Certification Review

(ANC-INT1151.AB2)
Lessons
Lab
TestPrep
Get A Free Trial

Skills You’ll Get

1

OSI Model, Encapsulation, and Network Topologies

  • The Purpose of Reference Models
  • The OSI Model
  • The TCP/IP Stack
  • Real-World Case Study
  • Defining a Network
  • Network Types and Characteristics
  • Networks Defined Based on Resource Location
  • Networks Defined by Topology
  • Virtual Network Concepts
  • Provider Links
  • Real-World Case Study I
2

Network Media Types and IP Addressing

  • Copper and Fiber Media and Connectors
  • Unshielded Twisted Pair
  • Plenum Versus Nonplenum Cable
  • Multiplexing in Fiber-Optic Networks
  • Cable Management
  • Real-World Case Study
  • Binary Numbering
  • IPv4 Addressing
  • Assigning IPv4 Addresses
  • Subnetting
  • Address Translation
  • IP Version 6
  • Real-World Case Study I
3

Common Ports and Protocols, and Network Services

  • Ports and Protocols
  • IP Protocol Types
  • DHCP
  • DNS
  • NTP
4

Data Center Architectures and Cloud Concepts

  • The Three-Tiered Network Architecture
  • Software-Defined Networking
  • Storage Area Networks
  • Deciding on an Architecture
  • Deployment Models
  • Service Models
  • Key Cloud Concepts
5

Various Network Devices, Routing Technologies and Bandwidth Management

  • Networking Devices
  • Networked Devices
  • Routing
  • Sources of Routing Information
  • Routing Protocol Characteristics
  • Routing Protocol Examples
  • Bandwidth Management
6

Ethernet Switching, Wireless Standard, and Troubleshooting Common Wireless Issues

  • Principles of Ethernet
  • Ethernet Switch Features
  • Introducing Wireless LANs
  • Deploying Wireless LANs
  • Securing Wireless LANs
  • Specifications and Limitations
  • Considerations
  • Common Issues
  • Wireless Network Troubleshooting
7

Ensure Network Availability, Organizational Docu...licies, High Availability, and Disaster Recovery

  • Monitoring Tools
  • Additional Monitoring Topics
  • Plans and Policies
  • Hardening and Security Policies
  • Common Documentation
  • High Availability
  • Real-World Case Study: SOHO Network Design
8

Security Concepts, Types of Attacks, and Network Hardening Techniques

  • Core Security Concepts
  • Authentication Methods
  • Risk Management and SIEM
  • Technology-Based Attacks
  • Human and Environmental Attacks
  • Other Miscellaneous Attacks
  • Best Practices
  • Wireless Security and IoT Considerations
9

Remote Access Methods, Physical Security, and Troubleshoot General Networks Issues

  • Virtual Private Networks (VPNs)
  • Other Remote Access Technologies
  • Authentication and Authorization Considerations
  • In-Band vs. Out-of-Band Management
  • Detection Methods
  • Prevention Methods
  • Asset Disposal
  • Considerations for General Network Troubleshooting
  • Common Issues
10

Troubleshooting Methodology, Common Cable Problems, Network Software Tools and Commands

  • Troubleshooting Basics
  • Specifications and Limitations
  • Cable Considerations and Applications
  • Common Issues
  • Common Tools
  • Software Tools
  • Command Line Tools
  • Basic Network Platform Commands

1

OSI Model, Encapsulation, and Network Topologies

  • Displaying the Structure of a UDP Segment
  • Displaying the Structure of a TCP Segment
  • Creating a Virtual Switch
2

Network Media Types and IP Addressing

  • Configuring a Class A IP Address
  • Configuring a Class B IP Address
  • Configuring a Class C IP Address
  • Creating a Subinterface on a Router and Assigning an IP Address
  • Configuring Network Address Translation
  • Configuring Port Address Translation
3

Common Ports and Protocols, and Network Services

  • Preventing Zone Transfers
  • Configuring Multi-Stratum NTP
4

Various Network Devices, Routing Technologies and Bandwidth Management

  • Performing a Proxy Server Operation
  • Configuring Directly Connected Routes
  • Configuring Static Routing
5

Ethernet Switching, Wireless Standard, and Troubleshooting Common Wireless Issues

  • Creating a VLAN and Viewing its Assignment to Port Mapping
  • Configuring an Access Port
  • Configuring and Viewing a Trunk Port Status
  • Configuring IP and Management Access
6

Ensure Network Availability, Organizational Docu...licies, High Availability, and Disaster Recovery

  • Configuring Syslog and Viewing Settings on a Router
  • Viewing the Application, Security, and System Logs
  • Viewing Interface Statistics and Status
  • Configuring NetFlow
  • Configuring a Default Domain Password Policy
  • Configuring VRRP
7

Security Concepts, Types of Attacks, and Network Hardening Techniques

  • Examining Asymmetric Encryption
  • Performing Symmetric Encryption
  • Setting Up a Honeypot
  • Cracking a Password
  • Using SET
  • Implementing Port Security
8

Remote Access Methods, Physical Security, and Troubleshoot General Networks Issues

  • Establishing a VPN Connection
9

Troubleshooting Methodology, Common Cable Problems, Network Software Tools and Commands

  • Capturing a Packet Using Wireshark
  • Part I: Command Line Tools
  • Part II: Command Line Tools
  • Part III: Command Line Tools

Related Courses

All Courses
scroll to top