Curriculum
- 1 Section
- 63 Lessons
- 51 Weeks
Expand all sectionsCollapse all sections
- Topics63
- 1.1Explaining Network Topologies Networking Overview Networking Concepts Network Types Network Topology Star Topology Mesh Topology Network Topologies Lab: Create Network Topologies
- 1.2Lesson Review OSI Model Concepts Open Systems Interconnection Model Data Encapsulation and Decapsulation Layer 1 – Physical Layer 2 – Data Link Layer 3 – Network Layer 4 – Transport Upper Layers OSI Model Summary
- 1.3Lesson Review SOHO Networks SOHO Routers Physical Layer Functions Data Link Layer Functions Network Layer Functions Transport and Application Layer and Security Functions The Internet Binary and Hexadecimal Lab: Explore a Single Location in a Lab Lab: Create a Home Wireless Network Lab: Create a SOHO Network
- 1.4Lesson Review Troubleshooting Methodology Network Troubleshooting Methodology Identify the Problem Identify Problem Symptoms Establish a Theory of Probable Cause Test the Theory to Determine the Cause Establish a Plan of Action Implement the Solution Verify the Solution Document Findings, Actions, and Outcomes Lab: Troubleshooting Methodology
- 1.5Lesson Review Module Quiz Supporting Cabling and Physical Installations Ethernet Network Data Transmission Ethernet Standards Media Access Control and Collision Domains 100BASE-TX Fast Ethernet Standards Gigabit Ethernet Standards Fiber Ethernet Standards Ethernet Specifications Lab: Reconnect to an Ethernet Network
- 1.6Lesson Review Copper Cables and Connectors Unshielded Twisted Pair Cable Shielded and Screened Twisted Pair Cable Cat Cable Standards Twisted Pair Connector Types Plenum and Riser-rated Cable Coaxial and Twinaxial Cable and Connectors Lab: Connect to an Ethernet Network Lab: Connect a Cable Modem Identify Cabling Identify Connectors
- 1.7Lesson Review Wiring Implementation Structured Cabling System T568A and T568B Termination Standards Patch Panels Structured Cable Installation Termination Tools and Techniques Lab: Explore Multiple Locations in a Lab Lab: Connect Network Devices Lab: Connect Patch Panel Cables 1 Lab: Connect Patch Panel Cables 2
- 1.8Lesson Review Fiber Optic Cables and Connectors Fiber Optic Cable Considerations Single Mode Fiber and Multimode Fiber Fiber Optic Connector Types Fiber Optic Cable Installation Fiber Distribution Panels Multi-Fiber Push On Connectors Wavelength Division Multiplexing Lab: Connect Fiber Optic Cables Identify Fiber Optic Connectors
- 1.9Lesson Review Physical Installation Factors Rack Systems Humidity and Temperature Power Management Fire Suppression Lesson Review Cable Troubleshooting Specification and Limitations Cable Issues Cable Category Issues Cable Testers Wire Map Testers and Tone Generators Attenuation and Interference Issues Crosstalk Issues Fiber Optic Cable Testing Tools Cable Troubleshooting Strategies Lab: Explore Physical Connectivity 1 Lab: Explore Physical Connectivity 2 Lab: Troubleshoot Physical Connectivity 1 Lab: Troubleshoot Physical Connectivity 2 Lab: Troubleshoot Physical Connectivity 3 Lab: Troubleshoot Physical Connectivity 4
- 1.10Lesson Review Module Quiz Configuring Interfaces and Switches Network Interfaces Network Interface Cards Modular Transceivers Transceiver Mismatch Issues Transceiver Signal Strength Issues Ethernet Frame Format Media Access Control Address Format Compare Network Adapters Lab: Select and Install a Network Adapter Lab: Connect a Media Converter
- 1.11Lesson Review Switch Port Configuration Link Aggregation and NIC Teaming Maximum Transmission Unit Spanning Tree Protocol Spanning Tree Protocol Configuration Power Over Ethernet Lab: Configure Port Aggregation Lab: Enable Jumbo Frame Support Lab: Configure PoE
