Introduction <br> CHAPTER 1: Network Technologies, Topologies, and Types <br>Wired and Wireless Network Topologies <br> Bus Topology <br> Ring Topology <br> Star Topology (Hub-and-Spoke) <br> Mesh Topology <br> Hybrid Topology <br> Bringing Wireless to a Topology <br> Infrastructure Wireless Topology <br> Ad Hoc Wireless Topology <br> Wireless Mesh Topology <br>Network Types and Characteristics <br> To Server or Not <br> LANs <br> WLANs <br> WANs <br> MANs <br> CANs <br> SANs <br> PANs <br> SDWANs <br> MPLS <br> mGRE <br>Network Links and Concepts <br> DSL Internet Access <br> Cable Broadband <br> The Public Switched Telephone Network <br> Leased Lines <br> T3 Lines <br> Metro-Optical <br> Satellite Internet Access <br> Termination Points <br> Demarc, Demarc Extension, and Smart Jacks <br> CSUs/DSUs <br> Verify Wiring Installation and Termination <br> Virtual Networking <br>What's Next? <br> CHAPTER 2: Models, Ports, Protocols, and Network Services <br>The OSI Networking Model <br> The OSI Seven-Layer Model <br> Physical Layer (Layer 1) <br> Data Link Layer (Layer 2) <br> Network Layer (Layer 3) <br> Transport Layer (Layer 4) <br> Session Layer (Layer 5) <br> Presentation Layer (Layer 6) <br> Application Layer (Layer 7) <br> OSI Model Summary <br> Comparing OSI to the Four-Layer TCP/IP Model <br> Identifying the OSI Layers at Which Various Network Components Operate <br> Data Encapsulation/Decapsulation and OSI <br>Ports and Protocols <br> Connection-Oriented Protocols Versus Connectionless Protocols <br> Internet Protocol <br> Transmission Control Protocol <br> How TCP Works <br> User Datagram Protocol <br> Internet Control Message Protocol <br> IPSec <br> Generic Routing Encapsulation <br> File Transfer Protocol <br> Secure Shell <br> Secure File Transfer Protocol <br> Telnet <br> Simple Mail Transfer Protocol <br> Domain Name System (DNS) <br> Dynamic Host Configuration Protocol (DHCP) <br> Trivial File Transfer Protocol <br> Hypertext Transfer Protocol <br> Network Time Protocol (NTP) <br> Post Office Protocol Version 3/Internet Message Access Protocol Version 4 <br> Simple Network Management Protocol <br> Components of SNMP <br> SNMP Management Systems <br> SNMP Agents <br> Management Information Bases <br> SNMP Communities <br> SNMPv3 <br> Lightweight Directory Access Protocol <br> Hypertext Transfer Protocol Secure <br> Server Message Block <br> Syslog <br> SMTP TLS <br> LDAPS <br> IMAP over SSL <br> POP3 over SSL <br> SQL, SQLnet, and MySQL <br> Remote Desktop Protocol <br> Session Initiation Protocol <br> Understanding Port Functions <br>Network Services <br> Domain Name Service (DNS) <br> The DNS Namespace <br> Types of DNS Entries <br> DNS Records <br> DNS in a Practical Implementation <br> Dynamic Host Configuration Protocol <br> The DHCP Process <br> DHCP and DNS Suffixes <br> DHCP Relays and IP Helpers <br> Network Time Protocol <br>What's Next? <br> CHAPTER 3: Addressing, Routing, and Switching <br>IP Addressing <br> IPv4 <br> IP Address Classes <br> Subnet Mask Assignment <br> Subnetting <br> Identifying the Differences Between IPv4 Public and Private Networks <br> Private Address Ranges <br> Classless Interdomain Routing <br> Default Gateways <br> Virtual IP <br> IPv4 Address Types <br> Unicast Address <br> Broadcast Address <br> Multicast <br> IPv6 Addressing <br> Where Have All the IPv4 Addresses Gone? <br> Identifying IPv6 Addresses <br> IPv6 Address Types <br> Global Unicast Addresses <br> Link-Local Addresses <br> Site-Local Addresses <br> Neighbor Discovery <br> Comparing IPv4 and IPv6 Addressing <br> Assigning IP Addresses <br> Static Addressing <br> Dynamic Addressing <br> BOOT Protocol (BOOTP) <br> Automatic Private IP Addressing <br> Identifying MAC Addresses <br> NAT and PAT <br> NAT <br> PAT <br> SNAT <br> DNAT <br>Managing Routing and Switching <br> The Default Gateway <br> Routing Tables <br> Static Routing <br> Default Route <br> Switching Methods <br> Packet Switching <br> Circuit Switching <br> Comparing Switching Methods <br> Dynamic Routing <br> Distance-Vector Routing <br> Link-State Routing <br> Hybrid Routing Protocols <br> Network Traffic <br> Routing Metrics <br> Virtual Local-Area Networks <br> VLAN Membership <br> VLAN Segmentation <br> The Spanning Tree Protocol <br> Interface Configuration and Switch Management <br> MDI-X <br> Trunking <br> Port Mirroring <br> Port Authentication <br> Power over Ethernet (PoE and PoE+) <br> MAC Address Table <br> Switch Management <br> Managed and Unmanaged <br> Quality of Service <br> Traffic Shaping <br> Access Control Lists <br> ARP and RARP <br>What's Next? <br> CHAPTER 4: Network Implementations <br>Common Networking Devices <br> Firewall <br> IDS/IPS <br> Router <br> Switch <br> Hub and Switch Cabling <br> Multilayer Switch <br> Hub <br> Bridge <br> DSL and Cable Modems <br> Access Point <br> Media Converter <br> Voice Gateway <br> Repeater <br> Wireless LAN Controller <br> Load Balancer <br> Proxy Server <br> VPN Concentrators and Headends <br> Networked Devices <br>Networking Architecture <br> Three-Tiered Architecture <br> Core Layer <br> Distribution/Aggregation Layer <br> Access/Edge Layer <br> Software-Defined Networking <br> Application Layer <br> Control Layer <br> Infrastructure Layer <br> Management Plane <br> Spine and Leaf <br> Traffic Flows <br> Datacenter Location Types <br> Storage-Area Networks <br> iSCSI <br> Fibre Channel and FCoE <br> Network-Attached Storage <br>What's Next? <br> CHAPTER 5: Cabling Solutions and Issues <br>General Media Considerations <br> Broadband Versus Baseband Transmissions <br> Simplex, Half-Duplex, and Full-Duplex Modes <br> Data Transmission Rates <br> Types of Network Media <br> Twisted-Pair Cabling (Copper) <br> Coaxial Cables <br> Twinaxial Cables <br> Fiber-Optic Cables <br> Plenum Versus PVC Cables <br> Types of Media Connectors <br> BNC Connectors <br> RJ-11 Connectors <br> RJ-45 Connectors <br> F-Type Connectors and RG-59 and RG-6 Cables <br> Fiber Connectors <br> Transceivers <br> Media Couplers/Converters <br> TIA/EIA 568A and 568B Wiring Standards <br> Straight-Through Versus Crossover Cables <br> Rollover and Loopback Cables <br> Components of Wiring Distribution <br> Network Cross-Connects <br> Horizontal Cabling <br> Vertical Cables <br> Patch Panels <br> Fiber Distribution Panels <br> 66 and 110 Blocks (T568A, T568B) <br> MDF and IDF Wiring Closets <br> Ethernet Copper and Fiber Standards <br> 10BASE-T <br> 100BASE-TX <br> 1000BASE-T <br> 10GBASE-T <br> 40GBASE-T <br> 1000BASE-LX and 1000BASE-SX <br> 10GBASE-LR and 10GBASE-SR <br> Multiplexing Options <br>Troubleshooting Common Cable Connectivity Issues <br>Limitations, Considerations, and Issues <br> Throughput, Speed, and Distance <br> Cabling Specifications/Limitations <br> Cabling Considerations <br> Cabling Applications <br> Attenuation and dB Loss <br> Interference <br> Incorrect Pinout <br> Bad Ports <br> Open/Short <br> LED Status Indicators <br> Incorrect Transceivers <br> Duplexing Issues <br> TX/RX Reversed <br> Dirty Optical Cables <br>Common Tools <br> Cable Crimpers, Strippers, and Snips/Cutters <br> Punchdown Tools <br> Tone Generator <br> Loopback Adapter <br> OTDR <br> Multimeter <br> Cable Tester <br> Wire Map <br> Tap <br> Fusion Splicer <br> Spectrum Analyzer <br> Fiber Light Meter <br>What's Next? <br> CHAPTER 6: Wireless Solutions and Issues <br>Understanding Wireless Basics <br> Wireless Channels and Frequencies <br> Cellular Technology Access <br> Speed, Distance, and Bandwidth <br> Channel Bonding <br> MIMO/MU-MIMO/Directional/Omnidirectional <br> Antenna Ratings <br> Antenna Coverage <br> Establishing Communications Between Wireless Devices <br> Configuring the Wireless Connection <br>Troubleshooting Wireless Issues <br> Site Surveys <br> Factors Affecting Wireless Signals <br> Interference <br> Reflection, Refraction, and Absorption <br>Troubleshooting AP Coverage <br>What's Next? <br> CHAPTER 7: Cloud Computing Concepts and Options <br>Cloud Concepts <br> Service Models <br> Software as a Service <br> Platform as a Service <br> Infrastructure as a Service <br> Desktop as a Service <br> Deployment Models <br> Private Cloud <br> Public Cloud <br> Hybrid and Community Clouds <br> Infrastructure as Code <br> Connectivity Options <br> Multitenancy <br> Elasticity <br> Scalability <br> Security Implications <br> The Relationship Between Resources <br>What's Next? <br> CHAPTER 8: Network Operations <br>Organizational Documents and Policies <br> Wiring and Port Locations <br> Troubleshooting Using Wiring Schematics <br> Physical and Logical Network Diagrams <br> Baseline Configurations <br> Policies, Procedures, Configurations, and Regulations <br> Policies <br> Password-Related Policies <br> Procedures <br> Change Management Documentation <br> Configuration Documentation <br> Regulations <br> Labeling <br>High Availability and Disaster Recovery <br> Backups <br> Full Backups <br> Differential Backups <br> Incremental Backups <br> Snapshots <br> Backup Best Practices <br> Using Uninterruptible Power Supplies <br> Why Use a UPS? <br> Power Threats <br> Beyond the UPS <br> Cold, Warm, Hot, and Cloud Sites <br> High Availability and Recovery Concepts <br> Active-Active Versus Active-Passive <br>Monitoring Network Performance <br> Common Performance Metrics <br> SNMP Monitors <br> Management Information Base (MIB) <br> Network Performance, Load, and Stress Testing <br> Performance Tests <br> Load Tests and Send/Receive Traffic <br> Stress Tests <br> Performance Metrics <br> Network Device Logs <br> Security Logs <br> Application Log <br> System Logs <br> History Logs <br> Log Management <br> Patch Management <br> Environmental Factors <br>What's Next? <br> CHAPTER 9: Network Security <br>Common Security Concepts <br> Access Control <br> Mandatory Access Control <br> Discretionary Access Control <br> Rule-Based Access Control <br> Role-Based Access Control <br> Defense in Depth <br> Network Segmentation <br> Screened Subnet <br> Separation of Duties <br> Honeypots <br> RADIUS and TACACS+ <br> Kerberos Authentication <br> Local Authentication <br> Lightweight Directory Access Protocol <br> Using Certificates <br> Auditing and Logging <br> Multifactor Authentication Factors <br> Additional Access Control Methods <br> 802.1X <br> Extensible Authentication Protocol (EAP) <br> Network Access Control (NAC) <br> MAC Filtering <br> Risk Management <br> Penetration Testing <br> Security Information