CompTIA Network+ N10-007

CompTIA Network+ N10-007

£159.00 Inc. VAT

Categories: , ,

Description

CompTIA’s Network+ is a vendor-neutral certification that validates technical competency in networking administration and support. The Network Plus certification confirms a technician’s critical knowledge of media and topologies, protocols and standards, network implementation and network support. The exams also cover domains such as security, safety and environmental issues and communication and professionalism.
 
Network+ ensures an IT professional has the knowledge and skills to:
 

  • Design and implement functional networks
  • Configure, manage, and maintain essential network devices
  • Use devices such as switches and routers to segment network traffic and create resilient networks
  • Identify benefits and drawbacks of existing network configurations
  • Implement network security, standards, and protocols
  • Troubleshoot network problems
  • Support the creation of virtualized networks
  •  
    What Skills Will You Learn?

     
    Networking Concepts
    Explain the purpose of a variety of networking concepts and implement them appropriately.
     
    Infrastructure
    Determine and; explain the appropriate cabling, device and storage technologies.
     
    Network Operations
    Use best practices to manage the network, determine policies & ensure business continuity.
     
    Network Security
    Summarize physical security and; common attacks while securing the wired and wireless network.
     
    Network Troubleshooting and; Tools
    Explain the network troubleshooting methodology & appropriate tools to support connectivity and; performance.
     
     
    Course Syllabus (click title below to reveal):
     



    Module 1: Networking Concepts
    1.1 Basic Networking
    • Intro to networking
    • Networking architectures
    • Activity: Basic Networking
    1.2 OSI Model
    • Layer 7 – Application
    • Layer 6 – Presentation
    • Layer 5 – Session
    • Layer 4 – Transport
    • Layer 3 – Network
    • Layer 2 – Data Link
    • Layer 1 – Physical
    • Activity: Exploring the OSI Model
    1.3 Protocols and Ports
    • Protocols and ports overview
    • Activity: Examining Protocols and Ports
    • Connection-oriented vs. connectionless
    • Transmission Control Protocol (TCP)
    • User Datagram Protocol (UDP)
    • Activity: Comparing TCP and UDP
    • Internet Protocol (IP)
    • Internet Control Messaging Protocol (ICMP)
    • Internet Group Messaging Protocol (IGMP)
    • Activity: Examining the Lower Layer Protocols
    • Layer 7 Remote Control Protocols
    • Layer 7 File Transfer Protocols
    • Layer 7 Messaging Protocols
    • Activity: Examining Messaging Protocols
    • Layer 7 Web Traffic Protocols
    • Layer 7 Streaming Media Protocols
    • Layer 7 Infrastructure Management Protocols
    1.4 Switching
    • Properties of Network Traffic
    • Contention Management
    • Activity: Creating Collision and Broadcast Domains
    • Interface Properties and Segmentation
    • Activity: Creating a Basic Network Segment
    • Switching prt 2
