Delivery Method Instructor-led (Classroom)

IN-NN CompTIA Network+ Summary Duration Audience Level 5 Days Network technicians Advanced Technology Delivery Method Training Credits Netwo...
2 downloads 0 Views 103KB Size
IN-NN CompTIA Network+

Summary Duration

Audience

Level

5 Days

Network technicians

Advanced

Technology

Delivery Method

Training Credits

Network Administration

Instructor-led (Classroom)

N/A

Introduction The CompTIA Network+ proves knowledge of networking features and functions and is the leading vendor-neutral certification for networking professionals. This course provides delegates with the knowledge and skills necessary to manage, maintain, troubleshoot, install, operate, and configure basic network infrastructure, describe networking technologies and basic design principles; adhere to wiring standards and use the testing tools. The CompTIA Network+ is the first step in starting a networking career and is recognised by many vendors such as Microsoft, Cisco, Novell and Red Hat as part of their certification tracks.

Prerequisites Before attending this course, delegates must have: Attended the CompTIA A+ course or have; 18 to 24 months of experience in the networking field

Target Audience Anyone wishing to build a solid foundation with regard to networking technology Anyone wishing to pursue a career in IT networking Network administrators, network technicians, network installers, help desk technicians, cable installers.

Course Content Lesson 1: Introduction to Network First Things First: What’s a Network? The Local Area Network (LAN) Common Network Components Wide Area Network (WAN) Network Architecture: Peer-to-Peer or Client-Server? Physical Network Topologies Bus Topology Star Topology Ring Topology Mesh Topology Point-to-Point Topology Point-to-to-Multipoint Topology Hybrid Topology Topology Selection, Backbones, and Segments Selecting the Right Topology

The Network backbone Network Segments Lesson 2: The Open Systems Interconnection Specifications Internetworking Models The Layered Approach Advantages of Reference Models The OSI Reference Model The Application Layer The Presentation Layer The Session Layer The Transport Layer The Network Layer The Data Link Layer The Physical Layer Introduction to Encapsulation Lesson 3: Networking Topologies, Connectors, and Wiring Standards Physical Media Coaxial Cable Twisted-Pair Cable Fiber-Optic Cable Media Converters Serial Cables Cable Properties Transmission Speeds Distance Duplex Noise Immunity (Security, EMI) Frequency Wiring Standards 568A vs. 568B Straight-Through Cable Crossover Cable T1 Crossover Cable Installing Wiring Distributions Lesson 4: The Current Ethernet Specifications Network Basics Ethernet Basics Collision Domain Broadcast Domain CSMA/CD Broadband/Baseband Bit Rates vs Baud Rate Wavelength Sampling-Size Half and Full-Duplex Ethernet Ethernet at the Data Link Layer Binary to Decimal and Hexadecimal Conversion Ethernet Addressing Ethernet Frames Ethernet at the Physical Layer Ethernet over Other Standards (IEEE 1905.1-2013) Ethernet over Power Line Ethernet over HDMI Lesson 5: Networking Devices Common Network Connectivity Devices Network Interface Card Hub

Bridge Switch Router Firewall DS/IPS HIDS Access Point Dynamic Host Configuration Protocol Server Other Specialized Devices Multilayer Switch Load Balancer Domain Name Service Server Proxy Server Encryption Devices Analoq Modem Packet Shaper VPN Concentrator Planning and Implementing a Basic SOHO Network Using Network Segmentation Determining Requirements Switches and Bridges at the Data Link Layer Hubs at the Physical Layer Environmental Considerations Lesson 6: Introduction to the Internet Protocol Introducing TCP/IP A Brief History of TCP/IP TCP/IP and the DoD Model The Process/Application Layer Protocols The Host-to-Host Layer Protocols The Internet Layer Protocols Data Encapsulation Lesson 7: IP Addressing IP Terminology The Hierarchical IP Addressing Scheme Network Addressing Private IP Addresses (RFC 1918) IPv4 Address Types Layer 2 Broadcasts Layer 3 Broadcasts Unicast Address Multicast Address (Class D) Internet Protocol Version 6 (IPv6) Why Do We Need IPv6? The Benefits of and Uses for IPv6 IPv6 Addressing and Expressions Shortened Expression Address Types Special Addresses Stateless Auto-configuration (EUI-64) DHCPv6 (Stateful) Migrating to IPv6 Lesson 8: IP Subnetting, Troubleshooting IP and Introduction to NAT Subnetting Basics How to Create Subnets Subnet Masks Classless Inter-Domain Routing (CIDR) Subnetting Class C Addresses Subnetting Class B Addresses Troubleshooting IP Addressing Determining IP Addressing Problems

