Computer Networking Fundamentals (1 Day)

£499.00

Category:

Description

A whirlwind introduction to both theoretical and practical hands on computer networking concepts

The reliance on computer networks is increasing in today’s world. There is a large number of IT professionals however who have never been exposed or had the time to delve into the fundamentals of how computer networks function.  This course provides an in-depth study in 1 day of the most important features of computer networks. This course will introduce the concepts and principles of computer networks in both theory and hand-on practical lab sessions. Attendees will be given the opportunity to learn how to test networks, implement security and resolve network problems. Students will gain a knowledge of basic skills in networking, and configuring networks. Students will be introduced to packet sniffing software which allows deep analysis of the underlying network.

In a nutshell

This course provides an in-depth hands-on approach to transmitting packets over modern networks. This course will introduce the concepts and principles of configuring & understanding computer networks. In addition, students will be given the opportunity to learn how to configure and test networks, deploy packet sniffers, work with network based software applications and resolve network problems. Each module includes a practical component where command line, application tools and packet sniffing is used to demonstrate the concepts outlined earlier. This course content is a reduced subset of the comprehensive 3 day course. Attendees who take this will get a discount if they later choose to take the 3 day course.

Syllabus

1: INTRODUCTION TO NETWORKS

1.1 USES OF COMPUTER NETWORKS – 1.2 NETWORK HARDWARE – 1.3 NETWORK SOFTWARE – 1.4 REFERENCE MODELS

This module introduces Business & Home Applications, Mobile Users & Social Issues surrounding networks. We briefly introduce Personal Area, Local Area, Metropolitan Area & Wide Area Networks alongside Internetworks. Next we examine Protocol Hierarchies, Design Issues for the Layers, Connection-Oriented Versus Connectionless Service, Service Primitives & the Relationship of Services to Protocols. We first meet the OSI Reference Model and the TCP/IP Reference Model which is the model used in this course. We compare the OSI and TCP/IP Reference Models and we also critique the OSI & TCP Model and Protocols. 

2 PACKET ANALYSIS AND SNIFFING TRAFFIC WITH WIRESHARK

We cover Packet Analysis and Packet Sniffers, Evaluating a Packet Sniffer, How Packet Sniffers,  Work, How Computers Communicate, Protocols, The Seven-Layer OSI Model, Data Encapsulation, Network Hardware, Traffic Classifications, Broadcast Traffic, Multicast Traffic and Unicast Traffic. We also cover Living Promiscuously, Sniffing Around Hubs, Sniffing in a Switched Environment, Port Mirroring, Hubbing Out, Using a Tap, ARP Cache Poisoning, Sniffing in a Routed Environment and Sniffer Placement in Practice. We also provide an Introduction to Wireshark, Installing Wireshark, Wireshark Fundamentals, Your First Packet Capture, Wireshark’s Main Window, Wireshark Preferences, Packet Color Coding and do live sniffing in the lab.

4: THE MEDIUM ACCESS CONTROL SUBLAYER

4.1 THE CHANNEL ALLOCATION PROBLEM – 4.2 MULTIPLE ACCESS PROTOCOLS – 4.3 ETHERNET – 4.4 WIRELESS LANS

This module looks at Static Channel Allocation, Assumptions for Dynamic Channel Allocation, ALOHA, Carrier Sense Multiple Access Protocols, Collision-Free protocols, Limited-Contention Protocols, Wireless LAN Protocols, Classic Ethernet Physical Layer, Classic Ethernet MAC Sublayer Protocol, Ethernet Performance, Switched Ethernet, Fast Ethernet, Gigabit & 10 Gigabit Ethernet and a retrospective on Ethernet. With regards Wireless, we look at the 802.11 Architecture and Protocol Stack, 802.11 Physical Layer & MAC Sublayer Protocol along with the 802.11 Frame Structure.

5: THE NETWORK LAYER

5.1 NETWORK LAYER DESIGN ISSUES – 5.2 ROUTING ALGORITHMS – 5.3 CONGESTION CONTROL ALGORITHMS

We begin by covering Store-and-Forward Packet Switching, services provided to the Transport Layer, Implementation of Connectionless Service & the Connection-Oriented Service plus a comparison of Virtual-Circuit and Datagram Networks. We introduce the Optimality Principle, Shortest Path Algorithm, Flooding, Distance Vector Routing, Link State Routing, Hierarchical Routing, Broadcast Routing, Multicast Routing, Anycast Routing, Routing for Mobile Hosts and Routing in Ad Hoc Networks. We look at Approaches to Congestion Control, Traffic-Aware Routing, Admission Control, Traffic Throttling and Load Shedding.

