- Design and implement functional networks
- Configure, manage, and maintain essential network devices
- Use devices such as switches and routers to segment network traffic and create resilient networks
- Identify benefits and drawbacks of existing network configurations
- Implement network security, standards, and protocols
- Troubleshoot network problems

CompTIA Network+ N10-007 Certification Training
Learn Everything You Need To Know To Get CompTIA Net+ Certified. Grow Your Networking Career!
20 hours | Self Paced Training | 12 months access
Course Price: $1000
Companies currently employing Certified CompTIA Network+ Specialists include:


Skills you will learn

Networking Concepts
Learn the implementation of various networking concepts

Network Security
Determine & explain the appropriate cabling, device and storage technologies

Network Troubleshooting & Tools
Learn to protect connectivity & performance and network troubleshooting methodology

Infrastructure
Determine & explain the appropriate cabling, device and storage technologies

Network Operations
Use best practices to manage the network, determine policies & ensure business continuity

CompTIA Network+
Certified Experts
$72,337Min $48K - Max $108K

YOU CAN GET:
- Network Administrator
- Computer Technician
- Network Technician
- Help Desk Technician
- System Engineer
- IS Consultant
- Network Support Specialist
- Network Engineer
- Network Analyst
- IT Manager
About the Training
The CompTIA Network Plus Bootcamp is designed to help you with exam preparation for the CompTIA Net+ (N10-007) certification. The skillset you develop from this course will help you land a job in networking.
The CompTIA Network+ Certification is brought to you by CompTIA and is
the go-to certification when it comes to learn and get a job in networking field.
The course is ideal for anyone seeking network security jobs or wanted to improve his/her portfolio by completing the CompTIA Network+ certification
Course Outline
- Networking Fundamentals - Part 1
- Networking Fundamentals - Part 2
- What is a Network?
- Network Building Blocks
- Types of Networks
- Host Requirements
- Numbering Systems
- Demo - Working with Numbering Systems
- Communication Types
- Communication Concepts
- Other Communication Methods
- Networking Models
- Workgroup vs. Domain
- Network Topologies
- Physical Bus
- Physical Star
- Physical Ring
- Physical Mesh
- Demo - Identifying Network Topology
- Logical Topologies
- Wireless Topologies
- Network Components and Services - Part 1
- Network Components and Services - Part 2
- Technical Challenges
- Knowledge Specialization
- Developing Soft Skills
- Achieving the Certification
- Planning for Certification
- Chapter 01 Review
- Review
- Introducing Networking Standards - Part 1
- Introducing Networking Standards - Part 2
- What is a Standard?
- Why Use Standards?
- Standards Organizations
- What is OSI/RM
- Upper Layers
- Lower Layers
- IEEE Networking Standards
- Ethernet
- Ethernet Frames
- MAC Addresses
- Access Methods
- 10Base Standards
- Demo - Ethernet Standards
- Chapter 02 Review
- Review
- Fundamentals of Network Transmission - Part 1
- Fundamentals of Network Transmission - Part 2
- Transmission Methods
- Network Performance Factors
- Serial vs. Parallel
- Baseband vs. Broadband
- Data Access Methods
- Communication Domains
- Data Access Methods (Cont.)
- Digital Signals
- Units of Measurement
- Transmission Media
- Twisted Pair Cabling
- Cable Media Categories
- Twisted Pair Connectors
- Copper Media Types
- Wiring Differences
- Coaxial Cabling
- Demo - Media Types
- Fiber Optic Cabling
- Connection Options
- Fiber Optic Connectors
- Demo - Optical Cables and Connectors
- Specialty Connectors and Cabling
- Media Converters
- Demarcation Point
