About Diploma In Computer Network

Diploma in Computer Networking is open to anyone with the knowledge of hardware.This hands on course is our recommended cirriculam for those who want to upgrade from hardware to Networking. This course covers the full range of IBM and IBM-compatible systems. This is a preliminary course recommended for candidates wish to enter Network and System administration field.


Diploma In Computer Network Highlights

Course Duration

2 Months

Learners

50000

Delivery Mode

Online

Apply Online

Click Now

WHO WILL BENEFIT

Students
Engineers
Systems programmers
Coding Enthusiast

COURSE CURRICULUM

What is a Network?

  • alt text Client/Server
  • alt text Peer-to-Peer
  • alt text LAN - Local Area Network
  • alt text CAN - Campus Area Network
  • alt text MAN - Metropolitan Area Network
  • alt text WAN - Wide Area Network
  • alt text How Do We Make Connections?
  • alt text What is a Protocol?
  • alt text Introduction to Addressing




Network Media

  • alt text Wired Media - Twisted Pair, Coaxial, and Fiber Optic
  • alt text What is the Plenum?
  • alt text Common Connectors
  • alt text Wiring Standards
  • alt text LAN Technology Types - Ethernet
  • alt text Standard Ethernet
  • alt text Fast Ethernet
  • alt text Gigabit Ethernet
  • alt text 10 Gigabit Ethernet
  • alt text Wiring Distriburtion


Network Topologies

  • alt text What Does Topology Mean?
  • alt text Bus, Star, Ring, Mesh, Hybrid,
  • alt text WAN Technologies - Circuit and Pocket Switching
  • alt text POTS, PSTN, T1/E1, and T3/E3
  • alt text ISDN
  • alt text SONET/OC-x
  • alt text Frame Relay and ATM
  • alt text MPLS - Multiprotocol Label Switching
  • alt text DSL
  • alt text Cable Modem, Satellite and Wireless
  • alt text What is a VPN?
  • alt text What is a VLAN?

OSI Model
  • alt text Definition of a Protocol
  • alt text Standards of Communication
  • alt text What is the OSI Model?
  • alt text Defining OSI Model Layers
  • alt text How Data Travels Through OSI Model
  • alt text Networking Hardware in OSI Model
osi

TCP/IP
  • alt text TCP/IP Protocol Suite
  • alt text What is TCP/IP (DARPA) Model?
  • alt text Transport Layer Protocols
  • alt text Internet Layer Protocols
  • alt text Types of TCP/IP Communication
  • alt text Working with IP Addresses
  • alt text Planning an IP Addressing Scheme
  • alt text Rules for IP Addressing
  • alt text What is Classful IP Addressing?
  • alt text Private vs. Public IP Addressing
  • alt text What is NAT?
  • alt text How Computers Get IP Addresses
  • alt text Working with Binary Numbers
  • alt text Converting Binary to Decimal and Vice Versa
  • alt text Binary IP Addresses
  • alt text Binary Subnet Masks
  • alt text Internetworking - What is a Router?
  • alt text What is a Default Gateway?
  • alt text What is Subnetting?
  • alt text Classful vs. Classless Interdomain Routing (CIDR)
  • alt text Subnetting with CIDR & VLSM
  • alt text CIDR Notation

tcpip
TCP/IP Protocols
  • alt text FTP - File Transfer Protocol
  • alt text TFTP - Trivial File Transfer Protocol
  • alt text HTTP and HTTPS
  • alt text NTP - Network Time Protocol
  • alt text POP3 and IMAP4
  • alt text SMTP - Simple Mail Transfer Protocol
  • alt text DHCP - Dynamic Host Configuration Protocol
  • alt text DNS - Domain Naming System
  • alt text Telnet and SSH
  • alt text SNMP - Simple Network Management Protocol
  • alt text SIP and RTP
  • alt text TLS - Transport Layer Security