    • Activity: Switching
    • Switching Loop Management
    • Activity: Managing Switching Loops
    • VLANs
    • Activity: Creating VLANs
    1.5 Routing
    • ARP
    • Activity: Examining ARP
    • IP Addressing Basics
    • Activity: Configuring IP
    • Routers
    • Activity: Setting Up a Router
    • Routing Basics
    • Activity Adding Static Routes
    • VLAN Routing
    • Activity: Routing Between VLANs
    • NAT/PAT
    • Activity: Configuring NAT/PAT
    • Routing Protocols
    • Activity Configuring a Routing Protocol
    • Firewalls
    • Activity: Configuring Firewalls
    1.6 Advanced Switching and Routing Concepts
    • IPv6 Concepts
    • Activity: Exploring IPv6
    • Performance Concepts
    • Distributed Switching
    • Software-defined Networking
    1.7 IP Addressing
    • Public vs. Private
    • Loopback and Reserved
    • Subnet Mask
    • Default Gateway
    • Virtual IP
    • Subnetting
    • Activity: Learning to Subnet
    • Address Assignments
    1.8 Network Types and Topologies
    • Wired Topologies
    • Wireless Topologies
    • Network Types
    • Technologies that Facilitate the Internet Of Things (IoT)
    1.9 Wireless Technologies
    • Radio Basics
    • 802.11 Standards
    • Wi-Fi Frequencies
    • Wi-Fi Antenna Concepts
    • Bluetooth
    • Cellular
    • Site Surveys
    • Activity: Using an RF Spectrum Analyzer
    1.10 Cloud Concepts
    • Types of Services
    • Cloud Delivery Models
    • Security Implications/Considerations
    • Activity: Exploring Cloud Services
    1.11 Network Services
    • DNS Service
    • Activity: Setting up DNS
    • DHCP Service
    • Activity: Setting Up DHCP
    • NTP
    • IPAM
    Module 2 – Infrastructure
    2.1 Cabling Solutions
    • Media Types
    • Activity: Testing a Fiber Optic Cable
    • Plenum vs.PVC
    • Connector Types
    • Activity: Crimping on an RJ-45 Connector
    • Transceivers
    • Termination Points
    • Activity: Terminating Cable to a 110 Block
    • Copper Cable Standards
    • Copper Termination Standards
    • Activity: Creating a Crossover Cable
    • Ethernet Deployment Standards
    2.2 Network Device Placement and Installation
    • Network Interface
    • Repeater
    • Hub
    • Bridge
    • Switch
    • Router
    • Modem
    • Wireless Access Point
    • Activity Setting up a WAP
    • Firewall
    • Media Converter
    • Wireless Range Extender
    • VoIP Endpoint
    2.3 Advanced Network Devices
    • Multilayer Switch
    • Wireless Controller
    • Load Balancer
    • IDS/IPS
    • Proxy Server
    • Activity Configuring Proxy Settings
    • VPN Concentrator
    • AAA/RADIUS Server
    • UTM Appliance
    • NGFW/Layer 7 Firewall
    • VoIP PBX
    • VoIP Gateway
    • Content Filter
    2.4 Virtualization and Network Storage Technologies
    • Virtual Networking Components
    • Network Storage Types
    • Connection Types
    • Jumbo Frames
    2.5 WAN Technologies
    • Service Types
    • Transmission Mediums
    • Characteristics of Service
    • Activity Configuring WAN Links
    • Termination
    Module 3 – Network Operations
    3.1 Documentation

