CompTIA Network+ Online Course

CompTIA Network+ Online Course in South Africa

 

2KO South Africa offers online CompTIA N+ courses in South Africa. We also offer full time CompTIA Network+ courses in Cape Town for groups of four or more delegates. 2KO South Africa's N+ course is offered to our international and local students. 2KO Africa is a network of companies that offers a substantial series of computer courses across the entire African region, and is a leading, international provider of certified online IT training, to ensure the best CompTIA N+ certification training in South Africa. CompTIA's Network+ course in South Africa is a vendor-neutral certification that validates technical competency in networking administration and support. The Network Plus certification confirms a technician's critical knowledge of media and topologies, protocols and standards, network implementation and network support. The exams also cover domains such as security, safety and environmental issues and communication and professionalism.

 

The CompTIA Network+ Certification Training Course from 2KO Africa measures the necessary competencies for an IT professional with approximately nine months experience in network support or administration. Students will learn the knowledge and skills needed to install, manage and troubleshoot a variety of networks on any platform. 2KO Africa's Network Plus training measures the necessary competencies for an IT professional with approximately nine months experience in network support or administration. Students will learn the knowledge and skills needed to install, manage and troubleshoot a variety of networks on any platform. Our Network + N10-006 training course follows the CompTIA objectives, ensuring you receive the training and knowledge needed to succeed.

 

CompTIA Network+ N10-006

 

Module 1 - Networking Concepts

Course Introduction

Introduction to Networks Overview

What is a Network?

Peer to Peer Networking

Client Server Networks

Physical Topologies

Physical Bus Topologies

Physical Star Topologies

Physical Ring Topologies

Physical Mesh Topologies

Point to Point Topologies

Hybrid Topologies

Backbones and Segments

 

Module 2

OSI Model Overview

Internetworking Models

Advantages of Reference Models

OSI Model and Layer Functions

TCP Reliability

TCP Flow Control and Packet Acknowledgement

Routing at Layer 3

Data Encapsulation

Multiplexing

Numbering Systems

Base and Broad Band

Bit Rate and Baud Rate

Wavelength

 

Module 3

Media Cables and Connectors Overview

Physical Media

Coax Media Cables and Connectors

Twisted-Pair Media Cables and Connectors

Fiber Optic Media Cables and Connectors

UTP and BNC Couplers

Broadband Over Power Lines

Serial and USB Connectors

Cable Properties

Wiring Standards

T1 Crossover Cable

Wiring Distribution Installation

Troubleshooting Wiring


Module 4

Ethernet Standards and Properties Overview

Collision and Broadcast Domains

Carrier Sense Multiple Access/Collision Detection

Duplex Ethernet

Binary to Decimal

Hex to Binary to Decimal

Ethernet Addressing

Ethernet Frames

IEEE Standards

802.3 Standards

IEEE 1901-2013

 

Module 5

Network Devices Overview

Common Network Device

Hubs

Network Interface Cards

Network Bridges

Switches and Routers

Firewalls and Other Devices

Dynamic Host Configuration Protocol

Specialized Devices

Multilayer Switch and Domain Name Services

Proxy Servers

Encryption Devices

VPN Concentrator

Planning and Implementing a Network

 

Module 6

Internet Protocol Overview

What is TCP/IP?

DoD and OSI Model

TCP/IP Protocol Suite

TCP and UDP

Port Number Examples

IP Header

ICMP

ARP

Data Encapsulation and De-Encapsulation

Protocol Data Units

Port Numbers at the Transport Layer

 

Module 7

Internet Protocol Addressing Overview

Addressing Terminology

IP Addressing Hierarchical Scheme

Classful IP Addressing

Private IP Addressing

IP Addressing Terms

Internet Protocol Version 6

Auto Configuration EUI-64

Link Local and Global Addressing

Transition Mechanisms

Dynamic Host Configuration Protocol 6

 

Module 8

Subnetting Overview

Subnetting Basics

Creating a Subnet Portion

Determining Number of Computers Through Subnetting

Locating Network ID's

Determining Block Size or Interval

Classless Inter-Domain Routing

Troubleshooting IP Addresses

Command Line Tools

Network Address Translation

How NAT Works

 

Module 9

Routing Concepts Overview

IP Routing Basics

IP Routing Process

Static and Dynamic Routing

Additional Routing Terms

Default Routing

Gateway Redundancy

 

Module 10

Dynamic Routing Protocols Overview

Routing Protocol Basics

Administrative Distance

Routing Protocol Classes

Distance Vector Routing Protocols

Routing Information Protocol

Classful and Classless Networks

Discontiguous Network

EIGRP and BGP

RIP - OSF and IS-IS Protocols

IPv6 Routing Protocols

 

