Infrastructure & Networking Pathway

4.2

/

5

in partnership with

Default Title
Default Title
Default Title
Default Title
Default Title

What will you learn?

1. Networking Concepts
  • OSI model layers: physical, data link, network, transport, session, presentation, application.
  • Networking appliances: routers, switches, firewalls, IDS/IPS, load balancers, proxies, NAS, SAN, and wireless devices.
  • Cloud concepts: NFV, VPC, network security groups, cloud gateways, deployment models (public, private, hybrid), service models (SaaS, IaaS, PaaS).
  • Ports and protocols: FTP, SFTP, SSH, Telnet, SMTP, DNS, DHCP, HTTP, HTTPS, SNMP, LDAP, RDP, SIP.
  • Traffic types: unicast, multicast, anycast, broadcast.
  • Transmission media: wireless (802.11, cellular, satellite), wired (fiber, coaxial, DAC).
  • Transceivers and connectors: SC, LC, ST, MPO, RJ11, RJ45, F-type, BNC.
  • Network topologies: mesh, hybrid, star/hub and spoke, spine and leaf, point-to-point, three-tier, and collapsed core.
  • IPv4 addressing: public vs. private, APIPA, RFC1918, loopback, subnetting (VLSM, CIDR), and address classes (A, B, C, D, E).
2. Network implementation
  • Routing technologies: static and dynamic routing (BGP, EIGRP, OSPF), route selection, NAT, PAT, FHRP, VIP, and subinterfaces.
  • Switching technologies: VLANs, interface configuration, spanning tree, MTU, and jumbo frames.
  • Wireless devices: channels, frequency options, SSID, network types, encryption, guest networks, authentication, antennas, and access points.
  • Physical installations: installation implications, power considerations, and environmental factors.
3. Network Operations
  • Documentation: physical vs. logical diagrams, rack diagrams, cable maps, network diagrams, asset inventory, IPAM, SLA, and wireless surveys.
  • Life-cycle management: EOL, EOS, software management, and decommissioning.
  • Change management: request process tracking.
  • Configuration management: production, backup, baseline configurations.
  • Network monitoring: SNMP, flow data, packet capture, baseline metrics, log aggregation, API integration, and port mirroring.
  • Disaster recovery: RPO, RTO, MTTR, MTBF, cold/warm/hot sites, active-active/passive, and testing.
  • Network services: DHCP, SLAAC, DNS, NTP, PTP, and NTS.
  • Access and management: VPNs, SSH, GUI, API, and console.
4. Network Security
  • Logical security: encryption (data in transit/rest), PKI, IAM, MFA, SSO, RADIUS, LDAP, SAML, TACACS+, time-based authentication, authorization, least privilege, role-based access control, and geofencing.
  • Physical security: cameras and locks.
  • Deception technologies: honeypot and honeynet.
  • Security terminology: risk, vulnerability, exploit, threat, and CIA triad.
  • Audits and compliance: data locality, PCI DSS, and GDPR.
  • Network segmentation: IoT, IIoT, SCADA, ICS, OT, guest, and BYOD.
  • Types of attacks: DoS/DDoS, VLAN hopping, MAC flooding, ARP poisoning/spoofing, DNS poisoning/spoofing, rogue devices/services, evil twin, on-path attack, and social engineering (phishing, dumpster diving, shoulder surfing, tailgating).
  • Security features and defense: device hardening, NAC, key management, ACL, URL/content filtering, trusted vs. untrusted zones, and screened subnet.
5. Network Troubleshooting
  • Troubleshooting methodology: identifying the problem, establishing a theory, testing, planning, and implementing a solution, verifying functionality, and documenting findings.
  • Cabling and physical interface issues: cable issues (incorrect type, signal degradation, improper termination, TX/RX transposed), interface issues (increasing counters, port status), and hardware issues (PoE, transceiver mismatch, signal strength).
  • Network services issues: switching issues (STP, VLAN assignment, ACLs), routing issues (routing table and default routes), address pool exhaustion, and incorrect gateway/IP/subnet mask.
  • Performance issues: congestion, latency, packet loss, and wireless interference.
  • Tools and protocols: protocol analyzers, command line tools, cable testers, and Wi-Fi analyzers.
Live Tuition Sessions

Our tutors are all industry leading professionals with extensive experience in their field. Our tutors continue to operate and lead in their industries which keeps our curriculum and course content up to date and aligned with employers expectations. You will also have access to our online learning platform , where you can contact your tutor directly between sessions.

Accredited Courses

All of our courses include accredited qualifications. We are authorised partners of CompTIA, AWS, Microsoft and the Chartered Institute of Marketing (CIM). To enhance your learning experience, we have also partnered with a specialist, industry leading Penetration Testing company; North Green Security.

Job Interview Guarantee

Our team has a combined 30+ years of experience recruiting into the IT & Tech sector, with a sharp focus on early careers. Our network of employers and reputation in the industry enables us to guarantee an interview for everyone that completes their course and passes their exam. You will have full transparency over the recruitment process and the interview and job role will be specific to your skills and experience.

Flexible, Part Time, Online Learning Solutions

We strive to make our courses as accessible as possible. We have a range of part time, online delivery models to suit your current career and responsibilities. Whilst it's important for us to complete your qualification and fire up your career change as quickly as possible, we also want to fit in with your current schedule.

Interest Free Payment Plans

Our interest free, flexible payment plans are designed to make your career change as seamless as possible. If you don't want to pay in full, you can spread the cost over 3, 6, 9 or 12 interest free installments. There are no deposits, finance agreement or credit checks.

Exam Pass Rate
0 %
Learners on Programme
0 +
Interview Guarantee
0 %
Employer Network
0 +

Excellent