Acknowledgments |
|
xvii | |
Additional Resources for Teachers |
|
xviii | |
Chapter 1 Network Models |
|
1 | (18) |
|
|
1 | (3) |
|
Lab Exercise 1.01 Exploring Network Hardware |
|
|
4 | (4) |
|
Lab Exercise 1.02 Understanding the Data Delivery Process |
|
|
8 | (4) |
|
Lab Exercise 1.03 Examining the Layers of the OSI Seven-Layer Model |
|
|
12 | (2) |
|
Lab Exercise 1.04 Preparing a Presentation of the OSI Seven-Layer Model |
|
|
14 | (2) |
|
|
16 | (1) |
|
|
17 | (2) |
Chapter 2 Cabling and Topology |
|
19 | (14) |
|
|
19 | (1) |
|
Lab Exercise 2.01 Identifying Network Topologies |
|
|
20 | (3) |
|
Lab Exercise 2.02 Determining Network Cabling Requirements |
|
|
23 | (4) |
|
Lab Exercise 2.03 Governing Bodies, Part 1 |
|
|
27 | (2) |
|
Lab Exercise 2.04 Industry Standards |
|
|
29 | (1) |
|
|
30 | (1) |
|
|
31 | (2) |
Chapter 3 Ethernet Basics |
|
33 | (18) |
|
|
33 | (1) |
|
Lab Exercise 3.01 The 802.3 Working Group and Standards |
|
|
34 | (3) |
|
Lab Exercise 3.02 CSMA/CD-Past and Present |
|
|
37 | (1) |
|
Lab Exercise 3.03 Building an Ethernet Patch Cable |
|
|
38 | (6) |
|
Lab Exercise 3.04 Understanding the Differences Between Cat Se and Cat 6/6A |
|
|
44 | (1) |
|
Lab Exercise 3.05 Enhancing the Performance of Ethernet Networks |
|
|
45 | (2) |
|
Lab Exercise 3.06 Exploring the Spanning Tree Protocol (STP) |
|
|
47 | (2) |
|
|
49 | (1) |
|
|
50 | (1) |
Chapter 4 Modern Ethernet |
|
51 | (16) |
|
|
51 | (1) |
|
Lab Exercise 4.01 Understanding Ethernet Standards |
|
|
52 | (3) |
|
Lab Exercise 4.02 Ethernet Network Design: Implementing Switches |
|
|
55 | (4) |
|
Lab Exercise 4.03 Beyond Gigabit Ethernet: 10 Gigabit Ethernet |
|
|
59 | (3) |
|
Lab Exercise 4.04 Beyond 10 Gigabit Ethernet: 40/100 Gigabit Ethernet |
|
|
62 | (2) |
|
|
64 | (1) |
|
|
65 | (2) |
Chapter 5 Installing a Physical Network |
|
67 | (28) |
|
|
67 | (1) |
|
Lab Exercise 5.01 Examining Structured Network Cabling |
|
|
68 | (3) |
|
Lab Exercise 5.02 Implementing a Small Network Infrastructure |
|
|
71 | (8) |
|
Lab Exercise 5.03 Installing Switches, Network Adapters, and PCs |
|
|
79 | (5) |
|
Lab Exercise 5.04 Diagnostics and Troubleshooting |
|
|
84 | (5) |
|
Lab Exercise 5.05 Field Trip: A Visit with the IT Department |
|
|
89 | (3) |
|
|
92 | (1) |
|
|
93 | (2) |
Chapter 6 TCP/IP Basics |
|
95 | (44) |
|
|
95 | (2) |
|
Lab Exercise 6.01 Diagramming the IP Address and Subnet Mask |
|
|
97 | (8) |
|
Lab Exercise 6.02 Configuring IP Addresses and Subnet Masks |
|
|
105 | (3) |
|
Lab Exercise 6.03 Configuring Subnetting |
|
|
108 | (5) |
|
Lab Exercise 6.04 Local vs. Remote IP Addresses: The Function of the Default Gateway |
|
|
113 | (4) |
|
Lab Exercise 6.05 Packet Sniffing; IP Addresses and MAC Addresses Working Together |
|
|
117 | (11) |
|
Lab Exercise 6.06 Static IP Addressing vs. Dynamic IP Addressing |
