CompTIA Network+ (Exam N10-008): ITPRO TV Videos, Labs and Practice Tests
Course Specifications
Course Number: ITP76–002_rev1.0
Course Length: 21 hours 39 minutes
Course Description
CompTIA’s Network+ validates the knowledge and skills needed to troubleshoot, configure and manage wired and wireless networks found in companies around the world. CompTIA Network+ certifies a professional-level understanding of emerging technologies, including cloud and virtualization technologies.
Course Content
Overview (9 minutes)
In this series you learn to support core IT technologies. This course is geared towards the individual who has basic computer skills and who desires to obtain a job as an entry-level IT technician. This course is designed to assist CompTIA A+ exam candidates in passing the current A+ 1000 series exams. This course is comprehensive covers objectives for both A+ 220-1001 and A+ 220-1002 exams.
1.0 - Networking Fundamentals (15 Episodes: 7 Hours 30 Minutes)
OSI Model (21 minutes)
In this episode, the viewer will identify the attributes and characteristics of the seven layer Open Systems Interconnection Model (OSI).
OSI and TCP-IP Models (18 minutes)
In this episode,the viewer will identify the functionality and characteristic of TCP/IP model. The viewer will also compare and contrast the Open Systems Interconnection Model with the TCP/IP model.
Encapsulation (19 minutes)
In this episode, the viewer will identify the process of encapsulation and decapsulation work as well as how this process relates to the Open Systems Interconnection Model (OSI). The viewer will also identify different headers that are generated during the encapsulation process such as Transmission Control Protocol (TCP), User Datagram Protocol (UDP) and the Internet Protocol (IP).
Network Topologies (19 minutes)
In this episode, the viewer will identify various network topology implementations such as bus, ring, star, full mesh, partial mesh and hybrid topologies.
Network Types (19 minutes)
In this episode, the viewer will identify the modern networking types and the characteristics such as peer-to-peer, client/server, local area networks, wide area networks, metropolitan area networks, wireless local area networks, campus area networks, storage area networks and software-defined wide area networks.
Virtualization (19 minutes)
In this episode, the viewer will identify the common components of virtualization, including type 1 and type 2 hypervisors, host and guest machines as well as virtual computing resources.
Service Provider Links (18 minutes)
In this episode, the viewer will identify the types of links that service providers use to connect customers to the providers networks such as satellite, DSL, Lease line and Metro-optical.
Copper Cables and Connections (21 minutes)
In this episode, the viewer will identify the attributes copper cabling and standards. The viewer will differentiate between unshielded and shielded twisted pair, TIA/EIA's category cabling standards and connectors.
Fiber Cables and Connections (20 minutes)
In this episode, the viewer will identify attributes associated with fiber optic connections such as single-mode, multimode and connector types like local connector, straight tip, subscriber connector, mechanical transfer, registered jack. The viewer will also identify transciever types such as SFPs, SFP+, QSFP and QSFP+.
Ethernet Standards (20 minutes)
In this episode, the viewer will identify as well as compare and contrast Ethernet BASE standards for copper and fiber-based cabling.
Cable Management (17 minutes)
In this episode, the viewer will identify techniques to organize cable distribution systems suchs as patch panels, fiber distribution panels, and variants of punchdown blocks such as 110s, 60s, Krones and Bixes.
IP Addressing Schemes and Contexts (21 minutes)
The viewer will learn about IP addressing format, basic classful scheme, and the contexts of where we use them.
IP Addressing IPv4 (23 minutes)
The learner will learn how to breakdown the IP address into its component parts, using binary conversion and binary ANDing, Also, they will break down the dotted decimal notation and learn basic 8 bit binary conversion.
IP Addressing Subnetting Basics (7 minutes)
The learner will learn how and why we needed subnetting and VLSM. They will also see how to write "IP addresses" in shorthand format that is non ambiguous too.
IP Addressing Subnetting Example (17 minutes)
The learner will learn how and why we needed subnetting and VLSM. They will also see how to write "IP addresses" in shorthand format that is non ambiguous too.
2.0 - Network Implementations (7 Episodes: 2 Hours 16 Minutes)
Networking and Networked Devices (17 minutes)
In this episode, the viewer will identify common networking devices that help to move traffic across networks as well as the endpoint devices or networked devices that connect to modern networks.
Routing and Bandwidth Management (22 minutes)
Managing routing and bandwidth are important part of a Network+ professional's tasks. Here Wes and Ronnie discuss some of the protocols and other knowledge needed to do so.
Ethernet Switching (22 minutes)
When working with switches there are several technologies. These are not always easy to remember. Wes and Ronnie introduce you to different concepts like Spanning-Tree-Protocol, Switching Loops, VLANs and more.
