Cambridge TECHNICALS LEVEL 3

Similar documents
Cambridge TECHNICALS LEVEL 3

Cambridge TECHNICALS LEVEL 3

Cambridge TECHNICALS LEVEL 3

Unit 4 Computer networks

Cambridge TECHNICALS LEVEL 3

Entry Level Assessment Blueprint Computer Networking Fundamentals

MTA_98-366_Vindicator930

Computer Networking Fundamentals

Unit 1.4 Wired and Wireless Networks

Computer SCienCe Theme: Programming Techniques

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Computer Networking Fundamentals

COPYRIGHTED MATERIAL. Con t e n t s. Chapter 1 Introduction to Networking 1. Chapter 2 Overview of Networking Components 21.

Cambridge TECHNICALS LEVEL 3

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

MTA: Networking Fundamentals (Course & Labs) Course Outline. MTA: Networking Fundamentals (Course & Labs) 02 Oct

Computer SCienCe Theme: Applications Generation

Unit Syllabus Level 2 Networking, telephony and VoIP for the digital home technology integrator

CompTIA Network+ Study Guide Table of Contents

Objective Applications, Devices, Protocols Applications, Devices, Protocols Classifying Network Components Objective 1.

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

Microsoft Exam

Hands-On TCP/IP Networking

Unit 2 Essentials of cyber security

CompTIA Network+ N10-005

QCF Level 3: BTEC Specialist Credit value: 10 Guided learning hours: 60. Aim and purpose. Unit introduction

Pass Microsoft Exam

CompTIA Network+ N (Course & Labs) Course Outline. CompTIA Network+ N (Course & Labs) 14 Mar

Networks and Communications MS216 - Course Outline -

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

CompTIA Network+ N ucertify Labs. Course Outline. CompTIA Network+ N ucertify Labs. 10 Oct

Cisco 1: Networking Fundamentals

Unit 3 Building IT systems

Course Outline. CompTIA Network+ N Pearson ucertify Course and Labs. CompTIA Network+ N Pearson ucertify Course and Labs

Chapter 11: It s a Network. Introduction to Networking

CompTIA Network+ Course

A LEVEL H446 COMPUTER SCIENCE. Code Challenges (21 40) September 2015

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued)

Chapter 4: Networking and the Internet

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations

Level 2 Install, configure and test ICT networks ( )

CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0)

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

Ethical Hacking and Prevention

Systems and Principles Unit Syllabus

Cisco CCNA (ICND1, ICND2) Bootcamp

CompTIA Network+ N ucertify Course & Labs. Course Outline. CompTIA Network+ N ucertify Course & Labs.

Systems and Principles Unit Syllabus

Security+ SY0-501 Study Guide Table of Contents

Networking Infrastructure

Certified Cisco Networking Associate v1.1 ( )

Fundamentals of Information Systems Security Lesson 8 Mitigation of Risk and Threats to Networks from Attacks and Malicious Code

Course overview. CompTIA Network+ Certification (Exam N10-007) Study Guide (G525eng v038)

Answers for Additional Exercises

CCNA Exploration Network Fundamentals

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE

A+ Certification Guide. Chapter 16 (Part B) Networking

The Learner can: 1.1 Describe the common types of security breach that can affect the organisation, such as:

Course Outline. CompTIA Network+ Deluxe Study Guide Third Edition (Course & Labs)

Erasable Programmable Read-Only Memory (EPROM) Electrically Erasable Programmable Read-Only Memory (EEPROM) CMOS 2.2.

Vocational Qualifications (QCF, NVQ, NQF) ICT Professional Competence. OCR Report to Centres

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.

MOC 6420A: Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Networking interview questions

CCNA. Course Catalog

TCP/IP Fundamentals. Introduction. Practice Practice : Name. Date Period

CtrlS Datacenters Placement Questions And Answers

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

Scope and Sequence: CCNA Exploration v4.0

CCNA. Murlisona App. Hiralal Lane, Ravivar Karanja, Near Pethe High-School, ,

LO N LO CompTIA Network (Course & Labs) Course Outline. LO CompTIA Network (Course & Labs) 04 Apr 2018

LO CompTIA Network (Course & Labs) Course Outline. LO CompTIA Network (Course & Labs) ( Add-On ) 15 Jul 2018

datasheet Certificate/Diploma in Business and Administration Main features of the qualifications Introduction Target audience

IT Essentials: PC Hardware and Software v4.1 Mapping to CompTIA A Objectives

PRACTICAL ROUTERS and SWITCHES for ENGINEERS and TECHNICIANS

Cisco Certified Network Associate ( )

