CNP - Certified Network Principles

E-Learning
Description
This course covers network principles. Topics covered include networking fundamentals, wireless LANs, security principles, network planning, and more
This course covers network principles. Topics covered include networking fundamentals,
wireless LANs, security principles, network planning, and more.
| Lesson Id | Title | Description |
|---|---|---|
| 1 | The Desktop Lifecycle |
Introduction to Network Fundamentals Overview Section 1: Basics of Networking What is a Network? Network Integration Networking Components Networking Components (cont.) Networking Components (cont.) Networking Components (cont.) Networking Components (cont.) Logical Infrastructure Design Notes Networking Challenges Section 2: Classifying Networks Important Definition The Different Types of Networks Explaining the Different Types of Networks Explaining the Different Types of Networks Explaining the Different Types of Networks Network Topology Different Network Topologies Section 3: Network Models What is the Purpose of a Reference Model? 7 Layers of the OSI Model Explaining the 7 layers of the OSI Model TCP/IP Reference Model The Explanation of the 4 TCP/IP Layers Section 4: Troubleshooting Process Troubleshooting General Methodology What are the Best Practices for Successful Network Ethernet Troubleshooting? Network+ Troubleshooting Problem Troubleshooting Techniques Troubleshooting Techniques Troubleshooting Techniques Troubleshooting Techniques Troubleshooting Techniques Troubleshooting Techniques Network Troubleshooting Tools Review |
| 2 | The Physical Networking Fundamentals |
The Physical Networking Fundamentals Course Outline Overview Section 1: Connection Technologies What is a Physical Network? Connection Technologies Ethernet Signaling and Modulating Baseband vs. Broadband Network Bandwidth Multiplexing Data Link Layer Network Interface Controller (NIC) Channel Access Multiple Access Techniques MAC Address Computer to Computer Connections Addressing Methods Ethernet Frame Section 2: Network Devices Types of Networking Devices Layer 1 Devices Layer 2 Device Switches Layer 3 Device Network Repeater Network Modem Section 3: Copper Media Electrical Interference Types of Copper Media UTP vs. STP UTP Categories Twisted -Pair Connectors Wiring Standard Centralized Connections Centralized Connections RS -232 Termination Tools COAX Cable Different Types of COAXIAL Cables Cable Testing Tools Troubleshooting Copper Cables Section 4: Optical Media Optical Fibers Fiber Types Fiber Types Fiber Types Wavelength -Division Multiplexing (WDM) Up to 200GB Technology Fiber Optical Connectors Fiber Optical Connectors Fiber Optical Standards Equipment Troubleshooting Fiber Section 5: Ethernet Standards The Evolution of Ethernet Power over Ethernet (POE) Standard Ethernet Code Exam Relevant Standards Advanced Options Review |
| 3 | TCP/IP Primer |
TCP/IP Primer Course Outline Overview Section 1: IP Addressing Binary Numbering IP Address IPv4 Address Scheme What makes up an IP Address? Classful Addressing Classless Addressing Special IPv4 Addresses Classful Addressing Classless Addressing Special IPv4 Addresses Subnetting IPv6 Addressing Drawbacks of IPv6 Typical IPv6 Address IPv6 Address Scopes Multicast Addresses IPv6 Migration Strategies Address Resolution Physical Address Resolution ARP Requests ARP Physical Address Resolution IPv6 Domain Name System (DNS) Domain Names DNS Servers DNS Server Database Resource Records DNS Server Database Resource Records Address Assignment Automating Dynamic IP Assignment DHCPv4/v6 Common Features DHCPv4 Leasing Process DHCPv6 Leasing Process Virtual IP Addresses IP Address Management (IPAM) Section 2: Core Protocols IP Packets IPv4 Packet Structure IPv6 Packet Structure ICMP TCP/IP protocols TCP Connections Establishing a Connection Sliding windows UDP Connections Section 3: Network Ports and Applications Network Ports The Different Port Ranges Common Ports Common Ports (continued) Common Ports (continued) Application Protocols Email Protocols Remote Access Protocols Resource Sharing Protocols TCP/IP Tools Review |
| 4 | Connecting Networks, Internet, and WAN Technologies |
