This section introduces you to networking protocols and standards and gives you practice connecting to a secure wireless network. After finishing this section, you should be able to:
Describe basic Internet protocols.
Compare and contrast wireless network standards.
Describe how networking devices transmit data to the right location on a network.
Physical Address The unique, burned-into read-only memory address of a network interface. This is also called the media access control address, or MAC address. MAC addresses are burned into the read-only memory of every single network interface, such as wireless network adapters and network interface cards. This makes it virtually impossible to change the device’s MAC address.
Logical Address An address assigned by software and, as such, can be changed. It includes two parts, the network address and the host address. The most common types of logical addresses are those assigned by the IP protocol and are called IP addresses.
Default Address Class A class designation (A through E) that specifies a default subnet mask value which defines the default network address portion of the IP address.
Internet Protocol (IP) The principal communications protocol in the internet protocol suite that is used to route information over the Internet.
Transmission Control Protocol (TCP) An important protocol in the internet protocol suite that enables two hosts to establish a connection and exchange data.
User Datagram Protocol (UDP) An important protocol in the internet protocol suite that is generally used when speed in transmission is more important than accuracy since the sending computer doesn’t verify that the packets were correctly received.
Domain Name System (DNS) A protocol that helps internet users and network devices discover other devices using a human-readable hostname instead of numeric IP addresses.
Hypertext Transfer Protocol (HTTP) A protocol that governs the transfer of web content between computers.
Hypertext Transfer Protocol Secure (HTTPS) A protocol that combines HTTP with the Secure Sockets Layer (SSL) protocol to securely transfer web content between computers.
Simple Mail Transfer Protocol (SMTP) A protocol used to send email.
Post Office Protocol 3 (POP3) A protocol used to receive email. With POP3, email is deleted from a server after it is downloaded to a client.
Internet Message Access Protocol (IMAP) A protocol used to receive email. With IMAP, email is saved on a server even after it is downloaded to a client.
IEEE 802 Standards A family of standards that deal mostly with how data is transferred between hosts in a local area network (LAN).
IEEE 802.11 Standards A family of standards under the 802 standards that deal with how data is transferred between hosts in a wireless network. Popular 802.11 standards are 802.11a, 802.11b, 802.11g, 802.11n, and 802.11ac.
IEEE 802.11 Encryption Protocols Security protocols that govern how data in a wireless network is secured by encryption. Examples of these protocols are Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), and WPA2.
Frequency A characteristic of a radio signal that carries digital information in a wireless network. 802.11 standards specify two frequencies, 2.4 GHz and 5 GHz.
Attenuation A feature of radio waves where the signal becomes weaker as the wave travels further from its point of origin. 802.11 standards require that signals are strong enough to cover a specific distance.
Speed A characteristic of 802.11 protocols that require protocols to transfer data at a specific number of bits per second.
Network Architect A person that develops and implements an organization’s communication network, including the hardware and software components needed for both physical and wireless connections.
Network Administrator A person that maintains and expands a company’s network. They install and configure network media, create and manage user accounts, implement firewalls and other network security, manage an organization’s mail system, configure network printers, and maintain Internet connectivity.
Network Technician A person that works closely with network administrators to ensure uninterrupted access to the company network. They troubleshoot problems reported to a company’s IT help desk and assist users in resolving network connection problems, such as replacing defective network cables and modifying Wi-Fi settings.
Topics Discussed:
Why
is it important that computers on a network use the same protocols?
How
do computer networks locate specific devices on the network?
What
career opportunities are available in computer networking?
Assignment:
Access the TestOut Courseware through the provided link.
Study Section 2.4: Networking Basics, and achieve a score of 80% or higher on the 15 question Exam to complete the Section.
Assigned: November 4th, 2019 Teacher Pacing Due Date: November 6th, 2019
This week, we will be working on our Ethernet Cabling exercise, where we will assemble an Ethernet Cat5e cable to the EIA/TIA 568A and 568B standards.
