Have any question?      +971 50 326 4554   info@pcdc.pk

Datacomm Engineer Level 1 Training

Course ID
DCELVL1
Campus
PCDC
Level
Beginner
Method
Class Room, Online

We are happy to offer you Datacomm Engineer Level 1 Training

We train in different languages – English, Hindi, Malayalam, Urdu and Tagalog and have built a reputation for excellence.

DATACOMM ENGINEER LEVEL 1 TRAINING OUTLINE (16 HOURS)

Lesson 1: Introduction to Network

First Things First: What’s a Network?

  • The Local Area Network (LAN)
  • Common Network Components
  • Wide Area Network (WAN)
  • Network Architecture: Peer-to-Peer or Client-Server?

Physical Network Topologies

  • Bus Topology
  • Star Topology
  • Ring Topology
  • Mesh Topology
  • Point-to-Point Topology
  • Point-to-to-Multipoint Topology
  • Hybrid Topology

Topology Selection, Backbones, and Segments

  • Selecting the Right Topology
  • The Network backbone
  • Network Segments

Lesson 2: The Open Systems InterconnectionSpecifications

Internetworking Models

  • The Layered Approach
  • Advantages of Reference Models The OSI Reference Model
  • The Application Layer
  • The Presentation Layer
  • The Session Layer
  • The Transport Layer
  • The Network Layer
  • The Data Link Layer
  • The Physical Layer Introduction to Encapsulation

Lesson 3: Networking Topologies, Connectors, andWiring Standards

Physical Media

  • Coaxial Cable
  • Twisted-Pair Cable
  • Fiber-Optic Cable
  • Media converters
  • Serial cables

Cable Properties

  • Transmission Speeds
  • Distance
  • Duplex
  • Noise Immunity (Security, EMI)

Frequency and Wiring Standards

  • 568A 568B
  • Straight-Through Cable
  • Crossover Cable
  • T1 Crossover Cable Installing Wiring Distributions

Lesson 4: The Current Ethernet Specifications

Network Basics Ethernet Basics

  • Collision Domain
  • Broadcast Domain
  • CSMA/CD
  • Broadband/Baseband
  • Bit Rates vs Baud Rate
  • Wavelength
  • Sampling-Size
  • Half and Full-Duplex Ethernet

Ethernet at the Data Link Layer

  • Binary to Decimal and Hexadecimal Conversion
  • Ethernet Addressing
  • Ethernet Frames

Lesson 5: Networking Devices

Common Network Connectivity Devices

  • Network Interface Card
  • Hub
  • Bridge
  • Switch
  • Router
  • Firewall
  • DS/IPS
  • HIDS
  • Access Point
  • Dynamic Host Configuration Protocol Server Specialized Devices
  • Multilayer Switch
  • Load Balancer
  • Domain Name Service Server
  • Proxy Server
  • Encryption Devices
  • Analog Modem
  • Packet Shaper
  • VPN Concentrator

Planning and Implementing a Basic SOHO Network

  • Using Network Segmentation
  • Determining Requirements
  • Switches and Bridges at the Data Link Layer
  • Hubs at the Physical Layer
  • Environmental Considerations

Lesson 6: Introduction to the Internet Protocol

Introducing TCP/IP

  • A Brief History of TCP/IP
  • TCP/IP and the DoD Model
  • The Process/Application Layer Protocols
  • The Host-to-Host Layer Protocols
  • The Internet Layer Protocols Data Encapsulation

Lesson 7: IP Addressing

IP Terminology

The Hierarchical IP Addressing Scheme

  • Network Addressing
  • Private IP Addresses (RFC 1918) IPv4 Address Types
  • Layer 2 Broadcasts
  • Layer 3 Broadcasts
  • Unicast Address
  • Multicast Address (Class D) Internet Protocol Version 6 (IPv6)
  • Why Do We Need IPv6?
  • The Benefits of and Uses for IPv6
  • IPv6 Addressing and Expressions
  • Shortened Expression
  • Address Types
  • Special Addresses
  • Stateless Auto-configuration (EUI-64)
  • DHCPv6 (Stateful)
  • Migrating to IPv6

