Embark on a transformative journey through the intricate landscape of networking with the CompTIA Network+ Certification (N10-007). This course isn’t just about mastering the intricacies of network models or delving into the depths of cabling and topology; it’s about empowering yourself with the skills and knowledge to navigate the digital highways of the modern era confidently. Picture yourself as the architect, laying down the foundations of robust networks, securing them against digital threats, and troubleshooting with finesse. With CompTIA Network+ +, you’re not just learning; you’re shaping your future in information technology.
In this comprehensive course, you’ll traverse through 22 meticulously crafted sections, each unlocking a new facet of comptia networking. From understanding the fundamentals of TCP/IP to exploring the nuances of wireless networking and delving into virtualization and cloud computing, every lesson is a stepping stone towards network mastery. Through immersive learning experiences and hands-on comptia network+ practice tests, you’ll absorb theoretical knowledge and hone your practical skills, preparing you for real-world challenges.
After studying the course materials of the CompTIA Network+ Certification (N10-007) there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60.
This CompTIA Network+ Certification (N10-007) does not require you to have any prior qualifications or experience. You can just enrol and start learning.This CompTIA Network+ Certification (N10-007) was made by professionals and it is compatible with all PC’s, Mac’s, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection.
Section 01: Introduction | |||
Introduction | 00:03:00 | ||
Section 02: Network Models | |||
What is a Model? | 00:02:00 | ||
OSI vs. TCP/IP Model | 00:07:00 | ||
Walking Through OSI and TCP/IP | 00:12:00 | ||
Meet the Frame | 00:06:00 | ||
The MAC Address | 00:07:00 | ||
Broadcast vs. Unicast | 00:04:00 | ||
Introduction to IP Addressing | 00:08:00 | ||
Packets and Ports | 00:05:00 | ||
Section 03: Cabling and Topology | |||
Network Topologies | 00:10:00 | ||
Coaxial Cabling | 00:05:00 | ||
Twisted Pair Cabling | 00:06:00 | ||
Cat Ratings | 00:06:00 | ||
Fiber Optic Cabling | 00:09:00 | ||
Fire Ratings | 00:05:00 | ||
Legacy Network Connections | 00:07:00 | ||
Section 04: Ethernet Basics | |||
What is Ethernet? | 00:07:00 | ||
Ethernet Frames | 00:07:00 | ||
Early Ethernet | 00:08:00 | ||
The Daddy of Ethernet, 10BaseT | 00:03:00 | ||
Terminating Twisted Pair | 00:14:00 | ||
Hubs vs. Switches | 00:13:00 | ||
Section 05: Modern Ethernet | |||
100BaseT | 00:05:00 | ||
Connecting Switches | 00:05:00 | ||
Gigabit Ethernet and 10-Gigabit Ethernet | 00:05:00 | ||
Transceivers | 00:07:00 | ||
Connecting Ethernet Scenarios | 00:14:00 | ||
Section 06: Installing a Physical Network | |||
Introduction to Structured Cabling | 00:04:00 | ||
Terminating Structured Cabling | 00:08:00 | ||
Equipment Room | 00:07:00 | ||
Alternative Distribution Panels | 00:04:00 | ||
Testing Cable | 00:09:00 | ||
Troubleshooting Structured Cabling, Part 1 | 00:05:00 | ||
Troubleshooting Structured Cabling, Part 2 | 00:05:00 | ||
Using a Toner and Probe | 00:03:00 | ||
Wired Connection Scenarios | 00:11:00 | ||
Section 07: TCP/IP Basics | |||
Introduction to IP Addressing and Binary | 00:13:00 | ||
Introduction to ARP | 00:04:00 | ||
Classful Addressing | 00:10:00 | ||
Subnet Masks | 00:12:00 | ||
Subnetting with CIDR | 00:10:00 | ||
More CIDR Subnetting Practice | 00:10:00 | ||
Dynamic and Static IP Addressing | 00:18:00 | ||
Rogue DHCP Servers | 00:07:00 | ||
Special IP Addresses | 00:07:00 | ||
IP Addressing Scenarios | 00:15:00 | ||
Section 08: Routing | |||
Introducing Routers | 00:15:00 | ||
Understanding Ports | 00:05:00 | ||
Network Address Translation | 00:06:00 | ||
Implementing NAT | 00:03:00 | ||
Forwarding Ports | 00:18:00 | ||
Tour of a SOHO Router | 00:12:00 | ||
SOHO vs. Enterprise | 00:09:00 | ||
Static Routes | 00:13:00 | ||
Dynamic Routing | 00:11:00 | ||
RIP | 00:04:00 | ||
OSPF | 00:04:00 | ||
BGP | 00:06:00 | ||
Section 09: TCP/IP Applications | |||
TCP and UDP | 00:07:00 | ||
ICMP and IGMP | 00:06:00 | ||
Handy Tools | 00:07:00 | ||
Introduction to Wireshark | 00:11:00 | ||
Introduction to netstat | 00:09:00 | ||
Web Servers | 00:12:00 | ||
FTP | 00:12:00 | ||
E-mail Servers and Clients | 00:09:00 | ||
Securing E-mail | 00:06:00 | ||
Telnet and SSH | 00:09:00 | ||
Network Time Protocol | 00:02:00 | ||
Network Service Scenarios | 00:10:00 | ||
Section 10: Network Naming | |||
Understanding DNS | 00:12:00 | ||