Connecting Networks, Internet, and WAN Technologies Course Outline Overview Section 1: Switching What is a Switching Loop? Switching Loop Effects on Network Performance Activating a Blocked Port Spanning Tree Protocol (STP) Spanning Tree Protocol (STP) Spanning Tree Protocol (STP) Spanning Tree Protocol (STP) Spanning Tree Protocol (STP) Spanning Tree Replacements How To Avoid Switching Loop Spanning Tree Replacements About VLANs VLAN Trunking Switch Management Section 2: Routing Routing Tables Route Commands Remote Routes Exterior/Interior Gateway Protocol Exterior Gateway Protocol (EGP) NAT Methods NAT Methods (continued) Port Address Translation (PAT) NAT and IPv6 Section 3: Internet Connection s The History of Internet Access Technologies Demarcation Points Dialup Access Integrated Services for Digital Network (ISDN) Two ISDN options DSL Cable Broadband Fiber Optics Internet Multiple Approaches for Fiber Optics Wireless Internet Acces s Cellular Connection Two Mobile Networks Internet Access ISP Troubleshooting Tools Internal and External Connectivity Errors Section 4: WAN Infrastructure Circuit vs. Packet Switching Virtual Circuits T and E Carriers Optical Carriers Point -to -Point Protocol Packet Switched WANs Frame Relay Asynchronous Transfer Mode UNI and NNI ATM Cells Review |
| 5 | Wireless LANs |
Wireless LANs Course Outline Overview Section 1: Wireless Networks Radio Broadcasts Managing Bandwidth Narrowband Transmission Spread Spectrum Encoding Methods MIMO and MUMIMO Devices in Wireless Networks Wireless Bridge Wireless Topology Wireless Topology Scaling Technology Scaling Technology Section 2: Wireless LAN Standards Wi -Fi Networks Frequency Bands Early Wi -Fi Standards Current Wi -Fi Standards Standards Comparison Local Wireless Technologies Local Wireless Technologies (continued) Local Wireless Technologies (continued) Bluetooth Wireless Connectivity Radio Performance Factors Radio Performance Factors Review |
| 6 | Security Principles |
Security Principles Course Outline Overview Section 1: Goals and Threats What is Information Security? What is Information Security? Defense in Depth CIA Triad Confidentiality Controls Integrity Controls Availability Controls Risk Based Definitions Classify Controls by the Actions Control Types Types of Threats Attack Vectors Password Cracking Techniques Social Engineering Techniques Phishing Information Malware Types of Malware More Malware Spyware and Adware What is a Botnet? Ransomware Stealthing: Rootkit Network Probes Spoofing Redirection DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Active Sniffing Methods Man-in-the-Middle (MitM) ARP Cache Poisoning ARP Normal Operation ARP Cache Poisoning Attacking Wireless DOS: Deauth/ Disassociation Attack Attacking Bluetooth Section 2: Digital Security Encryption Symmetric Cryptography – Use of Secret Keys Symmetric Encryption Symmetric Keys Asymmetric Cryptography Asymmetric Encryption When to Use Which Key? Asymmetric http://ijcscn.com/Documents/Volumes/vol5issue1/ijcscn2015050103.pdf Hashing Algorithms Data Integrity Mechanisms AAA Process Authentication Strong Authentication Access Control Mechanisms Biometric System Types Passwords and PINs One-Time Password Authentication Synchronous Token (Hardware or Software Token) Asynchronous Token Device (Hardware or Software Token) Cryptographic Keys Memory Cards Smart Card Digital Certificates (Public Key Certificates) Section 3: Transport Encryption SSL/TLS Hybrid Encryption SSH Security Protocol E-mail Standards Secure E-mail Standard Encryption Protocols Wireless Security Wired Equivalent Privacy Wireless Security Wi-Fi Protected Access Wireless Security 802.11i - WPA2 WPA and WPA2 Mode Types Wireless Security WPA3 Wi-Fi Protected Setup Authentication Virtual Private Network (VPN) Virtual Private Network Technologies What is a Tunneling Protocol? Tunneling Protocols – PPTP Tunneling Protocols – L2TP Tunneling Protocols – IPSec IPSec – Network Layer Protection IPSec Key Management IPSec Handshaking Process SAs in Use IPSec is a Suite of Protocols IPSEC Datagrams Review |
| 7 | Defending the Network |
Defending the Network Course Outline Overview Section 1: Network Security Components Bastion Host Devices Work at Different Layers Access Control Lists Switch Security Features Firewalls Firewall – First Line of Defense Firewall Types – Packet Filtering Firewall Types – Proxy Firewalls Firewall Types – Circuit -Level Proxy Firewall Firewall Types – Application -Layer Proxy Firewall Types – Stateful Firewall Types – Dynamic Packet -Filtering Firewall Types – Kernel Proxies Layer 7 Firewall Content Filtering Network Access Control (NAC) Design Firewall Placement Firewall Architecture Types – Screened Host Firewall Architecture Types – Multi - or Dual -Homed Firewall Architecture Types – Screened Subnet DMZ IDS – Second Line of Defense IPS – Last Line of Defense? IDS / IPS NIDS / NIPS HIDS / HIPS HIPS Unified Threat Management Unified