
Mastering Computer Network Management and Troubleshooting
Manage network configurations and resolve connectivity and performance issues.

Track
IT Hardware, Networking & Cyber Security
Level
Advanced
Language
English
Duration
30 hours
Learning Mode
Learn at ALC or at Home
Introduction
- In this course, you will learn to:
- Identify the basic principles and concepts of network security, including confidentiality, integrity, availability, authentication, and non-repudiation, to understand the fundamental aspects of securing networks.
- Recognize various types of network threats, such as malware, phishing, DDoS attacks, insider threats, and system vulnerabilities, to assess potential risks to network security.
- Describe security measures such as access control, encryption, firewalls, intrusion detection/prevention systems (IDS/IPS), and network segmentation, to understand how these measures are implemented to enhance network security.
- Analyze network security monitoring tools and techniques to detect and analyze suspicious network activity, anomalies, and security events, allowing for effective response and mitigation of security incidents.
- Explain the latest advancements in networking technologies and security threats, such as cloud computing and IoT, to stay informed about emerging trends and potential risks to network security.
What you'll learn ?
- At the end of this course, learners will be able to:
- Analyze various types of network threats, vulnerabilities, and attack vectors, and assess their potential impact on network security to develop effective risk mitigation strategies.
- Evaluate network security monitoring tools and techniques to detect and analyze suspicious network activity, anomalies, and security events, enabling proactive response and mitigation of security incidents.
- Apply troubleshooting skills to resolve common network security issues, such as access control problems, misconfigurations, and security policy violations, ensuring the integrity and availability of network resources.
- Design wireless network solutions for diverse use cases, including enterprise networks, public hotspots, and IoT deployments, by applying knowledge and skills in wireless networking technologies and best practices.
- Predict future capacity requirements, analyze network performance metrics, and plan for network scalability to accommodate growth and changes in network demand, ensuring optimal network performance and resource utilization.
Syllabus
Network security and authentication
- Network Security part 3
- Network Security part 4
- Multifactor authentication part 1
- Multifactor authentication part 2
- Authentication methods
- Network access protocols Part 1
- Network access protocols Part 2
Network management
- Asset Disposal
- Wireless Security
- Remote Access Security
- Network Transceivers
- Network Management - 1
- Network Management - 2
- Network Management Part 3
Wide area networks
- Network Management Part 4
- Internet Connectivity Types
- Wide Area Networks ( WANs)
- Wide Area Networks part 1
- Wide Area Networks part 2
- Wan Technologies Part 1
- Wan Technologies Part 2
Wireless Networking
- Checking internet speed with Speed test
- Wireless frequencies and channel’s part 1
- Wireless frequencies & channels part 2
- Wi-Fi Standards
- WPA 3
- Wireless Networking -2
- Wireless Networking part 3
- Configuring Wi-Fi network
Designing a Network
- Configuring Wi-Fi router -1
- Designing a network-1
- Designing a network-2
- Designing a network part 3
- Designing a network part 4
- Network performance
- SNMP
Network troubleshooting-1
- Using Monitoring tools
- Troubleshooting Methodology and connectivity issues
- Network Testing Tools
- Twisted pair cable issues
- Fiber Optic Connectivity Issues
- Network Troubleshooting-2
- Common Port Problems
- Common Software Tools for Network Troubleshooting
Network troubleshooting-2
- Using Software testing tool
- Command line tool for networking
- Using Command line utilities
- Troubleshooting Basic IP Networking Issues
- Common Switching Issues
- Wi-Fi Access Point Issues
- Wireless issues
- Common errors in DHCP
- Troubleshooting DNS issues
- Troubleshooting slow internet problems
About Cisco packet tracer
- About Cisco Packet Tracer
- Installing and configuring packet tracer
- Adding basic components in packet tracer
- Configuring Switches
- Configuring Routers
- About VPN Part 1
- About VPN Part 2
- VPN softwares
- How to install VPN?
NOS basics
- Installing VPN
- Configuring VPN
- NOS Basics Part 1
- NOS Basics Part 2
- Installing NOS
- Configuring basic things in NOS
- File server
- Print server
- Web server
Emerging network technologies
- Mail server
- Database server
- FTP Server
- Installing Print server
- Emerging Network Technologies
- IoT
- Next Generation Hotspots
Cloud computing and NAS basics
- Cloud Computing - 1
- Cloud Computing - 2
- Cloud Computing - 3
- Cloud Computing - 4
- Cloud computing - 5
- About Network Attached Storage
- Basics of NAS
Wireshark basics
- Types of NAS solutions
- Benefits of Network Attached Storage
- NAS devices
- Wireshark Basics -1
- Wireshark Basics - 2
- Common Networking attacks
- Denial of Service
- Social Engineering
Common networking attacks
- Phishing
- Ransomware
- DNS Poisoning & Spoofing
- Wireless Deauthentication
- Man-in-the-Middle
- What is a Network Rack?
- How to Set-Up a Network Rack
- Network Rack Equipment
Network operations
- Network Operation part -1
- Network Operation part -2
- Network Operation part -3
- Network operation part 4
- Network Operation Part 5
- Network Operation Part 6
Work-Centric Approach
The academic approach of the course focuses on ‘work-centric’ education. With this hands-on approach, derive knowledge from and while working to make it more wholesome, delightful and useful. The ultimate objective is to empower learners to also engage in socially useful and productive work. It aims at bringing learners closer to their rewarding careers as well as to the development of the community.
- Step 1: Learners are given an overview of the course and its connection to life and work
- Step 2: Learners are exposed to the specific tool(s) used in the course through the various real-life applications of the tool(s).
- Step 3: Learners are acquainted with the careers and the hierarchy of roles they can perform at workplaces after attaining increasing levels of mastery over the tool(s).
- Step 4: Learners are acquainted with the architecture of the tool or tool map so as to appreciate various parts of the tool, their functions, utility and inter-relations.
- Step 5: Learners are exposed to simple application development methodology by using the tool at the beginner’s level.
- Step 6: Learners perform the differential skills related to the use of the tool to improve the given ready-made industry-standard outputs.
- Step 7: Learners are engaged in appreciation of real-life case studies developed by the experts.
- Step 8: Learners are encouraged to proceed from appreciation to imitation of the experts.
- Step 9: After the imitation experience, they are required to improve the expert’s outputs so that they proceed from mere imitation to emulation.
- Step 10: Emulation is taken a level further from working with differential skills towards the visualization and creation of a complete output according to the requirements provided. (Long Assignments)
- Step 11: Understanding the requirements, communicating one’s own thoughts and presenting are important skills required in facing an interview for securing a work order/job. For instilling these skills, learners are presented with various subject-specific technical as well as HR-oriented questions and encouraged to answer them.
- Step 12: Finally, they develop the integral skills involving optimal methods and best practices to produce useful outputs right from scratch, publish them in their ePortfolio and thereby proceed from emulation to self-expression, from self-expression to self-confidence and from self-confidence to self-reliance and self-esteem!