DATACOMM ENGINEER LEVEL 1 TRAINING OUTLINE (16 HOURS)
Lesson 1: Introduction to Network
First Things First: What’s a Network?
- The Local Area Network (LAN)
- Common Network Components
- Wide Area Network (WAN)
- Network Architecture: Peer-to-Peer or Client-Server?
Physical Network Topologies
- Bus Topology
- Star Topology
- Ring Topology
- Mesh Topology
- Point-to-Point Topology
- Point-to-to-Multipoint Topology
- Hybrid Topology
Topology Selection, Backbones, and Segments
- Selecting the Right Topology
- The Network backbone
- Network Segments
Lesson 2: The Open Systems InterconnectionSpecifications
Internetworking Models
- The Layered Approach
- Advantages of Reference Models The OSI Reference Model
- The Application Layer
- The Presentation Layer
- The Session Layer
- The Transport Layer
- The Network Layer
- The Data Link Layer
- The Physical Layer Introduction to Encapsulation
Lesson 3: Networking Topologies, Connectors, andWiring Standards
Physical Media
- Coaxial Cable
- Twisted-Pair Cable
- Fiber-Optic Cable
- Media converters
- Serial cables
Cable Properties
- Transmission Speeds
- Distance
- Duplex
- Noise Immunity (Security, EMI)
Frequency and Wiring Standards
- 568A 568B
- Straight-Through Cable
- Crossover Cable
- T1 Crossover Cable Installing Wiring Distributions
Lesson 4: The Current Ethernet Specifications
Network Basics Ethernet Basics
- Collision Domain
- Broadcast Domain
- CSMA/CD
- Broadband/Baseband
- Bit Rates vs Baud Rate
- Wavelength
- Sampling-Size
- Half and Full-Duplex Ethernet
Ethernet at the Data Link Layer
- Binary to Decimal and Hexadecimal Conversion
- Ethernet Addressing
- Ethernet Frames
Lesson 5: Networking Devices
Common Network Connectivity Devices
- Network Interface Card
- Hub
- Bridge
- Switch
- Router
- Firewall
- DS/IPS
- HIDS
- Access Point
- Dynamic Host Configuration Protocol Server Specialized Devices
- Multilayer Switch
- Load Balancer
- Domain Name Service Server
- Proxy Server
- Encryption Devices
- Analog Modem
- Packet Shaper
- VPN Concentrator
Planning and Implementing a Basic SOHO Network
- Using Network Segmentation
- Determining Requirements
- Switches and Bridges at the Data Link Layer
- Hubs at the Physical Layer
- Environmental Considerations
Lesson 6: Introduction to the Internet Protocol
Introducing TCP/IP
- A Brief History of TCP/IP
- TCP/IP and the DoD Model
- The Process/Application Layer Protocols
- The Host-to-Host Layer Protocols
- The Internet Layer Protocols Data Encapsulation
Lesson 7: IP Addressing
IP Terminology
The Hierarchical IP Addressing Scheme
- Network Addressing
- Private IP Addresses (RFC 1918) IPv4 Address Types
- Layer 2 Broadcasts
- Layer 3 Broadcasts
- Unicast Address
- Multicast Address (Class D) Internet Protocol Version 6 (IPv6)
- Why Do We Need IPv6?
