CompTIA Network+
5 days training event
6100-3073
Introduction
Introduction
Network Models
What is a Model?
OSI vs. TCP/IP Model
Meet the Frame
The MAC Address
Broadcast vs Unicast
Introduction to IP Addressing
Packets and Ports
Network Models
Cabling and Topology
Network Topologies
Coaxial Cabling
Twisted Pair Cabling
Cat Ratings
Fiber Optic Cabling
Fire Ratings
Legacy Network Connections
Ethernet Basics
What is Ethernet?
Ethernet Frames
Early Ethernet
The Daddy of Ethernet, 10BaseT
Terminating Twisted Pair
Hubs vs. Switches
Modern Ethernet
100BaseT
Connecting Switches
Gigabit Ethernet and 10-Gigabit Ethernet
Transceivers
Connecting Ethernet Scenarios
Installing a Physical Network
Introduction to Structured Cabling
Terminating Structured Cabling
Equipment Room
Alternative Distribution Panels
Testing Cable
Troubleshooting Structured Cabling
Using a Toner and Probe
Wired Connection Scenarios
TCP/IP Basics
Introduction to IP Addressing and Binary
Introduction to ARP
Classful Addressing
Subnet Masks
Subnetting with CIDR
More CIDR Subnetting Practice
Dynamic and Static IP Addressing
Rogue DHCP Servers
Special IP Addresses
IP Addressing Scenarios
TCP/IP Basics
Routing
Introducing Routers
Understanding Ports
Network Address Translation
Implementing NAT
Forwarding Ports
Tour of a SOHO Router
SOHO vs. Enterprise
Static Routes
Dynamic Routing
RIP
OSPF
BGP
TCP/IP Applications
TCP and UDP
ICMP and IGMP
Handy Tools
Introduction to Wireshark
Introduction to netstat
Web Servers
FTP
E-mail Servers and Clients
Securing E-mail
Telnet and SSH
Network Time Protocol
Network Service Scenarios
Network Naming
Understanding DNS
Applying DNS
The Hosts File
Net Command
Windows Name Resolution
Dynamic DNS
DNS Troubleshooting
Securing TCP/IP
Making TCP/IP Secure
Symmetric Encryption
Asymmetric Encryption
Cryptographic Hashes
Identification
Access Control
AAA
Kerberos/EAP
Single Sign-On
Certificates and Trust
Certificate Error Scenarios
Advanced Networking Devices
Understanding IP Tunneling
Virtual Private Networks
Introduction to VLANs
InterVLAN Routing
Interfacing with Managed Switches
Switch Port Protection
Port Bonding
Port Mirroring
Quality of Service
IDS vs. IPS
Proxy Servers
Load Balancing
Device Placement Scenarios
IPv6
Introduction to IPv6
IPv6 Addressing
IPv6 In Action
IPv4 and IPv6 Tunneling
Remote Connectivity
Telephony Technologies
Optical Carriers
Packet Switching
Connecting with Dial-up
Digital Subscriber Line (DSL)
Connecting with Cable Modems
Connecting with Satellites
ISDN and BPL
Remote Desktop Connectivity
Advanced Remote Control Systems
Wireless Networking
Introduction to 802.11
802.11 Standards
Power over Ethernet (PoE)
Antennas
Wireless Security Standards
Implementing Wireless Security
Threats to Your Wireless Network
Retro Threats
Wi-Fi Protected Setup (WPS)
Enterprise Wireless
Installing a Wireless Network
Wireless Scenarios
More Wireless Scenarios
Virtualization and Cloud Computing
Virtualization Basics
Cloud Ownership
Cloud Implementation
Your First Virtual Machine
NAS and SAN
Platform as a Service (PaaS)
Software as a Service (SaaS)
Infrastructure as a Service (IaaS)
Mobile Networking
Cellular Technologies
Mobile Connectivity
Deploying Mobile Devices
Mobile Access Control
Building a Real-World Network
Network Types
Network Design
Power Management
Unified Communications
Network Documentation
Contingency Planning
Predicting Hardware Failure
Backups
Managing Risk
What is Risk Management?
Security Policies
Change Management
User Training
Standard Business Documentation
Mitigating Network Threats
High Availability
Protecting Your Network
Denial of Service
Malware
Social Engineering
Access Control
Man-in-the-Middle
Introduction to Firewalls
Firewalls
DMZ
Hardening Devices
Physical Security Controls
Testing Network Security
Network Protection Scenarios
Network Monitoring
SNMP
Documenting Logs
System Monitoring
SIEM (Security Information and Event Management)
Network Troubleshooting
Network Troubleshooting Theory
TRAINING LOCATIONS
أماكن ومقرات التدريب حول العالم
Dubai
Kuala Lumpur
Tunis
Istanbul
Amman
Sharm El Sheikh
Ottawa
Paris