course

Home / Courses / CNP – Certified Network Principles

Agenda

  • Introduction to Network Fundamentals
  • Overview
  • Section 1: Basics of Networking
  • What is a Network?
  • Network Integration
  • Networking Components
  • Networking Components (cont.)
  • Networking Components (cont.)
  • Networking Components (cont.)
  • Networking Components (cont.)
  • Logical Infrastructure Design Notes
  • Networking Challenges
  • Section 2: Classifying Networks
  • Important Definition
  • The Different Types of Networks
  • Explaining the Different Types of Networks
  • Explaining the Different Types of Networks
  • Explaining the Different Types of Networks
  • Network Topology
  • Different Network Topologies
  • Section 3: Network Models
  • What is the Purpose of a Reference Model?
  • 7 Layers of the OSI Model
  • Explaining the 7 layers of the OSI Model
  • TCP/IP Reference Model
  • The Explanation of the 4 TCP/IP Layers
  • Section 4: Troubleshooting Process
  • Troubleshooting General Methodology
  • What are the Best Practices for Successful Network Ethernet Troubleshooting?
  • Network+ Troubleshooting Problem
  • Troubleshooting Techniques
  • Troubleshooting Techniques
  • Troubleshooting Techniques
  • Troubleshooting Techniques
  • Troubleshooting Techniques
  • Troubleshooting Techniques
  • Network Troubleshooting Tools
  • Review

  • The Physical Networking Fundamentals
  • Course Outline
  • Overview
  • Section 1: Connection Technologies
  • What is a Physical Network?
  • Connection Technologies
  • Ethernet
  • Signaling and Modulating
  • Baseband vs. Broadband
  • Network Bandwidth
  • Multiplexing
  • Data Link Layer
  • Network Interface Controller (NIC)
  • Channel Access
  • Multiple Access Techniques
  • MAC Address
  • Computer to Computer Connections
  • Addressing Methods
  • Ethernet Frame
  • Section 2: Network Devices
  • Types of Networking Devices
  • Layer 1 Devices
  • Layer 2 Device
  • Switches
  • Layer 3 Device
  • Network Repeater
  • Network Modem
  • Section 3: Copper Media
  • Electrical Interference
  • Types of Copper Media
  • UTP vs. STP
  • UTP Categories
  • Twisted
  • -Pair Connectors
  • Wiring Standard
  • Centralized Connections
  • Centralized Connections
  • RS
  • -232
  • Termination Tools
  • COAX Cable
  • Different Types of COAXIAL Cables
  • Cable Testing Tools
  • Troubleshooting Copper Cables
  • Section 4: Optical Media
  • Optical Fibers
  • Fiber Types
  • Fiber Types
  • Fiber Types
  • Wavelength
  • -Division Multiplexing (WDM)
  • Up to 200GB Technology
  • Fiber Optical Connectors
  • Fiber Optical Connectors
  • Fiber Optical Standards
  • Equipment
  • Troubleshooting Fiber
  • Section 5: Ethernet Standards
  • The Evolution of Ethernet
  • Power over Ethernet (POE)
  • Standard Ethernet Code
  • Exam Relevant Standards
  • Advanced Options
  • Review

  • TCP/IP Primer
  • Course Outline
  • Overview
  • Section 1: IP Addressing
  • Binary Numbering
  • IP Address
  • IPv4 Address Scheme
  • What makes up an IP Address?
  • Classful Addressing
  • Classless Addressing
  • Special IPv4 Addresses
  • Classful Addressing
  • Classless Addressing
  • Special IPv4 Addresses
  • Subnetting IPv6 Addressing
  • Drawbacks of IPv6
  • Typical IPv6 Address
  • IPv6 Address Scopes
  • Multicast Addresses
  • IPv6 Migration Strategies
  • Address Resolution
  • Physical Address Resolution
  • ARP Requests
  • ARP
  • Physical Address Resolution IPv6
  • Domain Name System (DNS)
  • Domain Names
  • DNS Servers
  • DNS Server Database Resource Records
  • DNS Server Database Resource Records
  • Address Assignment
  • Automating Dynamic IP Assignment
  • DHCPv4/v6 Common Features
  • DHCPv4 Leasing Process
  • DHCPv6 Leasing Process
  • Virtual IP Addresses
  • IP Address Management (IPAM)
  • Section 2: Core Protocols
  • IP Packets
  • IPv4 Packet Structure
  • IPv6 Packet Structure
  • ICMP
  • TCP/IP protocols
  • TCP Connections
  • Establishing a Connection
  • Sliding windows
  • UDP Connections
  • Section 3: Network Ports and Applications
  • Network Ports
  • The Different Port Ranges
  • Common Ports
  • Common Ports (continued)
  • Common Ports (continued)
  • Application Protocols
  • Email Protocols
  • Remote Access Protocols
  • Resource Sharing Protocols
  • TCP/IP Tools
  • Review

