CompTIA Network+ N10-007

(9 customer reviews)
Sale!

Leading the way

CompTIA Network+ N10-007

(9 customer reviews)

| Total Course Video Hours: 33 Hrs 10 Min
|  Videos: 162
|  Course Access: 12 Months Unlimited Access
|  Study Method: Online Video Lessons
|  Course Type: Certificate Course
|  Award: Cyber Studies Institute
|  International Certification (optional):

CompTIA Network+ N10-007

 

Course Fee:

R1600,00

Current Special Ends in:

  • 00Days
  • 00Hours
  • 00Min
  • 00Sec

Overview

This course prepares the student to take the CompTIA Network+ N10-007 certification exam. It covers all exam objectives, as well as additional topics that provide background and context. Demonstrations and instructor commentary throughout the course come from real-world experience, with examples and tips that the network professional can use in a production environment.

In this course, you will:

– Describe networking concepts
– Explain the function and installation of network infrastructure components
– Describe network operations concepts and implementation
– Describe network security concepts and implementation
– Explain network troubleshooting techniques and tool usage

Claim your FREE R500 Gift Voucher

FREE R500 gift voucher, especially for you 🎁

Join our mailing list and get your free exclusive R500 discount voucher.

This Voucher can be used for any of our Bundle Courses.

Curriculum

Topics:
Public vs. Private
Loopback and Reserved
Subnet Mask
Default Gateway
Virtual IP
Subnetting
Activity Learning to Subnet
Address Assignments
1.8 Network Types and Topologies
You will compare and contrast the characteristics of network topologies, types and technologies.
Topics:
Wired Topologies
Wireless Topologies
Network Types
Technologies that Facilitate the Internet Of Things (IoT)
(No activity for this chapter)
1.9 Wireless Technologies
You will, given a scenario, implement the appropriate wireless technologies and configurations.
Topics:
Radio Basics
802.11 Standards
Wi-Fi Frequencies
Wi-Fi Antenna Concepts
Bluetooth
Cellular
Site Surveys
Activity Using an RF Spectrum Analyzer
1.10 Cloud Concepts
You will summarize cloud concepts and their purposes.
Topics:
Types of Services
Cloud Delivery Models
Security Implications/Considerations
Activity Exploring Cloud Services

1.11 Network Services
You will explain the functions of network services.
Topics:
DNS Service
Activity Setting up DNS
DHCP Service
Activity Setting Up DHCP
NTP
IPAM


Module 2 – Infrastructure
2.1 Cabling Solutions
You will, given a scenario, deploy the appropriate cabling solution.
Topics:
Media Types
Activity Testing a Fiber Optic Cable
Plenum vs. PVC
Connector Types
Activity Crimping on an RJ-45 Connector
Transceivers
Termination Points
Activity Terminating Cable to a 110 Block
Copper Cable Standards
Copper Termination Standards
Activity Creating a Crossover Cable
Ethernet Deployment Standards
2.2 Network Device Placement and Installation
You will, given a scenario, determine the appropriate placement of networking devices on a
network and install/configure them.
Topics:
Network Interface
Repeater
Hub
Bridge
Switch
Router
Modem
Wireless Access Point
Activity Setting up a WAP
Firewall

Media Converter
Wireless Range Extender
VoIP Endpoint
2.3 Advanced Network Devices
You will explain the purposes and use cases for advanced networking devices.
Topics:
Multilayer Switch
Wireless Controller
Load Balancer
IDS/IPS
Proxy Server
Activity Configuring Proxy Settings
VPN Concentrator
AAA/RADIUS Server
UTM Appliance
NGFW/Layer 7 Firewall
VoIP PBX
VoIP Gateway
Content Filter
2.4 Virtualization and Network Storage Technologies
You will explain the purposes of virtualization and network storage technologies.
Topics:
Virtual Networking Components
Network Storage Types
Connection Types
Jumbo Frames
(No activity for this chapter)
2.5 WAN Technologies
You will compare and contrast WAN technologies.
Topics:
Service Types
Transmission Mediums
Characteristics of Service
Activity Configuring WAN Links
Termination

