1.2 Classify how applications, devices, and protocols relate to the OSI Model
Lab Title Distinguish Between Applications and Protocols Book Chapter 6 Book Heading The TCP/IP Layers Testing and Troubleshooting a LAN 1-3 The OSI Model The Ethernet LAN The Transport Layer Home Networking Network Services-DHCP & DNS Book Page # 239 45
1 1 6
12 15 241
34
10
416
11
1 6
Analyzing Computer Networks FTP Data Packets The OSI Model The TCP/IP Layers
446
12 239
Header Fields Determining if Two Computers Are on the Same Logical Network in IPv4 IPv4 Allocating Bits for Network Addresses IPv4 - Create a Custom Subnet Mask (Part 1) IPv4 - Create a Custom Subnet Mask (Part 2) IPv4 Using Variable Length Subnet Masks IPv4 Scenario Based Test Applet Intermediate IPv4 Addressing Practice 1 Intermediate IPv4 Addressing Practice 2 IPv4 Advanced Route Aggregation Planning
259
6 6 6 6 6 6 6 9 6 9 6
Subnet Masks IPv4 Addressing Subnet Masks Subnet Masks Subnet Masks CIDR Blocks Subnet Masks Static Routing Subnet Masks Static Routing Number Conversion
259 255 259 259 259 267 259 359 259 359 249
372
9 9
375 378
Routed Protocols
239
Book Chapter 6
Book Chapter 6
Book Heading
The TCP/IP Layers Refer to the steps outlined in the lab exercise
Refer to the steps outlined in the lab exercise Refer to the steps outlined in the lab exercise
Configuring Static Hostname Resolution on a Workstation Using NLS Lookup for DNS Troubleshooting
Network 416 Services-DHCP and DNS 1 Testing and 44 Troubleshooting a LAN Refer to the steps outlined in the lab exercise
10
420
Book Chapter
Book Heading
Book Page #
Web Address [Virtualization Terminology] Refer to the steps outlined in the lab exercise Refer to the steps outlined in the lab exercise Web Address [Virtualization Technology and Services]
Domain 2.0: Networking Installation and Configuration 2.1 Given a scenario, install, and configure routers and switches
Lab Title Connect to Switch console Port using PuTTY Connect to a Switch and Reconfigure the Hostname and Password Configure an IP Address on a Switch with a Default Gateway Switch Management via Telnet Understanding Switching Loops Choosing and Configuring a Root Switch Configuring Switched VLANs and Trunk Ports Configuring Port Security Spanning Tree Identification Connecting to the Routers Console Port Configuring Hostname and Passwords Configuring an Ethernet Interface on a Router Using the Show Run Command to Read the Current Configuration show Commands Useful for Troubleshooting Common Router Problems Book Book Heading Chapter 7 The Console Port Connection 8 Introduction to Switch Configuration Introduction to Switch Configuration Introduction to Switch Configuration Spanning Tree Protocol Spanning Tree Protocol Book Page # 296
331
333
332
8 8
338 338
Introduction to 329 VLANs Refer to the steps outlined in the lab exercise 8 Spanning-Tree 338 Protocol 7 The Console Port 296 Connection 7 The Routers 311 Privileged EXEC Mode 7 The Routers 311 Privileged EXEC Mode 9 Static Routing 367
Static Routing
365
9 9
Verifying a Router-Router Connection with Cisco Discovery Protocol Saving the Router or Switch Configuration Static and Default Routing Configuring InterVLAN Routing Configuring Dynamic Routing Reading a Routing Table
9 9
368 359
Web Address [Configuring InterVLAN routing] 9 Configuring RIP 379 and RIPv2 9 Static Routing 368
185
167
419 422
Process
Book Chapter 1
Book Page # 34
33
Home Networking
27
Book Chapter
Book Heading
Book Page #
2.6 Given a set of requirements, plan and implement a basic SOHO network
Lab Title Configuring a Network Adapter with IPv6 Address Configuring Access Restrictions on a Small Business/Home Office Router Configuring Port Forwarding to Local Book Chapter Book Heading Book Page # Refer to the steps outlined in the lab exercise 1 Home Networking 34
