• Classroom
  • Online, Instructor-Led
Course Description

A strong foundation of basic networking concepts is fundamental to a successful career in information technology, and in our popular Understanding Networking Fundamentals course, you’ll gain those real—world, practical skills.

In this broad—based foundational course, you’ll move step—by—step through the basics of data networking, practicing with leading—edge technologies from Cisco, Juniper, ADTRAN, HP, Dell, and Microsoft.

With a strong foundation and an understanding of basic network functions, standards, and protocols, you will be prepared to tackle advanced networking skills including TCP/IP, security, wireless integration, and Voice over IP.

Learning Objectives

How switches and routers interconnect using equipment from multiple vendors
IP addressing and how to create subnets
How TCP/IP works and how to configure it on various devices
Capture and view network traffic using a protocol analyzer
Wireless network options available
Basic security and firewall issues
How Ethernet works and how all of the various forms can be connected
Basics of layered network protocols
Difference between logical and physical network segments
Install Cat 5e UTP and fiber optic cables
How VLANs function
When and how to use NAT
Function of various routing protocols such as RIP, EIGRP, and OSPF
An overview of WAN technologies
Functions of NetBIOS and NetBEUI
Benefits and issues of Instant Communications

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Customer Service and Technical Support
  • Network Services
  • Systems Administration

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.