Describe the Operation of Data Networks |
|
Describe the purpose and functions of various network devices |
1 |
Select the components required to meet a given network specification |
1 |
Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network |
1 |
Describe common networking applications including web applications |
1, 2 |
Describe the purpose and basic operation of the protocols in the OSI and TCP models |
1, 2 |
Describe the impact of applications (Voice Over IP and Video Over IP) on a network |
2 |
Interpret network diagrams |
6 |
Determine the path between two hosts across a network |
6 |
Describe the components required for network and Internet communications |
1 |
Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered model approach |
1 |
Differentiate between LAN/WAN operation and features |
1, 10 |
Implement a Small Switched Network |
|
Select the appropriate media, cables, ports, and connectors to connect switches to other network devices and hosts |
1 |
Explain the technology and media access control method for Ethernet technologies |
1 |
Explain network segmentation and basic traffic management concepts |
1, 7 |
Explain the operation of Cisco switches and basic switching concepts |
7 |
Perform, save and verify initial switch configuration tasks including remote access management |
7 |
Verify network status and switch operation using basic utilities (including: ping, traceroute, telnet, SSH, arp, ipconfig), SHOW & DEBUG commands |
7 |
Implement and verify basic security for a switch (port security, deactivate ports) |
7 |
Identify, prescribe, and resolve common switched network media issues, configuration issues, autonegotiation, and switch hardware failures |
1, 7 |
Implement an IP Addressing Scheme and IP Services to Meet Network Requirements for a Small Branch Office |
|
Describe the need and role of addressing in a network |
2, 3, 4 |
Create and apply an addressing scheme to a network |
2, 3, 4 |
Assign and verify valid IP addresses to hosts, servers, and networking devices in a LAN environment |
2, 3 |
Explain the basic uses and operation of NAT in a small network connecting to one ISP |
3 |
Describe and verify DNS operation |
2, 3, 4 |
Describe the operation and benefits of using private and public IP addressing |
2, 3 |
Enable NAT for a small network with a single ISP and connection using SDM and verify operation using CLI and ping |
3 |
Configure, verify and troubleshoot DHCP and DNS operation on a router (including: CLI/SDM) |
3, 4 |
Implement static and dynamic addressing services for hosts in a LAN environment |
3 |
Identify and correct IP addressing issues |
3 |
Implement a Small Routed Network |
|
Describe basic routing concepts (including: packet forwarding, router lookup process) |
6 |
Describe the operation of Cisco routers (including: router bootup process, POST, router components) |
5 |
Select the appropriate media, cables, ports, and connectors to connect routers to other network devices and hosts |
1 |
Configure, verify, and troubleshoot RIPv2 |
6 |
Access and utilize the router CLI to set basic parameters |
4 |
Connect, configure, and verify operation status of a device interface |
4 |
Verify device configuration and network connectivity using ping, traceroute, telnet, SSH or other utilities |
4 |
Perform and verify routing configuration tasks for a static or default route given specific routing requirements |
6 |
Manage IOS configuration files (including: save, edit, upgrade, restore) |
5 |
Manage Cisco IOS |
5 |
Implement password and physical security |
4, 5 |
Verify network status and router operation using basic utilities (including: ping, traceroute, telnet, SSH, arp, ipconfig), SHOW & DEBUG commands |
4 |
Explain and Select the Appropriate Administrative Tasks Required for a WLAN |
|
Describe standards associated with wireless media (including: IEEE WI-FI Alliance, ITU/FCC) |
8 |
Identify and describe the purpose of the components in a small wireless network (including: SSID, BSS, ESS) |
8 |
Identify the basic parameters to configure on a wireless network to ensure that devices connect to the correct access point |
8 |
Compare and contrast wireless security features and capabilities of WPA security (including: open, WEP, WPA-1/2) |
8 |
Identify common issues with implementing wireless networks |
8 |
Identify Security Threats to a Network and Describe General Methods to Mitigate Those Threats |
|
Explain today's increasing network security threats and the need to implement a comprehensive security policy to mitigate the threats |
9 |
Explain general methods to mitigate common security threats to network devices, hosts, and applications |
9 |
Describe the functions of common security appliances and applications |
9 |
Describe security recommended practices including initial steps to secure network devices |
9 |
Implement and Verify WAN Links |
|
Describe different methods for connecting to a WAN |
10 |
Configure and verify a basic WAN serial connection |
10 |