Fundamentals of Information Technology II

(INFO-0008.AB1)
Lessons
Lab
TestPrep
Get A Free Trial

Skills You’ll Get

1

Introduction to Computer Networks

  • Introduction
  • Network Topologies
  • The OSI Model
  • The Ethernet LAN
  • Home Networking
  • Assembling an Office LAN
  • Testing and Troubleshooting a LAN
  • Summary
  • Questions and Problems
2

Interconnecting the LANs

  • Introduction
  • The Network Bridge
  • The Network Switch
  • The Router
  • The Console Port Connection
  • Interconnecting LANs with the Router
  • Interconnecting LANs and WANs
  • Summary
  • Questions and Problems
3

TCP/IP

  • Introduction
  • The TCP/IP Layers
  • Number Conversion
  • IPv4 Addressing
  • Subnet Masks: Subnetting and Supernetting
  • Supernetting, CIDR Blocks, and VLSM
  • IPv6 Addressing
  • Summary
  • Questions and Problems
4

Managing the Network Infrastructure

  • Introduction
  • Domain Name and IP Address Assignment
  • IP Address Management with DHCP
  • Scaling a Network with NAT and PAT
  • Domain Name System (DNS)
  • Network Management Protocols
  • Analyzing Network Traffic
  • Network Analyzer: Wireshark
  • Analyzing Computer Networks: FTP Data Packets
  • Troubleshooting IP Networks
  • Summary
  • Questions and Problems
5

Creating Scripts

  • Beginning a Shell Script
  • Using Commands
  • Using Arguments
  • Using Variables
  • Using Conditional Expressions
  • Using Loops
  • Using Functions
  • Setting the Script’s Exit Value
  • Summary
  • Exam Essentials
6

Implementing One-to-Many Windows PowerShell Remoting

  • One-to-Many Remote Access in the Classic Scenario
  • One-to-Many Remoting with Persistent Sessions
  • Managing Session Configurations
  • One-to-Many Remoting with the Windows PowerShell ISE
  • Try it Yourself
  • Passing Input to Remote Commands
  • Summary
  • Q&A
7

Thinking in Terms of Objects

  • The Problem with UNIX/Linux
  • What Is an Object?
  • Discovering Object Members
  • Putting Objects into Action
  • Try it Yourself
  • Summary
  • Q&A
8

Mastering the Windows PowerShell Pipeline

  • Understanding How the Pipeline Works from a High Level
  • Understanding in Depth How the Pipeline Works
  • Try it Yourself
  • Passing Data Through the Pipeline
  • Try it Yourself
  • "Forcing" Objects Through the Pipeline
  • Summary
  • Q&A
9

Introducing Cloud Computing Configurations and Deployments

  • Introducing Cloud Computing
  • Creating and Validating a Cloud Deployment
  • Verifying System Requirements
  • Summary
  • Exam Essentials
10

Security Concepts and Threats

  • Understanding Hackers and Motives
  • Understanding Security Threats
  • Understanding Access Control
  • Summary
  • Exam Essentials
  • Written Lab
11

Security Best Practices

  • Understanding Security Best Practices
  • Summary
  • Exam Essentials
  • Written Lab
12

Business Continuity and Computer Support

  • Understanding Business Continuity
  • Exploring Computer Support Concepts
  • Summary
  • Exam Essentials
  • Written Lab

1

Introduction to Computer Networks

  • Assembling Components to Complete the Workstation
  • Using the ping Utility
2

Interconnecting the LANs

  • Connecting a Hub to a Switch
3

Managing the Network Infrastructure

  • Configuring Network Address Translation
  • Configuring Port Address Translation
  • Capturing a Packet Using Wireshark
4

Creating Scripts

  • Creating an Advanced Script
  • Making Simple Batch Files
  • Redirecting the Output
5

Thinking in Terms of Objects

  • Retrieving Metadata
  • Retrieving the Available Properties with Get-Process
  • Retrieving the Available Methods with Get-Process
  • Retrieving Specific Information About Services
  • Working with Objects and Members
6

Mastering the Windows PowerShell Pipeline

  • Adding Users Using a Hash Table
  • Using the Pipeline Operator
  • Stopping the Print Spooler Service
  • Storing Elements in an Array
  • Experimenting with Pipeline Parameter Binding
7

Introducing Cloud Computing Configurations and Deployments

  • Conducting Vulnerability Scanning Using Nessus
  • Creating a Remote Access VPN Connection
  • Connecting to a Remote Computer Using the Remote Desktop Connection
8

Security Concepts and Threats

  • Creating a DoS Attack Scenario
  • Identifying the Denial of Service Attack
  • Understanding Single Sign-On
9

Security Best Practices

  • Applying a Screen Saver
  • Backing Up a Windows Security Certificate
  • Starting and Stopping a Service
10

Business Continuity and Computer Support

  • Backing Up Files
  • Restoring Files
  • Booting Into Safe Mode 
  • Creating a Restore Point
  • Restoring a Restore Point
  • Running an Application in Compatibility Mode
  • Using the System Configuration Utility
  • Creating a Desktop Shortcut for MSConfig

Related Courses

All Courses
scroll to top