"Charting the Course... Interconnecting Cisco Networking Devices Accelerated 3.0 (CCNAX) Course Summary

CompTIA A Practical Application Exam, 2009 Edition

Unit code: D/601/1956 QCF Level 5: BTEC Higher National Credit value: 15

Understanding Networking Fundamentals

Interconnecting Cisco Network Devices Part 1 v2.0 (ICND 1)

access link basic service set (BSS) broadband cable ad hoc wireless network Address Resolution Protocol (ARP) broadcast broadcast domain

Pass Microsoft Exam

IT Foundations Networking Specialist Certification with Exam

Security Assessment Checklist

Number: Passing Score: 750 Time Limit: 120 min File Version: Microsoft

High School Graduation Years 2016, 2017 and 2018

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview

Syllabus: The syllabus is broadly structured as follows:

Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview

CCNA Routing and Switching (NI )

Level 3 Voice and data communications ( )

ICND1 v2.0 Interconnecting Cisco Networking Devices Part 1 CCENT & Part of CCNA Rout/Switch

Vocational Qualifications (QCF, NVQ, NQF) Using ICT. OCR Report to Centres Entry Level Award Using ICT (Entry 3) 01679

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

R5: Configuring Windows Server 2008 R2 Network Infrastructure

CompTIA Network+ Study Guide. Second Edition. John Wiley & Sons, Inc. WILEY

Course Outline. Networking Essentials, Fifth Edition Pearson ucertify Labs.

OCR 10 Mensuration (Foundation)

CCNA 1 Final Exam Answers UPDATE 2012 eg.2

Transcription:

Cambridge TECHNICALS LEVEL 3 IT MAPPING GUIDE Unit 4 Computer networks Version 1 ocr.org.uk/it

INTRODUCTION Prodigy are delighted to work with OCR, a progressive Awarding Organisation, who share the ambition of providing high-quality qualifications, learning solutions that are industry-led and reliable and valid assessment. The Cambridge Technicals in IT qualifications provide future-ready skills for a learner to further their ambitions, whether that is in terms of further academic study, enter an apprenticeship or as a springboard to gaining employment. Prodigy Learning (Prodigy) is an award-winning EdTech business providing digital skills certifications and learning solutions for a range of technologies including Adobe, Autodesk and Microsoft. Established in 2000, Prodigy now have offices in Dublin, London and Sydney. Having worked closely with Microsoft since 2000, Prodigy is a Microsoft Authorised Education Gold Partner and a MS Global Training Partner supporting academic institutions utilise Microsoft Imagine Academy, Microsoft certifications and other Microsoft Education solutions. Historically, the UK has thrived on a rich research and technology base and has been at the forefront of global technology innovation. Enthusing young learners about following exciting careers in science, technology, engineering and mathematics (STEM) subjects is fundamental to maintaining this success. However, currently the UK has a widely acknowledged skills gap in the pipeline of talent studying computing-related disciplines. Therefore, providing high quality, engaging and relevant qualifications that equip learners with current technical knowledge and skills is essential to encourage more young people into the computing discipline, and moreover to ensure they progress to jobs in the sector. 2

MAPPED TO MTA NETWORKING FUNDAMENTALS UNIT 1. Understanding Network Infrastructures 1.2.1 Network types - local area network (LAN) 1.2.2 Network types - wireless local area network (WLAN) 1.2.3 Network types - wide area network (WAN) 1.4 Network topologies (layout) (e.g. bus, wireless, segments, backbones) 1.8.1 Network - MAC Addressing 1.8.2 Network - APIPA 1.8.3 Network - Class 1.1.3 firewalls 1.2.1 perimeter networks 1.2.2 1.2.3 reserved address ranges for local use (including local loopback ip) 1.2.4 VLANs 1.2.5 wired LAN 1.2.6 wireless LAN 1.3.1 leased lines 1.3.2 dial-up 1.3.3 ISDN, VPN, T1, T3, E1, E3, DSL, 1.3.4 cable and their characteristics (speed, availability) 1.5.1 star 1.5.2 mesh 1.5.3 ring 3

