Network Administration Training in Calgary, AB

Attendees may include:

  • Candidates who are looking to build their careers in Network Administration.
  • Candidates with Background in Computer Science, Electrical Engineering and Computer Networks.
  • People who are looking to enhance their careers in Computer Networking.

How will I benefit?

The Computer Network Administration training will provide you a comprehensive insight on Network Administration. It will provide you a complete insight on the different aspects of Networking and Administration such as IP Addressing, Network Media, Troubleshooting etc.

Overview:

100 Hours - Weekdays and Weekends
icon1

We understand your business needs proper networking. With our comprehensive program - you get a complete insight of the full package. You can enhance your career strongly with the Network Administration Program. There is a strong demand of Network Administration professionals in the market.

Network Administration course contents:

Course Contents:
  • Network Topologies:
    • Understanding the logical and physical network topologies.
    • Mesh, Bus and Ring topologies.
    • Exploring Star and Hybrid topologies.
    • Understanding point-to-point and point-to-multipoint networks.
    • Investigating client-server and peer-to-peer connections.
    • Exploring network collisions CSMA/CD, and CSMA/CA.
    • Understanding the difference between Internet, Intranets and Extranets.

 

  • Network Implementations:
    • Understanding WANs and MANs.
    • Exploring LANs, WANs and PANs.
    • Introducing SCADA/ICS and medianets.

 

  • OSI Model:
    • Introducing the OSI Model.
    • Exploring Layer 1: The Physical layer.
    • Discovering Layer 2: The Data Link layer.
    • Understanding Layer 3: The Network layer.
    • Getting around with Layer 4: The Transport layer.
    • Touring Layer 5: The Session layer.
    • Looking at Layer 6: The Presentation layer.
    • Understanding Layer 7: The application layers.
    • Exploring encapsulation and de-encapsulation.
    • Discover how the layers work together.

 

  • TCP/IP Model:
    • Understanding the TCP/IP suite.
    • Introducing the TCP/IP model.
    • Exploring the application layer.
    • Understanding the transport layer.
    • Exploring the internet layer.
    • Understanding the network interface layer.
    • Comparing the TCP/IP model and the OSI model.

 

  • Commonly used Network Devices:
    • Introducing Network Interface controllers (NICs).
    • Exploring hubs.
    • Understanding bridges.
    • Exploring switches.
    • Understanding routers.
    • Introducing wired and wireless access points.
Course Content:
  • The Basics of Numbering Systems Used in Networking:
    • Working with the binary numbering system.
    • Using the hexadecimal numbering system.
    • Understanding the octal numbering system.

 

  • Understanding Addressing:
    • Exploring physical addressing.
    • Working with logical addressing.
    • Understanding how logical and physical addressing work together.
    • Exploring multicast, unicast, and broadcast.
    • Comparing broadcast domains and unicast domains.

 

  • IPV4 Addressing:
    • Introducing IPV4 and IPV4 addressing structure.
    • Understanding the IPV4 classful A,B,C,D and E ranges.
    • Using the IPV4 classless addressing.
    • Exploring the reserved IP address ranges and loopback.
    • Comparing the private, public, and IPV4 and APIPA addressing.
    • Subnetting with IPV4.
    • Configuring default routes and gateway settings.
    • Understanding and setting a subnet mask.

 

  • IPV6 Addressing:
    • Introducing IPV6.
    • Understanding the IPV6 addressing.
    • Working with subnetting in IPV6.
    • Configuring gateways and subnet masks in IPV6.
    • Understanding IPV6 reserved ranges.
    • Exploring IPV6 link local 6to4 tunneling, 4to6.
    • Introducing ipconfig
    • Exploring dual IP stacks.
  • Name and IP Address Resolution Techniques:
    • Explaining DHCP and how DHCP works.
    • Configuring DHCP in Windows Server 2012.
    • Explaining DNS and how DNS works.
    • Configuring DNS in Windows Server 2012.
    • Explaining WINS and how WINS works.
    • Configuring WINS in Windows.
    • Explaining NAT and how NAT works.

 

  • Other Concepts Related to Addressing:
    • Understanding ports.
    • Exploring packets.
    • Using remote access.
Course Contents:
  • Copper Cable:
    • Exploring cable types and their characteristics.
    • Comparing cable standards.
    • Identifying copper connectors.
    • Creating a coaxial cable.
    • Terminating a CAT 5 cable.
    • Punching down keystone jacks and patch cables.
    • Mitigating EMI and its effect on copper cable.
    • Understanding security limitations on copper cabling.

 

  • Wireless LAN:
    • Exploring wireless LAN types.
    • Distinguishing legacy, current, and future Wifi standards.
    • Comparing the 2.4 and 5 GHZ frequencies.
    • Distinguishing legacy standards (802.11a and 802.11b).
    • Recognizing current standards (802.11g and 802.11n).
    • Exploring future standards (802.11ac).
    • Bridging networks with point-to-point (P2P) wireless.
  • Wireless LAN Security considerations:
    • Scrutinizing WEP.
    • Securing your network with WPA2.
    • Authenticating users with 802.1x.
    • Analyzing the shortcomings of the wireless security.

