Privacy Policy

Effective date: August 24, 2018

Sgraph Infotech ("us", "we", or "our") operates the website (the "Service").

This page informs you of our policies regarding the collection, use, and disclosure of personal data when you use our Service and the choices you have associated with that data. This Privacy Policy for Sgraph Infotech is powered by

We use your data to provide and improve the Service. By using the Service, you agree to the collection and use of information in accordance with this policy. Unless otherwise defined in this Privacy Policy, terms used in this Privacy Policy have the same meanings as in our Terms and Conditions, accessible from

Information Collection And Use

We collect several different types of information for various purposes to provide and improve our Service to you.

Types of Data Collected

Personal Data

While using our Service, we may ask you to provide us with certain personally identifiable information that can be used to contact or identify you ("Personal Data"). Personally identifiable information may include, but is not limited to:

  • Email address
  • First name and last name
  • Phone number
  • Cookies and Usage Data

Usage Data

We may also collect information how the Service is accessed and used ("Usage Data"). This Usage Data may include information such as your computer's Internet Protocol address (e.g. IP address), browser type, browser version, the pages of our Service that you visit, the time and date of your visit, the time spent on those pages, unique device identifiers and other diagnostic data.

Tracking & Cookies Data

We use cookies and similar tracking technologies to track the activity on our Service and hold certain information.

Cookies are files with small amount of data which may include an anonymous unique identifier. Cookies are sent to your browser from a website and stored on your device. Tracking technologies also used are beacons, tags, and scripts to collect and track information and to improve and analyze our Service.

You can instruct your browser to refuse all cookies or to indicate when a cookie is being sent. However, if you do not accept cookies, you may not be able to use some portions of our Service.

Examples of Cookies we use:

  • Session Cookies. We use Session Cookies to operate our Service.
  • Preference Cookies. We use Preference Cookies to remember your preferences and various settings.
  • Security Cookies. We use Security Cookies for security purposes.

Use of Data

Sgraph Infotech uses the collected data for various purposes:

  • To provide and maintain the Service
  • To notify you about changes to our Service
  • To allow you to participate in interactive features of our Service when you choose to do so
  • To provide customer care and support
  • To provide analysis or valuable information so that we can improve the Service
  • To monitor the usage of the Service
  • To detect, prevent and address technical issues

Transfer Of Data

Your information, including Personal Data, may be transferred to — and maintained on — computers located outside of your state, province, country or other governmental jurisdiction where the data protection laws may differ than those from your jurisdiction.

If you are located outside India and choose to provide information to us, please note that we transfer the data, including Personal Data, to India and process it there.

Your consent to this Privacy Policy followed by your submission of such information represents your agreement to that transfer.

Sgraph Infotech will take all steps reasonably necessary to ensure that your data is treated securely and in accordance with this Privacy Policy and no transfer of your Personal Data will take place to an organization or a country unless there are adequate controls in place including the security of your data and other personal information.

Disclosure Of Data

Legal Requirements

Sgraph Infotech may disclose your Personal Data in the good faith belief that such action is necessary to:

  • To comply with a legal obligation
  • To protect and defend the rights or property of Sgraph Infotech
  • To prevent or investigate possible wrongdoing in connection with the Service
  • To protect the personal safety of users of the Service or the public
  • To protect against legal liability

Security Of Data

The security of your data is important to us, but remember that no method of transmission over the Internet, or method of electronic storage is 100% secure. While we strive to use commercially acceptable means to protect your Personal Data, we cannot guarantee its absolute security.

Service Providers

We may employ third party companies and individuals to facilitate our Service ("Service Providers"), to provide the Service on our behalf, to perform Service-related services or to assist us in analyzing how our Service is used.

These third parties have access to your Personal Data only to perform these tasks on our behalf and are obligated not to disclose or use it for any other purpose.


We may use third-party Service Providers to monitor and analyze the use of our Service.

