Course Objectives
Upon successful completion of this course, students will be prepared for entry to mid- level jobs as computer network support specialists. Students will learn how to analyze network data, configure network settings, and evaluate network performance.
Agenda
- Networking Overview
- Network Standards and the OSI Model
- Network Types
- Identify Network Configurations
- Data Transmission Methods
- Copper Media
- Fiber Optic Media
- Bounded Network Media Installation
- Noise Control
- Wireless Networking
- Wireless Network Devices and Components
- Install a Wireless Network
- Physical Network Topologies
- Logical Network Topologies
- Ethernet Networks
- Network Devices
- VLANs
- The TCP/IP Protocol Suite
- IPv4 Addressing
- Default IP Addressing Schemes
- Create Custom IP Addressing Schemes
- IPv6 Address Implementation
- Delivery Techniques
- Enable Static Routing
- Implement Dynamic IP Routing
- Assign IP Addresses
- Domain Naming Services
- TCP/IP Commands
- Common TCP/IP Protocols
- WAN Basics
- WAN Connectivity Methods
- WAN Transmission Technologies
- Unified Communication Technologies
- Virtualization
- SAN Implementations
- Cloud Computing
- Introduction to Network Security
- Vulnerabilities
- Threats and Attacks
- Authentication Methods
- Encryption Methods
- Physical Security Controls
- Network Access Controls
- Install and Configure Firewalls
- Harden Networks
- Intrusion Detection and Prevention
- Educate Users
- Incident Management and Response
- Basic Forensic Concepts
- Remote Network Architectures
- Remote Access Networking Implementations
- Virtual Private Networking
- VPN Protocols
- Network Monitoring
- Configuration Management Documentation
- Network Performance Optimization
- Network Troubleshooting Models
- Network Troubleshooting Utilities
- Hardware Troubleshooting Tools
- Common Connectivity Issues
- Appendix A: Mapping Course Content to the CompTIA Network+ Exam
- Appendix B: Network Fault Tolerance and Disaster Recovery
- Appendix C: Planning and Implementing a SOHO Network
- Appendix D: Legend for Icons Used in Network+ Figures
- The Information Security Cycle
- Information Security Controls
- Authentication Methods
- Cryptography Fundamentals
- Security Policy Fundamentals
- Social Engineering
- Malware
- Software-Based Threats
- Network-Based Threats
- Wireless Threats and Vulnerabilities
- Physical Threats and Vulnerabilities
- Manage Data Security
- Manage Application Security
- Manage Device and Host Security
- Manage Mobile Security
- Configure Security Parameters on Network Devices and Technologies
- Network Design Elements and Components
- Implement Networking Protocols and Services
- Apply Secure Network Administration Principles
- Secure Wireless Traffic
- Access Control and Authentication Services
- Implement Account Management Security Controls
- Install a CA Hierarchy
- Enroll Certificates
- Secure Network Traffic by Using Certificates
- Renew Certificates
- Back Up and Restore Certificates and Private Keys
- Revoke Certificates
- Physical Security
- Legal Compliance
- Security Awareness and Training
- Integrate Systems and Data with Third Parties
- Risk Analysis
- Implement Vulnerability Assessment Tools and Techniques
- Scan for Vulnerabilities
- Mitigation and Deterrent Techniques
- Respond to Security Incidents
- Recover from a Security Incident
- Business Continuity
- Plan for Disaster Recovery
- Execute DRPs and Procedures
FREE
Interested in course?
Course Type: Instructor Led