Networking Basics, Network Operating Systems and Wi-Fi Workshop
Miscellaneous / / December 04, 2023
Are you an advanced user? Do you want to study to become a system administrator, network technology or information security specialist?
Get started with a course on networking fundamentals!
-create a home or small office wireless WI-FI network;
-manage basic wireless network security settings - WEP, WPA, WPA2;
-configure a WI-FI access point yourself;
-understand network terminology;
-perform simple diagnostics of network connections using the PING command;
- get acquainted with the purpose of the MAC address, IP address, network mask;
-understand how TCP/IP-based routing occurs;
-continue studying at senior courses in LINUX and MS WINDOWS.
One of the best teachers in the field "Network technologies", Microsoft Certified Trainer and Sun Solaris 9 Certified Specialist. Holder of 29 prestigious international certifications from Microsoft and Sun Microsystems.
Mikhail Yurievich began his professional career in the IT field more than 20 years ago as a developer application software in Turbo Pascal and then Delphi (creation of software for processing experimental data). Since 1997, he has been involved in the administration of heterogeneous Windows - Unix networks. Since 2002, his responsibilities included the formation of an IT department, design of SCS, administration of IT infrastructure, including initially more than 200 PCs and 10 servers, implementation of optimal software and hardware platforms to support automation solutions corporate tasks.
Mikhail Yurievich ensured the continuity of electronic document management processes, audited clients’ information systems, and formed requirements for software and hardware complex of information systems, organization and control of work at facilities (more than 500 PCs of the main office, as well as a network of 14 branches), was involved in ensuring continuity business processes. Developed and monitored the company's IT budget, conducted a security audit of the IT infrastructure, analysis and optimization of the performance of implemented solutions, administration of databases on the platform MS SQL.
Specialist in Russian Linux (ALT Linux and Astra Linux distributions). Participant of the Azure Technology Laboratory conference (in the area of artificial intelligence and machine learning).
In the center "Specialist" Mikhail Yurievich has been teaching since 2007. Students highly appreciate both the professional and pedagogical abilities of the teacher. Always relies on examples from real practice and uses visual materials to explain complex concepts. He is happy to share professional secrets with students and gives a lot of information that goes beyond the scope of the course program.
» Teacher's articles:
» Videos of teacher’s seminars:
A unique specialist, a talented teacher, leading teacher of the Center and head of the “PC Setup and Repair” direction. He trained more than 6,000 students and always received the most flattering reviews from them. Possessing innate intelligence and...
A unique specialist, a talented teacher, leading teacher of the Center and head of the “PC Setup and Repair” direction. He trained more than 6,000 students and always received the most flattering reviews from them. Possessing innate intelligence and tact, he presents educational material competently and intelligibly, and generously shares his wealth of experience in the operation and maintenance of computer equipment.
In enthusiastic reviews from Nikolai Mikhailovich’s grateful listeners, they repeat with enviable frequency words such as “The best teacher I have ever met in my life” and “I wish there were more of them teachers!
In 1979 he graduated with honors from Moscow State Technical University named after N.E. Bauman. Since that time, Nikolai Mikhailovich has been working in the computer laboratory of MSTU, and since 1988 he has been in charge of it.
Nikolai Mikhailovich’s professional and teaching experience is truly enormous. He was involved in consulting technical department specialists in preparation for passing the A+ Certification tests of Kombelga-Golden Telecom.
Nikolai Mikhailovich began teaching 37 years ago at the department of Moscow State Technical University named after N.E. Bauman, where he conducted coursework and diploma design. “Specialist” has been teaching at the training center for over 24 years.
Certifications:
» Teacher's articles:
Module 1. Purpose and types of computer networks (1 ac. h.)
-Purpose of the network
-Types of networks: local network, wide area network
-the local network
-global network
-Classification by coverage area metropolitan area network (MAN) - city network campus area network (CAN) - campus network personal area network (PAN) - personal network
metropolitan area network (MAN) - city network
-campus area network (CAN) – campus network
-personal area network (PAN) – personal network
-Varieties of local networks peer-to-peer network network based on a dedicated server combined network
- peer-to-peer network
-network based on a dedicated server
-combined network
Module 2. Identification of computers on a network (1 ac. h.)
-Concepts of network interface and host
-Addressing hosts on the network MAC address IP address
-MAC address
-IP address
-Computer name on the network host name DNS name NetBIOS name
-hostname
-DNS name
-NetBIOS name
-Practical work.
-Using the Windows window interface to view host network IDs.
-Use the command line or PowerShell.
-Utilities: Ipconfig Hostname Getmac
-Ipconfig
-Hostname
-Getmac
Module 3. The concept of network architecture. Ethernet (1 ac. h.)
