REVISED CCNA COURSE CONTENTS

REVISED CCNA COURSE CONTENTS

February 03, 2011
                  
 INTERCONNECTING CISCO NETWORK DEVICES

INTRODUCTION


Course Acronym: ICND (640 – 801)                Course Duration: 40 Hours

Course Content:

·         Concepts and commands required to configure Cisco switches and multiprotocol internetworks.
·         Demonstrations, exercises, and laboratory projects to identify and recommend the best Cisco solutions.
·         Basic configuration procedures to build a multirouter, multigroup internetwork that uses LAN and WAN interfaces for the most commonly used routing and routed protocols.
·         Installation, configuration, and troubleshooting information that technical support people required to install and configure Cisco products.

Who Should Attend:              

·         Network Administrators responsible for implementing and managing small & medium business networks.
·         Customers or channel sellers new to Cisco products or to internetworking industry.
·         Network support staff who will act as network device installers & first-line support.
·         Network technicians new to Cisco products and services.
·         CCNA candidate
·         CCNP candidate

Content by Module:

·         Module 1: Getting Started with Cisco Networks
·         Chapter1: Course Introduction
·         Chapter 2: Selecting Cisco Network Devices
·         Chapter 3: Assembling and Cabling Cisco Network Devices
·         Chapter 4: Operating and Configuring a Cisco IOS Devices
·         Chapter5: Managing Your Network Environment
·         Module 2: Interconnecting Cisco Switches
·         Chapter 6: Catalyst Switch operations
·         Chapter 7: Extending Switch Functionality
·         Module 3: Interconnecting Cisco Routers
·         Chapter 8: Configuring IP Addressing
·         Chapter 9: Adding Basic IP Routing Protocols
·         Chapter 10: Basic IP Traffic Management with Access Lists
·         Chapter 11: Configuring Novell IPX
·         Module 4: Extending the Network to WAN
·         Chapter 12: Establishing Serial Point-to-Point Connections
·         Chapter 13: Completing an ISDN BRI Call
·         Chapter 14: Establishing a Frame Relay PVC Connection
·         Module 5: Solving Network Problems
·         Chapter 15: Solving basic Network Problems

REVISED CCNA COURSE CONTENTS

 

NAT     :     NETWORK ADDRESS TRANSLATION


PAT      :     PORT ADDRESS TRANSLATION

EIGRP:      EXTENDED INTERIOR GATEWAY ROUTING PROTOCOL

OSPF    :      OPEN SHORTEST PATH FIRST

VLSM:       VARIABLE LENGTH SUBNET MASKS
Functional Levels Server 2008

Functional Levels Server 2008

February 03, 2011

Functional Levels Server 2008

The features available in a Windows Server 2008 domain depend on the functional level. Therefore, you can add additional features to a domain by raising the functional level. Windows Server 2008 supports three different domain functional levels. The three domain functional levels are:

* Windows 2000
* Windows Server 2003
* Windows Server 2008

Windows 2000

When you configure a new Windows Server 2003 domain, the default domain functional level is Windows 2000. This functional level supports Windows 2000, 2003 and 2008 domain controllers. Other available features include universal groups, group nesting, group conversions and security identifier history.

Windows Server 2003

The second domain functional level is Windows Server 2003. Upgrading to this domain functional level provides support for Windows Server 2003 and 2008 domain controllers. You get all the features under the Windows 2000 functional level and additional ones that include:

* Netdom.exe management tool
* Logon time stamp dates
* Ability to redirect Users and Computers container
* Ability for Authorization Manager to store its authorization policies in AD DS
* Constrained delegation
* Selective delegation

Windows Server 2008

The third domain functional level is Windows Server 2008. This domain functional level only provides support for Windows Server 2008 domain controllers. If you want to take advantage of all the features included with Windows Server 2008, you must implement this functional level. Along with the features introduced at the previous levels, you can also take advantage of the following:

* Distributed File System
* Advanced Encryption Standard support for the Kerberos protocol
* Last Interactive Logon Information
* Fine-grained password policies

Functional levels determine the features that are available and the domain controllers that are supported. In a previous article, you learned about the three domain functional levels that are supported under Windows Server 2008. There are also functional levels at the forest level.

Windows Server 2008 supports the following three forest functional levels:

* Windows 2000 Native
* Windows Server 2003 Interim
* Windows Server 2003

Windows 2000 Native

Windows 2000 native is the default forest functional level. It provides support for Windows 2000, 2003 and 2008 domain controllers. This functional level support all of the default AD DS features.

Windows Server 2003

This forest functional level supports Windows Server 2003 and 2008 domain controllers. Along with the default features, the following features are introduced at this level:

* Forest trust
* Domain rename
* Linked-value replication
* Read-only domain controller
* Improved Knowledge Consistency Checker
* Ability to create the dynamic auxiliary class named dynamicObject
* Ability to create instances on new group types to support role-based
authorization.
* Deactivation and redefinition of attributes and classes in the schema

Windows Server 2008

The third forest functional level is Windows Server 2008. As the name implies, only domain controllers running Windows Server 2008 are supported. No additional features are introduced at this level.

Active Directory database file NTDS.DIT.doc

Active Directory database file NTDS.DIT.doc

February 03, 2011
Downalod My Document

Active Directory database file NTDS.DIT.doc 


Downlaod
25. Name some OU design considerations.

25. Name some OU design considerations.

January 10, 2011
Windows admin interview questions (includes Vista)



OU design requires balancing requirements for delegating administrative rights - independent of Group Policy needs - and the need to scope the application of Group Policy. The following OU design recommendations address delegation and scope issues:
Applying Group Policy An OU is the lowest-level Active Directory container to which you can assign Group Policy settings.
Delegating administrative authority
usually don't go more than 3 OU levels
24. What tool would I use to try to grab security related packets from the wire?

24. What tool would I use to try to grab security related packets from the wire?

January 10, 2011
Windows admin interview questions (includes Vista)


you must use sniffer-detecting tools to help stop the snoops. ...
A good packet sniffer would be "ethereal"

22. How can you forcibly remove AD from a server, and what do you do later?

22. How can you forcibly remove AD from a server, and what do you do later?

January 10, 2011
Windows admin interview questions (includes Vista)

Demote the server using dcpromo /forceremoval, then remove the metadata from Active directory using ndtsutil. There is no way to get user passwords from AD that I am aware of, but you should still be able to change them.
Another way out too
Restart the DC is DSRM mode
a. Locate the following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ProductOptions
b. In the right-pane, double-click ProductType.
c. Type ServerNT in the Value data box, and then click OK.
Restart the server in normal mode
its a member server now but AD entries are still there. Promote teh server to a fake domain say ABC.com and then remove gracefully using DCpromo. Else after restart you can also use ntdsutil to do metadata as told in teh earlier post
23.  Can I get user passwords from the AD database?

23. Can I get user passwords from the AD database?

January 10, 2011
Windows admin interview questions (includes Vista)



The passwords in AD are not stored encrypted by default, so they cannot be decrypted. They are hashed. The only way to recover the data from a hash is with some sort of a hacking algorithm that attempts to crack the hash (such tools exist).