CompTIA Network+ N10-008: Cables & Connectors
CompTIA Network+ N10-008: Cables & Connectors
- discover the key concepts covered in this course
- differentiate between the different copper cable types including twisted pair, coaxial, and twinaxial
- differentiate between TIA/EIA-568A and TIA/EIA-568B copper termination standards
- differentiate between singlemode and multimode fiber cabling
- differentiate between different connector types including RJ11, RJ45, f-type, local connector (LC), straight tip (ST), subscriber connector (SC), mechanical transfer (MT), and registered jack (RJ)
- outline the purpose and characteristics of small form-factor pluggable (SFP), enhanced form-factor pluggable (SFP+), quad small form factor pluggable (QSFP), and enhanced quad small form-factor pluggable (QSFP+) transceiver types
- outline common cable management responsibilities including working with patch panels and punchdown blocks
- describe the purpose and characteristics of the 10BASE-T, 100BASE-TX, 1000BASE-T, 10GBASE-T, and 40GBASE-T Ethernet standards
- outline the purpose and characteristics of the 100BASE-FX, 100BASE-SX, 1000BASE-SX, 1000BASE-LX, 10GBASE-SR, and 10GBASE-LR fiber Ethernet standards, as well as coarse wavelength division multiplexing (CWDM), dense wavelength division multiplexing (DWDM), bidirectional wavelength division multiplexing (WDM)
- summarize the key concepts covered in this course
Networking cables and connectors are network hardware components that allow devices to connect and communicate with each other. Different types of network cables exist, each offering different standards, limitations, and speeds. In addition to connecting devices, network cables and connectors are essential for transferring data and information between computers, routers, switches, and storage area networks. In this course, you値l examine common network cabling implementations such as copper and fiber. You'll discover how to differentiate between the different cable types, including twisted pair, coaxial, and twinaxial. You'll also explore the many different connector and transceiver types and learn common cable management responsibilities including working with patch panels and punchdown blocks. Finally, you'll learn how to differentiate between 10BASE-T, 100BASE-TX, 1000BASE-T, 10GBASE-T, and 40GBASE-T copper Ethernet standards, as well as the 100BASE-FX, 100BASE-SX, 1000BASE-SX, 1000BASE-LX, 10GBASE-SR, and 10GBASE-LR fiber Ethernet standards. This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam.
CompTIA Network+ N10-008: Cloud Concepts
CompTIA Network+ N10-008: Cloud Concepts
- discover the key concepts covered in this course
- outline key characteristics of the public cloud architecture and recognize the benefits and challenges of public cloud computing
- describe the purpose and features of private cloud computing and recognize advantages and disadvantages of the private deployment model
- outline how hybrid deployments use a mix of on-premise and cloud solutions and recognize the benefits and use cases of hybrid deployments
- outline the purpose and benefits of the community cloud deployment model
- recognize key characteristics of the software as a service (SaaS) software distribution model
- describe the purpose and features of the infrastructure as a service (IaaS) service model
- outline the key benefits of implementing a platform as a service (PaaS) service model
- recognize key benefits of using the desktop as a service (DaaS) software technology
- outline the purpose and features of the available connectivity methods including virtual private network (VPN) and private-direct cloud provider connections
- recognize cloud risk factors and considerations
- differentiate between local and cloud resources
- outline the use cases and benefits of Infrastructure as Code (IaC)
- describe how multitenancy allows multiple customers of a cloud vendor to use the same computing resources
- describe elasticity and how it affects cloud computing
- describe the concept of scalability, which is to increase or decrease the size or power of a cloud solution
- recognize potential security concerns and mitigations when implementing a cloud computing solution
- summarize the key concepts covered in this course
Cloud networking is a type of Internet-based network solution that makes resources available to network users via a central, third-party platform that is typically hosted online. In this course, you値l learn about cloud deployment and service models, and explore how to select the appropriate solution depending on your organizational needs. In addition to SaaS, IaaS, and PaaS, you値l explore the benefits of using the desktop as a service software technology. You値l also learn about the relationship between local and cloud resources, as well as relevant security implications and considerations. You値l also examine how multitenancy allows multiple customers of the same cloud vendor to use the same computing resources. Finally, you will explore the effects of elasticity on cloud computing, with a focus on one of the main features of cloud computing, the ability to increase or decrease (scale) the size or power of a cloud solution. This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam.
