CYB-305 Networking Fundamentals

(AIUS-CYB-305-V2.AE1)
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

OSI Model, Networking Connectors, and Ethernet Specifications

  • First Things First: What's a Network?
  • Physical Network Topologies
  • Topology Selection, Backbones, and Segments
  • Internetworking Models
  • Introduction to Encapsulation
  • Modulation Techniques
  • Physical Media
  • Cable Properties
  • Wiring Standards
  • Installing Wiring Distributions
  • Network Basics
  • Ethernet Basics
  • Ethernet at the Data Link Layer
  • Ethernet at the Physical Layer
  • Ethernet over Other Standards (IEEE 1905.1-2013)
2

Networking Devices, IP Addressing, Subnetting, and Troubleshooting

  • Common Network Connectivity Devices
  • Other Specialized Devices
  • Networked Devices
  • Planning and Implementing a Basic SOHO Network Using Network Segmentation
  • Introducing TCP/IP
  • Data Encapsulation
  • IP Terminology
  • The Hierarchical IP Addressing Scheme
  • IPv4 Address Types
  • Internet Protocol Version 6 (IPv6)
  • Subnetting Basics
  • Troubleshooting IP Addressing
  • Introduction to Network Address Translation (NAT)
3

IP Routing and Protocols, Virtual LANs, and Wireless Networking

  • Routing Basics
  • The IP Routing Process
  • Testing Your IP Routing Understanding
  • Static and Dynamic Routing
  • Routing Protocol Basics
  • Distance-Vector Routing Protocols
  • Link-State Routing Protocols
  • High Available Routes
  • Advanced IPv6 Concepts
  • IPv6 Routing Protocols
  • Networking Before Layer 2 Switching
  • Switching Services
  • Spanning Tree Protocol
  • Virtual LANs
  • VLAN Trunking Protocol
  • Advanced Features of Switches
  • Introduction to Wireless Technology
  • Cellular Technologies
  • The 802.11 Standards (Regulatory Impacts)
  • Comparing 802.11 Standards
  • Wireless Network Components
  • Installing a Wireless Network
  • Site Survey
  • Wireless Security
4

Remote Network, Network Availability, Organizati...ies, and High Availability and Disaster Recovery

  • Site-to-Site VPN
  • Client-to-Site VPN
  • Remote Desktop Connection
  • Virtual Network Computing
  • Connection Methods
  • Jump Box/Host
  • In-Band vs. Out-of-Band Management
  • Performance Monitoring/Metrics/Sensors
  • SNMP
  • Application Programming Interface Integration
  • Protocol Analyzer/Packet Capture
  • Flow Data
  • Log Aggregation
  • Plans and Procedures
  • Hardening and Security Policies
  • Common Documentation
  • IP Address Management
  • Common Agreements
  • Load Balancing
  • Multipathing
  • Network Interface Card (NIC) Teaming
  • Redundant Hardware/Clusters
  • Facilities and Infrastructure Support
  • Redundancy and High Availability Concepts
  • Backups
  • Testing
5

Data Center Architecture, Troubleshooting, Software Tools and Attacks

  • Cloud Computing
  • Infrastructure as Code
  • Software-Defined Networking
  • Virtual Extensible Local Area Network
  • Zero Trust Architecture
  • Secure Access Secure Edge/Security Service Edge
  • Narrowing Down the Problem
  • Troubleshooting Steps
  • Troubleshooting Tips
  • Software Tools
  • Using traceroute
  • Using ipconfig, ifconfig, and ip
  • Using the ifconfig Utility
  • Using the ip Utility
  • Using the iptables Utility
  • Using the ping Utility
  • The Address Resolution Protocol
  • Using the arp Utility
  • Using the nslookup Utility
  • Resolving Names with the Hosts File
  • Using the mtr Command (pathping)
  • Using the Nmap Utility
  • Using the route Command
  • Using the netstat Utility
  • Using tcpdump
  • Basic Networking Device Commands
  • Hardware Tools
  • Common Security  Terminology
  • AAA Model
  • Regulatory Compliance
  • Technology-Based Attacks
  • Human and Environmental
  • Hardening Security
  • Implementing Network Segmentation
  • Physical Security Concepts

1

OSI Model, Networking Connectors, and Ethernet Specifications

  • Exploring a Single Location in a Lab
  • Connecting Devices in a Peer-To-Peer Architecture
  • Configuring an iSCSI Target and Initiator
  • Connecting Devices in a Mesh Topology
  • Creating a Bus Topology
  • Connecting Patch Panel Cables
  • Connecting Fiber Optic Cables
  • Establishing an Internet Connection Between Two Switches Using a Media Converter
  • Configuring the Speed and Duplex Settings of a Network Interface
  • Configuring NIC Teaming
  • Connecting to an Ethernet Network
  • Reconnecting to an Ethernet Network
2

