Lesson 1 Introduction to Networks |
|
1 | (24) |
|
|
1 | (1) |
|
|
1 | (1) |
|
|
2 | (4) |
|
A Brief History of Networking |
|
|
2 | (2) |
|
Different Types of Networks |
|
|
4 | (2) |
|
|
6 | (7) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
7 | (1) |
|
|
8 | (2) |
|
|
10 | (1) |
|
Point-to-Multipoint Topology |
|
|
10 | (1) |
|
|
11 | (1) |
|
Physical vs. Logical Topologies |
|
|
12 | (1) |
|
Basic Network Configuration in Windows |
|
|
13 | (2) |
|
|
15 | (1) |
|
|
15 | (2) |
|
|
17 | (1) |
|
|
18 | (7) |
|
Lab 1: Tour of a Working Client/Server LAN |
|
|
18 | (1) |
|
Lab 2: Configuring Network Related Components in Windows 7 |
|
|
18 | (6) |
|
Find and Open the Network and Sharing Center |
|
|
19 | (1) |
|
Familiarize Yourself with the Network and Sharing Center |
|
|
20 | (4) |
|
Lab 3: Basic Diagramming of Star and Bus Topologies |
|
|
24 | (2) |
|
Familiarizing Yourself with Star and Bus Topologies |
|
|
24 | (1) |
Lesson 2 The OSI and TCP/IP Models |
|
25 | (21) |
|
|
25 | (1) |
|
|
25 | (1) |
|
Introduction to the OSI Model |
|
|
26 | (10) |
|
What the OSI Model Looks Like |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
32 | (1) |
|
How Data Moves Through the OSI Model |
|
|
33 | (3) |
|
|
36 | (2) |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
38 | (1) |
|
Alternate Layer Names for the TCP/IP Model |
|
|
38 | (1) |
|
How the Layers Work Together |
|
|
38 | (1) |
|
|
39 | (1) |
|
|
40 | (2) |
|
|
42 | (4) |
|
Lab 1: How TCP/IP Protocols Work through the TCP/IP Model |
|
|
42 | (1) |
|
Follow Protocols Through the Layers of the TCP/IP Model |
|
|
42 | (1) |
|
Lab 2: Using the IPCONFIG Command |
|
|
43 | (5) |
|
|
43 | (3) |
Lesson 3 Media |
|
46 | (35) |
|
|
46 | (1) |
|
|
47 | (1) |
|
Copper Cabling and Its Properties |
|
|
48 | (16) |
|
|
48 | (1) |
|
|
49 | (7) |
|
|
56 | (1) |
|
|
57 | (2) |
|
Broadband over Power Line |
|
|
59 | (1) |
|
|
60 | (1) |
|
|
61 | (1) |
|
Problems and Limitations Related to Copper |
|
|
61 | (3) |
|
|
64 | (3) |
|
|
64 | (1) |
|
|
65 | (1) |
|
|
65 | (2) |
|
Installing Wiring Distributions |
|
|
67 | (4) |
|
Vertical and Horizontal Cross-Connects |
|
|
67 | (1) |
|
|
68 | (2) |
|
Verifying Correct Wiring Installation |
|
|
70 | (1) |
|
Verifying Proper Wiring Termination |
|
|
70 | (1) |
|
|
71 | (3) |
|
|
71 | (3) |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
75 | (2) |
|
|
77 | (1) |
|
|
78 | (3) |
|
|
78 | (1) |
|
Get to Know Your Patch Cables |
|
|
78 | (1) |
|
Lab 2: Create Straight-Through and Crossover Cables |
|
|
78 | (4) |
|
Create a Straight-Through Cable |
|
|
79 | (1) |
|
|
80 | (1) |
Lesson 4 Network Addressing |
|
81 | (40) |
|
|
81 | (1) |
|
|
82 | (1) |
|
|
82 | (2) |
|
|
