Global Infrastructure Management Specialist (GIMS) Course
![]() by IIHTBangalore, Kochi, Chandigarh City, Chennai, New Delhi, Pune, Coimbatore, Kolkata |
Request Info |
Eligibility: (Pre-requisites) | 10th and 10+2 qualified students and others who are aspirants of global infrastructure management are eligible to attend this training. 10th and 12th pass out, fresh graduates and final year graduates who are willing to build a career in infrastructure management should attend this training. |
Medium of instruction: | English |
Global Infrastructure Management Specialist Training Course or GIMS is one of the most sought after hardware and networking certification that is designed for students who want to build a career in maintaining and troubleshooting network server. This training course educates a candidate on installing, configuring and managing hardware and network servers. Students with GIMS qualification witness ample scope of growth in the professional world. IIHT brings to you interactive Global Infrastructure Management Specialist training program for the hardware and networking career aspirants.
Ideal Training Participants
Professionals or Aspirants: From 10+2 qualified students, fresh graduates and final year graduation students and professionals who want to develop a career as a global infrastructure management specialist are the ideal participants for IIHT GIMS training program.
IIHT Global Infrastructure Management Specialist Training Course Benefits
Organizational Benefits:
-
Better infrastructure management.
-
Ensures effective network server.
-
Improves work processes.
Individual Benefits:
-
Prepares one to work in a hardware and network environment.
-
Enhances one's knowledge in the IT domain.
-
Moulds one's career as a system admin, network engineer etc.
At IIHT, we have highly qualified and experienced faculty who deliver interactive training sessions on server operating system. We also offer industry endorsed syllabus and courseware for better preparation. IIHT GIMS training course is a 2 year program including 4 semesters.
IIHT GIMS Training Offerings
-
2 years including 4 semesters training course by highly experienced IIHT faculty.
-
Industry endorsed curriculum and quality courseware.
-
Interactive sessions with networking experts.
-
Comprehensive exams, assignments and online examinations.
-
Mock interviews and active placement assistance.
Our IIHT GIMS Courses
Semester I
Digital Electronics
• Number System
• Gates
• Binary Arithmetic
• Boolean Algebra
• Flip-Flop
• Edge Triggered JK Flip Flop
• JK Master / Slave
• Memories
• Microprocessor
Microsoft Office Suite 2010
• Getting Started with Microsoft Office 2010
• Word 2010 Basics
• Views
• Working with Files
• Working with Text
• Formatting Text
• Tables
• Spelling and Grammar
• Track Changes
• Spreadsheet 2010 Basics
• Modifying Worksheets
• Formatting Cells
• Formulas and Functions
• Sorting and Filling
• MS PowerPoint 2010 Basics
• Create a new presentation
• Working with slides
• Graphics
• Outlook 2010 Basics
• Electronic Mails
• Inbox Management
• Calendar
• Events and Meetings
• Access 2010 Basics
• Forms
• Sorting Records
A+
• Computer Components Identification
• Assemble and Disassemble Computer
• omponents
• Components in Portable Computers
• Devices Installation and Configuration
• Characteristics of Cabling and their Connectors
• Common IDE, SCSI and Peripheral Devices
• Optimize PC Operations Optimization
• Determine the Issues that must be Considered when upgrading a PC
• Popular CPU Chips
• Types of Memory (RAM)
• Types of Motherboards and their Components
• Printer Technologies, Interfaces and Options/Upgrades
• Troubleshoot Common Printer Problems
• Operating System Fundamentals OS Installation
• Common Error Codes Interpretation
• Networking Capabilities of Windows
• Basic Internet Protocols and Terminologies
• Procedures for Establishing Internet Connectivity
Network +
• Logical or Physical Network Topologies
• Networking Standards
