Table of Contents



-6439819545320Modified: 2020-06-12020000Modified: 2020-06-12-914400-9144000003743325LESSON PLAN 00LESSON PLAN left2722245TestOut Network Pro - English 5.0.x 020000TestOut Network Pro - English 5.0.x Table of Contents TOC \o "1-1" \h \z \u Table of Contents PAGEREF _Toc41911219 \h 20.1: Network Pro Introduction PAGEREF _Toc41911220 \h 40.2: Use the Simulator PAGEREF _Toc41911221 \h 51.1: Networking Overview PAGEREF _Toc41911222 \h 61.2: Network Topologies PAGEREF _Toc41911223 \h 81.3: The OSI Model PAGEREF _Toc41911224 \h 101.4: Network Protocols PAGEREF _Toc41911225 \h 121.5: Numbering Systems PAGEREF _Toc41911226 \h 142.1: Twisted Pair PAGEREF _Toc41911227 \h 152.2: Coaxial PAGEREF _Toc41911228 \h 172.3: Fiber Optic PAGEREF _Toc41911229 \h 192.4: Wiring Implementation PAGEREF _Toc41911230 \h 212.5: Troubleshoot Network Media PAGEREF _Toc41911231 \h 243.1: Network Adapters PAGEREF _Toc41911232 \h 273.2: Network Devices PAGEREF _Toc41911233 \h 303.3: Internetwork Devices PAGEREF _Toc41911234 \h 324.1: Ethernet PAGEREF _Toc41911235 \h 344.2: Ethernet Specifications PAGEREF _Toc41911236 \h 364.3: Connect Network Devices PAGEREF _Toc41911237 \h 384.4: Troubleshoot Physical Connectivity PAGEREF _Toc41911238 \h 405.1: IP Addressing PAGEREF _Toc41911239 \h 425.2: APIPA and Alternate Addressing PAGEREF _Toc41911240 \h 455.3: DHCP Server Configuration PAGEREF _Toc41911241 \h 475.4: DHCP Relay PAGEREF _Toc41911242 \h 495.5: DNS Name Resolution PAGEREF _Toc41911243 \h 515.6: IP Version 6 PAGEREF _Toc41911244 \h 545.7: Multicast PAGEREF _Toc41911245 \h 575.8: Troubleshoot IP Configuration Issues PAGEREF _Toc41911246 \h 585.9: Troubleshoot IP Communications PAGEREF _Toc41911247 \h 605.10: Troubleshoot Name Resolution PAGEREF _Toc41911248 \h 626.1: Switch Access PAGEREF _Toc41911249 \h 646.2: Switch IP Configuration PAGEREF _Toc41911250 \h 666.3: Switch Interface Configuration PAGEREF _Toc41911251 \h 676.4: Virtual LANs PAGEREF _Toc41911252 \h 696.5: Trunking PAGEREF _Toc41911253 \h 716.6: Spanning Tree Protocol PAGEREF _Toc41911254 \h 736.7: Switch Troubleshooting PAGEREF _Toc41911255 \h 757.1: Routing Basics PAGEREF _Toc41911256 \h 777.2: Routing Protocols PAGEREF _Toc41911257 \h 797.3: Network Address Translation PAGEREF _Toc41911258 \h 827.4: Routing Troubleshooting PAGEREF _Toc41911259 \h 848.1: Firewalls PAGEREF _Toc41911260 \h 868.2: Security Appliances PAGEREF _Toc41911261 \h 898.3: Firewall Design and Implementation PAGEREF _Toc41911262 \h 919.1: Network-Based Storage PAGEREF _Toc41911263 \h 939.2: Voice over IP (VoIP) PAGEREF _Toc41911264 \h 959.3: Virtualization PAGEREF _Toc41911265 \h 989.4: Virtual Networking PAGEREF _Toc41911266 \h 1009.5: Cloud Computing PAGEREF _Toc41911267 \h 10210.1: Wireless Concepts PAGEREF _Toc41911268 \h 10410.2: Wireless Standards PAGEREF _Toc41911269 \h 10610.3: Wireless Configuration PAGEREF _Toc41911270 \h 10810.4: Wireless Network Design PAGEREF _Toc41911271 \h 11010.5: Wireless Network Implementation PAGEREF _Toc41911272 \h 11310.6: Wireless Security PAGEREF _Toc41911273 \h 11510.7: Wireless Troubleshooting PAGEREF _Toc41911274 \h 11811.1: WAN Concepts PAGEREF _Toc41911275 \h 12011.2: WAN Connections PAGEREF _Toc41911276 \h 12311.3: Internet Connectivity PAGEREF _Toc41911277 \h 12511.4: Remote Access PAGEREF _Toc41911278 \h 12811.5: WAN Troubleshooting PAGEREF _Toc41911279 \h 13012.1: Network Design, Documentation, and Policies PAGEREF _Toc41911280 \h 13212.2: Risk Management PAGEREF _Toc41911281 \h 13512.3: Security Policies PAGEREF _Toc41911282 \h 13813.1: Physical Security PAGEREF _Toc41911283 \h 14113.2: Social Engineering PAGEREF _Toc41911284 \h 14313.3: Network Vulnerabilities and Threats 1 PAGEREF _Toc41911285 \h 14513.4: Network Vulnerabilities and Threats 2 PAGEREF _Toc41911286 \h 14913.5: Authentication PAGEREF _Toc41911287 \h 15113.6: Secure Protocols PAGEREF _Toc41911288 \h 15413.7: Remote Access Security PAGEREF _Toc41911289 \h 15613.8: Troubleshoot Network Security Issues PAGEREF _Toc41911290 \h 15814.1: Detection and Prevention PAGEREF _Toc41911291 \h 16014.2: Penetration Testing PAGEREF _Toc41911292 \h 16314.3: Network Hardening PAGEREF _Toc41911293 \h 16615.1: Update Management PAGEREF _Toc41911294 \h 16915.2: Data Protection PAGEREF _Toc41911295 \h 17115.3: Remote Management PAGEREF _Toc41911296 \h 17315.4: Mobile Device Management PAGEREF _Toc41911297 \h 17515.5: Data Center Management PAGEREF _Toc41911298 \h 17715.6: Monitoring PAGEREF _Toc41911299 \h 17915.7: Log File Management PAGEREF _Toc41911300 \h 18115.8: Network Management with SNMP PAGEREF _Toc41911301 \h 18316.1: Optimization PAGEREF _Toc41911302 \h 18516.2: Troubleshooting Methodology PAGEREF _Toc41911303 \h 189Practice Exams PAGEREF _Toc41911304 \h 191Appendix A: Approximate Time for the Course PAGEREF _Toc41911305 \h 1920.1: Network Pro IntroductionLecture Focus Questions:What are the course prerequisites? What major topics are covered in the course? What certification does this course prepare me for? ?Video/DemoTime0.1.1 Network Pro Introduction3:35Total Video Time3:35Total TimeAbout 4 minutes0.2: Use the SimulatorSummaryIn this section, you will learn to:Read simulated component documentation and view components to make appropriate choices and meet the scenario's requirements. Add and remove simulated computer components. Change views and navigate between floors and buildings to view and add simulated components. Use the zoom feature to view additional image details. Attach simulated cables. Use the simulation interface to identify where simulated cables connect to the computer. Configure services on Hyper-V guest servers. ?Video/DemoTime0.2.1 Use the Simulator10:59Total Video Time10:59Lab/Activity0.2.2 Explore a Single Location in a Lab0.2.3 Explore Multiple Locations in a LabTotal TimeAbout 35 minutes1.1: Networking OverviewLecture Focus Questions:Why are protocols important for networking? What are the advantages of a client-server network as compared to a peer-to-peer network? What is the main characteristic of a subnet? How can you tell one subnet from another? How does an intranet differ from the internet? What is the main purpose of an extranet? The key terms for this section include:TermDefinitionInternet Protocol Address (IP Address)The Internet Protocol (IP) address identifies the network and host address assigned to a device.Subnet AddressThe portion of the IP address that identifies the network the device is assigned to.Local Area Network(LAN)A group of computers and associated devices that share a common communications line or wireless link, typically to a server.Metropolitan Area Network (MAN)All of the networks within the same metropolitan area that are connected together.Wide Area Network(WAN)A WAN connects several LANs. Wans are often limited to a corporation or an organization, but are sometimes accessible to the public.InternetThe internet is a collection of many different networks owned by many different entities that all share information and communicate together.IntranetA local or restricted communications network, especially a private network created using World Wide Web software.ExtranetAn intranet that can be partially accessed by authorized outside users, enabling businesses to exchange information over the internet securely.This section helps you prepare for the following certification exam objectives:ExamObjectiveCompTIA Network+1.5 Compare and contrast the characteristics of network topologies, types and technologies. Types LAN MAN WAN CAN ?Video/DemoTime1.1.1 Introduction to Networking5:231.1.2 Network Types7:471.1.3 Networking Terms10:58Total Video Time24:08Fact Sheets1.1.4 Networking FactsNumber of Exam Questions4 questionsTotal TimeAbout 34 minutes1.2: Network TopologiesLecture Focus Questions:What is defined by the logical topology? How does the logical topology differ from the physical topology? Why can a single physical topology support multiple logical topologies? Why is a physical mesh topology normally an impractical solution? What advantages of the logical star topology have as compared to the logical bus topology? Why is termination important on a physical bus topology? How do hosts on a physical ring topology communicate? The key terms for this section include:TermDefinitionTopologyTopology is the term used to describe how devices are connected and how messages flow from device to device. The physical topology describes the way the network is wired. The logical topology describes the way messages are sent.LANLAN is the acronym for local area network. A LAN is a computer network that interconnects computers within a limited area.TerminatorTerminators absorb signals and prevent them from reflecting repeatedly back and forth on the cable. Terminators are used with bus topology.This section helps you prepare for the following certification exam objectives:ExamObjectiveCompTIA Network+1.5 Compare and contrast the characteristics of network topologies, types and technologies. Wired topologies Logical vs. physical Star Ring Mesh Bus ?Video/DemoTime1.2.1 Network Topologies7:09Total Video Time7:09Fact Sheets1.2.2 Topology FactsNumber of Exam Questions12 questionsTotal TimeAbout 25 minutes1.3: The OSI ModelLecture Focus Questions:What is the OSI model? Why is it important for understanding networking? What are the advantages of using a theoretical model to describe networking? What is the name of Layer 3 in the OSI model? Layer 5? Which OSI model layers typically correspond to the network architecture? How does the session ID differ from the port number? Which OSI model layer would you find a frame at? What is the difference between connectionless and connection-oriented services? The key terms for this section include:TermDefinitionOpen Systems Interconnection (OSI) Model?A reference model for how applications communicate over a network without regard to its underlying internal structure and technology.This section helps you prepare for the following certification exam objectives:ExamObjectiveCompTIA Network+1.2 Explain devices, applications, protocols and services at their appropriate OSI layers. Layer 1 - Physical Layer 2 - Data link Layer 3 - Network Layer 4 - Transport Layer 5 - Session Layer 6 - Presentation Layer 7 - Application ?Video/DemoTime1.3.1 The OSI Model3:011.3.3 OSI Model Layers7:561.3.4 OSI Model Communications3:14Total Video Time14:11Fact Sheets1.3.2 OSI Model Facts1.3.5 OSI Layers FactsNumber of Exam Questions14 questionsTotal TimeAbout 39 minutes1.4: Network ProtocolsLecture Focus Questions:How does a protocol suite differ from a protocol? How does TCP differ from UDP? What are the differences between the three email protocols (IMAP4, POP3, and SMTP)? How does SSH differ from Telnet? How does HTTPS differ from HTTP? The key terms for this section include:TermDefinitionProtocolA protocol is a set of standards for communication between network hosts.TCP/IP SuiteThe internet protocol suite (frequently referred to as TCP/IP) is the most widely used protocol suite today.This section helps you prepare for the following certification exam objectives:ExamObjectiveCompTIA Network+1.1 Explain the purposes and uses of ports and protocols. Protocols and ports SSH 22 DNS 53 SMTP 25 SFTP 22 FTP 20, 21 TFTP 69 TELNET 23 DHCP 67, 68 HTTP 80 HTTPS 443 SNMP 161 RDP 3389 NTP 123 SIP 5060, 5061 SMB 445 POP 110 IMAP 143 LDAP 389 LDAPS 636 H.323 1720 Connection-oriented vs. connectionless 1.8 Explain the functions of network services.NTP 3.4 Given a scenario, use remote access methods.RDP Telnet ?Video/DemoTime1.4.1 TCP/IP Protocol Suite7:571.4.2 Common Network Services8:141.4.3 Explore Network Services7:58Total Video Time24:09Fact Sheets1.4.4 Common TCP/IP ProtocolsNumber of Exam Questions12 questionsTotal TimeAbout 42 minutes1.5: Numbering SystemsLecture Focus Questions:What is the difference between a binary numbering system and a hexadecimal numbering system? What are the possible values in a binary number? In a hexadecimal number, how many possible characters can be used for each number space? In a 3-bit binary number, how many possible combinations are there? The key terms for this section include:TermDefinitionBinary NumberA number system that only has two values, typically 0 (zero) and 1 (one).Octal NumberA base-8 number system that uses the digits 0-7.Hexadecimal NumberA numbering system with 16 symbols, 1-9 and A-F.?Video/DemoTime1.5.1 Numbering Systems8:39Total Video Time8:39Fact Sheets1.5.2 Numbering System FactsNumber of Exam Questions3 questionsTotal TimeAbout 17 minutes2.1: Twisted PairLecture Focus Questions:Why are wires twisted together in twisted pair cables? What is the difference between STP cabling and UTP cabling? What is the difference between Cat 3, Cat 5e, and Cat 6a cables? How can you tell the difference between RJ11 and RJ45 connectors? You have an installation that requires Cat 5 cabling. Which cable ratings could you use for the installation? In this section, you will learn to:Select and install cables to connect a DSL modem. Select and install cables to connect to an Ethernet network. The key terms for this section include:TermDefinitionCrosstalkAn unwanted transfer of signals between communication channels.UTPUTP stands for unshielded twisted pair. UTP cables are easy to work with and less expensive than shielded cables.STPSTP stands for shielded twisted pair. Shielding is electrically conductive foil or braided material that is wrapped around pairs of wires, around the overall cable, or both.Plenum SpaceA plenum space is a part of a building that provides a pathway for the airflow needed by heating and air conditioning systems, such as above a dropped ceiling or below a raised floor.Riser SpaceAn area that connects multiple floors where cables can be run. This area cannot be a plenum space.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro1.1 Implement a cabling solution to establish network pTIA Network+2.1 Given a scenario, deploy the appropriate cabling solution. Media types Copper UTP STP Plenum vs. PVC Connector types Copper RJ-45 RJ-11 Copper cable standards Cat 3 Cat 5 Cat 5e Cat 6 Cat 6a Cat 7 ?Video/DemoTime2.1.1 Twisted Pair11:25Total Video Time11:25Lab/Activity2.1.3 Connect to an Ethernet NetworkFact Sheets2.1.2 Twisted Pair FactsNumber of Exam Questions7 questionsTotal TimeAbout 36 minutes2.2: CoaxialLecture Focus Questions:What is the function of the wire mesh in coaxial cables? Which part of the cable is used to carry data? Which connector type and cable grade is used to connect a cable modem to the internet? Is twisted pair cable more immune to EMI than coaxial cable? In this section, you will learn to:Connect a cable modem. The key terms for this section include:TermDefinitionPVCPolyvinyl chloride is a type of plastic use to shield objects such as coaxial cable.EMIElectromagnetic interference (EMI) is a disturbance generated by an external source that affects an electrical circuit by electromagnetic induction, electrostatic coupling, or conduction.BNCA BNC (Bayonet Neill–Concelman) is a type of quick connect/disconnect adapter used on some types of cables, such as the RG-58 A/U cable used with the 10Base-2 Ethernet system.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro1.1 Implement a cabling solution to establish network pTIA Network+2.1 Given a scenario, deploy the appropriate cabling solution. Media types Copper Connector types Copper BNC DB-9 DB-25 F-type Copper cable standards RG-6 RG-59 3.4 Given a scenario, use remote access methods.Out-of-band management Modem ?Video/DemoTime2.2.1 Coaxial4:54Total Video Time4:54Lab/Activity2.2.3 Connect a Cable ModemFact Sheets2.2.2 Coaxial Cable FactsNumber of Exam Questions6 questionsTotal TimeAbout 28 minutes2.3: Fiber OpticLecture Focus Questions:How do light waves within a fiber optic cable travel around corners? What advantages do fiber optic cables offer over twisted pair cables and other media choices? What are the disadvantages of implementing fiber optic cables? What is the difference between single mode and multimode cables? How can you tell the difference between an ST connector and an SC connector? Which connector types combine two strands of fiber into a single connector? What are media converters used for? In this section, you will learn to:Select and install components to connect to a network that uses fiber optic media. The key terms for this section include:TermDefinitionLEDA light-emitting diode is a two-lead semiconductor light source that emits visible light when an electric current passes through it.WDMWave Division Multiplexing (WDM) joins several light wavelengths (colors) onto a single strand of fiber.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro1.1 Implement a cabling solution to establish network communication.?CompTIA Network+2.1 Given a scenario, deploy the appropriate cabling solution. Media types Copper Fiber Single-mode Multimode Connector types Fiber LC ST SC APC UPC MTRJ 2.2 Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them.Media converter ?Video/DemoTime2.3.1 Fiber Optic10:52Total Video Time10:52Lab/Activity2.3.3 Connect Fiber Optic CablesFact Sheets2.3.2 Fiber Optic FactsNumber of Exam Questions9 questionsTotal TimeAbout 37 minutes2.4: Wiring ImplementationLecture Focus Questions:What is the difference between the T568A and T568B standards? When should you use both standards? What type of cable would you use to connect two hosts together in a back-to-back configuration using twisted pair cable? When should you use stranded core twisted pair cable instead of solid core twisted pair? What is the difference between the MDF and an IDF? What type of cable connects an IDF to the MDF? Who is typically responsible for installing a demarc extension? What is the difference between a 25 pair block and a 50 pair block? What can you use to make the 50 pair block function like a 25 pair block? When you use a punch down tool, which way should the blade be facing? What is a patch panel used for? In this section, you will learn to:Use the appropriate tools to create Cat 5 drop cables. Use the appropriate tools to connect cables using punch down blocks. Connect patch panel cables. The key terms for this section include:TermDefinitionPoEPower over Ethernet (PoE) is a technology that allows a single cable to provide both data and electric power to devices such as wireless access points, IP cameras, and VoIP phones.PinoutWhen connecting two devices using twisted pair cabling, the pinout determines which wire goes to which pin of the connector.LECWhen you contract with a local exchange carrier (LEC) for data, internet, or telephone services, they install a physical cable and a termination jack onto your premises.DemarcThe demarc (short for demarcation point) is the line that marks the boundary between the telecommunications (telco) equipment and your private network or telephone system.MDFsA frame or rack that is used to interconnect and manage telecommunication wiring in a building. It functions like an old-time telephone switchboard, where operators used connecting wires to route telephone calls. Today's MDF describes the room that houses the traditional MDF along with networking patch panels. Often, rack-mounted equipment is also housed in an MDF.Punchdown Block?A device that connects one group of wires to another group of wires through a system of metal pegs that the wires are attached to.Patch PanelPatch panels permit circuits to be arranged and rearranged by plugging and unplugging respective patch cords in a mounted hardware assembly.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro1.1 Implement a cabling solution to establish network pTIA Network+2.1 Given a scenario, deploy the appropriate cabling solution.Copper termination standards TIA/EIA 568a TIA/EIA 568b Termination points 66 block 110 block Patch panel Fiber distribution panel 2.5 Compare and contrast WAN technologies.Termination Demarcation point Smart jack 3.1 Given a scenario, use appropriate documentation and diagrams to manage the network.Wiring and port locations IDF/MDF documentation ?Video/DemoTime2.4.1 Twisted Pair Cable Construction9:582.4.3 Wiring Distribution5:152.4.4 Use Punchdown Blocks5:31Total Video Time20:44Lab/Activity2.4.6 Connect Patch Panel Cables 12.4.7 Connect Patch Panel Cables 2Fact Sheets2.4.2 Cable Construction Facts2.4.5 Wiring Distribution FactsNumber of Exam Questions13 questionsTotal TimeAbout 68 minutes2.5: Troubleshoot Network MediaLecture Focus Questions:How do you prevent back reflection and optical return loss? What is the difference between a short circuit and an open circuit? What happens when you connect a single mode fiber to multimode fiber? What is the difference between a time-domain reflectometer and an optical time-domain reflectometer? Which tool would you use to test the bandwidth of your internet connection? Which cable types are immune to the effects of EMI? How does distance affect attenuation? How does distance affect impedance? What is the single best method to reduce the effects of an impedance mismatch? What is the difference between a regular cable tester and a cable certifier? Which tool would you use to find the end of a specific cable within a wiring closet? The key terms for this section include:TermDefinitionElectromagnetic Interference (EMI)andRadio Frequency Interference (RFI)Electromagnetic interference and radio frequency interference are external signals that interfere with normal network communications. Common sources of EMI/RFI include nearby generators, motors (such as elevator motors), radio transmitters, welders, transformers, and fluorescent lighting.CrosstalkCrosstalk is interference that is caused by signals within twisted pairs of wires (for example, current flow on one twisted pair causing a current flow on an adjacent pair).AttenuationAttenuation is the loss of signal strength from one end of a cable to the other. This is also known as dB loss.ShortAn electrical short occurs when electrical signals take a path other than the intended path. In the case of twisted pair wiring, a short means that a signal sent on one wire arrives on a different wire.Open CircuitAn open circuit is when a cut in the wire prevents the original signal from reaching the end of the wire. An open circuit is different from a short in that the signal stops (electricity cannot flow because the path is disconnected).This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro5.1 Troubleshoot issues with networking media or devices to establish network pTIA Network+2.5 Compare and contrast WAN technologies.Termination Smart jack 5.2 Given a scenario, use the appropriate tool.Hardware tools Crimper Punchdown tool OTDR Multimeter Light meter Tone generator Cable tester Loopback adapter Spectrum analyzer Software tools Bandwidth speed tester 5.3 Given a scenario, troubleshoot common wired connectivity and performance issues.Attenuation Crosstalk EMI Open/short Incorrect pin-out Incorrect cable type Transceiver mismatch TX/RX reverse Damaged cables Bent pins 5.4 Given a scenario, troubleshoot common wireless connectivity and performance issues.Reflection Refraction Absorption ?Video/DemoTime2.5.1 Troubleshoot Copper Wiring Issues13:522.5.3 Troubleshoot Fiber Optic Wiring Issues7:302.5.5 Troubleshooting Tools6:08Total Video Time27:30Fact Sheets2.5.2 Copper Wiring Troubleshooting Facts2.5.4 Fiber Optic Wiring Troubleshooting Facts2.5.6 Troubleshooting Tools FactsNumber of Exam Questions15 questionsTotal TimeAbout 58 minutes3.1: Network AdaptersLecture Focus Questions:What are two major differences between a modem and an Ethernet NIC? How can you identify a network card manufacturer from its MAC address? What is the function of a transceiver? What is the purpose of the CRC? At which OSI layer does a network adapter card operate? At which layer does a media converter work? Can you use a media converter to connect network segments that are using different architecture types? Why or why not? How does a computer find the MAC address of another device on the same subnet? What does the MAC address FF-FF-FF-FF-FF-FF indicate? In this section, you will learn to:Select and install network cards to meet network connection requirements. Connect a media converter. The key terms for this section include:TermDefinitionNICA network interface card (NIC), also called a network adapter, connects a host to the network medium. It is responsible for converting binary data into a format that can be sent on the network medium.GBICA GBIC (gigabit interface converter) is a large transceiver that fits in a port slot and is used for Gigabit media, including copper and optical fiber.SFPAn SFP (small form-factor pluggable) is similar to a GBIC, but is a smaller size. An SFP is sometimes called a mini-GBIC.XFPAn XFP transceiver is similar to an SFP in size, but is used for 10-Gigabit networking.QSFPQSFP (quad, or 4-channel, small form-factor pluggable) is a compact hot-pluggable transceiver that is also used for data communication applications.MAC AddressA Media Access Control (MAC) address is a unique identifier burned into the ROM of every Ethernet NIC.Address Resolution Protocol(ARP)Hosts use ARP to discover the MAC address of a device from its IP address.Reverse Address Resolution Protocol(RARP)Hosts use the reverse address resolution protocol (RARP) to find the IP address of a host with a known MAC address.