尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
Networking Essentials 
Class Intro & 
Chapter 1 
Intro to Networking
Your Professor 
 Masters Degree 
 Many Certifications: 
MCT, MCSE, MCDBA, MCSA, MCDST, 
CWSP, CWNA, CCNA, CNST, CWST, CST, 
CIW, A+, Network+, iNet+, Security+, Project 
Management (2000), Systems Analysis 
 Lead professor in the CNT department 
 Author 
 Your teacher ;-)
Class Content 
 Network+ preparation 
 Class meets at the following times: 
 AM class: 9:00-2:00 
 PM class: 6:00-11:00 
 Each class gets two 10 min breaks and one 
30 min lunch. (breaks may be aggregated 
for a longer lunch on some occasions) 
 Field trips are desired but not guaranteed.
Syllabus 
 Textbook: Network+ Guide to Networks by Tamara 
Dean 
Course Requirements Possible 
Points 
Group Participation 75 
Attendance 125 
Review Questions (Total) 150 
Labs (Total) 225 
Acronym Quizzes (Total) 50 
Chapter Tests (Total) 400 
Final Project (Total) 100 
Total Points 1125
Course Outline 
Week Topic Reading & Tests 
Week 1 Networking, OSI Chapters 1-2, Form Groups 
Week 2 Media & Protocols Chapters 3-4 
Week 3 Hardware & Topologies Exam 1, Chapters 5-6 
Week 4 WANs Chapter 7 
Week 5 NOS & Server 2003 Chapter 8 
Week 6 UNIX & Linux Midterm Exam, Chapter 9 
Begin Final Project 
Week 7 Linux & Netware Continue chapter 9, begin chapter 10 
Week 8 Netware & TCP/IP Continue chapters 10-11 
Week 9 Troubleshooting Exam 3 (ch 9-11), Chapter 12 
Week 10 Integrity & Availability Chapter 13 
Week 11 Security & Management Chapters 14-15, 
Week 12 Projects & Exam Final Exam (ch 13-15 ), Final Projects
Chapter 1 Intro to 
Networking 
 Beginnings of networking 
 Stand alone computers 
 Sneakernet 
 Why network? 
 Reduce Redundancy 
 Enhance Capabilities 
 Share Resources 
• Data 
• Devices 
• Internet 
 Communicate
Types of networks 
 P2P (Peer-to-Peer) 
 Client-Server 
Client – a computer that requests 
resources from another computer 
Server – a computer that provides 
resources to other computers and 
manages those resources.
Peer to Peer 
 Advantages 
 Easy to install 
 No server needed 
 Each user has control 
 No administrators 
needed 
 Less expensive 
 Disadvantages 
 Security & backups 
must be applied 
individually 
 Many passwords 
needed 
 Reduced password 
security 
 Reduced machine 
performance 
 No central control 
 Not flexible (hard to 
change things)
Client Server 
 Advantages 
 Centralized 
security & 
backups 
 Faster access 
 Single password 
 Better password 
security 
 Disadvantages 
 Central point of 
failure 
 Administrator 
required 
 Server and server 
software required 
More expensive
NOS (Network Operating 
System) 
 Controls user and application access 
to resources 
 Restricts user access times and 
locations 
 Controls communication between 
networked computers 
 Lets name a few…
NOS (Network Operating 
System) 
 Microsoft Windows 
 Novell Netware 
 UNIX 
 Linux 
 BSD (Berkley Software Distribution) 
 Sun Solaris 
 IBM OS/2 
 Mac OS
Network Scope 
 LAN (Local Area Network) – group of 
machines in one or many closely 
located buildings that are all 
connected together with high speed 
links. 
 MAN (Metropolitan Area Network) 
 WAN (Wide Area Network)
Terms 
 NIC (Network Interface Card) 
 Node – A device that can communicate with 
a network. Identified by a unique number. 
 Segment – part of a network consisting of a 
number of nodes that all use the same 
communication type 
 Backbone – connects segments together. 
 Protocol – the standard for communications 
 Topology – the layout of the network
Types of Servers 
 DC (Domain Controller) 
 File & Print Server 
 Communication Server 
 Mail Server 
 Web Server 
 Network Management Server 
 Name server (DNS, WINS) 
 Addressing server (DHCP) 
 Licensing server 
 Software distribution server (SMS) 
 Backup server 
 Patch Management server (SUS)
Skills of the Network 
Professional 
 Basic Technical skills 
 Software & hardware installation & 
configuration 
 Network design 
 Protocols, topologies, media types 
 Other Technical skills 
 Security 
 Voice & Data integration 
 NOS’s indepth 
 Network device configuration (Routers…) 
 Data warehousing
Skills of the network 
professional 
 Soft skills 
 Patience 
 Empathy 
 Listening 
 Critical thinking 
 Communication (oral & written) 
 Dependability 
 Teamwork 
 Leadership (especially change mgmt)
Certification 
 Vendor Neutral Certifications 
CompTIA (Computing Technology 
Industry Association) 
ETA (Electronics Technicians 
Association) 
CWNP (Certified Wireless Network 
Professional) program 
 Vendor Certifications 
Microsoft, Novell, Oracle, Sun, Cisco
Acronyms 
 DC, Domain Controller 
 CompTIA, Computing Technology Industry Association 
 LAN, Local Area Network 
 MAN, Metropolitan Area Network 
 WAN, Wide Area Network 
 MCSE, Microsoft Certified Systems Engineer 
 NIC, Network Interface Card 
 NOS, Network Operating System 
 P2P, Peer to Peer

