logo

Chapter 03 - Network Administration I - 12/25

Chapter 03 - Network Administration I - 12/25
Course content
Chapter Kick-off
Chapter 03- Network Administration I
Network Foundations
What Is a Connected Device?
Network Types
Network By Size
Wirless Networks
Specialized Network
Inter-Networks
Networks Types - Knowledge Check
Network Topologies
Network Devices Identity
Building the Network
Access Devices
Infrastructure Devices
Secuirty Devices
Specialized Devices
What is Network Architecture?
Client-server Networks
Peer-to-peer Networks
Cloud-based Networks
Virtual Networks
What Are Physical and Logical Addresses?
Physical Address
Logical Address
Network Foundaions
Network Foundations - Key Takeaways
The OSI Model
What is a Network Model?
The OSI Model
Data Encapsulation and Decapsulation
Network Protocols and Port Numbers
Our Learning Approach
The Physical Layer
Network Media and Cables
Ethernet Cable
Fiber Media
The Physical Layer - Knowledge Check
The Data Link Layer
Network Frame
Ethernet Protocol
Media Access Contorol Protocol(MAC)
Wirless LAN Components
Wirless Technologies
The Data Link Layer - Knowledge Check
The Network Layer
Network Packet
Internet Protocol Address (IP)
What is a Subnet?
Subnet and Subnetting
Internet Control Message Protocol (ICMP)
The Network Layer - Knowledge Check
The Transport Layer
Transmission Control Protocol (TCP)
TCP Life Cycle
User Datagram Protocol (UDP)
Reliable (TCP) vs. Unreliable (UDP)
The Transport Layer - Knowledge Check
The Session Layer
Network Basic Input/output System (NetBIOS)
Server Message Block Protocol (SMB)
The Session Layer - Knowledge Check
The Presentation Layer
Secure Sockets Layer (SSL) & Transport Layer Secuirty (TLS)
Security Certificates
The Presentation Layer - Knowledge Check
The Application Layer
Telnet and Secure Shell (SSH) Protocols
Hypertext Transfer Protocol (HTTP) & Hypertext Transfer Protocol Secure (HTTPS)
Mail Systems Protocols
Domain Name System Protocol (DNS)
File Transfer Protocol (FTP)
Remote Desktop Protocol (FTP)
The Application Layer - Knowledge Check
Data Decapsulation Process
The Journey of Data
OSI Application By Cybersecuirty Professionals
The OSI Model - Key Takeaways
Chapter Closure
Network Administration I Quiz
10Questions

TechDX