NET training
Recommendation
Introduction to
Recommendations
Making recommendations,
various techniques
Hands on Exercise for
Recommendations
Classification
Classification System Overview
Classification process
Naive Bayes Classifier
Decision Trees
Examples of Classification
Clustering
Clustering basics
Hierarchical clustering
Course Content and Syllabus for CCNA
Training
Describe how a network Identify and correct common
network problems at layers 1, 2,
works 3 and 7 using a layered model
Describe the purpose and approach
functions of various network Differentiate between LAN/WAN
devices operation and features
Describe the purpose and
functions of various network Configure, verify and
devices troubleshoot a switch
Select the components required with VLANs and
to meet a network specification
Use the OSI and TCP/IP models
interswitch
and their associated protocols to communications
explain how data flows in a
network Select the appropriate media,
Describe common networked cables, ports, and connectors to
applications including web connect switches to other
applications network devices and hosts
Describe the purpose and basic Explain the technology and
operation of the protocols in the media access control method
OSI and TCP models for Ethernet networks
Describe the impact of Explain network segmentation
applications (Voice Over IP and and basic traffic management
Video Over IP) on a network concepts
Interpret network diagrams Explain basic switching
Determine the path between two concepts and the operation of
hosts across a network Cisco switches
Describe the components Perform and verify initial switch
required for network and configuration tasks including
Internet communications remote access management
Verify network status and switch
operation using basic utilities
(including: ping, traceroute, IP Services to meet
telnet, SSH, arp, ipconfig),
SHOW & DEBUG commands
network requirements
Identify, prescribe, and resolve Describe the operation and
common switched network benefits of using private and
media issues, configuration public IP addressing
issues, auto negotiation, and Explain the operation and
switch hardware failures benefits of using DHCP and
Describe enhanced switching DNS
technologies (including: VTP, Configure, verify and
RSTP, VLAN, PVSTP, 802.1q) troubleshoot DHCP and DNS
Describe how VLANs create operation on a router.(including:
logically separate networks and CLI/SDM)
the need for routing between Implement static and dynamic
them addressing services for hosts in
Configure, verify, and a LAN environment
troubleshoot VLANs Calculate and apply an
Configure, verify, and addressing scheme including
troubleshoot trunking on Cisco VLSM IP addressing design to a
switches network
Configure, verify, and Determine the appropriate
troubleshoot interVLAN routing classless addressing scheme
Configure, verify, and using VLSM and summarization
troubleshoot VTP to satisfy addressing
Configure, verify, and requirements in a LAN/WAN
troubleshoot RSTP operation environment
Interpret the output of various Describe the technological
show and debug commands to requirements for running IPv6 in
verify the operational status of a conjunction with IPv4 (including:
Cisco switched network. protocols, dual stack, tunneling,
Implement basic switch security etc).
(including: port security, trunk Describe IPv6 addresses
access, management vlan other Identify and correct common
than vlan1, etc.) problems associated with IP
addressing and host
Implement an IP configurations
addressing scheme and
Configure, verify and Manage Cisco IOS
Compare and contrast methods
troubleshoot a switch of routing and routing protocols
with VLANs and Configure, verify, and
interswitch troubleshoot OSPF
Configure, verify, and
communications troubleshoot EIGRP
Describe basic routing concepts Verify network connectivity
(including: packet forwarding, (including: using ping,
router lookup process) traceroute, and telnet or SSH)
Describe the operation of Cisco Troubleshoot routing issues
routers (including: router bootup Verify router hardware and
process, POST, router software operation using SHOW
components) & DEBUG commands.
Select the appropriate media, Implement basic router security
cables, ports, and connectors to
connect routers to other network Explain and select the
devices and hosts appropriate
Configure, verify, and administrative tasks
troubleshoot RIPv2
Access and utilize the router to required for a WLAN
set basic parameters.(including:
Describe standards associated
CLI/SDM)
with wireless media (including:
Connect, configure, and verify
IEEE WI-FI Alliance, ITU/FCC)
operation status of a device
Identify and describe the
interface
purpose of the components in a
Verify device configuration and
small wireless network.
network connectivity using ping,
(Including: SSID, BSS, ESS)
traceroute, telnet, SSH or other
Identify the basic parameters to
utilities
configure on a wireless network
Perform and verify routing
to ensure that devices connect
configuration tasks for a static or
to the correct access point
default route given specific
Compare and contrast wireless
routing requirements
security features and
Manage IOS configuration files.
