0
0 reviews
CompTIA-Network+
Category
25
Students
enrolled
- Description
- Curriculum
CompTIA Network+ is a professional certification designed to validate the knowledge and skills required to manage, maintain, troubleshoot, install, and configure basic network infrastructure. It is an entry-level certification aimed at IT professionals who want to demonstrate their competency in networking.
Key Components:
- Network Fundamentals: Understanding basic networking concepts, including protocols, standards, and network types.
- Network Implementations: Installing and configuring network devices, cabling, and wireless settings.
- Network Operations: Managing network operations, performance monitoring, and troubleshooting.
- Network Security: Implementing network security measures to protect data and network devices.
- Network Troubleshooting: Identifying, diagnosing, and resolving network issues.
Exam Details:
- Format: Multiple-choice and performance-based questions.
- Duration: 90 minutes.
- Questions: Maximum of 90 questions.
- Passing Score: 720 on a scale of 100-900.
Target Audience:
- Network Administrators
- Network Technicians
- Help Desk Technicians
- IT Cable Installers
- Any IT professional looking to strengthen their networking skills
Benefits:
- Skill Validation: Confirms the ability to handle essential networking tasks and responsibilities.
- Career Advancement: Enhances job prospects and potential for career growth in IT and networking fields.
- Industry Recognition: Widely recognized by employers as a credible certification in networking.
Topics Covered:
- Networking Concepts: Covers protocols and models, such as TCP/IP, OSI, and the functions of different network services and applications.
- Infrastructure: Focuses on network devices, cabling solutions, and wireless networking.
- Network Operations: Involves monitoring and optimizing network performance, as well as business continuity and disaster recovery.
- Network Security: Addresses physical security, common attacks and vulnerabilities, and implementing security protocols and policies.
- Network Troubleshooting and Tools: Techniques for diagnosing and fixing common network issues, as well as using appropriate tools for network troubleshooting.
CompTIA Network+ provides a solid foundation for individuals seeking to establish or advance their careers in networking, offering essential knowledge and skills applicable to various IT roles.
lesson 1: Comparing OSI Model Network Functions
-
1Lesson 1: Comparing OSI Model Network Functions3 mins
Comparing OSI Model Network Functions
-
2Topic 1A Compare and Contrast OSI Model Layers3 mins
Compare and Contrast OSI Model Layers
-
3Open Systems Interconnection Model10 mins
Open Systems Interconnection Model
-
4Data Encapsulation and Decapsulation10 mins
Data Encapsulation and Decapsulation
-
5Layer 1-Physical7 mins
Layer 1-Physical
-
6Layer 2-Data Link7 mins
Layer 2-Data Link
-
7Layer 3-Network7 mins
Layer 3-Network
-
8Layer 4-Transport7 mins
Layer 4-Transport
-
9Upper Layers7 mins
Upper Layers
-
10OSI Model Summary5 mins
OSI Model Summary
-
11Topic 1B Configure SOHO Networks3 mins
Configure SOHO Networks
-
12SOHO Routers3 mins
SOHO Routers
-
13Physical Layer Functions7 mins
Physical Layer Functions
-
14Data Link Layer Functions7 mins
Data Link Layer Functions
-
15Network Layer Functions10 mins
Network Layer Functions
-
16Transport and Application Layer and Security Functions7 mins
Transport and Application Layer and Security Functions
-
17The Internet7 mins
The Internet
-
18Hexadecimal Notation7 mins
Hexadecimal Notation
-
19Lesson 1 Assement10 questions
Lesson 2: Deploying Ethernet Cabling
-
20Lesson 2 Deploying Ethernet Cabling5 mins
Deploying Ethernet Cabling
-
21Introduction: Summarize Ethernet Standards3 mins
Introduction: Summarize Ethernet Standards
-
22Network Data Transmission5 mins
Network Data Transmission
-
23Ethernet Standards5 mins
Ethernet Standards
-
24Media Access Control and Collision Domains7 mins
Media Access Control and Collision Domains
-
25100BASE-TX Fast Ethernet Standard7 mins
100BASE-TX Fast Ethernet Standard
-
26Gigabit Ethernet Standards5 mins
Gigabit Ethernet Standards
-
27Topic 2B Summarize Copper Cabling Types3 mins
Summarize Copper Cabling Types
-
28Unshielded Twisted Pair Cable Considerations10 mins
