Computer Network And System Administrator Manager Professional Certifications Traning Courses

Why Choose Us   |   Employment Objective

68 students review
  • Description
  • Schedule
  • What You'll Learn
  • Outline
  • Prerequisites
  • Income Expectations
  • Next Step
  • Tuition Fee
  • Exam

Network And System Administrator Manager Professional that prepares individuals to manage the computer operations and control the system configurations emanating from a specific site or network hub. Includes instruction in computer hardware and software and applications; local area (LAN) and wide area (WAN) networking; principles of information systems security; disk space and traffic load monitoring; data backup; resource allocation; and setup and takedown procedures.

Course Intended

    This course is designed for individuals who have basic computer user skills and who are interested in obtaining a job as an entry-level IT technician.

SCHEDULE DATES - 185 Hour Hands-On Program
Network And System Administrator Manager Professional
9AM-2PM (Mon-Tue)
Start Date & Graduation Date
01/17/2022 to 04/25/2022
2 Days (10 Hours) a Week for 19 Weeks
Network And System Administrator Manager Professional
10AM-3PM (Weekends)
Start Date & Graduation Date
12/04/2021 to 03/27/2022
2 Days (10 Hours) a Week for 19 Weeks
Network And System Administrator Manager Professional
10AM-3PM (Weekends)
Start Date & Graduation Date
02/05/2022 to 05/15/2022
2 Days (10 Hours) a Week for 19 Weeks
Network And System Administrator Manager Professional
9AM-5PM (M-F)
Start Date & Graduation Date
03/07/2022 to 04/08/2022
5 Days (35 Hours) a Week for 5 Weeks
Network And System Administrator Manager Professional
9AM - 5PM (Saturday)
Start Date
Graduation Date
2 Days (10 Hours) a Week for 19 Weeks
Network And System Administrator Manager Professional
10AM-3PM (Weekends)
Start Date
Graduation Date
2 Days (10 Hours) a Week for 19 Weeks
Network And System Administrator Manager Professional
10AM-3PM (Weekends)
Start Date
Graduation Date
2 Days (10 Hours) a Week for 19 Weeks
Network And System Administrator Manager Professional
9AM-5PM (M-F)
Start Date
Graduation Date
5 Days (35 Hours) a Week for 5 Weeks
Network And System Administrator Manager Professional Objectives

Identify basic network theory concepts and major network communications methods.

  • Identify basic network theory concepts and major network communications methods.
  • Describe bounded network media.
  • Identify unbounded network media.
  • Identify the major types of network implementations.
  • Identify TCP/IP addressing and data delivery methods.
  • Implement routing technologies.
  • Identify the major services deployed on TCP/IP networks.
  • Identify the infrastructure of a WAN implementation.
  • Identify the components used in cloud computing and virtualization.
  • Describe basic concepts related to network security.
  • Prevent security breaches.
  • Respond to security incidents.
  • Identify the components of a remote network implementation.
  • Identify the tools, methods, and techniques used in managing a network.
  • Describe troubleshooting of issues on a network.
  • Identify the hardware components of personal computers and mobile digital devices.
  • Identify the basic components and functions of operating systems.
  • Identify networking and security fundamentals.
  • Identify the operational procedures that should be followed by professional PC technicians.
  • Install, configure, and troubleshoot display devices.
  • Install and configure peripheral components.
  • Manage system components.
  • Manage data storage.
  • Install and configure Microsoft Windows.
  • Optimize and maintain Microsoft Windows.
  • Work with other operating systems.
  • Identify the hardware and software requirements for client environment configurations.
  • Identify network technologies.
  • Install and configure networking capabilities.
  • Support mobile digital devices.
  • Support printers and multifunction devices.
  • Identify security threats, vulnerabilities, and controls0.
  • Implement security controls.
  • Troubleshoot system-wide issues.
  • After taking this course, you should be able to:

    Identify the components of a computer network and describe their basic characteristics

