0845 450 6120

CompTIA Network+

This 5 day course is intended for those wishing to qualify with CompTIA Network+ Certification.

Network+ is foundation-level certification designed for IT professionals with 1 year's experience whose job role is focused on network administration. CompTIA Network+ is aimed at IT professionals with job roles such as network administrator, network technician, network installer, help desk technician and IT cable installer.

Learning Objectives

At the end of this course you will be able to:

  • Identify the basic network theory concepts.
  • Identify the major network communications methods.
  • Describe network media and hardware components.
  • Identify the major types of network implementations.
  • Identify the components of a TCP/IP network implementation.
  • Identify TCP/IP addressing and data delivery methods.
  • Identify the major services deployed on TCP/IP networks.
  • Identify the components of a LAN implementation.
  • Identify the infrastructure of a WAN implementation.
  • Identify the components of a remote network implementation.
  • Identify the major issues and methods to secure systems on a network.
  • Identify the major issues and technologies in network security.
  • Identify network security threats and attacks.
  • Identify the tools, methods, and techniques used in managing a network.
  • Describe troubleshooting of issues on a network.

Pre-Requisites

Students should meet the following criteria prior to taking the course:

  • Taken and passed both CompTIA A+ Certification exams or have equivalent knowledge and experience

  • Be able to configure and support PC, laptop, mobile (smartphone/tablet), and print devices.

  • Know basic network terminology and functions (such as Ethernet, TCP/IP, switches, routers).

  • Configure and manage users, groups, and shared resources in a simple SOHO network.

  • Understand the use of basic access control measures, such as authentication, security policy, encryption, and firewalls

Course Content

Module 1 / Topologies and Infrastructure

•Topologies and the OSI Model
•Key Features of Networks
•Clients and Servers
•Network Topologies
•The OSI Model
•Physical Layer
•Data Link Layer
•Network Layer
•Upper Layers
•OSI Model Summary
•Ethernet
•Media Types and Modulation
•Signaling
•Media Access Control
•Ethernet Frames
•Legacy Ethernet Standards
•Modern Ethernet Standards
•MAC Addressing
•Address Resolution Protocol (ARP)
•Protocol Analyzers


Labs
•Configuring a Network Adapter
•Using Hyper-V
•ARP and Packet Analysis
•Hubs, Bridges, and Switches
•Hubs and Bridges
•Switches
•Managing a Switch
•Switch Interface Configuration
•Virtual LANs (VLAN)
•Spanning Tree Protocol (STP)
•Power over Ethernet (PoE)
•Infrastructure and Design
•Network Infrastructure Implementations
•Planning an Enterprise Campus Network
•Planning a SOHO Network Installation
•Planning an Industrial Control System
•TCP/IP Protocol Suite


Module 2 / Addressing and Routing
•Internet Protocol
•Internet Protocol Basics
•Subnet Masks
•ipconfig / ifconfig
•IP Routing Basics
•ICMP and ping


Labs
•IP Address Configuration
•IPv4 Addressing
•IP Addressing Schemes
•Subnetting and Classless Addressing
•Planning an IP Addressing Scheme
•Public Internet Addressing
•Multicast and IGMP


Labs
•IP Addressing Schemes
•DHCP and APIPA
•Static versus Dynamic IP Addressing
•Configuring DHCP
•Configuring DHCP in Windows
•Configuring DHCP in Linux
•IPv6 Address Format
•IPv6 Addressing Schemes
•Configuring IPv6 Addresses
•Migrating to IPv6


Labs
•IPv6 Addressing
•Routing
•Routing Basics
•Routing Algorithms and Metrics
•Routing Protocols
•Administrative Distance and Route Redistribution
•IPv4 and IPv6 Internet Routing
•High Availability Routing
•Installing and Configuring Routers
•Routing Troubleshooting Tools


Labs
•Configuring Routing


Module 3 / Troubleshooting and Management
•Transport Protocols
•Transmission Control Protocol (TCP)
•User Datagram Protocol (UDP)
•TCP/IP Ports
•netstat