 

  • Fiber-Optic Media:
    • Comparing fiber connectors and cables.
    • Using the fiber-optic cables in LAN applications.
    • Interfacing the fiber-optic cable in WAN applications.
Course Content:
  • WAN Technologies:
    • Dial-up.
    • DSL and ADSL.
    • Cable and Broadband.
    • Leased lines.
    • MPLS and VPLS.
    • Tunnels and VPN.
    • Fringe WAN connection options.

 

  • Switches:
    • Hubs, bridges, and switches.
    • Hardware specification.
    • Backplane speed.
    • Hardware Redundancy.
    • Switching Types and MAC tables.
    • Managed and unmanaged switches.
    • VLANs.
    • Spanning-Tree Protocol (STP).
    • Security Options.

 

  • Routers:
    • Transmission and speed considerations.
    • Static vs Dynamic Routing.
    • Routing Tables.
    • Software Routing in Windows.
    • Network Address Translation (NAT).
    • Basic Router Security.
    • Firewalls and Security Zones.
    • Firewall advanced features.

 

  • Routing Protocols:
    • Directly connected and static routes.
    • Distance Vector.
    • Link State.
    • RIPV2.
    • OSPF.
    • OSPF areas.
    • EIGRP.
    • BGP.
Course Content:
  • Protocol Basics:
    • The role of protocols in networking.
    • Connection vs connectionless.
    • Port addresses.
    • Packets and frames.

 

  • Network Protocols:
    • ARP and InARP.
    • ICMP.
    • IGMP.
    • DNS and NetBIOS.
    • HTTP.
    • HTTPS.
    • Mail Services: POP, IMAP and SMTP.
    • Transfer VOIP: MGCP, RTP, and H.323.
    • FTP and TFTP.
    • SMB.
    • SSH.
    • RDP.
    • SNMP.
    • DHCP.

 

  • Command Line (CLI) Tools:
    • IPConfig.
    • Ping, Tracert, PathPing.
    • Arp.
    • Telnet.
    • Netstat.
    • Nbtstat.
Course Content:
  • Understanding Firewalls:
    • What is a firewall?
    • A host firewall.
    • A network firewall.
    • Static Packet Filtering (SPF) vs Stateful Packet Filtering (SPI).

 

  • Host as a Router:
    • Netfilter and iptables.
    • Using iptables to setup a host firewall.
    • Creating a shell script to automate configuring Netfilter.
    • Understanding hosts as routers.
    • Host as a router: Including an additional network adapter.
    • Host as a router: Setting up a second host to test the router.
    • Host as a router: Setting up IP forwarding.
    • Host as a router: Configuring the router's Netfilter settings.
    • Host as a router: Testing.

 

  • Host as a Firewall:
    • Understanding using a host as a network firewall.
    • Setting up a web server to receive forwarded packets.
    • Configuring port forwarding by adding Netfilter rules.
    • Testing port forwarding.
    • Understanding one-legged demiliterized zones (DMZ) using iptables.
    • Using iptables to setup a one-legged DMZ.
    • Understanding Squid, an application proxy firewall.
    • Setting up Squid.
    • Fine-tuning the Ubuntu router host.

 

  • Packet Analysis:
    • What is Packet Analysis?
    • Packet-Analysis applications in Network Security: ARP poisoning example.
    • Packet capturing with Wireshark.
    • Exploring Wireshark's advanced features.
    • Demonstrating Wireshark's advanced features.

 

  • Intrusion Detection System (IDS) and Vulnerability Assessment:
    • What is an IDS?
    • Introducing Snort.
    • Snort as a packet sniffer.
    • Snort as an IDS: Establishing rules.
    • Snort as an IDS: Detecting pings.
    • What is network vulnerability assessment?
    • Nessus.
    • Network scanning with Nessus.

 