    Understand the model of host-to-host communication

    Describe the features and functions of the Cisco Internetwork Operating System (IOS®) software

    Describe LANs and the role of switches within LANs

    Describe Ethernet as the network access layer of TCP/IP and describe the operation of switches

    Install a switch and perform the initial configuration

    Describe the TCP/IP Internet layer, IPv4, its addressing scheme, and subnetting

    Describe the TCP/IP Transport layer and Application layer

    Explore functions of routing

    Implement basic configuration on a Cisco router

    Explain host-to-host communications across switches and routers

    Identify and resolve common switched network issues and common problems associated with IPv4 addressing

    Describe IPv6 main features and addresses, and configure and verify basic IPv6 connectivity

    Describe the operation, benefits, and limitations of static routing

    Describe, implement, and verify Virtual Local Area Networks (VLANs) and trunks

    Describe the application and configuration of inter-VLAN routing

    Explain the basics of dynamic routing protocols and describe components and terms of Open Shortest Path First (OSPF)

    Explain how Spanning Tree Protocol (STP) and Rapid Spanning Tree Protocol (RSTP) work

    Configure link aggregation using EtherChannel

    Describe the purpose of Layer 3 redundancy protocols

    Describe basic WAN and VPN concepts

    Describe the operation of Access Control Lists (ACLs) and their applications in the network

    Configure Internet access using Dynamic Host Configuration Protocol (DHCP) clients and explain and configure Network Address Translation (NAT) on Cisco routers

    Describe basic Quality of Service (QoS) concepts

    Describe the concepts of wireless networks, which types of wireless networks can be built, and how to use Wireless LAN Controllers (WLCs)

    Describe network and device architectures and introduce virtualization

    Introduce the concept of network programmability and Software-Defined Networking (SDN) and describe smart network management solutions such as Cisco DNA Center™, Software-Defined Access (SD-Access), and Software-Defined Wide Area Network (SD-WAN)

    Configure basic IOS system monitoring tools

    Describe the management of Cisco devices

    Describe the current security threat landscape

    Describe threat defense technologies

    Implement a basic security configuration of the device management plane

    Implement basic steps to harden network devices

Network And System Administrator Manager Professional Program



    Motherboards and Motherboard Components. RAM. Random Access Memory, w/ troubleshooting PC Expansion Cards. Storage w/troubleshooting The CPU Including 1.11: PC Connections and Connectors Power & Power Supplies w/troubleshooting The Right PC: Home Assignment with Exam. Video and Sound Completed with 1.7 above. Install and configure common peripheral devices. Printers: Install & Configure Printers: Different Technologies Printers: Maintenance.


  • Cables & Connectors
  • Cable Characteristics.
  • TCP/IP
  • TCP/IP & UDP Ports
  • WIFI Networking.
  • SOHO Networking, Install and Configure.
  • Connection Types
  • Connection Devices.
  • Networking Tools of the Trade.

Mobile Devices

  • Laptop Hardware & Components
  • Laptop Components
  • Laptop Features.
  • Other Mobile Devices: Tablets, Phones, etc.
  • Accessories and Ports’

Hardware and Network Troubleshooting

  • This objective covered in 1.0 above
  • This objective covered in 1.0 above
  • This objective covered in 1.0 above
  • This objective covered in 2.0 above
  • This objective covered in 1.0, 2.0, or 3.0 above.
  • This objective covered in 1.0 above.

Windows Operating Systems

  • Compare Operating Systems Windows Vista, 7, 8, & 8.1
  • Operating System Installation
  • Command Line Tools.
  • OS Features and Tools.
  • The Control Panel
  • Install Networking on a Desktop.
  • Preventative Maintenance and Tools

Other Operating Systems

  • MAC OS and Linux
  • Virtualization
  • The Cloud
  • Network Hosts
  • Mobile Operating Systems: Android, IOS, etc.
  • Install and Configure Mobile OS systems.
  • Mobile Data synchronization


  • Common Threats and Vulnerabilities
  • Prevention
  • OS Security Settings.
  • Deploy Security Best Practices per Workstation
  • Securing the mobile device
  • Data Disposal and Destruction
  • Secure a SOHO wired and wireless network.
  • Software Troubleshooting
  • Operational Procedures.