Unshielded Twisted Pair Cable Considerations
-
29Shielded and Screened Twisted Pair Cable Considerations5 mins
Shielded and Screened Twisted Pair Cable Considerations
-
30Cat Cable Standards10 mins
Cat Cable Standards
-
31Twisted Pair Connector Types7 mins
Twisted Pair Connector Types
-
32Copper Termination Standards7 mins
Copper Termination Standards
-
33Plenum- and Riser-rated Cable5 mins
Plenum- and Riser-rated Cable
-
34Coaxial and Twinaxial Cable and Connectors10 mins
Coaxial and Twinaxial Cable and Connectors
-
35Topic 2C Summarize Fiber Optic Cabling Types3 mins
Summarize Fiber Optic Cabling Types
-
36Fiber Optic Cable Considerations5 mins
Fiber Optic Cable Considerations
-
37Single Mode Fiber and Multimode Fiber7 mins
Single Mode Fiber and Multimode Fiber
-
38Fiber Optic Connector Types5 mins
Fiber Optic Connector Types
-
39Fiber Ethernet Standards5 mins
Fiber Ethernet Standards
-
40Fiber Optic Cable Installation10 mins
Fiber Optic Cable Installation
-
41Topic 2D Deploy Ethernet Cabling3 mins
Deploy Ethernet Cabling
-
42Structured Cabling System7 mins
Structured Cabling System
-
43Cable Management10 mins
Cable Management
-
44Wiring Tools and Techniques5 mins
Wiring Tools and Techniques
-
45Termination Tools5 mins
Termination Tools
-
46Fiber Distribution Panels and Fusion Splicing5 mins
Fiber Distribution Panels and Fusion Splicing
-
47Transceivers7 mins
Transceivers
-
48Wavelength Division Multiplexing5 mins
Wavelength Division Multiplexing
-
49Lesson 2 Assesment19 questions
Lesson 3 Deploying Ethernet Switching
-
50Lesson 3 Deploying Ethernet Switching3 mins
Deploying Ethernet Switching
-
51Topic 3A Deploy Networking Devices3 mins
Deploy Networking Devices
-
52Repeaters and Media Converters5 mins
Repeaters and Media Converters
-
53Hubs7 mins
Hubs
-
54Bridges7 mins
Bridges
-
55Layer 2 Switches10 mins
Layer 2 Switches
-
56Topic 3B Explain Network Interfaces5 mins
Explain Network Interfaces
-
57Network Interface Cards5 mins
Network Interface Cards
-
58Ethernet Frame Format4 mins
Ethernet Frame Format
-
59Media Access Control Address Format7 mins
Media Access Control Address Format
-
60Frame Length and Maximum Transmission Unit5 mins
Frame Length and Maximum Transmission Unit
-
61Packet Sniffers and Taps7 mins
Packet Sniffers and Taps
-
62tcpdump5 mins
tcpdump
-
63Wireshark5 mins
Wireshark
-
64Topic 3C Deploy Common Ethernet Switching Features11 mins
Deploy Common Ethernet Switching Features
-
65Ethernet Switch Types7 mins
Ethernet Switch Types
-
66Switch Interface Configuration7 mins
Switch Interface Configuration
-
67Auto MDI/MDI-X5 mins
Auto MDI/MDI-X
-
68MAC Address Table and Port Security5 mins
MAC Address Table and Port Security
-
69Port Aggregation3 mins
Port Aggregation
-
70Port Mirroring7 mins
Port Mirroring
-
71Jumbo Frames and Flow Control5 mins
Jumbo Frames and Flow Control
-
72Power Over Ethernet5 mins
Power Over Ethernet
-
73Lesson 3 Assesment15 questions
Lesson 4 Troubleshooting Ethernet Networks
-
74Lesson 4 Troubleshooting Ethernet Networks3 mins
Troubleshooting Ethernet Networks
-
75Topic 4A Explain Network Troubleshooting Methodology3 mins
Explain Network Troubleshooting Methodology
-
76Network Troubleshooting Methodology5 mins
Network Troubleshooting Methodology
-
77Identify the Problem (Gather Information)7 mins
Identify the Problem (Gather Information)
-
78Identify the Problem (Question Users)7 mins
Identify the Problem (Question Users)
-
79Establish a Theory of Probable Cause7 mins
Establish a Theory of Probable Cause
-
80Test the Theory to Determine the Cause5 mins
Test the Theory to Determine the Cause
-
81Establish a Plan of Action5 mins
Establish a Plan of Action
-
82Implement the Solution5 mins
Implement the Solution
-
83Verify Full System Functionality and Implement Preventive Measures5 mins
Verify Full System Functionality and Implement Preventive Measures
-
84Document Findings, Actions, and Outcomes15 mins
Document Findings, Actions, and Outcomes
-
85Topic 4B Troubleshoot Common Cable Connectivity Issues14 mins
Troubleshoot Common Cable Connectivity Issues
-
86Specification and Limitations7 mins
Specification and Limitations
-
87Cable Issues7 mins
Cable Issues
-
88Loopback Plugs, Status Indicators, and Interface Configuration10 mins
Loopback Plugs, Status Indicators, and Interface Configuration
-
