ASM Educational Center (ASM) Est. 1992

Similar documents
MIS NETWORK ADMINISTRATOR PROGRAM

Microsoft. CompTIA Network+ Rapid Review. (Exam N10-005) Craig Zacker

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

Study Guide CompTIA A+ Certification, Domain 2 Networking

CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01

#888 Network Fundamentals

CompTIA Network+ (Exam N10-005)

Networking Technology Online Course Outline

Local Area Networks (LANs) Blueprint (May 2012 Release)

COMPUTER NETWORK TECHNOLOGY (40)

SSVVP SIP School VVoIP Professional Certification

SSVP SIP School VoIP Professional Certification

Test Code: 8148 / Version 1

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

Networking 4 Voice and Video over IP (VVoIP)

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

Networking Devices. Lesson 6

Network System Design Lesson Objectives

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

COMPUTER NETWORK TECHNOLOGY (300)

IT Networking and Security

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Chapter 1 Personal Computer Hardware hours

Multi-Homing Security Gateway

City of Dublin Education & Training Board. Programme Module for. Front Line Technical Support Skills. Leading to. Level 6 FETAC 6N2056

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts

Domain 3.0 Networking... 1

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Lesson Plans Network+

Network Technology CMP-354-TE. TECEP Test Description

Post-Class Quiz: Telecommunication & Network Security Domain

TestOut Network Pro English 4.0.x LESSON PLAN

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Network Security Administrator

Chapter 5. Data Communication And Internet Technology

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Advanced Higher Computing. Computer Networks. Homework Sheets

Chapter 4 Customizing Your Network Settings

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

CCT vs. CCENT Skill Set Comparison

Chapter 1 Network Security

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

Introduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie )

Chapter 4 Connecting to the Internet through an ISP

Firewall VPN Router. Quick Installation Guide M73-APO09-380

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

Microsoft MTA Exam

RuggedCom Solutions for

Securing Cisco Network Devices (SND)

Lesson Plans Managing a Windows 2003 Network Infrastructure

How To Pass A Credit Course At Florida State College At Jacksonville

Linux Network Security

IT Networking and Security

Protecting the Home Network (Firewall)

"Charting the Course...

Security Technology: Firewalls and VPNs

ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server

VPN. Date: 4/15/2004 By: Heena Patel

Gigabit SSL VPN Security Router

NETWORK SECURITY (W/LAB) Course Syllabus

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Chapter 4 Customizing Your Network Settings

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

Computer System Networking and Telecommunications CIP Task Grid

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Networking: EC Council Network Security Administrator NSA

CompTIA Network+ (N10-004) Cert Guide. Mike Harwood. Pearson. 800 East 96th Street. Indiana USA. Indianapolis,

Gigabit Content Security Router

How To Learn Cisco Cisco Ios And Cisco Vlan

CIS 175 NETWORK TECHNICIAN JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS

Cisco CCNP Implementing Secure Converged Wide Area Networks (ISCW)

SOHO 6 Wireless Installation Procedure Windows 95/98/ME with Internet Explorer 5.x & 6.0

IINS Implementing Cisco Network Security 3.0 (IINS)

Chapter 15: Advanced Networks

IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

Exam: Cisco Title: Interconnecting Cisco Networking Devices Part 1 Version: Demo. Actualtests.com - The Power of Knowing

ZyWALL 5. Internet Security Appliance. Quick Start Guide Version 3.62 (XD.0) May 2004

Chapter 12 Supporting Network Address Translation (NAT)

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM

ECB1220R. Wireless SOHO Router/Client Bridge

1. Which of the OSI model layers is also referred to as Transport layer? A. Layer 7 B. Layer 2 C. Layer 5 D. Layer 4

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

Recommended IP Telephony Architecture

Fundamentals of Network Security - Theory and Practice-

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

Multi-Homing Dual WAN Firewall Router

Prestige 324. Prestige 324. Intelligent Broadband Sharing Gateway. Version 3.60 January 2003 Quick Start Guide