- 1.12Lesson Review Switch Troubleshooting Hardware Failure Issues Port Status Indicators Switch Show Commands Interface Error Counters MAC Address Table Network Loop and Broadcast Storm Issues Power Over Ethernet Issues Lab: Troubleshoot Disabled Ports Lab: Switching Loop
- 1.13Lesson Review Module Quiz Checkpoint Review Configuring Network Addressing Internet Protocol Basics IPv4 Datagram Header Layer 2 vs. Layer 3 Addressing and Forwarding Address Resolution Protocol Unicast and Broadcast Addressing Multicast and Anycast Addressing Lab: Explore Packets and Frames Lab: Explore ARP in Wireshark
- 1.14Lesson Review IP Version 4 Addressing IPv4 Address Format Network Masks Subnet Masks Host Address Ranges Default Gateway Broadcast Addresses IP Interface Configuration in Windows IP Interface Configuration in Linux Lab: Configure IP Addresses Lab: Configure IP Addresses on Mobile Devices Lab: Configure IP Addresses on Linux
- 1.15Lesson Review IP Version 4 Subnetting Classful Addressing Public vs Private Addressing Other Reserved Address Ranges IPv4 Address Scheme Design Classless Inter-Domain Routing Variable Length Subnet Masks Lab: Configure IP Networks and Subnets
- 1.16Lesson Review IP Troubleshooting Tools ipconfig ifconfig and ip arp ping Lab: IPv4 Troubleshooting Tools Lab: IPv4 Troubleshooting tools for Linux Lab: Use IPv4 Test Tools
- 1.17Lesson Review IP Version 6 IPv4 vs IPv6 IPv6 Address Format IPv6 Network Prefixes IPv6 Unicast Addressing IPv6 Link Local Addressing IPv6 Multicast and Anycast Addressing IPv4 and IPv6 Transition Mechanisms Common IPv6 Address Prefixes Lab: Configure an IPv6 Address
- 1.18Lesson Review IP Troubleshooting IP Configuration Issues Duplicate IP and MAC Address Issues IP Forwarding Issues Lab: Use ping and tracert on Windows Lab: Use ping and traceroute on Linux Lab: Assisted Troubleshooting 1 Lab: Assisted Troubleshooting 2 Lab: Assisted Troubleshooting 3 Live Lab: Explore the VM Lab Environment Applied Live Lab: Troubleshoot IP Configuration
- 1.19Lesson Review Module Quiz Configuring Routing and Advanced Switching Routing Technologies Routing Tables and Path Selection Static and Default Routes Routing Table Example Packet Forwarding Fragmentation Router Configuration Routing Table Tools tracert and traceroute Lab: Install an Enterprise Router Lab: Cisco Troubleshooting Tools
- 1.20Lesson Review Dynamic Routing Technologies Dynamic Routing Protocols Routing Information Protocol Enhanced Interior Gateway Routing Protocol Open Shortest Path First Border Gateway Protocol Route Selection
- 1.21Lesson Review Network Address Translation Edge Routers Network Address Translation Types Port Address Translation Lab: Configure NAT
- 1.22Lesson Review Firewalls Firewall Uses and Types Firewall Selection and Placement
- 1.23Lesson Review Enterprise Network Topologies Hybrid Topology Three-Tiered Network Hierarchy Compare Three-tier Hierarchical Model Lab: Create a Three-tier Network
- 1.24Lesson Review Virtual LANs Virtual LANs and Subnets Virtual LAN IDs and Membership Trunking and IEEE 802.1Q Tagged and Untagged Ports Voice VLANs Default VLAN and Native VLAN VLAN Routing Lab: Configure Switch IP and VLAN – GUI Lab: Create VLANs – GUI Lab: Configure Trunking Lab: Configure Switch IP Settings – CLI Lab: Configure Management VLAN Settings – CLI
- 1.25Lesson Review Routing and VLAN Troubleshooting Routing Table Issues Default Route and Routing Loop Issues VLAN Assignment Issues
- 1.26Lesson Review Module Quiz Implementing Network Services Transport and Application Layer Protocols Transport Layer Ports and Connections Transmission Control Protocol TCP Handshake and Teardown User Datagram Protocol netstat Common TCP and UDP Ports Lab: Explore Three-way Handshake in Wireshark Lab: View Open Ports with netstat
