The CompTIA Network+ is a vendor neutral networking certification that is trusted around the world. It validates the essential knowledge and skills needed to confidently troubleshooting, configure, or maintenance of a wired and wireless network. The Network+ performance based course will help delegates pave their way onto a career in IT Infrastructure and Security.
This course is intended for IT professionals with a basic knowledge of computer hardware, software, and operating systems who wish to increase their knowledge and understanding of networking concepts and acquire the required skills to prepare for a career in network support or administration, or who wish to prepare for the CompTIA Network+ certification (Exam N10-007).
Prerequisites
- Before attending this course, delegates must:
- Hold the CompTIA A+ certification or;
- Have at least 9 to 12 months of networking experience
Gain hands-on experience in networking to pass the CompTIA Network+ certification exam with the CompTIA Network+ course and lab. Interactive lessons and hands-on labs comprehensively cover the N10-008 exam objectives and provide knowledge in areas of networking technologies, including installation, configuration, troubleshooting, peripherals, protocols, and more. The course comes in handy as the CompTIA Network+ study guide which will help you get a full understanding of the challenges you’ll face as a network administrator.
Here’s what you will get
The CompTIA Network+ N10-008 exam verifies that a candidate can assess an enterprise’s network posture, and recommend and implement an appropriate network infrastructure for troubleshooting, configuring, and managing networks. It provides knowledge of various concepts, such as IP addressing, cloud concepts, network services, ethernet switching, network topologies, and many more.
Lessons
26+ Lessons | 1025+ Exercises | 208+ Quizzes | 546+ Flashcards | 546+ Glossary of terms
TestPrep
80+ Pre Assessment Questions | 2+ Full Length Tests | 80+ Post Assessment Questions | 160+ Practice Test Questions
Hand on lab
35+ LiveLab | 35+ Video tutorials | 46+ Minutes
Video Lessons
10+ Videos | 02:12+ Hours
Here’s what you will learn
Lessons 1: Introduction
- Who Should Read This Course?
- CompTIA Network+ Exam Topics
- How This Course Is Organized
Lessons 2: The OSI Model and Encapsulation
- The Purpose of Reference Models
- The OSI Model
- The TCP/IP Stack
- Real-World Case Study
- Summary
- Review All the Key Topics
- Additional Resources
Lessons 3: Network Topologies and Types
- Defining a Network
- Network Types and Characteristics
- Networks Defined Based on Resource Location
- Networks Defined by Topology
- Virtual Network Concepts
- Provider Links
- Real-World Case Study
- Summary
- Review All the Key Topics
- Additional Resources
Lessons 4: Network Media Types
- Copper and Fiber Media and Connectors
- Unshielded Twisted Pair
- Plenum Versus Nonplenum Cable
- Multiplexing in Fiber-Optic Networks
- Cable Management
- Real-World Case Study
- Summary
- Review All the Key Topics
- Additional Resources
Lessons 5: IP Addressing
- Binary Numbering
- IPv4 Addressing
- Assigning IPv4 Addresses
- Subnetting
- Address Translation
- IP Version 6
- Real-World Case Study
- Summary
- Review All the Key Topics
- Additional Resources
Lessons 6: Common Ports and Protocols
- Ports and Protocols
- IP Protocol Types
- Summary
- Review All the Key Topics
- Additional Resources
Lessons 7: Network Services
- DHCP
- DNS
- NTP
- Summary
- Review All the Key Topics
- Additional Resources
Lessons 8: Corporate and Datacenter Architectures
- The Three-Tiered Network Architecture
- Software-Defined Networking
- Storage Area Networks
- Deciding on an Architecture
- Summary
- Review All the Key Topics
- Additional Resources
Lessons 9: Cloud Concepts
- Deployment Models
- Service Models
- Key Cloud Concepts
- Summary
- Review All the Key Topics
- Additional Resources
Lessons 10: Various Network Devices
- Networking Devices
- Networked Devices
- Summary
- Review All the Key Topics
- Additional Resources
Lessons 11: Routing Technologies and Bandwidth Management
- Routing
- Sources of Routing Information
- Routing Protocol Characteristics
- Routing Protocol Examples
- Bandwidth Management
- Summary
- Review All the Key Topics
- Additional Resources
Lessons 12: Ethernet Switching
