0% found this document useful (0 votes)
48 views13 pages

IT Essentials 2

The document outlines the course details for IT Essentials II, covering topics such as operating system fundamentals, networking, physical components of a network, TCP/IP networking, network services, network operating systems, installation processes, and troubleshooting. It includes detailed chapters on Microsoft Windows, UNIX/Linux, and advanced network security and administration. The course aims to provide comprehensive knowledge and skills for managing and troubleshooting various operating systems and network environments.

Uploaded by

oonaylin552
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views13 pages

IT Essentials 2

The document outlines the course details for IT Essentials II, covering topics such as operating system fundamentals, networking, physical components of a network, TCP/IP networking, network services, network operating systems, installation processes, and troubleshooting. It includes detailed chapters on Microsoft Windows, UNIX/Linux, and advanced network security and administration. The course aims to provide comprehensive knowledge and skills for managing and troubleshooting various operating systems and network environments.

Uploaded by

oonaylin552
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Course Details For IT Essentials II

Chapter 1: Operating System Fundamentals

1.1 Operating System Basics


1.1.1 Overview of PC Operating Systems
1.1.2 PCs and computer networks
1.1.3 The kernel
1.1.4 The user interface
1.1.5 The file system
1.1.6 Common desktop operating systems

1.2 Microsoft Windows


1.2.1 MS-DOS
1.2.2 Microsoft Windows 3.1
1.2.3 Windows 9x
1.2.4 Windows NT and Windows 2000
1.2.5 Windows XP
1.2.6 Windows GUI
1.2.7 Windows CLI
1.2.8 Windows Control Panel

1.3 UNIX and Linux on the Desktop


1.3.1 Origins of UNIX
1.3.2 Origins of Linux
1.3.3 Linux/UNIX GUI
1.3.4 Linux/UNIX CLI
1.3.5 Linux and UNIX system configuration tools

1.4 Network Operating Systems Overview


1.4.1 Common network operating systems
1.4.2 The client-server model
1.4.3 Evaluating customer resources and requirements

Chapter 2: Introduction to Networking

2.1 Benefits of Networking


2.1.1 File, print, and application services
2.1.2 Mail services
2.1.3 Directory and name services
2.1.4 The Internet
2.1.5 Network administration

2.2 Types of Networks


2.2.1 Overview
2.2.2 Local-Area Networks (LANs)
2.2.3 Wide-Area Networks (WANs)
2.2.4 Peer-to-peer networks
2.2.5 Client/server networks

2.3 Networking Standards


2.3.1 Proprietary versus open standards
2.3.2 The OSI reference model
2.3.3 The DoD model
2.3.4 The IEEE
2.3.5 The ITU
2.3.6 Other standards

2.4 Networking Protocols


2.4.1 Protocol suite
2.4.2 TCP/IP
2.4.3 IPX/SPX
2.4.4 AppleTalk

2.5 LAN Architectures


2.5.1 Ethernet
2.5.2 Token Ring
2.5.3 Fiber Distributed Data Interface (FDDI)

Chapter 3: Physical Components of a Network

3.1 Configuring a Network Interface Card


3.1.1 What is a NIC?
3.1.2 Setting the IP address
3.1.3 DHCP servers
3.1.4 Domain Name System
3.1.5 Default gateway

3.2 Topologies
3.2.1 The network topology
3.2.2 Physical versus logical topology
3.2.3 Bus topology
3.2.4 Star topology
3.2.5 Ring topology
3.2.6 Mesh topology
3.2.7 Hybrid topology

3.3 Media Types


3.3.1 Networking media
3.3.2 Coaxial cable
3.3.3 Twisted-pair cable
3.3.4 Fiber-optic cable
3.3.5 Wireless

3.4 Devices
3.4.1 Hubs and repeaters
3.4.2 Bridges and switches
3.4.3 Routers

3.5 Connecting to the Internet (WANs)


3.5.1 Synchronous and asynchronous serial lines
3.5.2 Modems
3.5.3 Dialup networking, modem standards, AT commands
3.5.4 ISPs and Internet backbone providers
3.5.5 DSL
3.5.6 Cable modems
3.5.7 Cable modem versus DSL Internet technologies

