CompTIA Network+ N10-007
CompTIA Network+ N10-007

CompTIA Network+ N10-007

$49
Instructor
Category
Reviews
Rating

About this course

The CompTIA Network+ course prepares the student to take the CompTIA Network+ N10-007 certification exam. It covers all exam (N10-007) objectives and additional topics that provide background and context. Demonstrations and instructor commentary throughout the course come from real-world experience. Included are examples and tips that the network professional can use in a production network environment. This course is ideal for an individual developing a career in an IT infrastructure group. During this network course, you will learn concepts that cover troubleshooting, network management, installation and configuration of networks. Provided CompTIA certifications are vendor-neutral, students will be able to validate his/her skill set in working with network concepts across multiple vendors.

Course Outline

Module 1 – Networking Concepts

1.1 Basic Networking
You will explain basic networking.
Topics:
• Intro to networking
• Networking architectures
• Activity Basic Networking

1.2 OSI Model
You will explain devices, applications, protocols, and services at their appropriate OSI layers.
Topics:
• Layer 7 – Application
• Layer 6 – Presentation
• Layer 5 – Session
• Layer 4 – Transport
• Layer 3 – Network
• Layer 2 – Data Link
• Layer 1 – Physical
• Activity Exploring the OSI Model

1.3 Protocols and Ports
You will explain the purposes and uses of ports and protocols.
Topics:
• Protocols and ports overview
• Activity Examining Protocols and Ports
• Connection-oriented vs. connectionless
• Transmission Control Protocol (TCP)
• User Datagram Protocol (UDP)
• Activity Comparing TCP and UDP
• Internet Protocol (IP)
• Internet Control Messaging Protocol (ICMP)
• Internet Group Messaging Protocol (IGMP)
• Activity Examining the Lower Layer Protocols
• Layer 7 Remote Control Protocols
• Layer 7 File Transfer Protocols
• Layer 7 Messaging Protocols
• Activity Examining Messaging Protocols
• Layer 7 Web Traffic Protocols
• Layer 7 Streaming Media Protocols
• Layer 7 Infrastructure Management Protocols

1.4 Switching
You will explain the concepts and characteristics of switching.
Topics:
• Packet-switched vs. circuit-switched networks
• Properties of Network Traffic
• Contention Management
• Activity Creating Collision and Broadcast Domains
• Interface Properties and Segmentation
• Activity Creating a Basic Network Segment
• Switching prt 2
• Activity Switching
• Switching Loop Management
• Activity Managing Switching Loops
• VLANs
• Activity Creating VLANs

1.5 Routing
You will explain the concepts and characteristics of routing.
Topics:
• ARP
• Activity Examining ARP
• IP Addressing Basics
• Activity Configuring IP
• Routers
• Activity Setting Up a Router
• Routing Basics
• Activity Adding Static Routes
• VLAN Routing
• Activity Routing Between VLANs
• NAT/PAT
• Activity Configuring NAT/PAT
• Routing Protocols
• Activity Configuring a Routing Protocol
• Firewalls
• Activity Configuring Firewalls

1.6 Advanced Switching and Routing Concepts
You will explain advanced switching and routing concepts.
Topics:
• IPv6 Concepts
• Activity Exploring IPv6
• Performance Concepts
• Distributed Switching
• Software-defined Networking

1.7 IP Addressing
You will, given a scenario, configure the appropriate IP addressing components.
Topics:
• Public vs. Private
• Loopback and Reserved
• Subnet Mask
• Default Gateway
• Virtual IP
• Subnetting
• Activity Learning to Subnet
• Address Assignments

1.8 Network Types and Topologies
You will compare and contrast the characteristics of network topologies, types and technologies.
Topics:
• Wired Topologies
• Wireless Topologies
• Network Types
• Technologies that Facilitate the Internet Of Things (IoT)
• (No activity for this chapter)

1.9 Wireless Technologies
You will, given a scenario, implement the appropriate wireless technologies and configurations.
Topics:
• Radio Basics
• 802.11 Standards
• Wi-Fi Frequencies
• Wi-Fi Antenna Concepts
• Bluetooth
• Cellular
• Site Surveys
• Activity Using an RF Spectrum Analyzer

1.10 Cloud Concepts
You will summarize cloud concepts and their purposes.
Topics:
• Types of Services
• Cloud Delivery Models
• Security Implications/Considerations
• Activity Exploring Cloud Services

1.11 Network Services
You will explain the functions of network services.
Topics:
• DNS Service
• Activity Setting up DNS
• DHCP Service
• Activity Setting Up DHCP
• NTP
• IPAM

