Muutke küpsiste eelistusi

Networking Essentials Lab Manual [Pehme köide]

  • Formaat: Paperback / softback, 160 pages, kõrgus x laius x paksus: 100x100x100 mm, kaal: 410 g
  • Ilmumisaeg: 04-Nov-2021
  • Kirjastus: Cisco Press
  • ISBN-10: 0137659261
  • ISBN-13: 9780137659265
Teised raamatud teemal:
  • Formaat: Paperback / softback, 160 pages, kõrgus x laius x paksus: 100x100x100 mm, kaal: 410 g
  • Ilmumisaeg: 04-Nov-2021
  • Kirjastus: Cisco Press
  • ISBN-10: 0137659261
  • ISBN-13: 9780137659265
Teised raamatud teemal:

The only authorized Lab Manual for the Cisco Networking Academy Networking Essentials Course


The Networking Essentials course is for developers, data scientists, cybersecurity specialists, and other professionals looking to broaden their networking domain knowledge. It’s also an excellent launching point for students pursuing a wide range of career pathways—from cybersecurity to software development to business and more. A Networking Academy digital badge is available for the instructor-led version of this course. No prerequisites required.


You’ll Learn These Core Skills:


  • Plan and install a home or small business network using wireless technology, and then connect it to the Internet
  • Develop critical thinking and problem-solving skills using Cisco Packet Tracers
  • Practice verifying and troubleshooting network and Internet connectivity
  • Recognize and mitigate security threats to a home network. The 37 comprehensive labs in this manual emphasize hands-on learning and practice to reinforce configuration skills


The Networking Essentials Lab Manual provides you with all the labs and packet tracer activity instructions from the course designed as hands-on practice to develop critical thinking and complex problem-solving skills.


