INTRODUCTION - e-CAB e-Commerce Association of …



Company Profile OfiZoom LimitedINTRODUCTIONiZoom Limited, is a well-known as training, software and business solution provider. It was established with good to provide world class information technology training, skill development training and outstanding solution in IT. iZoom is also specialized in healthcare business industry providing automation and solutions products in the field.It has been supporting clients nationwide in manage the evolving role of information technology in business. As a strategic business partner, we provide diversified IT solutions and services that support attainment of our clients' business objectives. Our services and solutions include custom application software development, website development, graphical content development, digital marketing, network infrastructure building, plastic card personalization, and delivery and installation of PCs, Servers, POS, and hardware’s etc.iZoom combines the best of technologies, processes, strategies, and our extensive industry experience to enable our clients to succeed. We design, implement, and support end-to-end IT solutions and services. Our goal is to improve performance, maximize IT investments, and, ultimately, create a competitive business advantage for our customers. Our ability to integrate Information Technology services into a flexible, total single-point-of-contact (SPOC) solution is the key element of our success.Partnerships with some of the world’s "best-in-class" corporations provide iZoom with unique expertise and experience in providing diversified Information Technology solutions, including Information Technology consulting and systems integration. For companies operating in the information age we help to leverage new technologies tocompetitive advantage. We deliver high value innovated solutions by bridging the gap between business and technology.Since iZoom inception, proven, demonstrate and invent unique products, techniques and capabilities that far and uniquely distinguish us from other software provider as we arespecialized in developing varies automated solutions in the field of insurance and hospitalmanagement, that is tailored to utilize the international standard such as WHO and medical and insurance science. STRENGTHS Deliver secure, reliable and scalable applications that help businesses excel in today'srapidly evolving economy.Gain client’s satisfaction by fully understand and address our client’s requirements within the minimal time-to-market.Assure a steady quality by guarantee high quality of our deliverables.Maintain continuous improvement by promoting a learning environment, and ensuring that our employees are exposed to, and trained on state-of-the-art technologies. Our software development process is continuously monitored and improved to maximize productivity.Utilize object-oriented analysis, design, and testing methodologies; ensure seamlessintegration and traceability between the project’s requirements, design, development, quality assurance, and delivery.Understand In-depth clients’ business requirements.Deliver world-class End-to-End IT solutions.Implement cutting-edge innovative solutions.Guarantees high quality of our deliverables.Seeking Continuous improvement.Adopting International & best practice standardsMISSION, STAFF & VISION (Committed to Excellence)To understand our customers’ business and technology issues, and to resolve the same with our experience in and commitment to varied range of platforms and products and with dedication to stay current with reliable and proven technologies to: Maximize the value of our customersDevelop a highly motivated workforceCOMPETITION KEYS (Exceeds Expectations)Specialize in the healthcare business automation industry along with the best services.Understand In-depth client business requirements.Bridge the gap between business and technology.Steer clients through technology.Innovate state-of-the-art turnkey solution and servicesDeliver world-class end-to-end IT solutions.Create long-term relationship with our clientsImplement cutting-edge innovative solutions that meet client requirements with the reality of the situation.Guarantee high quality of our deliverables.Adopt International & best practice standards.Continuous improvement.2451108953500We take special care to exceed the expectations of our diverse clients by continually making our products and services better.EXPERTISE AREASOFTWARE HOUSE A clearly stated corporate mission, ably backed by total commitment of its staff, is goingiZoom the NUMBER ONE software house of Bangladesh. iZoom provides a wide range of business applications for all kinds of users starting from smallest operation with one PC to a networked environment. Whether the user requires small household financial software, or a fully integrated real-time on-line banking application, or an ERP, with electronics interfaces, iZoom is geared towards satisfying the customer needs fully and completely. iZoom’s success story is the outcome of its commitment to maintain a team of fully trained highly developed competent technical personnel who are required to update themselves on a continuous basis from home and abroad. Investment in training is one area where iZoom refuses to cut corners.EXPERTISE IN DEVELOPMENT TOOLS AND LANGUAGESiZoom maintain a highly skilled group of software professionals equipped with various technologies as follows: Analysis & Design: OOAD & UML Architecture/Framework: Client-Server, n-Tier & Application Server: MS IIS, Oracle AIS & Apache Languages/ Development Tools: C#, , VB6, , XML, Java, Oracle Developer & COBOLWeb Technologies: HTML, DHTML, PHP, ASP, , VBScript, JavaScript, JSP & XML Component Technologies: COM, DCOM, COM+, WINAPI, J2EE & EJBOther Tools: Crystal Reports, Visual UML, CodeSmith, VSS, VbExpress & NetAdvantageEXPERTISE IN RDBMSiZoom has a proven expertise in relational database management system. The RDBMS includes Oracle, Informix, Microsoft SQL Server, and MySQL. The software professionals are trained on database administration and tuning of these products. As an Advantage Partner Oracle iZoom maintaining a pool of resources in the role of pre-sales, implementation and Support. To match the need of high performance Enterprise Data Warehousing and Business Intelligence for large customer’s iZoom also has invested in developing resources for Teradata Data Warehousing Solution and has number of resources in trained on Teradata.PROJECT MANAGEMENT AND PROCESS MANAGEMENT017970500 For software project management iZoom follows PRINCE2 and PMI Methodology. iZoom has certified project managers to manage project professionally. iZoom follow CMMi Level 3 methodology for managing the process of delivering and implementing software solution.IN-HOUSE TRAINING FACILITIESiZoom maintains an in-house Training Center where regular classes are held for its own staffs. Whenever a person acquires knowledge about any new product, it is transferred to others in the organization. The same facility, where all necessary equipment’s are installed, is used to impart training to iZoom’s customers.SERVICE FACILITIES IN OTHER CITIESiZoom maintains a Branch at Chittagong where required technical personnel are posted. Adequate stocks of spare parts are kept there to support customers in that region. In addition, iZoom Engineers have been implementing and maintaining installations all over the country.SOLUTION PROVIDERiZoom offers system study, system design, development, implementation, support andmaintenance, as well as project management, project service and consultancy service on variety of platforms. iZoom has developed solutions out of many years of experience and professional expertise. Our core focus is to design and develop solutions that suit tomorrow's business requirements. iZoom offers flexible delivery options which include total or shared responsibility for projects. Work is undertaken at the clients’ location or at iZoom’s development center. Work can also be performed for any stage of the project life cycle. iZoom provides on-site / off-shore software development solution and custom application development along with technical support and maintenance services. It offers solutions in almost all major areas with special focus on commercial banking, investment banking, merchant banking, manufacturing, sales, distributions, MIS etc. Turnkey projects have always been iZoom’s forte. The methodology adopted includes a mix of on-site and off-site activities. Study and analysis are the activities that are performed on-site in close interaction with the customers and end-users. System design, development and testing are performed off-site in iZoom's premises. It has also successfully participated in 'Joint Application Development' projects, where a number of parties have developed various components of an Application Package. The is in a unique position to provide and support end to end IT Solution covering both Infrastructure and Business Application part. The great value add a customer can have is to get single point of service for all IT PUTING SOLUTIONSiZoom has been the pioneer in providing Computer System Solution Provider in Bangladeshsince 2014 and has a strategic alliance with Dell. Headquarter in Austin, Texas, USA, Dell Inc. listens to customers and delivers innovative technology and services they trust and value. Being a local partner, iZoom has been representing all range of Dell products in Bangladesh. A list of these products is as follows:Laptops & Tablets,Desktops & Workstations,Server, Storage & Networking, Printer,Packaged Software etc.iZoom Corporation Limited is mainly focused on providing solutions to its customers. Currently we are offering solutions in the following areas:IT Infrastructure ManagementIntelligent Data ManagementData ConsolidationData ProtectionData AchieveData BackupData MigrationData ReplicationDisaster recoveryHigh AvailabilityVirtualization TechnologySoftware & Application Management etc.OFFERING COURSESOUR COURSESOFFERING COURSES FOR PROFESSIONAL WITH GURANTEED JOBSSoftware Testing for Bangladeshi StudentsSoftware Testing for Immigrants Oracle Database AdministrationDatabase Administration with SQL/MYSQLMIS Report DeveloperProject Management ProfessionalCertified Business analysis ProfessionalWindows Server 2008 MCTTP CertificationAngular JS/ Node JS/ Kendu JSRestful API Services with WCF and MVC APIMultiplatform Mobile Application Development with IONIC FRAMEWORK OFFERING COURSES FOR EXPERTProfessional web application development with MVC(Latest)iPhone Apps DevelopmentAndroid Application DevelopmentProfessional web application development with Ruby On RailsCertified software SpecialistEnglish Language Development TrainingOFFERING COURSES FOR INTERMEDIATE & HIGHERCertified web development Specialist(PHP)Professional web development with MVC(Latest)Creative graphics designCisco Certified Network Associate(HIGHER)Red Hat System AdministrationProfessional Video EditingLearning auto desk and auto cadEnglish Language Development TrainingOFFERING COURSES FOR GENERALSearch engine optimization(SEO) – Available Job for guaranteedCertified CMS SpecialistProfessional office and documentation ManagementAdvanced ExcelEnglish Language Development TrainingFinancial Budget for Training:Elementary Course:Course NameDurationPersonFee(Taka)Introduction to Computers 12 Hours13,20,000.00Microsoft Excel48 Hours1A+48 Hours1Network Basics48 Hours1Mobile Application Training 10 Hours1Advance Course:Course NameDurationPersonFee(Taka)CWDS(Certified web development Specialist)240 Hours12,95,000.00CCNA(CISCO CERTIFIED NETWORK ASSOCIATE)240 Hours12,80,000.00Specialization Course for Security:Course NameDurationPersonFee(Taka)5A. Introduction to Information Security Fundamentals and Best Practices240 Hours13,20,000.005B. Forensics240 Hours13,20,000.005C. Network Assurance240 Hours13,20,000.005D. Secure Software and Browser Security240 Hours13,20,000.005E. Information Risk Management240 Hours13,20,000.005F. Cyber Incident Analysis and Response240 Hours13,20,000.005G. Ethical Hacking and Counter Measure240 Hours13,20,000.00Professional Courses:Course NameDurationPersonFee(Taka)Software Testing QTP/UTF26413,20,000.00Database Administration with SQL26413,20,000.00Project Management Professional26413,20,000.00Business Analyst26413,20,000.00[Notes: There must be at least 10 students for the batch to be conducted.]1057275-66675Elementary Courses(Computer Basics)00Elementary Courses(Computer Basics)What you will be able to:Communicate with confidence regarding information security topics, terms, and conceptsUnderstand and apply the Principles of Least PrivilegeUnderstand and apply the Confidentiality, Integrity, and Availability (CIA) TriadBuild better passwords that are more secure while also being easier to remember and typeGrasp basic cryptographic principles, processes, procedures, and applicationsUnderstand computer network basicsHave a fundamental grasp of any number of critical technical networking acronyms: TCP/IP, IP, TCP, UDP, MAC, ARP, NAT, ICMP, and DNSUtilize built-in