CompTIA Network+ (N10-008): Disaster Recovery & High Availability Concepts
CompTIA Network+ (N10-008): Disaster Recovery & High Availability Concepts
- discover the key concepts covered in this course
- describe how load balancing works
- outline the purpose and features of using multipathing as a failover tool
- differentiate between redundant hardware and clusters, including servers and networking equipment
- outline the purpose and features of facilities and infrastructure support concepts, including uninterruptible power supply (UPS), power distribution units (PDUs), generators, HVAC, and fire suppression
- describe how network interface card (NIC) teaming works in a high availability configuration
- recognize redundancy and high availability concepts including site recovery, active-active vs. active-passive clustering, diverse paths, routing redundancy, mean time to repair and mean time between failure, recovery time objective and recovery point objective
- recognize network device backup and restore options, including data, state, and configuration
- summarize the key concepts covered in this course
Disaster recovery and high availability are areas of security planning that involve tools, policies, and procedures that ensure the availability and recovery of critical services and infrastructure in the event of a human-induced or natural disaster.
In this course, you'll explore high availability and disaster recovery concepts such as load balancing, multipathing, and network interface card teaming. You値l learn about facilities and infrastructure support concepts including uninterruptible power supply, power distribution units, generators, HVAC, and fire suppression. Lastly, you'll explore redundancy and high availability concepts including cold, warm, and hot sites, as well as network device backup and restore states and configurations.
This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam.
CompTIA Network+ (N10-008): Ethernet Switching & Wireless Standards
CompTIA Network+ (N10-008): Ethernet Switching & Wireless Standards
- discover the key concepts covered in this course
- describe the data virtual local area network (VLAN)
- recognize when to use voice VLANs
- outline the characteristics and purpose of port configurations including port tagging, port aggregation, duplex, speed, flow control, port mirroring, port security, jumbo frames, and auto-medium-dependent interface crossover (MDI-X)
- outline the purpose and features of using media access control (MAC) address tables on Ethernet switches
- differentiate between Power over Ethernet (PoE) and Power over Ethernet plus (PoE+)
- outline the purpose and characteristics of the Spanning Tree Protocol (STP)
- describe carrier-sense multiple access with collision detection (CSMA/CD)
- outline the purpose and features of using Address Resolution Protocol (ARP)
- outline key features of the Neighbor Discovery Protocol (NDP)
- differentiate between 802.11 standards including a, b, g, n, ac and ax
- recognize when to implement 2.4 GHz and 5 GHz wireless frequencies
- outline the purpose and key features of Wi-Fi channels and recognize their respective regulatory impacts
- describe channel bonding use cases
- recognize when to deploy the service set identifier (SSID) and basic service sets, extended service set, independent basic service set (ad-hoc) and roaming
- recognize key differences between omni and directional antenna types
- outline the purpose and features of encryption standards including Wi-Fi Protected Access (WPA), WPA2 Personal, Advanced Encryption Standard (AES), Temporal Key Integrity Protocol (TKIP) and WPA/WPA2 Enterprise (AES/TKIP)
- outline the purpose and features of key cellular technologies including code-division multiple access (CDMA), Global System for Mobile Communications (GSM), Long-Term Evolution (LTE), as well as 3G, 4G, and 5G
- describe the multiple input, multiple output (MIMO) and multi-user MIMO (MU-MIMO) wireless standards
- summarize the key concepts covered in this course
Ethernet switching enables devices such as computers and printers to communicate seamlessly with each other on the same network.
In this course, you'll learn about key switching features. You値l also explore different port configurations, how Address Resolution Protocol works, and examine key features of the Neighbor Discovery Protocol.
You値l also explore how to install and configure the appropriate wireless technologies and standards and learn how to differentiate between 802.11 standards, and recognize when to implement 2.4 GHz and 5 GHz wireless frequencies. You値l also learn when to deploy a service set identifier as well as basic service sets, the extended service set, independent basic service set (Ad-hoc) and roaming. Lastly, you値l learn about wireless encryption standards, cellular technologies, and multiple-input multiple-output, and multi-user MIMO.
This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam.
