• Course
  • Vendor

A strong foundation of basic networking concepts is fundamental to a successful career in information technology, and in our popular Understanding Networking Fundamentals course, you'll gain those real-world, practical skills.

  • Course Start Date: 2019-03-18
  • Time: 08:30:00 - 16:30:00
  • Duration: 5 days 08:30 AM - 04:30 PM
  • Location: Virtual
  • Delivery Methods(s): Virtual Instructor Led

Course Outline

Pre-Requisites

Introduction to Information Technology (CompTIA Strata IT Fundamentals)

Lessons

A strong foundation of basic networking concepts is fundamental to a successful career in information technology, and in our popular Understanding Networking Fundamentals course, you'll gain those real-world, practical skills.

In this broad-based foundational course, you'll move step-by-step through the basics of data networking, practicing with leading-edge technologies from Cisco, Juniper, ADTRAN, HP, Dell, and Microsoft.

With a strong foundation and an understanding of basic network functions, standards, and protocols, you will be prepared to tackle advanced networking skills including TCP/IP, security, wireless integration, and Voice over IP.

What You'll Learn
  • How switches and routers interconnect using equipment from multiple vendors
  • IP addressing and how to create subnets
  • How TCP/IP works and how to configure it on various devices
  • Capture and view network traffic using a protocol analyzer
  • Wireless network options available
  • Basic security and firewall issues
  • How Ethernet works and how all of the various forms can be connected
  • Basics of layered network protocols
  • Difference between logical and physical network segments
  • Install Cat 5e UTP and fiber optic cables
  • How VLANs function
  • When and how to use NAT
  • Function of various routing protocols such as RIP, EIGRP, and OSPF
  • An overview of WAN technologies
  • Functions of NetBIOS and NetBEUI
  • Benefits and issues of Instant Communications
Who Needs to Attend

Technical professionals responsible for voice/data integration, network administrators, applications developers, help desk staff, IT managers, and IT project managers.