  • Google Analytics

    Google Analytics is a web analytics service offered by Google that tracks and reports website traffic. Google uses the data collected to track and monitor the use of our Service. This data is shared with other Google services. Google may use the collected data to contextualize and personalize the ads of its own advertising network.

    You can opt-out of having made your activity on the Service available to Google Analytics by installing the Google Analytics opt-out browser add-on. The add-on prevents the Google Analytics JavaScript (ga.js, analytics.js, and dc.js) from sharing information with Google Analytics about visits activity.

    For more information on the privacy practices of Google, please visit the Google Privacy & Terms web page:

Links To Other Sites

Our Service may contain links to other sites that are not operated by us. If you click on a third party link, you will be directed to that third party's site. We strongly advise you to review the Privacy Policy of every site you visit.

We have no control over and assume no responsibility for the content, privacy policies or practices of any third party sites or services.

Children's Privacy

Our Service does not address anyone under the age of 18 ("Children").

We do not knowingly collect personally identifiable information from anyone under the age of 18. If you are a parent or guardian and you are aware that your Children has provided us with Personal Data, please contact us. If we become aware that we have collected Personal Data from children without verification of parental consent, we take steps to remove that information from our servers.

Changes To This Privacy Policy

We may update our Privacy Policy from time to time. We will notify you of any changes by posting the new Privacy Policy on this page.

We will let you know via email and/or a prominent notice on our Service, prior to the change becoming effective and update the "effective date" at the top of this Privacy Policy.

You are advised to review this Privacy Policy periodically for any changes. Changes to this Privacy Policy are effective when they are posted on this page.

Contact Us

If you have any questions about this Privacy Policy, please contact us:

  • By email: This email address is being protected from spambots. You need JavaScript enabled to view it.


  1. Introduction & History to AWS
    1. Navigate the AWS Management Console
    2. Recognize AWS Global Infrastructure
    3. Describe the security measures AWS provides
  1. AWS Storage & Content Delivery
    1. Identify key AWS storage options
    2. Describe Amazon EBS
    3. Create an Amazon S3 bucket and manage associated objects
  1. Compute Services & Networking
    1. Identify the different AWS compute and networking options
    2. Describe an Amazon Virtual Private Cloud (VPC)
    3. Create an Amazon EC2 instance
    4. Verify how to use Amazon EBS
  1. AWS Managed Services & Database
    1. Describe Amazon DynamoDB
    2. Verify key aspects of Amazon RDS
    3. Execute an Amazon RDS drive application
  1. Deployment and Management
    1. Identify AWS CloudFormation
    2. Describe Amazon CloudWatch metrics and alarms
    3. Describe Amazon Identity and Access Management (IAM)
    4. Leveraging Global Infrastructure
    5. Extending On-Premises into the Cloud
    6. Computing in the Cloud
    7. Designing Storage Subsystems
    8. Assignments
    9. Distributed Environments
    10. Choosing a Datastore
    11. Designing Web-Scale Media Hosting
    12. Event Driven Scaling
    13. Infrastructure as Code
    14. Assignments
    15. Orchestrating Batch Processing
    16. Reviewing Large Scale Design Patterns
    17. Designing for Cost
    18. Planning for High Availability and Disaster Recovery
    19. Assignments
    20. Demonstration of a complete Project
    21. Project/Assignments
    22. Doubts and Question/Answers session.


  1. Introduction
    1. Introduction
    2. Why python?
    3. Installing Python and versions
    4. Interactive mode, creating and running programs
    5. Blocks, Indentation, lines and commenting
  1. Input/Output and assigment
    1. Printing
    2. Input strings and numbers
    3. Varaible declaration and assignment
    4. Operators
    5. Expression and  Code evaluation
    6. Error messages 
  1. Flow Control Loops and decision making
    1. While loop
    2. For loop
    3. if, else, elseif
    4. exit, break
  1. Built in Data-Types
    1. Strings and characters
    2. Lists
    3. Tuples
    4. Dictionaries
    5. Files 
  1. Functions
    1. Function declaration
    2. Basic function
    3. Pass by value 
  1. Error Handling
    1. Except
    2. Try, Except and raise exceptions 
  1. Basic Classes and instances
    1. Defining a class, basic class
    2. Instance
    3. Class Data
    4. Properties
  1. Debugging
    1. Debugging