Module 2 – Infrastructure

2.1 Cabling Solutions
You will, given a scenario, deploy the appropriate cabling solution.
Topics:
• Media Types
• Activity Testing a Fiber Optic Cable
• Plenum vs. PVC
• Connector Types
• Activity Crimping on an RJ-45 Connector
• Transceivers
• Termination Points
• Activity Terminating Cable to a 110 Block
• Copper Cable Standards
• Copper Termination Standards
• Activity Creating a Crossover Cable
• Ethernet Deployment Standards

2.2 Network Device Placement and Installation
You will, given a scenario, determine the appropriate placement of networking devices on a
network and install/configure them.
Topics:
• Network Interface
• Repeater
• Hub
• Bridge
• Switch
• Router
• Modem
• Wireless Access Point
• Activity Setting up a WAP
• Firewall
• Media Converter
• Wireless Range Extender
• VoIP Endpoint

2.3 Advanced Network Devices
You will explain the purposes and use cases for advanced networking devices.
Topics:
• Multilayer Switch
• Wireless Controller
• Load Balancer
• IDS/IPS
• Proxy Server
• Activity Configuring Proxy Settings
• VPN Concentrator
• AAA/RADIUS Server
• UTM Appliance
• NGFW/Layer 7 Firewall
• VoIP PBX
• VoIP Gateway
• Content Filter

2.4 Virtualization and Network Storage Technologies
You will explain the purposes of virtualization and network storage technologies.
Topics:
• Virtual Networking Components
• Network Storage Types
• Connection Types
• Jumbo Frames
• (No activity for this chapter)

2.5 WAN Technologies
You will compare and contrast WAN technologies.
Topics:
• Service Types
• Transmission Mediums
• Characteristics of Service
• Activity Configuring WAN Links
• Termination

Module 3 – Network Operations

3.1 Documentation
You will, given a scenario, use appropriate documentation and diagrams to manage the
network.
Topics:
• Diagram Symbols
• Standard Operating Procedures/Work Instructions
• Logical vs. Physical Diagrams
• Rack Diagrams
• Change Management Documentation
• Wiring and Port Locations
• IDF/MDF Documentation
• Labeling
• Network Configuration and Performance Baselines
• Inventory Management
• Activity Using Documentation

3.2 Business Continuity and Disaster Recovery
You will compare and contrast business continuity and disaster recovery concepts.
Topics:
• Availability Concepts
• Recovery
• Activity Backing Up Your Data
• MTTR
• MTBF
• SLA Requirements

3.3 Scanning, Monitoring, and Patching
You will explain common scanning, monitoring and patching processes and summarize their
expected outputs.
Topics:
• Processes
• Event Management
• SNMP Monitors
• Metrics
• Activity Testing the Network

3.4 Remote Access Methods

You will, given a scenario, use remote access methods.
Topics:
• VPN
• RDP
• SSH
• VNC
• Telnet
• HTTPS/Management URL
• Remote File Access
• Out-of-Band Management
• Activity Making Remote Connections

3.5 Policies and Best Practices
You will identify policies and best practices.
Topics:

• Privileged User Agreement
• Password Policy
• On-boarding/Off-boarding Procedures
• Licensing Restrictions
• International Export Controls
• Data Loss Prevention
• Remote Access Policies
• Incident Response Policies
• BYOD
• AUP
• NDA
• System Life Cycle
• Safety Procedures And Policies
• Activity Creating Policies and Procedures

Module 4 – Network Security

4.1 Physical Security Devices
You will summarize the purposes of physical security devices.
Topics:
• Detection
• Prevention
• (No activity for this chapter)

4.2 Authentication and Access Control
You will explain authentication and access controls.
Topics:

• Authorization, Authentication, and Accounting
• Multifactor Authentication
• Access Control
• Activity Examining Access Control Mechanisms

4.3 Basic Wireless Network Security
You will, given a scenario, secure a basic wireless network.
Topics:
• WPA
• WPA2
• TKIP-RC4
• CCMP-AES
• Authentication and Authorization
• Geofencing
• Activity Demonstrating the Need for Wireless Security

4.4 Common Network Attacks
You will summarize common networking attacks.

Topics:
• DoS
• Social Engineering
• Insider Threat
• Logic Bomb
• Rogue Access Point
• Evil Twin
• War-driving
• Phishing
• Ransomware
• DNS Poisoning
• ARP Poisoning
• Spoofing
• Deauthentication
• Brute Force
• VLAN Hopping
• Man-in-the-Middle
• Exploits vs. Vulnerabilities
• Activity Conducting a Phishing Attack