- The Benefits of and Uses for IPv6
- IPv6 Addressing and Expressions
- Shortened Expression
- Address Types
- Special Addresses
- Stateless Auto-configuration (EUI-64)
- DHCPv6 (Stateful)
- Migrating to IPv6
Lesson 8: IP Subnetting, Troubleshooting IP and Introduction to NAT
Subnetting Basics
- How to Create Subnets
- Subnet Masks
- Classless Inter-Domain Routing (CIDR)
- Subnetting Class C Addresses
- Subnetting Class B Addresses Troubleshooting IP Addressing
- Determining IP Addressing Problems
Introduction to Network Address Translation (NAT)
- Types of Network Address Translation
- NAT Names
- How NAT Works
Chapter 9: Introduction to IP Routing
- Routing Basics
- The IP Routing Process
- Testing Your IP Routing Understanding
- Static and Dynamic Routing
Chapter 10: Routing Protocols
Routing Protocols Basics
- Administrative Distances
- Classes of Routing Protocols
- Distance Vector Routing Protocols Routing Information Protocol (RIP)
- RIP Version 2 (RIPv2)
- VLSM and Discontiguous Networks
- EIGRP
- Border Gateway Protocol (BGP) Link State Routing Protocols
- Open Shortest Path First (BGP)
- Intermediate System-to-Intermediate System (IS-IS) High availability
- Hot Standby Router Protocol (HSRP)
- Virtual Router Redundancy Protocol IPv6 Routing Protocols
IPv6 Routing Protocols
Chapter 11: Switching and Virtual LANs
Networking Before Layer 2 Switching Switching Services
- Limitations of Layer 2 Switching
- Bridging LAN Switching
- Three Switch Functions at Layer 2 Spanning Tree Protocol
- Spanning-Tree Port States
- STP Convergence
- Rapid Spanning Tree Protocol 802.1w Virtual LANs
- VLAN Basics
- Quality of Service
- VLAN Memberships
- Static VLANs
- Dynamic VLANs
- Identifying VLANs
- VLANs Identification Methods VLAN Trunking Protocol
- VTP Modes of Operation
- Do we Really Need to Put an IP address on a Switch
- Port Security
- Port Bonding
Two Additional Advanced Features of Switches
- Power over Ethernet (802.3af,802.3at)
- Port Mirroring/ Spanning (SPAN/RSPAN)
Chapter 12: Wireless Networking
Introduction to Wireless TechnologyThe 802.11 Standards
- 4GHz (802.11b)
- 4 GHz (802.11g)
- 5GHz (802.11a)
- 5GHz (802.11h)
- 4GHz/5GHz (802.11n)
Comparing 802.11 Standards
Wireless Network Components
Wireless Access Points
Wireless Network Interface Card
Wireless Antennas
Installing a Wireless Network
- Ad Hoc Mode: Independent Basic Service Set
- Infrastructure Mode: Basic Service Set
- Wireless Controllers
- Mobile Hot Spots
- Signal Degradation
- Other Network Infrastructure Implementations
- Installing and Configuring WLAN Hardware Site Survey
Wireless Security
- Wireless Threats
- Open Access
- Service Set Identifiers, Wired Equivalent Privacy, and Media Access Control Address Authentication
- Remote Authentication Dial-In User Service (802.1x)
- Temporal Key Integrity Protocol
- Wi-Fi Protected Access or WPA2 Pre-Shared Key
Chapter 13: Authentication and Access Control
Security Filtering
- Access Control Lists
- Tunneling
- Encryption
- Remote Access
Managing User Account and Password Security
- Managing User Accounts
- Managing Passwords
- Single Sign-On
- Multifactor Authentication User-Authentication Methods
- Public Key Infrastructure
- Kerberos
- Authentication, Authorization, and Accounting (AAA)
- Web Services
- Unified Voice Services
- Network Controllers
- Network Access Control (NAC)
- Challenge Handshake Authentication Protocol (CHAP)
- MS-CHAP
- Extensible Authentication Protocol (EAP)
- Hashes
- Network Access Control
Chapter 14: Network Threats and Mitigation
Recognizing Security Threats
- Denial of Service
- Distributed Dos (DDos)
- Authentication Issues
- Zero Day Attacks
- Insider Threat/Malicious Employee Vulnerabilities
- Unnecessary Running Services
- Open Ports
- Unpatched/Legacy Systems
- Unencrypted Channels
- Clear-Text Credentials
- TEMPEST/RF Emanation
- Malicious Users
- Buffer Overflow
- Wireless Threats
- Attackers and Their Tools
- Misconfiguring Issues
- Social Engineering (Phishing) Understanding Mitigation Techniques
- Active Detection
- Passive Detection
- Proactive Defense
- Basic Forensic Concepts Policies and Procedures
- Security Policies
- Security Training
- Patches and Upgrades
- Firmware Updates
- Driver Updates
- Upgrading Downgrading Anti-malware software
- Host-based
- Cloud/Server based
- Configuration Backups
- Updating Antivirus Components
- Fixing an Infected Computer
Chapter 15: Physical Security and Risk
Using Hardware and Software Security Devices Defining Firewalls
- Network-Based Firewalls
- Host-Based Firewalls Firewall Technologies
- Access Control Lists
- Port Security
- Demilitarized Zone
- Protocol Switching
- Dynamic Packet Filtering
- Proxy Services
Firewalls at the Application Layer vs. the Network Layer
- Stateful Stateless Network Layer Firewalls
- Application Layer Firewalls
Scanning Services and Other Firewall Features
- Content Filtering
- Signature Identification
- Context Awareness
- Virtual Wire vs Routed
- Zones
Intrusion Detection and Prevention Systems
- Network-Based IDS
- Hot-Based IDS
- Vulnerability Scanners
- VPN Concentrators
Understanding Problems Affecting Device Security
- Physical Security
- Logical Security Configurations
- Risk-Related Concepts
Chapter 16: Wide Area Networks
What’s a WAN?