89Cable Testers11 mins
Cable Testers
-
90Wire Map Testers and Tone Generators7 mins
Wire Map Testers and Tone Generators
-
91Attenuation and Interference Issues7 mins
Attenuation and Interference Issues
-
92Crosstalk Issues5 mins
Crosstalk Issues
-
93Cable Application Issues7 mins
Cable Application Issues
-
94Fiber Optic Cable Testing Tools7 mins
Fiber Optic Cable Testing Tools
-
95Lesson 4 Assesment10 questions
Lesson 5 Explaining IPv4 Addressing
-
96Lesson 5 Explaining IPv4 Addressing5 mins
Explaining IPv4 Addressing
-
97Topic 5A Explain IPv4 Addressing Schemes3 mins
Explain IPv4 Addressing Schemes
-
98IPv4 Datagram Header7 mins
IPv4 Datagram Header
-
99IPv4 Address Format10 mins
IPv4 Address Format
-
100Network Masks7 mins
Network Masks
-
101Subnet Masks7 mins
Subnet Masks
-
102Host Address Ranges7 mins
Host Address Ranges
-
103Introduction: Explain IPv4 Forwarding3 mins
Introduction: Explain IPv4 Forwarding
-
104Layer 2 versus Layer 3 Addressing and Forwarding5 mins
Layer 2 versus Layer 3 Addressing and Forwarding
-
105IPv4 Default Gateways7 mins
IPv4 Default Gateways
-
106Address Resolution Protocol7 mins
Address Resolution Protocol
-
107Unicast and Broadcast Addressing7 mins
Unicast and Broadcast Addressing
-
108Multicast and Anycast Addressing5 mins
Multicast and Anycast Addressing
-
109Topic 5C Configure IP Networks and Subnets7 mins
Configure IP Networks and Subnets
-
110Virtual LANs and Subnets10 mins
Virtual LANs and Subnets
-
111Classful Addressing7 mins
Classful Addressing
-
112Public versus Private Addressing7 mins
Public versus Private Addressing
-
113Other Reserved Address Ranges5 mins
Other Reserved Address Ranges
-
114IPv4 Address Scheme Design10 mins
IPv4 Address Scheme Design
-
115Lesson 5 Assesment15 questions
Lesson 6 Supporting IPv4 and IPv6 Networks
-
116Lesson 6 Supporting IPv4 and IPv6 Networks3 mins
Supporting IPv4 and IPv6 Networks
-
117Topic 6A Use Appropriate Tools to Test IP Configuration3 mins
Use Appropriate Tools to Test IP Configuration
-
118IP Interface Configuration in Windows10 mins
IP Interface Configuration in Windows
-
119ipconfig10 mins
ipconfig
-
120ifconfig and ip10 mins
ifconfig and ip
-
121ARP CACHE UTILITY7 mins
ARP CACHE UTILITY
-
122Internet Control Message Protocol and ping10 mins
Internet Control Message Protocol and ping
-
123Topic 6B Troubleshoot IP Networks3 mins
Troubleshoot IP Networks
-
124Hardware Failure and Network Interface Issues10 mins
Hardware Failure and Network Interface Issues
-
125IP Configuration Issues10 mins
IP Configuration Issues
-
126Duplicate IP and MAC Address Issues6 mins
Duplicate IP and MAC Address Issues
-
127Problem Isolation7 mins
Problem Isolation
-
128Incorrect DNS Issues5 mins
Incorrect DNS Issues
-
129Multicast Flooding Issues5 mins
Multicast Flooding Issues
-
130Topic 6C Explain IPv6 Addressing Schemes3 mins
Explain IPv6 Addressing Schemes
-
131IPv4 versus IPv67 mins
IPv4 versus IPv6
-
132IPv6 Address Format5 mins
IPv6 Address Format
-
133IPv6 Network Prefixes5 mins
IPv6 Network Prefixes
-
134IPv6 Unicast Addressing7 mins
IPv6 Unicast Addressing
-
135IPv6 Link Local Addressing5 mins
IPv6 Link Local Addressing
-
136IPv6 Interface Autoconfiguration and Testing10 mins
IPv6 Interface Autoconfiguration and Testing
-
137IPv6 Multicast Addressing7 mins
IPv6 Multicast Addressing
-
138IPv4 and IPv6 Transition Mechanisms7 mins
IPv4 and IPv6 Transition Mechanisms
-
139Common IPv6 Address Prefixes5 mins
Common IPv6 Address Prefixes
-
140Lesson 6 Assesment14 questions
Lesson 7: Configuring and Troubleshooting Routers
-
141Lesson 7: Configuring and Troubleshooting Routers3 mins
Configuring and Troubleshooting Routers
-
142Topic 7A Compare and Contrast Routing Concepts3 mins
Introduction: Compare and Contrast Routing Concepts
-
143Routing Tables and Path Selection7 mins
Routing Tables and Path Selection
-
144Static and Default Routes5 mins
Static and Default Routes
-
145Routing Table Example5 mins
Routing Table Example
-
146Packet Forwarding10 mins
Packet Forwarding
-
147Fragmentation5 mins
Fragmentation
-
148Topic 7B Compare and Contrast Dynamic Routing ConceptsText lesson
Introduction: Compare and Contrast Dynamic Routing Concepts
-
149Dynamic Routing Protocols6 mins
Dynamic Routing Protocols
-
150Interior versus Exterior Gateway Protocols5 mins