Chapter 1 Communication in a Connected World 1(2)
1.5.4 Lab-My Local Network
1(2)
Objectives
1(1)
Background/Scenario
1(1)
Instructions
1(1)
Reflection
2(1)
Chapter 2 Online Connections 3(4)
2.2.7 Lab-Determine the IP Address Configuration of a Computer
3(4)
Objectives
3(1)
Required Resources
3(1)
Instructions
3(1)
Part 1: Determine the IP Address Using the Command Prompt
3(2)
Part 2: Test the Network Interface TCP/IP Stack
5(2)
Chapter 3 Investigate Networking with Packet Tracer 7(12)
3.3.3 Packet Tracer-Deploy Devices
7(2)
Objectives
7(1)
Required Resources
7(1)
Instructions
7(1)
Part 1: Deploying the Devices
7(1)
Part 2: Deploying the Same Type of Devices Multiple Times
7(1)
Part 3: Copying the Devices
8(1)
3.3.4 Packet Tracer-Deploy and Cable Devices
9(2)
Objectives
9(1)
Background/Scenario
9(1)
Instructions
9(1)
Part 1: Deploy the Devices
9(1)
Part 2: Cable the Devices
10(1)
3.4.3 Packet Tracer-Configure End Devices
11(4)
Topology
11(1)
Objectives
11(1)
Background/Scenario
11(1)
Required Resources
11(1)
Instructions
11(1)
Part 1: Build the Topology
11(1)
Part 2: Configure Static IP Addresses
11(1)
Part 3: Verify Connectivity
12(1)
Part 4: Basic Switch Configuration
13(2)
3.5.1 Packet Tracer-Create a Simple Network
15(4)
Objectives
15(1)
Instructions
15(1)
Part 1: Build a Simple Network
15(1)
Part 2: Configure the End Devices and Verify Connectivity
16(3)
Chapter 4 Build a Simple Network 19(6)
4.5.7 Lab-Build a Simple Network
19(3)
Topology
19(1)
Objectives
19(1)
Background/Scenario
20(1)
Required Resources
20(1)
Instructions
20(1)
Part 1: Set Up the Network Topology (Ethernet only)
20(1)
Part 2: Configure PC Hosts
20(2)
4.5.8 Lab-Trace a Route
22(3)
Objectives
22(1)
Background/Scenario
22(1)
Required Resources
22(1)
Instructions
22(1)
Part 1: Determine Network Connectivity to a Destination Host
22(1)
Part 2: Trace a Route to a Remote Server Using Tracert
23(2)
Chapter 5 Communication Principles 25(6)
5.1.4 Lab-My Protocol Rules
25(2)
Objectives
25(1)
Background/Scenario
25(1)
Instructions
25(1)
Reflection
26(1)
5.4.5 Lab-Determine the MAC Address of a Host
27(4)
Objectives
27(1)
Background/Scenario
27(1)
Required Resources
27(1)
Instructions
27(1)
Part 1: Locating the MAC Address on a Computer
27(1)
Part 2: Analyzing the Parts of a MAC Address
28(1)
Reflection
29(2)
Chapter 6 Network Design and the Access Layer 31(12)
6.2.4 Lab-View Wireless and Wired NIC Information
31(3)
Objectives
31(1)
Background/Scenario
31(1)
Required Resources
31(1)
Instructions
31(1)
Part 1: Identify and Work with PC NICs
31(2)
Part 2: Identify and Use the System Tray Network Icons
33(1)
Reflection
33(1)
6.4.8 Lab-View Captured Traffic in Wireshark
34(9)
Topology
34(1)
Objectives
34(1)
Background/Scenario
34(1)
Required Resources
35(1)
Instructions
35(1)
Part 1: Download and Install Wireshark
35(1)
Part 2: Capture and Analyze Local ARP Data in Wireshark
36(5)
Part 3: Examine the ARP cache entries on the PC
41(1)
Reflection
42(1)
Chapter 7 Routing Between Networks 43(12)
7.1.4 Lab-IPv4 Addresses and Network Communication
43(4)
Topology
43(1)
Objectives
43(1)
Background/Scenario
43(1)
Required Resources
43(1)
Instructions
43(1)
Part 1: Create a Peer-to-Peer Network
43(2)
Part 2: Modify IPv4 Addresses
45(2)
7.3.3 Packet Tracer-Observe Data Flow in a LAN
47(3)
Objectives
47(1)
Instructions
47(1)
Part 1: Create a Logical Network Diagram with 3 PCs and a Switch
47(1)
Part 2: Configure Host Names and IP Addresses on the PCs
47(1)
Part 3: Observe the Flow of Data from PC-A to PC-C by Creating Network Traffic
48(1)
Part 4: View ARP Tables on Each PC
48(2)
7.3.4 Lab-Connect to a Wireless Router
50(5)
Topology
50(1)
Objectives
50(1)
Background/Scenario
50(1)
Required Resources
50(1)
Instructions
51(1)
Part 1: Connecting to the Network
51(1)
Part 2: Some Useful Windows Networking Commands
52(3)
Chapter 8 The Internet Protocol 55(8)
8.1.2 Packet Tracer-Connect to a Web Server
55(2)
Objectives
55(1)
Instructions
55(1)
Part 1: Verify Connectivity to the Web Server
55(1)
Part 2: Connect to the Web Server via the Web Client
56(1)
8.2.7 Lab-Use a Calculator for Binary Conversions
57(6)
Objectives
57(1)
Background/Scenario
57(1)
Required Resources
57(1)
Instructions
57(1)
Part 1: Using Windows Calculator