capabilities of WPA security
(including: save, edit, upgrade,
restore)
(including: open, WEP, WPA- Describe the purpose and types
1/2) of ACLs
Identify common issues with Configure and apply ACLs
implementing wireless networks. based on network filtering
(Including: Interface, miss requirements.(including:
configuration) CLI/SDM)
Configure and apply an ACLs to
Identify security threats limit telnet and SSH access to
to a network and the router using (including:
SDM/CLI)
describe general Verify and monitor ACLs in a
methods to mitigate network environment
those threats Troubleshoot ACL issues
Explain the basic operation of
Describe today's increasing NAT
network security threats and Configure NAT for given
explain the need to implement a network requirements using
comprehensive security policy (including: CLI/SDM)
to mitigate the threats Troubleshoot NAT issues
Explain general methods to
mitigate common security Implement and verify
threats to network devices, WAN links
hosts, and applications
Describe the functions of Describe different methods for
common security appliances connecting to a WAN
and applications Configure and verify a basic
Describe security recommended WAN serial connection
practices including initial steps Configure and verify Frame
to secure network devices Relay on Cisco routers
Troubleshoot WAN
Implement, verify, and implementation issues
troubleshoot NAT and Describe VPN technology
(including: importance, benefits,
ACLs in a medium-size role, impact, components)
Enterprise branch office Configure and verify a PPP
network connection between Cisco
routers
Course Content and Syllabus for CCNP
Training
CCNP Course Content Defining Virtual Networks
(VLANs)
Implementing Cisco IP Implementing Spanning Tree
Routing (300-101) Implementing InterVLAN
Routing
Describing network Implement High Availability in a
fundamentals Campus Environment
Establishing Internet and WAN Wireless Client Access
connectivity (IPv4 and IPv6) Minimizing Service Loss and
Managing network device Data Theft in a Campus
security Network
Operating a medium-sized LAN Configuring Campus Switches
with multiple switches, to Support Voice
supporting VLANs, trunking, and
spanning tree Troubleshooting and
Troubleshooting IP connectivity Maintaining Cisco IP Networks
(300-135)
(IPv4 and IPv6)
Configuring and troubleshooting Layer 2 switching
EIGRP and OSPF (IPv4 and VLANs, VLAN access control
IPv6) lists, port security
Configuring devices for SNMP, Switch security issues
Syslog, and NetFlow access Link aggregation protocols
Managing Cisco device Spanning Tree Protocol (STP)
configurations, Cisco IOS Inter-VLAN routing solutions
images, and licenses First Hop Redundancy Protocols
(FHRPs) - HSRP, VRRP, and
Implementing Cisco IP
GLBP
Switched Networks (300-115) Branch office operations
Drawing Lines Enhanced Interior Gateway
Introduction to Campus Routing Protocol (EIGRP)
Networks Open Shortest Path First
(OSPF)
Layer 3 path control
Course Content and Syllabus for Cloud
Computing Training
Introduction to Cloud Exploiting Software as a
Computing Service ( SaaS )
Defining cloud computing Characterizing SaaS
Components of a computing Minimizing the need for local
cloud hardware and software
Differentiating types of clouds: Streamlining administration with
public, private, hybrid centralized installation and
Delivering services from the updates
cloud Optimizing cost and
Categorizing service types performance with the ability to
Comparing vendor cloud scale on demand
products: Amazon, Google, Comparing service scenarios
Microsoft and others Improving collaboration with
business productivity tools
Adopting the Cloud Simplifying business process
creation by integrating existing
Key drivers of cloud computing components
solutions Inspecting SaaS technologies
Instantaneous provisioning of Deploying Web applications
computing resources Implementing Web services:
Handling varied loads with SOAP, REST
elasticity and seamless Choosing a development
scalability platform
Tapping into an infinite storage
capacity Delivering Platform as a
Cost-effective pay-as-you-use Service (PaaS)