• Characteristics of Different Types of Cables
• Different media Connectors and Describe their uses
• Purposes, Features and Functions of Network Components
• General Characteristics of the Different wireless technologies
• Different Network Protocols
• Classful IP and Their Subnet Masks
• Subnetting
• Private and Public network addressing schemes
• WAN Technologies
• Security protocols and authentication protocols
• Basic capabilities different server operating systems
• Benefits and characteristics of using a firewall and proxy service
• Main characteristics and purpose of extranets and intranets
• Antivirus software
• Fault Tolerance
• Network Utility to Troubleshoot Networks
• Impact of modifying, adding or removing network services
• ?Network Troubleshooting with Physical Topology
Installing and Configuring Windows 7 (MCTS)
• Installing Windows 7
• Preparing the Windows 7 Installation Source
• User and Group Management
• Password Reset Disk
• Parental Control
• Upgrading to Windows 7
• User Profiles Management
• System Images Capturing
• Virtual Hard Disk Files
• Application Compatibility
• Introducing Windows 7
• Windows Aero and Mouse operations
• Switching Users
• Disks and Device Drivers
• Network Settings
• IPv4/IPv6 Configuration
• Network Configuration
• Folder and File Access
• BranchCache
• Printers in Windows 7
• Windows 7 Desktops Security
• Windows 7 Client Computers
• Mobile Computing and Remote Access in Windows 7
Red Hat System Administration I (RH124)
• Get Started with the GNOME Graphical Desktop
• Manage Files Graphically with Nautilus
• Get Help in a Graphical Environment
• Configure Local Services
• Manage Physical Storage I
• Manage Logical Volumes
• Monitor System Resources
• Manage System Software
• Get Started with Bash
• Get Help in a Textual Environment
• Establish Network Connectivity
• Administer Users and Groups
• Manage Files from the Command Line
• Secure Linux File Access
• Administer Remote Systems
• Configure General Services
• Manage Physical Storage II
• Install Linux Graphically
• Manage Virtual Machines
• Control the Boot Process
• Deploy File Sharing Services
• Secure Network Services
Laptop Maintenance
• Laptop Features and Function keys
• Common Laptop Problems
• Function of a Laptop
• Power Options For Laptops
• Hibernate Features
• Standby Features
• Laptop battery
• Common laptop problems
• Best practices
• General maintenance of the laptop
Communication Skills and Personality
Development
• Importance of Effective Communication
• Types of Communication
• Verbal Communication
• Scope of Written Communication
• Types of Writing
• Effective Writing
• Reading Skills
• Listening
• Improving one's Vocabulary
• Root words
• Usage of words with similar meaning
• Homophones, Synonyms & Antonyms
• Personality, its types
• Significance of Personality-An organizational perspective
• Public Speaking - As part of personality development
• Group Discussion - A practice of corporate personality development
• Interviews
• Presentation Skills - The root of Personality Development
• Acing your speech - Effective public speaking tips
• Public Presentation
• Nature and scope of a group discussion
Semester II
MCITP Server Administration: Windows
Server 2008 Administration
• Windows Server 2008 Installation and Administration
• Automated Server Deployment
• Windows Deployment Services and Network Connectivity
• IPv6 in Windows Server 2008
• Domain and Forest Functionality
• Group Policy in Windows Server 2008
• Application Servers and Deployment
• Server and Application Virtualization
• Terminal Services RemoteApp
• File and Print Servers
• Provisioning Data and Credential Delegation
• Remote Administration Technologies
• Windows Server 2008 Patch Management Strategies
• Replica Mode and Autonomous Mode
• WSUS (Windows Server Update Services)
• Server Security and Remote Access
• VPN (Virtual Private Network) Protocols
• Network Policy Server and Remote Access Accounting