Local Area Networks

  • Topologies and the OSI Model
  • Key Features of Networks
  • Network Topologies
  • The OSI Model
  • Physical Layer
  • Data Link Layer
  • Network Layer
  • Transport Layer
  • Upper Layers
  • OSI Model Summary
  • Labs
  • VM Orientation
  • Ethernet
  • Transmission Media
  • Media Access Control
  • Broadcast Domains
  • Ethernet Frames
  • Ethernet Deployment Standards
  • MAC Addressing
  • Address Resolution Protocol (ARP)
  • Packet Sniffers
  • Labs
  • Configuring Ethernet Networking
  • Hubs, Bridges, and Switches
  • Hubs and Bridges
  • Switches
  • Switch Interface Configuration
  • Spanning Tree Protocol (STP)
  • Power over Ethernet (PoE)
  • Infrastructure and Design
  • Network Infrastructure Implementations
  • Planning an Enterprise Campus Network
  • Network Hierarchy and Distributed Switching
  • Software Defined Networking
  • Planning a SOHO Network
  • TCP/IP Protocol Suite
  • Policies and Best Practices
  • Procedures and Standards
  • Safety Procedures
  • Incident Response Policies
  • Security and Data Policies
  • Password Policy
  • Employee Policies

IP Addressing

  • Internet Protocol
  • IPv4
  • IPv4 Address Structure
  • Subnet Masks
  • IP Routing Basics
  • ipconfig / ifconfig
  • ICMP and ping
  • Labs
  • Configuring IPv4 Networking
  • IPv4 Addressing
  • IPv4 Addressing Schemes
  • Classful Addressing
  • Public versus Private Addressing
  • Subnetting and Classless Addressing
  • Planning an IPv4 Addressing Scheme
  • Public Internet Addressing
  • Variable Length Subnet Masks (VLSM)
  • Labs
  • Configuring IPv4 Subnets
  • IPv6 Addressing
  • IPv6 Address Format
  • IPv6 Addressing Schemes
  • IPv6 Address Autoconfiguration
  • Migrating to IPv6
  • Labs
  • Configuring IPv6 Networking DHCP and APIPA
  • IPv4 Address Autoconfiguration
  • Configuring DHCP
  • DHCPv6
  • Labs
  • Configuring Address Autoconfiguration


  • Routing
  • Routing Basics
  • Routing Algorithms and Metrics
  • Dynamic Routing Protocols
  • Administrative Distance and Route Redistribution
  • IPv4 and IPv6 Internet Routing
  • High Availability Routing
  • Installing and Configuring Routers
  • Routing Troubleshooting Tools
  • Labs
  • Configuring Routing TCP and UDP
  • Transmission Control Protocol (TCP)
  • User Datagram Protocol (UDP)
  • TCP and UDP Ports
  • Port Scanners
  • Protocol Analyzers
  • Labs
  • TCP and Port Scanning Name Resolution and IPAM
  • Host Names and FQDNs
  • Domain Name System
  • Configuring DNS Servers
  • Resource Records
  • Name Resolution Tools
  • IP Address Management (IPAM)
  • Labs Configuring Name Resolution and IPAM Monitoring and Scanning
  • Performance Monitoring
  • Network Monitoring Utilities
  • Logs and Event Management
  • Simple Network Management Protocol
  • Analyzing Performance Metrics
  • Patch Management
  • Vulnerability Scanning
  • Labs
  • Performance Testing and Monitoring Network Troubleshooting
  • Troubleshooting Procedures
  • Identifying the Problem
  • Establishing a Probable Cause
  • Establishing a Plan of Action
  • Troubleshooting Hardware Failure Issues
  • Troubleshooting Addressing Issues
  • Troubleshooting DHCP Issues
  • Troubleshooting Name Resolution
  • Troubleshooting Services

