Looking for a Tutor Near You?

Post Learning Requirement ยป
x
x

Direction

x

Ask a Question

x

Hire a Tutor

IT Training Courses in Ras Al Khaimah

Filter

Discover a diverse selection of IT Training courses in Ras Al Khaimah, thoughtfully designed to meet your educational needs. Immerse yourself in accredited programs led by seasoned instructors, and harness the benefits of adaptable learning solutions to achieve excellence in your chosen field. Enroll today to embark on a transformative educational journey.

1 to 5 of 5 Courses
Amir Saleem

By:   Amir Saleem

  • Location :
    Ras Al Khaimah
  • Fees :
  • Duration :
  • Schedule :
  • Segment :
    IT Training
  • Subject :
    Computer Basics

Course Details

Covers the basic concepts of computing and teaches how computing can be an everyday feature of life and work. It covers basic Microsoft Office computer applications and touch-typing training.

Amir Saleem

By:   Amir Saleem

  • Location :
    Ras Al Khaimah
  • Fees :
  • Duration :
  • Schedule :
  • Segment :
    IT Training
  • Subject :
    Computer Basics

Course Details

Knowing computer: What is Computer, Basic Applications of Computer; Components of Computer System, Central Processing Unit (CPU), VDU, Keyboard and Mouse, Other input/output Devices, Computer Memory, Concepts of Hardware and Software; Concept of Computing, Data and Information; Applications of IECT; Connecting keyboard, mouse, monitor and printer to CPU and checking power supply. 2. Operating Computer using GUI Based Operating System:

What is an Operating System; Basics of Popular Operating Systems; The User Interface, Using Mouse; Using right Button of the Mouse and Moving Icons on the screen, Use of Common Icons, Status Bar, Using Menu and Menu-selection, Running an Application, Viewing of File, Folders and Directories, Creating and Renaming of files and folders, Opening and closing of different Windows; Using help; Creating Shortcuts, Basics of O.S Setup; Common utilities. Understanding Word Processing: Word Processing Basics; Opening and Closing of documents; Text creation and Manipulation; Formatting of text; Table handling; Spell check, language setting and thesaurus; Printing of word document. 4. Using Spread Sheet: Basics of Spreadsheet; Manipulation of cells; 

Sunny Sudershan

By:   Sunny Sudershan

  • Location :
    Ras Al Khaimah
  • Fees :
  • Duration :
  • Schedule :
  • Segment :
    IT Training
  • Subject :
    Linux, UNIX

Course Details

Red Hat Enterprise Linux (RHEL) is a Linux distribution developed by Red Hat and targeted toward the commercial market.This course will help us to understand and use essential tools

  • Access a shell prompt and issue commands with correct syntax
  • Use input-output redirection (>, >>, |, 2>, etc.)
  • Use grep and regular expressions to analyze text
  • Access remote systems using ssh
  • Log in and switch users in multiuser targets
  • Archive, compress, unpack and uncompress files using tar, star, gzip, and bzip2
  • Create and edit text files
  • Create, delete, copy, and move files and directories
  • Create hard and soft links
  • List, set, and change standard ago/RW permissions
  • Locate, read, and use system documentation including man, info, and files in /user/share/doc

Operate running systems

  • Boot, reboot and shut down a system normally
  • Boot systems into different targets manually
  • Interrupt the boot process in order to gain access to a system
  • Identity CPU/memory intensive processes, adjust process priority with renice and kill processes
  • Locate and interpret system log files and journals
  • Access a virtual machine's console
  • Start and stop virtual machines
  • Start, stop and check the status of network services
  • Securely transfer files between systems

Configure local storage

  • List, create, delete partitions on MBR and GPT disks
  • Create and remove physical volumes, assign physical volumes to volume groups, and create and delete logical volumes
  • Configure systems to mount file systems at boot by Universally Unique ID (UUID) or label
  • Add new partitions and logical volumes, and swap to a system non-destructively

Create and configure file systems

  • Create, mount, unmount, and use fat, ext4, and NFS file systems
  • Mount and unmount CIFS and NFS network file systems
  • Extend existing logical volumes
  • Create and configure set-GID directories for collaboration
  • Create and manage Access Control Lists (ACLs)
  • Diagnose and correct file permission problems

