+ All Categories
Home > Documents > [XLS]CCENT exam objectives crosswalk · Web view... Explore different internetworking device...

[XLS]CCENT exam objectives crosswalk · Web view... Explore different internetworking device...

Date post: 06-May-2018
Category:
Upload: vonhi
View: 214 times
Download: 1 times
Share this document with a friend
26
What is the purpose of this document? Anatomy of a crosswalk CCENT exam objective Target activity in co Target lab in cont 1. Determine the exam objective to be add 2. Locate supporting activities and labs in the content: Example: 3.5.3.1 = Chapter 3, objective 5.3, page 1 3. Locate further explanations and extension activities in Abbreviations Go to this site fo ICG: Interactive Course Guide PT: Packet Tracer VoD: Video on Demand Using this crosswalk Before beginning a chapter… check ICG for crosswalk extension activities check exam objectives for related activities and labs When reviewing for quizzes and tests… check key activities and labs noted in the crosswalk When preparing students for the CCENT… use activites, labs and extensions for review Where the crosswalk indicates NO related activities or labs… t these areas for development of your own review activities This document aligns each of the CCENT exam (ICND1 #640-822) objectives to sp Discovery 1 (Networking for Home and Small Businesses) and CCNA Discovery 2 ( ISP) curricula, as well as to enrichment activities from the ICGs. Assign and verify valid IP addresses to hosts, servers, and networking devices in a LAN environment 3.5.3.1: View IP configurations on hosts 3.5.2.2: IP addresses and network communication https://cisco.webe Access and play ba series, Preparing Stu links to session m
Transcript

What is the purpose of this document?

Anatomy of a crosswalkCCENT exam objective: Target activity in content: Target lab in content: Enrichment activity in ICG:

1. Determine the exam objective to be addressed 2. Locate supporting activities and labs in the content: Example: 3.5.3.1 = Chapter 3, objective 5.3, page 13. Locate further explanations and extension activities in the chapter ICG

Abbreviations Go to this site for more ideas on embedding CCENT activities in instruction:ICG: Interactive Course GuidePT: Packet TracerVoD: Video on Demand

Using this crosswalkBefore beginning a chapter…

check ICG for crosswalk extension activitiescheck exam objectives for related activities and labs

When reviewing for quizzes and tests…check key activities and labs noted in the crosswalk

When preparing students for the CCENT…use activites, labs and extensions for review

Where the crosswalk indicates NO related activities or labs…target these areas for development of your own review activities

This document aligns each of the CCENT exam (ICND1 #640-822) objectives to specific activities and labs in the CCNA Discovery 1 (Networking for Home and Small Businesses) and CCNA Discovery 2 (Working at a Small-to-Medium Business or ISP) curricula, as well as to enrichment activities from the ICGs.

Assign and verify valid IP addresses to hosts, servers, and networking devices in a LAN environment

3.5.3.1: View IP configurations on hosts

3.5.2.2: IP addresses and network communication

Ch. 3.5 Reflection 02 #2: create a preliminary network addressing plan for a company LAN

https://cisco.webex.com/cisco/onstage/g.php?p=821&t=m Access and play back webinar recordings for the series, Preparing Students for CCENT Success, as well as links to session materials.

Go to this site for more ideas on embedding CCENT activities in instruction:

This document aligns each of the CCENT exam (ICND1 #640-822) objectives to specific activities and labs in the CCNA Discovery 1 (Networking for Home and Small Businesses) and CCNA Discovery 2 (Working at a Small-to-

https://cisco.webex.com/cisco/onstage/g.php?p=821&t=m Access and play back webinar recordings for the series, Preparing Students for CCENT Success, as well as links to

CCENT ObjectiveChapter Content Alignment

CCNA Discovery 1Activities Labs

Describe the operation of data networks.1.5.3.4: Installing a printerDescribe the purpose and functions of various

network devices1.2.2.4: Servers, desktops and workstations 3.1.3.2: Identify network components 3.1.5.2: Identify roles of client and server