  • Connecting Networks, Internet, and WAN Technologies
  • Course Outline
  • Overview
  • Section 1: Switching
  • What is a Switching Loop?
  • Switching Loop Effects on Network Performance
  • Activating a Blocked Port
  • Spanning Tree Protocol (STP)
  • Spanning Tree Protocol (STP)
  • Spanning Tree Protocol (STP)
  • Spanning Tree Protocol (STP)
  • Spanning Tree Protocol (STP)
  • Spanning Tree Replacements
  • How To Avoid Switching Loop
  • Spanning Tree Replacements
  • About VLANs
  • VLAN Trunking
  • Switch Management
  • Section 2: Routing
  • Routing Tables
  • Route Commands
  • Remote Routes
  • Exterior/Interior Gateway Protocol
  • Exterior Gateway Protocol (EGP)
  • NAT Methods
  • NAT Methods (continued)
  • Port Address Translation (PAT)
  • NAT and IPv6
  • Section 3: Internet Connection
  • s
  • The History of Internet Access
  • Technologies
  • Demarcation Points
  • Dialup Access
  • Integrated Services for Digital Network (ISDN)
  • Two ISDN options
  • DSL
  • Cable Broadband
  • Fiber Optics Internet
  • Multiple Approaches for Fiber Optics
  • Wireless Internet Acces
  • s
  • Cellular Connection
  • Two Mobile Networks
  • Internet Access
  • ISP Troubleshooting Tools
  • Internal and External Connectivity Errors
  • Section 4: WAN Infrastructure
  • Circuit vs. Packet Switching
  • Virtual Circuits
  • T and E Carriers
  • Optical Carriers
  • Point
  • -to
  • -Point Protocol
  • Packet Switched WANs
  • Frame Relay
  • Asynchronous Transfer Mode
  • UNI and NNI
  • ATM Cells
  • Review

  • Wireless LANs
  • Course Outline
  • Overview
  • Section 1: Wireless Networks
  • Radio Broadcasts
  • Managing Bandwidth
  • Narrowband Transmission
  • Spread Spectrum Encoding Methods
  • MIMO and MUMIMO
  • Devices in Wireless Networks
  • Wireless Bridge
  • Wireless Topology
  • Wireless Topology
  • Scaling Technology
  • Scaling Technology
  • Section 2: Wireless LAN Standards
  • Wi
  • -Fi Networks
  • Frequency Bands
  • Early Wi
  • -Fi Standards
  • Current Wi
  • -Fi Standards
  • Standards Comparison
  • Local Wireless Technologies
  • Local Wireless Technologies (continued)
  • Local Wireless Technologies (continued)
  • Bluetooth
  • Wireless Connectivity
  • Radio Performance Factors
  • Radio Performance Factors
  • Review