billing models
Evaluating barriers to cloud Exploring the technical
computing foundation for PaaS
Handling sensitive data Specifying the components of
Aspects of cloud security PaaS
Assessing governance solutions
Analyzing vendor PaaS Tools and support for
provisions management and monitoring
Selecting an appropriate
implementation Building a Business
Building services with solution Case
stacks
Evaluating the architecture of Calculating the financial
vendor specific platforms implications
Becoming familiar with service Analyzing current and future
platform tools computing requirements
Leveraging the power of Comparing in-house facilities to
scalable middleware the cloud
Managing cloud storage Estimating economic factors
Controlling unstructured data in downstream
the cloud Preserving business continuity
Deploying relational databases Selecting appropriate service-
in the cloud level agreements
Improving data availability Safeguarding access to assets
Employing support services in the cloud
Testing in the cloud Security, availability and
Monitoring cloud-based services disaster recovery strategies
Analyzing portability across
platforms Migrating to the Cloud
Deploying Infrastructure Technical considerations
as a Service ( IaaS ) Rearchitecting applications for
the cloud
Enabling technologies Integrating the cloud with
Scalable server clusters existing applications
Achieving transparency with Avoiding vendor lock-in
platform virtualization Planning the migration
Elastic storage devices Incremental vs
Accessing IaaS one-step solution
Provisioning servers on demand Selecting a vendor
Handling dynamic and static IP Establishing staff skill
addresses requirements
Course Content and Syllabus for Java
Training
Java Language Using encapsulation to combine
methods and data in a single
Environment class
Object Oriented Inheritance and Polymorphism
Platform Independent
Automatic Memory Writing Java Classes
Management
Encapsulation
Compiled / Interpreted approach
Polymorphism
Robust
Inheritance
Secure
OOP in Java
Dynamic Linking
Class Fundamentals
MultiThreaded
Using Objects
Built-in Networking
Constructor
Garbage Collection
Java Fundamentals Method Overloading
Data types Method Overriding
Operators Static Members
Control Statements Understanding Interface
Arrays Using Interfaces class
Enhanced for-loop
Enumerated types Packages
Static import
Why packages
Auto boxing
Understanding Classpath
C-style formatted I/O
Access modifiers and their
Variable arguments
Scope
Essentials of Object- Exception Handling
Oriented Programming
Importance of Exception
Object and Class Definition Handling
Exception Propagation
Exception Types
Using try and catch Introduction to Networking
throw, throws, finally InetAddress
Writing User defined Exceptions URL
TCP Socket and ServerSocket
I/O Operations in Java UDP Socket
Developing a Chat Application
Byte Oriented Streams
File Handling Java Util Package /
Readers and Writers Collections Framework
Multithreaded Collection and Iterator Interface
Programming Enumeration
List and ArrayList
Introduction to Multi-Threading Vector
Understanding Threads and its Comparator
States Set Interface and SortedSet
Java Threading Model Hashtable
Thread class and Runnable Properties
Interface
Thread Priorities Generics
Thread Synchronization
Inter thread Communication Introduction to Generics
Preventing Deadlocks Using Built-in Generics
Collections
DEVELOPING Java Writing Simple Generic Class
APPS Bounded Generics
Wild Card Generics
Defining a Solution without
Writing Code Inner Classes
Organizing a Concept Solution
Creating a Program Skeleton Nested Top Level Classes
Defining Error Checking Member Classes
Requirements Local Classes
Introduction to Application Anonymous Classes
Security
Abstract Window Toolkit
Network Programming
Graphics
Color and Font
AWT Components/Controls
Event Handling and Layouts
Swing Programming
Introduction to Swing and MVC
Architecture
Light Weight Component
Swing Hierarchy
Atomic Components e.g.
JButton, JList and more
Intermediate Container e.g.
JPanel, JSplitPane and more
Top-Level Container e.g.
