Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Page Title Page Copyright Page Dedication Contents Preface Acknowledgments Introduction 1 Basic Network Concepts
Identifying Characteristics of a Network
Servers, Workstations, and Hosts WANs, LANs, and MANs Types of Networks Internet, Intranet, and Extranet
Identifying Network Topologies
Bus Topologies Star Topologies Mesh Topologies Ring Topologies Hybrid Topologies Wireless Topologies Point-to-Point and Point-to-Multipoint Segments and Backbones
Network Media and Connectors
Coaxial Cable Twisted-Pair Cable Exercise 1-1: Crimping a Category 5 Cable Fiber-Optic Cable Connector Types Networking over Power Lines Media Converters
Access Methods
CSMA/CD CSMA/CA Token Passing Modulation Techniques Multiplexing and De-multiplexing Bit Rates vs. Baud Rate
Network Architectures
Baseband and Broadband Ethernet Token Ring FDDI Exercise 1-2: Identifying the Different Network Architectures
Network Operating Systems
Windows Servers Exercise 1-3: Installing DNS on a Windows Server UNIX/Linux Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers
2 Network Protocols and Standards
Network Protocols
NetBEUI What Is NetBIOS? IPX/SPX AppleTalk TCP/IP Routable vs. Nonroutable Protocols
The OSI Model
Layer 7: The Application Layer Layer 6: The Presentation Layer Layer 5: The Session Layer Layer 4: The Transport Layer Layer 3: The Network Layer Layer 2: The Data Link Layer Layer 1: The Physical Layer Data Encapsulation Exercise 2-1: Mixing and Matching OSI Model Definitions Protocols and the OSI Layers Exercise 2-2: Viewing Protocol Information with Network Monitor Exercise 2-3: Analyzing Network Traffic
802 Project Standards
IEEE 802 Categories Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers
3 Networking Components
Network Interface Cards
Transceivers Exercise 3-1: Configuring a Network Card MAC Address Exercise 3-2: Determining Your Local Machine’s MAC Address Troubleshooting Network Cards
Hubs, MAUs, and Repeaters
Hubs Multistation Access Units Repeaters
Bridges and Switches
Bridges Switches
Routers and Brouters
Routers Brouters Collision Domains and Broadcast Domains
Gateways and Security Devices
Gateways Firewalls Intrusion Detection Systems Exercise 3-3: Identifying Network Components
Other Networking Devices
Wireless Access Points Analog Modems CSU/DSU ISDN Network Appliances Virtualization Cloud Computing Storage Area Networks SCADA/ICS and Medianets Power Management Wiring Distribution and Rack Systems Device Placement and Labeling Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers
4 TCP/IP Addressing
TCP/IP Fundamentals
TCP/IP Settings Exercise 4-1: Identifying Remote Systems
TCP/IP Addressing
Understanding Binary Exercise 4-2: Converting Decimal to Binary Exercise 4-3: Converting Binary to Decimal Address Classes Exercise 4-4: Identifying Address Classes Loopback Address Private Addresses Exercise 4-5: Understanding Valid Addresses Addressing Schemes TCP/IP Ports Exercise 4-6: Viewing TCP/IP Port Values
TCP/IP Configuration Concepts
Manual Configuration Dynamic Host Configuration Protocol (DHCP) Exercise 4-7: Configuring TCP/IP to Use DHCP APIPA Boot Protocol Domain Name System Windows Internet Naming Service Exercise 4-8: Configuring a Client for DNS Configuring a Linux Machine for TCP/IP Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers
5 TCP/IP Protocols
TCP/IP Protocol Suite
The TCP/IP Model Exercise 5-1: Identifying TCP/IP Protocols
IPv6 Fundamentals
IPv6 Addressing and Hexadecimal Addressing IPv6 Protocols Tunneling Protocols Exercise 5-2: Exploring IPv6
Network Services
Web Services Network Controllers DHCP DNS RDP WINS NAT/PAT/SNAT ICS SMB/CIFS NFS AFP Samba ZeroConfig VoIP Unified Voice Services Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers
6 TCP/IP Utilities and Troubleshooting
Communication Requires ARP
How ARP Works ARP Cache Exercise 6-1: Using ARP to See Your Local ARP Cache RARP
Common TCP/IP Commands
IPCONFIG and ifconfig Exercise 6-2: Using IPCONFIG Ping and Hping2 Exercise 6-3: Using Ping Tracert/traceroute Netstat Exercise 6-4: Using Netstat to Determine Open Connections to a System Telnet Exercise 6-5: Using Telnet to Remotely Administer a Cisco Router FTP Exercise 6-6: Configuring and Using FTP
Name Resolution Commands
NBTSTAT Exercise 6-7: Using NBTSTAT to View NetBIOS Name Tables NSLOOKUP and DIG Exercise 6-8: Using NSLOOKUP
TCP/IP Utilities
Hostname and Host MTR Route Arping Pathping MAC Address Lookup Table
Troubleshooting with TCP/IP Utilities
Connectivity Problems Name-Resolution Problems Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers
7 Configuring Routers and Switches
Basic Router Configuration