57(1)
Part 2: Binary System
58(1)
Part 3: Network Addresses
59(2)
Reflection
61(2)
Chapter 9 Dynamic Addressing with DHCP 63(4)
9.2.5 Packet Tracer-Configure DHCP on a Wireless Router
63(4)
Objectives
63(1)
Background/Scenario
63(1)
Instructions
63(1)
Part 1: Set Up the Network Topology
63(1)
Part 2: Observe the Default DHCP Settings
63(1)
Part 3: Change the Default IP Address of the Wireless Router
64(1)
Part 4: Change the Default DHCP Range of Addresses
64(1)
Part 5: Enable DHCP on the Other PCs
64(1)
Part 6: Verify Connectivity
65(2)
Chapter 10 IPv4 and IPv6 Address Management 67(8)
10.2.3 Packet Tracer-Examine NAT on a Wireless Router
67(3)
Objectives
67(1)
Instructions
67(1)
Part 1: Examine the Configuration for Accessing External Network
67(1)
Part 2: Examine the Configurations for Accessing the Internal Network
68(1)
Part 3: Connect 3 PCs to the Wireless Router
68(1)
Part 4: View NAT Translation Across the Wireless Router
68(1)
Part 5: View the Header Information of the Packets that Traveled Across the Network
69(1)
10.4.7 Lab-Identify IPv6 Addresses
70(5)
Topology
70(1)
Objectives
70(1)
Background/Scenario
70(1)
Required Resources
70(1)
Instructions
70(1)
Part 1: Practice with Different Types of IPv6 Addresses
70(1)
Part 2: Examine a Host IPv6 Network Interface and Address
71(2)
Reflection Questions
73(2)
Chapter 11 Transport Layer Services 75(2)
11.1.6 Packet Tracer-The Client Interaction
75(2)
Objectives
75(1)
Background/Scenario
75(1)
Instructions
75(1)
Part 1: Enter Simulation Mode
75(1)
Part 2: Set Event List Filters
75(1)
Part 3: Request a Web Page from the PC
75(1)
Part 4: Run the Simulation
76(1)
Part 5: Access a Specific PDU
76(1)
Part 6: Examine the Contents of the PDU Information Window
76(1)
Chapter 12 Application Layer Services 77(12)
12.2.4 Lab-Observe DNS Name Resolution
77(4)
Objectives
77(1)
Background/Scenario
77(1)
Required Resources
77(1)
Instructions
77(1)
Part 1: Observe DNS Conversion
77(3)
Reflection
80(1)
12.3.3 Packet Tracer-Observe Web Request
81(2)
Objectives
81(1)
Instructions
81(1)
Part 1: Verify Connectivity to the Web Server
81(1)
Part 2: Connect to the Web Server
81(1)
Part 3: View the HTML Code
81(1)
Part 4: Observe Traffic Between the Client and the Web Server
81(2)
12.4.4 Packet Tracer-Use FTP Services
83(3)
Objectives
83(1)
Background/Scenario
83(1)
Instructions
83(1)
Part 1: Upload a File to an FTP Server
83(2)
Part 2: Download a File from an FTP Server
85(1)
12.5.4 Packet Tracer-Use Telnet and SSH
86(3)
Objectives
86(1)
Instructions
86(1)
Part 1: Verify Connectivity
86(1)
Part 2: Access a Remote Device
86(3)
Chapter 13 Build a Home Network 89(4)
13.5.5 Lab-Configure a Wireless Router and Client
89(4)
Topology
89(1)
Objectives
89(1)
Background/Scenario
89(1)
Required Resources
89(1)
Instructions
90(1)
Part 1: Configure Basic Settings on a Wireless Router
90(1)
Part 2: Connect a Wireless Client
90(3)
Chapter 14 Connecting to the Internet 93(8)
14.2.13 Lab-Install Linux in a Virtual Machine and Explore the GUI
93(5)
Objectives
93(1)
Background/Scenario
93(1)
Required Resources
93(1)
Instructions
93(1)
Part 1: Prepare a Computer for Virtualization
93(1)
Part 2: Install Ubuntu on the Virtual Machine
94(2)
Part 3: Explore the GUI
96(1)
Reflection Question
97(1)
14.3.8 Lab-Configure a Mobile Device for Wi-Fi Connectivity
98(3)
Objectives
98(1)
Background/Scenario
98(1)
Required Resources
98(1)
Instructions
98(1)
Part 1: Configure Wi-Fi Settings on an Android Device
98(1)
Part 2: Configure Wi-Fi Settings on an iOS Device
99(2)
Chapter 15 Security Considerations 101(2)
15.2.3 Lab - Social Engineering
101(2)
Objective
101(1)
Resources
101(1)
Instructions
101(1)
Part 1: Research Social Engineering Examples
101(1)
Part 2: Recognize the Signs of Social Engineering
101(1)
Part 3: Research Ways to Prevent Social Engineering
102(1)
Chapter 16 Configure Network and Device Security 103(4)
16.2.4 Packet Tracer-Configure Basic Wireless Security
103(1)
Objectives
103(1)
Background/Scenario
103(1)
Instructions
103(1)
Part 1: Verify Connectivity
103(1)
Part 2: Configure Basic Wireless Security
103(1)
Part 3: Update the Wireless Settings on the Laptop
103(1)
Part 4: Verify Connectivity
103(1)
16.3.8 Lab-Configure Firewall Settings