CompTIA Network+ N10-008: IP Addressing Schemes and Subnetting
CompTIA Network+ N10-008: IP Addressing Schemes and Subnetting
- discover the key concepts covered in this course
- outline the key differences between public and private IP addresses and provide an overview of RFC1918
- differentiate between Network Address Translation (NAT) and Port Address Translation (PAT)
- recognize the differences between IPv4 and IPv6 and the benefits of each
- describe Automatic Private IP Addressing (APIPA) solutions including Extended Unique Identifier (EUI-64)
- differentiate between unicast, broadcast, anycast, and multicast packets
- outline the purpose and characteristics of the link local, loopback, and default gateway addresses
- recognize how to perform base-2 conversions and work with binary values
- describe binary to decimal conversion, how to determine the size of a subnet, and Classless Inter-Domain Routing (CIDR) notations
- recognize how to subnet a class C network
- describe how to subnet a class B network
- recognize how to subnet a class A network
- describe how to perform supernetting
- recognize how to determine the address ranges of subnets
- describe IPv6 concepts such as tunneling, dual stack, shorthand notation, router advertisement, and stateless address autoconfiguration (SLAAC)
- outline the purpose and characteristics of subinterfaces
- describe when to use virtual IP addresses
- summarize the key concepts covered in this course
Computers and devices each require a unique identifier, known as an IP address, in order to participate on an IP network. Using a subnet mask, the IP address is divided into a network portion and a host portion. This practice is called subnetting and it allows for an IP network to be logically subdivided or segmented. In this course, you'll learn the fundamentals of public and private IP addresses and how to use Network Address Translation and Port Address Translation to translate addresses. Next, you'll examine the differences between IPv4 and IPv6 addressing, as well as various types of addresses including unicast, multicast, and anycast. You'll learn the basics of base-2 conversions and binary values and examine classes A, B, C, D, and E, which respectively allow you to portion a network into various different sizes. Finally, you値l learn about supernetting, a more advanced form of subnetting, as well as IPv6 concepts, subinterfaces, and virtual IP addresses.
CompTIA Network+ N10-008: Network Implementations
CompTIA Network+ N10-008: Network Implementations
- discover the key concepts covered in this course
- differentiate between layer 2 and layer 3 capable switches
- outline the key usage scenarios for network routers and describe how they can guide and direct network data
- outline the key characteristics and purpose of hubs and bridges, respectively
- describe common networking devices including access points, load balancers, proxy servers, repeaters, voice gateways, media converters, and VPN headends
- outline the characteristics and purpose of a firewall and recognize the security benefits it can offer
- recognize key benefits and implementations of an intrusion detection system (IDS)
- describe when and where to use network printers, cameras, physical access control devices, and heating, ventilation, and air conditioning (HVAC) sensors
- describe how the voice over Internet protocol (VoIP) is used to deliver multimedia sessions and voice communications over Internet Protocol (IP) networks
- outline the purpose and benefits of the Internet of Things (IoT) for organizations
- describe the essential components of SCADA systems and outline its most common applications such as industrial implementations
- differentiate between the routing protocols of Routing Information Protocol (RIP), Open Shortest Path First (OSPF), Enhanced Interior Gateway Routing Protocol (EIGRP), and Border Gateway Protocol (BGP)
- differentiate between the link state, distance vector, and hybrid routing protocols
- describe when and where to implement static and default routes, as well as administrative distances, exterior vs. interior, and time to live
- outline the purpose and characteristics of bandwidth management concepts including traffic shaping and Quality of Service (QoS)
- summarize the key concepts covered in this course
Networking devices are instrumental to the delivery of data over a network. In this course, you'll learn about comparing and contrasting various networking devices to determine when and where to use them on a network. You値l also explore common networking devices such as hubs, switches, and routers in addition to network appliances used for more specialized tasks such as the Intrusion prevention system, intrusion detection system, proxy servers, and supervisory control and data acquisition systems. You値l also examine different routing technologies, including dynamic routing concepts and protocols. And you値l explore how to recognize the key differences between the Routing Information Protocol and Open Shortest Path First routing protocols, and recognize how to differentiate between link state, distance vector, and hybrid routing protocols. Lastly, you値l learn about bandwidth management concepts including traffic shaping and quality of service. This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam.
