LearnKey Training

Network+ 2012 Certification Course (N10-005) - Exam Retired

Network+ 2012 Certification Course (N10-005) - Exam Retired

Back to Product Page


Network+ 2012 Certification Course (N10-005) - Exam Retired

5 Sessions -
14 Hours of Interactive Training

Network+ is an elite training program that completely and adequately prepares students to become Network+ certified. Students of CompTIA Network+ 2012 will gain the knowledge and skills necessary to manage, maintain, troubleshoot, install, operate and configure basic network infrastructure, describe networking technologies, and basic design principles. The CompTIA Network+ certification course will provide students with the ability to effectively learn real-world concepts and skills to help launch or enhance a networking career.

Benefits
  • Certification is ranked as one of the most in-demand networking skills in the IT department
  • Achieve industry recognition and respect among colleagues and professionals
  • Provides a full library of knowledge that can be referenced time and time again

About The Author
Tom Carpenter is a trainer, consultant and author specializing in networking technologies and Microsoft solutions. Tom has written more than 15 books on topics ranging from Windows Server to wireless networking. He has trained more than 30,000 IT professionals since 1997 in face-to-face training classes and he has taught more than 60,000 through webinars and online training programs. He holds certifications with Microsoft, CompTIA and CWNP and is the current CTO for CWNP - the premiere 802.11 wireless administration certification program. With more than 20 years experience in the IT industry, Tom brings a wealth of experience to any training program.

Session 1

Section A: Introduction

  • Networking Evolution
  • Why Network+
  • Network+ Domains
  • Prerequisites
  • Preparing for the Exam
  • Viewing Objectives

Section B: Networking Models

  • The OSI Model
  • The Seven-Layer Model
  • Layer 7: Application
  • Layer 6: Presentation
  • Layer 5: Session
  • Layer 4: Transport
  • Layer 3: Network
  • Layer 2: Data-Link
  • Layer 1: Physical
  • Terminology and the OSI
  • TCP/IP Model
  • The Four-Layer Model
  • Devices and the TCP Model
  • Protocols at Each Layer
  • Network Topologies
  • Peer-to-Peer vs. Client/Server

Section C: Applications and Devices

  • Network Interface Card
  • Hub
  • Bridge
  • Switch
  • Router
  • Multilayer Switch
  • Encryption Devices
  • Bits and Bytes

Section D: IPv4 Overview and Addressing

  • Binary Number
  • IP Addressing
  • Public vs. Private
  • Address Types
  • Subnetting
  • DHCP
  • DHCP Process
  • APIPA
  • Under IP

Section E: IPv6 Overview and Addressing

  • IPv6
  • IPv6 Addressing
  • IPv6 Address Space
  • IPv6 vs. IPv4

Section F: Switching Protocols

  • Collision Domain
  • Broadcast Domain
  • VLANs Defined
  • VLAN Example
  • VLAN Tagging
  • VLAN Applications
  • Spanning Tree Protocol
  • STP Port Types
  • Port Mirroring

Section G: Routing Protocols

  • Static Routing
  • Static Routing Issues
  • Routing Protocols
  • Distance Vector Routing
  • Link-State Routing
  • Routing Protocol Metrics
  • Administrative Distance

Session 2

Section A: Networking Protocols

  • TCP and UDP Ports
  • Common Ports
  • TCP/IP Suite
  • VoIP Protocols
  • Network Management Protocols
  • Network Communications Protocols

Section B: Name Resolution

  • Domain Name System
  • Dynamic DNS
  • DNS Servers

Section C: Virtual Desktops

  • Virtualization
  • Using Virtual Desktops
  • Virtual Servers
  • Virtual PBX
  • Virtual Switches
  • Network as a Service

Section D: Media and Connectors

  • Fiber Media
  • Copper Cabling
  • Cable Categories
  • Copper Connectors
  • Cable Types
  • Media Converters
  • Wiring Distribution

Section E: WAN Solutions

  • Circuit Switch
  • Packet Switch
  • Selecting a WAN Link
  • Wireless WANs
  • Wired WANs