- 1.27Lesson Review Dynamic Host Configuration Protocol DHCP Process DHCP Server Configuration DHCP Options DHCP Reservations and Exclusions Lab: Configure a DHCP Server Lab: Configure DHCP Server Options Lab: Create DHCP Exclusions Lab: Create DHCP Client Reservations Configure Client Addressing (2:22) Lab: Configure Client Addressing for DHCP
- 1.28Lesson Review APIPA and SLAAC Automatic Private IP Addressing IPv6 Interface Autoconfiguration and Testing DHCPv6 Server Configuration Lab: Explore APIPA Addressing Lab: Explore APIPA Addressing in Network Modeler Set Up Alternate Addressing (3:33)
- 1.29Lesson Review DHCP Relay and Troubleshooting DHCP Relay and IP Helper DHCP Issues Troubleshooting DHCP Exhaustion (4:09) Lab: Configure a DHCP Relay Agent Lab: Add a DHCP Server on Another Subnet Lab: Troubleshoot Address Pool Exhaustion Applied Live Lab: Troubleshoot Address Pool Exhaustion Lab: Explore DHCP Troubleshooting Lab: Troubleshoot IP Configuration 1 Lab: Troubleshoot IP Configuration 2 Lab: Troubleshoot IP Configuration 3
- 1.30Lesson Review Domain Name System Host Names and Domain Names DNS Hierarchy Name Resolution Using DNS Resource Record Types Host Address and Canonical Name Records Mail Exchange, Service, and Text Records Pointer Records DNS Server Configuration Internal vs External DNS DNS Security Lab: Configure DNS Addresses Lab: Create Standard DNS Zones Lab: Create Host Records Lab: Create CNAME Records Lab: Troubleshoot DNS Records Configuring DNS Caching on Linux (4:24) Applied Live Lab: Configure DNS Records
- 1.31Lesson Review DNS Troubleshooting Client DNS Issues Name Resolution Issues nslookup dig Lab: Explore nslookup Lab: Use nslookup Applied Live Lab: Report DNS Configuration
- 1.32Lesson Review Module Quiz Checkpoint Review Explaining Application Services Application Security and Time Synchronization Transport Layer Security Network Time Protocol Precision Time Protocol Lab: Configure NTP on Linux Applied Live Lab: Troubleshoot Time Synchronization Issues
- 1.33Lesson Review Web, File, Print, and Database Services HypertextTransfer Protocol HTTP Secure File Transfer Protocol Secure File Transfer Protocol Server Message Block Network Attached Storage Database Services Live Lab: Verify Secure Web Services Lab: Scan for Web Services with Nmap
- 1.34Lesson Review Email and Voice Services Simple Mail Transfer Protocol Internet Message Access Protocol Voice and Video Services VoIP Protocols VoIP Phones Lab: Connect VoIP 1 Lab: Connect VoIP 2
- 1.35Lesson Review Disaster Recovery and High Availability Disaster Recovery Concepts Disaster Recovery Metrics Disaster Recovery Sites Fault Tolerance and Redundancy Load Balancers High Availability Clusters First Hop Redundancy Lab: Configure NIC Teaming Live Lab: Configure First Hop Redundancy
- 1.36Lesson Review Module Quiz Supporting Network Management Organizational Policies and Documentation Configuration Management Network Device Backup Management Live Lab: Backup and Restore Network Appliances Change Management Asset Inventory Documentation Lifecycle Management Decommissioning Physical Network Diagrams Logical Network Diagrams IP Address Management Common Agreements Lab: Update Firmware Live Lab: Update Network Documentation
- 1.37Lesson Review Host Discovery and Monitoring Network Discovery Nmap Nmap Port Scanning Discovery Protocols Performance Monitoring Availability Monitoring Configuration Monitoring Lab: Scan Using Zenmap Applied Live Lab: Perform Network Discovery
- 1.38Lesson Review Simple Network Management Protocol SNMP Agents and Monitors SNMP Security Configuring an SNMP System on a Router (2:39) Monitoring a Switch with SNMP (1:56) Configuring SNMP Trap (5:42) Applied Live Lab: Configure SNMP