Interior versus Exterior Gateway Protocols
-
151Routing Information Protocol10 mins
Routing Information Protocol
-
152RIP Versions5 mins
RIP Versions
-
153Enhanced Interior Gateway Routing Protocol5 mins
Enhanced Interior Gateway Routing Protocol
-
154Open Shortest Path First7 mins
Open Shortest Path First
-
155Border Gateway Protocol7 mins
Border Gateway Protocol
-
156Administrative Distance5 mins
Administrative Distance
-
157Classless Inter-Domain Routing10 mins
Classless Inter-Domain Routing
-
158Variable Length Subnet Masks7 mins
Variable Length Subnet Masks
-
159VLSM Design10 mins
VLSM Design
-
160Topic 7C Install and Troubleshoot Routers3 mins
Introductiom: Install and Troubleshoot Routers
-
161Edge Routers5 mins
Edge Routers
-
162Router Configuration6 mins
Router Configuration
-
163route10 mins
route
-
164tracert and traceroute10 mins
tracert and traceroute
-
165Missing Route Issues5 mins
Missing Route Issues
-
166Routing Loop Issues7 mins
Routing Loop Issues
-
167Asymmetrical Routing Issues5 mins
Asymmetrical Routing Issues
-
168Low Optical Link Budget Issues10 mins
Low Optical Link Budget Issues
-
169Lesson 7 Assesment15 questions
Lesson 8 Explaining Network Topologies and Types
-
170Lesson 8 Explaining Network Topologies and Types3 mins
Introduction: Explaining Network Topologies and Types
-
171Topic 8A Explain Network Types and Characteristics3 mins
Explain Network Types and Characteristics
-
172Client-Server versus Peer-to-Peer Networks5 mins
Client-Server versus Peer-to-Peer Networks
-
173Network Types10 mins
Network Types
-
174Network Topology6 mins
Network Topology
-
175Star Topology5 mins
Star Topology
-
176Mesh Topology5 mins
Mesh Topology
-
177Ring Topology5 mins
Ring Topology
-
178Bus Topology5 mins
Bus Topology
-
179Hybrid Topology6 mins
Hybrid Topology
-
180Topic 8B Explain Tiered Switching Architecture10 mins
Explain Tiered Switching Architecture
-
181Three-Tiered Network Hierarchy10 mins
Three-Tiered Network Hierarchy
-
182Spanning Tree Protocol10 mins
Spanning Tree Protocol
-
183Spanning Tree Protocol Configuration10 mins
Spanning Tree Protocol Configuration
-
184Switching Loop and Broadcast Storm Issues5 mins
Switching Loop and Broadcast Storm Issues
-
185Topic 8C Explain Virtual LANs10 mins
Introduction: Explain Virtual LANs
-
186Virtual LAN IDs and Membership3 mins
Virtual LAN IDs and Membership
-
187Trunking and IEEE 802.1Q7 mins
Trunking and IEEE 802.1Q
-
188Tagged and Untagged Ports5 mins
Tagged and Untagged Ports
-
189Voice VLANs10 mins
Voice VLANs
-
190Lesson 8 Assesment15 questions
Lesson 9 Explaining Transport Layer Protocols
-
191Lesson 9: Explaining Transport Layer Protocols3 mins
Explaining Transport Layer Protocols
-
192Topic 9A Compare and Contrast Transport Protocols3 mins
Introduction: Compare and Contrast Transport Protocols
-
193Transport Layer Ports and Connections7 mins
Transport Layer Ports and Connections
-
194Transmission Control Protocol10 mins
Transmission Control Protocol
-
195TCP Handshake and Teardown10 mins
TCP Handshake and Teardown
-
196User Datagram Protocol5 mins
User Datagram Protocol
-
197Common TCP and UDP Ports10 mins
Common TCP and UDP Ports
-
198Topic 9B Use Appropriate Tools to Scan Network Ports3 mins
Use Appropriate Tools to Scan Network Ports
-
199IP Scanners7 mins
IP Scanners
-
200Nmap6 mins
Nmap
-
201netstat7 mins
netstat
-
202Remote Port Scanners10 mins
Remote Port Scanners
-
203Protocol Analyzers30 mins
Protocol Analyzers
-
204Lesson 9 Assesment10 questions
Lesson 10 Explaining Network Services
-
205Lesson 10 Explaining Network Services3 mins
Introduction and Objectives
-
206Topic 10A Explain the Use of Network Addressing Services3 mins
Introduction: Explain the Use of Network Addressing Services
-
207Dynamic Host Configuration Protocol7 mins
Dynamic Host Configuration Protocol
-
208DHCP Server Configuration10 mins
DHCP Server Configuration
-
209DHCP Options Configuration6 mins
DHCP Options Configuration
-
210DHCP Reservations and Exclusions6 mins
DHCP Reservations and Exclusions
-
211DHCP Relay and IP Helper10 mins
DHCP Relay and IP Helper
-
212DHCPv6 Server Configuration7 mins
DHCPv6 Server Configuration
-
213Topic 10B Explain the Use of Name Resolution Services3 mins
Explain the Use of Name Resolution Services
-
214Host Names and Fully Qualified Domain Names7 mins
