Career & Technical Education (CTE) Program

Advanced Networking 1b: Protecting Your Network

Advanced Networking 1b: Protecting Your Network

You’ve learned the basics of networks, and now it’s time to dig deeper into the intricacies and inner workings of these channels. In this course, you’ll learn the methods used to manage traffic, transmissions, and users based on organizational needs and the important decisions that go into building an optimal network. You’ll explore types of malicious attacks and the role that risk management plays in the strategic planning to prepare for, monitor, and efficiently remediate damage. Lastly, you’ll investigate processes that can be used to prevent, monitor, and notify of these events to employ action plans quickly. Get ready to advance your networking prowess! Let’s get started!

Review course outline

Access for a year

USD 299.00*

* Choose more courses to get a discount

Enroll now

Units at a glance

Think about how access to school is controlled each day. You may need to scan your ID, walk through a metal detector, or use wireless communication mounted on a wall to unlock a door. In a network, a high degree of monitoring is required for security, availability, and optimization. Managing networks is very much like this. Users receive permission to complete specific actions on a network, and there are systems in place that control their movement. Not everyone can get onto a network, and doing anything that is not allowed is highly visible to network administrators. This unit is all about learning the methods used to manage traffic, transmissions, and users, so here we go!

What will you learn in this unit?

  • Define the purpose of change management, and describe how it can be used
  • Evaluate types of network logs and practices
  • Analyze methods for maintaining network logs
  • Discuss best practices to implement network monitoring

Like a puzzle that you need to solve, networks are full of options, and it is up to you to figure out what the best choices are. Understanding organizational needs and making the right decisions are critical parts of the process. You might need to consider the deployment methods, infrastructure, what systems respond best to change, addressing schemes, and storage methods. Luckily for you, this unit covers it all! We’ll dive deep into the methods surrounding many of the important decisions that you will make as you build an optimal network that best serves the needs of your organization.

What will you learn in this unit?

  • Explain deployment methods, including public, private, and cloud
  • Describe automation and orchestration requirements
  • Assess the advantages and disadvantages of elasticity, scalability, and multitenancy to determine the most suitable application
  • Calculate and convert various numbering systems, including hexadecimal, binary, and decimal
  • Differentiate between storage methods and contrast the uses of NAS, cloud, and extended storage

We keep talking about network architecture, but what is it? You are probably familiar with thinking about architecture in terms of how a building is made, including the engineering used to support the structure, the strategy of the layout, and even the aesthetics. Believe it or not, network architecture actually has a lot of similarities to traditional architecture! Although networks are highly standardized, there are a lot of options available when creating them and for the methods used to construct them. There are considerations such as how the network traffic will flow, how it will be managed and monitored, and what will make it the most effective for the demands of the organization that it serves. Let’s learn how to build the best network we can!

What will you learn in this unit?

  • Identify three-tier network architecture, both theoretically and when implemented
  • Define spine-leaf architecture and compare it to three-tier network architecture
  • Describe how traffic flows within a network
  • Discuss the concepts of architecture and traffic flows within the context of data center locations and the advantages/disadvantages they possess

As sure as the sun rises in the east and sets in the west, disasters will happen, and network components will fail! In this unit, we discuss the need for formalized plans when the unexpected occurs and how to define the parameters of the response. As the size of the organization and the infrastructure that supports it grow, more preparation is required to provide a comprehensive response. How will your plans take into account the organization’s employees, stakeholders, facilities in other locations, and cloud-based services? Without plans in place to respond on an organizational level, the response might not be quick enough. We will also investigate methods and processes that can be used to prevent, monitor, and alert us to these events so that plans can be employed quickly. Let’s get prepared!

What will you learn in this unit?

  • Describe a business continuity plan
  • Explain disaster recovery, including NIC teaming and multipathing
  • Plan solutions to common network hardware issues in response to the disruption of services
  • Discuss high availability concepts, including active, passive, and cloud sites
  • Compare routing protocols for prevention and response to disaster recovery

The world of technology is full of security threats, and it isn’t possible to avoid malicious attacks on an organization’s infrastructure. Still, while we can’t stop an attack from happening, we can prepare for attacks, monitor them, and efficiently remediate any damage caused. This lesson is all about the types of attacks that you will encounter and the role that risk management plays in strategic planning. Risk management encompasses a wide variety of tactics and assessments that are used to prepare for the threats that technology faces.

What will you learn in this unit?

  • Compare attack types, including piggybacking and tailgating
  • Interpret security risk assessments and vulnerability assessments
  • Describe penetration testing
  • Devise posture assessments and business risk assessments
  • Summarize process assessments and vendor assessments
  • Define security information and event management

Building secure networks demands a range of skills. Think about physical buildings and the many things we do to protect them from a variety of dangers. There are screens on our windows and locks on our doors to keep out pests and unwanted visitors. You might also have a camera so that if something bad does happen, you can go back and see exactly what went wrong. Networks are likewise protected in a variety of ways. In this unit, we will discuss how to protect and secure networks by investigating topics ranging from fundamental methods and frameworks to protocols and planning. Once the network is built, you will be able to ensure that it stands the test of time.

What will you learn in this unit?

  • Give scenario-based examples to explain wireless security concepts
  • Evaluate the methods and implementation of wireless security concepts
  • Analyze least privilege, role-based access, and zero trust
  • Compare various security protocols including LDAP and Kerberos
  • Harden a network to ensure its integrity
  • Define cryptography and make plans to prepare for change, unexpected incidents, and common malicious attacks

Whether it is our personal documents and pictures or a company’s data, we store quite a bit of information on computers and servers. Most people put things on their computer, a company server, or the cloud and don’t think any more about it. For network administrators, however, being prepared for the what ifs is an important part of the job. People panic when they can’t find the file that they are looking for. If a business loses data, that has a definite financial impact on the business. Let’s find out how to make sure that doesn’t happen.

What will you learn in this unit?

  • Utilize basic tools to find disk and volume errors
  • Repair problems with files and folders
  • Create and implement safe account policies
  • Analyze a system for errors
  • Minimize the attack surface of a system

Advanced technical skills are necessary but insufficient on their own for a great career. Indeed, there is another trait that can lift up professionals who may lack some skills: professional etiquette. Professional etiquette is a highly sought-after trait in the technology community. It is vital. A network professional must be an excellent problem solver, a resourceful person, and an effective communicator. A technology professional is required to work in teams quite frequently and operate within the boundaries that their organization’s policies and procedures outline. An effective technology professional can discuss their content area with other technology professionals and translate complex concepts for non-native technology users.

What will you learn in this unit?

  • Evaluate and highlight formal agreements, including NDAs and service-level agreements
  • Demonstrate an understanding of a range of roles and professional responsibilities
  • Act as a strong teammate and leader
  • Develop your career with internal performance goals and external certifications

Physical

  • Video recording device
     

Software

  • Presentation software
  • Word processing software
     

Optional

  • Art supplies
  • Audio recording device
  • Digital camera
  • Graphic design software
  • Poster board
  • Spreadsheet software
Enroll now
Go back

Companion courses

Introduction to Networking 1a: Introduction

Introduction to Networking 1a: Introduction

Show all
Introduction to Networking 1b: Network Oversight

Introduction to Networking 1b: Network Oversight

Show all
Network Security Fundamentals 1a: Introduction

Network Security Fundamentals 1a: Introduction

Show all
Network Security Fundamentals 1b: Forensics and Permissions

Network Security Fundamentals 1b: Forensics and Permissions

Show all
Operational Cybersecurity 1a: Introduction

Operational Cybersecurity 1a: Introduction

Show all