![]() |
Course: CNT160AB First Term: 2020 Fall
Final Term: Current
Final Term: 9999
|
Lec + Lab 4.0 Credit(s) 6.0 Period(s) 6.0 Load
Credit(s) Period(s)
Load
Subject Type: OccupationalLoad Formula: T- Lab Load |
MCCCD Official Course Competencies | |||
---|---|---|---|
1. Configure and troubleshoot Single-area OSPFv2. (I)
2. Evaluate how vulnerabilities, threats and exploits can be mitigated using network security. (II) 3. Configure and troubleshoot ACLs. (III) 4. Configure and troubleshoot NAT for IPv4. (IV) 5. Explain WAN access, VPNs, Internet Protocol Security (IPsec), and QOS. (V, VI) 6. Implement network management tools. (VII, VIII) 7. Design and troubleshoot network configurations. (IX, X) 8. Assess network architectures, virtualization, and automation. (XI, XII) | |||
MCCCD Official Course Competencies must be coordinated with the content outline so that each major point in the outline serves one or more competencies. MCCCD faculty retains authority in determining the pedagogical approach, methodology, content sequencing, and assessment metrics for student work. Please see individual course syllabi for additional information, including specific course requirements. | |||
MCCCD Official Course Outline | |||
I. Single-area OSPFv2 for IPv4
A. Basic OSPF Features, packet types, and operation B. Configuration and troubleshooting OSPF within a single area II. Network security A. Cybersecurity B. Network threats, malware, and common network attacks C. IP vulnerabilities D. Best practices for network protection E. Cryptography processes III. ACLs A. Purpose of ACLs to security B. Use of wildcard masks C. ACL configuration considerations D. Configuration and troubleshooting standard and extended IPv4 ACLs E. Application of ACLs in the Virtual Terminal Ports to secure remote access IV. NAT for IPv4 A. Purpose and functions B. Advantages and disadvantages C. Operation of different types of NAT D. Configuration of static, dynamic, and dynamic with overload NAT V. WAN concepts A. Purpose and operation of WANs, including point-to-point serial connections B. Public vs. private WANS and broadband connections C. WAN protocols for certain applications VI. VPN and IPSec A. Benefits and different types of VPNs B. Application of IPsec framework is applied to secure networks VII. QOS A. Use of QOS in network data transmission quality B. Minimum requirement, queuing algorithms, and different QOS Models VIII. Network management A. Use of Cisco Discovery Protocol (CDP) to map a network topology B. Use of Link Layer Discovery Protocol (LLDP) to map a network topology C. Implementation of Network Time Protocol (NTP) D. Simple Network Management Protocol (SNMP) and syslog operations E. Use of commands to backup and restore configuration files F. Use of commands to upgrade the router Operating System IX. Network design A. Technologies convergence in a switched network B. Network design considerations C. Switch support of network requirements D. Switched networks and hierarchical designs E. Equipment available for small and medium size networks X. Network troubleshooting A. Network documentation development and use in troubleshooting B. Troubleshooting processes, systematic approaches, and tools C. Symptoms and troubleshooting a network using a layered model XI. Network virtualization A. Cloud computing and virtualization B. Virtualization devices and services C. Software-defined networking D. Controller programming XII. Network automation A. Data formats and configuration management tools including Puppet, Chef, Ansible, and SaltStack B. Use of Application Programming Interfaces (APIs) to enable computer-to-computer communications C. Use of Representational State Transfer (REST) to enable computer-to-computer communications D. Use of Cisco Digital network Architecture (DNA) to enable intent-based networking | |||
MCCCD Governing Board Approval Date: December 10, 2019 |