Course Details For IT Essentials II
Chapter 1: Operating System Fundamentals
1.1 Operating System Basics
1.1.1 Overview of PC Operating Systems
1.1.2 PCs and computer networks
1.1.3 The kernel
1.1.4 The user interface
1.1.5 The file system
1.1.6 Common desktop operating systems
1.2 Microsoft Windows
1.2.1 MS-DOS
1.2.2 Microsoft Windows 3.1
1.2.3 Windows 9x
1.2.4 Windows NT and Windows 2000
1.2.5 Windows XP
1.2.6 Windows GUI
1.2.7 Windows CLI
1.2.8 Windows Control Panel
1.3 UNIX and Linux on the Desktop
1.3.1 Origins of UNIX
1.3.2 Origins of Linux
1.3.3 Linux/UNIX GUI
1.3.4 Linux/UNIX CLI
1.3.5 Linux and UNIX system configuration tools
1.4 Network Operating Systems Overview
1.4.1 Common network operating systems
1.4.2 The client-server model
1.4.3 Evaluating customer resources and requirements
Chapter 2: Introduction to Networking
2.1 Benefits of Networking
2.1.1 File, print, and application services
2.1.2 Mail services
2.1.3 Directory and name services
2.1.4 The Internet
2.1.5 Network administration
2.2 Types of Networks
2.2.1 Overview
2.2.2 Local-Area Networks (LANs)
2.2.3 Wide-Area Networks (WANs)
2.2.4 Peer-to-peer networks
2.2.5 Client/server networks
2.3 Networking Standards
2.3.1 Proprietary versus open standards
2.3.2 The OSI reference model
2.3.3 The DoD model
2.3.4 The IEEE
2.3.5 The ITU
2.3.6 Other standards
2.4 Networking Protocols
2.4.1 Protocol suite
2.4.2 TCP/IP
2.4.3 IPX/SPX
2.4.4 AppleTalk
2.5 LAN Architectures
2.5.1 Ethernet
2.5.2 Token Ring
2.5.3 Fiber Distributed Data Interface (FDDI)
Chapter 3: Physical Components of a Network
3.1 Configuring a Network Interface Card
3.1.1 What is a NIC?
3.1.2 Setting the IP address
3.1.3 DHCP servers
3.1.4 Domain Name System
3.1.5 Default gateway
3.2 Topologies
3.2.1 The network topology
3.2.2 Physical versus logical topology
3.2.3 Bus topology
3.2.4 Star topology
3.2.5 Ring topology
3.2.6 Mesh topology
3.2.7 Hybrid topology
3.3 Media Types
3.3.1 Networking media
3.3.2 Coaxial cable
3.3.3 Twisted-pair cable
3.3.4 Fiber-optic cable
3.3.5 Wireless
3.4 Devices
3.4.1 Hubs and repeaters
3.4.2 Bridges and switches
3.4.3 Routers
3.5 Connecting to the Internet (WANs)
3.5.1 Synchronous and asynchronous serial lines
3.5.2 Modems
3.5.3 Dialup networking, modem standards, AT commands
3.5.4 ISPs and Internet backbone providers
3.5.5 DSL
3.5.6 Cable modems
3.5.7 Cable modem versus DSL Internet technologies
Chapter 4: TCP/IP Networking
4.1 History of TCP/IP
4.1.1 Origins and growth of TCP/IP
4.1.2 The TCP/IP network model
4.1.3 TCP/IP and network operating systems
4.2 IP Addressing
4.2.1 IPv4 addressing
4.2.2 IPv4 addressing overview
4.2.3 Class A addresses
4.2.4 Class B addresses
4.2.5 Class C addresses
4.2.6 Class D and E addresses
4.2.7 The IPv4 address crisis
4.2.8 Subnetting
4.3 Name Resolution
4.3.1 Overview of name resolution
4.3.2 Hostnames and host tables
4.3.3 The domain name system
4.3.4 Name services and the NOS
4.3.5 WINS
4.4 TCP/IP Protocols
4.4.1 Overview of TCP/IP protocols
4.4.2 Address Resolution Protocol (ARP)
4.4.3 Internet Control Message Protocol (ICMP)
4.4.4 Transmission Control Protocol (TCP)
4.4.5 User Datagram Protocol (UDP)
4.4.6 DHCP services
4.4.7 Hypertext Transport Protocol (HTTP)
4.4.8 File Transfer Protocol (FTP)
4.4.9 Telnet
