top of page

1. Network Basics

  • Network concepts

  • Networking models

  • Local area network

  • Basic network types

  • Peer-to-peer model

  • Client/server model

  • Segments and backbones

  • Network wiring

  • Fiber optic

  • Twisted pair

  • Coaxial

  • Serial

  • Duplex

  • Wireless LAN

  • Network protocols

  • Network architectures

  • Network designs

  • Point-to-point vs. point-to-multipoint

  • Packet vs. circuit-switching networks

  • Ethernet

  • Ethernet networks

  • Token Ring networks

  • Wireless LANs

  • WAN bandwidth technologies

  • WAN mesh topology

  • The OSI model

  • The OSI model applied to local area networking

 

2. Wired Computer-To-Computer Connections

  • Wired network connections

  • Fiber optic wired connections

  • Twisted pair connections

  • Terminating CATx-to-RJ-45 connectors

  • Coaxial connections

  • Terminating coax-to-BNC connectors

  • Plenum wiring

  • Network interface cards and modems

  • Computer network connection

  • NIC selection

  • Addressing

  • MAC addresses

  • IP addresses

  • Character-based names

  • Domain Name System

  • NetBIOS

  • Port addresses

  • Modems

  • Riser cards

  • Softmodems

  • When a modem isn't a modem

  • Model installation

  • Dial-up connection creation

  • Dial-up connection object management

 

3. Network-To-Network Connections

  • Network-to-network connection components

  • Network Access Points (NAPs)

  • Internet Service Providers (ISPs)

  • How an ISP works

  • LAN installation components

  • Telecommunications room

  • LAN wiring

  • Network cable installation

  • Telecommunications room equipment

  • Using a punchdown tool

  • LAN wiring tests

  • LAN tests

 

4. Wired Internetworking Devices

  • Basic internetworking devices

  • Internetworking devices

  • Repeaters

  • Bridges

  • Heterogeneous (translating) bridges

  • Encapsulating bridges

  • A learning (transparent) bridge

  • Bridge routing management

  • Additional filtering and intelligence

  • Local and remote bridges

  • Layer 2 switches

  • Bridges vs. switches

  • Routers

  • About routers

  • Router features

  • Types of routers

  • Routing tables

  • Routing examples

  • Brouters

  • Bridges vs. routers

  • Ethernet hubs

  • Token Ring Multi-Station Access Unit

  • Media converters

  • Firewalls

  • Specialized internetworking devices

  • Higher-level switches

  • IDS and IPS

  • Traffic shaper

  • Multifunction network devices

 

5. Wired Communication Standards

  • The TCP/IP protocol suite

  • IEEE Network interface layer protocols

  • IPCONFIG

  • Internet layer protocols

  • Transport layer protocols

  • TCP

  • Network monitor

  • UDP

  • TCP vs. UDP

  • Application layer protocols

  • Telnet

  • NTP

  • E-mail messaging protocols

  • TCP/IP

  • IPv4

  • IPv6

  • TCP/IP configuration parameters

  • Subnet masks

  • IPv6 subnets

  • Default gateway

  • DNS

  • WINS

  • Static TCP/IP parameters

  • DHCP and DHCPv6

  • DHCP servers

  • Installing a DHCP server

  • IPv6 scopes

 

6. Wireless Networking

  • Wireless network devices

  • Wireless communications

  • Wireless LAN components

  • Wireless networking standards

  • Standards

  • Wireless protocols

  • Wireless configuration

  • WLAN security risks

  • WLAN security components

  • Transmission encryption

  • Wireless access point configuration

  • Wireless clients

 

7. Security Threats and Mitigation

  • Security threats

  • Viruses, worms, and Trojan horses

  • Social engineering

  • Phishing

  • Denial of Service (DoS) attacks

  • Distributed DoS attacks

  • Man-in-the-middle attacks

  • Spoofing

  • Threat mitigation

  • Security policies

  • Human resources policy

  • Incident response policy

  • Change management

  • Configuration management documentation

  • Education

  • Communication

  • User awareness

  • Types of training

 

8. Security Practices

  • Operating systems

  • Antivirus software

  • Spyware

  • Securing the operating system

  • Windows Update

  • Patch management

  • Other updates

  • Windows Firewall

  • Devices

  • Firewalls and proxy servers

  • Security zones

  • DMZ configurations

  • Traffic filtering

  • Network Access Control (NAC)

  • Virtual private network

  • Security issues

  • Built-in management interfaces

  • Physical attack susceptibility

  • Overcoming device weaknesses

  • Intrusion detection and prevention

  • NIDS

  • HIDS

  • Physical access control

  • Surveillance

 

9. Network Access Control

  • Authentication

  • Usernames and passwords

  • Authentication factors

  • Authentication protocols

  • Identification and authentication

  • Identity proofing

  • Single sign-on

  • Kerberos

  • The Kerberos process

  • Kerberos security weaknesses

  • CHAP

  • EAP

  • PPPoE

  • Mutual authentication

  • Public key cryptography

  • Cryptography overview

  • Encryption

  • Public key cryptography overview

  • Asymmetric cryptography

  • Public key infrastructure

  • Setup and initialization

  • Administration of issued keys and certificates

  • Certificate cancellation and key history

  • Securing public key management systems

  • Remote access

  • Remote network access

  • RADIUS

  • Diameter

  • LDAP and remote access

  • Terminal Access Controller Access Control System (TACACS)

  • 802.1x

  • VPN security

  • VPN protocols

  • IPsec

  • Secure shell (SSH)

  • VPN solutions

  • Wireless security

  • Wireless networking

  • Wireless networking security

  • Wireless networking vulnerabilities

  • Wi-Fi scanners

 

10. Monitoring

  • Monitoring resources

  • Windows computers

  • Performance monitor

  • Performance monitor configuration

  • Data Collector Sets (DCS)

  • Viewing Data Collector Ser reports

  • Reliability Monitor

  • Remote Desktop

  • Event Viewer

  • Remote logs

  • Event forwarding

  • Subscriptions

  • Device and application logging

 

11. Troubleshooting

  • Troubleshooting basics

  • Information gathering

  • Identify the affected area

  • Determine if anything has changed

  • Establish the most probable cause

  • Determine if escalation is necessary

  • Create an action plan

  • Implement a solution and test the result

  • Identify the results of the solution and its effects

  • Document the problem and the solution

  • Problem and resolution tracking

  • Hardware toolkit

  • Software toolkit

  • Troubleshooting the network

  • Troubleshooting wired connections

  • Testing the physical network

  • Troubleshooting wireless network connections

  • Troubleshooting TCP/IP

  • Ipconfig

  • UNIX Ifconfig

  • Using Ipconfig to display TCP/IP settings

  • Ping and basic TCP/IP connectivity

  • NSLookup

  • Tracert

  • Windows Network Diagnostics

  • Troubleshooting scenarios

  • Remote Desktop troubleshooting

  • Inability of a user to access a shared resource

  • Preventing illegal attempts to access an account

  • Connectivity issues

  • Network problems relating to adding or removing services

CompTIA Network+

Virtual $995

On-Site: Request

Dates:

11/27-12/1

Reserve seat

bottom of page