Select the components required to meet a given network specification

3.1.3.2: Basic network components

3.1.5.3: Building a simple peer-to-peer network 3.6.2.3: Prototype a simple network (PT) Capstone Project, Activities 1,2

Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network

6.3.3.3: Match items to OSI layers 6.3.3.4: Build and send a frame

6.3.3.5: View PDU information (PT)

Describe common networking applications, including web applications

6.1.1.4: Match service to client request

3.5.7.2: Observe ARP, broadcast and ICMP traffic on a network (PT) 3.6.5.3: Map a network drive 6.2.3.3: Explore FTP 6.2.4.4: Configure an email client

Describe the purpose and basic operation of the protocols in the OSI and TCP models

6.1.3.4: Distinguish between characteristics of TCP and UDP 6.3.2.3: Match items to TCP/IP layers

6.3.3.5: View PDU information (PT)

Describe the impact of applications (Voice over IP and Video over IP) on a network

6.1.3.4: Distinguish between characteristics of TCP and UDP

Interpret network diagrams

Implement a small switched network.

3.1.6.1, 3.6.1.2: Distinguish between physical and logical topology diagrams 3.5.5.2: Identify LANs in a given diagram

3.5.7.1: Learn to use Packet Tracer (PT) Capstone Project, Activity 1

Determine the path between two hosts across a network

3.4.2.3: Determine paths between hosts using a hub 3.4.3.4: Determine paths between hosts using hubs and switches

3.5.7.2: Build a two-host hubbed network and observe data traffic. (PT) 4.2.3.2: Create and observe packet flow between source and destination hosts over the Internet. (PT)

Describe the components required for network and Internet communications

3.1.3.1: Basic network components 3.3.7.2: Determine components needed for specific scenarios

4.2.3.2: Create and observe packet flow between source and destination hosts over the Internet. (PT) Capstone Project, Step 2

Identify and correct common network problems at Layers 1, 2, 3, and 7 using a layered model approach

9.1.3.3: Match scenario to troubleshooting approach

9.2.3.2: Verify Layer 3 configuration on a host (PT) 9.2.4.3: Use ping to verify connectivity (PT)

Differentiate between LAN/WAN operation and features

3.5.5.1: View different LAN types 3.5.5.2: Count local networks within a LAN 4.2.2.1: View email packet flow 4.3.1.1: View data transfer between source and destination on the Internet

4.2.3.2: Forward packets across the network (PT) 4.2.3.3: Trace Internet connectivity

Select the appropriate media, cables, ports, and connectors to connect switches to other network devices and hosts

3.6.2.3: Prototype a switched network (PT) 3.6.4.3: Connect hosts to a Linksys router

Explain the technology and media access control method for Ethernet technologies

3.3.3.1: View the process of sending a frame on an Ethernet network 3.3.4.1: Build an ethernet frame 7.2.4.2: View the reservation process for CSMA/CA

3.3.3.2: Determine the MAC address of a host

Explain network segmentation and basic traffic management concepts

3.4.3.4: Describe various types of traffic issues on a network using both switches and a hub 3.5.5.1: View and study reasons for segmenting networks 5.2.3.4: Distinguish between unicast, broadcast and multicast traffic handling

Explain the operation of Cisco switches and basic switching concepts

3.4.5.1: Determine how a switch forwards a frame

Perform, save and verify initial switch configuration tasks, including remote access management

3.6.2.3: Prototype a simple switched network; verify using ping

Verify network status and switch operation using basic utilities, including ping, traceroute, Telnet, SSH, ARP, ipconfig, show and debug commands

3.4.7.1: View the use of ARP in sending frames to destinations

9.3.3.2: Troubleshoot physical connectivity and verify using ping

Implement and verify basic security for a switch (port security, deactivate ports)

Implement an IP addressing scheme and IP services to meet network requirements for a small branch office.