Host Names and Fully Qualified Domain Names
-
215Domain Name System7 mins
Domain Name System
-
216Name Resolution Using DNS7 mins
Name Resolution Using DNS
-
217Resource Record Types7 mins
Resource Record Types
-
218Host Address and Canonical Name Records7 mins
Host Address and Canonical Name Records
-
219Mail Exchange, Service, and Text Records7 mins
Mail Exchange, Service, and Text Records
-
220Pointer Records16 mins
Pointer Records
-
221Topic 10C Configure DNS Services10 mins
Introduction: Configure DNS Services
-
222DNS Server Configuration7 mins
DNS Server Configuration
-
223Internal versus External DNS7 mins
Internal versus External DNS
-
224nslookup7 mins
nslookup
-
225dig13 mins
dig
-
226Lesson 10 Assesment10 questions
Lesson 11 Explaining Network Applications
-
227Lesson 11 Explaining Network ApplicationsText lesson
Lesson 11: Introduction & Objectives
-
228Topic 11A Explain the Use of Web, File/Print, and Database Services3 mins
Topic 11A Explain the Use of Web, File/Print, and Database Services
-
229Hypertext Transfer Protocol10 mins
Hypertext Transfer Protocol
-
230Secure Sockets Layer/Transport Layer Security7 mins
Secure Sockets Layer/Transport Layer Security
-
231File Transfer Protocol7 mins
File Transfer Protocol
-
232Secure File Transfer Protocol7 mins
Secure File Transfer Protocol
-
233File and Print Services5 mins
File and Print Services
-
234Database Services5 mins
Database Services
-
235Topic 11B Explain the Use of Email and Voice Services3 mins
Explain the Use of Email and Voice Services
-
236Simple Mail Transfer Protocol10 mins
Simple Mail Transfer Protocol
-
237Mailbox Access Protocols25 mins
Mailbox Access Protocols
-
238Voice and Video Services10 mins
Voice and Video Services
-
239VoIP Protocols7 mins
VoIP Protocols
-
240VoIP Phones16 mins
VoIP Phones
-
241Voice Gateways10 mins
Voice Gateways
-
242Lesson 11 Assesment15 questions
Lesson 12 Ensuring Network Availability
-
243Lesson 12 Ensuring Network Availability3 mins
Lesson 12: Introduction & Objectives
-
244Topic 12A Explain the Use of Network Management Services3 mins
Explain the Use of Network Management Services
-
245Secure Shell Servers and Terminal Emulators10 mins
Secure Shell Servers and Terminal Emulators
-
246Secure Shell Commands11 mins
Secure Shell Commands
-
247Telnet5 mins
Telnet
-
248Remote Desktop Protocol5 mins
Remote Desktop Protocol
-
249Network Time Protocol7 mins
Network Time Protocol
-
250Topic 12B Use Event Management to Ensure Network Availability3 mins
Use Event Management to Ensure Network Availability
-
251Performance Metrics, Bottlenecks, and Baselines7 mins
Performance Metrics, Bottlenecks, and Baselines
-
252Environmental Monitoring6 mins
Environmental Monitoring
-
253Simple Network Management Protocol15 mins
Simple Network Management Protocol
-
254Network Device Logs7 mins
Network Device Logs
-
255Log Collectors and Syslog7 mins
Log Collectors and Syslog
-
256Event Management7 mins
Event Management
-
257Log Reviews10 mins
Log Reviews
-
258Topic 12C Use Performance Metrics to Ensure Network Availability3 mins
Use Performance Metrics to Ensure Network Availability
-
259Network Metrics10 mins
Network Metrics
-
260Bandwidth Management6 mins
Bandwidth Management
-
261Traffic Shaping5 mins
Traffic Shaping
-
262Traffic Analysis Tools10 mins
Traffic Analysis Tools
-
263NetFlow7 mins
NetFlow
-
264Interface Monitoring Metrics7 mins
Interface Monitoring Metrics
-
265Troubleshooting Interface Errors7 mins
Troubleshooting Interface Errors
-
266Lessom 12 Assesment12 questions
Lesson 13 Explaining Common Security Concepts
-
267Lesson 13 Explaining Common Security Concepts3 mins
Lesson 13: Introduction & Objectives
-
268Topic 13A Explain Common Security Concepts3 mins
Introduction: Explain Common Security Concepts
-
269Security Concepts5 mins
Security Concepts
-
270Security Risk Assessments7 mins
Security Risk Assessments
-
271Vulnerability and Exploit Types10 mins
Vulnerability and Exploit Types
-
272Threat Types and Assessment5 mins
Threat Types and Assessment
-
273Security Information and Event Management4 mins
Security Information and Event Management
-
274Penetration Testing4 mins
Penetration Testing
-
275Privileged Access Management6 mins
Privileged Access Management
-
276Vendor Assessment5 mins
Vendor Assessment
-
277Topic 13B Explain Authentication Methods3 mins
