CompTIA Network+ (Exam N10-006) Certification Series!
$150.00Read more
Overview: The CompTIA Network+ Certification course builds on existing user-level knowledge and experience with personal computer operating systems and networks to present fundamental skills and concepts that students will use on the job in any type of networking career. If students are pursuing a CompTIA technical certification path, the CompTIA A+ certification is an excellent first step to take before preparing for the CompTIA Network+ certification.
Certification Details
CompTIA Network+ is a vendor neutral networking certification that is trusted around the world. It validates the essential knowledge and skills needed to confidently design, configure, manage and troubleshoot any wired and wireless devices. Recommended experience for this certification is CompTIA A+ Certification and (9) months of networking experience. No prerequisites required.
Certification Exam Details:
CompTIA Network+ N10-006: Learn More about this certification exam.
Series Taught By: Patrick Loner
Available CEUs for Course Series Completion: 0
Students can earn up to 0 CEUs for fully completing this course series. This information will be displayed on the certificate of completion. Learn More
Course Modules:
Module 01 – Network Theory
(Duration: 1h 40m)
- Workbook (Pdf)
- Network Theory
- OSI Model Location
- The IEEE 802.11 Standard
- The OSI and TCP/IP Models
- OSI Layer 7
- OSI Layer 6
- OSI Layer 5
- OSI Layer 4
- OSI Layer 3
- OSI Layer 2
- OSI Layer 1
- LAN Compared with the OSI Model
- TCP/IP Architecture
- Demo – OSI Review
- LANs
- WANs
- Network Coverage Areas
- The Internet
- Intranets
- Extranets
- Enterprise Networks
- Specialized Network Types
- Network Configurations
- Centralized Networks
- Client/Server Networks
- Peer-to-Peer Networks
- Mixed Mode Networks
- Network Topologies
- Frequencies and Overlap of Wireless Channels
- Radio Networking
- Broadcast Radio
- Spread Spectrum
- Infrared Transmission
- Bluetooth
- Microwave Transmission
- Data Transmission
- Analog Signals
- Digital Signals
- Digital Data Transmission
- Unicast Transmission
- Broadcast Transmission
- Multicast Transmission
- Anycast Transmission
- Serial Data Transmission
- Parallel Data Transmission
- Baseband Transmission
- Broadband Transmission
- Transmission Speeds
- Types of Media Access
- Polling
- CSMA/CA
- CSMA/CD
- Multiplexing
- Review Quiz (Number of attempts allowed: Unlimited)
Module 03 – Unbounded Network Media
(Duration: 51m)
- Workbook (Pdf)
- Unbounded Network Media
- The 802.11 Standard
- The 802.11 Family
- 802.11 Networking
- The 802.1x Standard
- The 802.11 Standard (Cont.)
