Section-1 Network architecture:
1.1 Explain the functions and applications of various network devices
- Router
- Switch
- Multilayer switch
- Firewall
- HIDS
- IDS/IPS
- Analog modem
1.2 Install and configure the following networking services/applications DHCP
- Static vs dynamic IP addressing
- Reservations
- Scopes
- Leases
- Options (DNS servers, suffixes)
- IP helper/DHCP relay
- DNS servers
- DNS records (A, MX, AAAA, CNAME, PTR)
- Dynamic DNS
- PAT
- SNAT
- DNAT
- Port forwarding
DNS
Proxy/reverse proxy NAT
1.3 Differentiate between common network topologies
- Mesh
- Bus
- Ring
- Star
- Hybrid
- Point-to-point
- Point-to-multipoint
- Client-server
- Peer-to-peer
1.4 Differentiate between network infrastructure implementations
- WAN
- MAN
- LAN
- WLAN
- PAN
- SCADA/ICS
- Medianets
- VTC
- ISDN
- IP/SIP
1.5 Explain the basics of routing concepts and protocols
- Loopback interface
- Routing loops
- Routing tables
- Static vs dynamic routes
- Default route
- Distance vector routing protocols
- RIP v2
- Hybrid routing protocols
- BGP
- Link state routing protocols
- OSPF
- IS-IS
- Interior vs exterior gateway routing protocols
- Autonomous system numbers
- Route redistribution
- High availability
- VRRP
- Virtual IP
- HSRP
- Route aggregation
- Routing metrics
- Hop counts
- MTU, bandwidth
- Costs
- Latency
- Administrative distance
- SPB
Section-2 Network operations
2.1 Given a scenario, use appropriate monitoring tools
- Packet/network analyzer
- Interface monitoring tools
- Port scanner
- Top talkers/listeners
- SNMP management software
- Trap
- Get
- Walk
- MIBS
- Alerts
- SMS
- Packet flow monitoring
- SYSLOG
- SIEM
- Environmental monitoring tools
- Temperature
- Humidity
- Power monitoring tools
- Wireless survey tools
- Wireless analyzers
2.2 Given a scenario, configure a switch using proper features
- VLAN
- Native VLAN/Default VLAN
- VTP
- Spanning tree (802.1d)/rapid spanning tree (802.1w)
- Flooding
- Forwarding/blocking
- Filtering
- Interface configuration
- Trunking/802.1q
- Tag vs untag VLANs
- Port bonding (LACP)
- Port mirroring (local vs remote)
- Speed and duplexing
- IP address assignment
- VLAN assignment
- Default gateway
- PoE and PoE+ (802.3af, 802.3at)
- Switch management
- User/passwords
- AAA configuration
- Console
- Virtual terminals
- In-band/Out-of-band management
- Managed vs unmanaged
Section-3 Network security
3.1 Compare and contrast risk related concepts
- Disaster recovery
- Business continuity
- Battery backups/UPS
- First responders
- Data breach
- End user awareness and training
- Single point of failure
- Critical nodes
- Critical assets
- Redundancy
- Adherence to standards and policies
- Vulnerability scanning
- Penetration testing
3.2 Compare and contrast common network vulnerabilities and threats
- Attacks/threats
- Denial of service
- Distributed DoS
- Botnet
- Traffic spike
- Coordinated attack
- Reflective/amplified
- DNS
- NTP
- Smurfing
- Friendly/unintentional DoS
- Physical attack
- Permanent DoS
- ARP cache poisoning
- Packet/protocol abuse
- Spoofing
- Wireless
- Evil twin
- Rogue AP
- War driving
- War chalking
- Bluejacking
- Bluesnarfing
- WPA/WEP/WPS attacks
- Brute force
- Session hijacking
- Social engineering
- Man-in-the-middle
- VLAN hopping
- Compromised system
- Effect of malware on the network
- Insider threat/malicious employee
- Zero day attacks
- Vulnerabilities
- Unnecessary running services
- Open ports
- Unpatched/legacy systems
- Unencrypted channels
