(N10-008.AB1) / ISBN : 978-1-64459-325-7
This course includes
Lessons
TestPrep
Hands-On Labs
Instructor Led (Add-on)
AI Tutor (Add-on)
199 Review
Get A Free Trial

Get the support you need. Enroll in our Instructor-Led Course.

Lessons

26+ Lessons | 1025+ Exercises | 208+ Quizzes | 546+ Flashcards | 546+ Glossary of terms

TestPrep

80+ Pre Assessment Questions | 2+ Full Length Tests | 80+ Post Assessment Questions | 160+ Practice Test Questions

Hands-On Labs

35+ LiveLab | 35+ Video tutorials | 01:04+ Hours

Video Lessons

10+ Videos | 02:10+ Hours

1

Introduction

  • Who Should Read This Course?
  • CompTIA Network+ Exam Topics
  • How This Course Is Organized
2

The OSI Model and Encapsulation

  • The Purpose of Reference Models
  • The OSI Model
  • The TCP/IP Stack
  • Real-World Case Study
  • Summary
  • Review All the Key Topics
  • Additional Resources
3

Network Topologies and Types

  • Defining a Network
  • Network Types and Characteristics
  • Networks Defined Based on Resource Location
  • Networks Defined by Topology
  • Virtual Network Concepts
  • Provider Links
  • Real-World Case Study
  • Summary
  • Review All the Key Topics
  • Additional Resources
4

Network Media Types

  • Copper and Fiber Media and Connectors
  • Unshielded Twisted Pair
  • Plenum Versus Nonplenum Cable
  • Multiplexing in Fiber-Optic Networks
  • Cable Management
  • Real-World Case Study
  • Summary
  • Review All the Key Topics
  • Additional Resources
5

IP Addressing

  • Binary Numbering
  • IPv4 Addressing
  • Assigning IPv4 Addresses
  • Subnetting
  • Address Translation
  • IP Version 6
  • Real-World Case Study
  • Summary
  • Review All the Key Topics
  • Additional Resources
6

Common Ports and Protocols

  • Ports and Protocols
  • IP Protocol Types
  • Summary
  • Review All the Key Topics
  • Additional Resources
7

Network Services

  • DHCP
  • DNS
  • NTP
  • Summary
  • Review All the Key Topics
  • Additional Resources
8

Corporate and Datacenter Architectures

  • The Three-Tiered Network Architecture
  • Software-Defined Networking
  • Storage Area Networks
  • Deciding on an Architecture
  • Summary
  • Review All the Key Topics
  • Additional Resources
9

Cloud Concepts

  • Deployment Models
  • Service Models
  • Key Cloud Concepts
  • Summary
  • Review All the Key Topics
  • Additional Resources
10

Various Network Devices

  • Networking Devices
  • Networked Devices
  • Summary
  • Review All the Key Topics
  • Additional Resources
11

Routing Technologies and Bandwidth Management

  • Routing
  • Sources of Routing Information
  • Routing Protocol Characteristics
  • Routing Protocol Examples
  • Bandwidth Management
  • Summary
  • Review All the Key Topics
  • Additional Resources
12

Ethernet Switching

  • Principles of Ethernet
  • Ethernet Switch Features
  • Summary
  • Review All the Key Topics
  • Additional Resources
13

Wireless Standards

  • Introducing Wireless LANs
  • Deploying Wireless LANs
  • Securing Wireless LANs
  • Summary
  • Review All the Key Topics
  • Additional Resources
14

Ensure Network Availability

  • Monitoring Tools
  • Additional Monitoring Topics
  • Summary
  • Review All the Key Topics
  • Additional Resources
15

Organizational Documents and Policies

  • Plans and Policies
  • Hardening and Security Policies
  • Common Documentation
  • Summary
  • Review All the Key Topics
  • Additional Resources
16