- Channels
- Channel Bonding
- Wireless Access Points
- Wireless Controllers
- Wireless Bridges
- Wireless Antennas
- Wireless Antenna Types
- Wireless Antenna Performance Factors
- SSID Broadcasts
- MIMO
- Configuration Options
- Configuring Wireless Clients
- Demo- Setting Up Wi-Fi
- Access Point
- Device Compatibility
- Troubleshooting Connections
- Common Problems
- Major Wireless Protocols
- Review Quiz (Number of attempts allowed: Unlimited)
Module 05 -TCP/IP Addressing and Data Delivery
(Duration: 2h)
- Workbook (Pdf)
- TCP/IP Addressing and Data Delivery
- Network Communication Protocols
- TCP
- TCP Three-way Handshake
- Internet Protocol (IP)
- UDP
- Protocols
- Demo- Examining Ports and Protocols
- The TCP/IP Model
- Encapsulation on TCP/IP Networks
- Connection-Oriented and Connectionless Protocols
- The Three-Way Handshake
- ICMP
- IGMP
- ARP
- Protocol Analyzers
- IPv4
- Subnet Masks
- Network IDs
- IPv4 Subnet Masks
- IPv4 Custom Subnets
- Routing Example
- Demo- Examining IP Settings
- Classful IPv4 Addresses
- Special Addresses
- APIPA
- Default Gateway
- CIDR
- CIDR Address
- Demo- Convert Binary
- IPv6
- IPv6 Address Types
- IPv6 Address Scopes
- IPv6 Subnets
- IPv6 Custom Subnets
- IPCONFIG and IFCONFIG
- Connections
- Flow Control
- Buffering
- Data Windows
- Error Detection
- Parity Checking
- Cyclic Redundancy Checking
- Review Quiz (Number of attempts allowed: Unlimited)
Module 07 -TCP/IP Services
(Duration: 1h 20m)
- Workbook (Pdf)
- TCP/IP Services
- TCP
- Data Transmission on IP Networks
- Static and Dynamic IP Addressing
- Static IP Address Assignment
- APIPA
- IP Configuration Utilities
- DHCP
- Port Addresses
- Service Port Numbers
- Demo- Port Numbers
- Demo- netstat
- DHCP and DHCPv6
- IPv4 Lease Process
- IPv6 Lease Process
- IPv6 Router Flags
- Demo- DHCP
- FQDN
- Name Resolution
- DNS
- DNS Components
- Types of DNS Servers
- Types of DNS Records
- The DNS Hierarchy
- The DNS Name Resolution Process
- Legacy Name Resolution Methods
- DNS (Cont.)
- Top-level Domains
- DNS Namespace
- DNS Records
- Demo- Examining DNS
- Transport-layer Protocols
- M and O Flags
- UDP
- IP
- Static IP Addressing
- Review Quiz (Number of attempts allowed: Unlimited)
Module 09 – Cloud and Virtualization Technologies
(Duration: 57m)
- Workbook (Pdf)
- Cloud and Virtualization Technologies
- Types of Server Virtualization
- Virtual NICs
- Virtual Switches
- Virtual Firewalls
- Virtual PBX
- SANs
- Virtual Computers
- Virtualization Concerns and Risks
- Demo- Viewing VM Components
- Fibre Channel
- iSCSI
- NAS
- Jumbo Frames
- Cloud Concepts
- Cloud Computing Features
- Cloud Computing Implementations
- IaaS
- SaaS
- PaaS
- IDaaS
- NaaS
- Cloud Computing
- Cloud Deployment
- Cloud Categories
- Risks and Concerns
- Review Quiz (Number of attempts allowed: Unlimited)
Module 11 -Preventing Security Breaches
(Duration: 2h 3m)
- Workbook (Pdf)
- Preventing Security Breaches
- CIA Triad
- Security Factors
- Non-repudiation
- Least Privilege
- Risks
- Data Breaches
- Unauthorized Access
- Hackers and Attackers
- Security Controls
- Security Policies
- Common Security Policy Types
- Adherence to Standards and Policies
- Windows Security Policies
- Group Policy
- Permissions
- Segmentation
- Wireless Security
- Disaster Recovery
- Single Point of Failure
- Vulnerabilities
- Physical Security Threats and Vulnerabilities
- Environmental Threats and Vulnerabilities
- Unnecessary Running Services
- Open Ports
- Unpatched and Legacy Systems
- Unencrypted Channels
- Cleartext Credentials
- Unsecure Protocols
- Radio Frequency Emanation
- Network Access Control
- Access Control Lists
- NAT
- Threats
- Attacks
- Data Theft
- Social Engineering Attacks
- Types of Social Engineering Attacks
- Insider Threats
- Malware Attacks
- Types of Malware Attacks
- Types of Viruses
- Effect of Malware on the Network
- Compromised Systems
- Buffer Overflows
- Password Attacks
- Types of Password Attacks
- Packet and Protocol Abuse
- IP Spoofing Attacks
- DoS Attacks
- Types of DoS Attacks
- Man-in-the-Middle Attacks
- Session Hijacking Attacks
- Port Scanning Attacks
- Replay Attacks
- FTP Bounce Attacks
- ARP Cache Poisoning Attacks
- VLAN Hopping
- Zero Day Attacks
- Wireless Threats and Attacks
- Firewalls and Proxies
- Firewall Categories
- Security Zones
- Intranet Zone
- Perimeter Network
- DMZ Options
- Screened Host
- Bastion Host
- Three-homed Firewall
- Back-to-back Firewalls
- Dead Zone
- Traffic Filtering
- NAT and PAT
- Port Address Translation
- Firewall Administration
- Rule Planning
- Port Security
- Intrusion Detection
- Events
- NIDS
- IDScenter for Snort
- Example Snort Rule
- HIDS
- Advantages of HIDS over NIDS
- Authentication
- Authentication Factors
- User Name and Password Authentication
- Two-Factor Authentication
- Multifactor Authentication
- Strong Passwords
- Patch Management
- Security Policies (Cont.)
