Week 1-3 Review
1. Networking Concepts
a. OSI model
b. Network appliances, application, functions
c. Cloud concepts and connectivity options
d. Ports, protocols, and services
e. Transmission media and transceivers
f. Network topologies, architectures, and types
g. IPv4 addressing
2. Network Implementation
a. Characteristics of routing technologies
b. Switching technologies and features
c. Wireless devices and technologies
d. Important factors of physical installations
3. Network Troubleshooting
a. Troubleshooting methodology
b. Common cabling and physical interface issues
c. Troubleshooting common networking issues
d. Troubleshooting common performance issues
e. Tools and Protocols for solving networking issues
Week 4-5
4. Network Operations
a. Organizational Processes and Procedures
b. Network monitoring technologies
c. Disaster Recovery Concepts
d. Implement IPv4 and IPv6 Network Services
e. Network Access and management methods
5. Network Security
a. Basic network security concepts
b. Types of attacks and their impact on the network
c. Network security features
d. Defense techniques and solutions
Acronyms you need to know:
A - Address: A unique identifier for a network device or resource.
ACL - Access Control List: A set of rules used to control network traƯic and access to
resources.
AH - Authentication Header: A protocol used to provide connectionless integrity and data origin
authentication.
AP - Access Point: A device that allows wireless devices to connect to a wired network.
API - Application Programming Interface: A set of tools and protocols for building and interacting
with software applications.
APIPA - Automatic Private Internet Protocol Addressing: A method for self-assigning an IP
address
when a DHCP server is unavailable.
ARP - Address Resolution Protocol: A protocol used to map IP addresses to MAC addresses.
AUP - Acceptable Use Policy: Guidelines that define the acceptable use of resources within a
network.
BGP - Border Gateway Protocol: A protocol used to exchange routing information between
autonomous systems on the internet.
BNC - Bayonet Neill–Concelman: A type of connector used for coaxial cables.
BSSID - Basic Service Set Identifier: A unique identifier for a specific access point in a wireless
network.
BYOD - Bring Your Own Device: A policy allowing employees to use their personal devices for
work purposes.
CAM - Content-addressable Memory: A type of memory used in networking devices for fast data
lookup.
CDN - Content Delivery Network: A network of servers that distribute content to users based on
their geographic location.
CDP - Cisco Discovery Protocol: A proprietary protocol used by Cisco devices to share
information with directly connected devices.
CIA - Confidentiality, Integrity, and Availability: A model used to guide policies for information
security.
CIDR - Classless Inter-domain Routing: A method for allocating IP addresses and routing IP
packets.
CLI - Command-line Interface: A text-based interface used to interact with software and
operating systems.
CNAME - Canonical Name: A type of DNS record that maps an alias name to a true (canonical)
domain name.
CPU - Central Processing Unit: The primary component of a computer that performs most of the
processing.
CRC - Cyclic Redundancy Check: A method used to detect errors in data transmission.
DAC - Direct Attach Copper: A type of cable used for short-range connections in data centers.
DAS - Direct-attached Storage: A storage device that is directly connected to a server or
workstation.
DCI - Data Center Interconnect: Technologies used to connect and manage multiple data
centers.
DDoS - Distributed Denial-of-service: A type of attack where multiple systems overwhelm a
target with traffic.
DHCP - Dynamic Host Configuration Protocol: A protocol that automatically assigns IP
addresses to devices on a network.
DLP - Data Loss Prevention: Technologies and strategies to prevent the unauthorized
transmission of data.
DNS - Domain Name System: A system that translates domain names into IP addresses.
DNSSEC - Domain Name System Security Extensions: A suite of extensions that add security
to DNS.
DoH - DNS over Hypertext Transfer Protocol Secure: A protocol for performing DNS resolution
via the HTTPS protocol.
DoS - Denial-of-service: An attack that makes a network service unavailable to its intended
users.
DoT - DNS over Transport Layer Security: A protocol for encrypting DNS queries and responses
to improve privacy and security.
DR - Disaster Recovery: Strategies and processes for recovering from catastrophic events
affecting IT systems.
EAPoL - Extensible Authentication Protocol over LAN: A network port authentication protocol
used in wired and wireless networks.
EIGRP - Enhanced Interior Gateway Routing Protocol: A Cisco proprietary routing protocol used
to automate routing decisions and configuration.
EOL - End-of-life: The point at which a product is no longer supported or produced by the
manufacturer.
EOS - End-of-support: The date when a manufacturer will no longer provide support or updates
for a product.
