You are previewing Network Administrator Street Smarts: A Real World Guide to CompTIA Network+® Skills, Second Edition.
O'Reilly logo
Network Administrator Street Smarts: A Real World Guide to CompTIA Network+® Skills, Second Edition

Book Description

Develop the skills you need in the real world

Hit the ground running with the street-smart training you'll find in this practical book. Using a "year in the life" approach, it gives you an inside look at network administration, with key information organized around the actual day-to-day tasks, scenarios, and challenges you'll face in the field. This valuable training tool is loaded with hands-on, step-by-step exercises covering all phases of network administration, including:

  • Designing a network

  • Implementing and configuring networks

  • Maintaining and securing networks

  • Troubleshooting a network

An invaluable study tool

This no-nonsense book also covers the common tasks that CompTIA expects all of its Network+ candidates to know how to perform. So whether you're preparing for certification or seeking practical skills to break into the field, you'll find the instruction you need, including:

  • Designing and drawing an internetwork

  • Identifying devices and components

  • Configuring wireless components

  • Planning for static and dynamic routing

  • Setting up hubs, switches, and routers

  • Maintaining security with encryption, scans, and more

  • Troubleshooting your network

The Street Smarts series is designed to help current or aspiring IT professionals put their certification to work for them. Full of practical, real world scenarios, each book features actual tasks from the field and then offers step-by-step exercises that teach the skills necessary to complete those tasks. And because the exercises are based upon exam objectives from leading technology certifications, each Street Smarts book can be used as a lab manual for certification prep.

Table of Contents

  1. Copyright
  2. Dear Reader
  3. Dedication
  4. Acknowledgments
  5. About the Author
  6. Introduction
  7. Designing an Internetwork
    1. Task 1.1: Drawing an Internetwork
    2. Task 1.2: Identifying Network Components
    3. Task 1.3: Differentiating Ethernet Devices
    4. Task 1.4: Discovering and Filtering MAC Addresses
    5. Task 1.5: Applying the OSI Model
    6. Task 1.6: Developing an IP Addressing Scheme
    7. Task 1.7: Designing a VLAN Scheme
    8. Task 1.8: Planning for Static and Dynamic Routing
  8. Implementing and Configuring the Design
    1. Task 2.1: Assigning IP Addresses
    2. Task 2.2: Naming Network Devices
    3. Task 2.3: Implementing Static and Dynamic Routing
    4. Task 2.4: Installing Wireless NICs
    5. Task 2.5: Measuring Wireless Signal Strength
    6. Task 2.6: Implementing Bluetooth
    7. Task 2.7: Implementing Ad Hoc Wireless Networking
    8. Task 2.8: Using an Analog Modem
    9. Task 2.9: Using a DSL Modem
    10. Task 2.10: Using a Router as a Frame Relay Switch
    11. Task 2.11: Simulating T1 CSU/DSUs
  9. Maintaining and Securing the Network
    1. Task 3.1: Creating Local User Accounts
    2. Task 3.2: Creating Local User Groups
    3. Task 3.3: Managing Access to Resources
    4. Task 3.4: Disabling Local User Accounts
    5. Task 3.5: Setting Password Restrictions
    6. Task 3.6: Mitigating the Ping of Death
    7. Task 3.7: Securing Links Between Routers
    8. Task 3.8: Guarding against SYN Flood Attacks
    9. Task 3.9: Implementing File-Level Encryption
    10. Task 3.10: Establishing Data Encryption Between Routers
    11. Task 3.11: Creating Data Backups
    12. Task 3.12: Running an Antivirus Scan
    13. Task 3.13: Running an Antispyware Scan
    14. Task 3.14: Searching for Operating System Updates
  10. Troubleshooting the Network
    1. Task 4.1: Using ARP Utilities
    2. Task 4.2: Using the NETSTAT Utility
    3. Task 4.3: Using the FTP Utility
    4. Task 4.4: Using Ping Utilities
    5. Task 4.5: Using the IPCONFIG Utility
    6. Task 4.6: Using Traceroute Utilities
    7. Task 4.7: Using Telnet
    8. Task 4.8: Using the NSLOOKUP Utility
    9. Task 4.9a: Using the Built-in Protocol Analyzer
    10. Task 4.9b: Using a Third-party Protocol Analyzer
    11. Task 4.10: Displaying Computer Event Logs
  11. Index