Chapter 1 Communication in a Connected World |
|
1 | (2) |
|
1.5.4 Lab-My Local Network |
|
|
1 | (2) |
|
|
1 | (1) |
|
|
1 | (1) |
|
|
1 | (1) |
|
|
2 | (1) |
Chapter 2 Online Connections |
|
3 | (4) |
|
2.2.7 Lab-Determine the IP Address Configuration of a Computer |
|
|
3 | (4) |
|
|
3 | (1) |
|
|
3 | (1) |
|
|
3 | (1) |
|
Part 1: Determine the IP Address Using the Command Prompt |
|
|
3 | (2) |
|
Part 2: Test the Network Interface TCP/IP Stack |
|
|
5 | (2) |
Chapter 3 Investigate Networking with Packet Tracer |
|
7 | (12) |
|
3.3.3 Packet Tracer-Deploy Devices |
|
|
7 | (2) |
|
|
7 | (1) |
|
|
7 | (1) |
|
|
7 | (1) |
|
Part 1: Deploying the Devices |
|
|
7 | (1) |
|
Part 2: Deploying the Same Type of Devices Multiple Times |
|
|
7 | (1) |
|
Part 3: Copying the Devices |
|
|
8 | (1) |
|
3.3.4 Packet Tracer-Deploy and Cable Devices |
|
|
9 | (2) |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
9 | (1) |
|
Part 1: Deploy the Devices |
|
|
9 | (1) |
|
Part 2: Cable the Devices |
|
|
10 | (1) |
|
3.4.3 Packet Tracer-Configure End Devices |
|
|
11 | (4) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
Part 1: Build the Topology |
|
|
11 | (1) |
|
Part 2: Configure Static IP Addresses |
|
|
11 | (1) |
|
Part 3: Verify Connectivity |
|
|
12 | (1) |
|
Part 4: Basic Switch Configuration |
|
|
13 | (2) |
|
3.5.1 Packet Tracer-Create a Simple Network |
|
|
15 | (4) |
|
|
15 | (1) |
|
|
15 | (1) |
|
Part 1: Build a Simple Network |
|
|
15 | (1) |
|
Part 2: Configure the End Devices and Verify Connectivity |
|
|
16 | (3) |
Chapter 4 Build a Simple Network |
|
19 | (6) |
|
4.5.7 Lab-Build a Simple Network |
|
|
19 | (3) |
|
|
19 | (1) |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
20 | (1) |
|
Part 1: Set Up the Network Topology (Ethernet only) |
|
|
20 | (1) |
|
Part 2: Configure PC Hosts |
|
|
20 | (2) |
|
|
22 | (3) |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
22 | (1) |
|
Part 1: Determine Network Connectivity to a Destination Host |
|
|
22 | (1) |
|
Part 2: Trace a Route to a Remote Server Using Tracert |
|
|
23 | (2) |
Chapter 5 Communication Principles |
|
25 | (6) |
|
5.1.4 Lab-My Protocol Rules |
|
|
25 | (2) |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
26 | (1) |
|
5.4.5 Lab-Determine the MAC Address of a Host |
|
|
27 | (4) |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
27 | (1) |
|
Part 1: Locating the MAC Address on a Computer |
|
|
27 | (1) |
|
Part 2: Analyzing the Parts of a MAC Address |
|
|
28 | (1) |
|
|
29 | (2) |
Chapter 6 Network Design and the Access Layer |
|
31 | (12) |
|
6.2.4 Lab-View Wireless and Wired NIC Information |
|
|
31 | (3) |
|
|
31 | (1) |
|
|
31 | (1) |
|
|
31 | (1) |
|
|
31 | (1) |
|
Part 1: Identify and Work with PC NICs |
|
|
31 | (2) |
|
Part 2: Identify and Use the System Tray Network Icons |
|
|
33 | (1) |
|
|
33 | (1) |
|
6.4.8 Lab-View Captured Traffic in Wireshark |
|
|
34 | (9) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
35 | (1) |
|
Part 1: Download and Install Wireshark |
|
|
35 | (1) |
|
Part 2: Capture and Analyze Local ARP Data in Wireshark |
|
|
36 | (5) |
|
Part 3: Examine the ARP cache entries on the PC |
|
|
41 | (1) |
|
|
42 | (1) |
Chapter 7 Routing Between Networks |
|
43 | (12) |
|
7.1.4 Lab-IPv4 Addresses and Network Communication |
|
|
43 | (4) |
|
|
43 | (1) |
|
|
43 | (1) |
|
|
43 | (1) |
|
|
43 | (1) |
|
|
43 | (1) |
|