Module 3 – Network Operations
3.1 Documentation
You will, given a scenario, use appropriate documentation and diagrams to manage the
network.
Topics:
Diagram Symbols
Standard Operating Procedures/Work Instructions
Logical vs. Physical Diagrams
Rack Diagrams
Change Management Documentation
Wiring and Port Locations
IDF/MDF Documentation
Labeling
Network Configuration and Performance Baselines
Inventory Management
Activity Using Documentation
3.2 Business Continuity and Disaster Recovery
You will compare and contrast business continuity and disaster recovery concepts.
Topics:
Availability Concepts
Recovery
Activity Backing Up Your Data
MTTR
MTBF
SLA Requirements
3.3 Scanning, Monitoring, and Patching
You will explain common scanning, monitoring and patching processes and summarize their
expected outputs.
Topics:
Processes
Event Management
SNMP Monitors
Metrics
Activity Testing the Network

3.4 Remote Access Methods
You will, given a scenario, use remote access methods.
Topics:
VPN
RDP
SSH
VNC
Telnet
HTTPS/Management URL
Remote File Access
Out-of-Band Management
Activity Making Remote Connections
3.5 Policies and Best Practices
You will identify policies and best practices.
Topics:
Privileged User Agreement
Password Policy
On-boarding/Off-boarding Procedures
Licensing Restrictions
International Export Controls
Data Loss Prevention
Remote Access Policies
Incident Response Policies
BYOD
AUP
NDA
System Life Cycle
Safety Procedures And Policies
Activity Creating Policies and Procedures


Module 4 – Network Security
4.1 Physical Security Devices
You will summarize the purposes of physical security devices.
Topics:
Detection
Prevention
(No activity for this chapter)

4.2 Authentication and Access Control
You will explain authentication and access controls.
Topics:
Authorization, Authentication, and Accounting
Multifactor Authentication
Access Control
Activity Examining Access Control Mechanisms
4.3 Basic Wireless Network Security
You will, given a scenario, secure a basic wireless network.
Topics:
WPA
WPA2
TKIP-RC4
CCMP-AES
Authentication and Authorization
Geofencing
Activity Demonstrating the Need for Wireless Security
4.4 Common Network Attacks
You will summarize common networking attacks.
Topics:
DoS
Social Engineering
Insider Threat
Logic Bomb
Rogue Access Point
Evil Twin
War-driving
Phishing
Ransomware
DNS Poisoning
ARP Poisoning
Spoofing
Deauthentication
Brute Force
VLAN Hopping
Man-in-the-Middle
Exploits vs. Vulnerabilities
Activity Conducting a Phishing Attack

4.5 Network Device Hardening
You will, given a scenario, implement network device hardening.
Topics:
Changing Default Credentials
Avoiding Common Passwords
File Hashing
Generating New Keys
Activity Supporting Secure Authentication and Encryption
Upgrading Firmware
Patching and Updates
Disabling Unnecessary Services
Using Secure Protocols
Disabling Unused Ports
4.6 Common Mitigation Techniques
You will explain common mitigation techniques and their purposes.
Topics:
Signature Management
Device Hardening
Change Native VLAN
Switchport Protection
Network Segmentation
Privileged User Account
File Integrity Monitoring
Role Separation
Restricting Access Via ACLs
Honeypot/Honeynet
Penetration Testing
Activity Implementing a Honeypot


Module 5 – Network Troubleshooting and Tools
5.1 Network Troubleshooting Methodology
You will explain the network troubleshooting methodology.
Topics:
Identify the Problem
Establish a Theory of Probable Cause
Test the Theory to Determine the Cause
Establish a Plan of Action to Resolve the Problem and Identify Potential Effects
Implement the Solution or Escalate as Necessary