Follow-On Courses
  • TCP/IP Networking
Course Outline
1. Network Overview
  • Defining a Network
    • Reasons to Use a Network
  • Network Components
    • End Devices
    • Operating Systems
    • Network Infrastructure
    • Network Types
    • Network Services
2. Network Functions and Standards
  • Generic Network Functions
  • Standards Organizations
    • Institute of Electrical and Electronics Engineers (IEEE)
    • Common WAN Serial Interface Standards
  • Internet Organizations
    • Internet Standards Process
  • OSI Model Overview
    • Layer 1: Physical Layer
    • Layer 2: Data Link Layer
    • Layer 3: Network Layer
    • Layer 4: Transport Layer
    • Layer 5: Session Layer
    • Layer 6: Presentation Layer
    • Layer 7: Application Layer
  • TCP/IP Model
3. Local Signaling Media
  • Serial Cabling Specifications
    • Media Interface Specifications
    • DCE and DTE Specifications
  • Twisted-Pair Cabling Specifications
    • Cable Runs
    • Unshielded Twisted Pair Cabling
    • Half-Duplex and Full-Duplex Operation
    • Seven Keys to Successful UTP Wiring
  • Fiber Optic Cabling Systems
    • Fiber Optic Cabling Types
  • Wireless Networking Systems
    • Wireless Network Preparation
    • Cellular Modem
4. Ethernet
  • Ethernet Overview
    • Network Interface Cards
    • Ethernet Addressing
  • Ethernet Standards
    • 10 Mbps Ethernet Connectivity Options
    • 100 Mbps Ethernet Connectivity Options
    • Gigabit Ethernet Overview
    • 10 Gigabit Ethernet Connectivity Options
    • 40 Gigabits and 100 Gigabits
  • Ethernet Version II Frame Structure
    • Ethernet Type Field
    • IEEE 802.3 with 802.2 Frame Format
    • Captured Frame Displayed by a Protocol Analyzer
  • Ethernet Equipment Overview
    • Ethernet Ports and Connectors
    • Ethernet Switches
    • Routers
    • Integrating 10, 100, and 1,000 Mbps and 10 Gbps Ethernet
  • Ethernet Performance Issues
5. Switching
  • Switching Overview
    • Current Switch Installations
  • Switch Operation Overview
    • The Learning Process
    • The Flooding Process Part1
    • The Forwarding and Filtering Process
    • The Flooding Process Part 2
    • Switch Loop Problems
  • Switch Configuration
    • Port Security
  • Spanning Tree Algorithm Overview
    • STA Root Switch Election
    • STA Path Selection
    • Spanning Tree Timers
    • STA Self-Healing Ability
  • VLAN Overview
    • VLAN Configuration
    • VLAN Operation
    • VLANs on Multiple Switches
  • Switch Troubleshooting
6. Logical Addressing
  • Logical Address Overview
  • Binary Numbering
    • Converting Binary to Decimal
    • Converting Decimal to Binary
    • Conversion Practice
  • Dotted Decimal Notation
  • Logical Address Types
  • Class-Based Addressing
    • Network-Specific Addresses
  • Reserved Addresses
  • Private Addresses
  • Network Masking
  • Classless Addressing
7. Address Resolution Protocol (ARP)
  • Address Resolution Overview
  • ARP Process
    • ARP Messages
  • ARP Cache
    • Duplicate MAC Addresses
  • Gratuitous ARP
  • Proxy ARP
  • ARP Restrictions
    • ARP Command
8. Network Layer Process
  • Logical Addressing
    • Network Loop Handling
    • Routing Decision-Making
    • Path Control
    • Multicast Management
  • Communication Flexibility
    • Multiplexing
    • Data Length Management
  • Quality of Service
    • Data Receipt Verification
  • Diagnostics
    • Logical Error Review
9. Subnetting
  • Subnetting Overview
    • Communication Between Hosts
    • IP Address and Mask
  • Subnetting Basics
    • Subnet Rules
    • Subnetting Decisions
    • Four Key Addresses
  • Case Study
    • Onageristic Analysis Inc.
    • Masking for Subnets
    • Masking for Interfaces
    • Headquarters Addressing
    • East Addressing
    • West Addressing
    • WWAN Addressing
10. Routing
  • Routing Overview
    • Logical Segmentation
  • Static Links vs. Dynamic Routing
  • Router Configuration Overview
    • Routing Protocols
    • Routing Metrics
    • Routing Decisions
  • Routing Protocol Operation
    • Routing Information Protocol
    • RIP Routing Tables
    • Open Shortest Path First (OSPF)
    • Enhanced Interior Gateway Routing Protocol (EIGRP)
    • Border Gateway Protocol (BGP)
11. WAN Overview
  • WAN Overview
    • Telecommunications Infrastructure
    • Connection Types: PVC and SVC
    • WAN Technologies
  • WAN Circuit-Switching
    • Wide Area Transmission Rates
    • SONET
    • Leased Lines
  • WAN Packet-Switching
    • Packet-Switching Networks
    • Metro/Carrier Ethernet
    • X.25 Overview
    • Frame Relay Overview
12. Host-to-Host Handling
  • Process Identification
    • Application Port Numbering
    • Temporary Ports
    • Port Address Translation
  • Connectionless Function
    • Connectionless Support
  • Connection-Based Functions
    • Connection Handshake
    • Connection Shutdown
13. Supporting Processes
  • Dynamic Host Configuration Protocol
    • Four-Step IP Addressing Process
  • Domain Name System
    • Internet Naming Hierarchy
    • Top-Level Domains
    • Country Domains
    • Dynamic DNS