Lesson 8: IP Subnetting, Troubleshooting IP and Introduction to NAT

Subnetting Basics

  • How to Create Subnets
  • Subnet Masks
  • Classless Inter-Domain Routing (CIDR)
  • Subnetting Class C Addresses
  • Subnetting Class B Addresses Troubleshooting IP Addressing
  • Determining IP Addressing Problems

Introduction to Network Address Translation (NAT)

  • Types of Network Address Translation
  • NAT Names
  • How NAT Works

Chapter 9: Introduction to IP Routing

  • Routing Basics
  • The IP Routing Process
  • Testing Your IP Routing Understanding
  • Static and Dynamic Routing

Chapter 10: Routing Protocols

Routing Protocols Basics

  • Administrative Distances
  • Classes of Routing Protocols
  • Distance Vector Routing Protocols Routing Information Protocol (RIP)
  • RIP Version 2 (RIPv2)
  • VLSM and Discontiguous Networks
  • EIGRP
  • Border Gateway Protocol (BGP) Link State Routing Protocols
  • Open Shortest Path First (BGP)
  • Intermediate System-to-Intermediate System (IS-IS) High availability
  • Hot Standby Router Protocol (HSRP)
  • Virtual Router Redundancy Protocol IPv6 Routing Protocols

IPv6 Routing Protocols

  • RIPng
  • EIGRPv6
  • OSPFv3

Chapter 11: Switching and Virtual LANs

Networking Before Layer 2 Switching Switching Services

  • Limitations of Layer 2 Switching
  • Bridging LAN Switching
  • Three Switch Functions at Layer 2 Spanning Tree Protocol
  • Spanning-Tree Port States
  • STP Convergence
  • Rapid Spanning Tree Protocol 802.1w Virtual LANs
  • VLAN Basics
  • Quality of Service
  • VLAN Memberships
  • Static VLANs
  • Dynamic VLANs
  • Identifying VLANs
  • VLANs Identification Methods VLAN Trunking Protocol
  • VTP Modes of Operation
  • Do we Really Need to Put an IP address on a Switch
  • Port Security
  • Port Bonding

Two Additional Advanced Features of Switches

  • Power over Ethernet (802.3af,802.3at)
  • Port Mirroring/ Spanning (SPAN/RSPAN)

Chapter 12: Wireless Networking

Introduction to Wireless TechnologyThe 802.11 Standards

  • 4GHz (802.11b)
  • 4 GHz (802.11g)
  • 5GHz (802.11a)
  • 5GHz (802.11h)
  • 4GHz/5GHz (802.11n)

Comparing 802.11 Standards

  • Range Comparisons

Wireless Network Components

Wireless Access Points

Wireless Network Interface Card

Wireless Antennas

Installing a Wireless Network

  • Ad Hoc Mode: Independent Basic Service Set
  • Infrastructure Mode: Basic Service Set
  • Wireless Controllers
  • Mobile Hot Spots
  • Signal Degradation
  • Other Network Infrastructure Implementations
  • Installing and Configuring WLAN Hardware Site Survey

Wireless Security

  • Wireless Threats
  • Open Access
  • Service Set Identifiers, Wired Equivalent Privacy, and Media Access Control Address Authentication
  • Remote Authentication Dial-In User Service (802.1x)
  • Temporal Key Integrity Protocol
  • Wi-Fi Protected Access or WPA2 Pre-Shared Key

