Network+ (N10-009) Cert Guide
(N10-009.AB1) / ISBN : 978-1-64459-621-0
About This Course
Skills You’ll Get
Interactive Lessons
27+ Interactive Lessons | 529+ Exercises | 263+ Quizzes | 489+ Flashcards | 489+ Glossary of terms
Gamified TestPrep
90+ Pre Assessment Questions | 2+ Full Length Tests | 90+ Post Assessment Questions | 180+ Practice Test Questions
Hands-On Labs
120+ LiveLab | 120+ Video tutorials | 03:45+ Hours
Introduction
- Who Should Read This Course?
- CompTIA Network+ Exam Topics
- How This Course Is Organized
The OSI Model and Encapsulation
- The Purpose of Reference Models
- The OSI Model
- The TCP/IP Stack
- Real-World Case Study
- Summary
- Review All the Key Topics
- Additional Resources
Networking Appliances, Applications, and Functions
- Physical and Virtual Appliances
- Applications and Functions
- Real-World Case Study
- Summary
- Review All the Key Topics
- Additional Resources
Cloud Concepts
- Network Functions Virtualization (NFV)
- Cloud Networking Components
- Deployment Models
- Service Models
- Key Cloud Concepts
- Real-World Case Study
- Summary
- Review All the Key Topics
- Additional Resources
Networking Ports, Protocols, Services, and Traffic Types
- Ports and Protocols
- Internet Protocol (IP) Types
- Traffic Types
- Summary
- Review All the Key Topics
- Additional Resources
Transmission Media and Transceivers
- Wireless
- Copper and Fiber Media and Connectors
- Multiplexing in Fiber-Optic Networks
- Real-World Case Study
- Summary
- Review All the Key Topics
- Additional Resources
Network Topologies, Architectures, and Types
- Defining a Network
- Network Types and Characteristics
- Networks Defined Based on Resource Location
- Networks Defined by Topology
- The Three-Tier Hierarchical Model
- Real-World Case Study
- Summary
- Review All the Key Topics
- Additional Resources
IPv4 Addressing
- Binary Numbering
- IPv4 Addressing
- Assigning IPv4 Addresses
- Subnetting
- Real-World Case Study
- Summary
- Review All the Key Topics
- Additional Resources
Evolving Use Cases
- SDN and SD-WAN
- Virtual Extensible Local Area Network (VXLAN)
- Zero Trust Architecture (ZTA)
- SASE and SSE
- Infrastructure as Code (IaC)
- IP Version 6
- Real-World Case Study
- Summary
- Review All the Key Topics
- Additional Resources
Routing Technologies
- Routing
- Sources of Routing Information
- Routing Protocol Characteristics
- Routing Protocol Examples
- Address Translation
- First Hop Redundancy Protocol (FHRP)
- Real-World Case Study
- Summary
- Review All the Key Topics
- Additional Resources
Ethernet Switching Technologies
- Principles of Ethernet
- Ethernet Switch Features
- Real-World Case Study
- Summary
- Review All the Key Topics
- Additional Resources
Configure Wireless Devices and Technologies
- Introducing Wireless LANs
- Deploying Wireless LANs
- Securing Wireless LANs
- Real-World Case Study
- Summary
- Review All the Key Topics
- Additional Resources
Physical Installations
- Important Installation Implications
- Power
- Environmental Factors
- Real-World Case Study
- Summary
- Review All the Key Topics
- Additional Resources
Organizational Processes and Procedures
- Documentation
- Processes and Procedures
- Real-World Case Study
- Summary
- Review All the Key Topics
- Additional Resources
Network Monitoring
- Network Monitoring Methods
- Monitoring Solutions
- Real-World Case Study
- Summary
- Review All the Key Topics
- Additional Resources
Disaster Recovery
- High Availability
- Real-World Case Study: Network Design
- Summary
- Review All the Key Topics
- Additional Resources
IPv4 and IPv6 Network Services
- Dynamic Addressing
- Name Resolution
- Time Protocols
- Real-World Case Study
- Summary
- Review All the Key Topics
- Additional Resources
Network Access and Management Methods
- Virtual Private Networks (VPNs)
- Other Network Access Technologies
- Authentication and Authorization Considerations
- In-Band vs. Out-of-Band Management
- Real-World Case Study
- Summary
- Review All the Key Topics
- Additional Resources
Network Security Concepts
- Core Security Concepts
- Authentication Methods
- Risk Management and SIEM
- Physical Security
- Audits and Regulatory Compliance
- Real-World Case Study
- Summary
- Review All the Key Topics
- Additional Resources
Types of Network Attacks
- Technology-Based Attacks
- Social Engineering Attacks
- Other Miscellaneous Attacks
- Real-World Case Study
- Summary
- Review All the Key Topics
- Additional Resources
Network Security Features
- Device Hardening
- Network Access Control (NAC)
- Other Network Security Features
- Real-World Case Study
- Summary
- Review All the Key Topics
- Additional Resources
A Network Troubleshooting Methodology
- Troubleshooting Basics
- Real-World Case Study
- Summary
- Review All the Key Topics
- Additional Resource
Troubleshoot Common Cabling Problems
- Specifications and Limitations
- Common Cable Issues
- Common Interface Issues
- Common Hardware Issues
- Common Tools
- Real-World Case Study
- Summary
- Review All the Key Topics
- Additional Resources
Troubleshoot Common Issues with Network Services
- Considerations for General Network Troubleshooting
- Common Network Service Issues
- Real-World Case Study
- Summary
- Review All the Key Topics
- Additional Resources
Troubleshoot Common Performance Issues
- Network Performance Considerations