83 | (1) |
|
|
84 | (15) |
|
Internet Protocol Version 4 (IPv4) |
|
|
85 | (12) |
|
Internet Protocol Version 6 (IPv6) |
|
|
97 | (2) |
|
How Physical and Logical Addressing Work Together |
|
|
99 | (8) |
|
Broadcast Domains versus Collision Domains |
|
|
106 | (1) |
|
Other Addressing Technologies |
|
|
107 | (6) |
|
|
107 | (1) |
|
Network Address Translation (NAT) |
|
|
107 | (3) |
|
|
110 | (3) |
|
|
113 | (1) |
|
|
113 | (1) |
|
|
114 | (1) |
|
|
115 | (2) |
|
|
117 | (4) |
|
Lab 1: Converting Binary to Hexadecimal and Hexadecimal to Binary |
|
|
117 | (1) |
|
Convert between Binary and Hexadecimal Values |
|
|
117 | (1) |
|
Lab 2: Converting Binary to Decimal and Decimal to Binary |
|
|
118 | (1) |
|
Convert between Binary and Decimal Values |
|
|
118 | (1) |
|
Lab 3: Determining the Subnet Mask of an IP Network Address in CIDR Notation |
|
|
119 | (1) |
|
Determine the Subnet Mask |
|
|
119 | (1) |
|
Lab 4: Determining the Subnet Mask and IP Ranges of a Class C IP Network Address in CIDR Notation |
|
|
120 | (3) |
|
Determine the IP Ranges and Subnet Mask from CIDR Notation |
|
|
120 | (1) |
Lesson 5 Network Protocols |
|
121 | (44) |
|
|
121 | (1) |
|
|
122 | (1) |
|
|
123 | (22) |
|
|
123 | (22) |
|
How Protocols Work Together |
|
|
145 | (5) |
|
|
150 | (7) |
|
Purpose and Properties of Routing Protocols |
|
|
150 | (3) |
|
Distance Vector Routing Protocols |
|
|
153 | (2) |
|
Link State Routing Protocols |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
157 | (1) |
|
|
157 | (3) |
|
|
160 | (5) |
|
Lab 1: Acquiring and Installing Wireshark |
|
|
160 | (1) |
|
|
160 | (1) |
|
Lab 2: Capturing Network Traffic with Wireshark |
|
|
160 | (2) |
|
|
161 | (1) |
|
Lab 3: Analyzing the Data Captured Using Wireshark |
|
|
162 | (5) |
|
Read and Interpret the Data Provided by Wireshark |
|
|
163 | (2) |
Lesson 6 Networking Devices |
|
165 | (54) |
|
|
165 | (2) |
|
|
167 | (1) |
|
|
167 | (3) |
|
Means of Communication and Media Used for Communication |
|
|
169 | (1) |
|
|
170 | (1) |
|
|
170 | (1) |
|
|
171 | (3) |
|
|
172 | (1) |
|
|
173 | (1) |
|
Singlemode Fiber to Multimode Fiber |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
175 | (7) |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
177 | (2) |
|
|
179 | (1) |
|
|
180 | (1) |
|
|
181 | (1) |
|
|
181 | (1) |
|
Spanning Tree Protocol (STP) |
|
|
181 | (1) |
|
Power over Ethernet (PoE) |
|
|
181 | (1) |
|
Channel Service Unit/Data Service Unit (CSU/DSU) |
|
|
182 | (1) |
|
|
182 | (4) |
|
|
183 | (1) |
|
|
184 | (1) |
|
|
184 | (2) |
|
|
186 | (5) |
|
Dynamic Host Configuration Protocol (DHCP) Servers |
|
|
186 | (2) |
|
Domain Name System (DNS) Servers |
|
|
188 | (2) |
|
|
190 | (1) |
|