4.4.10 SMTP
4.4.11 POP3
4.4.12 IMAP
Chapter 5: Overview of Network Services
5.1 Network Services
5.1.1 An introduction to network/NOS services
5.2 Remote Administration and Access Services
5.2.1 What is remote access?
5.2.2 Telecommuting
5.2.3 Mobile users
5.2.4 Terminal emulation services
5.2.5 Telnet services
5.2.6 Configuring remote access for a client
5.2.7 Controlling remote access rights
5.2.8 Remote administration to Linux system
5.3 Directory Services
5.3.1 What is a directory service?
5.3.2 Directory service standards
5.3.3 Windows 2000 Active Directory
5.3.4 The Novell Network Directory Service (NDS)
5.3.5 Network Information Service (NIS)
5.4 Other NOS Services
5.4.1 Mail
5.4.2 Printing
5.4.3 File sharing
5.4.4 FTP (File Transfer) web services
5.4.5 Web services
5.4.6 Intranets
5.4.7 Extranet
5.4.8 Automating tasks with scripts services
5.4.9 Domain Name Service (DNS)
5.4.10 DHCP
5.4.11 Domains
Chapter 6: Introduction to Network Operating Systems
6.1 Characteristics of a Network Operating System
6.1.1 Overview of NOS characteristics
6.1.2 Differences between PCs and a NOS
6.1.3 Multiuser, multitasking, and multiprocessor systems
6.1.4 NOS server hardware
6.1.5 Choosing a NOS
6.1.6 Types of NOSs
6.2 Windows NT and Windows 2000
6.2.1 Windows terminology
6.2.2 Windows NT 4.0
6.2.3 Windows 2000 Operating Systems
6.2.4 Windows 2000's family of Operating Systems
6.3 Linux
6.3.1 History of Linux
6.3.2 What is UNIX?
6.3.3 Linux Operating Systems
6.3.4 Linux clients
6.4 Determining Software Requirements for a Linux NOS
6.4.1 Workstation software and programs
6.4.2 Server software and programs
6.4.3 Additional software and programs
6.4.4 Verifying software compatibility
Chapter 7: Installation and Boot Process Overview
7.1 Preparing for the Installation
7.1.1 Installing NOS
7.1.2 Planning the system
7.1.3 Planning hardware installation
7.1.4 Server hardware components
7.1.5 Hardware requirements
7.1.6 Creating a hardware inventory
7.1.7 Identifying hardware using Device Manager
7.1.8 Checking hardware compatibility lists
7.1.9 Verifying the network
7.2 The Installation Process
7.2.1 Installation media
7.2.2 BIOS settings
7.2.3 The installation program
7.2.4 Disk partitions
7.2.5 Partitioning a disk
7.2.6 Swap files
7.2.7 Formatting the disk
7.2.8 Creating initial administrative accounts
7.2.9 Completing the installation
7.3 The Boot Process
7.3.1 The steps of the boot process
7.3.2 Basic files required
7.3.3 BIOS interaction
7.3.4 Detailed steps of the boot process
7.3.5 Linux boot process
7.4 Troubleshooting NOS Installation
7.4.1 Unable to boot from installation media
7.4.2 Problems during the installation process
7.4.3 Post-installation problems
Chapter 8: Windows 2000 Professional
8.1 Installation
8.1.1 Installing the OS
8.1.2 Installation of OS add-on options
8.2 Administrator/User Interface
8.2.1 Log in procedures
8.2.2 Graphical user interface (GUI)
8.2.3 Command-line interface (CLI)
8.2.4 Windows Explorer navigation
8.3 User Accounts
8.3.1 Adding users
8.3.2 Managing user accounts
8.4 Managing the File System
8.4.1 Creating and sharing folders
8.4.2 Creating groups and adding users
8.4.3 Passwords and permissions
8.5 Services
8.5.1 Hypertext Transfer Protocol (HTTP)
8.5.2 File Transfer Protocol (FTP)
