Networking_Essentials_v3_0_Scope_and_Sequence
Networking_Essentials_v3_0_Scope_and_Sequence
Prerequisites 3
Certification Alignment 3
Course Description 3
Course Objectives 3
Equipment Requirements 5
Course Outline 5
Prerequisites
For proper skill-building, the students should have a basic understanding of how to use a computer and browse the
internet.
Certification Alignment
This course aligns to Cisco Certified Support Technician (CCST) Networking certification objectives.
Course Description
This course teaches the fundamentals of networking. It covers the foundation of networking and network devices,
how to use different network applications and protocols to accomplish networking tasks, how to provide Internet
Protocol (IP) addresses to devices both manually and automatically and understand how IP addresses are calculated
and assigned, how the physical, data link, and network layers work together to provide end-to-end connectivity,
how to provide basic network diagnostics and troubleshooting including endpoints, networks, for both local and
remote scenarios, will teach foundations of security and about network and computer threats and attacks including
application, cyber, wireless, and mobile device attacks, and how to perform basic secure wireless configuration.
The course has many features to help students understand these concepts:
Course Outline
Listed below are the current set of modules and their associated competencies outlined for this course. Each
module is an integrated unit of learning that consists of content, activities and assessments that target a specific set
of competencies. The size of the module will depend on the depth of knowledge and skill needed to master the
competency.
1.3 Bandwidth and Throughput Explain the network transmission speed and capacity.
Module 2. Network Components, Types, and Explain network types, components, and connections.
Connections
2.1 Clients and Servers Explain the roles of clients and servers in a network.
Module 3. Wireless and Mobile Networks Configure mobile devices for wireless access.
3.1 Wireless Networks Describe the different types of networks used by cell phones and mobile devices.
3.2 Mobile Device Connectivity Configure mobile devices for wireless connectivity.
Module 4. Build a Home Network Configure an integrated wireless router and wireless client to connect securely to
the internet.
4.1 Home Network Basics Describe the components required to build a home network.
4.2 Network Technologies in the Home Describe wired and wireless network technologies.
4.4 Set Up a Home Router Configure wireless devices for secure communications.
Module 5. Communication Principles Explain the importance of standards and protocols in network communications.
5.3 Network Communication Models Compare the OSI and TCP/IP models.
Module 7. The Access Layer Explain how communication occurs on Ethernet networks.
7.1 Encapsulation and the Ethernet Frame Explain the process of encapsulation and Ethernet framing.
7.2 The Access Layer Explain how to improve network communication at the access layer.
8.2 The IPv4 Address Structure Explain how IPv4 addresses and subnets are used together.
Module 9. IPv4 and Network Segmentation Explain how IPv4 addresses are used in network communication and segmentation.
9.1 IPv4 Unicast, Broadcast, and Multicast Compare the characteristics and uses of the unicast, broadcast and multicast IPv4
addresses.
9.2 Types of IPv4 Addresses Explain public, private, and reserved IPv4 addresses.
9.3 Network Segmentation Explain how subnetting segments a network to enable better communication.
Module 10. IPv6 Addressing Formats and Explain features of IPv6 addressing.
Rules
11.1 Static and Dynamic Addressing Compare static and dynamic IPv4 addressing.
11.2 DHCPv4 Configuration Configure a DHCPv4 server to dynamically assign IPv4 addresses.
Module 12. Gateways to Other Networks Explain how routers connect networks together.
12.2 Network Address Translation Explain the purpose of Network Address Translation in small networks.
Module 13. The ARP Process Explain how ARP enables communication on a network.
13.1 MAC and IP Compare the roles of the MAC address and the IP address.
13.2 Broadcast Containment Explain why it is important to contain broadcasts within a network.
14.4 The Need for Routing Explain the need for routing.
Module 15. TCP and UDP Explain how clients access internet services.
15.1 TCP and UDP Compare TCP and UDP transport layer functions.
15.2 Port Numbers Explain how TCP and UDP use port numbers.
Module 16. Application Layer Services Explain the function of common application layer services.
16.1 The Client Server Relationship Explain client and server interaction.
Module 17. Network Testing Utilities Use various tools to test and troubleshoot network connectivity.
18.1 Reliable Networks Describe the four basic requirements of a reliable network.
18.2 Hierarchical Network Design Explain the function at each layer of the 3-layer network design model.
Module 19. Cloud and Virtualization Explain the characteristics of virtualization and cloud services.
19.1 Cloud and Cloud Services Explain the characteristics of clouds and cloud services.
Module 20. Number Systems Calculate numbers between decimal, binary, and hexadecimal systems.
20.1 Binary Number System Calculate numbers between decimal and binary systems
20.2 Hexadecimal Number System Calculate numbers between decimal and hexadecimal systems.
Module 21. Ethernet Switching Explain how Ethernet operates in a switched network.
21.1 Ethernet Explain the OSI model Layer 1 and Layer 2 functions in an Ethernet network.
21.2 Ethernet Frames Explain how the Ethernet sublayers are related to the frame fields.
21.3 Ethernet MAC Address Explain the types of Ethernet MAC addresses.
21.4 The MAC Address Table Explain how a switch builds its MAC address table and forwards frames.
Module 22. Network Layer Explain how routers use network layer protocols and services to enable end-to-end
connectivity.
