Published 6/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.84 GB | Duration: 13h 18mPreparatory Course for exam
What you'll learnLearn about the networking fundamentals
Understand network models, standards and topologies
Know about the network components like routers, switches etc.
Learn about cabling and connectors
Gain knowledge about the ports and protocols used in networking
Understand IP addressing and subnetting
Learn the concepts of network switching, routing, VoIP, Internet and SCADA
Gain understanding of software defined networking (SDN)
Implement networking services like DHCP, DNS, WLAN, 802.1x, remote access, AAA, RADIUS, VPN, virtualization and cloud computing
Create organizational documents and policies
Monitor network and identify issues
Implement high availability and disaster recovery
Learn the fundamentals of network security
Plan and implement measures to secure network
Identify threats and vulnerabilities
Protect the network from intrusion and malware
Learn the concepts of troubleshooting the network
RequirementsThe course is designed in such a way that the beginners can also take it and understand the concepts being taught in this course.
However, candidates with a little prior knowledge and experience of managing small to medium enterprise networks will find it much easier to grasp and clear the certification exam. The candidates are also expected to have knowledge of networking devices, network topologies and networking protocols.
DescriptionThe CompTIA Network+ course has been designed to cover all the exam topics that are part of the certification exam. This course has been designed keeping in view the prospective candidates that are going to appear for the CompTIA Network+ certification exam. For those candidates who are not planning to pass the certification exam, this course still provides an excellent opportunity to enhance their skill set and enable them to learn new skills which they can implement in their practical jobs. The course not only delivers theoretical knowledge to the students but also, encourages them to do hands-on training when it comes to the operations, implementation and troubleshooting the networks of various sizes and complexity. In addition to that, the knowledge acquired in this course can also help candidates to prepare for other certifications related to networking such as Cisco's CCNA, CCNP and Juniper's JCNA etc. Students working in similar job roles can also opt for this course as this will help them to grow in their careers and switch to the field of computer networking.The CompTIA Network+ course is a preparatory course for CompTIA N10-008 certification exam. The course covers the exam topics comprehensively and prepares the students to appear and pass the certification. The exam topics comprise of networking fundamentals and cover all domains like infrastructure, implementation, operations, maintenance, troubleshooting and security. The CompTIA Network+ certification is in high demand as every organization is dependent on network infrastructure for connectivity, business, and communication. The remote work culture has also contributed to the increased reliance on networking infrastructure as more and more applications are being accessed remotely using the network connectivity. These all factors make this certification, a must have for candidates looking to establish themselves in the field of computer networking.
OverviewSection 1: Chapter 1 - Network Fundamentals
Lecture 1 Instructor Introduction
Lecture 2 Course Introduction
Lecture 3 Network Fundamentals
Lecture 4 Topic A: Introduction to Networking
Lecture 5 What is a Network?
Lecture 6 Network Building Blocks
Lecture 7 Types of Networks
Lecture 8 Host Requirements
Lecture 9 Numbering Systems
Lecture 10 Demo - Numbering Systems
Lecture 11 Communication Types
Lecture 12 Communication Concepts
Lecture 13 Topic B: Network Models and Topologies
Lecture 14 Networking Models
Lecture 15 Workgroup vs. Domain
Lecture 16 Network Topologies
Lecture 17 Physical Bus
Lecture 18 Physical Star
Lecture 19 Physical Ring
Lecture 20 Physical Mesh
Lecture 21 Logical Topologies
Lecture 22 Wireless Topologies
Lecture 23 Topic C: Network Components and Services
Lecture 24 Network Components and Services
Lecture 25 Network Components and Services
Lecture 26 Topic D: Network Standards
Lecture 27 What is a Standard?
Lecture 28 Why Use Standards?
Lecture 29 Standards Organizations
Lecture 30 IEEE Networking Standards
Lecture 31 10Base Standards
Lecture 32 Ethernet
Lecture 33 Ethernet Frames
Lecture 34 MAC Addresses
Lecture 35 Access Methods
Lecture 36 OSI / RM
Lecture 37 Upper Layers
Lecture 38 Lower Layers
Lecture 39 Chapter 1 Review
Section 2: Chapter 2 - Network Communication
Lecture 40 Network Communication
Lecture 41 Topic A: Cabling and Connectors
Lecture 42 Transmission Methods
Lecture 43 Serial vs. Parallel
Lecture 44 Baseband vs. Broadband
Lecture 45 Data Access Methods
Lecture 46 Communication Domains
Lecture 47 Data Access Methods
Lecture 48 Digital Signals
Lecture 49 Transmission Media
Lecture 50 Twisted Pair Cabling
Lecture 51 Cable Media Categories
Lecture 52 Twisted Pair Connectors
Lecture 53 Copper Media Types
Lecture 54 Wiring Differences
Lecture 55 Coaxial Cabling
Lecture 56 Demo - Media Types
Lecture 57 Fiber Optic Cabling
Lecture 58 Connection Options
Lecture 59 Fiber Optic Connectors
Lecture 60 Demo - Optical Cables and Connectors
Lecture 61 Media Converters
Lecture 62 Transceivers
Lecture 63 Demarcation Point
Lecture 64 Other LAN Components
Lecture 65 Wiring Individual Workstations
Lecture 66 Connecting Cables
Lecture 67 Punchdown Blocks
Lecture 68 Demo - LAN Wiring
Lecture 69 Topic B: Ports and Protocols
Lecture 70 Overview of TCP/IP
Lecture 71 TCP/IP Layers
Lecture 72 Core Protocols
Lecture 73 Transport Protocols
Lecture 74 Transmission Control Protocol
Lecture 75 User Datagram Protocol
Lecture 76 What is a Socket?
Lecture 77 Internet Layer
Lecture 78 Core Internet Layer Protocols
Lecture 79 IP Datagrams
Lecture 80 Application Layer
Lecture 81 Application Layer Protocols
Lecture 82 Well-Known Ports
Lecture 83 Demo - Ports and Protocols
Lecture 84 Topic C: IP Addressing
Lecture 85 Introduction to IP Addresses
Lecture 86 Subnet Masks
Lecture 87 IPv4 Address Rules
Lecture 88 Valid Masks
Lecture 89 Default Gateway
Lecture 90 Demo - Working with Binary IP Addresses
Lecture 91 Demo - Configuring IP Addresses
Lecture 92 Address Categories
Lecture 93 Public vs. Private Addresses
Lecture 94 Classful Addressing
Lecture 95 Classless Addressing
Lecture 96 Demo - CIDR Notation
Lecture 97 Create IPv4 Subnets
Lecture 98 Simple Subnetting
Lecture 99 Complex Subnetting
Lecture 100 Demo - Creating Subnets
Lecture 101 Introduction to IPv6
Lecture 102 IPv6 Advantages
Lecture 103 IPv6 Addresses
Lecture 104 IPv6 Addressing
Lecture 105 Global Unicast
Lecture 106 Unique Local Unicast
Lecture 107 Link-Local Address
Lecture 108 Special Addresses
Lecture 109 Autoconfiguration in IPv6
Lecture 110 Demo - IPv6 Addressing
Lecture 111 Demo - Objective Check
Lecture 112 Chapter 2 Review
Section 3: Chapter 3 - Network Infrastructure
Lecture 113 Network Infrastructure
Lecture 114 Topic A: Network Devices
Lecture 115 Common Network Devices
Lecture 116 Device Capabilities
Lecture 117 OSI / RM Layers and Devices
Lecture 118 Physical Devices
Lecture 119 Network Interface Cards
Lecture 120 Repeaters
Lecture 121 Repeater Types
Lecture 122 Hubs
Lecture 123 Data Link Filtering
Lecture 124 Network Bridge
Lecture 125 Switches
Lecture 126 Topic B: Network Switching
Lecture 127 Switch Categories
Lecture 128 Switch Characteristics
Lecture 129 Power over Ethernet
Lecture 130 Virtual Capabilities
Lecture 131 Virtual LAN (VLAN)
Lecture 132 Initial Switch Configuration
Lecture 133 Interface Configuration
Lecture 134 Introduction to STP
Lecture 135 STP Port States
Lecture 136 RSTP Differences
Lecture 137 Understanding Trunking
Lecture 138 Trunking Protocols
Lecture 139 Additional Management for Switches
Lecture 140 Demo - Objective Check
Lecture 141 Topic C: Network Routing
Lecture 142 Layer 3 Functionality
Lecture 143 Routing Tables
Lecture 144 Demo - Routing Tables
Lecture 145 Network Segmentation Benefits
Lecture 146 Hardware vs. Software Routers
Lecture 147 Static vs. Dynamic Routing
Lecture 148 Routing Protocols
Lecture 149 Dynamic Routing
Lecture 150 What is a Metric?
Lecture 151 Distance Vector vs. Link State
Lecture 152 Path Vector
Lecture 153 Interior Routing Protocols
Lecture 154 Exterior Routing Protocols
Lecture 155 Routing Problems
Lecture 156 Topic D: Additional Network Devices
Lecture 157 Additional Network Devices
Lecture 158 VoIP Phones
Lecture 159 Load Balancers
Lecture 160 Traffic Shapers
Lecture 161 Intrusion Prevention Systems
Lecture 162 Firewalls
Lecture 163 Demo - Examining Firewalls
Lecture 164 Monitoring Devices
Lecture 165 Internet of Things (IoT)
Lecture 166 SCADA
Lecture 167 Internet Connectivity
Lecture 168 Wireless Devices
Lecture 169 Topic E: Datacenter Architecture
Lecture 170 Three-Tiered
Lecture 171 Access Layer
Lecture 172 Aggregation Layer
Lecture 173 Additional Designs
Lecture 174 Network Locations
Lecture 175 Software-Defined Networking
Lecture 176 Software-Defined Networking (cont.)
Lecture 177 Chapter 3 Review
Section 4: Chapter 4 - Network Implementations
Lecture 178 Network Implementations
Lecture 179 Topic A: Network Services
Lecture 180 Introducing DHCP
Lecture 181 DHCP Leases
Lecture 182 Lease Renewal
Lecture 183 DHCP Server Placement
Lecture 184 DHCP Implementations
Lecture 185 DHCP Servers
Lecture 186 Demo - Configuring DHCP
Lecture 187 What is Name Resolution?
Lecture 188 Types of Names
Lecture 189 Introduction to DNS
Lecture 190 DNS Components
Lecture 191 Resource Records
Lecture 192 DNS Zones and Domains
Lecture 193 Name Resolution Process
Lecture 194 Types of Queries
Lecture 195 Demo - Configuring DNS
Lecture 196 Topic B: Wireless Implementations
Lecture 197 Wireless Networking Fundamentals
Lecture 198 Wireless Networking Fundamentals
Lecture 199 Types of Wireless
Lecture 200 Wireless Networking Components
Lecture 201 Demo - WAP Configuration
Lecture 202 Wireless Modes
Lecture 203 Wireless Devices
Lecture 204 Wireless Networking Standards
Lecture 205 802.11 Standards
Lecture 206 Enhancing Wireless Performance
Lecture 207 Wired Equivalent Privacy
Lecture 208 Wi-Fi Protected Access
Lecture 209 802.1x
Lecture 210 Demo - Configuring Security Options
Lecture 211 Planning Wireless Networks
Lecture 212 Choosing Antennas
Lecture 213 Antenna Types
Lecture 214 Wireless Channels
Lecture 215 Site Surveys
Lecture 216 Topic C: Remote Access
Lecture 217 Introduction to Remote Networking
Lecture 218 Remote Node
Lecture 219 Remote Desktop Control
Lecture 220 Remote Control Concepts
Lecture 221 Demo - Configuring Remote Control
Lecture 222 Understanding Authentication
Lecture 223 Authentication, Authorization, and Accounting (AAA)
Lecture 224 CHAP and MS-CHAP
Lecture 225 EAP and Other Authentication Protocols
Lecture 226 RADIUS
Lecture 227 What is a VPN?
Lecture 228 VPN Tunnel Types
Lecture 229 What is Encapsulation?
Lecture 230 VPN Components
Lecture 231 Encryption Types
Lecture 232 VPN Concentrators
Lecture 233 VPN Protocols
Lecture 234 Demo - Creating and Configuring VPN Connections
Lecture 235 Topic D: Cloud and Virtualization
Lecture 236 What is Virtualization?
Lecture 237 Virtualization Benefits
Lecture 238 Virtual Machine Hosts
Lecture 239 Virtualization and Cloud Computing
Lecture 240 Demo - Virtualization Platforms
Lecture 241 Virtualization Components
Lecture 242 Demo - Create and Configure Virtual Machines
Lecture 243 Virtual Devices and Networks
Lecture 244 What is Cloud Computing?