JFrame and JApplet
Swing Related Events
Course Content and Syllabus for Core Java
Training
Core Java Language Using encapsulation to combine
methods and data in a single
Environment class
Object Oriented Inheritance and Polymorphism
Platform Independent
Automatic Memory Writing Java Classes
Management
Encapsulation
Compiled / Interpreted approach
Polymorphism
Robust
Inheritance
Secure
OOP in Java
Dynamic Linking
Class Fundamentals
MultiThreaded
Using Objects
Built-in Networking
Constructor
Garbage Collection
Java Fundamentals Method Overloading
Data types Method Overriding
Operators Static Members
Control Statements Understanding Interface
Arrays Using Interfaces class
Enhanced for-loop
Enumerated types Packages
Static import
Why packages
Auto boxing
Understanding Classpath
C-style formatted I/O
Access modifiers and their
Variable arguments
Scope
Essentials of Object- Exception Handling
Oriented Programming
Importance of Exception
Object and Class Definition Handling
Exception Propagation Network Programming
Exception Types
Using try and catch Introduction to Networking
throw, throws, finally InetAddress
Writing User defined Exceptions URL
TCP Socket and ServerSocket
I/O Operations in Java UDP Socket
Developing a Chat Application
Byte Oriented Streams
File Handling Java Util Package /
Readers and Writers
Collections Framework
Multithreaded Collection and Iterator Interface
Programming Enumeration
List and ArrayList
Introduction to Multi-Threading Vector
Understanding Threads and its Comparator
States Set Interface and SortedSet
Java Threading Model Hashtable
Thread class and Runnable Properties
Interface
Thread Priorities Generics
Thread Synchronization
Inter thread Communication Introduction to Generics
Preventing Deadlocks Using Built-in Generics
Collections
DEVELOPING Java Writing Simple Generic Class
APPS Bounded Generics
Wild Card Generics
Defining a Solution without
Writing Code Inner Classes
Organizing a Concept Solution
Creating a Program Skeleton Nested Top Level Classes
Defining Error Checking Member Classes
Requirements Local Classes
Introduction to Application Anonymous Classes
Security
Abstract Window Toolkit SiteMesh
Spark
Graphics Servlet API
Color and Font
AWT Components/Controls
Event Handling and Layouts
Swing Programming
Introduction to Swing and MVC
Architecture
Light Weight Component
Swing Hierarchy
Atomic Components e.g.
JButton, JList and more
Intermediate Container e.g.
JPanel, JSplitPane and more
Top-Level Container e.g.
JFrame and JApplet
Swing Related Events
JAVA Frameworks
java framework struts 2
JSF (JavaServer Faces)
Spring MVC framework
Wicket framework
Stripes
Tapestry
RIFE
Seam
Google Web Toolkit (GWT)
OpenXava
Apache Axis
Hibernate
JDOM
Java Applet
Course Content and Syllabus for Linux
System Programming Training
Linux System Files and devices
Programming Course Library functions
Contents Low-level file access
Managing files
Introduction to C Programming The standard I/O library
Introduction to ’C’ Formatted input and output
Control flow Statements in ‘C’ The /proc file system
Functions
Arrays Process
Pointers
Pointers and functions What is a process
Structures Viewing processes
C preprocessor Starting new process
Link List, Doubly Linked lists Duplicating a process
image
Introduction to operating Programming example of using
fork() system call
system
What Operating Systems Do
Signal
Computer-System Organization Viewing the header file signal.h
Computer-System Architecture Signal handling
Operating-System Structure Signal sending
Operating-System Operations POSIX Signals API
Process Management Programming example of signal
Memory Management handling related functions.
Storage Management
Protection and Security Posix threads
Types of kernel
programming
Linux system Threads and Processes
Programming Creating Threads
Synchronizing Threads
Communicating Between What Is a Socket?
Threads Socket Connections
Programming example of using Socket Attributes
pthread related functions. Socket Domains
Socket Types
IPC (Inter Process Socket Protocols
communication) Creating a Socket
Socket Addresses
Discuss various IPC Naming a Socket
mechanisms (in brief) Accepting Connections
pipe() Requesting Connections
popen() Closing a Socket
named pipes (FIFO) Programming example of
creating local Client and Local
System V-IPC (Inter Server using AF_UNIX
Process communication)
Understanding the Linux
interface facilities
Semaphores, for managing
access to resources
Using functions like semctl(),
semget() , semopt().