Section F: 802 Standards

  • 802 Standards and Terminology
  • CSMA/CD
  • CSMA/CA
  • 802.11

Section G: Planning a Small Network

  • Cable Length
  • Environmental Limitations
  • Equipment Limitations
  • Compatibility Requirements
  • Device Types and Requirements
  • List of Requirements

Session 3

Section A: Installing Routers

  • Routing Tables
  • Router Interface Configuration
  • Network Address Translation
  • Port Address Translation
  • Traffic Filtering
  • Quality of Service
  • Router Diagnostics

Section B: Installing Switches

  • Managed vs. Unmanaged
  • Switch Interface Configuration
  • VLANs and Trunking
  • PoE
  • QoS and Traffic Filtering
  • Switch Diagnostics

Section C: Installing a Wireless Network

  • Antenna Types
  • WAP Placement
  • Frequencies and Channels
  • SSIDs (Enable/Disable)
  • Compatibility

Section D: Understanding Network Appliances

  • Network Appliances
  • Load Balancer
  • Proxy Server
  • Content Filter
  • VPN Concentrator

Section E: Configuration Documentation

  • Configuration Management
  • Wire Schemes
  • Cable Management
  • Asset Management
  • Performance Baselines
  • Change Management

Section F: Network Performance

  • Network Optimization
  • Traffic Shaping
  • High Availability
  • Caching Engines
  • CARP

Section G: Network Monitoring

  • SNMP
  • Logging
  • Network Sniffer
  • Port Scanners
  • Traffic Analysis

Session 4

Section A: Troubleshooting Methodology

  • Troubleshooting
  • CompTIA Troubleshooting Process
  • Identify the Problem
  • Establish a Theory
  • Test the Theory
  • Establish a Plan
  • Implement the Solution
  • Verify Full System Functionality
  • Document

Section B: Troubleshooting Switches

  • Switching Loop
  • Bad Cables / Improper Cable Types
  • Port Configuration
  • VLAN Assignment
  • Mismatched MTU
  • MTU Black Hole
  • Power Failure
  • Bad Modules (SFPs, GBICs)

Section C: Troubleshooting Routers

  • Common Problems with Routers
  • Bad or Missing Routes
  • Configuration Errors

Section D: Troubleshooting Media

  • Common Cable Problems
  • Media Troubleshooting Tools
  • Protocol Analyzers

Section E: Troubleshooting Wireless

  • Interference
  • Signal Strength
  • Configurations
  • Bounce
  • Latency

Section F: Troubleshooting Software

  • Troubleshooting Tools
  • PING
  • TRACERT
  • IPCONFIG
  • NSLOOKUP
  • ARP
  • NETSTAT

Section G: Using Protocol Analyzers

  • Protocol Analyzer Overview
  • Wireshark

Session 5

Section A: Security Concepts

  • CIA
  • AAA
  • Least Privilege
  • Attack Surface
  • Defense in Depth
  • Security Controls
  • Control Classes

Section B: Security Threats

  • Internal Threats
  • External Threats
  • Types of Attackers
  • Types of Attacks
  • Wireless Threats
  • Attacks
  • Mitigation Techniques
  • Risk Analysis

Section C: Security Authentication

  • Authentication
  • Credential Types
  • Weak Authentication
  • Strong Authentication
  • RADIUS Servers
  • User Directories
  • Windows Authentication
  • 802.1X with EAP
  • Network Access Control
  • Public Key Infrastructure
  • Single Sign-On

Section D: Installing Firewalls

  • Firewalls
  • Network Firewalls
  • Packet Filtering Firewalls
  • Stateful Inspection Firewalls
  • Personal Firewall
  • Hardware vs. Software
  • Firewall Rules
  • NAT, PAT, and DMZs

Section E: Network Level Security

  • Remote Access Solutions
  • ACLs
  • Virtual Private Networking
  • VPN Protocols
  • IPSec
  • Internet Key Exchange
  • AH and ESP

Section F: Wireless Security

  • Encryption Protocols
  • MAC Filtering
  • Device Placement and Signal Strength

Section G: Security Appliances

  • IDS and IPS
  • Vulnerability Scanners
  • Honeypots and Honeynets

Section H: Game Over

  • Tom vs. Virus