CSC-320ᅠNetwork Fundamentals

(TUI-CSC-320.AE1) / ISBN : 978-1-64459-787-3
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Introduction to Networks and The Open System Interconnection (OSI) Reference Model

  • What Is the Network+ Certification?
  • Why Become Network+ Certified?
  • How to Become Network+ Certified
  • Tips for Taking the Network+ Exam
  • Who Should Read This Course?
  • How to Use This Course
  • N10-009 Exam Objectives
  • First Things First: What's a Network?
  • Physical Network Topologies
  • Topology Selection, Backbones, and Segments
  • Challenge Activity
  • Internetworking Models
  • Introduction to Encapsulation
  • Modulation Techniques
  • Challenge Activity
  • Physical Media
  • Cable Properties
  • Wiring Standards
  • Installing Wiring Distributions
  • Challenge Activity
  • Network Basics
  • Ethernet Basics
  • Ethernet at the Data Link Layer
  • Ethernet at the Physical Layer
  • Ethernet over Other Standards (IEEE 1905.1-2013)
  • Challenge Activity
  • Common Network Connectivity Devices
  • Other Specialized Devices
  • Networked Devices
  • Planning and Implementing a Basic SOHO Network Using Network Segmentation
  • Challenge Activity
2

IP Addressing and IP Subnetting

  • Introducing TCP/IP
  • Data Encapsulation
  • Challenge Activity
  • IP Terminology
  • The Hierarchical IP Addressing Scheme
  • IPv4 Address Types
  • Internet Protocol Version 6 (IPv6)
  • Challenge Activity
  • Subnetting Basics
  • Troubleshooting IP Addressing
  • Introduction to Network Address Translation (NAT)
  • Challenge Activity
  • Routing Basics
  • The IP Routing Process
  • Testing Your IP Routing Understanding
  • Static and Dynamic Routing
  • Challenge Activity
  • Routing Protocol Basics
  • Distance-Vector Routing Protocols
  • Link-State Routing Protocols
  • High Available Routes
  • Advanced IPv6 Concepts
  • IPv6 Routing Protocols
  • Challenge Activity
3

Switching and Virtual LANs

  • Networking Before Layer 2 Switching
  • Switching Services
  • Spanning Tree Protocol
  • Virtual LANs
  • VLAN Trunking Protocol
  • Advanced Features of Switches
  • Challenge Activity
  • Introduction to Wireless Technology
  • Cellular Technologies
  • The 802.11 Standards (Regulatory Impacts)
  • Comparing 802.11 Standards
  • Wireless Network Components
  • Installing a Wireless Network
  • Site Survey
  • Challenge Activity
  • Wireless Security
  • Site-to-Site VPN
  • Client-to-Site VPN
  • Remote Desktop Connection
  • Virtual Network Computing
  • Connection Methods
  • Jump Box/Host
  • In-Band vs. Out-of-Band Management
  • Challenge Activity
  • Performance Monitoring/Metrics/Sensors
  • SNMP
  • Application Programming Interface Integration
  • Protocol Analyzer/Packet Capture
  • Flow Data
  • Log Aggregation
  • Challenge Activity 
  • Plans and Procedures
  • Hardening and Security Policies
  • Common Documentation
  • IP Address Management
  • Common Agreements
  • Challenge Activity
4

High Availability and Disaster Recovery

  • Load Balancing
  • Multipathing
  • Network Interface Card (NIC) Teaming
  • Redundant Hardware/Clusters
  • Facilities and Infrastructure Support
  • Redundancy and High Availability Concepts
  • Backups
  • Testing
  • Challenge Activity
  • Cloud Computing
  • Infrastructure as Code
  • Software-Defined Networking
  • Virtual Extensible Local Area Network
  • Zero Trust Architecture
  • Secure Access Secure Edge/Security Service Edge
  • Challenge Activity
  • Narrowing Down the Problem
  • Troubleshooting Steps
  • Troubleshooting Tips
  • Challenge Activity
  • Software Tools
  • Using traceroute
  • Using ipconfig, ifconfig, and ip
  • Using the ifconfig Utility
  • Using the ip Utility
  • Using the iptables Utility
  • Using the ping Utility
  • The Address Resolution Protocol
  • Using the arp Utility
  • Using the nslookup Utility
  • Resolving Names with the Hosts File
  • Using the mtr Command (pathping)
  • Using the Nmap Utility
  • Using the route Command
  • Using the netstat Utility
  • Using tcpdump
  • Basic Networking Device Commands
  • Hardware Tools
  • Challenge Activity
  • Common Security  Terminology
  • AAA Model
  • Regulatory Compliance
  • Challenge Activity
  • Technology-Based Attacks
  • Human and Environmental
  • Hardening Security
  • Implementing Network Segmentation
  • Physical Security Concepts
  • Challenge Activity

1

Introduction to Networks and The Open System Interconnection (OSI) Reference Model