Additional Specialized Network Devices |
|
|
191 | (3) |
|
Multifunction Network Devices |
|
|
191 | (1) |
|
Intrusion Detection Systems (IDS) and Intrusion Protection Systems (IPS) |
|
|
192 | (1) |
|
|
193 | (1) |
|
|
193 | (1) |
|
|
194 | (1) |
|
|
194 | (3) |
|
|
194 | (2) |
|
|
196 | (1) |
|
|
197 | (2) |
|
|
197 | (1) |
|
|
198 | (1) |
|
|
198 | (1) |
|
|
198 | (1) |
|
|
199 | (1) |
|
Network as a Service (NaaS) |
|
|
199 | (1) |
|
|
199 | (1) |
|
|
200 | (2) |
|
|
202 | (17) |
|
Lab 1: Connecting Two Computers Using Crossover Cables |
|
|
202 | (2) |
|
Connect the Computers Together |
|
|
202 | (1) |
|
Configure the Two Computers |
|
|
202 | (1) |
|
|
203 | (1) |
|
Verify the Share in Network Places |
|
|
204 | (1) |
|
Lab 2: Connecting Multiple Computers Together Using a Switch or Hub |
|
|
204 | (1) |
|
Build a Network Using a Switch or Hub |
|
|
205 | (1) |
|
Lab 3: Connecting Multiple Switches or Hubs Together in a Single Network |
|
|
205 | (1) |
|
Connect Multiple Networks Together Using Switches or Hubs |
|
|
205 | (1) |
|
Lab 4: Creating a Virtual Workstation using VMPlayer |
|
|
206 | (15) |
|
Obtaining the Needed Files |
|
|
206 | (1) |
|
|
207 | (2) |
|
Creating Your First Virtual Machine |
|
|
209 | (6) |
|
Installing VM-Tools Inside Linux |
|
|
215 | (4) |
Lesson 7 LAN Technologies |
|
219 | (33) |
|
|
219 | (1) |
|
|
220 | (1) |
|
|
221 | (7) |
|
|
221 | (1) |
|
Ethernet Communications Methods |
|
|
222 | (3) |
|
Baseband Ethernet Technologies |
|
|
225 | (3) |
|
|
228 | (5) |
|
|
228 | (2) |
|
|
230 | (1) |
|
|
230 | (1) |
|
|
231 | (2) |
|
Wireless LAN Technologies |
|
|
233 | (9) |
|
|
233 | (1) |
|
|
234 | (2) |
|
|
236 | (6) |
|
|
242 | (1) |
|
SOHO Network Technologies |
|
|
242 | (3) |
|
|
242 | (1) |
|
|
243 | (1) |
|
Device Types and Requirements |
|
|
243 | (1) |
|
|
243 | (1) |
|
|
243 | (1) |
|
Compatibility Requirements |
|
|
244 | (1) |
|
|
245 | (1) |
|
|
245 | (2) |
|
|
247 | (5) |
|
Lab 1: Accessing a Wireless Access Point |
|
|
247 | (3) |
|
Part 1: Determine the Gateway |
|
|
247 | (2) |
|
Part 2: Open a WAP's Configuration Screen |
|
|
249 | (1) |
|
Lab 2: Becoming Familiar with a WAP Configuration Screen |
|
|
250 | (4) |
|
Become Familiar with Common Options Available irtWAPs |
|
|
251 | (1) |
Lesson 8 WAN Technologies |
|
252 | (33) |
|
|
252 | (1) |
|
|
253 | (1) |
|
Types of Circuit Switching |
|
|
254 | (3) |
|
|
254 | (1) |
|
|
255 | (1) |
|
|
256 | (1) |
|
Virtual Circuit Switching |
|
|
256 | (1) |
|
|
257 | (6) |
|
|
257 | (1) |
|
|
257 | (1) |
|
|
258 | (1) |
|
|
259 | (2) |
|
|
261 | (2) |
|
|
263 | (11) |
|
|
263 | (2) |
|
Integrated Service Digital Network (ISDN) |
|
|
265 | (2) |
|
Digital Subscriber Line (DSL) Technologies |