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro1.2 Deploy appropriate wired networking or internetworking device(s). 5.1 Troubleshoot issues with networking media or devices to establish network communication.?CompTIA Network+2.1 Given a scenario, deploy the appropriate cabling solution.Transceivers SFP GBIC SFP+ QSFP Characteristics of fiber transceivers Bidirectional 2.2 Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them.Modems ?Video/DemoTime3.1.1 Network Adapters8:34Total Video Time8:34Lab/Activity3.1.3 Select and Install a Network Adapter3.1.4 Connect a Media ConverterFact Sheets3.1.2 Network Adapter FactsNumber of Exam Questions10 questionsTotal TimeAbout 48 minutes3.2: Network DevicesLecture Focus Questions:A host on a network sends a frame to the hub. Which other devices on the network will see this frame? A host on a network sends a frame to a switch. Which other devices on the network will see this frame? What are the similarities and differences between a bridge and a switch? What are the advantages of using switches instead of hubs? At which OSI model layer do wireless access points operate? What type of device do you use to translate from one network architecture to another? In this section, you will learn to:Select and install appropriate networking hardware. The key terms for this section include:TermDefinitionHubThe central connecting point of a physical star, logical bus topology.BridgeA device that connects two (or more) media segments on the same subnet. It filters traffic between both segments based on the MAC address in the frame.SwitchA multi-port bridge that performs filtering based on MAC addresses and provides additional features not found in a bridge.Wireless Access Point (AP)A hub for a wireless network. As with a hub, any message sent to any wireless host connected to the AP can be received by all other wireless hosts.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro1.2 Deploy appropriate wired networking or internetworking device(s).5.1 Troubleshoot issues with networking media or devices to establish network pTIA Network+2.2 Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them.Switch Hub ?Video/DemoTime3.2.1 Network Devices10:10Total Video Time10:10Lab/Activity3.2.3 Install a Hub3.2.4 Select a Networking DeviceFact Sheets3.2.2 Network Connection Device FactsNumber of Exam Questions14 questionsTotal TimeAbout 54 minutes3.3: Internetwork DevicesLecture Focus Questions:What is the main role of a router? How does a router differ from a switch or a hub? How are the physical and logical network addresses used when data is routed through an internetwork? Which addresses stay the same? Which addresses change from hop to hop? How does a firewall protect a network? In this section, you will learn to:Select the appropriate device to connect two networks The key terms for this section include:TermDefinitionRouterA router is a device that connects two or more network segments or subnets.FirewallA firewall is a router with additional security features. Firewalls can be programmed with security rules to restrict the flow of traffic between networks.Layer 3 SwitchA Layer 3 switch is capable of reading Layer 3 (network) addresses and routing packets between subnets. A Layer 3 switch often provides better performance than a router, but it does not support as many features as a router.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro1.2 Deploy appropriate wired networking or internetworking device(s).5.1 Troubleshoot issues with networking media or devices to establish network pTIA Network+2.2 Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them.Firewall Router 2.3 Explain the purposes and use cases for advanced networking devices.Multilayer switch ?Video/DemoTime3.3.1 Internetwork Devices6:28Total Video Time6:28Lab/Activity3.3.3 Select a RouterFact Sheets3.3.2 Internetwork Device FactsNumber of Exam Questions5 questionsTotal TimeAbout 29 minutes4.1: EthernetLecture Focus Questions:What logical topologies are supported on an Ethernet network? What is the purpose of the backoff on Ethernet networks? How can you eliminate collisions on an Ethernet network? What device is used to enable full-duplex communications with Ethernet? The key terms for this section include:TermDefinitionUTPUTP stands for unshielded twisted pair. UTP cables are easy to work with and less expensive than shielded cables.MAC AddressA Media Access Control (MAC) address is a unique identifier burned into the ROM of every Ethernet NIC.CRCThe cyclic redundancy check (CRC) is the result of a mathematical calculation performed on the frame. The CRC helps verify that the frame contents have arrived uncorrupted.This section helps you prepare for the following certification exam objectives:ExamObjectiveCompTIA Network+1.3 Explain the concepts and characteristics of routing and switching.Properties of network traffic CSMA/CD 2.1 Given a scenario, deploy the appropriate cabling solution.Transceivers Characteristics of fiber transceivers Duplex ?Video/DemoTime4.1.1 Ethernet Architecture8:20Total Video Time8:20Fact Sheets4.1.2 Ethernet FactsNumber of Exam Questions4 questionsTotal TimeAbout 18 minutes4.2: Ethernet SpecificationsLecture Focus Questions:What is the maximum cable length for most Ethernet standards that use twisted pair cables? Which twisted pair cable category should you use on a 1000BaseT network? What is the advantage of using single mode cable on a 1000BaseLX network? What is the difference between 1000BaseLX and 1000BaseSX? In this section, you will learn to:Reconnect to an Ethernet network The key terms for this section include:TermDefinitionUTPUTP stands for unshielded twisted pair. UTP cables are easy to work with and less expensive than shielded cables.Fiber Optic CableFiber optic cable is a high-speed data transmission medium. It contains tiny glass or plastic optical fibers that carry light beams. Digital data is transmitted through the cable via rapid pulses of light.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro1.1 Select and install cables for communication between computers and networking pTIA Network+2.1 Given a scenario, deploy the appropriate cabling solution.Ethernet deployment standards 100BaseT 1000BaseT 1000BaseLX 1000BaseSX 10GBaseT ?Video/DemoTime4.2.1 Ethernet Specifications6:18Total Video Time6:18Lab/Activity4.2.3 Reconnect to an Ethernet NetworkFact Sheets4.2.2 Ethernet Specifications FactsNumber of Exam Questions15 questionsTotal TimeAbout 39 minutes4.3: Connect Network DevicesLecture Focus Questions:Which cable type would you use to connect a workstation to a regular port on a hub or a switch? Which cable type would you use to connect a router to the uplink port on a switch? Which cable type would you use to connect two switches together using their uplink ports? Which switch feature makes choosing crossover or straight-through cables easier? When would you use a rollover cable? In this section, you will learn to:Connect network devices. The key terms for this section include:TermDefinitionStraight-Through CableA straight-through cable connects each wire to the same pin on each connector (pin 1 to pin 1, pin 2 to pin 2, etc.). A straight-through cable is used when a crossover is performed with a hub or a switch.Crossover CableA crossover cable matches the transmit (Tx) wires on one connector with the receive (Rx) wires on the other connector. A crossover cable is used when crossing is not performed automatically or when crossover is performed twice.RolloverA rollover cable might also have an RJ45 connector on both ends, requiring an adapter to convert from the RJ45 connector to the serial cable.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro1.1 Select and install cables for communication between computers and networking devices.2.1 Select and install the appropriate networking or internetworking device(s).CompTIA Network+2.1 Given a scenario, deploy the appropriate cabling solution.Connector types Copper DB-9 DB-25 Copper termination standards Crossover Straight-through ?Video/DemoTime4.3.1 Connect Devices7:38Total Video Time7:38Lab/Activity4.3.3 Connect Network DevicesFact Sheets4.3.2 Device Connection FactsNumber of Exam Questions11 questionsTotal TimeAbout 36 minutes4.4: Troubleshoot Physical ConnectivityLecture Focus Questions:What happens if a host goes down in a star topology? What happens if a host goes down in a token ring topology? What happens if there is a cable break on a bus topology? What happens is there is a cable break on a dual ring topology? What is indicated by a flashing green link light? What might be the problem if none of the NIC lights are working? In this section, you will learn to:Connect a network cable. Replace the patch cable. Replace a faulty cable. Troubleshoot a faulty cable. Reconnect a switch. Troubleshoot a switch. Connect an unplugged cable. Troubleshoot an unplugged cable. The key terms for this section include:TermDefinitionCollisionIn a half duplex Ethernet network, a collision is the result of two devices on the same Ethernet network attempting to transmit data at exactly the same time.Keepalive SignalA Keepalive signal is a message sent by one device (such as a network interface card)? to another device (such as a switch) to check that the link between the two is operating. A keepalive signal is sometimes referred to as a heartbeat.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro1.2 Deploy appropriate wired networking or internetworking device(s).5.1 Troubleshoot issues with networking media or devices to establish network pTIA Network+1.5 Compare and contrast the characteristics of network topologies, types and technologies.Wired topologies Logical vs. physical Star Ring Mesh Bus 5.3 Given a scenario, troubleshoot common wired connectivity and performance issues.Duplex/speed mismatch Network connection LED status indicators 5.5 Given a scenario, troubleshoot common network service issues.Hardware failure ?Video/DemoTime4.4.1 Troubleshoot the Physical Network Topology6:554.4.3 Troubleshoot the Link Status6:24Total Video Time13:19Lab/Activity4.4.5 Explore Physical Connectivity4.4.6 Troubleshoot Physical Connectivity 14.4.7 Troubleshoot Physical Connectivity 24.4.8 Troubleshoot Physical Connectivity 34.4.9 Troubleshoot Physical Connectivity 4Fact Sheets4.4.2 Physical Network Topology Troubleshooting Facts4.4.4 Link Status Troubleshooting FactsNumber of Exam Questions12 questionsTotal TimeAbout 96 minutes5.1: IP AddressingLecture Focus Questions:What is an octet? What is the decimal equivalent of the following binary number? 01100111. What is the binary equivalent of the following decimal number? 211. How is the network portion of an IP address identified? Which portion of a class C address designates the network address? What is the difference between subnetting and supernetting? Which method uses a subnet mask that is longer than the default subnet mask? What does /14 mean in the following IP address: 199.78.11.12/14? How does variable-length subnet masking work? In this section, you will learn to:Configure IP addresses. Configure IP addresses on mobile devices. The key terms for this section include:TermDefinitionIANAThe Internet Assigned Numbers Authority is a function of a nonprofit private American corporation that oversees global IP address allocation, autonomous system number allocation, root zone management in the Domain Name System, media types, and other Internet Protocol-related symbols and internet numbers.Classful IP AddressesClassful addresses are IP addresses that use a default subnet mask, as follows: Class A: 255.0.0.0 Class B: 255.255.0.0 Class C: 255.255.255.0 VLSMVariable Length Subnet Masking (VLSM) is the method used to divide an IP address into subnets of different sizes. When using VLSM, you ignore the default subnet mask boundaries and specify a custom number of subnet mask bits.SubnettingThe process of dividing a large network into smaller networks.SupernettingThe process of combining two or more networks.Classless Inter-Domain Routing(CIDR)A set of internet protocol standards used to create unique identifiers for networks and host devices.ANDingThe process used to determine the network address/ID.Subnet MaskA 32-bit number that defines which portion of an IPv4 address identifies the network address and which portion of the address defines the host work IDA 32-bit number that identifies the network an IPv4 address belongs to.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro2.1 Configure IP addressing, DNS, and DHCP for a network pTIA Network+1.3 Explain the concepts and characteristics of routing and switching.Properties of network traffic Broadcast 1.4 Given a scenario, configure the appropriate IP addressing components.Subnet mask Subnetting Classful Classes A, B, C, D, and E Classless VLSM CIDR notation (IPv4 vs. IPv6) Address assignments DHCP Static ?Video/DemoTime5.1.1 IP Addresses10:435.1.3 Subnets12:135.1.6 IP Address Assignment6:42Total Video Time29:38Lab/Activity5.1.7 Configure IP Addresses5.1.8 Configure IP Addresses on Mobile DevicesFact Sheets5.1.2 IP Address Facts5.1.4 Subnet Facts5.1.5 Variable Length Subnet Mask (VLSM) Facts5.1.9 IP Address Assignment FactsNumber of Exam Questions15 questionsTotal TimeAbout 89 minutes5.2: APIPA and Alternate AddressingLecture Focus Questions:How do you know if a host is using an APIPA address? Which IP configuration parameters are set when APIPA is used? Which parameters are not set? In which scenarios would an alternate IP configuration simplify IP configuration? In this section, you will learn to:Set Up alternate addressing. Configure alternate addressing. The key terms for this section include:TermDefinitionAutomatic Private IP Addressing (APIPA)APIPA provides an option for automatic IP address assignment without a DHCP server. APIPA is enabled by default on most modern operating systems, including Windows and Linux.Alternate IP ConfigurationA manual configuration of a computer's IP address, default gateway, DNS server address, and WINS address. This configuration is used if the DHCP server fails to provide this similar information.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro2.1 Configure IP addressing, DNS, and DHCP for a network pTIA Network+1.4 Given a scenario, configure the appropriate IP addressing components.Address assignments APIPA ?Video/DemoTime5.2.1 APIPA4:035.2.2 Set Up Alternate Addressing3:53Total Video Time7:56Lab/Activity5.2.3 Configure Alternate AddressingFact Sheets5.2.4 APIPA and Alternate IP Addressing FactsNumber of Exam Questions3 questionsTotal TimeAbout 28 minutes5.3: DHCP Server ConfigurationLecture Focus Questions:What type of configuration parameters can be delivered using DHCP? What are the advantages of static IP address assignments? When might you want to use static IP addressing? In this section, you will learn to:Configure a DHCP server. Configure DHCP options. Create DHCP exclusions. Create DHCP client reservations. Configure a DHCP client. The key terms for this section include:TermDefinitionDHCP Discover (D)The client begins by sending out a DHCP Discover frame to identify DHCP servers on the network.DHCP Offer (O)A DHCP server that receives a Discover request from a client responds with a DHCP Offer advertisement, which contains an available IP address. If more than one DHCP server responds with an offer, the client usually responds to the first offer it receives.DHCP Request (R)The client accepts the offered IP address by sending a DHCP request back to the DHCP server.DHCP ACK (A)The DHCP server responds to the request by sending a DHCP ACK (acknowledgement). At this point, the IP address is leased to and configured on the DHCP client.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro3.1 Configure DHCP services for a network pTIA Network+1.4 Given a scenario, configure the appropriate IP addressing components.Address assignments DHCP IP reservations 1.8 Explain the functions of network services.DHCP service MAC reservations Pools IP exclusions Scope options Lease time ?Video/DemoTime5.3.1 DHCP Server10:375.3.3 DHCP Options4:175.3.7 Configure Host Addressing2:24Total Video Time17:18Lab/Activity5.3.2 Configure a DHCP Server5.3.4 Configure DHCP Options5.3.5 Create DHCP Exclusions5.3.6 Create DHCP Client Reservations5.3.8 Configure a DHCP ClientFact Sheets5.3.9 DHCP Configuration FactsNumber of Exam Questions8 questionsTotal TimeAbout 91 minutes5.4: DHCP RelayLecture Focus Questions:What is the difference between an RFC 1542 compliant router and a DHCP relay agent? In this section, you will learn to:Configure a DHCP relay agent Add a DHCP server on another subnet The key terms for this section include:TermDefinitionRFC 1542 Compliant RouterAn RFC 1542 compliant router listens for DHCP traffic and routes any received DHCP frames to the appropriate subnet. .DHCP Relay AgentA function of the Routing and Remote Access service (RRAS) role on a Windows server, the DHCP Relay Agent service sends the DHCP packets it receives to a remote DHCP server on a different subnet.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro3.1 Configure DHCP services for a network pTIA Network+1.8 Explain the functions of network services.DHCP service DHCP relay/IP helper ?Video/DemoTime5.4.1 Configure DHCP Relay5:50Total Video Time5:50Lab/Activity5.4.3 Configure a DHCP Relay Agent5.4.4 Add a DHCP Server on Another SubnetFact Sheets5.4.2 DHCP Relay FactsNumber of Exam Questions3 questionsTotal TimeAbout 38 minutes5.5: DNS Name ResolutionLecture Focus Questions:How are host names organized in DNS? What is the difference between a forward lookup zone and a reverse lookup? What is the role of the root servers in DNS? In DNS, what is the difference between a zone and a domain? What is the difference between an A record and a PTR record? In this section, you will learn to:Configure DNS addresses. Create standard DNS zones. Create reverse DNS zones. Create host records. Create CNAME records. Troubleshoot DNS records. The key terms for this section include:TermDefinition. (dot) domainThe . (dot) domain, or root domain, denotes a fully qualified, unambiguous domain -Level Domain(TDL)The last part of a domain name (for example, .com, .edu, .gov). TDLs are managed by the Internet Corporation of Assigned Names and Numbers (ICANN).Fully Qualified Domain Name(FQDN)The host name and all domain names separated by periods. The final period (which is for the root domain) is often omitted and only implied.Additional DomainsAdditional domains are second-level domains with names registered to an individual or organization for use on the internet. These names are based on an appropriate top-level domains, depending on the type of organization or geographic location where a name is used. and are examples of additional domains in your DNS structure.HostnameThe hostname is the part of a domain name that represents a specific host. For example, "www" is the hostname of .RecordsRecords are used to store entries for hostnames, IP addresses, and other information in the zone database. Each host has at least one record in the DNS database that maps the hostname to the IP address.Authoritative ServerAn authoritative server is a DNS server that has a complete copy of all the records for a particular domain.Dynamic DNS(DDNS)DDNS enables clients or the DHCP server to update records in the zone database. Without dynamic updates, all A (host) and PTR (pointer) records must be configured manually. With dynamic updates, host records are created and deleted automatically whenever the DHCP server creates or releases an IP address lease.