Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-800-268-7737 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Network Administrator Essentials

New & Exclusive – Gain the essential skills you need in networking technologies for success as a network administrator.

GK# 6970

Course Overview

TOP

This course combines select topics from two of our most popular networking courses: Understanding Networking Fundamentals and TCP/IP Networking. In this course, you will learn how to configure a workstation to connect to a network, analyze network traffic, examine switch and router configurations, and perform basic IPv4 subnetting. In short, you will gain the essential knowledge and skills to configure, support, and troubleshoot a TCP/IP network.

Our expert instructor and hands-on labs will help prepare you for a career in network administration. In addition, this course will position you for more specialized courses in network security, wireless integration, VoIP, and product-specific training in Cisco, Avaya, and Microsoft.

Schedule

TOP
  • Delivery Format:
  • Date:
  • Location:
  • Access Period:

$

What You'll Learn

TOP
  • The roles of various devices in a TCP/IP network
  • Basics of layered network protocols and the two primary reference models: OSI and TCP/IP
  • Ethernet operations and the use of VLANs, including switch operations and the use of Spanning Tree as a method for eliminating broadcast storms on a switched network
  • Wi-Fi router configuration and operation on a SOHO network, including security, SSID, and Wi-Fi channels
  • Various IP addressing considerations, including binary to decimal conversion, dotted decimal notation, classful vs. classless addressing, private vs. public addresses, and the use of network masking
  • Basic subnetting using both fixed-length subnet masking (FLSM) and variable-length subnet masking (VLSM)
  • The operation and configuration of routers, including the function and characteristics of various routing protocols (RIP, EIGRP, OSPF, and BGP)
  • Various WAN technologies, including circuit switched solutions such as leased lines and packet switched solutions such as Carrier Ethernet, and determine the best WAN connectivity solution for a given corporate network
  • Operation of various TCP/IP protocols on a network, including connectionless and connection-oriented communications using UDP and TCP, translation between private and public addresses using NAT, and support protocols such as ARP, DNS, and DHCP
  • Analysis of multicasting, Voice over IP, e-mail, FTP, Telnet, and other application layer traffic
  • Use of a protocol analyzer and other tools to troubleshoot problems at each layer of a TCP/IP network
  • Basic network security implementations, including security protocols, firewall configurations, and common security threats and mitigation techniques
  • Functions of IPv6 and its related protocols
  • Current and emerging trends in network technology

Outline

TOP
Viewing outline for:

On-Demand Outline

Introduction to Networking

What is computer networking?

Building blocks of networks

Network infrastructure

  • Media
  • Switches and access points
  • Routers

Network services

Network types

Network topologies

Locating network resources

  • Peer-to-peer networking
  • Client-server networking

Virtual computing

Cloud computing

  • Cloud computing services
  • Cloud computing architectures

Network Standards

Standards organizations

Example standards development process

OSI networking model

TCP/IP model

TCP/IP Overview

Origins of TCP and IP

ARPANET requirements documents

Collaborative network requirements

Layered approach to networking

  • Actual flow
  • Effective flow

Documentation and RFCs

TCP/IP Numbering Systems

Introduction to numbering systems

Positional numbering system basics

Converting between numbering systems

  • Binary/hexadecimal to decimal
  • Decimal to binary/hexadecimal
  • Binary to hexadecimal
  • Hexadecimal to binary

Counting

Guidelines for determining the base of a number

Physical Network Connections

UTP cabling

  • UTP standards and categories
  • UTP system components
  • RJ-45 connections
  • Half and full duplex operations
  • Crossover vs. straight-through

Structured cabling systems

  • Designing cabling systems
  • Installing cabling systems
  • Examining network cabling
  • Testing and certifying cabling systems

Fiber optic cabling

  • Fiber cable types
  • Fiber cabling components
  • Fiber optic testing

Wireless connections

  • Wireless connections
  • Wireless components
  • Wireless considerations

Ethernet LANs

NIC and MAC addresses

Ethernet standards

Ethernet frame structures

Ethernet equipment types

Ethernet connectors

Ethernet performance issues

Ethernet Switching

Benefits of switching

Switch installations

Switch operations

Spanning Tree Protocol

  • STP operations
  • Rapid Spanning Tree Protocol
  • STP self-healing capability

Configuring switches

  • Port security
  • Power over Ethernet
  • Port mirroring

VLANs

Troubleshooting

Wireless LANs

WLAN standards: IEEE & Wi-Fi Alliance

WLAN components

  • Wi-Fi client hardware and software
  • Access points
  • WLAN controllers
  • SSID