  • Security Principles
  • Course Outline
  • Overview
  • Section 1: Goals and Threats
  • What is Information Security?
  • What is Information Security?
  • Defense in Depth
  • CIA Triad
  • Confidentiality Controls
  • Integrity Controls
  • Availability Controls
  • Risk Based Definitions
  • Classify Controls by the Actions
  • Control Types
  • Types of Threats
  • Attack Vectors
  • Password Cracking Techniques
  • Social Engineering Techniques
  • Phishing Information
  • Malware
  • Types of Malware
  • More Malware Spyware and Adware
  • What is a Botnet?
  • Ransomware
  • Stealthing: Rootkit
  • Network Probes
  • Spoofing
  • Redirection
  • DoS
  • DDoS
  • Packet Sniffers
  • Passive Sniffing
  • Active Sniffing
  • Active Sniffing Methods
  • Man-in-the-Middle (MitM)
  • ARP Cache Poisoning
  • ARP Normal Operation
  • ARP Cache Poisoning
  • Attacking Wireless
  • DOS: Deauth/ Disassociation Attack
  • Attacking Bluetooth
  • Section 2: Digital Security
  • Encryption
  • Symmetric Cryptography – Use of Secret Keys
  • Symmetric Encryption
  • Symmetric Keys
  • Asymmetric Cryptography
  • Asymmetric Encryption
  • When to Use Which Key?
  • Asymmetric
  • http://ijcscn.com/Documents/Volumes/vol5issue1/ijcscn2015050103.pdf
  • Hashing Algorithms
  • Data Integrity Mechanisms
  • AAA Process
  • Authentication
  • Strong Authentication
  • Access Control Mechanisms
  • Biometric System Types
  • Passwords and PINs
  • One-Time Password Authentication
  • Synchronous Token (Hardware or Software Token)
  • Asynchronous Token Device (Hardware or Software Token)
  • Cryptographic Keys
  • Memory Cards
  • Smart Card
  • Digital Certificates (Public Key Certificates)
  • Section 3: Transport Encryption
  • SSL/TLS Hybrid Encryption
  • SSH Security Protocol
  • E-mail Standards
  • Secure E-mail Standard
  • Encryption Protocols
  • Wireless Security Wired Equivalent Privacy
  • Wireless Security Wi-Fi Protected Access
  • Wireless Security 802.11i – WPA2
  • WPA and WPA2 Mode Types
  • Wireless Security WPA3
  • Wi-Fi Protected Setup
  • Authentication
  • Virtual Private Network (VPN)
  • Virtual Private Network Technologies
  • What is a Tunneling Protocol?
  • Tunneling Protocols
  • – PPTP
  • Tunneling Protocols
  • – L2TP
  • Tunneling Protocols
  • – IPSec
  • IPSec
  • – Network Layer Protection
  • IPSec Key Management
  • IPSec Handshaking Process
  • SAs in Use
  • IPSec is a Suite of Protocols
  • IPSEC Datagrams
  • Review

  • Defending the Network
  • Course Outline
  • Overview
  • Section 1: Network Security Components
  • Bastion Host
  • Devices Work at Different Layers
  • Access Control Lists
  • Switch Security Features
  • Firewalls
  • Firewall
  • – First Line of Defense
  • Firewall Types
  • – Packet Filtering
  • Firewall Types
  • – Proxy Firewalls
  • Firewall Types
  • – Circuit
  • -Level Proxy Firewall
  • Firewall Types
  • – Application
  • -Layer Proxy
  • Firewall Types
  • – Stateful
  • Firewall Types
  • – Dynamic Packet
  • -Filtering
  • Firewall Types
  • – Kernel Proxies
  • Layer 7 Firewall
  • Content Filtering
  • Network Access Control (NAC)
  • Design
  • Firewall Placement
  • Firewall Architecture Types
  • – Screened Host
  • Firewall Architecture Types
  • – Multi
  • – or Dual
  • -Homed
  • Firewall Architecture Types
  • – Screened Subnet
  • DMZ
  • IDS
  • – Second Line of Defense
  • IPS
  • – Last Line of Defense?
  • IDS / IPS
  • NIDS / NIPS
  • HIDS / HIPS
  • HIPS
  • Unified Threat Management
  • Unified Threat Management (UTM)
  • UTM Product Criteria
  • Malware Defenses
  • Data Loss Prevention (DLP)
  • Data Loss Prevention (DLP)
  • Data Loss Prevention (DLP)
  • Data Loss Prevention (DLP)
  • Surveillance Systems
  • Intrusion Sensors
  • Securing Mobile Devices
  • Secure Entryways
  • Section 2: Network Authentication Systems
  • Terms Used
  • Terms Used
  • Single Sign-on Technology
  • Windows Account Types
  • PPP
  • Authentication Protocols – PAP, CHAP, MS-CHAP
  • Authentication Protocol – EAP
  • Authentication Protocol – EAP
  • Remote Centralized Administration
  • RADIUS Characteristics
  • RADIUS
  • TACACS+ Characteristics
  • What is Kerberos?
  • Important Note
  • Dependencies
  • Kerberos Components
  • Keys used in Authentication
  • Keys used in Authentication (cont.)
  • Tickets
  • Tickets (cont.)
  • Login Process
  • Message 1: Authentication Service Request
  • Message 2: Authentication Service Reply
  • Message 3: Ticket-Granting Service Request
  • Message 4: Ticket-Granting Service Reply
  • Delegation
  • 802.1X
  • 802.1X Three Main Components
  • Section 3: Hardening the Network
  • Defense in Depth
  • Data Security Lifecycle
  • Data Discovery
  • Data Classification
  • Data Classification Categories
  • Typical Security Measures
  • Data Protection Policies
  • Data Deletion
  • Application Security
  • Secure Coding Principles
  • Patch Management
  • Security Updates
  • Host Firewall Settings
  • Securing Hosts
  • Securing Hosts
  • Securing the Internal Network
  • Securing the Perimeter Network
  • Create or Promote Cyber Security Culture
  • What is a Vulnerability Assessment (VA)?
  • Typical Vulnerability Assessment Process
  • Vulnerability Scanners
  • What is a Penetration Test?
  • Security Troubleshooting Review

