• 100 Queen St W, Brampton, ON L6X 1A4, Canada
  • +1-800-961-0337
START DATE END DATE CLASS TIMINGS MODE LOCATION ACTION
10/29/2018 11/02/2018
  • VLT
  • GTR
Live Online
11/12/2018 11/16/2018
  • VLT
  • GTR
Live Online

Course Objectives

  • Recognize the essential system hypothesis ideas. 
  • Recognize the significant system specialized techniques. 
  • Portray organize media and equipment segments. 
  • Distinguish the significant sorts of system executions. 
  • Distinguish the segments of a TCP/IP organize usage. 
  • Distinguish TCP/IP tending to and information conveyance techniques. 
  • Distinguish the real administrations sent on TCP/IP systems. 
  • Distinguish the segments of a LAN execution. 
  • Distinguish the foundation of a WAN execution. 
  • Distinguish the segments of a remote system execution. 
  • Distinguish the real issues and strategies to secure frameworks on a system. 
  • Distinguish the real issues and advances in arrange security. 
  • Distinguish arrange security dangers and assaults. 
  • Recognize the instruments, strategies, and procedures utilized as a part of dealing with a system. 
  • Portray investigating of issues on a system. 

Audience Profile

This course is planned for section level PC bolster experts with a fundamental learning of PC equipment, programming, and working frameworks to get ready for the CompTIA® Network+® (Exam N10-005), or who wish to build their insight and comprehension of systems administration ideas and gain the expected abilities to get ready for a vocation in organize support or organization. A run of the mill understudy taking up the CompTIA® Network+® (Exam N10-005) course ought to have at least nine months or a greater amount of expert PC bolster involvement as a PC or help work area professional. Systems administration encounter is useful yet not obligatory; A+ accreditation or identical abilities and information is useful however not required. 

Lesson 1: Network Theory 

  • Theme 1A: Networking Terminology 
  • Theme 1B: Network Categories 
  • Theme 1C: Standard Network Models 
  • Theme 1D: Physical Network Topologies 
  • Theme 1E: Logical Network Topologies 

Lesson 2: Network Communications Methods 

  • Theme 2A: Data Transmission Methods 
  • Theme 2B: Media Access Methods 
  • Theme 2C: Signaling Methods 

Lesson 3: Network Media and Hardware 

  • Theme 3A: Bounded Network Media 
  • Theme 3B: Unbounded Network Media 
  • Theme 3C: Noise Control 
  • Theme 3D: Network Connectivity Devices 

Lesson 4: Network Implementations 

  • Theme 4A: Ethernet Networks 
  • Theme 4B: Wireless Networks 

Lesson 5: Networking Models 

  • Theme 5A: The OSI Model 
  • Theme 5B: The TCP/IP Model 

Lesson 6: TCP/IP Addressing and Data Delivery 

  • Theme 6A: The TCP/IP Protocol Suite 
  • Theme 6B: IP Addressing 
  • Theme 6C: Default IP Addressing Schemes 
  • Theme 6D: Create Custom IP Addressing Schemes 
  • Theme 6E: Implement IPv6 Addresses 
  • Theme 6F: Delivery Techniques 

Lesson 7: TCP/IP Services 

  • Theme 7A: Assign IP Addresses 
  • Theme 7B: Domain Naming Services 
  • Theme 7C: TCP/IP Commands 
  • Theme 7D: Common TCP/IP Protocols 
  • Theme 7E: TCP/IP Interoperability Services 

Lesson 8: LAN Infrastructure 

  • Theme 8A: Switching 
  • Theme 8B: Enable Static Routing 
  • Theme 8C: Implement Dynamic IP Routing 
  • Theme 8D: Virtual LANs 
  • Theme 8E: Plan a SOHO Network 

Lesson 9: WAN Infrastructure 

  • Theme 9A: WAN Transmission Technologies 
  • Theme 9B: WAN Connectivity Methods 
  • Theme 9C: Voice over Data Transmission 

Lesson 10: Remote Networking 

  • Point 10A: Remote Network Architectures 
  • Point 10B: Remote Access Networking Implementations 
  • Point 10C: Virtual Private Networking 
  • Point 10D: VPN Protocols 

Lesson 11: System Security 

  • Point 11A: Computer Security Basics 
  • Point 11B: System Security Tools 
  • Point 11C: Authentication Methods 
  • Point 11D: Encryption Methods 

Lesson 12: Network Security 

  • Point 12A: Network Perimeter Security 
  • Point 12B: Intrusion Detection and Prevention 
  • Point 12C: Protect Network Traffic Using IPSec 

Lesson 13: Network Security Threats and Attacks 

  • Point 13A: Network-Based Security Threats and Attacks 
  • Point 13B: Apply Threat Mitigation Techniques 
  • Point 13C: Educate Users 

Lesson 14: Network Management 

  • Point 14A: Network Monitoring 
  • Point 14B: Configuration Management Documentation 
  • Point 14C: Network Performance Optimization 

Lesson 15: Network Troubleshooting 

  • Point 15A: Network Troubleshooting Models 
  • Point 15B: Network Troubleshooting Utilities 
  • Point 15C: Hardware Troubleshooting Tools 
  • Point 15D: Common Connectivity Issues 

Index A: Mapping Network+ Course Content to the CompTIA Network+ Exam Objectives 

Index B: CompTIA Network+ Acronyms 

Index C: Network Fault Tolerance Methods 

Index D: Disaster Recovery Planning

To guarantee your prosperity, you will require fundamental Windows end-client PC aptitudes. To meet this essential, you can take any at least one of the accompanying Element K courses, or have equal understanding: 

  • Prologue to Personal Computers: Using Windows XP 
  • Windows XP Professional: An Introduction 
  • Prologue to Personal Computers: Using Windows 7 
  • Microsoft® Windows® 7: Level 1 
  • Microsoft® Windows® 7: Level 2 
  • Furthermore, we very suggest that you hold the CompTIA A+ affirmation, or have equal aptitudes and information. You might need to take the accompanying Element K course: CompTIA® A+® Certification: A Comprehensive Approach for All 2009 Exam Objectives ((Windows® 7)) (Comprehensive)

Awards