Explain the role and function of network components
Describe characteristics of network topology architectures
Compare physical interface and cabling types
Identify interface and cable issues (collisions, errors, mismatch duplex, and/or speed)
Compare TCP to UDP
Configure and verify IPv4 addressing and subnetting, Describe the need for private IPv4 addressing
Configure and verify IPv6 addressing and prefix, Compare IPv6 address types
Describe switching concepts
Configure and verify VLANs (normal range) spanning multiple switches
Configure and verify Interswitch connectivity
Configure and verify Layer 2 discovery protocols (CDP and LLDP)
Configure and verify (Layer 2/Layer 3) EtherChannel (LACP)
Describe the need for and basic operations of Rapid PVST+ Spanning Tree Protocol and identify basic operations
Interpret the components of routing table
Determine how a router makes a forwarding decision by default
Configure and verify IPv4 and IPv6 static routing
Configure and verify single area OSPFv2
Describe the purpose of first hop redundancy protocol
Configure and verify inside source NAT using static, pools and PAT
Configure and verify NTP operating in a client and server mode
Explain the role of DHCP and DNS within the network
Configure and verify DHCP client and relay
Explain the function of SNMP in network operations
Describe the use of syslog features including facilities and levels
Configure network devices for remote access using SSH and Telnet
Describe the capabilities and function of TFTP/FTP in the network
Define key security concepts (threats, vulnerabilities, exploits, and mitigation techniques)
Describe security program elements (user awareness, training, and physical access control)
Configure device access control using local passwords
Describe security password policies elements, such as management, complexity, and password alternatives (multifactor authentication, certificates, and biometrics)
Configure and verify Access Control Lists (ACL)
Describe remote access and site-to-site VPNs
Configure Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port security)
Differentiate authentication, authorization, and accounting concepts
Student feedback
4.9
Course rating
Reviews
Thejashree Chan
Khairul
Arontm