Shared memory, for highly
efficient data sharing between
programs
Using functions like
shmat(),shmctl(),shmdt(),shmge
t()
Messaging, for an easy way of
passing data between programs
Using functions like
msgget(),msgctl(),msgrcv(),msg
snd()
Socket Programming
Course Content and Syllabus for Linux
Kernel and Device Driver Development
Training
Linux Kernel and Device Process Scheduling in Unix
Systems
Driver Development Fair Scheduling
Course Contents The Scheduler Entry Point
Wait Queues
The Process Waking Up
Process Descriptor and the Preemption and Context
Task Structure Switching
Allocating the Process
Descriptor System Calls
Storing the Process Descriptor
Process State System Calls
Manipulating the Current Examples of system calls
Process State Examples of Standard APIs
Process Context System call Implementation
Copy-on-Write API-system Call-OS relationship
Forking Types of system calls
vfork() Processor Affinity System Calls
Kernel Threads Yielding Processor Time
Communicating with the Kernel
Process Scheduling APIs, POSIX, and the C Library
Accessing the System Call from
Multitasking User-Space
Linux’s Process Scheduler
Policy Memory Management
I/O-Bound Versus Processor-
Bound Processes Pages
Process Priority Zones
Time slice Getting Pages
The Scheduling Policy in Action Getting Zeroed Pages
The Linux Scheduling Algorithm Freeing Pages
Scheduler Classes kmalloc()
gfp_mask Flags Interrupt context
Action Modifiers Taslets
Zone Modifiers Softirq
Type Flags
kfree() An Introduction to Kernel
vmalloc() Synchronization
Slab Layer
Design of the Slab Layer Kernel Synchronization Methods
Slab Allocator Interface Spin locks
Allocating from the Cache Reader-writer locks
The Process Address Space Semaphores
RTOS
Introduction to RTOS
What is Real Time System?
Requirements of Real time
System
Hard Real-time Systems and
Soft Real-time Systems
Task
What is a task creation?
Unitask approach Vs multitask
approach
Task states
Scheduling
Multitasking Kernel
Context switch
Priority based scheduling
Round Robin scheduling
Course Content and Syllabus for MATLAB
and Simulink Training
MATLAB and Simulink Methods of accessing Matrix
Elements
Course Contents
Introduction to MATLAB Creating Scripts in
What is MATLAB? MATLAB
Elementary MATLAB Constructs
MATLAB Variables Matrices operations
Arithmetic Operations Addition, subtractions of
Logical and Relational matrices of n numbers rows and
Operations columns
Mathematical Functions Multiplication of Matrices of nxm
Graphical Functions and mxn row column.
I/O Operations
Import Wizard Plotting Commands
Special I/O Functions
The MATLAB Search Path One dimensional plots
Elementary Matrix Two dimension plots
Manipulations Three dimension plots
More Complicated Data Flow control Commands
Structures IF statements
Structures While Statements
Cell Arrays For Loops
Definition of Cell Arrays
Access to Cell Array Elements User defined functions
How to deal with Creating functions in MATLAB
environment
Matrices and Arrays in Calling functions
MATLAB Executing functions
Arithmetic MATLAB
Operations
Arithmetic Operations as Matrix
Operations
Arithmetic Operations as Field
Operations
Course Content and Syllabus for HTML
Training
HTML Course Content About XHTML - why you should
use current standards and how
Getting started with XHTML differs from HTML
HTML Principals of HTML - element
structure, tags and properties
is the core language for creating Writing good HTML - rules and
web pages. conventions
This course is aimed at anyone
wishing to learn how to write Formatting
and edit HTML code, whether
your intention is to hand-code or Paragraphs and line breaks
to use a visual editor such as Heading tags
Dreamweaver. Multiple spaces
This course is an ideal primer Special characters
for our Introduction to CSS
course, which moves into Tables
building more complex page
layouts with stylesheets. When and how to use tables
Table properties
General
Images
Website structure and
management About web graphics - JPEG and
Following standards - usability GIF
and accessibility issues, Controlling image placement
essential page elements and Setting Image properties via
properties HTML
About web browsers
Hyperlinks
HTML/XHTML
Understanding document
relative and absolute paths,
email and external links
Creating simple navigation for techniques using CSS
websites (cascading stylesheets).