Cisco RV220W Network Security Firewall

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Cisco RV082 Dual WAN VPN Router Cisco Small Business Routers

ETA - RESI (Computer Networking) NCEE COMPETENCIES PROJECT

Transcription:

CompTIA Network+ Certification Course Outline Objective 1.1 - The OSI and TCP/IP Models The OSI and TCP/IP Models OSI Layer 7 OSI Layer 6 OSI Layer 5 OSI Layer 4 OSI Layer 3 OSI Layer 2 OSI Layer 1 LAN Compared with the OSI Model TCP/IP Architecture Demo - OSI Review Objective 1.1 Review Objective 1.2 - Applications, Devices, Protocols Applications, Devices, Protocols Classifying Network Components Objective 1.2 Review Objective 1.3 - IP Addressing IP Addressing MAC Address IPv4 Classful IPv4 Addresses Subnet Masks Network IDs Special Addresses CIDR CIDR Address APIPA IPv6 IPv6 Address Types IPv6 Address Scopes Demo - Convert Binary IPv4 Subnet Masks IPv4 Custom Subnets IPv6 Subnets IPv6 Custom Subnets Default Gateway Routing Example IPCONFIG and IFCONFIG Demo - Examining IP Settings Objective 1.3 Review Objective 1.4 - Routing and Switching Routing and Switching Internetworking Devices Ethernet Hub Repeaters Repeater Placement Wireless Repeater Repeater Operation Limitations of Repeaters Bridges Bridge Operation Bridge Types Bridge Routing Management Bridge Filtering and Intelligence Local and Remote Bridges Layer 2 Switch Configurations for Switched Networks Switched Network with Bottlenecks Switched Network without Bottlenecks Benefits of Switches Higher-level Switches Managed Layer 3 Switch Virtual LAN VLAN Filtering VLAN Trunking Trunking Example Demo - Intro to Routing and Switching VLANs Routers Router Operation About Routers Router Features Key Points Types of Routers Routing Table Contents Routing Metrics Routing Examples Brouters Bridges vs. Routers Objective 1.4 Review Objective 1.5 - TCP and UDP Ports TCP and UDP Ports Transport-layer Protocols Port Addresses Service Port Numbers Demo - Port Numbers Demo - netstat Objective 1.5 Review Objective 1.6 - Protocols Protocols Network Communication Protocols TCP TCP Three-way Handshake Internet Protocol (IP) UDP Protocols Page 1 of 5

