LearnKey Training

Network+ (N10-006) Course - Exam Retires Aug 31, 2018

Network+ (N10-006) Course - Exam Retires Aug 31, 2018

Back to Product Page


Network+ (N10-006) Course - Exam Retires Aug 31, 2018

5 Sessions -
13 Hours of Interactive Training

Network+ is an elite video training tutorial that completely and adequately prepares students to become Network+ certified. Network+ students will gain the knowledge and skills necessary to manage, maintain, troubleshoot, install, operate, and configure basic network infrastructure, describe networking technologies, and basic design principles. Included FREE ($199 value) with the purchase of this course is a project workbook with over 100 practice exercises consisting of hands-on labs, conceptual design exercises, and troubleshooting exercises to sharpen your test and real-life skills. This course and workbook will provide students with the ability to effectively learn real-world concepts and skills to help launch or enhance a networking career.

Benefits
  • Provide a full library of knowledge that can be referenced time and time again
  • Interactive labs, student workbooks, and hundreds of pre/post test questions
  • View your online courseware anytime anywhere

About The Author
Jason Manibog, LearnKey’s senior instructor, has spent over 15 years in the Information Technology arena as a trainer, consultant, and courseware writer. Jason is a Microsoft Certified Trainer with multiple certifications in Microsoft, CompTIA, and Adobe. Jason brings a wealth of real-world experience and the ability to explain things in very practical, real-life like terms to any class he teaches, courseware he writes, or e-Learning courses he develops.

Session 1

Section A: Network Requirements

  • Determine Network Requirements
  • List of Requirements
  • Environment and Equipment Limitations
  • Compatibility Requirements
  • Wired and Wireless Considerations
  • Security Considerations

Section B: Welcome to Network+

  • Networks/P2P Networks
  • Peer-to-Peer Networks
  • Hub vs. Switch
  • Connecting Devices
  • Network Interface Cards
  • Network Cables

Section C: Wiring Standards

  • Compare CAT Cable Standards
  • PVC vs. Plenum

Section D: Ethernet Standards

  • Ethernet Standards and Types
  • Unshielded Twisted-Pair Standards
  • Coaxial and Fiber-Optic Standards
  • Ethernet over HDMI and Power Lines
  • Straight-through, Crossover, Rollover
  • Cable Crimpers
  • Coaxial Cables
  • RJ-48C

Section E: Other Copper Connectors

  • Copper Couplers
  • Test the Connection

Section F: Routers

  • Router Considerations
  • Multilayer Switch
  • Access Point

Section G: Connect Phone and Router

  • 802.11 Wireless Networks
  • Cellular Networks

Section H: Connect to the Internet

  • Modems
  • Integrated Services Digital Network
  • WiMAX and Metro-Internet
  • Leased Lines

Section I: Blocks, IDF, MDF, and Patch Panels

  • 66 Block vs. 110 Block
  • MDFs and IDFs
  • Network Tools

Section J: LAN

  • Infrastructure Implementation
  • Network Topology Differences
  • Mesh Topology
  • Bus Topology
  • Ring Topology
  • Star Topology
  • Hybrid Topology
  • Star Network Example

Section K: Point-to-Point and Multipoint

  • Point-to-Point
  • Point-to-Multipoint
  • Multicast
  • Unicast and Broadcast
  • Broadcast Domains vs. Collision Domains
  • Collision

Section L: Public vs. Private Networks

  • Public and Private
  • Load Balancing
  • Testing Lab
  • Performance Optimization
  • IP Addressing
  • IPv6
  • Other IPv6 Aspects

Section M: IPv4

  • IPv4 Addressing
  • Subnet Masks
  • Subnetting
  • Classful Subnets
  • Classless Interdomain Routing
  • Binary Numbers
  • Translate Decimal to Binary
  • Binary Anding
  • Route Aggregation
  • NAT/PAT

Section N: MAC Addresses

  • MAC Addressing
  • Find a MAC Address
  • Address Resolution Protocol
  • Run ARP
  • MAC Address Lookup Table
  • Hexadecimal
  • Octal
  • EUI-64

