CompTIA: Network+ (N10-008)
Are you interested in learning more about how enterprise networks operate? Are you interested in a technology-related career field? This course is perfect for you!
 
        
      
Why Get The Network+?
          If you are interested in working in a technology career field, especially Information Technology or Cyber Security, then understanding how networks operate is an absolute must. Enterprise technology is built on networks and helps those businesses achieve their ultimate mission. 
Course Curriculum
    
    0 - Welcome to CompTIA: Network+ (N10-008)
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    1 - Networking Basics & OSI Model (15:40)
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    - 1-1 - Network Basics and OSI Model (02:09)
- 1-2 - OSI Model - Layer 1 - Physical Layer (00:35)
- 1-3 - OSI Model - Layer 2 - Data Link (05:48)
- 1-4 - OSI Model - Layer 3 - Network Layer (02:58)
- 1-5 - OSI Model - Layer 4 - Transport Layer (02:02)
- 1-6 - OSI Model - Layer 5 - Session Layer (00:35)
- 1-7 - OSI Model - Layer 6 - Presentation Layer (00:17)
- 1-8 - OSI Model - Layer 7 - Application Layer (00:23)
- 1-9 - Network Basics & OSI Model Wrap-Up (00:37)
    
    2 - Network Topologies & Network Cabling (10:09)
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    3 - Ethernet
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    4 - TCP/IP Basics (24:03)
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    5 - TCP/IP Applications (14:48)
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    6 - Routing (17:38)
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    7 - Domain Name System (DNS) (12:14)
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    8 - IPv6 (11:18)
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    9 - TCP/IP Security (25:31)
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    - 9-1 - TCP/IP Security Introduction (01:09)
- 9-2 - Encryption (04:05)
- 9-3 - Verify Integrity with Hashing (02:59)
- 9-4 - Digital Signatures (00:47)
- 9-5 - Public Key Infrastructure (PKI) (01:00)
- 9-6 - Secure Authentication (01:07)
- 9-7 - Authorization (03:10)
- 9-8 - AAA (04:07)
- 9-9 - Secure Protocols (03:39)
- 9-10 - Secure Applications (03:28)
    
    10 - Switch Features (13:25)
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    11 - WAN (Wide Area Network) (18:40)
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    12 - Wireless (27:53)
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    13 - Network Operations (22:25)
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    14 - Network Security (34:10)
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    - 14-1 - Core Security Terms (03:01)
- 14-2 - Common Network Threats (07:38)
- 14-3 - Password Attacks (00:58)
- 14-4 - Insider Threats (00:40)
- 14-5 - Types of Users (01:01)
- 14-6 - System Lifecycle & Sanitization (00:36)
- 14-7 - Malware (03:38)
- 14-8 - Social Engineering (01:51)
- 14-9 - Common Vulnerabilities (02:32)
- 14-10 - Hardening (Physical Security) (02:13)
- 14-11 - Hardening (Network Security) (05:19)
- 14-12 - Firewall Basics (01:33)
- 14-13 - Firewall Implementation (02:03)
- 14-14 - Firewall Troubleshooting (00:24)
- 14-15 - Attract Attackers With Honey (00:43)
    
    15 - Network Monitoring (12:45)
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    16 - Network Troubleshooting (17:24)
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    - 16-1 - Hardware & Software Troubleshooting Tools (08:19)
- 16-2 - Troubleshooting Methodology (02:52)
- 16-3 - Common Troubleshooting Issues (01:27)
- 16-4 - Hands-On Troubleshooting Issues (00:59)
- 16-5 - Configuration Troubleshooting (02:01)
- 16-6 - Remote Connectivity Troubleshooting (01:15)
- 16-7 - Humble Pie & Knowing When to Ask For Help (00:31)
    
    17 - Data Centers (12:44)
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    18 - Virtualization & Cloud (13:23)
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    
    
    19 - Other Systems & Technologies (07:24)
    
      
  
  
        Available in
        
        days
      
      
        
        days
        after you enroll
      
    Ready To Enroll?
Select a training option below to enroll in the course now!
 
      
     
      
    