  • Logging and Monitoring:
    • Logging and its significance.
    • Syslog-ng.
    • Log forwarding using syslog-ng: part I.
    • Log forwarding using syslog-ng: part II.
    • Kiwi.
    • Simple Network Management Protocol (SNMP).
Course Content:
  • IP Addresses:
    • How to configure and verify an IP address.
    • Static vs Dynamic IP addressing.
    • Public vs private IPv4 addresses.
    • IPv4 addresses.
    • Determining classes of IP addresses.
    • What DNS lookups do for you.
Course Content:
  • Troubleshooting:
    • Using NSLOOKUP.
    • Using ping.
    • ipconfig.
    • Traceroute(tracert),
    • What is Network Interface card (NIC)?
    • Fine-tuning Wireshark for more efficient troubleshooting.
    • Free network troubleshooting tools.
    • More free network troubleshooting tools.
    • Troubleshooting a broken DNS.
    • Troubleshooting for a user who can't connect to the Internet.
    • Still Troubleshooting for users who can't connect to the Internet.
Course Contents:
  • Subnetting:
    • Understanding binary basics.
    • Converting between number formats.
    • Default gateway.
    • What is a subnet mask?
    • Introducing to subnetting IPv4 addresses.
    • Intermediate subnetting IPv4 addresses.
    • Subnetting when solving host per subnet.
    • Subnetting a Class A network.
    • Variable-length subnet masks (VLSM).
    • How to find my network ID.
    • Supernetting.
Course Content:
  • Delivery:
    • Understanding port numbers.
    • How to establish a TCP connection.
    • TCP vs UDP.
    • Understanding media access control (MAC) addresses.
    • Understanding Network Address Translation (NAT).
    • Using Address Resolution Protocol (ARP) for Layer 2 connectivity.
    • Basic IP routing.
    • Managing traffic using access control lists (ACLs).
    • Exploring the function of routing.
    • Understanding Dynamic Host Configuration Protocol (DHCP) process.
Course Contents:
  • IPv6:
    • IPv6 for dummies, but you can watch it too.
    • Static routing in IPv6.
    • Dynamic routing in IPv6.
Course Content:
  • Introduction:
    • Using the Packet Tracer software.
    • Overview of navigation on Cisco routers.
    • Setting up the network lab.
    • Assigning IP addresses to computers and interfaces.

 

  • Configuring Routing on Cisco Router:
    • Understanding and configuring default routes.
    • Understanding and configuring static routes.
    • Configuring RIPv2.
    • Understanding dynamic routing.
    • Verification commands.

 

  • The Routing Information Protocol (RIP):
    • Understanding RIPng.
    • Comparing RIPng and RIPv2.
    • Using the RIP timers.
    • Using the passive-interface command.
    • Exploring the debug ip rip command.

 

  • The Enahanced Interior Gateway Router Protocol (EIGRP):
    • Understanding EIGRP.
    • Understanding autonomous system numbers.
    • Exploring the topology table.
    • Configuring a feasible successor route.
    • Setting up a successor route.
    • Exploring EIGRP configuration options.
    • Understanding how EIGRP chooses routes based on bandwidth.

 

  • The Open Shortest Path First (OSPF) Routing Protocol:
    • Understanding OSPF.
    • Introducing the process ID number.
    • Understanding the area number.
    • Exploring the wildcard masking.
    • Further exploring OSPF configuration.
    • Understanding the election process.
Course Content:
  • Traffic Capture and Analysis:
    • Traffic capture overview.
    • Exploring the Wireshark interface.
    • Managing capture options.
    • Using display and capture filters.
    • Challenge: Filtering the data that is displayed.
    • Solution: Filtering the data that is displayed.
  • Review of the Open Systems Interconnection (OSI) Model:
    • Dissecting the OSI model.
    • Diving deeper into the layers of the OSI model.
    • Understanding encapsulation.

 

  • Deep Packet Analysis of Common Protocols:
    • Analyzing TCP.
    • Dissecting the TCP three-way handshake.
    • Exploring IPv4.
    • Discovering HTTP.
    • Mastering DNS.
    • Grasping UDP.
    • Examining FTP.
    • Dissecting ICMP.
    • Challenge: Protocol discovery.
    • Solution: Protocol discovery.

 

  • Normal and Abnormal Behavior:
    • Displaying Wireshark's expert system.
    • Navigating TCP transmission errors.

 

  • Common Attack Signatures:
    • Detecting denial-of-service attacks.
    • Challenge: Identifying attack signatures.
    • Solution: Identifying attack signatures.
    • Identifying network scans.
    • Distinguishing ARP issues from attacks.
    • Protecting from password attacks.
    • Examining macof attacks.

 

  • Security Tools:
    • Understanding passive and active attacks.
    • Using security tools for ethical hacking.
Course Content:
  • Accessing a Switch:
    • Exploring the physical components of Catalyst 2950 switch.
    • Accessing the switch with-in band and out-of-band methods.
    • Configuring the terminal.
    • Exploring the three-configuration modes.
    • Using the built-in help.

 

  • Global Commands:
    • Configuring a switch hostname.
    • Disabling IP domain name lookup.
    • Creating a banner message.
    • Saving and Viewing configurations.

 

  • Secure Management Access:
    • Securing console and Telnet access.
    • Securing privileged EXEC mode access.
    • Encrypting passwords.

 

  • Addressing a Switch:
    • Assigning an IP address to a switch.
    • Configuring the default gateway.

 

  • Switch Port Mode and Security:
    • Explore switch port commands and settings.
    • Understanding switch port security.

 

  • VLANs:
    • Understanding VLANs.
    • Exploring the types of VLANs.
    • Creating VLANs.
    • Adding ports to a VLAN.
    • Configuring trunk ports.

 

  • Verifying Configurations:
    • Additional show commands.
    • Resetting a switch.