Computer Network Fundamentals
Introduction to Computer Networks28Network Standards and Protocols24Network Media and Devices30IP Addressing and Subnetting27Network Configuration28Network Management24Network Security Threats22Network Security Measures23Network Security Best Practices30Troubleshooting Tools and Techniques22Common Network Problems23Advanced Troubleshooting22
Network Security
Introduction to Network Security25Security Policies and Standards23Risk Assessment and Management28Cryptography and Encryption31Firewalls and Intrusion Detection Systems28Virtual Private Networks (VPNs)25Network Access Control (NAC)22Security Information and Event Management (SIEM)28Security Monitoring Techniques30Incident Response Planning and Procedures28Forensic Analysis and Evidence Collection26Security Auditing and Compliance28Cloud Security22Mobile Device Security28Social Engineering and Phishing27Emerging Security Trends25
Network Troubleshooting
Identifying and resolving common network connectivity issues24Using diagnostic tools to troubleshoot network connectivity26Troubleshooting wireless network connectivity24Identifying and resolving network performance issues29Using performance monitoring tools to troubleshoot network performance24Troubleshooting network congestion23Identifying and resolving common network security issues26Using security monitoring tools to troubleshoot network security23Troubleshooting network access control22Troubleshooting virtualized networks22Troubleshooting cloud-based networks22Troubleshooting software-defined networks (SDN)29
Network Management
Introduction to Network Management26Network Management Standards and Protocols24Network Management Tools24Network Monitoring Techniques23Network Troubleshooting Methodologies26Common Network Problems and Solutions30Network Configuration Management Principles28Network Configuration Tools24Network Change Management22Network Performance Metrics28Network Performance Analysis Techniques30Network Performance Optimization Techniques27Network Security Threats and Vulnerabilities30Network Security Controls and Measures28Network Security Management Best Practices27
Network Protocols
Definition and Purpose of Network Protocols27Types of Network Protocols26Protocol Standards and Organizations30Introduction to TCP IP27TCP and UDP Protocols24IP Addressing and Subnetting23Dynamic Routing Protocols23Static Routing28Routing Table Management25Introduction to Network Security27Encryption and Decryption31Secure Sockets Layer (SSL) and Transport Layer Security (TLS)22Simple Network Management Protocol (SNMP)22Network Monitoring and Troubleshooting29Remote Access and Management31
Network Operating Systems
Introduction to Network Operating Systems27Network Operating System Architecture29Network Operating System Installation and Configuration26Network Monitoring and Troubleshooting25User and Group Management25Network Security25File and Print Services26Email Services25Web Services25Network Virtualization23Cloud Computing27Network Automation22
Cloud Computing
Definition and Overview of Cloud Computing23Cloud Deployment Models29Cloud Service Models31Cloud Security29Virtualization and Cloud Infrastructure23Cloud Storage Services23Cloud Networking Services29Cloud Monitoring and Management26Cloud-Native Application Development22Serverless Computing23Cloud Databases22Cloud Integration Services22Cloud Cost Management22Cloud Governance and Compliance29Cloud Disaster Recovery and Business Continuity26Cloud Security Management29
Virtualization
Definition and Benefits of Virtualization26Types of Virtualization29Hypervisors and Virtual Machines22Benefits of Server Virtualization28Types of Server Virtualization26Server Virtualization Platforms22Benefits of Desktop Virtualization26Types of Desktop Virtualization25Desktop Virtualization Platforms23Benefits of Storage Virtualization27Types of Storage Virtualization28Storage Virtualization Platforms27Security Considerations for Virtualization27Virtualization Security Tools and Techniques23Best Practices for Virtualization Security31Virtualization Management Tools27Best Practices for Virtualization Management25Cloud-Based Virtualization Management28
Data Communications
Definition and Scope of Data Communications29Data Communication Models25Data Transmission Concepts29Data Link Layer Concepts24Error Detection and Correction Techniques22Media Access Control Protocols25Network Layer Concepts25Routing Algorithms8Congestion Control Mechanisms29Transport Layer Concepts28TCP and UDP Protocols28Flow Control and Error Control in Transport Layer24Application Layer Concepts25Common Application Layer Protocols31Network Security22
Network Simulation
Introduction to Network Simulation28Simulation Modeling Techniques24Network Simulation Tools26Simulation Scenario Development22Data Collection and Analysis30Simulation Validation and Verification23Network Performance Evaluation29Network Troubleshooting and Diagnosis28Network Design and Optimization24
Network Cabling and Wiring
Overview of Network Cabling25Network Wiring Standards27Tools and Equipment30Unshielded Twisted Pair (UTP) Cabling24Shielded Twisted Pair (STP) Cabling28Coaxial Cabling22Fiber Optic Cable Construction24Fiber Optic Connectors23Fiber Optic Splicing23Cable Routing and Management26Cable Termination and Testing22Documentation and Labeling22Cable Inspection and Troubleshooting24Cable Replacement and Repair26Network Cabling Safety25
Network Ethical Hacking
Definition and Scope of Ethical Hacking26Types of Ethical Hacking28Tools and Technologies for Ethical Hacking26Footprinting and Information Gathering29Network Scanning and Port Identification31Vulnerability Assessment27Buffer Overflow Attacks29SQL Injection Attacks16Cross-Site Scripting (XSS) Attacks27Maintaining Access and Persistence24Privilege Escalation23Lateral Movement25Ethical Reporting of Vulnerabilities25Remediation and Mitigation Strategies22Legal and Ethical Considerations22
Network Project Management
Overview of Network Project Management26Project Initiation and Planning24Project Execution and Monitoring23Project Closure and Evaluation24Project Management Software28Agile Project Management25Network Monitoring and Troubleshooting31Network Security Management25Case Study: Network Upgrade Project25Case Study: Network Security Implementation24Case Study: Network Troubleshooting and Resolution29