CIW Network Technology Associate

1D0-61C: CIW Network Technology Associate

Network Technology Associate teaches essential networking technologies and skills, including TCP/IP, stable network creation, wireless networking, mobile devices and network troubleshooting. You will learn to use various network components and protocols that enable users to share data quickly and easily. You will explore the different types of transmission media, and you will learn how network architecture and topologies provide for efficient and secure communication. In addition, you will learn about the OSI reference model and its relationship to packet creation, and you will compare and contrast the OSI model with the Internet architecture model.

You will study the functions, features and technologies associated with Internet services, such as cloud computing. You will learn about the advantages and disadvantages of Bring Your Own Device (BYOD), the growing trend of employees bringing their personal mobile devices to work. BYOD policies and enforcement strategies will also be covered.

You will learn about the benefits of implementing a Content Management System (CMS). You will also achieve competency in performing basic hardware and operating system maintenance procedures. In addition, you will study mobile computing devices and mobile operating systems.

You will also learn about the importance of routing, and you will explore IP addressing, IP address classes and subnet masks. Finally, you will explore essential network security concepts, Internet-based challenges facing today’s users, and methods you can use to secure networks and network transmissions, including authentication, encryption and firewalls.


Introduction to Networking

  • Overview of Networks and Protocols
  • Telephony and Convergence Networking
  • Networking Evolution
  • Client/Server Model
  • Also, Network Operations Center (NOC)
  • Networking Categories
  • Also, Network Topologies
  • Network Operating System
  • Microsoft Windows Servers
  • UNIX/Linux
  • Also,The Need for Protocols
  • OSI Reference Model
  • Data Encapsulation Packets
  • Also, OSI/RM Protocol Examples
  • Transmission Control
  • Protocol/Internet Protocol (TCP/IP)
  • Also, Binding Protocols
  • Local Area Network (LAN)
  • Also, Wide Area Network (WAN)
  • Internet Exchange Point (IXP)

Networking Components and Standards

  • Overview of Networking Components
  • Common Network Components
  • Also, Transmission Media
  • Wireless Network Technologies
  • Also, Transmission Types
  • IEEE LAN Standards
  • Also, Carrier Systems
  • Virtualization

Connecting to the Internet

  • Introduction to Connecting to the Internet
  • Mobile Computing
  • Also, Mobile Devices and Cloud Computing
  • Configuring a Wireless Network
  • Fourth-Generation (4G) Wireless
  • Also, TCP/IP
  • Internet Architecture
  • Internet Protocols
  • De-multiplexing
  • Also, Introduction to Routing
  • Routing Protocols
  • Port Numbers
  • Internet Protocol Version 4 (IPv4)
  • Additionally, Internet Protocol Version 6 (IPv6)
  • Configuring TCP/IP
  • Also, Diagnostic Tools for Internet
  • Troubleshooting

Internet Services

  • Overview of Internet Services
  • Cloud Services
  • Also, Real-World Case Study: Internet Servers
  • Additionally, Choosing Web Server Products
  • Content Management System (CMS)

Hardware and Device Connectivity

  • Introduction to Hardware and Device Connectivity
  • Motherboard
  • Storage Devices
  • Additionally, Network Interface Card (NIC)
  • Also, Optical Discs
  • Device Connectivity
  • System Management
  • Also, Preventive Maintenance
  • Software Troubleshooting

Network and Cloud Security Risks

  • Importance of Network Security
  • Bring Your Own Device (BYOD)
  • Additionally, Real-World Case Study
  • Cloud Security Threats
  • Cloud Disaster Recovery
  • Malware (Malicious Software)
  • Overview of Network Attack Types
  • Defeating Network Attacks
  • Authentication
  • Encryption
  • Firewalls
  • Security Zones
  • Virtual Private Network (VPN)
  • Also, Security Audit
  • Other Security Threats