MAPPED TO MTA NETWORKING FUNDAMENTALS UNIT 1.8.4 Network - Classless 1.8.5 Network - Private 1.8.6 Network - Loopback 1.10.2 Network Security - Security Systems (e.g. firewall, routers, WEP) 2.5.7 Network Specification - security network security (e.g. firewall, MAC filtering) 2.6.4 Network Plan - software (e.g. operating systems, firewall) 1.1.3 firewalls 1.2.1 perimeter networks 1.2.2 1.2.3 reserved address ranges for local use (including local loopback ip) 1.2.4 VLANs 1.2.5 wired LAN 1.2.6 wireless LAN 1.3.1 leased lines 1.3.2 dial-up 1.3.3 ISDN, VPN, T1, T3, E1, E3, DSL, 1.3.4 cable and their characteristics (speed, availability) 1.5.1 star 1.5.2 mesh 1.5.3 ring 4

MAPPED TO MTA NETWORKING FUNDAMENTALS UNIT 4.2.2 Maintenance issues - virus: treatment (e.g. virus protection, firewall, security update) 4.2.11 Maintenance issues - security settings (e.g. router, firewall) 1.1.3 firewalls 1.2.1 perimeter networks 1.2.2 1.2.3 reserved address ranges for local use (including local loopback ip) 2. Understanding Network Hardware 1.3.6 Network components routers 2.2.1 transmission speed considerations 2.2.2 directly connected routes 2.2.3 static routing 1.2.4 VLANs 1.2.5 wired LAN 2.2.4 dynamic routing (routing protocols) 1.2.6 wireless LAN 1.3.1 leased lines 2.2.5 default routes 1.3.2 dial-up 1.3.3 ISDN, VPN, T1, T3, E1, E3, DSL, 2.2.6 routing table and how it selects best routes 1.3.4 cable and their characteristics (speed, availability) 2.2.7 routing table memory 1.5.1 star 1.5.2 mesh 1.5.3 ring 2.2.8 NAT 2.2.9 software routing in Windows Server 5

MAPPED TO MTA NETWORKING FUNDAMENTALS UNIT 3. Understanding Protocols and Services 1.6.7 Networking models - OSI 7 layer model 1.6.8 Networking models - TCP/IP model 1.7 IP versions (e.g. IPv4, IPv6) 1.8.1 Network - MAC Addressing 1.8.2 Network - APIPA 1.8.3 Network - Class 1.8.4 Network - Classless 1.8.5 Network - Private 1.8.6 Network - Loopback 1.8.7 Network - TCP ports 1.9.1 Network data units - Ethernet frames 3.1.1 OSI model 3.1.2 TCP model 3.1.3 examples of devices, protocols, and applications and which OSI/ TCP layer they belong to 3.1.4 TCP and UDP 3.1.5 wellknown ports for most-used purposes (not necessarily Internet) 3.1.6 packets and frames 3.2.1, subnetting 3.2.2 NAT, static IP, gateway 3.2.3 APIPA 3.2.4 network classes, classful/ classless IP 3.2.5 reserved address ranges for local use (including local loopback ip) 6

MAPPED TO MTA NETWORKING FUNDAMENTALS UNIT 1.9.2 Network data units - IP packets 1.9.3 Network data units - TCP packets 3.1.1 OSI model 3.1.2 TCP model 3.1.3 examples of devices, protocols, and applications and which OSI/ TCP layer they belong to 3.1.4 TCP and UDP 3.1.5 wellknown ports for most-used purposes (not necessarily Internet) 3.1.6 packets and frames 3.2.1, subnetting 3.2.2 NAT, static IP, gateway 3.2.3 APIPA 3.2.4 network classes, classful/ classless IP 3.2.5 reserved address ranges for local use (including local loopback ip) 7

MAPPED TO MTA NETWORKING FUNDAMENTALS UNIT 1.7 IP versions (e.g. IPv4, IPv6) 1.8.6 Network - Loopback 1.9.2 Network data units - IP packets 3.3.1 subnetting 3.3.2 IPconfig 3.3.3 why use IPv6 3.3.4 3.3.5 ipv4toipv6 tunnelling protocols to ensure backwards compatibility 3.3.6 dual ip stack 3.3.7 subnet mask 3.3.8 gateway 3.3.9 ports 3.3.10 packets 3.3.11 reserved address ranges for local use (including local loopback ip) 8

MAPPED TO MTA NETWORKING FUNDAMENTALS UNIT 3.5.1 DHCP 3.5.2 IPsec 3.5.3 remote access 3.6.1 tools such as ping; tracert; pathping 3.6.2 Telnet 3.6.3 IPconfig; netstat, reserved address ranges for local use (including local loopback ip) 3.6.4 protocols 1.5.3 Network protocols - TCP 1.6.8 Networking models - TCP/IP model 2.2.1 Network Services - DHCP 2.2.4 Network Services - Other Services (e.g. printing, email, web, DNS) 2.4.1 Testing Tools - Ping 2.4.2 Testing Tools - ipconfig 2.4.3 Testing Tools -pathping 2.4.4 Testing Tools -tracert 9