Windows tools to see your network settingsRecognize and be able to discuss various security technologies, including anti-malware, firewalls, and intrusion detection systems.Determine your "Phishing IQ" to more easily identify SPAM email messagesUnderstand physical security issues and how they support cybersecurityHave an introductory level of knowledge regarding incident response, business continuity, and disaster recover planningAccess a number of websites to better understand password security, encryption, phishing, browser security, etc.MICROSOFT OFFICE EXCEL 2016Chapter 1: Office Workspace BasicsBasic Window Elements Exploring Microsoft Office Backstage Working with the Ribbon Customizing the Quick Access Toolbar Working with KeyTips Using the Status Bar Getting Help Chapter 2: Introduction to ExcelWhat is Excel? Getting to Know the Excel Window Moving the Cell Selector Opening a Workbook Navigating a Workbook Selecting Cells Creating Workbooks Saving a Workbook Closing a Workbook Chapter 3: Entering and Editing Data Entering Text, Numbers, and Data Editing Data Using AutoComplete and AutoFill Copying Data Moving and Clearing Data Using Undo and Redo Finding and Replacing Data Chapter 4: Introduction to Formulas and Functions What are Formulas and Functions? Entering Formulas Entering Functions Using the Insert Function Tool Using AutoSum Copying and Moving Formulas Chapter 5: Working with Functions Using Statistical Functions Using Financial Functions Testing Conditions with IF Using Date and Time Functions Using Linked Values in Formulas Copying Formula Values Chapter 6: Formatting Data Introduction to Formatting Applying Number Formats Applying Font Formats Changing Cell Alignment Applying Cell Styles Copying Formats Clearing Formats Finding and Replacing Formats Chapter 7: Formatting Worksheets Inserting and Deleting Rows and Columns Inserting and Deleting Cells Adjusting Column and Row Sizes Hiding Worksheet Components Inserting and Deleting Worksheets Copying and Moving Worksheets Customizing Sheet Tabs Adding a Worksheet Background Chapter 8: Adding Charts and Graphics Creating a Chart Enhancing a Chart Modifying Chart Data Changing Chart Types Drawing Shapes Inserting Pictures Creating SmartArt Chapter 9: Viewing and Printing Workbooks Changing View Options Splitting and Freezing a Worksheet Sorting and Filtering Data Info about Slicers Customizing the Page Layout Adding Headers and Footers Modifying Page Breaks Previewing and Printing the Worksheet Printing Selected Data Chapter 10: Managing Workbooks Arranging Multiple Workbooks Adding Hyperlinks Working with Comments Saving Workbooks in Different Formats Saving a Workbook as a Web PagesE-Mailing a WorkbookCompTIA A+ CertificationAt the end of this course, students will be able to:Identify the components of standard desktop personal computers.Identify fundamental components and functions of personal computer operating systems.Identify best practices followed by professional personal computer technicians.Install and configure computer components.Install and configure system components.Maintain and troubleshoot peripheral components.5Troubleshoot system components.Install and configure operating systems.Maintain and troubleshoot installations of Microsoft Windows.Identify network technologies.Install and manage network connections.Support laptops and portable computing devices.Support printers and scanners.Identify personal computer security concepts.Support personal computer security.Course OutlineLesson 1: Personal Computer ComponentsTopics: Personal Computer ComponentsSystem Unit ComponentsStorage DevicesPersonal Computer Connection MethodsLesson 2: Operating System FundamentalsTopics:Personal Computer Operating SystemsWindows User Interface ComponentsWindows File System ManagementWindows System Management ToolsLesson 3: PC Technician Professional Best PracticesTopics:Tools of the TradeElectrical SafetyEnvironmental Safety and Materials HandlingPerform Preventative MaintenanceDiagnostics and TroubleshootingProfessionalism and CommunicationLesson 4: Installing and Configuring Peripheral ComponentsTopics:Install and Configure Display DevicesInstall and Configure Input DevicesInstall and Configure Adapter CardsInstall and Configure Multimedia DevicesLesson 5: Installing and Configuring System ComponentsTopics: Install and Configure Storage DevicesInstall and Configure Power SuppliesInstall and Configure MemoryInstall and Configure CPUsInstall and Configure System BoardsLesson 6: Maintaining and Troubleshooting Peripheral ComponentsTopics: Troubleshoot Display DevicesMaintain and Troubleshoot Input DevicesTroubleshoot Adapter CardsTroubleshoot Multimedia DevicesLesson 7: Troubleshooting System ComponentsTopics:Troubleshoot Storage DevicesTroubleshoot Power SuppliesTroubleshoot MemoryTroubleshoot CPUsTroubleshoot System BoardsLesson 8: Installing and Configuring Operating SystemsTopics:Install Microsoft WindowsUpgrade WindowsAdd Devices to WindowsOptimize WindowsLesson 9: Maintaining and Troubleshooting Microsoft WindowsTopics: Operating System UtilitiesMaintain Microsoft WindowsTroubleshoot Microsoft WindowsRecover Microsoft WindowsLesson 10: Network TechnologiesTopics:Network ConceptsNetwork CommunicationsNetwork ConnectivityInternet TechnologiesLesson 11: Installing and Managing Network ConnectionsTopics:Create Network ConnectionsInstall and Configure Web BrowsersMaintain and Troubleshoot Network ConnectionsLesson 12: Supporting Laptops and Portable Computing DevicesTopics:Laptop and Portable Computing Device ComponentsInstall and Configure Laptops and Portable Computing DevicesMaintain and Troubleshoot Laptops and PortableComputing DevicesLesson 13: Supporting Printers and ScannersTopics:Printer and Scanner TechnologiesPrinter and Scanner ComponentsPrinter and Scanner ProcessesInstall and Configure Printers and ScannersMaintain and Troubleshoot Printers and ScannersLesson 14: Personal Computer Security ConceptsTopics: Security FundamentalsSecurity Protection MeasuresData and Physical SecurityWireless SecuritySocial EngineeringLesson 15: Supporting Personal Computer SecurityTopics:Install and Configure Security MeasuresMaintain and Troubleshoot Security MeasuresAppendix E: A Brief History of Personal ComputersCompTIA A+ Certification ProfessionalNetworking FundamentalsUnit 1: Introduction to NetworkingOverviewObjectivesIntroductionNetworking ConnectivityNetwork ExtensionNetwork TopologiesProtocolsPrograms and ProcessesProtocol Layering ConceptsEncapsulation and DE capsulationSummaryAssessmentsUnit 2: The OSI Model Layers 1 - 4OverviewObjectivesIntroductionThe Physical LayerThe Data Link LayerThe Network LayerThe Transport LayerSummaryAssessmentsUnit 3: The OSI Model Layers 5 - 7OverviewObjectivesIntroductionThe Session LayerThe Presentation LayerThe Application LayerSummaryAssessmentsUnit 4: LAN ArchitectureOverviewObjectivesIntroductionHistory of LANsTransmission Methods and MediaLAN Protocols IntroductionEthernetToken RingToken BusFiber Distributed Data Interface (FDDI)Wireless LANsLAN ProtocolsSummaryAssessmentsUnit 5: Computing PlatformsOverviewObjectivesIntroductionPersonal ComputersWorkstationsMidrange ComputersMainframe ComputersSummaryAssessmentsUnit 6: Network Operating SystemsOverviewObjectivesIntroductionThe Client/Server ModelRemote Procedure Call (RPC)PC LAN Architectures and the OSI ModelNetwork Operating SystemXerox Network Systems (XNS) and the OSI ModelNovell NetWare and the OSI ModelAppleTalk and the OSI ModelBanyan Vines and the OSI ModelIBM PC LANs and the OSI ModelWindows NT and the OSI ModelUNIX and the OSI ModelLANtastic and the OSI ModelSummaryAssessmentsUnit 7: System ArchitecturesOverviewObjectivesIntroductionTCP/IP Naming and AddressingTCP/IP Applications and Application ServicesTCP/IP Protocol DetailsSystem ArchitecturesSummaryAssessmentsUnit 8: InternetworkingOverviewObjectivesIntroductionRelays and RepeatersBridgesRoutersGatewaysHubsSwitchesNetwork Management and SNMPSummaryAssessmentsUnit 9: Telecommunications Overview OverviewObjectivesIntroductionSample Telecommunications Services and ComponentsWAN Link OptionsSummaryAssessmentsUnit 10: Summary — Network Case StudyOverviewObjectivesIntroductionNetwork Case StudySummaryAssessments781050203200Advance Course00Advance CourseCertified Web Development SpecialistMODULE 1 – Introduction to Web TechnologyDay 1 / Learning the Basics of Web Technology1Idea about - Web Designing, Web Development, Software Development, Outsourcing, Freelancing.2Basic Ideas on - Domain, Hosting, IP, Server, NameServer, Programming Language, Designing Language, Structured Query Language, Framework, CMS, IDE, cPanel, Domain Control Panel, FTP Client, Local Server.3Discuss on what we will be Learning in the Web Technology course and how4Code Concepts, Program ConceptsDay 2 / Learning to Use the Tools of Web Programming1How to use IDEs (NotePad++, NetBeans, PHPStorm, PHPEdit)2How to use Local Server Application (XAMPP, WAMP, LAMP, MAMP)3How to operate cPanel and Domain Control Panel4How to use FTP Clients (CoreFTP, FileZilla)MODULE 2 – HTML and HTML5Day 3 / Practicing the Basics of HTML and HTML Pages1Comments, Starting HTML Page, Head, Style, Script, Body2Meta Tag, Meta Attributes, Keywords, Description, Author, Page Refresh3Paragraph, Heading, Division, Section, Article4Header, Footer, Main, Aside5Span, Cite, Address, Abbreviation, Details, Summary6Bold, Underline, Italic, Small, Strong, Subscript, Superscript7Delete, Mark, Code, Block Quote, QuotationDay 4 / Practicing Advanced HTML and Basic HTML51Font, Font Size, Font Color, Font Face2HTML Entities – Registered Trademark, Copyright, Euro, Space, Cent, Pound3Symbol – Summation, Elements Of, Not Elements Of, Empty, Differential Sign4URL Anchor, Mail Anchor, Call Anchor, Target5Navigation Tag, Purpose of Navigation Tag6Image, Image Source, Alternate Attribute, Height and Width, Title7Description List, Define Terms, Define Details, Ordered List, Unordered List, List ItemDay 5 / Practicing More HTML5 and Designing Pages1iFrame, iFrame Target, Sandbox Attribute, Load iFrame on Click2Audio, Video, Source, Media Type, Preload, Stream YouTube Video using iFrame3Base URL, Bidirectional Override, Preformatted Text, Data List, 4Level, Result, Access Key, Editable Attribute, Downloadable Product 5Table, Table Row, Table Data, Table Head, Table Body, Table Foot, Style Attribute, Border6HTML Form, Input Types, Get and Post Method, Button Tag, Button Attributes7Designing Website Layout using HTML Day 6 / Exam on HTML and HTML51Online Quiz2Mentoring Session3Professional Lab TestMODULE 3 – CSS and CSS3Day 7 / Practicing Basic CSS Codes1How to and Where to CSS code, Comments in CSS, Converting Style Attribute to CSS2ID Selector, Class Selector, Child Class, Grouping Selector, Multi Stylesheet, Link Stylesheet3Background Image, Background Repeat, Background Position, Background Color4Padding, Margin, List, Font, Link, and Table using CSS5CSS Combinators – Child Selector, Descendent Selector, Adjacent Selector; Target Selector6Dimension, Media Screen, Responsive Design7Cursor, Custom Font (from External and Internal Source)Day 8 / Designing with Advanced CSS and Basic CSS31Border in CSS, Box Shadow, Opacity, Horizontal Alignment, Background Image Handling2White Space, Float, Clear Tag, Columns, Visibility, Animation, Animation Moves3Table in CSS, Position in CSS4An example Dropdown Menu using CSS5Outline, Menu Example 1 and 2, CSS for Print Screen6Transform, Border-box7Designing Button using CSSDay 9 / Designing more Advanced with CSS31Designing Search Box and Text Fields using CSS32Border Image, Background Image, Background Color3Gradient, Text Shadow, Word Break4Rotate, Rotate X, Rotate Y, Content Position, Counter5Transform, Animation, Button in CSS3, Columns, Filter6Designing Layout using CSS7Understanding the Concept of Template and ThemeDay 10 / Exam on CSS and CSS31Online Quiz2Mentoring Session3Professional Lab TestMODULE 4 – JavaScriptDay 11 / Basic JavaScript1Writing JavaScript Code, Comments, Simple Variable, Variable Types2JS Operators, Simple Function, Parameter, Arguments3If Else Statement, Handling Multiple Condition, Conditional Operators4Get Element By ID, Get Element By Tag Name, Get Element By Class5Switch Case, For Loop, EVAL FunctionDay 12 / Advanced JavaScript1ParseInt, ParseFloat, ParseString, This Element2Class and Object, Advanced Class and Object3Handling String, Handling Number4Handling Math, Handling Math5Handling ArrayDay 13 / Examples on JavaScript1Example - Form Validation, Advanced Form Validation2Example - JSON Format, Auto Select, Confirm Function, 3Example - Image Slider, Popup Page4Example - Printing Option Creation, Random URL, Blur5Example - Creating Dynamic Dropdown MenuDay 14 / Exam on JavaScript1Online Quiz2Mentoring Session3Professional Lab TestMODULE 5 – jQueryDay 15 / jQuery Basics, the JavaScript Library1Basis Rules and Guidelines on jQuery; Show, Hide, Toggle Function;2Change CSS using jQuery, Menu with Mouse-over and Mouse-out3Focus and Blur on Text Field4Fade-in, Fade-out, Fade-Toggle5Slide-up, Slide-down, Menu using Toggle6Get