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro3.2 Configure DNS for the pTIA Network+1.8 Explain the functions of network services.DNS service Record types A, AAA TXT (SPF, DKIM) SRV MX CNAME NS PTR Internal vs. external DNS Third-party/cloud-hosted DNS Hierarchy Forward vs. reverse zone ?Video/DemoTime5.5.1 DNS12:535.5.2 Configure DNS11:34Total Video Time24:27Lab/Activity5.5.4 Configure DNS Addresses5.5.5 Create Standard DNS Zones5.5.6 Create Host Records5.5.7 Create CNAME Records5.5.8 Troubleshoot DNS RecordsFact Sheets5.5.3 DNS FactsNumber of Exam Questions5 questionsTotal TimeAbout 95 minutes5.6: IP Version 6Lecture Focus Questions:What is the primary reason for developing IPv6? How many hexadecimal numbers are in an IPv6 address? How does this compare to a MAC address? What do you add to an IPv6 address when you remove one or more quartets with all 0s? What information is included within the IPv6 address prefix? How many numbers are used for the interface ID? How can the interface ID be related to the MAC address? What is the difference between ISATAP and 6to4 tunneling? What is the difference between stateful autoconfiguration and stateless autoconfiguration? In this section, you will learn to:Configure IPv6 addresses. Configure a DHCP6 server. Configure an IPv6 address. The key terms for this section include:TermDefinitionGlobal-UnicastAn IPv6 address type that is publicly routable and can be used in the internet.Unique-LocalAn IPv6 address type that indicates an IP address is a private IP address.Link-LocalAn IPv6 address type that indicates that the IP address was configured by default.MulticastAn IPv6 address type that indicates that the packet is addressed to a number of hosts on the network, but not all hosts.Prefix IDThe leftmost bits of the IPv6 address, also know as the network ID. The prefix is used for routing IPv6 packets.Interface IDThe rightmost bits of the IPv6 address used to uniquely identify a network card (interface) in a host.AnycastA unicast address that is assigned to more than one interface, typically interfaces belonging to different hosts.Local LoopbackThe local loopback address for the local host is 0:0:0:0:0:0:0:1 (also identified as ::1 or ::1/128). The local loopback address is not assigned to an interface. It can verify that the TCP/IP protocol stack is properly installed on the host.Dual StackA dual stack configuration enables a host to communicate with IPv4 and IPv6 hosts; the IPv4 and IPv6 protocol stacks run concurrently on a host.TunnelingTunneling allows IPv6 hosts or sites to communicate over the existing IPv4 infrastructure. A device encapsulates IPv6 packets within IPv4 packets for transmission across an IPv4 network, and then the IPv6 packets are de-encapsulated by another device at the other end. Static Full AssignmentThe entire 128-bit address and all other configuration information is statically assigned to the host.Static Partial AssignmentThe prefix is statically assigned. The interface ID is derived from the MAC address.Stateless AutoconfigurationClients automatically generate the interface ID and learn the subnet prefix and default gateway through the Neighbor Discovery Protocol (NDP).DHCPv6IPv6 uses an updated version of DHCP, DHCPv6. It operates in two modes, stateful and stateless. This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro2.1 Configure IP addressing, DNS, and DHCP for a network pTIA Network+1.3 Explain the concepts and characteristics of routing and switching.IPv6 concepts Addressing Tunneling Dual stack Router advertisement Neighbor discovery 1.4 Given a scenario, configure the appropriate IP addressing components.Loopback and reserved Default gateway Address assignments DHCPv6 EUI64 1.8 Explain the functions of network services.IPAM ?Video/DemoTime5.6.1 IP Version 69:275.6.5 IPv6 Address Assignment11:065.6.6 Configure IPv6 Addresses9:335.6.7 Configure a DHCP6 Server4:59Total Video Time35:05Lab/Activity5.6.9 Configure an IPv6 AddressFact Sheets5.6.2 IPv6 Facts5.6.3 IPv6 Address Type Facts5.6.4 IPv4 to IPv6 Migration5.6.8 IPv6 Address Assignment FactsNumber of Exam Questions8 questionsTotal TimeAbout 76 minutes5.7: MulticastLecture Focus Questions:How does multicast differ from unicast and broadcast? What is the IP address range reserved for multicast groups? What does a regular switch do when it receives a multicast frame? Which device would you configure to prevent multicast traffic from being sent to non-group members? The key terms for this section include:TermDefinitionUnicastMessages are sent to a specific host address. The sending device must know the IP address of all recipients and must create a separate packet for each destination device.BroadcastA single packet that, when sent, is processed by all hosts. Broadcast packets are not typically forwarded by routers, so broadcast traffic is limited to within a single subnet.IGMPThe Internet Group Management Protocol (IGMP) is used to identify group members and to forward multicast packets on to the segments where group members reside.This section helps you prepare for the following certification exam objectives:ExamObjectiveCompTIA Network+1.3 Explain the concepts and characteristics of routing and switching.Properties of network traffic Multicast Unicast ?Video/DemoTime5.7.1 Multicast6:24Total Video Time6:24Fact Sheets5.7.2 Multicast FactsNumber of Exam Questions6 questionsTotal TimeAbout 18 minutes5.8: Troubleshoot IP Configuration IssuesLecture Focus Questions:What does the /release switch do when used with ipconfig? How can you tell if a rogue DHCP server is active on your network? How do you know if a host is using APIPA? In this section, you will learn to:Find information about IP configuration settings on Windows and Linux systems. Troubleshoot IP configuration problems. The key terms for this section include:TermDefinitionAPIPAAPIPA (Automatic Private IP Addressing) is the Windows function that provides DHCP autoconfiguration addressing. When the DHCP process fails, Windows will automatically assign an IP address from the private range of 169.254.0.1 to 169.254.255.254. Once the address has been assigned, the host uses Address Resolution Protocol (ARP) to verify that the chosen APIPA address is unique.ipconfigipconfig is a command line tool used to control the network connections on Windows machines.DHCPDynamic Host Configuration Protocol (DHCP) is a protocol used to centrally manage the distribution of IP addresses within a network.DNSDNS stands for Domain Name System. The main function of DNS is to translate domain names into IP Addresses, which computers can understand.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro3.4 Use network tools to discover network devices and resources.5.2 Troubleshoot IP configuration issues to establish network pTIA Network+5.2 Given a scenario, use the appropriate tool. Software tools Command line ipconfig ifconfig 5.5 Given a scenario, troubleshoot common network service issues.Incorrect gateway Incorrect netmask Duplicate IP addresses Duplicate MAC addresses Expired IP address Exhausted DHCP scope Rogue DHCP server ?Video/DemoTime5.8.1 IP Configuration Troubleshooting12:075.8.2 Use ipconfig6:465.8.3 Use ifconfig4:12Total Video Time23:05Lab/Activity5.8.5 Explore IP Configuration5.8.6 Troubleshoot IP Configuration 15.8.7 Troubleshoot IP Configuration 25.8.8 Troubleshoot IP Configuration 3Fact Sheets5.8.4 Ipconfig Utility FactsNumber of Exam Questions5 questionsTotal TimeAbout 82 minutes5.9: Troubleshoot IP CommunicationsLecture Focus Questions:What is the difference between netstat and arp? If a ping test fails, what should you do? What information does tracert provide? What does TCPdump do? In this section, you will learn to:Use ping and tracert. Use arp and netstat. Use tcpdump. Explore network communications. The key terms for this section include:TermDefinitionpingping sends an ICMP echo request/reply packet to a remote host. A response from the remote host indicates that both hosts are correctly configured and a connection exists between them. Address Resolution Protocol(ARP)Hosts use ARP to discover the MAC address of a device from its IP address.tcpdumptcpdump is a packet analyzer that runs in a command line utility. It allows the user to view TCP/IP and other packets as they are transmitted and received over a computer's network.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro3.4 Use network tools to discover network devices and resources.5.2 Troubleshoot IP configuration issues to establish network pTIA Network+1.3 Explain the concepts and characteristics of routing and switching.Segmentation and interface properties ARP table 5.2 Given a scenario, use the appropriate tool.Software tools Command line ping tracert, traceroute iptables netstat tcpdump route arp 5.5 Given a scenario, troubleshoot common network service issues.Unresponsive service ?Video/DemoTime5.9.1 Network Communication Troubleshooting7:185.9.2 Use ping and tracert9:265.9.4 Use arp and netstat8:325.9.6 Use tcpdump5:41Total Video Time30:57Lab/Activity5.9.8 Explore Network CommunicationsFact Sheets5.9.3 Network Communication Troubleshooting Facts5.9.5 arp and netstat Facts5.9.7 tcpdump FactsNumber of Exam Questions15 questionsTotal TimeAbout 73 minutes5.10: Troubleshoot Name ResolutionLecture Focus Questions:What are the symptoms of name resolution problems? What is the difference between nslookup and dig? In this section, you will learn to:Use nslookup The key terms for this section include:TermDefinitiontracert or tracerouteThe tracert or traceroute commands are used to show details about the path that a packet takes from the computer to whatever destination you specify.nslookupA command-line tool used (in Windows and other operating systems) to query the Domain Name System (DNS) to obtain the domain name, the IP address mapping, or for any other specific DNS record.digDomain Information Groper (dig) is a Unix-like network administration command-line tool used to determine what a particular DNS server thinks the given host’s IP address should be.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro3.4 Use network tools to discover network devices and resources.5.3 Troubleshoot wired or wireless network connectivity to establish network pTIA Network+5.2 Given a scenario, use the appropriate tool.Software tools Command line dig 5.5 Given a scenario, troubleshoot common network service issues.Names not resolving ?Video/DemoTime5.10.1 Name Resolution Troubleshooting4:115.10.3 Use nslookup9:13Total Video Time13:24Lab/Activity5.10.4 Explore nslookupFact Sheets5.10.2 Name Resolution Troubleshooting FactsNumber of Exam Questions7 questionsTotal TimeAbout 38 minutes6.1: Switch AccessLecture Focus Questions:What are the requirements for connecting a VTY (virtual terminal) to a Cisco device? What types of cable can you use to connect a PC to a router console port? What is the difference between a managed switch and an unmanaged switch? What is the difference between in-band and out-of-band management? In this section, you will learn to:Use the command line interface (CLI). The key terms for this section include:TermDefinitionManaged SwitchA switch that must be configured before you can use it.Unmanaged SwitchAn unmanaged switch allows Ethernet devices to communicate with one another automatically using auto-negotiation to determine parameters such as the data rate and whether to use half-duplex or full-duplex mode.Out-of-Band ManagementOut-of-band management allows you to use a dedicated communication channel that separates management traffic from normal network traffic. Network switches and routers allow you to use console redirection to access the device's console through a built-in serial or USB port.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro2.3 Perform basic router configuration pTIA Network+3.4 Given a scenario, use remote access methods.Out-of-band management Console router ?Video/DemoTime6.1.1 Device Access4:146.1.2 Use the Command Line Interface (CLI)7:23Total Video Time11:37Fact Sheets6.1.3 Device Connection FactsNumber of Exam Questions3 questionsTotal TimeAbout 20 minutes6.2: Switch IP ConfigurationLecture Focus Questions:Why would you configure an IP address on a switch? What does the ip address dhcp command allow you to do? In this section, you will learn to:Configure management VLAN settings. Configure switch IP settings. The key terms for this section include:TermDefinitionVLANA VLAN (Virtual Local Network) is a group of devices on one or more local area networks (LANs) that are configured to communicate as if they were attached to the same wire when, in fact, they could be located on a number of different LAN segments.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro4.3 Configure security for a switch.?Video/DemoTime6.2.1 IP Address and Default Gateway Configuration3:29Total Video Time3:29Lab/Activity6.2.3 Configure Management VLAN Settings6.2.4 Configure Switch IP SettingsFact Sheets6.2.2 Switch IP Configuration FactsNumber of Exam Questions3 questionsTotal TimeAbout 36 minutes6.3: Switch Interface ConfigurationLecture Focus Questions:How does the VLAN interface configuration mode differ from Ethernet, FastEthernet, and GigabitEthernet interface configuration modes? What must you consider if you manually configure speed or duplex settings? What happens when autonegotiation fails for the Ethernet interface on a Cisco device? What is the default setting for all ports on a switch? In this section, you will learn to:Configure switch interfaces. Configure switch ports. The key terms for this section include:TermDefinitionForwarding DatabaseA forwarding database is a list of Layer 2 MAC addresses and the ports used to reach each device.Content Addressable Memory(CAM)The Content Addressable Memory (CAM) table stores the relationship between the MAC addresses on the network and the switch port each one is connected to.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro2.2 Perform basic switch configuration pTIA Network+1.3 Explain the concepts and characteristics of routing and switching.Segmentation and interface properties Port mirroring ?Video/DemoTime6.3.1 Switch Operations7:086.3.3 Switch Configuration Overview3:316.3.4 Configure Switch Interfaces5:48Total Video Time16:27Lab/Activity6.3.7 Configure Switch PortsFact Sheets6.3.2 Switch Forwarding Facts6.3.5 Switch Configuration Mode Facts6.3.6 Switch Configuration Command ListNumber of Exam Questions4 questionsTotal TimeAbout 48 minutes6.4: Virtual LANsLecture Focus Questions:What are two advantages of creating VLANs on your network? You have two VLANs configured on a single switch. How many broadcast domains are there? How many collision domains are there? What happens if two devices on the same switch are assigned to different VLANs? In this section, you will learn to:Create VLANs. Explore VLANs. The key terms for this section include:TermDefinitionVLANA VLAN (Virtual Local Network) is a group of devices on one or more local area networks (LAN) that are configured to communicate as if they were attached to the same wire when, in fact, they could be located on a number of different LAN segments.VLAN IDSwitches use VLAN identifications (IDs) to route VLAN traffic. VLAN IDs are appended to the header of each frame.In addition, VLAN IDs allow switches to identify which VLAN the frame belongs to and are used for inter-switch traffic.?This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro3.6 Configure virtual pTIA Network+1.3 Explain the concepts and characteristics of routing and switching.Segmentation and interface properties VLANs ?Video/DemoTime6.4.1 VLAN Overview5:266.4.3 Configure VLANs6:26Total Video Time11:52Lab/Activity6.4.5 Create VLANs6.4.6 Explore VLANsFact Sheets6.4.2 VLAN Facts6.4.4 VLAN Command ListNumber of Exam Questions13 questionsTotal TimeAbout 59 minutes6.5: TrunkingLecture Focus Questions:What is trunking? Why is trunking important to VLAN configuration? What protocol does a Cisco switch use to automatically detect trunk ports? By default, traffic from which VLANs are allowed on trunk ports? What is the default configuration of most Cisco switches? In this section, you will learn to:Configure trunking Configure the native VLAN Configure allowed VLANs The key terms for this section include:TermDefinitionVTPVLAN Trunking Protocol (VTP) is a Cisco proprietary protocol that propagates the definition of Virtual Local Area Networks (VLAN) on the whole local area network. Trunking occurs when you configure VLANs that span multiple switches.This section helps you prepare for the following certification exam objectives:ExamObjectiveCompTIA Network+1.3 Explain the concepts and characteristics of routing and switching.Properties of network traffic Broadcast domains Segmentation and interface properties VLANs Trunking (802.1q) Tagging and untagging ports 4.6 Explain common mitigation techniques and their purposes.Change native VLAN ?Video/DemoTime6.5.1 Access and Trunk Ports8:406.5.2 Trunking3:196.5.6 Native VLAN6:06Total Video Time18:05Lab/Activity6.5.5 Configure Trunking6.5.7 Configure the Native VLAN6.5.8 Configure Allowed VLANsFact Sheets6.5.3 Trunking Facts6.5.4 Trunking Command ListNumber of Exam Questions7 questionsTotal TimeAbout 72 minutes6.6: Spanning Tree ProtocolLecture Focus Questions:Why does root switch selection never require a tie breaker? When would you modify an STP mode? How does PVST+ differ from Rapid PVST+? How do ports work in a multiple VLAN environment? How are root bridges designated in a multiple VLAN environment? What happens during STP convergence? In this section, you will learn to:Configure STP Select a root bridge Configure Rapid PVST+ Find STP Info Configure EtherChannels The key terms for this section include:TermDefinitionSwitching LoopMany networks implement redundant paths between multiple switches to create fault tolerance. However, providing redundant paths between segments could cause frames to pass between the redundant paths endlessly. This condition is known as a switching loop.Spanning Tree Protocol(STP)The Spanning Tree Protocol (STP) is a network protocol that builds a loop-free logical topology for Ethernet networks. Root BridgeThe root bridge is the master bridge, or controlling bridge.Designated BridgeA designated bridge is any other device that participates in forwarding packets through the network.Backup BridgeAll redundant devices are classified as backup bridges. They listen to network traffic and build the bridge database. However, they do not forward packets. They can take over if the root bridge or a designated bridge fails.This section helps you prepare for the following certification exam objectives:ExamObjectiveCompTIA Network+1.3 Explain the concepts and characteristics of routing and switching.Properties of network traffic Protocol data units Segmentation and interface properties Switching loops/spanning tree ?Video/DemoTime6.6.1 Spanning Tree Protocol7:176.6.2 Configure STP2:426.6.3 Select a Root Bridge3:216.6.8 Configure EtherChannels8:14Total Video Time21:34Lab/Activity6.6.5 Configure the Root Bridge6.6.6 Configure Rapid PVST+6.6.7 Find STP InfoFact Sheets6.6.4 STP Facts6.6.9 EtherChannel FactsNumber of Exam Questions15 questionsTotal TimeAbout 83 minutes6.7: Switch TroubleshootingLecture Focus Questions:You have a network connected by switches with a single device connected to each switch port. Why would you be surprised to see collisions on this network? What is a duplex mismatch? What conditions lead to a broadcast storm? How can you prevent switching loops from forming? You moved a device from one switch port to another, and now it cannot communicate with any other device on the network. The switch link lights are lit. What switch configuration should you check? Other than the switch configuration, what should you check if you see excessive frame errors on the switch? The key terms for this section include:TermDefinitionBroadcast StormA broadcast storm is excessive broadcast traffic that renders normal network communications impossible. CollisionsA collision occurs when two devices that share the same media segment transmit at the same time. Duplex MismatchA duplex mismatch occurs when two devices use different duplex settings. For example, when one device tries to transmit using full duplex while the other expects half duplex communications. Frame ErrorsThe switch examines incoming frames and only forwards frames that are complete and correctly formed; invalid frames are simply dropped. These types of frames are known as frame errors.This section helps you prepare for the following certification exam objectives:ExamObjectiveCompTIA Network+1.3 Explain the concepts and characteristics of routing and switching.Segmentation and interface properties MAC address table 5.3 Given a scenario, troubleshoot common wired connectivity and performance issues.Bad port Duplex/speed mismatch VLAN mismatch ?Video/DemoTime6.7.1 Switch Troubleshooting12:38Total Video Time12:38Fact Sheets6.7.2 Switch Troubleshooting FactsNumber of Exam Questions9 questionsTotal TimeAbout 27 minutes7.1: Routing BasicsLecture Focus Questions:With respect to routing, what is a packet? With respect to routing, what is a network? What does the next hop signify? What information is contained in a routing table? What is the function of a routing table? In a routing table, how is the default route used? What is the difference between static and dynamic routing? When would you create a static routing table entry? When would you configure both static and dynamic routing on the same router? What is the difference between interior and exterior routing? The key terms for this section include:TermDefinitionPacketA packet is the payload of an OSI Layer 2 frame. A packet has a header and a payload. The header contains the source and destination IP addresses. The payload depends on the protocol that formed the workWhen used in routing, the term network can be defined as a broadcast domain where all the hosts have the same network portion in their IP address. Normally, a LAN fits this more precise definition of a network.Routing TableThe routing table is a database of entries containing: The address of a known network. The next hop gateway (router). The network interface to reach the next hop gateway. A metric or cost that indicates the desirability of the route (Tte lower the metric, the more desirable the route). Next HopAn IP address entry in a router's routing table that specifies the next or closest router in its routing path.Default RouteThe default route is an entry of 0.0.0.0 in a routing table. This entry matches every network.Loopback EntryLoopback entries contains loopback addresses, which are used for diagnostics and for troubleshooting the TCP/IP stack. This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro2.3 Perform basic router configuration pTIA Network+1.3 Explain the concepts and characteristics of routing and switching. Routing Routing types Default Static Dynamic ?Video/DemoTime7.1.1 Routing10:03Total Video Time10:03Fact Sheets7.1.2 Routing FactsNumber of Exam Questions6 questionsTotal TimeAbout 22 minutes7.2: Routing ProtocolsLecture Focus Questions:What network link characteristics are used by routing protocols when computing a metric value or cost? How does a distance vector routing protocol differ from a link state routing protocol? How are routing paths shared by distance vector routing protocols? How are routing paths shared by link state routing protocols? What is a hybrid routing protocol? How is administrative distance used to select a best path? What is the difference between RIP and RIPv2? Why is this important in today's networks? Which routing protocol is typically used within an ISP? Which protocol is used on the internet? Which routing protocols divide an autonomous system into areas? How does IS-IS differ from OSPF? In this section, you will learn to:Configure a router with static routes. Enable OSPF routing. The key terms for this section include:TermDefinitionHop CountThe distance between networks can be measured in hop counts, or the number times a router forwards an IP packet from one network to another. For a directly connected link, the hop count is zero.BandwidthNetwork bandwidth measures the capacity of a link. If bandwidth is a factor in the cost, a link with a lower capacity link will have a higher cost than a link with high bandwidth.ThroughputAlthough the advertised bandwidth is the maximum capacity of a link, its actual throughput will be less due to latency and other network overhead. If used in the cost calculation, larger throughput will contribute to a lower cost.Link UtilizationLink utilization is the percentage of a network's bandwidth that is currently being consumed by network traffic. If utilization is used, the cost will be less for links with low utilization.LoadThe load on a router refers to the amount of computational work that it performs. If load is a factor in the cost, links for routers that are performing under heavy load will have a higher cost.MTUThe maximum transmission unit (MTU) setting on a router determines the maximum payload size for a frame. While this characteristic is not usually included in a metric, it is sometimes used as a tie-breaker when two links or paths have the same cost.Packet LossPacket loss occurs when IP packets fail to reach their destination. If it is used in calculating cost, a link that experiences greater packet loss will have a higher cost.LatencyLatency is the delay in transmissions over the path. If latency is used in the cost, a path with higher latency has a higher cost.ReliabilityReliability is measured by how often the path is down. If it is used in cost calculations, a highly reliable path has a lower cost.