4.5 Network Device Hardening
You will, given a scenario, implement network device hardening.
Topics:

• Changing Default Credentials
• Avoiding Common Passwords
• File Hashing
• Generating New Keys
• Activity Supporting Secure Authentication and Encryption
• Upgrading Firmware
• Patching and Updates
• Disabling Unnecessary Services
• Using Secure Protocols
• Disabling Unused Ports

4.6 Common Mitigation Techniques
You will explain common mitigation techniques and their purposes.
Topics:

• Signature Management
• Device Hardening
• Change Native VLAN
• Switchport Protection
• Network Segmentation
• Privileged User Account
• File Integrity Monitoring
• Role Separation
• Restricting Access Via ACLs
• Honeypot/Honeynet
• Penetration Testing
• Activity Implementing a Honeypot

Module 5 – Network Troubleshooting and Tools

5.1 Network Troubleshooting Methodology
You will explain the network troubleshooting methodology.
Topics:
• Identify the Problem
• Establish a Theory of Probable Cause
• Test the Theory to Determine the Cause
• Establish a Plan of Action to Resolve the Problem and Identify Potential Effects
• Implement the Solution or Escalate as Necessary
• Verify Full System Functionality and , if Applicable, Implement Preventive Measures
• Document Findings, Actions, and Outcomes
• (No activity for this chapter)

5.2 Using the Appropriate Tool
You will, given a scenario, use the appropriate tool.
Topics:
• Hardware Tools – Basic Hand Held
• Hardware Tools – Analyzers
• Activity Troubleshooting with Hardware Tools
• Software Tools – Testers and Analyzers
• Activity Troubleshooting with Software Tools
• Software Tools – Command Line
• Activity Using Command Line Tools

5.3 Troubleshoot Wired Connectivity and Performance
You will, given a scenario, troubleshoot common wired connectivity and performance issues.
Topics:

• Signal Issues:

  •  Attenuation
  •  Latency
  •  Jitter
  •  Crosstalk
  •  EMI

• Activity Troubleshooting Signal Problems

• Physical Issues:

  • Open/short
  •  Incorrect pin-out
  •  Incorrect Cable Type
  •  Bad Port
  •  Damaged cable
  •  Bent pins

• Transceiver Issues:

  •  Transceiver mismatch
  •  TX/RX reverse
  •  Duplex/speed mismatch

• Activity Troubleshooting Transceiver Problems

• Traffic Flow Issues:

  •  Bottleneck
  •  VLAN mismatch
  •  Network connection LED status indicators

5.4 Troubleshoot Wireless Connectivity and Performance
You will, given a scenario, troubleshoot common wireless connectivity and performance issues.
Topics:

• Signal Loss:

  • Attenuation
  •  Reflection
  •  Refraction
  •  Absorption

• Latency & Jitter

• Antenna Issues:

  •  Incorrect antenna type
  •  Incorrect antenna placement

• Incorrect WAP type

• WAP Issues:

  •  Interference
  •  Channel overlap
  •  Overcapacity
  •  Distance limitations
  •  Frequency mismatch
  •  Power levels
  •  Signal-to-noise ratio

• WAP Misconfiguration:

  •  Wrong SSID
  •  Wrong passphrase
  •  Security type mismatch
  •  Activity Troubleshooting WAP Issues

5.5 Troubleshoot Common Network Service Issues
You will, given a scenario, troubleshoot common network service issues.
Topics:

• Common Network Issues:

  •  Physical Connectivity
  •  Incorrect IP Address
  •  Incorrect Gateway
  •  Incorrect Netmask
  •  Names Not Resolving
  •  Untrusted SSL Certificate

• DHCP Issues:

  •  Duplicate IP Addresses
  •  Expired IP Address
  •  Rogue DHCP
  •  Exhausted DHCP Scope

• Firewall/ACL Issues:

  •  Blocked TCP/UDP Ports
  •  Incorrect Host-based Firewall Settings
  •  Incorrect ACL Setting

• Advanced Network Issues:

  •  DNS Server Issues
  •  Duplicate MAC Addresses
  •  Incorrect Time

• Unresponsive Service
• Hardware Failure
• Activity Case Study: Troubleshooting an Unusual Network Issue

Reviews

0 Rated 0 out of 0 Ratings
5 stars
4 stars
3 stars
2 stars
1 stars

slot jepang