CompTIA Network+ N10-007


About this course
The CompTIA Network+ course prepares the student to take the CompTIA Network+ N10-007 certification exam. It covers all exam (N10-007) objectives and additional topics that provide background and context. Demonstrations and instructor commentary throughout the course come from real-world experience. Included are examples and tips that the network professional can use in a production network environment. This course is ideal for an individual developing a career in an IT infrastructure group. During this network course, you will learn concepts that cover troubleshooting, network management, installation and configuration of networks. Provided CompTIA certifications are vendor-neutral, students will be able to validate his/her skill set in working with network concepts across multiple vendors.
Course Outline
Module 1 – Networking Concepts
1.1 Basic Networking
You will explain basic networking.
Topics:
• Intro to networking
• Networking architectures
• Activity Basic Networking
1.2 OSI Model
You will explain devices, applications, protocols, and services at their appropriate OSI layers.
Topics:
• Layer 7 – Application
• Layer 6 – Presentation
• Layer 5 – Session
• Layer 4 – Transport
• Layer 3 – Network
• Layer 2 – Data Link
• Layer 1 – Physical
• Activity Exploring the OSI Model
1.3 Protocols and Ports
You will explain the purposes and uses of ports and protocols.
Topics:
• Protocols and ports overview
• Activity Examining Protocols and Ports
• Connection-oriented vs. connectionless
• Transmission Control Protocol (TCP)
• User Datagram Protocol (UDP)
• Activity Comparing TCP and UDP
• Internet Protocol (IP)
• Internet Control Messaging Protocol (ICMP)
• Internet Group Messaging Protocol (IGMP)
• Activity Examining the Lower Layer Protocols
• Layer 7 Remote Control Protocols
• Layer 7 File Transfer Protocols
• Layer 7 Messaging Protocols
• Activity Examining Messaging Protocols
• Layer 7 Web Traffic Protocols
• Layer 7 Streaming Media Protocols
• Layer 7 Infrastructure Management Protocols
1.4 Switching
You will explain the concepts and characteristics of switching.
Topics:
• Packet-switched vs. circuit-switched networks
• Properties of Network Traffic
• Contention Management
• Activity Creating Collision and Broadcast Domains
• Interface Properties and Segmentation
• Activity Creating a Basic Network Segment
• Switching prt 2
• Activity Switching
• Switching Loop Management
• Activity Managing Switching Loops
• VLANs
• Activity Creating VLANs
1.5 Routing
You will explain the concepts and characteristics of routing.
Topics:
• ARP
• Activity Examining ARP
• IP Addressing Basics
• Activity Configuring IP
• Routers
• Activity Setting Up a Router
• Routing Basics
• Activity Adding Static Routes
• VLAN Routing
• Activity Routing Between VLANs
• NAT/PAT
• Activity Configuring NAT/PAT
• Routing Protocols
• Activity Configuring a Routing Protocol
• Firewalls
• Activity Configuring Firewalls
1.6 Advanced Switching and Routing Concepts
You will explain advanced switching and routing concepts.
Topics:
• IPv6 Concepts
• Activity Exploring IPv6
• Performance Concepts
• Distributed Switching
• Software-defined Networking
1.7 IP Addressing
You will, given a scenario, configure the appropriate IP addressing components.
Topics:
• Public vs. Private
• Loopback and Reserved
• Subnet Mask
• Default Gateway
• Virtual IP
• Subnetting
• Activity Learning to Subnet
• Address Assignments
1.8 Network Types and Topologies
You will compare and contrast the characteristics of network topologies, types and technologies.
Topics:
• Wired Topologies
• Wireless Topologies
• Network Types
• Technologies that Facilitate the Internet Of Things (IoT)
• (No activity for this chapter)
1.9 Wireless Technologies
You will, given a scenario, implement the appropriate wireless technologies and configurations.
Topics:
• Radio Basics
• 802.11 Standards
• Wi-Fi Frequencies
• Wi-Fi Antenna Concepts
• Bluetooth
• Cellular
• Site Surveys
• Activity Using an RF Spectrum Analyzer
1.10 Cloud Concepts
You will summarize cloud concepts and their purposes.
Topics:
• Types of Services
• Cloud Delivery Models
• Security Implications/Considerations
• Activity Exploring Cloud Services
1.11 Network Services
You will explain the functions of network services.
