62 West Harbour
Granton
Edinburgh EH5 1PW
Troubleshoot WAN Issues
- Common WAN Issues
Troubleshoot Security Issues
- Security Configuration Issues
- Other Security Issues
Troubleshoot Network Issues
- Physical Layer Issues
- Data Link Layer Issues
- Network Layer Issues
Troubleshoot Copper and Fiber Cabling Issues
- Common Copper Cable Issues
- Common Fiber Cable Issues
Troubleshoot Wireless Issues
- Wireless Transmission Issues
- Wireless Configuration Issues
Troubleshooting Tools
- Command-Line Tools
- The ipconfig Command
- The tracert Command
- The ping Command
- Windows pathping Command
- The arp Command
- The netstat Command
- The nbtstat Command
- The nslookup Command
- The Cisco show mac-address-table Command
- Hardware and Software Tools
Troubleshooting Methodology
- Identify the Problem
- Establish a Theory
- Test the Theory
- Establish a Plan of Action
- Implement the Solution or Escalate
- Verify the Solution and Implement Preventative Measures
- Document Findings, Actions, and Outcomes
Implement Ports and Protocols
- Transport Protocols: TCP and UDP
- TCP and UDP Headers
- Error Recovery
- Flow Control
- Connection Establishment and Termination
- UDP
- Port Numbers
Best Practices and Change Management
- Best Practices
- Change Management
Implement Policies, Procedures, and Safety Practices
- Policies and Procedures
- Safety Policies
Wired and Wireless Standards
- Ethernet Standards
- Wired Standards
- TIA/EIA 568A and 568B Standards
- Wireless Standards
Network Theory
- The TCP/IP Application Layer
- The TCP/IP Transport Layer
- The TCP/IP Internet Layer
- The TCP/IP Network Access Layer
- Collisions
- Transmission Techniques
- End-to-End Communication
- Numbering Systems
Network Models
- The OSI and TCP/IP Models
- OSI Layers
- TCP/IP Layers and Protocols
- Data Flow Through the Layers
Physical Security, Firewalls, Access Control, and Forensics
- Physical Security
- Firewalls
- Firewall Placement and Configuration
- Access Control Models
- Forensic Concepts
Hardening Devices
- Anti-malware Software
- Device Hardening
- Disable Unused Network Services
- Use Secure Protocols
- Configure Switch Port Security
- User Authentication
- Data Integrity and Hashing
- Wireless Security
Risks, Threats, and Vulnerabilities
- Denial of Service
- Distributed DoS
- Reflected and Amplified Attacks
- Other Attack and Threat Terminology
- Wireless Attacks
- Vulnerabilities
- Risk Management
WLAN Implementation
- WLAN Features
- Frequencies
- Transmission Methods
- Channels
- Antennas
- WLAN Topologies
- WLAN Devices
- Wireless Routers
- Wireless Access Points
- Wireless LAN Controllers
- Wireless Bridge
- Wireless Installation
- Channels and Frequency Bands
- Wireless Site Surveys
- Wireless Router Configuration
STP, VLANs, Trunking, and VTP
- STP and RSTP Concepts and Operation
- STP Algorithm
- STP Convergence
- Port Costs
- RSTP Operation
- RSTP Port Roles
- VLAN Concepts
- Reasons for and Benefit of Using VLANs
- Types of VLANs
- Trunking VLANs
- VTP Concepts
- VTP Modes
- VTP Operation
- VTP Pruning
Switch Configuration
- Evolution to Switching
- From Bridges to Switches
- Switch Types
- Switching Logic
- Basic Switch Configuration
- AAA Configuration
- Link Aggregation Configuration
- LACP Modes
- Configuring EtherChannel
- Port Mirroring Configuration
Network: Network Segmentation, Patches, and Updates
- Network Segmentation
- Patches and Updates
Network Monitoring and Metrics
- Types of Metrics
- SNMP
- SNMP Message Types
- SNMP Versions
- The Management Information Base
- Syslog
- Syslog Operation
- Severity Levels
- Syslog Message Format
- Port Scanners
- Packet Sniffers
- Packet Flow Monitors (NetFlow)
Network Design and Documentation
- Network Design
- Sample Design Approach
- Design Considerations for Layers 1, 2, and 3
- Wireless Design Considerations
- Documentation
- IP Addressing Scheme
- Network Diagrams
- Baselines
- Asset Management
- Policies and Procedures
Unified Communications, Virtualization, and Cloud
- Unified Communications
- Quality of Service
- Virtualization
- Server Virtualization
- Networking Device Virtualization
- Software-Defined Networking
- Cloud Concepts
- Storage Area Networks
- Directly Attached Storage
- Network-Attached Storage
- Fibre Channel
- Fibre Channel over Ethernet
- iSCSI
Routing Concepts
- Static and Default Routing Overview
- Dynamic Routing Protocols
- Route Redistribution
- IGP and EGP Routing Protocols
- Distance Vector Routing Protocols
- Link-State Routing Protocols
- Classful Routing Protocols
- Classless Routing Protocols
- Dynamic Routing Metrics
- Administrative Distance
- Routing Loop Prevention
- Link-State Routing Protocol Features
- Building the LSDB
- Calculating the Dijkstra Algorithm
- Convergence with Link-State Protocols
- Route Aggregation
- High Availability
Implement IPv6 Addressing
- IPv6 Addressing Overview
- Representing the IPv6 Address
- Conventions for Writing IPv6 Addresses
- Conventions for Writing IPv6 Prefixes
- IPv6 Address Types
- Global Unicast Addresses
- Link-Local Addresses
- Configuring IPv6 Addressing
- EUI-64 Concept
- Stateless Address Autoconfiguration
- Migration to IPv6
- Dual-Stack
- Tunnelling
Implement IPv4 Addressing
- Local Addressing
- MAC Addresses
- Collision and Broadcast Domains
- IPv4 Addressing
- IPv4 Address Structure
- Private and Public IP Addressing
- IPv4 Address Types
- Subnetting in Four Steps
- Determine How Many Bits to Borrow
- Determine the New Subnet Mask
- Determine the Subnet Multiplier
- List the Subnets, Host Ranges, and Broadcast Addresses
- Subnetting Example 1
- Subnetting Example 2
- Subnetting Example 3
- VLSM and Classless Addressing
Network Topologies and Infrastructure
- Network Topologies
- Bus
- Ring
- Star, Extended Star, and Hub-and-Spoke
- Full and Partial Mesh
- Client-Server and Peer-to-Peer
- Network Infrastructures
- PANs
- LANs and WLANs
- CANs
- MANs
- WANs
- Other Network Infrastructures
- Industrial Networks
- Mediantes
Cable Installation
- Copper
- Copper Cables
- Copper Connectors
- Fibre
- Fibre-Optic Cables
- Fibre Connectors
- Media Converters
- Tools
WAN Technologies
- Packet Switching and Circuit Switching
- WAN Link Options
- Home and Small Office
- Wireless
- SONET
- Dedicated Leased Lines
- Enterprise WANs
Network Services and Applications
- VPN
- Types
- IPsec and IKE
- Other VPN Technologies
- Remote Access Services
- AAA Services
- Microsoft’s RAS
- Other Remote Access Services
- Unified Communications
- DHCP
- DNS
- NAT
Network Devices
- Common Network Devices
- Specialty Devices
- Firewalls
- IDS and IPS
- Proxy Server
- Load Balancer
- Packet Shaper
- VPN Concentrator