• Network Access Protection
• Storage Area Networks and Logical Unit Numbers (LUN)
• Certificate Services Role-Based Administration
• Credential Roaming and Web Enrollment Support
• Online Responder for Certificate Services
• Network Device Enrollment Service
• Clustering and High Availability
• Backing Up Data and Disaster Recovery
MCITP Server Administration:
Windows Server 2008 Network
Infrastructure, Configuring
• Windows Server 2008 Installation
• DNS Server Role and Domain Name System
• Recursive and Iterative Queries
• Forward and Windows internet Name System
• Overview of the DHCP Server Role
• Dual Layer Architecture
• ISATASP Tunneling and Port Proxy
• Transitioning from IPv4 to IPv6
• Network and VPN Access
• Network Policy Server
• RADIUS Clients and Servers
• NPS Authentication Methods
• Log File Properties
• SQL Server Logging
• Overview of IPsec
• Storage Technologies
• Windows Server 2008 Storage Management Overview
• Common Capacity Management Challenges
• File Server Resource Manager
• Quota Management
• Network load balancing manager
• Security and Audit policy
• WSUS Administration
MCITP Server Administration: Windows Server
2008 Active Directory, Configuring
• Windows Server 2008 Active Directory
• Organizational Units and Domain Controllers Global Catalog
• Operations Masters and Server Manager
• Global Catalog Servers
• RID Master
• Transferring and Seizing of Operations Master Roles
• Active Directory and DNS
• Command-Line DNS Server Administration
• Zone Transfers and Replication
• Active Directory Sites and Replication
• Active Directory Sites
• Active Directory Lightweight Directory Services AD LDS)
• Active Directory Rights Management Services AD RMS)
• Read-Only Domain Controllers
• Active Directory Federation Services (AD FS)
• Windows Server 2008 Virtualization
• Active Directory Objects and Trusts
• Organizational Units
• Group Membership
• Shell Access Policies
• Group Policy to Deploy Software
• Backing Up and Recovering Active Directory
• Use of Windows Server Backup
• Active Directory Certificate Services
• Installing Active Directory Certificate Services
• Certificate Templates and Revocation
Red Hat System Administration II (RH135)
• Automated Installations of Red Hat Enterprise Linux
• Accessing the Command Line
• Intermediate Command Line Tools
• Regular Expressions, Pipelines, and I/O Redirection
• Network Configuration and Troubleshooting
• Managing Simple Partitions and Filesystems
• Managing Flexible Storage with Logical Volumes
• Access Network File Sharing Services
• Managing User Accounts
• Controlling Access to Files
• Managing SELinux
• Installing and Managing Software
• Managing Installed Services
• Analyzing and Storing Logs
• Managing Processes
• Tuning and Maintaining the Kernel
• System Recovery Techniques
Cisco Routing and Switching
(CCNA – ICND I & ICND II)
• Basic Networking Concepts & OSI Reference Model
• Function of Ethernet
• Network Security
• Wireless Network Technology
• Ethernet Switch Configuration
• Subnetting
• Routers and Router Configuration
• Different WAN Technologies
• Advanced dynamic Routing Protocols
• Route Summarization
• Link State Routing Protocol
• EIGRP
• Advanced Switching Technology
• VLAN and Trunks
• Access Control List
• Network Address Translation (NAT)
• IP version 6
• Wide Area Network
• Frame Relay
Checkpoint Certified Security
Administrator
• Check Point NGX Pro R60
• Installations and configurations
• Graphical Interface
• Policies
• Network Address Translation
• Tracking and Alerts
• Encryption and VPNs
• SmartDefense
Communication Skills and Personality
Development
• Scope of verbal Communication
• Formal Communication
• Informal Communication
• Phonetics
• Pronunciation
• Listening
• Accent and Neutral Accent
• Reading a formal Text
• Pace of Communication
• Dictionaries
• Interviews and its types
• Interviewer and Interviewee - Roles and Responsibilities
• Skills required for facing an interview
• Effective Presentation Skills
