lesson 02: IP Access and NAT
    • WAN IP
    • Networking Foundation.
    • WAN IP
    • Subnet
    • Gateway, DNS add
    • Private IP NAT
    • Winbox Introduction.
    • IP Addressing Study.







  • Lesson 09: Routing
    • Static/ Specific routing
    • OSPF
    • OSPF (Route Tuning)
    • BGP (NON Transitive)
    • BGP (Transitive)


  • Lesson 10: Firewall
    • Basic Firewall
    • Port monitoring
    • Advance Firewall
    • Mangle
    • packet marking
    • High Bandwidth on certain host/IP
    • No bandwidth control on ping.


  • Lesson 11: VPN Configuration
    • VPN Server
    • VPN client
    • IP Security (IPsec)
    • Ethernet Over IP (EOIP)
    • GRE Tunnel
    • IPIP Tunnel
  • PPP Tunnels
    • PPP Tunnel
    • PPPoE Tunnel
    • PPTP
    • L2TP
    • Open VPN
  • VPN windows dialer to connect any PC with private IP of head office.


  • Lesson 12: Link Redundancy Solution
    • Link Redundancy with fail over.
    • Load Balance with STP.
    • Load Balance with OSPF.
    • Load Balance other mechanism.
    • Bandwidth merge of different link


Hotspot solution


Red Hat Certified Engineer (RHCE)

Red Hat System Administration I (RH124)

Chapter 1 : Accessing the Command Line

Chapter 2: Managing Files From the Command Line

Chapter 3: Getting Help in Red Hat Enterprise Linux [Without LAB]

Chapter 4: Creating, Viewing, and Editing Text Files

Chapter 5: Managing Local Linux Users and Groups

Chapter 6: Controlling Access to Files With Linux File System Permission

Chapter 8: Controlling Services and Daemons

Chapter 11: Managing Red Hat Enterprise Linux Networking

Chapter 9: Configuring and Securing OpenSSH Service

Chapter 12: Archiving and Copying Files Between Systems

Chapter 13: Installing and Updating Software Packages

Chapter 14: Accessing Linux file Systems


Red Hat System Administration II (RH134)

Chapter 2 : Using Regular Expression With grep

Chapter 3 : Creating and Editing Text files with vim

Chapter 4 : Scheduling Future Linux Tasks

Chapter  6: Controlling Access to Files With Access Control lists (ACLs)

Chapter 7 : Managing SELinux Security

Chapter 8: Connecting to Network-defined Users and Groups

Chapter 9: Adding Disks, Partitions, and File System to a Linux System

Chapter 10: Managing Logical Volume Management (LVM) Storage

Chapter 11: Accessing Network Storage with Network File System (NFS)

Chapter 13: Controlling and Troubleshooting the Red Hat  Enterprise Linux Boot Process

Chapter 14: Limiting Network Communication with firewalld


Red Hat System Administration III (RH254)

Chapter 1: Controlling Services and Daemons

Chapter 2: Managing IPv6 Networking

Chapter 3: Configuring Link Aggregation and Bridging

Chapter 4: Network Port Security

Chapter 5: Managing DNS for Servers

Chapter 6: Configuring Email Transmission

Chapter 7: Providing Remote Block Storage

Chapter 8: Providing File-based Storage

Chapter 9: Configuring MariaDB Databases

Chapter 10: Providing Apache HTTPD Web Service

Chapter 11:Writing Bash Scripts

Chapter 12: Bash Conditionals and Control Structures

Chapter 13: Configuring the Shell Environment


Windows Server 2012 MCSA

Course Objectives

The Microsoft Certified Solutions Associate (MCSA) certification for Windows 2012 is ideal for IT workers wanting to establish a solid foundation and understanding of Windows Server 2012. Exam Topics covered include: Installation & configuration of Windows Server 2012, Managing and understanding Active Directory Domain Services, Implementing networking services, file and print services, Implementing local storage, Administering Group Policy, Implementing Server virtualization with Hyper-V, Configure and troubleshoot DNS, Remote Access and file system security, and more...

Course Outline

1 - Deploying and Managing Windows Server 2012

2 - Introduction to Active Directory Domain Services

3 - Managing Active Directory Domain Services Objects

4 - Automating Active Directory Domain Services Administration

5 - Implementing IPv4

6 - Implementing DHCP

7 - Implementing DNS

8 - Implementing IPv6

9 - Implementing Local Storage

10 - Implementing File and Print Services

11 - Implementing Group Policy

12 - Securing Windows Servers by Using Group Policy Objects

13 - Implementing Server Virtualization with Hyper-V

14 - Deploying and Maintaining Server Images

15 - Configuring and Troubleshooting Domain Name System

16 - Maintaining Active Directory Domain Services

17 - Managing User and Service Accounts

18 - Implementing a Group Policy Infrastructure

19 - Managing User Desktops with Group Policy

20 - Configuring and Troubleshooting Remote Access

21 - Installing, Configuring, and Troubleshooting the Network Policy Server Role

22 - Implementing Network Access Protection

23 - Optimizing File Services

24 - Configuring Encryption and Advanced Auditing

25 - Configuring Encryption and Advanced Auditing

26 - Monitoring Windows Server 2012

27 - Implementing Advanced Network Services

28 - Implementing Advanced File Services

29 - Implementing Dynamic Access Control

30 - Implementing Distributed Active Directory Domain Services Deployments

31 - Implementing Active Directory Domain Services Sites and Replication

32 - Implementing Active Directory Certificate Services

33 - Implementing Active Directory Rights Management Services

34 - Implementing Active Directory Federation Services

35 - Implementing Network Load Balancing

36 - Implementing Failover Clustering

37 - Implementing Failover Clustering with Hyper-V

38 - Implementing Disaster Recovery