CompTIA Network+ N10-008: Network Operations
CompTIA Network+ N10-008: Network Operations
- discover the key concepts covered in this course
- recognize different device and network metrics, including central processing unit (CPU) usage, memory, network metrics, bandwidth, latency, and jitter
- describe the Simple Network Management Protocol (SNMP) and how it works
- outline the purpose of network logging features including traffic and audit logs, syslog, and logging severity levels
- recognize key network interface statistics such as link state, speed/duplex, send/receive traffic, cyclic redundancy checks (CRCs), protocol packet and byte counts
- outline the most common interface errors and alerts including CRC errors, giants, runts, and encapsulation errors
- outline key environmental factors and sensors such as temperature, humidity, electrical, and flooding
- recognize how to determine network performance and availability baselines
- describe NetFlow data and how to analyze it
- recognize how to determine uptime percentages and types of downtime
- describe how to create organizational plans and procedures for network operations including change management, incident response, disaster recovery, standard operating procedures, business continuity, and system life cycle
- outline the purpose and features of policies used to ensure network hardening and security including policies for passwords, acceptable use, bring your own device (BYOD), remote access, onboarding and offboarding, security, and data loss prevention
- outline the purpose and features of common documentation for network operations including physical network diagrams, logical network diagrams, wiring diagrams, site surveys, audit and assessment reports, and baseline configurations
- outline the purpose and characteristics of common network operations agreements, including the non-disclosure agreement (NDA), service-level agreement (SLA), and memorandum of understanding (MOU)
- summarize the key concepts covered in this course
The goal of network operations is typically to monitor, manage, and respond to network-related incidents to ensure a network's overall availability and performance is not compromised.
In this course, you値l learn about statistics and sensors available to ensure network availability. You'll explore the Simple Network Management Protocol and how it works, and examine using network device logs. You値l also learn about interface statistics, errors, and alerts, as well as environmental factors and sensors that relate to temperature, humidity, electrical, and flooding.
You'll then learn about organizational documents and policies, and learn how to plan for incident response, disaster recovery, and business continuity. Lastly, you値l explore hardening and security policy planning strategies, and common documentation every organization should maintain. This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam.
CompTIA Network+ N10-008: Network Services & Data Center Architectures
CompTIA Network+ N10-008: Network Services & Data Center Architectures
- discover the key concepts covered in this course
- describe the purpose and function of DNS
- differentiate between internal and external DNS and recognize the structure of DNS namespaces
- outline the purpose and characteristics of the authoritative server of a DNS zone
- recognize when to use various types of DNS records, including A, SRV, and CNAME
- outline key components of a DNS hierarchy including root DNS servers, zone transfers, time to live (TTL), DNS caching, reverse DNS, recursive lookups, and authoritative name servers
- describe the purpose and characteristics of the DHCP service including its scope, exclusion ranges, reservations, dynamic assignment, lease time, scope options, available addresses, DHCP relay, and IP helpers
- outline the purpose and features of NTP
- outline the purpose and features of IPAM
- describe the characteristics of three-tier data center networks
- describe the software-defined networking (SDN) approach
- describe storage area networks (SAN) and outline the related connection types including fiber channel, fiber channel over Ethernet (FCoE), Internet Small Computer Systems Interface (iSCSI)
- differentiate between north-south and east-west traffic flows
- describe the spine and leaf architecture and list benefits over traditional network architectures
- outline the purpose and key characteristics of colocation data centers
- summarize the key concepts covered in this course
All computers and network devices require an IP address to be able to connect to the Internet or other IP devices on an organizational network. In this course, you'll learn about the fundamentals of both DHCP and DNS and how DHCP can help automate the configuration of devices on an IP network. You値l explore start of authority records as well as the various DNS record types used to handle requests and translate domain names into IP addresses. You値l then review key characteristics of both the Network Time Protocol and IP Address Management. Next, you値l examine basic corporate and data center architectures, and common architectures such as three-tiered, spine and leaf. You'll learn key characteristics of software-defined networking and explore the storage area network and common connections types that include fiber channel, fiber channel over Ethernet, Internet small computer, and Systems Interface. Lastly, you値l learn about colocations and the benefits and solutions these data centers can offer. This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam.
