Trusted Training Partners

Quick Look Course Summary:CompTIA N+ Networking Course
  • Next Public Course Date:

  • Length: 4 day(s)

  • Price (at your venue): 1 Person R 20,115.00 EX VAT 3 Person R 12,254.62 EX VAT 10 Person R 7,813.79 EX VAT

  • Certification Type:Accredited

  • Locations & Venues: Off-site or in-house. We train in all major city centres throughout South Africa.

Get Free & personalised
Training Advice

    Knowing your course will help us prepare for our consultation and phone call.

    The more people you send on our courses, the cheaper the unit cost.

    YesNo

    Input this code: captcha

    CompTIA N+ Networking Course: Introduction

    This course is to prepare students for the CompTIA Network+ Certification exam.

    CompTIA N+ Networking Course :Course Outline

    1. Network Basics
    Network concepts
    Networking models and protocols
    The basic components of a network
    Physical network segments
    Cable types
    Wireless networking
    Comparing network protocols
    Network architectures
    Physical network topologies
    Ethernet standards
    Characteristics of the various physical architectures
    WAN bandwidth technologies
    The OSI model

    2. Wired Connections
    Wired network connections
    Fibre optic cables and connectors
    Twisted pair cables and connectors
    Terminating with an RJ-45 connector
    Coaxial cables and connectors
    Terminating with a BNC connector
    Plenum wiring
    Network interface cards and modems
    Installing a NIC
    Removing a NIC
    Installing a PCI internal modem
    Creating a dial-up connection
    Dial-up connection object properties

    3. Network-to-Network Connections
    Network-to-Network connection components
    Connection components of an ISP
    Telecommunication room connection components
    LAN wiring
    Running network cabling
    Terminating a Cat 5e or Cat 6 cable in a punch down block
    LAN wiring tests
    LAN wiring test equipment

    4. Wired Internetworking Devices
    Internetworking devices
    Internetworking basics
    Bridges and switches
    Routers and routers
    Token Ring and other devices
    Firewall products
    Specialized internetworking devices
    Multilayer switches
    IDS and IPS products
    Comparing traffic shaper configuration

    5. Wired Communication Standards
    The TCP/IP protocol suite
    The TCP/IP architecture
    Using IPCONFIG to view IP configuration
    Viewing the ARP cache
    Testing host functionality
    Using port numbers
    Using Network Monitor to view a TCP connection
    Using Network Monitor to capture UDP packets
    TCP and UDP
    Using FTP to download a file
    Using Telnet to verify SMTP
    TCP/IP
    Comparing IPv4 and IPv6 addresses
    TCP/IP configuration parameters
    Configuring TCP/IP parameters
    The DHCP lease process
    DHCP servers
    Installing a DHCP server
    Configuring an IPv6 scope

    6. Wireless Networking
    Wireless network devices
    Wireless networking standards
    Comparing wireless networking standards
    Wireless configuration
    Technology used to implement WLANs
    Configuring a wireless access point

    7. Security Threats and Mitigation
    Security Threats
    Identifying Common Security Threats
    Social engineering
    DoS attacks
    Assessing vulnerability to DDoS attacks
    Port scanning
    Threat mitigation
    Creating a security policy
    Creating a human resources policy
    Creating an incident response and reporting policy
    Implementing change management
    User education and training
    Education opportunities and methods

    8. Security Practices
    Operating systems
    Installing antivirus software
    Scanning the system for spyware
    Updating the operating system
    Managing software patches
    Determining BIOS version
    Configuring Windows Firewall
    Devices
    Examining firewalls and proxy servers
    Comparing firewall-based secure topologies
    The benefits of NAC
    Security enabled by VPNs
    Identifying inherent weaknesses in network devices
    Ways to overcome device threats
    IDS characteristics
    Comparing HIDS and NIDS
    Risks associated with physical access to systems
    Logging and surveillance best practices

    9. Network Access Control
    Authentication
    Comparing one, two, and three-factor authentication
    Hashing data
    Requirements of a secure authentication system
    Components of Kerberos
    Comparing authentication systems
    Public key cryptography
    Certificate life cycle and management
    Remote access
    RADIUS and Diameter authentication
    The role of LDAP in a remote access environment
    TACACS+ authentication
    How 802.1x adds security to your network
    Comparing VPN protocols
    Wireless security
    Wireless networking vulnerabilities
    Scanning for insecure access points

    10. Monitoring
    Monitoring resources
    Viewing real-time performance data in Resource Overview
    Monitoring network performance
    Configuring Performance Monitor
    Running a Data Collector Set
    Viewing a Data Collector Set report
    Determining a system’s Stability Index
    Implementing Remote Desktop connections
    Event Viewer
    Viewing the event logs
    Viewing event logs on a remote computer
    Configuring source and collecting computers
    Creating an event subscription
    Forwarded events
    Device and application logging

    11. Troubleshooting
    Troubleshooting Basics
    Troubleshooting procedures
    Tracking problems and resolutions
    Common toolkit components
    Troubleshooting the network
    Testing the physical network
    Troubleshooting wireless networking
    TCP/IP utilities used for troubleshooting
    Using Ipconfig to display TCP/IP settings
    Testing TCP/IP connectivity
    Using NSLookup and tracert
    Troubleshooting with Network Diagnostics
    Remote Desktop connectivity
    Inability to access a shared resource
    Troubleshooting access to an account
    Hardware problems
    Network Problems
    Appendix A : Certification exam objectives map
    Comprehensive exam objectives
    Appendix B : CompTIA Network+ Acronyms
    Acronym list

    CompTIA N+ Networking Course: Course Duration

    4 day/s

    Who should attend: CompTIA N+ Networking Course

    This course is intended for programmers, networking.

    **Quote does not include Any Exam Fees (if applicable)

    IMPORTANT ACTION: Do Not Wait To Improve Your Skills.  

    Book Now By Completing Online Booking Form / Customised Proposal or Obtain Approval For Your Already Received Customised Proposal

    Realize incredible savings by sending more delegates

    Do you want to save costs by doing training at your premises?

    Save costs by providing own laptop

    Region *

    Accredited Courses

    Additional Courses

    Software & IT Courses

    Top Rated