Computers, tablets, laptops & servers

Price search results for CompTIA Network Certification N10 008 Online Training Course 

CompTIA Network+ Certification (N10-008) Online Training Course

CompTIA Network+ Certification (N10-008) Online Training Course

CompTIA Network+ Certification (N10-008) Online Training Course - Course Description The brand new CompTIA Network+ N10-008 Certification is a worldwide recognized qualification which validates the skills of networking professionals. The qualification...read more

Price
£
£59.00
from
Here are the details of the CompTIA Network+ Certification (N10-008) Online Training Course. Course Description The brand new CompTIA Network+ N10-008 Certification is a worldwide recognized qualification which validates the skills of networking professionals. The qualification recognizes a technician's ability to describe the features and functions of network components and to manage, maintain, troubleshoot, install, operate and configure basic network infrastructure.This course makes sure the successful candidate has the knowledge and skills required to implement a defined network architecture with basic network security. Furthermore, a successful candidate will be able to configure, maintain, and troubleshoot network devices using appropriate network tools and understand the features and purpose of network technologies. Candidates will be able to make basic solution recommendations, analyze network traffic, and be familiar with common protocols and media types. Example Training Video (Not From This Course) PrerequisitesStudents taking this course should meet the following pre-requisites: CompTIA A+ certification or equivalent experience At least 1 year of experience supporting TCP/IP networks Course Objectives By the end of this course, you will: Describe basic networking concepts Describe network infrastructure and explain how to deploy common network components Describe network operations and explain how to support a production network Describe network security concepts and explain how to implement basic network security Describe network troubleshooting and explain how to use common tools to troubleshoot a network Module 1 – Networking Concepts1.1 Basic NetworkingYou will explain basic networking.Topics: Intro to networking Networking architectures Activity Basic Networking 1.2 OSI ModelYou will explain devices, applications, protocols, and services at their appropriate OSI layers.Topics: Layer 7 – Application Layer 6 – Presentation Layer 5 – Session Layer 4 – Transport Layer 3 – Network Layer 2 – Data Link Layer 1 – Physical Activity Exploring the OSI Model 1.3 Protocols and PortsYou will explain the purposes and uses of ports and protocols.Topics: Protocols and ports overview Activity Examining Protocols and Ports Connection-oriented vs. connectionless Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Activity Comparing TCP and UDP Internet Protocol (IP) Internet Control Messaging Protocol (ICMP) Internet Group Messaging Protocol (IGMP) Activity Examining the Lower Layer Protocols Layer 7 Remote Control Protocols Layer 7 File Transfer Protocols Layer 7 Messaging Protocols Activity Examining Messaging Protocols Layer 7 Web Traffic Protocols Layer 7 Streaming Media Protocols Layer 7 Infrastructure Management Protocols 1.4 SwitchingYou will explain the concepts and characteristics of switching.Topics: Packet-switched vs. circuit-switched networks Properties of Network Traffic Contention Management Activity Creating Collision and Broadcast Domains Interface Properties and Segmentation Activity Creating a Basic Network Segment Switching prt 2 Activity Switching Switching Loop Management Activity Managing Switching Loops VLANs Activity Creating VLANs 1.5 RoutingYou will explain the concepts and characteristics of routing.Topics: ARP Activity Examining ARP IP Addressing Basics Activity Configuring IP Routers Activity Setting Up a Router Routing Basics Activity Adding Static Routes VLAN Routing Activity Routing Between VLANs NAT/PAT Activity Configuring NAT/PAT Routing Protocols Activity Configuring a Routing Protocol Firewalls Activity Configuring Firewalls 1.6 Advanced Switching and Routing ConceptsYou will explain advanced switching and routing concepts.Topics: IPv6 Concepts Activity Exploring IPv6 Performance Concepts Distributed Switching Software-defined Networking 1.7 IP AddressingYou will, given a scenario, configure the appropriate IP addressing components.Topics: Public vs. Private Loopback and Reserved Subnet Mask Default Gateway Virtual IP Subnetting Activity Learning to Subnet Address Assignments 1.8 Network Types and TopologiesYou will compare and contrast the characteristics of network topologies, types and technologies.Topics: Wired Topologies Wireless Topologies Network Types Technologies that Facilitate the Internet Of Things (IoT) (No activity for this chapter) 1.9 Wireless TechnologiesYou will, given a scenario, implement the appropriate wireless technologies and configurations.Topics: Radio Basics 802.11 Standards Wi-Fi Frequencies Wi-Fi Antenna Concepts Bluetooth Cellular Site Surveys Activity Using an RF Spectrum Analyzer 1.10 Cloud ConceptsYou will summarize cloud concepts and their purposes.Topics: Types of Services Cloud Delivery Models Security