Visit the web links provided above for instructions on how to build a Cat5e cable to the EIA/TIA 568A or 568B spec. Read through the instructions completely before proceeding. Pay particular notice to the difference between a “passthrough” cable and a “crossover” cable.
Visit the rolling cart to pick up your tools and materials. You will need a arm’s length of Cat5e cable, two RJ-45 cable ends (with load bars), and a crimper tool.
Follow the instructions to build your passthrough patch cable.
Once you have your passthrough cable built, test it using the provided cable tester. If your cable test is successful, you may proceed to build a “crossover” cable for extra credit.
Use clear tape and a marker to label your cables with your name and what type of cable it is (passthrough or crossover), and place it in the wire basket on the front table in the room.
Once they are graded, you are free to take your Cat5e cable home for your own use. Cables left behind will be deployed within the department.
Assigned: October 31st, 2019 Due Date: November 1st, 2019
This section introduces you to computer networking and gives you practice setting up wired network connections. After finishing this section, you should be able to:
Use a web browser to access the World Wide Web.
Define some advantages of computer networking.
Describe the relationship between ISPs and the Internet.
Explain the role of clients and servers on a network.
Compare and contrast different Internet Service options.
Use a cable modem to connect a small home office network to the Internet.
Use an Ethernet cable to connect a workstation to a local area network.
Network Interface A computer component that provides a port (usually RJ-45) where a network cable can be connected.
Network Cable A cable that provides connectivity between network devices. A common network cable connects a computers network interface with a wall jack.
Wall Jack A device, usually located on a building wall, that provides a port (usually RJ-45) where a network cable can be connected. On the hidden side of a wall jack is wiring to a patch panel or to a network device.
Local Area Network (LAN) A group of networked computers that are physically close together, usually in the same building.
Wide Area Network (WAN) A network of interconnected LANs across a large geographical location.
Client-Server Model A computing model where computer servers supply network and computational services (such as email, file sharing, online gaming, and VoIP) that are consumed by client computers.
File Server A computer that provide network access to shared disk storage.
Mail Server A computer that provides email services to a network.
Web Server A computer that stores web pages and hypertext documents and transmits them to devices requesting these pages.
Database Server A computer that stores databases, which are huge repositories of organized data.
Gaming Server A computer that provides a gaming environment that tracks events in multiplayer video games.
Modem Short for modulator/demodulator, a network device that converts digital signals used by modern networks to analog signals that are typically carried by telephone or cable tv lines.
Router A network device that moves traffic between two different IP networks.
Switch A network device that moves traffic within an IP network.
Access Point A network device that connects wireless devices to a wired network.
Firewall A network security device that protects a network by examining the traffic before transferring it to the network.
Home Router A small network device with modem, firewall, routing, and switching features that is used in homes and small businesses.
Registered Jack 11 (RJ-11) Interface A network interface or connection with four pins and a clip to hold the plug into a wall socket. RJ-11 is used to connect to a plain old telephone line. In a DSL network, this interface connects the modem to the wall jack.
Registered Jack 45 (RJ-45) Interface A network interface or connection with eight pins, that is similar, but wider than RJ-11 connectors. RJ-45 is used to create a wired connection between a computer and a network.
Bluetooth A technology used to create wireless connections between computers and devices.
Near Field Communications (NFC) A technology that uses specially encoded tags that respond in a specific way when scanned by a radio frequency reader. NFC is often used by placing a smartphone near a scanner to pay for an item in a store.
Dial-Up A technology used in the early days of the internet where a computer would make a phone call to the ISP to establish internet connectivity.
Digital Subscriber Line (DSL) A technology that uses phone lines to establish high-speed connectivity to the internet through an ISP.
Cable A technology that uses cable tv lines to establish high-speed connectivity to the internet through an ISP.
Fiber Optic A technology that used fiber optic cables that carry light signals to establish high-speed connectivity to the internet through an ISP.
Satellite A technology that sends signals to and from a satellite to establish connectivity to the internet through an ISP.
Cellular A technology that uses cellular radio signals to establish connectivity to the internet through an ISP.
