Networking Essentials

(HM-CPMT1352.AE1)
Lessons
Lab
TestPrep
Get A Free Trial

Skills You’ll Get

1

Introduction

2

Networking Basics, Connectors, Ethernet, Devices

  • First Things First: What's a Network?
  • Physical Network  Topologies
  • Topology Selection, Backbones, and Segments
  • Internetworking Models
  • The OSI Reference Model
  • Introduction to Encapsulation
  • Modulation Techniques
  • Physical Media
  • Cable Properties
  • Wiring Standards
  • Installing Wiring Distributions
  • Network Basics
  • Ethernet Basics
  • Ethernet at the Data Link Layer
  • Ethernet at the Physical Layer
  • Ethernet over Other Standards (IEEE 1905.1-2013)
  • Common Network Connectivity Devices
  • Other Specialized Devices
  • Networked Devices
  • Planning and Implementing a Basic SOHO Network Using Network Segmentation
3

Internet Protocol

  • Introducing TCP/IP
  • Data Encapsulation
  • IP Terminology
  • The Hierarchical IP Addressing Scheme
  • IPv4 Address Types
  • Internet Protocol Version 6 (IPv6)
  • Subnetting Basics
  • Troubleshooting IP Addressing
  • Introduction to Network Address Translation (NAT)
4

IP Routing and Protocols, and Virtual LANs

  • Routing Basics
  • The IP Routing Process
  • Testing Your IP Routing Understanding
  • Static and Dynamic Routing
  • Routing Protocol Basics
  • Distance-Vector Routing Protocols
  • Link-State Routing Protocols
  • High Availability
  • Advanced IPv6 Concepts
  • IPv6 Routing Protocols
  • Networking Before Layer 2 Switching
  • Switching Services
  • Spanning Tree Protocol
  • Virtual LANs
  • VLAN Trunking Protocol
  • Two Additional Advanced Features of Switches
5

Wireless networks, Sensors, Documents, High Availability and Disaster Recovery

  • Introduction to Wireless Technology
  • Cellular Technologies
  • The 802.11 Standards (Regulatory Impacts)
  • Comparing 802.11 Standards
  • Wireless Network Components
  • Installing a Wireless Network
  • Site Survey
  • Wireless Security
  • Performance Metrics/Sensors
  • SNMP
  • Network Device Logs
  • Interface Statistics/Status
  • Interface Errors or Alerts
  • Environmental Factors and Sensors
  • Baselines
  • NetFlow Data
  • Uptime/Downtime
  • Plans and Procedures
  • Hardening and Security Policies
  • Common Documentation
  • Common Agreements
  • Load Balancing
  • Multipathing
  • Network Interface Card (NIC) Teaming
  • Redundant Hardware/Clusters
  • Facilities and Infrastructure Support
  • Redundancy and High Availability (HA) Concepts
  • Mean Time to Repair (MTTR)
  • Mean Time Between Failure (MTBF)
  • Recovery Time Objective (RTO)
  • Recovery Point Objective (RPO)
  • Network Device Backup/Restore
6

Security Concepts, Attacks, and Network Hardening Techniques

  • Confidentiality, Integrity, and Availability (CIA)
  • Threats
  • Vulnerabilities
  • Least Privilege
  • Role-Based Access
  • Zero Trust
  • Defense in Depth
  • Authentication Methods
  • Security Risk Assessments
  • Security Information and Event Management (SIEM)
  • Technology-Based Attacks
  • Human and Environmental
  • Best Practices
  • Wireless Security
  • IoT Access Considerations
7

Remote Access & Physical Security, Cloud, Network Availability

  • Site-to-Site VPN
  • Client-to-Site VPN
  • Remote Desktop Connection
  • Remote Desktop Gateway
  • SSH
  • Virtual Network Computing (VNC)
  • Virtual Desktop
  • Authentication and Authorization Considerations
  • In-Band vs. Out-of-Band Management
  • Detection Methods
  • Prevention Methods
  • Asset Disposal
  • Data Center Network Architectures
  • Software-Defined Networking
  • Traffic Flows
  • Branch Office vs. On-premises Data Center vs. Colocation
  • Cloud Computing and Its Effect on the Enterprise Network
  • Overview of Network Programmability in Enterprise Network
  • Application Programming Interfaces (APIs)
  • Managing Network Documentation
  • Network Monitoring
  • Network Optimization
  • Performance Metrics/Sensors
  • Network Metrics
  • Network Device Logs
  • Interface Statistics/Status
  • Interface Errors
  • Baseline
  • NetFlow
  • Uptime
  • Downtime
8