Introduction: Explain Authentication Methods
-
278Authentication Methods and Access Controls4 mins
Authentication Methods and Access Controls
-
279Multifactor and Two-Factor Authentication10 mins
Multifactor and Two-Factor Authentication
-
280Local Authentication and Single Sign-on7 mins
Local Authentication and Single Sign-on
-
281Kerberos5 mins
Kerberos
-
282Digital Certificates and PKI8 mins
Digital Certificates and PKI
-
283Extensible Authentication Protocol and IEEE 802.1X7 mins
Extensible Authentication Protocol and IEEE 802.1X
-
284RADIUS and TACACS+30 mins
RADIUS and TACACS+
-
285Lightweight Directory Access Protocol7 mins
Lightweight Directory Access Protocol
-
286LDAP Secure5 mins
LDAP Secure
-
287Lesson 13 Assesment13 questions
Lesson 14 Supporting and Troubleshooting Secure Networks
-
288Lesson 14 Supporting and Troubleshooting Secure Networks3 mins
Lesson 14: Introduction & Objectives
-
289Topic 14A Compare and Contrast Security Appliances3 mins
Introduction: Compare and Contrast Security Appliances
-
290Network Segmentation Enforcement5 mins
Network Segmentation Enforcement
-
291Screened Subnets7 mins
Screened Subnets
-
292Firewall Uses and Types10 mins
Firewall Uses and Types
-
293Firewall Selection and Placement15 mins
Firewall Selection and Placement
-
294Proxy Servers10 mins
Proxy Servers
-
295Network Address Translation10 mins
Network Address Translation
-
296Port Address Translation5 mins
Port Address Translation
-
297Defense in Depth7 mins
Defense in Depth
-
298Intrusion Detection and Prevention Systems10 mins
Intrusion Detection and Prevention Systems
-
299Topic 14B Troubleshoot Service and Security Issues10 mins
Introduction: Troubleshoot Service and Security Issues
-
300DHCP Issues5 mins
DHCP Issues
-
301Name Resolution Issues7 mins
Name Resolution Issues
-
302VLAN Assignment Issues7 mins
VLAN Assignment Issues
-
303Unresponsive Service and Network Performance Issues6 mins
Unresponsive Service and Network Performance Issues
-
304Misconfigured Firewall and ACL Issues5 mins
Misconfigured Firewall and ACL Issues
-
305Untrusted Certificate Issues10 mins
Untrusted Certificate Issues
-
306Other Common Issues7 mins
Other Common Issues
-
307Lesson 14 Assesment11 questions
Lesson 15 Deploying and Troubleshooting Wireless Networks
-
308Lesson 15 Deploying and Troubleshooting Wireless Networks3 mins
Lesson 15: Introduction & Objectives
-
309Topic 15A Summarize Wireless Standards9 mins
Introduction: Summarize Wireless Standards
-
310IEEE 802.11 Wireless Standards10 mins
IEEE 802.11 Wireless Standards
-
311IEEE 802.11a and 5 GHz Channel Bandwidth5 mins
IEEE 802.11a and 5 GHz Channel Bandwidth
-
312IEEE 802.11b/g and 2.4 GHz Channel Bandwidth7 mins
IEEE 802.11b/g and 2.4 GHz Channel Bandwidth
-
313IEEE 802.11n, MIMO, and Channel Bonding10 mins
IEEE 802.11n, MIMO, and Channel Bonding
-
314Wi-Fi 5 and Wi-Fi 67 mins
Wi-Fi 5 and Wi-Fi 6
-
315Multiuser MIMO5 mins
Multiuser MIMO
-
3162G and 3G Cellular Technologies7 mins
2G and 3G Cellular Technologies
-
3174G and 5G Cellular Technologies10 mins
4G and 5G Cellular Technologies
-
318Topic 15B Install Wireless Networks3 mins
Introduction: Install Wireless Networks
-
319Infrastructure Topology and Wireless Access Points5 mins
Infrastructure Topology and Wireless Access Points
-
320Wireless Site Design7 mins
Wireless Site Design
-
321Site Surveys and Heat Maps7 mins
Site Surveys and Heat Maps
-
322Wireless Roaming and Bridging7 mins
Wireless Roaming and Bridging
-
323Wireless LAN Controllers7 mins
Wireless LAN Controllers
-
324Ad Hoc and Mesh Topologies16 mins
Ad Hoc and Mesh Topologies
-
325Topic 15C Troubleshoot Wireless Networks9 mins
Introduction: Troubleshoot Wireless Networks
-
326Wireless Performance Assessment10 mins
Wireless Performance Assessment
-
327Signal Strength6 mins
Signal Strength
-
328Antenna Types7 mins
Antenna Types
-
329Insufficient Wireless Coverage Issues7 mins
Insufficient Wireless Coverage Issues
-
330Channel Utilization and Overlap Issues10 mins
Channel Utilization and Overlap Issues
-
331Overcapacity Issues5 mins
Overcapacity Issues
-
332Interference Issues5 mins
Interference Issues
-
333Topic 15D Configure and Troubleshoot Wireless Security3 mins
Introduction: Configure and Troubleshoot Wireless Security
-
334Wi-Fi Encryption Standards10 mins