Wireless Infrastructure (20 minutes)
In this episode, the viewer will identify technologies associated with wireless networks such as service set identifier variants like basic service set, extended service set and independent basic service sets. The viewer will also compare and contrast wireless antenna types like directional and omni-directional as well as channel bonding, MIMO and MU-MIMO.
Wireless Encryption Standards (17 minutes)
In this episode, the viewer will identify wireless encryption standards that are used to protect data on wireless networks. The viewer will compare and contrast the strengths and weaknesses of WPS, WPA, WPA2, TKIP, CCMP and the difference between personal and enterprise modes.
802.11 Standards (21 minutes)
In this episode, the viewer will identify the standards set forth by the IEEE for wireless local area network \(WLAN\) under 802.11.
Cellular Technologies (15 minutes)
In this episode, the viewer will identify technologies associated with cellular communications such as CDMA, GSM, LTE and the 3GPPs revisions of cellular technologies generations like 3G, 4G, and the newer 5G.
3.0-Network Operations (10 Episodes: 2 Hours 59 Minutes)
Performance Metrics (17 minutes)
In this episode, the viewer will identify the types of performance metrics that can be inspected to sample performance indictors to help ensure network availability.
Interface Statistics (11 minutes)
In this episode, the viewer will identify attributes of network interfaces on connectivity devices as well and network interface cards (NICs), that can be inspected to determine and ensure network availability.
Device Logs (16 minutes)
In this episode, the viewer will identify the types and locations of network device logs that can be gathered and analyzed to determine and ensure network availability.
SNMP (14 minutes)
In this episode, the viewer will identify the components that make up the Simple Network Management Protocols such as object identifiers or OIDs, SNMP traps as well as management interface bases or MIBs, to determine and ensure network availability.
Environmental Factors (13 minutes)
In this episode, the viewer will identify environmental factors that can hinder network availability.
Plans and Procedures (21 minutes)
In this episode, the viewer will identify the components and processes surrounding various organizational plans and procedures for incident response, change management and system lifecycles.
Plans and procedures - BCDR (18 minutes)
In this episode, the viewer will identify the component of a business continuity plan and its purpose in organizational planning as well as the components and processes that make up a disaster recovery plan.
Security Policies (21 minutes)
In this episode, the viewer will identify various types of policies used within enterprise environments such as a basic security policy, password policies, remote access policies, onboarding and offboarding policies, BYOD policies and data loss prevention.
Organizational Documentation (21 minutes)
In this episode, the viewer will identify common documentation that is used in enterprise environments such as network diagrams, rack diagrams, site survey reports, wiring diagrams, audit and assessment reports, baseline configurations as well as service-level agreements, non-disclosure agreements and memorandum of understandings.
High Availability and Disaster Recovery Solutions (22 minutes)
The Network+ Professional will need to identify High Avaiability and Disaster Recovery Concepts and decide which is a corret solution for a given scenario. Here you learn about these concepts and where they fit in HA planning and DR plan.
4.0-Network Security (12 Episodes: 3 Hours 50 Minutes)
Security Concepts (22 minutes)
In this episode, the viewer will identify foundational security concepts such as the CIA triad, the principle of least privilege, threats, vulnerabilities, exploits and model of Zero Trust.
Security - Cryptography Basics (18 minutes)
In this episode, the viewer will identify the most common way to keep information confidential and maintaining integrity through cryptographic techniques such as encryption, asymmetric and symmetric key and hashing.
Security - Defense in Depth (20 minutes)
In this episode, the viewer will identify how companies re-enforce security with technologies that provide a layered approach to organizational security through a process called defense in depth. The viewer will identify concepts such as separation of duties, network segmentation, DMZs, network access control and honeypots.
Security - Authentication Methods (21 minutes)
In this episode, the viewer will identify basic authentication concepts such as identification, authentication, authorization and accounting or IAAA, RADIUS, TACACS+, single sign-on, Kerberos, 802.1X, LDAP, EAP as well as authentication factors and how they are implemented to perform multifactor authentication.
Security - Assessment Types (19 minutes)
In this episode, the viewer will identify different assessment types used to address organizational security such as vulnerability assessments, penetration testing, risk assessments and postures assessments.
Technology-based Attacks (21 minutes)
In this episode, the viewer will identify different types of technology-based attacks such as DoS and DDoS attacks, botnets, man-in-the-middle attacks, rogue DHCP servers and access points, evil twins, password attacks, ARP spoofing, deauthentication and malware.
Social Engineering (15 minutes)
In this episode, the viewer will identify one of the most common form of attacks, social engineering. The viewer will identify different types of social engineering techniques such as phishing, spear phishing, whaling, tailgating and piggybacking attacks, shoulder surfing, dumpster diving and impersonation.
Virtual Private Networks (16 minutes)
In this episode, the viewer will identify techniques to make connections to systems that the user is not physically sitting at called remote connection such as VPN types, Windows Remote Desktop, Virtual Network Computing as well as in-band vs. out-of-band management.
Remote Connections (18 minutes)
In this episode, the viewer will identify various ways to connect to company resources when outside of the company networks such as Window Remote Desktop Connection, virtual network computing, and SSH.
Physical Security (18 minutes)
In this episode, the viewer will identify common techniques to ensure physical security within an enterprise network and be able to explain the importance.
Network Hardening - Best Practices (22 minutes)
In this episode, the viewer will learn network hardening techniques to increase security such as secure SNMP communications, router advertisement guard, port security, password complexity, closing unused ports and services, access control lists, DHCP snooping and more.
Network Hardening - Wireless Security (15 minutes)
In this episode, the viewer will identify the techniques to secure wireless networks such as MAC filtering, antenna placement, client isolation, guest networks, EAP, preshared keys, captive portals and geofencing.
5.0-Network Troubleshooting (18 Episodes: 5 Hours 13 Minutes)
Troubleshooting - Identify the problem (13 minutes)
In this episode, the viewer will identify the steps and processes defined in CompTIA's established troubleshooting model. This episode focuses on identifying the problem.
Troubleshooting - Establish and Test a Theory (19 minutes)
In this episode, the viewer will identify the steps and processes defined in CompTIA's established troubleshooting model. This episode focuses on developing and testing a theory as well as establishing an action plan.
Troubleshooting - Plan and Implement a Solution (17 minutes)
In this episode, the viewer will identify the steps and processes defined in CompTIA's established troubleshooting model. This episode focuses on creating an action plan and implementing a solution.
Troubleshooting - Verify System Functionality (12 minutes)
In this episode, the viewer will identify the steps and processes defined in CompTIA's established troubleshooting model. This episode focuses on verifying system functionality.
Troubleshooting - Document the Issue (11 minutes)
In this episode, the viewer will identify the steps and processes defined in CompTIA's established troubleshooting model. This episode focuses on documenting the issue.
Cabling Tools (20 minutes)
In this episode, the viewer will identify common tools used to correct network cabling issues such as cable strippers and crimpers, punchdown tools, loopback adapters, tone locators and generators, cable testers, rollover cables, crossover cables and more.
Cabling Issues (16 minutes)
In this episode, the viewer will identify common issues and considerations when troubleshooting cabling issues such as distance and speed limitations and issues such as attenuation, interference, shorts, impedance mismatches, dirty optical cables, pinout mismatches and more.
Network Software Tools (18 minutes)
In this episode, the viewer will identify the software-based application used to troubleshoot network communications.
Troubleshooting with Ping (16 minutes)
In this episode, the viewer will identify the best practices when using the command *ping* to test end-to-end communications over networks.
IP Addressing Commands (19 minutes)
In this episode, the viewer will identify the command line tools used to troubleshooting IP addressing such as Windows *ipconfig* and Linux-based *ifconfig*, *ip* as well as the *route* command.
DNS Troubleshooting Commands (18 minutes)
In this episode, the viewer will identify the command line tools used to troubleshoot the DNS service such as *nslookup* and *ipconfig* in Windows as well as *dig* in Unix and Linux systems.
Route Troubleshooting Commands (19 minutes)
In this episode, the viewer will identify the command line tools used to troubleshooting routes in Windows such as the *route* and *tracert* command as well as the *netstat* command. The viewer will also identify the commands in used in Linux-based systems to view and determine routes such as *mtr*, *traceroute* and *netstat* commands.
Information Gathering Commands (16 minutes)
In this episode, the viewer will identify the command line tool *tcpdump* used to capture network traffic as well as the popular network mapping utility called *nmap*
Additional Network Commands (21 minutes)
In this episode, the viewer will identify the command line tools used to troubleshoot communications such as *netstat* and *arp*.
Wireless Network Issues (17 minutes)
In this episode, the viewer will identify wireless limitations such as throughput, speed distance, received signal strength indication \(RSSI\). The viewer will also identify common considerations issues such as interference, channel overlap, attenuation and client disassociation issues. The viewer will also identify common configuration issues such as wrong SSID, wrong passphrases and encryption mismatch issues.
Addressing Issues (16 minutes)
In this episode, the viewer will identify configuration issues such as incorrect IP addresses, duplicate IP addresses, gateway addresses, subnet masks as well as duplicate MAC addresses and the challenges of BYOD device configuration issues.
Network Service Issues (22 minutes)
In this episode, the viewer will identify issues associated with common network services such as NTP, DNS, DHCP, certificates and firewalls as well as switching and routing issues.
Routing and Switching Issues (15 minutes)
There are multiple issues that you should be aware of when it comes to routing and switching. You will identify and describe those issues and learn what causes them to happen.