Chapter 4: TCP/IP Networking

4.1 History of TCP/IP


4.1.1 Origins and growth of TCP/IP
4.1.2 The TCP/IP network model
4.1.3 TCP/IP and network operating systems

4.2 IP Addressing
4.2.1 IPv4 addressing
4.2.2 IPv4 addressing overview
4.2.3 Class A addresses
4.2.4 Class B addresses
4.2.5 Class C addresses
4.2.6 Class D and E addresses
4.2.7 The IPv4 address crisis
4.2.8 Subnetting

4.3 Name Resolution


4.3.1 Overview of name resolution
4.3.2 Hostnames and host tables
4.3.3 The domain name system
4.3.4 Name services and the NOS
4.3.5 WINS

4.4 TCP/IP Protocols


4.4.1 Overview of TCP/IP protocols
4.4.2 Address Resolution Protocol (ARP)
4.4.3 Internet Control Message Protocol (ICMP)
4.4.4 Transmission Control Protocol (TCP)
4.4.5 User Datagram Protocol (UDP)
4.4.6 DHCP services
4.4.7 Hypertext Transport Protocol (HTTP)
4.4.8 File Transfer Protocol (FTP)
4.4.9 Telnet
4.4.10 SMTP
4.4.11 POP3
4.4.12 IMAP

Chapter 5: Overview of Network Services

5.1 Network Services


5.1.1 An introduction to network/NOS services

5.2 Remote Administration and Access Services


5.2.1 What is remote access?
5.2.2 Telecommuting
5.2.3 Mobile users
5.2.4 Terminal emulation services
5.2.5 Telnet services
5.2.6 Configuring remote access for a client
5.2.7 Controlling remote access rights
5.2.8 Remote administration to Linux system

5.3 Directory Services


5.3.1 What is a directory service?
5.3.2 Directory service standards
5.3.3 Windows 2000 Active Directory
5.3.4 The Novell Network Directory Service (NDS)
5.3.5 Network Information Service (NIS)

5.4 Other NOS Services


5.4.1 Mail
5.4.2 Printing
5.4.3 File sharing
5.4.4 FTP (File Transfer) web services
5.4.5 Web services
5.4.6 Intranets
5.4.7 Extranet
5.4.8 Automating tasks with scripts services
5.4.9 Domain Name Service (DNS)
5.4.10 DHCP
5.4.11 Domains

Chapter 6: Introduction to Network Operating Systems

6.1 Characteristics of a Network Operating System


6.1.1 Overview of NOS characteristics
6.1.2 Differences between PCs and a NOS
6.1.3 Multiuser, multitasking, and multiprocessor systems
6.1.4 NOS server hardware
6.1.5 Choosing a NOS
6.1.6 Types of NOSs

6.2 Windows NT and Windows 2000


6.2.1 Windows terminology
6.2.2 Windows NT 4.0
6.2.3 Windows 2000 Operating Systems
6.2.4 Windows 2000's family of Operating Systems

6.3 Linux
6.3.1 History of Linux
6.3.2 What is UNIX?
6.3.3 Linux Operating Systems
6.3.4 Linux clients

6.4 Determining Software Requirements for a Linux NOS


6.4.1 Workstation software and programs
6.4.2 Server software and programs
6.4.3 Additional software and programs
6.4.4 Verifying software compatibility

Chapter 7: Installation and Boot Process Overview

7.1 Preparing for the Installation


7.1.1 Installing NOS
7.1.2 Planning the system
7.1.3 Planning hardware installation
7.1.4 Server hardware components
7.1.5 Hardware requirements
7.1.6 Creating a hardware inventory
7.1.7 Identifying hardware using Device Manager
7.1.8 Checking hardware compatibility lists
7.1.9 Verifying the network

7.2 The Installation Process


7.2.1 Installation media
7.2.2 BIOS settings
7.2.3 The installation program
7.2.4 Disk partitions
7.2.5 Partitioning a disk
7.2.6 Swap files
7.2.7 Formatting the disk
7.2.8 Creating initial administrative accounts
7.2.9 Completing the installation

7.3 The Boot Process


7.3.1 The steps of the boot process
7.3.2 Basic files required
7.3.3 BIOS interaction
7.3.4 Detailed steps of the boot process
7.3.5 Linux boot process

