network Engineering Basics

  1. Introduction to Networks
  2. The Open Systems Interconnection Specifications
  3. Networking Topologies, Connectors, and Wiring Standards
    • Physical Media
    • Cable Properties
    • Wiring Standards
    • Installing Wiring Distributions
  4. The Current Ethernet Specifications
    • Network Basics
  5. Networking Devices
  6. Introduction to the Internet Protocol
  7. IP Addressing
  8. IP Subnetting, Troubleshooting IP, and Introduction to NAT
  9. Introduction to IP Routing
  10. Routing Protocols
  11. Switching and Virtual LANs
  12. Wireless Networking
  13. Authentication and Access Control
  14. Network Threats and Mitigation
  15. Physical Security and Risk
  16. Wide Area Networks
  17. Troubleshooting Tools
  18. Software and Hardware Tools
  19. Network Troubleshooting
  20. Management, Monitoring, and Optimization

Network Models

  • What is a Model?
  • OSI vs. TCP/IP Model
  • Walking Through OSI and TCP/IP
  • Meet the Frame
  • The MAC Address
  • Broadcast vs. Unicast
  • Introduction to IP Addressing
  • Packets and Ports

Cabling and Topology

  • Network Topologies
  • Coaxial Cabling
  • Twisted Pair Cabling
  • Cat Ratings
  • Fiber Optic Cabling
  • Fire Ratings
  • Legacy Network Connections

Ethernet Basics

  • What is Ethernet?
  • Ethernet Frames
  • Early Ethernet
  • The Daddy of Ethernet, 10BaseT
  • Terminating Twisted Pair
  • Hubs vs. Switches

Modern Ethernet

  • 100BaseT
  • Connecting Switches
  • Gigabit Ethernet and 10-Gigabit Ethernet
  • Transceivers
  • Connecting Ethernet Scenarios

Installing a Physical Network

  • Introduction to Structured Cabling
  • Terminating Structured Cabling
  • Equipment Room
  • Alternative Distribution Panels
  • Testing Cable
  • Troubleshooting Structured Cabling
  • Using a Toner and Probe
  • Wired Connection Scenarios

TCP/IP Basics

  • introduction to IP Addressing and Binary
  • Introduction to ARP
  • Classful Addressing
  • Subnet Masks
  • Subnetting with CIDR
  • More CIDR Subnetting Practice
  • Dynamic and Static IP Addressing
  • Rogue DHCP Servers
  • Special IP Addresses
  • IP Addressing Scenarios

Routing

  • Introducing Routers
  • Understanding Ports
  • Network Address Translation
  • Implementing NAT
  • Forwarding Ports
  • Tour of a SOHO Router
  • SOHO vs. Enterprise
  • Static Routes
  • Dynamic Routing
  • RIP
  • OSPF
  • BGP

TCP/IP Applications

  • TCP and UDP
  • ICMP and IGMP
  • Handy Tools
  • Introduction to Wireshark
  • Introduction to netstat
  • Web Servers
  • FTP
  • E-mail Servers and Clients
  • Securing E-mail
  • Telnet and SSH
  • Network Time Protocol
  • Network Service Scenarios

Network Naming

Securing TCP/IP

Advanced Networking Devices

  • Understanding IP Tunneling
  • Virtual Private Networks
  • Introduction to VLANs
  • InterVLAN Routing
  • Interfacing with Managed Switches
  • Switch Port Protection
  • Port Bonding
  • Port Mirroring
  • Quality of Service
  • IDS vs. IPS
  • Proxy Servers
  • Load Balancing
  • Device Placement Scenarios

IPv6

  • Introduction to IPv6
  • IPv6 Addressing
  • IPv6 In Action
  • IPv4 and IPv6 Tunneling

Remote Connectivity

Wireless Networking

  • Introduction to 802.11
  • 802.11 Standards
  • Power over Ethernet (PoE)
  • Antennas
  • Wireless Security Standards
  • Implementing Wireless Security
  • Threats to Your Wireless Network
  • Retro Threats
  • Wi-Fi Protected Setup (WPS)
  • Enterprise Wireless
  • Installing a Wireless Network
  • Wireless Scenarios
  • More Wireless Scenarios

Virtualization and Cloud Computing

Mobile Networking

  • Cellular Technologies
  • Mobile Connectivity
  • Deploying Mobile Devices
  • Mobile Access Control

Building a Real-World Network

  • Network Types
  • Network Design
  • Power Management
  • Unified Communications
  • Network Documentation
  • Contingency Planning
  • Predicting Hardware Failure
  • Backups

Managing Risk

  • What is Risk Management?

Protecting Your Network

Network Monitoring

  • SNMP
  • Documenting Logs
  • System Monitoring
  • SIEM (Security Information and Event Management)

Network Troubleshooting

  • Network Troubleshooting Theory

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.