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro2.3 Perform basic router configuration pTIA Network+1.3 Explain the concepts and characteristics of routing and switching.Properties of network traffic MTU Routing Routing types Static Dynamic Routing protocols (IPv4 and IPv6) Distance-vector routing protocols RIP EIGRP Link-state routing protocols OSPF Hybrid BGP ?Video/DemoTime7.2.1 Routing Protocol Characteristics12:407.2.3 Routing Protocols5:207.2.5 High Availability6:197.2.6 Configure Routing11:01Total Video Time35:20Lab/Activity7.2.7 Configure Static Routes7.2.8 Enable OSPF RoutingFact Sheets7.2.2 Routing Protocol Characteristics Facts7.2.4 Routing Protocol FactsNumber of Exam Questions13 questionsTotal TimeAbout 83 minutes7.3: Network Address TranslationLecture Focus Questions:How does NAT work? What is the difference between static NAT and dynamic NAT? What is port forwarding? What is the difference between NAT and PAT? Which IP addresses are considered private and guaranteed not to be used on the internet? In this section, you will learn to:Configure NAT from the CLI. Configure NAT on an NSA. Configure port forwarding. The key terms for this section include:TermDefinitionNetwork Address Translation(NAT)NAT translates private addresses to the public address of the NAT router. This allows you to connect a private network to the internet without obtaining registered (public) addresses for every host.Port Address Translation(PAT)Technically speaking, NAT translates one address to another. Port address translation (PAT) associates a port number with the translated address.This section helps you prepare for the following certification exam objectives:ExamObjectiveCompTIA Network+1.3 Explain the concepts and characteristics of routing and switching.NAT/PAT Port forwarding 1.4 Given a scenario, configure the appropriate IP addressing components.Private vs. public ?Video/DemoTime7.3.1 Network Address Translation9:537.3.2 Configure NAT from the CLI8:417.3.3 Configure NAT on an NSA5:167.3.4 Configure Port Forwarding6:07Total Video Time29:57Fact Sheets7.3.5 NAT FactsNumber of Exam Questions10 questionsTotal TimeAbout 45 minutes7.4: Routing TroubleshootingLecture Focus Questions:How is it possible for all hosts on a subnet to be configured with the wrong default gateway address? What is the format for the default route entry in a routing table? What purpose does the default route serve? What are the symptoms of a routing loop? How can you identify a routing loop? Why might you escalate routing problems that you observe? How can proxy ARP settings appear as routing problems? In this section, you will learn to:Troubleshoot routing. Find path information. The key terms for this section include:TermDefinitionNeighbor Discovery(ND)ND enables routers on the same link to advertise their existence to neighboring routers and to learn about the existence of their neighbors. Routers use ND messages to identify the link-layer addresses of neighboring devices that are directly connected to the router.Black Hole RouterA black hole router is a router that drops packets if the size of the packet exceeds the Maximum Transmission Unit (MTU) size it can support. It is called a black hole because the router does not send an error message to the sending host when it drops an oversize packet. In essence, the packet enters a network "black hole."Routing loopA routing loop occurs when data is being passed back and forth between routers in the path instead of forwarding it to the destination network.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro5.1 Troubleshoot issues with networking media or devices to establish network pTIA Network+5.3 Given a scenario, troubleshoot common wired connectivity and performance issues.Latency ?Video/DemoTime7.4.1 Routing Troubleshooting13:527.4.2 Troubleshoot Routing5:59Total Video Time19:51Lab/Activity7.4.4 Find Path Information 17.4.5 Find Path Information 2Fact Sheets7.4.3 Troubleshoot Routing FactsNumber of Exam Questions9 questionsTotal TimeAbout 58 minutes8.1: FirewallsLecture Focus Questions:How does a packet filtering firewall differ from a circuit-level gateway? Why is a packet filtering firewall a stateless device? What types of filter criteria can an application layer gateway use for filtering? Which security device might you choose to restrict access by user account? What is the difference between a proxy and a reverse proxy? In this section, you will learn to:Configure a host firewall. Configure Linux iptables. The key terms for this section include:TermDefinitionFirewallA firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules.Access Control List (ACL)Filtering rules firewalls use to identify which traffic to allow and which traffic to block. Network PortsNetwork ports are logical connections provided by the TCP or UDP protocols at the Transport layer. They are used by protocols in the upper layers of the OSI model. The TCP/IP protocol stack uses port numbers to determine which protocol incoming traffic should be directed to.iptablesiptables is a command line firewall utility for Linux operation systems that uses three different policy chains to allow or block network traffic.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro4.1 Configure a host firewall to provide local pTIA Network+1.1 Explain the purposes and uses of ports and protocols.Protocols and ports SSH 22 DNS 53 SMTP 25 SFTP 22 FTP 20, 21 TFTP 69 TELNET 23 DHCP 67, 68 HTTP 80 HTTPS 443 SNMP 161 RDP 3389 NTP 123 SIP 5060, 5061 SMB 445 POP 110 IMAP 143 LDAP 389 LDAPS 636 323 1720 1.3 Explain the concepts and characteristics of routing and switching.Access control list 2.2 Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them.Firewall 2.3 Explain the purposes and use cases for advanced networking devices.Proxy server UTM appliance NGFW/Layer 7 firewall Content filter 4.6 Explain common mitigation techniques and their purposes.Restricting access via ACLs ?Video/DemoTime8.1.1 Firewalls3:158.1.2 Firewall Types11:148.1.5 Configure Windows Firewall4:068.1.6 Configure Linux iptables4:02Total Video Time22:37Lab/Activity8.1.8 Configure a Host FirewallFact Sheets8.1.3 Firewall Facts8.1.4 Common Ports8.1.7 Linux iptable FactsNumber of Exam Questions15 questionsTotal TimeAbout 65 minutes8.2: Security AppliancesLecture Focus Questions:Under which conditions would you use an all-in-one security appliance? Which security functions are included in an all-in-one security appliance? In this section, you will learn to:Configure network security appliance access. The key terms for this section include:TermDefinitionAll-in-One Security AppliancesA device that combines many security functions into a single device, such as firewall, IDS/IPS, and antivirus.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro4.5 Perform administrative tasks on a network security pTIA Network+2.2 Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them.Firewall 2.3 Explain the purposes and use cases for advanced networking devices.?Video/DemoTime8.2.1 All-in-One Security Appliances3:338.2.3 Network Security Appliance Access7:02Total Video Time10:35Lab/Activity8.2.4 Configure Network Security Appliance AccessFact Sheets8.2.2 Security Solution FactsNumber of Exam Questions3 questionsTotal TimeAbout 31 minutes8.3: Firewall Design and ImplementationLecture Focus Questions:How do firewalls manage incoming and outgoing traffic? What is the difference between a standard ACL and an extended ACL? What does the deny any statement do? What is the difference between a routed firewall and a transparent firewall? In this section, you will learn to:Create Firewall ACLs. Configure a DMZ. Configure a perimeter firewall. Configure a proxy server. The key terms for this section include:TermDefinitionDemilitarized Zone(DMZ)A buffer network (or subnet) that sits between the private network and an untrusted network (such as the internet).Access Control ListFiltering rules firewalls use to identify which traffic to allow and which to block.Routed FirewallA routed firewall is a Layer 3 router. Many hardware routers include firewall functionality. Transmitting data through this type of firewall counts as a router hop. A routed firewall usually supports multiple interfaces, each connected to a different network segment.Transparent FirewallA transparent firewall, also called a virtual firewall, operates at Layer 2 and is not seen as a router hop by connected devices. Both the internal and external interfaces on a transparent firewall connect to the same network segment.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro4.1 Configure a host firewall to provide local pTIA Network+1.3 Explain the concepts and characteristics of routing and switching.Segmentation and interface properties DMZ 2.2 Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them.Firewall 4.2 Explain authentication and access controls.Access control MAC filtering 5.5 Given a scenario, troubleshoot common network service issues.Incorrect host-based firewall settings Incorrect ACL settings ?Video/DemoTime8.3.1 Firewall Network Design Principles10:098.3.2 Configure a Perimeter Firewall9:528.3.3 Firewall ACLs9:298.3.4 Create Firewall ACLs6:048.3.7 Configure a Proxy Server6:47Total Video Time42:21Lab/Activity8.3.5 Configure a DMZ8.3.6 Configure a Perimeter FirewallFact Sheets8.3.8 Firewall Design and Configuration FactsNumber of Exam Questions15 questionsTotal TimeAbout 87 minutes9.1: Network-Based StorageLecture Focus Questions:What is the difference between a SAN solution and a NAS solution? How does a SAN appear to users on a network? How does a NAS device appear to users on a network? How does a cluster appear to users on the network? What does load balancing alleviate on a network? What is failover? In this section, you will learn to:Configure an iSCSI target. Configure an iSCSI initiator. The key terms for this section include:TermDefinitionHost Bus Adapter(HBA)A host bus adapter (HBA) is a hardware device, such as a circuit board or integrated circuit adapter, that provides I/O processing and physical connectivity between a host system, such as a server, and a storage device. TargetAll SAN storage devices are called targets.InitiatorThe servers that connect to the shared storage device are called initiators. They run initiator software that connects to and communicates with the SAN target.Jumbo FrameAn Ethernet packet larger than 1500 bytes is called a jumbo frame. Network-Attached Storage(NAS)Network-Attached Storage (NAS) is a self-contained storage appliance designed to allow clients to store and share files over the network. It can also be used for backups and media streaming.This section helps you prepare for the following certification exam objectives:ExamObjectiveCompTIA Network+1.5 Compare and contrast the characteristics of network topologies, types and technologies.Types SAN 2.4 Explain the purposes of virtualization and network storage work storage types SAN Connection type FCoE Fibre Channel iSCSI InfiniBand 3.2 Compare and contrast business continuity and disaster recovery concepts.Availability concepts Load balancing Clustering ?Video/DemoTime9.1.1 Storage Area Networks10:429.1.2 Configure an iSCSI SAN5:549.1.6 Network Attached Storage6:419.1.7 Configure a NAS Device7:45Total Video Time31:02Lab/Activity9.1.3 Configure an iSCSI Target9.1.4 Configure an iSCSI InitiatorFact Sheets9.1.5 SAN Facts9.1.8 NAS FactsNumber of Exam Questions6 questionsTotal TimeAbout 72 minutes9.2: Voice over IP (VoIP)Lecture Focus Questions:How does VoIP differ from traditional phone service? What are the functions of a VoIP server? What are other names for a VoIP server? What is the difference between a hard VoIP phone and a soft VoIP phone? How is a VoIP gateway used? What is the most common open source VoIP protocol? What is the function of a codec? Why is quality of service (QoS) important for VoIP? What happens if there is too much latency in a VoIP call? What is jitter? How does it affect VoIP calls? In this section, you will learn to:Configure VoIP. The key terms for this section include:TermDefinitionVoice over IP(VoIP)Voice over IP (VoIP) is a protocol optimized for the transmission of voice data (telephone calls) through a packet-switched IP network. VoIP routes phone calls through an IP network, including the internet. VoIP solutions can integrate with the public switched telephone network (PSTN) to allow VoIP customers to make and receive external calls.VoIP GatewayA? voice over IP (VoIP) gateway converts voice and fax calls between the PSTN and your IP network in real time.SamplingIn VoIP, audio is converted from an analog signal to digital data through a technique called sampling.CodecA special algorithm called a codec compresses VoIP data to reduce bandwidth consumption. On the receiving end, the same algorithm is used again to decompress the work LatencyNetwork latency is how long it takes for a packet of data to get from one point to another. Too much latency causes VoIP callers to talk over each other.JitterJitter is a variation in the delay or latency of received packets. Latency going up and down during a call can cause unusual sound effects (minor pauses, jumps, choppiness).Unified CommunicationsAppliances that plug directly into your network and provide a wide variety of communication services, such as voice, voicemail, instant messaging, and faxing. This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro2.5 Configure a VoIP pTIA Network+1.3 Explain the concepts and characteristics of routing and switching.Segmentation and interface properties PoE and PoE+ (802.3af, 802.3at) 2.2 Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them.VoIP endpoint 2.3 Explain the purposes and use cases for advanced networking devices.VoIP PBX VoIP gateway 2.4 Explain the purposes of virtualization and network storage technologies.Jumbo frame 5.3 Given a scenario, troubleshoot common wired connectivity and performance issues.Jitter 5.4 Given a scenario, troubleshoot common wireless connectivity and performance issues.Latency Jitter ?Video/DemoTime9.2.1 Voice over IP (VoIP)11:13Total Video Time11:13Lab/Activity9.2.3 Configure VoIP 19.2.4 Configure VoIP 2Fact Sheets9.2.2 VoIP FactsNumber of Exam Questions13 questionsTotal TimeAbout 54 minutes9.3: VirtualizationLecture Focus Questions:What is the relationship between the host and the guest operating systems? What is the function of the hypervisor? What are the differences between a virtual machine and a virtual hard disk? Which type of virtualization allows applications to run within the virtual machine without being modified in any way? What is paravirtualization? What is the difference between full and partial virtualization? In this section, you will learn to:Create a virtual machine. The key terms for this section include:TermDefinitionVirtualizationVirtualization is the ability to install and run multiple operating systems simultaneously on a single physical machine.HypervisorA hypervisor is thin layer of software that resides between the virtual operating system(s) and the hardware. A hypervisor allows virtual machines to interact with the hardware without going through the host operating system. A hypervisor also manages access to the CPU, storage, and RAM.Virtual MachineA virtual machine is a software implementation of a computer that executes programs like a physical machine. The virtual machine appears to be a self-contained and autonomous system, but is running on a host computer and functions through a hypervisor.Virtual Hard Disk (VHD)A virtual hard disk is a file created within the host operating system that simulates a hard disk for the virtual machine.Full VirtualizationIn full virtualization, the virtual machine completely simulates a real physical host. This allows most operating systems and applications to run within the virtual machine without being modified in any way.Partial VirtualizationIn partial virtualization, only some of the components of the virtual machine are virtualized. The guest operating systems use some virtual components and some real physical hardware components in the actual device where the hypervisor is running. Operating systems or applications must be modified before they can run in a partial virtualization environment.Paravirtualization In paravirtualization, the hardware is not virtualized. All of the guest operating systems running on the hypervisor directly access various hardware resources in the physical device; components are not virtual. The guest operating systems run in isolated domains on the same physical hardware. Operating systems and applications must be modified before they can run in a paravirtualization environment.?Video/DemoTime9.3.1 Virtualization Overview10:519.3.2 Create a Virtual Machine3:28Total Video Time14:19Fact Sheets9.3.3 Virtualization FactsNumber of Exam Questions4 questionsTotal TimeAbout 24 minutes9.4: Virtual NetworkingLecture Focus Questions:How is network as a service (NaaS) similar to the offsite datacenter? How is it different? What can you do to protect virtual hosts from network exploits? How does a virtual router differ from a physical router? What is the best way to set up a virtual firewall? What is the difference between a physical switch and a virtual switch? Where can you configure a custom MAC address for a virtual network interface? In this section, you will learn to:Configure virtual network devices. The key terms for this section include:TermDefinitionVirtual Network InterfacesA virtual network interface is a software version of a physical network adapter, which is used in a virtual machine to allow it to connect to a network (either physical or virtual).Virtual SwitchesA virtual switch allows one virtual machine to communicate with another in much the same way that a physical switch allows physical hosts to communicate with each other.Virtual VLANsMost virtual switch implementations support VLANs. You can define VLANs within the virtual switch and associate specific hosts with a specific VLAN. However, because virtual hosts are not physically connected to the switch with cables, VLAN membership is defined within the configuration of each virtual machine.Virtual RoutersA virtual router is a software-based routing framework, which allows the host machine to perform as a typical hardware router over a local area network.Virtual FirewallsA virtual firewall is a firewall within the hypervisor itself. It lets you monitor and filter traffic on the virtual network as it flows between virtual machines.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro3.6 Configure virtual networkingCompTIA Network+1.3 Explain the concepts and characteristics of routing and switching.Software-defined networking 2.4 Explain the purposes of virtualization and network storage technologies.Virtual networking components Virtual switch Virtual firewall Virtual NIC Virtual router Hypervisor ?Video/DemoTime9.4.1 Virtual Networking Implementations6:049.4.2 Virtual Network Devices7:089.4.3 Configure Virtual Network Devices3:04Total Video Time16:16Fact Sheets9.4.4 Virtualization Implementation Facts9.4.5 Virtual Networking FactsNumber of Exam Questions9 questionsTotal TimeAbout 36 minutes9.5: Cloud ComputingLecture Focus Questions:What is the difference between a hybrid cloud and a community cloud? What is the difference between IaaS and PaaS? What two implementations are available for SaaS? What services does cloud computing provide? Which cloud computing model allows the client to run software without purchasing servers, data center space, or network equipment? The key terms for this section include:TermDefinitionCloud ComputingCloud computing is a combination of software, data access, computation, and storage services provided to clients through the internet. The term cloud is a metaphor for the internet based on the basic cloud drawing used to represent the telephone networkPublic CloudCloud-based computing resources such as platforms, applications, and storage are made available to the general public by a cloud service provider (such as Google's Gmail). A public cloud can be accessed by anyone, although some may require a fee. Private CloudA private cloud provides resources to a single organization. Private clouds can be hosted internally, but because of the expense and expertise required to do so, they are typically hosted externally, by a third munity CloudA community cloud is designed to be shared by several organizations. Hybrid CloudA hybrid cloud is a combination of public, private, and community cloud resources from different service providers. Infrastructure as a Service (IaaS)IaaS delivers infrastructure to the client, such as processing, storage, networks, and virtualized environments. The client deploys and runs software without purchasing servers, data center space, or network equipment.Platform as a Service (PaaS)PaaS delivers everything a developer needs to build an application. The deployment comes without the cost and complexity of buying and managing the underlying hardware and software layers.Software as a Service (SaaS)SaaS delivers software applications to the client either over the internet or on a local area network. This section helps you prepare for the following certification exam objectives:ExamObjectiveCompTIA Network+1.7 Summarize cloud concepts and their purposes.Types of services SaaS PaaS IaaS Cloud delivery models Private Public Hybrid Connectivity methods Security implications/ considerations Relationship between local and cloud resources ?Video/DemoTime9.5.1 Cloud Computing Overview12:07Total Video Time12:07Fact Sheets9.5.2 Cloud Computing FactsNumber of Exam Questions5 questionsTotal TimeAbout 23 minutes10.1: Wireless ConceptsLecture Focus Questions:Under what circumstances might you choose an ad hoc wireless network? What device is used to create an infrastructure wireless network? How do wireless networks control media access? What is the difference between a BSS and an ESS? What do wireless clients use to identify a specific wireless access point? How do multiple access points identify themselves as part of the same network? The key terms for this section include:TermDefinitionStation(STA)An STA is a wireless NIC in an end device such as a laptop or wireless PDA. STA often refers to the device itself, not just the NIC.Access Point(AP)An AP, sometimes called a wireless AP (WAP), is the device that coordinates all communications between wireless devices, as well as the connection to the wired network.Basic Service Set(BSS)A BSS, also called a cell, is the smallest unit of a wireless network. All devices in the BSS can communicate with each other. The devices in the BSS depend on the operating mode. All devices within the BSS use the same radio frequency channel to communicate.Independent Basic Service Set(IBSS)An IBSS is a set of STAs configured in ad hoc mode.Extended Service Set(ESS)An ESS consists of multiple BSSs with a distribution system (DS). In an ESS, BSSs that have an overlapping transmission range use different frequencies.Distribution System(DS)The DS is the LAN that connects multiple APs (and BSSs) together. The DS allows wireless clients to communicate with the wired network and with wireless clients in other cells.Service Set Identifier(SSID)The SSID, also called the network name, groups wireless devices into the same logical network.Basic Service Set Identifier(BSSID)The BSSID is a 48-bit value that identifies an AP in an infrastructure network or an STA in an ad hoc network. The BSSID allows devices to find a specific AP within an ESS that has multiple access points, and STAs use it to keep track of APs as they roam between BSSs. The BSSID is the MAC address of the AP and is set automatically.