Show as: Mobile

CompTIA Network+ N10-007

Course summary
159 GBP
Professional Training

Course description

CompTIA’s Network+ is a vendor-neutral certification that validates technical competency in networking administration and support. The Network Plus certification confirms a technician’s critical knowledge of media and topologies, protocols and standards, network implementation and network support. The exams also cover domains such as security, safety and environmental issues and communication and professionalism.   Network+ ensures an IT professional has the knowledge and skills to:  
  • Design and implement functional networks
  • Configure, manage, and maintain essential network devices
  • Use devices such as switches and routers to segment network traffic and create resilient networks
  • Identify benefits and drawbacks of existing network configurations
  • Implement network security, standards, and protocols
  • Troubleshoot network problems
  • Support the creation of virtualized networks
  •   What Skills Will You Learn?

      Networking Concepts Explain the purpose of a variety of networking concepts and implement them appropriately.   Infrastructure Determine and; explain the appropriate cabling, device and storage technologies.   Network Operations Use best practices to manage the network, determine policies & ensure business continuity.   Network Security Summarize physical security and; common attacks while securing the wired and wireless network.   Network Troubleshooting and; Tools Explain the network troubleshooting methodology & appropriate tools to support connectivity and; performance.     Course Syllabus (click title below to reveal):   [zozo_accordions style="default" id="CompTIA Network+ N10-007"] [zozo_accordion title="CompTIA Network+ N10-007" open="no" parent_id="accordion-1"] Module 1: Networking Concepts 1.1 Basic Networking • Intro to networking • Networking architectures • Activity: Basic Networking 1.2 OSI Model • Layer 7 – Application • Layer 6 – Presentation • Layer 5 – Session • Layer 4 – Transport • Layer 3 – Network • Layer 2 – Data Link • Layer 1 – Physical • Activity: Exploring the OSI Model 1.3 Protocols and Ports • Protocols and ports overview • Activity: Examining Protocols and Ports • Connection-oriented vs. connectionless • Transmission Control Protocol (TCP) • User Datagram Protocol (UDP) • Activity: Comparing TCP and UDP • Internet Protocol (IP) • Internet Control Messaging Protocol (ICMP) • Internet Group Messaging Protocol (IGMP) • Activity: Examining the Lower Layer Protocols • Layer 7 Remote Control Protocols • Layer 7 File Transfer Protocols • Layer 7 Messaging Protocols • Activity: Examining Messaging Protocols • Layer 7 Web Traffic Protocols • Layer 7 Streaming Media Protocols • Layer 7 Infrastructure Management Protocols 1.4 Switching • Properties of Network Traffic • Contention Management • Activity: Creating Collision and Broadcast Domains • Interface Properties and Segmentation • Activity: Creating a Basic Network Segment • Switching prt 2 • Activity: Switching • Switching Loop Management • Activity: Managing Switching Loops • VLANs • Activity: Creating VLANs 1.5 Routing • ARP • Activity: Examining ARP • IP Addressing Basics • Activity: Configuring IP • Routers • Activity: Setting Up a Router • Routing Basics • Activity Adding Static Routes • VLAN Routing • Activity: Routing Between VLANs • NAT/PAT • Activity: Configuring NAT/PAT • Routing Protocols • Activity Configuring a Routing Protocol • Firewalls • Activity: Configuring Firewalls 1.6 Advanced Switching and Routing Concepts • IPv6 Concepts • Activity: Exploring IPv6 • Performance Concepts • Distributed Switching • Software-defined Networking 1.7 IP Addressing • Public vs. Private • Loopback and Reserved • Subnet Mask • Default Gateway • Virtual IP • Subnetting • Activity: Learning to Subnet • Address Assignments 1.8 Network Types and Topologies • Wired Topologies • Wireless