Train together, save more! 10% off individual registration, 20% off for pairs.
×
Log in
Or create your account
You have just added to your selection
Your cart is empty, See our trainings

Description

This cycle will provide you with all the knowledge necessary to understand, install and administer business networks. You will learn the operation and implementation of the main network protocols such as TCP/IP, DNS, HTTP, as well as different interconnection equipment such as switches and routers. A module entirely dedicated to system and network security will complete this training cycle.

Who is this training for ?

For whom ?

Computer technicians.

Prerequisites

Training objectives

Training program

    • A network for what? The different elements and their role.
    • Classification of the different types of networks.
    • Advantages and disadvantages of the different technologies.
    • Share resources.
    • Nature and purpose of a protocol.
    • Twisted pair, coaxial and optical fiber.
    • Cabling principle and rule.
    • Wireless.
    • Why and when use a local network? The type of addressing of the Ethernet standard.
    • Constraints, advantages and mode of operation of Ethernet (CSMA/CD).
    • Several speeds from 10 MB to several GB (10/100 base T/Gigabit Ethernet/.
    • ).
    • Wireless local networks (802.
    • 11x).
    • The different equipment, their roles and their respective advantages.
    • Practical work Creation of a local network with switches and workstations.
    • Installing a network analyzer.
    • Configuring IP address parameters on workstations.
    • Identify and work with MAC addresses, ARP requests and the ARP table.
    • Connection tests between stations.
    • Network addressing constraints.
    • The IP protocol.
    • The addressing plan.
    • Broadcast and Multicast .
    • The TCP and UDP protocols.
    • Concept of port number.
    • The DNS name service.
    • Role and interest .
    • The operating principles.
    • The notion of domain.
    • The DHCP server.
    • The basic principles.
    • Know how to assign IP addresses dynamically.
    • Other services provided by DHCP.
    • SMTP, POP3, IMAP4 messaging protocols.
    • HTTP, HTTPS, FTP, TELNET and SSH.
    • Practical work Example of using FTP between workstations and the FTP server (tracing and analysis of frames and packets).
    • Telnet connection to routers (tracing and analysis of frames and packets).
    • Integration of workstations as DNS and DHCP client.
    • The architecture of a Cisco router.
    • Installation and configuration.
    • Configuring Cisco switches.
    • Configure IP routing.
    • Routing protocols.
    • RIP v1 and v2 distance vector routing.
    • EIGRP.
    • Operating principles.
    • Loop processing.
    • OSPF routing protocols.
    • Database and topology.
    • Link states.
    • Convergence.
    • Topology, tables, loops, routes, political routing.
    • Multicast routing.
    • Configure a router for WAN networks .
    • Address translation.
    • Public addresses and private addresses.
    • Access for a given application.
    • Extended Access Lists.
    • Practical work rnPhysical connection of routers.
    • Configuration of IP addresses on routers.
    • Identify and work with the MAC addresses, ARP requests and the ARP table of routers.
    • Analyze the routing table.
    • Connection tests between stations and routers.
    • Configuration of 'a translation table.'}
    • How to recover the password.
    • Configuration register states.
    • Download a new software package version.
    • Save via TFTP.
    • Downloading a new configuration.
    • Router supervision.
    • Software verification.
    • Management modifications and configuration.
    • Security.
    • Public addresses and private addresses.
    • Maintenance techniques.
    • Recognize and repair faulty hardware components.
    • Hardware maintenance.
    • Interface testing.
    • Software maintenance.
    • Debugging.
    • Practical work Backup and reinstallation of configuration and IOS via the network.
    • Recovery after loss of IOS in Flash.
    • Recovery and replacement of word exceeds.
    • Introduction to security.
    • Low-layer attacks and application attacks.
    • Which architectures for which needs? Firewall: pierre cornerstone of security.
    • Server proxy and application relay.
    • Data and exchange security.
    • Securing a system, "Hardening".
    • Daily audit and security.
    • Practical work Installation and use of Wireshark.
    • Implementation of an application attack.
    • Installing a Cache/Authentication proxy.
    • Deploying an SMTP relay and an HTTP/FTP Antivirus proxy.
    • Carrying out an attack Man in the Middle on an SSL session.
    • Implementing IPSec.
  • 1004
  • 91 h

Submit your review

Translated By Google Translate