Introduction to Network Address Translation (NAT) Types of Network Address Translation NAT Names How NAT Works Chapter 9: Introduction to IP Routing Routing Basics The IP Routing Process Testing Your IP Routing Understanding Static and Dynamic Routing Lesson 10: Routing Protocols Routing Protocols Basics Administrative Distances Classes of Routing Protocols Distance Vector Routing Protocols Routing Information Protocol (RIP) RIP Version 2 (RIPv2) VLSM and Discontiguous Networks EIGRP Border Gateway Protocol (BGP) Link State Routing Protocols Open Shortest Path First (BGP) Intermediate System-to-Intermediate System (IS-IS) High availability Hot Standby Router Protocol (HSRP) Virtual Router Redundancy Protocol IPv6 Routing Protocols IPv6 Routing Protocols RIPng EIGRPv6 OSPFv3 Lesson 11: Switching and Virtual LANs Networking Before Layer 2 Switching Switching Services Limitations of Layer 2 Switching Bridging vs. LAN Switching Three Switch Functions at Layer 2 Spanning Tree Protocol Spanning-Tree Port States STP Convergence Rapid Spanning Tree Protocol 802.1w Virtual LANs VLAN Basics Quality of Service VLAN Memberships Static VLANs Dynamic VLANs Identifying VLANs VLANs Identification Methods VLAN Trunking Protocol VTP Modes of Operation Do we Really Need to Put an IP address on a Switch Port Security Port Bonding Two Additional Advanced Features of Switches Power over Ethernet (802.3af,802.3at) Port Mirroring/ Spanning (SPAN/RSPAN) Lesson 12: Wireless Networking Introduction to Wireless Technology

The 802.11 Standards 2.4GHz (802.11b) 2.4 GHz (802.11g) 5GHz (802.11a) 5GHz (802.11h) 2.4GHz/5GHz (802.11n) Comparing 802.11 Standards Range Comparisons Wireless Network Components Wireless Access Points Wireless Network Interface Card Wireless Antennas Installing a Wireless Network Ad Hoc Mode: Independent Basic Service Set Infrastructure Mode: Basic Service Set Wireless Controllers Mobile Hot Spots Signal Degradation Other Network Infrastructure Implementations Installing and Configuring WLAN Hardware Site Survey Wireless Security Wireless Threats Open Access Service Set Identifiers, Wired Equivalent Privacy, and Media Access Control Address Authentication Remote Authentication Dial-In User Service (802.1x) Temporal Key Integrity Protocol Wi-Fi Protected Access or WPA2 Pre-Shared Key Lesson 13: Authentication and Access Control Security Filtering Access Control Lists Tunneling Encryption Remote Access Managing User Account and Password Security Managing User Accounts Managing Passwords Single Sign-On Multifactor Authentication User-Authentication Methods Public Key Infrastructure Kerberos Authentication, Authorization, and Accounting (AAA) Web Services Unified Voice Services Network Controllers Network Access Control (NAC) Challenge Handshake Authentication Protocol (CHAP) MS-CHAP Extensible Authentication Protocol (EAP) Hashes Network Access Control Lesson 14: Network Threats and Mitigation Recognizing Security Threats Denial of Service Distributed Dos (DDos) Authentication Issues Zero Day Attacks Insider Threat/Malicious Employee

Vulnerabilities Unnecessary Running Services Open Ports Unpatched/Legacy Systems Unencrypted Channels Clear-Text Credentials TEMPEST/RF Emanation Malicious Users Buffer Overflow Wireless Threats Attackers and Their Tools Misconfiguring Issues Social Engineering (Phishing) Understanding Mitigation Techniques Active Detection Passive Detection Proactive Defence Basic Forensic Concepts Policies and Procedures Security Policies Security Training Patches and Upgrades Firmware Updates Driver Updates Upgrading vs. Downgrading Anti-malware software Host-based Cloud/Server based Configuration Backups Updating Antivirus Components Fixing an Infected Computer Lesson 15: Physical Security and Risk Using Hardware and Software Security Devices Defining Firewalls Network-Based Firewalls Host-Based Firewalls Firewall Technologies Access Control Lists Port Security Demilitarized Zone Protocol Switching Dynamic Packet Filtering Proxy Services Firewalls at the Application Layer vs. the Network Layer Stateful vs. Stateless Network Layer Firewalls Application Layer Firewalls Scanning Services and Other Firewall Features Content Filtering Signature Identification Context Awareness Virtual Wire vs Routed Zones Intrusion Detection and Prevention Systems Network-Based IDS Hot-Based IDS Vulnerability Scanners VPN Concentrators Understanding Problems Affecting Device Security Physical Security Logical Security Configurations