|
|
128 | (4) |
|
Lab Exercise 6.07 Configuring and Testing a DHCP Client and a DHCP Server |
|
|
132 | (4) |
|
|
136 | (1) |
|
|
137 | (2) |
Chapter 7 Routing |
|
139 | (22) |
|
|
139 | (1) |
|
Lab Exercise 7.01 Governing Bodies, Part 2 |
|
|
140 | (3) |
|
Lab Exercise 7.02 Installing and Configuring Routers |
|
|
143 | (5) |
|
Lab Exercise 7.03 Exploring NAT and Port Forwarding |
|
|
148 | (4) |
|
Lab Exercise 7.04 Configuring Multiple Routers and Implementing Dynamic Routing |
|
|
152 | (6) |
|
|
158 | (2) |
|
|
160 | (1) |
Chapter 8 TCP/IP Applications |
|
161 | (24) |
|
|
161 | (1) |
|
Lab Exercise 8.01 Transport Layer and Network Layer Protocols |
|
|
162 | (3) |
|
Lab Exercise 8.02 Analyzing TCP/IP Ports and Associations |
|
|
165 | (4) |
|
Lab Exercise 8.03 HTTP and Ports |
|
|
169 | (5) |
|
Lab Exercise 8.04 FTP and Ports |
|
|
174 | (5) |
|
Lab Exercise 8.05 The TCP Three-Way Handshake in Action |
|
|
179 | (3) |
|
|
182 | (1) |
|
|
183 | (2) |
Chapter 9 Network Naming |
|
185 | (20) |
|
|
185 | (1) |
|
Lab Exercise 9.01 DNS Resolver Cache |
|
|
186 | (5) |
|
Lab Exercise 9.02 Using the hosts File for Name Resolution |
|
|
191 | (2) |
|
Lab Exercise 9.03 nslookup |
|
|
193 | (5) |
|
Lab Exercise 9.04 DNS Client and DNS Server in Action |
|
|
198 | (4) |
|
|
202 | (1) |
|
|
203 | (2) |
Chapter 10 Securing TCP/IP |
|
205 | (14) |
|
|
205 | (1) |
|
Lab Exercise 10.01 Evaluating Digital Signatures |
|
|
206 | (4) |
|
Lab Exercise 10.02 Configuring and Using GPG Encryption |
|
|
210 | (5) |
|
Lab Exercise 10.03 Analyzing Secure TCP/IP Ports and Associations |
|
|
215 | (2) |
|
|
217 | (1) |
|
|
218 | (1) |
Chapter 11 Advanced Networking Devices |
|
219 | (20) |
|
|
219 | (1) |
|
Lab Exercise 11.01 Exploring Network Terms |
|
|
220 | (2) |
|
Lab Exercise 11.02 Encrypting Through a VPN |
|
|
222 | (4) |
|
Lab Exercise 11.03 Configuring VLANs on a Switch |
|
|
226 | (8) |
|
Lab Exercise 11.04 Exploring Network Protection |
|
|
234 | (2) |
|
|
236 | (1) |
|
|
237 | (2) |
Chapter 12 IPv6 |
|
239 | (20) |
|
|
239 | (1) |
|
Lab Exercise 12.01 IPv6 Facts, Figures, and Dates |
|
|
240 | (3) |
|
Lab Exercise 12.02 IPv6 Terminology |
|
|
243 | (2) |
|
Lab Exercise 12.03 IPv6 Address Notation Shortcuts |
|
|
245 | (2) |
|
Lab Exercise 12.04 IPv6 Configuration and Communication |
|
|
247 | (3) |
|
Lab Exercise 12.05 IPv6 Tunnel Broker |
|
|
250 | (6) |
|
|
256 | (1) |
|
|
257 | (2) |
Chapter 13 Remote Connectivity |
|
259 | (16) |
|
|
259 | (1) |
|
Lab Exercise 13.01 Identifying WAN Technologies |
|
|
260 | (2) |
|
Lab Exercise 13.02 Explore the "Last Mile" |
|
|
262 | (3) |
|
Lab Exercise 13.03 Using Remote Desktop Connection |
|
|
265 | (4) |
|
Lab Exercise 13.04 Using Windows Remote Assistance |
|
|
269 | (4) |
|
|
273 | (1) |
|
|
274 | (1) |
Chapter 14 Wireless Networking |