Describe and verify DNS operation

Identify, prescribe, and resolve common switched-network media issues, configuration issues, autonegotiation, and switch hardware failures

9.3.3.2: Troubleshoot various physical connectivity problems

Describe the need and role of addressing in a network; create and apply an addressing scheme to a network

3.5.2.1: View the use of MAC and IP addresses in creating a network frame 5.1.3.2: Drag and drop PCs to place them in correct networks

3.5.2.2: IP addresses and network communication Capstone Project, Activity 9

Assign and verify valid IP addresses to hosts, servers, and networking devices in a LAN environment

5.1.4.1: View interaction between IP address and subnet mask

3.5.2.2: IP addresses and network communication Capstone Project, Activity 9

Explain the basic uses and operation of NAT in a small network connecting to one ISP

5.2.2.3: Describe how an ISP handles public and private IPs 5.4.3.1: View NAT operations

5.4.3.2: Examine NAT on a multi-function device(PT)

6.2.1.2: View DNS client-server interaction

Lab 6.2.1.3: Observe DNS name resolution

Identify and correct IP addressing issues

Implement a small routed network

Describe the operation and benefits of using private and public IP addressing

5.4.3.1: View NAT operations

5.4.3.2: Examine NAT on a multi-function device(PT)

Enable NAT for a small network with a single ISP and connection using SDM and verify operation using CLI and ping

5.4.3.2: Examine NAT on a multi-function device(PT)

Configure, verify and troubleshoot DHCP and DNS operation on a router, using the CLI and SDM

9.3.6.2: Determine whether a DHCP problem is related to the wired, wireless, or both parts of the network

5.3.3.3: Configure a DHCP server and client (PT)

Implement static and dynamic addressing services for hosts in a LAN environment

5.3.3.3: Configure a DHCP server and client (PT)

5.1.3.2: Match host IPs to their correct network

9.2.3.2: Verify Layer 3 configuration on a host (PT)

Describe basic routing concepts, including packet forwarding and the router lookup process

3.5.2.3: View a router forwarding packets 3.5.4.3: Determine how a router forwards a packet

Describe the operation of Cisco routers, including the router bootup process, POST, router components

3.5.4.1: Examine tables maintained by routers 3.6.3.1: View the functionality of a Linksys router 3.6.4.1: Identify components of a Linksys router

Select the appropriate media, cables, ports, and connectors to connect routers to other network devices and hosts

3.5.7.2: Create a small LAN and observe traffic (PT) 3.6.2.3: Prototype a small LAN (PT) 9.3.3.2: Troubleshoot physical connectivity

Configure, verify, and troubleshoot RIPv2

Manage the Cisco IOS software

Implement password and physical security

Access and utilize the router CLI to set basic parameters

Connect, configure, and verify operation status of a device interface

9.2.3.2: Troubleshoot using ipconfig (PT) 9.3.3.2: Troubleshoot connectivity problems

Verify device configuration and network connectivity using ping, traceroute, Telnet, SSH, and other utilities

9.2.2.1: Study software utilities for troubleshooting connectivity

4.2.3.2: Use ping and traceroute to check connectivity(PT) 4.2.3.3: Use a variety of utilities and tools to trace packet forwarding through the Internet

Perform and verify routing condfiguration tasks for a static or default route given specific routing requirements

Manage Cisco IOS configuration files, including saving, editing, upgrading, restoring

7.4.3.2: Use Linksys GUI to back up and restore a configuration file 7.4.4.2: Use Linksys GUI to upgrade firmware

7.4.4.2: Use Linksys GUI to upgrade firmware

7.3.5.2: Configure wireless security on an AP

Explain and select the appropriate administrative tasks required for a WLAN.

Identify security threats to a network and describe general methods to mitigate those threats.

