Introduction |
|
xix | |
|
PART I DOMAIN 1.0: NETWORKING FUNDAMENTALS |
|
|
1 | (102) |
|
|
3 | (14) |
|
|
3 | (9) |
|
|
12 | (5) |
|
Chapter 2 Network Topologies |
|
|
17 | (12) |
|
|
17 | (2) |
|
Network Types and Characteristics |
|
|
19 | (2) |
|
|
21 | (1) |
|
Service-Related Entry Points |
|
|
22 | (1) |
|
|
22 | (2) |
|
|
24 | (5) |
|
Chapter 3 Cables and Connectors |
|
|
29 | (12) |
|
|
30 | (3) |
|
|
33 | (2) |
|
|
35 | (1) |
|
|
36 | (5) |
|
|
41 | (14) |
|
|
42 | (6) |
|
|
48 | (7) |
|
Chapter 5 Ports and Protocols |
|
|
55 | (12) |
|
|
55 | (5) |
|
Application Layer Protocols |
|
|
60 | (7) |
|
Chapter 6 Network Services |
|
|
67 | (12) |
|
|
67 | (3) |
|
|
70 | (5) |
|
|
75 | (4) |
|
Chapter 7 Network Architecture |
|
|
79 | (12) |
|
Three-Tiered Architecture |
|
|
79 | (3) |
|
Software-Defined Networking |
|
|
82 | (1) |
|
Spine and Leaf Architecture |
|
|
83 | (1) |
|
|
84 | (1) |
|
|
84 | (1) |
|
|
85 | (6) |
|
Chapter 8 Cloud Computing |
|
|
91 | (12) |
|
|
91 | (2) |
|
|
93 | (10) |
|
PART II DOMAIN 2.0: NETWORK IMPLEMENTATIONS |
|
|
103 | (50) |
|
Chapter 9 Network Devices |
|
|
105 | (12) |
|
|
105 | (6) |
|
|
111 | (6) |
|
Chapter 10 Routing and Bandwidth Management |
|
|
117 | (12) |
|
|
118 | (6) |
|
|
124 | (5) |
|
|
129 | (12) |
|
|
129 | (2) |
|
|
131 | (10) |
|
Chapter 12 Wireless Standards |
|
|
141 | (12) |
|
|
142 | (7) |
|
|
149 | (4) |
|
PART III DOMAIN 3.0: NETWORK OPERATIONS |
|
|
153 | (38) |
|
Chapter 13 Network Availability |
|
|
155 | (12) |
|
|
156 | (2) |
|
|
158 | (1) |
|
|
159 | (2) |
|
Interface Errors or Alerts |
|
|
161 | (1) |
|
|
162 | (1) |
|
|
162 | (1) |
|
|
163 | (4) |
|
Chapter 14 Organizational Documents and Policies |
|
|
167 | (12) |
|
|
167 | (4) |
|
Hardening and Security Policies |
|
|
171 | (1) |
|
|
172 | (3) |
|
|
175 | (4) |
|
Chapter 15 High Availability and Disaster Recovery |
|
|
179 | (12) |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
180 | (1) |
|
Redundant Hardware/Clusters |
|
|
181 | (1) |
|
Facilities and Infrastructure Support |
|
|
182 | (3) |
|
Redundancy and High Availability Concepts |
|
|
185 | (3) |
|
Network Device Backup/Restore |
|
|
188 | (3) |
|
PART IV DOMAIN 4.0: NETWORK SECURITY |
|
|
191 | (60) |
|
Chapter 16 Security Concepts |
|
|
193 | (14) |
|
Confidentiality, Integrity, and Availability |
|
|
193 | (1) |
|
|
194 | (1) |
|
|
194 | (1) |
|
|
195 | (1) |
|
|
195 | (1) |
|
|
196 | (1) |
|
|
196 | (1) |
|
|
197 | (1) |
|
|
198 | (3) |
|
|
201 | (1) |
|
|
202 | (5) |
|
Chapter 17 Network Attacks |
|
|
207 | (10) |
|
|
207 | (5) |
|
Human and Environmental Attacks |
|
|
212 | (5) |
|
Chapter 18 Network Hardening |
|
|
217 | (14) |
|
|
217 | (6) |
|
|
223 | (4) |
|
IoT Access Considerations |
|
|
227 | (4) |
|
|
231 | (10) |
|
|
232 | (2) |
|
|
234 | (1) |
|
Virtual Network Computing (VNC) |
|
|
235 | (1) |
|
|
235 | (1) |
|
Authentication and Authorization Considerations |
|
|
236 | (1) |
|
In-band vs. Out-of-band Management |
|
|
236 | (5) |
|
Chapter 20 Physical Security |
|
|
241 | (10) |
|
|
241 | (2) |
|
|
243 | (3) |
|
|
246 | (5) |
|
PART V DOMAIN 5.0: NETWORK TROUBLESHOOTING |
|
|
251 | (64) |
|
Chapter 21 Network Troubleshooting Methodology |
|
|
253 | (10) |
|
|
254 | (2) |
|
Establish a Theory of Probable Cause |
|
|
256 | (1) |
|
Test the Theory to Determine the Cause |
|
|
256 | (1) |
|
Establish a Plan of Action to Resolve the Problem and Identify Potential Effects |
|
|
257 | (1) |
|
Implement the Solution or Escalate as Necessary |
|
|
258 | (1) |
|
Verify Full System Functionality and, if Applicable, Implement Preventive Measures |
|
|
259 | (1) |
|
Document Findings, Actions, Outcomes, and Lessons Learned |
|
|
259 | (4) |
|
Chapter 22 Troubleshooting Cable Connectivity |
|
|
263 | (12) |
|
Specifications and Limitations |
|
|
264 | (1) |
|
|
265 | (1) |
|
|
265 | (2) |
|
|
267 | (4) |
|
|
271 | (4) |
|
Chapter 23 Network Software Tools and Commands |
|
|
275 | (14) |
|
|
275 | (4) |
|
|
279 | (5) |
|
Basic Network Platform Commands |
|
|
284 | (5) |
|
Chapter 24 Troubleshooting Wireless Connectivity |
|
|
289 | (12) |
|
Specifications and Limitations |
|
|
289 | (2) |
|
|
291 | (2) |
|
|
293 | (8) |
|
Chapter 25 Troubleshooting Network Issues |
|
|
301 | (14) |
|
|
301 | (2) |
|
|
303 | (12) |
Index |
|
315 | |