- Other LAN Components
- Wiring Individual Workstations
- Connecting Cables
- Punchdown Blocks
- Introduction to Wireless LANs
- Wireless Networking Fundamentals
- Types of Wireless
- Wireless Networking Components
- Demo - Configuring an Access Point
- Wireless Modes
- Wireless Devices
- Wireless Networking Standards
- 802.11 Standards
- Enhancing Wireless Performance
- Wired Equivalent Privacy
- Wi-Fi Protected Access
- 802.1x
- Demo - Examining Wireless Security
- Planning Wireless Networks
- Choosing Antennas
- Antenna Types
- Wireless Channels
- Site Surveys
- Other Considerations
- Chapter 03 Review
- Review
- Understanding TCP/IP - Part 1
- Understanding TCP/IP - Part 2
- Overview of TCP/IP
- TCP/IP Layers
- Core Protocols
- Transport Protocols
- Transmission Control Protocol
- User Datagram Protocol
- What is a Socket?
- Internet Layer
- Core Internet Layer Protocols
- IP Datagrams
- Application Layer
- Application Layer Protocols
- Well Known Ports
- Introduction to IP Addresses
- Subnet Masks
- Demo - Working with Binary IP Addresses
- IPv4 Address Rules
- Valid Masks
- Default Gateway
- Demo - Configuring IP Addresses
- Address Categories
- Public vs. Private Addresses
- Classful Addressing
- Classless Addressing
- Demo - CIDR Notation
- Create IPv4 Subnets
- Simple Subnetting
- Complex Subnetting
- Demo - Creating Subnets
- Introduction to IPv6
- IPv6 Advantages
- IPv6 Addresses
- IPv6 Addressing
- Global Unicast
- Unique Local Unicast
- Link Local Address
- Special Addresses
- Autoconfiguration in IPv6
- Demo - Viewing and Configuring IPV6
- Introducing DHCP
- DHCP Leases
- Lease Renewal
- DHCP Server Placement
- DHCP Implementations
- DHCP Servers
- What is Name Resolution
- Types of Names
- Introduction to DNS
- DNS Components
- Resource Records
- DNS Zones and Domains
- Name Resolution Process
- Types of Queries
- Chapter 04 Review
- Review
- Introduction to Network Devices - Part 1
- Introduction to Network Devices - Part 2
- Common Network Devices
- Device Capabilities
- OSI / RM Layers and Devices
- Introduction to Physical Devices
- Network Interface Cards
- Repeaters
- Repeater Types
- Hubs
- Data Link Filtering
- What is a Bridge?
- Network Switches
- Introduction to the Layer 2 Switch
- Switch Categories
- Switch Characteristics
- Power Over Ethernet
- Virtual Capabilities
- Virtual LAN (VLAN)
- Initial Switch Configuration
- Interface Configuration
- Introduction to STP
- STP Port States
- RSTP Differences
- Understanding Trunking
- Trunking Protocols
- Additional Management for Switches
- The Layer 3 Job
- Routing Tables
- Demo - Reading a Routing Table
- Network Segmentation Benefits
- Hardware vs. Software Routers
- Static vs. Dynamic Routing
- Routing Protocols
- Dynamic Routing
- What is a Metric?
- Distance Vector vs. Link State
- Path Vector
- Interior Routing Protocols
- Exterior Routing Protocols
- Routing Problems
- Router Redundancy
- Additional Network Devices
- Load Balancers
- Traffic Shapers
- Chapter 05 Review
- Review
- WAN Fundamentals - Part 1
- WAN Fundamentals - Part 2
- What is a Wide Area Network (WAN)?
- WAN Options
- WAN Categories
- Public Switched Telephone Network
- Integrated Services Digital Network
- Digital Subscriber Line
- Cable Modems
- MPLS
- ATM
- Frame Relay
- Leased Lines
- Metropolitan Ethernet
- Satellite WANs
- Wireless Local Loop
- WiMAX
- Cellular Connections
- GSM vs. CDMA
- 3G Technologies
- 4G Technology
- Fiber WAN Connections
- OC Levels
- Demo - Choosing a WAN Provider
- Chapter 06 Review
- Review
- Introduction to Remote Networking - Part 1
- Introduction to Remote Networking - Part 2
- Introduction to Remote Networking
- Remote Node
- Remote Desktop Control
- Remote Control Concepts
- ooDemo - Configuring Remote Control