Verify network status and router operation using basic utilities, including ping, traceroute, Telnet, SSH, ARP, ipconfig, and show and debug commands

9.2.2.1: Compare the type of problem verified by each utility

9.2.3.2: Troubleshoot using the ipconfig command (PT) 9.2.4.3: Troubleshoot using the ping command 9.2.7.2: Troubleshoot using network utilities

Describe standards associated with wireless media, including IEEE WI-FI Alliance, ITU/FCC

7.1.1.1: Compare IR, RF, and Bluetooth 7.2.1.2: Compare WLAN standards

Identify and describe the purpose of the components in a small wireless network, including SSID, BSS, ESS

7.2.2.3: Match component to its functionality

7.2.6.4: Configure a wireless client

Identify the basic parameters to configure on a wireless network to ensure that devices connect to the correct access point

7.2.3.4: Configure SSID on an AP using GUI 7.2.4.3: Configure channels using Linksys GUI 7.4.3.2: Backup and restore configs using Linksys GUI 7.4.4.2: Update firmware using Linksys GUI

7.2.5.3: Configure basic functionality on an AP 7.2.6.4: Configure a wireless client

Compare and contrast wireless security features and capabilities of WPA security, including open, WEP, WPA-1/2

7.3.3.2: Compare functions of PSK and EAP 7.3.4.3: Configure encryption using Linksys GUI

7.3.5.2: Create a security plan and configure security on an AP

Identify common issues when implementing wireless networks

9.3.4.2: View the impact of adding hosts to a WLAN

9.3.5.2: Troubleshoot a wireless network (PT)

Implement and verify WAN links.

Explain today’s increasing network security threats and the need to implement a comprehensive security policy to mitigate the threats

8.1.1.2: Describe various security threats 8.3.1.1: Identify parts of a security policy

Explain general methods to mitigate common security threats to network devices, hosts, and applications

8.3.1.2: Identify common security measures 8.3.5.2: Identify the purpose of various security tools

8.4.3.2: Perform vulnerability analysis

Describe the functions of common security appliances and applications

8.3.5.2: Identify the purpose of various security tools 8.4.1.2: Study various types of firewalls

2.3.3.2: Examine OS and application patches 8.4.3.2: Perform vulnerability analysis

Describe security recommended practices, including initial steps to secure network devices

8.4.4.1: Identify security best practices

8.4.2.4: Configure firewall settings using Linksys GUI

Describe different methods of connecting to a WAN

4.1.4.2: Describe various types of Internet connections 4.3.2.3: Describe devices in Internet cloud

Configure and verify a basic WAN serial connection

Chapter Content AlignmentCCNA Discovery 1 CCNA Discovery 2

ICG Extensions Activities Labs

Ch. 1: Personal computer VoD Ch. 1.2 Reflections 01, 02, 03: research on mainframes, servers, and PDAs Ch. 3: Networking Concepts VoD

5.4.1.1: Study a configuration checklist 5.5.1.2: Study a 2960 switch 5.1.1.1: Compare features of various ISRs

3.3.3.4: Explore different LAN switch options (PT) 3.3.4.3: Explore different internetworking device options (PT)

Ch. 3.6 Reflection #1: prototype a network designed in a previous reflection activity (PT)

3.2.1.4: Identify phases in network upgrade planning 3.3.1.1: Describe factors involved in equipment selection

3.2.4.2: Create a cabling upgrade proposal

Ch. 6.3 Reflection #2: use article Basic Journey of a Packet to draw diagrams of data flow

2.2.1.1: View functions of the OSI model layers 9.1.1.3: Match layers to devices, protocols and technologies

9.1.1.4: Organize CCENT exam objectives by OSI layers

Ch. 4: Connecting to the Internet through an ISP VoD Ch. 6: Network Services VoD

1.1.1.1: Describe common business uses of networking 7.4.1.2: Match protocols to associated network servers