Risk-Related Concepts Lesson 16: Wide Area Networks What’s a WAN? Defining WAN Terms The Public Switched Telephone Network WAN Connection Types Bandwidth or Speed T-Series Connections The T1 Connection The T3 Connection Transmission Media Wired Connections Dense Wavelength Division Multiplexing Passive Optical Network Wireless Technologies Broadband Services DSL Technology and xDSL Cable Modem Wireless WAN Technologies Cellular WAN WAN Protocols Integrated Services Digital Network Frame Relay Technology Point to Point Protocol Asynchronous Transfer Mode MPLS WAN Troubleshooting Loss of Internet Connectivity Interface Errors/Monitoring Split Horizon DNS Issues Router configurations Company Security Policy Lesson 17: Troubleshooting Tools Protocol Analyzers Throughput Testers Connectivity Software Using Traceroute Using ipconfiq and ifconfiq Using the ipconfiq Utility Using the ifconfiq Utility Using the ping Utility Using the Address Resolution Protocol The Windows ARP Table Using the arp Utility Using the nslookup Utility Resolving Names with the Hosts Table Using the Mtr Command Using the route Command Using the route Command Options Some Examples of the route command Using the nbtstat Utility The – a Switch The – A Switch

The – c Switch The - n Switch The – r Switch The – R Switch The – S Switch The – s Switch Using the netstat Utility The – a Switch The – e Switch The – r Switch The - s Switch The – p Switch The – n Switch Using the File Transfer Protocol Starting FTP and Logging In to an FTP Server Downloading Files Uploading Files Using the Telnet Utility How to Enable Telnet in Windows Don’t Use Telnet, Use Secure Shell Lesson 18: Software and Hardware Tools Understanding Network Scanners Packet Sniffers/Network Monitors Intrusion Detection and Prevention Software Port Scanners Wi-Fi Analyzer Baseline Network Monitoring and Logging Network Monitoring SNMP Syslog SIEM Utilization Identifying Hardware Tools Cable Testers Protocol Analyzer Certifiers Time-Domain Reflectometer Optical Time-Domain Reflectometer Multimeter Toner Probe Butt Set Punch-Down Tool Cable Stripper/Snips Voltage Event Recorder (Power) Environmental Monitors Lesson 19: Network Troubleshooting Narrowing Down the Problem Did You Check the Super Simple Stuff? Is Hardware or Software Causing the Problem? Is it a Workstation or a Server Problem? Which Segments of the Network Are Affected? Is It Bad Cabling Troubleshooting Steps Step 1: Identify the Problem Step 2: Establish a Theory of Probable Cause Step 3: Test the Theory to Determine Cause Step 4: Establish a Plan of Action to Resolve the Problem and Identify Potential Effects Step 5: Implement the Solution or Escalate as Necessary

Step 6: Verify Full System Functionality and if applicable Implement Preventative Measures Step 7: Document Findings, Actions and Outcomes Troubleshooting Tips Don’t Overlook the Small Stuff Prioritize Your Problems Check the Software Configuration Don’t Overlook Physical Conditions Don’t Overlook Cable Problems Check for Viruses Lesson 20: Management, Monitoring, and Optimization Managing Network Documentation Using SNMP Schematics and Diagrams Networking Monitoring Baselines On-boarding and Off-boarding of Mobile Devices NAC Policies, Procedures, and Regulations Safety Practices Implementing Network Segmentation Network Optimization Reasons to Optimize Your Network’s Performance How to Optimize Performance Unified Communications Traffic Shaping Load Balancing High availability Caching Engines Fault Tolerance Archives/Backups Common Address Redundancy Protocol Virtual Networking Locating and Installing Equipment Change Management Procedures

Associated Certifications & Exam This course will prepare delegates to write the CompTIA Network+, N10-006 Exam. Successfully passing this exam will result in the attainment of the CompTIA Network+ Certification. On successful completion of this course, delegates will receive a Torque IT course attendance certificate.