CertPREP Courseware: CompTIA Network+
🔍 Click to enlarge photo

CertPREP Courseware: CompTIA Network+

Web price: $150.00
Member price: $150.00
Qty

Please select required options above

Description
The CompTIA Network+ Certification ensures that you have in-depth knowledge of how to troubleshoot, configure and manage networks. It's proof that you have the skills to succeed in job roles such as network administrator, system engineer, and network analyst. The goal of this course is to provide you with all the tools you need to prepare for the CompTIA Network+ (N10-007) exam - including 6 months of access to text explanations, video demos, lab activities, self-assessment questions, and a practice exam - to increase your chances of passing the exam on your first try.

Training outline 

Lesson 1

  • What is the purpose of a network?
  • What are some examples of network components?
  • How are networks defined by geography?
  • How are networks defined by topology?
  • How are networks defined by resource location?

Lesson 2

  • What is the purpose of a network model?
  • What are the layers of the OSI model?
  • What are the characteristics of each layer of the OSI model?
  • How does the TCP/IP stack compare to the OSI model?
  • What are the well-known TCP and/or UDP port numbers for a given collection of common applications?

Lesson 3

  • What are the characteristics of various media types?
  • What is the role of a given network infrastructure component?
  • Specialized network devices offer what features?
  • How are virtualization technologies changing traditional corporate data center designs?
  • What are some of the primary protocols and hardware components found in a Voice over IP (VoIP) network?

Lesson 4

  • What are the characteristics of Ethernet networks, in terms of media access, collisions domains, broadcast domains, and distance/speed limitations of various Ethernet standards?
  • Ethernet switches perform what functions? How are these functions related to VLANs, trunks, Spanning Tree Protocol, link aggregation, Power over Ethernet, port monitoring, user authentication, and first-hop redundancy?

Lesson 5

  • How are decimal numbers represented in binary format?
  • What is the format of an IP Version 4 (IPv4) address, and what are the distinctions between unicast, broadcast, and multicast addresses?
  • Which options are available for assigning IP addresses to networked devices?
  • Given a subnet design need (for example, a number of required subnets and a number of required hosts per subnet), how do you decide the right subnet mask for a network?
  • What are the primary characteristics of IPv6?

Lesson 6

  • How are source and destination IP addresses used to route traffic through a network?
  • What are sources for routing information used to populate a router’s routing table?
  • How do routed protocols differ from routing protocols?
  • When multiple routing protocols know how to reach a destination network, which route is chosen?
  • When a single routing protocol knows of multiple routes to reach a destination network, how is the preferred path (or paths) chosen?
  • What is the distinction between an Interior Gateway Protocol (IGP) and an Exterior Gateway Protocol (EGP)?
  • What are the primary differences between distance-vector and link-state routing protocols?
  • What are the characteristics of the following routing protocols? Routing Information Protocol (RIP), Open Shortest Path First (OSPF) protocol, Intermediate System-to-Intermediate System (IS-IS) protocol, Enhanced Interior Gateway Routing Protocol (EIGRP), and Border Gateway Protocol (BGP)
  • How does Network Address Translation (NAT) perform IP address translation, and how do the Port Address Translation (PAT), Static NAT (SNAT), and Dynamic NAT (DNAT) approaches to NAT differ?
  • What protocols are used to route multicast traffic?

Lesson 7

  • What are three categories of wide area network (WAN) connections?
  • How are data rates measured on various WAN technologies?
  • Which types of media (or wireless technologies) might you use in WAN connections?
  • What are the characteristics of the following WAN technologies? Dedicated leased line, digital subscriber line (DSL), cable modem, Synchronous Optical Network (SONET), satellite, plain old telephone service (POTS), Integrated Services Digital Network (ISDN), Frame Relay, Asynchronous Transfer Mode (ATM), and Multiprotocol Label Switching (MPLS)

Lesson 8

  • How do various wireless LAN technologies function, and what wireless standards are in common use?
  • What are some of the most important WLAN design considerations?
  • What WLAN security risks exist, and how can you mitigate those risks?

Lesson 9

  • Why is high availability a requirement in today’s network designs, and what mechanisms can help provide that high availability?
  • What various technologies optimize network performance?
  • What QoS mechanisms can help optimize network performance?
  • Using what you have learned in this and previous Lessons, how do you design a SOHO network based on a set of requirements?

Lesson 10

  • What are some of the more useful Microsoft Windows commands for configuring and troubleshooting network clients and servers?
  • What are some of the more useful UNIX commands for configuring and troubleshooting network clients and servers?

Lesson 11

  • What are some of the more common tools used to physically maintain a network?
  • What are components found in effective network documentation?
  • What sorts of network monitoring tools are available to network adminis-trators, and what types of information are included in various logs?

Lesson 12

  • What are the goals of network security, and what sorts of attacks do you need to defend against?
  • What best practices can be implemented to defend against security threats?
  • What are the characteristics of various remote-access security technologies?
  • How can firewalls be used to protect an organization’s internal network, while allowing connectivity to an untrusted network such as the Internet?
  • How can virtual private networks (VPNs) be used to secure traffic as that traffic flows over an untrusted network?
  • What is the difference between intrusion prevention and intrusion detection systems, and how do they protect an organization from common security threats?

Lesson 13

  • What are the common policies used in the modern network?
  • What are the common best practices?

Lesson 14

  • What are the elements in a structured troubleshooting model?
  • What common physical layer troubleshooting issues might you encounter?
  • What potential Layer 2 issues are you most likely to face when troubleshooting a network containing Ethernet switches?
  • Aside from routing protocol troubleshooting, what Layer 3 troubleshooting issues are common in a routed network?
  • How do characteristics unique to wireless networks impact your troubleshooting of a network containing wireless access points?
  • Student access for each license to the course content and resources for 6 months including:

    • All text, video, and end of lesson questions
    • Lab content (where available)
    • Practice Test