A strong foundation of basic networking concepts is fundamental to a successful career in information technology.
Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyse network traffic using a protocol analyser, examine switch and router configurations, perform basic IPv4 addressing and sub-netting, and research network security solutions. You will gain an understanding of basic network functions, standards, and protocols, to prepare you to tackle advanced networking skills.
What You’ll Learn:
- Basics of layered network protocols and compare the two primary reference models: OSI and TCP/IP
- Inspect a structured cabling system, including the proper use and installation of UTP and fiber optic cables
- Configure a workstation to connect to a network
- Ethernet operations and the use of VLANs by examining the configuration and operation of switches on a network
- Spanning Tree operation as a method of eliminating broadcast storms on a switched network
- Configure a Wi-Fi router for operation on a SOHO network, including security, SSID, and Wi-Fi channel
- Various IP addressing considerations, including binary to decimal conversion, dotted decimal notation, classful vs. classless addressing, private vs. public addresses, and the use of network masking
- Create a subnet for a small network, selecting the correct masks for various situations to accommodate the current number of hosts in each subnet and to also allow for future growth
- Operation of various TCP/IP protocols on a network, including connectionless and connection-oriented communications using UDP and TCP, translation between private and public addresses using NAT, and support protocols such as ARP, DNS, and DHCP
- Router configurations to determine the function of various routing protocols, including RIP, IGRP, and OSPF, within and between networks
- Various WAN technologies, including circuit switched solutions such as leased lines and packet switched solutions such as Carrier Ethernet, and determine the best WAN connectivity solution for a given corporate network
- Use a protocol analyzer to capture and view network traffic, including e-mail, instant message exchanges, and web transactions
- Basic network security implementations by testing the impact a router that has been configured as a firewall has on the flow of traffic through a network
- Research the suitability of popular anti-malware suites for mitigating network security threats
- Research Mobile Device Management (MDM) solutions to support BYOD deployments