Certification

Network Foundation
100%
Course Summary
Local Area Networks
Ethernet
Hubs, Bridges, and Switches
Infrastructure and Design
Policies and Best Practices
IP Addressing
IPv4 Addressing
IPv6 Addressing
DHCP and APIPA
Routing
TCP and UDP
Name Resolution and IPAM
Monitoring and Scanning
Network Troubleshooting
Applications and Services
Virtualization, SAN, and Cloud Services
Network Security Design
Network Security Appliances
Authentication and Endpoint Security
Network Site Management
Installing Cabled Networks
Installing Wireless Networks
Installing WAN Links
Configuring Remote Access
Course Summary
Local Area Networks
- Topologies and the OSI Model
- Key Features of Networks
- Network Topologies
- The OSI Model
- Physical Layer
- Data Link Layer
- Network Layer
- Transport Layer
- Upper Layers
- OSI Model Summary
Ethernet
- Transmission Media
- Media Access Control
- Broadcast Domains
- Ethernet Frames
- Ethernet Deployment Standards
- MAC Addressing
- Address Resolution Protocol (ARP)
- Packet Sniffers
Hubs, Bridges, and Switches
- Hubs and Bridges
- Switches
- Switch Interface Configuration
- Spanning Tree Protocol (STP)
- Power over Ethernet (PoE)
Infrastructure and Design
- Network Infrastructure Implementations
- Planning an Enterprise Campus Network
- Network Hierarchy and Distributed Switching
- Software Defined Networking
- Planning a SOHO Network
- TCP/IP Protocol Suite
Policies and Best Practices
- Procedures and Standards
- Safety Procedures
- Incident Response Policies
- Security and Data Policies
- Password Policy
- Employee Policies
IP Addressing
- Internet Protocol
- IPv4
- IPv4 Address Structure
- Subnet Masks
- IP Routing Basics
- ipconfig / ifconfig
- ICMP and ping
IPv4 Addressing
- Broadcast, Multicast, and Unicast
- Classful Addressing
- Public versus Private Addressing
- Subnetting and Classless Addressing
- Planning an IPv4 Addressing Scheme
- Public Internet Addressing
- Variable Length Subnet Masks (VLSM)
IPv6 Addressing
- IPv6 Address Format
- IPv6 Addressing Schemes
- IPv6 Address Autoconfiguration
- Migrating to IPv6
DHCP and APIPA
- IPv4 Address Autoconfiguration
- Configuring DHCP
- DHCPv6
Routing
- Routing Basics
- Routing Algorithms and Metrics
- Dynamic Routing Protocols
- Administrative Distance and Route Redistribution
- IPv4 and IPv6 Internet Routing
- High Availability Routing
- Installing and Configuring Routers
- Routing Troubleshooting Tools
TCP and UDP
- Transmission Control Protocol (TCP)
- User Datagram Protocol (UDP)
- TCP and UDP Ports
- Port Scanners
- Protocol Analyzers
Name Resolution and IPAM
- Host Names and FQDNs
- Domain Name System
- Configuring DNS Servers
- Resource Records
- Name Resolution Tools
- IP Address Management (IPAM)
Monitoring and Scanning
- Performance Monitoring
- Network Monitoring Utilities
- Logs and Event Management
- Simple Network Management Protocol
- Analyzing Performance Metrics
- Patch Management
- Vulnerability Scanning
Network Troubleshooting
- Troubleshooting Procedures
- Identifying the Problem
- Establishing a Probable Cause
- Establishing a Plan of Action
- Troubleshooting Hardware Failure Issues
- Troubleshooting Addressing Issues
- Troubleshooting DHCP Issues
- Troubleshooting Name Resolution
- Troubleshooting Services
Applications and Services
- TCP/IP Services
- HTTP and Web Servers
- SSL / TLS and HTTPS
- Email (SMTP / POP / IMAP)
- Voice Services (VoIP and VTC)
- Real-time Services Protocols
- Quality of Service
- Traffic Shaping
- Bottlenecks and Load Balancing
- Multilayer Switches
Virtualization, SAN, and Cloud Services
- Virtualization Technologies
- Network Storage Types
- Fibre Channel and InfiniBand
- iSCSI
- Cloud Computing
- Configuring Cloud Connectivity
Network Security Design
- Security Basics
- Common Networking Attacks
- Network Segmentation and DMZ
- Virtual LANs (VLAN)
- VLAN Trunks
- Network Address Translation (NAT)
- Device and Service Hardening
- Honeypots and Penetration Tests
Network Security Appliances
- Basic Firewalls
- Stateful Firewalls
- Deploying a Firewall
- Configuring a Firewall
- Deploying a Proxy
- Intrusion Detection Systems (IDS)
- Denial of Service
Authentication and Endpoint Security
- Authentication and Access Controls
- Social Engineering
- Authentication Technologies
- PKI and Digital Certificates
- Local Authentication
- RADIUS and TACACS+
- Directory Services
- Endpoint Security
- Network Access Control
Network Site Management
- Network Cabling Solutions
- Distribution Frames
- Change and Configuration Management
- Network Documentation and Diagrams
- Labeling
- Physical Security Devices
- Business Continuity and Disaster Recovery
- Network Link Management
- Power Management
- Backup Management
Installing Cabled Networks
- Twisted Pair Cable (UTP / STP / ScTP)
- Twisted Pair Connectors
- Wiring Tools and Techniques
- Cable Testing Tools
- Troubleshooting Wired Connectivity
- Other Copper Cable Types
- Fiber Optic Cable and Connectors
- Transceivers and Media Converters
Installing Wireless Networks
- Wireless Standards (IEEE 802.11)
- Wireless Network Topologies
- Wireless Site Design
- Troubleshooting Wireless Connectivity
- Wireless Security
- Wi-Fi Authentication
- Extensible Authentication Protocol
- Troubleshooting Wireless Security
- Wireless Controllers
Installing WAN Links
- Wide Area Networks (WAN)
- Telecommunications Networks
- Modern Telecommunications Networks
- Local Loop Services
- Installing WAN Links
- Wireless WAN Services
- Internet of Things
Configuring Remote Access
- Remote Access Services (RAS)
- MPLS and PPP
- SIP Trunks 474
- Virtual Private Networks (VPN)
- SSL / TLS / DTLS VPNs
- IPsec
- Internet Key Exchange / ISAKMP
- Remote Access Servers
- Remote Administration Tools
- Managing Network Appliances
- Remote File Access