Network Devices
  • alt text Modem and NIC
  • alt text Repeater and Hub
  • alt text Bridge and Switch
  • alt text Router
  • alt text Different Types of Switches
  • alt text Advanced Switch Funcionality
  • alt text Firewall and Proxy Server
  • alt text Wireless Access Point
  • alt text Basic DHCP Server and DNS Server
  • alt text CSU/DSU
  • alt text Media Converters
  • alt text Load Balancer and Bandwidth Shaper
Routing
  • alt text Understanding Routing Tables
  • alt text Adding and Deleting Routes
  • alt text Static vs. Dynamic Routing
  • alt text Routing Protocols
  • alt text Distance Vector Protocols: RIP, RIPv2, and BGP
  • alt text Link State Protocols: OSPF and IS-IS
  • alt text Hybrid Routing Protocol: EIGRP
  • alt text What is Convergence?
  • alt text IGP vs. EGP


Wireless Networking
  • alt text Benefits of Wireless Networking
  • alt text Components of a Wireless Access Point
  • alt text Where to Place a WAP
  • alt text Wireless Networking Standards
  • alt text RF Channels
  • alt text How to Secure a Wireless Network
  • alt text WEP - Wired Equivalency Privacy
  • alt text WPA - Wi-Fi Protected Access
  • alt text 802.1x
  • alt text Setting Up a Wireless Access Point


Networking Command Line Tools
  • alt text ipconfig/ifconfig/arp Utilities Overview
  • alt text ping/arp ping Utilities Overview
  • alt text tracert/traceroute Utilities Overview
  • alt text mtr Utility Overview
  • alt text netstat/nbstat/route Utilities Overview
  • alt text nslookup/dig/host Utilities Overview
  • alt text ipconfig Command
  • alt text arp Command
  • alt text ping Command
  • alt text tracert Command
  • alt text netstat Command
  • alt text nslookup Command
command
Network Performance Optimization
  • alt text Reasons for Network Performance Optimization
  • alt text Quality of Service (QoS)
  • alt text Traffic Shaping
  • alt text Load Balancing
  • alt text Fault Tolerance
  • alt text RAID 0 - Disk Striping
  • alt text RAID 1 - Disk Mirroring and Duplexing
  • alt text RAID 5 - Disk Striping with Parity
  • alt text Other Popular Forms of RAID
  • alt text Caching Engines
Network Tools
  • alt text Cable Strippers
  • alt text Snips and Crimpers
  • alt text Punch Down Tool
  • alt text Cable Testers and Certifiers
  • alt text Time Domain Reflectometer (TDR) and Optical Time Domain Reflectometer (OTDR)
  • alt text Toner Probe
  • alt text Voltage Event Recorder
  • alt text Multimeter
  • alt text Protocol Analyzer, Temperature Monitor, and Butt Set
monitor
Network Monitoring
  • alt text Packet Sniffers
  • alt text Port Scanners
  • alt text Intrusion Detection Software (IDS) and Intrusion Prevention Software (IPS)
  • alt text System, Event, and History Logs
Documentation
  • alt text Why is Documentation so Important?
  • alt text What Should I Document?
  • alt text Wiring Schematics
  • alt text Physical and Logical Network Diagrams
  • alt text Baseline
  • alt text Network Policies
  • alt text Network Procedures
  • alt text Network Configuration
  • alt text Regulations
Troubleshooting
  • alt text The Process of Troubleshooting - Gather Information
  • alt text Who is Affected?
  • alt text What's Changed?
  • alt text Why is This Happening?
  • alt text Can I Handle It?
  • alt text Process of Finding a Solution
  • alt text Physical Issues
  • alt text Logical Issues
  • alt text Issues to Escalate
  • alt text Wireless Issues
  • alt text CMOS Setting
  • alt text Operating System Troubleshooting
  • alt text Hardware Troubleshooting
Network Security
  • alt text Firewalls
  • alt text Other Security Devices
  • alt text Network Access Security
  • alt text Filtering
  • alt text Tunneling and Encryption
  • alt text User Authentication
  • alt text Device Security
  • alt text Common Security Threats