7.3.3.2: Examine a DNS server

Ch. 6.3 Reflection #3: play the OSI game

2.2.2.4: Match protocols to their OSI layers 7.2.3.3: Describe differences between TCP and UDP

Ch. 6: Network Services VoD Ch. 6.2 Reflection #5: Research requirements, potential problems, and benefits of VoIP

1.1.1.1: Describe business applications of VoIP

Ch. 3.1 Reflection 01: Diagram networks students have used

3.1.2.1: Compare physical and logical network diagrams 3.1.2.2: Compare common network topologies

3.1.3.2: Create physical and logical diagrams (PT) 3.2.4.2: Evaluate a floor plan and propose upgrades 10.0.1, Part C, Step 3

Ch. 3.1 Activity #3: based on photographs/scenarios of home and office networks, students draw and label pathways for data to follow

2.3.1.4: Troubleshoot and resolve a connectivity issue between two hosts

Ch. 3.2 Reflection 01: students encode/decode communications using protocol "rules" they determine; students research communication processes, like sign language and Morse code

3.1.3.2: Create physical and logical diagrams (PT) 10.0.1, Part C

Ch. 6.3 Reflection #5: create and present troubleshooting problems and figure out which OSI layer is involved Ch. 9: Troubleshooting your Network VoD

2.2.3.5: Identify the layer on which a problem occurs

2.3.1.4: Troubleshoot and correct network issues (PT)

Ch. 4.2 Reflection 01: download various types of packets, and analyze packet size, path, hops and transmission time

1.2.2.1: View operations of the Internet backbone 1.2.2.2: View differences between Tier 1, 2 and 3 ISPs

1.2.3.3: Use tools to map the Internet

Ch. 4.5 Reflection: research evolving standards and implementations of cabling; research TIA termination standards

3.2.1.2: Compare uses of various network cables 5.5.4.1: View cabling needed to connect a switch to a router

5.5.4.4: Use a configuration checklist to connect a switch to a LAN (PT)

Ch. 3.2 Reflection 01: students select a type of business and determine unicast, broadcast, and multicast messages needed for it Ch. 3.3 Reflection 01: research "new Ethernet" and naming schemes

5.5.1.3: Compare half-and full-duplex operations

9.2.4.4: Troubleshoot link connectivity issues related to switch technology

Ch. 3.4 Reflection 01: explain to the boss why switches should be used rather than hubs in a large network; develop the implementation plan Ch. 3.5 Reflection 02: Prepare a preliminary network expansion plan

4.1.3.3: View segmentation of a network using subnets

9.2.4.3: Configure and troubleshoot duplex mismatches on a switched network (PT)

Ch. 3.4 Discussion 03: Prepare a flow chart of collision operations in a switched network

5.5.5.1: View CDP commands

5.5.5.2: Use CDP as a network discovery tool

5.5.3.3: Perform initial switch configuration (e-lab)

5.5.2.2: Perform initial switch startup 5.5.3.4: Perform initial switch configuration (PT)1.2.3.4 Interpret ping and traceroute output (PT) 5.5.4.5: Connect, configure and verify operations on a 2960 switch

5.5.4.2, 5.5.4.3: View command sequences for switch port security

5.5.4.5: Connect, configure and verify operations on a 2960 switch 10.0.1, Part F

Implement an IP addressing scheme and IP services to meet network requirements for a small branch office.

9.2.4.1, 4.2: Study LAN connectivity issues centered on switches

5.5.4.4: Use a configuration checklist to connect a switch to a LAN (PT) 9.2.4.3: Configure and troubleshoot duplex mismatches on a switched network (PT)

Ch. 3.4 Reflection 02 #3: practice building ARP tables Ch. 5: Addressing Basics VoD Ch.3.5 Reflection 01: Routers and gateways Ch. 3.5 Reflection 01 #1: experiment with IP addressing and gateways Ch. 5.3 Reflection #3: design a sample network using static and dynamic addressing