7.4 Troubleshooting NOS Installation


7.4.1 Unable to boot from installation media
7.4.2 Problems during the installation process
7.4.3 Post-installation problems
Chapter 8: Windows 2000 Professional

8.1 Installation
8.1.1 Installing the OS
8.1.2 Installation of OS add-on options

8.2 Administrator/User Interface


8.2.1 Log in procedures
8.2.2 Graphical user interface (GUI)
8.2.3 Command-line interface (CLI)
8.2.4 Windows Explorer navigation

8.3 User Accounts


8.3.1 Adding users
8.3.2 Managing user accounts

8.4 Managing the File System


8.4.1 Creating and sharing folders
8.4.2 Creating groups and adding users
8.4.3 Passwords and permissions

8.5 Services
8.5.1 Hypertext Transfer Protocol (HTTP)
8.5.2 File Transfer Protocol (FTP)
8.5.3 Telnet
8.5.4 E-mail server/client relationship
8.5.5 Printing in Windows 2000
8.5.6 Scripts

Chapter 9: Linux

9.1 Pre-Installation Tasks


9.1.1 The boot method
9.1.2 Installation media
9.1.3 Selecting the appropriate parameters for installation
9.1.4 Creating the Linux file system
9.1.5 Selecting packages to install

9.2 Installing and Configuring Linux


9.2.1 Linux hardware requirements
9.2.2 Starting the installation
9.2.3 Configuring appropriate security settings
9.2.4 Configuring network settings
9.2.5 Other configurations and settings

9.3 X Server
9.3.1 Video card chipset
9.3.2 X server options
9.3.3 Installing X server
9.3.4 Configuring X server
9.3.5 Hardware configurations
9.3.6 Window managers
9.3.7 Desktop environments

9.4 Post-Installation Configuration and Tasks


9.4.1 Post-installation of applications and programs
9.4.2 Installing and reconfiguring the boot loader
9.4.3 Kernel issues
9.4.4 Environment variables
9.4.5 Verifying proper application functioning and performance

Chapter 10: Advanced NOS Administration

10.1 User Interface Administration


10.1.1 Log in procedures
10.1.2 GUI interface
10.1.3 CLI interface
10.1.4 The Linux shells
10.1.5 vi Editor

10.2 User Accounts and Group Accounts


10.2.1 User and group accounts in a Linux environment
10.2.2 Adding users
10.2.3 Managing user accounts
10.2.4 Creating groups and adding users to groups

10.3 Files System and Services Management


10.3.1 Creating/sharing directories
10.3.2 Passwords and permissions
10.3.3 Mounting and managing files systems
10.3.4 File system configuration files
10.3.5 Managing runlevels
10.3.6 Documenting a Linux system configuration

10.4 Daemons
10.4.1 Introduction to Linux daemons
10.4.2 Starting, stopping, and restarting daemons
10.4.3 HTTP
10.4.4 FTP
10.4.5 Telnet
10.4.6 Server Message Block (SMB) protocol
10.4.7 NFS
10.4.8 Mail client
10.4.9 Printing in a Linux environment
10.4.10 Scripts

Chapter 11: Network Security

11.1 Backups
11.1.1 Overview of backup methods
11.1.2 Installing backup software
11.1.3 Back hardware
11.1.4 Backup strategies
11.1.5 Automating backups

11.2 Drive Mapping


11.2.1 What is drive mapping?
11.2.2 Mapping drives in Windows networks
11.2.3 Mapping drives in Linux networks
11.2.4 Mapping drives in Novell networks

11.3 Partition and Processes Management


11.3.1 Using fdisk, mkfs, and fsck
11.3.2 Managing system processes with Cron jobs
11.3.3 Core dumps
11.3.4 Assigning permissions for processes

11.4 Monitoring Resources


11.4.1 Disk management
11.4.2 Memory usage
11.4.3 CPU usage
11.4.4 Reviewing daily logs
11.4.5 Checking resource usage on Windows 2000 and Windows XP
11.4.6 Checking resource usage on Linux

11.5 Analyzing and Optimizing Network Performance


11.5.1 Key concepts in analyzing and optimizing network performance
11.5.2 Bottleneck
11.5.3 Baselines
11.5.4 Determining Internet connection speed
11.5.5 Network monitoring software
11.5.6 Network management software
11.5.7 Management software for small and medium-sized networks
11.5.8 Management Service Provider (MSP)
11.5.9 SNMP concepts and components
11.5.10 SNMP structure and functions