Implications/Considerations Activity Exploring Cloud Services 1.11 Network ServicesYou will explain the functions of network services.Topics: DNS Service Activity Setting up DNS DHCP Service Activity Setting Up DHCP NTP IPAM Module 2 – Infrastructure2.1 Cabling SolutionsYou will, given a scenario, deploy the appropriate cabling solution.Topics: Media Types Activity Testing a Fiber Optic Cable Plenum vs. PVC Connector Types Activity Crimping on an RJ-45 Connector Transceivers Termination Points Activity Terminating Cable to a 110 Block Copper Cable Standards Copper Termination Standards Activity Creating a Crossover Cable Ethernet Deployment Standards 2.2 Network Device Placement and InstallationYou will, given a scenario, determine the appropriate placement of networking devices on a network and install/configure them.Topics: Network Interface Repeater Hub Bridge Switch Router Modem Wireless Access Point Activity Setting up a WAP Firewall Media Converter Wireless Range Extender VoIP Endpoint 2.3 Advanced Network DevicesYou will explain the purposes and use cases for advanced networking devices.Topics: Multilayer Switch Wireless Controller Load Balancer IDS/IPS Proxy Server Activity Configuring Proxy Settings VPN Concentrator AAA/RADIUS Server UTM Appliance NGFW/Layer 7 Firewall VoIP PBX VoIP Gateway Content Filter 2.4 Virtualization and Network Storage TechnologiesYou will explain the purposes of virtualization and network storage technologies.Topics: Virtual Networking Components Network Storage Types Connection Types Jumbo Frames (No activity for this chapter) 2.5 WAN TechnologiesYou will compare and contrast WAN technologies.Topics: Service Types Transmission Mediums Characteristics of Service Activity Configuring WAN Links Termination Module 3 – Network Operations3.1 DocumentationYou will, given a scenario, use appropriate documentation and diagrams to manage the network.Topics: Diagram Symbols Standard Operating Procedures/Work Instructions Logical vs. Physical Diagrams Rack Diagrams Change Management Documentation Wiring and Port Locations IDF/MDF Documentation Labeling Network Configuration and Performance Baselines Inventory Management Activity Using Documentation 3.2 Business Continuity and Disaster RecoveryYou will compare and contrast business continuity and disaster recovery concepts.Topics: Availability Concepts Recovery Activity Backing Up Your Data MTTR MTBF SLA Requirements 3.3 Scanning, Monitoring, and PatchingYou will explain common scanning, monitoring and patching processes and summarize their expected outputs.Topics: Processes Event Management SNMP Monitors Metrics Activity Testing the Network 3.4 Remote Access MethodsYou will, given a scenario, use remote access methods.Topics: VPN RDP SSH VNC Telnet HTTPS/Management URL Remote File Access Out-of-Band Management Activity Making Remote Connections 3.5 Policies and Best PracticesYou will identify policies and best practices.Topics: Privileged User Agreement Password Policy On-boarding/Off-boarding Procedures Licensing Restrictions International Export Controls Data Loss Prevention Remote Access Policies Incident Response Policies BYOD AUP NDA System Life Cycle Safety Procedures And Policies Activity Creating Policies and Procedures Module 4 – Network Security4.1 Physical Security DevicesYou will summarize the purposes of physical security devices.Topics: Detection Prevention (No activity for this chapter) 4.2 Authentication and Access ControlYou will explain authentication and access controls.Topics: Authorization, Authentication, and Accounting Multifactor Authentication Access Control Activity Examining Access Control Mechanisms 4.3 Basic Wireless Network SecurityYou will, given a scenario, secure a basic wireless network.Topics: WPA WPA2 TKIP-RC4 CCMP-AES Authentication and Authorization Geofencing Activity Demonstrating the Need for Wireless Security 4.4 Common Network AttacksYou will summarize common networking attacks.Topics: DoS Social Engineering Insider Threat Logic Bomb Rogue Access Point Evil Twin War-driving Phishing Ransomware DNS Poisoning ARP Poisoning Spoofing Deauthentication Brute Force VLAN Hopping Man-in-the-Middle Exploits vs. Vulnerabilities Activity Conducting a Phishing Attack 4.5 Network Device HardeningYou will, given a scenario, implement network device hardening.Topics: Changing Default Credentials Avoiding Common Passwords File Hashing Generating New Keys Activity Supporting Secure Authentication and Encryption Upgrading Firmware Patching and Updates Disabling Unnecessary Services Using Secure Protocols Disabling Unused Ports 4.6 Common Mitigation TechniquesYou will explain common mitigation techniques and their purposes.Topics: Signature Management Device Hardening Change Native VLAN Switchport Protection Network Segmentation Privileged User Account File Integrity Monitoring Role Separation Restricting Access Via ACLs Honeypot/Honeynet Penetration Testing Activity Implementing a Honeypot Module 5 – Network Troubleshooting and Tools5.1 Network Troubleshooting MethodologyYou will explain the network troubleshooting methodology.Topics: Identify the Problem Establish a Theory of Probable Cause Test the Theory to Determine the Cause Establish a Plan of Action to Resolve the Problem and Identify Potential