Lecture 245 The Cloud Advantage
Lecture 246 Cloud Models
Lecture 247 Cloud Services Models
Lecture 248 Demo - Working in the Cloud
Lecture 249 Chapter 4 Review
Section 5: Chapter 5 - Network Operations
Lecture 250 Network Operations
Lecture 251 Topic A: Organizational Documents and Policies
Lecture 252 Organizational Documents and Policies
Lecture 253 Plans and Procedures
Lecture 254 Hardening and Security Policies
Lecture 255 Network Documentation
Lecture 256 Business Agreements
Lecture 257 Topic B: Network Monitoring
Lecture 258 Types of Monitoring
Lecture 259 Performance Baselines
Lecture 260 Monitoring Tools
Lecture 261 Network Monitoring Types
Lecture 262 Introduction to Network Tools
Lecture 263 Analyzing Traffic
Lecture 264 Interface Statistics
Lecture 265 Environmental Monitoring
Lecture 266 Using SYSLOG
Lecture 267 Network Device Logs
Lecture 268 Using SNMP
Lecture 269 SNMP Components
Lecture 0 SNMP Packet Types
Lecture 270 Monitoring Operating Systems
Lecture 271 Demo - Monitoring Operating Systems
Lecture 272 Performance Metrics and Sensors
Lecture 273 Patch Management
Lecture 274 Operating System Updates
Lecture 275 Updating Windows Systems
Lecture 276 Managing Network Devices
Lecture 277 Topic C: High Availability and Disaster Recovery
Lecture 278 Maintaining Business Continuity
Lecture 279 Understanding High Availability
Lecture 280 High Availability Options
Lecture 281 Disaster Recovery
Lecture 282 Hardware Redundancy
Lecture 283 Facilities and Infrastructure
Lecture 284 High Availability Concepts
Lecture 285 Key Terms
Lecture 286 Chapter 5 Review
Section 6: Chapter 6 - Network Security
Lecture 287 Network Security
Lecture 288 Topic A: Network Security Fundamentals
Lecture 289 Introduction to Network Security
Lecture 290 The CIA Triad
Lecture 291 Network Threats
Lecture 292 Network Vulnerabilities
Lecture 293 Understanding Risk
Lecture 294 What is AAAA?
Lecture 295 Cryptography
Lecture 296 Algorithms and Keys
Lecture 297 Digital Signatures
Lecture 298 Best Practices for Permissions
Lecture 299 Best Practices for Employees
Lecture 300 Defense in Depth
Lecture 301 Topic B: Planning for Network Security
Lecture 302 Planning for Network Security
Lecture 303 Types of Threats
Lecture 304 Threat-Vulnerability Pairs
Lecture 305 Identifying Vulnerabilities
Lecture 306 Types of Vulnerabilities
Lecture 307 Mitigating Risks
Lecture 308 Risk Assessments
Lecture 309 Topic C: Identifying Threats and Vulnerabilities
Lecture 310 Threat Categories
Lecture 311 Introduction to Software Attacks
Lecture 312 Malicious Code Attacks
Lecture 313 Types of Malicious Code
Lecture 314 Network Threats
Lecture 315 Port Scanning and Eavesdropping
Lecture 316 IP Spoofing
Lecture 317 Denial of Service (DoS)
Lecture 318 On-path Attacks
Lecture 319 Human Attacks
Lecture 320 Wireless Vulnerabilities and Threats
Lecture 321 Topic D: Protecting the Network
Lecture 322 Protecting the Network
Lecture 323 Implementing Physical Protection
Lecture 324 Physical Security Options
Lecture 325 Anti-Malware
Lecture 326 Demo - Anti-Malware Options
Lecture 327 Network Hardening
Lecture 328 Securing Network Communications
Lecture 329 Best Practices
Lecture 330 Demo - System Hardening
Lecture 331 Wireless Security
Lecture 332 Authentication
Lecture 333 Authentication Factors
Lecture 334 Authentication Factors
Lecture 335 Chapter 6 Review
Section 7: Chapter 7 - Network Troubleshooting
Lecture 336 Network Troubleshooting
Lecture 337 Topic A: Troubleshooting Methodology
Lecture 338 Introduction to Troubleshooting
Lecture 339 Identifying the Issue
Lecture 340 Establish a Theory of Probable Cause
Lecture 341 Create an Action Plan
Lecture 342 Putting it All Together
Lecture 343 Topic B: Troubleshooting Tools
Lecture 344 Hardware Troubleshooting Tools
Lecture 345 Network Toolkit
Lecture 346 Software Toolkits
Lecture 347 OS Troubleshooting Tools
Lecture 348 Demo - TCP/IP Troubleshooting Tools
Lecture 349 Topic C: Troubleshooting Network Issues
Lecture 350 Introduction to Wireless Issues
Lecture 351 Wireless Signal Issues
Lecture 352 Troubleshooting Hardware and Configuration
Lecture 353 Wireless Security Issues
Lecture 354 Troubleshooting Wired Connectivity Issues
Lecture 355 Common Cable Issues
Lecture 356 Troubleshooting Network Service Issues
Lecture 357 Troubleshooting Security Issues
Lecture 358 Chapter 7 Review
Lecture 359 Course Closure
Network administrator,System administrator,Network manager,IT/IS manager,Network security analyst,NOC analyst,Network engineer
HOMEPAGE
https://www.udemy.com/course/comptia-network-n10-008-exam/
Warning! You are not allowed to view this text.
Warning! You are not allowed to view this text.