Applying DNS | 00:19:00 | ||
The Hosts File | 00:04:00 | ||
Net Command | 00:08:00 | ||
Windows Name Resolution | 00:11:00 | ||
Dynamic DNS | 00:05:00 | ||
DNS Troubleshooting | 00:13:00 | ||
Section 11: Securing TCP/IP | |||
Making TCP/IP Secure | 00:04:00 | ||
Symmetric Encryption | 00:06:00 | ||
Asymmetric Encryption | 00:03:00 | ||
Cryptographic Hashes | 00:05:00 | ||
Identification | 00:12:00 | ||
Access Control | 00:04:00 | ||
AAA | 00:05:00 | ||
Kerberos/EAP | 00:08:00 | ||
Single Sign-On | 00:10:00 | ||
Certificates and Trust | 00:14:00 | ||
Certificate Error Scenarios | 00:08:00 | ||
Section 12: Advanced Networking Devices | |||
Understanding IP Tunneling | 00:06:00 | ||
Virtual Private Networks | 00:13:00 | ||
Introduction to VLANs | 00:12:00 | ||
InterVLAN Routing | 00:03:00 | ||
Interfacing with Managed Switches | 00:11:00 | ||
Switch Port Protection | 00:07:00 | ||
Port Bonding | 00:07:00 | ||
Port Mirroring | 00:04:00 | ||
Quality of Service | 00:05:00 | ||
IDS vs. IPS | 00:04:00 | ||
Proxy Servers | 00:13:00 | ||
Load Balancing | 00:09:00 | ||
Device Placement Scenarios | 00:13:00 | ||
Section 13: IPv6 | |||
Introduction to IPv6 | 00:13:00 | ||
IPv6 Addressing | 00:15:00 | ||
IPv6 in Action | 00:13:00 | ||
IPv4 and IPv6 Tunneling | 00:05:00 | ||
Section 14: Remote Connectivity | |||
Telephony Technologies | 00:09:00 | ||
Optical Carriers | 00:03:00 | ||
Packet Switching | 00:05:00 | ||
Connecting with Dial-up | 00:05:00 | ||
Digital Subscriber Line (DSL) | 00:05:00 | ||
Connecting with Cable Modems | 00:04:00 | ||
Connecting with Satellites | 00:03:00 | ||
ISDN and BPL | 00:04:00 | ||
Remote Desktop Connectivity | 00:05:00 | ||
Advanced Remote Control Systems | 00:09:00 | ||
Section 15: Wireless Networking | |||
Introduction to 802.11 | 00:12:00 | ||
802.11 Standards | 00:12:00 | ||
Power over Ethernet (PoE) | 00:04:00 | ||
Antennas | 00:09:00 | ||
Wireless Security Standards | 00:16:00 | ||
Implementing Wireless Security | 00:07:00 | ||
Threats to Your Wireless Network | 00:07:00 | ||
Retro Threats | 00:05:00 | ||
Wi-Fi Protected Setup (WPS) | 00:05:00 | ||
Enterprise Wireless | 00:06:00 | ||
Installing a Wireless Network | 00:15:00 | ||
Wireless Scenarios | 00:07:00 | ||
More Wireless Scenarios | 00:09:00 | ||
Section 16: Virtualization and Cloud Computing | |||
Virtualization Basics | 00:07:00 | ||
Cloud Ownership | 00:03:00 | ||
Cloud Implementation | 00:12:00 | ||
Your First Virtual Machine | 00:09:00 | ||
NAS and SAN | 00:16:00 | ||
Platform as a Service (PaaS) | 00:09:00 | ||
Software as a Service (SaaS) | 00:03:00 | ||
Infrastructure as a Service (IaaS) | 00:10:00 | ||
Section 17: Mobile Networking | |||
Cellular Technologies | 00:05:00 | ||
Mobile Connectivity | 00:07:00 | ||
Deploying Mobile Devices | 00:05:00 | ||
Mobile Access Control | 00:06:00 | ||
Section 18: Building a Real-World Network | |||
Network Types | 00:04:00 | ||
Network Design | 00:10:00 | ||
Power Management | 00:06:00 | ||
Unified Communications | 00:11:00 | ||
Network Documentation | 00:07:00 | ||
Contingency Planning | 00:10:00 | ||
Predicting Hardware Failure | 00:05:00 | ||
Backups | 00:08:00 | ||
Section 19: Managing Risk | |||
What is Risk Management? | 00:06:00 | ||
Security Policies | 00:08:00 | ||
Change Management | 00:07:00 | ||
User Training | 00:03:00 | ||
Standard Business Documentation | 00:05:00 | ||
Mitigating Network Threats | 00:05:00 | ||
High Availability | 00:05:00 | ||
Section 20: Protecting Your Network | |||
Denial of Service | 00:09:00 | ||
Malware | 00:10:00 | ||
Social Engineering | 00:04:00 | ||
Access Control | 00:08:00 | ||
Man-in-the-Middle | 00:22:00 | ||
Introduction to Firewalls | 00:05:00 | ||
Firewalls | 00:10:00 | ||
DMZ | 00:06:00 | ||
Hardening Devices | 00:14:00 | ||
Physical Security Controls | 00:09:00 | ||
Testing Network Security | 00:08:00 | ||
Network Protection Scenarios | 00:14:00 | ||
Section 21: Network Monitoring | |||
SNMP | 00:15:00 | ||
Documenting Logs | 00:09:00 | ||
System Monitoring | 00:08:00 | ||
SIEM (Security Information and Event Management) | 00:07:00 | ||
Section 22: Network Troubleshooting | |||
Network Troubleshooting Theory | 00:05:00 |
Have you ever scrolled through social media and been blown away by captivating edits? Maybe it was a seamless transition, …
0
Imagine diving into your photos, not just looking at them. Imagine transporting viewers to the heart of your scene, letting …
0
Imagine transforming your stunning photographs into captivating moving narratives. Learn After Effects for Photography unlocks a world of creative possibilities, …
0