and Event Management <br>Common Networking Attacks <br> Denial-of-Service and Distributed Denial-of-Service Attacks <br> Types of DoS Attacks <br> Other Common Attacks <br> Social Engineering <br> Logic Bomb <br> Rogue DHCP <br> Rogue Access Points and Evil Twins <br> Advertising Wireless Weaknesses <br> Phishing <br> Ransomware <br> DNS Poisoning <br> ARP Cache Poisoning <br> Spoofing <br> Deauthentication <br> Brute Force <br> On-Path Attack <br> VLAN Hopping <br> ARP Spoofing <br> Vulnerabilities and Prevention <br>Network Hardening and Physical Security <br> Disposing of Assets <br> Implementing Physical Security <br> Lock and Key <br> Swipe Card and PIN Access <br> Biometrics <br> Two-Factor and Multifactor Authentication <br> Secured Versus Unsecured Protocols <br> Hardening Best Practices <br> Wireless Security <br> MAC Filtering <br> Antenna Placement and Power Levels <br> Isolation <br> Preshared Keys <br> Geofencing <br> Captive Portal <br> IoT Access Considerations <br>Remote-Access Methods <br> Remote File Access <br> VPNs <br> Components of the VPN Connection <br> VPN Connection Types <br> VPN Pros and Cons <br> IPSec <br> SSL/TLS/DTLS <br> Site-to-Site and Client-to-Site <br> Virtual Desktops <br> HTTPS/Management URL <br> Authentication and Authorization Considerations <br> Out-of-Band Management <br>What's Next? <br> CHAPTER 10: Network Troubleshooting <br>Troubleshooting Steps and Procedures <br> Identify the Problem <br> Identify Symptoms <br> Determine Whether Anything Has Changed <br> Duplicate the Problem if Possible <br> Approach Multiple Problems Individually <br> Establish a Theory of Probable Cause <br> Test the Theory to Determine the Cause <br> Establish a Plan of Action <br> Implement the Solution or Escalate <br> Determine Whether Escalation Is Necessary <br> Verify Full System Functionality <br> Document Findings, Actions, Outcomes, and Lessons <br>Software Troubleshooting Tools <br> Wi-Fi Analyzer <br> Protocol Analyzer <br> Bandwidth Speed Tester <br> Port Scanner <br> iperf <br> NetFlow Analyzer <br> TFTP Server <br> Terminal Emulator <br> IP Scanner <br> Command-Line Tools <br> The Trace Route Utility (tracert/traceroute) <br> ping <br> The Destination Host Unreachable Message <br> The Request Timed Out Message <br> The Unknown Host Message <br> The Expired TTL Message <br> Troubleshooting with ping <br> hostname <br> ARP <br> arp ping <br> The netstat Command <br> netstat -e <br> netstat -a <br> netstat -r <br> netstat -s <br> telnet <br> ipconfig <br> ifconfig <br> nslookup <br> dig <br> The tcpdump Command <br> The route Utility <br> nmap <br> Basic Network Platform Commands <br>Troubleshooting General Networking Issues <br> Common Considerations <br> Common Problems to Be Aware Of <br> Collisions <br> Broadcast Storm <br> Multicast Flooding <br> Asymmetrical Routing <br> Switching Loops <br> Routing Loops <br> Missing Route <br> Low Optical Link Budget <br> Incorrect VLAN <br> DNS Issues <br> Incorrect Gateway <br> Incorrect Subnet Mask <br> Duplicate or Incorrect IP Address <br> Duplicate MAC Addresses <br> Expired IP Address <br> Rogue DHCP Server <br> Certificate Issues <br> NTP Issues/Incorrect Time <br> DHCP Scope Exhaustion <br> Blocked Ports, Services, or Addresses <br> Incorrect Firewall Settings <br> Incorrect ACL Settings <br> Unresponsive Service <br> BYOD Challenges <br> Licensed Feature Issues <br> Hardware Failure <br> Network Performance Issues <br>What's Next? <br>Glossary <br> <br>