Network Administration Training in Calgary, AB
Attendees may include:
- Candidates who are looking to build their careers in Network Administration.
- Candidates with Background in Computer Science, Electrical Engineering and Computer Networks.
- People who are looking to enhance their careers in Computer Networking.
How will I benefit?
The Computer Network Administration training will provide you a comprehensive insight on Network Administration. It will provide you a complete insight on the different aspects of Networking and Administration such as IP Addressing, Network Media, Troubleshooting etc.
Overview:
100 Hours – Weekdays and Weekends

We understand your business needs proper networking. With our comprehensive program – you get a complete insight of the full package. You can enhance your career strongly with the Network Administration Program. There is a strong demand of Network Administration professionals in the market.
Network Administration course contents:
Course Contents:
- Network Topologies:
- Understanding the logical and physical network topologies.
- Mesh, Bus and Ring topologies.
- Exploring Star and Hybrid topologies.
- Understanding point-to-point and point-to-multipoint networks.
- Investigating client-server and peer-to-peer connections.
- Exploring network collisions CSMA/CD, and CSMA/CA.
- Understanding the difference between Internet, Intranets and Extranets.
- Network Implementations:
- Understanding WANs and MANs.
- Exploring LANs, WANs and PANs.
- Introducing SCADA/ICS and medianets.
- OSI Model:
- Introducing the OSI Model.
- Exploring Layer 1: The Physical layer.
- Discovering Layer 2: The Data Link layer.
- Understanding Layer 3: The Network layer.
- Getting around with Layer 4: The Transport layer.
- Touring Layer 5: The Session layer.
- Looking at Layer 6: The Presentation layer.
- Understanding Layer 7: The application layers.
- Exploring encapsulation and de-encapsulation.
- Discover how the layers work together.
- TCP/IP Model:
- Understanding the TCP/IP suite.
- Introducing the TCP/IP model.
- Exploring the application layer.
- Understanding the transport layer.
- Exploring the internet layer.
- Understanding the network interface layer.
- Comparing the TCP/IP model and the OSI model.
- Commonly used Network Devices:
- Introducing Network Interface controllers (NICs).
- Exploring hubs.
- Understanding bridges.
- Exploring switches.
- Understanding routers.
- Introducing wired and wireless access points.
Course Content:
- The Basics of Numbering Systems Used in Networking:
- Working with the binary numbering system.
- Using the hexadecimal numbering system.
- Understanding the octal numbering system.
- Understanding Addressing:
- Exploring physical addressing.
- Working with logical addressing.
- Understanding how logical and physical addressing work together.
- Exploring multicast, unicast, and broadcast.
- Comparing broadcast domains and unicast domains.
- IPV4 Addressing:
- Introducing IPV4 and IPV4 addressing structure.
- Understanding the IPV4 classful A,B,C,D and E ranges.
- Using the IPV4 classless addressing.
- Exploring the reserved IP address ranges and loopback.
- Comparing the private, public, and IPV4 and APIPA addressing.
- Subnetting with IPV4.
- Configuring default routes and gateway settings.
- Understanding and setting a subnet mask.
- IPV6 Addressing:
- Introducing IPV6.
- Understanding the IPV6 addressing.
- Working with subnetting in IPV6.
- Configuring gateways and subnet masks in IPV6.
- Understanding IPV6 reserved ranges.
- Exploring IPV6 link local 6to4 tunneling, 4to6.
- Introducing ipconfig
- Exploring dual IP stacks.
- Name and IP Address Resolution Techniques:
- Explaining DHCP and how DHCP works.
- Configuring DHCP in Windows Server 2012.
- Explaining DNS and how DNS works.
- Configuring DNS in Windows Server 2012.
- Explaining WINS and how WINS works.
- Configuring WINS in Windows.
- Explaining NAT and how NAT works.
- Other Concepts Related to Addressing:
- Understanding ports.
- Exploring packets.
- Using remote access.
Course Contents:
- Copper Cable:
- Exploring cable types and their characteristics.
- Comparing cable standards.
- Identifying copper connectors.
- Creating a coaxial cable.
- Terminating a CAT 5 cable.
- Punching down keystone jacks and patch cables.
- Mitigating EMI and its effect on copper cable.
- Understanding security limitations on copper cabling.
- Wireless LAN:
- Exploring wireless LAN types.
- Distinguishing legacy, current, and future Wifi standards.
- Comparing the 2.4 and 5 GHZ frequencies.
- Distinguishing legacy standards (802.11a and 802.11b).
- Recognizing current standards (802.11g and 802.11n).