Applications and Security

  • Applications and Services
  • TCP/IP Services
  • HTTP and Web Servers
  • SSL / TLS and HTTPS
  • Email (SMTP / POP / IMAP)
  • Voice Services (VoIP and VTC)
  • Real-time Services Protocols
  • Quality of Service
  • Traffic Shaping Bottlenecks and Load Balancing
  • Multilayer Switches
  • Labs
  • Configuring Application Protocols
  • Virtualization, SAN, and Cloud Services
  • Virtualization Technologies
  • Network Storage Types
  • Fibre Channel and InfiniBand
  • iSCSI
  • Cloud Computing
  • Configuring Cloud Connectivity
  • Network Security Design
  • Security Basics
  • Common Networking Attacks
  • Network Segmentation and DMZ
  • Virtual LANs (VLAN)
  • VLAN Trunks
  • Network Address Translation (NAT)
  • Device and Service Hardening
  • Honeypots and Penetration Tests Network Security Appliances
  • Basic Firewalls
  • Stateful Firewalls
  • Deploying a Firewall
  • Configuring a Firewall
  • Deploying a Proxy
  • Intrusion Detection Systems (IDS)
  • Denial of Service
  • Labs
  • Configuring a NAT Firewall
  • Authentication and Endpoint Security
  • Authentication and Access Controls
  • Social Engineering
  • Authentication Technologies
  • PKI and Digital Certificates
  • Local Authentication
  • Directory Services
  • Endpoint Security
  • Network Access Control
  • Labs
  • Secure Appliance Administration

Operations and Infrastructure

  • Network Site Management
  • Network Cabling Solutions
  • Distribution Frames
  • Change and Configuration Management
  • Network Documentation and Diagrams
  • Labeling Physical Security Devices
  • Business Continuity and Disaster Recovery
  • Network Link Management
  • Power Management
  • Backup Management
  • Labs
  • Network Inventory Management Installing Cabled Networks
  • Twisted Pair Cable (UTP / STP / ScTP)
  • Twisted Pair Connectors
  • Wiring Tools and Techniques
  • Cable Testing Tools
  • Troubleshooting Wired Connectivity
  • Other Copper Cable Types
  • Fiber Optic Cable and Connectors
  • Transceivers and Media Converters Installing Wireless Networks
  • Wireless Standards (IEEE 802.11)
  • Wireless Network Topologies
  • Wireless Site Design
  • Troubleshooting Wireless Connectivity
  • Wireless Security
  • Wi-Fi Authentication
  • Extensible Authentication Protocol
  • Troubleshooting Wireless Security
  • Wireless Controllers Installing WAN Links
  • Wide Area Networks (WAN)
  • Telecommunications Networks
  • Modern Telecommunications Networks
  • Local Loop Services Installing WAN Links
  • Wireless WAN Services
  • Internet of Things Configuring Remote Access
  • Remote Access Services (RAS)
  • MPLS and PPP SIP Trunks
  • Virtual Private Networks (VPN)
  • IPsec Internet Key Exchange / ISAKMP
  • Remote Access Servers
  • Remote Administration Tools
  • Managing Network Appliances
  • Remote File Access
  • Labs
  • Configuring Secure Access Channels
  • Configuring a Virtual Private Network

Introduction to Ethical Hacking & Footprinting and Reconnaissance

  • Information Security Overview
  • Information Security Threats and Attack Vectors
  • Hacking Concepts
  • Ethical Hacking Concepts
  • Information Security Controls
  • Penetration Testing Concepts
  • Information Security Laws and Standards
  • Footprinting Concepts
  • Footprinting through Search Engines
  • Footprinting through Web Services
  • Footprinting through Social Networking Sites
  • Website Footprinting
  • Email Footprinting
  • Competitive Intelligence
  • Whois Footprinting
  • DNS Footprinting
  • Network Footprinting
  • Footprinting through Social Engineering
  • Footprinting Tools
  • Footprinting Countermeasures
  • Footprinting Penetration Testing

