How to build a Network from scratch

Networking & Communications Course

If you are interested taking Networking & Communications Course then get in touch using the contact us form or you can directly email us at info.cyberworldacademy@gmail.com or use the phone numbers to contact us. Call Now (+91) 9081006788


It is the interconnection of multiple devices, generally termed as Hosts connected using multiple paths for the purpose of sending/receiving data or media.

There are also multiple devices or mediums which helps in the communication between two different devices which are known as Network devices. Ex: Router, Switch, Hub, Bridge

How networking works, and how to use different devices to build networks. Computer networking has existed for many years, and as time has passed the technologies have become faster and less expensive. Networks are made up of various devices—computers, switches, routers—connected together by cables or wireless signals. Understanding the basics of how networks are put together is an important step in building a wireless network in a community or neighborhood.

Rs. 12,000/-   Duration: 50 Days

[Note: Prices displayed are after Discount and includes GST]

Detailed Syllabus of Networking & Communications Course:

  • Need for Networking
  • Protocols for Communications
  • TCP/IP Basics
  • Communication Media
  • Ethernet standards
  • Types of Networks and topologies
  • Network Design and Architectures
  • IP Addressing and Subnetting Basics
  • Classful and Classless IP Addresses
  • Network Unicast, Multicast and Broadcast
  • Ring Topology
  • Star Topology
  • Full-Mesh Topology
  • Hub-and-Spoke Topology
  • Partial-Mesh Topology
  • Networks Defined by Resource Location
  • Client- Networks
  • Dissecting the OSI Model
  • The Purpose of Reference Models
  • The TCP/IP Stack
  • Layers of the TCP/IP Stack
  • Common Application Protocols in the TCP/IP Stack
  • Media and Technologies
  • Coaxial Cable
  • Single-Mode Fiber
  • Cable Distribution
  • Wireless Technologies
  • Network Infrastructure Devices
  • Hubs
  • Bridges
  • Switches
  • Multilayer Switches
  • Routers
  • Infrastructure Device Summary
  • Specialized Network Devices
  • VPN Concentrators
  • Firewalls
  • DNS Servers
  • DHCP Servers
  • Proxy Servers
  • Content Engines
  • Content Switches
  • Virtual Network Devices
  • Virtual Servers
  • Virtual Switches
  • Virtual Desktops
  • Other Virtualization Solutions
  • Voice over IP Protocols and Components
  • Understanding Ethernet
  • Principles of Ethernet
  • Ethernet Origins
  • Carrier Sense Multiple Access Collision Detect
  • Distance and Speed Limitations
  • Ethernet Switch Features
  • Virtual LANs
  • Trunks
  • Spanning Tree Protocol
  • Broadcast Storms
  • STP Operation
  • Link Aggregation
  • Power over Ethernet
  • Port Monitoring
  • User Authentication
  • First-Hop Redundancy
  • Other Switch Features
  • Binary Numbering
  • Principles of Binary Numbering
  • Converting a Binary Number to a Decimal Number
  • Converting a Decimal Number to a Binary Number
  • Binary Numbering Practice
  • IPv4 Addressing
  • IPv4 Address Structure
  • Classes of Addresses
  • Types of Addresses - Unicast,Broadcast,Multicast
  • Assigning IPv4 Addresses
  • IP Addressing Components
  • Static Configuration
  • Dynamic Configuration
  • BOOTP
  • DHCP
  • Subnetting
  • Purpose of Subnetting
  • Subnet Mask Notation
  • Subnet Notation: Practice Exercise
  • Extending a Classful Mask
  • Borrowed Bits
  • Calculating the Number of Created Subnets
  • Calculating the Number of Available Hosts
  • Calculating New IP Address Ranges
  • Classless Inter-Domain Routing
  • IP Version 6
  • Need for IPv6
  • IPv6 Address Structure
  • IPv6 Data Flows
  • Unicast
  • Multicast
  • Anycast
  • Basic Routing Processes
  • Sources of Routing Information
  • Directly Connected Routes
  • Static Routes
  • Dynamic Routing Protocols
  • Routing Protocol Characteristics
  • Believability of a Route
  • Metrics
  • Interior Versus Exterior Gateway Protocols
  • Route Advertisement Method
  • Distance Vector
  • Link State
  • Routing Protocol Examples
  • Address Translation
  • NAT
  • PAT
  • Multicast Routing
  • IGMP
  • PIM
  • PIM-DM
  • PIM-SM
  • WAN Media Types
  • Physical Media
  • Wireless Media
  • WAN Technologies
  • Dedicated Leased Line
  • CSU/DSU
  • Point-to-Point Protocol
  • Digital Subscriber Line
  • Cable Modem
  • Synchronous Optical Network
  • Satellite
  • Plain Old Telephone Service
  • Integrated Services Digital Network
  • Frame Relay
  • Asynchronous Transfer Mode
  • Multiprotocol Label Switching
  • Introducing Wireless LANs
  • WLAN Concepts and Components
  • Wireless Routers
  • Wireless Access Point
  • Antennas
  • Other VPN Technologies
  • Intrusion Detection and Prevention
  • IDS Versus IPS
  • IDS and IPS Device Categories
  • Detection Methods
  • Deploying Network-Based and Host-Based Solutions