and Set Text/HTML using jQuery; Day 16 / jQuery Basics, the JavaScript Library1Example – Add and Remove Element Dynamically2Get Dimension using jQuery, Animation using jQuery3Load File using jQuery, AJAX Page Load using jQuery, No Conflict Function4Make Popup using jQuery, Print Selected Division using jQuery5Calendar Date Picker, Crosscheck Password using jQueryDay 17 / Exam on JavaScript1Online Quiz2Mentoring Session3Professional Lab TestMODULE 6 – Search Engine Optimization & Social Media IntegrationDay 18 / Understanding SEO and SMI1Basics – What is SEO, Types of SEO2Research and Analysis – Market, Keyword, Competitor3SEO Guide for Web Design – Content Guideline, Optimization, Design & Layout, Sitemap4Analytics – Google Analytics, Setup, Configure, Understand and Manage5Basics on “On-Page Optimization”6Domain Names & Suggestions, Popular TLD and Domain Names7Meta Tags, Meta Description, Meta Keywords, Title, Header, Bold Text, Invisible Text8Images and Alt Text Handling, Broken Link Handling, Duplicate Content9Internal Link Building, Sitemap Creation and Management, Robots Text10Server and Hosting Check, 301 Redirection, 404 Error11Basics on “Off-Page Optimization”12Page Rank, Link Popularity, Link Building in Detail, Directory Submission13Search Engine Submission14Blog Submission, Articles Writing, Posting to Forums 15Links Exchange, SEO through other Exchanging16Keyword Analyzer Tools, Google Tools, Yahoo Tools, Bing Tools17What is Social Media Integration, What are the Most Popular Social Medias18Facebook Integration – Like Button, Like-box, Facebook Posts on your Website19More Facebook Integration – Facebook Comments20Facebook Ads and MarketingMODULE 7 – Photoshop for Web/App DevelopersDay 19 / Basics of Photoshop1Marquee, Lasso, Slice, Crop, Move Tools and their Practical Use2Brush, Pencil, Patch, Stamp, History Tools and their Use3Eraser, Blur, Sharpen, Smudge, Dodge, Sponge, Burn Tool and their Use4Gradient, Paint Bucket, Different Shape Tools and their Use5Selection and Pen Tool6Eyedropper, Hand and Zoom Tool7Color, Swatches, Style Window and their Use8History Window and its Use9Different Type of Brush and their Use10Image, Canvas, Pixel, Rotation, Trim, Revert etc Actions11Extract, Filter Gallery, Liquefy, Pattern Maker and their Use12Different type of Layer and their UseMODULE 8 – SQL/MySQLDay 20 / Understanding Database and Database Management Tools1What is Database; Traditional and Modern way of storing Data;2What are the basic Tools for Database Management, Understanding SQLYog3Understanding the Interface and Features of PhpMyAdmin; Data Export and Import;4Handling Database and Table Structure (Create, Alter, Delete) using PhpMyAdmin5Insert, Update, Delete data using PhpMyAdmin; Using Functions from PhpMyAdmin6Working with SQLYog; Working on Remote Database Server;Day 21 / Managing Database and Table Structures in SQL/MySQL1MySQL Intro – How, when and where to use MySQL2MySQL Connect – How to get connected to MySQL3CREATE Database – How to Create Database4DROP Database – How to Drop a Database5KEYS– Use and Importance of Primary and Unique Key in Database6NULL & NOT NULL – Importance & Contradiction of NULL & NOT NULL7AUTO-INCREMENT – How to Auto-Increment in Database8DEFAULT – MySQL Default and its use9DATE – Date, Time and Timestamps in MySQL Database10CREATE Table – How to Create Table using MySQL Query and SQLYog11ALTER Table – How to Alter Table using MySQL Query and SQLYog12DROP Table – How to Drop Table using MySQL Query and SQLYogDay 22 / Advanced Queries using SQL/MySQL1INSERT INTO – How to insert data in a Data-Tables2SELECT – How to select and grab Data from Data-Table (In Different Ways)3WHERE – How to select Data from Database using Conditions4ORDER BY – How to bring Data from Database in Order5GROUP BY – Grouping Database outputs from MySQL6UPDATE – How to Update Data in a Data-Table7DELETE – How to Delete Data of a Data-Table8BASIC JOIN – How to use JOIN and the Importance of it in Database9LEFT JOIN – Use of Left Join and its Practices10RIGHT JOIN – Use of Right Join and its Practices11FULL JOIN – Use of Full Join and its Practices12OUTER JOIN – Use of Outer Join and its PracticesDay 23 / Working with Advanced MySQL1MySQL Functions – Understanding the Importance of Functions2Group By, Having, Count Function3Average, Minimum, Maximum, Sum, Length4Round, Format, Now Function5First, Last, Mid Function6UCase, LCase Function7Understanding Primary Key, Foreign Key, Reference, and Constrain8Implementing Relation, and Creating Relational Database9Creating Database of an E-Commerce Website10Upload Database on Real Server (cPanel/PhpMyAdmin)Day 24 / Exam on SQL/MySQL1Online Quiz2Mentoring Session3Professional Lab TestMODULE 9 – PHP (Basics and Advanced)Day 25 / Learning Basics of PHP1Syntax, Print / Echo – Basic concepts on PHP2Variables, Data Types, Constants – Data Types and Variables in PHP 3Operators – Operators in PHP Programming4If...Else...Else-If – Different conditional statements in PHP5Switch – PHP Switch Case 6Syntax, Print / Echo – Basic concepts on PHP7For Loops and Foreach Loop – Practical implementation of Loop8Date – Use of Date functions and their ElementsDay 26 / Learning Advanced Topics in PHP1Arrays – Array and multi-dimensional data handling2String – Working with Strings using PHP3Error, Exception – Error and Exception Handling using PHP4Custom Functions – Use of Custom Function Development and its Practical uses5Library Functions – Trim, Round, Min, Max etc.6Handling HTML Form using PHP – Detailed guideline to use Form in PHP7Form Field Validation – Verifying data (Email, URL etc.) that will be accepted by Form8File Handling and Upload – Handling File and Uploading File using PHP9Form Security – Safety of Submitted Data using HTML Form / Know about SQL Injection10User Agent – Identify website’s Visitor Type, whether it is Bot or UserDay 27 / Learning Cookie, Session, Encryption, Class and Object1Cookies – How to use Cookies in PHP2Sessions – Use of Session, Guideline about Login-Registration System3Reading File – Reading File Data in Read/Write Mode by Character or by String4Encryption – Data Encryption, Hash, Salt Mechanism5Knowing details about Class and Object6Understanding Constructor and Destructor7Child Class and Inheritance8Encapsulation – Private, Public and Protected Data Type9Static Variable, Static Function10Magic Method - Call, Set and Autoload Function; Concept of NameSpaceDay 28 / Handling Database using PDO; Learning to Parse XML1Connect to Database using PHP MySQLi Class2Select Data using PHP MySQLi Class3Insert Data in Database using PHP MySQLi Class; Get Last Insert ID;4Update Data in Database using PHP MySQLi Class5Delete Data from Database using PHP MySQLi Class6Create Database and Table using PHP MySQLi Class7Connect to Database using PDO Class; Understanding Prepared Statement;8Select Data from Database; Select Data from Database with Placeholder;9Insert Data into Database; Insert Data from Database using Placeholder;10Update Data into Database using PDO Class;11Delete Data from Database using PDO Class;12Handling Error in PDO; 13Create Table and Database using PDO Class;14Parse XML; Show data from XML Data source;Day 29 / Sending real-time Mail & SMS; Generate PDF & Excel; AJAX Pagination1Send Mail using PHP with the help of Apache/SendMail Module; Send SMTP Mail2Send SMS using PHP with the help of SMS Gateway, Learn to use cURL3Generate PDF using DOM PDF Library; Generate Excel using PHPExcel Library4Create Paginated Table using AJAXDay 30 / Integrate Payment Gateway; Safe File Download; Dynamic Search; Graph1Integrate real-time Payment Gateway in your Project2Download File without creating any Download Link / Safe File downloading Facility using PHP3Use jQuery AJAX, PHP and MySQL to create Dynamic Search; Example of Dropdown4Generate Graph (Bar Diagram) using jQuery, PHP and MySQLDay 31 / Exam on PHP 7.01Online Quiz2Mentoring Session3Professional Lab TestMODULE 10 – Professional ProjectDay 32 / Preparing all the Designs and Codes for Project1Creating and Documenting Requirements2Preparing Database for Project3Preparing Template for the Project4Preparing the Skeleton of the Project (View, Model, Controller)Day 33 / Professional Web Project – Day 11Create Admin Panel; Login System and Access Level Control;2Admin Module - Add Admin, List Admin, Edit Admin Delete Admin;3Customer Module P1 – List Customer; Edit Customer Profile; Reset Customer Password4Customer Module P2 – List Addresses, Edit Addresses;Day 34 / Professional Web Project – Day 21Product Module - Add Product, List Product, Edit Product, Delete Product; Set Featured Product;2Order Module – List Invoice/Orders, Change Invoice/Order Status; Send Mail on Status Change;3Slider Module – Add Slider, Edit Slider, Delete SliderDay 35 / Professional Web Project – Day 31Login in the Website2Register in the Website; Send Mail on Registration;3Access Control in PagesDay 36 / Professional Web Project – Day 41My Account Page2Address Book Page3Make Dynamic MenuDay 37 / Professional Web Project – Day 51Make Category and Sub-Category Pages2Make Product Details Page3Create Shopping Cart and Shopping Cart PageDay 38 / Professional Web Project – Day 61Order Submission; Checkout Page2Payment Gateway Integration3Send Payment Notification; Generate Invoice4Order List PageDay 39 / Professional Web Project – Day 71Return Management2Make different Sections of the Website Dynamic3Implementing XML Download of Data List from Admin Panel4Understanding the Concepts of: Inventory ManagementDay 40 / Know details about Freelancing and Outsourcing1How to create UpWork /Freelancer Accounts2How to make a 100% Perfect Profile for Freelancing Job3Which exams should a person attain to Highlight his Freelancer Portfolio4How to receive a job and its Requirements, and start working with it5How to Deliver the job and receive Payment6What are the scopes of National Level Job Market in Web Technology Sector7Some more Tips and Tricks about Web Technology Career8Getting ready for Local Market as Job Seeker / Local FreelancerCISCO CERTIFIED NETWORK ASSOCIATEExam: 200-120IP Data NetworksUnderstand the operation of data networks.Know the purpose and functions of network devices such as routers, switches, bridges and hubs.Be able to select components to meet a specific network requirement.Understand how certain applications can impact network performance.Know the protocols, purpose and operation of both the OSI and TCP/IP models.Describe the data flow between two hosts on a networkBe able to choose the most appropriate cables, media, ports and connectors to connect network devices and hosts to a LAN.LAN SwitchingUnderstand the media access control method for Ethernet.Describe the basic switching concepts and the operation of switches.Configure and verify switch configuration including remote access management.Verify a network and switch operation using basic utilities such as ping, telnet and SSH. Describe VLANs and the need for routing between VLANs.Understand network segmentation and traffic management.Be able to configure and verify VLANs.Configure and verify trunking on Cisco switches.Understand advanced switching technologies: RSTPPVSTPEtherChannelBe able to configure and verify PVSTP operation.Describe the process of root bridge election.IP Addressing (IPv4 and IPv6)Describe the need for public and private addresses for IPv4.Understand IPv6 addresses.Describe the appropriate IPv6 addressing scheme for a LAN/WAN environment.Describe the appropriate IPv4 addressing scheme for a LAN/WAN environment, including VLSM and summarization.Identify the appropriate IPv4 addressing scheme using VLSM and summarization to satisfy addressing requirements in a LAN/WAN environment. Describe the technologies required to run IPv6 and IPv4 concurrently such as dual stack. IP Routing Understand the basic routing concepts.Understand the boot process of a Cisco router.Configure and verify a basic router configuration using the command line interface.Configure and verify both serial and Ethernet interfaces.Be able to verify the network connectivity and configuration of a router.Configure a static or default route given specific requirements, then verify.Manage Cisco IOS files and image(s).Understand Cisco IOS licensing.Understand and distinguish different methods of routing and routing protocols.Configure and verify EIGRP in a single autonomous system.Configure and verify OSPF (v2 and v3) in a single area.Configure and verify interVLAN routing using router-on-a-stick.Be able to configure SVI interfaces.IP ServicesConfigure and verify DHCP on a Cisco router.Understand the features and applications of each type of ACL.Be able to configure and verify ACLs.Understand the basic operation of NAT.Configure and verify NAT based on a set of network requirements.Be able to configure and verify NTP as a client.Recognize high availability FHRP.Understand, configure and verify Syslog and utilize Syslog output.Understand SNMP v2 and work Device SecurityBe able to configure and verify device security features.Understand, configure and verify switch port security features.Configure