Scanning Networks & Enumeration

  • Network Scanning Concepts
  • Scanning Tools
  • Scanning Techniques
  • Scanning Beyond IDS and Firewall
  • Banner Grabbing
  • Draw Network Diagrams
  • Scanning Pen Testing
  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP Enumeration
  • SMTP and DNS Enumeration
  • Other Enumeration Techniques
  • Enumeration Countermeasures
  • Enumeration Pen Testing

Vulnerability Analysis & System Hacking

  • Vulnerability Assessment Concepts
  • Vulnerability Assessment Solutions
  • Vulnerability Scoring Systems
  • Vulnerability Assessment Tools
  • Vulnerability Assessment Reports
  • System Hacking Concepts
  • Cracking Passwords
  • Escalating Privileges
  • Executing Applications
  • Hiding Files
  • Covering Tracks
  • Penetration Testing

Malware Threats & Sniffing

  • Malware Concepts
  • Trojan Concepts
  • Virus and Worm Concepts
  • Malware Analysis
  • Countermeasures
  • Anti-Malware Software
  • Malware Penetration Testing
  • Sniffing Concepts
  • Sniffing Technique: MAC Attacks
  • Sniffing Technique: DHCP Attacks
  • Sniffing Technique: ARP Poisoning
  • Sniffing Technique: Spoofing Attacks
  • Sniffing Technique: DNS Poisoning
  • Sniffing Tools
  • Countermeasures
  • Sniffing Detection Techniques
  • Sniffing Pen Testing

Social Engineering & Denial-of-Service

  • Social Engineering Concepts
  • Social Engineering Techniques
  • Insider Threats
  • Impersonation on Social Networking Sites
  • Identity Theft
  • Countermeasures
  • Social Engineering Pen Testing
  • DoS/DDoS Concepts
  • DoS/DDoS Attack Techniques
  • Botnets
  • DDoS Case Study
  • DoS/DDoS Attack Tools
  • Countermeasures
  • DoS/DDoS Protection Tools
  • DoS/DDoS Penetration Testing

This class includes lecture sections and some self-study sections. In instructor-led classes, lectures are delivered in real-time, either in person or via video conferencing. In e-learning classes, the lectures are on recorded videos.

Instructor-Led (Lecture)

Exploring the Functions of Networking

Introducing the Host-to-Host Communications Model

Operating Cisco IOS Software

Introducing LANs

Exploring the TCP/IP Link Layer

Starting a Switch

Introducing the TCP/IP Internet Layer, IPv4 Addressing, and Subnets

Explaining the TCP/IP Transport Layer and Application Layer

Exploring the Functions of Routing

Configuring a Cisco Router

Exploring the Packet Delivery Process

Troubleshooting a Simple Network

Introducing Basic IPv6

Configuring Static Routing

Implementing VLANs and Trunks

Routing Between VLANs

Introducing OSPF

Improving Redundant Switched Topologies with EtherChannel

Explaining Basics of ACL

Enabling Internet Connectivity

Explaining the Evolution of Intelligent Networks

Introducing System Monitoring

Managing Cisco Devices

Securing Administrative Access

Implementing Device Hardening


Building Redundant Switched Topologies

Exploring Layer 3 Redundancy

Introducing WAN Technologies

Introducing QoS

Explaining Wireless Fundamentals

Introducing Architectures and Virtualization

Examining the Security Threat Landscape

Implementing Threat Defense Technologies

Lab outline

Get Started with Cisco Command-Line Interface (CLI)

