MIS NETWORK ADMINISTRATOR PROGRAM



Similar documents
ASM Educational Center (ASM) Est. 1992

Microsoft. CompTIA Network+ Rapid Review. (Exam N10-005) Craig Zacker

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

Study Guide CompTIA A+ Certification, Domain 2 Networking

CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01

CompTIA Network+ (Exam N10-005)

#888 Network Fundamentals

Networking Technology Online Course Outline

Local Area Networks (LANs) Blueprint (May 2012 Release)

COMPUTER NETWORK TECHNOLOGY (40)

SSVVP SIP School VVoIP Professional Certification

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

SSVP SIP School VoIP Professional Certification

Test Code: 8148 / Version 1

Networking 4 Voice and Video over IP (VVoIP)

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

Network System Design Lesson Objectives

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time

Networking Devices. Lesson 6

IT Networking and Security

COMPUTER NETWORK TECHNOLOGY (300)

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Chapter 1 Personal Computer Hardware hours

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

City of Dublin Education & Training Board. Programme Module for. Front Line Technical Support Skills. Leading to. Level 6 FETAC 6N2056

Domain 3.0 Networking... 1

Multi-Homing Security Gateway

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Network Technology CMP-354-TE. TECEP Test Description

Network Security Administrator

TestOut Network Pro English 4.0.x LESSON PLAN

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

Lesson Plans Network+

Advanced Higher Computing. Computer Networks. Homework Sheets

Post-Class Quiz: Telecommunication & Network Security Domain

Lesson Plans Managing a Windows 2003 Network Infrastructure

Introduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie )

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

NETWORK SECURITY (W/LAB) Course Syllabus

CCT vs. CCENT Skill Set Comparison

Chapter 5. Data Communication And Internet Technology

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Linux Network Security

Chapter 4 Customizing Your Network Settings

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

"Charting the Course...

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

RuggedCom Solutions for

IT Networking and Security

Securing Cisco Network Devices (SND)

Microsoft MTA Exam

Chapter 1 Network Security

How To Learn Cisco Cisco Ios And Cisco Vlan

Chapter 4 Connecting to the Internet through an ISP

Firewall VPN Router. Quick Installation Guide M73-APO09-380

How To Pass A Credit Course At Florida State College At Jacksonville

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

CIS 175 NETWORK TECHNICIAN JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS

Convergence Technologies Professional (CTP) Course 1: Data Networking

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IINS Implementing Cisco Network Security 3.0 (IINS)

Protecting the Home Network (Firewall)

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server

VPN. Date: 4/15/2004 By: Heena Patel

Gigabit SSL VPN Security Router

Security Technology: Firewalls and VPNs

Microsoft MTA Qualifications. CompTIA Qualifications. Course Title: SUPPORT SPECIALIST (ITSS) Includes Work Experience of 16 weeks with IT company

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Chapter 4 Customizing Your Network Settings

Networking: EC Council Network Security Administrator NSA

Cisco CCNP Implementing Secure Converged Wide Area Networks (ISCW)

Medical Networks and Operating Systems

Computer System Networking and Telecommunications CIP Task Grid

Chapter 15: Advanced Networks

IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION

CompTIA Network+ (N10-004) Cert Guide. Mike Harwood. Pearson. 800 East 96th Street. Indiana USA. Indianapolis,

Network Technologies

INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1)

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

ZyWALL 5. Internet Security Appliance. Quick Start Guide Version 3.62 (XD.0) May 2004

Understanding Windows Server 2003 Networking p. 1 The OSI Model p. 2 Protocol Stacks p. 4 Communication between Stacks p. 13 Microsoft's Network

Exam: Cisco Title: Interconnecting Cisco Networking Devices Part 1 Version: Demo. Actualtests.com - The Power of Knowing

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM

Lab Organizing CCENT Objectives by OSI Layer

Chapter 12 Supporting Network Address Translation (NAT)

Gigabit Content Security Router

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

Fundamentals of Network Security - Theory and Practice-

Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

Prestige 324. Prestige 324. Intelligent Broadband Sharing Gateway. Version 3.60 January 2003 Quick Start Guide