  • Network Technology Boom
  • Course Outline
  • Overview
  • Section 1: Network Expansion
  • Today’s Networks
  • VoIP
  • VoIP Components
  • VoIP Protocols
  • SIP Trunks
  • Streaming Media
  • Industrial Control Systems
  • Industrial Control Systems
  • Industrial Control Systems
  • What makes IoT Unique?
  • IoT Devices
  • DAS
  • NAS
  • SAN
  • SAN Architecture
  • SAN Architecture
  • Quality of Service
  • QoS
  • 802.1p Classes
  • Differentiated Services
  • Differentiated Services
  • Section 2: Virtual and Cloud Network
  • s
  • Virtualization Definition
  • How Does Virtualization Work?
  • What is a Virtual Machine (VM)?
  • What is a Hypervisor?
  • Type 1 and Type 2 Hypervisors
  • Why Virtualize? Commonly Cited Benefits
  • Virtualization Benefits
  • vSwitch Terminology
  • vSwitch Terminology
  • Connectivity
  • Vmware vSphere 6.x Virtual Switches
  • vSwitch Connections
  • vSwitch Routing
  • What is a Software Defined Datacenter?
  • Network and Communications in the Cloud
  • Cloud Networking
  • – VXLAN
  • Cloud Computing Defined
  • NIST Five Essential Characteristics
  • NIST Three Service Models
  • SaaS Pros and Cons
  • PaaS Pros and Cons
  • IaaS Pros and Cons
  • NIST Four Deployment Models
  • Cloud Computing Characteristics
  • Cloud Computing Benefits
  • Security Risks Most Commonly Cited
  • Cloud Access Security Broker (CASB)
  • Review

  • Day to Day Networking
  • Course Outline
  • Overview
  • Section 1: Network Monitoring and Optimization
  • Monitoring Tools
  • Network Analyzer Wireshark
  • Network Analyzer Tasks
  • Protocols
  • – SNMP
  • SNMP
  • Syslog
  • System Logs
  • SIEM
  • Metrics / Performance
  • Optimizing Performance
  • Load Balancer
  • Load Balancer Configurations
  • Proxy Servers
  • Proxy Servers
  • Section 2: Network Fault Tolerance and Recovery
  • Availability and Recovery
  • Availability and Recovery
  • Reliability and Recovery Terminology
  • Reliability and Recovery Terminology
  • Redundancy
  • Power Management
  • Site Strategies
  • DR Site Strategies
  • DR Site Strategies
  • DR Site Strategies
  • DR Site Strategies
  • Backup Types
  • Backup Security
  • Creating Backup Policies
  • Section 3: Responding to Network Security Incidents
  • Security Events
  • What is an Incident?
  • Security Incident
  • Indication of Compromise
  • Incident Response Goals
  • Incident Response Goals
  • Six Step Approach to Incident Handling
  • Preparation Phase
  • Identification Basic Steps Identification and Initial Response
  • Containment
  • Containment Goals
  • Eradication
  • Eradication Goals
  • Recovery Goals
  • Follow-up Goals
  • Review

  • Network Planning
  • Course Outline
  • Overview
  • Section 1: Network Policy Design
  • About Policy
  • Recommendations for Policy
  • Policy Examples
  • Acceptable Use Policies
  • Passwords
  • Implement General Password Policies that Work!
  • Consider Something Better
  • Mobile Device Policies
  • Remote Access Policies
  • Human Resource Policies
  • Regulatory Compliance
  • Business Agreements
  • Section 2: Network Installation
  • Network Documentation
  • Network Diagrams
  • Logical Infrastructure Design Notes
  • Network Requirements
  • Network Installation
  • Rack Systems
  • Organizing Components
  • Section 3: Maintenance and Upgrades
  • Controlling How Changes Take Place
  • Change Control Process
  • Requesting Changes
  • Change Control Steps
  • Software Changes
  • Review
Tags
Technical Core Type: Core 4 Product Line: Other Technical
FREE

Interested in course?