1. Network Basics
-
Network concepts
-
Networking models
-
Local area network
-
Basic network types
-
Peer-to-peer model
-
Client/server model
-
Segments and backbones
-
Network wiring
-
Fiber optic
-
Twisted pair
-
Coaxial
-
Serial
-
Duplex
-
Wireless LAN
-
Network protocols
-
Network architectures
-
Network designs
-
Point-to-point vs. point-to-multipoint
-
Packet vs. circuit-switching networks
-
Ethernet
-
Ethernet networks
-
Token Ring networks
-
Wireless LANs
-
WAN bandwidth technologies
-
WAN mesh topology
-
The OSI model
-
The OSI model applied to local area networking
2. Wired Computer-To-Computer Connections
-
Wired network connections
-
Fiber optic wired connections
-
Twisted pair connections
-
Terminating CATx-to-RJ-45 connectors
-
Coaxial connections
-
Terminating coax-to-BNC connectors
-
Plenum wiring
-
Network interface cards and modems
-
Computer network connection
-
NIC selection
-
Addressing
-
MAC addresses
-
IP addresses
-
Character-based names
-
Domain Name System
-
NetBIOS
-
Port addresses
-
Modems
-
Riser cards
-
Softmodems
-
When a modem isn't a modem
-
Model installation
-
Dial-up connection creation
-
Dial-up connection object management
3. Network-To-Network Connections
-
Network-to-network connection components
-
Network Access Points (NAPs)
-
Internet Service Providers (ISPs)
-
How an ISP works
-
LAN installation components
-
Telecommunications room
-
LAN wiring
-
Network cable installation
-
Telecommunications room equipment
-
Using a punchdown tool
-
LAN wiring tests
-
LAN tests
4. Wired Internetworking Devices
-
Basic internetworking devices
-
Internetworking devices
-
Repeaters
-
Bridges
-
Heterogeneous (translating) bridges
-
Encapsulating bridges
-
A learning (transparent) bridge
-
Bridge routing management
-
Additional filtering and intelligence
-
Local and remote bridges
-
Layer 2 switches
-
Bridges vs. switches
-
Routers
-
About routers
-
Router features
-
Types of routers
-
Routing tables
-
Routing examples
-
Brouters
-
Bridges vs. routers
-
Ethernet hubs
-
Token Ring Multi-Station Access Unit
-
Media converters
-
Firewalls
-
Specialized internetworking devices
-
Higher-level switches
-
IDS and IPS
-
Traffic shaper
-
Multifunction network devices
5. Wired Communication Standards
-
The TCP/IP protocol suite
-
IEEE Network interface layer protocols
-
IPCONFIG
-
Internet layer protocols
-
Transport layer protocols
-
TCP
-
Network monitor
-
UDP
-
TCP vs. UDP
-
Application layer protocols
-
Telnet
-
NTP
-
E-mail messaging protocols
-
TCP/IP
-
IPv4
-
IPv6
-
TCP/IP configuration parameters
-
Subnet masks
-
IPv6 subnets
-
Default gateway
-
DNS
-
WINS
-
Static TCP/IP parameters
-
DHCP and DHCPv6
-
DHCP servers
-
Installing a DHCP server
-
IPv6 scopes
6. Wireless Networking
-
Wireless network devices
-
Wireless communications
-
Wireless LAN components
-
Wireless networking standards
-
Standards
-
Wireless protocols
-
Wireless configuration
-
WLAN security risks
-
WLAN security components
-
Transmission encryption
-
Wireless access point configuration
-
Wireless clients
7. Security Threats and Mitigation
-
Security threats
-
Viruses, worms, and Trojan horses
-
Social engineering
-
Phishing
-
Denial of Service (DoS) attacks
-
Distributed DoS attacks
-
Man-in-the-middle attacks
-
Spoofing
-
Threat mitigation
-
Security policies
-
Human resources policy
-
Incident response policy
-
Change management
-
Configuration management documentation
-
Education
-
Communication
-
User awareness
-
Types of training
8. Security Practices
-
Operating systems
-
Antivirus software
-
Spyware
-
Securing the operating system
-
Windows Update
-
Patch management
-
Other updates
-
Windows Firewall
-
Devices
-
Firewalls and proxy servers
-
Security zones
-
DMZ configurations
-
Traffic filtering
-
Network Access Control (NAC)
-
Virtual private network
-
Security issues
-
Built-in management interfaces
-
Physical attack susceptibility
-
Overcoming device weaknesses
-
Intrusion detection and prevention
-
NIDS
-
HIDS
-
Physical access control
-
Surveillance
9. Network Access Control
-
Authentication
-
Usernames and passwords
-
Authentication factors
-
Authentication protocols
-
Identification and authentication
-
Identity proofing
-
Single sign-on
-
Kerberos
-
The Kerberos process
-
Kerberos security weaknesses
-
CHAP
-
EAP
-
PPPoE
-
Mutual authentication
-
Public key cryptography
-
Cryptography overview
-
Encryption
-
Public key cryptography overview
-
Asymmetric cryptography
-
Public key infrastructure
-
Setup and initialization
-
Administration of issued keys and certificates
-
Certificate cancellation and key history
-
Securing public key management systems
-
Remote access
-
Remote network access
-
RADIUS
-
Diameter
-
LDAP and remote access
-
Terminal Access Controller Access Control System (TACACS)
-
802.1x
-
VPN security
-
VPN protocols
-
IPsec
-
Secure shell (SSH)
-
VPN solutions
-
Wireless security
-
Wireless networking
-
Wireless networking security
-
Wireless networking vulnerabilities
-
Wi-Fi scanners
10. Monitoring
-
Monitoring resources
-
Windows computers
-
Performance monitor
-
Performance monitor configuration
-
Data Collector Sets (DCS)
-
Viewing Data Collector Ser reports
-
Reliability Monitor
-
Remote Desktop
-
Event Viewer
-
Remote logs
-
Event forwarding
-
Subscriptions
-
Device and application logging
11. Troubleshooting
-
Troubleshooting basics
-
Information gathering
-
Identify the affected area
-
Determine if anything has changed
-
Establish the most probable cause
-
Determine if escalation is necessary
-
Create an action plan
-
Implement a solution and test the result
-
Identify the results of the solution and its effects
-
Document the problem and the solution
-
Problem and resolution tracking
-
Hardware toolkit
-
Software toolkit
-
Troubleshooting the network
-
Troubleshooting wired connections
-
Testing the physical network
-
Troubleshooting wireless network connections
-
Troubleshooting TCP/IP
-
Ipconfig
-
UNIX Ifconfig
-
Using Ipconfig to display TCP/IP settings
-
Ping and basic TCP/IP connectivity
-
NSLookup
-
Tracert
-
Windows Network Diagnostics
-
Troubleshooting scenarios
-
Remote Desktop troubleshooting
-
Inability of a user to access a shared resource
-
Preventing illegal attempts to access an account
-
Connectivity issues
-
Network problems relating to adding or removing services