  • ICMP Overview
    • The ping Command
    • Variation Reports
14. NetBIOS and NetBEUI
  • A Historical Perspective
    • What is NetBIOS?
    • NetBIOS Services
    • NetBIOS vs. NetBEUI
    • NetBIOS over TCP/IP
  • Server Message Block
    • SMB Security
  • NetBIOS Limitations
    • The net Commands
    • The nbtstat Command
15. Security
  • Network Security Overview
    • Network Security Assessment
    • Attack Types
    • Hackers and Attackers
    • Authentication
    • Enciphering
    • Intrusion Detection Systems
  • Content Filtering
    • Firewalls
    • Personal Firewalls
    • Packet Filters
    • Proxy Servers
    • Stateful Inspection Firewalls
  • Security Levels
    • Single-Layer Protection
    • Double-Layer Protection
    • Triple-Layer Protection
  • Virtual Private Networks (VPNs)
  • Develop a Security Plan
    • Vulnerability Assessment
16. User and Manager Processes
  • User and Manager Processes Overview
  • Terminal Emulation
  • File Transfer
    • Connection-Based File Transfer
    • Connectionless File Transfer
  • E-Mail
    • Sending E-Mail
    • Retrieving E-Mail
  • Web Browsing
    • Uniform Resource Locator
  • Network Management
17. Wireless LANs
  • Wireless LAN Overview
    • Wireless LAN Components
    • Wireless Design Issues
  • Wireless LAN Standards
    • IEEE 802.11b
    • IEEE 802.11a
    • IEEE 802.11g
    • IEEE 802.11n
    • Wi-Fi Alliance
  • Wireless Security
    • Basic Security Steps
    • Wired Equivalent Privacy
    • Wi-Fi Protected Access
    • Wi-Fi Protected Access 2
  • Standard Optional Solutions
    • Cellular Wi-Fi Router
18. Instant Communications
  • Instant Messaging Overview
    • Integrated Communications
    • Presence Awareness
    • Security Issues
  • Sarbanes-Oxley (SOX) Act
  • Standards
    • SIMPLE
    • XMPP
  • Short Message Service
    • SMS Center
  • Enhanced Messaging Service
  • Multimedia Messaging Service
  • Potential Future
19. Networking Advances
  • Internet Protocol Version 6 (IPv6)
    • IPv6 Addressing
    • Internet2
  • What is Unified Communications?
    • UC Components
    • Unified Messaging
    • Presence
    • Web Conferencing
    • Voice over Internet Protocol (VoIP)
  • Voice over IP
    • Uses for VoIP
    • Why VoIP Instead of Traditional Voice?
  • IPTV
    • Streaming
    • Protocol Decisions
Labs
Lab 1: Network Equipment
  • Identifying the Equipment
  • Identifying the Cabling in the Classroom
  • Identifying the Lab Configurations
Lab 2: Simple Networking with Ethernet
  • Configuring your PC
  • Cables Might Matter
  • Connecting to the Hub
  • Using netstat
Lab 3: Elementary Protocol Analysis
  • The Protocol Analyzer
  • Traffic Flow in a Hub Network
  • Error Messages
Lab 4: Exploring Layer 2 Switching
  • Using a Single Workgroup Switch
  • Using Switches to Isolate Traffic Among Ports
  • Viewing the Switch Forwarding Table
  • Using Multiple Switches
  • Controlling Traffic with the Spanning Tree Protocol
  • Viewing Forwarding Tables from Other Vendors
Lab 5: Logical Addressing
  • Identifying Classes of Addresses
  • Identifying Public and Private Addresses
  • Identifying Properly Formatted Masks
  • Identifying Masks and Prefixes
  • IP Network Address Selection
  • Labeling an IP Network with Correct Addresses
Lab 6: Address Resolution Protocol (ARP) Processing
  • View the ARP Cache
  • Verify the ARP Cache Entries for the Classroom
  • View an ARP Exchange Using the Protocol Analyzer
Lab 7: Subnetting
  • Selecting Masks for Various Problems
  • Creating a Subnet Plan
  • Labeling the Network Diagram
Lab 8: Routing
  • Add Routers to the Networks
  • Convert Your Workstation to DHCP for Address Assignment
  • Workgroup 1 Router Information
  • Workgroup 2 Router Information
  • Configurations
Lab 9: IP Header Analysis
  • IP Header Information
Lab 10: TCP Operation
  • Viewing a TCP Session
  • Locating and Documenting the Three-Step Startup Process
  • Locating and Documenting the Application Login Process
  • Locating and Documenting the Logout Process
  • Locating and Documenting TCP Session Termination
Lab 11: DHCP Operation and Analysis
  • Viewing the Result of DHCP Failure
  • Viewing Your DHCP Configuration
  • View a UDP Header
  • View the Four-Step DHCP Process
Lab 12: DNS
  • Querying a DNS Server with nslookup
  • Viewing a DNS Request
  • Viewing a DNS Response
Lab 13: ICMP
  • Examining an Echo Request/Echo Response Message Pair
  • Examining a Network Unreachable Message
Lab 14: Network Security
  • Implementing the Windows XP Firewall Function
  • Testing the Windows XP Firewall Function
  • Viewing the Configuration of the Firewall Implementation in the Network
  • Testing the Network Firewall Function
Lab 15: User Processes
  • Viewing an SMTP Session
  • Viewing a POP3 Session
Lab 16: Wireless Networking
  • Setting Up a Wireless Connection
  • Verifying Your New IP Address
  • Determining Your Wireless Connectivity
Lab 17: Instant Messaging
  • o Instant Messaging
Lab 18: Leading Edge Processes
  • Preparing for Voice over IP
  • Placing a Call
  • Watching the Call Process