More Related Content

What's hot

Computer network (12)
Computer network (12)Computer network (12)
Computer network (12)
NYversity
 
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric VanderburgNetworking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Eric Vanderburg
 
Network protocol structure scope
Network protocol structure scopeNetwork protocol structure scope
Network protocol structure scope
Sanat Maharjan
 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overview
scooby_doo
 
Networking peer-to-peer-powerpoint-presentation4410 (1)
Networking peer-to-peer-powerpoint-presentation4410 (1)Networking peer-to-peer-powerpoint-presentation4410 (1)
Networking peer-to-peer-powerpoint-presentation4410 (1)
sarmad ali
 
Networking basics PPT
Networking basics PPTNetworking basics PPT
Networking basics PPT
Ehsan Ullah Kakar
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
Carlo Fonda
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and router
Akmal Cikmat
 
Introduction to computer networks
Introduction to computer networks Introduction to computer networks
Introduction to computer networks
Basma Gamal
 
Basic Networking Network
Basic Networking NetworkBasic Networking Network
Basic Networking Network
JGrace Johnny
 
Computer networks
Computer networksComputer networks
Computer networks
Tej Kiran
 
Network th ITM3
Network th ITM3Network th ITM3
Network th ITM3
Aram Mohammed
 
Basics of Computer Network Device
Basics of Computer Network DeviceBasics of Computer Network Device
Basics of Computer Network Device
Rubal Sagwal
 
Topic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpipTopic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpip
Atika Zaimi
 
MVA slides lesson 5
MVA slides lesson 5MVA slides lesson 5
98 366 mva slides lesson 7
98 366 mva slides lesson 798 366 mva slides lesson 7
98 366 mva slides lesson 7
suddenven
 
C/S archtecture including basic networking
C/S archtecture including basic networkingC/S archtecture including basic networking
C/S archtecture including basic networking
abhinav2727
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)
welcometofacebook
 
Networking Fundamentals: Computer Network Basics
Networking Fundamentals: Computer Network BasicsNetworking Fundamentals: Computer Network Basics
Networking Fundamentals: Computer Network Basics
Andriy Berestovskyy
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
Dulith Kasun
 

What's hot (20)

Computer network (12)
Computer network (12)Computer network (12)
Computer network (12)
 
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric VanderburgNetworking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
 
