Computer Hardware
Computer Networking
Cisco Certified Network Associate
Microsoft Certified Systems Engineer
Server Examination

Computer Networking: N + (1 Month)
 Network Fundamentals

Network Elements

  • Local Area Network
  • Wide Area Network
  • Hosts, Workstation and Server
  • Peer-to-Peer vs. Client/Server Architecture

Physical Topologies

  • Bus Topology
  • Star Topology
  • Ring Topology
  • Mesh Topology
  • Backbones and Segments
  • Selecting the Right Topology

Physical Media

  • Coaxial Cable
  • Twisted-Pair Cable
  • Fiber-Optic Cable
  • Cable Type Summary

Common Network Connectivity Devices

  • NIC
  • Hub
  • Switch
  • Bridge
  • Routers
  • Gateways
  • Other devices
The OSI Model

Introducing the OSI Model

The OSI Model’s Lower Layers

  • The Physical Layer
  • The Data Link Layer

The OSI Model’s Middle Layers

  • The Network Layer
  • The Transport Layer

The OSI Model’s Upper Layers

  • The Session Layer
  • The Presentation Layer
  • The Application Layer
  • Upper Layer Devices

Networking Protocols

  • TCP/IP
  • IPX/SPX
  • NetBEUI
  • AppleTalk and AppleTalk over IP
TCP/IP Fundamentals

Introducing TCP/IP

  • A Brief History of TCP/IP
  • TCP/IP Design Goals
  • TCP/IP and OSI Model

The Transmission Control Protocol

The Internet Layer Protocol

  • The Internet Protocol
  • Internet Control Message Protocol (ICMP)
  • Address Resolution Protocol (ARP) and
  • Reverse ARP (RARP)
  • Routers and Routing

The Application Protocols

  • Simple Network Management Protocol (SNMP)
  • File Transfer Protocol (FTP)
  • Trivial File Transfer Protocol (TFTP)
  • Secure File Transfer Protocol (SFTP)
  • Simple Mail Transfer Protocol (SMTP)
  • Post Office Protocol (POP)
  • Internet Message Access Protocol, Version 4 (IMAP4)
  • Line Printer Daemon (LPD)
  • Network File System (NFS)
  • Telnet
  • Secure Shell (SSH)
  • Hypertext Transfer Protocol (HTTP)
  • Hypertext Transfer Protocol Secure (HTTPS)
  • Network Time Protocol (NTP)
  • Network News Transfer Protocol (NNTP
  • )
  • Secure Copy Protocol (SCP)
  • Lightweight Directory Access Protocol (LDAP)
  • Internet Group Management Protocol (IGMP)
  • Line Printer Remote (LPR)

Other Upper-Layer Protocol

  • User Datagram Protocol (UDP)
  • Server Message Block (SMB)
  • AppleTalk Filing Protocol (AFP)
  • Internet Connection Sharing (ICS)

Overview of Ports and Sockets

Understanding IP Addressing

  • Overview of Ethernet Addresses
  • Overview of IP Addressing
  • Understanding Subnets
  • Subnetting a Class C Network
  • Classless Inter-Domain Routing (CIDR)
  • IP Proxy Servers

Name Resolution Methods

  • Internet Domain Organization
  • Using HOSTS
  • Using DNS
  • Using WINS

Configuring TCP/IP on Windows Workstations

  • The IP Setting Tab
  • The DNS Tab
  • The WINS Tab
  • The Options Tab
  • The Windows Registry
  • Zero Configurations (ZeroConf)

Virtual LANs (VLANs)

TCP/IP Utilities

Using the Address Resolution Protocol (ARP)

  • The Windows ARP Table
  • Using the arp Utility

Using the netstat Utility

  • The –a Switch
  • The –e Switch
  • The –r Switch
  • The –s Switch
  • The –n Switch
  • The –p Switch

Using nbtstat Utility

  • The –a Switch
  • The –A Switch
  • The –c Switch
  • The –n Switch
  • The –r Switch
  • The –R Switch
  • The –S Switch
  • The –s Switch

Using the File Transfer Protocol (FTP)

  • Starting FTP and Logging In to an FTP Server
  • Downloading Files
  • Uploading Files

Using the ping Utility

Using winipcfg, ipconfig, and ifconfig

  • Using winipcfg Utility
  • Using ipconfig Utility
  • Using ifconfig Utility

Using the tracert Utility

Using the Telnet Utility

Using the nslookup Utility

Network Operating Systems

Microsoft Windows

  • Features
  • Client Support
  • Interoperability
  • Authentications
  • File and Print Services
  • Application Support
  • Security