and verify ACLs for filtering network traffic.Limit telnet and SSH access to a router by configuring ACLs.TroubleshootingTroubleshoot and correct common issues concerning IP addressing and host configurations.Be able to utilize netflow and monitor data.Troubleshoot and fix spanning tree operation.Troubleshoot and resolve routing issues, including OSPF, and EIGRP.Troubleshoot and correct VLAN problems.Identify and resolve interVLAN problems.Troubleshoot and resolve switch trunking issues.Troubleshoot and fix ACL problems.Troubleshoot and correct layer 1 problems.Troubleshoot and correct WAN issues.Troubleshoot EtherChannel issues.WAN TechnologiesUnderstand and identify different WAN technologies including: Metro EthernetFrame RelayVSATCellular 3G and 4GMPLST1/E1ISDNDSLCableVPNConfigure and verify a serial WAN connection.Configure Frame Relay on Cisco routers including verification.Be able to configure and verify a PPP connection between two Cisco routers.Configure and troubleshoot PPPoE.?762000133350Specialization Courses for Security(Only for those assigned by SSF)00Specialization Courses for Security(Only for those assigned by SSF)5A.Introduction to Information Security Fundamentals and Best Practices5B.work Assurance5D.Secure Software and Browser rmation Risk Management5F.Cyber Incident Analysis and Response5G.Ethical Hacking and Counter Measure5A. INTRODUCTION TO INFORMATION SECURITY FUNDAMENTALS AND BEST PRACTICESiZoom Certified Security Specialist (ICSS) allows students to enhance their skills in three different areas namely information security, network security, and computer rmation security plays a vital role in most organizations. Information security is where information, information processing, and communications are protected against the confidentiality, integrity, and availability of information and information processing. In communications, information security also covers trustworthy authentication of messages that covers identification of verifying and recording the approval and authorization of information, non-alteration of data, and the non-repudiation of communication or stored data.WHO SHOULD ATTENDThis course will benefit students who are interested in learning the fundamentals of information security, network security, and computer forensics.EXAM INFORMATIONThe ICSS exam will be conducted on the last day of training. Students need to pass the online Exam to receive the ICSS certification.EXAM DETAILS:Number of Questions: 50Passing Score: 70%Test Duration: 2 HoursTest Format: Multiple ChoiceCERTIFICATION:This course prepares an individual to sit for ECSS exam this certification is an excellent complement to educational offerings in the domain of security and networking.Educational institutions can provide greater value to students by providing them not only with one of the most updated courses available today, but also a certification that empowers students in the corporate world.5B. COMPUTER HACKING FORENSIC INVESTIGATOR CERTIFICATIONAbout the ProgramComputer forensics is the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crimes or misuse, including but not limited to; theft of trade secrets, theft of or destruction of intellectual property, and fraud. Computer forensic investigators can draw from an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information.The CHFI course will give participants the necessary skills to identify an intruder’s footprints and to properly gather the necessary evidence to prosecute. Many of today’s top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. It is no longer a matter of “will your organization be comprised (hacked)?” but, rather, “when?” Today’s battle between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now, the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminal, then this is the course for you.A CHFI v8 certified professional will be able to understand:The process of investigating cyber-crimes and the laws involved, as well as details in obtaining a search warrant.Different types of digital evidence, rules of evidence, digital evidence examination processes, and electronic crime and digital evidence consideration by crime category.Roles of a first responder, first responder toolkit, securing and evaluating an electronic crime scene, conducting preliminary interviews, documenting electronic crime scenes, collecting and preserving electronic evidence, packaging and transporting electronic evidence and reporting the crime sceneHow to recover deleted files and deleted partitions in Windows, Mac OS X, and LinuxThe process involved in forensic investigation using Access Data FTK and Encase Steganography and its techniques, as well as steg analysis, and image file forensicsPassword cracking concepts, tools, types of password attacks and how to investigate password protected file breaches.Different types of log capturing techniques, log management, time synchronization and log capturing tools.How to investigate logs, network traffic, wireless attacks, and web attacksHow to track e-mails and investigate e-mail crimes and many more.About the ExamThe CHFI certification is awarded after successfully passing the exam EC0 312-49. CHFI EC0 312-49 exams are available at ECC exam center around the world.CHFI Exam DetailsNumber of Questions: 150Passing Score: 70%Test Duration: 4 hoursTest Format: Multiple choiceTest Delivery: ECC exam portalCHFI Course OutlineComputer Forensics in Today’s WorldComputer Forensics Investigation ProcessSearching and Seizing ComputersDigital EvidenceFirst Responder ProceduresComputer Forensics LabUnderstanding Hard Disks and File SystemsWindows ForensicsData Acquisition and DuplicationRecovering Deleted Files and Deleted PartitionsForensics Investigation Using AccessData FTKForensics Investigation Using EnCaseSteganography and Image File ForensicsApplication Password CrackersLog Capturing and Event CorrelationNetwork Forensics, Investigating Logs and Investigating Network TrafficInvestigating Wireless AttacksInvestigating Web AttacksTracking Emails and Investigating Email CrimesMobile ForensicsInvestigative ReportsBecoming an Expert WitnessWho Is It For?The CHFI program is designed for all IT professionals involved with information system security, computer forensics, and incident response.Target AudiencePolice and other law enforcement personnelDefense and Military personnele-Business Security professionalsSystems administratorsLegal professionalsBanking, Insurance and other professionalsGovernment agenciesIT WORK ASSURANCENetwork Assurance covers secure network practices necessary to protect networked systems against attacks and exploits. Network security administration topics include firewalls, intrusion detection/prevention, common cryptographic ciphers, AAA (authentication, authorization, and accounting), server and client security, and secure policy generation.Two credit hours through ACE are provided only if all four courses within the Online for IT Professionals (Cyber 201) track are completed.5D.SECURE SOFTWARE AND BROWSER SECURITYWe begin day one with an overview of recent web application attack and security trends, then follow up by examining the essential technologies that are at play in web applications. You cannot win the battle if you do not understand what you are trying to defend. We arm you with the right information so you can understand how web applications work and the security concepts related to them.We discuss the authentication aspect of web applications in depth. The vulnerability of authentication is covered, followed by examples of exploitation and the mitigations that can be implemented in the short and long term. We complete the discussion by providing information on how to discover and test for vulnerabilities.Authorization is the last topic of discussion for the day: the goal is to make sure that applications properly control access to the appropriate resources. You will learn the right way to plan for access during the development life cycle and the common pitfalls with access control. Similar to the discussion on authentication, we start with the vulnerabilities and then move on to mitigations and testing, followed by a section on best practices on authorization.WEB BASICS AND AUTHENTICATION SECURITY HTTP basicsOverview of web technologiesWeb application architectureRecent attack trendsAuthentication vulnerabilities and defenseAuthorization vulnerabilities and defenseWEB APPLICATION COMMON VULNERABILITIES AND MITIGATIONSSSL vulnerabilities and testingProper encryption use in web applicationSession vulnerabilities and testingCross-site request forgeryBusiness logic flawsConcurrencyInput-related flaws and related defensesSQL injection vulnerabilities, testing, and defensePROACTIVE DEFENSE AND OPERATION SECURITYCross-site scripting vulnerability and defensesWeb environment configuration securityIntrusion detection in web applicationIncident handlingHoneytokenAJAX AND WEB SERVICES SECURITYWeb services overviewSecurity in parsing of XMLXML securityAJAX technologies overviewAJAX attack trends and common attacksAJAX defenseCUTTING-EDGE WEB SECURITYClickjackingDNS rebindingFlash securityJava applet securitySingle-sign-on solution and securityIPv6 impact on web securityWho Should Attend?Application developersApplication security analysts or managersApplication architectsPenetration testers who are interested in learning about defensive strategiesSecurity professionals who are interested in learning about web application securityAuditors who need to understand defensive mechanisms in web applicationsEmployees of PCI compliant organizations who need to be trained to comply with PCI requirementsYou Will Be Able ToUnderstand the major risks and common vulnerabilities related to web applications through real-world examples. Mitigate common security vulnerabilities in web applications using proper coding techniques, software components, configurations, and defensive architecture.Understand the best practices in various domains of web application security such as authentication, access control, and input validation.Fulfill the training requirement as stated in PCI DSS 6.5. Deploy and consume web services (SOAP and REST) in a more secure fashion.Proactively deploy cutting-edge defensive mechanisms such as the defensive HTTP response headers and Content Security Policy to improve the security of web applications.Strategically roll out a web application security program in a large environment.Incorporate advanced web technologies such as HTML5 and AJAX cross-domain requests into applications in a safe and secure manner.Develop strategies to assess the security posture of multiple web applications.Hands-on TrainingFull-day lab with hands-on exercises on how to secure a web application, starting with the operating system, the web server, finding configuration problems in the application language setup, and finding and fixing coding problems in the site.RMATION RISK MANAGEMENTEach and every day, vital data is at risk and under attack across the globe. Information security breaches have become a serious problem at even the largest, most sophisticated companies and organizations. Career opportunities have soared in recent years for professionals who can mitigate these threats.In this three-course certificate program, you’ll examine key concepts in this rapidly evolving field. We’ll show you how to identify and combat different types of threats and attacks with cutting-edge tools and techniques. You’ll develop the ability to create and implement comprehensive risk management programs for organizations of all sizes. Acquire the knowledge and skills to secure your current role and elevate your career trajectory.WHAT YOU'LL LEARNSecurity strategies relating to issues such as privacy, legal and regulatory compliance, social and geopolitical impacts, national security and evolving technologiesBest practices for protecting mobile workforces, developing security metrics, managing electronic evidence, handling e-crime and e-discovery, and securing information in the cloudHow to develop and maintain risk assessments and risk management plansStandards for business continuity and disaster recovery planningTechniques for designing information assurance strategies?Get Hands-On ExperienceServe as an information security consultant to a local organizationWork on real-world scenarios using state-of-the-art EC-Council iLabs software (purchase required)5F.CYBER INCIDENT ANALYSIS AND RESPONSEAn examination of policies and procedures related to security incidents, exposures, and risks and technologies used to respond to such threats. Topics include dynamic vulnerability analysis, intrusion detection, attack response, evidence protection, and business continuity. Discussion also covers types and modes of computer-facilitated attacks, readiness, and evidence scope, as well as the role of computer emergency response teams.Learning Objectives:?At the end of this course, students should be able to:Develop and utilize policies, procedures, and technologies for incident analysis.Evaluate risk management techniques to address potential