Part 1: Create a Peer-to-Peer Network |
|
|
43 | (2) |
|
Part 2: Modify IPv4 Addresses |
|
|
45 | (2) |
|
7.3.3 Packet Tracer-Observe Data Flow in a LAN |
|
|
47 | (3) |
|
|
47 | (1) |
|
|
47 | (1) |
|
Part 1: Create a Logical Network Diagram with 3 PCs and a Switch |
|
|
47 | (1) |
|
Part 2: Configure Host Names and IP Addresses on the PCs |
|
|
47 | (1) |
|
Part 3: Observe the Flow of Data from PC-A to PC-C by Creating Network Traffic |
|
|
48 | (1) |
|
Part 4: View ARP Tables on Each PC |
|
|
48 | (2) |
|
7.3.4 Lab-Connect to a Wireless Router |
|
|
50 | (5) |
|
|
50 | (1) |
|
|
50 | (1) |
|
|
50 | (1) |
|
|
50 | (1) |
|
|
51 | (1) |
|
Part 1: Connecting to the Network |
|
|
51 | (1) |
|
Part 2: Some Useful Windows Networking Commands |
|
|
52 | (3) |
Chapter 8 The Internet Protocol |
|
55 | (8) |
|
8.1.2 Packet Tracer-Connect to a Web Server |
|
|
55 | (2) |
|
|
55 | (1) |
|
|
55 | (1) |
|
Part 1: Verify Connectivity to the Web Server |
|
|
55 | (1) |
|
Part 2: Connect to the Web Server via the Web Client |
|
|
56 | (1) |
|
8.2.7 Lab-Use a Calculator for Binary Conversions |
|
|
57 | (6) |
|
|
57 | (1) |
|
|
57 | (1) |
|
|
57 | (1) |
|
|
57 | (1) |
|
Part 1: Using Windows Calculator |
|
|
57 | (1) |
|
|
58 | (1) |
|
Part 3: Network Addresses |
|
|
59 | (2) |
|
|
61 | (2) |
Chapter 9 Dynamic Addressing with DHCP |
|
63 | (4) |
|
9.2.5 Packet Tracer-Configure DHCP on a Wireless Router |
|
|
63 | (4) |
|
|
63 | (1) |
|
|
63 | (1) |
|
|
63 | (1) |
|
Part 1: Set Up the Network Topology |
|
|
63 | (1) |
|
Part 2: Observe the Default DHCP Settings |
|
|
63 | (1) |
|
Part 3: Change the Default IP Address of the Wireless Router |
|
|
64 | (1) |
|
Part 4: Change the Default DHCP Range of Addresses |
|
|
64 | (1) |
|
Part 5: Enable DHCP on the Other PCs |
|
|
64 | (1) |
|
Part 6: Verify Connectivity |
|
|
65 | (2) |
Chapter 10 IPv4 and IPv6 Address Management |
|
67 | (8) |
|
10.2.3 Packet Tracer-Examine NAT on a Wireless Router |
|
|
67 | (3) |
|
|
67 | (1) |
|
|
67 | (1) |
|
Part 1: Examine the Configuration for Accessing External Network |
|
|
67 | (1) |
|
Part 2: Examine the Configurations for Accessing the Internal Network |
|
|
68 | (1) |
|
Part 3: Connect 3 PCs to the Wireless Router |
|
|
68 | (1) |
|
Part 4: View NAT Translation Across the Wireless Router |
|
|
68 | (1) |
|
Part 5: View the Header Information of the Packets that Traveled Across the Network |
|
|
69 | (1) |
|
10.4.7 Lab-Identify IPv6 Addresses |
|
|
70 | (5) |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
70 | (1) |
|
Part 1: Practice with Different Types of IPv6 Addresses |
|
|
70 | (1) |
|
Part 2: Examine a Host IPv6 Network Interface and Address |
|
|
71 | (2) |
|
|
73 | (2) |
Chapter 11 Transport Layer Services |
|
75 | (2) |
|
11.1.6 Packet Tracer-The Client Interaction |
|
|
75 | (2) |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
75 | (1) |
|
Part 1: Enter Simulation Mode |
|
|
75 | (1) |
|
Part 2: Set Event List Filters |
|
|
75 | (1) |
|
Part 3: Request a Web Page from the PC |
|
|
75 | (1) |
|
Part 4: Run the Simulation |
|
|
76 | (1) |
|
Part 5: Access a Specific PDU |
|
|
76 | (1) |
|
Part 6: Examine the Contents of the PDU Information Window |
|
|
76 | (1) |
Chapter 12 Application Layer Services |
|
77 | (12) |
|
12.2.4 Lab-Observe DNS Name Resolution |
|
|
77 | (4) |
|
|
77 | (1) |
|
|
77 | (1) |
|
|
77 | (1) |
|
|
77 | (1) |
|