- Wireless Performance Considerations
- Other Wireless Considerations
- Common Wireless Issues
- Wireless Network Troubleshooting
- Real-World Case Study
- Summary
- Review All the Key Topics
Network Troubleshooting Tools
- Software Tools
- Command-Line Tools
- Basic Networking Device Commands
- Hardware Tools
- Real-World Case Study
- Summary
- Review All the Key Topics
- Additional Resources
Final Preparation
- Strategies for Taking the Exam
- Summary
The OSI Model and Encapsulation
- Viewing the IPv4 Header
- Analyzing the Structure of TCP and UDP Segments
Networking Appliances, Applications, and Functions
- Connecting Systems to the Internet Through a Firewall Router
- Implementing Intrusion Detection and Prevention
- Configuring a Basic Switch
- Configuring a Firewall
- Configuring a Proxy Server
- Creating an ALB in AWS
- Configuring a Router
Cloud Concepts
- Creating a Virtual Switch
- Creating a Virtual Network in Azure
- Creating a VPC in AWS
- Creating a Network Firewall in AWS
- Creating a Network ACL
- Creating a NAT Gateway
- Creating an Internet Gateway in AWS
- Creating a VPN Connection
Networking Ports, Protocols, Services, and Traffic Types
- Understanding HTTP/HTTPS
- Exploiting SMTP
- Connecting to a Remote Computer Using the Remote Desktop Connection
- Understanding ICMP
- Configuring GRE Tunnels
- Configuring IPSec
Transmission Media and Transceivers
- Working with a Mobile Hotspot
- Connecting to an Ethernet Network
- Reconnecting to an Ethernet Network
- Providing Remote Internet Access Using Analog Modem
- Connecting Fiber Optic Cables
- Establishing an Internet Connection Between Two Switches Using a Media Converter
Network Topologies, Architectures, and Types
- Exploring a Single Location in a Lab
- Connecting Devices in a Peer-To-Peer Architecture
- Connecting Devices in a Mesh Topology
IPv4 Addressing
- Exploring APIPA and Loopback Addresses
- Configuring an IPv4 Address
- Configuring an IP Address in Linux
Evolving Use Cases
- Configuring IPv6 on a Router
- Configuring an IPv6 Address
- Configuring Stateless and Stateful DHCPv6
Routing Technologies
- Configuring Static Routing
- Configuring EIGRP
- Configuring OSPF
- Configuring BGP
- Configuring Network Address Translation
- Configuring HSRP
Ethernet Switching Technologies
- Configuring the Speed and Duplex Settings of a Network Interface
- Enabling Jumbo Frame Support
- Configuring Speed, Duplex, and Description on a Switch
- Configuring an Access Port
- Viewing the Default Status of the Interfaces on a Switch
- Connecting to a VoIP
- Observing the STP Modes
- Configuring VLAN and Trunking
- Investigating STP Loop Prevention
- Powering a VoIP Phone Using PoE Injector
- Configuring PortFast and Rapid Spanning Tree
- Configuring a BPDU Guard on a Switch Port
- Creating a VLAN and Placing a Switch Port into It
- Configuring a Loop Guard on a Switch Port
- Configuring NIC Teaming
- Configuring EtherChannel
Configure Wireless Devices and Technologies
- Connecting to a Cable Modem
- Creating a Home Wireless Network
- Configuring Autonomous Access Points
- Implementing a SOHO Network
- Connecting an iPhone to a Laptop via Bluetooth
Physical Installations
- Mounting and Stacking Switches in a Server Rack
- Providing Cooling and Ventilation to a Motherboard
Organizational Processes and Procedures
- Installing the IPAM Feature
Network Monitoring
- Viewing and Exporting Event Logs
- Configuring Syslog and Observing the Log Settings
- Monitoring the System's Performance Using Performance Monitor
Disaster Recovery
- Backing Up Files
- Creating a Restore Point
- Creating Redundant Storage
- Creating a Local Backup
- Restoring Files
IPv4 and IPv6 Network Services
- Configuring DHCP on a Router
- Configuring SLAAC
- Configuring a DNS Server
- Configuring Zone Transfers
- Viewing and Creating a Record Type
- Connecting to a DSL Network
- Examining DNS Entries
- Configuring Multi-stratum NTP
Network Access and Management Methods
- Configuring a VPN Connection on an iPad
- Creating a Site-to-Site VPN Connection
- Configuring an SSH Server on a Linux System
Network Security Concepts
- Examining PKI Certificates
- Examining a Self-Signed Certificate
- Adding a Digital Certificate
- Creating Asymmetric Key Pairs
- Understanding Symmetric Encryption
- Creating a Demilitarized Zone
- Using Honeypot
- Configuring the RADIUS Server
- Implementing Physical Security
Types of Network Attacks
- Spoofing a MAC Address
- Defending Against IP Spoofing
- Cracking Passwords Using Cain and Abel
- Configuring DHCP Snooping
- Performing ARP Spoofing
- Simulating a DoS Attack
- Using Anti-phishing Tools
- Using the SET Tool
Network Security Features
- Disabling Unnecessary Services in Windows
- Setting Up a Password Policy
- Strengthening iPad Security
Troubleshoot Common Cabling Problems
- Connecting Patch Panel Cables
Troubleshoot Common Issues with Network Services
- Troubleshooting IP Addressing Issues
- Troubleshooting Switching Issues
Network Troubleshooting Tools
- Using the Protocol Analyzer Tool
- Using Command Line Tools
- Understanding Networking and Network Diagnostics Command Line Tools
- Generating and Examining the ARP Packets
- Using the ping and tracert Commands
- Examining Port Numbers
- Using Networking Device Commands
- Testing an RJ-45 Cable Using a Cable Tester
- Using a Visual Fault Locator
- Using a Network Tap