Do you want to learn the fundamentals of networking and how to build, secure, and troubleshoot networks? If so, the CompTIA Network+ (N10-007) Course is for you!
Step into the dynamic realm of networking through our comprehensive ” CompTIA Network+ (N10-007) Course. ” Section by section, you’ll unravel the secrets of network models, cabling, Ethernet, and TCP/IP, gaining the building blocks of connectivity. The CompTIA Network+ (N10-007) Course is a comprehensive and up-to-date course that will teach you everything you need to know to pass the CompTIA Network+ exam and become a certified Network+ professional.
As you progress, discover the power of virtualization, cloud computing, and mobile networking, propelling you into the future of IT. Unearth the essentials of IPv6 and explore remote connectivity to master the art of seamless communication. Delve into wireless networking and network monitoring, ensuring your skills are up to date and your networks are secure. The CompTIA Network+ (N10-007) Course is the perfect way to learn the fundamentals of networking and become a certified Network+ professional. With this course, you will have the knowledge and skills that you need to succeed in the IT industry.
Section 01: Introduction | |||
Introduction | 00:03:00 | ||
Section 02: Network Models | |||
What is a Model? | 00:02:00 | ||
OSI vs. TCP/IP Model | 00:07:00 | ||
Walking Through OSI and TCP/IP | 00:12:00 | ||
Meet the Frame | 00:06:00 | ||
The MAC Address | 00:07:00 | ||
Broadcast vs. Unicast | 00:04:00 | ||
Introduction to IP Addressing | 00:08:00 | ||
Packets and Ports | 00:05:00 | ||
Section 03: Cabling and Topology | |||
Network Topologies | 00:10:00 | ||
Coaxial Cabling | 00:05:00 | ||
Twisted Pair Cabling | 00:06:00 | ||
Cat Ratings | 00:06:00 | ||
Fiber Optic Cabling | 00:09:00 | ||
Fire Ratings | 00:05:00 | ||
Legacy Network Connections | 00:07:00 | ||
Section 04: Ethernet Basics | |||
What is Ethernet? | 00:07:00 | ||
Ethernet Frames | 00:07:00 | ||
Early Ethernet | 00:08:00 | ||
The Daddy of Ethernet, 10BaseT | 00:03:00 | ||
Terminating Twisted Pair | 00:14:00 | ||
Hubs vs. Switches | 00:13:00 | ||
Section 05: Modern Ethernet | |||
100BaseT | 00:05:00 | ||
Connecting Switches | 00:05:00 | ||
Gigabit Ethernet and 10-Gigabit Ethernet | 00:05:00 | ||
Transceivers | 00:07:00 | ||
Connecting Ethernet Scenarios | 00:14:00 | ||
Section 06: Installing a Physical Network | |||
Introduction to Structured Cabling | 00:04:00 | ||
Terminating Structured Cabling | 00:08:00 | ||
Equipment Room | 00:07:00 | ||
Alternative Distribution Panels | 00:04:00 | ||
Testing Cable | 00:09:00 | ||
Troubleshooting Structured Cabling, Part 1 | 00:05:00 | ||
Troubleshooting Structured Cabling, Part 2 | 00:05:00 | ||
Using a Toner and Probe | 00:03:00 | ||
Wired Connection Scenarios | 00:11:00 | ||
Section 07: TCP/IP Basics | |||
Introduction to IP Addressing and Binary | 00:13:00 | ||
Introduction to ARP | 00:04:00 | ||
Classful Addressing | 00:10:00 | ||
Subnet Masks | 00:12:00 | ||
Subnetting with CIDR | 00:10:00 | ||
More CIDR Subnetting Practice | 00:10:00 | ||
Dynamic and Static IP Addressing | 00:18:00 | ||
Rogue DHCP Servers | 00:07:00 | ||
Special IP Addresses | 00:07:00 | ||
IP Addressing Scenarios | 00:15:00 | ||
Section 08: Routing | |||
Introducing Routers | 00:15:00 | ||
Understanding Ports | 00:05:00 | ||
Network Address Translation | 00:08:00 | ||
Implementing NAT | 00:03:00 | ||
Forwarding Ports | 00:18:00 | ||
Tour of a SOHO Router | 00:12:00 | ||
SOHO vs. Enterprise | 00:09:00 | ||
Static Routes | 00:13:00 | ||
Dynamic Routing | 00:11:00 | ||
RIP | 00:04:00 | ||
OSPF | 00:04:00 | ||
BGP | 00:06:00 | ||
Section 09: TCP/IP Applications | |||
TCP and UDP | 00:07:00 | ||
ICMP and IGMP | 00:06:00 | ||
Handy Tools | 00:07:00 | ||
Introduction to Wireshark | 00:11:00 | ||
Introduction to netstat | 00:09:00 | ||
Web Servers | 00:12:00 | ||
FTP | 00:12:00 | ||
E-mail Servers and Clients | 00:09:00 | ||
Securing E-mail | 00:06:00 | ||
Telnet and SSH | 00:09:00 | ||
Network Time Protocol | 00:02:00 | ||
Network Service Scenarios | 00:10:00 | ||
Section 10: Network Naming | |||
Understanding DNS | 00:12:00 | ||
