|
Dec 03, 2024
|
|
|
|
CST 161 - CISCO - Introduction to NetworkingCredits: 3 Instructional Contact Hours: 3
Introduces the architecture, structure, functions and components of the Internet and other computer networks. Introduces how networks operate and how to build simple local area networks (LAN), perform basic configurations for routers and switches, and implement Internet Protocol (IP).
Prerequisite(s): CST 133W Corequisite(s): May be taken concurrently with CST 133W or with instructor permission. Lecture Hours: 15 Lab Hours: 30 Meets MTA Requirement: None Pass/NoCredit: Yes
Outcomes and Objectives
- Build simple LANs, implementing IPv4 and IPv6 addressing schemes.
- Describe the factors that must be considered when selecting network devices.
- Configure and verify a basic router configuration.
- Configure and verify a basic switch configuration.
- Describe the fundamental aspects of IPv4 and IPv6 addressing in detail.
- Demonstrate Variable Length Subnet Masking.
- Configure routers, switches, and end devices.
- Describe scaling a network to include: Network Documentation, Device Inventory, Budget, and Traffic Analysis.
- Demonstrate how to verify connectivity.
- Demonstrate troubleshooting methodologies.
- Describe the two forms of software programs, or processes, that provide access to a network: Network applications and Application layer services.
- Demonstrate critical thinking skills using real equipment and Cisco Packet Tracer.
- Describe the Ethernet Frame.
- Describe the Ethernet MAC Address.
- Describe the MAC Address table.
- Troubleshoot a layer 2 connectivity issue.
- Configure a default gateway on a host.
- Configure a default gateway on a switch.
- Design a Variable Length Subnet Mask.
- Configure and troubleshoot connectivity in a small network using security best practices.
- Explain the types of ICMP messages and the reasons they are sent.
- Describe the four classes of physical threats which are: hardware, environmental, electrical, and maintenance.
- Describe the two types of service disruption attacks.
- Troubleshoot Layer 2, 3, and 4 issues.
- Explain Network Attack Mitigation.
- Justify the importance of Device Security.
Add to Portfolio (opens a new window)
|
|