Session 2

Section A: Switch Configuration

  • Managed vs. Unmanaged
  • VTP
  • Create a VLAN on a Switch

Section B: Spanning Tree Protocol

  • Use Spanning Tree Protocol
  • Forwarding and Blocking
  • Port Bonding
  • Port Mirroring
  • PoE and PoE+

Section C: Power Management

  • Surge Protectors and UPS
  • Power Converters

Section D: Server Racks

  • Rack Systems
  • Rack Monitoring

Section E: Labeling

  • Label Ports
  • Other Labling Considerations

Section F: Placement, Airflow, and Cable Trays

  • Label Ports, Environmental Factors
  • Device Placement

Section G: OSI Model

  • Open Systems Interconnection
  • OSI Layers
  • OSI Model Test Tips
  • ICMP
  • Broadband vs. Baseband
  • Sampling Size

Section H: Client/Server Networks

  • Change Management Procedures
  • Submit a Change Request
  • Documentation
  • Network+ Road Map

Section I: IP Address Assignment

  • DHCP
  • Checking a Static Address
  • Checking a Dynamic Address
  • Leases

Section J: Obtain IP Addresses

  • DHCP Reservations
  • Exam Recap
  • NAT
  • NAT Setup
  • Domain Name Server
  • DNS Records
  • Create an Alias Record
  • Create a Mail Exchange Record
  • Exam Recap

Section K: Other Network Services

  • Web Services
  • Unified Communications
  • Protocols and Port Numbers
  • Remote Access Services
  • IPsec
  • PPTP
  • Routing Tables
  • Routing Table Options

Section L: Routing Protocols

  • Distance-Vector Routing Protocol
  • Link-State Routing Protocol
  • Hybrid Routing Protocols
  • Other Routing Topics
  • Hop Counts
  • Administrative Distance
  • VPN
  • Add a VPN
  • Port Forwarding

Session 3

Section A: Network Maintenance

  • Network Maintenance and Protection
  • Business Continuity, Archives, Backups
  • Network Compliance
  • Patches and Updates
  • Check for Updates
  • Vulnerability Patches
  • Firmware Upgrade
  • Security Policies, Documentation

Section B: Use Policy

  • Network, Acceptable Use Policies
  • End-User Awareness
  • Network Segmentation
  • Management Scenarios
  • Network Access Control
  • Potential Data Incident

Section C: Network Attacks

  • Denial of Service Attacks
  • ARP Cache Poisoning, Spoofing

Section D: Wardriving

  • Security Issues in Wireless Networks
  • Security Issues with Bluetooth Networks
  • Password Attacks, Session Hijacking
  • Phishing
  • Social Engineering
  • Man-in-the-Middle, VLAN Hopping
  • Malware
  • Insider Threats, Zero Day Attack
  • Reduce Vulnerabilities in Networks

Section E: Protocols

  • Unsecure Protocols
  • Secure Protocols
  • SSL vs. TLS, IPsec
  • Switch Port Security
  • Password Security, Hardening a Network
  • Antimalware Software
  • Types of Filtering
  • User Authentication Protocols
  • Multifactor Authentication, Kerberos
  • MS-CHAP, SHA

Section F: Firewall Placement

  • Firewalls
  • Windows Firewall
  • Types of Firewalls
  • Next-Generation Firewalls
  • Demilitarized Zone
  • Implicit Deny in Firewalls
  • Network Intrusion
  • IDS/IPS
  • Honeypot, Content Filter

Section G: Threat Management

  • Unified Threat Management
  • Network Diagrams
  • Network Documents
  • Network Access Control Models
  • Persistent vs. Nonpersistent Agents
  • Types of Access Control

Section H: Common Security Issues

  • Security Control
  • Areas to Secure
  • Road Map

Section I: Network Safety

  • MSDS, Electrical Safety
  • Electrostatic Discharge
  • Equipment Installation Safety
  • Emergency Procedures
  • Fire Suppression, Extinguishers, HVAC