Wi-Fi A technology that uses radio signals to connect a device to an access point.
Topics Discussed:
What hardware components are needed for a wired network? A wireless network?
What roles do servers play on a network?
What is the difference between a LAN and a WAN?
Assignment:
Access the TestOut Courseware through the provided link.
Study Section 2.3: Networking Basics, and achieve a score of 80% or higher on the 15 question Exam to complete the Section.
Assigned: October 28th, 2019 Teacher Pacing Due Date: October 30th, 2019
This week we will be working in the classroom with a specialized Operating System installation. We will be using a Virtual Machine software called VirtualBox to installing a specialized OS (Kali Linux) in a virtual environment that we will use in the second half of our course.
I will distribute the required files in class today. If you did not receive the files or if you were not in attendance today, you will need to see me and I will show you where to download the files directly.
In your Downloads folder, you should have a subfolder called “VirtualBox 6.0”. Inside this folder, you should have four files: a VirtualBox .dmg file, a Kali Linux 2019 .ova file, an Oracle_VM .vbox-extpack file, and a UserManual.pdf file. If you are missing any of these files, please see me immediately to get them.
I will instruct you in-class on Thursday how to install VirtualBox VM in OSX, and how to load the VirtualBox extension pack and the preconfigured Kali Linux package.
We will walk through the configuration and testing of Kali on Friday, and I will explain some of the unique and powerful features of this specialized flavor of the Linux operating system.
Kali Linux will be required for the second half of the class, and you must complete your VirtualBox VM Kali Linux installation in class by Friday, October 25th to receive credit for this Lab Activity.
Assigned: October 23rd, 2019 Due Date: October 25th, 2019
This section introduces you to Web browsers and gives you practice using search engines, navigating web pages, and configuring basic browser settings. After finishing this section, you should be able to:
Use a web browser to access the World Wide Web.
Use browser features such as private browsing, bookmarks, and downloading files.
Use a search engine to find and evaluate web content.
Identify reliable academic sources online.
Distinguish between primary, secondary, and tertiary sources.
Describe key browser and website features, including plug-ins, client-side scripting, certificates, caching, and proxy settings.
Configure browser privacy and security features such as pop-up blockers, location tracking, and cookies.
Web Browser An application for accessing information on the World Wide Web.
Web Search A search of the World Wide Web using a web browser, often done by visiting a web search engine site such as Google, Bing, or Yahoo.
Academic Source Books or articles written by experts who have credentials in a particular field of study.
Consumer-level Source Resources such as personal websites, online forums, news websites, and online magazines whose audience is consumers of information — people looking for practical information to solve a problem, make a purchasing decision, or just become better informed on current events and issues.
Primary Source Resources such as original speeches, letters, poems, laws, scientific fieldwork, and artwork.
Secondary Source Resources such as articles or books that review, analyze, or describe primary sources.
Tertiary Source Resources that compile or summarize material from other sources including bibliographies, abstracts, and online article indexes and databases.
Citation Style The format used for citing academic sources, including author, date of publication, and journal title.
Cookie A small piece of data sent from a website and stored on a user’s computer by the web browser while the user is browsing. Cookies are designed to help websites remember information such as items in an online shopping cart and entries in a web form so that the website can customize a web page for the user.
Browser Extension Software that adds functionality to a web browser.
Client-Side Scripting The process of transferring source code from a web server to a web browser and running that code directly in the browser.
Certificate A digital document that contains encryption keys and is used for encryption and identification.
Caching The storing of images, sounds, web pages, and other information associated with particular websites that allows a browser to redisplay data without having to reload it from the website.
Proxy Server A device that stands as an intermediary between an application such as a web browser and the Internet. A proxy server intercepts all requests and can use filter rules to allow or deny internet traffic.
Pop-up Blocker A feature of most web browsers that prevents pop-up windows such as advertisements from being displayed.
Topics Discussed:
What web browser settings are most important for online safety and security?
How can you evaluate online information and determine if it’s reliable?