    • Diagram Symbols
    • Standard Operating Procedures/Work Instructions
    • Logical vs. Physical Diagrams
    • Rack Diagrams
    • Change Management Documentation
    • Wiring and Port Locations
    • IDF/MDF Documentation
    • Labeling
    • Network Configuration and Performance Baselines
    • Inventory Management
    • Activity Using Documentation
    3.2 Business Continuity and Disaster Recovery
    • Availability Concepts
    • Recovery
    • Activity Backing Up Your Data
    • MTTR
    • MTBF
    • SLA Requirements
    3.3 Scanning, Monitoring, and Patching
    • Processes
    • Event Management
    • SNMP Monitors
    • Metrics
    • Activity: Testing the Network
    3.4 Remote Access Methods
    • VPN
    • RDP
    • SSH
    • VNC
    • Telnet
    • HTTPS/Management URL
    • Remote File Access
    • Out-of-Band Management
    • Activity: Making Remote Connections
    3.5 Policies and Best Practices
    • Privileged User Agreement
    • Password Policy
    • On-boarding/Off-boarding Procedures
    • Licensing Restrictions
    • International Export Controls
    • Data Loss Prevention
    • Remote Access Policies
    • Incident Response Policies
    • BYOD
    • AUP
    • NDA
    • System Life Cycle
    • Safety Procedures And Policies
    • Activity: Creating Policies and Procedures
    Module 4 – Network Security
    4.1 Physical Security Devices
    • Detection
    • Prevention
    4.2 Authentication and Access Control
    • Authorization, Authentication, and Accounting
    • Multifactor Authentication
    • Access Control
    • Activity: Examining Access Control Mechanisms
    4.3 Basic Wireless Network Security
    • WPA
    • WPA2
    • TKIP-RC4
    • CCMP-AES
    • Authentication and Authorization
    • Geofencing
    • Activity: Demonstrating the Need for Wireless Security
    4.4 Common Network Attacks
    • DoS
    • Social Engineering
    • Insider Threat
    • Logic Bomb
    • Rogue Access Point
    • Evil Twin
    • War-driving
    • Phishing
    • Ransomware
    • DNS Poisoning
    • ARP Poisoning
    • Spoofing
    • Deauthentication
    • Brute Force
    • VLAN Hopping
    • Man-in-the-Middle
    • Exploits vs. Vulnerabilities
    • Activity Conducting a Phishing Attack
    4.5 Network Device Hardening
    • Changing Default Credentials
    • Avoiding Common Passwords
    • File Hashing
    • Generating New Keys
    • Activity Supporting Secure Authentication and Encryption
    • Upgrading Firmware
    • Patching and Updates
    • Disabling Unnecessary Services
    • Using Secure Protocols
    • Disabling Unused Ports
    4.6 Common Mitigation Techniques
    • Signature Management
    • Device Hardening
    • Change Native VLAN
    • Switchport Protection
    • Network Segmentation
    • Privileged User Account
    • File Integrity Monitoring
    • Role Separation
    • Restricting Access Via ACLs
    • Honeypot/Honeynet
    • Penetration Testing
    • Activity: Implementing a Honeypot
    Module – Network Troubleshooting and Tools
    5.1 Network Troubleshooting Methodology
    • Identify the Problem
    • Establish a Theory of Probable Cause
    • Test the Theory to Determine the Cause
    • Establish a Plan of Action to Resolve the Problem and Identify Potential Effects
    • Implement the Solution or Escalate as Necessary
    • Verify Full System Functionality and , if Applicable, Implement Preventive Measures
    • Document Findings, Actions, and Outcomes
    5.2 Using the Appropriate Tool
    • Hardware Tools – Basic Hand Held
    • Hardware Tools – Analyzers
    • Activity: Troubleshooting with Hardware Tools
    • Software Tools – Testers and Analyzers
    • Activity: Troubleshooting with Software Tools
    • Software Tools – Command Line
    • Activity: Using Command Line Tools
    5.3 Troubleshoot Wired Connectivity and Performance
    • Signal Issues:
    o Attenuation
    o Latency
    o Jitter
    o Crosstalk
    o EMI
    • Activity Troubleshooting Signal Problems
    • Physical Issues:
    o Open/short
    o Incorrect pin-out
    o Incorrect Cable Type
    o Bad Port
    o Damaged cable
    o Bent pins
    • Transceiver Issues:
    o Transceiver mismatch
    o TX/RX reverse
    o Duplex/speed mismatch
    • Activity: Troubleshooting Transceiver Problems
    • Traffic Flow Issues:
    o Bottleneck
    o VLAN mismatch
    o Network connection LED status indicators
    5.4 Troubleshoot Wireless Connectivity and Performance
    • Signal Loss:
    o Attenuation
    o Reflection
    o Refraction
    o Absorption
    • Latency & Jitter
    • Antenna Issues:
    o Incorrect antenna type
    o Incorrect antenna placement
    • Incorrect WAP type
    • WAP Issues:
    o Interference
    o Channel overlap
    o Overcapacity
    o Distance limitations
    o Frequency mismatch
    o Power levels
    o Signal-to-noise ratio
    • WAP Misconfiguration:
    o Wrong SSID
    o Wrong passphrase
    o Security type mismatch
    • Activity Troubleshooting WAP Issues
    5.5 Troubleshoot Common Network Service Issues
    • Common Network Issues:
    o Physical Connectivity
    o Incorrect IP Address
    o Incorrect Gateway
    o Incorrect Netmask
    o Names Not Resolving
    o Untrusted SSL Certificate
    • DHCP Issues:
    o Duplicate IP Addresses
    o Expired IP Address
    o Rogue DHCP
    o Exhausted DHCP Scope
    • Firewall/ACL Issues:
    o Blocked TCP/UDP Ports
    o Incorrect Host-based Firewall Settings
    o Incorrect ACL Settings
    • Advanced Network Issues:
    o DNS Server Issues
    o Duplicate MAC Addresses
    o Incorrect Time
    • Unresponsive Service
    • Hardware Failure
    • Activity Case Study: Troubleshooting an Unusual Network Issue