Chapter 12: Installing and Maintaining Hardware in Linux

12.1 Hardware Terms, Concepts, and Components


12.1.1 Overview of hardware components
12.1.2 Central Processing Unit (CPU)
12.1.3 Video hardware
12.1.4 Miscellaneous hardware and components
12.1.5 Hardware monitoring devices

12.2 Hardware Installation, Configuration, and Maintenance


12.2.1 Locating hardware drivers for Linux
12.2.2 Configuring hardware in a Linux system
12.2.3 Linux kernel modules

12.3 Checking and Confirming Hardware Configuration


12.3.1 Power cables
12.3.2 IRQ, DMA, and I/O settings
12.3.3 EIDE devices
12.3.4 SCSI devices
12.3.5 BIOS settings
12.3.6 Diagnosing and troubleshooting devices
12.3.7 SCSI devices
12.3.8 Peripheral devices
12.3.9 Core system hardware

12.4 Laptop and Mobile Devices


12.4.1 Power management
12.4.2 PC card devices

Chapter 13: Troubleshooting the Operating System

13.1 Identifying and Locating Symptoms and Problems


13.1.1 Hardware problems
13.1.2 Kernel problems
13.1.3 Application software
13.1.4 Configuration
13.1.5 User error
13.1.6 Using system utilities and system status tools
13.1.7 Unresponsive programs and processes
13.1.8 When to start, stop, or restart a process
13.1.9 Troubleshooting persistent problems

13.1.10 Examining log files


13.1.11 The dmesg command
13.1.12 Troubleshooting problems based on user feedback

13.2 LILO Boot Errors


13.2.1 Error codes
13.2.2 Booting a Linux system without LILO
13.2.3 Emergency boot system
13.2.4 Using an emergency boot disk in Linux

13.3 Recognizing Common Errors


13.3.1 Various reasons for package dependency problems
13.3.2 Solutions to package dependency problems
13.3.3 Backup and restore errors
13.3.4 Application failure on Linux servers

13.4 Troubleshooting Network Problems


13.4.1 Loss of connectivity
13.4.2 Operator error
13.4.3 Using TCP/IP utilities
13.4.4 Problem-solving guidelines
13.4.5 Windows 2000 diagnostic tools
13.4.6 Wake-on-LAN

13.5 Disaster Recovery


13.5.1 Risk analysis
13.5.2 Understanding redundancy, clustering, scalability, and high availability
13.5.3 Clustering
13.5.4 Scalability
13.5.5 High availability
13.5.6 Hot swapping, warm swapping, and hot spares
13.5.7 Creating a disaster recovery plan based on fault tolerance/recovery
13.5.8 Testing the plan
13.5.9 Hot and cold sites

Chapter 14: Network Security

14.1 Developing a Network Security Policy


14.1.1 Accessing security needs
14.1.2 Acceptable use policy
14.1.3 Username and password standards
14.1.4 Rules for network access
14.1.5 Policy for disposal of materials
14.1.6 Virus protection standards
14.1.7 Online security resources
14.1.8 Server room security
14.1.9 Anti-theft devices for server hardware
14.1.10 Securing removable media
14.2 Threats to Network Security
14.2.1 Overview: Internal/external security
14.2.2 Outside threats
14.2.3 Denial of Service (DoS)
14.2.4 Distributed Denial of Service (DDoS)
14.2.5 Well known exploits
14.2.6 Inside threats

14.3 Implementing Security Measures


14.3.1 File encryption
14.3.2 IP security
14.3.3 Secure Sockets Layer (SSL)
14.3.4 E-mail security
14.3.5 Public/private key encryption

14.4 Applying Patches and Upgrades


14.4.1 Finding patches and upgrades
14.4.2 Selecting patches and upgrades
14.4.3 Applying patches and upgrades
14.5 Firewalls
14.5.1 Introduction to firewalls and proxies
14.5.2 Packet filtering
14.5.3 Firewall placement
14.5.4 Common firewall solutions
14.5.5 Using an NOS as a firewall

You might also like