Section J: Data Forensics

  • Steps in Data Forensics
  • Data Forensics Concepts

Session 4

Section A: Redundancy

  • Load Balance
  • Single Point of Failure

Section B: Other Networks

  • Road Map
  • SOHO Wireless Routers
  • Device Density
  • Site Surveys

Section C: Antenna Placement

  • Wireless Antenna
  • Secure Wireless Network
  • Wireless Topologies

Section D: Wireless Authentication Security

  • Wireless Authentication
  • Types of Switching in WANs
  • SONET

Section E: Fiber Connectors

  • Fiber Connector Types
  • Single-Mode Fiber-Optic Connectors

Section F: WANs

  • Other Types of WANs
  • Virtual Switches and Routers
  • Virtual Firewall
  • Software-Defined Networking

Section G: SAN

  • Storage Area Network
  • Cloud Computing
  • Types of Cloud Computing
  • Create a Virtual Machine

Section H: Specialized Networks

  • SCADA/ICS
  • Video Teleconferencing
  • Real-Time Services
  • QoS

Section I: Network Monitoring Tools

  • Packet Analyzers
  • NMAP Scan
  • NMAP Services
  • Top Talkers and Top Listeners

Section J: Monitor Networks

  • Performance Monitor
  • Data Collector Set
  • Resource Monitor
  • Netstat
  • SNMP Management Software
  • Dynamic Memory Machine
  • Types of Alerts
  • Log Management

Section K: Temperature and Humidity

  • Monitoring Temperature
  • Handling Utilization Problems
  • Speed and Duplex

Session 5

Section A: Troubleshooting

  • The 7 Steps of Troubleshooting
  • Steps in Identifying a Problem
  • Approach Multiple Problems
  • Establish a Theory of Probable Cause
  • Test the Theory
  • Establish a Plan of Action
  • Implement Solution or Escalate
  • Verify Full System Functionality
  • Document and Recap

Section B: IP Addresses

  • APIPA
  • Nslookup
  • IP Addressing Problems
  • Ping
  • Tracert
  • Pathping
  • Nbtstat
  • Wireless Channel Utilization
  • Pathping Results

Section C: Troubleshoot Wireless

  • Common Wireless Signal Issues
  • Wireless Channel Issues
  • Saturation in Wireless Networks
  • Access Point Updates
  • Wrong SSID
  • Adjust Saved Network Information
  • Signal Strength Levels
  • Security Issues
  • Antenna Types
  • Incompatibilities and Incorrect Settings
  • More Wireless Signal Information
  • Other Forms of Interference
  • Thin and Thick Access Points
  • Wireless Standard Related Issues

Section D: Analysis and Tools

  • Speed and Performance Testing Sites
  • Network Analyzers

Section E: Physical Tools for Troubleshooting

  • Network Testing Tools
  • Mismatched Cable Standards
  • Crosstalk Types and EMI

Section F: Troubleshoot Cabling

  • Distance Limitations
  • Cable Connector and Wiring Problems
  • Tx/Rx Reverse
  • SFP/GBIC Transceivers
  • Attenuation/dB Loss
  • Fiber-Optic Cable Mismatches
  • Fiber-Optic Cable Limitations
  • Switching Loops
  • Incorrect VLAN Assignment

Section G: Troubleshoot Hardware

  • Incorrect NIC Settings
  • End-to-End Connectivity
  • Hardware Failure
  • Misconfigured DHCP
  • Misconfigured DNS
  • Neighboring Devices on Networks
  • Power Failure, Power Anomalies
  • Black Holes in Networks
  • Missing IP Routes

Section H: Security Practices

  • NIC Teaming Configurations
  • Multicast Group Membership
  • More Security Issues
  • Malware Reminders
  • Denial of Service Prevention
  • Unreachable Default Gateway
  • Lack of Patches
  • Malicious Users
  • Authentication Issues
  • Change Router Password
  • Back Door Attack, ARP Issues
  • Banner Grabbing
  • Domains vs. Local Workgroups
  • Jamming
  • Common WAN Issues
  • Customer Premise Equipment
  • Company Security Policy

Section I: Course Recap

  • Road Map Review
  • Final Points