exposures.Develop incident response plans and procedures that maintain investigative integrity for a variety of incidents and exposures.Incorporate incident management, containment, identification, eradication, and recovery.Evaluate environment for global/international influences and determine risk implications.Construct a business continuity plan.Utilize forensic techniques to determine extent of incident, and formulate corrective and evidentiary-based response.Analyze types and modes of computer-facilitated attacks for their potential organizational and global impact.Incorporate analysis and response results into appropriate action plans, reporting, information sharing, improvement cycles, and exposure elimination.Evaluate inter and intra organizational resources for incident investigation and response.5G.Ethical Hacking and Counter MeasureThe Certified Ethical Hacker program is the pinnacle of the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”.This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment.This ethical hacking course puts you in the driver’s seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems. You will be taught the five phases of ethical hacking and the ways to approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.Underground Hacking ToolsThe hacking tools and techniques in each of these five phases are provided in detail in an encyclopedic approach to help you identify when an attack has been used against your own targets. Why then is this training called the Certified Ethical Hacker Course? This is because by using the same techniques as the bad guys, you can assess the security posture of an organization with the same approach these malicious hackers use, identify weaknesses and fix the problems before they are identified by the enemy, causing what could potentially be a catastrophic damage to your respective organization.We live in an age where attacks are all susceptible and come from anyplace at any time and we never know how skilled, well-funded, or persistent the threat will be. Throughout the CEH course, you will be immersed in a hacker’s mindset, evaluating not just logical, but physical security. Exploring every possible point of entry to find the weakest link in an organization. From the end user, the secretary, the CEO, misconfigurations, vulnerable times during migrations even information left in the dumpster.Who Is It For?The Certified Ethical Hacking training course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.Introduction to Ethical HackingFoot printing and ReconnaissanceScanning NetworksEnumerationSystem HackingMalware ThreatsSniffingSocial EngineeringDenial-of-ServiceSession HijackingHacking WebserversHacking Web ApplicationsSQL InjectionHacking Wireless NetworksHacking Mobile PlatformsEvading IDS, Firewalls, and HoneypotsCloud ComputingCryptographyWhat is New in CEH Version 9 CourseFocus on New Attack Vectors Emphasis on Cloud Computing Technology CEHv9 focuses on various threats and hacking attacks to the emerging cloud computing technologyCovers wide-ranging countermeasures to combat cloud computing attacksProvides a detailed pen testing methodology for cloud systems to identify threats in advanceEmphasis on Mobile Platforms and Tablet Computers CEHv9 focuses on the latest hacking attacks targeted to mobile platform and tablet computers and covers countermeasures to secure mobile infrastructureCoverage of latest development in mobile and web technologiesNew Vulnerabilities Are Addressed Heartbleed CVE-2014-0160 Heartbleed makes the SSL layer used by millions of websites and thousands of cloud providers vulnerable.Detailed coverage and labs in Module 18: Cryptography.Shellshock CVE-2014-6271 Shellshock exposes vulnerability in Bash, the widely-used shell for Unix-based operating systems such as Linux and OS X.Detailed coverage and labs in Module 11: Hacking WebserversPoodle CVE-2014-3566 POODLE lets attackers decrypt SSLv3 connections and hijack the cookie session that identifies you to a service, allowing them to control your account without needing your password.Case study in Module 18: CryptographyHacking Using Mobile Phones CEHv9 focuses on performing hacking (Foot printing, scanning, enumeration, system hacking, sniffing, DDoS attack, etc.) using mobile phonesCourseware covers latest mobile hacking tools in all the modulesCoverage of latest Trojan, Virus, BackdoorsCourseware covers Information Security Controls and InformationSecurity Laws and StandardsLabs on Hacking Mobile Platforms and Cloud ComputingMore than 40 percent new labs are added from Version 8More than 1500 new/updated toolsCEHv9 program focuses on addressing security issues to the latest operating systems like Windows 8.1It also focuses on addressing the existing threats to operating environments dominated by Windows 7, Windows 8, and other operating systems (backward compatibility)PARTNERSiZoom realized that in order to maintain vision and strength in the technology competitive. Collaboration between technical expertise and know-how must be uniquely merged. Especially software products and business needs are subject to ever faster changes, thus iZoom works in a targeted manner with pioneer know-how partners. Partners are chosen for their recognized expertise and commitment to deliver customers high quality data processing, services and solutions in a secure and reliable manner.iZoom strategic Business partners are:Since its inception in 2005 in North America, PeopleNTech has trained over 4,000 Americancitizens and immigrants, who are earning between $80,000 and $200,000 every year. Abubokor Hanip, founder of PeopleNTech is strongly focused on changing lives and careers since its inception. At PeopleNTech, we provide hands on training with real-time project oriented approach. 95% of our students get employed within a week of completing the course. The real world competition pushes us to innovate new methods and approaches towards training improvements. We are a job market driven career change facility with decades of experience in the fields of software quality assurance, business analyst and database administration. Our certified instructors work closely with the students in every step of their learning process. Headquartered in Tyson's Square, Virginia, PeopleNTech operates full service training center in New York (Astoria & Brooklyn), Atlantic City in New Jersey, Kitchener in Ontario Canada, Gurgaon, Haryana in India and finally in Dhaka, Bangladesh. Live online training is also available via the World Wide Web for your convenience.DataSoft has been a CMMi level 5 in progress; ISO 9001:2008 certified leading software product and Service Company in Bangladesh. Since 1998, DataSoft has successful track record of delivering innovative and cost-effective technical services to customers in both Corporate and public sectors undertakings. Our customer includes number of Fortune 500 companies and offering mission critical public services IT services like e-Payment, Customs House Automation, Port IT operation (CTMS), automation of commercial banks and more than 2200microfinancebanks in SaaS model on a private cloud, to name a few.We have track record in web application, Mobility, Bio-informatics, BigData, and Simulation-Gamingand these days Internet of Thing Technology adaptation.Tech Valley Solutions Ltd. (TVSL) is a Concern of Tech Valley Computers Ltd., working keenly closer to the challenge as a one point solution provider in SL has started upgrading its existing man power with internationally recognized certifications in every sector of its operation and in some special cases, acquired more experienced and professional people with excellent customer service support in mind.We are proud to announce that our company has in its possession the best computer engineers, programmers and most dynamic sales squad in our country concerning educational background and experience. Having adequate expertise, the company has earned the capability to serve the local need of IT with proper support & maintenance services. These made the company as one of the leading IT Company of the country.The services offered by TVSL is regarded by the customers as skillful and friendly because they are executed by professionals bearing in mind the importance of a customer as well as due to the competence of their technological knowledge. Our aim is to give the customer an efficient and reliable system for maximum productivity as well as lowest possible expenditure of maintenance.SCSL is one of the leading ICT solutions and services providers in Bangladesh having?CMMi Level 3?appraisal?and ISO-9001:2008 certification. Our Business Application Development services help clients concentrate on evolving business and technology challenges by defining, designing and building applications adapted to meet your business requirements.SCSL implements best practices like BOOT, JV, Turnkey and SaaS model for its projects.SCSL develops in windows, web and mobile platforms for better accessibility and user friendliness of the user end. SCSL works with ERP, HRM, e-Commerce, e-Governance Application, Web Portal development and implementation in an enterprise scale.SCSL marks success for the strongest product line the "'ERP OPTIMATM'" providing a stellar Enterprise Planning Solution. Our consultancy services have provided solutions for Capacity Development of Bangladesh and other Ministries of Government of Bangladesh.Since its inception data edge limited (dataedge) has been Bangladesh is leading technology consulting firm. Our ultimate goal is to understand, design, develop and/or outsource, and implement innovative technology solutions that will help our clients increase their bottom line.dataedge primarily focuses on the following segments in Bangladesh. However, owing to the changing nature of business the focus area may often shift or change. CLIENTSWorking for our clients' success and making sure they obtain tangible benefits from cooperating with iZoom are the goals we endeavor to achieve first and foremost. When working with us our clients expect to be dealt with professionally, responsibly and constructively and our team works as one to make sure these expectations are always met or, better still, exceeded.What is more, we believe that trust is one of the key factors to successful and long-lasting cooperation, so we work hard to establish and uphold trustworthy relationships with our each and every client.During the years the company has been operating, we have managed to attractclients from all over the world, including the USA, United Kingdom, Germany, NewZealand, Netherlands and more. We are proud to say that we have a 95% clientretention rate and the majority of them opt to have iZoom as their preferred service provider and cooperate with us on a regular basis. The references that our clients provided us with support our claim that we are fully capable of delivering top-quality end results while complying with the strictest business standards and ensuring seamless and efficient communication process.OUR TEAMWe are well aware that the success of any software product depends significantly on the qualities of a development team. That is the reason why we pay much attention to organizing a solid professional collective.All iZoom personnel is highly educated and experienced in what they do. Every member of the development team has as a minimum a bachelor degree in computer science. Moreover, they possess decades of professional experience combined in software development and programming.The experience, advanced English skills and the potential of our managers and developers allow us to successfully perform tasks of practically any kind and complexity in the fields of creation, testing, and modification of software products. In case there is a need to realize a really considerable project under the strict time constraints, we can draw on additional quality resources and put together an efficient work-team, which will include sufficient number of skilled professionals.OUR EXPERIENCED INSTRUCTORSEngr. Abubokor HanipPh.D. (In progress), MS (CSE), B.Sc. (EEE). Career Highlights Mr. Hanip is an Engineer by profession and serving the community for the last twelve years. He is the Founder and CEO of PeopleNTech, PeopleNTech Software Solutions Pvt. Ltd., India, PeopleNTech Canada, Inc., PeopleNTech Institute of Information Technology, Inc., PeopleNTech Upscale Learning, LLC, Premium Resource Organization of Bangladeshi Americans for Saving and Investment (PROBASI), Inc. He is also the Director of Shilpi Construction Ltd., Dhaka, Bangladesh and CEO of Smart Academia, New York and VP & Director of Mi3. Holdings, Inc. & FreebeePay, Inc. He is a man of envision and capable of transitioning his desire among others to make them live with style and honor.BioHe is a former IT consultant of Internal Revenue Service (IRS), International Business Management (IBM), Department of Defense (DoD), Federal Deposit Insurance Corporation (FDIC) & Northrop Grumman. He worked as IT Analyst with Oracle Corporation also. His tireless endeavor and charismatic