ESP - Encapsulating Security Payload: A protocol used in IPSec to provide confidentiality,
integrity and authenticity of data packets.
ESSID - Extended Service Set Identifier: The name of a wireless network in a multiple-access
point configuration.
EULA - End User License Agreement: A legal contract between a software provider and the
user outlining the terms of use.
FC - Fibre Channel: A high-speed network technology primarily used for storage networking.
FHRP - First Hop Redundancy Protocol: Protocols that provide redundancy for IP gateways,
ensuring availability.
FTP - File Transfer Protocol: A standard network protocol used to transfer files between a client
and server.
GDPR - General Data Protection Regulation: A regulation in the EU governing data protection
and privacy.
GRE - Generic Routing Encapsulation: A tunneling protocol used to encapsulate a wide variety
of network layer protocols.
GUI - Graphical User Interface: A visual interface allowing users to interact with a computer
using graphical elements like icons and buttons.
HTTP - Hypertext Transfer Protocol: A protocol used for transmitting hypertext (web pages) over
the internet.
HTTPS - Hypertext Transfer Protocol Secure: A secure version of HTTP that encrypts data for
safe communication over the internet.
IaaS - Infrastructure as a Service: A cloud computing model that provides virtualized computing
resources over the internet.
IaC - Infrastructure as Code: The process of managing and provisioning computing
infrastructure through machine-readable scripts or code.
IAM - Identity and Access Management: A framework of policies and technologies for ensuring
that the right users have the appropriate access to technology resources.
ICMP - Internet Control Message Protocol: A network protocol used for error handling and
diagnostics in IP networks.
ICS - Industrial Control System: Systems used to control industrial processes, including SCADA,
DCS, and PLCs.
IDF - Intermediate Distribution Frame: A distribution point for network cables and equipment
within a building.
IDS - Intrusion Detection System: A system that monitors network traƯic for suspicious activity
and potential threats.
IoT - Internet of Things: A network of physical objects embedded with sensors and software to
connect and exchange data with other devices.
IIoT - Industrial Internet of Things: The use of IoT technology in industrial sectors and
applications.
IKE - Internet Key Exchange: A protocol used to set up a secure, authenticated communication
channel in IPSec.
IP - Internet Protocol: A protocol responsible for addressing and routing packets of data across
networks.
IPAM - Internet Protocol Address Management: Tools and processes for planning, tracking, and
managing IP address space.
IPS - Intrusion Prevention System: A system that actively monitors and blocks potential threats
to the network.
IPSec - Internet Protocol Security: A suite of protocols used to secure Internet Protocol (IP)
communications by authenticating and encrypting each IP packet.
IS-IS - Intermediate System to Intermediate System: A routing protocol used to move
information efficiently within a computer network, a variant of the link-state routing protocol.
LACP - Link Aggregation Control Protocol: A protocol used to combine multiple network
connections in parallel to increase throughput and provide redundancy.
LAN - Local Area Network: A network that connects devices within a limited area, such as a
home, school, or office.
LC - Local Connector: A type of fiber optic connector used in high-density connections.
LDAP - Lightweight Directory Access Protocol: A protocol used to access and manage directory
information services over a network.
LDAPS - Lightweight Directory Access Protocol over SSL: A secure version of LDAP using
SSL/TLS encryption.
LLDP - Link Layer Discovery Protocol: A protocol used by network devices to advertise their
identity and capabilities to neighbors on the same local network.
MAC - Media Access Control: A unique identifier assigned to network interfaces for
communications on the physical network.
MDF - Main Distribution Frame: A central point in a network where cables converge and connect
to switching equipment.
MDIX - Medium Dependent Interface Crossover: A network interface that automatically crosses
over the transmit and receive pairs of a cable.
MFA - Multifactor Authentication: A security process that requires multiple methods of
authentication from independent categories of credentials.
MIB - Management Information Base: A database used for managing the entities in a
communication network.
MPO - Multifiber Push On: A type of fiber optic connector that allows for the connection of
multiple fibers in a single interface.
MTBF - Mean Time Between Failure: The predicted elapsed time between inherent failures of a
system during operation.
MTTR - Mean Time To Repair: The average time required to repair a failed component or
device.
MTU - Maximum Transmission Unit: The largest size of a packet or frame that can be sent in a
network.
MX - Mail Exchange: A DNS record that directs email to a mail server.
NAC - Network Access Control: A security solution that controls access to a network based on
policies, including authentication and compliance checks.