 Advanced Python


  1. Classes and Objects detailed
    1. Classes detailed
    2. Constructors
    3. Generators
    4. Iterators
    5. Decorators 
  1. Regular Expressions
    1. Defining regular expressions
    2. Compiling regular expressions
    3. Using regular expressions
    4. Match and find
    5. Examples 
  1. Networking, DB and CGI
    1. Networking, telnet and ssh
    2. Database connection
    3. Basic graphics 
  1. Parsing
    1. Special purpose parsers
    2. Writing a recursive descent parser by hand
    3. Parsing comma delimited lines
    4. Parsing functors
    5. Parsing names, phone numbers, etc
    6. XML parsing 
  1. Multithreading
    1. Multithreading and examples 
  1. Logging and debugging again
    1. Logging and debugging examples



  • Introduction to Apex 
  • Pupose of Apex

Apex Fundamentals

  • Collections
  • Loops

Visual Force

  • Introduction and Tools 
  • Purpose of Visualforce 
  • MVC Architecture


  • Variables and Formulas 
  • Standard Controllers and Standard List Controllers 
  • Custom Controllers and Controller Extensions 
  • Using static resources and custom components 
  • Styling VF pages 
  • Overriding buttons, links and tabs with VF 
  • Using JavaScript in VF Pages 
  • Advanced examples

Apex Scheduling

  • Triggers 
  • Invoking Apex 
  • Classes, Objects and Interfaces 
  • Testing Apex 
  • Dynamic Apex 
  • Batch Apex 
  • Debugging Apex 
  • Deploying Apex 
  • Developing Apex in managed packages

SObjects and the Database

  • What is an sObject 
  • SOQL and SOSL Queries


  • Migration with change sets

Basic HTML,

Basic CSS,

Basic Javascript/Jquery


  • Introduction to the Cloud Computing
  • Evolution of Cloud Computing
  • Comparisons with other computing techniques fetchers
  • Key characteristics of cloud computing
  • Advantages/Disadvantages
  • Classification of Cloud Computing
    • Based on as a service model
      • SAAS (Software as a service)
      • PAAS (Platform as a service)
      • IAAS (Infrastructure as a service
    • Based on deployment or access model
      • Public Cloud
      • Private Cloud
      • Hybrid Cloud

 Sales Force CRM Concepts

  • What is CRM?
  • How CRM can help?
  • Sales force CRM Navigation terminology
  • Compare CRM with other CRM products
  • Customization in sales force .com CRM
  • Introduction to sales force CRM Setup tool
    • Personal Setup
    • App Setup
    • Admin Setup

Extending Salesforce CRM

  • Learn about custom objects 
  • Learn about custom tabs 



  • Look up Relationship
  • Mater-detail Relationship
  • Many to Many Relationship


  • Create custom profiles & custom fields
  • Define dependent pick list
  • Customize lookup fields
  • Customize validation & formulas
  • Customize page layouts
  • Customize standard related lists
  • Use field-level security

Security & Access

  • Create & Manager Users
  • Set organization-wide defaults
  • Learn about record accessed
  • Create the role hierarchy
  • Learn about role transfer & mass Transfer functionality
  • Profiles, Login History


  • Define workflow
  • Set up workflow rules
  • Set up workflow tasks & alerts

Workflow Approvals

  • Plan approvals using workflow
  • Use the approval wizard – standard vs. jump start
  • Create workflow approvals


  • Create custom reports 
  • Create standard reports
  • Use advanced filters 
  • Use conditional highlighting 
  • Use custom summary formulas 
  • Use dashboards

