Introduction |
|
1 | (2) |
|
Personal Computer Hardware |
|
|
3 | (14) |
|
|
3 | (1) |
|
How and Where Computers are Used |
|
|
3 | (1) |
|
Local and Network Applications |
|
|
3 | (1) |
|
|
4 | (2) |
|
|
4 | (1) |
|
Servers, Desktops and Workstations |
|
|
5 | (1) |
|
|
5 | (1) |
|
Binary Representation of Data |
|
|
6 | (2) |
|
Representing Information Digitally |
|
|
6 | (1) |
|
Measuring Data Storage Capacity |
|
|
7 | (1) |
|
Measuring Speed, Resolution and Frequency |
|
|
7 | (1) |
|
Computer Components and Peripherals |
|
|
8 | (4) |
|
|
8 | (1) |
|
Motherboard, CPU, and RAM |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
12 | (1) |
|
Computer System Components |
|
|
12 | (5) |
|
Safety and Best Practices |
|
|
13 | (1) |
|
Installing Components and Verifying Operation |
|
|
13 | (1) |
|
Installing Peripherals and Verifying Operation |
|
|
14 | (2) |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
17 | (8) |
|
|
17 | (2) |
|
Purpose of an Operating System |
|
|
17 | (1) |
|
Operating System Requirements |
|
|
18 | (1) |
|
Operating System Selection |
|
|
19 | (1) |
|
Installing the Operating System |
|
|
19 | (3) |
|
|
19 | (1) |
|
Preparing for OS Installation |
|
|
20 | (1) |
|
Configuring a Computer for the Network |
|
|
20 | (1) |
|
|
21 | (1) |
|
Network Name and Address Planning |
|
|
21 | (1) |
|
Maintaining the Operating System |
|
|
22 | (3) |
|
Why and When to Apply Patches |
|
|
22 | (1) |
|
|
22 | (1) |
|
Applications Patches and Updates |
|
|
22 | (2) |
|
|
24 | (1) |
|
|
24 | (1) |
|
|
24 | (1) |
|
Connecting to the Network |
|
|
25 | (22) |
|
|
25 | (3) |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
26 | (1) |
|
Computer Roles in a Network |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
28 | (1) |
|
Principles of Communication |
|
|
28 | (4) |
|
Source, Channel, and Destination |
|
|
28 | (1) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
|
31 | (1) |
|
|
31 | (1) |
|
Protocol Use in Communication |
|
|
32 | (1) |
|
Communicating on a Local Wired Network |
|
|
32 | (4) |
|
|
32 | (1) |
|
Standardization of Protocols |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
34 | (1) |
|
Hierarchical Design of Ethernet Networks |
|
|
34 | (1) |
|
|
35 | (1) |
|
Access and Distribution Layers and Devices |
|
|
35 | (1) |
|
Building the Access Layer of an Ethernet Network |
|
|
36 | (3) |
|
|
36 | (1) |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
38 | (1) |
|
Address Resolution Protocol (ARP) |
|
|
39 | (1) |
|
Building the Distribution Layer of Network |
|
|
39 | (3) |
|
|
39 | (1) |
|
|
39 | (1) |
|
|
40 | (1) |
|
Tables Maintained by Routers |
|
|
41 | (1) |
|
|
41 | (1) |
|
Adding Hosts to Local and Remote Networks |
|
|
42 | (1) |
|
Learn to Use Packet Tracer |
|
|
42 | (1) |
|
Plan and Connect a Local Network |
|
|
42 | (5) |
|
Plan and Document an Ethernet Network |
|
|
42 | (1) |
|
|
43 | (1) |
|
|
44 | (1) |
|
Connecting the Linksys Router |
|
|
44 | (1) |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
46 | (1) |
|
Connecting to the Internet Through an ISP |
|
|
47 | (14) |
|
|
47 | (2) |
|
Explain What the Internet Is |
|
|
47 | (1) |
|
Internet Service Providers (ISPs) |
|
|
47 | (1) |
|
The ISPs Relationship with the Internet |
|
|
48 | (1) |
|
Options for Connecting to the ISP |
|
|
48 | (1) |
|
|
48 | (1) |
|
Sending Information Across the Internet |
|
|
49 | (2) |
|
Importance of the Internet Protocol (IP) |
|
|
49 | (1) |
|
|
50 | (1) |
|
Forwarding Packets Across the Internet |
|
|
50 | (1) |
|
Networking Devices in a NOC |
|
|
51 | (2) |
|
|
51 | (1) |
|
Devices in Internet Cloud |
|
|
51 | (1) |
|
Physical and Environmental Requirements |
|
|
52 | (1) |
|
|
53 | (2) |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
54 | (1) |
|
|
54 | (1) |
|
Working with Twisted Pair Cabling |
|
|
55 | (6) |
|
|
55 | (1) |
|
|
55 | (2) |
|
|
57 | (1) |
|
Terminating UTP at Patch Panels and Wall Jacks |
|
|
57 | (1) |
|
|
58 | (1) |
|
|
59 | (1) |
|
|
60 | (1) |
|
|
60 | (1) |
|
|
60 | (1) |
|
|
