"A Training Solution Provider delivering Learning Skills to keep forever"

Call the JCS training team free now 0800 5425 150 Or mail Email | training@jcstraining.com

CompTIA Network+ Certification Support Skills 5 Days

Course Overview

This 5-day course is intended for those wishing to qualify with CompTIA Network+ Certification. Network+ is foundation-level certification designed for IT professionals with 1 years’ experience whose job role is focused on network administration. CompTIA Network+ is aimed at IT professionals with job roles such as network administrator, network technician, network installer, help desk technician and IT cable installer

 

 

Prerequisites

Students should meet the following criteria prior to taking the course:

Taken and passed both CompTIA A+ Certification exams or have equivalent knowledge and experience

Be able to: Configure and support PC, laptop, mobile (smartphone/tablet), and print devices.

Know basic network terminology and functions (such as Ethernet, TCP/IP, switches, routers).

Configure and manage users, groups, and shared resources in a simple SOHO network.

Understand the use of basic access control measures, such as authentication, security policy, encryption, and firewalls

Delegates will learn how to

  • At the end of this course you will be able to:
  • Identify the basic network theory concepts.
  • Identify the major network communications methods.
  • Describe network media and hardware components.
  • Identify the major types of network implementations.
  • Identify the components of a TCP/IP network implementation.
  • Identify TCP/IP addressing and data delivery methods.
  • Identify the major services deployed on TCP/IP networks.
  • Identify the components of a LAN implementation.
  • Identify the infrastructure of a WAN implementation.
  • Identify the components of a remote network implementation.
  • Identify the major issues and methods to secure systems on a network.
  • Identify the major issues and technologies in network security.
  • Identify network security threats and attacks.
  • Identify the tools, methods, and techniques used in managing a network.
  • Describe troubleshooting of issues on a network.

Outline

Module 1 / Topologies and Infrastructure

Topologies and the OSI Model

Key Features of Networks

Clients and Servers

Network Topologies

The OSI Model

Physical Layer

Data Link Layer

Network Layer

Upper Layers

OSI Model Summary

Ethernet

Media Types and Modulation

Signaling

Media Access Control

Ethernet Frames

Legacy Ethernet Standards

Modern Ethernet Standards

MAC Addressing

Address Resolution Protocol (ARP)

Protocol Analyzers

Labs

Configuring a Network Adapter

Using Hyper-V

ARP and Packet Analysis

Hubs, Bridges, and Switche

Hubs and Bridges

Switches

Managing a Switch

Switch Interface Configuration

Virtual LANs (VLAN)

Spanning Tree Protocol (STP)

Power over Ethernet (PoE)

Infrastructure and Design

Network Infrastructure Implementations

Planning an Enterprise Campus Network

Planning a SOHO Network Installation

Planning an Industrial Control System

TCP/IP Protocol Suite

Module 2 / Addressing and Routing

Internet Protocol

Internet Protocol Basics

Subnet Masks

ipconfig / ifconfig

IP Routing Basics

ICMP and ping

Labs

IP Address Configuration

IPv4 Addressing

IP Addressing Schemes

Subnetting and Classless Addressing

Planning an IP Addressing Scheme

Public Internet Addressing

Multicast and IGMP

Labs

IP Addressing Schemes

DHCP and APIPA

Static versus Dynamic IP Addressing

Configuring DHCP

Labs

Configuring DHCP Clients and Servers

Labs

Configuring DHCP in Windows

Configuring DHCP in Linux
IPv6 Addressing

IPv6 Address Format

IPv6 Addressing Schemes

Configuring IPv6 Addresses

Migrating to IPv6

Labs

IPv6 Addressing

Routing

Routing Basics

Routing Algorithms and Metrics

Routing Protocols

Administrative Distance and Route Redistribution

IPv4 and IPv6 Internet Routing

High Availability Routing

Installing and Configuring Routers

Routing Troubleshooting Tools

Labs

Configuring Routing

Module 3 / Troubleshooting and Management

Transport Protocols

Transmission Control Protocol (TCP)

User Datagram Protocol (UDP)

TCP/IP Ports

netstat

Labs

TCP and Port Scanning
Name Resolution

Host Names and FQDNs

Domain Name System (DNS)

Configuring DNS Servers

nslookup and nbtstat

Labs

Name Resolution

Configuring DNS

Troubleshooting

Troubleshooting Procedures

Identifying the Problem

Establishing a Probable Cause

Establishing a Plan of Action

Troubleshooting Connectivity Issues

Troubleshooting Configuration Issues

Troubleshooting Internetworking

Troubleshooting Services

Applications and Services

TCP/IP Services

HTTP and HTTPS

FTP, TFTP, and SMB

Email (SMTP / POP / IMAP)

VoIP and VTC

Real-time Services Protocols

Quality of Service

Packet Shapers

Load Balancers

Multilayer Switches

Labs

Configuring Email Services

Management and Monitoring

Performance Monitoring

Network Monitoring Utilities

Logs

Analyzing Performance Metrics

Simple Network Management Protocol

Remote Administration Tools

Labs

Performance Testing and Monitoring

Monitoring and Management Tools

Cloud and Virtualization

Virtualization Technologies

Storage Area Networks

Cloud Computing

Module 4 / Installation

Network Sites

Wiring Distribution

Rack Systems

Safety and ESD

Power Management

HVAC (Heating, Ventilation, Air Conditioning)

Physical Security Controls

Fire Prevention and Suppression

Installing Cable

Twisted Pair Cable (UTP / STP / ScTP)

Twisted Pair Connectors

Wiring Tools and Techniques

Cable Testing and Troubleshooting

Other Copper Cable Types

Fiber Optic Cable and Connectors

Media Converters

Troubleshooting Fiber Cable Issues

Installing Wireless Networks

Wireless Standards (IEEE 802.11)

Wireless Network Topologies

Wireless Site Design

Site Surveys and Antenna Placement

Troubleshooting Wireless Links

WAN Technologies

WAN Basics

Telecommunications Networks

Modern Telecommunications Networks

Packet-switched WAN Services

Local Loop Services

Wireless WANs

Remote Access

Remote Access Services (RAS)

Virtual Private Networks (VPN)

PPTP and SSL VPNs

IP Security (IPsec)

Remote Access Servers

Installing Remote Access Links

Troubleshooting WAN Issues

Module 5 / Security

Vulnerabilities and Threats

Security Basics

Social Engineering

Network Reconnaissance

Wireless Security

Network Attack Strategies

Denial of Service

Security Appliances

Network Segmentation

Demilitarized Zones (DMZ)

Network Address Translation

Firewalls

Configuring a Firewall

Proxies and Gateways

Anti-malware Software

Intrusion Detection Systems (IDS)

Labs

Configuring Certificate Services, HTTPS, and FTPS

Configuring a NAT Firewall

Authentication

Authentication Technologies

Cryptographic Hash Functions

NTLM and Kerberos

RADIUS and TACACS+

PAP, CHAP, and EAP

Wi-Fi Authentication

Endpoint Security

Network Access Control

Mobile Device Management

Troubleshooting Authentication and ACLs

Labs

Authentication Methods and VPNs

Incident Response

Business Continuity Concepts

Disaster Recovery Planning

IT Contingency Planning

Training

Incident Response Procedures

Forensic Procedures

Collection of Evidence

Change and Configuration Management

Change and Configuration Management

Documentation

Procedures and Standards

Employee Policies

Patch Management

Backup Plans and Policies