Course Highlights Gain the skills and credentials to kickstart a successful career and learn from the experts with this step-by-step …
Gain the skills and credentials to kickstart a successful career and learn from the experts with this step-by-step training course. This CompTIA Network+ Certification (N10-008) course has been specially designed to help learners gain a good command of CompTIA Network+ Certification (N10-008),providing them with a solid foundation of knowledge to become a qualified professional.
Through this CompTIA Network+ Certification (N10-008) course, you will gain both practical and theoretical understanding of CompTIA Network+ Certification (N10-008) that will increase your employability in this field, help you stand out from the competition and boost your earning potential in no time.
Not only that, but this training includes up-to-date knowledge and techniques that will ensure you have the most in-demand skills to rise to the top of the industry. This qualification is fully accredited, broken down into several manageable modules, ideal for aspiring professionals.
Introduction | |||
Introduction to Network+ | 00:03:00 | ||
What’s on the Network+ Exam | 00:02:00 | ||
What Can You Do with a Network+ Certification | 00:03:00 | ||
Section 01: Network Models | |||
The OSI Model | 00:13:00 | ||
Meet the Frame | 00:06:00 | ||
The MAC Address | 00:07:00 | ||
Broadcast vs. Unicast | 00:04:00 | ||
Introduction to IP Addressing | 00:08:00 | ||
Packets and Ports | 00:05:00 | ||
Section 02: Cabling and Topology | |||
Network Topologies | 00:05:00 | ||
Coaxial Cabling | 00:05:00 | ||
Twisted Pair Cabling | 00:05:00 | ||
Fiber Optic Cabling | 00:09:00 | ||
Fire Ratings | 00:05:00 | ||
Section 03: Ethernet Basics | |||
What is Ethernet? | 00:06:00 | ||
Ethernet Frames | 00:07:00 | ||
Terminating Twisted Pair | 00:08:00 | ||
Hubs vs. Switches | 00:12:00 | ||
Connecting Switches | 00:05:00 | ||
Section 04: Ethernet Standards | |||
100BaseT | 00:05:00 | ||
Gigabit Ethernet and 10-Gigabit Ethernet | 00:05:00 | ||
Transceivers | 00:07:00 | ||
Connecting Ethernet Scenarios | 00:14:00 | ||
Section 05: Installing a Physical Network | |||
Introduction to Structured Cabling | 00:04:00 | ||
Terminating Structured Cabling | 00:08:00 | ||
Equipment Room | 00:07:00 | ||
Alternative Distribution Panels | 00:04:00 | ||
Testing Cable | 00:09:00 | ||
Troubleshooting Structured Cabling, Part-1 | 00:04:00 | ||
Troubleshooting Structured Cabling, Part-2 | 00:04:00 | ||
Using a Toner and Probe | 00:03:00 | ||
Wired Connection Scenarios | 00:10:00 | ||
Section 06: TCP/IP Basics | |||
Introduction to IP Addressing and Binary | 00:13:00 | ||
Introduction to ARP | 00:04:00 | ||
Subnet Masks | 00:12:00 | ||
Classful Addressing | 00:10:00 | ||
Subnetting with CIDR | 00:10:00 | ||
More CIDR Subnetting Practice | 00:10:00 | ||
Dynamic and Static IP Addressing | 00:05:00 | ||
Special IP Addresses | 00:07:00 | ||
IP Addressing Scenarios | 00:15:00 | ||
Section 07: Routing | |||
Introducing Routers | 00:15:00 | ||
Understanding Ports | 00:03:00 | ||
Network Address Translation (NAT) | 00:06:00 | ||
Implementing NAT | 00:02:00 | ||
Forwarding Ports | 00:18:00 | ||
Tour of a SOHO Router | 00:12:00 | ||
SOHO vs. Enterprise | 00:09:00 | ||
Static Routes | 00:13:00 | ||
Dynamic Routing | 00:10:00 | ||
Routing Information Protocol (RIP) | 00:04:00 | ||
Open Shortest Path First (OSPF) | 00:03:00 | ||
Border Gateway Protocol | 00:06:00 | ||
Section 08: TCP/IP Applications | |||
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) | 00:07:00 | ||
ICMP and IGMP | 00:06:00 | ||
Handy Tools | 00:07:00 | ||
Introduction to Wireshark | 00:10:00 | ||
Introduction to netstat | 00:09:00 | ||
Web Servers | 00:12:00 | ||
File Transfer Protocol (FTP) | 00:12:00 | ||
E-mail Servers and Clients | 00:09:00 | ||
Securing E-mail | 00:06:00 | ||
Telnet and SSH | 00:09:00 | ||
Network Time Protocol (NTP) | 00:03:00 | ||
Network Service Scenarios | 00:09:00 | ||
Section 09: Network Naming | |||
Understanding DNS | 00:07:00 | ||
Applying DNS | 00:19:00 | ||
net Command | 00:08:00 | ||
Windows Name Resolution | 00:11:00 | ||
Dynamic DNS | 00:05:00 | ||
