CompTIA: Network+ (N10-008)
Are you interested in learning more about how enterprise networks operate? Are you interested in a technology-related career field? This course is perfect for you!
Why Get The Network+?
If you are interested in working in a technology career field, especially Information Technology or Cyber Security, then understanding how networks operate is an absolute must. Enterprise technology is built on networks and helps those businesses achieve their ultimate mission.
Course Curriculum
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- 1-1 - Network Basics and OSI Model (02:09)
- 1-2 - OSI Model - Layer 1 - Physical Layer (00:35)
- 1-3 - OSI Model - Layer 2 - Data Link (05:48)
- 1-4 - OSI Model - Layer 3 - Network Layer (02:58)
- 1-5 - OSI Model - Layer 4 - Transport Layer (02:02)
- 1-6 - OSI Model - Layer 5 - Session Layer (00:35)
- 1-7 - OSI Model - Layer 6 - Presentation Layer (00:17)
- 1-8 - OSI Model - Layer 7 - Application Layer (00:23)
- 1-9 - Network Basics & OSI Model Wrap-Up (00:37)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- 9-1 - TCP/IP Security Introduction (01:09)
- 9-2 - Encryption (04:05)
- 9-3 - Verify Integrity with Hashing (02:59)
- 9-4 - Digital Signatures (00:47)
- 9-5 - Public Key Infrastructure (PKI) (01:00)
- 9-6 - Secure Authentication (01:07)
- 9-7 - Authorization (03:10)
- 9-8 - AAA (04:07)
- 9-9 - Secure Protocols (03:39)
- 9-10 - Secure Applications (03:28)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- 14-1 - Core Security Terms (03:01)
- 14-2 - Common Network Threats (07:38)
- 14-3 - Password Attacks (00:58)
- 14-4 - Insider Threats (00:40)
- 14-5 - Types of Users (01:01)
- 14-6 - System Lifecycle & Sanitization (00:36)
- 14-7 - Malware (03:38)
- 14-8 - Social Engineering (01:51)
- 14-9 - Common Vulnerabilities (02:32)
- 14-10 - Hardening (Physical Security) (02:13)
- 14-11 - Hardening (Network Security) (05:19)
- 14-12 - Firewall Basics (01:33)
- 14-13 - Firewall Implementation (02:03)
- 14-14 - Firewall Troubleshooting (00:24)
- 14-15 - Attract Attackers With Honey (00:43)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- 16-1 - Hardware & Software Troubleshooting Tools (08:19)
- 16-2 - Troubleshooting Methodology (02:52)
- 16-3 - Common Troubleshooting Issues (01:27)
- 16-4 - Hands-On Troubleshooting Issues (00:59)
- 16-5 - Configuration Troubleshooting (02:01)
- 16-6 - Remote Connectivity Troubleshooting (01:15)
- 16-7 - Humble Pie & Knowing When to Ask For Help (00:31)
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Available in
days
days
after you enroll
Ready To Enroll?
Select a training option below to enroll in the course now!