Services on a Small Office/Home Office Router Address Translation Terminology Configuring a Connection to a Network Printer Mapping a Network Drive to a Desktop Configuring a Client Network Address with an IPv4 Address
exercise
Web Address [Address Translation Technology] Refer to the steps outlined in the lab exercise Refer to the steps outlined in the lab exercise Refer to the steps outlined in the lab exercise
119
Matching Transceiver Port Functions for Category 5 Cabling Matching Cable to Wire Length
75
71
77
and Test It
CAT6/5e/5 UTP Cables 2 Cable Testing and Certification Terminating CAT6/5e/5 UTP Cables The Console Port Connection 86 77
298
44
94
70
124
23
Terminology
401-415
Book Page # 7 7 22
Book Chapter 2
Book Page # 94
Lab Title IEEE Local Area Network Wire Standards IEEE LAN Standards and Technologies
Book Chapter 4
Book Heading IEEE 802.11 Wireless LAN Standard The Ethernet LAN
15
Book Chapter 2 3
Domain 4.0: Network Management 4.1 Explain the purpose and functions of various network appliances
Book Book Heading Chapter Functions of Network 12 Security Software Appliances/Management and Hardware Software 12 Introduction to Virtual Private Network
Lab Title
487
4.2 Given a scenario, use appropriate hardware tools to troubleshoot connectivity issues
Lab Title Hardware Tools and Function Using the ipconfig Command with Available Book Chapter 2 Book Heading Terminating CAT6/5e/5 UTP cables The Ethernet LAN Book Page # 73
18
Options
4.3 Given a scenario, use appropriate software tools to troubleshoot connectivity issues
Lab Title Using ipconfig to Discover Network Settings Using ping to Troubleshoot Connectivity Using Expended ping (Command Switches) to Troubleshoot Connectivity Using ARP to discover a MAC Address Using traceroute Troubleshoot Connectivity Using netstat to Troubleshoot Connectivity Using ipconfig, ping, arp, and tracert Together to Troubleshoot Connectivity Using the route print Command Using Basic Linux Troubleshooting Commands Identifying Troubleshooting Commands to Use for Various Tasks Matching Command Output to Commands
Book Chapter 1
Book Page # 18
44
45
245
Static Routing
361
Troubleshooting A LAN
44
9 1
361 18
4.4 Given a scenario, use the appropriate network monitoring resource to analyze traffic
Lab Title Understanding SNMP Functions and Terminology Identifying Network Monitoring Databases and Logs Based on Need
Book Chapter 8
Book Heading Network Management Troubleshooting Cabling Systems Analyzing Computer Network Data Traffic
94
11
448
Book Chapter 2
Book Page # 94
4.6 Explain different methods and rationales for network performance optimization
Lab Title Identifying Network Performance Terminology
Book Chapter
Book Heading
Book Page #
Domain 5.0: Network Security 5.1 Given a scenario, implement appropriate wireless security measures
Lab Title Book Book Heading Book
Chapter 12 1 4
VPN Terminology
12
487
Tunneling Terminology
12 12
491 487
Book Chapter 12
Book Heading
Introduction to Virtual Private Networks 12 Introduction to 487 Virtual Private Networks Refer to the steps outlined in the lab exercise
Creating a Local Login Database to Secure Access to a Router Network Vulnerabilities the Hacker and Network Admin Perspectives Types of Network Threats and Attacks
Control of a Network) Refer to the steps outlined in the lab exercise 12 Intrusion (How an 469 Attacker Gains Control of a Network) Intrusion (How an 469 Attacker Gains Control of a Network) Network Security 468 - 496
12
Network Protection Mechanism Firewall Terminology and Functions Folder Sharing and Security Resource Security Through a Domain Controller Data Storage and Disaster Recovery Concepts
12 12
Security Software 484 and Hardware Refer to the steps outlined in the lab exercise Refer to the steps outlined in the lab exercise
12 Network Security 469 - 475 Refer to the steps outlined in the lab exercise
35