8.5.3 Telnet
8.5.4 E-mail server/client relationship
8.5.5 Printing in Windows 2000
8.5.6 Scripts
Chapter 9: Linux
9.1 Pre-Installation Tasks
9.1.1 The boot method
9.1.2 Installation media
9.1.3 Selecting the appropriate parameters for installation
9.1.4 Creating the Linux file system
9.1.5 Selecting packages to install
9.2 Installing and Configuring Linux
9.2.1 Linux hardware requirements
9.2.2 Starting the installation
9.2.3 Configuring appropriate security settings
9.2.4 Configuring network settings
9.2.5 Other configurations and settings
9.3 X Server
9.3.1 Video card chipset
9.3.2 X server options
9.3.3 Installing X server
9.3.4 Configuring X server
9.3.5 Hardware configurations
9.3.6 Window managers
9.3.7 Desktop environments
9.4 Post-Installation Configuration and Tasks
9.4.1 Post-installation of applications and programs
9.4.2 Installing and reconfiguring the boot loader
9.4.3 Kernel issues
9.4.4 Environment variables
9.4.5 Verifying proper application functioning and performance
Chapter 10: Advanced NOS Administration
10.1 User Interface Administration
10.1.1 Log in procedures
10.1.2 GUI interface
10.1.3 CLI interface
10.1.4 The Linux shells
10.1.5 vi Editor
10.2 User Accounts and Group Accounts
10.2.1 User and group accounts in a Linux environment
10.2.2 Adding users
10.2.3 Managing user accounts
10.2.4 Creating groups and adding users to groups
10.3 Files System and Services Management
10.3.1 Creating/sharing directories
10.3.2 Passwords and permissions
10.3.3 Mounting and managing files systems
10.3.4 File system configuration files
10.3.5 Managing runlevels
10.3.6 Documenting a Linux system configuration
10.4 Daemons
10.4.1 Introduction to Linux daemons
10.4.2 Starting, stopping, and restarting daemons
10.4.3 HTTP
10.4.4 FTP
10.4.5 Telnet
10.4.6 Server Message Block (SMB) protocol
10.4.7 NFS
10.4.8 Mail client
10.4.9 Printing in a Linux environment
10.4.10 Scripts
Chapter 11: Network Security
11.1 Backups
11.1.1 Overview of backup methods
11.1.2 Installing backup software
11.1.3 Back hardware
11.1.4 Backup strategies
11.1.5 Automating backups
11.2 Drive Mapping
11.2.1 What is drive mapping?
11.2.2 Mapping drives in Windows networks
11.2.3 Mapping drives in Linux networks
11.2.4 Mapping drives in Novell networks
11.3 Partition and Processes Management
11.3.1 Using fdisk, mkfs, and fsck
11.3.2 Managing system processes with Cron jobs
11.3.3 Core dumps
11.3.4 Assigning permissions for processes
11.4 Monitoring Resources
11.4.1 Disk management
11.4.2 Memory usage
11.4.3 CPU usage
11.4.4 Reviewing daily logs
11.4.5 Checking resource usage on Windows 2000 and Windows XP
11.4.6 Checking resource usage on Linux
11.5 Analyzing and Optimizing Network Performance
11.5.1 Key concepts in analyzing and optimizing network performance
11.5.2 Bottleneck
11.5.3 Baselines
11.5.4 Determining Internet connection speed
11.5.5 Network monitoring software
11.5.6 Network management software
11.5.7 Management software for small and medium-sized networks
11.5.8 Management Service Provider (MSP)
11.5.9 SNMP concepts and components
11.5.10 SNMP structure and functions
Chapter 12: Installing and Maintaining Hardware in Linux
12.1 Hardware Terms, Concepts, and Components
12.1.1 Overview of hardware components