Wi-Fi channels

Wi-Fi speeds

WLAN security

WLAN performance issues

IPv4 Addressing

Logical addressing

IPv4 address structure

  • Dotted decimal notation
  • Classful addressing (Class A, B, C, D, E)
  • Reserved addresses
  • Network masking

Subnetting classful address blocks

Private addressing

Network Address Translation (NAT)

Variable-Length Subnet Masking (VLSM)

Classless Inter-Domain Routing

  • CIDR prefix notation

IPv4 Subnetting with FLSM

Purpose of subnetting

Subnet communications

Subnet mask rules

Calculating subnets

  • Four key addresses
  • Implementing the plan
  • Subnetting case study

Variable-length subnet masking

IPv4 Subnetting with VLSM

IPv4 Subnets

  • FLSM vs. VLSM

Calculating VLSM subnet values

  • Determining the masks
  • Laying out subnets and their addresses

Planning for growth

  • Sequential allocation errors
  • Future subnets

CIDR and VLSM

Address Resolution Protocol

Address mapping

ARP restrictions

ARP cache

ARP commands

ARP message fields

Additional ARP capabilities

Multicasting

What is multicasting?

  • Uses for multicasting
  • Reserved IP multicast addresses

Internet Group Management Protocol

  • Joining multicast groups
  • Multicast routing

Mapping Class D IP address to an Ethernet multicast address

How does it all work together?

Internet Protocol Version 4

Internet Protocol overview

  • Self-healing networks

IPv4 header

  • IPv4 header layout
  • Differentiated services
  • Explicit congestion notification
  • Total IP length
  • Identification
  • Fragmentation
  • Time to live
  • Protocol
  • IPv4 header checksum
  • IPv4 Addresses
  • IPv4 Options

Routing

Routing overview

Logical segmentation

Static vs. dynamic routing

Routing decision process

Routing metrics

Routing protocol operation

Common routing protocols

  • Routing Information Protocol (RIP)
  • Open Shortest Path First (OSPF)
  • Enhanced Interior Gateway Routing Protocol (EIGRP)
  • Border Gateway Protocol (BGP)

Configuring routers

IP Routing

Routing function

IP routing algorithm

Types of routing protocols

Choosing the best path

Routing tables

Routing Information Protocol

Open Shortest Path First

Enhanced Interior Gateway Routing Protocol

Border Gateway Protocol

Wide Area Networks

Evolution of WAN technologies

Sources of WAN solutions

Circuit-switched vs. packet-switched

Circuit-switched WAN solutions

  • TDM circuits
  • SONET
  • Optical Transport Networks

Packet-switched WAN solutions

  • Multiprotocol Label Switching
  • Carrier Ethernet networks

Internet WANs

Autoconfiguration

Manual vs. automatic assignments

Historical solutions

DHCP new lease acquisition process

  • DHCP discover
  • DHCP offer
  • DHCP request
  • DHCP acknowledgment

DHCP scopes and options

  • IP lease renewal

DHCP in a routed network

Multiple DHCP servers

Troubleshooting DHCP

  • The ipconfig /release command
  • The ipconfig /renew command

Domain Name System

Name and number organizations

The DNS name space

  • Generic top-level domains
  • Sponsored top-level domains

DNS name servers

  • Primary and secondary servers

A distributed service

DNS name resolution process

DNS message format

DNS resource records

Reverse lookup

Dynamic DNS

Troubleshooting DNS

ICMP Diagnostic and Error Reports

ICMP basics

ICMP message destinations

  • Silent discard vs. informed discard

ICMP message layout

ICMP message types

  • Echo request and echo reply
  • Destination unreachable
  • ICMP redirect
  • Time exceeded

UDP Sessions

Host-to-host layer categories

  • Connectionless protocols
  • Connection-oriented protocols
  • Low overhead vs. reliability

UDP header layout

UDP/TCP ports

UDP ports and sockets

  • UDP application port examples

Common UDP Applications

Trivial File Transfer Protocol

  • TFTP transfer process
  • TFTP operation codes

Simple Network Management Protocol

  • SNMP manager model
  • SNMP agent model
  • SNMP commands
  • Management information base

Remote Network Monitoring

TCP Sessions

TCP overview

  • Reliable transport services
  • TCP characteristics

TCP header

  • Source and destination ports
  • Sequence number
  • Acknowledgment number
  • Header length
  • Session flags
  • Window size
  • TCP checksum
  • Urgent pointer
  • TCP options
  • Maximum segment size and window size