Verify Full System Functionality and , if Applicable, Implement Preventive Measures
Document Findings, Actions, and Outcomes
(No activity for this chapter)
5.2 Using the Appropriate Tool
You will, given a scenario, use the appropriate tool.
Topics:
Hardware Tools – Basic Hand Held
Hardware Tools – Analyzers
Activity Troubleshooting with Hardware Tools
Software Tools – Testers and Analyzers
Activity Troubleshooting with Software Tools
Software Tools – Command Line
Activity Using Command Line Tools
5.3 Troubleshoot Wired Connectivity and Performance
You will, given a scenario, troubleshoot common wired connectivity and performance issues.
Topics:
Signal Issues:
o Attenuation
o Latency
o Jitter
o Crosstalk
o EMI
Activity Troubleshooting Signal Problems
Physical Issues:
o Open/short
o Incorrect pin-out
o Incorrect Cable Type
o Bad Port
o Damaged cable
o Bent pins
Transceiver Issues:
o Transceiver mismatch
o TX/RX reverse
o Duplex/speed mismatch
Activity Troubleshooting Transceiver Problems
Traffic Flow Issues:
o Bottleneck
o VLAN mismatch
o Network connection LED status indicators

5.4 Troubleshoot Wireless Connectivity and Performance
You will, given a scenario, troubleshoot common wireless connectivity and performance issues.
Topics:
Signal Loss:
o Attenuation
o Reflection
o Refraction
o Absorption
Latency & Jitter
Antenna Issues:
o Incorrect antenna type
o Incorrect antenna placement
Incorrect WAP type
WAP Issues:
o Interference
o Channel overlap
o Overcapacity
o Distance limitations
o Frequency mismatch
o Power levels
o Signal-to-noise ratio
WAP Misconfiguration:
o Wrong SSID
o Wrong passphrase
o Security type mismatch
Activity Troubleshooting WAP Issues
5.5 Troubleshoot Common Network Service Issues
You will, given a scenario, troubleshoot common network service issues.
Topics:
Common Network Issues:
o Physical Connectivity
o Incorrect IP Address
o Incorrect Gateway
o Incorrect Netmask
o Names Not Resolving
o Untrusted SSL Certificate
DHCP Issues:
o Duplicate IP Addresses
o Expired IP Address
o Rogue DHCP
o Exhausted DHCP Scope
Firewall/ACL Issues:

o Blocked TCP/UDP Ports
o Incorrect Host-based Firewall Settings
o Incorrect ACL Settings
Advanced Network Issues:
o DNS Server Issues
o Duplicate MAC Addresses
o Incorrect Time
Unresponsive Service
Hardware Failure
Activity Case Study: Troubleshooting an Unusual Network Issue

9 reviews for CompTIA Network+ N10-007

  1. Kaya

    The course content was up-to-date, reflecting the latest trends and developments in the field.

  2. Siphokazi

    The dedication and expertise shown by you are unmatched. Best college ever!

  3. Alexander

    The course provided excellent support materials, including downloadable resources and reference guides.

  4. Mzwandile

    The course included regular assessments, allowing me to track my progress and identify areas for improvement.

  5. Zimkhitha

    The dedication and expertise shown by you are unmatched. Best college ever!

  6. Samuel

    The practical examples and case studies shared in the course were highly relevant and applicable.

  7. Ayabonga

    I passed my exam on the first try! Thank you

  8. Ife

    I am thrilled to have chosen CSI for this course. Thank you for exceeding my expectations!

  9. Nuru

    The professionalism and expertise demonstrated by you are unparalleled. Best college in SA!

Add a review

Your email address will not be published. Required fields are marked *

Excited to Study Enroll Qualify

If you are ready to take the next step, click on the “Enroll Now” button below or “Contact us now” on this course for a detailed course outline or if you have any questions. An expert course adviser is standing by to assist you.

CompTIA Authorized Partner

Cyber Studies Institute (Pty) Ltd is proud to be an Official CompTIA Authorized Partner. Ensuring that you receive the best training in the world.

CompTIA Authorized Partner

How does studying with CSI work?

Click here to read how the process of studying at CSI work.