leadership has been always instrumental and remedial to the irremediable people for a new aspiration and a cured, healthy living. In recognition of his outstanding service rendered to the community development work, he received number of Awards of Recognitions by U.S. Ambassador to Bangladesh Dan Mozena, Nobel Laureate Professor Dr. Muhammad Yunus, Bangladesh Association of Florida, North America Bangladesh Convention, American Association of Bangladeshi Engineers and Architects Convention, America Bangladesh Canada (ABC) Convention, Federation of Bangladeshi Associations in North America (FOBANA), Bangladesh-American Community Council, Inc., NY, NRB (Non Resident Bangladeshi) TAROKA AWARD, Bangladesh Center for Community Development Inc (BCCDI), DC, EKTARA, Honorable Congressman Hanson Hashem Clarke, The Council of New York City. Under his able guidance and leadership, PEOPLENTECH has been able to place more than 3000 people in the main stream IT job bringing back them from Odd Job in order to fulfill their long cherished dream of prestigious living. Out of many, the notable brain child program of Abubokor Hanip is to provide scholarship to Female in Information Technology (FIT), Bangladeshi in Information Technology (BIT), Senior citizens in Information Technology and English as a second language to increase the number of IT professionals. He is affiliated as Director, Bangladesh American Software Association, Director, US-Bangladesh Technology Association and Member, American Association of Bangladeshi Engineers & Architects, NY-NJ-CT, Inc. Education and certificationsDoctor of Management in Organizational Leadership- Information Systems & Technology- University of Phoenix- In ProgressMasters in Computer Science, New York Institute Of Information Technology, NYBachelor in Electrical and Electronic Engineering, Chittagong University of Engineering and Technology, BangladeshOracle Certified Professional (OCP)Sun Certified System Administrator (SCSA)Dr. Sazzad HossainPh.D (Engg), M.Sc (Engg), B.Sc. (Engg).Career HighlightsAcademic and corporate trainer with over 18 years of instruction delivered on introduction to Quantum Computer, Humanoid Robots, VLSI Design, Computer Communications and Networks, Date Communication and Computer Networks, internet and intranet, Telecommunication, Computer Network Management, Database Management, Management Information System, Web Application and Internet, Digital Image Processing, Artificial Intelligence, Digital Signal Processing Programming C, C++, Java, HTML, LISP, VHDL, Visual HDL, SQL, PL/SQL, FORTRAN77.BioDr. Sazzad Hossain is a giant and well-experienced instructor in IT field with enormous knowledge on subject matter. He is also a supervisor to current PhD students and more than fifty under grade students completed their thesis/project for their fulfillment of the B.Sc. degree in Computer Science and Engineering. He served as an instructor at Portland State University, Oregon, USA on Quantum Computer, Humanoid in the year of 2008. He is also having real time industrial experience as a team member of Computer Support Team for ECE & CS Department, Portland State University, Oregon, USA, Software developer at Ishika dot com, Ohio, USA and Application Programmer/Developer in Moscow, Russia.Education and certificationsB. Sc.(Engr) Major: Electrical System Network Engineering.M.Sc.(Engr)-Electrical and Computer Engineering.Haroonor Rashid Cheif Operation OfficerSummary of Qualifications18 + years of experience as a highly organized information technology consultant. Effective at multitasking and working under pressure to accomplish mitted collaborator and a team leader.Adapts quickly and easily to new environments.Analytical, accurate and detail-oriented.Effective and knowledgeable in working with global financial companies.Professional AccomplishmentsAcquired a high level of expertise in configuring, managing and troubleshooting various networked operating system environmentsEngineered, implemented, and tested standardized, yet highly customizable desktop builds supporting a broad range of hardware platforms and business environmentsDesigned and implemented various methodologies for company-wide distribution of applicationsDeveloped a variety of laptop hardware/software configurations allowing remote access to corporate LAN resourcesAccumulated in-depth knowledge of many popular software products, including their features and potential problemsDeveloped numerous scripts to help in automation of IT processesAmassed extensive experience in end-user communication, teamwork, and managementCERTIFICATION AND TRAININGMCSE Microsoft Certified System Engineer- InternetMCP Microsoft Certified ProfessionalCISCO Certified Dial-up networking EngineerCISCO Certified VPN Networking specialistCheckpoint Firewall trained and certified system engineerCheckpoint Certified Security AnalystSCCM EDUCATIONMS in Electrical Engineering [Emphasis on Telecommunication and Computer networks], [Certificate of Excellency] GPA: 3.9/4.0City University of the City College of New York, NYBS in Electrical Engineering (Cumlaude), GPA: 3.4/4.0City University of the City College of New York, NYPh.D.Electrical and Computer Engineering.Jeff JarvisMBA, University of Washington Bachelor of Science in Engineering,University of South FloridaCTOCareer HighlightsJeff Jarvis is a very common name in the business world especially in America, Asia and India. By solving thousands of complex business related problems such as marketing, strategic management, and many more, he has been succeeding to establish his name as a reliable Business Executive. His research work in various Business field has helped him to come up with sophisticated real business solution. He has successfully amalgamated his technical knowledge with business expertise.BioLeadership in Restructuring & Transformation of Sales / Professional Service / Customer Service Organizations in Domestic & International Business Environments. Strategic leader with strong general management skills, business acumen, and a broad understanding of Mobile Applications and Enterprise Software (SaaS & On-Prem) across various industry verticals. Extensive customer care management background and in-depth knowledge of the dynamics of delivering high quality services in a continually changing economy and industry. Change management oriented: proven success in leading cultural change and identifying where the business should be positioned to create/enhance value for the future. Provide the vision, leadership and direction for all operational activities associated with an organization/Business Unit, maintaining a culture of consistency and passion for the customer. Develop and execute strategic business plans that are well crafted in term of goals, initiatives in new services/products, competitively driving revenue up and costs down. Build, motivate and retain teams with a common sense of purpose and strong commitment to attaining market leadership as well as high levels of service excellence. Senior executive field operations experience with Sales, Development, Professional Services, Operations in the America's, Europe and Asia. Drove business on a global scale while successfully managing complex Fortune 100 accounts. I have been promoted into C-level roles through positive results but my core passion is Services & Operations.Education and certificationsMaster in Business Administration, University of WashingtonBachelor of Science in Engineering ,University of South Florida Nilesh MishraCOOCareer HighlightsMr. Mishra is a Business graduate and working as a Business developer for the last one decade. He has gained a huge reputation in Business world especially in North America and India. His excellent flexible adoptable power has been assisting him to solve various business related internal and external problems. He has inscribed his name successfully in recruiting and Business consulting. Mr. Mishra has also been performing tremendously in Human Resource management by blending his academic and practical knowledge.BioMr. Mishra is the Chief Operating Officer of PeopleNTech and handling business at multi-locations in multi cities across the globe. He has over 12 years of experience in Business and Office Management, Customer Management, Sales Leadership, Marketing, Process expertise, Execution Compliance, and Risk Management. He has been overseeing all business development and corporate communications activities and communicating the Company's value proposition to leading industry analysts. He has been instrumental in managing in house team of Technical and Business staff and enterprise clients in all IT verticals.Education and certificationsMaster in Business Administration Bachelor in Business Administration Dr. Syed Siddique HussainPh. D. in Technical Education, MS, B.Sc.DirectorCareer Highlights Dr. Syed Hussain is a devoted academician experienced in diverse field of research in education, educational management and teaching with outstanding achievement throughout academic career and he was awarded with ‘OIC gold medal' award for outstanding academic performance in the Masters’ of Science in Technical Education program. 'IIT gold medal' award for outstanding academic performance in the Post Graduate Diploma in Technical Education program, 'BIT gold medal' award for outstanding academic performance in the Bachelor of Engineering program.BioFormer Curriculum Specialist, Bangladesh Technical Education Board and Head of Mechanical Engineering Department, Bangladesh University of Textile (Formerly CTET), Dhaka. Conducted researches for developing and implementing tools for Curriculum Evaluation, Student Evaluation, Institute Evaluation, Staff Evaluation and Resource Utilization for educational institutions. Expert in using research tools STATA, SPSS & SQL. Planned organized and established control over the laboratory facilities and networking system. Coordinated & Conducted govt. financed training on Computer Fundamentals and Microsoft Office package for Secondary and Higher Secondary Teachers. He is a life fellow of Institution of Engineers, Bangladesh.Education and certificationsB.Sc. Mechanical Engineering,MS Technical Education & Production Engineering, Ph.D. in Technical Education.Wing CommanderM Salahuddin Chowdhury (Retd)MBA, CSRT (USA), BSC (PAK).Business Development ManagerCareer Highlights He is a retired Air Force officer of Bangladesh having 24 years of service experience at home and abroad.BioHe worked as commanding Officer in different Units with as many as 1250 personnel under his command. He is having 3 commendation certificates in his credit received from 3 Chief of Air Staffs for his outstanding services rendered to BAF. Salahuddin is an expert on National security and performed his duties providing physical security to the President and Prime ministers of Bangladesh from 1993-1996. His utmost sincere service and notable performance allowed him to be nominated as Deputy Chief of Movement control in United Nations peace keeping mission in DR Congo and served there from 2007-2008. He was also deeply involved in planning, promotion of service provision in Bangladesh Air Force (BAF) and worked as instructor and counselor in BAF Academy from 1998-2000. His service career was also further decorated while serving as APS/PS to three successive Air Chiefs of BAF from 2002-2007. He is also involved with Bangladesh defense journal as US Bureau chief, a columnist in different journal and a television talk show participant. Education and certificationsMasters of Business Administration, Major in Marketing, DIU, Dhaka, Bangladesh. (2008-2010).Training Course on Industrial Accident and Safety Management from Institute of Engineers, Dhaka, Bangladesh in 1996.Training Course on Comprehensive Security Response to Terrorism from Asia Pacific Centre for Security Studies, Hawaii, USA in 2005.Training Course on Military Core Competencies in Peace Operation from Pearson Peacekeeping Centre, Cornwallis, Canada in 2004.Staff Course from Pakistan Air Force in 2000.Security and management planning seminar in Singapore, Malaysia, Nepal, Srilanka, Thailand, Japan, India, China, Uganda, Kenya, Rwanda.Dr. Saiful KhandakerMPhil (UMIST, Manchester), PhD (UMIST, Manchester), MBCS Career Highlights Dr. Saiful Khandaker acquired necessary acumen spanning over two decades preparing himself to lead Mi3, a technology organization in North America and Bangladesh. Alongside gaining formal education, his continuous learning from work related involvements and leading engineering teams as software consultant with some of Fortune 500 technology corporations has been the eye-opener in the wide world of technology.BioAn avid learner as he is, Dr. Saiful experienced the development and growth of outsourcing, internet and mobile telephony, product development and value creation from the nearest possible views giving him insights into subtle intricacies and inner-workings of technology world. Dr. Saiful raised $1.4 million from personal networking. While sourcing IT talents for General Electric (GE) in Bangladesh as