- 1.39Lesson Review Event Management Network Device Logs Log Collectors and Syslog Event Prioritization and Alerting Security Information and Event Management Log Reviews Lab: Configure Logging in pfSense Lab: Evaluate Event Logs in pfSense Lab: Auditing Device Logs on a Cisco Switch Lab: Configure Logging on Linux Lab: View Event Logs Live Lab: Configure Log Collection Lesson Review Packet Capture and Analysis Packet Capture tcpdump Protocol Analyzers Using Wireshark to Troubleshoot Network Issues (4:23) Lab: Troubleshoot with Wireshark Lab: Configure Port Mirroring
- 1.40Lesson Review Traffic Monitoring Common Performance Issues Interface Statistics Flow Data Traffic Testing Tools Bandwidth Management Traffic Shaping Lab: Configure QoS Monitoring Interface Statistics (5:09) Live Lab: Configure Flow Collection and Analysis Applied Live Lab: Troubleshoot Network Service Issues
- 1.41Lesson Review Module Quiz Explaining Network Security Concepts Security Concepts Common Security Terminology Security Audits and Assessments Regulatory Compliance Encryption Vulnerability and Exploit Types Deception Technologies Lab: Create a Honeypot
- 1.42Lesson Review Network Threats and Attacks Threat Types and Assessment Attack Types Distributed DoS Attacks and Botnets Malware Attacks Lab: Analyze a DoS Attack Lab: Analyze a DDoS Attack
- 1.43Lesson Review Spoofing Attacks On-Path Attacks Performing an On-Path DHCP Attack (6:59) Poison ARP (5:45) MAC Flooding Attack Using SMAC to Spoof MAC Addresses (3:46) VLAN Hopping Attacks Lab: Poison ARP and Analyze with Wireshark Lab: Spoof MAC Addresses with SMAC Lab: Perform a DHCP Spoofing On-Path Attack
- 1.44Lesson Review Rogue System Attacks Rogue Devices and Services Rogue DHCP Setting Up DHCP Snooping (1:45) DNS Attacks Poisoning DNS (6:19) Lab: Discover a Rogue DHCP Server Lab: Configure DHCP Snooping Lab: Poison DNS Lab: Analyze DNS Spoofing Applied Live Lab: Analyze Network Attacks
- 1.45Lesson Review Social Engineering Social Engineering Attacks Password Attacks Lab: Respond to Social Engineering Exploits Lab: Crack a Password with John the Ripper
- 1.46Lesson Review Module Quiz Checkpoint Review Applying Network Security Features Authentication Access Control Authentication Methods Local Authentication Single Sign-On and Kerberos Digital Certificates and PKI Key Management Federated Identity and SAML Remote Authentication Live Lab: Deploy a Digital Certificate
- 1.47Lesson Review Authorization and Account Management Authorization and Role-Based Access Control Privileged Access Management Lightweight Directory Access Protocol LDAP Secure Lab: Manage Account Policies Live Lab: Configure Management Privileges
- 1.48Lesson Review Network Hardening Defense in Depth Device and Service Hardening View Linux Services Scanning for Unsecure Protocols (4:51) Lab: Scan for Unsecure Protocols Lab: Enable and Disable Linux Services Lab: Disable Network Service
- 1.49Lesson Review Switch Security Network Access Control and Port Security Lab: Secure Access to a Switch Lab: Secure Access to a Switch 2 Lab: Disable Switch Ports – GUI Extensible Authentication Protocol and IEEE 802.1X Port Guards Lab: Harden a Switch Port Mirroring
- 1.50Lesson Review Network Security Rules Security Rules and ACL Configuration Proxy Servers Content Filtering Misconfigured Firewall and ACL Issues Creating Firewall ACLs (5:51) Lab: Configure Network Security Appliance Access Lab: Configure a Security Appliance Lab: Configure a Perimeter Firewall Lab: Restrict Telnet and SSH Access Lab: Permit Traffic Lab: Block Source Hosts Applied Live Lab: Troubleshoot Service and Security Issues
- 1.51Lesson Review Module Quiz Supporting Network Security Design Zone-based Security Network Security Zones Configuring a Screened Subnet (3:40) Perimeter Networks Screened Subnets Lab: Configure a Screened Subnet (DMZ) Lab: Configure Screened Subnets Intrusion Detection and Prevention Systems Implementing Intrusion Detection and Prevention (6:18) Lab: Implement Intrusion Prevention