Configuration Modes Configuring the Hostname Configuring Interfaces Exercise 7-1: Performing Basic Configuration of Cisco Routers
Basic Switch Configuration
Configuring Interfaces Configuring VLANs Port Mirroring Exercise 7-2: Configuring VLANs on Cisco Switches Configuring Port Security Switch Management
Troubleshooting Connectivity
Layer-1 and Layer-2 Troubleshooting Layer-3 Troubleshooting Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers
8 Subnetting and Routing
Understanding Subnetting
Exercise 8-1: Subnetting IP Addresses
Classful vs. Classless Addressing
CIDR Exercise 8-2: Subnetting Networks Supernetting
Understanding Routing and Static Routes
Routing Concepts Cisco Routers Exercise 8-3: Configuring Cisco Routers Windows Routers
Dynamic Routing Protocols
Routing Metrics Distance Vector Link State Advanced Concepts Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers
9 Configuring Network Services
Understanding DNS
DNS Overview Configuring DNS Records Dynamic DNS Exercise 9-1: Installing and Configuring DNS
Deploying DHCP
DHCP Overview Configuring DHCP Configuring Reservations Exercise 9-2: Installing and Configuring DHCP DHCP Relay and IP Helper
Implementing NAT
NAT Overview Configuring NAT Exercise 9-3: Configuring NAT on Windows Server
Port Forwarding, Proxy Servers, and Unified Communications
Port Forwarding Exercise 9-4: Configuring Port Forwarding Proxy Servers Unified Communications Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers
10 Wireless Networking
Wireless Basics
Wireless Concepts Wireless Network Types Wireless Standards Channels Authentication and Encryption
Securing Wireless
Security Best Practices Threats Against Wireless
Implementing a Wireless Network
Configuring the Wireless Router/Access Point Wireless Security Configuring the Client Exercise 10-1: Configuring a Wireless Network Implementing MAC Filtering Changing the SSID and Implementing WEP Configuring a Windows 8 Client Configuring Roaming Wireless Understanding Mobile Devices Troubleshooting Wireless
PAN Networking
Infrared (IR) Bluetooth NFC Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers
11 Remote Access and VPN Connectivity
Remote Connectivity Concepts
Public Switched Telephone Network Integrated Services Digital Network
Remote Access Service (RAS)
Serial Line Internet Protocol Point-to-Point Protocol Exercise 11-1: Enabling Modem Logging in Windows
Dial-Up Networking
Modem Configuration Parameters Unimodem Telephony API Requirements for a Remote Connection Exercise 11-2: Creating a PPP Dial-Up Connection
Virtual Private Networks (VPNs)
VPN Overview VPN Protocols Exercise 11-3: Setting Up a VPN Server Exercise 11-4: Setting Up a VPN Client Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers
12 Wide Area Network Technologies
Packet-Switching vs. Circuit-Switching Networks
Packet Switching Circuit Switching X.25 and Frame Relay
Fiber-Optic WAN Technologies
Synchronous Optical Network/Synchronous Digital Hierarchy Optical Carrier Level-X Fiber Distributed Data Interface Asynchronous Transfer Mode
Internet Access Technologies
Leased Lines with Tx-/Ex-Carriers DSL/ADSL Broadband Cable High Speed via Satellite and Cellular Networks Other Methods of Internet Access Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers
13 Implementing a Network
Installing a Network
Networking Options Network Requirements Exercise 13-1: Confirming Networking Components in Windows Installing a Network Server
Creating User Accounts
Built-in Accounts Creating User Accounts Exercise 13-2: Creating Users in Active Directory Password Policies Exercise 13-3: Configuring a Password Policy
Managing Groups
Built-in Groups Creating Groups Exercise 13-4: Creating Groups in Active Directory
Securing Files and Folders
Securing Files in Windows Exercise 13-5: Configuring Permissions in Windows Server 2012 Connecting to a Shared Folder Securing Files in Linux
Installing Printers
Installing a Print Server Changing Printer Permissions Exercise 13-6: Installing a Printer on Windows Server 2012 Configuring a Print Client
Working with Network Hardware
Environmental Factors that Affect Computer Networks Common Peripheral Ports and Network Components Compatibility and Cabling Issues Implementing a SOHO Network Implement a Network Based on Requirements Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers
14 Maintaining and Supporting a Network
Network Upgrades and Downgrades
Safety Practices Software Upgrades Hardware Upgrades
Installing Patches and Updates
Exercise 14-1: Configuring Windows Update Windows Server Update Services (WSUS)
Antivirus and Antispyware Software
Antivirus Software Antispyware/Adware