- SSH
- Demo – Network Security
- Securing the Operating System
- Windows Update
- Updates
- Demo – Vulnerability
- Honeypots and Honeynets
- Honeypot Examples
- Honeypot Deployment
- Account Expiration
- Education
- Communication
- User Awareness
- Review Quiz (Number of attempts allowed: Unlimited)
Module 13 – Remote Networking
(Duration: 28m)
- Workbook (Pdf)
- Remote Networking
- RADIUS
- RADIUS Authentication
- TACACS+ vs. RADIUS
- Remote Desktop Services
- RADIUS (Cont.)
- VPN Technologies
- VPN Security Models
- VPN Protocols
- PPTP vs. L2TP
- IPSec Protocols
- IPSec Encryption
- PPPoE
- Tunneling Protocols
- Review Quiz (Number of attempts allowed: Unlimited)
Module 15 -Troubleshooting Network Issues
(Duration: 2h 27m)
- Workbook (Pdf)
- Troubleshooting Network Issues
- Common Problems
- Troubleshooting
- Troubleshooting Models
- The Network+ Troubleshooting Model
- Troubleshooting Documentation Template
- Change Management
- Configuration Documentation
- Rationales
- Methods
- Troubleshooting with IP Configuration Utilities
- The ping Utility
- The traceroute and tracert Utilities
- The arp Utility
- The NBTSTAT Utility
- The NETSTAT Utility
- The nslookup Utility
- WLAN Survey Software
- SNIPS
- Loopback Interface
- Speed Test Sites
- Looking Glass Sites
- Demo- Troubleshooting a Switch
- Demo- Troubleshooting a Router
- Network Technician’s Hand Tools
- Hardware Toolkit
- Additional Tools
- Software Toolkit
- Cable Testing Devices
- Cable Testing Device
- Physical Cable Tests
- Network Function Tests
- Cable Certifier
- Additional Features
- Testing a Basic Permanent Link
- Crimpers
- Coax Crimper
- Twisted-pair Cable Crimper
- Using a Fiber Optic Cable Crimper
- Terminating Fiber Optic Cable
- Butt Set
- Butt Set Uses
- Modapt Device
- Toner Probe
- Using a Toner Probe
- Punchdown Tools
- Using a Punchdown Tool
- Network Analyzer
- Loopback Plugs
- TDR
- OTDR
- Multimeters
- Measuring Resistance
- Measuring Voltage
- Measuring Current
- Measuring Continuity
- Environmental Monitor
- ASHRAE 9.9 Guidelines
- Safety Rules
- Wire Crimpers
- Cable Strippers
- Punch Down Tools (Cont.)
- Circuit Testers
- Multimeters (Cont.)