Wi-Fi Encryption Standards
-
335Personal Authentication6 mins
Personal Authentication
-
336Enterprise/IEEE 802.1X Authentication7 mins
Enterprise/IEEE 802.1X Authentication
-
337Wi-Fi Security Configuration Issues10 mins
Wi-Fi Security Configuration Issues
-
338Client Disassociation Issues5 mins
Client Disassociation Issues
-
339Open Authentication and Captive Portal Issues5 mins
Open Authentication and Captive Portal Issues
-
340Lesson 15 Assesment20 questions
Lesson 16 Comparing WAN Links and Remote Access Methods
-
341Lesson 16 Comparing WAN Links and Remote Access Methods3 mins
Lesson 16: Introduction & Objectives
-
342Topic 16A Explain WAN Provider Links6 mins
Introduction: Explain WAN Provider Links
-
343Wide Area Networks and the OSI Model5 mins
Wide Area Networks and the OSI Model
-
344WAN Provider Links5 mins
WAN Provider Links
-
345T-Carrier and Leased Line Provider Links7 mins
T-Carrier and Leased Line Provider Links
-
346Digital Subscriber Line Provider Links7 mins
Digital Subscriber Line Provider Links
-
347Fiber to the Curb5 mins
Fiber to the Curb
-
348Cable Provider Links5 mins
Cable Provider Links
-
349Metro-optical Provider Links7 mins
Metro-optical Provider Links
-
350Microwave Satellite5 mins
Microwave Satellite
-
351Topic 16B Compare and Contrast Remote Access Methods10 mins
Introduction: Compare and Contrast Remote Access Methods
-
352Remote Network Access Authentication and Authorization6 mins
Remote Network Access Authentication and Authorization
-
353Tunneling and Encapsulation Protocols5 mins
Tunneling and Encapsulation Protocols
-
354Client-to-Site Virtual Private Networks7 mins
Client-to-Site Virtual Private Networks
-
355Remote Host Access and Remote Desktop Gateways6 mins
Remote Host Access and Remote Desktop Gateways
-
356Site-to-Site Virtual Private Networks7 mins
Site-to-Site Virtual Private Networks
-
357Hub and Spoke VPNs and VPN Headends7 mins
Hub and Spoke VPNs and VPN Headends
-
358Internet Protocol Security6 mins
Internet Protocol Security
-
359IKE and IPSec Modes7 mins
IKE and IPSec Modes
-
360Out-of-Band Management Methods6 mins
Out-of-Band Management Methods
-
361Lesson 16 Assesment10 questions
Lesson 17 Explaining Organizational and Physical Security Concepts
-
362Lesson 17 Explaining Organizational and Physical Security Concepts3 mins
Lesson 17: Introduction & Objectives
-
363Topic 17A Explain Organizational Documentation and Policies3 mins
Introduction: Explain Organizational Documentation and Policies
-
364Operating Plans and Procedures6 mins
Operating Plans and Procedures
-
365System Life Cycle Plans and Procedures10 mins
System Life Cycle Plans and Procedures
-
366Physical Network Diagrams7 mins
Physical Network Diagrams
-
367Rack Diagrams5 mins
Rack Diagrams
-
368Logical versus Physical Network Diagrams7 mins
Logical versus Physical Network Diagrams
-
369Security Response Plans and Procedures6 mins
Security Response Plans and Procedures
-
370Hardening and Security Policies7 mins
Hardening and Security Policies
-
371Usage Policies6 mins
Usage Policies
-
372Data Loss Prevention5 mins
Data Loss Prevention
-
373Remote Access Policies5 mins
Remote Access Policies
-
374Common Agreements5 mins
Common Agreements
-
375Topic 17B Explain Physical Security Methods3 mins
Introduction: Explain Physical Security Methods
-
376Badges and Site Secure Entry Systems6 mins
Badges and Site Secure Entry Systems
-
377Physical Security for Server Systems5 mins
Physical Security for Server Systems
-
378Detection-Based Devices5 mins
Detection-Based Devices
-
379Alarms and Tamper Detection5 mins
Alarms and Tamper Detection
-
380Asset Disposal7 mins
Asset Disposal
-
381Employee Training7 mins
Employee Training
-
382Topic 17C Compare and Contrast Internet of Things Devices6 mins
Introduction: Compare and Contrast Internet of Things Devices
-
383Internet of Things5 mins
Internet of Things
-
384Industrial Control Systems/Supervisory Control and Data Acquisition5 mins
Industrial Control Systems/Supervisory Control and Data Acquisition
-
385IoT Networks6 mins
IoT Networks
-
386Placement and Security5 mins
Placement and Security
-
387Lesson 17 Assesment15 questions
Lesson 18 Explaining Disaster Recovery and High Availability Concepts
-
388Lesson 18 Explaining Disaster Recovery and High Availability Concepts3 mins
