CompTIA Network + 2009 Training

$54.57 (tax incl.)

The demand for skilled network support professionals continues to grow, and our CompTIA Network+ training course is exactly the thing…

Categorized in
Quantity

The demand for skilled network support professionals continues to grow, and our CompTIA Network+ training course is exactly the thing you need to successfully prepare for the accompanying certification exam to become an IT professional. CompTIA Network+ 2009 certification validates the knowledge and skills of networking professionals. It is an international, vendor-neutral certification that recognizes a technician’s ability to describe the features and functions of networking components and to install, configure and troubleshoot basic networking hardware, protocols and services. The Network+ training video course allows you to gain these valuable skills by learning from certified professionals who have years of experience in the IT world and will pass it down to you when taking our self-study Network+ certification training course.

Network+ Exam Number

  • N10-004

CompTIA Network+ Certification Training Outline:

1.0 Network Basics

Introduction
Network Concepts
Network Wiring
Wireless Fundamentals
Network Architectures
Network Topologies
Topologies and Connection Types
Ethernet Architecture
WAN Topologies and Connection Types
Understanding the OSI/RM
Using the OSI Reference Model
Summary

2.0 Understanding Wired Network Connections

Introduction
Cables and Connectors
Network Connection Methods
How to Configure Local Connections Demo
Understanding and Configuring TCP/IP
TCP/IP Addressing
Using the Subnet Mask to Determine a Network ID/Host ID
Understanding IPv4 Addressing
Classful vs. Classless Architecture
The Role of ARP
How ARP/IP Works Together
Communication with IPv4
Using ARP Command Line Tool Demo
Subnetting IPv4 Networks
Subnet Mask Overview
Subnetting for Complex Networks
Subnetting for Complex Networks
IPv4 Fundamentals
Understanding the Need for IPv6
Overview of IPv6
Unicast IPv6 Addresses
Understanding and Configuring Name Resolution
Name Resolution Basics
DNS Components
Understanding the Concept of DNS Zone
Name Resolution Process
Process of a Client Resolving an Internet Host Demo
How to Resolve Web Server Name using DNS
NetBIOS Name Resolution and WINS
Configuring NetBIOS Name Resolution on a Windows Client Demo
Understanding and Configuring Automatic Addressing
Introducing DHCP
Configuring Dynamic IP Addresses
Troubleshooting TCP/IP Connections
Understanding Wired Network Connections
Summary

3.0 Understanding Network-to-Network Connections

Introduction
Overview of Internet Service Providers
Process of Small and Regional ISP Setups
Connecting the ISP to the LAN
How Physical Wiring Works in the LAN
Understanding LAN Wiring Components
Summary

4.0 Internet Working Devices

Introduction
Overview of Networking Devices
Physical Layer Devices
Data Link Layer Devices
Understanding Switches
Process of VLAN Trunking
Network Layer Devices
Routing Overview
Examining the Routing Table on a Windows 7 Client Demo
Process of Routing Between Different Network Segments
Routing Protocols
Specialized Internetworking Devices
Higher Level Switches
Internetworking Devices
Summary

5.0 Understanding Wireless Networking

Introduction
Wireless Networking Devices
Wireless Network Standings
Wireless Access Protocols
Wireless Security
Wireless Configuration
Understanding Wireless Networking
Summary

6.0 Network Security

Introduction
Security Threats
Malicious Code
Social Engineering
Network Attacks
Threat Mitigation
Human Resource Policies
Awareness and Education
Operating System Security
Using the Microsoft Anti-Spyware Capabilities Demo
Operating System Security
Configuring Automatic Update Settings Demo
Operating System Security
Configuring the Windows Firewall Program Demo
Network Security Devices
Network Protection Devices
Perimeter Networks
Diagramming Different Styles Of Perimeter Networks
Virtual Private Networks
Security Network Devices
Network Access Control
Authentication Process and Application
Authentication Protocols
Typical Login and Resource Access Process for User
Authentication Protocols
Public Key Infrastructure
PKI Basics
Remote Access Security
Centralizing Remote Access Authentication
Summary

7.0 Monitoring and Troubleshooting

Introduction
Monitoring Resources
Monitor Resource and the Network in General Demo
Monitoring Resources
Monitoring Events
Process of Using Event Viewer Demo
Troubleshooting Basics
Troubleshooting Network
Troubleshooting Wireless Connections
Troubleshooting TCP/IP
Monitoring and Troubleshooting
Summary