22.1 Network Layer Characteristics Explain how the network layer uses IP protocols for reliable communications.
22.2 IPv4 Packet Explain the role of the major header fields in the IPv4 packet.
22.3 IPv6 Packet Explain the role of the major header fields in the IPv6 packet.
Module 23. IPv4 Address Structure Calculate an IPv4 subnetting scheme to efficiently segment a network.
23.1 IPv4 Address Structure Describe the structure of an IPv4 address including the network portion, the host
portion, and the subnet mask.
Module 24. Address Resolution Explain how ARP enables communication on a local area network.
Module 25. IP Addressing Services Explain how DNS and DHCP services operate.
Module 26. Transport Layer Compare the operations of transport layer protocols in supporting end-to-end
communication.
26.1 Transportation of Data Explain the purpose of the transport layer in managing the transportation of data in
end-to-end communication.
26.4 Port Numbers Explain how TCP and UDP use port numbers.
26.5 TCP Communication Process Explain how TCP session establishment and termination processes facilitate reliable
communication.
26.6 Reliability and Flow Control Explain how TCP protocol data units are transmitted and acknowledged to
guarantee delivery.
26.7 UDP Communication Describe the UDP client processes to establish communication with a server.
Module 27. The Cisco IOS Command Line Use the Cisco IOS.
27.1 IOS Navigation Use correct commands to navigate the Cisco IOS modes.
27.2 The Command Structure Explain how to navigate the Cisco IOS to configure network devices.
27.3 View Device Information Use show commands to monitor device operations.
Module 28. Build a Small Cisco Network Build a simple computer network using Cisco devices.
28.3 Secure the Devices Configure devices for secure remote management.
28.4 Configure the Default Gateway Configure devices to use the default gateway.
29.1 ICMP Messages Explain how ICMP is used to test network connectivity.
29.2 Ping and Traceroute Testing Use ping and traceroute utilities to test network connectivity.
Module 30. Physical Layer Explain how physical layer protocols, services, and network media support
communications across data networks.
30.1 Purpose of the Physical Layer Describe the purpose and functions of the physical layer in the network.
30.4 UTP Cabling Explain how UTP cable is used in Ethernet networks.
30.5 Fiber-Optic Cabling Describe fiber-optic cabling and its main advantages over other media.
Module 31. Data Link Layer Explain how media access control in the data link layer supports communication
across physical and logical networks.
31.2 Media Access Control Methods Explain how devices access a LAN in order to send frames.
Module 32. Routing at the Network Layer Explain how routers use network layer protocols and services to enable end-to-end
connectivity.
32.1 How a Host Routes Explain how network devices use routing tables to direct packets to a destination
network.
32.2 Routing Tables Explain the function of fields in the routing table of a router.
33.2 GUA and LLA Static Configuration Explain how to configure static global unicast and link-local IPv6 network addresses.
33.3 Dynamic Addressing for IPv6 GUAs Explain how to configure global unicast addresses dynamically.
33.4 Dynamic Addressing for IPv6 LLAs Configure link-local addresses dynamically.
Module 34. IPv6 Neighbor Discovery Explain how ND enables communication on a network.
34.1 Neighbor Discovery Operation Describe the operation of IPv6 neighbor discovery.
Module 35. Cisco Switches and Routers Describe Cisco routers and switches.
35.2 Switch Speeds and Forwarding Describe switch forwarding methods and port settings available on Layer 2 switch
Methods ports.
35.3 Switch Boot Process Describe the Cisco LAN switch boot process.
35.5 Router Boot Process Describe the Cisco router boot process.
Module 36. Troubleshoot Common Network Troubleshoot basic network connectivity issues.
Problems
36.1 The Troubleshooting Process Describe some of the approaches used to troubleshoot networks.
36.2 Physical Layer Problems Describe the process of detecting physical layer problems.
36.4 Common Internet Connectivity Issues Explain common internet connectivity problems.
36.5 Customer Support Explain how to use outside sources and internet resources for troubleshooting.
Module 37. Network Support Demonstrate effective troubleshooting methodologies and help desk best practices.
37.4 Troubleshoot Endpoint Connectivity Explain how to verify network connectivity in the operating systems of Linux, Mac,
Android, and Apple devices.
Module 38. Cybersecurity Threats, Explain common threats, vulnerabilities, and attacks on end points.
Vulnerabilities, and Attacks
38.1 Common Threats Explain the threats, vulnerabilities, and attacks that occur in the various domains.
38.2 Deception Describe the different deception methods used by attackers to deceive their
victims.
38.4 Wireless and Mobile Device Attacks Describe common types of wireless and mobile device attacks.
39.3 Defending Systems and Devices Explain cybersecurity processes and procedures that protect systems.
39.5 Firewalls and Host-Based Intrusion Explain how firewalls operate to filter traffic and recommend endpoint security
Prevention measures.
39.6 Secure Wireless Access Configure basic wireless security on a home router (WPAx).