Ramadan 2015 Updates

Insha’Allah, First Day of Ramadan will be on
Thursday, June 18, 2015

Eid ul Fitr will be on Friday, July 17, 2015

Please click, for Ramadan Programming Schedule at the McLean Islamic Center

Please click, for Ramadan 2015 Recitation Schedule at the McLean Islamic Center

Coming Courses

Please click, for details about SQL Fundamentals Course from July 25, register soon for discounted price

Coming Events

Tarawih @ MIC
Jul 7 @ 10:20 pm – 11:30 pm
Cisco CCNA 200-120, “Real lab experience with real Hardware” @ MIC
Jul 8 @ 6:00 pm – 9:00 pm


Cisco CCNA prepares for first level of cisco networking certification towards cisco CCIE which is highest level of Networking certification in the field of Routing and Switching. This course will prepare students with real hands on experience with the actual hardware used in most of small to mid sized organizations. This course will also prepare a candidate to be more confident in networking technologies and will make one implement easily in real time environment.


Start Date: May-06-2015
Frequency: Every Wednesday
Timing: 6:00 P.M.
Duration: 36 Hours
Prepares for Certification Path: Cisco CCNA, CCNP and CCIE
Fee: $399, Early bird tuition fee: $350
Location: 1340-Old Chain Bridge road McLean, VA 22101
Important: Max 35 students, qualified students First Come First Server
Reference Book: Cisco CCNA Routing and Switching 200-120 Official Cert Guide Library By Wendell Odom

Register and Pay

Details of the Course Topics

1.0 Operation of IP Data Networks
1.1 Recognize the purpose and functions of various network devices such as routers, switches, bridges and hubs
1.2 Select the components required to meet a given network specification
1.3 Identify common applications and their impact on the network
1.4 Describe the purpose and basic operation of the protocols in the OSI and TCP/IP models
1.5 Predict the data flow between two hosts across a network
1.6 Identify the appropriate media, cables, ports, and connectors to connect Cisco network devices to other network devices and hosts in a LAN

2.0 LAN Switching Technologies
2.1 Determine the technology and media access control method for Ethernet networks
2.2 Identify basic switching concepts and the operation of Cisco switches
2.2.a Collision Domains
2.2.b Broadcast Domains
2.2.c Ways to switch
2.2.c (i) Store
2.2.c (ii) Forward
2.2.c (iii) Cut through
2.2.d CAM Table
2.3 Configure and verify initial switch configuration including remote access management
2.3.a hostname
2.3.b mgmt ip address
2.3.c ip default-gateway
2.3.d local user and password
2.3.e enable secret password
2.3.f console and VTY logins
2.3.g exec-timeout
2.3.h service password encryption
2.3.i copy run start
2.4 Verify network status and switch operation using basic utilities such as
2.4.a ping
2.4.b telnet
2.4.c SSH
2.5 Describe how VLANs create logically separate networks and the need for routing between them
2.5.a Explain network segmentation and basic traffic management concepts
2.6 Configure and verify VLANs
2.7 Configure and verify trunking on Cisco switches
2.7.a dtp (topic)
2.7.b auto-negotiation
2.8 Identify enhanced switching technologies
2.8.a RSTP
2.8.b PVSTP
2.8.c Etherchannels
2.9 Configure and verify PVSTP operation
2.9.a Describe root bridge election
2.9.b Spanning tree mode

3.0 IP Addressing (IPv4/IPv6)
3.1 Describe the operation and necessity of using private and public IP addresses for IPv4 addressing
3.2 Identify the appropriate IPv6 addressing scheme to satisfy addressing requirements in a LAN/WAN environment
3.3 Identify the appropriate IPv4 addressing scheme using VLSM and summarization to satisfy addressing requirements in a LAN/WAN environment
3.4 Describe the technological requirements for running IPv6 in conjunction with IPv4
3.4.a dual stack
3.5 Describe IPv6 addresses
3.5.a global unicast
3.5.b multicast
3.5.c link local
3.5.d unique local
3.5.e eui 64
3.5.f auto-configuration