- Understanding Authentication
- Authentication, Authorization, and Accounting (AAA)
- CHAP and MS-CHAP
- EAP and Other Authentication Protocols
- RADIUS
- TACACS+
- What is a VPN?
- VPN Tunnel Types
- What is Encapsulation?
- VPN Components
- Encryption Types
- VPN Concentrators
- VPN Protocols
- Demo - Create and Configure a VPN
- Chapter 07 Review
- Review
- Network Security Fundamentals - Part 1
- Network Security Fundamentals - Part 2
- Introduction to Network Security
- The CIA Triad
- Network Threats
- Network Vulnerabilities
- Understanding Risk
- What is AAAA?
- Cryptography
- Algorithms and Keys
- Digital Signatures
- Best Practices for Permissions
- Best Practices for Employees
- Planning for Network Security
- Types of Threats
- Threat-Vulnerability Pairs
- Identifying Vulnerabilities
- Types of Vulnerabilities
- Mitigating Risks
- User Awareness
- Understanding Compliance
- Business Continuity
- Change Management
- Network Documentation
- Threat Categories
- Introduction to Software Attacks
- Malicious Code Attacks
- Types of Malicious Code
- Network Threats
- Port Scanning and Eavesdropping
- IP Spoofing
- Denial of Service (DoS)
- Man-in-the-Middle Attacks
- Human Attacks
- Wireless Vulnerabilities and Threats
- Protecting the Network
- Implementing Physical Protection
- Physical Security Options
- Demo - Examining Physical Security Devices
- Anti-Malware
- Demo - Anti-malware Options
- Network Hardening
- Securing Network Communications
- Introduction to Firewalls
- Types of Firewalls
- Demo - Using Firewalls
- Authentication
- Authentication Factors
- Network Access Control
- Chapter 08 Review
- Review
- Maintaining Business Continuity - Part 1
- Maintaining Business Continuity - Part 2
- Maintaining Business Continuity - Part 3
- Understanding High Availability
- High Availability Options
- Disaster Recovery
- Monitoring Network Devices
- Patch Management
- What is Virtualization?
- Virtualization Benefits
- Virtualization and Cloud Computing
- Virtual Machine Hosts
- Virtualization Components
- The Importance of Storage
- Storage Options
- Storage Area Networks
- Virtual Devices and Networks
- What is Cloud Computing?
- The Cloud Advantage
- Cloud Models
- Cloud Services Models
- Demo - Working in the Cloud
- Unified Communications
- Unified Communication Components
- Unified Communication Technologies
- Chapter 09 Review
- Review
- Network Safety Fundamentals - Part 1
- Network Safety Fundamentals - Part 2
- The Importance of Safety
- Electrical Safety
- Static Electricity
- Preventing Static Electricity
- Fire Suppression Systems
- Implementing Network Policies
- Types of Monitoring
- Performance Baselines
- Monitoring Tools
- Network Monitoring Tools
- Introduction to Network Tools
- Analyzing Traffic
- Environmental Monitoring
- Using SYSLOG
- Using SIEM
- Using SNMP
- SNMP Components
- Monitoring Operating Systems
- Using Task Manager
- Using Event Viewer
- Maintaining and Monitoring Networks
- Using Performance Monitor
- Additional Monitoring Types
- Introduction to Patch Management
- Operating System Updates
- Updating Windows Systems
- Managing Network Devices
- Introduction to Troubleshooting
- Identifying the Issue
- Establish a Theory of Probable Cause
- Create an Action Plan
- Putting it All Together
- Hardware Troubleshooting Tools
- Network Tool Kit
- Software Toolkits
- OS Troubleshooting Tools
- Demo - OS Troubleshooting Tools
- Introduction to Wireless Issues
- Wireless Signal Issues
- Troubleshooting Hardware and Configuration
- Wireless Security Issues
- Troubleshooting Wired Connectivity Issues
- Troubleshooting Fiber Cable Issues
- Troubleshooting Network Service Issues
- Troubleshooting Security Issues
- Chapter 10 Review
- Review
- Course Closure
- Course Summary