DNS Troubleshooting | 00:13:00 | ||
Section 10: Securing TCP/IP | |||
Making TCP/IP Secure | 00:04:00 | ||
Symmetric Encryption | 00:05:00 | ||
Asymmetric Encryption | 00:03:00 | ||
Cryptographic Hashes | 00:05:00 | ||
Identification | 00:08:00 | ||
Access Control | 00:04:00 | ||
AAA | 00:05:00 | ||
Kerberos/EAP | 00:07:00 | ||
Single Sign-On | 00:10:00 | ||
Certificates and Trust | 00:14:00 | ||
Certificate Error Scenarios | 00:08:00 | ||
Section 11: Switch Features | |||
Switch Management | 00:09:00 | ||
Introduction to VLANs | 00:10:00 | ||
InterVLAN Routing | 00:03:00 | ||
Trunking | 00:08:00 | ||
Cisco Commands | 00:06:00 | ||
Switch Port Protection | 00:07:00 | ||
Port Bonding | 00:07:00 | ||
Port Mirroring | 00:03:00 | ||
Quality of Service | 00:05:00 | ||
IDS vs. IPS | 00:04:00 | ||
Proxy Servers | 00:13:00 | ||
Load Balancing | 00:08:00 | ||
Device Placement Scenarios | 00:13:00 | ||
Section 12: IPv6 | |||
Introduction to IPv6 | 00:13:00 | ||
IPv6 Addressing | 00:15:00 | ||
IPv6 in Action | 00:13:00 | ||
IPv4 and IPv6 Tunneling | 00:05:00 | ||
Section 13: WAN Connectivity | |||
Understanding IP Tunneling | 00:06:00 | ||
WAN Technologies | 00:06:00 | ||
Digital Subscriber Line (DSL) | 00:04:00 | ||
Connecting with Cable Modems | 00:04:00 | ||
Connecting with Satellites | 00:02:00 | ||
Cellular Technologies | 00:04:00 | ||
Remote Desktop Connectivity | 00:04:00 | ||
Virtual Private Networks (VPNs) | 00:09:00 | ||
WAN Troubleshooting Scenarios | 00:05:00 | ||
Section 14: Wireless Networking | |||
Introduction to 802.11 | 00:12:00 | ||
802.11 Standards | 00:12:00 | ||
Power Over Ethernet (PoE) | 00:04:00 | ||
Antennas | 00:09:00 | ||
Wireless Security Standards | 00:06:00 | ||
Implementing Wireless Security | 00:07:00 | ||
Threats to Your Wireless Network | 00:07:00 | ||
Enterprise Wireless | 00:06:00 | ||
Installing a Wireless Network | 00:15:00 | ||
Wireless Scenarios | 00:06:00 | ||
More Wireless Scenarios | 00:09:00 | ||
Section 15: Virtualization and Cloud Computing | |||
Virtualization Basics | 00:07:00 | ||
Your First Virtual Machine | 00:07:00 | ||
Cloud Basics | 00:03:00 | ||
Cloud Services | 00:07:00 | ||
Cloud Ownership | 00:02:00 | ||
Infrastructure as Code (IaC) | 00:03:00 | ||
Heroku Demo | 00:09:00 | ||
Enterprise Virtualization | 00:05:00 | ||
Cloud Implementation | 00:11:00 | ||
Section 16: Datacenters | |||
Classic Data Center Architecture | 00:12:00 | ||
NAS and SAN | 00:16:00 | ||
The Modern Data Center | 00:09:00 | ||
High Availability | 00:11:00 | ||
Documenting the Datacenter | 00:08:00 | ||
Section 17: Integrating Networked Devices | |||
Network Types | 00:04:00 | ||
Internet of Things (IoT) | 00:07:00 | ||
Voice Over IP (VoIP) | 00:11:00 | ||
Industrial Control Systems and SCADA | 00:09:00 | ||
Section 18: Network Operations | |||
What are Network Operations? | 00:03:00 | ||
Hardening and Security Policies | 00:08:00 | ||
Change Management | 00:07:00 | ||
Patching and Updating | 00:07:00 | ||
Security Risk Management | 00:05:00 | ||
Points of Failure | 00:04:00 | ||
Standard Business Documentation | 00:05:00 | ||
Incident Response and Forensics | 00:05:00 | ||
Disaster Recovery and Backups | 00:12:00 | ||
Business Continuity | 00:12:00 | ||
Deployment Models | 00:05:00 | ||
Section 19: Protecting Networks | |||
Security Concepts | 00:06:00 | ||
Defense in Depth | 00:05:00 | ||
Rogue DHCP Servers | 00:04:00 | ||
Denial of Service (DoS) | 00:10:00 | ||
On-Path and Spoofing Attacks | 00:23:00 | ||
Password Attacks | 00:06:00 | ||
VLAN Hopping | 00:06:00 | ||
System Life Cycle | 00:04:00 | ||
Malware | 00:06:00 | ||
Social Engineering | 00:08:00 | ||
Common Vulnerabilities | 00:03:00 | ||
Physical Security | 00:13:00 | ||
Network Hardening | 00:08:00 | ||
Demilitarized Zone (DMZ) | 00:05:00 | ||
Introduction to Firewalls | 00:04:00 | ||
Firewalls | 00:10:00 | ||
Section 20: Networking Monitoring | |||
Networking Monitoring | 00:08:00 | ||
SNMP | 00:15:00 | ||
Documenting Logs | 00:07:00 | ||
System Monitoring | 00:08:00 | ||
Security Information and Event Management (SIEM) | 00:07:00 | ||
Section 21: Network Troubleshooting | |||
Network Troubleshooting Theory | 00:05:00 |