NAS - Network-attached Storage: A storage device connected to a network that provides data
access to a group of clients.
NAT - Network Address Translation: A method of remapping IP addresses by modifying network
address information in packet headers.
NFV - Network Functions Virtualization: A network architecture concept that uses virtualization
to manage core networking functions via software.
NIC - Network Interface Card: A hardware component that connects a computer to a network.
NS - Name Server: A server that maps domain names to IP addresses.
NTP - Network Time Protocol: A protocol used to synchronize clocks on computers within a
network.
NTS - Network Time Security: An extension to NTP that adds cryptographic security features to
protect time synchronization.
OS - Operating System: Software that manages hardware and provides services for computer
programs.
OSPF - Open Shortest Path First: A link-state routing protocol used to determine the best path
for data through a network.
OSI - Open Systems Interconnection: A conceptual model used to standardize communications
functions in telecommunication and computing systems.
OT - Operational Technology: Hardware and software that detects or causes changes through
direct monitoring and control of physical devices, processes, and events.
PaaS - Platform as a Service: A cloud computing model that provides a platform allowing
customers to develop, run, and manage applications without dealing with the infrastructure.
PAT - Port Address Translation: A type of NAT that maps multiple private IP addresses to a
single public IP address using diƯerent ports.
PCI DSS - Payment Card Industry Data Security Standards: A set of security standards
designed to ensure that all companies that accept, process, store, or transmit credit card
information maintain a secure environment.
PDU - Power Distribution Unit: A device that distributes electric power to multiple devices, often
used in data centers.
PKI - Public Key Infrastructure: A framework for managing digital certificates and public-key
encryption.
PoE - Power over Ethernet: A technology that allows electrical power to be transmitted over
network cables long with data.
PSK - Pre-shared Key: A shared secret used for securing wireless networks, typically used in
WPA or WPA2.
PTP - Precision Time Protocol: A protocol used to synchronize clocks throughout a computer
network with high precision.
PTR - Pointer: A type of DNS record that maps an IP address to a domain name, often used in
reverse DNS lookups.
QoS - Quality of Service: A set of techniques to manage network traƯic and ensure the
performance of critical applications.
QSFP - Quad Small Form-factor Pluggable: A type of compact, hot-pluggable transceiver used
for data communications applications.
RADIUS - Remote Authentication Dial-in User Service: A networking protocol that provides
Centralized authentication, authorization, and accounting for users who connect and use a
network service.
RDP - Remote Desktop Protocol: A protocol developed by Microsoft that allows a user to
connect to another computer over a network.
RFID - Radio Frequency Identifier: A technology that uses electromagnetic fields to
automatically identify and track tags attached to objects.
RIP - Routing Information Protocol: One of the oldest distance-vector routing protocols used to
determine the best route for data through a network.
RJ - Registered Jack: A standardized physical network interface for connecting
telecommunications or networking equipment.
RPO - Recovery Point Objective: The maximum acceptable amount of data loss measured in
time during a disaster.
RSTP - Rapid Spanning Tree Protocol: An enhancement of the Spanning Tree Protocol (STP)
that provides faster convergence in a network.
RTO - Recovery Time Objective: The target time set for the recovery of IT and business
activities after a disaster.
RX - Receiver: A device or component that receives data or signals.
SaaS - Software as a Service: A cloud computing model that provides software applications
over the internet, typically on a subscription basis.
SAML - Security Assertion Markup Language: An XML-based standard for exchanging
authentication and authorization data between parties, particularly between an identity provider
and a service
provider.
SAN - Storage Area Network: A specialized network that provides access to consolidated,
block-level data storage.
SASE - Secure Access Service Edge: A network architecture model that combines network
security functions with WAN capabilities to support the secure access needs of organizations.
SC - Subscriber Connector: A type of fiber optic connector commonly used in data networks.
SCADA - Supervisory Control and Data Acquisition: A system used for remote monitoring and
control of industrial processes.
SDN - Software-defined Network: An approach to networking that uses software-based
controllers to manage network resources and services.
SD-WAN - Software-defined Wide Area Network: A virtual WAN architecture that allows
enterprises to leverage any combination of transport services to securely connect users to
applications.
SFP - Small Form-factor Pluggable: A compact, hot-pluggable transceiver used in data
communications and telecommunication networks.
SFTP - Secure File Transfer Protocol: A secure version of FTP that encrypts both commands
and data.
SIP - Session Initiation Protocol: A protocol used to initiate, maintain, and terminate real-time
sessions in IP networks, such as voice and video calls.