- Exploring future standards (802.11ac).
- Bridging networks with point-to-point (P2P) wireless.
- Wireless LAN Security considerations:
- Scrutinizing WEP.
- Securing your network with WPA2.
- Authenticating users with 802.1x.
- Analyzing the shortcomings of the wireless security.
- Fiber-Optic Media:
- Comparing fiber connectors and cables.
- Using the fiber-optic cables in LAN applications.
- Interfacing the fiber-optic cable in WAN applications.
Course Content:
- WAN Technologies:
- Dial-up.
- DSL and ADSL.
- Cable and Broadband.
- Leased lines.
- MPLS and VPLS.
- Tunnels and VPN.
- Fringe WAN connection options.
- Switches:
- Hubs, bridges, and switches.
- Hardware specification.
- Backplane speed.
- Hardware Redundancy.
- Switching Types and MAC tables.
- Managed and unmanaged switches.
- VLANs.
- Spanning-Tree Protocol (STP).
- Security Options.
- Routers:
- Transmission and speed considerations.
- Static vs Dynamic Routing.
- Routing Tables.
- Software Routing in Windows.
- Network Address Translation (NAT).
- Basic Router Security.
- Firewalls and Security Zones.
- Firewall advanced features.
- Routing Protocols:
- Directly connected and static routes.
- Distance Vector.
- Link State.
- RIPV2.
- OSPF.
- OSPF areas.
- EIGRP.
- BGP.
Course Content:
- Protocol Basics:
- The role of protocols in networking.
- Connection vs connectionless.
- Port addresses.
- Packets and frames.
- Network Protocols:
- ARP and InARP.
- ICMP.
- IGMP.
- DNS and NetBIOS.
- HTTP.
- HTTPS.
- Mail Services: POP, IMAP and SMTP.
- Transfer VOIP: MGCP, RTP, and H.323.
- FTP and TFTP.
- SMB.
- SSH.
- RDP.
- SNMP.
- DHCP.
- Command Line (CLI) Tools:
- IPConfig.
- Ping, Tracert, PathPing.
- Arp.
- Telnet.
- Netstat.
- Nbtstat.
Course Content:
- Understanding Firewalls:
- What is a firewall?
- A host firewall.
- A network firewall.
- Static Packet Filtering (SPF) vs Stateful Packet Filtering (SPI).
- Host as a Router:
- Netfilter and iptables.
- Using iptables to setup a host firewall.
- Creating a shell script to automate configuring Netfilter.
- Understanding hosts as routers.
- Host as a router: Including an additional network adapter.
- Host as a router: Setting up a second host to test the router.
- Host as a router: Setting up IP forwarding.
- Host as a router: Configuring the router’s Netfilter settings.
- Host as a router: Testing.
- Host as a Firewall:
- Understanding using a host as a network firewall.
- Setting up a web server to receive forwarded packets.
- Configuring port forwarding by adding Netfilter rules.
- Testing port forwarding.
- Understanding one-legged demiliterized zones (DMZ) using iptables.
- Using iptables to setup a one-legged DMZ.
- Understanding Squid, an application proxy firewall.
- Setting up Squid.
- Fine-tuning the Ubuntu router host.
- Packet Analysis:
- What is Packet Analysis?
- Packet-Analysis applications in Network Security: ARP poisoning example.
- Packet capturing with Wireshark.
- Exploring Wireshark’s advanced features.
- Demonstrating Wireshark’s advanced features.
- Intrusion Detection System (IDS) and Vulnerability Assessment:
- What is an IDS?
- Introducing Snort.
- Snort as a packet sniffer.
- Snort as an IDS: Establishing rules.
- Snort as an IDS: Detecting pings.
- What is network vulnerability assessment?
- Nessus.
- Network scanning with Nessus.
- Logging and Monitoring:
- Logging and its significance.
- Syslog-ng.
- Log forwarding using syslog-ng: part I.
- Log forwarding using syslog-ng: part II.
- Kiwi.
- Simple Network Management Protocol (SNMP).
Course Content:
- IP Addresses:
- How to configure and verify an IP address.
- Static vs Dynamic IP addressing.
- Public vs private IPv4 addresses.
- IPv4 addresses.
- Determining classes of IP addresses.
- What DNS lookups do for you.
Course Content:
- Troubleshooting:
- Using NSLOOKUP.
- Using ping.
- ipconfig.
- Traceroute(tracert),
- What is Network Interface card (NIC)?
- Fine-tuning Wireshark for more efficient troubleshooting.
- Free network troubleshooting tools.
- More free network troubleshooting tools.
- Troubleshooting a broken DNS.