Transcription:

Network + Networking NH5200 Fundamentals COURSE TITLE: Network+ Networking Fundamentals 104 Total Hours COURSE OVERVIEW: After completing this course, students will be able to perform tasks such as: Installation Configuration Diagnosing Preventative maintenance Basic networking COURSE OBJECTIVES: CompTIA Network+ validates the ability to select, connect, configure and troubleshoot basic network hardware, including wireless technology. Employees, customers, and potential clients depend on their network. Employing those CompTIA Network+ certified help keep this vital part of business up and running. This course is intended for entry-level computer support professionals with basic knowledge of computer hardware, software, and operating systems, who wish to increase their knowledge and understanding of networking concepts and skills to prepare for a career in network support or administration, or to prepare for the CompTIA Network+ N10-005 certification. INSTRUCTIONAL STRATEGIES: This course combines theory instruction with lab application. Instructional strategies include theory, demonstration, discussion, practical application, simulation and presentations. COURSE OUTLINE: Objective 1.1 - The OSI and TCP/IP Models OSI Layer 7 OSI Layer 6 OSI Layer 5 OSI Layer 4 OSI Layer 3 OSI Layer 2 OSI Layer 1 LAN Compared with the OSI Model TCP/IP Architecture Demo - OSI Review Objective 1.1 Review Lab: Compare TCP/IP to other protocols Objective 1.2 - Applications, Devices, Protocols Classifying Network Components Objective 1.2 Review Objective 1.3 - IP Addressing

MAC Address IPv4 Classful IPv4 Addresses Subnet Masks Network IDs Special Addresses CIDR CIDR Address APIPA IPv6 IPv6 Address Types IPv6 Address Scopes Demo - Convert Binary IPv4 Subnet Masks IPv4 Custom Subnets IPv6 Subnets IPv6 Custom Subnets Default Gateway Routing Example IPCONFIG and IFCONFIG Demo - Examining IP Settings Objective 1.3 Review Objective 1.4 - Routing and Switching Internetworking Devices Ethernet Hub Repeaters Repeater Placement Wireless Repeater Repeater Operation Limitations of Repeaters Bridges Bridge Operation Bridge Types Bridge Routing Management Bridge Filtering and Intelligence Local and Remote Bridges Layer 2 Switch Configurations for Switched Networks Switched Network with Bottlenecks Switched Network without Bottlenecks Benefits of Switches Higher-level Switches Managed Layer 3 Switch Virtual LAN VLAN Filtering VLAN Trunking Trunking Example

Demo - Intro to Routing and Switching VLANs Routers Router Operation About Routers Router Features Key Points Types of Routers Routing Table Contents Routing Metrics Routing Examples Brouters Bridges vs. Routers Objective 1.4 Review Lab: Examine Router and Switch Functions Objective 1.5 - TCP and UDP Ports Transport-layer Protocols Port Addresses Service Port Numbers Demo - Port Numbers Demo - netstat Objective 1.5 Review Objective 1.6 - Protocols Network Communication Protocols TCP TCP Three-way Handshake Internet Protocol (IP) UDP Protocols Demo - Examining Ports and Protocols Objective 1.6 Review Objective 1.7 - The Domain Name System DNS Top-level Domains DNS Namespace DNS Records Demo - Examining DNS Objective 1.7 Review Objective 1.8 - Troubleshooting Methodology Troubleshooting Hardware Toolkit Additional Tools

Software Toolkit Objective 1.8 Review Objective 1.9 - Virtual Networks Virtual Computers Virtualization Concerns and Risks Demo - Viewing VM Components Cloud Computing Cloud Deployment Cloud Categories Risks and Concerns Objective 1.9 Review Objective 2.1 - Installing and Configuring Routers and Switches Installing Routers and Switches Demo - Routing NAT Objective 2.1 Review Lab: Troubleshoot Network Connectivity Lab: Create a Virtual Network Lab: Connectivity Methods Objective 2.2 - Installing and Configuring Wireless Networks The 802.11 Standard The 802.11 Family 802.11 Networking Configuration Options Configuring Wireless Clients RADIUS Demo - Setting Up Wi-Fi Objective 2.2 Review Objective 2.3 DHCP Static IP Addressing DHCP and DHCPv6 IPv4 Lease Process IPv6 Lease Process IPv6 Router Flags M and O Flags Demo - DHCP Objective 2.3 Review. Objective 2.4 - Troubleshooting Wireless Networks Troubleshooting Connections Common Problems

