Certified Basic Network Support Professional Course Outline


Course Outline
 

 

1. Introduction to Networking Concepts

  • What is Networking: Explains the concept of networking and how devices connect to share data.
  • Advantages & Disadvantages: Discusses the benefits and limitations of networking systems.
  • Network Characteristics: Explains features like scalability, reliability, and efficiency in networks.
  • Network Models (Peer-to-Peer and Client-and-Server): Details the different network models and how they operate.
  • Network Types (LAN, WAN, MAN, PAN): Covers various network types, including Local, Wide, Metropolitan, and Personal Area Networks.
  • Network Topologies (Bus, Star, Ring): Describes different physical and logical network layouts.
  • Internet connection (DSL, Cable, Serial Link): Explains the types of internet connections available for networks.
  • Network Media: Discusses the various media used for data transmission in networking, including copper and fiber-optic cables.

2. Networking Models

  • History: Provides a historical overview of networking model development.
  • Layered Network Model: Describes the importance of a layered approach in networking, including OSI and TCP/IP models.
  • Layering Concepts and Benefits: Explains the reasons for using a layered approach in network architecture.
  • TCP/IP Protocol Architecture: Details the TCP/IP model and how it standardizes communication across the internet.
  • RFC (Request For Comments): Discusses the role of RFCs in setting networking protocols.
  • Application, Transport, Internet, and Network Access Layer: Breaks down the layers and functions within the TCP/IP stack.
  • Devices at Different Layers: Describes the devices used at each layer in the networking model.
  • Data Encapsulation: Explains how data is wrapped into packets for transmission.
  • The OSI Reference Model: An introduction to the OSI model and its seven layers.
  • OSI Layers and Their Functions: Describes the function of each of the OSI seven layers.
  • Comparing OSI and TCP/IP: A comparison of the OSI and TCP/IP models for network communication.

3. LAN (Local Area Network)
  • Ethernet History: Explains the evolution of Ethernet as a networking standard.
  • Ethernet Types (10/100/1000 Base T, TX, SX/LX): Describes the various Ethernet standards and their transmission speeds.
  • 10BASE2 and 10BASE5: Covers the legacy Ethernet standards and their applications.
  • Repeaters: Explains the role of repeaters in extending network distances.
  • 10BASE-T with Hubs: Discusses Ethernet networking with hubs.
  • UTP Cabling, UTP Cables, and RJ-45 Connectors: Details UTP cabling and connectors used in networking.
  • UTP Cabling Pin-outs: Explains how cables are wired with specific pinouts.
  • CSMA/CD: Describes the protocol used for managing network traffic.
  • Using Switches and Their Advantages: Explains the role of switches and their advantages over hubs.
  • Ethernet Data-Link Protocols and Frame: Details the protocols and Ethernet frame structure.
  • Wiring Ethernet Cables: Discusses the proper technique for wiring Ethernet cables.
  • Ethernet Addressing, Framing, and Error Detection: Covers Ethernet addressing and error detection in transmission.
  • LAN Types (Ethernet, Token Ring, FDDI): Compares different LAN technologies and their use cases.

4. WAN (Wide Area Network)

  • WAN Basics (DCE, DTE, CSU/DSU, CPE, Demarc, DS0): Introduces the components and terminology of WAN technologies.
  • WAN Technologies (Leased Lines, Circuit & Packet Switching, Cell Relay): Describes the various technologies used in WANs for data transmission.
  • HDLC (High-Level Data Link Control): Explains this protocol used in WAN communication.
  • PPP (Point-to-Point Protocol): Details PPP, a method of data transmission over WANs.
  • Frame Relay: Explains the frame relay technology used for WAN connections.
  • ATM (Asynchronous Transfer Mode): Describes ATM and its application in high-speed networks.
  • WAN Cabling Standards: Discusses the cabling used for WAN connections.
  • Clock Rates, Synchronization, DCE, and DTE: Explains synchronization and the devices involved in WAN setup.
  • OSI Layer for Point-to-Point WANs: Describes the layer used for point-to-point connections in WANs.