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro1.3 Implement appropriate wireless networking device(s).2.4 Establish a wireless network connection for a device on the network.? CompTIA Network+1.3 Explain the concepts and characteristics of routing and switching.Properties of network traffic CSMA/CA 1.5 Compare and contrast the characteristics of network topologies, types and technologies.Wireless topologies Mesh Ad hoc Infrastructure 2.5 Compare and contrast WAN technologies.Transmission mediums Wireless ?Video/DemoTime10.1.1 Radio Frequency Wireless8:0610.1.2 Wireless Architecture7:50Total Video Time15:56Fact Sheets10.1.3 Wireless Architecture Facts10.1.4 Wireless Infrastructure FactsNumber of Exam Questions5 questionsTotal TimeAbout 31 minutes10.2: Wireless StandardsLecture Focus Questions:What are the differences between 802.11a and 802.11g specifications? Devices that support the 802.11g standards are typically compatible with which other wireless standard? How does MIMO differ from channel bonding? Why is channel bonding typically not used with the 2.4 GHz range? What happens when an 802.11a device connects to an access point that supports both 802.11n and 802.11a? What happens if the access point uses MIMO and supports dual band? Which types of devices typically use Bluetooth wireless? In this section, you will learn to:Configure Bluetooth Connections The key terms for this section include:TermDefinitionMultiple-Input, Multiple-Output (MIMO)MIMO increases bandwidth by using multiple antennas for both the transmitter and receiver.Channel BondingChannel bonding combines two non-overlapping 20 MHz channels into a single 40 MHz channel, resulting in slightly more than double the bandwidth.Multi-User MIMO(MU-MIMO)MU-MIMO is an enhancement to MIMO that allows multiple users to use the same channel. In addition to adding MU-MIMO, 802.11ac doubled the number of MIMO radio streams from four to eight.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro1.3 Implement appropriate wireless networking device(s).2.4 Establish a wireless network connection for a device on the pTIA Network+1.5 Compare and contrast the characteristics of network topologies, types and technologies.Types pan Technologies that facilitate the Internet of Things (IoT) Bluetooth IR RFID 1.6 Given a scenario, implement the appropriate wireless technologies and configurations.802.11 standards a b g n ac Frequencies 2.4GHz 5.0GHz Channel bandwidth Channel bonding ?Video/DemoTime10.2.1 Wireless Standards13:2210.2.2 Infrared3:3310.2.3 Bluetooth4:2810.2.4 Configure Bluetooth Connections5:25Total Video Time26:48Fact Sheets10.2.5 Wireless Standards FactsNumber of Exam Questions12 questionsTotal TimeAbout 44 minutes10.3: Wireless ConfigurationLecture Focus Questions:What information does the wireless profile contain? What is the strongest encryption method? How does a MAC access list help keep a network secure? What is the purpose of a beacon? How are wireless networks listed in the notification area? In this section, you will learn to:Create a Home Wireless Network. Secure a Home Wireless Network. Configure Wireless Profiles. The key terms for this section include:TermDefinitionAccess Point(AP)A access point (AP), sometimes called a wireless access point, is the device that allows a Wi-Fi device to connect to a wired network.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro1.3 Implement appropriate wireless networking device(s).2.4 Establish a wireless network connection for a device on the pTIA Network+2.2 Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them.Bridge Wireless access point Wireless range extender ?Video/DemoTime10.3.1 Wireless Network Configuration9:3010.3.3 Configure Wireless Networks9:47Total Video Time19:17Lab/Activity10.3.4 Create a Home Wireless Network10.3.5 Secure a Home Wireless Network10.3.6 Configure Wireless ProfilesFact Sheets10.3.2 Wireless Configuration TasksNumber of Exam Questions5 questionsTotal TimeAbout 66 minutes10.4: Wireless Network DesignLecture Focus Questions:What is device density? What is the difference between received signal length and signal to noise ratio? Which implementation automatically partitions a single broadcast domain into multiple VLANs? What information is specified in a logical network diagram? How do you measure the signal strength at a given distance from the access point? What is the Z-Wave protocol commonly used for? In this section, you will learn to:Design an Indoor Wireless Network. Design an Outdoor Wireless Network. The key terms for this section include:TermDefinitionRadio Frequency(RF)Radio frequency (RF) refers to the rate of oscillation of electromagnetic radio waves in the range of 3 kHz to 300 GHz, as well as the alternating currents carrying the radio signals. This is the frequency band that is used for communications transmission and broadcasting.Internet of Things(IoT)The internet of things is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity. These embedded features enable these things to connect, collect, and exchange data.Z-WaveZ-Wave is a wireless communication protocol for communication among devices used for home automation. It uses radio waves for signaling and control.Ant+Ant+ is a protocol used to monitor sensor data. It uses a 2.4 GHz ISM band and has fast transmission rates. It is compatible with the mesh topology, but can also be used with the point-to-point, star, and tree topologies. Near-Field Communication (NFC)Near-field communication (NFC) allows devices to communicate and share data with each other. It requires devices to be about four inches apart to communicate with each other. It's very common to see NFC used with cell phones and mobile pay applications. Spectrum AnalyzerA spectrum analyzer is a device that displays signal amplitude (strength) as it varies by signal frequency. The frequency appears on the horizontal axis, and the amplitude is displayed on the vertical axis.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro1.3 Implement appropriate wireless networking device(s).2.4 Establish a wireless network connection for a device on the pTIA Network+1.5 Compare and contrast the characteristics of network topologies, types and technologies.Types WLAN Technologies that facilitate the Internet of Things (IoT) Z-Wave Ant+ NFC 11 1.6 Given a scenario, implement the appropriate wireless technologies and configurations.Site survey Speed and distance requirements MIMO/MU-MIMO Unidirectional/ omnidirectional 2.2 Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them.Bridge Wireless access point 5.2 Given a scenario, use the appropriate tool.Hardware tools Spectrum analyzer ?Video/DemoTime10.4.1 Wireless Network Design7:0210.4.2 Site Survey7:1710.4.3 Wireless Antenna Types6:1010.4.5 Conduct a Wireless Survey4:39Total Video Time25:08Lab/Activity10.4.7 Design an Indoor Wireless Network10.4.8 Design an Outdoor Wireless NetworkFact Sheets10.4.4 Wireless Network Design Facts10.4.6 Wireless Site Survey FactsNumber of Exam Questions11 questionsTotal TimeAbout 71 minutes10.5: Wireless Network ImplementationLecture Focus Questions:What is the difference between a hub-and-spoke infrastructure and a distributed wireless mesh infrastructure? What is a lightweight access point used for? Which protocol is used to route frames back and forth between the wireless network and the wired LAN? Which enterprise deployment has limited mobility and is difficult to manage? In this section, you will learn to:Implement an Enterprise wireless network. The key terms for this section include:TermDefinitionIndependent Access PointsIndependent access points (APs) are where each AP stands alone, providing separate wireless networks by using its own independent configuration.Hub-and-SpokeIn a hub-and-spoke configuration, a wireless controller is connected to all APs through wired links. The individual APs contain very little embedded intelligence and are sometimes referred to as lightweight access points (LWAPs).Distributed Wireless Mesh InfrastructureNewer wireless networks can be deployed using a distributed wireless mesh architecture. These networks still use a controller, but they move some of the network intelligence from the controller out to the individual APs.Wireless BridgesWireless bridges are used to connect wired or wireless networks together.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro1.3 Implement appropriate wireless networking device(s).2.4 Establish a wireless network connection for a device on the pTIA Network+2.2 Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them.Bridge Wireless access point 5.3 Given a scenario, troubleshoot common wired connectivity and performance issues.Bottlenecks ?Video/DemoTime10.5.1 Enterprise Wireless Equipment7:4610.5.2 Configure Enterprise Wireless Networks8:10Total Video Time15:56Lab/Activity10.5.4 Implement an Enterprise Wireless NetworkFact Sheets10.5.3 Enterprise Wireless FactsNumber of Exam Questions4 questionsTotal TimeAbout 37 minutes10.6: Wireless SecurityLecture Focus Questions:What does open authentication use to authenticate a device? Why is open authentication an unsecure solution? Which two additional components are required to implement 802.1x authentication? What is the difference between WPA Personal and WPA Enterprise? How can geofencing protect your network? Which default values should you always change on your wireless network? In this section, you will learn to:Secure an Enterprise wireless network. The key terms for this section include:TermDefinitionOpen AuthenticationOpen authentication requires that clients provide a MAC address in order to connect to the wireless network.Shared Key AuthenticationWith shared key authentication, clients and access points are configured with a shared key (called a secret or a passphrase). Only devices with the correct shared key can connect to the wireless network.802.1x Authentication802.1x authentication uses usernames and passwords, certificates, or devices such as smart cards to authenticate wireless clients.Rogue Access PointA rogue access point is any unauthorized access point added to a network.Data EmanationThe electromagnetic field generated by a network cable or network device, such as wireless router, which can be manipulated in order to eavesdrop on conversations or steal data.Packet SniffingPacket sniffing (also known as eavesdropping) is the interception and decoding of wireless transmissions. InterferenceWith wireless networks, interference is a signal that corrupts or destroys the wireless signal sent by APs and other wireless devices. Interference affects the availability of a network because normal communications are made impossible.JammingJamming is signal interference that is created intentionally by an attacker to make a wireless network impossible to use.Deauthentication AttackA deauthentication attack is when an attack spoofs your MAC address and then tells you wireless network to disconnect you from the network. Attackers may use a deauthentication attack to stage evil twin or man-in-the-middle attacks.BluetoothBluetooth is the standard for short-range wireless interconnection and is designed to allow devices to communicate within a personal area network (PAN) of close proximity. PAN devices include cell phones, personal digital assistants (PDAs), printers, mice, and keyboards.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro1.3 Implement appropriate wireless networking device(s).2.4 Establish a wireless network connection for a device on the pTIA Network+4.2 Explain authentication and access controls.Access control MAC filtering 4.3 Given a scenario, secure a basic wireless network.WPA WPA2 TKIP-RC4 CCMP-AES Authentication and authorization Shared or open Preshared key MAC filtering Geofencing 4.4 Summarize common networking attacks.Rogue access point Evil twin War-driving Deauthentication ?Video/DemoTime10.6.1 Wireless Security8:4410.6.3 Wireless Attacks9:3910.6.5 Secure a Wireless Network13:26Total Video Time31:49Lab/Activity10.6.6 Secure an Enterprise Wireless NetworkFact Sheets10.6.2 Wireless Security Facts10.6.4 Wireless Attack FactsNumber of Exam Questions15 questionsTotal TimeAbout 69 minutes10.7: Wireless TroubleshootingLecture Focus Questions:Where is the best place to situate your wireless access point? What types of objects might obstruct radio frequency wireless transmissions? How many channels should separate two different wireless networks? Which types of wireless networks require line-of-sight connections? How do range and antenna placement affect wireless networks? How does refraction affect your RF signal? In this section, you will learn to:Optimize a wireless network. Explore wireless network problems. Troubleshoot wireless network problems. The key terms for this section include:TermDefinitionDirectional AntennaA directional antenna creates a narrow, focused signal in a particular direction, which increases the signal strength and transmission distance. It provides a stronger point-to-point connection and is better equipped to handle obstacles.Omnidirectional AntennaAn omnidirectional antenna disperses the radio frequency wave in an equal 360-degree pattern. This provides access to many clients in a radius.Bandwidth SaturationBandwidth saturation is the point at which all of the available bandwidth on an internet connection has achieved maximum capacity and cannot pass any more data through the connection.Device SaturationDevice saturation is when the percentage of CPU time where I/O requests are issued to a device or the bandwidth utilization for the device is close to 100%.Frequency MismatchFrequency mismatch is when devices on the network are not broadcasting on the same frequency.AbsorptionAbsorption is when a signal passes through objects and the signal loses power.RefractionRefraction is when radio waves pass through objects of different densities, which cause the signal to bend or change speeds.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro5.3 Troubleshoot wired or wireless network connectivity to establish network pTIA Network+5.2 Given a scenario, use the appropriate tool.Software tools WiFi analyzer 5.4 Given a scenario, troubleshoot common wireless connectivity and performance issues.Reflection Refraction Absorption Latency Incorrect antenna type Interference Incorrect antenna placement Distance limitations Frequency mismatch Wrong SSID Wrong passphrase Security type mismatch Power levels ?Video/DemoTime10.7.1 Wireless Communications Troubleshooting11:3410.7.2 Troubleshoot Wireless Connections6:2310.7.4 Optimize Wireless Networks7:26Total Video Time25:23Lab/Activity10.7.5 Optimize a Wireless Network10.7.6 Explore Wireless Network Problems10.7.7 Troubleshoot Wireless Network ProblemsFact Sheets10.7.3 Wireless Network Troubleshooting FactsNumber of Exam Questions14 questionsTotal TimeAbout 81 minutes11.1: WAN ConceptsLecture Focus Questions:What is the optical carrier specification base rate? Why is the base rate significant? What are the differences between T1 and T3? E1 and E3? J1 and J3? Concerning WAN technologies, what is a channel? Why are channels important? What is the difference between a packet-switched network and a circuit-switched network? What are the two parts of a CSU/DSU? Which functions does each perform? Which WAN technology uses fixed-length cells? Which WAN technology is a transport technology for carrying signals over fiber optic cables? Which WAN technology can be implemented over regular telephone lines? How does MPLS add labels to packets? What are these labels used for? The key terms for this section include:TermDefinitionWAN CloudThe WAN cloud is the collection of equipment that makes up the WAN network. The WAN cloud is owned and maintained by telecommunications companies.Central Office (CO)The central office is a switching facility connected to the WAN, and it is the nearest point of presence for the WAN provider. It provides WAN cloud entry and exit points.Local LoopThe local loop is the cable that extends from the central office to the customer location. The local loop is owned and maintained by the WAN service provider.Demarcation Point (Demarc)When you contract with a local exchange carrier (LEC) for data or telephone services, they install a physical cable and a termination jack onto your premises. The demarcation point marks the boundary between the telco equipment and your organization's network or telephone system.Customer Premises Equipment (CPE)Devices physically located on the subscriber's premises are referred to as the customer premises equipment. CPE includes both the wiring and devices that the subscriber owns and the equipment leased from the WAN provider. CPE can include the smart jack, demarc, local loop, copper line drivers, and repeaters.Channel Service Unit/Data Service Unit (CSU/DSU)A CSU/DSU converts the signal received from the WAN provider into a signal that can be used by equipment at the customer site.Public Switched Telephone Network (PSTN)The PSTN is the network used to place local and long distance phone calls.Integrated Services Digital Network (ISDN)ISDN is a WAN technology that provides increased bandwidth within the local loop. The two forms of ISDN are ISDN BRI (basic rate interface) and ISDN PRI (primary rate interface).Frame RelayFrame Relay is a protocol used to connect to a WAN over dedicated (leased) lines. Frame Relay is a packet switching technology that supports variable-sized data units called frames.Asynchronous Transfer Mode (ATM)ATM is a WAN communication technology originally designed for carrying time-sensitive data like voice and video. It can also be used for regular data transport. ATM is a packet switching technology that uses fixed-length data units called cells. Each cell is 53 bytes.Distributed SwitchingDistributed switching is an architecture in which multiple processor-controlled switching units are distributed. There is often a hierarchy of switching elements with a centralized host switch and remote switches located close to concentrations of users.Multiprotocol Label Switching (MPLS)MPLS is a WAN data classification and data carrying mechanism. MPLS is a packet switching technology that supports variable-length frames. Dynamic Multipoint VPN (DMVPN)DMVPN is a Cisco IOS Software solution for building scalable IPsec Virtual Private Networks (VPNs).SIP TrunkSIP trunking is a method where business phone systems operate using an internet connection instead of a traditional phone line.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro1.2 Deploy appropriate wired networking or internetworking device(s).1.3 Implement appropriate wireless networking device(s).CompTIA Network+1.3 Explain the concepts and characteristics of routing and switching.Distributed switching Packet-switched vs. circuit-switched network 2.5 Compare and Contrast WAN technologies.Service type ISDN T1/T3 E1/E3 OC-3 - OC-192 Metropolitan Ethernet PRI Transmission mediums Copper Fiber Characteristics of service MPLS ATM Frame relay SIP trunk Termination Demarcation point CSU/DSU ?Video/DemoTime11.1.1 WAN Structure5:1411.1.2 WAN Technologies10:0211.1.3 WAN Services10:29Total Video Time25:45Fact Sheets11.1.4 WAN Media Facts11.1.5 WAN Facts11.1.6 WAN Services FactsNumber of Exam Questions15 questionsTotal TimeAbout 56 minutes11.2: WAN ConnectionsLecture Focus Questions:What is the difference between LCP and NCP? In which layer of the OSI model does PPP function? Which PPP feature can detect link errors? During PPP configuration, which authentication methods are available? In this section, you will learn to:Configure a PPP WAN link. The key terms for this section include:TermDefinitionPPP WAN LinkA point-to-point WAN link connects two endpoints on a pre-established communications path, usually through a telephone company.? The Point-to-Point Protocol (PPP) moves data through the connection.Link Control Protocol (LCP)LCP is responsible for establishing, maintaining, and tearing down the PPP link. LCP packets are exchanged work Control Protocol (NCP)NCP is used to agree on and configure Network layer protocols. Each Network layer protocol has a corresponding control protocol packet.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro1.2 Deploy appropriate wired networking or internetworking device(s).1.3 Implement appropriate wireless networking device(s).CompTIA Network+2.5 Compare and contrast WAN technologies.Characteristics of Service PPP ?Video/DemoTime11.2.1 PPP WAN Connections3:0111.2.2 Set Up a PPP WAN Link3:22Total Video Time6:23Lab/Activity11.2.4 Configure a PPP WAN LinkFact Sheets11.2.3 PPP WAN Connection FactsNumber of Exam Questions8 questionsTotal TimeAbout 32 minutes11.3: Internet ConnectivityLecture Focus Questions:What connection speeds should you expect from a PSTN internet connection? What is multiplexing? How does it increase the bandwidth of a connection? How does DSL enable you to talk on the phone and connect to the internet at the same time? What are the requirements for qualifying for DSL service? Which DSL service does not support simultaneous voice and data transmissions? What is the difference between BRI and PRI with ISDN? What is the difference between a B channel and a D channel? What are the disadvantages of a satellite internet connection? In this section, you will learn to:Connect to a DSL network. The key terms for this section include:TermDefinitionPOTS Phone LinePOTS is the acronym for Plain Old Telephone Service, the standard telephone service most homes have.Digital Subscriber Line(DSL)Digital subscriber line (DSL) is a high-speed digital bandwidth connection from a phone wall jack on an existing telephone network. With DSL, data and voice are both sent on the same copper wire with data using one frequency and voice using another.Cellular NetworkingCellular networking uses a digital mobile phone network for internet access.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro1.2 Deploy appropriate wired networking or internetworking device(s).1.3 Implement appropriate wireless networking device(s).CompTIA Network+1.6 Given a scenario, implement the appropriate wireless technologies and configurations.Cellular GSM TDMA CDMA 2.3 Explain the purposes and use cases for advanced networking devices.AAA/RADIUS server 2.5 Compare and contrast WAN technologies.Characteristics of Service PPPoE PPP Service type DSL Cable broadband Dial-up ISDN PRI Transmission mediums Satellite 3.5 Identify policies and best practices.Remote access policies 4.2 Explain authentication and access controls.Authorization, authentication and accounting RADIUS TACACS+ ?Video/DemoTime11.3.1 Traditional Internet Connectivity13:0911.3.2 Mobile Internet Connectivity8:09Total Video Time21:18Lab/Activity11.3.4 Connect to a DSL NetworkFact Sheets11.3.3 Internet Services FactsNumber of Exam Questions15 questionsTotal TimeAbout 54 minutes11.4: Remote AccessLecture Focus Questions:What functions are performed by PPP for remote access connections? How does PPPoE differ from PPP? Why is proxy ARP necessary for dial-up remote access clients? What is the difference between authentication and authorization? What is an advantage of using RADIUS or TACACS+ in your remote access solution? How does RADIUS differ from TACACS+? In this section, you will learn to:Configure a remote access server. Configure a RADIUS solution. The key terms for this section include:TermDefinitionAuthenticationAuthentication is the process of proving identity where logon credentials are exchanged and logon is allowed or denied.AuthorizationAuthorization is the process of identifying the resources that a user can access over the remote access connection.AccountingAccounting is an activity that tracks or logs the use of the remote access connection. AAA ServerAn AAA server is used to centralize authentication, authorization, and accounting for multiple remote access servers. Connection requests from remote clients are received by the remote access server and are forwarded to the AAA server to be approved or denied. Policies defined on the AAA server apply to all clients connected to all remote access servers.