104(3)
Topology
104(1)
Objectives
104(1)
Background/Scenario
104(1)
Required Resources
104(1)
Instructions
105(1)
Part 1: Verify that the Windows Firewall is Active and is Blocking ICMP Requests
105(1)
Part 2: Create a New Inbound Rule Allowing ICMP Traffic Through the Firewall
105(1)
Part 3: Disabling or Deleting the New ICMP Rule
106 (1)
Chapter 17 Cisco Switches and Routers 107(4)
17.5.1 Packet Tracer-Compare In-Band and Out-of-Band Management Access
107(4)
Objectives
107(1)
Instructions
107(1)
Part 1: Establish an Out-of-Band Connection
107(2)
Part 2: Establish an In-Band Connection
109(2)
Chapter 18 The Cisco IOS Command Line 111(8)
18.2.6 Packet Tracer-Navigate the IOS
111(5)
Objectives
111(1)
Background/Scenario
111(1)
Instructions
111(1)
Part 1: Establish Basic Connections, Access the CLI, and Explore Help
111(1)
Part 2: Explore EXEC Modes
112(2)
Part 3: Set the Clock
114(2)
18.3.3 Packet Tracer-Use Cisco IOS Show Commands
116(3)
Objectives
116(1)
Background/Scenario
116(1)
Instructions
116(1)
Part 1: Connect to the ISP Cisco 4321 Router
116(1)
Part 2: Explore the Show Commands
116(3)
Chapter 19 Build a Small Cisco Network 119(14)
19.1.4 Packet Tracer-Implement Basic Connectivity
119(3)
Objectives
119(1)
Background/Scenario
119(1)
Instructions
119(1)
Part 1: Perform SVI Configuration on S1 and S2
119(1)
Part 2: Configure the PCs
120(2)
19.2.4 Packet Tracer-Configure initial Router Settings
122(4)
Objectives
122(1)
Background/Scenario
122(1)
Instructions
122(1)
Part 1: Verify the Default Router Configuration
122(1)
Part 2: Configure and Verify the Initial Router Configuration
123(1)
Part 3: Save the Running Configuration File
124(2)
19.3.6 Packet Tracer-Configure SSH
126(2)
Objectives
126(1)
Background/Scenario
126(1)
Instructions
126(1)
Part 1: Secure Passwords
126(1)
Part 2: Encrypt Communications
127(1)
Part 3: Verify SSH Implementation
127(1)
19.4.4 Packet Tracer-Build a Switch and Router Network
128(5)
Objectives
128(1)
Background/Scenario
128(1)
Instructions
128(1)
Part 1: Configure Devices and Verify Connectivity
128(2)
Part 2: Display Device Information
130(1)
Part 3: Secure Remote Access to the Router
131(1)
Reflection
132(1)
Chapter 20 Security Considerations 133
20.3.3 Packet Tracer-Use the ipconfig Command
133(1)
Objectives
133(1)
Background/Scenario
133(1)
Instructions
133(1)
Part 1: Verify Configurations
133(1)
Part 2: Correct Any Misconfigurations
133(1)
20.3.6 Packet Tracer-Use the ping Command
134(2)
Objectives
134(1)
Background/Scenario
134(1)
Instructions
134(1)
Part 1: Verify Connectivity
134(1)
Part 2: Ping the Web Server from PCs with Connectivity Issues
134(1)
Part 3: Ping the Web Server from Correctly Configured PCs
134(1)
Part 4: Ping the IP Address of the Web Server from PCs with Connectivity Issues
135(1)
Part 5: Compare the DNS Server Information on the PCs
135(1)
Part 6: Make Any Necessary Configuration Changes on the PCs
135(1)
20.3.12 Lab-Troubleshoot Using Network Utilities
136(5)
Objectives
136(1)
Background/Scenario
136(1)
Required Resources
136(1)
Instructions
136(1)
Part 1: Network Connections
136(2)
Part 2: External Connectivity
138(2)
Reflection
140(1)
20.4.3 Packet Tracer-Troubleshoot a Wireless Connection
141(2)
Objectives
141(1)
Background/Scenario
141(1)
Instructions
141(1)
Part 1: Verify Connectivity
141(1)
Part 2: Examine the IP Configuration of the PCs
141(1)
Part 3: Examine the Wireless Settings on the Wireless Client
141(1)
Part 4: Examine the Wireless Settings on the Wireless Router
142(1)
Part 5: Make Any Necessary Configuration Changes on the Wireless Clients
142(1)
20.7.1 Packet Tracer-Skills Integration Challenge
143
Objectives
143(1)
Background/Scenario
143(1)
Instructions
143(1)
Router R1
143(1)
Switch S1
143(1)
Server
144(1)
Wireless Router in the Home
144(1)
End Devices in the Home
144(1)
Verify Connectivity
144
Cisco Networking Academy is an innovative Cisco education initiative that delivers information and communication technology skills to improve career and economic opportunities around the world. The Academy provides online courses, interactive tools, and lab activities to prepare individuals for information technology and networking careers in virtually every industry.