4.1.2.2: View networks, subnets, and hosts in an IP hierarchy 4.1.3.1, 4.1.3.2: View the subnetting and IP assignments in an addressing scheme

4.1.5.2: Modify IP configurations to enable routing between subnets 4.1.5.3: Create a subnetting scheme 10.0.1, Part B

Ch. 3.5 Reflection 02 #2: create a preliminary network addressing plan for a company LAN

4.1.3.5: Create and apply IPs in order to subnet a network (PT) 9.3.1.4 Troubleshoot a small IP network 9.3.4.5 Troubleshoot DHCP and NAT (PT)

Ch. 5.4 Discussion 03-04: describe NAT with an office model; research NAT using given links

4.2.2.2: Complete a diagram of NAT operations 5.3.8.1: View commands for configuring static NAT

5.3.8.3: Configure static NAT (PT) 5.3.8.4: Use SDM and CLI to configure PAT and NAT

Ch. 6.2 Reflection #1: research TLDs

7.3.3.1: View steps in DNS resolution

1.2.3.4 Interpret ping and traceroute output (PT) 7.3.3.2: Examine cached DNS information 7.3.3.5: Create primary and secondary forward lookup zones

IP Addressing Services VoD

IP Addressing Services VoD

Implement a small routed network

10.0.1, Part E, Step 1

Ch. 5.4 Discussion 03-04: describe NAT with an office model; research NAT using given links

4.2.1.1, 4.2.1.2: View the basic operation of NAT and describe its benefits

4.2.3.3: Observe Network Address Translation (PT)

5.2.4.1: View commands for configuring NAT using SDM

5.2.4.2: Enable NAT on a router using SDM

2.3.1.2: Study host configuration issues 5.3.7.1: View steps for DHCP configuration

5.3.7.2: Configure a Cisco router as a DHCP server (PT) 5.3.7.3: Use Cisco CLI to configure a router as a DHCP server

5.3.7.3: Use SDM and CLI to configure DHCP services

2.3.1.4: Diagnose and correct IP configuration errors (PT)

Ch. 3.5 Discussion 02: Details of the 5-step process of frame transmission

6.1.1.2: View steps in the routing process 6.1.2.4: Build routing table entries

6.1.1.5: Configure static and default routes (PT) 6.1.2.5: Build a network diagram from routing table information 9.4.1.4 Apply routing table principles (PT)

Ch. 3.5 Discussion 04: Compare ARP and routing tables

5.1.1.2: View and describe the functions of ISR components 5.1.3.1: View and describe the stages of the POST process 9.2.2.1: View stages of the bootup process

1.3.1.3 Identify router to meet customer needs 5.1.3.5: Power up and observe router startup procedures

Ch. 5.4 Reflection 02 #2: design a business customer routing solution, describing the device selected and its capabilities

5.1.1.2: View and describe the functions of ISR components 5.1.2.1: Describe cables and connections in physical setup of an ISR

6.1.5.1: View steps in configuring RIP

6.1.5.3: Configure RIP (PT) 6.1.5.4: Configure RIP 9.4.2.4: Troubleshoot a RIP router network 9.4.2.3 RIP challenge (PT)

5.3.1.3: Navigate through router command modes (e-lab)

5.3.2.5: Explore router CLI (PT) 5.3.4.4: Use router CLI to perform basic router configuration 5.3.5.5: Set and verify basic parameters using router CLI

5.3.3.2: View router interface information (e-lab) 9.2.3.1, 3.2: View outputs of various show commands related to interfaces

5.3.5.4: Configure ethernet and serial interfaces (PT) 9.2.3.3: Use show commands to identify interface problems and errors

8.3.2.1: View and compare in-band and out-of-band operations

1.2.3.4 Interpret ping and traceroute output (PT) 5.3.5.5: Set and verify basic parameters using router CLI 8.3.3.2: Use Telnet to establish connectivity 8.3.3.4: Use SSH to configure a remote router