- Voltmeters
- Cable Testers
- Cable Certifiers
- Types of Cable Testers and Certifiers
- Crossover Cables
- Hardware Loopback Plugs
- Time-Domain Reflectometers
- Tone Generators and Tone Locators
- Environment Monitors
- Butt Sets
- LED Indicators
- Network Analyzers
- Demarc
- Wireless Testers
- Light Meters
- Physical Issues
- Logical Issues
- Routing and Switching Issues
- Wireless Issues
- Simultaneous Wired/Wireless Connections
- Discovery of Neighboring Devices and Nodes
- Common Security Configuration Issues
- Misconfigured Firewalls
- Misconfigured ACLs and Applications
- Open or Closed Ports
- Authentication Issues
- Domain or Local Group Configuration
- Malware
- DoS Attacks
- ICMP-Related Issues
- Malicious Users
- Improper Access
- ARP Issues
- Banner Grabbing
- Jamming
- Troubleshooting Wired Connections
- Antivirus Software
- Review Quiz (Number of attempts allowed: Unlimited)
Module 02 -Bounded Network Media
(Duration: 1h 24m)
- Workbook (Pdf)
- Bounded Network Media
- Twisted-pair Cable
- Common UTP Categories
- Additional TP Categories
- Stranded vs. Solid
- Straight-through, Cross-over, Rollover
- Pin Numbering of RJ-45 Connector
- T1 Crossover Cable
- Coaxial Cable
- RG Standards
- Single-mode Fiber to UTP
- Broadband Over Power Line
- Access BPL
- BPL Modem
- Twisted-pair Connectors
- Pin Numbering of RJ-45 Connector (Cont.)
- Serial Connectors
- Serial Cable
- Serial Console Connections
- Serial Cable Types
- Serial Data Rates
- Typical UTP Installation
- Fiber Optic Cable
- Fiber Optic Connectors
- Fiber Optic Connector Types
- Thinnet Connectors
- Terminating Coax with BNC
- RG-6 and RG-59 Connectors
- Plenums
- Media Converters
- Telecommunications Room
- Termination Choices
- Punchdown Block
- Wire Placement
- Cross-connects
- MDF to IDF Connections
- Workstation Drops
- Classifying Network Components
- Review Quiz (Number of attempts allowed: Unlimited)
Module 04 -Network Implementations
(Duration: 4h 9m)
- Workbook (Pdf)
- Network Implementations
- Repeaters
- Repeater Placement
- Wireless Repeater
- Repeater Operation
- Limitations of Repeaters
- Local Area Networks
- Network Topologies
- Logical Network Topologies
- Peer-to-peer Model
- Decentralized
- Peer-to-peer Authentication
- Client/Server Model
- A Client/Server LAN
- Client/Server Authentication
- Star Topology
- Bus Topology
- Ring Topology
- Mesh Topology
- Hybrid Topology
- Point-to-point vs. Point-to-multipoint
- MPLS
- Demo – Topology
- NICs
- Transceivers
- IEEE 802.x Standards
- Ethernet (IEEE 802.3)
- Ethernet Frames
- MAC Addresses
- The 10Base Standards
- Fast Ethernet
- Gigabit Ethernet
- 10 Gigabit Ethernet
- PoE
- Ethernet Hub
- Ethernet
- Ethernet Media
- 10-Gigabit Ethernet Standards
- Gigabit Ethernet Standards
- Fast Ethernet Standards
- 10BASE-T
- Ethernet Bonding
- Data Transmission
- Data Collisions
- Channel Access Methods
- Demo – LAN Cable Types
- Network Access Points
- LAN Installation Components
- MAC Address
- Switches
- Routers
- Types of Routers
- Gateways
- Firewalls
- Analog Modems
- Network Controllers
- Legacy Network Connectivity Devices
- Collision and Broadcast Domains
- Switches and Network Performance
- Switch Types and Operating Modes
- STP (IEEE 802.1d)
- Internetworking Devices
- Bridges
- Bridge Operation
- Bridge Types
- Bridge Routing Management
- Bridge Filtering and Intelligence
- Local and Remote Bridges