 

  • Frequencies and Channels
  • CSMA/CA
  • Transmission Methods
  • WLAN Standards
  • 802.11a
  • 802.11b
  • 802.11g
  • 802.11n
  • Deploying Wireless LANs
  • Types of WLANs
  • IBSS
  • BSS
  • ESS
  • Sources of Interf
  • erence
  • Wireless AP Placement
  • Securing Wireless LANs
  • Security Issues
  • Approaches to WLAN Security
  • Security Standards
  • WEP
  • WPA
  • WPA2
  • Summary
  • Exam Preparation Tasks
  • Review All the Key Topics
  • Complete Tables and Lists from Memory
  • Optimizing Network Performance
  • High Availability
  • High-Availability Measurement
  • Fault-Tolerant Network Design
  • Hardware Redundancy
  • Layer 3 Redundancy
  • Design Considerations for High-Availability Networks
  • High-Availability Best Practices
  • Content Caching
  • Load Balancing
  • QoS Technologies
  • Introduction to QoS
  • QoS Configuration Steps
  • QoS Components
  • QoS Mechanisms
  • Classification
  • Marking
  • Congestion Management
  • Congestion Avoidance
  • Policing and Shaping
  • Link Efficiency
  • Case Study: SOHO Network Design
  • Suggested Solution
  • IP Addressing
  • Layer 1 Media
  • Layer 2 Devices
  • Layer 3 Devices
  • Wireless Design
  • Environmental Factors
  • Cost Savings Versus Performance
  • Topology
  • Using Command-Line Utilities
  • Windows Commands
  • arp
  • ipconfig
  • nbtstat
  • netstat
  • nslookup
  • ping
  • route
  • tracert
  • UNIX Commands
  • arp
  • dig and nslookup
  • host
  • ifconfig
  • traceroute
  • netstat
  • ping
  • Summary
  • Managing a Network
  • Maintenance Tools
  • Bit-Error Rate Tester
  • Butt Set
  • Cable Certifier
  • Cable Tester
  • Connectivity Software
  • Crimper
  • Electrostatic Discharge Wrist Strap
  • Environmental Monitor
  • Loopback Plug
  • Multimeter
  • Protocol Analyzer
  • Punch-Down Tool
  • Throughput Tester
  • Time Domain Reflectometer/Optical Time Domain Reflectometer
  • Toner Probe
  • Configuration Management
  • Monitoring Resources and Reports
  • SNMP
  • Syslog
  • Logs
  • Application Logs
  • Security Logs
  • System Logs
  • Summary
  • Security Fundamentals
  • Network Security Goals
  • Confidentiality
  • Integrity
  • Availability
  • Categories of Network Attacks
  • From the Library of Dave TurnerContents
  • Confidentiality Attacks
  • Integrity Attacks
  • Availability Attacks
  • Defending Against Attacks
  • User Training
  • Patching
  • Security Policies
  • Governing Policy
  • Technical Policies
  • End User Policies
  • More Detailed Documents
  • Incident Response
  • Vulnerability Scanners
  • Nessus
  • Nmap
  • Honey Pots and Honey Nets
  • Access Control Lists
  • Remote Access Security
  • Firewalls
  • Firewall Types
  • Firewall Inspection Types
  • Packet-Filtering Firewall
  • Stateful Firewall
  • Firewall Zones
  • Virtual Private Networks
  • Overview of IPsec
  • IKE Modes and Phases
  • Authentication Header and Encapsulating Security Payload
  • The Five Steps in Setting Up and Tearing Down an IPsec Site-to-Site
  • VPN
  • Complete Tables and Lists from Memory
  • Wireless Troubleshooting

 

.



Live Direction