61 | (10) |
|
|
61 | (2) |
|
Purpose of the IP Address |
|
|
61 | (1) |
|
|
61 | (1) |
|
|
62 | (1) |
|
How IP Addresses and Subnet Masks Interact |
|
|
62 | (1) |
|
|
63 | (2) |
|
IP Address Classes and Default Subnet Masks |
|
|
63 | (1) |
|
Public and Private IP Addresses |
|
|
64 | (1) |
|
Unicast, Broadcast and Multicast Addresses |
|
|
64 | (1) |
|
How IP Addresses are Obtained |
|
|
65 | (2) |
|
Static and Dynamic Address Assignment |
|
|
66 | (1) |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
67 | (4) |
|
Network Boundaries and Address Space |
|
|
67 | (1) |
|
|
68 | (1) |
|
Network Address Translation |
|
|
69 | (1) |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
71 | (10) |
|
|
71 | (2) |
|
Client Server Relationship |
|
|
71 | (1) |
|
Role of Protocols in Client Server Communication |
|
|
71 | (1) |
|
TCP and UDP Transport Protocols |
|
|
72 | (1) |
|
|
73 | (1) |
|
Application Protocols and Services |
|
|
73 | (4) |
|
Domain Name Service (DNS) |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
74 | (1) |
|
Email Clients and Servers |
|
|
75 | (1) |
|
|
76 | (1) |
|
Voice Clients and Servers |
|
|
76 | (1) |
|
|
77 | (1) |
|
Layered Model and Protocols |
|
|
77 | (4) |
|
|
77 | (1) |
|
Protocol Operation of Sending and Receiving a Message |
|
|
78 | (1) |
|
Open Systems Interconnect Model |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
81 | (16) |
|
|
81 | (2) |
|
Wireless Technologies and Devices |
|
|
81 | (1) |
|
Benefits and Limitations of Wireless Technology |
|
|
82 | (1) |
|
Types of Wireless Networks and Their Boundaries |
|
|
82 | (1) |
|
|
83 | (5) |
|
|
83 | (1) |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
85 | (1) |
|
Configuring the Access Point |
|
|
86 | (1) |
|
Configuring the Wireless Client |
|
|
87 | (1) |
|
Security Considerations on A Wireless LAN |
|
|
88 | (3) |
|
|
88 | (1) |
|
Limiting Access to a WLAN |
|
|
89 | (1) |
|
|
89 | (1) |
|
|
90 | (1) |
|
Traffic Filtering on a WLAN |
|
|
91 | (1) |
|
Configuring an Integrated AP and Wireless Client |
|
|
91 | (6) |
|
|
91 | (1) |
|
Installing and Securing the AP |
|
|
92 | (1) |
|
Backing-up and Restoring Configuration Files |
|
|
93 | (1) |
|
|
93 | (2) |
|
|
95 | (1) |
|
|
95 | (1) |
|
|
95 | (2) |
|
|
97 | (12) |
|
|
97 | (2) |
|
Risks of Network Intrusion |
|
|
97 | (1) |
|
Sources of Network Intrusion |
|
|
97 | (1) |
|
Social Engineering and Phishing |
|
|
98 | (1) |
|
|
99 | (2) |
|
Viruses, Worms, and Trojan Horses |
|
|
99 | (1) |
|
Denial of Service and Brute Force Attacks |
|
|
99 | (1) |
|
Spyware, Tracking Cookies, Adware and Popups |
|
|
100 | (1) |
|
|
101 | (1) |
|
|
101 | (4) |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
103 | (1) |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
105 | (4) |
|
|
105 | (1) |
|
|
105 | (1) |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
108 | (1) |
|
|
108 | (1) |
|
|
108 | (1) |
|
Troubleshooting Your Network |
|
|
109 | (12) |
|
|
109 | (2) |
|
|
109 | (1) |
|
|
109 | (1) |
|
Approaches to Troubleshooting |
|
|
110 | (1) |
|
|
111 | (2) |
|
Detecting Physical Problems |
|
|
111 | (1) |
|
Software Utilities for Troubleshooting Connectivity |
|
|
111 | (1) |
|
Troubleshooting Using Ipconfig |
|
|
111 | (1) |
|
Troubleshooting Using Ping |
|
|
112 | (1) |
|
Troubleshooting Using Tracert |
|
|
113 | (1) |
|
Troubleshooting Using Netstat |
|
|
113 | (1) |
|
Troubleshooting Using Nslookup |
|
|
113 | (1) |
|
|
113 | (4) |
|
|
114 | (1) |
|
|
114 | (1) |
|
|
114 | (1) |
|
Troubleshooting Radio Problems in a WLAN |
|
|
115 | (1) |
|
Troubleshooting Association & Authentication on a WLAN |
|
|
115 | (1) |
|
|
116 | (1) |
|
Troubleshooting the ISR to ISP Connection |
|
|
117 | (1) |
|
Troubleshooting and the Helpdesk |
|
|
117 | (4) |
|
|
117 | (1) |
|
Using Outside Sources for Help |
|
|
118 | (1) |
|
|
118 | (2) |
|
|
120 | (1) |
|
|
120 | (1) |
|
|
120 | (1) |
|
|
121 | (2) |
|
10.0 Putting It All Together |
|
|
121 | (2) |
|
|
121 | (1) |
|
|
121 | (1) |
|
|
121 | (2) |
Glossary |
|
123 | |