powered by
Center for Curriculum and Transfer Articulation
Enterprise Networking, Security, and Automation
Course: CNT160AB

First Term: 2020 Fall
Lec + Lab   4.0 Credit(s)   6.0 Period(s)   6.0 Load  
Subject Type: Occupational
Load Formula: T- Lab Load


Description: Focus on the configuration of routers and switches within small and medium size networks for advanced functionality including Open Shortest Path First (OSPF), Network security, Access Control Lists (ACLs), Network Address Translation (NAT), Wide Area Network (WAN) concepts, Virtual Private Networks (VPNs), Quality of Service (QOS), network management, design, troubleshooting, virtualization, and automation. Preparation for Cisco certification examination.




MCCCD Official Course Competencies
1. Configure and troubleshoot Single-area OSPFv2. (I)
2. Evaluate how vulnerabilities, threats and exploits can be mitigated using network security. (II)
3. Configure and troubleshoot ACLs. (III)
4. Configure and troubleshoot NAT for IPv4. (IV)
5. Explain WAN access, VPNs, Internet Protocol Security (IPsec), and QOS. (V, VI)
6. Implement network management tools. (VII, VIII)
7. Design and troubleshoot network configurations. (IX, X)
8. Assess network architectures, virtualization, and automation. (XI, XII)
MCCCD Official Course Competencies must be coordinated with the content outline so that each major point in the outline serves one or more competencies. MCCCD faculty retains authority in determining the pedagogical approach, methodology, content sequencing, and assessment metrics for student work. Please see individual course syllabi for additional information, including specific course requirements.
 
MCCCD Official Course Outline
I. Single-area OSPFv2 for IPv4
   A. Basic OSPF Features, packet types, and operation
   B. Configuration and troubleshooting OSPF within a single area
II. Network security
   A. Cybersecurity
   B. Network threats, malware, and common network attacks
   C. IP vulnerabilities
   D. Best practices for network protection
   E. Cryptography processes
III. ACLs
   A. Purpose of ACLs to security
   B. Use of wildcard masks
   C. ACL configuration considerations
   D. Configuration and troubleshooting standard and extended IPv4 ACLs
   E. Application of ACLs in the Virtual Terminal Ports to secure remote access
IV. NAT for IPv4
   A. Purpose and functions
   B. Advantages and disadvantages
   C. Operation of different types of NAT
   D. Configuration of static, dynamic, and dynamic with overload NAT
V. WAN concepts
   A. Purpose and operation of WANs, including point-to-point serial connections
   B. Public vs. private WANS and broadband connections
   C. WAN protocols for certain applications
VI. VPN and IPSec
   A. Benefits and different types of VPNs
   B. Application of IPsec framework is applied to secure networks
VII. QOS
   A. Use of QOS in network data transmission quality
   B. Minimum requirement, queuing algorithms, and different QOS Models
VIII. Network management
   A. Use of Cisco Discovery Protocol (CDP) to map a network topology
   B. Use of Link Layer Discovery Protocol (LLDP) to map a network topology
   C. Implementation of Network Time Protocol (NTP)
   D. Simple Network Management Protocol (SNMP) and syslog operations
   E. Use of commands to backup and restore configuration files
   F. Use of commands to upgrade the router Operating System
IX. Network design
   A. Technologies convergence in a switched network
   B. Network design considerations
   C. Switch support of network requirements
   D. Switched networks and hierarchical designs
   E. Equipment available for small and medium size networks
X. Network troubleshooting
   A. Network documentation development and use in troubleshooting
   B. Troubleshooting processes, systematic approaches, and tools
   C. Symptoms and troubleshooting a network using a layered model
XI. Network virtualization
   A. Cloud computing and virtualization
   B. Virtualization devices and services
   C. Software-defined networking
   D. Controller programming
XII. Network automation
   A. Data formats and configuration management tools including Puppet, Chef, Ansible, and SaltStack
   B. Use of Application Programming Interfaces (APIs) to enable computer-to-computer communications
   C. Use of Representational State Transfer (REST) to enable computer-to-computer communications
   D. Use of Cisco Digital network Architecture (DNA) to enable intent-based networking
 
MCCCD Governing Board Approval Date: December 10, 2019

All information published is subject to change without notice. Every effort has been made to ensure the accuracy of information presented, but based on the dynamic nature of the curricular process, course and program information is subject to change in order to reflect the most current information available.