• Significance of Leadership
• Factors of Leadership
• Qualities of a good leader
Semester III
Configuring Exchange Server 2007
• Server Roles and Permissions
• Role based Deployment and Server Roles
• Exchange 2007 administration
• Administrative Permissions Delegations
• Exchange Organization, Server and Recipient Management
• Active Directory Configuration Partition, Managing Recipients Using the Exchange 007 Management Console
• Distribution Groups and Exchange 2007Mailbox Server
• Exchange 2007 Public Folder Database
• Scheduled Maintenance, Clustering
• Logging, Auditing and Monitoring of Exchange 2007
Red Hat System Administration III (RH 255) ?Enhance User Security
• Bash Scripting and Tools
• File Security with GnuPG
• Package Management
• Network Monitoring
• Advanced Network Configuration
• Secure Network Traffic
• NTP Server Configuration
• System Monitoring and Logs
• Centralized and Secure Storage
• SSL-encapsulated Web Services
• Web Server Additional Configuration
• Basic SMTP Configuration
• Caching-Only DNS Server
• File Sharing with NFS, CIFS & FTP
• Troubleshooting Boot Process
Certified Ethical Hacking
• Footprinting and Scanning
• Enumeration
• System Hacking and Trojans
• Denial of Service and Sniffers
• Session Hijacking
• Hacking Web Servers
• Web Application Vulnerabilities
• Web Techniques Based Password cracking
• SQL Injection and Hacking Wireless Networks
• Viruses, Worms and Physical Security
• Linux Hacking
• Evading IDS and Firewalls
• Buffer Overflows and Cryptography
• Penetration Testing
Sun Solaris System Administration
• Solaris 10 OS Installation
• Directory Hierarchy
• File Components & types
• Disk Management & Disk Architecture
• Device Configuration
• Disk Partitioning
• Solaris File System Management
• Boot PROM and GRUB Commands
• Solaris Package Management
• Patch Administration
• File Permissions and Access
• Access Control Lists (ACL)
• FTP, Telnet & SSH
• Restricting remote root login
• Printer and System Process Management
• Backup and Restore
Implementing Cisco IP Routing (ROUTE)
• Implement an EIGRP based solution, given a network design and a set of requirements
• Implement a multi-area OSPF Network, given a network design and a set of requirements
• Implement an EBGP based solution, given a network design and a set of requirements
• Implement an IPv6 based solution, given a network design and a set of requirements
• Implement an IPv4 or IPv6 based redistribution solution, given a network design and a set of requirements
• Implement Layer 3 Path Control Solution
Implementing Cisco IP Switched Networks
(SWITCH)
• Implement High Availability, given a network design and a set of requirements
• Implement a Security Extension of a Layer 2 solution, given a network design and a set of requirements
• Implement Switch based Layer 3 services, given a network design and a set of requirements
• Prepare infrastructure to support advanced services
• Implement VLAN based solution, given a network design and a set of requirements
Semester IV
Troubleshooting and Maintaining Cisco IP
Switched Networks (TSHOOT)
Maintain and monitor network performance
Troubleshoot Multi Protocol system networks
• Troubleshoot EIGRP, OSPF, EBGP
• Troubleshoot routing redistribution solution & a DHCP client and server solution
• Troubleshoot NAT
• Troubleshoot IPv6 routing & IPv6 and IPv4 interoperability
• Troubleshoot switch-to-switch connectivity for the VLAN based solution
• Troubleshoot private VLANS
• Troubleshoot port security & general switch security
• Troubleshoot VACL and PACL
• Troubleshoot switch virtual interfaces (SVIs)
• Troubleshoot switch support of advanced services (i.e., Wireless, VOIP and Video)
• Troubleshoot a VoIP support solution & a video support solution
• Troubleshoot Layer 3 Security
• Troubleshoot configuration issues related to accessing the AAA server for authentication purposes
• Troubleshoot security issues related to IOS services (i.e. finger, NTP, HTTP, FTP, RCP etc.)