-Physical network topology Bus (Star) Ring (Ring) Mesh topology (Mesh)
-Bus
-Star
-Ring
-Mesh topology (Mesh)
-Data transmission medium Copper wire Optical fiber Wireless networks
-Copper wire
-Optical fiber
-Wireless network
-Network devices Hub (HUB) Switch (SWITCH) Router (Router)
-Hub
-Switch (SWITCH)
-Router
-Media access methods Carrier sense multiple access with collision detection (CSMA/CD) Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) Token Passing Access Passing)
-Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
-Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
-Access with token passing (Token Passing)
-Network protocols Routed and non-routable protocols The concept of protocol stacks
-Routable and non-routable protocols
-The concept of protocol stack
-Data transmission methods Unicast Multicast Anycast Broadcast
-Unicast
-Multicast
-Anycast
-Broadcast
Module 4. OSI reference network model (2 ac. h.)
- Purpose of the OSI model
-Seven-level representation of the process of interaction between hosts on the network
-Encapsulation and decapsulation
-Basic functions of OSI 7 protocols. Application Layer 6. Presentation Layer 5. Session Layer 4. Transport Layer Connection-oriented protocols - TCP (Transmission Control Protocol) Non-connection-oriented protocols - UDP (User Datagram Protocol) 3. Network Layer The operation of a network layer protocol using the example of the Internet Protocol (IP) Routing table 2. Data-Link Layer Formation of a frame for transmission over the network Implementation of a mechanism for controlling access to the medium 1. Physical Layer
- Application Layer
- Presentation Layer
- Session Layer
- Transport Layer Connection-oriented protocols - TCP (Transmission Control Protocol) Non-connection-oriented protocols - UDP (User Datagram Protocol)
Connection-oriented protocols - TCP (Transmission Control Protocol)
Non-connection-oriented protocols - UDP (User Datagram Protocol)
- Network Layer The operation of the network layer protocol using the example of the Internet Protocol (IP) Routing table
The operation of a network layer protocol using the example of the IP (Internet Protocol) protocol
Routing table
- Data-Link Layer Frame formation for transmission over the network Implementation of a medium access control mechanism
Framing for network transmission
Implementation of a medium access control mechanism
- Physical Layer
Practical work. Using the ROUTE Command to Display or Modify the Local Host's Routing Table
Module 5. TCP/IP protocol stack (2 ac. h.)
-4-level TCP/IP model
-Comparison of the 4-layer TCP/IP model and the 7-layer OSI model
-Application level protocols: TELNET, HTTP, FTP, SMTP, POP3, IMAP
-Transport layer protocols: TCP, UDP
-Internet layer protocols: IP, ARP, ICMP
-Network interface level
-Practical work. ARP utility - viewing the ARP table (ARP cache) Network diagnostics - PING utility - Testing communication with a specified host Route tracing - TRACERT utility
Module 6. IPv4 addressing (6 ac. h.)
-TTL (Time to Live) – packet lifetime
-IP address structure - network ID and host host ID
-Format dotted decimal
-Class addressing system
-Classless networking - CIDR
-Network (subnet) mask, concept and purpose.
-Reserved IP addresses
-Autonomous (private) networks. Address ranges
-Configuring IP addressing parameters Manual configuration Automatic configuration Dynamic IP address allocation - DHCP Automatic assignment of private IP addresses - APIPA
-Manual setting
-Automatic configuration Dynamic IP address allocation - DHCP Automatic private IP address assignment - APIPA
-Dynamic IP address distribution - DHCP
-Automatic assignment of private IP addresses - APIPA
-Introduction to DNS (Domain Name System)
-Host Name Resolution DNS Resolver Cache File Hosts DNS Server
-DNS resolver cache
-Hosts file
-DNS server
-The concept of TCP and UDP ports. Socket.
-Network address translation: NAT - basic, PAT - advanced
-Practical work. Determine whether hosts belong to one or more networks. Determination of network addresses, broadcast address, range of host addresses on the network.
Module 7. Introduction to IPv6 (2 ac. h.)
-Structure and format of IP address
-Hexadecimal representation
-EUI-64 technology
-Tunneling: purpose and description of standard tunnels
Module 8. Wi-Fi networks (1 ac. h.)
-Application areas of wireless networks
-Pros and cons of wireless networks
-Basic elements of a WI-FI network Access point (AP) Wireless adapter
-Access point (AP)
- Wireless adapter
-Methods of combining devices into a WI-FI network Ad Hoc - independent configuration Infrastructure mode - using an access point
-Ad Hoc – independent configuration
-Infrastructure mode – using an access point
-IEEE 802.11 family of wireless networking standards
-Wireless security - WPA, IEEE 802.11i (WPA2) and 802.1x
-Practical work. View the characteristics of available WI-FI networks. Creating a small office or home WI-FI network. Setting up an access point.
This course is designed for IT professionals involved in assessing, planning, deploying and operating Microsoft Office 365 services, including identities, dependencies, requirements, and support technologies. * *the course is taught in partnership with the ARMKYBERSEC Academy
4,2
49 990 ₽