Using images as link buttons
General
Design and layout
techniques Website structure
why you should use standards -
Efficient and practical page usability and accessibility
design issues, About web browsers
Working with Div tags for layout Optimising pages for search
Controlling content width engines
Media Player
Framework
Movie Player Controllers
Course Content and Syllabus for Python
Testing Training
Python Course Content Data types
An Introduction to Numbers
Python Strings
Lists, tuples & Dictionary
Introductory Remarks about Exercise
Python
A Brief History of Python
How python is differ from other
Decision making &
languages Loops
Python Versions
Installing Python Introduction
IDLE Control Flow and Syntax
Getting Help The if Statement
How to execute Python program Python Operators
Writing your first program The while Loop
break and continue
Python Basics The for Loop
Pass statement
Python keywords and Identifiers Exercise
Python statements
Python indentation Functions
Comments in python
command line arguments Introduction
Getting user input Calling a function
Exercise Function arguments
Built in functions
Variables and data types Scope of variables
Decorators
Passing Functions to a Function
Introduction Lambda
Variables Closures
Exercise Instance Methods
Special class method
Modules and Packages Inheritance
Method overriding
Modules Data hiding
Importing module Exercise
Standard Module - sys
Standard Module - OS Regular Expressions
The dir Function
Packages Introduction
Exercise Match function
Search function
Exception Handling Grouping
Matching at Beginning or End
Errors Match Objects
Run Time Errors Flags
Handling IO Exceptions Exercise
Try.... except statement
Raise Socket programming
Assert
Exercise What are sockets?
Creating sockets
Files and Directories Server-client socket methods
Connecting client server
Introduction Client-server chatting program
Writing Data to a File Exercise
Reading Data From a File
Additional File Methods
Working with files
Working with Directories
The pickle Module
Exercise
Classes Objects
Introduction classes and objects
Creating Classes
Course Content and Syllabus for Ethical
Hacking Training
Ethical Hacking Syllabus Writing Advance Backdoors for
Windows
Information Intelligence. Attacking Network Switches
Information Intelligence Attacking FTP Servers
Organize Your Information Advanced Social Engineering
Google/Bing Hacking. Attacks
Hunting And Profiling People. Advanced Cross Site Scripting
Gathering Email Accounts Sub attacks
domains/host. From Reflected XSS To
Whois Lookup Reverse Shell
OS Info Hunting From Stored XSS To Reverse
Uptime Info Hunting Shell
Webserver Info Hunting Advanced File Handling Attacks
Traceroute Target IP Address From File Upload To Reverse
TCP Port Scanning Shell
TCP SYN Port Scanning From Remote File Inclusion To
TCP ACK Firewall Scanning Reverse Shell
Finding Live Hosts From Local File Inclusion To
UDP Sweeping And Probing Reverse Shell.
Database Enumerating From SQL Injection To Reverse
MySQL Server Enumerating Shell
DNS Enumerating Advanced CSRF Attacks
SNMP Enumerating Session Hijacking Attacks
Password Attacks Advanced System Command
Advanced Web Server Injection Attack
Fingerprinting Sniffing Network Passwords
Advanced Web Application Sniffing HTTP Passwords
Fingerprinting Sniffing Ftp And Telnet
Advanced Web Application Passwords
Firewall Fingerprinting Advanced Sniffing
Advanced OS Fingerprinting Sniffing Facebook Cookies
Attacking DHCP Servers Advanced SSL Sniffing
Writing Virus Codes Advanced Network Attacks
From Man In The Middle Attack
To Full Network
Advanced Mobile Hacking
Tactics
Attacking WEP Protected
802.11 Networks
Attacking WPA/WPA2 Protected
802.11 Networks
Attacking Apache Web Server
Attacking IIS Web Server
Buffer Overflow Attacks
Advanced Stateful Packet
Inspection Firewall Evasion And
Bypassing
Advanced Antivirus Detection
Evasion And Bypassing
Advanced Windows User
Access Control (UAC) Evasion
And Bypassing
Advanced Firewall
Outbound/Inbound Rules
Evasion And Bypassing
Vulnerability Vs Penteration
Testing
Course Content and Syllabus for Computer
Training
NETWORK BASICS NETWORK ACCESS
Network concepts
CONTROL
Network architectures Authentication
The OSI model Public key cryptography
Remote access
WIRED COMPUTER- Wireless security
TO-COMPUTER
CONNECTIONS MONITORING
Wired network connections Monitoring resources
Network interface cards and Event Viewer
modems
TROUBLESHOOTING
WIRELESS
Troubleshooting basics
NETWORKING Troubleshooting the network
Troubleshooting scenarios
Wireless network devices
Wireless networking standards
Wireless configuration
CERTIFICATION EXAM
OBJECTIVES MAP
SECURITY THREATS Comprehensive exam
AND MITIGATION objectives
Security threats
Threat mitigation
COMPTIA NETWORK+
ACRONYMS
SECURITY PRACTICES
Acronym list
Operating systems
Devices