Topologies • Network Types • Technologies that Facilitate the Internet Of Things (IoT) 1.9 Wireless Technologies • Radio Basics • 802.11 Standards • Wi-Fi Frequencies • Wi-Fi Antenna Concepts • Bluetooth • Cellular • Site Surveys • Activity: Using an RF Spectrum Analyzer 1.10 Cloud Concepts • Types of Services • Cloud Delivery Models • Security Implications/Considerations • Activity: Exploring Cloud Services 1.11 Network Services • DNS Service • Activity: Setting up DNS • DHCP Service • Activity: Setting Up DHCP • NTP • IPAM Module 2 – Infrastructure 2.1 Cabling Solutions • Media Types • Activity: Testing a Fiber Optic Cable • Plenum vs.PVC • Connector Types • Activity: Crimping on an RJ-45 Connector • Transceivers • Termination Points • Activity: Terminating Cable to a 110 Block • Copper Cable Standards • Copper Termination Standards • Activity: Creating a Crossover Cable • Ethernet Deployment Standards 2.2 Network Device Placement and Installation • Network Interface • Repeater • Hub • Bridge • Switch • Router • Modem • Wireless Access Point • Activity Setting up a WAP • Firewall • Media Converter • Wireless Range Extender • VoIP Endpoint 2.3 Advanced Network Devices • Multilayer Switch • Wireless Controller • Load Balancer • IDS/IPS • Proxy Server • Activity Configuring Proxy Settings • VPN Concentrator • AAA/RADIUS Server • UTM Appliance • NGFW/Layer 7 Firewall • VoIP PBX • VoIP Gateway • Content Filter 2.4 Virtualization and Network Storage Technologies • Virtual Networking Components • Network Storage Types • Connection Types • Jumbo Frames 2.5 WAN Technologies • Service Types • Transmission Mediums • Characteristics of Service • Activity Configuring WAN Links • Termination Module 3 – Network Operations 3.1 Documentation • Diagram Symbols • Standard Operating Procedures/Work Instructions • Logical vs. Physical Diagrams • Rack Diagrams • Change Management Documentation • Wiring and Port Locations • IDF/MDF Documentation • Labeling • Network Configuration and Performance Baselines • Inventory Management • Activity Using Documentation 3.2 Business Continuity and Disaster Recovery • Availability Concepts • Recovery • Activity Backing Up Your Data • MTTR • MTBF • SLA Requirements 3.3 Scanning, Monitoring, and Patching • Processes • Event Management • SNMP Monitors • Metrics • Activity: Testing the Network 3.4 Remote Access Methods • VPN • RDP • SSH • VNC • Telnet • HTTPS/Management URL • Remote File Access • Out-of-Band Management • Activity: Making Remote Connections 3.5 Policies and Best Practices • Privileged User Agreement • Password Policy • On-boarding/Off-boarding Procedures • Licensing Restrictions • International Export Controls • Data Loss Prevention • Remote Access Policies • Incident Response Policies • BYOD • AUP • NDA • System Life Cycle • Safety Procedures And Policies • Activity: Creating Policies and Procedures Module 4 – Network Security 4.1 Physical Security Devices • Detection • Prevention 4.2 Authentication and Access Control • Authorization, Authentication, and Accounting • Multifactor Authentication • Access Control • Activity: Examining Access Control Mechanisms 4.3 Basic Wireless Network Security • WPA • WPA2 • TKIP-RC4 • CCMP-AES • Authentication and Authorization • Geofencing • Activity: Demonstrating the Need for Wireless Security 4.4 Common Network Attacks • DoS • Social Engineering • Insider Threat • Logic Bomb • Rogue Access Point • Evil Twin • War-driving • Phishing • Ransomware • DNS Poisoning • ARP Poisoning • Spoofing • Deauthentication • Brute Force • VLAN Hopping • Man-in-the-Middle • Exploits vs. Vulnerabilities • Activity Conducting a Phishing Attack 4.5 Network Device Hardening • Changing Default Credentials • Avoiding Common Passwords • File Hashing • Generating New Keys • Activity Supporting Secure Authentication and Encryption • Upgrading Firmware • Patching and Updates • Disabling Unnecessary Services • Using Secure Protocols • Disabling Unused Ports 4.6 Common Mitigation Techniques • Signature Management • Device Hardening • Change Native VLAN • Switchport Protection • Network Segmentation • Privileged User Account • File Integrity Monitoring • Role Separation • Restricting Access Via ACLs • Honeypot/Honeynet • Penetration Testing • Activity: Implementing a Honeypot Module – Network Troubleshooting and Tools 5.1 Network Troubleshooting Methodology • Identify the Problem • Establish a Theory of Probable Cause • Test the Theory to Determine the Cause • Establish a Plan of Action to Resolve the Problem and Identify Potential Effects • Implement the Solution or Escalate as Necessary • Verify Full System Functionality and , if Applicable, Implement Preventive Measures • Document Findings, Actions, and Outcomes 5.2 Using the Appropriate Tool • Hardware Tools – Basic Hand Held • Hardware Tools – Analyzers • Activity: Troubleshooting with Hardware Tools • Software Tools – Testers and Analyzers • Activity: Troubleshooting with Software Tools • Software Tools – Command Line • Activity: Using Command Line Tools 5.3 Troubleshoot Wired Connectivity and Performance • Signal Issues: o Attenuation o Latency o Jitter o Crosstalk o EMI • Activity Troubleshooting Signal Problems • Physical Issues: o Open/short o Incorrect pin-out o Incorrect Cable Type o Bad Port o Damaged cable o Bent pins • Transceiver Issues: o Transceiver mismatch o TX/RX reverse o Duplex/speed mismatch • Activity: Troubleshooting Transceiver Problems • Traffic Flow Issues: o Bottleneck o VLAN mismatch o Network connection LED status indicators 5.4 Troubleshoot Wireless Connectivity and Performance • Signal Loss: o Attenuation o Reflection o Refraction o Absorption • Latency & Jitter • Antenna Issues: o Incorrect antenna type o Incorrect antenna placement • Incorrect WAP type • WAP Issues: o Interference o Channel overlap o Overcapacity o Distance limitations o Frequency mismatch o Power levels o Signal-to-noise ratio • WAP Misconfiguration: o Wrong SSID o Wrong passphrase o Security type mismatch • Activity Troubleshooting WAP Issues 5.5 Troubleshoot Common Network Service Issues • Common Network Issues: o Physical Connectivity o Incorrect IP Address o Incorrect Gateway o Incorrect Netmask o Names Not Resolving o Untrusted SSL Certificate • DHCP Issues: o Duplicate IP Addresses o Expired IP Address o Rogue DHCP o Exhausted DHCP Scope • Firewall/ACL Issues: o Blocked TCP/UDP Ports o Incorrect Host-based Firewall Settings o Incorrect ACL Settings • Advanced Network Issues: o DNS Server Issues o Duplicate MAC Addresses o Incorrect Time • Unresponsive Service • Hardware Failure • Activity Case Study: Troubleshooting an Unusual Network Issue [/zozo_accordion]

    About provider

    Hudson - Leaders in Learning

    Hudson provide high spec e-learning to the consumer and corporate market all over the world. The majority of our online training is accessible across most devices including laptop, desktop, tablet, and smart phones. Our courses are designed to fit around...

    Read more and show all courses with this provider

    Customer Outreach Award 2019


    We believe that it should be easy for you to find and compare training courses. 

    Our Customer Outreach Award is presented to trusted providers who are excellent at responding to enquiries, making your search quicker, more efficient and easier, too.

    Request info

    Fill out your details to find out more about CompTIA Network+ N10-007.

      Contact the provider

      Get more information

      Register your interest

    Request Information

    Find out more about this CompTIA Network+ N10-007 course - simply fill out your details:


    There are no reviews available yet.

    U.K. L&D Report: 2019 - Benchmark Your Workplace Learning Strategy

    Are you curious about the L&D strategies of some of the U.K.'s top companies?

    Find out what they're up to in's second annual U.K. L&D Report!


    Learn more