Introduction to the OSI Model
- Understand the OSI model
- Layers 1 to 3 of the OSI model
- Layers 1 to 3 of the OSI model
Configure IPv4 and IPv6 Addressing
- Configure the Network to use an ISATAP Router
- Setup Network Connectivity between IPv4 and IPv6 Devices
Network Management – Diagrams, Symbols, and Documentation
- Introduction to LibreOffice Draw
- Create Network Diagrams with LibreOffice Draw
Network Services and Protocols (Part 1)
- Troubleshooting ICMP Related Issues (including Ping and Traceroute)
- Understand How ARP Works
Network Services and Protocols (Part 2)
- Verify Port 80 for HTTP
- Verify Port 443 for HTTPS
- Contrast TCP and UDP Protocols
- Using a Port Scanner
Network Services and Protocols (Part 3)
- Configuring Port 21 for FTP
- Configuring Port 161 for SNMP
- Configuring Port 23 for Telnet
- Configuring Port 445 for SMB
- Configuring Port 3389 for RDP
- Using VNC and SSH
Install OS Updates and Configure Security Policy
- Configure and Run Windows Update
- Configure Network Security Policy
Understand Common Network Vulnerabilities
- Spoofing a DNS Server
- Exploring DNS Server Vulnerabilities
- Using Anti-Phishing configuration
Implement a Host-based Firewall
- Preliminary Tasks
- Configuring Firewall Rules Using Windows Firewall
- Configuring Firewall Rules using Windows Firewall with Advanced Security
- Configuring Firewall Rules from the Command Line Interface
Install Hyper-V
Troubleshoot Internet Connection and DNS Issues
- Troubleshoot Internet Connectivity Issues
- Troubleshoot Network Connectivity due to DNS settings
Install and Configure DHCP and DNS Servers
- Installing and Configuring DHCP
- Installing and Configuring DNS
Introduction to Software as a Service (SaaS)
- Using OneDrive for Document Storage
- Using OneDrive for Document Sharing
Detecting System Bottlenecks and Log Management
- Monitor System Performance
- Detecting System Bottlenecks
Troubleshoot Network Connectivity with Network Utilities
- Using ipconfig
- Using pathping
- Using route
- Using iptables
- Using tcpdump
- Using nmap
VPN Technologies and Services
- Install VPN Server
- Configure VPN Server Properties
- Using PPTP
- Using L2TP and IPSec
Install and Configure Network Load Balancing
- Installing Network Load Balancing Nodes
- Configuring a New NLB Cluster
- Adding a Secondary Node to an NLB Cluster
- Examining the working of an NLB cluster
- Configuring and validating port rules for NLB cluster
Configure Switching Features
- Trunk Configuration Part 1
- VLAN Trunk Protocol
- Trunk Configuration Part 2
- Native VLAN Configuration
- Adding and Removing VLANs from a Trunk
- Configuring EtherChannel
Configure and Verify Switch Security Features
- ARP Inspection, DHCP Snooping, and IP Source Guard
- Private VLANs (PVLANs)
Configure Switching Concepts
- Examining the functionality of a Switch
- Examining the MAC Address Table
- Examining MAC Address Aging
- Frame Flooding
- Creating and Managing VLANs
Backup and Restore
- Restoring a Windows Computer Using System Image Backup
- Using Windows 10 backup utilities
- Automating Windows Server Backup
Routing Concepts and Protocols
- Static Routing
- Dynamic Routing
- Static and Dynamic Routing
- Floating Static Route
- Configuring Multiple Dynamic Routing Protocols
Configure Gateway Redundancy Protocols
- Configuring HSRP
- Priority and Pre-emption
- Examining HSRP
Configure Email Client Protocols
- Configuring an Email Service
- Configuring a Mail Client
Install and Configure SNMP
- Installing the Monitoring Software
- Installing and Configuring SNMP
- Performing a Network Inventory
Controlling VPN Access with RADIUS
- Install Network Policy Server - Microsoft RADIUS
- Configure VPN Ports
- Viewing the NPS Logs
Assess Network Vulnerabilities and Threats using MBSA
- Running MBSA to Detect System Vulnerabilities