CompTIA Network+ (N10-007) Online Course
Testprep CompTIA Network+ online course will help you to prepare for the CompTIA Network+ (N10-007) exam and covers all the concepts in details which will also help you to become a good Networking Tech Professional.
Course Curriculum
Introduction
- Introduction to the course
Network Models
- What is a Model?
- OSI Model vs. TCP/IP Model
- Walking Through OSI and TCP/IP
- Meet the Frame
- The MAC Address
- Broadcast vs. Unicast
- Introduction to IP Addressing
- Packets and Ports
Cabling and Topology
- Network Topologies
- Coaxial Cabling
- Twisted Pair Cabling
- Cat Ratings
- Fiber Optic Cabling
- Fire Ratings
- Legacy Network Connections
Ethernet Basics
- What is Ethernet?
- Ethernet Frames
- Early Ethernet
- The Daddy of Ethernet: 10BaseT
- Terminating Twisted Pair
- Hubs vs. Switches
Modern Ethernet
- 100BaseT
- Connecting Switches
- Gigabit Ethernet and 10-Gigabit Ethernet
- Transceivers
- Connecting Ethernet Scenarios
Installing a Physical Network
- Introduction to Structured Cabling
- Terminating Structured Cabling
- Equipment Room
- Alternative Distribution Panels
- Testing Cable
- Troubleshooting Structured Cabling, Part 1
- Troubleshooting Structured Cabling, Part 2
- Using a Toner and Probe
- Wired Connection Scenarios
TCP/IP Basics
- Introduction to IP Addressing and Binary
- Introduction to ARP
- Subnet Masks
- Classful Addressing
- Subnetting with CIDR
- More CIDR Subnetting Practice
- Dynamic and Static IP Addressing
- Rogue DHCP Servers
- Special IP Addresses
- IP Addressing Scenarios
Routing
- Introducing Routers
- Understanding Ports
- Network Address Translation
- Implementing NAT
- Forwarding Ports
- Tour of a SOHO Router
- SOHO vs. Enterprise
- Static Routes
- Dynamic Routing
- RIP
- OSPF
- BGP
TCP/IP Applications
- TCP and UDP
- ICMP and IGMP
- Handy Tools
- Introduction to Wireshark
- Introduction to netstat
- Web Servers
- FTP
- E-mail Servers and Clients
- Securing E-mail
- Telnet and SSH
- Network Time Protocol
- Network Service Scenarios
Network Naming
- Understanding DNS
- Applying DNS
- The HOSTS File
- Net Command
- Windows Name Resolution
- Dynamic DNS
- DNS Troubleshooting
Securing TCP/IP
- Making TCP/IP Secure
- Symmetric Encryption
- Asymmetric Encryption
- Cryptographic Hashes
- Identification
- Access Control
- AAA
- Kerberos/EAP
- Single Sign-On
- Certificates and Trust
- Certificate Error Scenarios
Advanced Networking Devices
- Understanding IP Tunneling
- Virtual Private Networks (VPNs)
- Introduction to VLANs
- InterVLAN Routing
- Interfacing with Managed Switches
- Switch Port Protection
- Port Bonding
- Port Mirroring
- Quality of Service
- IDS vs. IPS
- Proxy Servers
- Load Balancing
- Device Placement Scenarios
IPv6
- Intro to IPv6
- IPv6 Addressing
- IPv6 in Action
- IPv4 and IPv6 Tunneling
Remote Connectivity
- Telephony Technologies
- Optical Carriers
- Packet Switching
- Connecting with Dial-up
- Digital Subscriber Line (DSL)
- Connecting with Cable Modems
- Connecting with Satellites
- ISDN and BPL
- Remote Desktop Connectivity
- Advanced Remote-Control Systems
Wireless Networking
- Introduction to 802.11
- 802.11 Standards
- Power Over Ethernet (PoE)
- Antennas
- Wireless Security Standards
- Implementing Wireless Security
- Threats to Your Wireless Network
- Retro Threats
- Wi-Fi Protected Setup (WPS)
- Enterprise Wireless
- Installing a Wireless Network
- Wireless Scenarios
- More Wireless Scenarios
Virtualization and Cloud Computing
- Virtualization Basics
- Cloud Ownership
- Cloud Implementation
- Your First Virtual Machine
- NAS and SAN
- Platform as a Service (PaaS)
- Software as a Service (SaaS)
- Infrastructure as a Service (IaaS)
Mobile Networking
- Cellular Technologies
- Mobile Connectivity
- Deploying Mobile Devices
- Mobile Access Control
Building a Real-World Network
- Network Types
- Network Design
- Power Management
- Unified Communications
- Network Documentation
- Contingency Planning
- Predicting Hardware Failur
- Backups
Managing Risk
- What is Risk Management?
- Security Policies
- Change Management
- User Training
- Standard Business Documentation
- Mitigating Network Threats
- High Availability
Protecting Your Network
- Denial of Service
- Malware
- Social Engineering
- Access Control
- Man-in-the-Middle
- Introduction to Firewalls
- Firewalls
- DMZ
- Hardening Devices
- Physical Security Controls
- Testing Network Security
- Network Protection Scenarios
Network Monitoring
- SNMP
- Documenting Logs
- System Monitoring
- SIEM
Network Troubleshooting
- Network Troubleshooting Theory