|
|
267 | (1) |
|
Broadband and Cable Modems |
|
|
268 | (1) |
|
|
269 | (1) |
|
|
270 | (1) |
|
|
271 | (1) |
|
Asynchronous Transfer Mode (ATM) |
|
|
272 | (1) |
|
Synchronous Optical Networking (SONET) and Synchronous Digital Hierarchy (SDH) |
|
|
273 | (1) |
|
Multiprotocol Label Switching (MPLS) |
|
|
274 | (1) |
|
|
274 | (2) |
|
Remote Access Services (RAS) |
|
|
274 | (1) |
|
Virtual Private Network (VPN) |
|
|
275 | (1) |
|
|
276 | (1) |
|
|
277 | (2) |
|
|
279 | (6) |
|
Lab 1: Researching Local WAN Providers |
|
|
279 | (1) |
|
Find Out Which Local ISPs Provide WAN Services in Your Area |
|
|
279 | (1) |
|
Report What You Discovered about Local ISPs |
|
|
279 | (1) |
|
Lab 2: Setting Up a VPN Using Windows 7 |
|
|
280 | (7) |
|
|
280 | (5) |
Lesson 9 Basic Network Security |
|
285 | (46) |
|
|
285 | (1) |
|
|
286 | (1) |
|
Network Security Considerations |
|
|
287 | (1) |
|
Basic Network Security Threats |
|
|
287 | (14) |
|
|
288 | (2) |
|
|
290 | (5) |
|
|
295 | (4) |
|
|
299 | (2) |
|
Countering Basic Security Threats |
|
|
301 | (16) |
|
|
301 | (6) |
|
|
307 | (1) |
|
|
307 | (2) |
|
|
309 | (1) |
|
|
309 | (8) |
|
After an Attack Has Occurred |
|
|
317 | (2) |
|
|
318 | (1) |
|
|
318 | (1) |
|
Network Tools that Can Be Used for Good or Bad |
|
|
319 | (3) |
|
Intrusion Detection Software (IDS) |
|
|
319 | (1) |
|
Intrusion Prevention Software (IPS) |
|
|
320 | (1) |
|
|
320 | (1) |
|
|
320 | (1) |
|
|
321 | (1) |
|
Password Capturing/Cracking Software |
|
|
321 | (1) |
|
|
322 | (1) |
|
|
322 | (3) |
|
|
325 | (6) |
|
Lab 1: Installing Malware Detection and Protection Software |
|
|
325 | (2) |
|
Download the Software Malwarebytes |
|
|
325 | (1) |
|
Install Malwarebytes Anti-Malware Software |
|
|
326 | (1) |
|
|
326 | (1) |
|
Lab 2: Installing Intrusion Detection and Protection Software |
|
|
327 | (6) |
|
Download the Software ZoneAlarm |
|
|
328 | (1) |
|
Install the ZoneAlarm Intrusion Detection Software |
|
|
328 | (1) |
|
|
329 | (2) |
Lesson 10 Network Access Security |
|
331 | (42) |
|
|
331 | (1) |
|
|
332 | (1) |
|
|
333 | (11) |
|
|
333 | (4) |
|
|
337 | (1) |
|
Common Features of a Firewall |
|
|
337 | (4) |
|
|
341 | (2) |
|
|
343 | (1) |
|
|
344 | (10) |
|
Virtual Private Network (VPN) |
|
|
349 | (1) |
|
|
350 | (4) |
|
Wireless Authentication and Encryption |
|
|
354 | (3) |
|
Wi-Fi Protected Access (WPA) |
|
|
355 | (1) |
|
Wired Equivalent Privacy (WEP) |
|
|
355 | (1) |
|
Remote Authentication Dial-In User Service (RADIUS) |
|
|
355 | (1) |
|
Temporal Key Integrity Protocol (TKIP) |
|
|
356 | (1) |
|
|
357 | (4) |
|
|
357 | (2) |
|
|
359 | (1) |
|
|
360 | (1) |
|
|
361 | (1) |
|
|
361 | (3) |
|
|
364 | (9) |
|