Cable Connectivity Issues, Troubleshooting, and Software Tools

  • Identifying Hardware Tools
  • Narrowing Down the Problem
  • Troubleshooting Steps
  • Troubleshooting Tips
  • Software Tools
  • Using traceroute
  • Using ipconfig, ifconfig, and ip
  • Using the iptables Utility
  • Using the ping Utility
  • Using the Address Resolution Protocol
  • Using the arp Utility
  • Using the nslookup Utility
  • Resolving Names with the Hosts File
  • Using the Mtr Command (pathping)
  • Using the Nmap Utility
  • Using the route Command
  • Using the nbtstat Utility
  • Using the netstat Utility
  • Using tcpdump
  • Using the File Transfer Protocol
  • Using the Telnet Utility
A

Appendix A: Subnetting Class A

  • Subnetting Practice Examples: Class A Addresses
  • Subnetting in Your Head: Class A Addresses
  • Written Lab 1
  • Written Lab 2

1

Networking Basics, Connectors, Ethernet, Devices

  • Identifying Clients and Servers
  • Connecting Devices in a Peer- To- Peer Architecture
  • Connecting Devices in Bus Topology
  • Preparing a Temporary Server for the Network or Internet Connection
  • Preparing a Temporary Server for the Network or Internet Connection
  • Connecting a New Workstation to the Internet
  • Connecting a Workstation to the Ethernet and to the Internet
  • Configuring Advanced Ethernet Options
  • Configuring and Displaying Speed, Duplex, and Description on a Switch
  • Creating a Subinterface on a Router and Assigning an IP Address
  • Configuring a DHCP Server
  • Adding a DNS server
  • Performing a Proxy Server Operation
2

Internet Protocol

  • Understanding the IPv4 Header
  • Displaying the Structure of a UDP Segment
  • Displaying the Structure of a TCP Segment
  • Displaying a Router’s IP ARP Table
  • Configuring a Class C IP Address
  • Configuring a Class A IP Address
  • Configuring a Class B IP Address
  • Enabling and Verifying SLAAC on a Router
  • Pinging a Host Using a PC
  • Configuring a CIDR-Based IP Network
  • Configuring Network Address Translation
  • Configuring Port Address Translation
3

IP Routing and Protocols, and Virtual LANs

  • Using the show IP route Command
  • Configuring Static Routing
  • Configuring GRE Tunnels
  • Using the show Command
  • Configuring an Access Port
  • Identifying the Root Ports and Viewing the STP Information of a Switch
  • Creating a VLAN and Viewing its Assignment to Port Mapping
  • Configuring and Viewing a Trunk Port Status
4

Wireless networks, Sensors, Documents, High Availability and Disaster Recovery

  • Installing a NIC
  • Connecting a Wireless Router to a Laptop
  • Turning on the Personal Hotspot of an iPhone
  • Viewing the Application, Security, and System Logs
  • Configuring Syslog and Viewing Settings on a Router
  • Viewing Interface Statistics and Status
  • Configuring NetFlow
  • Creating a Demilitarized Zone
  • Configuring a Default Domain Password Policy
  • Configuring VRRP
5

Security Concepts, Attacks, and Network Hardening Techniques

  • Setting Up a Honeypot
  • Installing a RADIUS Server
  • Configuring AAA for Device Access Control
  • Simulating a DoS Attack
  • Cracking Passwords
  • Performing a DoS Attack with the SYN Flood
  • Performing ARP Spoofing
  • Using Social Engineering Techniques to Plan an Attack
  • Using OWASP ZAP
  • Configuring DHCP Snooping
6

Remote Access & Physical Security, Cloud, Network Availability

  • Configuring an SSH Server
  • Creating a Virtual Switch
7

Cable Connectivity Issues, Troubleshooting, and Software Tools

  • Part III: Command Line Tools
  • Capturing a Packet Using Wireshark
  • Part I: Command Line Tools
  • Part II: Command Line Tools

Related Courses

All Courses
scroll to top