MAPPED TO MTA SECURITY FUNDAMENTALS 98-367 UNIT 2. Understand operating system security 2.5.5 Network Specification - security risk assessment 2.5.6 Network Specification - security Wi-Fi security 4.2.1 Maintenance issues - virus: sources (e.g. email, hacking, software install) 4.2.2 Maintenance issues - virus: treatment (e.g. virus protection, firewall, security update) 2.1.1 Multifactor authentication 2.1.2 physical and virtual smart cards 2.1.3 Remote Authentication Dial-In User Service (RADI- US) 2.1.4 biometrics 2.1.5 use Run As to perform administrative tasks 2.2.1 File system permissions 2.2.2 share permissions 2.2.3 registry 2.2.4 Active Directory 2.2.5 enable or disable inheritance 2.2.6 behaviour when moving or copying files within the same disk or on another disk 2.2.7 multiple groups with different permissions 2.2.8 basic permissions and advanced permissions 2.2.9 take ownership 2.2.10 delegation 2.2.11 inheritance 10

MAPPED TO MTA SECURITY FUNDAMENTALS 98-367 UNIT 2.5.5 Network Specification - security risk assessment 2.5.6 Network Specification - security Wi-Fi security 4.2.1 Maintenance issues - virus: sources (e.g. email, hacking, software install) 4.2.2 Maintenance issues - virus: treatment (e.g. virus protection, firewall, security update) 2.3.1 Password complexity 2.3.2 account lockout 2.3.3 password length 2.3.4 password history 2.3.5 time between password changes 2.3.6 enforce by using Group Policies 2.3.7 common attack methods 2.3.8 password reset procedures 2.3.9 protect domain user account passwords 2.4. Understand audit policies 2.4.1 Types of auditing 2.4.2 what can be audited 2.4.3 enable auditing 2.4.4 what to audit for specific purposes 2.4.5 where to save audit information 2.4.6 how to secure audit information 11

MAPPED TO MTA SECURITY FUNDAMENTALS 98-367 UNIT 2.5.5 Network Specification - security risk assessment 2.5.6 Network Specification - security Wi-Fi security 4.2.1 Maintenance issues - virus: sources (e.g. email, hacking, software install) 4.2.2 Maintenance issues - virus: treatment (e.g. virus protection, firewall, security update) 2.5.1 Encrypting file system (EFS) 2.5.2 how EFSencrypted folders impact moving/ copying files 2.5.3 BitLocker (To Go); TPM 2.5.4 softwarebased encryption 2.5.5 MAIL encryption and signing and other uses 2.5.6 virtual private network (VPN) 2.5.7 public key/ private key 2.5.8 encryption algorithms 2.5.9 certificate properties 2.5.10 certificate services 2.5.11 PKI/certificate services infrastructure 2.5.12 token devices 2.5.13 lock down devices to run only trusted applications 12

MAPPED TO MTA SECURITY FUNDAMENTALS 98-367 UNIT 2.5.5 Network Specification - security risk assessment 2.5.6 Network Specification - security Wi-Fi security 4.2.1 Maintenance issues - virus: sources (e.g. email, hacking, software install) 4.2.2 Maintenance issues - virus: treatment (e.g. virus protection, firewall, security update) 2.6.1 Buffer overflow 2.6.2 viruses, polymorphic viruses 2.6.3 worms 2.6.4 Trojan horses 2.6.5 spyware 2.6.6 ransomware 2.6.7 adware 2.6.8 rootkits 2.6.9 backdoors 2.6.10 zero day attacks 13

MAPPED TO MTA SECURITY FUNDAMENTALS 98-367 UNIT 3. Understand network security 2.5.7 Network Specification - security network security (e.g. firewall, MAC filtering) 4.2.1 Maintenance issues - virus: sources (e.g. email, hacking, software install) 4.2.2 Maintenance issues - virus: treatment (e.g. virus protection, firewall, security update 4.2.11 Maintenance issues - security settings (e.g. router, firewall) 3.1.1 Types of hardware firewalls and their characteristics 3.1.2 when to use a hardware firewall instead of a software firewall 3.1.3 stateful vs. stateless firewall inspection 3.1.4 Security Compliance Manager 3.1.5 security baselines 3.2.1 Routing 3.2.2 honeypot 3.2.3 perimeter networks 3.2.4 network address translation (NAT) 3.2.5 VPN 3.2.6 Ipsec 3.2.7 server and domain isolation 14