- Layer 2 Switch
- Configurations for Switched Networks
- Switched Network with Bottlenecks
- Switched Network without Bottlenecks
- Benefits of Switches
- Higher-level Switches
- Managed Layer 3 Switch
- Installing Routers and Switches
- Demo- Routing NAT
- Label Edge Routers
- Networking Appliances
- Demo- The Purpose of Network Devices
- Demo- Interface Monitoring
- Demo- Interface Configuration
- VLANs
- VLAN Assignment
- Port Mirroring
- Trunking
- IEEE 802.1q
- VLAN Pooling Virtual LAN
- VLAN Filtering
- VLAN Trunking
- Trunking Example
- Demo- Intro to Routing and Switching VLANs
- Spanning Tree
- Demo- Spanning Tree
- Demo- Packet Tracing
- Internet Service Providers (ISPs)
- Small ISPs
- Regional ISP
- Typical UTP Installation
- Telecommunications Room
- Standards
- Review Quiz (Number of attempts allowed: Unlimited)
Module 06 -Routing
(Duration: 1h 17m)
- Workbook (Pdf)
- Routing
- Routes
- Comparing Routing and Switching
- The IP Data Packet Delivery Process
- The Local and Remote Delivery Process
- Static Routing
- Routing Tables
- Static Routing Tables
- Routing Table Entries
- Routing Entry Components
- The Route Command
- The Routing Process
- Autonomous Systems
- Router Roles in Autonomous Systems
- Routing Methods in Autonomous Systems
- Dynamic Routing
- Comparing Static and Dynamic Routing
- Distance
- Vector Routing
- Link-State Routing
- Comparing Distance-Vector and Link-State Routing
- Routers
- Router Operation
- About Routers
- Router Features
- Types of Routers
- Routing Table Contents
- Routing Metrics
- Routing Examples
- Brouters
- Bridges vs. Routers
- Virtual Routers
- Hybrid Routing
- Path-Vector Routing
- Route Convergence
- Routing Loops
- Count-to-Infinity Loops
- Split Horizon and Poison Reverse
- Router Discovery Protocols
- Link State Routing Protocols
- Review Quiz (Number of attempts allowed: Unlimited)
Module 08 -WAN Infrastructure
(Duration: 1h 4m)
- Workbook (Pdf)
- WAN Infrastructure
- Key Points
- Wide Area Networks
- Packet vs. Circuit Switching
- Demo- Packet Switching
- WAN Connections
- QoS
- Mobile Devices
- Cable Internet Access
- MPLS
- DSL
- Metro-Ethernet
- POTS/PSTN
- ISDN
- DSL (Cont.)
- Cable
- Satellite
- Wireless
- WiMAX
- Cellular
- T and E Lines
- X.25 and Frame Relay
- ATM
- SONET and SDH
- DWDM
- PON
- Voice-over-Data Systems
- VoIP
- VoIP Protocols
- VoIP Software
- Video Conferencing
- Review Quiz (Number of attempts allowed: Unlimited)
Module 10 -Network Security Basics
(Duration: 1h 43m)
- Workbook (Pdf)
- Network Security Basics
- Wireless Security
- Transmission Encryption
- Demo- Wireless Security
- Business Continuity
- Disposal and Destruction
- AAA
- Authentication Factors
- One-factor Authentication
- Two-factor Authentication
- Three-factor Authentication
- Single Sign-on
- Kerberos
- Kerberos System Components
- Kerberos Data Types
- Kerberos Authentication Process
- CHAP
- EAP
- PPPoE
- Mutual Authentication
- Cryptography
- ROT13 Cipher
- Wireless Security Threats
- Vulnerabilities of Access Points
- Wi-Fi Scanners
- War Chalking Symbols
- Denial-of-Service Attacks
- Distributed DoS Attacks
- DDoS Countermeasures
- Man-in-the-Middle Attacks
- Buffer Overflow
- FTP Bounce Attacks
- Smurf Attacks
- Malware
- Social Engineering
- Attack Types
- Social Engineering Countermeasures
- TACACS+
- 802.1x
- Tokens
- Biometrics
- Mutual Authentication (Cont.)