  • Exploring a Single Location in a Lab
  • Connecting Devices in a Peer-To-Peer Architecture
  • Configuring an iSCSI Target and Initiator
  • Connecting Devices in a Mesh Topology
  • Creating a Bus Topology
  • Connecting Patch Panel Cables
  • Connecting Fiber Optic Cables
  • Establishing an Internet Connection Between Two Switches Using a Media Converter
  • Configuring the Speed and Duplex Settings of a Network Interface
  • Configuring NIC Teaming
  • Connecting to an Ethernet Network
  • Reconnecting to an Ethernet Network
  • Mounting and Stacking Switches in a Server Rack
  • Connecting Systems to the Internet Through a Firewall Router
  • Implementing Intrusion Detection and Prevention
  • Configuring a Firewall
  • Configuring DHCP on a Router
  • Creating an ALB in AWS
  • Configuring a Router
  • Configuring Autonomous Access Points
  • Connecting to a VoIP
  • Connecting to a Cable Modem
  • Configuring a DNS Server
  • Configuring Zone Transfers
  • Connecting to a DSL Network
  • Configuring a Basic Switch
  • Viewing and Creating a Record Type
  • Examining DNS Entries
  • Configuring a Proxy Server
  • Providing Remote Internet Access Using Analog Modem
  • Configuring Multi-stratum NTP
  • Creating a Demilitarized Zone
  • Powering a VoIP Phone Using PoE Injector
  • Implementing a SOHO Network
2

IP Addressing and IP Subnetting

  • Viewing the IPv4 Header
  • Understanding ICMP
  • Understanding HTTP/HTTPS
  • Analyzing the Structure of TCP and UDP Segments
  • Using the ping and tracert Commands
  • Exploiting SMTP
  • Examining Port Numbers
  • Configuring an SSH Server on a Linux System
  • Connecting to a Remote Computer Using the Remote Desktop Connection
  • Configuring IPSec
  • Configuring GRE Tunnels
  • Exploring APIPA and Loopback Addresses
  • Configuring an IPv4 Address
  • Configuring an IPv6 Address
  • Configuring Stateless and Stateful DHCPv6
  • Configuring SLAAC
  • Configuring an IP Address in Linux
  • Configuring Network Address Translation
  • Configuring Static Routing
  • Configuring BGP
  • Configuring EIGRP
  • Configuring OSPF
  • Configuring IPv6 on a Router
3

Switching and Virtual LANs

  • Viewing the Default Status of the Interfaces on a Switch
  • Configuring a Loop Guard on a Switch Port
  • Observing the STP Modes
  • Investigating STP Loop Prevention
  • Configuring a BPDU Guard on a Switch Port
  • Configuring PortFast and Rapid Spanning Tree
  • Configuring an Access Port
  • Creating a VLAN and Placing a Switch Port into It
  • Configuring DHCP Snooping
  • Configuring Speed, Duplex, and Description on a Switch
  • Configuring VLAN and Trunking
  • Configuring EtherChannel
  • Enabling Jumbo Frame Support
  • Creating a Home Wireless Network
  • Working with a Mobile Hotspot
  • Connecting an iPhone to a Laptop via Bluetooth
  • Creating a Site-to-Site VPN Connection
  • Configuring a VPN Connection on an iPad
  • Monitoring the System's Performance Using Performance Monitor
  • Using a Visual Fault Locator
  • Viewing and Exporting Event Logs
  • Configuring Syslog and Observing the Log Settings
  • Setting Up a Password Policy
  • Strengthening iPad Security
  • Installing the IPAM Feature
4

High Availability and Disaster Recovery

  • Creating Redundant Storage
  • Configuring HSRP
  • Backing Up Files
  • Creating a Restore Point
  • Restoring Files
  • Creating a Local Backup
  • Creating a VPN Connection
  • Creating a Virtual Switch
  • Creating a VPC in AWS
  • Creating a Virtual Network in Azure
  • Creating a Network Firewall in AWS
  • Creating a NAT Gateway
  • Creating a VPC Network
  • Troubleshooting IP Addressing Issues
  • Using the Protocol Analyzer Tool
  • Generating and Examining the ARP Packets
  • Understanding Networking and Network Diagnostics Command Line Tools
  • Using Command Line Tools
  • Troubleshooting Switching Issues
  • Using Networking Device Commands
  • Testing an RJ-45 Cable Using a Cable Tester
  • Using a Network Tap
  • Providing Cooling and Ventilation to a Motherboard
  • Examining a Self-Signed Certificate
  • Examining PKI Certificates
  • Adding a Digital Certificate
  • Creating Asymmetric Key Pairs
  • Understanding Symmetric Encryption
  • Configuring the RADIUS Server
  • Spoofing a MAC Address
  • Defending Against IP Spoofing
  • Simulating a DoS Attack
  • Performing ARP Spoofing
  • Using Anti-phishing Tools
  • Using the SET Tool
  • Creating a Network ACL
  • Cracking Passwords Using Cain and Abel
  • Using Honeypot
  • Implementing Physical Security
  • Disabling Unnecessary Services in Windows

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

Related Courses

All Courses
scroll to top