Post has attachment
SAP, Oracle Apps, Hadoop, Salesforce, Informatica, SAS, SW Testing, JAVA, .NET
Training in Pune @9028499699

Training + Live Project+ Experience= 100% JOB

Mob : 9028499699 E-mail id : erp.pune@yahoo.com
Web: www.erptrainingacademy.com
Training : 45 Days Live Project: 2 Months
ERP Consulting:
2nd Floor, Above Trisha Food Corner, Opposite DY Patil Girls Hostel,
Near D.Y. Patil College of Engg., Pimpri, Pune 411018.

Live Project

GOOD OPPORTUNITY FOR FRESHERS
Good Opportunity for all Fresher’s to get an exposure on Live project
Any Fresher Candidates will have only Subject Knowledge, but they will not have real time Exposure….. By Doing this Candidate will get Live Project Exposure and will be able to show Exposure equivalent to real time Software Developer, which companies are expecting from Fresh Candidates, that will help them to get job Easily…………………
After Completion of Live Project We Provide Experience Certificates to file your gap in Resume/Career.
Courses that we provide
SAP R/3
Technical modules

• ABAP ,Advanced ABAP ( Cross Applications)
• Workflow,ABAP WebDynpro, ABAP- HR
• BASIS, Basis Security
Functional Modules
• Material Management
• Production Planning
• Sales & Distribution
• Human Resources
• Plant Maintenance
• Project System
• Finance/Controlling
• Quality Management
• Warehouse Management

Advanced Modules
• Exchange Infrastructure (XI)
• Enterprise Portal (EP)
• Business Information Warehouse (BIW)
• Business Objects (BO)
• Customer Relation Management (CRM )
• Supply Chain Management (SCM)
• Advanced Planning & Optimization (APO)
• Product Life Cycle Management (PLM)
• Supply Resource Management (SRM)
• Master Data Management (MDM)
• Solution Manager
• SAP IS Utilities
• SAP Retail
• SAP HANA
• SAP Business One (B1)
Oracle Apps
• Oracle Apps Developer Track
• Oracle Apps DBA Track
• Human Resources
• Finance
• Business Information Warehouse (BIW)
• Customer Relation Management (CRM )
• Supply Chain Management (SCM)
Software Courses

• JAVA & J2EE
• .NET
• Software Testing
• Android
• Oracle PL/SQL
• Oracle Forms & Reports
• Oracle DBA
• Informatica
• SAS
• BigData/Hadoop
• Salesforce

After Completion of Live Project We Provide Experience Certificates to file your gap in Resume/Career. We Provide following Documents.
• Resume Making
• Offer Letter, Appointment Letter
• Experience Letter, Reliving Letter
• Increment & Promotion Letter
• Company Website & E-mail id
• Company Identity Card
• Telephonic & Physical Verification
• Project Manager, HR( Name ,Phone No)
• HR (Name, E-mail, Phone No)
• Client Business Flow & Blue Print
• Bank Statement
• Form 16( Excluding Tax)
Photo

Post has attachment

Post has shared content
A perfect mix of our HANA class room training and practical lab experiments will make you an expert in the HANA world.Our #SAPHANAAdministrationtraining covers the complete cycle of administration of SAP HANA solutions.
Contact:-
Vtech Soft Solutions
Call:- 9704017167, 9542934555
Mail:- info@vtechsoft.in
http://www.vtechsoft.in/sap-hana-admin-training-in-hyderabad.html 
A perfect mix of our HANA class room training and practical lab experiments will make you an expert in the HANA world.Our #SAPHANAAdministrationtraining covers the complete cycle of administration of SAP HANA solutions.
Contact:-
Vtech Soft Solutions
Call:- 9704017167, 9542934555
Mail:- info@vtechsoft.in
http://www.vtechsoft.in/sap-hana-admin-training-in-hyderabad.html
Photo

Post has attachment

Exam Name
Oracle #Real Application #Clusters 11g Release 2 and #Grid Infrastructure #Administration
Exam #Code- 1Z0-058
http://bit.ly/1O66YNT

HI guys ..! I have important #question #answers or updated dumps with valid solutions for all #Oracle certs, send me your email id if anyone need.

Post has attachment
Linux Ethical hacker
Restriction of physical access  to the Linux systems
Linux is a robust OS, but it is still vulnerable to hardware dangers that may lead to damage on its physical drives or power losses that may cause data corruption
 
Therefore, in addition to access controls, server rooms should include the following items to ensure integrity and availability and provide protections from power outages, power anomalies,
floods, and so on:
• Adequate air conditioning for all servers at peak utilization
• Sufficient power, UPSs, and PDUs
• Raised flooring
 
servers environment, having at least the following access controls to protect security:
 
• Keycard access to server room allowing only authorized personnel
• Real-time cameras and video recording equipment to guard all servers and archive activity
• Locking server rack for highly sensitive servers
 
unauthorized physical access is still best hindered by
• Maintaining least privilege physical access controls by locking vital areas and providing unique keys only to specific personnel who need access
• Performing background checks, both criminal and financial, prior to granting physical access
• Designing the route used to access systems such that it passes more than one employee, especially employees with access privileges to the respective systems
• Mixing physical locks with more high-tech ones, so hacking the access control system does not grant access to places that also require a key
 
Stealing/Changing Data Using a Bootable Linux CD
Once an attacker has gained physical access, getting into a box can be as simple as booting to a CD-based Linux distribution, deleting the root user account password in the /etc/shadow file
 
Disabling Bootable Linux CDs
There are three standard electronic physical access controls:
• BIOS passwords
• Disabling boot from removable media
• Password-protected hard drives (easy to implement for workstations, but for servers requires hardware-level remote administration ability, such as IP KVM
 
Preventing the BIOS Password  Tricks
disabling the ability to boot from any form of removable(CDs, DVDs,
floppy drives, and USB devices ) media is advisable and will keep out many of the lower-level, script-kiddies attackers. But  like BIOS passwords, if attackers obtain physical access to the box, they can easily circumvent this security measure.
 
Platter Locks and Tricks
some computer manufacturers have introduced password protected
hard drives (or platter locks), particularly for use in laptops. The password is   stored in the chip set on the drive and is accessed or modified by the drive CMOS. This technology requires users to enter a password before the hard drive can be activated. During a cold or warm boot, this occurs just after the POST (at the time the hard drive is  accessed), and it arrests the machine at that state until the password has been entered.
 
Whole Disk or Partition Encryption
The best way to protect against data tampering or unintended disclosure is to implement one of the many whole disk or partition encryption methodologies available to Linux systems. This entails encrypting the entire contents of the hard drive, or partition, using a crystallographic encryption algorithm.
 
 
For more details please visit http://www.raju-online.com
 
Photo

Post has attachment


Oracle DBAGlobal Attract
DBA Guru's look no further, if you eat, breath and dream Oracle walk this way
$90000.00 - $110000.00 p.a.
Auckland

For more details please visit my site
http://www.raju-online.com
Wait while more posts are being loaded