CompTIA Network+ (N10-008) Cert Prep
Offered By: LinkedIn Learning
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Practice your skills and get ready to tackle the CompTIA Network+ (N10-008) certification exam.
Syllabus
Introduction
- Introduction
- What's on the Network+ exam?
- What can you do with a Network+ certification?
- What is a model?
- The OSI model
- Meet the frame
- The MAC address
- Broadcast vs. unicast
- Introduction to IP addressing
- Packets and ports
- Network topologies
- Coaxial cabling
- Twisted-pair cabling
- Fiber-optic cabling
- Fire ratings
- What is Ethernet?
- Ethernet frames
- Terminating twisted pair
- Hubs vs. switches
- Connecting switches
- 100BaseT
- Gigabit Ethernet and 10-gigabit Ethernet
- Transceivers
- Connecting Ethernet scenarios
- Introduction to structured cabling
- Terminating structured cabling
- Equipment room
- Alternative distribution panels
- Testing cable
- Troubleshooting structured cabling, part 1
- Troubleshooting structured cabling, part 2
- Using a toner and probe
- Wired connection scenarios
- Introduction to IP addressing and binary
- Introduction to ARP
- Subnet masks
- Classful addressing
- Subnetting with CIDR
- More CIDR subnetting practice
- Dynamic and static IP addressing
- Special IP addresses
- IP addressing scenarios
- Introducing routers
- Understanding ports
- Network address translation
- Implementing NAT
- Forwarding ports
- Tour of a SOHO router
- SOHO vs. enterprise
- Static routes
- Dynamic routing
- RIP
- OSPF
- BGP
- TCP and UDP
- ICMP and IGMP
- Handy tools
- Introduction to Wireshark
- Introduction to netstat
- Web servers
- FTP
- Email servers and clients
- Securing email
- Telnet and SSH
- Network Time Protocol
- Network service scenarios
- Understanding DNS
- Applying DNS
- The net command
- Windows name resolution
- Dynamic DNS
- DNS troubleshooting
- Making TCP/IP secure
- Symmetric encryption
- Asymmetric encryption
- Cryptographic hashes
- Identification
- Access control
- AAA
- Kerberos/EAP
- Single sign-on
- Certificates and trust
- Certificate error scenarios
- Switch management
- Introduction to VLANs
- InterVLAN routing
- Trunking
- Cisco commands
- Switch port protection
- Port bonding
- Port mirroring
- Quality of service
- IDS vs. IPS
- Proxy servers
- Load balancing
- Device placement scenarios
- Introduction to IPv6
- IPv6 addressing
- IPv6 in action
- IPv4 and IPv6 tunneling
- Understanding IP tunneling
- WAN technologies
- Digital subscriber line (DSL)
- Connecting with cable modems
- Connecting with satellites
- Cellular technologies
- Remote desktop connectivity
- Virtual private networks (VPNs)
- WAN troubleshooting scenarios
- Introduction to 802.11
- 802.11 standards
- Power over Ethernet (PoE)
- Antennas
- Wireless security standards
- Implementing wireless security
- Threats to your wireless network
- Enterprise wireless
- Installing a wireless network
- Wireless scenarios
- NEEDS TITLE
- Virtualization basics
- Your first virtual machine
- Cloud basics
- Cloud services
- Cloud ownership
- Infrastructure as code (IaC)
- Heroku demo
- Enterprise virtualization
- Cloud implementation
- Classic data center architecture
- NAS and SAN
- The modern data center
- High availability
- Documenting the data center
- Network types
- Internet of Things (IoT)
- Voice Over IP (VoIP)
- Industrial control systems and SCADA
- What are network operations?
- Hardening and security policies
- Change management
- Patching and updating
- Security risk management
- Points of failure
- Standard business documentation
- Incident response and forensics
- Disaster recovery and backups
- Business continuity
- Deployment models
- Security concepts
- Defense in depth
- Rogue DHCP servers
- Denial of Service (DoS)
- On-path and spoofing attacks
- Password attacks
- VLAN hopping
- System life cycle
- Malware
- Social engineering
- Common vulnerabilities
- Physical security
- Network hardening
- Demilitarized Zone (DMZ)
- Introduction to firewalls
- Firewalls
- Network monitoring
- SNMP
- Documenting logs
- System monitoring
- Security information and event management (SIEM)
- Network troubleshooting theory
Taught by
Joe Ramm, Mike Meyers and Total Seminars
Related Courses
Network Security(ISC)² via Coursera 5G Network Fundamentals
Institut Mines-Télécom via Coursera 5G for Everyone
Qualcomm via Coursera AWS Advanced Networking Specialty (LA)
A Cloud Guru AWS Certified Advanced Networking - Specialty 2020
A Cloud Guru