Backing Up Network Data
Tape Drives Archives Full, Incremental, and Differential Backups Scheduling Backups Exercise 14-2: Backing Up and Restoring Data on a Windows Server
Providing Fault Tolerance
RAID Level 0 RAID Level 1 RAID 5 Exercise 14-3: Understanding and Configuring Fault Tolerance
Network Documentation and Configuration Management
Wiring Schematics Physical Network Diagrams Logical Network Diagrams Asset Management IP Address Utilization Vendor Documentation Baselines Internal Policies, Procedures, and Standards Change Management Configuration Management Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers
15 Network Security Principles
Understanding Attack Types
Social Engineering Phishing Attack Network-Based Attacks Common Vulnerabilities Malicious Software Mitigating Attacks
Understanding System Security
Authentication Authorization Windows Security Subsystem Configuring Permissions Securing the Registry Exercise 15-1: Setting Permissions on Registry Keys Configuring User Rights Exercise 15-2: Modifying User Rights on a Windows System Configuring Auditing Exercise 15-3: Implementing Auditing in Windows
Implementing Network Security
Network Access Security
Securing Communication
Defining Data Encryption Encryption Methods Encryption Standards Methods of Securing Traffic
Fault Tolerance and Disaster Recovery
Fault Tolerance Disaster Recovery and Business Continuity
Guidelines to Protect the Network
Physical Security Firewalls Intrusion Detection Systems Patch Management Hardening Devices and Systems Data Encryption Policies and Procedures Vulnerability Testing and Penetration Testing End-User Awareness and Training Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers
16 Network Security Practices
Implement Network Hardening Techniques
Security Policy and Access Control Models Antimalware Software Switch Port Security Disable Unneeded Network Services Network Segmentation and Access Lists Use Secure Protocols
Physical Security Controls
Securing the Premises Network Closet/Server Room Access Control Methods
Implementing Firewalls
Firewall Architecture Firewall Types Other Firewall Features Configuring Access Control Lists Exercise 16-1: Enabling the Windows Firewall
Basic Forensics Concepts
First Responder Evidence Collection Handling Evidence Forensics Report Legal Hold Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers
17 Monitoring the Network
Monitoring and Logging
Monitoring Logging
Monitoring Tools
Packet/Network Analyzer Port Scanner Exercise 17-1: Using a Port Scanner System Monitor Exercise 17-2: Using System Monitor Event Viewer Exercise 17-3: Checking Event Logs Other Monitoring Tools Environmental and Power Monitoring
Monitoring Techniques to Track Problems
Monitoring Best Practices Monitoring Utilization Interface Monitoring Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers
18 Troubleshooting the Network
Managing Network Problems
Does the Problem Exist Across the Network? Workstation, Workgroup, LAN, or WAN Problem? Is the Problem Consistent and Replicable? Standard Troubleshooting Methods
Network Troubleshooting Methodology
Step 1: Identify the Problem Step 2: Establish a Theory of Probable Cause Step 3: Test the Theory to Determine Cause Step 4: Establish a Plan of Action to Resolve the Problem and Identify Potential Effects Step 5: Implement the Solution or Escalate as Necessary Step 6: Verify Full System Functionality and, If Applicable, Implement Preventative Measures Step 7: Document Findings, Actions, and Outcomes Other Methodology Steps Sample Troubleshooting Situations
System or Operator Problems Checking Physical and Logical Indicators
Link Lights Collision Lights Power Lights Error Displays Error Logs and Displays Performance Issues and Optimization Physical and Logical Issues
Other Symptoms and Causes of Network Problems
Recognizing Abnormal Physical Conditions Isolating and Correcting Problems in the Physical Media Checking the Status of Servers Checking for Configuration Problems Checking for Viruses Checking the Validity of the Account Name and Password Rechecking Operator Logon Procedures Selecting and Running Appropriate Diagnostics
Network Troubleshooting Tools
Cable Crimper, Wire Stripper, and Punch-Down Tool Cable Tester, Certifier, and Butt Set Crossover Cables Loopback Plug, Line Testers, and Light Meter Tone Generator/Toner Probe TDR and OTDR Oscilloscopes Multimeter Software Troubleshooting Tools Certification Summary ✓ Two-Minute Drill Q&A Self Test Self Test Answers
A About the Download B How to Score Your Pre-assessment C Performance-Based Questions and Answers Glossary Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion