About Comptia N+ certification Training

Diploma in Computer Networking is open to anyone with the knowledge of hardware.This hands on course is our recommended cirriculam for those who want to upgrade from hardware to Networking. This course covers the full range of IBM and IBM-compatible systems. This is a preliminary course recommended for candidates wish to enter Network and System administration field.

The student will describe the major networking technologies, systems, skills, and tools used in modern networks. This course will assist the student in preparing for the N10-007 exam and certification.
This course is intended for entry-level computer support professionals with basic knowledge of computer hardware, software and operating systems to prepare for the CompTIA Network+ (Exam N10-007) or to increase their knowledge and understanding of networking concepts and acquire the skills required to prepare for a career in network support or administration. Tier 1 & 2 Support staff seeking IAT-1 certification to comply with the Directive DoD 8570.1.
A great way to start preparation for the CompTIA Certified Network+ Professional (N+) is to start by properly appreciating the role of the syllabus and study guide in the CompTIA N10-006 certification exam. This study guide is a tool for getting you to CompTIA on the same page and understanding the nature of the CompTIA Network+ exam.
This CompTIA N10-006 exam preparation guide has been compiled by our team of experts to provide an overview of the CompTIA Network+ exam, study material, sample questions, practice exam and ways to interpret the examination goals to help you assess your readiness for the CompTIA N+ exam by identifying preconditions of knowledge. To determine what type of questions will be asked and the level of difficulty that could be tested in the CompTIA Network+ certification exam, we recommend that you refer the simulation questions and practice test listed in this guide.


COMPTIA N+ CERTIFICATION HIGHLIGHTS

Course Duration

2 Months

Learners

50000

Delivery Mode

Classroom Training

Apply Online

Click Now

WHO WILL BENEFIT

Students
Engineer
Systems programmers
Coding Enthusiast

COMPTIA N+ CERTIFICATION COURSE CURRICULUM

What is a Network?
  • Alt Text Client/Server
  • Alt Text Peer-to-Peer
  • Alt Text LAN - Local Area Network
  • Alt Text CAN - Campus Area Network
  • Alt Text MAN - Metropolitan Area Network
  • Alt Text WAN - Wide Area Network
  • Alt Text How Do We Make Connections?
  • Alt Text What is a Protocol?
  • Alt Text Introduction to Addressing




Network Media
  • Alt Text Wired Media - Twisted Pair, Coaxial, and Fiber Optic
  • Alt Text What is the Plenum?
  • Alt Text Common Connectors
  • Alt Text Wiring Standards
  • Alt Text LAN Technology Types - Ethernet
  • Alt Text Standard Ethernet
  • Alt Text Fast Ethernet
  • Alt Text Gigabit Ethernet
  • Alt Text 10 Gigabit Ethernet
  • Alt Text Wiring Distriburtion


Network Topologies
  • Alt Text What Does Topology Mean?
  • Alt Text Bus,Star, Ring,Mesh,Hybrid,
  • Alt Text WAN Technologies - Circuit and Pocket Switching
  • Alt Text POTS, PSTN, T1/E1, and T3/E3
  • Alt Text ISDN
  • Alt Text SONET/OC-x
  • Alt Text Frame Relay and ATM
  • Alt Text MPLS - Multiprotocol Label Switching
  • Alt Text DSL
  • Alt Text Cable Modem, Satellite and Wireless
  • Alt Text What is a VPN?
  • Alt Text What is a VLAN?

OSI Model
  • Alt Text Definition of a Protocol
  • Alt Text Standards of Communication
  • Alt Text What is the OSI Model?
  • Alt Text Defining OSI Model Layers
  • Alt Text How Data Travels Through OSI Model
  • Alt Text Networking Hardware in OSI Model
Feature Image
TCP/IP
  • Alt Text TCP/IP Protocol Suite
  • Alt Text What is TCP/IP (DARPA) Model?
  • Alt Text Transport Layer Protocols
  • Alt Text Internet Layer Protocols
  • Alt Text Types of TCP/IP Communication
  • Alt Text Working with IP Addresses
  • Alt Text Planning an IP Addressing Scheme
  • Alt Text Rules for IP Addressing
  • Alt Text What is Classful IP Addressing?
  • Alt Text Private vs. Public IP Addressing
  • Alt Text What is NAT?
  • Alt Text How Computers Get IP Addresses
  • Alt Text Working with Binary Numbers
  • Alt Text Converting Binary to Decimal and Vice Versa
  • Alt Text Binary IP Addresses
  • Alt Text Binary Subnet Masks
  • Alt Text Internetworking - What is a Router?
  • Alt Text What is a Default Gateway?
  • Alt Text What is Subnetting?
  • Alt Text Classful vs. Classless Interdomain Routing (CIDR)
  • Alt Text Subnetting with CIDR & VLSM
  • Alt Text CIDR Notation

Feature Image
TCP/IP Protocols
  • Alt Text FTP - File Transfer Protocol
  • Alt Text TFTP - Trivial File Transfer Protocol
  • Alt Text HTTP and HTTPS
  • Alt Text NTP - Network Time Protocol
  • Alt Text POP3 and IMAP4
  • Alt Text SMTP - Simple Mail Transfer Protocol
  • Alt Text DHCP - Dynamic Host Configuration Protocol
  • Alt Text DNS - Domain Naming System
  • Alt Text Telnet and SSH
  • Alt Text SNMP - Simple Network Management Protocol
  • Alt Text SIP and RTP
  • Alt Text TLS - Transport Layer Security

Network Devices
  • Alt Text Modem and NIC
  • Alt Text Repeater and Hub
  • Alt Text Bridge and Switch
  • Alt Text Router
  • Alt Text Different Types of Switches
  • Alt Text Advanced Switch Funcionality
  • Alt Text Firewall and Proxy Server
  • Alt Text Wireless Access Point
  • Alt Text Basic DHCP Server and DNS Server
  • Alt Text CSU/DSU
  • Alt Text Media Converters
  • Alt Text Load Balancer and Bandwidth Shaper
Routing
  • Alt Text Understanding Routing Tables
  • Alt Text Adding and Deleting Routes
  • Alt Text Static vs. Dynamic Routing
  • Alt Text Routing Protocols
  • Alt Text Distance Vector Protocols: RIP, RIPv2, and BGP
  • Alt Text Link State Protocols: OSPF and IS-IS
  • Alt Text Hybrid Routing Protocol: EIGRP
  • Alt Text What is Convergence?
  • Alt Text IGP vs. EGP


Wireless Networking
  • Alt Text Benefits of Wireless Networking
  • Alt Text Components of a Wireless Access Point
  • Alt Text Where to Place a WAP
  • Alt Text Wireless Networking Standards
  • Alt Text RF Channels
  • Alt Text How to Secure a Wireless Network
  • Alt Text WEP - Wired Equivalency Privacy
  • Alt Text WPA - Wi-Fi Protected Access
  • Alt Text 802.1x
  • Alt Text Setting Up a Wireless Access Point


Networking Command Line Tools
  • Alt Text ipconfig/ifconfig/arp Utilities Overview
  • Alt Text ping/arp ping Utilities Overview
  • Alt Text tracert/traceroute Utilities Overview
  • Alt Text mtr Utility Overview
  • Alt Text netstat/nbstat/route Utilities Overview
  • Alt Text nslookup/dig/host Utilities Overview
  • Alt Text ipconfig Command
  • Alt Text arp Command
  • Alt Text ping Command
  • Alt Text tracert Command
  • Alt Text netstat Command
  • Alt Text nslookup Command
Feature Image
Network Performance Optimization
  • Alt Text Reasons for Network Performance Optimization
  • Alt Text Quality of Service (QoS)
  • Alt Text Traffic Shaping
  • Alt Text Load Balancing
  • Alt Text Fault Tolerance
  • Alt Text RAID 0 - Disk Striping
  • Alt Text RAID 1 - Disk Mirroring and Duplexing
  • Alt Text RAID 5 - Disk Striping with Parity
  • Alt Text Other Popular Forms of RAID
  • Alt Text Caching Engines
Network Tools
  • Alt Text Cable Strippers
  • Alt Text Snips and Crimpers
  • Alt Text Punch Down Tool
  • Alt Text Cable Testers and Certifiers
  • Alt Text Time Domain Reflectometer (TDR) and Optical Time Domain Reflectometer (OTDR)
  • Alt Text Toner Probe
  • Alt Text Voltage Event Recorder
  • Alt Text Multimeter
  • Alt Text Protocol Analyzer, Temperature Monitor, and Butt Set
Feature Image
Network Monitoring
  • Alt Text Packet Sniffers
  • Alt Text Port Scanners
  • Alt Text Intrusion Detection Software (IDS) and Intrusion Prevention Software (IPS)
  • Alt Text System, Event, and History Logs
Documentation
  • Alt Text Why is Documentation so Important?
  • Alt Text What Should I Document?
  • Alt Text Wiring Schematics
  • Alt Text Physical and Logical Network Diagrams
  • Alt Text Baseline
  • Alt Text Network Policies
  • Alt Text Network Procedures
  • Alt Text Network Configuration
  • Alt Text Regulations
Troubleshooting
  • Alt Text The Process of Troubleshooting - Gather Information
  • Alt Text Who is Affected?
  • Alt Text What's Changed?
  • Alt Text Why is This Happening?
  • Alt Text Can I Handle It?
  • Alt Text Process of Finding a Solution
  • Alt Text Physical Issues
  • Alt Text Logical Issues
  • Alt Text Issues to Escalate
  • Alt Text Wireless Issues
  • Alt Text CMOS Setting
  • Alt Text Operating System Troubleshooting
  • Alt Text Hardware Troubleshooting
Network Security
  • Alt Text Firewalls
  • Alt Text Other Security Devices
  • Alt Text Network Access Security
  • Alt Text Filtering
  • Alt Text Tunneling and Encryption
  • Alt Text User Authentication
  • Alt Text Device Security
  • Alt Text Common Security Threats