6.1.1.4: View static route configurations

5.3.6.2: Configure a default route (PT) 6.1.1.5: Manually configure static and default routes (PT)

5.3.9.1: View the backup process

5.3.9.3: Back up a configuration using TFTP (PT) 5.3.9.4: Save and load router configuration files

8.4.3.1: View the backup process 8.4.3.3: View ROM monitor recovery process

8.4.3.2: Use TFTP to back up and restore Cisco IOS software images 8.4.3.4: Use ROMmon and tftpdnld to manage Cisco IOS images

5.3.4.1, 4.2, 4.3: View password security configurations

5.3.4.4: Perform an initial router configuration (PT) 5.3.5.5: Set and verify basic parameters using router CLI

Explain and select the appropriate administrative tasks required for a WLAN.

Identify security threats to a network and describe general methods to mitigate those threats.

8.3.2.1: View and compare in-band and out-of-band operations

2.3.1.4 Troubleshoot network issues (PT) 5.3.3.3 Using Cisco IOS CLI show commands (PT) 9.4.2.4: Troubleshoot configurations on remote routers in a RIP network

Ch. 7: Wireless Technologies VoD Ch. 7.1 Reflection #1: research business uses of Bluetooth Ch. 7.2 Reflection #1: research development of the 802.11n standard

Ch. 7.2 Discussion 02: have students diagram the ESS in a "wireless school"; have students track WLAN connectivity by measuring signal strength as they move around the building

Ch. 7.2 Discussion 02: use multiple APs to experiment with configuring SSIDs

10.0.1, Part D, Step 3 9.6.5.5 CCENT troubleshooting challenge

Ch. 7.3 Reflection #6: teams attempt to access each other's wireless AP in an "attack and defend" activity

8.2.4.1: View differences between forms of authentication 8.2.4.2: Compare WEP and WPA

8.2.4.3: Configure WEP on a wireless router. (PT)

Ch. 7.3 Reflection #1: research war driving using links given Ch. 7.4 Reflection #3: identify a large room and have students conduct a survey, detailing issues involved with implementing a WLAN

9.2.1.1: View possible problem areas at Layers 1 and 2 on WLANs

9.6.5.5 CCENT troubleshooting challenge

Implement and verify WAN links.

Serial Connectivity VoD

Ch. 3.4 Discussion 08: Describe how ARP poisoning occurs Ch. 4.3 Reflection 01: track the proliferation ofa virus or worm over the Internet Ch. 6.2 Reflection #2: research phishing

8.1.1.2: Describe a variety of ISP security practices 8.2.1.1: View differences between DoS, DDoS, and DRDoS attacks

8.1.3.3: Take steps to secure local and transmitted data

Ch. 7.3 Reflection #2: research network attacks and methods used against them

8.1.1.2: Describe a variety of ISP security practices 8.2.1.2: Describe ACLs and port filtering

8.2.1.3: Create a plan for port filters and access lists 8.2.2.3: Create a plan for implementing firewalls

Ch. 8.4 Reflection #2: research vulnerability analysis tools

7.4.2.5: Compare HTTP and HTTPS 8.1.3.2: Describe ways to encrypt various network applications 8.2.3.4: Distinguish between IDS and IPS

8.2.1.3: Create a plan for port filters and access lists 8.2.2.3 Plan network-based firewalls (PT)

Ch. 8: Network Security VoD

8.1.1.2: Describe a variety of ISP security practices 8.1.2.2: View the AAA process

8.1.3.3: Take steps to secure local and transmitted data

1.2.1.1: Compare various types of Internet connections 5.4.2.2: View differences between circuit-and packet-switched and point-to-point connections.