Demo - Examining Ports and Protocols Objective 1.6 Review Objective 1.7 - The Domain Name System The Domain Name System DNS Top-level Domains DNS Namespace DNS Records Demo - Examining DNS Objective 1.7 Review Objective 1.8 - Troubleshooting Methodology Troubleshooting Methodology Troubleshooting Hardware Toolkit Additional Tools Software Toolkit Objective 1.8 Review Objective 1.9 - Virtual Networks Virtual Networks Virtual Computers Virtualization Concerns and Risks Demo - Viewing VM Components Cloud Computing Cloud Deployment Cloud Categories Risks and Concerns Objective 1.9 Review Objective 2.1 - Installing and Configuring Routers and Switches Installing and Configuring Routers and Switches Installing Routers and Switches Demo - Routing NAT Objective 2.1 Review Objective 2.2 - Installing and Configuring Wireless Networks Installing and Configuring Wireless Networks The 802.11 Standard The 802.11 Family 802.11 Networking Configuration Options Configuring Wireless Clients RADIUS Demo - Setting Up Wi-Fi Objective 2.2 Review Objective 2.3 - DHCP DHCP Static IP Addressing DHCP and DHCPv6 IPv4 Lease Process IPv6 Lease Process IPv6 Router Flags M and O Flags Demo - DHCP Objective 2.3 Review Objective 2.4 - Troubleshooting Wireless Networks Troubleshooting Wireless Networks Troubleshooting Connections Common Problems Objective 2.4 Review Objective 2.5 - Troubleshooting Router and Switch Problems Troubleshooting Router and Switch Problems Common Problems Demo - Troubleshooting a Switch Demo - Troubleshooting a Router Objective 2.5 Review Objective 2.6 - Planning and Implementing a SOHO Network Planning and Implementing a SOHO Network Purposes of a Plan Creating a Plan Ongoing Planning Implementing a Plan Network Cable Objective 2.6 Review Objective 3.1 - Standard Media Types Standard Media Types Fiber Optic Cable Twisted-pair Cable Common UTP Categories Additional TP Categories Stranded vs. Solid Straight-through, Cross-over, Rollover Pin Numbering of RJ-45 Connector T1 Crossover Cable Coaxial Cable RG Standards Plenums Media Converters Single-mode Fiber to UTP Broadband Over Power Line Access BPL BPL Modem Objective 3.1 Review Objective 3.2 - Standard Connector Types Standard Connector Types Fiber Optic Connectors Fiber Optic Connector Types Twisted-pair Connectors Pin Numbering of RJ-45 Connector Thinnet Connectors Terminating Coax with BNC RG-6 and RG-59 Connectors Serial Connectors Serial Cable Serial Console Connections Serial Cable Types Serial Data Rates Typical UTP Installation Telecommunications Room Termination Choices Punchdown Block Wire Placement Objective 3.2 Review Objective 3.3 - Wireless Standards Objective 3.3 - Wireless Standards Wireless Standards The 802.1x Standard The 802.11 Standard Access Point Major Wireless Protocols Device Compatibility Channels Channel Bonding MIMO Objective 3.3 Review Objective 3.4 - WAN Technologies Page 2 of 5

WAN Technologies Wide Area Networks Packet vs. Circuit Switching Demo - Packet Switching WAN Connections POTS/PSTN ISDN DSL Cable Satellite Wireless WiMAX Cellular T and E Lines X.25 and Frame Relay ATM SONET and SDH DWDM PON Objective 3.4 Review Objective 3.5 - Network Topologies Network Topologies Local Area Networks Network Topologies Logical Network Topologies Peer-to-peer Model Decentralized Peer-to-peer Authentication Client/Server Model A Client/Server LAN Client/Server Authentication Star Topology Bus Topology Ring Topology Mesh Topology Hybrid Topology Point-to-point vs. Point-to-multipoint MPLS Label Edge Routers Demo - Topology Objective 3.5 Review Objective 3.6 - Troubleshooting Physical Connectivity Troubleshooting Physical Connectivity Troubleshooting Wired Connections Cable Testing Devices Physical Cable Tests Objective 3.6 Review Objective 3.7 - LAN Technologies LAN Technologies Ethernet Ethernet Media 10-Gigabit Ethernet Standards Gigabit Ethernet Standards Fast Ethernet Standards 10BASE-T Ethernet Bonding Data Transmission Data Collisions Channel Access Methods Demo - LAN Cable Types Objective 3.7 Review Objective 3.8 - Wiring Distribution Components Wiring Distribution Components Network Access Points Demo - Packet Tracing Internet Service Providers (ISPs) Small ISPs Regional ISP LAN Installation Components Cross-connects MDF to IDF Connections Standards Workstation Drops Typical UTP Installation Telecommunications Room Objective 3.8 Review Objective 4.1 - Network Appliances Network Appliances Networking Appliances Demo - The Purpose of Network Devices Objective 4.1 Review Objective 4.2 - Network Hardware Tools Network Hardware Tools Cable Testing Device Physical Cable Tests Network Function Tests Cable Certifier Additional Features Testing a Basic Permanent Link Crimpers Coax Crimper Twisted-pair Cable Crimper Using a Fiber Optic Cable Crimper Terminating Fiber Optic Cable Butt Set Butt Set Uses Modapt Device Toner Probe Using a Toner Probe Punchdown Tools Using a Punchdown Tool Network Analyzer Loopback Plugs TDR OTDR Multimeters Measuring Resistance Measuring Voltage Measuring Current Measuring Continuity Environmental Monitor ASHRAE 9.9 Guidelines Objective 4.2 Review Objective 4.3 - Network Software Tools Network Software Tools Network Analyzer TCP/IP Utilities IPConfig Ifconfig Ping (Packet Internet Groper) Ping Troubleshooting NSLookup and Tracert Demo - Software Tools Objective 4.3 Review Objective 4.4 - Monitoring Network Traffic Page 3 of 5

