Course Duration in Hours
54
54
Foundations
What is a Network?
Defining the function of network
Understanding the pieces of network
Examples of applications that use networks
Network Designs
Living in the OSI World
Introducing the mythical OSI model
Walking through the layers of OSI
Applying OSI to real life
Basic TCP/IP
Addressing Fundamentals
How OSI and TCP/IP relate
Understanding the two address concept
IP address format
Default IP address classes
Public vs Private addresses
TCP and UDP Communication
Understanding the difference between TCP and UDP
The TCP three-way handshake
TCP sequence numbers and acknowledgements
TCP windowing
Understanding Port Numbers
How port numbers work
The well-known port numbers
The Tale of Two Packets
LANs
Welcome to Ethernet
The evolution of Ethernet
CSMA/CD The essence of Ethernet Technology
Methods of communicating in the LAN
The official explanation of a MAC address
Understanding the Physical Connections
A view of network cards on PCs and Cisco devices
Understanding Ethernet cabling
The two types of Ethernet Cables
Understanding LAN Switches
The problem with CSMA/CD
Understanding Collision domains and Broadcast domains
How a Switch Switches!
Working with the Cisco Switch IOS
What is the Cisco IOS?
How to get help in the IOS?
Understanding the IOS modes.
Initial Setup of a Cisco Switch
Understanding the Physical indicators
Observing the boot process
Performing the initial configuration
Configuring Switch Security
Configuring Passwords on a Cisco switch
Understanding SSH
Setting up Port security
Optimizing and Troubleshooting Switches
Configuring speed and duplex
The place of Spanning-Tree protocol
Using show commands to troubleshoot networks
Wireless
Understanding Wireless Networking
The styles of and facts about wireless Networks
The world of radio Frequency
Wireless Network Standards and Organizations
Wireless Security and Implementation
Understanding the dangers of wireless networks
The wireless security Evolution
Basic wireless design and implementation
Advanced TCP/IP
Working with Binary
Reviewing the basics of IP
A preview of what is to come
Converting numbers from decimal to binary and back
IP Subnetting
Subnetting based on networks
Subnetting based on hosts
Reverse Engineering subnets
The great exception
Routing
Initial Router Configuration
Understanding physical indicators
Observing the boot process
Performing the initial configuration
SDM and DHCP Server Configuration
What is the SDM?
Enabling the router for SSH and secure SDM
Using SDM to configure DHCP
Implementing Static Routing
Understanding the purpose of routing (in general)
How stating routing can help
Configuration and design scenarios for static routing
Implementing Dynamic Routing with RIP
How routing protocols will help us
Types of routing protocols
Understanding and configuring RIP
Internet Access with NAT and PAT
Understanding the need for NAT
The forms of NAT
Configuring NAT
WAN Connectivity
Understanding the categories of WAN connections
Layers 2 WAN Protocols
Configuring HDLC and PPP WAN connections
Management and Security
Telnet, SSH, and CDP
Managing Telnet and SSH sessions
Using CDP to discover a Network
File Management
Understanding the purpose of copy command
Copying file to and from your router
Review
Rebuilding the small Office network
Switch VLANs
Understanding VLANs
The view of a normal switch
Defining VLANs and Trunks
The flexibility of VLANs
Understanding Trunks and VTP
Understanding how trunks really work
The 802.1Q protocol
How VTP can Help or Annihilate your Network
Configuring VLANs and VTP
Network diagram enhancements
Configuring VTP
Configuring VLANs and Switch ports
Configuring Routing Between VLANs
Switch STP
Understanding the Spanning-Tree Protocol
Some good switching practices
What switch loops are and how to stop them
Specifics of Spanning Tree Protocol operation
Configuring Basic STP
Network Diagram Modifications
Identifying current STP Configuration
Configuring and testing STP
Enhancements to STP
The STP port transitioning process
Initial Enhancement: PVST+
Ultimate Enhancement: RSTP
General Switching
Troubleshooting and Security best Practices
Switch Troubleshooting Process
Common Troubleshooting areas for switches
Securing the switched network
Subnetting
Understanding VLSM
Subnetting review
Working through VLSM scenario
Routing Protocols
Distance Vector vs. Link State
Understanding Distance Vector routing protocols
Distance vector loop prevention mechanisms
Understanding Link State protocols
OSPF Concepts
Route Summarization
OSPF terms and Network Design
The OSPF HELLO packet
OSPF Configuration and Troubleshooting
Configuring OSPF : General syntax
Modifying the Router ID
Verification and Troubleshooting
EIGRP Concepts and Configuration
EIGRP: The Good, The Bad and The Proprietary
Understanding EIRGP Auto Summery
EIGRP Configuration and Verification
Access-Lists
The Rules of the ACL
What are access lists
Using ACLs for Security
Types of ACLs
Configuring ACLs
Standard, Network Access
Standard, VTY access
Extended, IP access
Extended, TCP access
NAT
Understanding the Three Styles of NAT
Command-line NAT Configuration
WAN Connections
Concepts of VPN Technology
Implementing PPP Authentication
Understanding Frame Relay
Configuring Frame Relay
IPv6
Understanding Basic Concepts and Addressing
Configuring, Routing, and Interoperating
Add on (Juniper Fundamentals)
Introduction to JNCIA
User Interface Options
JunOS Software Fundamentals
JunOS Configuration Basics
+2
Bsc (any)
B.Com (Computers)
BCA
MCA
B.Tech
M.Tech
Diploma
Appin Technology Lab-Visakhapatnam, Visakhapatnam,IN