Applying DNS | 00:19:00 | ||
The Hosts File | 00:04:00 | ||
Net Command | 00:08:00 | ||
Windows Name Resolution | 00:11:00 | ||
Dynamic DNS | 00:05:00 | ||
DNS Troubleshooting | 00:13:00 | ||
Section 11: Securing TCP/IP | |||
Making TCP/IP Secure | 00:04:00 | ||
Symmetric Encryption | 00:06:00 | ||
Asymmetric Encryption | 00:03:00 | ||
Cryptographic Hashes | 00:05:00 | ||
Identification | 00:12:00 | ||
Access Control | 00:08:00 | ||
AAA | 00:05:00 | ||
Kerberos/EAP | 00:08:00 | ||
Single Sign-On | 00:10:00 | ||
Certificates and Trust | 00:14:00 | ||
Certificate Error Scenarios | 00:08:00 | ||
Section 12: Advanced Networking Devices | |||
Understanding IP Tunneling | 00:06:00 | ||
Virtual Private Networks | 00:13:00 | ||
Introduction to VLANs | 00:12:00 | ||
InterVLAN Routing | 00:03:00 | ||
Interfacing with Managed Switches | 00:11:00 | ||
Switch Port Protection | 00:07:00 | ||
Port Bonding | 00:07:00 | ||
Port Mirroring | 00:04:00 | ||
Quality of Service | 00:05:00 | ||
IDS vs. IPS | 00:04:00 | ||
Proxy Servers | 00:13:00 | ||
Load Balancing | 00:09:00 | ||
Device Placement Scenarios | 00:13:00 | ||
Section 13: IPv6 | |||
Introduction to IPv6 | 00:13:00 | ||
IPv6 Addressing | 00:15:00 | ||
IPv6 in Action | 00:13:00 | ||
IPv4 and IPv6 Tunneling | 00:05:00 | ||
Section 14: Remote Connectivity | |||
Telephony Technologies | 00:09:00 | ||
Optical Carriers | 00:03:00 | ||
Packet Switching | 00:05:00 | ||
Connecting with Dial-up | 00:05:00 | ||
Digital Subscriber Line (DSL) | 00:05:00 | ||
Connecting with Cable Modems | 00:04:00 | ||
Connecting with Satellites | 00:03:00 | ||
ISDN and BPL | 00:04:00 | ||
Remote Desktop Connectivity | 00:05:00 | ||
Advanced Remote Control Systems | 00:09:00 | ||
Section 15: Wireless Networking | |||
Introduction to 802.11 | 00:12:00 | ||
802.11 Standards | 00:12:00 | ||
Power over Ethernet (PoE) | 00:04:00 | ||
Antennas | 00:09:00 | ||
Wireless Security Standards | 00:16:00 | ||
Implementing Wireless Security | 00:07:00 | ||
Threats to Your Wireless Network | 00:07:00 | ||
Retro Threats | 00:05:00 | ||
Wi-Fi Protected Setup (WPS) | 00:05:00 | ||
Enterprise Wireless | 00:06:00 | ||
Installing a Wireless Network | 00:15:00 | ||
Wireless Scenarios | 00:07:00 | ||
More Wireless Scenarios | 00:09:00 | ||
Section 16: Virtualization and Cloud Computing | |||
Virtualization Basics | 00:07:00 | ||
Cloud Ownership | 00:03:00 | ||
Cloud Implementation | 00:12:00 | ||
Your First Virtual Machine | 00:09:00 | ||
NAS and SAN | 00:16:00 | ||
Platform as a Service (PaaS) | 00:09:00 | ||
Software as a Service (SaaS) | 00:03:00 | ||
Infrastructure as a Service (IaaS) | 00:10:00 | ||
Section 17: Mobile Networking | |||
Cellular Technologies | 00:05:00 | ||
Mobile Connectivity | 00:07:00 | ||
Deploying Mobile Devices | 00:05:00 | ||
Mobile Access Control | 00:06:00 | ||
Section 18: Building a Real-World Network | |||
Network Types | 00:04:00 | ||
Network Design | 00:10:00 | ||
Power Management | 00:06:00 | ||
Unified Communications | 00:11:00 | ||
Network Documentation | 00:07:00 | ||
Contingency Planning | 00:10:00 | ||
Predicting Hardware Failure | 00:05:00 | ||
Backups | 00:08:00 | ||
Section 19: Managing Risk | |||
What is Risk Management? | 00:06:00 | ||
Security Policies | 00:08:00 | ||
Change Management | 00:07:00 | ||
User Training | 00:03:00 | ||
Standard Business Documentation | 00:05:00 | ||
Mitigating Network Threats | 00:05:00 | ||
High Availability | 00:05:00 | ||
Section 20: Protecting Your Network | |||
Denial of Service | 00:09:00 | ||
Malware | 00:10:00 | ||
Social Engineering | 00:04:00 | ||
Access Control | 00:04:00 | ||
Man-in-the-Middle | 00:22:00 | ||
Introduction to Firewalls | 00:05:00 | ||
Firewalls | 00:10:00 | ||
DMZ | 00:06:00 | ||
Hardening Devices | 00:14:00 | ||
Physical Security Controls | 00:09:00 | ||
Testing Network Security | 00:08:00 | ||
Network Protection Scenarios | 00:14:00 | ||
Section 21: Network Monitoring | |||
SNMP | 00:15:00 | ||
Documenting Logs | 00:09:00 | ||
System Monitoring | 00:08:00 | ||
SIEM (Security Information and Event Management) | 00:07:00 | ||
Section 22: Network Troubleshooting | |||
Network Troubleshooting Theory | 00:05:00 |