What can you do to troubleshoot common web browser problems?
Assignment:
Access the TestOut Courseware through the provided link.
Study Section 2.2: Web Browsers, and achieve a score of 80% or higher on the 14 question Exam to complete the Section.
Assigned: October 21st, 2019 Teacher Pacing Due Date: October 22nd, 2019
This section introduces you to basic concepts associated with the Internet and the World Wide Web. After finishing this section, you should be able to:
Define the Internet and the World Wide Web.
Describe the essential components of the Web, including websites, URLs, hyperlinks, web browsers, and search engines.
Identify technologies that use the Internet, including the Web, email, instant messaging, VoIP, and the Internet of Things.
Identify common web applications, including Webmail, Google Docs, Facebook, and YouTube.
Define and describe the uses of cloud computing.
Define social media and describe its uses.
Recognize the risks and responsibilities of using social media.
Describe the differences between downloading, live streaming, and on-demand streaming.
Copy files from the local Windows file system to OneDrive.
Internet An internetwork, or a connection between networks.
The Web Short for World Wide Web, the digital content that is delivered over the Internet, usually through a web browser.
The Internet Often used synonymously with the Web, the vast collection of networking hardware and physical computing devices that make up the Internet.
Internet Service Providers (ISP) A company that provides individuals and businesses access to the internet and other related services.
IP Address A numerical label that is assigned to devices so they can connect and communicate on a network.
Hypertext Transfer Protocol (HTTP) A set of rules that govern the transfer of web content between computers.
File Transfer Protocol (FTP) A set of rules that govern the transfer of files between computers.
Universal Resource Locator (URL) The reference or address to a resource on the Internet. Example: https://www.testout.com/home/about/privacy
Domain Name System (DNS) A system and set of rules that associates domain names (such as web servers) with unique IP addresses so that users can find and use network resources by an easily readable name instead of by IP address.
Transmission Control Protocol/Internet Protocol (TCP-IP) A set of rules that facilitates internet communication.
Hypertext Markup Language (HTML) A programming language that web pages use to display content through web browsers.
Intranet A private network, usually hidden from the internet and protected by a security device, that uses the same technologies that are used on the internet and may or may not be connected to the internet.
Voice over IP (VoIP) A technology that sends voice phone calls using the TCP/IP protocol over digital data lines.
Wi-Fi A technology that allows computers, smartphones, and other devices to communicate on a wireless network.
Internet of Things (IoT) A computing concept that describes the network of physical devices and everyday devices (including refrigerators, thermostats, streetlights, and environmental tracking systems) that communicate with the internet.
Social Media Platform A web-based technology to distribute information and encourage people to connect with others who share a common interest. Examples of social media platforms are Facebook, Twitter, LinkedIn, and Instagram.
Cloud Computing The use of remote services hosted on the internet to store, manage, and process data.
Cloud Storage A cloud computing service that remotely maintains, manages, and backs up data and makes that data available to users over a network.
Streaming A method of transmitting and receiving data (especially video and audio information) over a network as a steady, continuous flow, allowing playback while the data is being transferred.
Live Streaming A streaming method that transmits data in real time as it is created.
On-Demand Streaming A streaming method that allows users to select and watch or listen to video or audio when they choose, rather than at a scheduled broadcast time.
Buffering The pre-loading of data from a stream into memory to help avoid interruptions while waiting for data that is received in bursts.
Topics Discussed:
What
is the relationship between the Internet, the World Wide Web, and web browsers?
What
are some benefits of using social media? What are some drawbacks?
What
are the most common uses of cloud computing?
Assignment:
Access the TestOut Courseware through the provided link.
Study Section 2.1: The Internet, and achieve a score of 80% or higher on the 15 question Exam to complete the Section.
Remember that Wednesday, October 16th is a District Late Start, and that Thursday, October 17th is Pre-ACT Testing with 20 minute classes starting at 12:40pm for everyone but sophomores. Please plan your week accordingly.