High Availability and Disaster Recovery

  • High Availability
  • Real-World Case Study: SOHO Network Design
  • Summary
  • Review All the Key Topics
  • Additional Resources
17

Common Security Concepts

  • Core Security Concepts
  • Authentication Methods
  • Risk Management and SIEM
  • Summary
  • Review All the Key Topics
  • Additional Resources
18

Common Types of Attacks

  • Technology-Based Attacks
  • Human and Environmental Attacks
  • Other Miscellaneous Attacks
  • Summary
  • Review All the Key Topics
  • Additional Resources
19

Network Hardening Techniques

  • Best Practices
  • Wireless Security and IoT Considerations
  • Summary
  • Review All the Key Topics
  • Additional Resources
20

Remote Access Methods

  • Virtual Private Networks (VPNs)
  • Other Remote Access Technologies
  • Authentication and Authorization Considerations
  • In-Band vs. Out-of-Band Management
  • Summary
  • Review All the Key Topics
  • Additional Resources
21

Physical Security

  • Detection Methods
  • Prevention Methods
  • Asset Disposal
  • Summary
  • Review All the Key Topics
  • Additional Resources
22

A Network Troubleshooting Methodology

  • Troubleshooting Basics
  • Summary
  • Review All the Key Topics
  • Additional Resource
23

Troubleshoot Common Cabling Problems

  • Specifications and Limitations
  • Cable Considerations and Applications
  • Common Issues
  • Common Tools
  • Summary
  • Review All the Key Topics
  • Additional Resources
24

Network Software Tools and Commands

  • Software Tools
  • Command Line Tools
  • Basic Network Platform Commands
  • Summary
  • Review All the Key Topics
  • Additional Resource
25

Troubleshoot Common Wireless Issues

  • Specifications and Limitations
  • Considerations
  • Common Issues
  • Wireless Network Troubleshooting
  • Summary
  • Review All the Key Topics
26

Troubleshoot General Network Issues

  • Considerations for General Network Troubleshooting
  • Common Issues
  • Summary
  • Review All the Key Topics
  • Additional Resources

1

The OSI Model and Encapsulation

  • Displaying the Structure of a UDP Segment
  • Displaying the Structure of a TCP Segment
2

Network Topologies and Types

  • Creating a Virtual Switch
4

IP Addressing

  • Configuring a Class A IP Address
  • Configuring a Class B IP Address
  • Configuring a Class C IP Address
  • Creating a Subinterface on a Router and Assigning an IP Address
  • Configuring Network Address Translation
  • Configuring Port Address Translation
6

Network Services

  • Preventing Zone Transfers
  • Configuring Multi-Stratum NTP
9

Various Network Devices

  • Performing a Proxy Server Operation
10

Routing Technologies and Bandwidth Management

  • Configuring Directly Connected Routes
  • Configuring Static Routing
11

Ethernet Switching

  • Creating a VLAN and Viewing its Assignment to Port Mapping
  • Configuring an Access Port
  • Configuring and Viewing a Trunk Port Status
  • Configuring IP and Management Access
13

Ensure Network Availability

  • Configuring Syslog and Viewing Settings on a Router
  • Viewing the Application, Security, and System Logs
  • Viewing Interface Statistics and Status
  • Configuring NetFlow
14

Organizational Documents and Policies

  • Configuring a Default Domain Password Policy
15

High Availability and Disaster Recovery

  • Configuring VRRP
16

Common Security Concepts

  • Examining Asymmetric Encryption
  • Performing Symmetric Encryption
  • Setting Up a Honeypot
17

Common Types of Attacks

  • Cracking a Password
  • Using SET
18

Network Hardening Techniques

  • Implementing Port Security
19

Remote Access Methods

  • Establishing a VPN Connection
23

Network Software Tools and Commands

  • Capturing a Packet Using Wireshark
  • Part I: Command Line Tools
  • Part II: Command Line Tools
  • Part III: Command Line Tools

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact us now

Related Courses

All Course
scroll to top