|
275 | (14) |
|
|
275 | (1) |
|
Lab Exercise 14.01 Wireless Standards and Security |
|
|
276 | (3) |
|
Lab Exercise 14.02 Planning the Wireless Network |
|
|
279 | (2) |
|
Lab Exercise 14.03 Configuring Wireless Networking |
|
|
281 | (4) |
|
Lab Exercise 14.04 Troubleshooting Wireless Networks |
|
|
285 | (2) |
|
|
287 | (1) |
|
|
288 | (1) |
Chapter 15 Virtualization and Cloud Computing |
|
289 | (22) |
|
|
289 | (2) |
|
Lab Exercise 15.01 Identifying Virtualization Technologies |
|
|
291 | (3) |
|
Lab Exercise 15.02 Installing and Configuring VMware Workstation Player |
|
|
294 | (5) |
|
Lab Exercise 15.03 Sending Network Traffic Between the Host System and VM |
|
|
299 | (5) |
|
Lab Exercise 15.04 Sending Network Traffic from the VM to the Internet |
|
|
304 | (2) |
|
Lab Exercise 15.05 Cloud Computing with Google Drive |
|
|
306 | (2) |
|
|
308 | (2) |
|
|
310 | (1) |
Chapter 16 Mobile Networking |
|
311 | (8) |
|
|
311 | (1) |
|
Lab Exercise 16.01 Cellular, Bluetooth, and Other Mobile Technologies |
|
|
312 | (3) |
|
Lab Exercise 16.02 Controlling Users' Mobile Devices |
|
|
315 | (2) |
|
|
317 | (1) |
|
|
318 | (1) |
Chapter 17 Building a Real-World Network |
|
319 | (12) |
|
|
319 | (1) |
|
Lab Exercise 17.01 Configuration Management Documentation |
|
|
320 | (6) |
|
Lab Exercise 17.02 Industrial Control Systems |
|
|
326 | (2) |
|
|
328 | (1) |
|
|
329 | (2) |
Chapter 18 Managing Risk |
|
331 | (10) |
|
|
331 | (1) |
|
Lab Exercise 18.01 Security Policies |
|
|
332 | (2) |
|
Lab Exercise 18.02 User Training |
|
|
334 | (2) |
|
Lab Exercise 18.03 Disaster Recovery and Business Continuity |
|
|
336 | (2) |
|
|
338 | (1) |
|
|
339 | (2) |
Chapter 19 Protecting Your Network |
|
341 | (18) |
|
|
341 | (1) |
|
Lab Exercise 19.01 Identifying Common Threats |
|
|
342 | (4) |
|
Lab Exercise 19.02 Implementing and Managing User Authentication |
|
|
346 | (4) |
|
Lab Exercise 19.03 Exploring Hardware Firewalls |
|
|
350 | (2) |
|
Lab Exercise 19.04 Configuring Windows Defender Firewall |
|
|
352 | (5) |
|
|
357 | (1) |
|
|
358 | (1) |
Chapter 20 Network Monitoring |
|
359 | (12) |
|
|
359 | (2) |
|
Lab Exercise 20.01 Understanding SNMP |
|
|
361 | (1) |
|
Lab Exercise 20.02 Monitoring Performance and Connectivity |
|
|
362 | (6) |
|
Lab Exercise 20.03 Understanding SIEM |
|
|
368 | (1) |
|
|
369 | (1) |
|
|
370 | (1) |
Chapter 21 Network Troubleshooting |
|
371 | (22) |
|
|
371 | (1) |
|
Lab Exercise 21.01 Identifying the Troubleshooting Process |
|
|
372 | (3) |
|
Lab Exercise 21.02 Identifying Hardware Troubleshooting Tools |
|
|
375 | (2) |
|
Lab Exercise 21.03 Using Software Troubleshooting Tools |
|
|
377 | (6) |
|
Lab Exercise 21.04 Exploring Vulnerability Scanners |
|
|
383 | (7) |
|
|
390 | (2) |
|
|
392 | (1) |
Glossary |
|
393 | (84) |
Index |
|
477 | |