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro4.4 Configure systems and remote devices to create and use a VPN pTIA Network+2.3 Explain the purposes and use cases for advanced networking devices.AAA/RADIUS server 2.5 Compare and contrast WAN technologies.Characteristics of Service PPPoE PPP 3.5 Identify policies and best practices.Remote access policies 4.2 Explain authentication and access controls.Authorization, authentication and accounting RADIUS TACACS+ ?Video/DemoTime11.4.1 Remote Access15:0411.4.3 Configure a Remote Access Server9:5111.4.4 Configure a RADIUS Solution7:35Total Video Time32:30Fact Sheets11.4.2 Remote Access FactsNumber of Exam Questions14 questionsTotal TimeAbout 52 minutes11.5: WAN TroubleshootingLecture Focus Questions:Which command shows you summary information about the interface status? Which utility allows you to verify the Application layer connectivity and configuration? What does an up/down interface status mean? Which command allows you to view the interface status and identify connectivity problems on a WAN link? What does it mean if the interface status is administratively down/down? In this section, you will learn to:Troubleshoot WAN Issues. The key terms for this section include:TermDefinitionpingping sends an ICMP echo request/reply packet to a remote host. A response from the remote host indicates that both hosts are correctly configured and a connection exists between them.traceroutetraceroute uses ICMP packets to test connectivity between devices, but it also shows the path between the two devices. Responses from each hop on the route are measured three times to provide an accurate representation of how long the packet takes to reach and then return back from the destination device.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro5.1 Troubleshoot issues with networking media or devices to establish network communication.5.3 Troubleshoot wired or wireless network connectivity to establish network pTIA Network+5.5 Given a scenario, troubleshoot common network service issues.Incorrect time ?Video/DemoTime11.5.1 WAN Troubleshooting8:3911.5.2 Troubleshoot WAN Issues8:02Total Video Time16:41Fact Sheets11.5.3 WAN Troubleshooting FactsNumber of Exam Questions9 questionsTotal TimeAbout 31 minutes12.1: Network Design, Documentation, and PoliciesLecture Focus Questions:Which document allows you to effectively monitor your system's performance? Why is it important to conduct a needs assessment? In the IT asset lifecycle, in which phase do you apply updates and patches? Why should you test a new asset in a sandbox environment? What information is needed to create a network diagram? The key terms for this section include:TermDefinitionPolicyA policy is a document that prescribes processes that help your organization reach goals and meet network requirements for such things as administrative delegation, network documentation, and security.RegulationA regulation is a requirement published by a government or other licensing body, and it must be followed. Policies are often written in response to regulations.ProcedureA procedure is a step-by-step process outlining how to implement a specific work DiagramA network diagram shows the logical and/or physical layout of your network.Wiring SchematicA wiring schematic is a type of network diagram that focuses on the physical connections between devices.ConfigurationConfiguration documentation identifies specific configuration information for a device, such as a firewall’s IP address assignments.Change and Job LogsA change or job log keeps track of changes to the configuration of a device or the network. BaselineA baseline is a snapshot of the performance statistics of the network or devices. The baseline is used as a logical basis for future comparison.This section helps you prepare for the following certification exam objectives:ExamObjectiveCompTIA Network+1.7 Summarize cloud concepts and their purposes.Security implications/ considerations 3.1 Given a scenario, use appropriate documentation and diagrams to manage the network.Diagram symbols Logical vs. physical diagrams Rack diagrams Wiring and port locations Inventory management Network configuration and performance baselines Standard operating procedures/work instructions 3.2 Compare and contrast business continuity and disaster recovery concepts.MTTR MTBF 3.3 Explain common scanning, monitoring and patching processes and summarize their expected outputs.Processes Reviewing baselines 3.5 Identify policies and best practices.System life cycle Asset disposal ?Video/DemoTime12.1.1 Organization Policies and Procedures3:4312.1.2 Network Design8:5012.1.4 Network Documentation8:3812.1.6 Asset Management7:19Total Video Time28:30Fact Sheets12.1.3 Network Design Facts12.1.5 Network Documentation Facts12.1.7 Asset Management FactsNumber of Exam Questions14 questionsTotal TimeAbout 58 minutes12.2: Risk ManagementLecture Focus Questions:What is the difference between a threat and a vulnerability? What is a mission-critical system? What is the difference between a BCP and a BIA? Which part of risk response can introduce the possibility of negligence and lead to liability? What is the difference between a tangible asset and an intangible asset? What is the difference between quantitative and qualitative analysis? The key terms for this section include:TermDefinitionAssetAn asset is a resource that has value to the organization.ThreatThreat is any potential danger to the confidentiality, integrity, or availability of information or systems.VulnerabilityVulnerability is the possibility of an asset being exploited due to the absence or weakness of an asset safeguard.Threat AgentA threat agent is an entity that may find and exploit a vulnerability, causing a threat to an asset.Threat VectorA threat vector is the path or means that an attacker uses to compromise a system. Threat vectors expose a system's vulnerabilities and are exploited by an attacker.Threat ProbabilityThreat probability is the likelihood that a particular threat will exploit a specific vulnerability of a system.AttackAn attack is an action that intends to compromise an asset by exploiting a vulnerability.CountermeasureA countermeasure is something done to reduce the likelihood of a successful attack.ExposureExposure is the vulnerability of losses from a threat agent.LossLoss is the real damage to an asset that reduces its confidentiality, integrity, or availability.RiskRisk is the likelihood of a vulnerability being exploited. Reducing the vulnerability or minimizing the threat agent reduces the risk.Residual RiskResidual risk is the portion of risk that remains after the implementation of a countermeasure. Residual risk almost always exists.Business Continuity Plan (BCP)A BCP identifies appropriate disaster responses that allow business operations to continue when infrastructure and resource capabilities are restricted or reduced. This ensures that critical business functions (CBF) can be performed when operations are disrupted. Additionally, a BCP identifies the actions required to restore the business to normal operation.Business Impact Analysis (BIA)A BIA focuses on the impact that losses will have on the organization.Disaster Recovery Plan (DRP)A DRP identifies short-term actions that can stop the incident and restore critical functions so the organization can continue to operate. The DRP is a subset of the BCP. The DRP is the plan for IT-related recovery and continuity.Security IncidentA security incident is an event or series of events that result from a security policy violation and has adverse effects on a company's ability to proceed with business.This section helps you prepare for the following certification exam objectives:ExamObjectiveCompTIA Network+3.1 Given a scenario, use appropriate documentation and diagrams to manage the network.Change management documentation 3.5 Identify policies and best practices.Incident response policies 4.6 Explain common mitigation techniques and their purposes.Role separation ??Video/DemoTime12.2.1 Risk Management3:0412.2.3 Business Continuity2:28Total Video Time5:32Fact Sheets12.2.2 Risk Management Facts12.2.4 Business Continuity Facts12.2.5 Incident Response FactsNumber of Exam Questions14 questionsTotal TimeAbout 35 minutes12.3: Security PoliciesLecture Focus Questions:What are the characteristics of a strong password? What information should be included in the privacy policy as personally identifiable information? Which vulnerabilities does a vulnerability scan look for in your network? Why should you destroy old versions of the security plan? What is the difference between onboarding and off-boarding? Which document specifies who is going to do what and when? The key terms for this section include:TermDefinitionOnboardingWhen one organization needs to work directly with another in either a vendor or partner relationship, steps should be taken to ensure that the integration process maintains the security of each party's network. This process is known as onboarding.Off-boardingWhen the relationship with the third party ends, you need to ensure that all of the doors that were opened between organizations during the onboarding phase are closed. This process is known as off-boarding.Security PolicyA security policy defines the overall security outlook for an organization.Acceptable Use PolicyAn acceptable use policy (AUP) identifies whether employees have rights to use company property, such as internet access and computer equipment, for personal use.Authorized Access PolicyAn authorized access policy documents access control to company resources and information. This policy specifies who is allowed to access an organization's various systems.Remote Access PolicyA remote access policy is a document that outlines and defines remote connections methods that are accepted by a company.Privileged User Account PolicyA privileged user account is any account that gives full access to the system. These accounts give users the ability to access and modify critical system settings, view restricted data, and so on. Change and Configuration Management PolicyA change and configuration management policy provides a structured approach to securing company assets and making process changes.Code of EthicsA code of ethics is a set of rules or standards that help you to act ethically in various situations.Human Resource PoliciesThese policies are the formal rules and guidelines that a business puts in place to hire, train, assess, and reward the members of their company.Password PolicyPassword policies detail the requirements for passwords.Privacy PolicyA privacy policy outlines how the organization will secure private information for employees, clients, and customers. The privacy policy outlines how personally identifiable information (PII) can be used and how it is protected from disclosure.User Management PolicyUser management policies identify actions that must take place when employee status changes. The administrator of a network for an organization needs to be aware of new employees, employee advancements and transfers, and terminated employees to ensure the security of the system.This section helps you prepare for the following certification exam objectives:ExamObjectiveCompTIA Network+3.2 Compare and contrast business continuity and disaster recovery concepts.SLA requirements 3.5 Identify policies and best practices.On-boarding/off-boarding procedures NDA 3.5 Identify policies and best practices.Privileged user agreement Password policy Licensing restrictions International export controls Data loss prevention Remote access policies AUP Safety procedures and policies 4.6 Explain common mitigation techniques and their purposes.Privileged user account Role separation ?Video/DemoTime12.3.1 Security Policies14:0512.3.3 Third-Party Integration Policies and Documents8:55Total Video Time23:00Fact Sheets12.3.2 Security Policy Facts12.3.4 Third-Party Integration FactsNumber of Exam Questions15 questionsTotal TimeAbout 48 minutes13.1: Physical SecurityLecture Focus Questions:What are some examples of physical security measures you can implement to protect your network? Which physical control measure uses mantraps, turnstiles, and double-entry doors? Who can prevent and react to security breaches? Which type of physical security system establishes controls at each layer to ensure that defeating one level of security does not allow an attacker subsequent access? What is the difference between an anti-passback system and a motion detector? In this section, you will learn to:Implement Physical Security. The key terms for this section include:TermDefinitionClosed-Circuit Television(CCTV)CCTV is a television system in which signals are not publicly distributed but are monitored privately, primarily for surveillance and security purposes.MantrapA mantrap is a specialized entrance with two doors that creates a security buffer zone between two areas.Once a person enters into the space between the doors, both doors are locked. To enter the facility, authentication must be provided.Anti-Passback SystemAn anti-passback system prevents a card holder from passing their card back to a second person to gain entry into the same controlled area.This section helps you prepare for the following certification exam objectives:ExamObjectiveCompTIA Network+4.1 Summarize the purposes of physical security devices. Detection Motion detection Video surveillance Asset tracking tags Tamper detection Prevention Badges Biometrics Smart cards Key fob Locks ?Video/DemoTime13.1.1 Physical Security10:19Total Video Time10:19Lab/Activity13.1.3 Implement Physical SecurityFact Sheets13.1.2 Physical Security FactsNumber of Exam Questions15 questionsTotal TimeAbout 43 minutes13.2: Social EngineeringLecture Focus Questions:What is social engineering? What is the best defense against social engineering? What is the difference between piggybacking and tailgating? How can you verify that a website is using HTTPS? What is the difference between pretexting and masquerading? In which type of social engineering attack does an attacker lie about having authority or use their high status in a company to force victims to provide information? In this section, you will learn to:Respond to social engineering exploits. The key terms for this section include:TermDefinitionSocial EngineeringSocial engineering is an attack that exploits human nature by convincing someone to reveal information or perform an activity.Shoulder SurfingShoulder surfing involves looking over the shoulder of someone working on a computer.EavesdroppingEavesdropping refers to an unauthorized person listening to employees or other authorized personnel as they discuss sensitive topics.Dumpster DivingDumpster diving is the process of looking in the trash for sensitive information that has not been properly disposed of.Tailgating and PiggybackingPiggybacking and tailgating refer to an attacker entering a secured building by following an authorized employee through a secure door without providing identification. Piggybacking usually implies consent from the authorized employee, whereas tailgating implies no consent from the authorized employee.MasqueradingMasquerading refers to convincing personnel to grant access to sensitive information or protected systems by pretending to be someone who is authorized and/or requires that access. PhishingA phishing scam is an email pretending to be from a trusted organization that asks a user to verify personal information or send money.Caller ID SpoofingCaller ID spoofing causes the telephone network to display a number on the recipient's caller ID display that implies that a call is coming from a legitimate source.Hoax EmailsHoax emails prey on email recipients who are fearful and believe most information if it is presented in a professional manner. Usually, these hoax messages instruct the reader to delete key system files or download Trojan horse viruses.Spyware/AdwareSpyware and adware are pop-up advertisements that can have malicious objectives, such as tricking users into unknowingly downloading malware or gathering information about the user and sending it to a third party for commercial gain.PretextingPretexting is the use of a fictitious scenario to persuade someone to perform an action or give information for which they are not authorized. This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro4.6 Respond to social engineering pTIA Network+4.4 Summarize common networking attacks.Social engineering Insider threat Phishing ?Video/DemoTime13.2.1 Social Engineering11:0813.2.3 Identify Social Engineering Exploits8:06Total Video Time19:14Lab/Activity13.2.4 Respond to Social Engineering ExploitsFact Sheets13.2.2 Social Engineering FactsNumber of Exam Questions12 questionsTotal TimeAbout 49 minutes13.3: Network Vulnerabilities and Threats 1Lecture Focus Questions:What is the main goal in a denial of service (DoS) attack? How do DDoS and DRDoS attacks differ? What is the difference between a virus and a worm? In addition to implementing virus scanning software, what must you do to ensure that you are protected from the latest virus variations? In which type of spoofing are packets intended for the default gateway sent to the attacker instead? In which type of session attack does the attacker hijack and exploit a user's cookies? In this section, you will learn to:Perform a UDP Flood Attack. Perform ARP Poisoning. The key terms for this section include:TermDefinitionMalwareMalware is a type of software designed to take over or damage a computer without the user's knowledge or approval.DoS and DDoSDenial of Service (DoS) and Distributed Denial of Service (DDoS) attacks impact system availability by flooding the target system with traffic or requests or by exploiting a system or software flaw. Permanent Denial-of-Service(PDoS)A permanent denial-of-service (PDoS) is an attack that damages a system so badly that it requires the replacement or re-installation of hardware. VirusA virus is a program that attempts to damage a computer system and replicate itself to other computer systems.WormA worm is a self-replicating program.Trojan HorseA Trojan horse is a malicious program that is disguised as legitimate or desirable software.ZombieA zombie is a computer that is infected with malware that allows remote software updates and control through a command and control center called a zombie master.BotnetA botnet refers to a group of zombie computers that are commanded from a central control infrastructure.RootkitA rootkit is a set of programs that allow attackers to maintain permanent and hidden administrator-level access to a computer.Logic BombA logic bomb is designed to execute only under predefined conditions and lies dormant until the predefined condition is met.SpywareSpyware is software that is installed without the user's consent or knowledge. Spyware is designed to intercept or take partial control of the user's interaction with the computer.AdwareAdware monitors actions that denote personal preferences and then sends pop-ups and ads that match those preferences.RansomwareRansomware denies access to a computer system until the user pays a ransom.ScarewareScareware is a scam that fools users into thinking they have some form of malware on their system. The intent of the scam is to sell the user fake antivirus software to remove malware they don't have.CrimewareCrimeware is designed to facilitate identity theft by gaining access to a user's online financial accounts, such as banks and online retailers.Ping FloodA ping flood is a simple DoS attack where the attacker overwhelms the victim with ICMP Echo Request (ping) packets.Ping of DeathThe ping of death is a DoS attack that uses the ping utility to send oversized ICMP packets.SmurfA Smurf attack is a form of DrDoS attack that spoofs the source address in ICMP packets. A Smurf attack requires an attacker system, an amplification network, and a victim computer or network.SYN FloodThe SYN flood exploits the TCP three-way handshake. So many resources are allocated that the victim cannot process a legitimate inbound request for a TCP/IP session.LANDA LAND attack is when an attacker floods the victim's system with packets that have forged headers.Christmas (Xmas) TreeA Christmas (Xmas) tree attack (also known as Christmas tree scan, nastygram, kamikaze, or lamp test segment) uses an IP packet with every option turned on for the protocol being used. Christmas tree packets can be used to conduct reconnaissance by scanning for open ports and a DoS attack if sent in large numbers.Man-in-the-MiddleA man-in-the-middle attack is used to intercept information between two communication partners.TCP/IP (session) HijackingTCP/IP hijacking is an extension of a man-in-the-middle attack where the attacker steals an open and active communication session from a legitimate user.HTTP (Session) HijackingHTTP (session) hijacking is a real-time attack in which the attacker hijacks a legitimate user's cookies and uses the cookies to take over the HTTP session.Replay AttackIn a replay attack, the attacker uses a protocol analyzer or sniffer to capture authentication information going from the client to the server. The attacker then uses this information to connect at a later time and pretend to be the client.IP SpoofingIP spoofing changes the IP address information within a packet. It can be used to hide the origin of the attack by spoofing the source address. It can also amplify attacks by sending a message to a broadcast address and then redirecting responses to a victim who is overwhelmed with responses.MAC SpoofingMAC spoofing is when an attacking device spoofs the MAC address of a valid host currently in the MAC address table of the switch. The switch then forwards frames destined for that valid host to the attacking device.ARP SpoofingARP spoofing (also known as ARP poisoning) uses spoofed ARP messages to associate a different MAC address with an IP address. ARP spoofing can also be used to perform Denial of Service (DoS) attacks by redirecting communications to fake or nonexistent MAC addresses.DNS SpoofingDNS spoofing (also known as DNS poisoning or Pharming) takes advantage of the DNS server's ability to resolve a domain into its respective IP address. This attack exploits DNS vulnerabilities, resolving a domain typed on a browser into a fake IP address. It also redirects connection to a potentially malicious server.