Networking and Security Fundamentals
Provided by QA
Overview
This 5 Day course provides an overview of the fundamentals of Networking and Security in Information Technology Networked environments. The first three days cover the Networking concepts, with the remaining two days covering Security.
Target Audience
This course is designed for those with no Network or Security field experience. Those that may be considering a career in the Networking or Security areas would find this knowledge beneficial, before moving on to more detailed study and certifications.
+
Prerequisites
This is an introductory level course so prior knowledge of the course content is not required, but experience of the fundamentals of computing and computer hardware would be desirable. Knowledge of configuring a computers; settings and accessing the command line tools would be useful, but not essential.
+
Delegates will learn how to
This course is designed to introduce the core concepts underlying how computers communicate, including the configuration settings required, the hardware required and how it operates. It includes cloud-based services that many networks and businesses are coming to rely on. The Security section will introduce core concepts, terminology and implementation of Security in the areas of the computer itself and the network it;s connected to.
+
Outline
Networking Fundamentals
Ch 1 : OSI Model Overview
Ch 11 : Security Concepts
This 5 Day course provides an overview of the fundamentals of Networking and Security in Information Technology Networked environments. The first three days cover the Networking concepts, with the remaining two days covering Security.
Target Audience
This course is designed for those with no Network or Security field experience. Those that may be considering a career in the Networking or Security areas would find this knowledge beneficial, before moving on to more detailed study and certifications.
+
Prerequisites
This is an introductory level course so prior knowledge of the course content is not required, but experience of the fundamentals of computing and computer hardware would be desirable. Knowledge of configuring a computers; settings and accessing the command line tools would be useful, but not essential.
+
Delegates will learn how to
This course is designed to introduce the core concepts underlying how computers communicate, including the configuration settings required, the hardware required and how it operates. It includes cloud-based services that many networks and businesses are coming to rely on. The Security section will introduce core concepts, terminology and implementation of Security in the areas of the computer itself and the network it;s connected to.
+
Outline
Networking Fundamentals
Ch 1 : OSI Model Overview
- OSI Model
- TCP/IP Model
- Types of Network
- Topology
- Media Access
- Wireless Connectivity
- Lan Media Types
- Network Interface Cards
- MAC Address
- IP Address
- Explain the Host to Host Layer function
- Explain Transmission Control Protocol (TCP) concepts
- Describe the Transmission Control Protocol
- Describe the User Datagram Protocol (UDP)
- Describe the differences between TCP and UDP
- Binary & Hexadecimal
- IP Addresses
- Classful & Classless Addressing
- Subnetting
- Public & Private Addresses
- NAT
- Describe routing principles
- Explain Static and Dynamic routing
- Explain Routing Information Protocol
- Explain Open Shortest Path First
- Describe IPv6 as a Protocol
- Describe IPv6 Address Types
- Describe IPv6 Address Compression
- Describe DHCP
- Describe DNS
- Describe Email
- Describe Web Services
- Describe Active Directory
- Describe Virtualisation
- Describe Containerisation
- Describe XaaS Terminology
- Describe Cloud Technology
- Describe Packet Switching vs Circuit Switching
- Describe current WAN Technologies
Ch 11 : Security Concepts
- CIA Triad
- AAA Triad
- Uses of Cryptography
- Cryptography Terminology
- Symmetric & Asymmetric Encryption
- Data Encryption
- Mobile Device Security
- Transport Encryption
- Wired Security
- Wireless (Wi-Fi) Security
- Accounts
- File System Security
- Malware
- NTFS
- EFS
- Bitlocker
- Understanding Malware
- Preventing Infection
- Removing Malware
- Firewall
- VLAN
- IDS / IPS
- Perimeter Network (formerly DMZ)
- Physical Security
- Detection Systems
- Disposal of Paper Documents
- Disposal of Data
- Power Supply Issues
Enquire
Start date | Location / delivery | |
---|---|---|
10 Mar 2025 | QA On-Line Virtual Centre, Virtual | Book now |
01132207150
01132207150