Networking Devices, IP Addressing, Subnetting, and Troubleshooting

  • Mounting and Stacking Switches in a Server Rack
  • Connecting Systems to the Internet Through a Firewall Router
  • Implementing Intrusion Detection and Prevention
  • Configuring a Firewall
  • Configuring DHCP on a Router
  • Creating an ALB in AWS
  • Configuring a Router
  • Configuring Autonomous Access Points
  • Connecting to a VoIP
  • Connecting to a Cable Modem
  • Configuring a DNS Server
  • Configuring Zone Transfers
  • Connecting to a DSL Network
  • Configuring a Basic Switch
  • Viewing and Creating a Record Type
  • Examining DNS Entries
  • Configuring a Proxy Server
  • Providing Remote Internet Access Using Analog Modem
  • Configuring Multi-stratum NTP
  • Creating a Demilitarized Zone
  • Powering a VoIP Phone Using PoE Injector
  • Implementing a SOHO Network
  • Viewing the IPv4 Header
  • Understanding ICMP
  • Understanding HTTP/HTTPS
  • Analyzing the Structure of TCP and UDP Segments
  • Using the ping and tracert Commands
  • Exploiting SMTP
  • Examining Port Numbers
  • Configuring an SSH Server on a Linux System
  • Connecting to a Remote Computer Using the Remote Desktop Connection
  • Configuring IPSec
  • Configuring GRE Tunnels
  • Exploring APIPA and Loopback Addresses
  • Configuring an IPv4 Address
  • Configuring an IPv6 Address
  • Configuring Stateless and Stateful DHCPv6
  • Configuring SLAAC
  • Configuring an IP Address in Linux
  • Configuring Network Address Translation
3

IP Routing and Protocols, Virtual LANs, and Wireless Networking

  • Configuring Static Routing
  • Configuring BGP
  • Configuring EIGRP
  • Configuring OSPF
  • Configuring IPv6 on a Router
  • Viewing the Default Status of the Interfaces on a Switch
  • Configuring a Loop Guard on a Switch Port
  • Observing the STP Modes
  • Investigating STP Loop Prevention
  • Configuring a BPDU Guard on a Switch Port
  • Configuring PortFast and Rapid Spanning Tree
  • Configuring an Access Port
  • Creating a VLAN and Placing a Switch Port into It
  • Configuring DHCP Snooping
  • Configuring Speed, Duplex, and Description on a Switch
  • Configuring VLAN and Trunking
  • Configuring EtherChannel
  • Enabling Jumbo Frame Support
  • Creating a Home Wireless Network
  • Connecting an iPhone to a Laptop via Bluetooth
  • Working with a Mobile Hotspot
4

Remote Network, Network Availability, Organizati...ies, and High Availability and Disaster Recovery

  • Creating a Site-to-Site VPN Connection
  • Configuring a VPN Connection on an iPad
  • Monitoring the System's Performance Using Performance Monitor
  • Using a Visual Fault Locator
  • Viewing and Exporting Event Logs
  • Configuring Syslog and Observing the Log Settings
  • Setting Up a Password Policy
  • Strengthening iPad Security
  • Installing the IPAM Feature
  • Creating Redundant Storage
  • Configuring HSRP
  • Backing Up Files
  • Creating a Restore Point
  • Restoring Files
  • Creating a Local Backup
5

Data Center Architecture, Troubleshooting, Software Tools and Attacks

  • Creating a VPN Connection
  • Creating a Virtual Switch
  • Creating a VPC in AWS
  • Creating a Virtual Network in Azure
  • Creating a Network Firewall in AWS
  • Creating a NAT Gateway
  • Creating a VPC Network
  • Troubleshooting IP Addressing Issues
  • Using the Protocol Analyzer Tool
  • Generating and Examining the ARP Packets
  • Understanding Networking and Network Diagnostics Command Line Tools
  • Using Command Line Tools
  • Troubleshooting Switching Issues
  • Using Networking Device Commands
  • Testing an RJ-45 Cable Using a Cable Tester
  • Using a Network Tap
  • Providing Cooling and Ventilation to a Motherboard
  • Examining a Self-Signed Certificate
  • Examining PKI Certificates
  • Adding a Digital Certificate
  • Creating Asymmetric Key Pairs
  • Understanding Symmetric Encryption
  • Configuring the RADIUS Server
  • Spoofing a MAC Address
  • Defending Against IP Spoofing
  • Simulating a DoS Attack
  • Performing ARP Spoofing
  • Using Anti-phishing Tools
  • Using the SET Tool
  • Creating a Network ACL
  • Cracking Passwords Using Cain and Abel
  • Using Honeypot
  • Implementing Physical Security
  • Disabling Unnecessary Services in Windows

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

Related Courses

All Courses
scroll to top