Novell NetWare

  • Features
  • Client Support
  • Interoperability
  • Authentication
  • Directory Structure
  • File and Print Services
  • Application Support
  • Security

UNIX/Linux

  • Features
  • Client Support and Interoperability
  • Authentication
  • File and Print Services
  • Application Support
  • Security

Macintosh

  • Features
  • Client Support
  • Interoperability
  • Authentication
  • File and Print Services
  • Application Support
  • Security
Wired and Wireless Networks

Before Installing New Hardware or Software

  • Standard Operating Procedures
  • Environmental Issues
  • Error Messages and Log Files
  • Current Configurations Baselines
  • Other Documentation

Wireless Networking

  • Wireless Network Components
  • Wireless Network Installation
  • Installation Type

Workstation Configuration

  • Configuring a Windows 9x Network
  • Configuring a Windows 2000 Network Client
  • Configuring Windows Clients for NetWare Network Access

Network Installation Tools

  • Wire Crimper
  • Media Testing Tool
  • Punch down Tool
WAN and Remote Access Technologies

Remote Access Connections Configuration Requirements

  • Hardware Requirements
  • Software Requirements

Remote Access Connection Methods

  • The Public Switched Telephone Network (PSTN)
  • Integrated Services Digital Network (ISDN)
  • Other Digital Options

Remote Access Protocols

  • Serial Line Internet Protocol (SLIP)
  • Point-to-Point Protocol (PPP) and PPPoE
  • (Point-to-Point Protocol over Ethernet)
  • Point-to-Point Tunneling Protocol (PPTP)
  • Windows Remote Access Services (RAS)
  • Remote Desktop Protocol (RDP)
Network Access and Security

Accessing Network Resources

  • Client Selection
  • Installing the Windows 95/98 and NT/2000 Client
  • Installing the NetWare Client
  • Installing the UNIX Client
  • Selecting a Primary Client

Managing User Account and Password Security

  • Network Resource-Sharing Security Models
  • Managing Accounts
  • Managing Passwords

Using Firewalls

  • Firewall Technologies
  • Comparing Firewall Operating System Platforms

Understanding and Defending against Hackers Attacks

  • Hackers Tools: Common Network Attacks
  • Intruder Detection: Defense Techniques

DoD Security Standards

  • Trusted Computer Systems
  • Trusted Network Interpretation
  • Certified Operating Systems and Networks

Understanding Encryption

  • Uses for Encryption
  • How Encryption Works Encryption Keys

Security Policies

  • Security Audit
  • Clean Desk Policy
  • Recording Equipment
  • Other Common Security Policies
  • Breaking Policy
  • The Exit Interview
Fault Tolerance and Disaster Recovery

Assessing Fault Tolerance and Disaster Recovery Needs

  • Hot Site
  • Worm Site
  • Cold Site

Power Management

  • Surge Protectors
  • Battery Backup Systems
  • Line Conditioners

Disk System Fault Tolerance

  • Disk Mirroring
  • Disk Duplexing
  • Disk Stripping
  • Redundant Array of Inexpensive (or Independent) Disks (RAID)

Backup Considerations

  • Backup Media Options
  • Backup Utilities
  • Backup Types
  • Tape Rotation Schedule

Virus Protection

  • Types of Viruses
  • Updating Antivirus Components
  • Scanning for Viruses

Software Revisions

  • Is It Necessary?
  • Where to Get Patches
  • Hoe to Apply Patches
Network Troubleshooting

Narrowing Down the Problem

  • Did u check the simple Stuff?
  • Is Hardware or Software Causing the Problem?
  • Is It a Workstation or a Server Problem?
  • Which Segment of a Network Are Affected?
  • Are there any Cabling Issues?

Troubleshooting Steps

  • Step 1: Establish Symptoms
  • Step 2: Identify the Affected Area
  • Step 3: Establish What Has Changed
  • Step 4: Select the Most Portable Cause
  • Step 5: Implement a Solution
  • Step 6: Test the Result
  • Step 7: Recognize the Potential Effect of the Solutions
  • Step 8: Document the Solution

The Troubleshooter’s Resources

  • Log Files
  • Manufacturer’s Troubleshooting Resources
  • Hardware Network Troubleshooting Tools
  • Software Troubleshooting Tools

Troubleshooting Tips

  • Don’t overlook the Small Stuff
  • Prioritize Your Problems
  • Check the Software Configuration
  • Don’t Overlook Physical Conditions
  • Don’t Overlook Cable Problems
  • Check for Viruses
 
 
 
User :
Password :
   
   
   
 
 

Home - About Us - Services - Courses- Photogallery - Testimonial - Enquiry - Contact Us