CompTIA Network+ (N10-008): Network Troubleshooting Methodologies & Tools
CompTIA Network+ (N10-008): Network Troubleshooting Methodologies & Tools
- discover the key concepts covered in this course
- recognize how to identify a problem by following the network troubleshooting methodology
- describe how to establish a theory of probable cause by questioning the obvious and considering multiple approaches
- recognize how to test a theory to determine the cause, next steps, and whether escalation is required
- describe how to establish a plan of action to resolve problems and identify potential effects
- recognize how to implement an appropriate solution or escalate if required
- recognize how to verify full system functionality and implement preventive measures
- describe how to document findings, actions, and outcomes
- recognize how to troubleshoot throughput, speed, and distance issues
- outline key cable considerations, including shielded and unshielded, plenum, and riser-card
- outline the features of different cable applications, including rollover, crossover, and Power over Ethernet
- describe how to troubleshoot attenuation, latency, interference, duplexing issues, and jitter
- recognize the steps to troubleshoot crosstalk and EMI
- outline the key considerations when troubleshooting opens and cable shorts
- describe how to troubleshoot duplex and transceiver mismatches
- recognize how to troubleshoot bad ports, bottlenecks, and VLAN mismatches
- outline how to troubleshoot damaged cables and bent pins
- recognize the steps to troubleshoot network connection LED status indicators
- recognize the common cable connectivity tools such as cable crimpers and punchdown tools
- summarize the key concepts covered in this course
If an incident or outage occurs, network administrators must be able to respond effectively and resolve network problems in a timely fashion. In this course, you値l learn about best practices for identifying a problem, establishing a theory of probable cause, testing theories, formulating a plan of action to resolve a problem, implementing a solution, or escalating the issue. You'll explore how to verify full system functionality and document findings, actions, outcomes, and lessons learned. You値l examine how to troubleshoot common cable connectivity issues and explore network specifications and limitations, cable considerations, and common issues such as attenuation, interference, bad ports, and duplexing issues. Lastly, you値l learn about common cable connectivity tools including cable crimpers, punchdown tools, tone generators, loopback adapters, and cable testers. This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam.
CompTIA Network+ N10-008: Network Types
CompTIA Network+ N10-008: Network Types
- discover the key concepts covered in this course
- recognize the essential components of a mesh topology
- outline the purpose and characteristics of the star topology
- describe the components of a bus topology
- recognize when to implement a ring topology
- recognize the benefits of using a hybrid topology
- differentiate between a local area network (LAN), metropolitan area network (MAN), and wide area network (WAN)
- outline the purpose and characteristics of other computer network types including wireless local area network (WLAN), personal area network (PAN), and campus area network (CAN)
- outline the purpose and characteristics of peer-to-peer and client/server networks
- recognize the benefits of using a storage area network (SAN)
- outline the purpose and characteristics of Multiprotocol Label Switching (MPLS)
- recognize when to use Multipoint Generic Routing Encapsulation (mGRE)
- outline common provider links and describe their purpose
- differentiate between satellite and metro-optical
- differentiate between demarcation points and smartjacks
- recognize when to use vSwitch, virtual network interface card (vNIC), network function virtualization (NFV), and hypervisor
- summarize the key concepts covered in this course
Network topologies represent how computers are interconnected to form a network. There are five main network topology types - mesh, star, bus, ring, and hybrid - and each offers unique advantages and disadvantages that technicians need to be aware of. In this course, you'll explore the five topologies in detail and learn when to implement each. You値l learn about computer networks such as local area networks, metropolitan area networks, and wide area networks. Next, you explore other computer network types including peer-to-peer, client/server, wireless local area network, personal area network, and campus area network. You'll examine Multiprotocol Label Switching and how it can be used as an efficient alternative to traditional Internet Protocol routing. Lastly, you'll learn about common service related entry points, virtual networking concepts, and the common network provider links such as satellite, digital subscriber line, cable, leased line, and metro-optical.
CompTIA Network+ N10-008: OSI Model Layers & Data Encapsulation
CompTIA Network+ N10-008: OSI Model Layers & Data Encapsulation
- discover the key concepts covered in this course
- outline the features and purpose of the Open Systems Interconnection (OSI) model
- outline the devices, applications, protocols, and services that function at the physical layer
- describe the devices, applications, protocols, and services that function at the data link layer
- outline the devices, applications, protocols, and services that function at the network layer
- describe the devices, applications, protocols, and services that function at the transport layer
- outline the devices, applications, protocols, and services that function at the session layer
- recognize the devices, applications, protocols, and services that function at the presentation layer
- describe the devices, applications, protocols, and services that function at the application layer
- outline the characteristics and purpose of Ethernet headers, IP headers, and TCP/UDP headers
- outline the features and purpose of TCP flags and differentiate between synchronization (SYN) and acknowledgement (ACK)
- differentiate between fixed and variable payloads
- differentiate between maximum transmission unit (MTU) and maximum segment size (MSS)
- summarize the key concepts covered in this course
The Open Systems Interconnection, or OSI, model is used to describe how computer systems communicate with each other. Frequently used for troubleshooting network problems, the seven layers of the OSI model are concepts with which all networking professionals should be familiar.
In this course, you値l learn about each layer of the OSI model. You値l outline how human-readable information, such as emails and chat messages, are transferred over a network, as well as the path this information takes along the OSI model.
You値l also examine data encapsulation and decapsulation within the context of the OSI model. You値l outline characteristics for Ethernet headers, IP headers, and TCP/UDP headers, and learn to differentiate between synchronization (SYN) and acknowledgement (ACK) flags.
Lastly, you値l recognize the primary differences between maximum transmission unit, or MTU, and maximum segment size, or MSS, and how these concepts relate to data being transmitted over a network.
CompTIA Network+ N10-008: Physical Security & Network Hardening
CompTIA Network+ N10-008: Physical Security & Network Hardening
- discover the key concepts covered in this course
- outline techniques used to harden a network, including securing SNMP, port security, private VLANs, DHCP snooping, and access control lists
- recognize how to choose strong passwords and change credentials
- outline the importance of disabling unused ports, such as IP ports and device ports
- recognize how explicit and implicit firewall rules can help harden a network
- describe how to implement WPA and WPA2 in a scenario
- recognize the steps involved in implementing TKIP-RC4 in a given scenario
- outline the purpose and characteristics of common authentication and authorization features, such as EAP, PEAP, EAP-FAST, EAP-TLS, shared or open, preshared key, captive portals, and MAC filtering
- recognize how to implement geofencing in a scenario
- describe the key wireless security considerations, such as antenna placement, power levels, and wireless client and guest network isolation
- recognize IoT security challenges and outline how to protect IoT systems and devices
- describe how to use a VPN, including IPsec, SSL/TLS/DTLS, site-to-site, and client-to-site
- recognize when and where to use remote desktop protocol (RDP) and remote desktop gateways
- outline the purpose and features of using SSH when remotely accessing a network
- describe the benefits of using virtual network computing (VNC) and virtual desktop
- recognize remote authentication and authorization considerations
- describe how to use out-of-band management, such as a modem or console router
- recognize when to implement motion detection and video surveillance
- describe when to implement asset tracking
- outline the purpose and features of tamper detection
- outline the purpose of prevention techniques, such as badges, biometrics, smart cards, key fobs, employee training, access control vestibules, and locks
- summarize the key concepts covered in this course
Network security is the practice of protecting and preventing unwelcome access attempts to computer networks. In this course, you値l learn about network hardening techniques and best practices. You値l learn to secure networks and about wireless authentication and authorization features.
You値l examine remote access methods and security considerations, VPN solutions, and the benefits of using virtual network computing and virtual desktop solutions. You値l learn about remote authentication and authorization considerations and how to implement out-of-band management.
CompTIA Network+ N10-008: Registered Ports
CompTIA Network+ N10-008: Registered Ports
- discover the key concepts covered in this course
- outline the purpose and characteristics of the Structured Query Language (SQL) Server
- describe when to use SQLnet port 1521
- describe the purpose of and cases for using the MySQL protocol
- outline the benefits of using Remote Desktop Protocol (RDP)
- describe the purpose of and cases for using the Session Initiation Protocol (SIP)
- differentiate between IP protocols ICMP, TCP, UDP, GRE, and IPsec
- differentiate between connectionless and connection-oriented packet switching
- summarize the key concepts covered in this course
With a range from 0 to 65535 split across three groups (those reserved for TCP/IP applications, registered ports, and dynamic ports), differentiating port numbers can be confusing. In this course, you'll learn how to identify and use the most common registered ports.
You'll examine port 1433, reserved for Structured Query Language (SQL) Server and when to use SQLnet port 1521, Remote Desktop Protocol (RDP) port 3306, and port 5060/5061, reserved for the Session Initiation Protocol (SIP).
You'll then outline how IP protocols are used to facilitate Internet Protocol (IP) communication, such as Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Internet Control Message Protocol (ICMP), and Gateway Routing Encapsulation (GRE).
Lastly, you'll examine connectionless and connection-oriented services, two data transmission services used to establish and terminate connections, exploring how they behave at the network and transport layers of the OSI model.
CompTIA Network+ (N10-008): Security Concepts & Threats
CompTIA Network+ (N10-008): Security Concepts & Threats
- discover the key concepts covered in this course
- describe the confidentiality, integrity, and availability (CIA) triad and outline how it can guide policies for information security within an organization
- recognize the most common potential internal and external threats to a network
- describe common network vulnerabilities such as zero-day attacks
- outline the characteristics of common exploits, including IP spoofing and eavesdropping
- outline the principle of least privilege
- recognize when and where to use role-based access control (RBAC)
- describe the zero trust security model
- outline the purpose and features of the defense in depth cybersecurity approach and how it can encompass separation of duties, network segmentation, network access control, and honeypots
- differentiate between authentication methods including multifactor, Terminal Access Controller Access-Control System Plus (TACACS+), Single sign-on (SSO), Remote Authentication Dial-in User Service (RADIUS), LDAP, Kerberos, local authentication, 802.1X, and Extensible Authentication Protocol (EAP)
- describe the benefits of security assessments and outline the most common assessment techniques including vulnerability assessments, penetration testing, risk assessments, and posture assessments
- outline the purpose and characteristics of the security information and event management (SIEM) software
- differentiate between common technology-based attacks including DNS poisoning, VLAN hopping, ARP spoofing, rogue DHCP, rogue access point (AP), evil twin, brute-force, dictionary, MAC spoofing, IP spoofing, and deauthentication
- describe ransomware attacks and outline how to prevent and remove them
- recognize best practices for preventing malware attacks
- outline the purpose and characteristics of an on-path attack
- describe commonly used password attack methods
- outline the purpose and characteristics of denial of service (DoS), distributed denial of service (DDoS), and Botnet or command and control attacks
- differentiate between common types of social engineering attacks including phishing, tailgating, piggybacking, and shoulder surfing
- summarize the key concepts covered in this course
Network security encompasses best practices and policies that are put in place to help monitor and prevent malicious attacks against both internal and external threats.
In this course, you'll learn about the confidentiality, integrity, and availability triad and other common security concepts. You値l explore well-known threats, both internal and external, as well as common vulnerabilities and newly discovered software vulnerabilities. Next, you値l examine authentication methods and how to perform security assessments.
You'll also examine common attacks, with a focus on technology-based attacks, and learn to differentiate between denial of service, distributed denial of service and Botnet/command and control attacks. You'll further explore how to prevent and remove ransomware and malware. Lastly, you'll learn about human and environmental attacks, such as social engineering, and how to differentiate between different social engineering attacks. This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam.
CompTIA Network+ (N10-008): Troubleshooting Network Issues
CompTIA Network+ (N10-008): Troubleshooting Network Issues
- discover the key concepts covered in this course
- recognize how to work with a packet sniffer to intercept and log network traffic
- describe how to use a port scanner to identify which ports are open on a network
- describe how to use a Wi-Fi analyzer to detect usage
- recognize when and how to use a bandwidth speed tester
- describe how to use other common software tools such as iPerf, NetFlow analyzers, Trivial File Transfer Protocol (TFTP) server, terminal emulator, and IP scanner
- describe how to use network troubleshooting command line tools, including ping, ipconfig, telnet, Nmap, and netstat
- outline the features and purpose of using Linux command line tools
- recognize how to troubleshoot wireless connectivity issues such as throughput, speed, distance, received signal strength indication (RSSI) signal strength, effective isotropic radiated power (EIRP), and power settings
- describe wireless connectivity considerations such as antennas, channel utilization, site surveys, and AP association time
- recognize common wireless connectivity issues including interference, channel overlap, antenna cable attenuation/signal loss, RF attenuation/signal loss, wrong SSID, incorrect passphrase, encryption protocol mismatch, insufficient wireless coverage, and captive portal issues
