Length: 3 Days
Computer Network Architecture Training
Used to be IT infrastructure was linked together in a loosely-coupled architecture, tied together via networking technologies such as Ethernet cables and the TCP/IP protocol.
Over the years, things got complicated. Today some networks live in the cloud, some are virtual and some rely on application-to-application connections – yet, networks still connect IT systems together in one way or another.
Amid network transformations, security measures also had to evolve. With vital personal and business data being shared on computer networks every day, security has become paramount in light of increased network attacks.
A network attack can be defined as any method, process, or means used to maliciously attempt to compromise network security. Network security is the process of preventing network attacks across a given network infrastructure, but the techniques and methods used by the attacker further distinguish whether the attack is an active cyberattack, a passive type attack, or some combination of the two.
There are many layers to consider when addressing network security across an organization. Attacks can happen at any layer in the network security layers model, so your network security hardware, software and policies must be designed to address each area.
Network security typically consists of three different controls. One of those controls, physical controls, are designed to prevent unauthorized personnel from gaining physical access to network components such as routers, cabling cupboards and so on. Controlled access, such as locks, biometric authentication and other devices, is essential in any organization.
Another, technical security controls protect data that is stored on the network or which is in transit across, into or out of the network. Protection is twofold; it needs to protect data and systems from unauthorized personnel, and it also needs to protect against malicious activities from employees.
Then there’s administrative controls, which consist of security policies and processes that control user behavior, including how users are authenticated, their level of access and also how IT staff members implement changes to the infrastructure.
Computer Network Architecture Training by Tonex
Computer network architecture training helps you learn principles of computer networking, internet architecture, internet protocols, wireless networks and next generation networking.
Computer network architecture training course helps you to understand a variety of topics in network security such as: computer networks, Ethernet/LAN, packets, IPv4/IPv6, UDP/TCP, Network security standards, and OSI model. Moreover, learn about network layer routing, application layers, transported layers, and network layers as the main layers included in network architecture.
By taking computer network architecture training, you will be introduced to the basic terminologies used in network architecture such as: HTTP, DNS, congestion control, TCP, IEEE 802.11, internetwork, datagrams, LAN, IP and firewall.
Learn about the difference between network core and network edge, internet protocol, protocol layers and network modeling as a short term comprehensive training by Tonex.
- The basics of Ethernet and LAN, different Ethernet speeds, spanning tree algorithm, virtual LAN (VLAN), virtual private networks (VPN) and commonly used Wi-Fi which prepares you for technical details of network architecture.
- The IPv4 and IPv6, the difference between them, importance of mobile IP, headers and subnets for IPv4 and IPv6.
- The OSI reference model including its seven layers which is the most important topic in network architecture. Furthermore, the main layers of OSI reference model will be described in detail. For example, network layer routing, application layers, transport layer, network layer, and data link layers are covered in this training.
Who Can Benefit from Computer Network Architecture Training
If you are an IT professional who specializes in network security, you will benefit from the presentations, examples, case studies, discussions, and individual activities upon the completion of the computer network architecture training and will prepare yourself for your career.
Computer Network Architecture Training in One Paragraph
Computer network architecture training will teach you the wireless and mobile networks aligned with standards in computer network security. To get you prepared for real-world cases, a set of labs, workshops and group activities of real-world case studies are designed to prepare you for the real-world problems and to be able to tackle all the related network architecture challenges.
Tonex is a leader in the cybersecurity industry with more than 15 years of experience and more than thousands of clients among the prestigious governmental and private organizations.
Tonex is known for delivering high quality training, seminars, conferences, workshops, and custom-designed courses.
Tonex Computer Network Architecture Training Framework
This seminar is in the form of an interactive presentation. It includes several hands-on activities in the class, including labs, workshops, and group activities. Students will bring in their favorite sample to work on and through the coaching of our instructors they practice to apply the techniques and concepts they learned at work.
The computer network architecture training is a 2-day course designed for:
- IT professionals in the area of information security and network architecture
- Executives and managers of cyber security and system engineering area
- Information technology professionals, network engineers, security analysts, policy analysts
- Security operation personnel, network administrators, system integrators and network architecture consultants
- Security traders to understand the network architecture
- Investors and contractors who plan to make investments in network security industry.
- Technicians, operators, and maintenance personnel who are or will be working on network related projects
- Managers, accountants, and executives of network security industry.