Observe How a Switch Operates

Perform Basic Switch Configuration

Implement the Initial Switch Configuration

Inspect TCP/IP Applications

Configure an Interface on a Cisco Router

Configure and Verify Layer 2 Discovery Protocols

Implement an Initial Router Configuration

Configure Default Gateway

Explore Packet Forwarding

Troubleshoot Switch Media and Port Issues

Troubleshoot Port Duplex Issues

Configure Basic IPv6 Connectivity

Configure and Verify IPv4 Static Routes

Configure IPv6 Static Routes

Implement IPv4 Static Routing

Implement IPv6 Static Routing

Configure VLAN and Trunk

Troubleshoot VLANs and Trunk

Configure a Router on a Stick

Implement Multiple VLANs and Basic Routing Between the VLANs

Configure and Verify Single-Area OSPF

Configure and Verify EtherChannel

Improve Redundant Switched Topologies with EtherChannel

Configure and Verify IPv4 ACLs

Implement Numbered and Named IPv4 ACLs

Configure a Provider-Assigned IPv4 Address

Configure Static NAT

Configure Dynamic NAT and Port Address Translation (PAT)

Implement PAT

Log into the WLC

Monitor the WLC

Configure a Dynamic (VLAN) Interface

Configure a DHCP Scope

Configure a WLAN

Define a Remote Access Dial-In User Service (RADIUS) Server

Explore Management Options

Explore the Cisco DNA Center

Configure and Verify NTP

Configure System Message Logging

Create the Cisco IOS Image Backup

Upgrade Cisco IOS Image

Configure WLAN Using Wi-Fi Protected Access 2 (WPA2) Pre-Shared Key (PSK) Using the GUI

Secure Console and Remote Access

Enable and Limit Remote Access Connectivity

Secure Device Administrative Access

Configure and Verify Port Security

Implement Device Hardening

Network and System Administrator Manager Program Prerequisites
  • This course is designed for individuals who have basic computer user skills and who are interested in obtaining a job as an entry-level IT technician.
  • HS Diploma/GED

Income Expectation


The average salary for a Network and System Administrator Manager is $101,200 in New York City. Salary estimates are provided by CompTIA.

Network and System Administrator Manager Employment Objective

Upon completion of this course, and the certifying exam(s), the student will be qualified to take a job as a

Network and System Administrator Manager Support Technician
Network Administrator
IT/Server Technician
or Storage Administrator



CompTIA Cybersecurity Analyst CySA+

CompTIA PenTest+

CompTIA Linux+

Cyber Security

Certified Ethical Hacker

Tuition Fee $8,500

CompTIA A+ 220-1001

CompTIA A+ 220-1002

CompTIA Network+ Certification N10-007

CompTIA Security+ Certification SYO-501

Cisco Certified Network Associate CCNA 200-301

CompTIA Exam Vouchers

  • CompTIA
  • EC-Council
Certified Instructors

Why Choose Us?

We provide quality education

  • Institute of Information Technology is approved by the U.S. Department of Homeland Security for Education and Training
  • Institute of Information Technology is approved by the NYS Education Department
  • Teachers are licensed by the NYS Education Department
  • Approved by NYS Labor Department
  • Approved by Workforce1 Development
  • Approved by Adult Career and Continuing Education Services-Vocational Rehabilitation (ACCES-VR)
  • Course Contents are approved by Authorized Partners
  • Unlimited Practice Exam

We use up-to-date course content

  • Real work Experience from Expert Certified Instructors
  • Authorized Partner Approved Course Contents
  • Hands-On Instructor-Led Classroom Training
  • Simulations of Real Work Projects
  • Limitless Practice Exams
  • One-On-One Help
  • Group Study
  • Lab Practice
  • Mentoring

We value your time & investment

  • Extra Help if Needed, At No Cost, Until You Are Certified!
  • Students can repeat class until certified at no cost
  • Payment Plan for Eligible Students
  • Textbooks included in tuition fee
  • Free Job Placement Assistance
  • Graduates & Career Services
  • Certification Exams Center
  • Discount Exam Vouchers
  • Affordable Tuition Fee
  • Mock Interview