- 1.52Lesson Review Internet of Things IoT Devices Industrial Embedded Systems IoT Networks IoT Network Security Lab: Scan for IoT Devices Lesson Review Physical Security Locks Cameras Geofencing Lab: Implement Physical Security
- 1.53Lesson Review Module Quiz Configuring Wireless Networks Wireless Concepts and Standards IEEE 802.11 Wireless Standards IEEE 802.11a and 5GHz Channel Bandwidth IEEE 8021b/g and 2.4GHz Channel Bandwidth IEEE 802.11n, MIMO, and Channel Bonding Wi-Fi 5 and Wi-Fi 6 Multiuser MIMO and Band Steering Cellular Technologies Satellite Technologies Lab: Configure Wireless Profiles
- 1.54Lesson Review Enterprise Wireless Network Design Infrastructure Network Type Range and Signal Strength Wireless Surveys and Heat Maps Wireless Roaming Wireless Controllers Antenna Types Other Wireless Network Types Lab: Design an Indoor Wireless Network Lab: Design an Outdoor Wireless Network Lab: Implement an Enterprise Wireless Network
- 1.55Lesson Review Wireless Security Wi-Fi Encryption Standards Personal Authentication Enterprise Authentication Guest Networks and Captive Portals Bring Your Own Device Issues Wireless Network Attacks Lab: Configure a Captive Portal Lab: Create a Guest Network for BYOD Lab: Secure an Enterprise Wireless Network Lab: Secure a Home Wireless Network Lab: Enable Wireless Intrusion Prevention
- 1.56Lesson Review Wireless Troubleshooting Wireless Performance Assessment Insufficient Wireless Coverage Issues Channel Overlap Issues Interference Issues Roaming and Client Disassociation Issues Overcapacity Issues Lab: Explore Wireless Network Problems Lab: Troubleshoot Wireless Network Problems Lab: Optimize a Wireless Network
- 1.57Lesson Review Module Quiz Checkpoint Review Comparing Remote Access Methods WAN and Internet Connectivity Wide Area Networks and the OSI Model Internet Access Types Fiber to the Curb and Fiber to the Premises
- 1.58Lesson Review Virtual Private Networks Remote Access Considerations Tunneling Protocols Internet Protocol Security Internet Key Exchange Client-to-Site VPNs Clientless VPNs Site-to-Site VPNs Lab: Configure a Remote Access VPN Lab: Configure an iPad VPN Connection Lab: Configure a RADIUS Solution
- 1.59Lesson Review Remote Management Remote Host Access Secure Shell Telnet Remote Desktop Protocol Console Connections and Out-of-Bound Management Jump Boxes API Connection Methods Lab: Allow Remote Desktop Connections Lab: Use PowerShell Remote Live Lab: Configure a Jump Box
- 1.60Lesson Review Module Quiz Summarizing Cloud Concepts Datacenter and Storage Networks Data Center Network Design Spine and Leaf Topology Storage Area Networks Fibre Channel Lab: Configure an iSCSI Target Lab: Configure an iSCSI Initiator
- 1.61Lesson Review Cloud Concepts Cloud Scalability and Elasticity Cloud Deployment Models Cloud Service Models Content Delivery Networks Lab: Live Deploy a Cloud VM
- 1.62Lesson Review Cloud Networking Cloud Instances Virtual Private Clouds Cloud Gateways Cloud Connectivity Options Cloud Firewall Security Security Groups and Security Lists Live Lab: Configure Cloud Networking
- 1.63Lesson Review Modern Network Environments Infrastructure as Code Uses for Infrastructure as Code Source Control Software-Defined Networking Software-Defined WAN Overlay Networks Zero Trust Architecture Secure Access Service Edge
Lesson Review Enterprise Network Topologies Hybrid Topology Three-Tiered Network Hierarchy Compare Three-tier Hierarchical Model Lab: Create a Three-tier Network
Prev
Lesson Review Routing and VLAN Troubleshooting Routing Table Issues Default Route and Routing Loop Issues VLAN Assignment Issues
Next