Topics:
• DNS Service
• Activity Setting up DNS
• DHCP Service
• Activity Setting Up DHCP
• NTP
• IPAM
Module 2 – Infrastructure
2.1 Cabling Solutions
You will, given a scenario, deploy the appropriate cabling solution.
Topics:
• Media Types
• Activity Testing a Fiber Optic Cable
• Plenum vs. PVC
• Connector Types
• Activity Crimping on an RJ-45 Connector
• Transceivers
• Termination Points
• Activity Terminating Cable to a 110 Block
• Copper Cable Standards
• Copper Termination Standards
• Activity Creating a Crossover Cable
• Ethernet Deployment Standards
2.2 Network Device Placement and Installation
You will, given a scenario, determine the appropriate placement of networking devices on a
network and install/configure them.
Topics:
• Network Interface
• Repeater
• Hub
• Bridge
• Switch
• Router
• Modem
• Wireless Access Point
• Activity Setting up a WAP
• Firewall
• Media Converter
• Wireless Range Extender
• VoIP Endpoint
2.3 Advanced Network Devices
You will explain the purposes and use cases for advanced networking devices.
Topics:
• Multilayer Switch
• Wireless Controller
• Load Balancer
• IDS/IPS
• Proxy Server
• Activity Configuring Proxy Settings
• VPN Concentrator
• AAA/RADIUS Server
• UTM Appliance
• NGFW/Layer 7 Firewall
• VoIP PBX
• VoIP Gateway
• Content Filter
2.4 Virtualization and Network Storage Technologies
You will explain the purposes of virtualization and network storage technologies.
Topics:
• Virtual Networking Components
• Network Storage Types
• Connection Types
• Jumbo Frames
• (No activity for this chapter)
2.5 WAN Technologies
You will compare and contrast WAN technologies.
Topics:
• Service Types
• Transmission Mediums
• Characteristics of Service
• Activity Configuring WAN Links
• Termination
Module 3 – Network Operations
3.1 Documentation
You will, given a scenario, use appropriate documentation and diagrams to manage the
network.
Topics:
• Diagram Symbols
• Standard Operating Procedures/Work Instructions
• Logical vs. Physical Diagrams
• Rack Diagrams
• Change Management Documentation
• Wiring and Port Locations
• IDF/MDF Documentation
• Labeling
• Network Configuration and Performance Baselines
• Inventory Management
• Activity Using Documentation
3.2 Business Continuity and Disaster Recovery
You will compare and contrast business continuity and disaster recovery concepts.
Topics:
• Availability Concepts
• Recovery
• Activity Backing Up Your Data
• MTTR
• MTBF
• SLA Requirements
3.3 Scanning, Monitoring, and Patching
You will explain common scanning, monitoring and patching processes and summarize their
expected outputs.
Topics:
• Processes
• Event Management
• SNMP Monitors
• Metrics
• Activity Testing the Network
3.4 Remote Access Methods
You will, given a scenario, use remote access methods.
Topics:
• VPN
• RDP
• SSH
• VNC
• Telnet
• HTTPS/Management URL
• Remote File Access
• Out-of-Band Management
• Activity Making Remote Connections
3.5 Policies and Best Practices
You will identify policies and best practices.
Topics:
• Privileged User Agreement
• Password Policy
• On-boarding/Off-boarding Procedures
• Licensing Restrictions
• International Export Controls
• Data Loss Prevention
• Remote Access Policies
• Incident Response Policies
• BYOD
• AUP
• NDA
• System Life Cycle
• Safety Procedures And Policies
• Activity Creating Policies and Procedures
Module 4 – Network Security
4.1 Physical Security Devices
You will summarize the purposes of physical security devices.
Topics:
• Detection
• Prevention
• (No activity for this chapter)
4.2 Authentication and Access Control
You will explain authentication and access controls.
Topics:
• Authorization, Authentication, and Accounting
• Multifactor Authentication
• Access Control
• Activity Examining Access Control Mechanisms
4.3 Basic Wireless Network Security
You will, given a scenario, secure a basic wireless network.
Topics:
• WPA
• WPA2
• TKIP-RC4
• CCMP-AES
• Authentication and Authorization
• Geofencing
• Activity Demonstrating the Need for Wireless Security
4.4 Common Network Attacks
You will summarize common networking attacks.