Storage Essentials (EMC)
• Storage Technology
• The Proliferation of Data
• The Data Center Evolution
• Storage Infrastructure
• Evolution of Storage
• Storage Systems Architecture
• Intelligent Disk Subsystems
• Storage Networking Overview
• Direct – Attached Storage
• Storage Area Networks
• Network – Attached Storage
• Emerging Technologies
• Information Availability
• Business Continuity Overview
• Backup and Recovery
• Local and Remote Replication
• Disaster Recovery
• Data Center Management
• Security and Virtualization
• Storage Infrastructure Security
• Virtualization Technologies
Server Administration
• Server Installation
• Types of servers and roles
• Software and Hardware Configuration
• Processors, Motherboard and storage devices, networking and fault tolerance
• Network operating system and TCP/IP
• Upgradation
• Risk Assessment
• Proactive Maintenance and monitoring performance
• Backups
• Server Security
• Disaster recovery
• Troubleshooting
Virtualization (Microsoft Hyper V)
• Introduction to Windows Server 2008 Hyper-V
• Configure Hyper-V Settings and Virtual Networks
• Hyper-V Remote Administration
• Creation of Virtual Hard Drives and Virtual Machines
• Virtual Machine Settings, Snapshots, and High Availability
• Migration of Virtual Machines to Hyper-V
• Introduction to System Center Virtual Machine Manager
• Managing the VMM Virtual Machine Image Library and Checkpoints
• Windows PowerShell and Disaster Recovery
IBM Tivoli Storage Manager
• IBM Tivoli Storage Manager
• Introduction to IBM Tivoli Disaster Recovery Manager
• Stanzas of the Disaster Recovery Plan File
• Breaking out a Disaster Recovery Plan File
• Client Recovery
• Disaster Recovery Manager Media Management
• Life Cycle of DRM Media
• Sending and Returning Volumes to Vault
• Recovery Site Considerations
• Backup and Recovery Using Removable Media
• Backup and Recovery Using Server-to-Server Virtual Volumes
• Bare Machine Recovery
Semester IV
ITSM
• Service management functions and roles
• Life cycle of a service
• Models and concepts of service management
• Service strategy
• Service design
• Service Transition
• Service Operation
Cloud Computing
• Cloud Computing
• History and Evolution of Cloud Computing
• Private and Public clouds
• Cloud Computing architecture and industry frameworks
• Cloud computing infrastructure
• Practical applications of cloud computing
• Vendors and products for Cloud computing
• Audit and security risk with Cloud computing
• Risk Mitigation methodology for Cloud computing
• Infrastructure as a service (IaaS)
• Platform as a service (PaaS)
• Software as a service(SaaS)
Soft Skills Development
• Transition from College to Corporate
• Business Written Communication
o Email etiquette
o SMS etiquette
• Business Spoken Communication
o Telephone etiquette
o Net and web meetings etiquette
• Working in Teams
• Attitude At Work
• Work Ethics
Classroom - Regular | ||||
When | Duration | Where | Remarks | Price |
Not Specified |
2 Years |
All Venues | Not Specified | Price On Request |
Kochi, Kadavanthara (Branch):- 132-136, DD Milestone Kadavanthara, Kochi - 682 020, Kerala, India
Chandigarh City, Sector 34-A (Branch):- SCO 94-95, First Floor Sector 34-A, Chandigarh City, Chandigarh, India
Chennai, Adyar (Branch):- No.2, 2nd Floor, East Wing, Gokul Arcade Sardar Patel Road Adyar, Chennai - 600020, Tamil Nadu, India
New Delhi, Noida (Branch):- A-72, 1st Floor., Sector-64 Noida, New Delhi - 201301, Delhi, India
New Delhi, South Extension (Branch):- IIHT Center, E-73., Part – 1, Near Bengali Sweets South Extension, New Delhi, Delhi, India
Pune, F. C. Road (Branch):- No-64 & 65, A-wing, 3rd Floor, Shreenath Plaza Dyaneshwar Paduka chowk F. C. Road, Pune, Maharashtra, India
Coimbatore, Gandhipuram (Branch):- No.1-7, Sri guru Towers, Sathy Road, Cross III Gandhipuram, Coimbatore - 641012, Tamil Nadu, India
Kolkata, JL Nehru Road (Center):- #30, Chowranghee Mansion, Park Street-Chowranghee Crossing JL Nehru Road, Kolkata, West Bengal, India
IIHT
IIHT, established in the year 1993 is a leading IT training provider of Asia. We specialize in providing training services on hardware, networking, database management, security and storage management. We teach students and train them for IT profession. Also, we help re-skilling IT professionals for better job performance. We have catered our training services to some of the renowned Fortune 500 companies.