Introduction
Network+ promo
()
Introduction to CompTIA network+ (N10-009) exam training
()
What's on the CompTIA network+ (N10-009) exam?
()
What can you do with a network+ certification?
()
1. Network Models
The OSI model
()
Meet the frame
()
The MAC address
()
Understanding ports and services
()
Internet protocol (IP) types
()
2. Cabling and Topology
Network topologies, architectures, and types
()
Coaxial cabling
()
Twisted pair cabling
()
Fiber optic cabling
()
Fire ratings: Plenum vs. non-plenum
()
3. Ethernet Basics
What is Ethernet?
()
Ethernet frames
()
Terminating twisted pair
()
Networking appliances
()
Hubs vs. switches
()
Connecting switches
()
4. Ethernet Standards
100BASE-T
()
Gigabit Ethernet and 10-gigabit Ethernet
()
Transceivers
()
Connecting Ethernet scenarios
()
5. Installing a Physical Network
Introduction to structured cabling
()
Terminating structured cabling
()
Equipment room
()
Alternative distribution panels
()
Using a toner and probe
()
Testing cable
()
Troubleshooting cabling, part 1
()
Troubleshooting cabling, part 2
()
Troubleshooting cabling, part 3
()
6. TCP/IP Basics
Introduction to IP addressing and binary
()
Introduction to ARP
()
Subnet masks
()
Classful addressing
()
Subnetting with CIDR
()
More CIDR subnetting practice
()
Dynamic and static IP addresses
()
Special IP addressing
()
IP addressing scenarios
()
7. Routing
Introduction to routers
()
Network address translation (NAT)
()
Implementing NAT
()
Forwarding ports
()
Tour of a SOHO router
()
SOHO vs. enterprise
()
Static routes
()
Dynamic routing
()
Open shortest path first (OSPF)
()
Border gateway protocol (BGP)
()
Enhanced interior gateway routing protocol (EIGRP)
()
First hop redundancy protocol (FHRP)
()
8. TCP/IP Applications
TCP and UDP
()
ICMP and IGMP
()
Explaining traffic types
()
Handy tools
()
Wireshark protocol analyzer
()
Introduction to netstat
()
File transfer protocol (FTP)
()
Email servers and clients
()
Securing email
()
Telnet and SSH
()
Network time protocol (NTP)
()
Network service scenarios
()
9. Network Naming
Understanding DNS
()
Applying DNS
()
Troubleshooting DNS
()
10. Securing TCP/IP
Making TCP/IP secure
()
Identification
()
Access control
()
RADIUS and TACACS+
()
Single sign-on (SSO)
()
Symmetric encryption
()
Asymmetric encryption
()
Digital certificates with public key infrastructure (PKI)
()
11. Switch Features
Switch management
()
Introduction to VLANs
()
InterVLAN routing
()
Configuring switching technologies
()
Trunking
()
Cisco commands
()
Switch port protection
()
Port mirroring
()
IDS vs. IPS
()
Proxy servers
()
Load balancing
()
Device placement scenarios
()
12. IPv6
Introduction to IPv6
()
IPv6 addressing
()
IPv6 in action
()
IPv4 and IPv6 tunneling
()
13. WAN Connectivity
Understanding IP tunneling
()
WAN technologies
()
Content delivery networks (CDNs)
()
Quality of service (QoS) and time to live (TTL)
()
Understanding satellite networking
()
Understanding cellular networking
()
Remote desktop connectivity
()
Virtual private networks (VPNs)
()
Troubleshooting network services
()
14. Wireless Networking
Introduction to 802.11
()
802.11 standards
()
Frequency, guest, and authentication options
()
Power over ethernet (PoE)
()
Common performance issues
()
Troubleshooting interface issues
()
Antennas
()
Wireless security standards
()
Implementing wireless security
()
Threats to your wireless network
()
Enterprise wireless
()
Installing a wireless network
()
Wireless scenarios
()
More wireless scenarios
()
15. Virtualization and Cloud Computing
Virtualization basics
()
Your first virtual machine
()
Cloud computing basics
()
Software-defined networking (SDN)
()
16. Data Centers
Classic data center architecture
()
High availability
()
17. Integrating Networked Devices
Internet of Things (IoT) and Industrial Internet of Things (IIoT)
()
Industrial control systems (ICS) and SCADA
()
What are network operations?
()
Encryption key management
()
Configuration management
()
Documentation
()
Documenting the datacenter
()
Patching and updating
()
Disaster recovery and backups
()
18. Network Operations
Security concepts
()
Defense in depth (DiD)
()
Rogue DHCP servers
()
Denial of service (DoS) and distributed denial of service (DDoS)
()
On-path attacks
()
VLAN hopping
()
Lifecycle management
()
Malware
()
Social engineering
()
Logical security
()
Physical security
()
19. Protecting Networks
Network monitoring technologies
()
System monitoring
()
Network troubleshooting
()