Network protocol structure scope
Network protocol structure scopeNetwork protocol structure scope
Network protocol structure scope
 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overview
 
Networking peer-to-peer-powerpoint-presentation4410 (1)
Networking peer-to-peer-powerpoint-presentation4410 (1)Networking peer-to-peer-powerpoint-presentation4410 (1)
Networking peer-to-peer-powerpoint-presentation4410 (1)
 
Networking basics PPT
Networking basics PPTNetworking basics PPT
Networking basics PPT
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and router
 
Introduction to computer networks
Introduction to computer networks Introduction to computer networks
Introduction to computer networks
 
Basic Networking Network
Basic Networking NetworkBasic Networking Network
Basic Networking Network
 
Computer networks
Computer networksComputer networks
Computer networks
 
Network th ITM3
Network th ITM3Network th ITM3
Network th ITM3
 
Basics of Computer Network Device
Basics of Computer Network DeviceBasics of Computer Network Device
Basics of Computer Network Device
 
Topic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpipTopic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpip
 
MVA slides lesson 5
MVA slides lesson 5MVA slides lesson 5
MVA slides lesson 5
 
98 366 mva slides lesson 7
98 366 mva slides lesson 798 366 mva slides lesson 7
98 366 mva slides lesson 7
 
C/S archtecture including basic networking
C/S archtecture including basic networkingC/S archtecture including basic networking
C/S archtecture including basic networking
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)
 
Networking Fundamentals: Computer Network Basics
Networking Fundamentals: Computer Network BasicsNetworking Fundamentals: Computer Network Basics
Networking Fundamentals: Computer Network Basics
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 

Viewers also liked

Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9
APSU
 
Net essentials6e ch11
Net essentials6e ch11Net essentials6e ch11
Net essentials6e ch11
APSU
 
Net essentials6e ch10
Net essentials6e ch10Net essentials6e ch10
Net essentials6e ch10
APSU
 
Net essentials6e ch5
Net essentials6e ch5Net essentials6e ch5
Net essentials6e ch5
APSU
 
Net essentials6e ch4
Net essentials6e ch4Net essentials6e ch4
Net essentials6e ch4
APSU
 
Net essentials6e ch6
Net essentials6e ch6Net essentials6e ch6
Net essentials6e ch6
APSU
 
Net essentials6e ch2
Net essentials6e ch2Net essentials6e ch2
Net essentials6e ch2
APSU
 
Net essentials6e ch8
Net essentials6e ch8Net essentials6e ch8
Net essentials6e ch8
APSU
 
Net essentials6e ch3
Net essentials6e ch3Net essentials6e ch3
Net essentials6e ch3
APSU
 
Net essentials6e ch7
Net essentials6e ch7Net essentials6e ch7
Net essentials6e ch7
APSU
 

Viewers also liked (10)

Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9
 
Net essentials6e ch11
Net essentials6e ch11Net essentials6e ch11
Net essentials6e ch11
 
Net essentials6e ch10
Net essentials6e ch10Net essentials6e ch10
Net essentials6e ch10
 
Net essentials6e ch5
Net essentials6e ch5Net essentials6e ch5
Net essentials6e ch5
 
Net essentials6e ch4
Net essentials6e ch4Net essentials6e ch4
Net essentials6e ch4
 
Net essentials6e ch6
Net essentials6e ch6Net essentials6e ch6
Net essentials6e ch6
 
Net essentials6e ch2
Net essentials6e ch2Net essentials6e ch2
Net essentials6e ch2
 
Net essentials6e ch8
Net essentials6e ch8Net essentials6e ch8
Net essentials6e ch8
 
Net essentials6e ch3
Net essentials6e ch3Net essentials6e ch3
Net essentials6e ch3
 
Net essentials6e ch7
Net essentials6e ch7Net essentials6e ch7
Net essentials6e ch7
 