Chapter 13: Authentication and Access Control

Security Filtering

  • Access Control Lists
  • Tunneling
  • Encryption
  • Remote Access

Managing User Account and Password Security

  • Managing User Accounts
  • Managing Passwords
  • Single Sign-On
  • Multifactor Authentication User-Authentication Methods
  • Public Key Infrastructure
  • Kerberos
  • Authentication, Authorization, and Accounting (AAA)
  • Web Services
  • Unified Voice Services
  • Network Controllers
  • Network Access Control (NAC)
  • Challenge Handshake Authentication Protocol (CHAP)
  • MS-CHAP
  • Extensible Authentication Protocol (EAP)
  • Hashes
  • Network Access Control

Chapter 14: Network Threats and Mitigation

Recognizing Security Threats

  • Denial of Service
  • Distributed Dos (DDos)
  • Authentication Issues
  • Zero Day Attacks
  • Insider Threat/Malicious Employee Vulnerabilities
  • Unnecessary Running Services
  • Open Ports
  • Unpatched/Legacy Systems
  • Unencrypted Channels
  • Clear-Text Credentials
  • TEMPEST/RF Emanation
  • Malicious Users
  • Buffer Overflow
  • Wireless Threats
  • Attackers and Their Tools
  • Misconfiguring Issues
  • Social Engineering (Phishing) Understanding Mitigation Techniques
  • Active Detection
  • Passive Detection
  • Proactive Defense
  • Basic Forensic Concepts Policies and Procedures
  • Security Policies
  • Security Training
  • Patches and Upgrades
  • Firmware Updates
  • Driver Updates
  • Upgrading Downgrading Anti-malware software
  • Host-based
  • Cloud/Server based
  • Configuration Backups
  • Updating Antivirus Components
  • Fixing an Infected Computer

Chapter 15: Physical Security and Risk

Using Hardware and Software Security Devices Defining Firewalls

  • Network-Based Firewalls
  • Host-Based Firewalls Firewall Technologies
  • Access Control Lists
  • Port Security
  • Demilitarized Zone
  • Protocol Switching
  • Dynamic Packet Filtering
  • Proxy Services

Firewalls at the Application Layer vs. the Network Layer

  • Stateful Stateless Network Layer Firewalls
  • Application Layer Firewalls

Scanning Services and Other Firewall Features

  • Content Filtering
  • Signature Identification
  • Context Awareness
  • Virtual Wire vs Routed
  • Zones

Intrusion Detection and Prevention Systems

  • Network-Based IDS
  • Hot-Based IDS
  • Vulnerability Scanners
  • VPN Concentrators

Understanding Problems Affecting Device Security

  • Physical Security
  • Logical Security Configurations
  • Risk-Related Concepts

Chapter 16: Wide Area Networks

What’s a WAN?

  • Defining WAN Terms
  • The Public Switched Telephone Network
  • WAN Connection Types
  • Bandwidth or Speed T-Series Connections
  • The T1 Connection
  • The T3 Connection Transmission Media
  • Wired Connections
  • Dense Wavelength Division Multiplexing
  • Passive Optical Network
  • Wireless Technologies Broadband Services
  • DSL Technology and xDSL
  • Cable Modem Wireless WAN Technologies
  • Cellular WAN WAN Protocols
  • Integrated Services Digital Network
  • Frame Relay Technology
  • Point to Point Protocol
  • Asynchronous Transfer Mode
  • MPLS

WAN Troubleshooting

  • Loss of Internet Connectivity
  • Interface Errors/Monitoring
  • Split Horizon
  • DNS Issues
  • Router configurations
  • Company Security Policy

Chapter 17: Troubleshooting Tools

Protocol Analyzers Throughput Testers Connectivity Software Using Traceroute

Using ipconfiq and ifconfiq

  • Using the ipconfiq Utility
  • Using the ifconfiq Utility Using the ping Utility Using the Address Resolution Protocol
  • The Windows ARP Table
  • Using the arp Utility Using the nslookup Utility

Resolving Names with the Hosts Table Using the Mtr Command

Using the route Command

  • Using the route Command Options
  • Some Examples of the route command

Using the nbtstat Utility

  • The – a Switch
  • The – A Switch
  • The – c Switch
  • The – n Switch
  • The – r Switch
  • The – R Switch
  • The – S Switch