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro4.6 Respond to social engineering pTIA Network+4.4 Summarize common networking attacks.DoS Reflective Amplified Distributed Logic bomb Ransomware DNS poisoning ARP poisoning Spoofing Man-in-the-middle ?Video/DemoTime13.3.1 Malware10:5513.3.3 Denial of Service (DoS)4:4413.3.4 Perform a UDP Flood Attack4:0913.3.6 Session and Spoofing Attacks5:1113.3.7 Perform ARP Poisoning7:42Total Video Time32:41Fact Sheets13.3.2 Malware Facts13.3.5 DoS Attack Facts13.3.8 Session and Spoofing Attack FactsNumber of Exam Questions15 questionsTotal TimeAbout 63 minutes13.4: Network Vulnerabilities and Threats 2Lecture Focus Questions:What is a drive-by download? What is the difference between MAC flooding and MAC spoofing? How does a command injection attack a web application? What is the difference between XSS and CSRF/XSRF? How does salting the hash protect your network? What is the target of ARP spoofing? How does a buffer overflow differ from an integer overflow? In this section, you will learn to:Crack passwords. The key terms for this section include:TermDefinitionMAC FloodingMAC flooding overloads the switch's MAC forwarding table to make the switch function like a hub.ARP Spoofing/PoisoningARP spoofing/poisoning associates the attacker's MAC address with the IP address of victim devices.MAC SpoofingMAC spoofing changes the source MAC address on frames sent by the attacker.VLAN HoppingVLAN hopping occurs when an attacking host on a VLAN attempts to access traffic on another VLAN that it should not have access to.Drive-by DownloadA drive-by download is an attack where software or malware is downloaded and installed without explicit consent from the user.Typosquatting or URL HijackingTyposquatting or URL hijacking occurs when an attacker registers domain names that correlate to common typographical errors users make while trying to access legitimate websites.Watering HoleA watering hole attack is a variation of a spear phishing attack, which is directed at a specific organization or person. Instead of overtly sending traditional phishing messages directly to the target, a watering hole attack is more passive than phishing; it relies on the trust the target has in specific websites.Buffer OverflowA buffer overflow occurs when the operating system or an application does not properly enforce boundaries for data input types and amounts. Hackers submit data beyond the size reserved for the data in the memory buffer, and the extra data overwrites adjacent memory locations. The extra data sent by the attacker could include executable code that might be able to execute in privileged mode.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro4.6 Respond to social engineering pTIA Network+4.4 Summarize common networking attacks.VLAN hopping Brute force 4.5 Given a scenario, implement network device hardening.Changing default credentials Avoiding common passwords 4.4 Summarize common networking attacks.Phishing ?Video/DemoTime13.4.1 Switch Attacks5:4313.4.3 Password Attacks6:2213.4.4 Crack Passwords8:2213.4.6 Web Attacks4:39Total Video Time25:06Fact Sheets13.4.2 Switch Attack Facts13.4.5 Password Attack Facts13.4.7 Web Attack FactsNumber of Exam Questions10 questionsTotal TimeAbout 51 minutes13.5: AuthenticationLecture Focus Questions:What is the role of a CA in a PKI? What is the subject name within a certificate? What does an authentication protocol do? How does CHAP protect the password or shared secret during the authentication process? Which authentication protocol would you choose if you needed to use smart cards? What are the two ticket types used with Kerberos? How do tickets make authentication and authorization more efficient? What device is required to implement 802.1x authentication? What is the difference between a strong authentication method and a mutual authentication method? The key terms for this section include:TermDefinitionFalse NegativeA false negative (or Type I error) occurs when a person who should be allowed access is denied access. The false rejection rate (FRR) is a measure of the probability that a false negative will occur.False PositiveA false positive (or Type II error) occurs when a person who should be denied access is allowed access.Crossover Error RateThe crossover error rate, also called the equal error rate, is the point where the number of false positives matches the number of false negatives in a biometric system. Processing RateThe processing rate, or system throughput, identifies the number of subjects or authentication attempts that can be validated. An acceptable rate is ten subjects per minute or above.KerberosKerberos is a free protocol that provides strong authentication for client/server applications using a secret-key cryptography so the client can prove its identity even across an unsecure network connection. IEEE 802.1XIEEE 802.1X is a port-based authentication service where the client initiates the authentication, a network device negotiates the authentication, and an authentication server is accessed after the supplicant is authenticated.Captive PortalA captive portal is a web page that pops up when you access a public Wi-Fi. This portal usually summarizes terms disclosing types of activities the Wi-Fi provider is not liable for during public access.CertificateA certificate is a digital document that identifies a user or a computer. The certificate includes a subject name, which is the name of a user or a computer.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro4.6 Respond to social engineering pTIA Network+4.2 Explain authentication and access controls.4.2 Explain authentication and access controls.Authorization, authentication and accounting Kerberos Single sign-on Certificates Auditing and logging Multifactor authentication Something you know Something you have Something you are Somewhere you are Something you do Access control 802.1x Captive portal 4.3 Given a scenario, secure a basic wireless network.Authentication and authorization EAP PEAP EAP-FAST EAP-TLS 4.6 Explain common mitigation techniques and their purposes.Signature management ?Video/DemoTime13.5.1 Authentication10:3413.5.3 Authentication Protocols11:1113.5.4 Digital Certificates5:24Total Video Time27:09Fact Sheets13.5.2 Authentication Facts13.5.5 Authentication Protocol FactsNumber of Exam Questions15 questionsTotal TimeAbout 53 minutes13.6: Secure ProtocolsLecture Focus Questions:Which protocol is the secure alternative to Telnet? What is the difference between SFTP and FTPS? Which protocol is added to HTTP for secure Web browsing? What improvements does SNMPv3 provide over earlier SNMP versions? In this section, you will learn to:Add SSL on a website. The key terms for this section include:TermDefinitionSSLSecure Sockets Layer (SSL) is a protocol used to secure connections between servers and network application clients over an unsecure network, such as the internet.TLSTransport Layer Security (TLS) is an improved version of SSL. Like SSL, TLS is an cryptographic protocol that provides communications security over a computer network.SSHSecure Socket Shell (SSH) is a network protocol that provides administrators with a secure way to access a remote computer.This section helps you prepare for the following certification exam objectives:ExamObjectiveCompTIA Network+3.4 Given a scenario, use remote access methods.VPN SSL/TLS/DTLS 4.4 Summarize common networking attacks.Exploits vs. vulnerabilities 4.5 Given a scenario, implement network device hardening.File hashing Using secure protocols Generating new keys 4.6 Explain common mitigation techniques and their purposes.File integrity monitoring ?Video/DemoTime13.6.1 Secure Protocols8:0213.6.2 Add SSL to a Website4:29Total Video Time12:31Fact Sheets13.6.3 Secure Protocol FactsNumber of Exam Questions7 questionsTotal TimeAbout 25 minutes13.7: Remote Access SecurityLecture Focus Questions:How does a remote access VPN differ from a host-to-host VPN? With a site-to-site VPN, which devices are configured as the VPN tunnel endpoints? What does PPTP use for encryption? What does L2TP use? What is the difference between AH and ESP used with IPsec? Why would you want to use SSL VPNs when creating VPNs? In this section, you will learn to:Configure a VPN connection. Configure a mobile device VPN connection. The key terms for this section include:TermDefinitionVirtual Private Network(VPN)A virtual private network (VPN) is a type of network that uses encryption to allow IP traffic to travel securely over the TCP/IP network. A VPN is used primarily to support secure communications over an untrusted network.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro4.4 Configure systems and remote devices to create and use a VPN pTIA Network+2.3 Explain the purposes and use cases for advanced networking devices.VPN concentrator 2.5 Compare and contrast WAN technologies.Characteristics of service DMVPN 3.4 Given a scenario, use remote access methods.VPN IPSec SSL/TLS/DTLS Site-to-site Client-to-site ?Video/DemoTime13.7.1 Virtual Private Networks (VPNs)10:2613.7.3 Set Up a VPN Connection5:54Total Video Time16:20Lab/Activity13.7.4 Configure a VPN Connection13.7.5 Configure a Mobile Device VPN ConnectionFact Sheets13.7.2 VPN FactsNumber of Exam Questions12 questionsTotal TimeAbout 58 minutes13.8: Troubleshoot Network Security IssuesLecture Focus Questions:How do you defend against a ping of death attack? What does the sniffer-detect script with the Nmap utility allow you to do? What tools can help you find backdoors? What can you do to prevent your network from becoming an amplifier for DoS attacks? What do you need in order to configure two-factor authentication? The key terms for this section include:TermDefinitionDoS and DDoSDenial of Service (DoS) and Distributed Denial of Service (DDoS) attacks impact system availability by flooding the target system with traffic or requests or by exploiting a system or software flaw. Ping of DeathThe ping of death attack uses the ping utility to send oversized ICMP packets (larger than 65,536 bytes). The attacker sends a ping of death packet directly to the victim, which overflows the memory buffers on that system and causes it to freeze, crash, or reboot.ARP PoisoningIn ARP poisoning, spoofed ARP messages are sent to hosts on an Ethernet LAN that contain false source MAC addresses. By doing this, the ARP tables on each host are updated with incorrect information. SniffingThe process of capturing all network frames being transmitted. Network card must be in promiscuous mode.Backdoor AccessA backdoor is an unprotected access method or pathway into a network system. This section helps you prepare for the following certification exam objectives:ExamObjectiveCompTIA Network+4.2 Explain authentication and access controls.Authorization, authentication and accounting Local authentication 4.4 Summarize common networking attacks.Exploits vs. vulnerabilities 4.5 Given a scenario, implement network device hardening.Disabling unused ports IP ports Device ports (physical and virtual) 5.5 Given a scenario, troubleshoot common network service issues.Untrusted SSL certificate Blocked TCP/UDP ports ?Video/DemoTime13.8.1 Resolve Network Security Issues8:4613.8.2 Respond to Network Attacks3:0013.8.3 Authentication Issues4:14Total Video Time16:00Fact Sheets13.8.4 Security Troubleshooting FactsNumber of Exam Questions5 questionsTotal TimeAbout 26 minutes14.1: Detection and PreventionLecture Focus Questions:What type of recognition method is used by most virus scanning software? How does an IPS differ from an IDS? What is the advantage of using a network-based IDS instead of a host-based IDS? What should you do regularly when using a signature-based IDS? How can packet sniffing and port scanning software be used to improve the security of your network? Which devices can you use to discover open ports? In this section, you will learn to:Configure Intrusion Prevention Enable Wireless Intrusion Prevention The key terms for this section include:TermDefinitionIntrusion Detection System(IDS)A special network device that can detect attacks and suspicious activity.Intrusion Prevention System(IPS)An intrusion prevention system (IPS) that can stop the malicious traffic before it makes it to the rest of your network.HoneypotA honeypot is a device or virtual machine that entices intruders by displaying a vulnerability, displaying a configuration flaw, or appearing to contain valuable data.HoneynetA honeynet is a network of honeypots.Tarpit(Sticky Honeypot)A tarpit (or sticky honeypot) is a honeypot that answers connection requests in such a way that the attacking computer is stuck for a period of time.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro4.5 Perform administrative tasks on a network security pTIA Network+2.3 Explain the purposes and use cases for advanced networking devices.IDS/IPS 3.3 Explain common scanning, monitoring and patching processes and summarize their expected outputs.Processes Port scanning Vulnerability scanning Event management SIEM 4.5 Given a scenario, implement network device hardening.Disabling unused ports IP ports Device ports (physical and virtual) 4.6 Explain common mitigation techniques and their purposes.Honeypot/honeynet 5.2 Given a scenario, use the appropriate tool.Software tools Port scanner ?Video/DemoTime14.1.1 Intrusion Detection and Prevention4:2214.1.2 Configure an IDS/IPS5:5814.1.3 Security Information and Event Management4:2014.1.7 Vulnerability Assessment4:23Total Video Time19:03Lab/Activity14.1.5 Configure Intrusion Prevention14.1.6 Enable Wireless Intrusion PreventionFact Sheets14.1.4 Intrusion Detection and Prevention Facts14.1.8 Vulnerability Assessment FactsNumber of Exam Questions15 questionsTotal TimeAbout 69 minutes14.2: Penetration TestingLecture Focus Questions:Why should you perform a penetration test on your network? Which type of penetration testing provides you with the most accurate results regarding your network's vulnerabilities? How does black box testing differ from grey box testing? In which stage of penetration testing do you create a fingerprint of your system? What is the difference between operations penetration testing and electronic penetration testing? In this section, you will learn to:Use penetration testing tools. The key terms for this section include:TermDefinitionPenetration TestingA penetration test (or pen test) is an authorized simulated security attack on the network and is conducted from outside the organization's security perimeter.Physical PenetrationA physical penetration test is where the tester attempts to physically enter a building without authorization, access servers or workstations, access wiring closets, and shut down power or other services.Operations PenetrationAn operations penetration test is where the tester attempts to gain as much information as possible using methods, such as dumpster diving, over-the-shoulder reconnaissance, and social engineering.Electronic PenetrationAn electronic penetration test is where the tester attempts to gain access and information about computer systems and the data on those systems using methods, such as system scanning, port scanning, network monitoring, sniffing, and fingerprinting (or footprinting).FingerprintingFingerprinting (also called footprinting) scans a target system to identify the operating system, the patch level, and the applications and services available on it.Black Box TestA black box test (also called a zero-knowledge test) is where the tester has no prior knowledge of the target system.White Box TestA white box test (also called a full-knowledge test) is where the tester has detailed information prior to starting the test.Grey Box TestA grey box test (also called a partial-knowledge test) is where the tester has the same amount of information that would be available to a typical insider in the organization.Single-Blind TestA single-blind test is where one side has advanced knowledge, such as the attacker or the defender.Double-Blind TestA double-blind test is where the penetration tester does not have prior information about the system and the network administrator has no knowledge that the test is being performed. Passive ReconnaissancePassive reconnaissance is an attempt to gain data about targeted network and computers without directly affecting the work EnumerationNetwork enumeration (also called network mapping) involves a thorough and systematic discovery of as much of the corporate network as possible. Vulnerability scanners are an important part of network enumeration.System EnumerationSystem enumeration is the process of gaining as much information about a specific computer as possible. System enumeration initiates fingerprinting.Target SelectionTarget selection is the process of identifying servers that appear available. An attack typically involves targeted servers that present the path of least resistance and are the easiest to exploit.Gaining AccessGaining access is the act of performing the exploit. A successful exploit on a service or application typically leads to an attempt to elevate privilege to local administrator or domain administrator and grant more privileges to the system or the entire network.Control and ReportingControl and reporting is the process of documenting the following in as much detail as possible: The level of access or control that was gained during the testing. Methods used during the penetration test. Services and systems exploited. This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro4.6 Explain common mitigation techniques and their purposes.Penetration testing CompTIA Network+5.2 Given a scenario, use the appropriate tool.Software toolsCommand lineNmap?Video/DemoTime14.2.1 Penetration Testing2:3814.2.3 Explore Penetration Testing Tools18:19Total Video Time20:57Fact Sheets14.2.2 Penetration Testing FactsNumber of Exam Questions10 questionsTotal TimeAbout 36 minutes14.3: Network HardeningLecture Focus Questions:How does SecureDynamic differ from SecureSticky? How does DAI validate ARP packets on the network? What is the difference between enforcement and remediation servers? How does an A port violation occur? How can you resolve it? What does DHCP snooping do on your network? In this section, you will learn to:Configure port security. The key terms for this section include:TermDefinitionSecureConfigured AddressA MAC address that has been manually identified as an allowed address.SecureDynamic AddressA MAC address that has been dynamically learned and allowed by the switch. SecureDynamic addresses are only saved in the MAC address table in RAM and are not added to the configuration file.SecureSticky AddressA MAC address that is manually configured or dynamically learned and saved.Port ViolationA port violation occurs when the maximum number of MAC addresses has been seen on the port and an unknown MAC address is then work Access Protection(NAP)A collection of components that allow administrators to regulate network access and communication based on a computer's compliance with health requirement policies.NAP ClientA? client that has NAP-aware software, either through the operating system or through other components. Client software generates a Statement of Health (SoH) that reports the client configuration for health requirements.NAP ServerThe NAP server is responsible for keeping track of health requirements and verifying that clients meet those requirements before gaining access. A Windows server running the Network Protection Service role is a NAP server.Enforcement Server (ES)ES (also called an enforcement point) is the connection point for clients to the network. Clients connect to the ES, submitting the SoH for validation. The ES forwards the SoH to the NAP server for validation. When the response from the NAP server is received, the ES allows or denies network access.Remediation ServerRemediation servers are a set of resources that a non-compliant computer can access on the limited-access network. The purpose of a remediation server is to provide the resources necessary for non-compliant clients to become compliant. For example, remediation servers might hold operating system patches or antivirus definition files.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro4.3 Configure security for a pTIA Network+3.4 Given a scenario, use remote access methods.SSH HTTPS/management URL Remote file access FTP/FTPS SFTP TFTP 4.2 Explain authentication and access controls.Access control NAC Port security 4.5 Given a scenario, implement network device hardening.Disabling unnecessary services Disabling unused ports IP ports Device ports (physical and virtual) 4.6 Explain common mitigation techniques and their purposes.Device hardening Switch port protection Spanning tree Flood guard BPDU guard Root guard DHCP snooping ?Video/DemoTime14.3.1 Network Hardening Techniques12:0414.3.2 Switch Port Security8:3914.3.4 Configure Switch Port Security3:4814.3.6 Network Access Control6:5014.3.7 Configure NAC14:03Total Video Time45:24Lab/Activity14.3.5 Configure Port SecurityFact Sheets14.3.3 Switch Port Security Facts14.3.8 NAC FactsNumber of Exam Questions13 questionsTotal TimeAbout 81 minutes15.1: Update ManagementLecture Focus Questions:What is the difference between a hotfix and a service pack? What does flashing do to firmware? Where can you go to find updates for applications or drivers? What does Windows Update do? In this section, you will learn to:Configure an update server. The key terms for this section include:TermDefinitionUpgradingUpgrading is the process of replacing a product with a newer version of the same product. When you perform an upgrade, you generally replace hardware, software, or firmware with a newer or better version to bring the system up to date or to improve its characteristics.DowngradingDowngrading is the process of reverting software (or hardware) back to an older version; a downgrade is the opposite of an upgrade. HotfixA hotfix is an operating system patch that fixes bugs and other software vulnerabilities.Service Pack (SP)A service pack is a collection of hotfixes and other system enhancements.FlashingUpdating firmware by flashing (replacing or updating) the code stored on a ROM chip.RollbackRollback means to revert the system to the pre-update version. This is useful in cases when updates interfere with certain programs or you simply prefer the pre-update system.This section helps you prepare for the following certification exam objectives:ExamObjectiveCompTIA Network+3.3? Explain common scanning, monitoring and patching processes and summarize their expected outputs.Processes Patch management Rollback 4.5 Given a scenario, implement network device hardening.Upgrading firmware Patching and updates ??Video/DemoTime15.1.1 Update Deployment and Management7:3215.1.2 Configure an Update Server7:22Total Video Time14:54Fact Sheets15.1.3 Update Deployment and Management FactsNumber of Exam Questions4 questionsTotal TimeAbout 24 minutes15.2: Data ProtectionLecture Focus Questions:What is the difference between a data backup and a server backup? What permissions do you need to perform a backup? Which type of server backup is for recovering only critical volumes? In Windows 8.x, which application do you use to back up user account files? How does backing up your server to an internal disk differ from backing up to an external disk? In this section, you will learn to:Configure a data backup. Configure a server backup. The key terms for this section include:TermDefinitionFull BackupBacks up all data, both new data and old data that is already backed up.Incremental BackupOnly backs up data that has changed since the last full backup or the last incremental backup.Differential BackupOnly backs up data that has changed since the last full backup.System Image BackupA system image backup consists of an entire volume backed up to a .vhd file. It contains everything on the system, including the operating system, installed programs, drivers, and user data files.File BackupA file backup includes specified files and folders backed up to a compressed file. File backups do not include system files, program files, encrypted files (including EFS-encrypted files), files in the Recycle Bin, user profile settings, or temporary files.Hot SiteA hot site is a duplicate of your primary site that contains full computer systems and complete data backups.Warm SiteA warm site includes critical hardware and data.Cold SiteA cold site is an alternate location with power that may or may not include some hardware.