Labs 
•TCP and Port Scanning
•Name Resolution
•Host Names and FQDNs
•Domain Name System (DNS)
•Configuring DNS Servers
•nslookup and nbtstat


Labs
•Name Resolution
•Configuring DNS
•Troubleshooting
•Troubleshooting Procedures
•Identifying the Problem
•Establishing a Probable Cause
•Establishing a Plan of Action
•Troubleshooting Connectivity Issues
•Troubleshooting Configuration Issues
•Troubleshooting Internetworking
•Troubleshooting Services
•Applications and Services
•TCP/IP Services
•HTTP and HTTPS
•FTP, TFTP, and SMB
•Email (SMTP / POP / IMAP)
•VoIP and VTC
•Real-time Services Protocols
•Quality of Service
•Packet Shapers
•Load Balancers
•Multilayer Switches


Labs
•Configuring Email Services
•Management and Monitoring
•Performance Monitoring
•Network Monitoring Utilities
•Logs
•Analyzing Performance Metrics
•Simple Network Management Protocol
•Remote Administration Tools


Labs
•Performance Testing and Monitoring
•Monitoring and Management Tools
•Cloud and Virtualization
•Virtualization Technologies
•Storage Area Networks
•Cloud Computing


Module 4 / Installation
•Network Sites
•Wiring Distribution
•Rack Systems
•Safety and ESD
•Power Management
•HVAC (Heating, Ventilation, Air Conditioning)
•Physical Security Controls
•Fire Prevention and Suppression
•Installing Cable
•Twisted Pair Cable (UTP / STP / ScTP)
•Twisted Pair Connectors
•Wiring Tools and Techniques
•Cable Testing and Troubleshooting
•Other Copper Cable Types
•Fiber Optic Cable and Connectors
•Media Converters
•Troubleshooting Fiber Cable Issues
•Installing Wireless Networks
•Wireless Standards (IEEE 802.11)
•Wireless Network Topologies
•Wireless Site Design
•Site Surveys and Antenna Placement
•Troubleshooting Wireless Links
•WAN Technologies
•WAN Basics
•Telecommunications Networks
•Modern Telecommunications Networks
•Packet-switched WAN Services
•Local Loop Services
•Wireless WANs
•Remote Access
•Remote Access Services (RAS)
•Virtual Private Networks (VPN)
•PPTP and SSL VPNs
•IP Security (IPsec)
•Remote Access Servers
•Installing Remote Access Links
•Troubleshooting WAN Issues


Module 5 / Security
•Vulnerabilities and Threats
•Security Basics
•Social Engineering
•Network Reconnaissance
•Wireless Security
•Network Attack Strategies
•Denial of Service
•Security Appliances
•Network Segmentation
•Demilitarized Zones (DMZ)
•Network Address Translation
•Firewalls
•Configuring a Firewall
•Proxies and Gateways
•Anti-malware Software
•Intrusion Detection Systems (IDS)


Labs
•Configuring Certificate Services, HTTPS, and FTPS
•Configuring a NAT Firewall
•Authentication
•Authentication Technologies
•Cryptographic Hash Functions
•NTLM and Kerberos
•RADIUS and TACACS+
•PAP, CHAP, and EAP
•Wi-Fi Authentication
•Endpoint Security
•Network Access Control
•Mobile Device Management
•Troubleshooting Authentication and ACLs


Labs
•Authentication Methods and VPNs
•Incident Response
•Business Continuity Concepts
•Disaster Recovery Planning
•IT Contingency Planning
•Training
•Incident Response Procedures
•Forensic Procedures
•Collection of Evidence
•Change and Configuration Management
•Change and Configuration Management
•Documentation
•Procedures and Standards
•Employee Policies
•Patch Management
•Backup Plans and Policies

One Month
Two Months
Three Months
More than Three Months
PRINCE2 Foundation & Practitioner
MSP Foundation & Practitioner
APMP Certificate
ITIL Foundation
Scrum in One Day
Certified ScrumMaster
ISTQB Software Test Foundation
Microsoft Project
BCS Business Analysis Practice
Other - Please Specify Below

Our Customers Include