- Introduction to Networks
- What’s a computer Network?
- Physical Network Topologies
- Topology Selection, Backbones, and Segments
- The Open Systems Interconnection Specifications
- Internetworking Models
- The OSI Reference Model
- Introduction to Encapsulation
- data network Modulation Techniques
- Networking Topologies, Connectors, and Wiring Standards
- Physical Media
- Cable Properties
- Wiring Standards
- Installing Wiring Distributions
- The Current Ethernet Specifications
- Network Basics
- Networking Devices
- Introduction to the Internet Protocol
- IP Addressing
- IP Subnetting, Troubleshooting IP, and Introduction to NAT
- Introduction to IP Routing
- Routing Protocols
- Switching and Virtual LANs
- Wireless Networking
- Authentication and Access Control
- Network Threats and Mitigation
- Physical Security and Risk
- Wide Area Networks
- Troubleshooting Tools
- Software and Hardware Tools
- Network Troubleshooting
- Management, Monitoring, and Optimization
Network Models
- What is a Model?
- OSI vs. TCP/IP Model
- Walking Through OSI and TCP/IP
- Meet the Frame
- The MAC Address
- Broadcast vs. Unicast
- Introduction to IP Addressing
- Packets and Ports
Cabling and Topology
- Network Topologies
- Coaxial Cabling
- Twisted Pair Cabling
- Cat Ratings
- Fiber Optic Cabling
- Fire Ratings
- Legacy Network Connections
Ethernet Basics
- What is Ethernet?
- Ethernet Frames
- Early Ethernet
- The Daddy of Ethernet, 10BaseT
- Terminating Twisted Pair
- Hubs vs. Switches
Modern Ethernet
- 100BaseT
- Connecting Switches
- Gigabit Ethernet and 10-Gigabit Ethernet
- Transceivers
- Connecting Ethernet Scenarios
Installing a Physical Network
- Introduction to Structured Cabling
- Terminating Structured Cabling
- Equipment Room
- Alternative Distribution Panels
- Testing Cable
- Troubleshooting Structured Cabling
- Using a Toner and Probe
- Wired Connection Scenarios
TCP/IP Basics
- introduction to IP Addressing and Binary
- Introduction to ARP
- Classful Addressing
- Subnet Masks
- Subnetting with CIDR
- More CIDR Subnetting Practice
- Dynamic and Static IP Addressing
- Rogue DHCP Servers
- Special IP Addresses
- IP Addressing Scenarios
Routing
- Introducing Routers
- Understanding Ports
- Network Address Translation
- Implementing NAT
- Forwarding Ports
- Tour of a SOHO Router
- SOHO vs. Enterprise
- Static Routes
- Dynamic Routing
- RIP
- OSPF
- BGP
TCP/IP Applications
- TCP and UDP
- ICMP and IGMP
- Handy Tools
- Introduction to Wireshark
- Introduction to netstat
- Web Servers
- FTP
- E-mail Servers and Clients
- Securing E-mail
- Telnet and SSH
- Network Time Protocol
- Network Service Scenarios
Network Naming
Securing TCP/IP
Advanced Networking Devices
- Understanding IP Tunneling
- Virtual Private Networks
- Introduction to VLANs
- InterVLAN Routing
- Interfacing with Managed Switches
- Switch Port Protection
- Port Bonding
- Port Mirroring
- Quality of Service
- IDS vs. IPS
- Proxy Servers
- Load Balancing
- Device Placement Scenarios
IPv6
- Introduction to IPv6
- IPv6 Addressing
- IPv6 In Action
- IPv4 and IPv6 Tunneling
Remote Connectivity
Wireless Networking
- Introduction to 802.11
- 802.11 Standards
- Power over Ethernet (PoE)
- Antennas
- Wireless Security Standards
- Implementing Wireless Security
- Threats to Your Wireless Network
- Retro Threats
- Wi-Fi Protected Setup (WPS)
- Enterprise Wireless
- Installing a Wireless Network
- Wireless Scenarios
- More Wireless Scenarios
Virtualization and Cloud Computing
Mobile Networking
- Cellular Technologies
- Mobile Connectivity
- Deploying Mobile Devices
- Mobile Access Control
Building a Real-World Network
- Network Types
- Network Design
- Power Management
- Unified Communications
- Network Documentation
- Contingency Planning
- Predicting Hardware Failure
- Backups
Managing Risk
- What is Risk Management?
Protecting Your Network
Network Monitoring
- SNMP
- Documenting Logs
- System Monitoring
- SIEM (Security Information and Event Management)
Network Troubleshooting
- Network Troubleshooting Theory