0845 450 6120

CompTIA Network+

This 5 day course is intended for those wishing to qualify with CompTIA Network+ Certification.

Network+ is foundation-level certification designed for IT professionals with 1 year's experience whose job role is focused on network administration. CompTIA Network+ is aimed at IT professionals with job roles such as network administrator, network technician, network installer, help desk technician and IT cable installer.


Learning Objectives

At the end of this course you will be able to:

  • Identify the basic network theory concepts.
  • Identify the major network communications methods.
  • Describe network media and hardware components.
  • Identify the major types of network implementations.
  • Identify the components of a TCP/IP network implementation.
  • Identify TCP/IP addressing and data delivery methods.
  • Identify the major services deployed on TCP/IP networks.
  • Identify the components of a LAN implementation.
  • Identify the infrastructure of a WAN implementation.
  • Identify the components of a remote network implementation.
  • Identify the major issues and methods to secure systems on a network.
  • Identify the major issues and technologies in network security.
  • Identify network security threats and attacks.
  • Identify the tools, methods, and techniques used in managing a network.
  • Describe troubleshooting of issues on a network.


Students should meet the following criteria prior to taking the course:

  • Taken and passed both CompTIA A+ Certification exams or have equivalent knowledge and experience

  • Be able to configure and support PC, laptop, mobile (smartphone/tablet), and print devices.

  • Know basic network terminology and functions (such as Ethernet, TCP/IP, switches, routers).

  • Configure and manage users, groups, and shared resources in a simple SOHO network.

  • Understand the use of basic access control measures, such as authentication, security policy, encryption, and firewalls

Course Content

Module 1 / Topologies and Infrastructure

•Topologies and the OSI Model
•Key Features of Networks
•Clients and Servers
•Network Topologies
•The OSI Model
•Physical Layer
•Data Link Layer
•Network Layer
•Upper Layers
•OSI Model Summary
•Media Types and Modulation
•Media Access Control
•Ethernet Frames
•Legacy Ethernet Standards
•Modern Ethernet Standards
•MAC Addressing
•Address Resolution Protocol (ARP)
•Protocol Analyzers

•Configuring a Network Adapter
•Using Hyper-V
•ARP and Packet Analysis
•Hubs, Bridges, and Switches
•Hubs and Bridges
•Managing a Switch
•Switch Interface Configuration
•Virtual LANs (VLAN)
•Spanning Tree Protocol (STP)
•Power over Ethernet (PoE)
•Infrastructure and Design
•Network Infrastructure Implementations
•Planning an Enterprise Campus Network
•Planning a SOHO Network Installation
•Planning an Industrial Control System
•TCP/IP Protocol Suite

Module 2 / Addressing and Routing
•Internet Protocol
•Internet Protocol Basics
•Subnet Masks
•ipconfig / ifconfig
•IP Routing Basics
•ICMP and ping

•IP Address Configuration
•IPv4 Addressing
•IP Addressing Schemes
•Subnetting and Classless Addressing
•Planning an IP Addressing Scheme
•Public Internet Addressing
•Multicast and IGMP

•IP Addressing Schemes
•Static versus Dynamic IP Addressing
•Configuring DHCP
•Configuring DHCP in Windows
•Configuring DHCP in Linux
•IPv6 Address Format
•IPv6 Addressing Schemes
•Configuring IPv6 Addresses
•Migrating to IPv6

•IPv6 Addressing
•Routing Basics
•Routing Algorithms and Metrics
•Routing Protocols
•Administrative Distance and Route Redistribution
•IPv4 and IPv6 Internet Routing
•High Availability Routing
•Installing and Configuring Routers
•Routing Troubleshooting Tools

•Configuring Routing

Module 3 / Troubleshooting and Management
•Transport Protocols
•Transmission Control Protocol (TCP)
•User Datagram Protocol (UDP)
•TCP/IP Ports

•TCP and Port Scanning
•Name Resolution
•Host Names and FQDNs
•Domain Name System (DNS)
•Configuring DNS Servers
•nslookup and nbtstat

•Name Resolution
•Configuring DNS
•Troubleshooting Procedures
•Identifying the Problem
•Establishing a Probable Cause
•Establishing a Plan of Action
•Troubleshooting Connectivity Issues
•Troubleshooting Configuration Issues
•Troubleshooting Internetworking
•Troubleshooting Services
•Applications and Services
•TCP/IP Services
•Email (SMTP / POP / IMAP)
•VoIP and VTC
•Real-time Services Protocols
•Quality of Service
•Packet Shapers
•Load Balancers
•Multilayer Switches

•Configuring Email Services
•Management and Monitoring
•Performance Monitoring
•Network Monitoring Utilities
•Analyzing Performance Metrics
•Simple Network Management Protocol
•Remote Administration Tools

•Performance Testing and Monitoring
•Monitoring and Management Tools
•Cloud and Virtualization
•Virtualization Technologies
•Storage Area Networks
•Cloud Computing

Module 4 / Installation
•Network Sites
•Wiring Distribution
•Rack Systems
•Safety and ESD
•Power Management
•HVAC (Heating, Ventilation, Air Conditioning)
•Physical Security Controls
•Fire Prevention and Suppression
•Installing Cable
•Twisted Pair Cable (UTP / STP / ScTP)
•Twisted Pair Connectors
•Wiring Tools and Techniques
•Cable Testing and Troubleshooting
•Other Copper Cable Types
•Fiber Optic Cable and Connectors
•Media Converters
•Troubleshooting Fiber Cable Issues
•Installing Wireless Networks
•Wireless Standards (IEEE 802.11)
•Wireless Network Topologies
•Wireless Site Design
•Site Surveys and Antenna Placement
•Troubleshooting Wireless Links
•WAN Technologies
•WAN Basics
•Telecommunications Networks
•Modern Telecommunications Networks
•Packet-switched WAN Services
•Local Loop Services
•Wireless WANs
•Remote Access
•Remote Access Services (RAS)
•Virtual Private Networks (VPN)
•IP Security (IPsec)
•Remote Access Servers
•Installing Remote Access Links
•Troubleshooting WAN Issues

Module 5 / Security
•Vulnerabilities and Threats
•Security Basics
•Social Engineering
•Network Reconnaissance
•Wireless Security
•Network Attack Strategies
•Denial of Service
•Security Appliances
•Network Segmentation
•Demilitarized Zones (DMZ)
•Network Address Translation
•Configuring a Firewall
•Proxies and Gateways
•Anti-malware Software
•Intrusion Detection Systems (IDS)

•Configuring Certificate Services, HTTPS, and FTPS
•Configuring a NAT Firewall
•Authentication Technologies
•Cryptographic Hash Functions
•NTLM and Kerberos
•Wi-Fi Authentication
•Endpoint Security
•Network Access Control
•Mobile Device Management
•Troubleshooting Authentication and ACLs

•Authentication Methods and VPNs
•Incident Response
•Business Continuity Concepts
•Disaster Recovery Planning
•IT Contingency Planning
•Incident Response Procedures
•Forensic Procedures
•Collection of Evidence
•Change and Configuration Management
•Change and Configuration Management
•Procedures and Standards
•Employee Policies
•Patch Management
•Backup Plans and Policies

Related Courses

One Month
Two Months
Three Months
More than Three Months
PRINCE2 Foundation & Practitioner
MSP Foundation & Practitioner
APMP Certificate
ITIL Foundation
Scrum in One Day
Certified ScrumMaster
ISTQB Software Test Foundation
Microsoft Project
BCS Business Analysis Practice
Other - Please Specify Below

Our Customers Include