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro3.5 Perform data and server backup and recovery pTIA Network+3.2 Compare and contrast business continuity and disaster recovery concepts. Recovery Cold sites Warm sites Hot sites Backups Full Differential Incremental Snapshots ?Video/DemoTime15.2.1 Data Backups9:4815.2.2 Protect Data4:5815.2.3 Recover Files from Backup4:04Total Video Time18:50Lab/Activity15.2.6 Configure a Data Backup15.2.7 Configure a Server BackupFact Sheets15.2.4 Workstation Backup Facts15.2.5 Server Backup FactsNumber of Exam Questions4 questionsTotal TimeAbout 57 minutes15.3: Remote ManagementLecture Focus Questions:What is the difference between Telnet and SSH? How does remote desktop software differ from terminal emulation software? How can you use a remote desktop solution for troubleshooting and technical support within your organization? How does a remote desktop protocol minimize the data sent between the client and server devices for a remote connection? What is device redirection? How does it add flexibility to remote desktop connections? What are the differences between hot, warm, and cold sites? In this section, you will learn to:Allow remote desktop connections. The key terms for this section include:TermDefinitionTerminal EmulationA terminal is a monitor and keyboard attached to a device (such as a mainframe, server, or router) through a serial or special console port. The terminal displays a text-based interface and users interact with the device by typing commands.Terminal Emulation UtilityA terminal emulation utility is a program that allows a console connection through the network. The terminal emulation software communicates with the device over the network and displays the text-based console screen. The two common terminal emulation programs used are Telnet and SSH.Remote DesktopA remote desktop utility displays the graphical user interface of a remote device. Remote desktop solutions are used to remotely manage a computer or allow support personnel to view and troubleshoot a remote user's system.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro3.3 Configure Remote Desktop to allow remote access to pTIA Network+3.4 Given a scenario, use remote access methods.VNC 3.5 Identify policies and best practices.Remote access policies ?Video/DemoTime15.3.1 Remote Management9:0715.3.2 Use Remote Desktop10:48Total Video Time19:55Lab/Activity15.3.3 Allow Remote Desktop ConnectionsFact Sheets15.3.4 Remote Management FactsNumber of Exam Questions4 questionsTotal TimeAbout 41 minutes15.4: Mobile Device ManagementLecture Focus Questions:What can you do to prevent malware from a mobile device from spreading? What can you use to remotely clear data on a mobile device? What should your acceptable use policy specify? In this section, you will learn to:Create a guest network for BYOD use. The key terms for this section include:TermDefinitionMobile DevicesMobile devices include smartphones, laptops, tablet PCs, PDAs, and other handheld computing devices.BYODMobile devices that users bring to work and use to complete daily work-related tasks are sometimes referred to as bring your own device (BYOD) devices.This section helps you prepare for the following certification exam objectives:ExamObjectiveCompTIA Network+3.5 Identify policies and best practices.On-boarding/off-boarding procedures BYOD ?Video/DemoTime15.4.1 Mobile Device Management10:2015.4.2 Enroll Mobile Devices4:5415.4.3 Configure Mobile Device Policies12:2015.4.4 Set Up a Guest Network for BYOD6:03Total Video Time33:37Lab/Activity15.4.5 Create a Guest Network for BYODFact Sheets15.4.6 Mobile Device Management FactsNumber of Exam Questions13 questionsTotal TimeAbout 64 minutes15.5: Data Center ManagementLecture Focus Questions:How does a brownout differ from a blackout? What are the best temperature and humidity ranges for electronic components? What is the difference between an SPS and a UPS? What is the air exchange rate for a server room? How should hot and cold aisles be set up for optimal air circulation? In this section, you will learn to:Configure UPS settings. The key terms for this section include:TermDefinitionSurge or SpikeA sudden rise in voltage.Sag or DipA sudden reduction in voltage for a short period of time (as long as a few seconds).BrownoutA reduction in voltage that lasts longer than a few seconds.BlackoutA complete power failure.FaultA momentary power outage.TransientA fluctuation caused by line noise or disturbance.Uninterruptible Power Supply(UPS)A device that constantly provides battery power to the computer and is recharged by the wall outlet. An online UPS constantly powers the computer from the battery. An offline UPS powers the computer from the wall outlet but switches to battery if the power fails.Standby Power Supply(SPS)An offline device that only switches on to provide power when an undervoltage occurs. If the switchover is not fast enough, the computer loses power and shuts down.This section helps you prepare for the following certification exam objectives:ExamObjectiveCompTIA Network+3.1 Given a scenario, use appropriate documentation and diagrams to manage the network.Labeling 3.2 Compare and contrast business continuity and disaster recovery concepts.Availability concepts Power management Battery backups/UPS Power generators Dual power supplies Redundant circuits ?Video/DemoTime15.5.1 Network Device Installation7:3815.5.2 Power Management11:3615.5.3 Configure UPS Settings10:2515.5.5 Environmental Monitoring7:10Total Video Time36:49Fact Sheets15.5.4 Power Management Facts15.5.6 Environmental Monitoring FactsNumber of Exam Questions13 questionsTotal TimeAbout 60 minutes15.6: MonitoringLecture Focus Questions:Why should you enable logging only for specific events? After you configure system logging, what else must you do to take advantage of logging's benefits? How does a load tester differ from a throughput tester? What must you do to configure a packet sniffer to be able to see all frames on a subnet? In this section, you will learn to:View Event Logs. Use a packet sniffer. Monitor utilization. Monitor Interface Statistics. The key terms for this section include:TermDefinitionLogA record of events that have occurred on a system. Logging capabilities are built into operating systems, services, and applications. Log entries are generated in response to changes in configuration, system state, or network conditions. Load TesterA tool that simulates a load on a server or service. For example, the load tester might simulate a large number of client connections to a website, test file downloads for an FTP site, or large volumes of email. Throughput TesterA device that measures the amount of data that can be transferred through a network or processed by a device (such as the amount of data that can be retrieved from a disk in a specific period of time). Packet SnifferSoftware that captures (records) frames that are transmitted on the network. Protocol AnalyzerA passive device that that captures transmitted frames and allows you to view the frame contents, but does not allow you to modify and retransmit frames.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro3.4 Use network tools to discover network devices and pTIA Network+3.3 Explain common scanning, monitoring and patching processes and summarize their expected outputs.Processes Packet/traffic analysis Metrics Error rate Utilization Packet drops Bandwidth/throughput 5.2 Given a scenario, use the appropriate tool.Software tools Packet sniffer Protocol analyzer Command line ?Video/DemoTime15.6.1 Network Monitoring7:1115.6.2 Protocol Analyzers2:3715.6.3 View Event Logs4:0315.6.4 Use a Packet Sniffer7:1415.6.5 Monitor Utilization8:1915.6.6 Monitor Interface Statistics5:07Total Video Time34:31Fact Sheets15.6.7 Network Monitoring FactsNumber of Exam Questions15 questionsTotal TimeAbout 55 minutes15.7: Log File ManagementLecture Focus Questions:When you enable logging for security level 4, what additional messages are received? What does the logging process do? What information is provided in the facility component of the log message? Which log messages are sent to the console by default for a Cisco device? In this section, you will learn to:Configure a Syslog server. The key terms for this section include:TermDefinitionTimestampThe timestamp indicates when the message was generated.MnemonicA mnemonic is a device, such as a pattern of letters, that assists you with remembering something.This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro3.4 Use network tools to discover network devices and pTIA Network+3.3 Explain common scanning, monitoring and patching processes and summarize their expected outputs.Processes Log reviewing ?Video/DemoTime15.7.1 Log File Management5:3315.7.2 Configure a Syslog Server3:19Total Video Time8:52Fact Sheets15.7.3 Log File Management FactsNumber of Exam Questions4 questionsTotal TimeAbout 18 minutes15.8: Network Management with SNMPLecture Focus Questions:What is the role of the MIB when using SNMP? What is a trap? How can you use a trap in network administration? How is the community name used with SNMP? Why doesn't the community name provide security for SNMP devices? In this section, you will learn to:Configure an SNMP system. The key terms for this section include:TermDefinitionSimple Network Management Protocol(SNMP)Simple Network Management Protocol (SNMP) is designed for managing complex networks. SNMP lets network hosts exchange configuration and status information. This information can be gathered by management software and used to monitor and manage the network and network events.ManagerA manager is the computer used to perform management tasks. The manager queries agents and gathers responses by sending messages.AgentAn agent is a software process that runs on managed network devices. The agent communicates information to the manager and can send dynamic messages to the manager.Management Information Base (MIB)The management information base (MIB) is a database of host configuration information. Agents report data to the MIB, and the manager can then view information by requesting data from the MIB.TrapA trap is an event configured on an agent. When the event occurs, the agent logs details regarding the event.GetA Get is a message sent from a management system that requests information about a specific OID.WalkA Walk uses GETNEXT messages to navigate the structure of an MIB.AlertAn alert can be configured so that when an event occurs (such as a trap), the network administrator receives an alert via email or SMS (text message).This section helps you prepare for the following certification exam objectives:ExamObjectiveTestOut Network Pro3.4 Use network tools to discover network devices and pTIA Network+3.3 Explain common scanning, monitoring and patching processes and summarize their expected outputs.Event management Notifications Alerts SNMP monitors MIB ?Video/DemoTime15.8.1 Network Management5:1215.8.2 Configure an SNMP System2:36Total Video Time7:48Fact Sheets15.8.3 SNMP FactsNumber of Exam Questions4 questionsTotal TimeAbout 17 minutes16.1: OptimizationLecture Focus Questions:Which feature would you use to configure a device with two connections to the same network? What is the purpose of spanning tree in a switched network? How does spanning tree compare to Ethernet bonding? Why doesn't spanning tree provide improved performance? How does a caching server improve network performance? When should quality of service (QoS) be a major concern on your network? What is the difference between a collision domain and a broadcast domain? Your network uses hubs as connection devices. What happens to the number of collisions on the network as you add devices? Which device provides guaranteed bandwidth between devices? Which device can you use to filter broadcast traffic? Your network uses switches as connection devices. All devices have a dedicated switch port. What happens to the number of collisions on the network as you add devices? In this section, you will learn to:Configure NIC teaming. The key terms for this section include:TermDefinitionNIC TeamingNIC Teaming (also called Ethernet bonding) logically groups two or more physical connections to the same network. Data is divided and sent on multiple interfaces, effectively increasing the speed at which the device can send and receive on the network.Spanning TreeA protocol on a switch that allows the switch to maintain multiple paths between switches within a subnet. The spanning tree protocol (STP) runs on each switch and is used to select a single path between any two switches.Load BalancingLoad balancing configures a group of servers in a logical group (called a server farm). Incoming requests to the group are distributed to individual members within the group. Incoming requests can be distributed evenly or unevenly between group members based on additional criteria, such as server capacity.Caching EngineThe process of saving previously acquired data for quick retrieval at a later time. Caching stores data in memory or on disk within a network device, where it can quickly be retrieved when needed.Quality of Service(QoS)QoS refers to a set of mechanisms that try to guarantee timely delivery or minimal delay of important or time-sensitive communications.Traffic ShaperA device that is capable of modifying the flow of data through a network in response to network traffic conditions.Multilayer Switch or Content SwitchA multilayer switch operates at?OSI model layers above Layer 2 and can use other information within a packet to make forwarding decisions.Demilitarized Zone(DMZ)A subnetwork that you place between your LAN and untrusted networks, such as the internet. External network nodes can only access what you choose to expose in the DMZ, and the rest of your network is protected by firewalls.Port Aggregation (PAgP)A Cisco protocol that lets you combine Ethernet ports to improve the speed of aggregated, or related, file transfers. This protocol is also called link aggregation, teaming ports, and pot trunking.Differentiated Services(Diffserv)A Layer 3 protocol QoS uses to classify IP packets. Each IP packet header has a DiffServ field. DiffServ inserts a differentiated services code point value, or DSCP value, in this filed to prioritize data flow. Routers forward packets according to the value in this field.Collision and Broadcast DomainsA collision domain identifies all of the devices that share the same network segment and have the potential to send colliding signals. A broadcast domain identifies all the devices that will see a broadcast frame that is sent on the network. The two work together to minimize mon Address Redundancy Protocol (CARP)A fault tolerance implementation that allows multiple firewalls and/or routers on the same local network to share a set of IP addresses. If one of the firewalls or routers fails, the shared IP address allows hosts to continue communicating with the firewall or router without interruption.Switch DependentSwitch dependent teaming requires that the adapters in a team are connected to the same switch.Switch IndependentSwitch independent teaming allows the adapters in a team to connect to different switches.This section helps you prepare for the following certification exam objectives:ExamObjectiveCompTIA Network+1.3 Explain the concepts and characteristics of routing and switching.Properties of network traffic Broadcast domains Collision domains Performance concepts Traffic shaping QoS Diffserv CoS 2.3 Explain the purposes and use cases for advanced networking devices.Load balancer 3.2 Compare and contrast business continuity and disaster recovery concepts.Availability concepts Fault tolerance High availability NIC teaming Port aggregation 4.6 Explain common mitigation techniques and their work segmentation DMZ VLAN ?Video/DemoTime16.1.1 Optimization7:5816.1.2 Network Segmentation10:1216.1.4 NIC Teaming Concepts4:4916.1.5 Set Up NIC Teaming3:32Total Video Time26:31Lab/Activity16.1.6 Configure NIC TeamingFact Sheets16.1.3 Optimization Facts16.1.7 NIC Teaming FactsNumber of Exam Questions15 questionsTotal TimeAbout 64 minutes16.2: Troubleshooting MethodologyLecture Focus Questions:Why is it important to follow a troubleshooting methodology? When faced with a problem, why shouldn't you start trying fixes immediately? What is escalation and when should it be performed? After the problem is fixed, what else must you do to finish troubleshooting? What is the difference between ping and traceroute? What Linux command is similar to ipconfig? When would you use nslookup or dig? This section helps you prepare for the following certification exam objectives:ExamObjectiveCompTIA Network+1.8 Explain the functions of network services.DHCP service TTL 5.1 Explain the network troubleshooting methodology.Identify the problem Gather information Duplicate the problem, if possible Question users Identify symptoms Determine if anything has changed Approach multiple problems individually Establish a theory of probable cause Question the obvious Consider multiple approaches Top-to-bottom/bottom-to-top OSI model Divide and conquer Test the theory to determine the cause Once the theory is confirmed, determine the next steps to resolve the problem If the theory is not confirmed, reestablish a new theory or escalate Establish a plan of action to resolve the problem and identify potential effects Implement the solution or escalate as necessary Verify full system functionality and, if applicable, implement preventive measures Document findings, actions, and outcomes 5.2 Given a scenario, use the appropriate tool.Software tools Command line ping tracert, traceroute nslookup pathping ?Video/DemoTime16.2.1 Troubleshooting Methodology6:0916.2.3 Troubleshooting Utilities9:29Total Video Time15:38Fact Sheets16.2.2 Troubleshooting Methodology Facts16.2.4 Troubleshooting Utility FactsNumber of Exam Questions10 questionsTotal TimeAbout 36 minutesPractice ExamsA.0: Network Pro Practice ExamsNetwork Pro Certification Practice Exam (12 questions)B.0: Network+ Practice ExamsNetwork+ Certification Practice Exam (90 questions)Appendix A: Approximate Time for the CourseThe total time for the LabSim for TestOut Network Pro course is approximately 56 hours and 54 minutes. Time is calculated by adding the approximate time for each section which is calculated using the following elements: Video/demo timesText Lessons (5 minutes assigned per text lesson)Simulations (12 minutes assigned per simulation)Questions (1 minute per question)Additionally, there are approximately another 33 hours and 11 minutes of Practice Test material at the end of the course.The breakdown for this course is as follows:ModuleSectionsTimeVideosLabsTextExams0.0: Introduction0.1: Network Pro Introduction440000.2: Use the Simulator35112400Total0:390:150:240:000:001.0: Networking Basics1.1: Networking Overview34250541.2: Network Topologies25805121.3: The OSI Model3915010141.4: Network Protocols422505121.5: Numbering Systems179053Total2:371:220:000:300:452.0: Cables and Connectors2.1: Twisted Pair361212572.2: Coaxial28512562.3: Fiber Optic371112592.4: Wiring Implementation68212410132.5: Troubleshoot Network Media582801515Total3:471:171:000:400:503.0: Networking Devices3.1: Network Adapters489245103.2: Network Devices5411245143.3: Internetwork Devices2971255Total2:110:271:000:150:294.0: Ethernet4.1: Ethernet1890544.2: Ethernet Specifications397125154.3: Connect Network Devices368125114.4: Troubleshoot Physical Connectivity9614601012Total3:090:381:240:250:425.0: IP Configuration5.1: IP Addressing89302420155.2: APIPA and Alternate Addressing28812535.3: DHCP Server Configuration911860585.4: DHCP Relay38624535.5: DNS Name Resolution952560555.6: IP Version 67636122085.7: Multicast1870565.8: Troubleshoot IP Configuration Issues822448555.9: Troubleshoot IP Communications73311215155.10: Troubleshoot Name Resolution38141257Total10:283:194:241:301:156.0: Switch Management6.1: Switch Access20120536.2: Switch IP Configuration36424536.3: Switch Interface Configuration4817121546.4: Virtual LANs59122410136.5: Trunking7219361076.6: Spanning Tree Protocol83223610156.7: Switch Troubleshooting2713059Total5:451:392:121:000:547.0: Routing7.1: Routing Basics22110567.2: Routing Protocols83362410137.3: Network Address Translation453005107.4: Routing Troubleshooting58202459Total3:281:370:480:250:388.0: Firewalls8.1: Firewalls65231215158.2: Security Appliances311112538.3: Firewall Design and Implementation874324515Total3:031:170:480:250:339.0: Network Customization9.1: Network-Based Storage7232241069.2: Voice over IP (VoIP)5412245139.3: Virtualization24150549.4: Virtual Networking361701099.5: Cloud Computing2313055Total3:291:290:480:350:3710.0: Wireless Networking10.1: Wireless Concepts3116010510.2: Wireless Standards4427051210.3: Wireless Configuration6620365510.4: Wireless Network Design712624101110.5: Wireless Network Implementation3716125410.6: Wireless Security693212101510.7: Wireless Troubleshooting812636514Total6:392:432:000:501:0611.0: Wide Area Networks (WANs)11.1: WAN Concepts56260151511.2: WAN Connections327125811.3: Internet Connectivity54221251511.4: Remote Access5233051411.5: WAN Troubleshooting3117059Total3:451:450:240:351:0112.0: Network Policies and Procedures12.1: Network Design, Documentation, and Policies58290151412.2: Risk Management3560151412.3: Security Policies482301015Total2:210:580:000:400:4313.0: Network Security13.1: Physical Security43111251513.2: Social Engineering49201251213.3: Network Vulnerabilities and Threats 163330151513.4: Network Vulnerabilities and Threats 251260151013.5: Authentication53280101513.6: Secure Protocols251305713.7: Remote Access Security58172451213.8: Troubleshoot Network Security Issues2616055Total6:082:440:481:051:3114.0: Network Hardening14.1: Detection and Prevention692024101514.2: Penetration Testing3621051014.3: Network Hardening8146121013Total3:061:270:360:250:3815.0: Network Management15.1: Update Management241505415.2: Data Protection57192410415.3: Remote Management4120125415.4: Mobile Device Management64341251315.5: Data Center Management60370101315.6: Monitoring5535051515.7: Log File Management18905415.8: Network Management with SNMP178054Total5:362:570:480:501:0116.0: Network Optimization16.1: Optimization642712101516.2: Troubleshooting Methodology361601010Total1:400:430:120:200:25Total Course Time 67:10Practice ExamsA.0: Network Pro Practice ExamsNumber of QuestionsTimeA.2: Network Pro Practice Exams - All Questions6112:12A.3: Network Pro Certification Practice Exam122:00Total7314:12B.0: Network+ Practice ExamsNumber of QuestionsTimeB.2: Network+ Practice Exams - 20 Random Questions1001:40B.3: Network+ Practice Exams - All Questions94915:49B.4: Network+ Certification Practice Exam901:30Total1,13918:59Total Practice Exam Time 33:11 ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download