Page 13 - Computer Software Application TP - Volume 1
P. 13

CONTENT



           Ex. No.                              Table of Contents                                   Page No.


                            Module 1: Network Architecture

             1              Straight cabling and cross cabling                                             1
             2              Switch Configuration                                                           3
             3              LAN and WAN setup                                                              6

             4              Setting TCP/IP                                                                 10
             5              Network Monitoring and Control                                                 12
             6              Wireless Networking Design                                                     15
             7              Implementing Voice over IP                                                     19

             8              Configuring DHCP, IPV4/IPV6                                                    21
             9              Configuring Network Security for preventing Attacks                            30
             10             Setting password policy                                                        32
             11             Sniffing on Switched Networks                                                  33
             12             IP Address Spoofing                                                            35

             13             DNS Spoofing                                                                   3  6
             14             Password Cracking: Dictionary vs Brute- Force vs Hybrid methods                39
             15             Handling Denial-of-Service (DoS)                                               41
             16             Using Tools like John the Ripper, Cain & Abeletc                               42
             17             Configuring Firewalls                                                          46


                            Module 2: Database Concepts

             18             Installation Steps of MySQL                                                    49
             19             Troubleshooting Basic Installation Issues                                      58
             20             Creating and Using a Database in MySQL                                         59
             21             Designing of Tables                                                            64
             22             Applying Data Integrity Rules                                                  69
             23             Using the DDL, DCL, DML statements                                             72

             24             Enforcing Constraints, Primary Key and Foreign Key                             77
             25             Adding indices to tables                                                       79
             26             Simple Select Queries                                                          82
             27             Insert, Update and Delete Queries                                              84

             28             Using the Number, Date and Character Functions                                 89
             29             Joins, Group by, Having, Sub query                                             93
             30             Indexing and Optimizing query                                                  101
             31             Creating & Using Stored procedure                                              103
             32             Creating and executing MySQL table level Triggers                              105





                                                            x
   8   9   10   11   12   13   14   15   16   17   18