Threat Management (UTM) UTM Product Criteria Malware Defenses Data Loss Prevention (DLP) Data Loss Prevention (DLP) Data Loss Prevention (DLP) Data Loss Prevention (DLP) Surveillance Systems Intrusion Sensors Securing Mobile Devices Secure Entryways Section 2: Network Authentication Systems Terms Used Terms Used Single Sign-on Technology Windows Account Types PPP Authentication Protocols – PAP, CHAP, MS-CHAP Authentication Protocol – EAP Authentication Protocol – EAP Remote Centralized Administration RADIUS Characteristics RADIUS TACACS+ Characteristics What is Kerberos? Important Note Dependencies Kerberos Components Keys used in Authentication Keys used in Authentication (cont.) Tickets Tickets (cont.) Login Process Message 1: Authentication Service Request Message 2: Authentication Service Reply Message 3: Ticket-Granting Service Request Message 4: Ticket-Granting Service Reply Delegation 802.1X 802.1X Three Main Components Section 3: Hardening the Network Defense in Depth Data Security Lifecycle Data Discovery Data Classification Data Classification Categories Typical Security Measures Data Protection Policies Data Deletion Application Security Secure Coding Principles Patch Management Security Updates Host Firewall Settings Securing Hosts Securing Hosts Securing the Internal Network Securing the Perimeter Network Create or Promote Cyber Security Culture What is a Vulnerability Assessment (VA)? Typical Vulnerability Assessment Process Vulnerability Scanners What is a Penetration Test? Security Troubleshooting Review |
| 8 | Network Technology Boom |
Network Technology Boom Course Outline Overview Section 1: Network Expansion Today's Networks VoIP VoIP Components VoIP Protocols SIP Trunks Streaming Media Industrial Control Systems Industrial Control Systems Industrial Control Systems What makes IoT Unique? IoT Devices DAS NAS SAN SAN Architecture SAN Architecture Quality of Service QoS 802.1p Classes Differentiated Services Differentiated Services Section 2: Virtual and Cloud Network s Virtualization Definition How Does Virtualization Work? What is a Virtual Machine (VM)? What is a Hypervisor? Type 1 and Type 2 Hypervisors Why Virtualize? Commonly Cited Benefits Virtualization Benefits vSwitch Terminology vSwitch Terminology Connectivity Vmware vSphere 6.x Virtual Switches vSwitch Connections vSwitch Routing What is a Software Defined Datacenter? Network and Communications in the Cloud Cloud Networking – VXLAN Cloud Computing Defined NIST Five Essential Characteristics NIST Three Service Models SaaS Pros and Cons PaaS Pros and Cons IaaS Pros and Cons NIST Four Deployment Models Cloud Computing Characteristics Cloud Computing Benefits Security Risks Most Commonly Cited Cloud Access Security Broker (CASB) Review |
| 9 | Day to Day Networking |
Day to Day Networking Course Outline Overview Section 1: Network Monitoring and Optimization Monitoring Tools Network Analyzer Wireshark Network Analyzer Tasks Protocols – SNMP SNMP Syslog System Logs SIEM Metrics / Performance Optimizing Performance Load Balancer Load Balancer Configurations Proxy Servers Proxy Servers Section 2: Network Fault Tolerance and Recovery Availability and Recovery Availability and Recovery Reliability and Recovery Terminology Reliability and Recovery Terminology Redundancy Power Management Site Strategies DR Site Strategies DR Site Strategies DR Site Strategies DR Site Strategies Backup Types Backup Security Creating Backup Policies Section 3: Responding to Network Security Incidents Security Events What is an Incident? Security Incident Indication of Compromise Incident Response Goals Incident Response Goals Six Step Approach to Incident Handling Preparation Phase Identification Basic Steps Identification and Initial Response Containment Containment Goals Eradication Eradication Goals Recovery Goals Follow-up Goals Review |
| 10 | Network Planning |
Network Planning Course Outline Overview Section 1: Network Policy Design About Policy Recommendations for Policy Policy Examples Acceptable Use Policies Passwords Implement General Password Policies that Work! Consider Something Better Mobile Device Policies Remote Access Policies Human Resource Policies Regulatory Compliance Business Agreements Section 2: Network Installation Network Documentation Network Diagrams Logical Infrastructure Design Notes Network Requirements Network Installation Rack Systems Organizing Components Section 3: Maintenance and Upgrades Controlling How Changes Take Place Change Control Process Requesting Changes Change Control Steps Software Changes Review |