Effects Implement the Solution or Escalate as Necessary Verify Full System Functionality and , if Applicable, Implement Preventive Measures Document Findings, Actions, and Outcomes (No activity for this chapter) 5.2 Using the Appropriate ToolYou will, given a scenario, use the appropriate tool.Topics: Hardware Tools – Basic Hand Held Hardware Tools – Analyzers Activity Troubleshooting with Hardware Tools Software Tools – Testers and Analyzers Activity Troubleshooting with Software Tools Software Tools – Command Line Activity Using Command Line Tools 5.3 Troubleshoot Wired Connectivity and PerformanceYou will, given a scenario, troubleshoot common wired connectivity and performance issues.Topics: Signal Issues: Attenuation Latency Jitter Crosstalk EMI Activity Troubleshooting Signal Problems Physical Issues: Open/short Incorrect pin-out Incorrect Cable Type Bad Port Damaged cable Bent pins Transceiver Issues: Transceiver mismatch TX/RX reverse Duplex/speed mismatch Activity Troubleshooting Transceiver Problems Traffic Flow Issues: Bottleneck VLAN mismatch Network connection LED status indicators 5.4 Troubleshoot Wireless Connectivity and PerformanceYou will, given a scenario, troubleshoot common wireless connectivity and performance issues.Topics: Signal Loss: Attenuation Reflection Refraction Absorption Latency andamp; Jitter Antenna Issues: Incorrect antenna type Incorrect antenna placement Incorrect WAP type WAP Issues: Interference Channel overlap Overcapacity Distance limitations Frequency mismatch Power levels Signal-to-noise ratio WAP Misconfiguration: Wrong SSID Wrong passphrase Security type mismatch Activity Troubleshooting WAP Issues 5.5 Troubleshoot Common Network Service IssuesYou will, given a scenario, troubleshoot common network service issues.Topics: Common Network Issues: Physical Connectivity Incorrect IP Address Incorrect Gateway Incorrect Netmask Names Not Resolving Untrusted SSL Certificate DHCP Issues: Duplicate IP Addresses Expired IP Address Rogue DHCP Exhausted DHCP Scope Firewall/ACL Issues: Blocked TCP/UDP Ports Incorrect Host-based Firewall Settings Incorrect ACL Settings Advanced Network Issues: DNS Server Issues Duplicate MAC Addresses Incorrect Time Unresponsive Service Hardware Failure Activity Case Study: Troubleshooting an Unusual LEARN365 Courses Include 12 Months Unlimited Online Access to: Expert Instructor-Led Training: Learn 365 uses only the industry's finest instructors in the IT industry. They have a minimum of 15 years real-world experience and are subject matter experts in their fields. Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This creates a personal learning experience and gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7. Visual Demonstrations andamp; Multimedia Presentations: Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor. Learn 365 always focuses on real world scenarios and skill-set development. Quizzes andamp; Exam Simulators: Learn 365's custom practice exams prepare you for your exams differently and more effectively than the traditional exam preps on the market. You will have practice quizzes after each module to ensure you are confident on the topic you have completed before proceeding. This will allow you to gauge your effectiveness before moving to the next module in your course. Learn 365 courses also include practice exams designed to replicate and mirror the environment in the testing centre. These exams are on average 100 questions to ensure you are 100% prepared before taking your certification exam. Social Learning andamp; Networking: Learn 365 has designed a world class Learning Management System (LMS). This system allows you to interact and collaborate with other students and Learn 365 employees, form study groups, engage in discussions in our NOW@ Forums, rate and like different courses and stay up to date with all the latest industry knowledge through our forums, student contributions and announcement features. Flash Cards andamp; Educational Games: IT online learning knows that education is not a one size fits all approach. Students learn in different ways through different tools. That is why we provide Flash Cards and Education Games throughout our courses. This will allow you to train in ways that keep you engaged and focused. Each course will have dozens of Flash Cards so you can sharpen your skill-sets throughout your training as well as educational games designed to make sure your retention level of the materials is extremely high. Navigation and Controls: Learn 365's self-paced training programs are designed in a modular fashion to allow you the flexibility to work with expert level instruction anytime 24/7. All courses are arranged in defined sections with navigation controls allowing you to control the pace of your training. This allows students to learn at their own pace around their schedule. Certificate of Completion: Upon completion of your training course, you will receive a Certificate of completion displaying your full name, course completed as well as the date of completion. You can print this out or save it digitally to showcase your accomplishment. Need to train your Team? Contact Us for Discounts on Multiple Subscription Purchases.
Secure

Copyright © 2014 onwards - Deals4Computers - 4theUK Ltd