Part 1: Observe DNS Conversion |
|
|
77 | (3) |
|
|
80 | (1) |
|
12.3.3 Packet Tracer-Observe Web Request |
|
|
81 | (2) |
|
|
81 | (1) |
|
|
81 | (1) |
|
Part 1: Verify Connectivity to the Web Server |
|
|
81 | (1) |
|
Part 2: Connect to the Web Server |
|
|
81 | (1) |
|
Part 3: View the HTML Code |
|
|
81 | (1) |
|
Part 4: Observe Traffic Between the Client and the Web Server |
|
|
81 | (2) |
|
12.4.4 Packet Tracer-Use FTP Services |
|
|
83 | (3) |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
Part 1: Upload a File to an FTP Server |
|
|
83 | (2) |
|
Part 2: Download a File from an FTP Server |
|
|
85 | (1) |
|
12.5.4 Packet Tracer-Use Telnet and SSH |
|
|
86 | (3) |
|
|
86 | (1) |
|
|
86 | (1) |
|
Part 1: Verify Connectivity |
|
|
86 | (1) |
|
Part 2: Access a Remote Device |
|
|
86 | (3) |
Chapter 13 Build a Home Network |
|
89 | (4) |
|
13.5.5 Lab-Configure a Wireless Router and Client |
|
|
89 | (4) |
|
|
89 | (1) |
|
|
89 | (1) |
|
|
89 | (1) |
|
|
89 | (1) |
|
|
90 | (1) |
|
Part 1: Configure Basic Settings on a Wireless Router |
|
|
90 | (1) |
|
Part 2: Connect a Wireless Client |
|
|
90 | (3) |
Chapter 14 Connecting to the Internet |
|
93 | (8) |
|
14.2.13 Lab-Install Linux in a Virtual Machine and Explore the GUI |
|
|
93 | (5) |
|
|
93 | (1) |
|
|
93 | (1) |
|
|
93 | (1) |
|
|
93 | (1) |
|
Part 1: Prepare a Computer for Virtualization |
|
|
93 | (1) |
|
Part 2: Install Ubuntu on the Virtual Machine |
|
|
94 | (2) |
|
|
96 | (1) |
|
|
97 | (1) |
|
14.3.8 Lab-Configure a Mobile Device for Wi-Fi Connectivity |
|
|
98 | (3) |
|
|
98 | (1) |
|
|
98 | (1) |
|
|
98 | (1) |
|
|
98 | (1) |
|
Part 1: Configure Wi-Fi Settings on an Android Device |
|
|
98 | (1) |
|
Part 2: Configure Wi-Fi Settings on an iOS Device |
|
|
99 | (2) |
Chapter 15 Security Considerations |
|
101 | (2) |
|
15.2.3 Lab - Social Engineering |
|
|
101 | (2) |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
101 | (1) |
|
Part 1: Research Social Engineering Examples |
|
|
101 | (1) |
|
Part 2: Recognize the Signs of Social Engineering |
|
|
101 | (1) |
|
Part 3: Research Ways to Prevent Social Engineering |
|
|
102 | (1) |
Chapter 16 Configure Network and Device Security |
|
103 | (4) |
|
16.2.4 Packet Tracer-Configure Basic Wireless Security |
|
|
103 | (1) |
|
|
103 | (1) |
|
|
103 | (1) |
|
|
103 | (1) |
|
Part 1: Verify Connectivity |
|
|
103 | (1) |
|
Part 2: Configure Basic Wireless Security |
|
|
103 | (1) |
|
Part 3: Update the Wireless Settings on the Laptop |
|
|
103 | (1) |
|
Part 4: Verify Connectivity |
|
|
103 | (1) |
|
16.3.8 Lab-Configure Firewall Settings |
|
|
104 | (3) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
105 | (1) |
|
Part 1: Verify that the Windows Firewall is Active and is Blocking ICMP Requests |
|
|
105 | (1) |
|
Part 2: Create a New Inbound Rule Allowing ICMP Traffic Through the Firewall |
|
|
105 | (1) |
|
Part 3: Disabling or Deleting the New ICMP Rule |
|
|
106 | (1) |
Chapter 17 Cisco Switches and Routers |
|
107 | (4) |
|
17.5.1 Packet Tracer-Compare In-Band and Out-of-Band Management Access |
|
|
107 | (4) |
|
|
107 | (1) |
|
|
107 | (1) |
|
Part 1: Establish an Out-of-Band Connection |
|
|
107 | (2) |
|
Part 2: Establish an In-Band Connection |
|
|
109 | (2) |
Chapter 18 The Cisco IOS Command Line |
|
111 | (8) |
|
18.2.6 Packet Tracer-Navigate the IOS |
|
|
111 | (5) |
|
|
111 | (1) |
|
|
111 | (1) |
|
|