MAPPED TO MTA SECURITY FUNDAMENTALS 98-367 UNIT 2.5.7 Network Specification - security network security (e.g. firewall, MAC filtering) 4.2.1 Maintenance issues - virus: sources (e.g. email, hacking, software install) 4.2.2 Maintenance issues - virus: treatment (e.g. virus protection, firewall, security update) 3.3.1 Protocol spoofing 3.3.2 Ipsec 3.3.3 tunnelling 3.3.4 DNSsec 3.3.5 network sniffing 3.3.6 denial-ofservice (DoS) attacks 3.3.7 common attack methods 15

MAPPED TO MTA SECURITY FUNDAMENTALS 98-367 UNIT 4. Understand security software 2.5.6 Network Specification - security Wi-Fi security 2.5.7 Network Specification - security network security (e.g. firewall, MAC filtering) 4.2.1 Maintenance issues - virus: sources (e.g. email, hacking, software install) 4.2.2 Maintenance issues - virus: treatment (e.g. virus protection, firewall, security update) 4.2.9 Maintenance issues - security: security update 4.2.10 Maintenance issues - security: security breach 4.5.1 Software/Hardware updates - security updates 4.1.1 Antivirus 4.1.2 protect against unwanted software installations 4.1.3 User Account Control (UAC) 4.1.4 keep client operating system and software updated 4.1.5 encrypt offline folders 4.1.6 software restriction policies 4.1.7 principal of least privilege 4.2.1 Antispam, antivirus, spoofing, phishing, pharming; client vs. server protection 4.2.2 Sender Policy Framework (SPF) records 4.2.3 PTR records 16

MAPPED TO MTA SECURITY FUNDAMENTALS 98-367 UNIT 4.3.1 Separation of services 4.3.2 hardening 4.3.3 keep servers updated 4.3.4 secure dynamic Domain Name System (DNS) updates 4.3.5 disable unsecure authentication protocols 4.3.6 Read- Only Domain Controllers (RODC) 2.5.6 Network Specification - security Wi-Fi security 2.5.7 Network Specification - security network security (e.g. firewall, MAC filtering) 4.2.1 Maintenance issues - virus: sources (e.g. email, hacking, software install) 4.2.2 Maintenance issues - virus: treatment (e.g. virus protection, firewall, security update) 17

The small print We d like to know your view on the resources we produce. By clicking on the Like or Dislike button you can help us to ensure that our resources work for you. When the email template pops up please add additional comments if you wish and then just click Send. Thank you. Whether you already offer OCR qualifications, are new to OCR, or are considering switching from your current provider/awarding organisation, you can request more information by completing the Expression of Interest form which can be found here: www.ocr.org.uk/expression-of-interest OCR Resources: the small print OCR s resources are provided to support the delivery of OCR qualifications, but in no way constitute an endorsed teaching method that is required by OCR. Whilst every effort is made to ensure the accuracy of the content, OCR cannot be held responsible for any errors or omissions within these resources. We update our resources on a regular basis, so please check the OCR website to ensure you have the most up to date version. This resource may be freely copied and distributed, as long as the OCR logo and this small print remain intact and OCR is acknowledged as the originator of this work. Our documents are updated over time. Whilst every effort is made to check all documents, there may be contradictions between published support and the specification, therefore please use the information on the latest specification at all times. Where changes are made to specifications these will be indicated within the document, there will be a new version number indicated, and a summary of the changes. If you do notice a discrepancy between the specification and a resource please contact us at: resources.feedback@ocr.org.uk. OCR acknowledges the use of the following content: Front cover: Young female with tablet, wavebreakmedia/ Shutterstock.com; Square down and Square up: alexwhite/ Shutterstock.com Please get in touch if you want to discuss the accessibility of resources we offer to support delivery of our qualifications: resources.feedback@ocr.org.uk www.ocr.org.uk OCR Customer Contact Centre Vocational qualifications Telephone 02476 851509 Facsimile 02476 851633 Email vocational.qualifications@ocr.org.uk OCR is part of Cambridge Assessment, a department of the University of Cambridge. For staff training purposes and as part of our quality assurance programme your call may be recorded or monitored. OCR 2018 Oxford Cambridge and RSA Examinations is a Company Limited by Guarantee. Registered in England. Registered office The Triangle Building, Shaftesbury Road, Cambridge, CB2 8EA. Registered company number 3484466. OCR is an exempt charity. Looking for a resource? There is now a quick and easy search tool to help find free resources for your qualification: www.ocr.org.uk/i-want-to/find-resources/