enlisted vendor, Dr. Saiful convinced and led a team from GE to check first-hand about Bangladesh’s outsourcing capabilities. To materialize immediate and long run visionary goals, Dr. Saiful initiated and founded US-Bangladesh Technology Association of North America stepping beyond self-interest, creating an cooperative platform conducive of exclusive actions benefiting Bangladesh regarding outsourcing, IT talent development, employment creation and channelizing NRB investments in technologies.Education and certificationsB.Sc in Computer Information SystemM.Sc in Technology, Phd.Prof. Dr. Badrul H. KhanCareer HighlightsBadrul H. Khan, Ph.D. is a world-renowned speaker, author, educator and consultant in the field of e-learning and educational technology. Professor Khan has the credit of first coining the phrase Web based instruction and popularizing the concept through his 1997 best-selling Web-Based Instruction book which paved the way for the new field of e-learning. In recognition for his work in this field the Egyptian E-Learning University Council has appointed him as an honorary distinguished professor of e-learning. He served as the Founding Director of Educational Technology Leadership graduate cohort program at the George Washington University, and Founding Director of Educational Technology Graduate program at the University of Texas at Brownsville. BioBadrul H. Khan, Ph.D. is currently working on e-learning projects at a federal agency in the United States and serves as consulting advisor to several international e-learning initiatives.?He served as a consultant/advisor to e-learning related projects for US federal government agencies, the World Bank, UNDP, NATO, USAID, Asian Development Bank, various higher education institutions and corporations in the USA and abroad. He authored and co-edited 10 books and 100 papers in the field of e-learning. His "Managing E-Learning" book translated into 13 languages. He served as contributing / consulting editor of nine prestigious international learning journals & magazines. Education and certificationsPh.D. Instructional Systems Technology, Indiana University, Bloomington, IN B.A. Chemistry, Indiana University, Bloomington, INDr. Halimur R. Khan Career HighlightsAn Associate Professor of Russian Language and Research Director at the US Air Force Academy in Colorado, USA. A Harvard University graduate, Halimur R. Khan, Ph.D., is an Associate Professor of Russian Language and Research Director at the US Air Force Academy. He teaches and conducts research on Russian language, literature, Russian area studies, as well as educational and national leadership issues; Khan also consults on international education policy. Currently, he is a core faculty member at the Strategic Languages Division at the US Air Force Academy under the Defense Department of the United States.BioHalimur Khan has been a faculty member at numerous U.S. universities teaching courses in Russian language, literature & culture as well as courses on Great Books, Culture & Civilization of South-Asia and of the United States. During his academic career, he has taught at Oberlin College, Georgetown University, Wayne State University, University of Michigan and Colgate University prior to joining the USAF Academy. Khan is a member of over a dozen professional organizations and a regular contributor to various national and international conferences. He is also involved in international education policy formulation, especially for primary and secondary schools in developing countries and frequently consults on girls’ access to education. He is the author of numerous books, and dozens of journal articles in the areas of Russian literature and international education policy. Education and certificationsHalimur has three Masters Degrees: (1) from Moscow Linguistic University (Interpreter and Translator of Russian, French and English languages); (2) from the University of Albany in New York (Russian literature), and (3) from Harvard University (International Education Policy and Leadership); Khan earned his Ph.D. in Slavic Languages, literatures and cultures from the University of Michigan. Prof. Dr. MohammadShahadat HossainMPhil and PhD(UMIST), UK.Career HighlightsMohammad Shahadat Hossain is a Professor of Computer Science and Engineering at the University of Chittagong, Bangladesh since 2007.BioHe was awarded with prestigious Commonwealth Academic Staff Fellowship in 2009 through a rigorous academic evaluation. He was also awarded with prestigious Tyndall Visiting Fellowship in 2006. In 2011 and 2013, Professor Hossain was awarded with noteworthy European Commission sponsored Erasmus Mundus Academic Staff Fellowship at the University of Aalborg of Denmark. He successfully completed a number of research projects. His current research area includes the modeling of risk and uncertainty using evolutionary computing techniques. Investigation of pragmatic software development tools and methods for Information Systems in general and for GIS, in particular is also his area of research. He has published several scholarly articles in the reputed international journals. He is the author of a number of books. His jointly authored book entitled "Computing Reality", published by Aoishima Research Institute (blue ocean press) in Tokyo, Japan, contributed significantly to enrich the knowledge of computer science and indexed in the ACM Digital Library, published by the Association for Computing Machinery, as one of the important computing literature books.Education and certificationsMPhil and PhD in Computation from the University of Manchester Institute of Science and Technology (UMIST), UK. Nizam MahmudB.Se,ITIL,IBM(ASNDA)MCTS,OCPDBA,MCDBA,CCNA,SCSA,UNIX Essentials,Career HighlightsOver 17 years of experience in the IT field and expert in designing, configuring, integrating and administering IT Infrastructure.More than 10 years working as a Software Engineer and System Consultant in multinational companies such as Griffith, Incubed Ltd, Equitable Life of Canada.More than 5 Years working as an Infrastructure Architect in Manulife Financial, Ontario.Expert knowledge of researching, architecting, implementing, deploying, managing, integrating and supporting necessary hardware and software for LAN/WAN infrastructure.Proficiency to apply disciplined Project management methodology and approach to the planning, development, implementation and evaluation of assigned small-to-large sized corporate projects across the entire project life cycle.BioMr. Nizam has been in the Networking and the system architecture field for the past 17 years and holds Cisco, OCP DBA, MCDBA, MCSE, SCSA certifications. He has been an instructor since 2005 and has taught over 3000 students. Mr. Nizam is an extremely enthusiastic trainer with a raw passion towards teaching and takes great pride in his career as an instructor, which has lead him to develop and deliver the class in his own unique way – very professional and knowledgeable, yet pleasant and enjoyable. Education and certificationsBachelor’s Degree in Electrical and Electronics Engineering from Chittagong University of Engineering & Technology, Bangladesh.ITIL Foundations V3 IBM WebSphere Application Server Network Deployment Administration Microsoft Certified Technology Specialist on Windows Server2008 and SQL Server 2008Oracle Certified Database Administrator (OCP DBA Oracle 8i upgraded to Oracle 9i)Oracle Certified Database Administrator (OCP DBA Oracle 8i upgraded to Oracle 9i)Microsoft Certified Database Administrator (MCDBA on SQL Server 2000 track)Microsoft Certified System Engineer (MCSE on windows 2000 track upgraded to windows 2003/2008)Cisco Certified Network Associate (CCNA)Sun Certified System Administrator (SCSA on Sun Solaris 8.0)UNIX EssentialsInstructorPerformance Testing Tuned with DBA skill sets.Mohammad M. RahmanB.Sc in Computer Engineering, Selenium Certified.Career HighlightsMore than eight years of diverse experience in the field of Information Technology with emphasis on Software Engineer in Test in USA. Experienced in testing Client/Server (2-Tier), Unity-Tier, Web Based Applications Media, Health care, Insurance, Telecom applications, Mortgage and Commercial Stand-Alone applications. Worked ad business and QA analyst in HBO, New York, NY, AOL/ Huffington post, New York, NY, Intelligent product Solutions, Ronkonkoma, NY Verizon, New York NY before joining in PEOPLENTECH as an instructor.BioWith a back ground of engineering Mohammad is a highly professional instructor and maintain the highest standard of technique in teaching SeleniumRC, WebDriver, and Selenium Grid, WinRunner, LoadRunner, Quick Test Pro, IBM (Rational Tools), Jmeter, Jira, TestDirector , Rational Clear Quest, Quality Center, C, C++, C#, SQL, PL/SQL, Visual Basic, Java, .Net, COBOL, HTML, JavaScript, XML, Assembly Language, VHDL, J2EE (JSP, Servlets, JDBC, EJB, JMS), ODBC, SQL Server, Oracle, DB2, MS Access, MongoDB, MySQL, Windows XP/ 2000/98/95/2003 Servers/Vista/7, HP UNIX, SUN Solaris 8.0/9.0, Linux, Mac OS, iOS, Android and Windows Mobile, IIS, iPlanet, WebSphere, WebLogic, Junit, TestNG, Spring, Hibernate, Struts, Intellij, Eclipse, IAR, AVR studio, Dev-C++, Code Blocks, ANT, Maven, CVS, Subversion, Tortoise SVN, GitHub, Hudson, Jenkin.Education and certificationsStony Brook University graduate on Computer Engineering.Certified in Selenium framework professional course. Instructor Selenium Framework with JAVA. Mohit Arora MBA, PMP, Lean Six Sigma Black Belt, B.Eng.Career HighlightsTaught over 5000 learners across different degree programs (Continuing Education Masters and Undergraduate) in US & Canadian institutions. Passionate educator accomplished practitioner and perceptive professional with a broad understanding of diverse businesses complimented with deep operational acumen. Awarded the 'Excellence in Teaching Award' for the best instructor in Business and Professional studies (student nominated). Affluent in online delivery with an ability to create a sense of personalization in virtual environment. Developed and delivered courses using multiple channels including online, evening classes and day seminars, Professional speaker on Project Management, Lean SIX Sigma, Leadership and Business Analysis. BioMohit is an author of 1000 Challenge PMP Questions’ and ‘5 Challenge Mock PMP Tests’, Co-Author, Leadership in Project Management – Leading People and Projects to Success – A self published university textbook presently used across universities and colleges in Canada, Teaching numerous evening courses, online classes and day seminars in Project Management and Business Analysis using PMI and IIBA frameworks and knowledge areas including PMP Prep, Foundations of Project Management Leadership in Project Management, Project Management Implementation and Control Global Operations Lean Six Sigma Foundations of Business Analysis, Leadership in Business Analysis.Education and certificationsChange Management Certification, Prosci. Strategic and Management Consulting Training, RBC Global Consulting Services.PMP (Project Management Professional), Project Management Institute.Advanced MS Project and Excel VBA certification, Nexient Learning. Six Sigma Black Belt, Maple Leaf Foods.MBA (Major – Strategic and Operations Management), Schulich School of Business. CSC (Canadian Securities Course), Canadian Securities Institute. Bachelor of Engineering, (Major – Mechanical Engineering), Delhi University.InstructorPMPSrikanth VejendlaB.Se, QTP, ISTQB, ELTP (Unix, VB, Oracle)Career HighlightsIT Professional for over 11 years and Software Trainer since 2010.Engineer and Test Analyst for top Wall Street financial firms such as Citigroup. Environment used: QTP, QC, Device Anywhere Pro, Perfecto Mobile, Selenium IDE/RC, Omniture, Site Catalyst.Proficiency on Software Development Life Cycle, Software Testing Life Cycle, Agile/Scrum Testing Methodologies.Expertise in test approaches, test strategies, effort estimations, test plans, Checklists for test design, execution, defect process, Test Evaluation summaries and Test metricsBioHe is a young, agile and professionally sound instructor. His proven expertise as an instructor of PEOPLENTECH stays up to date with the latest development on information technology in the field of UFT, Mobile testing, Web services. He has already lifted the following awards and honors through his outstanding performance in his professional field. Awarded first prize in ‘Bug Finding Contest’ in Nok Nok Labs in 2012. Awarded ‘Star of the Quarter’ twice in FY 10, 11 by Citigroup. Received four ‘Pat on Back’s, eleven Positive Incident logs from Mahindra Satyam.Education and certificationsBachelors in Electronics & CommunicationHP Certified Professional in QTP 10.0, Quality Center 10ISTQB CertifiedELTP Training on UNIX, Visual Basic, OracleE-Learning: Load Runner, IBM Rational Robot Microsoft Office Suite, Project Management Instructor Software TestingUnified Functional Testing (UFT)/QTPMobile Application Testing than eight years of diverse eTariq AhsanM.Sc, B.Sc. SAP XI, Java, Oracle, UnixCareer Highlights23 years of extensive experience in the Information Technology field. These experiences include system analysis and design, team management, data modeling, object-oriented development, and web and GUI design and development, lead role as Systems Designer and Lead Application Developer. Also includes Software Change Management System Administration. Had full life cycle responsibility ranging from system requirements, system and functional design, development, testing, and system implementation, user and support staff training. Broad experience in 24x7 on-call production support with direct client liaison.BioHe is having multifarious real time work experience with Lockheed Martin, Windsor Mill, MD, Ironclad Technology Services, Virginia Beach, VA Project of Command Fleet Financial System, US Navy, Norfolk, VA, Contractor as Sr. Java/JEE Developer, Department of Family and Protective Services, Texas, State Government Austin, TX, Contractor as Sr. Java/J2EE Developer, Lockheed Martin, National Archive and Record Administration (NARA) Project Greenbelt, Maryland, Contractor as Sr. Java/J2EE Developer, Defense Finance & Accounting Services (DFAS), US Department of Defense, Lexington Park, Maryland, Programmer Analyst Principal Leader, Computer Science Corporation (CSC) , AT&T, Hoffman Estates, Illinois, Consultant and many other reputed companies in USA.Education and certificationsM.S. in Computer Science, New Mexico Institute of Mining & Technology (NMIMT), Socorro, New Mexico 1992.B.Sc. in Mechanical Engineering, Bangladesh Institute of Technology, Rajshahi, Bangladesh. 