Skip to content
Adaptive

Learn Network and Systems Administration

Read the notes, then try the practice. It adapts as you go.When you're ready.

Session Length

~17 min

Adaptive Checks

15 questions

Transfer Probes

8

Lesson Notes

Network and systems administration is the discipline concerned with the design, deployment, management, and maintenance of computer networks and the server infrastructure that supports organizational operations. It encompasses a broad range of responsibilities including configuring routers, switches, and firewalls; managing operating systems on servers and workstations; provisioning user accounts and access controls; monitoring system performance; and ensuring high availability and disaster recovery. As organizations increasingly rely on digital infrastructure, skilled administrators serve as the backbone that keeps business-critical services running reliably and securely.

The field draws on knowledge from computer science, electrical engineering, and information security. Network administrators must understand the OSI and TCP/IP models that govern data communication, as well as protocols such as DNS, DHCP, HTTP, and BGP that enable the internet and enterprise networks to function. Systems administrators, meanwhile, must be proficient in operating systems like Linux and Windows Server, virtualization platforms such as VMware and Hyper-V, and increasingly in containerization technologies like Docker and Kubernetes. The convergence of these skill sets reflects the modern reality that networks and systems are deeply interdependent.

In recent years, the role has evolved significantly with the rise of cloud computing, infrastructure as code, and DevOps practices. Traditional on-premises administration is now complemented by cloud platform management on services like AWS, Azure, and Google Cloud. Automation tools such as Ansible, Terraform, and PowerShell have transformed routine tasks, shifting the profession from manual configuration toward programmable infrastructure. This evolution demands that modern administrators combine traditional networking and systems knowledge with scripting, automation, and security skills to manage hybrid and multi-cloud environments effectively.

You'll be able to:

  • Design scalable network architectures using VLANs, subnetting, and routing protocols for enterprise environments
  • Apply configuration management tools to automate server provisioning, patching, and compliance monitoring at scale
  • Evaluate monitoring and alerting strategies that ensure high availability and rapid incident response across distributed systems
  • Analyze directory services and authentication protocols including LDAP, Kerberos, and RADIUS for centralized access control

One step at a time.

Key Concepts

TCP/IP Model

The foundational four-layer communication protocol suite (Network Interface, Internet, Transport, Application) that governs how data is packaged, addressed, transmitted, routed, and received across the internet and local networks.

Example: When a user visits a website, data flows through the Application layer (HTTP), Transport layer (TCP establishing a reliable connection on port 80 or 443), Internet layer (IP routing packets across networks), and Network Interface layer (Ethernet frames on the local network).

DNS (Domain Name System)

A hierarchical, distributed naming system that translates human-readable domain names into IP addresses, enabling users to access resources by name rather than by numerical address. It uses a system of authoritative name servers and recursive resolvers.

Example: When a user types 'www.example.com' into a browser, the DNS resolver queries root servers, then .com TLD servers, then the authoritative server for example.com, ultimately returning the IP address 93.184.216.34.

DHCP (Dynamic Host Configuration Protocol)

A network management protocol that automatically assigns IP addresses, subnet masks, default gateways, and other network configuration parameters to devices on a network, eliminating the need for manual configuration of each host.

Example: When a laptop connects to a corporate Wi-Fi network, the DHCP server automatically assigns it an IP address of 192.168.1.105, a subnet mask of 255.255.255.0, and a gateway of 192.168.1.1, allowing it to communicate immediately.

Active Directory

A Microsoft directory service that provides centralized authentication, authorization, and directory services for Windows-based networks. It organizes resources into a hierarchical structure of domains, organizational units, and group policies.

Example: An administrator creates a Group Policy Object in Active Directory that enforces a password complexity policy across all 500 user accounts in the organization, requiring passwords of at least 12 characters with mixed character types.

Virtualization

The technology that creates abstracted, virtual versions of physical hardware resources such as servers, storage devices, and networks, allowing multiple virtual machines to run on a single physical host, improving resource utilization and flexibility.

Example: A single physical server running VMware ESXi hosts five virtual machines: a web server, a database server, a mail server, a file server, and a development environment, each with its own operating system and isolated resources.

Firewall

A network security device or software that monitors and filters incoming and outgoing network traffic based on predefined security rules, establishing a barrier between trusted internal networks and untrusted external networks such as the internet.

Example: A network administrator configures a firewall rule to allow inbound HTTPS traffic on port 443 to the web server while blocking all other inbound connections from the internet, reducing the attack surface.

RAID (Redundant Array of Independent Disks)

A data storage virtualization technology that combines multiple physical disk drives into a single logical unit for the purposes of data redundancy, performance improvement, or both, using techniques like striping, mirroring, and parity.

Example: A file server uses RAID 5 with four 2TB drives, providing 6TB of usable storage with single-disk fault tolerance. When one drive fails, the data is reconstructed from parity information while the server continues operating.

VPN (Virtual Private Network)

A technology that creates a secure, encrypted tunnel over a public network such as the internet, enabling remote users or branch offices to access private network resources as if they were directly connected to the local area network.

Example: A remote employee connects to the company's OpenVPN server, creating an encrypted tunnel that allows them to access internal file shares, databases, and intranet applications from their home office as if they were on-site.

More terms are available in the glossary.

Explore your way

Choose a different way to engage with this topic β€” no grading, just richer thinking.

Explore your way β€” choose one:

Explore with AI β†’

Concept Map

See how the key ideas connect. Nodes color in as you practice.

Worked Example

Walk through a solved problem step-by-step. Try predicting each step before revealing it.

Adaptive Practice

This is guided practice, not just a quiz. Hints and pacing adjust in real time.

Small steps add up.

What you get while practicing:

  • Math Lens cues for what to look for and what to ignore.
  • Progressive hints (direction, rule, then apply).
  • Targeted feedback when a common misconception appears.

Teach It Back

The best way to know if you understand something: explain it in your own words.

Keep Practicing

More ways to strengthen what you just learned.

Network and Systems Administration Adaptive Course - Learn with AI Support | PiqCue