- describe the key considerations when troubleshooting wired networking issues, including device configuration review, routing tables, interface status, VLAN assignment, and network performance baselines
- describe how to troubleshoot issues relating to an incorrect or failed default gateway
- describe how to troubleshoot issues relating to an incorrectly configured netmask
- recognize how to troubleshoot issues caused by duplicate IP and MAC addresses
- recognize how to troubleshoot issues where names are not resolving
- describe how to troubleshoot issues caused by expired DHCP scopes and rogue DHCP servers
- recognize how to correct issues caused by expired IP addresses and incorrect system times
- describe how to troubleshoot issues caused by untrusted SSL certificates and blocked TCP/UDP ports
- recognize how to troubleshoot issues caused by incorrect firewall and ACL settings
- describe how to correct issues caused by hardware failures and unresponsive services
- outline the characteristics of and reason for common wired connectivity issues
- summarize the key concepts covered in this course
Troubleshooting network connectivity is a complex responsibility that can require various approaches and techniques in order to resolve issues. In this course, you値l learn about using the appropriate network troubleshooting software tools and commands. You値l explore software tools such as Wi-Fi analyzers and port scanners and learn about traditional command line tools and network platform commands. You'll also examine how to troubleshoot common wireless connectivity issues including issues relating to specifications and limitations. Next, you値l learn about common considerations and issues pertaining to wireless connectivity. You値l explore general network troubleshooting best practices as they relate to wired networks. Finally, you'll examine considerations such as routing tables, VLAN assignment, and other common issues. This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam.
CompTIA Network+ N10-008: Well-known Ports & Protocols
CompTIA Network+ N10-008: Well-known Ports & Protocols
- discover the key concepts covered in this course
- outline the features of the File Transfer Protocol (FTP)
- describe when to use the Secure Shell (SSH) protocol
- outline the purpose and characteristics of the Secure File Transfer Protocol (SFTP)
- outline the purpose and characteristics of telnet
- describe how the Simple Mail Transfer Protocol (SMTP) is used for e-mail communications
- outline the common uses for the Domain Name System (DNS)
- recognize the benefits of using Dynamic Host Configuration Protocol (DHCP) on a network
- outline the key considerations when using the Trivial File Transfer Protocol (TFTP)
- recognize the common uses of the Hypertext Transfer Protocol (HTTP)
- outline the ways in which the Post Office Protocol v3 (POP3) is used for e-mail communication
- describe the Network Time Protocol (NTP)
- outline the purpose of the Internet Message Access Protocol (IMAP)
- recognize how the Simple Network Management Protocol (SNMP) is used in the administration of networks
- outline the purpose and characteristics of the Lightweight Directory Access Protocol (LDAP)
- outline the features of the Hypertext Transfer Protocol Secure (HTTPS)
- describe the purpose and characteristics of the Server Message Block (SMB)
- describe how syslog is the standard for message logging
- outline the benefits of using SMTP TLS
- describe the benefits of using Secure Lightweight Directory Access Protocol (LDAPS)
- recognize the benefits of using IMAP over SSL for secure e-mail communications
- outline how POP3 over SSL can be used to secure e-mail communications
- summarize the key concepts covered in this course
In terms of computer networks, protocols are used to provide a required set of rules that enable computers to exchange information. Well-known Internet protocols include Transmission Control Protocol/Internet Protocol, User Datagram Protocol/Internet Protocol, File Transfer Protocol, and Hypertext Transfer Protocol. Ports, by comparison, are used to identify a type of network or specific process. Port numbers, ranging from 0 to 65535, are typically divided into three categories - well-known ports, dynamic ports, and registered ports. In this course, you値l learn about the most commonly-known ports in use on a computer network today. These include File Transfer Protocol, Simple Mail Transfer Protocol, Domain Name System, and Hypertext Transfer Protocol. You'll examine how HTTP uses the reserved port 80 and enables computers to send and receive Web client-based communication and messages from a Web server, including web site pages and data. Next, you'll explore other key ports including, port 25, reserved for Simple Mail Transfer Protocol and how SMTP allows e-mail clients and services to send out e-mails. You'll learn how port 100, reserved for Post Office Protocol v3 and port 143, reserved for Internet Message Access Protocol, allow for e-mail clients to retrieve e-mail messages from a mail server over a TCP/IP connection. Lastly, you'll learn about Secure Sockets Layer and how it can be incorporated into POP3 and IMAP implementations to enable more secure encrypted e-mail communications.