6: THE TRANSPORT LAYER

6.1 THE TRANSPORT SERVICE – 6.2 ELEMENTS OF TRANSPORT PROTOCOLS – 6.3 CONGESTION CONTROL ALGORITHMS – 6.4 THE INTERNET TRANSPORT PROTOCOLS: UDP – 6.5 THE INTERNET TRANSPORT PROTOCOLS: TCP

We start off looking at services provided to the Upper Layers, Transport Service Primitives and Berkeley Sockets. Next we discuss Addressing, Connection Establishment & Release, Flow Control and Buffering, Multiplexing and Crash Recovery. We examine Desirable Bandwidth Allocation, Regulating the Sending Rate and Wireless Issues. Ne introduce UDP, Remote Procedure Call and the Real-Time Transport Protocol. Next is TCP where we examine the TCP Service, TCP Protocol, TCP Segment Header, TCP Connection Establishment, TCP Connection Release, TCP Connection Management Modeling, TCP Transmission Policy, TCP Timer Management, TCP Congestion Control and the Future of TCP. 

7: THE APPLICATION LAYER

7.1 DNS–THE DOMAIN NAME SYSTEM – 7.2 ELECTRONIC MAIL – 7.3 THE WORLD WIDE WEB

We start by looking at the DNS Name Space, Resource Records, Name Servers, Architecture and Services, The User Agent, Message Formats, Message Transfer, Final Delivery, Architectural Overview, Static Web Pages, Dynamic Web Pages and Web Applications, HTTP–The HyperText Transfer Protocol, Mobile Web and Web Search.

8: NETWORK SECURITY

10.1 CRYPTOGRAPHY – 10.2 SYMMETRIC-KEY ALGORITHMS – 10.3 PUBLIC-KEY ALGORITHMS – 10.4 DIGITAL SIGNATURES
We begin with an introduction to Cryptography and discuss substitution Ciphers, Transposition Ciphers, One-Time Pads, Two Fundamental Cryptographic Principles, DES–The Data Encryption Standard, AES–The Advanced Encryption Standard, Cipher Modes, Other Ciphers, Cryptanalysis, RSA, Other Public-Key Algorithms, Symmetric-Key Signatures, Public-Key Signatures, Message Digests and the Birthday Attack. We then discuss Certificates, X.509, Public Key Infrastructures, IPsec Firewalls, Virtual Private Networks and Wireless Security.

 

 

Additional information

Equipment to bring

Students should bring their own laptop but we can also provide a laptop in many cases. Some of the course exercises are based on Windows, while others focus on Linux. VMware Player or VMware Workstation is used for the class. We can provide it on the day. If you plan to use a Macintosh, please make sure you bring VMware Fusion, along with a Windows guest virtual machine.

You will also be required to disable your anti-virus tools temporarily for some exercises, so make sure you have the anti-virus administrator permissions to do so. Do not plan on just killing your anti-virus service or processes, because most anti-virus tools still function, even when their associated services and processes have been terminated. For many enterprise-managed clients, disabling your anti-virus tool may require a different password than the Administrator account password. Please bring that administrator password for your anti-virus tool. We will provide you with a copy of the attack tools to experiment with during the class and to take home for later analysis.

Who should attend?

We welcome anyone with some background in an aspect of IT/computing. Ideally the person is an IT professional but we can tailor aspects of the material to suit the strength of the attendee. We particularly welcome networking specialists, coders, under-graduates and post-graduates, professionals who need to build deeper technical skills and those looking to move into a computer networks related area.

Why choose this course?

This course offers in-depth technical excellence along with industry-leading methodologies to examine networks from the bottom up.

We provide theoretical in-depth notes on networks and testing networks alongside cutting edge lab classes to demonstrate the tools.

We go deep into the tools arsenal with numerous hands-on exercises that show subtle, less well-known and undocumented features that are useful for those who wish to simply know more about networks.

We show how the tools interrelate with each other in an overall testing process by focusing on the workflow of professional penetration testers and ethical hackers, proceeding step by step and discussing the most effective means for conducting projects.

We show how penetration testing and ethical hacking should fit into a comprehensive enterprise information security program.

Course Location & Date: (Email us the date range which suits you and we will get back to you).

We generally run our courses in local hotels or training centres but we can also visit your company and conduct the training there. We are flexible.

Email us at info@wirelessnetworksecuritycourses.com with your preferred date(s) for training. We also can do weekends.