Current location - Quotes Website - Signature design - What knowledge does a network manager need to master?
What knowledge does a network manager need to master?
Knowledge that network management must master/Obasan Part I: computer structure and working principle, performance parameters of various spare parts and mainstream brands, assembly of computer hardware, CMOS setting, partition and formatting of hard disk, installation of Windows98/2000/XP, installation of hardware drivers and application programs, structure, backup and application of Windows registry, and distribution of Windows kernel: CPU, memory and hard disk. The optimization of software and hardware system, the performance evaluation of the whole machine, the principle and prevention of computer virus, the causes, phenomena and solutions of common software and hardware failures, and the sales skills of correctly distinguishing fake goods from parallel goods in the market. The first part: computer structure and working principle, performance parameters of various spare parts and mainstream brands, assembly of computer hardware, CMOS setting, partition and formatting of hard disk, installation of Windows98/2000/XP, installation of hardware drivers and applications, structure of Windows registry, backup and application, kernel of Windows: allocation of CPU, memory and hard disk, optimization of software and hardware systems, The performance evaluation of the whole machine, the principle and prevention of computer virus, the causes and phenomena of common software and hardware failures, and the sales skills to solve and correctly distinguish counterfeit goods, parallel imports, software and hardware products in the market. The second part: the basic composition, development and topology design of the network, the construction and implementation of 10BASE-T local area network, the structure and characteristics of various servers, and the Ethernet peer-to-peer network. Similarities and differences between TCP/IP four-layer model and OSI seven-layer model, TCP/IP protocol analysis, how to set IP address, subnet mask, default gateway, distinguish subnet from network segment and hub, switch and router, RJ45 network cable production and establishment and maintenance of Internet cafes, nt, Win2000server and Linux server construction, establishment and debugging of 98 peer-to-peer network and setting of proxy server Part III: WIN2000 configuration, users and servers. Network resource monitoring, system environment setting and disk system management. Install, configure and manage Web, Ftp, DNS, DHCP, WINS and other servers. Use Exchange mail server software to establish and manage personal mail server, bulletin board server, website mail server and chat server. A series of maintenance and management methods such as database creation, table creation and publication, database backup and recovery, table import and export in SQL Server. The basic principle of proxy server. Take Microsoft proxy as an example to realize the setting and management of proxy server. The fourth part: The basic principle of proxy server. Take Microsoft proxy as an example to realize the setting and management of proxy server. The configuration, use and management skills of Cisco Work2000, a popular network management software, manage all routers and switches in the network on one monitoring computer, monitor network traffic in real time and find network problems in time. Routing and switching technology: explain the routing principle, and master the common configuration commands and configurations of Cisco routers through the study of router configuration examples. Explain the switching principle, and master the common configuration commands and configurations of switches by learning the configuration examples of switches. The fifth part: Customize the system manually, test the performance of the management system, and set the compilation kernel. Ftp service and Samba service, other services, such as DHCP and NFS. Web network service. Including the configuration, use and security settings of Apache services. Introduction of other network service software. DNS technology and its application. Some simple routing techniques, some simple load balancing techniques. Mail network service. Including: the configuration and use of sendmail, the configuration and use of Qmail. Part VI: The use of some email client programs: the basic overview of network security, the introduction of network protocols, the basic knowledge of conventional encryption, the basic knowledge of public key encryption and digital signature, the difficulties of identity verification, the email encryption experiment using PGP and digital certificates, the comprehensive description of the implementation of network security countermeasures in the environment, various vulnerabilities under Windows98, attack types and defense methods, and security configuration schemes (system security, IE security, Outlook security, etc.). ). Combined with the hacker attack process, the implementation of network security countermeasures in WindowsNT environment is comprehensively described. Various vulnerabilities, attack types, defense methods and security configuration schemes under WindowsNT comprehensively describe the realization of network security countermeasures under Windows2000 environment, the log security, WEB security and software firewall of Windows system. Various vulnerabilities, attack types, defense methods and security configuration schemes under Windows20 00. Part VII: Linux administrator Part I: Introduction of basic application 1, GNU/linux and Redhat Linux installation. 2. System knowledge (shell, file system, pipeline and redirection, process concept) and introduction of common system commands (ls, cp, mkdir, rm, vi, man, chmod, etc.). 3. Basic system management (including: introduction of system startup process, disk management, user management, log viewing, use of tar/gz package, rpm package management, etc.). 2. Configuration and use of basic system services (including graphic terminal and basic network services) (9 class hours) 1 and graphic terminal (x-window). Show the friendly interface of UNIX system around KDE and/or GNOME. 2. A simple way to write a shell textbook, environment variable 3. Basic configuration of IP network under Linux (IP address, gateway, name) 4. Configuration and use of network services under Linux (including basic configuration of ftp, DNS, Apache, Sendmail and samba). This paper introduces the installation based on RedHat and linuxconf. Introduction of Webmin management tools. 3. Pre-courses (background courses) 1, Preface 2, Advanced System Management. Including: manual system customization (inetd, service, ntsysv) and system performance test management (ps, top, tail, dmesg, /proc). 3. Kernel setup and compilation. 4. Advanced network application 1, ftp service and Samba service, and other services, such as DHCP and NFS. 2.Web network service. Including the configuration, use and security settings of Apache services. Introduction of other network service software. DNS technology and its application. 3. Some simple routing techniques. Some simple load balancing techniques. 5. Mail network service. Including: the configuration and use of sendmail, the configuration and use of Qmail. The use of some mail client programs. V system network security 1, the theory and application of packet filtering firewall (NAT technology, kernel architecture, the use of Ipchains/Iptable), and the introduction of other non-core firewalls. 2. System security. Configuration and use of SSH. Intrusion detection system and checkpoint technology and its application III. Principle and application of virtual private network. Including Ipsec, PPTP, authentication, key exchange protocol and other technologies. 6. Summarize the mixed structure of secure network service system.