CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
2. Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certifications
PC Hardware
Network Administration
IT Project Management
Network Design
User Training
IT Troubleshooting
Qualifications Summary
Education
M.B.A., IT Management, Western Governor’s University
B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
5. Page 5
Port scanners are used to
scan a network for open
ports and protocols. The
information gathered is then
used to harden the network.
Port scanners are a great method of finding
vulnerabilities in the network infrastructure and
plugging them before a security breech can occur.
A word of caution: only use a port scanner on a
network or system that you are authorized to scan.
Port scanning is a possible sign of someone trying
to breech a system and can lead to problems if you
are not authorized to scan that system.
Network monitoring II.
6. Page 6
– Interface monitoring/packet flow
monitoring.
» These are usually deployed as active software tools to monitor
and analyze network traffic within a network segment.
• Commonly called packet sniffers or protocol analyzers, they
allow for an in depth look at what traffic is on the network and
may reveal security issues that the network administrator can
then mitigate.
» They can identify top talkers on a network segment.
• The interfaces that are sending the most network traffic (or
utilizing the most bandwidth for sending packets).
» They can identify top listeners on a network segment.
• The interfaces that are receiving the most network traffic (or
utilizing the most bandwidth for receiving packets).
» Microsoft Message Analyzer and Wireshark are examples of
free packet flow monitoring tools.
Network monitoring II.
8. Page 8
– Wi-Fi analyzer.
» A similar tool to the protocol analyzer, but for wireless
networks.
• Sniffs out packets on wireless networks.
» Can check for bandwidth usage, channel usage, top talkers etc.
» Can identify networks by passively scanning the radio
frequencies (RFs).
» Can identify hidden networks if given enough time.
» Can infer non-beaconing networks based on data traffic.
– Wireless survey tools.
» Most commonly used as a design tool for setting up high quality
wireless networks.
• Through the use of mapping tools, the survey tools can help
to establish the required amount of access points (APs), ideal
antenna placement, and optimum channel overlap.
• Can also be used to identify possible causes of RF
» Used to eliminate wireless network performance and security
issues before they even occur.
Network monitoring II.
10. Page 10
A network’s health can be
affected by more than just a
network interface failing or
a possible security breech.
Network and systems administrators also need to be
concerned about environmental factors. Some of
those factors include electrical power, heat, and
humidity.
Network monitoring II.
11. Page 11
– Power monitoring.
» Systems and tools can be used to evaluate the amount of and
the quality of the electrical power being delivered to the system.
• Power monitoring is often deployed with, or alongside, an
uninterruptable power supply (UPS).
• The monitor will issue an alert when an issue with electrical
power has been identified.
– Environmental monitors.
» Heat monitors.
• All electrical components are designed to operate within a
specified heat range.
• While they are designed to operate within a range, electrical
components also generate heat when in use.
• Monitors allow administrators to control temperature levels.
» Humidity monitoring.
• Too little humidity increases the risk of electrostatic discharge
and too much humidity increases the risk of condensation.
• Monitors allow administrators to control humidity levels.
Network monitoring II.
12. Page 12
Network monitoring II.
Port scanners are used to scan for unsecured ports and protocols. The
information gathered by port scanners is used to harden networks and
make them less vulnerable to security breeches. Interface monitoring
evaluates network traffic at the packet level. Packet sniffers can help to
identify issues on the network that can then be mitigated.
Topic
Active network monitoring
tools.
Summary
A Wi-Fi analyzer is similar to a packet sniffer, but checks wireless network
packets instead. Analyzers can also identify which RF channels are in use.
The analyzer can help to identify wireless networks, even ones that are
hidden. Wireless survey tools are used to help design efficient and secure
wireless networks.
Wireless monitoring tools.
A network’s function and health can be affected by environmental factors.
Power monitors are used to evaluate the electrical supply being delivered to
the system. Heat and humidity monitors are used to help maintain the
correct levels of heat and humidity.
Environmental monitoring.
14. This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.