course

Home / Courses / Computer Networking & Security

Course Objectives

Upon successful completion of this course, students will be prepared for entry to mid- level jobs as computer network support specialists. Students will learn how to analyze network data, configure network settings, and evaluate network performance.

Agenda

  • Networking Overview
  • Network Standards and the OSI Model
  • Network Types
  • Identify Network Configurations
  • Data Transmission Methods

  • Copper Media
  • Fiber Optic Media
  • Bounded Network Media Installation
  • Noise Control

  • Wireless Networking
  • Wireless Network Devices and Components
  • Install a Wireless Network

  • Physical Network Topologies
  • Logical Network Topologies
  • Ethernet Networks
  • Network Devices
  • VLANs

  • The TCP/IP Protocol Suite
  • IPv4 Addressing
  • Default IP Addressing Schemes
  • Create Custom IP Addressing Schemes
  • IPv6 Address Implementation
  • Delivery Techniques

  • Enable Static Routing
  • Implement Dynamic IP Routing

  • Assign IP Addresses
  • Domain Naming Services
  • TCP/IP Commands
  • Common TCP/IP Protocols

  • WAN Basics
  • WAN Connectivity Methods
  • WAN Transmission Technologies
  • Unified Communication Technologies

  • Virtualization
  • SAN Implementations
  • Cloud Computing

  • Introduction to Network Security
  • Vulnerabilities
  • Threats and Attacks
  • Authentication Methods
  • Encryption Methods

  • Physical Security Controls
  • Network Access Controls
  • Install and Configure Firewalls
  • Harden Networks
  • Intrusion Detection and Prevention
  • Educate Users

  • Incident Management and Response
  • Basic Forensic Concepts

  • Remote Network Architectures
  • Remote Access Networking Implementations
  • Virtual Private Networking
  • VPN Protocols

  • Network Monitoring
  • Configuration Management Documentation
  • Network Performance Optimization

  • Network Troubleshooting Models
  • Network Troubleshooting Utilities
  • Hardware Troubleshooting Tools
  • Common Connectivity Issues

  • Appendix A: Mapping Course Content to the CompTIA Network+ Exam
  • Appendix B: Network Fault Tolerance and Disaster Recovery
  • Appendix C: Planning and Implementing a SOHO Network
  • Appendix D: Legend for Icons Used in Network+ Figures

  • The Information Security Cycle
  • Information Security Controls
  • Authentication Methods
  • Cryptography Fundamentals
  • Security Policy Fundamentals

  • Social Engineering
  • Malware
  • Software-Based Threats
  • Network-Based Threats
  • Wireless Threats and Vulnerabilities
  • Physical Threats and Vulnerabilities

  • Manage Data Security
  • Manage Application Security
  • Manage Device and Host Security
  • Manage Mobile Security

  • Configure Security Parameters on Network Devices and Technologies
  • Network Design Elements and Components
  • Implement Networking Protocols and Services
  • Apply Secure Network Administration Principles
  • Secure Wireless Traffic

  • Access Control and Authentication Services
  • Implement Account Management Security Controls

  • Install a CA Hierarchy
  • Enroll Certificates
  • Secure Network Traffic by Using Certificates
  • Renew Certificates
  • Back Up and Restore Certificates and Private Keys
  • Revoke Certificates

  • Physical Security
  • Legal Compliance
  • Security Awareness and Training
  • Integrate Systems and Data with Third Parties

  • Risk Analysis
  • Implement Vulnerability Assessment Tools and Techniques
  • Scan for Vulnerabilities
  • Mitigation and Deterrent Techniques

  • Respond to Security Incidents
  • Recover from a Security Incident

  • Business Continuity
  • Plan for Disaster Recovery
  • Execute DRPs and Procedures
Tags
Vendor: Logical Operations Technical Core Type: Core 5 Product Line: CompTIA LoD Tier: Custom
FREE

Interested in course?


Course Type: Instructor Led