Assigned: October 14th, 2019 Teacher Pacing Due Date: October 16th, 2019
This section introduces you to various categories of application software and gives you practice managing Windows applications. After finishing this section, you should be able to:
Identify application software that increases personal productivity.
Identify application software that facilitates collaboration.
Identify some common business application software.
Run Windows applications.
Pin applications to the Start Menu and the taskbar.
Unpin applications from the Start Menu and the taskbar.
Create application shortcuts on the Windows desktop.
Productivity Software Software that is used to perform common tasks in a business or home office such as word processing, spreadsheets, presentations, web browsing, and visual diagramming.
Collaboration Software Software that facilitates the sharing, processing, and management of files, documents and other data between members of a team. This software includes message boards, screen sharing, conferencing software, email, calendaring, instant messaging, text messaging, and online workspace and document sharing.
Business Software Software designed for advanced or specialized business functions such as database management, project management, customer relationship management, accounting, desktop publishing, graphic design, and computer aided design.
Netiquette The rules of etiquette that should be observed while using computer networks, such as the Internet.
Windows Application A traditional desktop application or program.
Windows 10 App A Windows program that is installed and maintained through the Windows Store and uses the type of interface you would typically see on a touchscreen device.
Shared Printer A printer that is attached to one computer but allows printing access to multiple computers and devices connected to the same network.
Print Job A file or set of files that have been submitted to a printer.
Print Queue A container that holds print jobs that are waiting to be sent to a printer that may be too busy to accept the print job.
Print Server A device or computer that connects client computers to printers. Client computers send print jobs to a print server that may hold them in a print queue before forwarding them to a printer.
Topics Discussed:
How can software applications increase your productivity at home or at the office?
What software applications can assist you in collaborating with other people?
What components are required to send a document to a printer?
Assignment:
Access the TestOut Courseware through the provided link.
Study Section 1.7: Application Software, and achieve a score of 80% or higher on the 14 question Exam to complete the Section.
Remember that Friday, October 4th is the end of the term. All past due work must be turned in by Thursday, October 3rd to receive credit. Please plan accordingly.
Assigned: October 1st, 2019 Teacher Pacing Due Date: October 3rd, 2019
This section introduces you to computer file system features and gives you practice managing files and folders on Windows. After finishing this section, you should be able to:
Describe common file system features, including compression, encryption, permissions, journaling, and file naming rules.
Compare and contrast common file systems, such as NTFS, FAT32, HFS, and Ext4.
Create folders in the Windows file system.
Copy, rename, and delete files in Windows.
Share a Windows folder with other users and grant them specific access to files within the folder.
File The smallest container within a computer’s storage system that is used to store information such as data, settings, and commands used in a computer program. A file is the smallest container that can be copied, deleted, or moved within a file system.
File Format The way in which a file is organized. Often, a file type is indicated by the file extension such as .jpg, .gif, .png., .mp3, .wav, .wma, .mp4, .avi, and .wmv.
File System The methods and structures that an operating system uses to organize files on a storage device like a hard drive. File systems often use directory structures to keep track of files.
Compression The process of making data consume less storage space.
Encryption The process of converting information so that it cannot be understood without decrypting it using a key, especially to prevent unauthorized access.
File Permissions The use of user and file attributes that control which users can read, write, move, or delete each file.
Journaling The process of tracking changes to a file so that a file can be repaired or restored in case of file corruption or data loss.
Topics Discussed:
How do operating systems keep track of documents and other files?
What are the most common file system features?
What is the main purpose of Windows file extensions?
Assignment:
Access the TestOut Courseware through the provided link.
Study Section 1.6: File Management, and achieve a score of 80% or higher on the 8 question Exam to complete the Section.
Assigned: September 23rd, 2019 Teacher Pacing Due Date: September 25th, 2019
Students will be able to demonstrate their understanding of basic operating system installation by installing and configuring a common desktop operating system so that they can prepare common desktop PCs for deployment.
This week we will be working in the lab with Operating Systems installation. We will be wiping and repartitioning the hard drives of our lab PCs, performing a basic operating system installation (Windows 10), and installing a specialized OS (Kali Linux) that we will use in the second half of our course.