- Principles of Ethernet
- Ethernet Switch Features
- Summary
- Review All the Key Topics
- Additional Resources
Lessons 13: Wireless Standards
- Introducing Wireless LANs
- Deploying Wireless LANs
- Securing Wireless LANs
- Summary
- Review All the Key Topics
- Additional Resources
Lessons 14: Ensure Network Availability
- Monitoring Tools
- Additional Monitoring Topics
- Summary
- Review All the Key Topics
- Additional Resources
Lessons 15: Organizational Documents and Policies
- Plans and Policies
- Hardening and Security Policies
- Common Documentation
- Summary
- Review All the Key Topics
- Additional Resources
Lessons 16: High Availability and Disaster Recovery
- High Availability
- Real-World Case Study: SOHO Network Design
- Summary
- Review All the Key Topics
- Additional Resources
Lessons 17: Common Security Concepts
- Core Security Concepts
- Authentication Methods
- Risk Management and SIEM
- Summary
- Review All the Key Topics
- Additional Resources
Lessons 18: Common Types of Attacks
- Technology-Based Attacks
- Human and Environmental Attacks
- Other Miscellaneous Attacks
- Summary
- Review All the Key Topics
- Additional Resources
Lessons 19: Network Hardening Techniques
- Best Practices
- Wireless Security and IoT Considerations
- Summary
- Review All the Key Topics
- Additional Resources
Lessons 20: Remote Access Methods
- Virtual Private Networks (VPNs)
- Other Remote Access Technologies
- Authentication and Authorization Considerations
- In-Band vs. Out-of-Band Management
- Summary
- Review All the Key Topics
- Additional Resources
Lessons 21: Physical Security
- Detection Methods
- Prevention Methods
- Asset Disposal
- Summary
- Review All the Key Topics
- Additional Resources
Lessons 22: A Network Troubleshooting Methodology
- Troubleshooting Basics
- Summary
- Review All the Key Topics
- Additional Resource
Lessons 23: Troubleshoot Common Cabling Problems
- Specifications and Limitations
- Cable Considerations and Applications
- Common Issues
- Common Tools
- Summary
- Review All the Key Topics
- Additional Resources
Lessons 24: Network Software Tools and Commands
- Software Tools
- Command Line Tools
- Basic Network Platform Commands
- Summary
- Review All the Key Topics
- Additional Resource
Lessons 25: Troubleshoot Common Wireless Issues
- Specifications and Limitations
- Considerations
- Common Issues
- Wireless Network Troubleshooting
- Summary
- Review All the Key Topics
Lessons 26: Troubleshoot General Network Issues
- Considerations for General Network Troubleshooting
- Common Issues
- Summary
- Review All the Key Topics
- Additional Resources
Hands-on LAB Activities
The OSI Model and Encapsulation
- Displaying the Structure of a UDP Segment
- Displaying the Structure of a TCP Segment
Network Topologies and Types
- Creating a Virtual Switch
IP Addressing
- Configuring a Class A IP Address
- Configuring a Class B IP Address
- Configuring a Class C IP Address
- Creating a Subinterface on a Router and Assigning an IP Address
- Configuring Network Address Translation
- Configuring Port Address Translation
Network Services
- Preventing Zone Transfers
- Configuring Multi-Stratum NTP
Various Network Devices
- Performing a Proxy Server Operation
Routing Technologies and Bandwidth Management
- Configuring Directly Connected Routes
- Configuring Static Routing
Ethernet Switching
- Creating a VLAN and Viewing its Assignment to Port Mapping
- Configuring an Access Port
- Configuring and Viewing a Trunk Port Status
- Configuring IP and Management Access
Ensure Network Availability
- Configuring Syslog and Viewing Settings on a Router
- Viewing the Application, Security, and System Logs
- Viewing Interface Statistics and Status
- Configuring NetFlow
Organizational Documents and Policies
- Configuring a Default Domain Password Policy
High Availability and Disaster Recovery
- Configuring VRRP
Common Security Concepts
- Examining Asymmetric Encryption
- Performing Symmetric Encryption
- Setting Up a Honeypot
Common Types of Attacks
- Cracking a Password
- Using SET
Network Hardening Techniques
- Implementing Port Security
Remote Access Methods
- Establishing a VPN Connection
Network Software Tools and Commands
- Capturing a Packet Using Wireshark
- Part I: Command Line Tools
- Part II: Command Line Tools
- Part III: Command Line Tools
Reviews
There are no reviews yet.