4.0 IP Routing Technologies
4.1 Describe basic routing concepts
4.1.a packet forwarding
4.1.b router lookup process
4.1.c Process Switching/Fast Switching/CEF
4.2 Configure and verify utilizing the CLI to set basic Router configuration
4.2.a hostname
4.2.b local user and password
4.2.c enable secret password
4.2.d console & VTY logins
4.2.e exec-timeout
4.2.f service password encryption
4.2.g interface IP Address
4.2.g (i) loopback
4.2.h banner
4.2.i motd
4.2.j copy run start
4.3 Configure and verify operation status of a device interface
4.3.a Serial
4.3.b Ethernet
4.4 Verify router configuration and network connectivity using
4.4.a ping
4.4.a (i) extended
4.4.b traceroute
4.4.c telnet
4.4.d SSH
4.4.e sh cdp neighbors
4.5 Configure and verify routing configuration for a static or default route given specific routing requirements
4.6 Differentiate methods of routing and routing protocols
4.6.a Static vs. dynamic
4.6.b Link state vs. distance vector
4.6.c next hop
4.6.d ip routing table
4.6.e Passive Interfaces (how they work)
4.6.f Admin distance
4.6.g split horizon
4.6.h metric
4.7 Configure and verify OSPF
4.7.a Benefit of single area
4.7.b Configure OSPv2
4.7.c Configure OSPv3
4.7.d Router ID
4.7.e Passive Interface
4.7.f Discuss multi-area OSPF
4.7.g Understand LSA types and purpose
4.8 Configure and verify interVLAN routing (Router on a stick)
4.8.a sub interfaces
4.8.b upstream routing
4.8.c encapsulation
4.9 Configure SVI interfaces
4.10 Manage Cisco IOS Files
4.10.a Boot Preferences
4.10.b Cisco IOS Images (15)
4.10.c Licensing
4.10.c (i) Show license
4.10.c (ii) Change license
4.11 Configure and verify EIGRP (single AS)
4.11.a Feasible Distance/Feasible Successors/Administrative distance
4.11.b Feasibility condition
4.11.c Metric composition
4.11.d Router ID
4.11.e Auto summary
4.11.f Path Selection
4.11.g Load Balancing
4.11.g (i) Unequal
4.11.g (ii) Equal

5.0 IP Services
5.1 Configure and verify DHCP (IOS Router)
5.1.a Configuring router interfaces to use DHCP
5.1.b DHCP options (Basic overview and functionality)
5.1.c Excluded addresses
5.1.d Lease time
5.2 Describe the types, features, and applications of ACLs
5.2.a standard (editing and sequence numbers)
5.2.b extended
5.2.c named
5.2.d numbered
5.2.e Log option
5.3 Configure and verify ACLs in a network environment
5.3.a named
5.3.b numbered
5.3.c Log option
5.4 Identify the basic operation of NAT
5.4.a purpose
5.4.b pool
5.4.c static
5.4.d 1 to 1
5.4.e overloading
5.4.f source addressing
5.4.g one way NAT
5.5 Configure and verify NAT for given network requirements
5.6 Configure and verify NTP as a client
5.7 Recognize High availability (FHRP)
5.7.a VRRP
5.7.b HSRP
5.7.c GLBP
5.8 Configure and verify syslog
5.8.a Utilize syslog output
5.9 Describe SNMP v2 and v3.

6.0 Network Device Security
6.1 Configure and verify network device security features
6.1.a Device password security
6.1.b Enable secret vs. enable
6.1.c Transport
6.1.c.1 disable telnet
6.1.c.2 SSH
6.1.d VTYs
6.1.e physical security
6.1.f service password
6.1.g Describe external authentication methods
6.2 Configure and verify Switch Port Security
6.2.a Sticky MAC
6.2.b MAC address limitation
6.2.c static/dynamic
6.2.d violation modes
6.2.d (i) err disable
6.2.d (ii) shutdown
6.2.d (iii) protect restrict
6.2.e Shutdown unused ports
6.2.f err disable recovery
6.2.g Assign unused ports in unused VLANs
6.2.h Putting Native VLAN to other than VLAN 1
6.3 Configure and verify ACLs to filter network traffic
6.4 Configure and verify ACLs to limit telnet and SSH access to the router