1986.SAP XI (Exchange Infrastructure), 05/06 – 06/06Prosoft, Downers Grove, ILCustomizing ClearQuest, 10/13-14/1998 Rational University, Sunnyvale, CaliforniaJava Programming for Oracle Developers, 1/4-8/1999 Oracle University, Chicago, IllinoisClearCase Fundamentals for Unix version 3.2, 1/18-22/1999 ClearCase Using ClearCase MetaData-Unix version 3.0,ClearCase Administration for Unix ClearCase version3.xConducted by Instructor from Rational Rose at Lucent Technologies Inc., Naperville, IllinoisNirjhor AnjumTeam LeaderCertifications: MSc CS, BSc CIS, WDDS (Delhi), MCTS, CompTIA A+Course Completions: ZCEC, CCNACareer HighlightsNirjhor Anjum has been involved in Software Industry since 2004 after starting his career from India. He has played noteworthy leading roles in different IT companies for the last almost 12 years across India and Bangladesh and done excellent professional projects for different national and multinational companies. Besides his involvement in the professional Software Industry, he has also been expanding his knowledge through Teaching Web Designing, Web Development and Software Development especially in the area of PHP Technology, besides and JSP. BioExpert professional with experience in the area of Software Project Management, IT Business Management, System Management, IT Governance, Technical Documentation (SRS, RFP, User Guide), Quality Testing (SQA, UAT), Server Management and Large Scale of CMS & Portal Management; Practically experienced in developing Web-Projects as Software Engineer and in leading large Projects that involves: Banking System, Online Payment Gateway, SMS Service, Enterprise Resource Planning (ERP), Customer Relationship Management (CRM), SAAS Systems and other Management Systems. The area of Technical qualification goes with PHP (MVC with OOP), (Razor), JSP (Web), MySQL, MSSQL, JavaScript, AJAX, jQuery, JSON, HTML5, CSS, CodeIgniter, Phalcon, Laravel, WordPress, Joomla, OpenCart, PrestaShop, Magento, phpFox, phpBB, vBulletin, SocialEngine, Online Payment Gateway Integration, Bulk SMS Service Integration and many more technologies. He is having manifold real time work experience such as Software Specialist, Software Shop Limited, SuperbNexus Inc., Chief Technical Officer, Software Engineering (Core), Banglalion Communications Limited, GreenHeaven PVT LTD, HOD, Web Development and Management Department,SBS (Pvt.) Ltd., Manager, Server and Web Solution Department Manager, IT Department, CSSI, India. Research WorkSecurity Application for Smart Phones and other Mobile Devices, ICIEV 2013Cloud Computing, AMAEducation and certificationsM.S. in Computer ScienceB.Sc in Computer Information SystemWDDS in Delhi,MCTS,ComptIA A+ZCEC,CCNAMd. Mahbubur RahmanSenior FacultyM.Sc. Engineering (CSE), B. Sc. Engineering (ME),MIEB, MBCS, MBGIS Career HighlightsOverall 17 years of experience in software solution architecting, system analysis, system design, architectural design, data modelling, relational database design, development, software project management and implementation; More than 10 years of experience in software project management; As a head of software department he is the pioneer in implementing first CMMI Level-3 organization in Bangladesh; More than 15 years hands on experiences in wide range of software application development included but not limited to desktop, client/server, web architecture based software application and mobile apps development in public sector as well as private sector and overseas outsourcing software projects.Experienced in leading a software company in Bangladesh; defining processes, implementing, maintaining and continuously improving process architecture across the organization; Expert in quality assurance, quality control and configuration management.BioMd. Mahbubur Rahman has been involved in software development, project management, training and consulting for more than 17 years with the intention of increasing productivity and the performance of technical people. Academically, he holds M.Sc. Engineering in CSE & B. Sc. Engineering in Mechanical discipline. He was formerly Head of Software department in BIPL, National IT Consultant in FMRP under Ministry of Finance, GOB, ICT Consultant/Team Leader in number of software projects in both government and private institutions.Education and CertificationMasters of Science in Computer Science and Engineering from United International University (UIU).Bachelor of Science in Mechanical Engineering from Rajshahi University of Engineering and Technology (RUET).InstructorAndroid apps development; Programming in Java;Programming in C#; Web application development in MVC; Software Project Management; RDBMS and SQL for developers; iOS and iPhone development (proposed)A.N.M. Ahidul AlamSenior FacultyMCA, MB, OCP-DBA, Oracle Development.Career Highlights He is an OCP and having expertise in Software-Universal banking System (UBS), Reporting Tools-Oracle business Intelligent (OBI) Platform-HP-UX, Software-Internet Banking (ibank) Software-TransWare Card management for ATM, Software-Transware Switching software for ATM.BioAhidul worked as a Senior First Executive Officer In-Charge & Database Administrator, Core Banking (Bank Ultimus) Software before joining as a team member of PEOPLENTECH. He is a successful and expert IT Manage in banking sector.Education and certificationsMCA (Masters in Computer Application)MBA (Masters in Business Administration)OCP-DBA (11G) (Oracle Certified Professional) Oracle University OCP-DBA (10G) (Oracle Certified Professional) Oracle UniversityOCP-DBA (9i) (Oracle Certified Professional) Oracle UniversityOracle word Force Development Program IBCS-Primax Limited (Oracle Authorize Education Centre)OCP-DBA (8i) (Oracle Certified Professional) SQL & Database Architecture.Md. Abdul HamidFacultyCertifications: BSc CSE, MCTSCareer HighlightsAnalyze, design, develop, and maintain products and assist in commercialization.Ensure product code and artifacts are managed according to guidelines.Assist in identifying and organizing requirements and producing specifications.Apply usability procedures and principles as defined.Build prototypes, products, and systems for testing.Design testing procedures. Document test results and develop client presentation.Develop and execute unit tests to ensure and maintain source code quality.Provide timely corrective actions on all assigned defects and issues.Create and maintain product documentation.Provide support for and prepare technical documentation.Share expertise throughout the organization.Continually evaluate engineering approaches and risks and make improvements.Assist in cost estimates.BioSoftware Engineers develop and maintain new or improved software products, procedures, and techniques. Responsibilities include providing innovative and cost-effective engineering solutions to meet technical objectives and timing. With increasing experience and seniority, Software Engineers will supervise and mentor junior engineers, participate in activities to define and implement frameworks and design practices, as well as in knowledge-sharing activities. Successful Software Engineers function well independently and in a team, are analytical thinkers, are creative and innovative, and have excellent communications skills. This position reports to the Software Project Manager or Product Manager.Tools and , MS SQL, SQL Server, Entity Framework, MVC4, IIS, LinQ, Petapoco FrameworkPHP (OOP, MVC), MySQL, WordPress, Joomla, OpenCartJavaScript, jQuery, JSON, AngularJS, AJAX, XML, HTML5, CSS, BootstrapREST, Web Services and APIEducation and certificationsBachelor of Computer Science and Engineering (BSC in CSE) Major in Computer Science and EngineeringMinor in Business AdministrationMd. Saiful IslamGraphics DesignerCareer HighlightsExperience in designing logos, corporate identity, advertisements, sales collaterals, catalogs, client presentations, newsletters, etc.Ability to bring fresh perspective to the brand without losing original intentExcellent communication skills and ability to interact with clients and understand their requirementsProven presentation skills with expertise in demonstrating the designs to the clients and getting their approvalBrainstorming and developing new concepts and ideas to boast the brandExcellent team player and ability to work in groups to complete a desired taskBioA Graphics Designer with 14+ years of professional experience seeking for a compelling job where my creative skills are challenged. Seeking a job position in the creative team where I can apply my knowledge of diverse design skills set and graphics art. Attend client meetings and understand their brand and promotion requirements. Come up with innovative concepts and get approval from the clients. Carry out detailed research and create design briefs for approval. Estimate the time required to complete the designs and send quotes accordingly. Complete the designs by coordinating with photographers and copy writers. Send out the completed designs to the clients for feedback. Carry out brain storming sessions to come up with new concepts and innovative ideasTools and TechnologiesAdobe Photoshop; Adobe Photoshop Multimedia Language Adobe Illustrator; Adobe PremiereCoral DrawAdobe AfterEffectsAdobe FlashQuack ExpressFront PageAdobe PageMakerSWiSHmaxEducation and certificationsHigher Diploma in Computer Engineering, The National Youth Development and Training Centre (nidata), Dhaka-Passing year 2006.Higher Diploma in Graphics Designing, Aptech Computer Education, Dhaka-Passing year 2001. (Accounting), National University-Passing year 2004.. (Hon’s), National University-Passing year 2002.H.S.C (Commerce), Dhaka Education Board, Dhaka-Passing year 1997.Md. Mamun MiahFacultyBA Hon’s in English Language,MBA in Human Resource ManagementCareer HighlightsMore than 7 years of extensive experience in English Language teaching, coordinating and developing materials from Elementary Level to Advanced Level, has made this English language teacher extensively acceptable to the students. He has achieved Core Managerial Experiences through working as an Executive Director at eMaster Groups from 2011-2012. He has also played a role of Managing Director at Milestone English Language Center from 2012-2014 and a Founder and CEO of English Exposure BD () started from 2014-present.BioA creative, well organized, updated and strong classroom performer, who has a proven track record of achieving excellent trainees’ attainment. Passionate about developing students English Language Skills through making friendly exposures irrespective of their age and rank. By using his natural air of authority to maintain discipline, he can foster and maintain a positive institutional climate where trainees get equal opportunities and enough motivation to explore their full potential. As an outstanding and inspirational faculty with very high personal standards and innovations, he is committed to the learning and development of his trainees. He has high expectations of both himself and his trainees, and shows an interest in every trainee as an individual.Education and certificationsMBA in Human Resource Management, University of Liberal Arts Bangladesh (ULAB), Dhanmondi, Dhaka-1209, Bangladesh 2013BA Hon’s in English Language, University of Liberal Arts Bangladesh (ULAB), Dhanmondi, Dhaka-1209, Bangladesh 2011Creator of the Modern Language Teaching and Adoption Method- “LANGUAGE ADOPTION IN ARTIFICAL EXPOSURE” ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download