The – s Switch Using the netstat Utility

  • The – a Switch
  • The – e Switch
  • The – r Switch
  • The – s Switch
  • The – p Switch
  • The – n Switch

Using the File Transfer Protocol

  • Starting FTP and Logging In to an FTP Server
  • Downloading Files
  • Uploading Files Using the Telnet Utility
  • How to Enable Telnet in Windows
  • Don’t Use Telnet, Use Secure Shell

Chapter 18: Software and Hardware Tools

Understanding Network Scanners

  • Packet Sniffers/Network Monitors
  • Intrusion Detection and Prevention Software
  • Port Scanners
  • Wi-Fi Analyzer Baseline Network Monitoring and Logging
  • Network Monitoring
  • SNMP
  • Syslog
  • SIEM
  • Utilization

Identifying Hardware Tools

  • Cable Testers
  • Protocol Analyzer
  • Certifiers
  • Time-Domain Reflectometer
  • Optical Time-Domain Reflectometer
  • Multimeter
  • Toner Probe
  • Butt Set
  • Punch-Down Tool
  • Cable Stripper/Snips
  • Voltage Event Recorder (Power)
  • Environmental Monitors

Chapter 19: Network Troubleshooting

Narrowing Down the Problem

  • Did You Check the Super Simple Stuff?
  • Is Hardware or Software Causing the Problem?
  • Is it a Workstation or a Server Problem?
  • Which Segments of the Network Are Affected?
  • Is It Bad Cabling
  • Troubleshooting Steps

Step 1: Identify the Problem

Step 2: Establish a Theory of Probable Cause Step 3: Test the Theory to Determine Cause

Step 4: Establish a Plan of Action to Resolve the Problem and Identify Potential Effects Step 5: Implement the Solution or Escalate as Necessary

Step 6: Verify Full System Functionality and if applicable Implement Preventative Measures

Step 7: Document Findings, Actions and Outcomes Troubleshooting Tips

Don’t Overlook the Small Stuff Prioritize Your Problems

Check the Software Configuration Don’t Overlook Physical Conditions Don’t Overlook Cable Problems Check for Viruses

Chapter 20: Management, Monitoring, and Optimization

Managing Network Documentation

  • Using SNMP
  • Schematics and Diagrams Networking Monitoring
  • Baselines
  • On-boarding and Off-boarding of Mobile Devices
  • NAC
  • Policies, Procedures, and Regulations
  • Safety Practices
  • Implementing Network Segmentation Network Optimization
  • Reasons to Optimize Your Network’s Performance
  • How to Optimize Performance
  • Unified Communications
  • Traffic Shaping
  • Load Balancing
  • High availability
  • Caching Engines
  • Fault Tolerance
  • Archives/Backups
  • Common Address Redundancy Protocol
  • Virtual Networking
  • Locating and Installing Equipment
  • Change Management Procedures

We are just a call away for help you to start your journey  Level 1 Diploma in Network Engineer

Benefits:

This qualification enables the learner, to recognise their skills, knowledge and understanding as well as demonstrating their competence in the workplace when carrying out the role of a Netword Engineer.

Requirements:

There are no formal entry requirements for this qualification, however candidates must have a stable internet connection and a computer or tablet with a camera and audio capabilities and be able to log onto Zoom to attend both the induction session as well as each unit based professional discussion session.

Entry Requirements:

There are no formal entry requirements for this qualification.  Centres should carry out an initial assessment of candidate skills and knowledge to identify any gaps and help plan the assessment. 

Mode of study

  • Online Training (Through Zoom )

  • Recorded Training Lectures

Materials Provided

Course participants will receive:

  • Study outline

  • Workbooks and practice problems

  • Suggested resources and study aids

  • Past Papers

  • Guidance on areas where you need additional preparation

For Any Inquiry Just Leave A Message