Cancellation Policy

We require 16 calendar days notice to reschedule or cancel any registration. Failure to provide the required notification will result in 100% charge of the course. If a student does not attend a scheduled course without prior notification it will result in full forfeiture of the funds and no reschedule will be allowed. Within the required notification period, only student substitutions will be permitted. Reschedules are permitted at anytime with 16 or more calendar days notice. Enrollments must be rescheduled within six months of the cancel date or funds on account will be forfeited.

Training Location

Online Classroom
your office

your city, your province
your country   

About Global Knowledge

x

Global Knowledge is the world's leading learning services and professional development solutions provider. We deliver learning solutions to support customers as they adapt to key business transformations and technological advancements that drive the way that organizations around the world differentiate themselves and thrive. Our learning programs, whether designed for a global organization or an individual professional, help businesses close skills gaps and foster an environment of continuous talent development.

Training Provider Rating

This vendor has an overall average rating of 4.38 out of 5 based on 421 reviews.

No comment
No comment
No comment
No comment
No comment
No comment
No comment
No comment
No comment
Wasn’t as advanced as I thought it would be. There was an issue when the day my course was the first time they used a new platfo ... Read more
x

Wasn’t as advanced as I thought it would be. There was an issue when the day my course was the first time they used a new platform.. from adobe to something called zoom; I had to call support line cause it stated our instructor wasn’t present. Thankfully I called cause everyone online was in the adobe virtual classroom waiting for what looked like a teacher who didn’t show up for class (IT didn’t get anything resolved until 10mins after start time). I felt like he was really getting hung up on very basic knowledge for the first half of the course (talking about how to create tabs and drag formulas as an example). I completed files a few times before he was done explaining. There was a scheduled fire drill for them (roughly 30mins)that also cut into our time, which wasn’t deducted from the hour lunch break or the two, fifteen min breaks. I also really wish he touched base more on the automating workbook functions portion which we barely did. I'm happy there were/are those study guides (learning videos) and exams to take on my own time that I hope after I've had the class are still available for me to learn from.

No comment
No comment
No comment
No comment
It was difficult to practice on my PC while trying to watch the presentation online.
No comment
David was excellent!! I am very for having this course!!
No comment
Everything was great, but the instructor wasted a lot of time talking about unrelated subjects (like demo-ing different programs, ... Read more
x

Everything was great, but the instructor wasted a lot of time talking about unrelated subjects (like demo-ing different programs, talking about other classes, and talks about how Excel/technology has changed) took up way too much time. The course could have been condensed or better focus would have been great

Did not actually receive the course materials yet (and the course has concluded). Ratings assume that I will receive the course m ... Read more
x

Did not actually receive the course materials yet (and the course has concluded). Ratings assume that I will receive the course materials as soon as possible.

Course Reviews

No Reviews Yet