Similar to Networking Essentials Lesson 01 - Eric Vanderburg

Chapter01 -- introduction to networking
Chapter01  -- introduction to networkingChapter01  -- introduction to networking
Chapter01 -- introduction to networking
Raja Waseem Akhtar
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
Dsunte Wilson
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
Mike Qaissaunee
 
Synapse india reviews abot Networking Concept
Synapse india reviews abot Networking ConceptSynapse india reviews abot Networking Concept
Synapse india reviews abot Networking Concept
saritasingh19866
 
Lecture 01
Lecture 01Lecture 01
Lecture 01
maruthi vardhan
 
Fundamental Of Computer Network.
Fundamental Of Computer Network. Fundamental Of Computer Network.
Fundamental Of Computer Network.
PushpendraSingh483
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
Mohd. ShahNawab
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
Lecture1
Lecture1Lecture1
Lecture1
Vedpal Yadav
 
Week_1_Intro_Internet_arch_Applications.ppt
Week_1_Intro_Internet_arch_Applications.pptWeek_1_Intro_Internet_arch_Applications.ppt
Week_1_Intro_Internet_arch_Applications.ppt
home107
 
lec3_10.ppt
lec3_10.pptlec3_10.ppt
lec3_10.ppt
ImXaib
 
Networking Comptia
Networking ComptiaNetworking Comptia
Networking Comptia
Marco Cruz
 
Networking course khurram shahzad
Networking course khurram shahzadNetworking course khurram shahzad
Networking course khurram shahzad
khurrak_shahzad
 
Networking
NetworkingNetworking
Networking
Remo Patel
 
Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2
webhostingguy
 
1_1_Know_basic_concepts_and_components_of_computer_networks_1_1.pptx
1_1_Know_basic_concepts_and_components_of_computer_networks_1_1.pptx1_1_Know_basic_concepts_and_components_of_computer_networks_1_1.pptx
1_1_Know_basic_concepts_and_components_of_computer_networks_1_1.pptx
liya7122
 
Client server technology main
Client server technology mainClient server technology main
Client server technology main
Anwar Kamal
 
networking
networking networking
networking
AmanyaLaban
 
A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)
Tuan Yang
 
Introduction computer networking
Introduction computer networkingIntroduction computer networking
Introduction computer networking
hadiyaahmed2
 

Similar to Networking Essentials Lesson 01 - Eric Vanderburg (20)

Chapter01 -- introduction to networking
Chapter01  -- introduction to networkingChapter01  -- introduction to networking
Chapter01 -- introduction to networking
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Synapse india reviews abot Networking Concept
Synapse india reviews abot Networking ConceptSynapse india reviews abot Networking Concept
Synapse india reviews abot Networking Concept
 
Lecture 01
Lecture 01Lecture 01
Lecture 01
 
Fundamental Of Computer Network.
Fundamental Of Computer Network. Fundamental Of Computer Network.
Fundamental Of Computer Network.
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
Lecture1
Lecture1Lecture1
Lecture1
 
Week_1_Intro_Internet_arch_Applications.ppt
Week_1_Intro_Internet_arch_Applications.pptWeek_1_Intro_Internet_arch_Applications.ppt
Week_1_Intro_Internet_arch_Applications.ppt
 
lec3_10.ppt
lec3_10.pptlec3_10.ppt
lec3_10.ppt
 
Networking Comptia
Networking ComptiaNetworking Comptia
Networking Comptia
 
Networking course khurram shahzad
Networking course khurram shahzadNetworking course khurram shahzad
Networking course khurram shahzad
 
Networking
NetworkingNetworking
Networking
 
Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2
 
1_1_Know_basic_concepts_and_components_of_computer_networks_1_1.pptx
1_1_Know_basic_concepts_and_components_of_computer_networks_1_1.pptx1_1_Know_basic_concepts_and_components_of_computer_networks_1_1.pptx
1_1_Know_basic_concepts_and_components_of_computer_networks_1_1.pptx
 