Deploy, configure and maintain systems

  • Configure networking and hostname resolution statically or dynamically
  • Schedule tasks using at and can
  • Start and stop services and configure services to start automatically at boot
  • Configure systems to boot into a specific target automatically
  • Install Red Hat Enterprise Linux automatically using Kickstart
  • Configure a physical machine to host virtual guests
  • Install Red Hat Enterprise Linux systems as virtual guests
  • Configure systems to launch virtual machines at boot
  • Configure network services to start automatically at boot
  • Configure a system to use time services
  • Install and update software packages from Red Hat Network, a remote repository, or from the local file system
  • Update the kernel package appropriately to ensure a bootable system
  • Modify the system bootloader

Manage users and groups

  • Create, delete and modify local user accounts
  • Change passwords and adjust password aging for local user accounts
  • Create, delete and modify local groups and group memberships
  • Configure a system to use an existing authentication service for user and group information

Manage security

  • Configure firewall settings using firewall-config, firewall-cmd, or tables
  • Configure key-based authentication for SSH
  • Set enforcing and permissive modes for SELinux
  • List and identify SELinux file and process context
  • Restore default files contexts
  • Use boolean settings to modify system SELinux settings
  • Diagnose and address routine SELinux policy violations

System configuration and management

  • Use network teaming or bonding to configure aggregated network links between two Red Hat Enterprise Linux systems
  • Configure IPv6 addresses and perform basic IPv6 troubleshooting
  • Route IP traffic and create static routes
  • Use firewalls and associated mechanisms such as rich rules, zones, and custom rules, to implement packet filtering and configure network address translation (NAT)
  • Use /proc/sys and syscall to modify and set kernel runtime parameters
  • Configure a system to authenticate using Kerberos
  • Configure a system as either an iSCSI target or initiator that persistently mounts an iSCSI target
  • Produce and deliver reports on system utilization (processor, memory, disk, and network)
  • Use shell scripting to automate system maintenance tasks

Network services

Network services are an important subset of the exam objectives. RHCE candidates should be capable of meeting the following objectives for each of the network services listed below:

  • Install the packages needed to provide the service
  • Configure SELinux to support the service
  • Use SELinux port labeling to allow services to use non-standard ports
  • Configure the service to start when the system is booted
  • Configure the service for basic operation
  • Configure host-based and user-based security for the service

HTTP/HTTPS

  • Configure a virtual host
  • Configure access restrictions on directories
  • Deploy a basic CGI application
  • Configure group-managed content
  • Configure TLS security

DNS

  • Configure a caching-only name server
  • Troubleshoot DNS client issues

NFS

  • Provide network shares to specific clients
  • Provide network shares suitable for group collaboration
  • Use Kerberos to control access to NFS network shares

SMB

  • Provide network shares to specific clients
  • Provide network shares suitable for group collaboration

SMTP

  • Configure a system to forward all email to a central mail server

SSH

  • Configure key-based authentication
  • Configure additional options described in documentation

NTP

  • Synchronize time using other NTP peers

Database services

  • Install and configure MariaDB
  • Backup and restore a database
  • Create a simple database schema
  • Perform simple SQL queries against a database
Toqeer Arif

By:   Toqeer Arif

  • Location :
    Ras Al Khaimah
  • Fees :
  • Duration :
  • Schedule :
  • Segment :
    IT Training
  • Subject :
    Android Training

Course Details

Android Application Development training from us provides knowledge and skills essential to design and create a complete Android application. It imparts extensive training on key Android API components and interactions. Knowledge of any programming language is sufficient to maximize your understanding of this course. Basic knowledge of using Java for Android application development is also preferable. If you wish to become an ace application developer for Android and establish your career in the mobile application development domain, this course is highly recommended for you.

Course Objectives

  • Skills to design and build an Android application from scratch.
  • Ability to use different plug-ins and tools to debug and maintain your Android applications.
  • Thorough understanding of main components of an Android application and its entire life cycle.
  • Using external resources, manifesting adapters and file intents.
  • Understanding and application of Android persistent storage tools and techniques: files, preferences, databases, and content providers.
  • Using background processing techniques available in Android.
Center For Continuing Education

By:   Center For Continuing Education

  • Location :
    Ras Al Khaimah
  • Fees :
  • Duration :
  • Schedule :
  • Segment :
    IT Training
  • Subject :
    Others

Course Details

IT training for business purpose is done here. We provide extensive training on various aspect of this program. Intensive training procedures are followed by the trainers of our academy. Supportive study materials are provided to each of the student; if required. Practical exposure is given to the students in maximum amount.