111 | (1) |
|
Part 1: Establish Basic Connections, Access the CLI, and Explore Help |
|
|
111 | (1) |
|
Part 2: Explore EXEC Modes |
|
|
112 | (2) |
|
|
114 | (2) |
|
18.3.3 Packet Tracer-Use Cisco IOS Show Commands |
|
|
116 | (3) |
|
|
116 | (1) |
|
|
116 | (1) |
|
|
116 | (1) |
|
Part 1: Connect to the ISP Cisco 4321 Router |
|
|
116 | (1) |
|
Part 2: Explore the Show Commands |
|
|
116 | (3) |
Chapter 19 Build a Small Cisco Network |
|
119 | (14) |
|
19.1.4 Packet Tracer-Implement Basic Connectivity |
|
|
119 | (3) |
|
|
119 | (1) |
|
|
119 | (1) |
|
|
119 | (1) |
|
Part 1: Perform SVI Configuration on S1 and S2 |
|
|
119 | (1) |
|
Part 2: Configure the PCs |
|
|
120 | (2) |
|
19.2.4 Packet Tracer-Configure initial Router Settings |
|
|
122 | (4) |
|
|
122 | (1) |
|
|
122 | (1) |
|
|
122 | (1) |
|
Part 1: Verify the Default Router Configuration |
|
|
122 | (1) |
|
Part 2: Configure and Verify the Initial Router Configuration |
|
|
123 | (1) |
|
Part 3: Save the Running Configuration File |
|
|
124 | (2) |
|
19.3.6 Packet Tracer-Configure SSH |
|
|
126 | (2) |
|
|
126 | (1) |
|
|
126 | (1) |
|
|
126 | (1) |
|
|
126 | (1) |
|
Part 2: Encrypt Communications |
|
|
127 | (1) |
|
Part 3: Verify SSH Implementation |
|
|
127 | (1) |
|
19.4.4 Packet Tracer-Build a Switch and Router Network |
|
|
128 | (5) |
|
|
128 | (1) |
|
|
128 | (1) |
|
|
128 | (1) |
|
Part 1: Configure Devices and Verify Connectivity |
|
|
128 | (2) |
|
Part 2: Display Device Information |
|
|
130 | (1) |
|
Part 3: Secure Remote Access to the Router |
|
|
131 | (1) |
|
|
132 | (1) |
Chapter 20 Security Considerations |
|
133 | |
|
20.3.3 Packet Tracer-Use the ipconfig Command |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
133 | (1) |
|
Part 1: Verify Configurations |
|
|
133 | (1) |
|
Part 2: Correct Any Misconfigurations |
|
|
133 | (1) |
|
20.3.6 Packet Tracer-Use the ping Command |
|
|
134 | (2) |
|
|
134 | (1) |
|
|
134 | (1) |
|
|
134 | (1) |
|
Part 1: Verify Connectivity |
|
|
134 | (1) |
|
Part 2: Ping the Web Server from PCs with Connectivity Issues |
|
|
134 | (1) |
|
Part 3: Ping the Web Server from Correctly Configured PCs |
|
|
134 | (1) |
|
Part 4: Ping the IP Address of the Web Server from PCs with Connectivity Issues |
|
|
135 | (1) |
|
Part 5: Compare the DNS Server Information on the PCs |
|
|
135 | (1) |
|
Part 6: Make Any Necessary Configuration Changes on the PCs |
|
|
135 | (1) |
|
20.3.12 Lab-Troubleshoot Using Network Utilities |
|
|
136 | (5) |
|
|
136 | (1) |
|
|
136 | (1) |
|
|
136 | (1) |
|
|
136 | (1) |
|
Part 1: Network Connections |
|
|
136 | (2) |
|
Part 2: External Connectivity |
|
|
138 | (2) |
|
|
140 | (1) |
|
20.4.3 Packet Tracer-Troubleshoot a Wireless Connection |
|
|
141 | (2) |
|
|
141 | (1) |
|
|
141 | (1) |
|
|
141 | (1) |
|
Part 1: Verify Connectivity |
|
|
141 | (1) |
|
Part 2: Examine the IP Configuration of the PCs |
|
|
141 | (1) |
|
Part 3: Examine the Wireless Settings on the Wireless Client |
|
|
141 | (1) |
|
Part 4: Examine the Wireless Settings on the Wireless Router |
|
|
142 | (1) |
|
Part 5: Make Any Necessary Configuration Changes on the Wireless Clients |
|
|
142 | (1) |
|
20.7.1 Packet Tracer-Skills Integration Challenge |
|
|
143 | |
|
|
143 | (1) |
|
|
143 | (1) |
|
|
143 | (1) |
|
|
143 | (1) |
|
|
143 | (1) |
|
|
144 | (1) |
|
Wireless Router in the Home |
|
|
144 | (1) |
|
|
144 | (1) |
|
|
144 | |