Client server technology main
Client server technology mainClient server technology main
Client server technology main
 
networking
networking networking
networking
 
A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)A Deep Dive in the World of IT Networking (Part 2)
A Deep Dive in the World of IT Networking (Part 2)
 
Introduction computer networking
Introduction computer networkingIntroduction computer networking
Introduction computer networking
 

More from Eric Vanderburg

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Eric Vanderburg
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
Eric Vanderburg
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Eric Vanderburg
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
Eric Vanderburg
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Eric Vanderburg
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
Eric Vanderburg
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
Eric Vanderburg
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
Eric Vanderburg
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
Eric Vanderburg
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
Eric Vanderburg
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
Eric Vanderburg
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
Eric Vanderburg
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
Eric Vanderburg
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Eric Vanderburg
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
Eric Vanderburg
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
Eric Vanderburg
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
Eric Vanderburg
 

More from Eric Vanderburg (20)

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
 

Recently uploaded

Multivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back againMultivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back again
Kieran Kunhya
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
ThousandEyes
 
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google CloudRadically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
ScyllaDB
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2
DianaGray10
 
So You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental DowntimeSo You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental Downtime
ScyllaDB
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
Ortus Solutions, Corp
 
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to SuccessMongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
ScyllaDB
 
APJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes WebinarAPJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes Webinar
ThousandEyes
 
Real-Time Persisted Events at Supercell
Real-Time Persisted Events at  SupercellReal-Time Persisted Events at  Supercell
Real-Time Persisted Events at Supercell
ScyllaDB
 
Guidelines for Effective Data Visualization
Guidelines for Effective Data VisualizationGuidelines for Effective Data Visualization
Guidelines for Effective Data Visualization
UmmeSalmaM1
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
Tobias Schneck
 
Automation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI AutomationAutomation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI Automation
UiPathCommunity
 
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDCScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
leebarnesutopia
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc
 
Fuxnet [EN] .pdf
Fuxnet [EN]                                   .pdfFuxnet [EN]                                   .pdf
Fuxnet [EN] .pdf
Overkill Security
 
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My IdentityCNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
Cynthia Thomas
 

Recently uploaded (20)

Multivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back againMultivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back again
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
 
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google CloudRadically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2
 
So You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental DowntimeSo You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental Downtime
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
 
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to SuccessMongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
 
APJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes WebinarAPJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes Webinar
 
Real-Time Persisted Events at Supercell
Real-Time Persisted Events at  SupercellReal-Time Persisted Events at  Supercell
Real-Time Persisted Events at Supercell
 
Guidelines for Effective Data Visualization
Guidelines for Effective Data VisualizationGuidelines for Effective Data Visualization
Guidelines for Effective Data Visualization
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
 
Automation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI AutomationAutomation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI Automation
 
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDCScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDC
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
 
Fuxnet [EN] .pdf
Fuxnet [EN]                                   .pdfFuxnet [EN]                                   .pdf
Fuxnet [EN] .pdf
 
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My IdentityCNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
 