Lesson 18: Introduction & Objectives
-
389Topic 18A Explain Disaster Recovery Concepts3 mins
Introduction: Explain Disaster Recovery Concepts
-
390High Availability7 mins
High Availability
-
391Fault Tolerance and Redundancy7 mins
Fault Tolerance and Redundancy
-
392Recovery Sites6 mins
Recovery Sites
-
393Facilities and Infrastructure Support6 mins
Facilities and Infrastructure Support
-
394Power Management7 mins
Power Management
-
395Network Device Backup Management5 mins
Network Device Backup Management
-
396Topic 18B Explain High Availability Concepts3 mins
Topic 18B Explain High Availability Concepts
-
397Multipathing5 mins
Multipathing
-
398Link Aggregation/NIC Teaming5 mins
Link Aggregation/NIC Teaming
-
399Load Balancers6 mins
Load Balancers
-
400Redundant Hardware/Clusters7 mins
Redundant Hardware/Clusters
-
401First Hop Redundancy10 mins
First Hop Redundancy
-
402Lesson 18 Assesment10 questions
Lesson 19 Applying Network Hardening Techniques
-
403Lesson 19 Applying Network Hardening Techniques3 mins
Lesson 19: Introduction & Objectives
-
40419A Compare and Contrast Types of Attacks3 mins
Introduction: Compare and Contrast Types of Attacks Topic
-
405General Attack Types7 mins
General Attack Types
-
406On-path Attacks15 mins
On-path Attacks
-
407DNS Poisoning Attacks6 mins
DNS Poisoning Attacks
-
408VLAN Hopping Attacks4 mins
VLAN Hopping Attacks
-
409Wireless Network Attacks10 mins
Wireless Network Attacks
-
410Distributed DoS Attacks and Botnets7 mins
Distributed DoS Attacks and Botnets
-
411Malware and Ransomware Attacks7 mins
Malware and Ransomware Attacks
-
412Password Attacks7 mins
Password Attacks
-
413Human and Environmental Attacks10 mins
Human and Environmental Attacks
-
414Topic 19B Apply Network Hardening Techniques3 mins
Introduction: Apply Network Hardening Techniques
-
415Device and Service Hardening15 mins
Device and Service Hardening
-
416Endpoint Security and Switchport Protection10 mins
Endpoint Security and Switchport Protection
-
417VLAN and PVLAN Best Practices7 mins
VLAN and PVLAN Best Practices
-
418Firewall Rules and ACL Configuration15 mins
Firewall Rules and ACL Configuration
-
419Control Plane Policing5 mins
Control Plane Policing
-
420Wireless Security7 mins
Wireless Security
-
421IoT Access Considerations5 mins
IoT Access Considerations
-
422Patch and Firmware Management15 mins
Patch and Firmware Management
-
423Lesson 19 Assesment10 questions
Lesson 20 Summarizing Cloud and Datacenter Architecture
-
424Lesson 20 Summarizing Cloud and Datacenter Architecture3 mins
Lesson 20: Introduction & Objectives
-
425Topic 20A Summarize Cloud Concepts3 mins
Introduction: Summarize Cloud Concepts
-
426Cloud Scalability and Elasticity7 mins
Cloud Scalability and Elasticity
-
427Cloud Deployment Models6 mins
Cloud Deployment Models
-
428Cloud Service Models10 mins
Cloud Service Models
-
429Cloud Connectivity Options7 mins
Cloud Connectivity Options
-
430Infrastructure as Code7 mins
Infrastructure as Code
-
431Cloud Security Implications7 mins
Cloud Security Implications
-
432Topic 20B Explain Virtualization and Storage Area Network Technologies3 mins
Introduction: Explain Virtualization and Storage Area Network Technologies
-
433Hypervisor Types7 mins
Hypervisor Types
-
434Virtual NICs and Switches20 mins
Virtual NICs and Switches
-
435Network Function Virtualization6 mins
Network Function Virtualization
-
436Storage Area Networks6 mins
Storage Area Networks
-
437SAN Connection Types10 mins
SAN Connection Types
-
438iSCSI6 mins
iSCSI
-
439Topic 20C Explain Datacenter Network Architecture3 mins
Introduction: Explain Datacenter Network Architecture
-
440Datacenter Network Design7 mins
Datacenter Network Design
-
441Software Defined Networking10 mins
Software Defined Networking
-
442Spine and Leaf Topology7 mins
Spine and Leaf Topology
-
443Datacenter Access Types6 mins
Datacenter Access Types
-
444Multiprotocol Label Switching7 mins
Multiprotocol Label Switching
-
445Software-defined WAN7 mins
Software-defined WAN
-
446Next Steps: Become a CompTIA Network+ Certified Professional!7 mins
Next Steps: Become a CompTIA Network+ Certified Professional!
-
447Lesson 20 Assesment15 questions
Course details
Duration
4 weeks
Lectures
427
Quizzes
20
Level
Intermediate
Given After completion by the Academy
1 year
Computer
Popular courses