Collect your PC from the storage shelf and assemble it on the tables in Lab 212. Connect all peripherals and test it to ensure that it still boots to the desktop login window. You do not need to log in.
Windows 10 installation media will be distributed. Boot from the Windows installation USB to begin the installation process.
You will be directed in class how to partition and format your hard drive. Once the hard drive is formatted to a single active partition, you may proceed with the installation process.
Follow the installation process, paying close attention to all instructions and prompts.
The required Account Name, Password and Machine Name naming convention will be written on the whiteboard in front of the room. Please make sure you type the Account Name and Password correctly, using capitals where indicated. Also, please take care to follow the correct Machine Name convention. DO NOT MAKE UP YOUR OWN INFORMATION FOR THESE STEPS.
Your Windows 10 installation is nearly complete when your machine boots to the desktop, and you have successfully logged into the Admin account. You should then browse to the Dell Support page, where you will download and install all required support updates for your PC. Use the Dell support tag located on the top of the machine to determine your required updates on the Dell Support site. See me if your Dell support tag is missing.
Once all device drivers and support software installations are complete, use the Control Panel to access the Windows Update settings. Click the Check for Updates button to search for updates and service packs. Install all service packs and updates that are available.
Your Windows 10 installation is complete when all required device drivers, service packs and system updates are complete. Next week, we will install a specialized OS called Kali Linux, that is specifically designed for offensive security and penetration testing
Assigned: September 18th, 2019 Due Date: September 24th, 2019
This
section introduces you to operating systems and gives you practice using the
Windows user interface. After finishing this section, you should be able to:
Identify
and describe different types of system software.
Identify
common operating systems.
Identify
and describe components of the Windows 10 operating system.
Change
display settings in Windows.
Use
the Settings app to view system information.
Configure
a screen saver through the Settings app.
Recognize
and use utility software.
Use
Windows Device Manager to update drivers.
Use
Windows Task Manager to prevent applications from running at system startup.
Operating System A computer program that makes it so people, hardware, and software can interface with each other in a meaningful way.
Graphical User Interface An operating system interface that allows a user to interact with the computer by displaying pictures, icons, and other images on a screen to represent files, folders, and system controls and by accepting input from a mouse or a touch screen.
Command Line Interface An operating system interface that allows a user to interact with the computer by displaying text on a screen and accepting input from the keyboard. The input is entered as commands. The command line is used primarily by IT and other tech professionals.
Disk Management A role of the operating system that helps keep storage devices well organized and maintained.
Application Management A role of the operating system that manages applications or programs that are installed on a system. Applications are run, configured, and deleted through application management.
Service Management A role of the operating system that runs processes or programs automatically in the background. These programs are services that perform functions like indexing files for better searches, verifying that software is up to date, and backing up files.
Device Management A role of the operating system that determines the hardware that is connected to the system, interprets instructions from the hardware, and sends instructions to it. Device management includes managing device drivers.
Access Control/Protection A role of the operating system that requires users to log in with their credentials before accessing sensitive information on the computer. It also manages antivirus and antimalware software to prevent malicious files from accessing the computer.
Utility Software Software that analyzes, configures, and optimizes the computer including backup software, compression software, disk cleaners, and antivirus software.
DeviceDrivers Software that allows an operating system to communicate with hardware devices, such as printers, video cards, scanners, and cameras.
Firmware Preinstalled, read-only software on a device that tells it how to work.
WindowsSettings App In Windows 10, an application that organizes the settings and customizes how the computer looks and functions.
Topics Discussed:
What
is the difference between hardware, system software, and application software?
What
is the purpose of an operating system?
How
can the Windows operating system be configured through the Settings app?
Assignment:
Access the TestOut Courseware through the provided link.
Study Section 1.5: Software, and achieve a score of 80% or higher on the 12 question Exam to complete the Section.
Assigned: September 16th, 2019 Teacher Pacing Due Date: September 17th, 2019