Data Utilities

  • Importing overview
  • Learn about import solutions & Custom Object records using the data loader
  • User mass delete
  • Initiate weekly export
  • Use storage

Red Hat Enterprise Linux 7-RHCE Syllabus

RH124 Red Hat System Administration I

Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux. This course will actively engage students in task focused activities, lab-based knowledge checks, and facilitative discussions to ensure maximum skill transfer and retention. In addition GUIbased Environment will be featured to build on the student's existing technical knowledge, while command line concepts will be introduced to provide a foundation for students planning to become full time Linux system administrator.

Course Outline

Unit 1: Accessing the Command Line

Recognize the BASH shell based on the default prompt.

Use Linux efficiently by switching between virtual consoles.

Display usage messages and be able to interpret a command's syntax.


Unit 2: Managing Files from the Command Line

Recognize and Find Familiarity in a File-system Tree,

Learn Terms Like “root” Directory and Subdirectory.

Introduction to Different types of Data in Separate System Directories.


Unit 3: Getting Help in Red Hat Enterprise Linux

Learn “man” Terminology, Including Topics and Sections.

Become Aware of The importance of less-noticed man sections.


Unit 4: Creating, Viewing and Editing Text Files

Control Output to Files.

Use Pipe to Control Output to Other Programs.

Unit 5: Manage Local Linux Users and Groups

Explain the Role of Users and Groups on a Linux System and How They are understood by the Computer.

Unit 6: Controlling Access to Files with Linux File-system Permissions

Explain How the Linux File Permissions Model Works.

Unit 7: Monitoring and Managing Linux Processes

Learn the Processes Lifecycle, in Order to better Comprehend Process States.

Unit 8: Controlling Services and Daemons

List System Daemons and Network Services Started by System services and Socket units.

Unit 9: Configuring And Securing Open-ssh Service

Log into a Remote System Using ssh to Run Commands From a Shell Prompt.

Unit 10: Analyzing and Storing Logs Describe the Basic “syslog” Architecture in RHEL7

Unit 11: Managing RHEL Networking Explain Fundamental Concepts of Computer Networking.

Unit 12: Archiving and Copying Files between Systems To Create Backups and Transfer Files Over The Network..

Unit 13: Installing and Updating Software Packages

Register System With Your Red Hat Account and Entitle Them to Software Updates for Installed Products.

Unit 14: Accessing Linux File-systems

Determine which Directories in the File-system Hierarchy are Stored on Which Storage Devices.

Unit 15: Using Virtualized Systems

Recognize the Consistent Use of KVM Architecture Throughout of Red Hat Product Line.

Unit 16: Accessing the Command Line


RH 134 Red Hat System Administration II

Red Hat System Administration II (RH134) is designed for IT Professionals working to full time Linux Administrators, the course is a follow ups to rh124(SA1). This course will actively engage students in task focused activities, lab-based knowledge checks, and facilitative discussions to ensure maximum skill transfer and retention. Students who attend System Administration I and System Administration II will be fully prepared to take the Red Hat Certified System Administration (RHCSA)Exam.

Course Outline

Unit 1: Automating Installation with Kickstart

Explain Kickstart Concepts and Architecture

Install and configure Linux using Kickstart

Unit 2: Using Regular Expressions with “grep”

Create a Regular Expressions that match desired data.

Unit 3: Creating and Editing Text files with vim Explain the three main modes of “vim”.

Unit 4: Scheduling Future Linux Tasks Scheduling tasks using at and cron.

Unit 5: Managing Priority of Linux Processes Explain about Linux Processes and nice values.

Unit 6: Controlling Access to Files with Access Control Lists (ACL) Describe ACL's and file system mount options..

Unit 7: Managing SELinux Security

Explain the Basics of Se-Linux permissions and Context Transitions.

Display Current Se-Linux Modes.

Correctly Interpret the Se-Linux Context of a File.