Networking Essentials Lesson 01 - Eric Vanderburg

  • 1. Networking Essentials Class Intro & Chapter 1 Intro to Networking
  • 2. Your Professor  Masters Degree  Many Certifications: MCT, MCSE, MCDBA, MCSA, MCDST, CWSP, CWNA, CCNA, CNST, CWST, CST, CIW, A+, Network+, iNet+, Security+, Project Management (2000), Systems Analysis  Lead professor in the CNT department  Author  Your teacher ;-)
  • 3. Class Content  Network+ preparation  Class meets at the following times:  AM class: 9:00-2:00  PM class: 6:00-11:00  Each class gets two 10 min breaks and one 30 min lunch. (breaks may be aggregated for a longer lunch on some occasions)  Field trips are desired but not guaranteed.
  • 4. Syllabus  Textbook: Network+ Guide to Networks by Tamara Dean Course Requirements Possible Points Group Participation 75 Attendance 125 Review Questions (Total) 150 Labs (Total) 225 Acronym Quizzes (Total) 50 Chapter Tests (Total) 400 Final Project (Total) 100 Total Points 1125
  • 5. Course Outline Week Topic Reading & Tests Week 1 Networking, OSI Chapters 1-2, Form Groups Week 2 Media & Protocols Chapters 3-4 Week 3 Hardware & Topologies Exam 1, Chapters 5-6 Week 4 WANs Chapter 7 Week 5 NOS & Server 2003 Chapter 8 Week 6 UNIX & Linux Midterm Exam, Chapter 9 Begin Final Project Week 7 Linux & Netware Continue chapter 9, begin chapter 10 Week 8 Netware & TCP/IP Continue chapters 10-11 Week 9 Troubleshooting Exam 3 (ch 9-11), Chapter 12 Week 10 Integrity & Availability Chapter 13 Week 11 Security & Management Chapters 14-15, Week 12 Projects & Exam Final Exam (ch 13-15 ), Final Projects
  • 6. Chapter 1 Intro to Networking  Beginnings of networking  Stand alone computers  Sneakernet  Why network?  Reduce Redundancy  Enhance Capabilities  Share Resources • Data • Devices • Internet  Communicate
  • 7. Types of networks  P2P (Peer-to-Peer)  Client-Server Client – a computer that requests resources from another computer Server – a computer that provides resources to other computers and manages those resources.
  • 8. Peer to Peer  Advantages  Easy to install  No server needed  Each user has control  No administrators needed  Less expensive  Disadvantages  Security & backups must be applied individually  Many passwords needed  Reduced password security  Reduced machine performance  No central control  Not flexible (hard to change things)
  • 9. Client Server  Advantages  Centralized security & backups  Faster access  Single password  Better password security  Disadvantages  Central point of failure  Administrator required  Server and server software required More expensive
  • 10. NOS (Network Operating System)  Controls user and application access to resources  Restricts user access times and locations  Controls communication between networked computers  Lets name a few…
  • 11. NOS (Network Operating System)  Microsoft Windows  Novell Netware  UNIX  Linux  BSD (Berkley Software Distribution)  Sun Solaris  IBM OS/2  Mac OS
  • 12. Network Scope  LAN (Local Area Network) – group of machines in one or many closely located buildings that are all connected together with high speed links.  MAN (Metropolitan Area Network)  WAN (Wide Area Network)
  • 13. Terms  NIC (Network Interface Card)  Node – A device that can communicate with a network. Identified by a unique number.  Segment – part of a network consisting of a number of nodes that all use the same communication type  Backbone – connects segments together.  Protocol – the standard for communications  Topology – the layout of the network
  • 14. Types of Servers  DC (Domain Controller)  File & Print Server  Communication Server  Mail Server  Web Server  Network Management Server  Name server (DNS, WINS)  Addressing server (DHCP)  Licensing server  Software distribution server (SMS)  Backup server  Patch Management server (SUS)
  • 15. Skills of the Network Professional  Basic Technical skills  Software & hardware installation & configuration  Network design  Protocols, topologies, media types  Other Technical skills  Security  Voice & Data integration  NOS’s indepth  Network device configuration (Routers…)  Data warehousing
  • 16. Skills of the network professional  Soft skills  Patience  Empathy  Listening  Critical thinking  Communication (oral & written)  Dependability  Teamwork  Leadership (especially change mgmt)
  • 17. Certification  Vendor Neutral Certifications CompTIA (Computing Technology Industry Association) ETA (Electronics Technicians Association) CWNP (Certified Wireless Network Professional) program  Vendor Certifications Microsoft, Novell, Oracle, Sun, Cisco
  • 18. Acronyms  DC, Domain Controller  CompTIA, Computing Technology Industry Association  LAN, Local Area Network  MAN, Metropolitan Area Network  WAN, Wide Area Network  MCSE, Microsoft Certified Systems Engineer  NIC, Network Interface Card  NOS, Network Operating System  P2P, Peer to Peer
  翻译: