COURSE OUTLINE: CompTIA Network+ · 2019-01-28 · • Network administrators, network technicians,...
Transcript of COURSE OUTLINE: CompTIA Network+ · 2019-01-28 · • Network administrators, network technicians,...
COURSE OUTLINE: CompTIA Network+
Page 1 of 14
Course Name CompTIA Network +
Course Duration 5 Days
Course Structure Instructor-Led
Course Overview The CompTIA Network+ proves knowledge of networking features and functions and is the leading vendor-neutral certification for networking professionals. This course provides delegates with the knowledge and skills necessary to manage, maintain, troubleshoot, install, operate, and configure basic network infrastructure, describe networking technologies and basic design principles; adhere to wiring standards and use the testing tools. The CompTIA Network+ is the first step in starting a networking career and is recognised by many vendors such as Microsoft, Cisco, Novell and Red Hat as part of their certification tracks. Audience profile This course is designed for:
• Anyone wishing to build a solid foundation with regard to networking technology
• Anyone wishing to pursue a career in IT networking • Network administrators, network technicians, network
installers, help desk technicians, cable installers.
Course Outcome After completing the CompTIA Network+ course, delegates will have an understanding of:
• Introduction to Networks • The Open Systems Interconnection Specifications • Networking Topologies, Connectors, and Wiring
Standards • The Current Ethernet Specifications • Networking Devices • Introduction to the Internet Protocol • IP Addressing • IP Subnetting, Troubleshooting IP, and Introduction to
NAT • Introduction to IP Routing • Routing Protocols • Switching and Virtual LANs • Wireless Networking • Authentication and Access Control • Network Threats and Mitigation • Physical Security and Risk • Wide Area Networks • Troubleshooting Tools • Software and Hardware tools • Network Troubleshooting • Management, Monitoring and Optimization
COURSE OUTLINE: CompTIA Network+
Page 2 of 14
Course Details Lesson 1: Introduction to Network
First Things First: What’s a Network?
• The Local Area Network (LAN) • Common Network Components • Wide Area Network (WAN) • Network Architecture: Peer-to-Peer or Client-Server?
Physical Network Topologies
• Bus Topology • Star Topology • Ring Topology • Mesh Topology • Point-to-Point Topology • Point-to-to-Multipoint Topology • Hybrid Topology
Topology Selection, Backbones, and Segments
• Selecting the Right Topology • The Network backbone • Network Segments
Lesson 2: The Open Systems Interconnection Specifications
Internetworking Models
• The Layered Approach • Advantages of Reference Models
The OSI Reference Model
• The Application Layer • The Presentation Layer • The Session Layer • The Transport Layer • The Network Layer • The Data Link Layer • The Physical Layer
Introduction to Encapsulation
Lesson 3: Networking Topologies, Connectors, and Wiring Standards
Physical Media
• Coaxial Cable • Twisted-Pair Cable • Fiber-Optic Cable
COURSE OUTLINE: CompTIA Network+
Page 3 of 14
• Media Converters • Serial Cables
Cable Properties
• Transmission Speeds • Distance • Duplex • Noise Immunity (Security, EMI) • Frequency
Wiring Standards
• 568A vs. 568B • Straight-Through Cable • Crossover Cable • T1 Crossover Cable
Installing Wiring Distributions
Lesson 4: The Current Ethernet Specifications
Network Basics
Ethernet Basics
• Collision Domain • Broadcast Domain • CSMA/CD • Broadband/Baseband • Bit Rates vs Baud Rate • Wavelength • Sampling-Size • Half and Full-Duplex Ethernet
Ethernet at the Data Link Layer
• Binary to Decimal and Hexadecimal Conversion • Ethernet Addressing • Ethernet Frames
Ethernet at the Physical Layer
Ethernet over Other Standards (IEEE 1905.1-2013)
• Ethernet over Power Line • Ethernet over HDMI
COURSE OUTLINE: CompTIA Network+
Page 4 of 14
Lesson 5: Networking Devices
Common Network Connectivity Devices
• Network Interface Card • Hub • Bridge • Switch • Router • Firewall • DS/IPS • HIDS • Access Point • Dynamic Host Configuration Protocol Server
Other Specialized Devices
• Multilayer Switch • Load Balancer • Domain Name Service Server • Proxy Server • Encryption Devices • Analoq Modem • Packet Shaper • VPN Concentrator
Planning and Implementing a Basic SOHO Network
• Using Network Segmentation • Determining Requirements • Switches and Bridges at the Data Link Layer • Hubs at the Physical Layer • Environmental Considerations
Lesson 6: Introduction to the Internet Protocol
Introducing TCP/IP
• A Brief History of TCP/IP • TCP/IP and the DoD Model • The Process/Application Layer Protocols • The Host-to-Host Layer Protocols • The Internet Layer Protocols
Data Encapsulation
Lesson 7: IP Addressing
IP Terminology
The Hierarchical IP Addressing Scheme
• Network Addressing
COURSE OUTLINE: CompTIA Network+
Page 5 of 14
• Private IP Addresses (RFC 1918)
IPv4 Address Types
• Layer 2 Broadcasts • Layer 3 Broadcasts • Unicast Address • Multicast Address (Class D)
Internet Protocol Version 6 (IPv6)
• Why Do We Need IPv6? • The Benefits of and Uses for IPv6 • IPv6 Addressing and Expressions • Shortened Expression • Address Types • Special Addresses • Stateless Auto-configuration (EUI-64) • DHCPv6 (Stateful) • Migrating to IPv6
Lesson 8: IP Subnetting, Troubleshooting IP and Introduction to NAT
Subnetting Basics
• How to Create Subnets • Subnet Masks • Classless Inter-Domain Routing (CIDR) • Subnetting Class C Addresses • Subnetting Class B Addresses
Troubleshooting IP Addressing
• Determining IP Addressing Problems
Introduction to Network Address Translation (NAT)
• Types of Network Address Translation • NAT Names • How NAT Works
Chapter 9: Introduction to IP Routing
• Routing Basics • The IP Routing Process • Testing Your IP Routing Understanding • Static and Dynamic Routing
COURSE OUTLINE: CompTIA Network+
Page 6 of 14
Lesson 10: Routing Protocols
Routing Protocols Basics
• Administrative Distances • Classes of Routing Protocols • Distance Vector Routing Protocols
Routing Information Protocol (RIP)
• RIP Version 2 (RIPv2) • VLSM and Discontiguous Networks • EIGRP • Border Gateway Protocol (BGP)
Link State Routing Protocols
• Open Shortest Path First (BGP) • Intermediate System-to-Intermediate System (IS-IS)
High availability
• Hot Standby Router Protocol (HSRP) • Virtual Router Redundancy Protocol IPv6 Routing
Protocols
IPv6 Routing Protocols
• RIPng • EIGRPv6 • OSPFv3
Lesson 11: Switching and Virtual LANs
Networking Before Layer 2 Switching
Switching Services
• Limitations of Layer 2 Switching • Bridging vs. LAN Switching • Three Switch Functions at Layer 2
Spanning Tree Protocol
• Spanning-Tree Port States • STP Convergence • Rapid Spanning Tree Protocol 802.1w
Virtual LANs
• VLAN Basics • Quality of Service • VLAN Memberships
COURSE OUTLINE: CompTIA Network+
Page 7 of 14
• Static VLANs • Dynamic VLANs • Identifying VLANs • VLANs Identification Methods
VLAN Trunking Protocol
• VTP Modes of Operation • Do we Really Need to Put an IP address on a Switch • Port Security • Port Bonding
Two Additional Advanced Features of Switches
• Power over Ethernet (802.3af,802.3at) • Port Mirroring/ Spanning (SPAN/RSPAN)
Lesson 12: Wireless Networking
Introduction to Wireless Technology
The 802.11 Standards
• 2.4GHz (802.11b) • 2.4 GHz (802.11g) • 5GHz (802.11a) • 5GHz (802.11h) • 2.4GHz/5GHz (802.11n)
Comparing 802.11 Standards
• Range Comparisons
Wireless Network Components
Wireless Access Points
Wireless Network Interface Card
Wireless Antennas
Installing a Wireless Network
• Ad Hoc Mode: Independent Basic Service Set • Infrastructure Mode: Basic Service Set • Wireless Controllers • Mobile Hot Spots • Signal Degradation • Other Network Infrastructure Implementations • Installing and Configuring WLAN Hardware
Site Survey
COURSE OUTLINE: CompTIA Network+
Page 8 of 14
Wireless Security
• Wireless Threats • Open Access • Service Set Identifiers, Wired Equivalent Privacy, and
Media Access Control Address Authentication • Remote Authentication Dial-In User Service (802.1x) • Temporal Key Integrity Protocol • Wi-Fi Protected Access or WPA2 Pre-Shared Key
Lesson 13: Authentication and Access Control
Security Filtering
• Access Control Lists • Tunneling • Encryption • Remote Access
Managing User Account and Password Security
• Managing User Accounts • Managing Passwords • Single Sign-On • Multifactor Authentication
User-Authentication Methods
• Public Key Infrastructure • Kerberos • Authentication, Authorization, and Accounting (AAA) • Web Services • Unified Voice Services • Network Controllers • Network Access Control (NAC) • Challenge Handshake Authentication Protocol
(CHAP) • MS-CHAP • Extensible Authentication Protocol (EAP) • Hashes • Network Access Control
Lesson 14: Network Threats and Mitigation
Recognizing Security Threats
• Denial of Service • Distributed Dos (DDos) • Authentication Issues • Zero Day Attacks • Insider Threat/Malicious Employee
COURSE OUTLINE: CompTIA Network+
Page 9 of 14
Vulnerabilities
• Unnecessary Running Services • Open Ports • Unpatched/Legacy Systems • Unencrypted Channels • Clear-Text Credentials • TEMPEST/RF Emanation • Malicious Users • Buffer Overflow • Wireless Threats • Attackers and Their Tools • Misconfiguring Issues • Social Engineering (Phishing)
Understanding Mitigation Techniques
• Active Detection • Passive Detection • Proactive Defence • Basic Forensic Concepts
Policies and Procedures
• Security Policies • Security Training • Patches and Upgrades • Firmware Updates • Driver Updates • Upgrading vs. Downgrading
Anti-malware software
• Host-based • Cloud/Server based • Configuration Backups • Updating Antivirus Components • Fixing an Infected Computer
Lesson 15: Physical Security and Risk
Using Hardware and Software Security Devices
Defining Firewalls
• Network-Based Firewalls • Host-Based Firewalls
Firewall Technologies
• Access Control Lists • Port Security • Demilitarized Zone
COURSE OUTLINE: CompTIA Network+
Page 10 of 14
• Protocol Switching • Dynamic Packet Filtering • Proxy Services
Firewalls at the Application Layer vs. the Network Layer
• Stateful vs. Stateless Network Layer Firewalls • Application Layer Firewalls
Scanning Services and Other Firewall Features
• Content Filtering • Signature Identification • Context Awareness • Virtual Wire vs Routed • Zones
Intrusion Detection and Prevention Systems
• Network-Based IDS • Hot-Based IDS • Vulnerability Scanners
VPN Concentrators
Understanding Problems Affecting Device Security
• Physical Security • Logical Security Configurations • Risk-Related Concepts
Lesson 16: Wide Area Networks
What’s a WAN?
• Defining WAN Terms • The Public Switched Telephone Network • WAN Connection Types • Bandwidth or Speed
T-Series Connections
• The T1 Connection • The T3 Connection
Transmission Media
• Wired Connections • Dense Wavelength Division Multiplexing • Passive Optical Network • Wireless Technologies
COURSE OUTLINE: CompTIA Network+
Page 11 of 14
Broadband Services
• DSL Technology and xDSL • Cable Modem
Wireless WAN Technologies
• Cellular WAN
WAN Protocols
• Integrated Services Digital Network • Frame Relay Technology • Point to Point Protocol • Asynchronous Transfer Mode • MPLS
WAN Troubleshooting
• Loss of Internet Connectivity • Interface Errors/Monitoring • Split Horizon • DNS Issues • Router configurations • Company Security Policy
Lesson 17: Troubleshooting Tools
Protocol Analyzers
Throughput Testers
Connectivity Software
Using Traceroute
Using ipconfiq and ifconfiq
• Using the ipconfiq Utility • Using the ifconfiq Utility
Using the ping Utility
Using the Address Resolution Protocol
• The Windows ARP Table • Using the arp Utility
Using the nslookup Utility
Resolving Names with the Hosts Table
COURSE OUTLINE: CompTIA Network+
Page 12 of 14
Using the Mtr Command
Using the route Command
• Using the route Command Options • Some Examples of the route command
Using the nbtstat Utility
• The – a Switch • The – A Switch • The – c Switch • The - n Switch • The – r Switch • The – R Switch • The – S Switch • The – s Switch
Using the netstat Utility
• The – a Switch • The – e Switch • The – r Switch • The - s Switch • The – p Switch • The – n Switch
Using the File Transfer Protocol
• Starting FTP and Logging In to an FTP Server • Downloading Files • Uploading Files
Using the Telnet Utility
• How to Enable Telnet in Windows • Don’t Use Telnet, Use Secure Shell
Lesson 18: Software and Hardware Tools
Understanding Network Scanners
• Packet Sniffers/Network Monitors • Intrusion Detection and Prevention Software • Port Scanners • Wi-Fi Analyzer
Baseline
Network Monitoring and Logging
• Network Monitoring • SNMP
COURSE OUTLINE: CompTIA Network+
Page 13 of 14
• Syslog • SIEM • Utilization
Identifying Hardware Tools
• Cable Testers • Protocol Analyzer • Certifiers • Time-Domain Reflectometer • Optical Time-Domain Reflectometer • Multimeter • Toner Probe • Butt Set • Punch-Down Tool • Cable Stripper/Snips • Voltage Event Recorder (Power) • Environmental Monitors
Lesson 19: Network Troubleshooting
Narrowing Down the Problem
• Did You Check the Super Simple Stuff? • Is Hardware or Software Causing the Problem? • Is it a Workstation or a Server Problem? • Which Segments of the Network Are Affected? • Is It Bad Cabling
Troubleshooting Steps
Step 1: Identify the Problem
Step 2: Establish a Theory of Probable Cause
Step 3: Test the Theory to Determine Cause
Step 4: Establish a Plan of Action to Resolve the Problem and Identify Potential Effects
Step 5: Implement the Solution or Escalate as Necessary
Step 6: Verify Full System Functionality and if applicable Implement Preventative Measures
Step 7: Document Findings, Actions and Outcomes
Troubleshooting Tips
• Don’t Overlook the Small Stuff • Prioritize Your Problems • Check the Software Configuration • Don’t Overlook Physical Conditions
COURSE OUTLINE: CompTIA Network+
Page 14 of 14
• Don’t Overlook Cable Problems • Check for Viruses
Lesson 20: Management, Monitoring, and Optimization
Managing Network Documentation
• Using SNMP • Schematics and Diagrams
Networking Monitoring
• Baselines • On-boarding and Off-boarding of Mobile Devices • NAC • Policies, Procedures, and Regulations • Safety Practices • Implementing Network Segmentation
Network Optimization
• Reasons to Optimize Your Network’s Performance • How to Optimize Performance • Unified Communications • Traffic Shaping • Load Balancing • High availability • Caching Engines • Fault Tolerance • Archives/Backups • Common Address Redundancy Protocol • Virtual Networking • Locating and Installing Equipment • Change Management Procedures