Identify Current Se-Linux Boolean Settings.

Unit 8: Connecting to Network-Defined Users and Groups

User authentication using centralized Identity Management Services.

Unit 9: Adding Disks, Partitions, and File Systems to a Linux System

Create and Delete disk Partitions on disks with an MBR Partitioning Scheme Using “fdisk”.

Create and Delete disk Partitions on disks with an GPT Partitioning Scheme Using “gdisk”.

Format Devices Using “mkfs” Mount File System into the Directory Tree

Unit 10: Managing Logical Volume Management (LVM) Storage

How to manage high performance LVM storage.

Unit 11: Accessing Network Attached Storage with Network File System (NFS)

Access , Mount and unmount NFS Shares .

Unit 12: Accessing Network Storage with SMB

How to mount and unmount smb file-system using the command line.

Unit 13: Controlling and Troubleshooting the Red Hat Enterprise Linux Boot Process

Describe and Influence the RHEL Boot Process..

Unit 14: Limiting Network Communication with Firewalled

Configure the Basic Firewall Using “firewalld”, “firewalld-config”and “firewalld-cmd”.

Unit 15: Comprehensive Review

Comprehensive Review of System Administration 2


RH254 Red Hat System Administration III

Red Hat System Administration III (RH254) is designed for experienced Linux administrators who require automation techniques using Bash Scripting and deployment of network services includes DNS , , APACHE HTTPD, MARIADB, POSTFIX. MAIL SERVER, NFS ,SAMBA , ISCSI STORAGE, FIREWALLD etc.

Course Outline

Unit 1: Controlling Services and Daemons ·

Control System Daemons and Services Using System ctl.

Unit 2: Managing IPV6 Networking ·

Configure and troubleshoot IPv6 address on Red Hat Enterprise Linux systems

Unit 3: Configuring Link Aggregation and Bridging ·

Configure and Troubleshoot Network Bonding and Teaming on RHEL

Unit 4: Network Port Security · Implement a Secure Network Using Firewall

Unit 5: Managing DNS for Servers ·

A Brief Study about DNS Records and how to Configure a Secure Caching DNS.

Unit 6: Configuring Email Transmission ·

Configure RHEL Server to Transmit all E-mail through an Unauthenticated SMTP Gateway.

Unit 7: Providing Remote Block Storage ·

How to Access Remote Storage Space Using ISCSI.

Unit 8: Providing File Based Storage ·

Export File System to Client Systems Using NFS and Providing Security.

Unit 9: Configuring MariaDB Databases ·

Install and Configure Mariadb Database.

Unit 10: Providing Apache HTTPD Web Service ·

Configure a Secure Apache HTTPD Web-service..

Unit 11: Writing Bash Scripts ·

Write simple shell scripts using Bash.

Unit 12: Bash Conditionals and Control Structures ·

Bash Conditionals and Other Control Structure.

Unit 13: Configuring the Shell Environment ·

Use Bash Startup Scripts to Define Environment Variables, Aliases and Functions.

Unit 14: Linux Containers and Docker .

Details about Linux Containers and Dockers.

Unit 15: Comprehensive Review ·

Comprehensive Review of System Administration 3

Sgraph Infotech
MSBI | DOT NET | AWS | Data Science | Python
Address :
3rd Floor, JP Royale- 90/4, Above ICICI Bank, Outer Ring Road, Opposite Radisson Blu, Marathahalli,
Karnataka - 560037
Tel : 9620885025
Email :


Best Android Training in Marathahalli Bangalore

Best .Net Training in Bangalore

Best Oracle SQL Training Institutes in Bangalore

Best PLSQL Training Centers in Bangalore

Best Big Data and Hadoop Training Courses in Bangalore

Best MSBI Training Institutes in Bangalore

Best Microsoft Power BI Training Bangalore

Best Oracle DBA Training at Bangalore


© 2016 | All rights reserved |Developed By Nexevo Technologies | Sitemap