You are on page 1of 12

1-Introduction to Networks

The Local Area Network (LAN)

Common Network Components

Virtual LANs (VLANs)

Wide Area Network (WAN)

Virtual Private Networks (VPNs)

Network Architecture: Peer-to-Peer or Client/Server?

Physical Network Topologies

Bus Topology

Star Topology

Ring Topology

Mesh Topology

Point-to-Point Topology

Point-to-Multipoint Topology

Hybrid Topology

Topology Selection, Backbones, and Segments

Selecting the Right Topology

2-The Open Systems Interconnection Specifications


Internetworking Models

The Layered Approach

Advantages of Reference Models

The OSI Reference Model

The Application Layer

The Presentation Layer

The Session Layer

The Transport Layer

The Network Layer


The Data Link Layer

The Physical Layer

Introduction to Encapsulation

Networking Topologies, Connectors, and Wiring


3-

Standards
Physical Media

Coaxial Cable

Twisted-Pair Cable

Fiber-Optic Cable

Serial Cables

Properties of Cables

Transmission Speeds

Distance

Duplex

Noise Immunity (Security, EMI)

Frequency

Wiring Standards

568A vs. 568B

Straight-Through Cable

Crossover Cable

Rollover Cable

Hardware Loopback

Installing Wiring Distributions

Vertical and Horizontal Cross-Connects

Patch Panels

Verifying Correct Wiring Installation

Verifying Proper Wiring Termination


4- The Current Ethernet Specifications
Network Basics

Ethernet Basics

Collision Domain

Broadcast Domain

CSMA/CD

Half- and Full-Duplex Ethernet

Ethernet at the Data Link Layer

Binary to Decimal and Hexadecimal Conversion

Ethernet Addressing

Ethernet Frames

Channel Bonding

Ethernet at the Physical Layer

5- Networking Devices
Common Network Connectivity Devices

Hub

Repeater

Modem

Network Interface Card (NIC)

Transceiver (Media Converter)

Bridge

Switch

Wireless Access Point (AP)

Router

Firewall

Dynamic Host Configuration Protocol (DHCP) Server

Other Specialized Devices

Multilayer Switch
Content Switch

Intrusion Detection or Prevention System (IDS/IPS)

Load Balancer

Multifunction Network Devices

Domain Name Service (DNS) Server

Bandwidth Shaper

Proxy Server

Channel Service Unit/Data Service Unit (CSU/DSU)

Network Segmentation

Switches and Bridges at the Data Link Layer

Hubs at the Physical Layer

6- Introduction to Internet Protocol (IP)


Introducing TCP/IP

A Brief History of TCP/IP

TCP/IP and the DoD Model

The Process/Application Layer Protocols

The Host-to-Host Layer Protocols

The Internet Layer Protocols

Data Encapsulation

7- IP Addressing
IP Terminology

The Hierarchical IP Addressing Scheme

Network Addressing

Private IP Addresses

Broadcast Addresses

Internet Protocol Version 6 (IPv6)

Why Do We Need IPv6?


The Benefits of and Uses for IPv6

IPv6 Addressing and Expressions

Shortened Expression

Address Types

Special Addresses

IP Subnetting, Troubleshooting IP, and Introduction


8-

to NAT
Subnetting Basics

How to Create Subnets

Subnet Masks

Classless Inter-Domain Routing (CIDR)

Subnetting Class C Addresses

Subnetting Class B Addresses

Troubleshooting IP Addressing

Determining IP Address Problems

Introduction to Network Address Translation (NAT)

Types of Network Address Translation

NAT Names

How NAT Works

9- Introduction to IP Routing
Routing Basics

The IP Routing Process

Testing Your IP Routing Understanding

Static and Dynamic Routing

10- Routing Protocols


Routing Protocol Basics
Administrative Distances

Classes of Routing Protocols

Distance-Vector Routing Protocols

Routing Information Protocol (RIP)

RIP Version 2 (RIPv2)

VLSM and Discontiguous Networks

EIGRP

Border Gateway Protocol (BGP)

Link-State Routing Protocols

Open Shortest Path First (OSPF)

Intermediate System to Intermediate System (IS-IS)

IPv6 Routing Protocols

RIPng

EIGRPv6

OSPFv3

11- Switching and Virtual LANs (VLANs)


Networking Before Layer 2 Switching

Switching Services

Limitations of Layer 2 Switching

Bridging vs. LAN Switching

Three Switch Functions at Layer 2

Spanning Tree Protocol (STP)

Spanning-Tree Port States

STP Convergence

Virtual LANs (VLANs)