- Defining WAN Terms
- The Public Switched Telephone Network
- WAN Connection Types
- Bandwidth or Speed T-Series Connections
- The T1 Connection
- The T3 Connection Transmission Media
- Wired Connections
- Dense Wavelength Division Multiplexing
- Passive Optical Network
- Wireless Technologies Broadband Services
- DSL Technology and xDSL
- Cable Modem Wireless WAN Technologies
- Cellular WAN WAN Protocols
- Integrated Services Digital Network
- Frame Relay Technology
- Point to Point Protocol
- Asynchronous Transfer Mode
- MPLS
WAN Troubleshooting
- Loss of Internet Connectivity
- Interface Errors/Monitoring
- Split Horizon
- DNS Issues
- Router configurations
- Company Security Policy
Chapter 17: Troubleshooting Tools
Protocol Analyzers Throughput Testers Connectivity Software Using Traceroute
Using ipconfiq and ifconfiq
- Using the ipconfiq Utility
- Using the ifconfiq Utility Using the ping Utility Using the Address Resolution Protocol
- The Windows ARP Table
- Using the arp Utility Using the nslookup Utility
Resolving Names with the Hosts Table Using the Mtr Command
Using the route Command
- Using the route Command Options
- Some Examples of the route command
Using the nbtstat Utility
- The – a Switch
- The – A Switch
- The – c Switch
- The – n Switch
- The – r Switch
- The – R Switch
- The – S Switch
The – s Switch Using the netstat Utility
- The – a Switch
- The – e Switch
- The – r Switch
- The – s Switch
- The – p Switch
- The – n Switch
Using the File Transfer Protocol
- Starting FTP and Logging In to an FTP Server
- Downloading Files
- Uploading Files Using the Telnet Utility
- How to Enable Telnet in Windows
- Don’t Use Telnet, Use Secure Shell
Chapter 18: Software and Hardware Tools
Understanding Network Scanners
- Packet Sniffers/Network Monitors
- Intrusion Detection and Prevention Software
- Port Scanners
- Wi-Fi Analyzer Baseline Network Monitoring and Logging
- Network Monitoring
- SNMP
- Syslog
- SIEM
- Utilization
Identifying Hardware Tools
- Cable Testers
- Protocol Analyzer
- Certifiers
- Time-Domain Reflectometer
- Optical Time-Domain Reflectometer
- Multimeter
- Toner Probe
- Butt Set
- Punch-Down Tool
- Cable Stripper/Snips
- Voltage Event Recorder (Power)
- Environmental Monitors
Chapter 19: Network Troubleshooting
Narrowing Down the Problem
- Did You Check the Super Simple Stuff?
- Is Hardware or Software Causing the Problem?
- Is it a Workstation or a Server Problem?
- Which Segments of the Network Are Affected?
- Is It Bad Cabling
- Troubleshooting Steps
Step 1: Identify the Problem
Step 2: Establish a Theory of Probable Cause Step 3: Test the Theory to Determine Cause
Step 4: Establish a Plan of Action to Resolve the Problem and Identify Potential Effects Step 5: Implement the Solution or Escalate as Necessary
Step 6: Verify Full System Functionality and if applicable Implement Preventative Measures
Step 7: Document Findings, Actions and Outcomes Troubleshooting Tips
Don’t Overlook the Small Stuff Prioritize Your Problems
Check the Software Configuration Don’t Overlook Physical Conditions Don’t Overlook Cable Problems Check for Viruses
Chapter 20: Management, Monitoring, and Optimization
Managing Network Documentation
- Using SNMP
- Schematics and Diagrams Networking Monitoring
- Baselines
- On-boarding and Off-boarding of Mobile Devices
- NAC
- Policies, Procedures, and Regulations
- Safety Practices
- Implementing Network Segmentation Network Optimization
- Reasons to Optimize Your Network’s Performance
- How to Optimize Performance
- Unified Communications
- Traffic Shaping
- Load Balancing
- High availability
- Caching Engines
- Fault Tolerance
- Archives/Backups
- Common Address Redundancy Protocol
- Virtual Networking
- Locating and Installing Equipment
- Change Management Procedures