Difference between revisions of "IT Technology/Network II"
From Teknologisk videncenter
m (→Skills achieved) |
m |
||
(One intermediate revision by the same user not shown) | |||
Line 27: | Line 27: | ||
--> | --> | ||
= Content = | = Content = | ||
− | *[[IT Technology/Network II | + | *[[IT Technology/Network II/Router| Routing Technologies]] |
*[[IT Technology/Network II - Switch| Switching Technologies]] | *[[IT Technology/Network II - Switch| Switching Technologies]] | ||
*[[IT Technology/Network II - Design| Network Design]] | *[[IT Technology/Network II - Design| Network Design]] | ||
Line 44: | Line 44: | ||
*The student can account for different forms of attack against Switched and Routed networks and suggest tools to monitor and secure the network. | *The student can account for different forms of attack against Switched and Routed networks and suggest tools to monitor and secure the network. | ||
=End Project= | =End Project= | ||
− | *[[IT Technology/Network II/Maikaa | + | *[[IT Technology/Network II/Maikaa| Maikaa]] |
[[Category:IT technology education]] | [[Category:IT technology education]] |
Latest revision as of 17:21, 30 November 2010
Description
This course is held after Network I course and will give the student advanced knowledge of Network technologies.
Content
- Routing Technologies
- Switching Technologies
- Network Design
- Tools for network design
- Network Management
Skills achieved
- The student can account for advanced IP-routing for example OSPF and BGP
- The student can plan and design Routed networks with two or more routing protocols. For example OSPF and BGP
- The student can plan and design Routed network using advanced Routing techniques for example Route Summarization/Aggregation, Policy Based Routing and advanced BGP features
- The student is aware of different IP-services and performances
- The student is capable of network Troubleshooting techniques.
- The student is capable of analyzing protocols with a Protocol Analyzer for example Wireshark
- The student can plan and design Switched network using VLANs, Trunks and STP (Spanning Tree Protocol)
- The student can plan and design network with High Availability and/or Load Balancing using for example HSRP, VRRP and GLBP
- The student can account for different forms of attack against Switched and Routed networks and suggest tools to monitor and secure the network.