Objective 2.4 Review Objective 2.5 - Troubleshooting Router and Switch Problems Common Problems Demo - Troubleshooting a Switch Demo - Troubleshooting a Router Objective 2.5 Review Objective 2.6 - Planning and Implementing a SOHO Network Purposes of a Plan Creating a Plan Ongoing Planning Implementing a Plan Network Cable Objective 2.6 Review Objective 3.1 - Standard Media Types Fiber Optic Cable Twisted-pair Cable Common UTP Categories Additional TP Categories Stranded vs. Solid Straight-through, Cross-over, Rollover Pin Numbering of RJ-45 Connector T1 Crossover Cable Coaxial Cable RG Standards Plenums Media Converters Single-mode Fiber to UTP Broadband Over Power Line Access BPL BPL Modem Objective 3.1 Review Objective 3.2 - Standard Connector Types Fiber Optic Connectors Fiber Optic Connector Types Twisted-pair Connectors Pin Numbering of RJ-45 Connector Thinnet Connectors Terminating Coax with BNC RG-6 and RG-59 Connectors Serial Connectors Serial Cable Serial Console Connections Serial Cable Types Serial Data Rates

Typical UTP Installation Telecommunications Room Termination Choices Punchdown Block Wire Placement Objective 3.2 Review Objective 3.3 - Wireless Standards The 802.1x Standard The 802.11 Standard Access Point Major Wireless Protocols Device Compatibility Channels Channel Bonding MIMO Objective 3.3 Review Objective 3.4 - WAN Technologies Wide Area Networks Packet vs. Circuit Switching Demo - Packet Switching WAN Connections POTS/PSTN ISDN DSL Cable Satellite Wireless WiMAX Cellular T and E Lines X.25 and Frame Relay ATM SONET and SDH DWDM PON Objective 3.4 Review Objective 3.5 - Network Topologies Local Area Networks Network Topologies Logical Network Topologies Peer-to-peer Model Decentralized Peer-to-peer Authentication Client/Server Model A Client/Server LAN

Client/Server Authentication Star Topology Bus Topology Ring Topology Mesh Topology Hybrid Topology Point-to-point vs. Point-to-multipoint MPLS Label Edge Routers Demo - Topology Objective 3.5 Review Objective 3.6 - Troubleshooting Physical Connectivity Troubleshooting Wired Connections Cable Testing Devices Physical Cable Tests Objective 3.6 Review Objective 3.7 - LAN Technologies Ethernet Ethernet Media 10-Gigabit Ethernet Standards Gigabit Ethernet Standards Fast Ethernet Standards 10BASE-T Ethernet Bonding Data Transmission Data Collisions Channel Access Methods Demo - LAN Cable Types Objective 3.7 Review Objective 3.8 - Wiring Distribution Components Network Access Points Demo - Packet Tracing Internet Service Providers (ISPs) Small ISPs Regional ISP LAN Installation Components Cross-connects MDF to IDF Connections Standards Workstation Drops Typical UTP Installation Telecommunications Room Objective 3.8 Review Objective 4.1 - Network Appliances Networking Appliances

Demo - The Purpose of Network Devices Objective 4.1 Review Objective 4.2 - Network Hardware Tools Cable Testing Device Physical Cable Tests Network Function Tests Cable Certifier Additional Features Testing a Basic Permanent Link Crimpers Coax Crimper Twisted-pair Cable Crimper Using a Fiber Optic Cable Crimper Terminating Fiber Optic Cable Butt Set Butt Set Uses Modapt Device Toner Probe Using a Toner Probe Punchdown Tools Using a Punchdown Tool Network Analyzer Loopback Plugs TDR OTDR Multimeters Measuring Resistance Measuring Voltage Measuring Current Measuring Continuity Environmental Monitor ASHRAE 9.9 Guidelines Objective 4.2 Review Lab: Create and Test Network Cable Objective 4.3 - Network Software Tools Network Analyzer TCP/IP Utilities IPConfig Ifconfig Ping (Packet Internet Groper) Ping Troubleshooting NSLookup and Tracert Demo - Software Tools Objective 4.3 Review Lab: TCP/IP Connectivity & Command Line Troubleshooting Objective 4.4 - Monitoring Network Traffic