Module 11

Switching and VLAN Configuration Overview

Switching and Virtual LANs

Switching Services

Address Learning and Forward/Filter Decisions

Loop Avoidance

Spanning Tree Protocol

VLAN Broadcast Domains

Access and Trunk Links

VTP Modes of Operation and Configuration

Advanced Features of Switches

Switch Management

VLAN Switch Configuration Demonstration

 

Module 12

Wireless Technologies Overview

Wireless Technologies Basics

Wireless Agencies and Standards

Wireless Frequency Ranges

802.11 Committees and Subcommittees

Wireless LAN Modulation Techniques

Wireless Access Points and NIC Cards

Wireless Network Types

Installing and Configuring Hardware

Wireless Security

Troubleshooting Issues

Environmental Factors

Rogue Access Point

 

Module 13

Network Hardening Techniques Overview

Access Control Lists

Tunneling Protocols

Encryption Standards

Remote Access

User Account and Resource Security

User Authentication Methods

Authentication - Authorization and Accounting

Secure and Unsecure Protocols

Access Control List Demonstration

 

Module 14

Network Security Vulnerabilities Overview

Denial of Service Attacks

Virus Attacks

Attackers and Their Tools

ARP Cache Poisoning and VLAN Hoping

Mitigation Techniques

Policies and Procedures

NSA Specifications

 

Module 15

Firewalls Overview

Firewalls Types

Firewall Technologies

Intrusion Detection and Prevention Systems

Vulnerability Scanning and VPN Concentrators

Device Security

Forward and Reverse Proxy Servers

Network Address Translation and Port Forwarding

Port Security Demonstration

 

Module 16

Wide Area Network Technologies Overview

Defining Wide Area Networks

WAN Connection Types

Dense and Course Wavelength Division Multiplexing

Passive Optical Network and SONET

Wireless Technologies

Broadband Services

WAN Protocols

Cellular WAN

Metro Ethernet

 

Module 17

Network Troubleshooting Overview

Protocol Analyzers

Network Scanners

Throughput Testers and Connectivity Software

Command Line Tool traceroute

ipconfig and ifconfig Utility

Ping and IPv6 Utility

Address Resolution Protocol

nslookup Utility

My traceroute Command

nbtstat and netstat Utility

File Transfer Protocol

Telnet Utility

Command Line Tool Guidelines

Windows Command Line Tools Demonstration

 

Module 18

Network Management Hardware Tools Overview

Hardware Tools Overview

 

Module 19

Troubleshooting Methodologies Overview

Troubleshooting Approaches

Narrowing Down the Problem

Troubleshooting Steps

Troubleshooting Tips

 

Module 20

Network Monitoring Tools Overview

Simple Network Management Protocol

Schematics and Diagrams

Policies - Procedures and Regulations

Network Performance Monitoring

Metrics - Reporting Terms and Interface Monitoring

Configuration Management

Virtual Networking

Storage Area Network

Cloud Architectures

Protocol Analyzer Demonstration

 

Module 21

Troubleshooting Wide Area Networks Overview

Local and Wide Area Networks

Wireless Local Area Network

Personal Area Network

SCADA and ICS

Medianets

WAN Connection Issues

Customer Equipment

Company ISP Security Policies and Satellite Issues

 

Module 22

Physical Security Overview

SCADA Review

Network Segmentation

Additional Physical Security and Specific Dangers

Access Controls and Monitoring

Environmental Controls and Electrical Power

Access Control Authentication Types

Multiple Factor Authentication

 

Module 23

Network Access Control Overview

IEEE 802.1x

Network Access Control

Computer Forensics

Investigative Process

Free Space vs. Slack Space

Disaster Recovery

Business Impact Assessment

Backup Considerations

RAID Backup Solutions

Redundancy and Single Points of Failure

 

Module 24

Troubleshooting Security Overview

Firewall Security Issues

Avenues of Attack

Types of DDOS Attacks

IP Address Spoofing

Replay Attacks and TCP/IP Hijacking

Encryption Attacks

Address System and Password Attacks

Software Exploitation

Viruses and Malware

Anti Malware Software

Switch Port Security

 

Module 25

Voice Over IP Overview

VOIP

 

Module 26

Security Policies and Programs Overview

Security Programs

Security Policy Types

Security Policy Concepts

Human Resource Policies

Installation Safety Issues

 

Module 27

IT Distribution and Change Management Overview

IT Distribution Concepts and Procedures

Change Management

Course Review