7.0 Troubleshooting
7.1 Troubleshoot and correct common problems associated with IP addressing and host configurations
7.2 Troubleshoot and resolve VLAN problems
7.2.a Identify that VLANs are configured
7.2.b Verify port membership correct
7.2.c Correct IP address configured
7.3 Troubleshoot and resolve trunking problems on Cisco switches
7.3.a Verify correct trunk states
7.3.b Verify correct encapsulation configured
7.3.c Correct VLANs allowed
7.4 Troubleshoot and resolve ACL issues
7.4.a Verify statistics
7.4.b Verify permitted networks
7.4.c Verify direction
7.4.c (i) Interface
7.5 Troubleshoot and resolve Layer 1 problems
7.5.a Framing
7.5.b CRC
7.5.c Runts
7.5.d Giants
7.5.e Dropped packets
7.5.f Late collisions
7.5.g Input/output errors
7.6 Identify and correct common network problems
7.7 Troubleshoot and resolve spanning tree operation issues
7.7.a Verify root switch
7.7.b Verify priority
7.7.c Verify mode is correct
7.7.d Verify port states
7.8 Troubleshoot and resolve routing issues
7.8.a Verify routing is enabled (sh ip protocols)
7.8.b Verify routing table is correct
7.8.c Verify correct path selection
7.9 Troubleshoot and resolve OSPF problems
7.9.a Verify neighbor adjacencies
7.9.b Verify hello and dead timers
7.9.c Verify OSPF area
7.9.d Verify interface MTU
7.9.e Verify network types
7.9.f Verify neighbor states
7.9.g Review OSPF topology table
7.10 Troubleshoot and resolve EIGRP problems
7.10.a Verify neighbor adjacencies
7.10.b Verify AS number
7.10.c Verify load balancing
7.10.d Split horizon
7.11 Troubleshoot and resolve interVLAN routing problems
7.11.a Verify connectivity
7.11.b Verify encapsulation
7.11.c Verify subnet
7.11.d Verify native VLAN
7.11.e Port mode trunk status
7.12 Troubleshoot and resolve WAN implementation issues
7.12.a Serial interfaces
7.12.b Frame relay
7.12.c PPP
7.13 Monitor NetFlow statistics
7.14 TS EtherChannel problems

8.0 WAN Technologies
8.1 Identify different WAN Technologies
8.1.a Metro ethernet
8.1.b VSAT
8.1.c Cellular 3g/4g
8.1.d MPLS
8.1.e T1/E1
8.1.f ISDN
8.1.g DSL
8.1.h Frame relay
8.1.i Cable
8.1.j VPN
8.2 Configure and verify a basic WAN serial connection
8.3 Configure and verify a PPP connection between Cisco routers
8.4 Configure and verify frame relay on Cisco routers
8.5 Implement and troubleshoot PPPoE

Tarawih @ MIC
Jul 8 @ 10:20 pm – 11:30 pm
Tarawih @ MIC
Jul 9 @ 10:20 pm – 11:30 pm
Sister’s Ring @ MIC
Jul 10 @ 6:00 pm – 7:00 pm

Sisters Ring is a social circle for girls ages 5-12. Lead by Sister Uzma, a counselor and mother, the group aims to bring Muslim girls together to discuss social issues in light of Islamic teachings. In addition to a discussion, the girls also participate in group games, and arts & crafts

Parents must fill out registration form for their children to participate.

Every other Friday, starting 5/22


Tarawih @ MIC
Jul 10 @ 10:20 pm – 11:30 pm
Tarawih @ MIC
Jul 11 @ 10:20 pm – 11:30 pm
Program with PL/SQL @ MIC
Jul 12 @ 12:00 pm – 8:00 pm


This course starts with an introduction to PL/SQL and proceeds to list the benefits of this powerful programming language. Participants are made aware of how to create PL/SQL blocks of application code that can be shared by multiple forms, reports, and data management applications. In addition, creation of anonymous PL/SQL blocks as well as stored procedures and functions are covered in this course.

Participants enhance their developer skills by learning to develop, execute, and manage PLSQL stored program units such as procedures, functions, packages, and database triggers. Understanding the basic functionality of how to debug functions and procedures using the SQL Developer Debugger gives way to refined lines of code. Participants also learn to manage PL/SQL subprograms, triggers, declaring identifiers, and trapping exceptions. The utilization of some of the Oracle-supplied packages is also in the course. Additionally participants learn to use Dynamic SQL, understand design considerations when coding using PL/SQL, understand and influence the PL/SQL compiler, and manage dependencies.