Lab 1: Constructing an ACL Using Windows Firewall |
|
|
364 | (6) |
|
Open the Windows 7 Firewall ACL Dialog Box |
|
|
364 | (6) |
|
Lab 2: Updates and Patches |
|
|
370 | (5) |
|
Configure How Windows Installs Updates and Patches |
|
|
370 | (2) |
|
Research Patches to Determine Whether It Is Safe to Install a New Patch |
|
|
372 | (1) |
Lesson 11 Network Management |
|
373 | (42) |
|
|
373 | (1) |
|
|
374 | (1) |
|
What Is Network Management and Why Do We Need It? |
|
|
375 | (4) |
|
Network Management Considerations |
|
|
375 | (4) |
|
|
379 | (8) |
|
Types of Network Documentation |
|
|
379 | (7) |
|
Using Network Documentation |
|
|
386 | (1) |
|
Keeping Network Documentation Up to Date |
|
|
387 | (1) |
|
|
387 | (8) |
|
|
388 | (3) |
|
|
391 | (2) |
|
|
393 | (1) |
|
|
393 | (1) |
|
|
393 | (2) |
|
|
395 | (8) |
|
Reasons for Network Optimization |
|
|
395 | (5) |
|
Methods to Achieve Network Optimization |
|
|
400 | (3) |
|
|
403 | (1) |
|
|
404 | (2) |
|
|
406 | (9) |
|
Lab 1: Using Windows 7 Performance Monitoring Software |
|
|
406 | (5) |
|
Open the Windows 7 Performance Monitor |
|
|
406 | (5) |
|
Lab 2: Using Windows Event Viewer |
|
|
411 | (8) |
|
Open Windows 7 Event Viewer |
|
|
411 | (4) |
Lesson 12 Network Troubleshooting |
|
415 | (62) |
|
|
415 | (2) |
|
|
417 | (1) |
|
One Size Does Not Fit All |
|
|
418 | (1) |
|
Stages of the Troubleshooting Process |
|
|
419 | (8) |
|
Information Gathering-Identify the Systems and the Problems |
|
|
419 | (1) |
|
Identify the Affected Areas of the Network |
|
|
420 | (1) |
|
Determine Whether Anything Has Changed |
|
|
420 | (1) |
|
Establish the Most Probable Cause |
|
|
421 | (1) |
|
Determine if Escalation is Necessary |
|
|
421 | (1) |
|
Create an Action Plan and Solution |
|
|
422 | (1) |
|
Implement and Test the Solution |
|
|
423 | (1) |
|
Identify the Results and Effects of the Solution |
|
|
423 | (1) |
|
Document the Solution and the Entire Process |
|
|
424 | (1) |
|
Bringing the Steps of the Troubleshooting Process Together |
|
|
425 | (2) |
|
Network Tools and What They Are Used For |
|
|
427 | (20) |
|
Command-Line Interface Network Tools |
|
|
427 | (13) |
|
|
440 | (7) |
|
|
447 | (5) |
|
Basic Troubleshooting Actions |
|
|
447 | (2) |
|
Advanced Troubleshooting Actions |
|
|
449 | (3) |
|
Common Connectivity Issues |
|
|
452 | (15) |
|
|
453 | (4) |
|
|
457 | (3) |
|
Issues That Should Be Escalated |
|
|
460 | (2) |
|
|
462 | (5) |
|
|
467 | (1) |
|
|
468 | (3) |
|
|
471 | (6) |
|
|
471 | (3) |
|
|
471 | (2) |
|
|
473 | (1) |
|
|
474 | (3) |
|
|
474 | (3) |
Appendix A: Network+ Certification |
|
477 | (11) |
Appendix B: Network+ Protocols |
|
488 | (2) |
Glossary |
|
490 | (15) |
Index |
|
505 | |