May 19, 2022  
2020-2021 Course Catalog 
    
2020-2021 Course Catalog [ARCHIVED CATALOG]

Add to Portfolio (opens a new window)

NET 229 - Cisco Networking III

Credits: 4
Lecture Hours: 2
Lab Hours: 4
Practicum Hours: 0
Work Experience: 0
Course Type: Voc/Tech
This course describes the architecture, components, and operations of routers and switches in a larger and more complex network. Students learn how to configure routers and switches for advanced functionality. By the end of this course, students will be able to configure and troubleshoot routers and switches and resolve common issues with OPSF, NAT, ACL’s and wide area networking.
Prerequisite: NET 228  
Competencies
  1. Explain how single-area OSPF operates in both point-to-point and broadcast multi-access networks.
    1. Describe basic OSPF features and characteristics.
    2. Describe the OSPF packet types used in single-area OSPF.
  2. Implement single-area OSPFv2 in both point-to-point and broadcast multiaccess networks.
    1. Configure an OSPFv2 router ID.
    2. Configure single-area OSPFv2 in a point-to-point network.
    3. Configure the OSPF interface priority to influence the DR/BDR election in a multiaccess network.
    4. Implement modifications to change the operation of single-area OSPFv2.
    5. Configure OSPF to propagate a default route.
    6. Verify a single-area OSPFv2 implementation.
  3. Explain how vulnerabilities, threats, and exploits can be mitigated to enhance network security.
    1. Describe the current state of cybersecurity and vectors of data loss.
    2. Explain the threat actors and tools used to exploit networks.
    3. Describe common network attacks.
    4. Explain how IP vulnerabilities are exploited by threat actors.
    5. Describe best practices for protecting a network.
    6. Discuss common cryptographic processes used to protect data in transit.
  4. Examine how ACLs are used as part of a network security policy.
    1. Explain how ACLs use wildcard masks.
    2. Explain how to create ACLs.
    3. Compare standard and extended IPv4 ACLs.
  5. Implement IPv4 ACLs to filter traffic and secure administrative access.
    1. Configure standard and extended IPv4 ACLs to filter traffic to meet networking requirements.
    2. Use sequence numbers to edit existing standard IPv4 ACLs.
    3. Explain the structure of an extended access control entry (ACE).
  6. Examine the purpose, function and operation of NAT.
    1. Describe the advantages and disadvantages of NAT.
    2. Configure static and dynamic NAT using the CLI.
    3. Configure PAT using the CLI.
    4. Describe NAT for IPv6.
  7. Characterize how WAN access technologies can be used to satisfy business requirements.
    1. Explain the purpose of a WAN.
    2. Explain how WANs operate.
    3. Compare private and public WAN technologies.
    4. Describe the appropriate WAN protocol and service for a specific network requirement.
    5. Explain the fundamentals of point-to-point serial communication across a WAN.
    6. Compare remote access broadband connection options for small to medium-sized businesses.
  8. Explain how VPNs and IPsec are used to secure site-to-site and remote access connectivity.
    1. Describe benefits of VPN technology.
    2. Describe different types of VPNs
    3. Explain how the IPsec framework is used to secure network traffic.
  9. Explain how networking devices implement QoS.
    1. Discuss how network transmission characteristics impact quality.
    2. Describe minimum network requirements for voice, video, and data traffic.
    3. Explain how QoS uses mechanisms to ensure transmission quality.
  10. Implement network management protocols to monitor the network.
    1. Use CDP to map a network topology.
    2. Implement NTP between an NTP client and NTP server.
    3. Explain how SNMP operates.
    4. Explain syslog operation.
    5. Use commands to back up and restore an IOS configuration file.
    6. Perform an upgrade on an IOS system image.
  11. Explain the characteristics of scalable network architectures.
    1. Explain how data, voice, and video are converged in a switched network.
    2. Describe a switched network in a small to medium-sized business.
    3. Discuss hierarchical small business network designs.
    4. List considerations for designing a scalable network.
    5. Identify how switch hardware features support network requirements.
    6. Describe the types of routers available for small to-medium-sized business networks.
  12. Examine enterprise networks.
    1. Explain how network documentation is developed and used to troubleshoot network issues.
    2. Describe the general troubleshooting process.
    3. Compare troubleshooting methods that use a systematic, layered approach.
    4. Describe different networking troubleshooting tools.
    5. Determine the symptoms and causes of network problems using a layered model.
    6. Troubleshoot a network using the layered model.
  13. Explain the purpose and characteristics of network virtualization.
    1. Explain the importance of cloud computing.
    2. Explain the importance of virtualization.
    3. Describe the virtualization of network devices and services.
    4. Describe software-defined networking.
    5. Describe controllers used in network programming.
  14. Analyze how network automation is enabled through RESTful APIs and configuration management tools.
    1. Describe automation.
    2. Compare JSON, YAML, and XML data formats.
    3. Explain how APIs enable computer to computer communications.
    4. Explain how REST enables computer to computer communications.
    5. Compare configuration management tools.
    6. Explain how Cisco DNA center enables intent-based networking.

Competencies Revised Date: 2019



Add to Portfolio (opens a new window)