5.4.3.3: Complete a WAN upgrade based on a business scenario

5.3.5.3: Configure a serial interface (e-lab) 5.4.4.1: View a serial PPP configuration 9.2.5.2: View and compare serial interface outputs

5.4.4.2: Configure a PPP connection (PT) 9.2.5.3: Troubleshoot encapsulation mismatches on a WAN serial connection (PT) 9.2.5.4: Troubleshoot WAN connectivity on a serial connection

Chapter Content AlignmentCCNA Discovery 2

ICG Extensions

Networking VoD: Introduction to PC Hardware

Ch. 3.1 Reflections 01& 02: Students create a network upgrade design for their school building or classroom, or for a business

Ch. 2 ISP Help Desk VoD Ch. 2.2 Discussion 01 Activities #1 & 2: OSI model and protocols charts Ch. 7.2 Reflections 01& 02: Taboo cards, acronym bingo, and match game reviewing TCP/IP protocol terminology Ch. 7.2 Reflection 03: Match encapsulation steps to protocol layers

Ch. 7.2 Reflections 01& 02: Taboo cards, acronym bingo and match game reviewing TCP/IP protocol terminology

Ch. 1: The Internet and its Uses VoD

Ch. 3: Planning the Network Upgrade VoD Ch. 3.1 Reflections 01 & 02: Students create a network upgrade design for their school building or classroom, or for a business

Ch. 3: Planning the Network Upgrade VoD

Ch. 2.2 Reflections 01 & 02: Hands-on troubleshooting based on OSI layers and requiring completion of "trouble tickets" Ch. 2.3 Reflection #1: Practice SOHO connectivity troubleshooting scenarios

Exploration 1: Data Link Layer VoD

Ch. 5 5 Reflection 01: Explore Cisco resources on autonegotiation problems in switches

Networking VoD: Securing the Local Area Network

Ch. 2.2 Reflections 01 & 02: Hands-on troubleshooting based on OSI layers and requiring completion of "trouble tickets" Ch. 2.3 Reflection #1: Practice SOHO connectivity troubleshooting scenarios Ch. 5 5 Reflection 01: Explore Cisco resources on autonegotiation problems in switches

Ch. 4.1 Discussion 03 Activity 03: Review network classes Ch. 4.1 Reflection: Subnetting practice exercises and activities Ch. 4.1 Discussion 13: Calculate addresses within a CIDR block

Ch. 4 Network Address Translation VoD

Ch. 5.2 Reflection 01: Explore secondary DNS services Ch. 7.3 Reflection 01: Divide an SLD into sub-domains

Ch. 4 Network Address Translation VoD Ch. 4.1 Discussion 05: Complete a T-chart comparing public and private addressing

Ch. 5.2 Reflection 02: Students complete blank screenshots of SDM Express configuration screens

Ch. 2.2 Reflections 01 & 02: Hands-on troubleshooting based on OSI layers and requiring completion of "trouble tickets"

Ch. 5 Accessing the Router VoD Ch. 5.1 Discussion 06: Detailed outline of bootup process Ch. 5.1 Discussion 08: Details on the sho version command and output Ch. 5.1 Discussion 09: Flowchart various boot options

Ch. 2.2 Reflections 01 & 02: Hands-on troubleshooting based on OSI layers and requiring completion of "trouble tickets"

Networking VoD: Teaching RIPv2

Ch. 5.3 Reflection 01, Activity 03: Work with CLI Hot Keys

Ch. 5.1 Discussion 03: Explore the Cisco IOS software resources

Ch. 5.1 Discussion 03: Explore the Cisco IOS software resources

Discovery 1, Ch. 7: Wirelesss Technologies VoD

VoD: Discussing Wireless Technologies

Ch. 7.3 Reflection 02: Research DoS attacks related to DNS

Networking VoD: Securing a Website with HTTPS

Ch. 1.2 Discussion 02: Explore implementations of Metro Ethernet Ch. 1.2 Reflection 01: Research wireless Internet providers Ch. 1.2 Reflection 02: Use online tools to compare ISP services Ch. 1.2 Reflection 03: Explore enterprise connections case studies


Recommended