Upon completion of the computer network architecture training course, the attendees are able to:
- Understand the basic ideas and philosophy behind the network architecture
- Get a clear idea of important protocols in TCP/IP networks
- Understand the architecture for mobility, multicast and routing
- Explain the virtual private networks, resource allocation and congestion control in network architecture
- Identify and analyze strengths and weaknesses of various network layers
- Identify alternative solutions in network architecture
- Manage small networks including different architectures
- Conduct the performance measurements and traffic analysis of internet architecture
The computer network architecture training course consists of the following lessons, which can be revised and tailored to the client’s need:
Introduction to Computer Networks
- Internet, HTTP, DNS, P2P
- Socket, Ports
- Congestion Control, Flow Control, TCP
- Routing, Basic Graphs, IP
- DSL Versus Cable, Aloha, CSMA, TDMA, Token, 802.11
- Security RSA
- Cellular Networks, Mobile Networks, Satellite Networks
- Wireless Multi-hop Networks
- Data Rate, Throughput and Bandwidth
- Datagram Forwarding
- Routing Loops
- LAN and Ethernet
- IETF and OSI
Basic Terminologies in Network Architecture
- What Is the Internet?
- What Is a Protocol?
- Network Edge
- Network Core
- Access Net, Physical Media
- Internet/ISP Structure
- Performance, Loss, Delay
- Protocol Layers, Service Models
- Network Modeling
Ethernet and LAN
- 10Mbs And 100Mbs Ethernet
- Gigabit Ethernet
- Ethernet Switches
- Spanning Tree Algorithm
- Virtual LAN (VLAN)
- Virtual Private Networks (VPN)
- Token Ring
- Virtual Circuits
- Asynchronous Transfer Mode; ATM
- Wimax and LTE
- Fixed Wireless
- Encoding And Framing
- Time-Division Multiplexing
- Packet Delay
- Packet Delay Variability
- Packet Size
- Error Detection
Ipv4 and Ipv6
- Ipv4 Header
- Ipv4 Subnet
- Classless IP Delivery Algorithm
- Address Resolution Protocol; ARP
- Dynamic Host Configuration Protocol (DHCP)
- Mobile IP
- IPv6 Header
- IPv6 Address
- IPv6 Multicast and Extension Headers
- IPv6 Host Address Assignment
- IPv6 Subnets
- IPv6 Connectivity via Tunneling
- IPv6 to IPv4 Connectivity
UDP and TCP
- User Datagram Protocol; UDP
- Trivial File Transport Protocol; TFTP
- Remote Procedure Call (RPC)
- The End-to-End Procedure
- TCP Header
- TCP State Diagram
- TCP Sliding Windows
- TCP Flow Control
- TCP Timeout and Retransmission
- TCP Timers
Computer Network Security Standards
- Application Level Security
- PGP, S/MIME, S-HTTP, HTTPS, SET And KERBEROS
- Transport Level Security SSL and TLS
- Network Level Security; IPsec and VPNs
- Link Level Security- PPP and RADIUS
OSI Reference Model
- History Of OSI Model
- The OSI Reference Model
- The Physical Layer
- The Data Link Layer
- The Network Layer
- The Transport Layer
- The Session Layer
- The Presentation Layer
- The Application Layer
- Data Transmission In OSI Model
- The TCP/IP Reference Model
- Initial TCP/IP Protocols
Network Layer Routing
- Routing and Forwarding
- Routing Algorithms
- Routing in the Internet
- Network Applications
- Web and HTTP
- Electronic Mail, SMTP, POP3, IMAP
- P2P File Sharing
- Socket Programming
- Web Server
Transport Layer Network Architecture
- Reliable Data Transfer
- Flow Control
- Congestion Control
- Connectionless Transport
- TCP Congestion Control
Network Layer in Network Architecture
- Introduction to Network Layer
- Virtual Circuit and Datagram Network
- IP; Internet Protocol
- IPv4 Addressing
- Routing Algorithm
- Link State
- Distance Vector
- Hierarchical Routing
- Broadcast and Multicast Routing
Data Link Layer
- Introduction to Datalink Layer
- Error Detection and Correction
- Multiple Access Protocols
- Link Layer Addressing
- Hubs and Switches
- Link Virtualization; ATM And MPLS
Wireless and Mobile Networks
- Introduction to Mobile Network and Wireless
- Wireless Links and Their Characteristics
- IEEE 802.11
- Wireless LANS
- Cellular Internet Access
- Architecture of CIA
- Standards in CIA
- Addressing and Routing to Mobile Users
- Mobile IP
- Handling Mobility in Cellular Networks
- Mobility and Higher Layer Protocols
Computer Network Security
- Introduction to Network Security
- Principles of Cryptography
- Key Distribution and Certification
- Access Control And Firewalls
- Attacks and Counter Measures
- Security in Different Layers on Network
- Shared Key Encryption
- Diffie-Hellman-Merkle Exchange
- SSH and TLS
Hands On, Workshops and Group Activities
- Group Activities
Sample Workshops and Labs for Computer Network Architecture Training
- Tutorial and Hands-on for Ethereal Packet Sniffer
- Implementing a Simple IP Router
- Implementing a Simple Network Access Translator
- Implementing a Simple Link State Routing Protocol
- A MAC Address Table Overflow Attack
- A BGP Path Hijacking Attack
Computer Network Architecture Training