INT 3203 - Computer Network I

(LTU-INT3203.AB1)
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Instructor-Led (Add-on)
Get A Free Trial

Skills You’ll Get

Get the support you need. Enroll in our Instructor-Led Course.

1

Introduction

  • Who Should Read This Course?
  • CompTIA Network+ Exam Topics
  • How This Course Is Organized
2

The OSI Model and Encapsulation

  • The Purpose of Reference Models
  • The OSI Model
  • The TCP/IP Stack
  • Real-World Case Study
  • Summary
  • Review All the Key Topics
  • Additional Resources
3

Network Topologies and Types

  • Defining a Network
  • Network Types and Characteristics
  • Networks Defined Based on Resource Location
  • Networks Defined by Topology
  • Virtual Network Concepts
  • Provider Links
  • Real-World Case Study
  • Summary
  • Review All the Key Topics
  • Additional Resources
4

Network Media Types

  • Copper and Fiber Media and Connectors
  • Unshielded Twisted Pair
  • Plenum Versus Nonplenum Cable
  • Multiplexing in Fiber-Optic Networks
  • Cable Management
  • Real-World Case Study
  • Summary
  • Review All the Key Topics
  • Additional Resources
5

IP Addressing

  • Binary Numbering
  • IPv4 Addressing
  • Assigning IPv4 Addresses
  • Subnetting
  • Address Translation
  • IP Version 6
  • Real-World Case Study
  • Summary
  • Review All the Key Topics
  • Additional Resources
6

Common Ports and Protocols

  • Ports and Protocols
  • IP Protocol Types
  • Summary
  • Review All the Key Topics
  • Additional Resources
7

Network Services

  • DHCP
  • DNS
  • NTP
  • Summary
  • Review All the Key Topics
  • Additional Resources
8

Corporate and Datacenter Architectures

  • The Three-Tiered Network Architecture
  • Software-Defined Networking
  • Storage Area Networks
  • Deciding on an Architecture
  • Summary
  • Review All the Key Topics
  • Additional Resources
9

Cloud Concepts

  • Deployment Models
  • Service Models
  • Key Cloud Concepts
  • Summary
  • Review All the Key Topics
  • Additional Resources
10

Various Network Devices

  • Networking Devices
  • Networked Devices
  • Summary
  • Review All the Key Topics
  • Additional Resources
11

Routing Technologies and Bandwidth Management

  • Routing
  • Sources of Routing Information
  • Routing Protocol Characteristics
  • Routing Protocol Examples
  • Bandwidth Management
  • Summary
  • Review All the Key Topics
  • Additional Resources
12

Ethernet Switching

  • Principles of Ethernet
  • Ethernet Switch Features
  • Summary
  • Review All the Key Topics
  • Additional Resources
13

Wireless Standards

  • Introducing Wireless LANs
  • Deploying Wireless LANs
  • Securing Wireless LANs
  • Summary
  • Review All the Key Topics
  • Additional Resources
14

Ensure Network Availability

  • Monitoring Tools
  • Additional Monitoring Topics
  • Summary
  • Review All the Key Topics
  • Additional Resources
15

Organizational Documents and Policies

  • Plans and Policies
  • Hardening and Security Policies
  • Common Documentation
  • Summary
  • Review All the Key Topics
  • Additional Resources
16

High Availability and Disaster Recovery

  • High Availability
  • Real-World Case Study: SOHO Network Design
  • Summary
  • Review All the Key Topics
  • Additional Resources
17

Common Security Concepts

  • Core Security Concepts
  • Authentication Methods
  • Risk Management and SIEM
  • Summary
  • Review All the Key Topics
  • Additional Resources
18

Common Types of Attacks

  • Technology-Based Attacks
  • Human and Environmental Attacks
  • Other Miscellaneous Attacks
  • Summary
  • Review All the Key Topics
  • Additional Resources
19

Network Hardening Techniques

  • Best Practices
  • Wireless Security and IoT Considerations
  • Summary
  • Review All the Key Topics
  • Additional Resources
20

Remote Access Methods

  • Virtual Private Networks (VPNs)
  • Other Remote Access Technologies
  • Authentication and Authorization Considerations
  • In-Band vs. Out-of-Band Management
  • Summary
  • Review All the Key Topics
  • Additional Resources
21

Physical Security

  • Detection Methods
  • Prevention Methods
  • Asset Disposal
  • Summary
  • Review All the Key Topics
  • Additional Resources
22

A Network Troubleshooting Methodology

  • Troubleshooting Basics
  • Summary
  • Review All the Key Topics
  • Additional Resource
23

Troubleshoot Common Cabling Problems

  • Specifications and Limitations
  • Cable Considerations and Applications
  • Common Issues
  • Common Tools
  • Summary
  • Review All the Key Topics
  • Additional Resources
24

Network Software Tools and Commands

  • Software Tools
  • Command Line Tools
  • Basic Network Platform Commands
  • Summary
  • Review All the Key Topics
  • Additional Resource
25

Troubleshoot Common Wireless Issues

  • Specifications and Limitations
  • Considerations
  • Common Issues
  • Wireless Network Troubleshooting
  • Summary
  • Review All the Key Topics
26

Troubleshoot General Network Issues

  • Considerations for General Network Troubleshooting
  • Common Issues
  • Summary
  • Review All the Key Topics
  • Additional Resources

1

The OSI Model and Encapsulation

  • Displaying the Structure of a UDP Segment
  • Displaying the Structure of a TCP Segment
2

Network Topologies and Types

  • Creating a Virtual Switch
3

IP Addressing

  • Configuring a Class A IP Address
  • Configuring a Class B IP Address
  • Configuring a Class C IP Address
  • Creating a Subinterface on a Router and Assigning an IP Address
  • Configuring Network Address Translation
  • Configuring Port Address Translation
4

Network Services

  • Preventing Zone Transfers
  • Configuring Multi-Stratum NTP
5

Various Network Devices

  • Performing a Proxy Server Operation
6

Routing Technologies and Bandwidth Management

  • Configuring Directly Connected Routes
  • Configuring Static Routing
7

Ethernet Switching

  • Creating a VLAN and Viewing its Assignment to Port Mapping
  • Configuring an Access Port
  • Configuring and Viewing a Trunk Port Status
  • Configuring IP and Management Access
8

Ensure Network Availability

  • Configuring Syslog and Viewing Settings on a Router
  • Viewing the Application, Security, and System Logs
  • Viewing Interface Statistics and Status
  • Configuring NetFlow
9

Organizational Documents and Policies

  • Configuring a Default Domain Password Policy
10

High Availability and Disaster Recovery

  • Configuring VRRP
11

Common Security Concepts

  • Examining Asymmetric Encryption
  • Performing Symmetric Encryption
  • Setting Up a Honeypot
12

Common Types of Attacks

  • Cracking a Password
  • Using SET
13

Network Hardening Techniques

  • Implementing Port Security
14

Remote Access Methods

  • Establishing a VPN Connection
15

Network Software Tools and Commands

  • Capturing a Packet Using Wireshark
  • Part I: Command Line Tools
  • Part II: Command Line Tools
  • Part III: Command Line Tools

Related Courses

All Courses
scroll to top