- Troubleshooting for a user who can’t connect to the Internet.
- Still Troubleshooting for users who can’t connect to the Internet.
Course Contents:
- Subnetting:
- Understanding binary basics.
- Converting between number formats.
- Default gateway.
- What is a subnet mask?
- Introducing to subnetting IPv4 addresses.
- Intermediate subnetting IPv4 addresses.
- Subnetting when solving host per subnet.
- Subnetting a Class A network.
- Variable-length subnet masks (VLSM).
- How to find my network ID.
- Supernetting.
Course Content:
- Delivery:
- Understanding port numbers.
- How to establish a TCP connection.
- TCP vs UDP.
- Understanding media access control (MAC) addresses.
- Understanding Network Address Translation (NAT).
- Using Address Resolution Protocol (ARP) for Layer 2 connectivity.
- Basic IP routing.
- Managing traffic using access control lists (ACLs).
- Exploring the function of routing.
- Understanding Dynamic Host Configuration Protocol (DHCP) process.
Course Contents:
- IPv6:
- IPv6 for dummies, but you can watch it too.
- Static routing in IPv6.
- Dynamic routing in IPv6.
Course Content:
- Introduction:
- Using the Packet Tracer software.
- Overview of navigation on Cisco routers.
- Setting up the network lab.
- Assigning IP addresses to computers and interfaces.
- Configuring Routing on Cisco Router:
- Understanding and configuring default routes.
- Understanding and configuring static routes.
- Configuring RIPv2.
- Understanding dynamic routing.
- Verification commands.
- The Routing Information Protocol (RIP):
- Understanding RIPng.
- Comparing RIPng and RIPv2.
- Using the RIP timers.
- Using the passive-interface command.
- Exploring the debug ip rip command.
- The Enahanced Interior Gateway Router Protocol (EIGRP):
- Understanding EIGRP.
- Understanding autonomous system numbers.
- Exploring the topology table.
- Configuring a feasible successor route.
- Setting up a successor route.
- Exploring EIGRP configuration options.
- Understanding how EIGRP chooses routes based on bandwidth.
- The Open Shortest Path First (OSPF) Routing Protocol:
- Understanding OSPF.
- Introducing the process ID number.
- Understanding the area number.
- Exploring the wildcard masking.
- Further exploring OSPF configuration.
- Understanding the election process.
Course Content:
- Traffic Capture and Analysis:
- Traffic capture overview.
- Exploring the Wireshark interface.
- Managing capture options.
- Using display and capture filters.
- Challenge: Filtering the data that is displayed.
- Solution: Filtering the data that is displayed.
- Review of the Open Systems Interconnection (OSI) Model:
- Dissecting the OSI model.
- Diving deeper into the layers of the OSI model.
- Understanding encapsulation.
- Deep Packet Analysis of Common Protocols:
- Analyzing TCP.
- Dissecting the TCP three-way handshake.
- Exploring IPv4.
- Discovering HTTP.
- Mastering DNS.
- Grasping UDP.
- Examining FTP.
- Dissecting ICMP.
- Challenge: Protocol discovery.
- Solution: Protocol discovery.
- Normal and Abnormal Behavior:
- Displaying Wireshark’s expert system.
- Navigating TCP transmission errors.
- Common Attack Signatures:
- Detecting denial-of-service attacks.
- Challenge: Identifying attack signatures.
- Solution: Identifying attack signatures.
- Identifying network scans.
- Distinguishing ARP issues from attacks.
- Protecting from password attacks.
- Examining macof attacks.
- Security Tools:
- Understanding passive and active attacks.
- Using security tools for ethical hacking.
Course Content:
- Accessing a Switch:
- Exploring the physical components of Catalyst 2950 switch.
- Accessing the switch with-in band and out-of-band methods.
- Configuring the terminal.
- Exploring the three-configuration modes.
- Using the built-in help.
- Global Commands:
- Configuring a switch hostname.
- Disabling IP domain name lookup.
- Creating a banner message.
- Saving and Viewing configurations.
- Secure Management Access:
- Securing console and Telnet access.
- Securing privileged EXEC mode access.
- Encrypting passwords.
- Addressing a Switch:
- Assigning an IP address to a switch.
- Configuring the default gateway.
- Switch Port Mode and Security:
- Explore switch port commands and settings.
- Understanding switch port security.
- VLANs:
- Understanding VLANs.
- Exploring the types of VLANs.
- Creating VLANs.
- Adding ports to a VLAN.
- Configuring trunk ports.
- Verifying Configurations:
- Additional show commands.
- Resetting a switch.