CompTIA: Network+ (N10-009)
Are you interested in learning more about how enterprise networks operate? Are you interested in a technology-related career field? This course is perfect for you!
Why Get The Network+?
If you are interested in working in a technology career field, especially Information Technology or Cyber Security, then understanding how networks operate is an absolute must. Enterprise technology is built on networks and helps those businesses achieve their ultimate mission.
Course Curriculum
0 - Welcome to CompTIA: Network+ (N10-009)
Available in
days
days
after you enroll
1 - Networking Basics & OSI Model (15:40)
Available in
days
days
after you enroll
- 1-1 - Network Basics and OSI Model (02:09)
- 1-2 - OSI Model - Layer 1 - Physical Layer (00:35)
- 1-3 - OSI Model - Layer 2 - Data Link (05:48)
- 1-4 - OSI Model - Layer 3 - Network Layer (02:58)
- 1-5 - OSI Model - Layer 4 - Transport Layer (02:02)
- 1-6 - OSI Model - Layer 5 - Session Layer (00:35)
- 1-7 - OSI Model - Layer 6 - Presentation Layer (00:17)
- 1-8 - OSI Model - Layer 7 - Application Layer (00:23)
- 1-9 - Network Basics & OSI Model Wrap-Up (00:37)
2 - Network Topologies & Network Cabling (10:09)
Available in
days
days
after you enroll
3 - Ethernet
Available in
days
days
after you enroll
4 - TCP/IP Basics (24:03)
Available in
days
days
after you enroll
5 - TCP/IP Applications (14:48)
Available in
days
days
after you enroll
6 - Routing (17:38)
Available in
days
days
after you enroll
7 - Domain Name System (DNS) (12:14)
Available in
days
days
after you enroll
8 - IPv6 (11:18)
Available in
days
days
after you enroll
9 - TCP/IP Security (25:31)
Available in
days
days
after you enroll
- 9-1 - TCP/IP Security Introduction (01:09)
- 9-2 - Encryption (04:05)
- 9-3 - Verify Integrity with Hashing (02:59)
- 9-4 - Digital Signatures (00:47)
- 9-5 - Public Key Infrastructure (PKI) (01:00)
- 9-6 - Secure Authentication (01:07)
- 9-7 - Authorization (03:10)
- 9-8 - AAA (04:07)
- 9-9 - Secure Protocols (03:39)
- 9-10 - Secure Applications (03:28)
10 - Switch Features (13:25)
Available in
days
days
after you enroll
11 - WAN (Wide Area Network) (18:40)
Available in
days
days
after you enroll
12 - Wireless (27:53)
Available in
days
days
after you enroll
13 - Network Operations (22:25)
Available in
days
days
after you enroll
14 - Network Security (34:10)
Available in
days
days
after you enroll
- 14-1 - Core Security Terms (03:01)
- 14-2 - Common Network Threats (07:38)
- 14-3 - Password Attacks (00:58)
- 14-4 - Insider Threats (00:40)
- 14-5 - Types of Users (01:01)
- 14-6 - System Lifecycle & Sanitization (00:36)
- 14-7 - Malware (03:38)
- 14-8 - Social Engineering (01:51)
- 14-9 - Common Vulnerabilities (02:32)
- 14-10 - Hardening (Physical Security) (02:13)
- 14-11 - Hardening (Network Security) (05:19)
- 14-12 - Firewall Basics (01:33)
- 14-13 - Firewall Implementation (02:03)
- 14-14 - Firewall Troubleshooting (00:24)
- 14-15 - Attract Attackers With Honey (00:43)
15 - Network Monitoring (12:45)
Available in
days
days
after you enroll
16 - Network Troubleshooting (17:24)
Available in
days
days
after you enroll
- 16-1 - Hardware & Software Troubleshooting Tools (08:19)
- 16-2 - Troubleshooting Methodology (02:52)
- 16-3 - Common Troubleshooting Issues (01:27)
- 16-4 - Hands-On Troubleshooting Issues (00:59)
- 16-5 - Configuration Troubleshooting (02:01)
- 16-6 - Remote Connectivity Troubleshooting (01:15)
- 16-7 - Humble Pie & Knowing When to Ask For Help (00:31)
17 - Data Centers (12:44)
Available in
days
days
after you enroll
18 - Virtualization & Cloud (13:23)
Available in
days
days
after you enroll
19 - Other Systems & Technologies (07:24)
Available in
days
days
after you enroll
Ready To Enroll?
Select a training option below to enroll in the course now!