Diploma in IT Infra
About IT Infrastructure:
IT infrastructure hardware and networking form the foundation of modern IT systems, encompassing servers, routers, switches, storage, and cabling to enable data flow and operations. Hardware includes servers for processing, end-user devices like computers and mobiles, networking gear such as routers and switches, and storage systems like NAS or SAN. Networking technology connects these via LANs, WANs, and protocols for seamless communication.
Why you should learn Cloud Computing:
Hands-on training in assembly, troubleshooting, OS installation, IP addressing, and router config builds versatile skills for IT support and infrastructure management. It remains essential in 2026 despite cloud shifts, supporting digital economy backbones. These skills ensure reliable connectivity for remote work, data centers, and security, with growing opportunities in public/private sectors amid India's expanding IT sector projected over $60 billion.
Job Market Demand
Roles like network engineer, system administrator, IT technician, and data center specialist offer strong demand in India, with salaries starting at ₹4-6 LPA and rising to ₹15+ LPA for experts. Skills transfer to cloud, cybersecurity, and hybrid environments.
Course Contents
| A+ Basic Hardware |
|---|
|
Motherboard |
|
Processors |
|
Memory |
|
Storage Devices |
|
OS installations |
|
BIOS and SMOS settings |
|
Installing and configuring printers |
|
Overview of windows and features |
|
Windows administration |
|
Preventive Maintenance in Windows |
|
Computer viruses and Threats |
|
Basic troubleshooting concepts |
|
Troubleshooting PC Hardware |
|
Troubleshooting Windows |
|
Software Installation, Formatting |
| N+ Basic Network |
|---|
|
Types of network cables and connectors |
|
IP classes: Class-A, Class-B, Class-C |
|
Ipv4 & Ipv6 |
|
Public and Private network |
|
Static and Dynamic |
|
Client side DNS |
|
DHCP |
|
Subnet mask |
|
Gateway |
|
TCP and UDP ports |
|
Protocols and their purpose |
|
Encryption types |
|
MAC filtering |
|
Wireless encryption |
|
Firewall, NAT, WPS, DMZ, DHCP |
|
Internet connection types and features |
|
Types of networks |
|
Topologies |
|
Network devices |
| CCNA |
|---|
|
Fundamentals of Networking |
|
Enterprise Network |
|
OSI Reference Model and TCP/IP Protocol Suite |
|
Function of DNS and DHCP |
|
Media Access Control (MAC) |
|
Packet delivery process |
|
Network Security |
|
Internetwork Operating System (IOS) |
|
Port Security |
|
Troubleshooting Switching issues |
|
Initial Start-up of the Cisco Router |
|
Using the Cisco SDM |
|
Device Configuration |
|
Advanced Dynamic Routing Protocols |
|
Link State Routing Protocol |
|
Switching Technology |
|
VLAN and Trunks |
|
Ports used in a Switch for VLAN |
|
STP Configuration and Monitoring |
|
Network Address Translation (NAT) |
|
Advanced Wide Area Network. |
| MCSA |
|---|
|
Installing & Configuring Windows Server 2012 |
|
Introduction to Active Directory Domain Services |
|
Services Administration |
|
Implementing Ipv4 |
|
Implementing DHCP |
|
Implementing DNS |
|
Implementing Local Storage |
|
Implementing File and Print Services |
|
Implementing Group Policy |
|
Securing Windows Servers Using Group |
|
Policy Objects |
|
Administering Windows Server 2012 |
|
Managing User and Service Accounts |
|
Configuring and Troubleshooting Remote Access |
|
Configuring and troubleshooting the Network Policy Server Role |
|
Optimizing File Services |
|
Configuring Encryption and Advanced Auditing |
|
Monitoring Windows Server 2012 |
|
Implementing Advanced Network Services |
|
Implementing Advanced File Services |
|
Implementing Dynamic Access Control |
|
Implementing Network Load Balancing |
|
Implementing Failover Clustering |
|
Implementing Failover Clustering with Hyper-V |
|
Implementing Disaster Recovery |
|
Implementing Distributed Active Directory |
|
Domain Services Deployments |
|
Implementing Active Directory Domain |
|
Services Sites and Replication |
| RHCSA |
|---|
|
Red Hat System Administration |
|
Manage Files Graphically with Nautilus |
|
Configure Local Services |
|
Manage Physical Storage |
|
Manage Logical Volumes |
|
Monitor System Resources |
|
Manage System Software |
|
Establish Network Connectivity |
|
Administer Users and Groups |
|
Manage Files |
|
Administer Remote Systems |
|
Configure General Services |
|
Manage Virtual Machines |
|
Control the Boot Process |
|
Deploy File Sharing Services |
|
Secure Network Services |
|
Network Configuration and Troubleshooting, |
|
Managing Flexible Storage with the Logical Volume Manager (LVM) |
|
NFS and CIFS |
|
Managing User Accounts |
|
Network User Accounts with LDAP |
|
Managing SELinux |
|
Installing and Managing Software |
|
Managing Processes |
|
Tuning and Maintaining the Kernel |
|
System Recovery Techniques |
| Ethical Hacking |
|---|
|
Introduction to Ethical Hacking |
|
Hacking Methodology |
|
Process of Malicious Hacking |
|
Foot printing and Scanning |
|
Enumeration |
|
System Hacking and Trojans |
|
Denial of Service and Sniffers |
|
Session Hijacking and Hacking Web Servers |
|
Session Hijacking |
|
Hacking Web Servers |
|
Web Application Vulnerabilities and Web Techniques Based Password Cracking |
|
Web Based Password Cracking Techniques |
|
Web Application Vulnerabilities |
|
Hacking Wireless Networking |
|
Viruses, Worms and Physical Security |
|
Linux Hacking |
|
Evading IDS and Firewalls |
|
Buffer Overflows and Cryptography |
|
Penetrating Testing |
|
Exploit Writing and Reverse Engineering |
| ITIL |
|---|
|
Configuration Management |
|
Configuration Management Activities |
|
Configuration Management Planning |
|
CMDB Development |
|
Configuration Verification And Audit |
|
Configuration Management v/s Asset Management |
|
Incident Management |
|
Scheduling |
|
Escalation |
|
Problem Management Activities |
|
Problem Control |
|
Error Control |
|
Service Desk |
|
Management Reports |
|
Standard Change |
|
Inputs & output for Change Management |
|
Activities |
|
Recording |
|
Key Performance Indicators (KPI) |
|
Definitive Software Library (DSL) |
|
ITIL Model |
|
Service Level Requirements (SLR) |
|
Business Impact Analysis (BIA) |
|
Risk Assessment |