SIEM - Security Information and Event Management: A solution that provides real-time analysis
of security alerts generated by network hardware and applications.
SLA - Service-level Agreement: A contract between a service provider and a customer that
specifies the level of service expected.
SLAAC - Stateless Address Autoconfiguration: A method in IPv6 that allows devices to
configure their own IP addresses automatically.
SMB - Server Message Block: A network protocol used for providing shared access to files,
printers, and serial ports between nodes on a network.
SMTP - Simple Mail Transfer Protocol: A protocol used for sending email messages between
serves.
SMTPS - Simple Mail Transfer Protocol Secure: An extension of SMTP that provides encrypted
communication using SSL/TLS.
SNMP - Simple Network Management Protocol: A protocol used for collecting and organizing
information about managed devices on IP networks.
SOA - Start of Authority: A DNS record that provides information about the DNS zone and the
authoritative server for that zone.
SQL - Structured Query Language: A standardized language used to manage and manipulate
databases.
SSE - Security Service Edge: A framework that combines multiple security services, such as
SWG, CASB, and ZTNA, to protect users and data in the cloud.
SSH - Secure Shell: A cryptographic network protocol used for secure data communication,
remote command-line login, and other secure network services.
SSID - Service Set Identifier: The name of a wireless network, used to identify and diƯerentiate
between networks.
SSL - Secure Socket Layer: A protocol for establishing authenticated and encrypted links
between networked computers.
SSO - Single Sign-on: An authentication process that allows a user to access multiple
applications with one set of login credentials.
ST - Straight Tip: A type of fiber optic connector known for its bayonet-style coupling.
STP - Shielded Twisted Pair: A type of twisted-pair cabling that includes shielding to reduce
electromagnetic interference.
SVI - Switch Virtual Interface: A virtual interface used to manage a switch and allow
communication between VLANs.
TACACS+ - Terminal Access Controller Access Control System Plus: A protocol used for
centralized authentication, authorization, and accounting for users who access a network.
TCP - Transmission Control Protocol: A core protocol of the Internet Protocol suite that ensures
reliable, ordered, and error-checked delivery of data.
TFTP - Trivial File Transfer Protocol: A simple file transfer protocol that provides basic file
transfer capabilities without authentication.
TTL - Time to Live: A value in an IP packet that indicates how long the packet should be allowed
to remain in the network before being discarded.
TX - Transmitter: A device or component that sends data or signals.
TXT - Text: A type of DNS record used to store text information, often used for verification
purposes.
UDP - User Datagram Protocol: A communication protocol that oƯers a faster, but less reliable,
transmission service compared to TCP.
UPS - Uninterruptible Power Supply: A device that provides backup power to electronics in the
event of a power failure.
URL - Uniform Resource Locator: The address used to access resources on the internet.
USB - Universal Serial Bus: A standard for connectors, cables, and protocols used for
communication and power supply between computers and electronic devices.
UTM - Unified Threat Management: A security solution that integrates multiple security features,
such as firewall, antivirus, and intrusion detection, into a single device.
UTP - Unshielded Twisted Pair: A type of twisted-pair cabling that does not include shielding
and is commonly used in Ethernet networks.
VIP - Virtual IP: An IP address that is assigned to multiple devices, allowing them to share the
same
IP address in a load-balanced or failover configuration.
VLAN - Virtual Local Area Network: A logical group of devices on a network that are segmented
by function, department, or other criteria.
VLSM - Variable Length Subnet Mask: A technique that allows for more eƯicient allocation of IP
addresses by using diƯerent subnet masks within the same network.
VoIP - Voice over IP: A technology that allows voice communication and multimedia sessions
over the Internet Protocol (IP) networks.
VPC - Virtual Private Cloud: A secure and isolated private cloud hosted within a public cloud
environment.
VPN - Virtual Private Network: A service that encrypts internet traƯic and routes it through a
remote server to provide privacy and security.
WAN - Wide Area Network: A telecommunications network that extends over a large geographic
area for the purpose of computer networking.
WPA - Wi-Fi Protected Access: A security protocol used to secure wireless networks.
WPS - Wi-Fi Protected Setup: A network security standard that simplifies the process of
connecting devices to a secure wireless network.
VXLAN - Virtual Extensible LAN: A network virtualization technology that allows for the creation
of large-scale virtualized networks over existing Layer 3 infrastructures.
ZTA - Zero Trust Architecture: A security model that assumes no implicit trust, requiring
verification of every access attempt regardless of its origin.