12.1.2 Central Processing Unit (CPU)
12.1.3 Video hardware
12.1.4 Miscellaneous hardware and components
12.1.5 Hardware monitoring devices
12.2 Hardware Installation, Configuration, and Maintenance
12.2.1 Locating hardware drivers for Linux
12.2.2 Configuring hardware in a Linux system
12.2.3 Linux kernel modules
12.3 Checking and Confirming Hardware Configuration
12.3.1 Power cables
12.3.2 IRQ, DMA, and I/O settings
12.3.3 EIDE devices
12.3.4 SCSI devices
12.3.5 BIOS settings
12.3.6 Diagnosing and troubleshooting devices
12.3.7 SCSI devices
12.3.8 Peripheral devices
12.3.9 Core system hardware
12.4 Laptop and Mobile Devices
12.4.1 Power management
12.4.2 PC card devices
Chapter 13: Troubleshooting the Operating System
13.1 Identifying and Locating Symptoms and Problems
13.1.1 Hardware problems
13.1.2 Kernel problems
13.1.3 Application software
13.1.4 Configuration
13.1.5 User error
13.1.6 Using system utilities and system status tools
13.1.7 Unresponsive programs and processes
13.1.8 When to start, stop, or restart a process
13.1.9 Troubleshooting persistent problems
13.1.10 Examining log files
13.1.11 The dmesg command
13.1.12 Troubleshooting problems based on user feedback
13.2 LILO Boot Errors
13.2.1 Error codes
13.2.2 Booting a Linux system without LILO
13.2.3 Emergency boot system
13.2.4 Using an emergency boot disk in Linux
13.3 Recognizing Common Errors
13.3.1 Various reasons for package dependency problems
13.3.2 Solutions to package dependency problems
13.3.3 Backup and restore errors
13.3.4 Application failure on Linux servers
13.4 Troubleshooting Network Problems
13.4.1 Loss of connectivity
13.4.2 Operator error
13.4.3 Using TCP/IP utilities
13.4.4 Problem-solving guidelines
13.4.5 Windows 2000 diagnostic tools
13.4.6 Wake-on-LAN
13.5 Disaster Recovery
13.5.1 Risk analysis
13.5.2 Understanding redundancy, clustering, scalability, and high availability
13.5.3 Clustering
13.5.4 Scalability
13.5.5 High availability
13.5.6 Hot swapping, warm swapping, and hot spares
13.5.7 Creating a disaster recovery plan based on fault tolerance/recovery
13.5.8 Testing the plan
13.5.9 Hot and cold sites
Chapter 14: Network Security
14.1 Developing a Network Security Policy
14.1.1 Accessing security needs
14.1.2 Acceptable use policy
14.1.3 Username and password standards
14.1.4 Rules for network access
14.1.5 Policy for disposal of materials
14.1.6 Virus protection standards
14.1.7 Online security resources
14.1.8 Server room security
14.1.9 Anti-theft devices for server hardware
14.1.10 Securing removable media
14.2 Threats to Network Security
14.2.1 Overview: Internal/external security
14.2.2 Outside threats
14.2.3 Denial of Service (DoS)
14.2.4 Distributed Denial of Service (DDoS)
14.2.5 Well known exploits
14.2.6 Inside threats
14.3 Implementing Security Measures
14.3.1 File encryption
14.3.2 IP security
14.3.3 Secure Sockets Layer (SSL)
14.3.4 E-mail security
14.3.5 Public/private key encryption
14.4 Applying Patches and Upgrades
14.4.1 Finding patches and upgrades
14.4.2 Selecting patches and upgrades
14.4.3 Applying patches and upgrades
14.5 Firewalls
14.5.1 Introduction to firewalls and proxies
14.5.2 Packet filtering
14.5.3 Firewall placement
14.5.4 Common firewall solutions
14.5.5 Using an NOS as a firewall