Diploma in Cyber Security Course Updated 2024

  • Compare and contrast Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports, protocols, and their purposes
    1. Ports and protocols
    2. File Transfer Protocol (FTP)
    3. Secure Shell (SSH)
    4. Telnet
    5. Simple Mail Transfer Protocol (SMTP)
    6. Domain Name System
    7. (DNS)
    8. Dynamic Host Configuration Protocol (DHCP)
    9. Hypertext Transfer Protocol (HTTP)
    10. Post Office Protocol 3(POP3)
    11. Network Basic Input/ Output System (NetBIOS)/ NetBIOS over TCP/IP (NetBT)
    12. Internet Mail Access Protocol (IMAP)
    13. Simple Network Management Protocol (SNMP)
    14. Lightweight Directory Access Protocol (LDAP)
    15. Hypertext Transfer Protocol Secure (HTTPS)
    16. Server Message Block (SMB)/Common Internet File System (CIFS)
    17. Remote Desktop Protocol (RDP)
    18. TCP vs. UDP
    19. Connectionless
    20. DHCP
    21. Trivial File Transfer Protocol (TFTP)
    22. Connection oriented
    23. HTTPS
    24. SSH
  • Compare and contrast common networking hardware.
    1. Routers
    2. Switches
      • Managed
      • Unmanaged
    3. Access points
    4. Patch panel
    5. Firewall
    6. Power over Ethernet (PoE)
      • Injectors
      • Switch
      • PoE standards
    7. Hub
    8. Cable modem
    9. Digital subscriber line (DSL)
    10. Optical network terminal (ONT)
    11. Network interface card (NIC)
    12. Software defined networking (SDN)
  • Compare and contrast protocols for wireless networking.
    1. Frequencies
      1. 4GHz
      2. 5GHz
    2. Channels
      • Regulations
      • 4GHz vs. 5GHz
    3. Bluetooth
    4. 802.11
      • a
      • b
      • g
      • n
      • ac (WiFi 5)
      • ax (WiFi )
    5. Long range fixed wireless
      • Licensed
      • Unlicensed
      • Power
      • Regulatory requirements for wireless power
    6. NFC
    7. Radiofrequency identification (RFID)
  • Summarize services provided by networked hosts.
    1. Server roles
      • DNS
      • DHCP
      • Fileshare
      • Print servers
      • Mail servers
      • Syslog
      • Web servers
      • Authentication, authorization, and accounting (AAA)
    2. Internet appliances
      • Spam gateways
      • Unified threat management(UTM)
      • Load balancers
      • Proxy servers
    3. Legacy/embedded systems Supervisory control and data acquisition (SCADA)
    4. Internet of Things (IoT) devices
  • Given a scenario, install and configure basic wired/wireless small office/home office (SOHO) networks.
    1. Internet Protocol (IP) addressing
      • IPv4
      • Private addresses
      • Public addresses
      • IPv6
      • Automatic Private IP Addressing (APIPA)
      • Static
      • Dynamic
      • Gateway
  • Compare and contrast common network configuration concepts.
    1. DNS
    2. Address
    3. A
    4. AAAA
    5. Mail exchanger (MX)
    6. Text (TXT)
    7. M Spam management
        • DomainKeys Identified Mail (DKIM)
        • Sender Policy Framework (SPF)
        • Domainbased Message Authentication, Reporting, and Conformance (DMARC)
    8. DHCP
      1. Leases
      2. Reservations
      3. Scope
    9. Virtual LAN (VLAN)
    10. Virtual private network (VPN)
  • Compare and contrast Internet connection types, network types, and their features.
    1. Internet connection types
    2. Satellite
    3. Fiber
    4. Cable
    5. DSL
    6. Cellular
    7. Wireless Internet service provider (WISP)
  • Network types
    1. Local area network (LAN)
    2. Wide area network (WAN)
    3. Personal area network (PAN)
    4. Metropolitan area network (MAN)
    5. Storage area network (SAN)
    6. Wireless local area network (WLAN)
  • Given a scenario, use networking tools.
    1. Crimper
    2. Cable stripper
    3. WiFi analyzer
    4. Toner probe
    5. Punchdown tool
    6. Cable tester
    7. Loopback plug
    8. Network tap

Archives

No archives to show.

Categories

  • No categories

Categories

  • No categories

Archives