Topics:
• DoS
• Social Engineering
• Insider Threat
• Logic Bomb
• Rogue Access Point
• Evil Twin
• War-driving
• Phishing
• Ransomware
• DNS Poisoning
• ARP Poisoning
• Spoofing
• Deauthentication
• Brute Force
• VLAN Hopping
• Man-in-the-Middle
• Exploits vs. Vulnerabilities
• Activity Conducting a Phishing Attack
4.5 Network Device Hardening
You will, given a scenario, implement network device hardening.
Topics:
• Changing Default Credentials
• Avoiding Common Passwords
• File Hashing
• Generating New Keys
• Activity Supporting Secure Authentication and Encryption
• Upgrading Firmware
• Patching and Updates
• Disabling Unnecessary Services
• Using Secure Protocols
• Disabling Unused Ports
4.6 Common Mitigation Techniques
You will explain common mitigation techniques and their purposes.
Topics:
• Signature Management
• Device Hardening
• Change Native VLAN
• Switchport Protection
• Network Segmentation
• Privileged User Account
• File Integrity Monitoring
• Role Separation
• Restricting Access Via ACLs
• Honeypot/Honeynet
• Penetration Testing
• Activity Implementing a Honeypot
Module 5 – Network Troubleshooting and Tools
5.1 Network Troubleshooting Methodology
You will explain the network troubleshooting methodology.
Topics:
• Identify the Problem
• Establish a Theory of Probable Cause
• Test the Theory to Determine the Cause
• Establish a Plan of Action to Resolve the Problem and Identify Potential Effects
• Implement the Solution or Escalate as Necessary
• Verify Full System Functionality and , if Applicable, Implement Preventive Measures
• Document Findings, Actions, and Outcomes
• (No activity for this chapter)
5.2 Using the Appropriate Tool
You will, given a scenario, use the appropriate tool.
Topics:
• Hardware Tools – Basic Hand Held
• Hardware Tools – Analyzers
• Activity Troubleshooting with Hardware Tools
• Software Tools – Testers and Analyzers
• Activity Troubleshooting with Software Tools
• Software Tools – Command Line
• Activity Using Command Line Tools
5.3 Troubleshoot Wired Connectivity and Performance
You will, given a scenario, troubleshoot common wired connectivity and performance issues.
Topics:
• Signal Issues:
- Attenuation
- Latency
- Jitter
- Crosstalk
- EMI
• Activity Troubleshooting Signal Problems
• Physical Issues:
- Open/short
- Incorrect pin-out
- Incorrect Cable Type
- Bad Port
- Damaged cable
- Bent pins
• Transceiver Issues:
- Transceiver mismatch
- TX/RX reverse
- Duplex/speed mismatch
• Activity Troubleshooting Transceiver Problems
• Traffic Flow Issues:
- Bottleneck
- VLAN mismatch
- Network connection LED status indicators
5.4 Troubleshoot Wireless Connectivity and Performance
You will, given a scenario, troubleshoot common wireless connectivity and performance issues.
Topics:
• Signal Loss:
- Attenuation
- Reflection
- Refraction
- Absorption
• Latency & Jitter
• Antenna Issues:
- Incorrect antenna type
- Incorrect antenna placement
• Incorrect WAP type
• WAP Issues:
- Interference
- Channel overlap
- Overcapacity
- Distance limitations
- Frequency mismatch
- Power levels
- Signal-to-noise ratio
• WAP Misconfiguration:
- Wrong SSID
- Wrong passphrase
- Security type mismatch
- Activity Troubleshooting WAP Issues
5.5 Troubleshoot Common Network Service Issues
You will, given a scenario, troubleshoot common network service issues.
Topics:
• Common Network Issues:
- Physical Connectivity
- Incorrect IP Address
- Incorrect Gateway
- Incorrect Netmask
- Names Not Resolving
- Untrusted SSL Certificate
• DHCP Issues:
- Duplicate IP Addresses
- Expired IP Address
- Rogue DHCP
- Exhausted DHCP Scope
• Firewall/ACL Issues:
- Blocked TCP/UDP Ports
- Incorrect Host-based Firewall Settings
- Incorrect ACL Setting
• Advanced Network Issues:
- DNS Server Issues
- Duplicate MAC Addresses
- Incorrect Time
• Unresponsive Service
• Hardware Failure
• Activity Case Study: Troubleshooting an Unusual Network Issue