Menu
Your Cart
Get Bulk Certifications at least 5 and Get 12% off on fees

Computer Hardware Networking

Computer Hardware Networking
Online Course New
Computer Hardware Networking
Government certification * Certification valid for life * Lifelong e-learning access
Below is your Total Fees of the Course (No Extra Charges). Thank You!
₹4,000
Ex Tax: ₹4,000
  • Stock: In Stock
  • Course Code: ACS0050
  • Weight: 0.00kg

The objective of the Course:

To train the officials to acquire knowledge in computer hardware and peripherals for installation, PC assembly, troubleshooting, and maintenance including system management and its backup and to undertake disaster prevention, and knowledge of TCP/IP networks workgroup, internet, and intranet.

Learning Outcomes:

The student will able to know the Computer assembling and troubleshooting. This course will provide a brief knowledge of Computer networking and troubleshooting

Fees (INR): Rs.4000/-

Minimum Eligibility Criteria and prerequisites, if any 10+2 pass with basic knowledge of computer

Duration
Maximum Duration1 Year
Syllabus
Module 1Introduction to Portable Mobile Computers, Laptops, Tablets (Types and classes of portable computers: - Laptops, Notebooks, Tablets, Smart Phones, Palmtops. Portable System models and configurations from different manufacturers: - IBM, DELL, Apple, Samsung, HP, Toshiba, Fujitsu, Acer, Compact Version Operating Systems and applications for portable Computers: - WINDOWS 8, Android and various various releases, various flavors of Linux that being loaded on handheld devices, Apple Macintosh and iOS. Low powered Portable system Processors and Graphics Processors GPU:- Intel Mobile Pentium, Mobile Celeron Processors, ARM Cortex processors, AMD Mobile Athlon-4 and Mobile Duron. Mobile processor packaging and compact Motherboards.)
Module 2Compact devices used in Portable Mobile Computers (Compact Hard Drives, CD/DVD R/W used in Mobile computers. Various type of secondary memory deployed in compact devices like Compact FLASH, MicroSD Cards, Wireless blutooth based Keyboards and mouse: - Inbuilt and External keyboards, Compact multimedia keyboards, TrackPoint, Touchpad’s, Wireless mouse.)
Module 3Specialized output devices used in Portable Mobile Computers (Display used in portable computers:- Dual Scan( passive Matrix) Displays. Active Matrix, Flat- Panel LCD/LED/AMOLED/IPS Displays, Active TFT Displays, touch panel, etc.)
Module 4Interfacing used with Portable Mobile Computers (PCMCIA Cards:- PCMCIA Ethernet LAN card, PCMCIA Wireless Card. Type –I, Type –II Type –III types of cards, and their slots. Infrared ports, Docking Stations, USB port, OTG USB, Mini USB, HDMI, micro HDMI port, etc)
Module 5Preventive maintenance for Portable Mobile Computers (Power Supply constraints, Battery charging, Handling and Storage, Cleaning of Displays, Running diagnostic software tools, Antivirus Software, Handling Plug-in /Plug-out Hardware.)
Module 6Portable Mobile Computers in wireless LANS (Wireless Standards :- IEEE 802. 11(a/b/g/n/ac), 802. 16 (Wi-max) RF Data Communication. Types of wireless networks IBSS Ad-Hoc, BSS and ESS Network Fundamentals and deployment, Key Characteristics of 802. 11 Wireless LANs, Typical Range of 802. 11a/b/g/n/ac WLAN, Access Point, Bridging, Wireless Router A WLAN Architecture, Typical Bluetooth Network—A Scatter-net, Bluetooth Ad Hoc Topology, Bluetooth Operating Range, Key Characteristics of Bluetooth Technology, Device Classes of Power Management. Introduction to Wireless Communication NFC. Emerging Wireless Technologies, wireless Internet, e-mail, and global positioning system(GPS) capabilities. General Packet Radio Service (GPRS), Enhanced Data GSM. Environment (EDGE), and Universal Mobile Telecommunications Service (UMTS), Wimax, LTE 4G services in mobile communication. Wireless Security Threats, Authenticity, Authorization, Accountability, Wireless Security of 802. 11b/g/n/ac in Typical Network, Taxonomy of 802. 11 Authentication Techniques, Shared-key Authentication Message Flow, WEP Privacy Using RC4 Algorithm, Taxonomy of Security Attacks. Encryption Algorithms WEP, WPA, TKIP, AES to secure Wi-Fi communication, etc.)
Certification
TypeDiploma
  1. Buy course
  2. Receive login credentials to your registered Email
  3. Access study materials and video tutorials
  4. Complete an online assessment
  5. Receive a Diploma in soft copy on your dashboard.
  6. Original Diploma will be couriered at your registered address

Write a review

Please login or register to review
We use cookies and other similar technologies to improve your browsing experience and the functionality of our site. Privacy Policy.