- SSO
- EAP (Cont.)
- Kerberos (Cont.)
- Wireless Authentication Methods
- Password Management
- Keys
- Symmetric Encryption in Action
- Public Key Cryptography
- Asymmetric Encryption in Action
- Demo – Encryption
- Public Key Cryptography (Cont.)
- Public Key Infrastructure
- Setup and Initialization Phase
- Encryption
- Encryption and Security Goals
- Hashing Encryption
- Key-Based Encryption
- Digital Certificates
- Certificates and Encryption
- Encryption Devices
- Benefits of Encryption Devices
- SSL and Encryption
- TLS
- Wireless Encryption Protocols
- Review Quiz (Number of attempts allowed: Unlimited)
Module 12-Responding to Security Incidents
(Duration: 4m)
- Workbook (Pdf)
- Responding to Security Incidents
- Human Resources Policies
- Incident Response Policy
- Preparation
- Detection
- Containment
- Eradication
- Recovery
- Follow-up
- Review Quiz (Number of attempts allowed: Unlimited)
Module 14 -Network Management
(Duration: 1h 1m)
- Workbook (Pdf)
- Network Management
- Acceptable Use
- Due Care
- Privacy
- Separation of Duties
- Need to Know
- Service-level Agreement
- Network Analyzer
- TCP/IP Utilities
- IPConfig
- Ifconfig
- Ping (Packet Internet Groper)
- Ping Troubleshooting
- NSLookup and Tracert
- Demo- Software Tools
- Performance Monitor
- Performance Objects
- Bottlenecks
- Configuration
- Event Viewer
- Event Information
- Event Types
- Device and Application Logging
- Syslog
- Syslog Alert Levels
- SNMP
- Network Monitor
- Demo- Network Monitoring
- Troubleshooting
- Review Quiz (Number of attempts allowed: Unlimited)
Module 16 -Planning and Implementing a SOHO Network
(Duration: 16m)
- Workbook (Pdf)
- Planning and Implementing a SOHO Network
- Purposes of a Plan
- Creating a Plan
- Ongoing Planning
- Implementing a Plan
- Network Cable
- Review Quiz (Number of attempts allowed: Unlimited)
- about 22.45 hours on-demand video
- 16 downloadable Pdf Workbooks
- Unlimited time access (During Membership)
- Access on mobile and Desktop
- Certificate of Completion
$150.00Read more
Course Features Include:
Expert Lectures
Learn on-demand from top instructors who are industry subject matter experts. Our highly certified expert instructors possess a superior understanding of the subject matter in their fields and have the ability to convey this knowledge in an effective, engaging, and professional manner to a wide audience.Certificates of Completion
Upon completion of a series of courses you can earn a certificate of completion from Career Academy. Certificates of Completion will display your full name, course completed, as well as the date of completion. Students have the ability to print this out or save it digitally to showcase your accomplishment.PowerPoint Visuals:
Many of the in-depth theories and processes discussed in our courses can be learned most efficiently through the detailed PowerPoint slides presented. These visuals are accompanied by an instructor voice-over to provide our students with a clear, efficient, and complete presentation of concepts.Professional Development Activities
Students are provided access to professional development activity files which allow for an individual to test out course theories and apply the knowledge they earned from the course.Review Quizzes
Once a course is completed, test your knowledge by taking our course review quiz! Students have the ability to retake any review quizzes as many times as they wish to ensure they understand the material or to improve upon their scores.Mobile Access
With our universal course player, you can learn from your computer, tablet as well as mobile devices. Keep up with your training on the go!
Trusted by Aspiring IT Professionals, Corporations and
Government agencies for more than a Decade
Get unlimited online access learn anywhere, anytime using your computer or mobile device!