5. Internet Protocol

  • Network Layer Functions: Explains the functions of the network layer in handling IP routing and data forwarding.
  • IP Packets: Describes how data is packaged into IP packets for transmission.
  • IP Routing: Discusses how routers direct IP packets through a network.
  • Routing Protocols: Introduces the protocols used for routing IP packets (e.g., OSPF, RIP).
  • IP Addressing: Details the structure and use of IP addresses.
  • A, B, and C Classes of Networks: Describes different classes of IP addresses for network segmentation.
  • IP Subnetting: Explains how IP subnetting works to divide a network into smaller segments.
  • Host & Router Routing: Describes the routing processes at host and router levels.
  • ARP, DNS, DHCP & Ping: Details the key protocols for IP address resolution, domain name services, dynamic IP allocation, and network diagnostics.

6. TCP/IP Transport Layer

  • Transport Layer Protocols: TCP and UDP: Describes the two key protocols of the transport layer: TCP and UDP.
  • Transmission Control Protocol: Explains how TCP ensures reliable data transfer.
  • Ports & Their Multiplexing: Details the use of ports to multiplex connections in the transport layer.
  • TCP Error Recovery, Flow Control and Data Segmentation: Discusses how TCP handles errors, manages flow control, and segments data.
  • TCP Connection Establish and Terminate: Describes how TCP establishes and terminates connections.
  • UDP (User Datagram Protocol): Explains the role of UDP for fast, connectionless communication.

7. Applications

  • TCP/IP Applications, QoS Needs, and Impact: Discusses the applications relying on TCP/IP and the need for Quality of Service (QoS).
  • The World Wide Web: Introduces the role of the web in internet applications.
  • HTTP (Hyper Text Transfer Protocol), HTTPS & SSL: Details the protocols used in web browsing and secure transactions.
  • Universal Resource Locators: Explains how URLs identify web resources.
  • FTP (File Transfer Protocol), Secured FTP: Discusses FTP for file transfer and its secure variants.
  • SMTP, POP3 & IMAP: Explains email protocols for sending and receiving messages.
  • Telnet: Describes the use of Telnet for remote access to devices.

8. Network Security

  • Sources and Types of Threats: Identifies the various network security threats and their sources.
  • Firewalls: Discusses the role of firewalls in network security.
  • Intrusion Detection and Prevention: Describes systems that detect and prevent unauthorized network access.
  • Virtual Private Networks (VPN): Explains the concept and benefits of VPNs for secure connections.
  • (Continued in the next message for the rest)

9. LAN Switching

  • Ethernet LAN Media and Cable Lengths: Discusses the types of media (such as copper or fiber) and the supported cable lengths in Ethernet LANs.
  • Hubs, Bridges, and Switches: Describes the differences between hubs, bridges, and switches and their role in network traffic management.
  • Forward and Filter Decision Switching: Explains how switches make forwarding decisions and filter unnecessary data.
  • Learning MAC Addresses & Frames Flooding: Details how switches learn MAC addresses and handle frame flooding when they don't know the destination address.
  • Spanning Tree Protocol: Introduces the Spanning Tree Protocol (STP), which prevents loops in Ethernet networks.
  • Collision Domains and Broadcast Domains: Explains the concepts of collision and broadcast domains, and how switches segment them.
  • Virtual LANs (VLAN): Describes the benefits and configuration of VLANs, which logically segment a LAN.

10. LAN Switches

  • Switches and LED Switch Status: Describes the function of LEDs on switches and how they indicate the status of the network.
  • Accessing the CLI & Password Security: Explains how to access a switch via CLI and implement basic password security.
  • User and Enable Modes: Describes the two primary operational modes for a Cisco switch: user mode and enable mode.
  • The debug and show Commands: Details the use of debug and show commands for troubleshooting and monitoring switch behavior.
  • Configuration Sub-modes and Contexts: Explains the different configuration sub-modes available when configuring a Cisco switch.
  • Storing, Copying and Erasing Switch Configuration Files: Discusses how to manage switch configuration files, including storing, copying, and erasing.
  • Initial Configuration: Covers the steps for configuring a switch for the first time.