TCP three-step handshake

Four-step session shutdown

  • Normal end
  • reset

TCP congestion management

Common TCP Applications

Telnet

  • Telnet negotiations
  • Telnet protocol options

File Transfer Protocol

  • FTP commands
  • FTP response codes

E-mail

  • Simple Mail Transfer Protocol
  • Post Office Protocol Version 3
  • Internet Message Access Protocol Version 4

World Wide Web

  • Uniform Resource Locator
  • HTTP requests and responses

Communications Protocols

Electronic mail

  • Sending e-mail with SMTP
  • Retrieving e-mail with POP
  • Retrieving e-mail with IMAP

Instant messaging

  • SIP for Instant Messaging and Presence Leveraging Extensions
  • Extensible Messaging and Presence Protocol

Voice over IP

  • Session Initiation Protocol
  • Real-Time Transport Protocol
  • H.323 and MGCP

Unified communications

VoIP Implementation

Benefits of VoIP

TCP/IP protocols used by VoIP

VoIP system components

VoIP protocols

  • Session Initiation Protocol (SIP)
  • Session Description Protocol (SDP)
  • Real-Time Transport Protocol (RTP)

VoIP codecs

Network Security

Security threats

  • Malware
  • Social engineering
  • Unsecured networks
  • Network attacks
  • Crackers and hackers

Threat mitigation

  • Anti-malware
  • Authentication
  • Encryption
  • Virtual private networks
  • Firewalls and perimeter networks
  • Intrusion detection systems
  • Security training and education

Developing a security plan

TCP/IP Security

TCP/IP security concerns

The CIA triad

TCP/IP vulnerabilities

  • Network access layer
  • Internet layer
  • Transport layer
  • Application layer

TCP/IP security protocols

Network access security tools

Virtual private networks

TCP/IP security protocols

  • IP Security (IPSec)
  • TLS and SSL
  • DNSSEC
  • Secure Shell protocol

Internet Protocol Version 6

IPv6 addressing

  • IPv6 address categories
  • Global unicast address format
  • Interface ID structure
  • IPv6 address types

IPv6 header layout

  • Extension headers

ICMPv6

IPv6 DNS operation

  • IPv6 DNS records

IPv6 routing services and protocols

  • Static routing
  • RIPng
  • OSPFv3
  • MP-BGP
  • EIGRP for IPv6

Internet2

Emerging Technologies

Improved wireless technologies

Enterprise mobility

Internet of Things

Software Defined Networks

  • Keeping up with new technologies

Labs

TOP
Viewing labs for:

On-Demand Labs

Lab 1: TCP/IP Math

  • Decimal Equivalents for Binary Sequences
  • Converting Binary Numbers to Decimal
  • Converting Decimal Numbers to Binary
  • Converting Hexadecimal Numbers to Decimal
  • Converting Decimal Numbers to Hexadecimal

Lab 2: Connect and Configure a Workstation

  • Modify your system configuration
  • Identify IP address configuration
  • Verify Connectivity

Lab 3: Protocol Analysis with Wireshark

  • Explore Wireshark
  • Customize the Wireshark appearance
  • Set a basic filter
  • Examine a capture file

Lab 4: Examine Current Switch Configurations

  • Use a command prompt.
  • View the switch forwarding table

Lab 5: Examine Spanning Tree

  • Examine normal Spanning Tree operation
  • Examine normal Spanning Tree after a connection failure

Lab 6: Configure a Wi-Fi router

  • Configure a Wi-Fi router

Lab 7: IP Addressing and Fixed-Length Subnetting

  • Essential IP Addressing and Subnetting
  • Fixed‐Length Subnet Masking

Lab 8: Create a Subnet Plan for a Small Network

  • Select masks for various problems
  • Create a subnet plan
  • Label the network diagram

Lab 9: Variable-Length Subnetting

  • Develop a VLSM Addressing Plan

Lab 10: ARP Analysis

  • View Your ARP Cache
  • Manually Change ARP Cache Entries
  • View ARP with the Protocol Analyzer

Lab 11: Multicasting

  • Capture a RIPv2 Multicast Frame
  • Capture an STP Multicast Frame
  • Capture a PIMv2 Multicast Frame
  • Capture an IGMPv2 Multicast Frame

Lab 12: Identify Network Access Problems

  • Identify Network Access Problems

Lab 13: IP Header Analysis

  • Capture and Analyze an IP Datagram
  • Manipulate Time-to-Live
  • The Fragmented IP Datagram