Monitoring Network Traffic Performance Monitor Performance Objects Bottlenecks Demo - Performance and Monitoring Configuration Event Viewer Event Information Event Types Device and Application Logging Syslog Syslog Alert Levels SNMP Network Monitor Demo - Network Monitoring Objective 4.4 Review Objective 4.5 - Management Documentation Management Documentation Change Management Configuration Documentation Objective 4.5 Review Objective 4.6 - Optimizing Network Performance Optimizing Network Performance Rationales Methods Objective 4.6 Review Objective 5.1 - Implementing Wireless Security Implementing Wireless Security Wireless Security Transmission Encryption Demo - Wireless Security Objective 5.1 Review Objective 5.2 - Network Access Security Methods Network Access Security Methods Network Access Control Access Control Lists VPN Technologies VPN Security Models VPN Protocols PPTP vs. L2TP IPSec Protocols IPSec Encryption PPPoE Remote Desktop Services SSH Demo - Network Security Objective 5.2 Review Objective 5.3 - User Authentication User Authentication AAA Authentication Factors One-factor Authentication Two-factor Authentication Three-factor Authentication Single Sign-on Kerberos Kerberos System Components Kerberos Data Types Kerberos Authentication Process CHAP EAP PPPoE Mutual Authentication Cryptography ROT13 Cipher Keys Symmetric Encryption in Action Public Key Cryptography Asymmetric Encryption in Action Demo - Encryption Public Key Cryptography Public Key Infrastructure Setup and Initialization Phase RADIUS RADIUS Authentication TACACS+ TACACS+ vs. RADIUS 802.1x Objective 5.3 Review Objective 5.4 - Network Security Threats Topic A: Attacks and Threats #NAME? Wireless Security Threats Vulnerabilities of Access Points Wi-Fi Scanners War Chalking Symbols Denial-of-Service Attacks Distributed DoS Attacks DDoS Countermeasures Man-in-the-Middle Attacks Buffer Overflow FTP Bounce Attacks Smurf Attacks Malware Social Engineering Attack Types Social Engineering Countermeasures Topic B: Mitigation Antivirus Software Securing the Operating System Windows Update Updates Patch Management Security Policies Acceptable Use Due Care Privacy Separation of Duties Need to Know Password Management Account Expiration Service-level Agreement Disposal and Destruction Human Resources Policies Incident Response Policy Preparation Detection Containment Eradication Recovery Follow-up Education Communication User Awareness Demo - Vulnerability Objective 5.4 Review Objective 5.5 - Installing and Configuring a Firewall Installing and Configuring a Firewall Firewalls and Proxies Page 4 of 5

Firewall Categories Security Zones Intranet Zone Perimeter Network DMZ Options Screened Host Bastion Host Three-homed Firewall Back-to-back Firewalls Dead Zone Traffic Filtering NAT and PAT Port Address Translation Firewall Administration Rule Planning Demo - Firewall Rules Port Security Objective 5.5 Review Objective 5.6 - Network Security Appliances and Methods Network Security Appliances and Methods Assessment Types Vulnerability Assessments Vulnerability Testing Tools Demo - Scanning Intrusion Detection Events NIDS IDScenter for Snort Example Snort Rule HIDS Advantages of HIDS over NIDS Honeypots and Honeynets Honeypot Examples Honeypot Deployment Objective 5.6 Review Course Closure Page 5 of 5