- Clear text credentials
- Unsecure protocols
- TELNET
- HTTP
- SLIP
- FTP
- TFTP
- SNMPv1 and SNMPv2
- TEMPEST/RF emanation
3.3 Given a scenario, install and configure a basic firewall
- Types of firewalls
- Host-based
- Network-based
- Software vs hardware
- Application aware/context aware
- Small office/home office firewall
- Stateful vs stateless inspection
- UTM
- Settings/techniques
- ACL
- Virtual wire vs routed
- DMZ
- Implicit deny
- Block/allow
- Outbound traffic
- Inbound traffic
- Firewall placement
- Internal/external
3.4 Explain the purpose of various network access control models
- 802.1x
- Posture assessment
- Guest network
- Persistent vs non-persistent agents
- Quarantine network
- Edge vs access control
- Identify the problem
- Gather information
- Duplicate the problem, if possible
- Question users
- Identify symptoms
- Determine if anything has changed
- Approach multiple problems individually
- Establish a theory of probable cause
- Question the obvious
- Consider multiple approaches
- Top-to-bottom/bottom-to-top OSI model
- Divide and conquer
- Test the theory to determine cause
- Once theory is confirmed, determine next steps to resolve problem
- If theory is not confirmed, re-establish new theory or escalate
- Establish a plan of action to resolve the problem and identify potential effects
- Implement the solution or escalate as necessary
- Verify full system functionality and if applicable implement preventative
- measures
- Document findings, actions, and outcomes
- Command line tools
- ipconfig
- netstat
- ifconfig
- ping/ping6/ping -6
- tracert/tracert -6/traceroute6/traceroute -6
- nbtstat
- nslookup
- arp
- mac address lookup table
- pathping
- Line testers
- Certifiers
- Multimeter
- Cable tester
- Light meter
- Toner probe
- Speed test sites
- Looking glass sites
- WiFi analyzer
- Protocol analyzer
- Shorts
- Opens
- Incorrect termination (mismatched standards)
- Straight-through
- Crossover
- Cross-talk
- Near end
- Far end
- EMI/RFI
- Distance limitations
- Attenuation/Db loss
- Bad connector
- Bad wiring
- Split pairs
- Tx/Rx reverse
- Cable placement
- Bad SFP/GBIC - cable or transceiver
- Misconfigured firewall
- Misconfigured ACLs/applications
- Malware
- Denial of service
- Open/closed ports
- ICMP related issues
- Ping of death
- Unreachable default gateway
- Unpatched firmware/OSs
- Malicious users
- Trusted
- Untrusted users
- Packet sniffing
- Authentication issues
- TACACS/RADIUS misconfigurations
- Default passwords/settings
- Improper access/backdoor access
- ARP issues
- Banner grabbing/OUI
- Domain/local group configurations
- Jamming
- Layer 1 – Physical
- Layer 2 – Data link
- Layer 3 – Network
- Layer 4 – Transport
- Layer 5 – Session
- Layer 6 – Presentation
- Layer 7 – Application
- Encapsulation/de-encapsulation
- Modulation techniques
- Multiplexing
- De-multiplexing
- Analog and digital techniques
- TDM
- Numbering systems
- Binary
- Hexadecimal
- Octal
- Broadband/base band
- Bit rates vs baud rate
- Sampling size
- CDMA/CD and CSMA/CA
- Carrier detect/sense
- Wavelength
- TCP/IP suite
- ICMP
- UDP
- TCP
- Collision
- 802.11a
- 802.11b
- 802.11g
- 802.11n
- 802.11ac
- Security policies
- Consent to monitoring
- Network policies
- Acceptable use policy
- Standard business documents
- SLA
- MOU
- MLA
- SOW
- 80 HTTP
- 443 HTTPS
- 137-139 Netbios
- 110 POP
- 143 IMAP
- 25 SMTP
- 5060/5061 SIP
- 2427/2727 MGCP
- 5004/5005 RTP
- 1720 H.323
- TCP
- Connection-oriented
- UDP
- Connectionless