We've prepared
exclusive interview pointers and questions bank for our registered students. You can access the questions bank using your student id and password.
Currently, our question bank can be accessed via
HanuInnoTech Mobile App or On-line.
We've prepared
exclusive interview pointers and questions bank for our registered students. You can access the questions bank using your student id and password.
Currently, our question bank can be accessed via
HanuInnoTech Mobile App or On-line.
We've also published hard copy of question bank. Here is preview:
Week 1 (Getting Started)
Enterprise Software Overview
- Enterprise Software Technology Overview
- Client Server Architecture
- N-Tier to Cloud Models
Week 2 (Databases)
SQL Databases, Business Intelligence, Big Data Analytics
- NO SQL Databases, MongoDB, Indexed Databases, Cloud Databases
- Hadoop Databases, Map Reduce Processing
- Columnar Databases, Object Databases & Real- Time Processing, In Memory Databases
- Mobile Embedded Databases for iOS, Android, and Windows Phone
Week 3 (Client Server Transaction Transaction )
Client Server Transaction Transaction
- Message Queue & RPC Technologies
- Distributed Objects, The Web and Internet Technologies
- Java Objects, Distributed Systems management and Tools
- Service Oriented Architecture (SOA)
Week 4 (Security Framework Modeling)
Security Framework Modeling
- Authentication: Basic/Digest authentication (Base 64), MD5 Hash, checksum
- Confidentiality and Privacy: Symmetric or private-key, Asymmetric or public-key infrastructure (PKI), Digital signature, SSL
- Security Best Practices
- Java Sandbox Security Framework
- Mobile Devices Security Sandbox Models
<
Week 5 (Security Design Patterns)
Security Design Patterns
- Cloud Security & Mobile Security
- Java Crypto, Android Crypto, and iOS
- Malware detection - Web Frameworks
- Security Design Patterns
Week 6 (Mobile & Cloud Computing Common Threats)
Mobile & Cloud Computing Common Threats
Week 7 (Threat Modeling Tools)
Modeling Tools
- Data Flow Diagrams
- Asset Centric Modeing
- Attacker Centric Models
Week 8 (Attack Pattern Development)
Develop Attack Patterns for DOS, D-DOS, End Point Security