Required Prerequisites:
– Oracle Database: SQL
– Laptop with Oracle 10g/11g Express and SQL Developer installed
Course Fee: $399
Duration: 40 Hours
Location: 1340-Old Chain Bridge road McLean, VA 22101
Prepares for Certification Path: Oracle PL/SQL Developer Certified Associate (OCA), 1Z0-147, Program with PL/SQL.
Time: 12:00 PM to 8:00 PM Every Sunday From Jun-07-2015, for 5 weeks
Reference Book: OCP Developer PL/SQL Program Units Exam Guide(http://www.amazon.com/Developer-Program-Units-Exam-Guide/dp/0072193360)

Register and Pay

Course Content

Overview of PL/SQL Programs
– Describe a PL/SQL program construct
– List the components of a PL/SQL block
– List the benefits of subprograms
– Describe how a stored procedure/function is invoked

Creating Procedures
– Define what a stored procedure is
– List the development steps for creating a procedure
– Create a procedure
– Describe the difference between formal and actual parameters
– List the types of parameter modes
– List the methods for calling a procedure with parameters
– Describe the DEFAULT option for parameters
– Create a procedure with parameters
– Invoke a procedure that has parameters
– Define a subprogram in the declarative section of a procedure
– Describe how exceptions are propagated
– Remove a procedure

Creating Functions
– Define what a stored function is
– Create a function
– List how a function can be invoked
– List the advantages of user-defined functions in SQL statements
– List where user-defined functions can be called from within an SQL statement
– Describe the restrictions on calling functions from SQL statements
– Remove a function
– Describe the differences between procedures and functions

Managing Subprograms
– Contrast system privileges with object privileges
– Grant privileges
– Contrast invokers rights with definers rights
– Identify views in the data dictionary to manage stored objects

Creating Packages
– Use DESCRIBE command to describe packages and list their possible components
– Identify a package specification and body
– Create packages: Create related variables , cursors, constants, exceptions, procedures, and functions
– Designate a package construct as either public or private
– Invoke a package construct
– Use a bodiless package
– Drop Packages
– Identify benefits of Packages

More Package Concepts
– Write packages that use the overloading feature
– Use Forward Referencing
– Describe errors with mutually referential subprograms
– Initialize variables with a one-time-only procedure
– Identify persistent states in package variables and cursors
– Identify restrictions on using Packaged functions in SQL statements
– Invoke packaged functions from SQL
– Use PL/SQL tables and records in Packages

Oracle Supplied Packages
– Describe the benefits of Execute Immediate over DBMS_SQL for Native Dynamic SQL
– Identify the flow of execution
– Describe the use and application of some Oracle server-supplied packages: DBMS_SQL, DBMS_OUTPUT, UTL_FILE

Manipulating Large Objects
– Compare and contrast LONG and large object (LOB) data types
– Describe LOB datatypes and how they are used
– Differentiate between internal and external LOBs
– Identify and Manage Bfiles
– Migrate from LONG To LOB
– Use the DBMS_LOB PL/SQL package
– Create LOB columns and populate them
– Perform SQL operations on LOBS: Update LOBs with SQL, Select from LOBS, Delete LOBS
– Describe the use of temporary LOBs

Creating Database Triggers
– Describe the different types of triggers
– Describe database triggers and their uses
– List guidelines for designing triggers
– Create a DML trigger
– List the DML trigger components
– Describe the trigger firing sequence options
– Use conditional predicate

Family Halaqa with Dr. Yahya Alavi @ MIC
Jul 12 @ 5:45 pm – 6:45 pm

Dr. Yahya Alvi covers the meanings of the Qur’an in a family friendly manner to help us gain a deeper understanding of the Qur’an and apply it in our daily life. A one hour lecture is followed by Q and A.

Every Sunday, following Asr

Tarawih @ MIC
Jul 12 @ 10:20 pm – 11:30 pm


© 2015 Mclean Islamic Center. © McLean Islamic Center, 2014. All rights reserved.