PRIVATE GROUP FEE:
$ Based upon a class size of six students.
Scheduling can be adjusted to employee work hours and incorporate client assignments.
SMALL CLASS SIZE:
There is a surcharge associated with training two or fewer students.
AUDIENCE:
Network Administrator
Support Personnel
Security Analyst
IT Professional
DATES:
CONTENT AND OBJECTIVES:
Getting Started
Examine clients, servers, daemons, well known sockets, dynamic sockets and ports.
Analyze the TCP/IP model for client-server interaction.
Ethernet IEEE Identifiers
Identify the network configuration.
Given the client specific configuration of the network, determine the IP address and the netmasks.
Virtual LAN
Create a VLAN and understand its function.
Perform a network reconfiguration and modification to the subnet.
Routing
Become familiar with the functions performed by a router and tasks for administering routers.
Create multiple networks connected through static routing.
Configure the routers and the host.
Transport
Become familiar with stubs, IDL: Interface Definition Language and the function of RPC: Remote Procedure Calls.
Install a program on two machines which communicate using Remote Procedure Calls.
Common Services
Identify the services associated with FTP.
Start up the FTP server.
Determine which users can use the server and which are denied.
Setup the view of the individual users.
Remove the capability to use rsh and rlogin for the purpose of improving security.
Network Time
Learn the tasks required for creating and using NCP: Network Time Protocol.
Setup the NCP for synchronization to occur at all the computers on the network.
DHCP: Dynamic Host Configuration Protocol
Identify and perform the configuration of a DHCP server.
Create and configure a DHCP server.
Set the IP address of the server's Ethernet card; the address must be a static IP address.
Establish the subnet mask.
DNS: Domain Name System
Identify and examine the configuration of a DNS server.
Create and configure a DNS server; the address must be a static IP address.
Define and establish the subnet mask.
Update the forward zone file definitions list files for mapping domains to IP addresses.
Update the reverse zone file definitions list files for mapping IP addresses to domains.
Understand the functionality and utilization of SNMP for monitoring networks.
Configure the three key components of an SNMP managed network: managed devices, agents, and NMSs - network-management systems.
NFS: Network File System
Connect a MS Windows system to a UNIX/Linux system.
Install the Windows Services for UNIX's NFS components to connect MS Windows to an NFS system.
Troubleshooting
Determine system issues and its solutions.
Given environment specific instructions, browse the logs to research problems.
Utilize the sar, vmstat, iostat, and dtrace tools to propose resolution(s) to the problem(s).
Virtual Classroom
Blended Learning
↓
Synchronous Instruction
Asynchronous Instruction
Effective February 27, 2012, the course dates listed on the CETi schedules only will be available based upon approved and authorized user ID.
Copyright Acknowledgement: The software product(s) listed in this outline are owned and copyrighted by their respective companies. CETi makes no representation regarding ownership in any of the software products that we train on.
CETi courses are not intended for or open to the general public. They are intended for employees of Fortune 1000 companies, government municipalities, consulting companies, software, companies, healthcare providers. and mid-sized businesses. Individuals attending such courses will be required to execute a statement acknowledging that the employer will be paying for the CETi course and that the employer has a licensed version of the software.
Certain courses only should be taught by the source software company training company and open source purveyor.