Performance Monitor Performance Objects Bottlenecks Demo - Performance and Monitoring Configuration Event Viewer Event Information Event Types Device and Application Logging Syslog Syslog Alert Levels SNMP Network Monitor Demo - Network Monitoring Objective 4.4 Review Lab: Capturing Network Traffic by Using Network Monitor Lab: Performance Monitor Objective 4.5 - Management Documentation Change Management Configuration Documentation Objective 4.5 Review Objective 4.6 - Optimizing Network Performance Rationales Methods Objective 4.6 Review Objective 5.1 - Implementing Wireless Security Wireless Security Transmission Encryption Demo - Wireless Security Objective 5.1 Review Lab: Configuring a Wireless Access Point Objective 5.2 - Network Access Security Methods Network Access Control Access Control Lists VPN Technologies VPN Security Models VPN Protocols PPTP vs. L2TP IPSec Protocols IPSec Encryption PPPoE Remote Desktop Services SSH Demo - Network Security Objective 5.2 Review

Lab: Viewing the Event Logs Objective 5.3 - User Authentication AAA Authentication Factors One-factor Authentication Two-factor Authentication Three-factor Authentication Single Sign-on Kerberos Kerberos System Components Kerberos Data Types Kerberos Authentication Process CHAP EAP PPPoE Mutual Authentication Cryptography ROT13 Cipher Keys Symmetric Encryption in Action Public Key Cryptography Asymmetric Encryption in Action Demo - Encryption Public Key Cryptography Public Key Infrastructure Setup and Initialization Phase RADIUS RADIUS Authentication TACACS+ TACACS+ vs. RADIUS 802.1x Objective 5.3 Review Objective 5.4 - Network Security Threats Topic A: Attacks and Threats Wireless Security Threats Vulnerabilities of Access Points Wi-Fi Scanners War Chalking Symbols Denial-of-Service Attacks Distributed DoS Attacks DDoS Countermeasures Man-in-the-Middle Attacks Buffer Overflow FTP Bounce Attacks Smurf Attacks Malware

Social Engineering Attack Types Social Engineering Countermeasures Topic B: Mitigation Antivirus Software Securing the Operating System Windows Update Updates Patch Management Security Policies Acceptable Use Due Care Privacy Separation of Duties Need to Know Password Management Account Expiration Service-level Agreement Disposal and Destruction Human Resources Policies Incident Response Policy Preparation Detection Containment Eradication Recovery Follow-up Education Communication User Awareness Demo - Vulnerability Objective 5.4 Review Objective 5.5 - Installing and Configuring a Firewall Firewalls and Proxies Firewall Categories Security Zones Intranet Zone Perimeter Network DMZ Options Screened Host Bastion Host Three-homed Firewall Back-to-back Firewalls Dead Zone Traffic Filtering NAT and PAT Port Address Translation

Firewall Administration Rule Planning Demo - Firewall Rules Port Security Objective 5.5 Review Lab: Configuring Firewall Rules Objective 5.6 - Network Security Appliances and Methods Assessment Types Vulnerability Assessments Vulnerability Testing Tools Demo - Scanning Intrusion Detection Events NIDS IDScenter for Snort Example Snort Rule HIDS Advantages of HIDS over NIDS Honeypots and Honeynets Honeypot Examples Honeypot Deployment Objective 5.6 Review Course Closure Lab: Create a Network Lab: Join a Domain Lab: Updating the Operating System *Session Course Outlines may change as needed, and shall be determined by the instructor. Content shall not change, and if so, students shall be given prior notice. However, the course breakout in sessions per week may vary, but all contact hours shall be met within the term, and within the class schedule parameters.