CompTIA Network+ Online Course

CompTIA Network+ Online Course in South Africa

 

2KO South Africa offers online CompTIA N+ courses in South Africa. We also offer full time CompTIA Network+ courses in Cape Town for groups of four or more delegates. 2KO South Africa's N+ course is offered to our international and local students. 2KO International delivers consulting services, in the IT and Business space, as well as being a training provider for IT certification and user level courses. Training can be any combination of bespoke, classroom and online learning, to ensure students have access to the best CompTIA N+ certification training in South Africa. CompTIA's Network+ course in South Africa is a vendor-neutral certification that validates technical competency in networking administration and support. The Network Plus certification confirms a technician's critical knowledge of media and topologies, protocols and standards, network implementation and network support. The exams also cover domains such as security, safety and environmental issues and communication and professionalism.

 

 

The CompTIA Network+ Certification Training Course from 2KO Africa measures the necessary competencies for an IT professional with approximately nine months experience in network support or administration. Students will learn the knowledge and skills needed to install, manage and troubleshoot a variety of networks on any platform. 2KO Africa's Network Plus training measures the necessary competencies for an IT professional with approximately nine months experience in network support or administration. Students will learn the knowledge and skills needed to install, manage and troubleshoot a variety of networks on any platform. Our Network + N10-007 training course follows the CompTIA objectives, ensuring you receive the training and knowledge needed to succeed.

 

CompTIA Network+ N10-007

 

Module 1 – Networking Concepts

1.1 Basic Networking You will explain basic networking.
Topics:

  • Intro to networking
  • Networking architectures
  • Activity Basic Networking

 

1.2 OSI Model You will explain devices, applications, protocols, and services at their appropriate OSI layers.
Topics:

  • Layer 7 – Application
  • Layer 6 – Presentation
  • Layer 5 – Session
  • Layer 4 – Transport
  • Layer 3 – Network
  • Layer 2 – Data Link
  • Layer 1 – Physical
  • Activity Exploring the OSI Model

 

1.3 Protocols and Ports You will explain the purposes and uses of ports and protocols.
Topics:

  • Protocols and ports overview
  • Activity Examining Protocols and Ports
  • Connection-oriented vs. connectionless
  • Transmission Control Protocol (TCP)
  • User Datagram Protocol (UDP)
  • Activity Comparing TCP and UDP
  • Internet Protocol (IP)
  • Internet Control Messaging Protocol (ICMP)
  • Internet Group Messaging Protocol (IGMP)
  • Activity Examining the Lower Layer Protocols
  • Layer 7 Remote Control Protocols
  • Layer 7 File Transfer Protocols
  • Layer 7 Messaging Protocols
  • Activity Examining Messaging Protocols
  • Layer 7 Web Traffic Protocols
  • Layer 7 Streaming Media Protocols
  • Layer 7 Infrastructure Management Protocols

 

1.4 Switching You will explain the concepts and characteristics of switching.
Topics:

  • Packet-switched vs. circuit-switched networks
  • Properties of Network Traffic
  • Contention Management
  • Activity Creating Collision and Broadcast Domains
  • Interface Properties and Segmentation
  • Activity Creating a Basic Network Segment
  • Switching prt 2
  • Activity Switching
  • Switching Loop Management
  • Activity Managing Switching Loops
  • VLANs
  • Activity Creating VLANs

 

1.5 Routing You will explain the concepts and characteristics of routing.
Topics:

  • ARP
  • Activity Examining ARP
  • IP Addressing Basics
  • Activity Configuring IP
  • Routers
  • Activity Setting Up a Router
  • Routing Basics
  • Activity Adding Static Routes
  • VLAN Routing
  • Activity Routing Between VLANs
  • NAT/PAT
  • Activity Configuring NAT/PAT
  • Routing Protocols
  • Activity Configuring a Routing Protocol
  • Firewalls
  • Activity Configuring Firewalls

 

1.6 Advanced Switching and Routing Concepts You will explain advanced switching and routing concepts.
Topics:

  • IPv6 Concepts
  • Activity Exploring IPv6
  • Performance Concepts
  • Distributed Switching
  • Software-defined Networking

 

1.7 IP Addressing You will, given a scenario, configure the appropriate IP addressing components.
Topics:

  • Public vs. Private
  • Loopback and Reserved
  • Subnet Mask
  • Default Gateway
  • Virtual IP
  • Subnetting
  • Activity Learning to Subnet
  • Address Assignments

 

1.8 Network Types and Topologies You will compare and contrast the characteristics of network topologies, types and technologies.
Topics:

  • Wired Topologies
  • Wireless Topologies
  • Network Types
  • Technologies that Facilitate the Internet Of Things (IoT)
  • (No activity for this chapter)

 

1.9 Wireless Technologies You will, given a scenario, implement the appropriate wireless technologies and configurations.
Topics:

  • Radio Basics
  • 802.11 Standards
  • Wi-Fi Frequencies
  • Wi-Fi Antenna Concepts
  • Bluetooth
  • Cellular
  • Site Surveys
  • Activity Using an RF Spectrum Analyzer

 

1.10 Cloud Concepts You will summarize cloud concepts and their purposes.
Topics:

  • Types of Services
  • Cloud Delivery Models
  • Security Implications/Considerations
  • Activity Exploring Cloud Services

 

1.11 Network Services You will explain the functions of network services.
Topics:

  • DNS Service
  • Activity Setting up DNS
  • DHCP Service
  • Activity Setting Up DHCP
  • NTP
  • IPAM

 

Module 2 – Infrastructure

2.1 Cabling Solutions You will, given a scenario, deploy the appropriate cabling solution.
Topics:

  • Media Types
  • Activity Testing a Fiber Optic Cable
  • Plenum vs. PVC
  • Connector Types
  • Activity Crimping on an RJ-45 Connector
  • Transceivers
  • Termination Points
  • Activity Terminating Cable to a 110 Block
  • Copper Cable Standards
  • Copper Termination Standards
  • Activity Creating a Crossover Cable
  • Ethernet Deployment Standards

 

2.2 Network Device Placement and Installation You will, given a scenario, determine the appropriate placement of networking devices on a network and install/configure them.
Topics:

  • Network Interface
  • Repeater
  • Hub
  • Bridge
  • Switch
  • Router
  • Modem
  • Wireless Access Point
  • Activity Setting up a WAP
  • Firewall
  • Media Converter
  • Wireless Range Extender
  • VoIP Endpoint

 

2.3 Advanced Network Devices You will explain the purposes and use cases for advanced networking devices.
Topics:

  • Multilayer Switch
  • Wireless Controller
  • Load Balancer
  • IDS/IPS
  • Proxy Server
  • Activity Configuring Proxy Settings
  • VPN Concentrator
  • AAA/RADIUS Server
  • UTM Appliance
  • NGFW/Layer 7 Firewall
  • VoIP PBX
  • VoIP Gateway
  • Content Filter

 

2.4 Virtualization and Network Storage Technologies You will explain the purposes of virtualization and network storage technologies.
Topics:

  • Virtual Networking Components
  • Network Storage Types
  • Connection Types
  • Jumbo Frames
  • (No activity for this chapter)

 

2.5 WAN Technologies You will compare and contrast WAN technologies.
Topics:

  • Service Types
  • Transmission Mediums
  • Characteristics of Service
  • Activity Configuring WAN Links
  • Termination

 

Module 3 – Network Operations

3.1 Documentation You will, given a scenario, use appropriate documentation and diagrams to manage the network.
Topics:

  • Diagram Symbols
  • Standard Operating Procedures/Work Instructions
  • Logical vs. Physical Diagrams
  • Rack Diagrams
  • Change Management Documentation
  • Wiring and Port Locations
  • IDF/MDF Documentation
  • Labeling
  • Network Configuration and Performance Baselines
  • Inventory Management
  • Activity Using Documentation

 

3.2 Business Continuity and Disaster Recovery You will compare and contrast business continuity and disaster recovery concepts.
Topics:

  • Availability Concepts
  • Recovery
  • Activity Backing Up Your Data
  • MTTR
  • MTBF
  • SLA Requirements

 

3.3 Scanning, Monitoring, and Patching You will explain common scanning, monitoring and patching processes and summarize their expected outputs.
Topics:

  • Processes
  • Event Management
  • SNMP Monitors
  • Metrics
  • Activity Testing the Network

 

3.4 Remote Access Methods You will, given a scenario, use remote access methods.
Topics:

  • VPN
  • RDP
  • SSH
  • VNC
  • Telnet
  • HTTPS/Management URL
  • Remote File Access
  • Out-of-Band Management
  • Activity Making Remote Connections

 

3.5 Policies and Best Practices You will identify policies and best practices.
Topics:

  • Privileged User Agreement
  • Password Policy
  • On-boarding/Off-boarding Procedures
  • Licensing Restrictions
  • International Export Controls
  • Data Loss Prevention
  • Remote Access Policies
  • Incident Response Policies
  • BYOD
  • AUP
  • NDA
  • System Life Cycle
  • Safety Procedures And Policies
  • Activity Creating Policies and Procedures

 

Module 4 – Network Security

4.1 Physical Security Devices You will summarize the purposes of physical security devices.
Topics:

  • Detection
  • Prevention
  • (No activity for this chapter)

 

4.2 Authentication and Access Control You will explain authentication and access controls.
Topics:

  • Authorization, Authentication, and Accounting
  • Multifactor Authentication
  • Access Control
  • Activity Examining Access Control Mechanisms

 

4.3 Basic Wireless Network Security You will, given a scenario, secure a basic wireless network.
Topics:

  • WPA
  • WPA2
  • TKIP-RC4
  • CCMP-AES
  • Authentication and Authorization
  • Geofencing
  • Activity Demonstrating the Need for Wireless Security

 

4.4 Common Network Attacks You will summarize common networking attacks.
Topics:

  • DoS
  • Social Engineering
  • Insider Threat
  • Logic Bomb
  • Rogue Access Point
  • Evil Twin
  • War-driving
  • Phishing
  • Ransomware
  • DNS Poisoning
  • ARP Poisoning
  • Spoofing
  • Deauthentication
  • Brute Force
  • VLAN Hopping
  • Man-in-the-Middle
  • Exploits vs. Vulnerabilities
  • Activity Conducting a Phishing Attack

 

4.5 Network Device Hardening You will, given a scenario, implement network device hardening.
Topics:

  • Changing Default Credentials
  • Avoiding Common Passwords
  • File Hashing
  • Generating New Keys
  • Activity Supporting Secure Authentication and Encryption
  • Upgrading Firmware
  • Patching and Updates
  • Disabling Unnecessary Services
  • Using Secure Protocols
  • Disabling Unused Ports

 

4.6 Common Mitigation Techniques You will explain common mitigation techniques and their purposes.
Topics:

  • Signature Management
  • Device Hardening
  • Change Native VLAN
  • Switchport Protection
  • Network Segmentation
  • Privileged User Account
  • File Integrity Monitoring
  • Role Separation
  • Restricting Access Via ACLs
  • Honeypot/Honeynet
  • Penetration Testing
  • Activity Implementing a Honeypot

 

Module 5 – Network Troubleshooting and Tools

5.1 Network Troubleshooting Methodology You will explain the network troubleshooting methodology.
Topics:

  • Identify the Problem
  • Establish a Theory of Probable Cause
  • Test the Theory to Determine the Cause
  • Establish a Plan of Action to Resolve the Problem and Identify Potential Effects
  • Implement the Solution or Escalate as Necessary
  • Verify Full System Functionality and , if Applicable, Implement Preventive Measures
  • Document Findings, Actions, and Outcomes
  • (No activity for this chapter)

 

5.2 Using the Appropriate Tool You will, given a scenario, use the appropriate tool.
Topics:

  • Hardware Tools – Basic Hand Held
  • Hardware Tools – Analyzers
  • Activity Troubleshooting with Hardware Tools
  • Software Tools – Testers and Analyzers
  • Activity Troubleshooting with Software Tools
  • Software Tools – Command Line
  • Activity Using Command Line Tools

 

5.3 Troubleshoot Wired Connectivity and Performance You will, given a scenario, troubleshoot common wired connectivity and performance issues.
Topics:

  • Signal Issues:
  • Attenuation
  • Latency
  • Jitter
  • Crosstalk
  • EMI
  • Activity Troubleshooting Signal Problems
  • Physical Issues:
  • Open/short
  • Incorrect pin-out
  • Incorrect Cable Type
  • Bad Port
  • Damaged cable
  • Bent pins
  • Transceiver Issues:
  • Transceiver mismatch
  • TX/RX reverse
  • Duplex/speed mismatch
  • Activity Troubleshooting Transceiver Problems
  • Traffic Flow Issues:
  • Bottleneck
  • VLAN mismatch
  • Network connection LED status indicators

 

5.4 Troubleshoot Wireless Connectivity and Performance You will, given a scenario, troubleshoot common wireless connectivity and performance issues.
Topics:

  • Signal Loss:
  • Attenuation
  • Reflection
  • Refraction
  • Absorption
  • Latency & Jitter
  • Antenna Issues:
  • Incorrect antenna type
  • Incorrect antenna placement
  • Incorrect WAP type
  • WAP Issues:
  • Interference
  • Channel overlap
  • Overcapacity
  • Distance limitations
  • Frequency mismatch
  • Power levels
  • Signal-to-noise ratio
  • WAP Misconfiguration:
  • Wrong SSID
  • Wrong passphrase
  • Security type mismatch
  • Activity Troubleshooting WAP Issues

 

5.5 Troubleshoot Common Network Service Issues You will, given a scenario, troubleshoot common network service issues.
Topics:

  • Common Network Issues:
  • Physical Connectivity
  • Incorrect IP Address
  • Incorrect Gateway
  • Incorrect Netmask
  • Names Not Resolving
  • Untrusted SSL Certificate
  • DHCP Issues:
  • Duplicate IP Addresses
  • Expired IP Address
  • Rogue DHCP
  • Exhausted DHCP Scope
  • Firewall/ACL Issues:
  • Blocked TCP/UDP Ports
  • Incorrect Host-based Firewall Settings
  • Incorrect ACL Settings
  • Advanced Network Issues:
  • DNS Server Issues
  • Duplicate MAC Addresses
  • Incorrect Time
  • Unresponsive Service
  • Hardware Failure
  • Activity Case Study: Troubleshooting an Unusual