Lab 14: IP Header Processing

  • Review Important IP Protocol Information

Lab 15: Examine Router Configurations

  • Add routers to the network
  • Convert your workstation to DHCP for address assignment
  • View result of a DHCP failure
  • View DHCP configuration
  • Move your workstation to a specific switch
  • Examine router information

Lab 16: IP Routing

  • Evaluate Local Routing Table
  • Trace the Route through the Network
  • View the Routing Table on a Virtual Router
  • View Routing Updates

Lab 17: Use tracert to Identify Network Problems

  • Analyze tracert Results

Lab 18: Perform a Live tracert

  • Perform a Live tracert

Lab 19: Recognize Application of Different WAN Technologies

  • Recommend WAN solution based on research

Lab 20: DHCP Process Analysis

  • Configure Your System to Use DHCP
  • Release and Reacquire an IP Address
  • Analyze the Four-Step DHCP Process

Lab 21: DNS Analysis

  • Create a DNS Query
  • View a DNS Query
  • View a DNS Response
  • View a Zone Transfer Using nslookup and Wireshark

Lab 22: ICMP Analysis

  • View ICMP Echo Packets
  • Examine Large ICMP Frames
  • Analyze ICMP Variation Reports
  • Examine an ICMP Redirect Message

Lab 23: UDP Transactions

  • Capture and Analyze RIPv2
  • Capture and Analyze DNS
  • Capture and Analyze TFTP

Lab 24: UDP Application Analysis

  • Analyze a TFTP Session
  • Analyze a UDP-Based Multicast Process

Lab 25: TCP Analysis

  • Capture and Analyze a Normal TCP Transaction
  • Analyze a Normal TCP Transaction Termination
  • Analyze an Abnormal TCP Transaction Termination

Lab 26: Identify Transport Layer Problems

  • Troubleshoot UDP
  • Troubleshoot TCP

Lab 27: TCP Application Analysis

  • Analyze a Telnet Session
  • Analyze an FTP Session
  • Analyze an HTTP Session
  • Examine How File Size Impacts Network Performance

Lab 28: Examine an E-mail Message with Wireshark

  • View an SMTP session
  • View a POP3 session

Lab 29: Examine an Instant Message Exchange with Wireshark

  • Examine an instant message exchange

Lab 30: VoIP Protocol Analysis

  • Analyze SIP Voice Connection Parameters

Lab 31: Test Firewall

  • Apply and test filters

Lab 32: Research Anti-Malware

  • Research AV-Test.org
  • Research anti-malware products
  • Evaluate your current solution

Lab 33: Secure Shell

  • Access Your Router via SSH
  • Access Your Router via SSH and Telnet
  • Block Telnet and Only Allow SSH Access to Routers

Lab 34: IPv6 Protocol Analysis

  • Set Up Your Workstation for IPv6
  • Verify Your IPv6 Configuration
  • Use Ping for IPv6
  • Use nslookup with IPv6

Lab 35: Research MDM Software

  • Research MDM software

Prerequisites

TOP

Network Administrator Essentials is a foundational course in networking concepts and technologies and does not require that you have any understanding of networking before you start this course of study. However, you should be familiar with the configuration and operation of computer systems prior to taking this course. If you currently do not have this basic understanding of computers, we recommend that you complete our CompTIA IT Fundamentals Certification course before you start Network Administrator Essentials.

Who Should Attend

TOP

New IT professionals who want to learn the basics of a structured, layered approach to networking, including the fundamentals of network hardware and components, network protocols, IP addressing and subnetting, and various tools used in network monitoring and troubleshooting. Ideal candidates include:

  • Entry-level and newly hired technical professionals, including PC support, help desk, and networking professionals
  • Sales and marketing professionals looking to increase their ability to communicate with technical professionals and increase sales
  • Technical professionals looking to strengthen core skills before pursuing advanced topics and certifications

Follow-On Courses

TOP

Upon completing Network Administrator Essentials, you will be well-positioned to pursue specializations in different networking technologies. Global Knowledge offers a number of courses that can help you attain your long-term learning and career goals. You can delve deeper into network administration through our Troubleshooting TCP/IP Networks with Wireshark course or our Cisco certification tracks. Or you can branch into specialized fields, such as Cybersecurity, Wi-Fi administration, or VoIP. Whatever your ultimate career goals, Global Knowledge is here to help!

Course Delivery

This course is available in the following formats:

On-Demand

Train at your own pace with 24/7 access to courses that help you acquire must-have technology skills.

Duration: 71 hours

Request this course in a different delivery format.
Enroll