11. Ethernet Switch Configuration

  • Securing CLI: Discusses methods to secure the CLI by setting strong passwords and restricting access.
  • Console and vty Settings: Describes how to configure the console and virtual terminal (vty) settings for remote access.
  • Logging synchronous and exec-timeout Commands: Explains how to configure logging and session timeout for managing switch access.
  • IP Address & Interfaces Configuring: Describes how to assign IP addresses and configure interfaces on a switch.
  • Port Security: Details the concept of port security and how to configure it to prevent unauthorized access.
  • VLAN Configuration: Explains how to create and manage VLANs on a switch.
  • Securing Unused Interfaces: Discusses how to secure unused interfaces to prevent unauthorized access.

12. Switch Troubleshooting

  • Cisco Discovery Protocol: Describes the use of the Cisco Discovery Protocol (CDP) to discover devices on a network.
  • Layer and Interface Status: Discusses how to check the status of layers and interfaces to diagnose network issues.
  • Interface Speed and Duplex Issues: Explains how mismatched speeds or duplex settings on interfaces can cause network problems.
  • Analyzing the Forwarding Path: Details how to analyze the path a frame takes through the switch to troubleshoot forwarding issues.
  • Port Security and Filtering: Covers troubleshooting port security and filtering issues to prevent unauthorized access.

13. Wireless LANs

  • Wireless LAN Basics: Provides an overview of wireless LANs and their components.
  • Wireless LAN Standards & Modes: Discusses the IEEE standards (802.11) and different modes of operation in wireless LANs.
  • Wireless Encoding and Nonoverlapping DSSS Channels: Explains encoding techniques and the use of non-overlapping channels to avoid interference.
  • Wireless Interference, Coverage Area, Speed, and Capacity: Discusses factors affecting wireless performance, such as interference, coverage, and speed.
  • Wireless Media Access (Layer 2): Describes the layer 2 access methods used in wireless networks.
  • Wireless LAN Security (WEP, WPA, IEEE 802.11i, WPA-2 SSID Cloaking and MAC Filtering): Explains the various security protocols for wireless networks.

14. Operating Routers

  • Installing Routers & Router Interfaces: Describes the installation of routers and the configuration of their interfaces.
  • Router CLI & Difference with the Switch CLI: Explains how the router CLI differs from the switch CLI and how to navigate it.
  • Interface Status Codes and IP Addresses: Discusses how to check interface status and assign IP addresses on routers.
  • Bandwidth and Clock Rate on Serial Interfaces: Explains how to configure bandwidth and clock rates on serial links.
  • Router Auxiliary (Aux) Port: Details the use of the router's auxiliary port for management.
  • Setup Mode, Upgrading, and Boot Process of the IOS: Discusses the initial configuration process and the router boot sequence.
  • Configuring the Configuration Register and the Show Version Command: Explains how to configure the router's configuration register and use the show version command.

15. Routing Protocol Concepts and Configuration

  • Connected and Static Routes: Introduces connected and static routes and how they are configured.
  • Default Routes and Their Configuration: Discusses default routes and how to configure them for traffic routing.
  • Routing Protocol (IGP & EGP) & Algorithms: Explains interior and exterior gateway protocols (IGP, EGP) and their routing algorithms.
  • Autosummarization and Manual Summarization, Classless and Classful Routing Protocols, and Convergence: Details the process of summarizing routes in routing protocols.
  • Basic Concepts, Configuring, and Verifying RIP-2: Introduces RIP-2 and explains its configuration and verification.
  • Different Metrics Used and the Show IP Route Command: Describes the metrics used in routing protocols and how to view routing information.
  • Administrative Distance: Explains the concept of administrative distance in routing protocols.
  • Debug Command and RIP: Details the use of the debug command for troubleshooting RIP.

16. Troubleshooting IP Routing

  • IP Addressing Issues: Discusses common IP addressing issues and troubleshooting techniques.
  • Host Networking Commands of Telnet, Tracert, Ipconfig, Arp, Netstat, and Nslookup: Explains the usage of these networking commands for troubleshooting.


Apply for Certification

https://www.vskills.in/certification/Certified-Basic-Network-Support-Professional

 For Support