VLAN Basics

VLAN Memberships

Static VLANs
Dynamic VLANs

Identifying VLANs

VLAN Identification Methods

Switching and Network Security

Port Security/Authentication

How VLANs Enhance Network Security

Two Additional Advanced Features of Switches

Power over Ethernet (PoE)

Port Mirroring/Spanning

12- Wireless Technologies


Introduction to Wireless Technology

The 802.11 Standards

2.4GHz (802.11b)

2.4GHz (802.11g)

5GHz (802.11a)

5GHz (802.11h)

2.4GHz/5GHz (802.11n)

Comparing 802.11 Standards

Wireless LAN Modulation Techniques

Range Comparisons

Wireless Network Components

Wireless Access Points

Wireless Network Interface Card (NIC)

Wireless Antennas

Installing a Wireless Network

Ad hoc Mode: Independent Basic Service Set (IBSS)

Infrastructure Mode: Basic Service Set (BSS)

Design Considerations with Large Wireless Networks


Installing and Configuring Hardware

Wireless Security

Open Access

Service Set Identifiers (SSIDs), Wired Equivalent


Privacy (WEP), and Media Access Control (MAC)

Address Authentication

Remote Authentication Dial In User Service (RADIUS)

Temporal Key Integrity Protocol (TKIP)

Wi-Fi Protected Access (WPA) or WPA 2 Pre-Shared Key

13- Authentication and Access Control


Security Filtering

Access Control Lists

Tunneling

Encryption

Remote Access

Managing User Account and Password Security

Network Resource-Sharing Security Models

Managing User Accounts

Managing Passwords

User-Authentication Methods

Public Key Infrastructure (PKI)

Kerberos

Authentication, Authorization, and Accounting (AAA)

Network Access Control (NAC)

Challenge Handshake Authentication Protocol (CHAP)

MS-CHAP

Extensible Authentication Protocol (EAP)

14- Network Threats and Mitigation


Recognizing Security Threats

Denial of Service (DoS)

Viruses

Worms

Attackers and Their Tools

Rogue Access Points

Social Engineering (Phishing)

Understanding Mitigation Techniques

Active Detection

Passive Detection

Proactive Defense

Policies and Procedures

Security Policies

Security Training

Patches and Upgrades

Updating Antivirus Components

Fixing an Infected Computer

15- Physical and Hardware Security


Using Hardware and Software Security Devices

Defining Firewalls

Network-Based Firewalls

Host-Based Firewalls

Firewall Technologies

Access Control Lists (ACL)

Demilitarized Zone (DMZ)

Protocol Switching

Dynamic Packet Filtering


Proxy Services

Firewalls at the Application Layer vs. the Network Layer

Stateful vs. Stateless Network-Layer Firewalls

Application-layer Firewalls

Scanning Services and Other Firewall Features

Content Filtering

Signature Identification

Zones

Intrusion-Detection and -Prevention Systems

Network-Based IDS

Host-Based IDS

VPN Concentrators

Understanding Problems Affecting Device Security

Physical Security

Logical Security Configurations

Restricting Local and Remote Access

Secure and Unsecure Application Protocols

16- Wide Area Networks


What’s a WAN?

Defining WAN Terms

The Public Switched Telephone Network (PSTN)

WAN Connection Types

Bandwidth or Speed

T-Series Connections

The T1 Connection

The T3 Connection

Transmission Media

Wired Connections
Wireless Technologies

Broadband Services

DSL Technology and xDSL

Cable Modem

WAN Protocols

Integrated Services Digital Network (ISDN)

Frame Relay Technology

Asynchronous Transfer Mode (ATM)

Multi Protocol Label Switching (MPLS)

17- Command-Line Tools


Using Traceroute

Using ipconfig and ifconfig

Using the ipconfig Utility

Using the ifconfig Utility

Using the ping Utility

Using the Address Resolution Protocol (ARP)

The Windows ARP Table

Using the arp Utility

Using the nslookup Utility

Resolving Names with the Hosts Table

Using the Mtr Command

Using the Route Command

Using the route Command Options

Some Examples of the route Command

Using the nbtstat Utility

The –a Switch

The –A Switch

The –c Switch

The –n Switch
The –r Switch

The –R Switch

The –S Switch

The –s Switch

Using the netstat Utility

The –a Switch

The –e Switch

The –r Switch

The –s Switch

The –p Switch

The –n Switch

Using the File Transfer Protocol (FTP)

Starting FTP and Logging In to an FTP Server

Downloading Files

Uploading Files

Using the Telephone Network (Telnet) Utility

How to Enable Telnet in Vista

Don’t Use Telnet, Use Secure Shell (SSH)

You might also like