CompTIA Network+ Certification Training Course
1 Network architecture
1.1 Explain the functions and applications of various network devices
-
Router
-
Switch
-
Multilayer switch
-
Firewall
-
HIDS
-
IDS/IPS
-
Access point (wireless/wired)
-
Content Filter
-
Load balancer
-
Hub
-
Analog modem
-
Packet shaper
-
VPN concentrator
1.2 Compare and contrast the use of networking services and applications
-
VPN
-
IPsec
-
GRE
-
SSL VPN
-
PTP/PPTP
-
TACACS/RADIUS
-
RAS
-
Web services
-
Unified voice services
-
Network controllers
1.3 Install and configure the following networking services/applications
-
DHCP
-
DNS
-
Proxy/reverse proxy
-
NAT
-
Port forwarding
1.4 Explain the characteristics and benefits of various WAN technologies
-
Fiber
-
Frame relay
-
Satellite
-
Broadband cable
-
DSL/ADSL
-
ISDN
-
ATM
-
PPP/Multilink PPP
-
MPLS
-
GSM/CDMA
-
Dialup
-
WiMAX
-
Metro-Ethernet
-
Leased lines
-
Circuit switches vs packet switch
1.5 Install and properly terminate various cable types and connectors using appropriate tools
-
Copper connectors
-
Copper cables
-
Fiber connectors
-
Fiber cables
-
Media converters
-
Tools
1.6 Differentiate between common network topologies
-
Mesh
-
Bus
-
Ring
-
Star
-
Hybrid
-
Point-to-point
-
Point-to-multipoint
-
Client-server
-
Peer-to-peer
1.7 Differentiate between network infrastructure implementations
-
WAN
-
MAN
-
LAN
-
WLAN
-
PAN
-
Bluetooth
-
SCADA/ICS
-
Medianet's
-
ISDN
-
IP/SIP
1.8 Given a scenario, implement and configure the appropriate addressing schema
-
IPv6
-
EUI 64
-
Teredo, mired
-
IPv4
-
Private vs public
-
NAT/PAT
-
MAC addressing
-
Multicast
-
Unicast
-
Broadcast
-
Broadcast domains vs, collision domains
1.9 Explain the basics of routing concepts and protocols
-
Loopback interface
-
Routing loops
-
Routing tables
-
Static vs dynamic routes
-
Default route
-
Distance vector routing protocols
-
Hybrid routing protocols t
-
Link state routing protocols
-
Interior vs exterior gateway routing protocols
-
Autonomous system numbers
-
Route redistribution
-
High availability
-
Route aggregation
-
Routing metrics
1.10 Identify the basics elements of unified communication technologies
-
VoIP
-
Video
-
Real time services
-
QoS
-
Devices
1.11 Compare and contrast technologies that support cloud and virtualization
-
Virtualization
-
Storage area network
-
Cloud concepts
1.12 Given a set of requirements, implement a basic network
-
List of requirements
-
Device types/requirements
-
Environment limitations
-
Equipment limitations
-
Compatibility requirements
-
Wired/wireless considerations
-
Security considerations
2.1 Given a scenario, use appropriate monitoring tools
-
Packet/network analyzer
-
Packet/network analyzer
-
Interface monitoring tools
-
Port scanner
-
Top talkers/listeners
-
SNMP management software
-
Alerts
-
Packet flow monitoring
-
SYSLOG
-
SIEM
-
Environmental monitoring tools
-
Power monitoring tools
-
Wireless survey tools
-
Wireless analyzers
2.2 Given a scenario, analyze metrics and reports from monitoring and tracking performance tools
-
Baseline
-
Bottleneck
-
Log management
-
Graphing
-
Utilization
-
Link status
-
Interface monitoring
2.3 Given a scenario, use appropriate resources to support configuration management
-
Archives/backups
-
Baselines
-
On-boarding and off-boarding of mobile devices
-
NAC
-
Documentation
2.4 Explain the importance of implementing network segmentation
-
SCADA systems/Industrial control systems
-
Legacy systems
-
Separate private/public networks
-
Honeypot/Honeynet
-
Testing lab
-
Load balancing
-
Performance optimization
-
Security
-
Compliance
2.5 Given a scenario, install and apply patches and updates
-
OS updates
-
Firmware updates
-
Driver updates
-
Feature changes/updates
-
Major vs minor updates
-
Vulnerability patches
-
Upgrading vs downgrading
2.6 Given a scenario, configure a switch using proper features
-
VLAN
-
Spanning tree (802.1d) /rapid spanning tree (802.1w)
-
Interface configuration
-
Default gateway
-
Poe and PoE+ (802.3AF, 802.3at)
-
Switch management
-
Managed vs. unmanaged
2.7 Install and configure wireless LAN infrastructure and implement the appropriate technologies in support of wireless capable devices
-
Small office/home office wireless router
-
Wireless access points
-
VLAN pooling
-
LWAPP
-
Wireless bridge
-
Site surveys
-
Frequencies
-
Channels
-
Goodput
-
Connection types
-
Antenna placement
-
Antenna types
-
MIMO/MUMIMO
-
Signal strength
-
SSID broadcast
-
Topologies
3.1 Compare and contrast common network vulnerabilities and threats
-
Attacks/threats
-
Distributed DoS
-
Botnet
-
Traffic spike
-
Coordinated attack
-
Reflective/amplified
-
DNS
-
NTP
-
Smurfing
-
Friendly/unintentional DoS
-
Physical attack
-
Permanent DoS
-
Evil twin
-
Rogue AP
-
Wardriving
-
War chalking
-
Bluejacking
-
Bluesnarfing
-
WPA/WEP/WPS attacks
-
Vulnerabilities
-
TELNET
-
HTTP
-
SLIP
-
FTP
-
TFTP
-
SNMPv1 and SNMPv2
3.2 Given a scenario, implement network hardening techniques
-
Anti-malware software
-
Switch port security
-
Network segmentation
-
Security policies
-
Disable unneeded network services
-
Use secure protocols
-
Access lists
-
Wireless security
-
Enterprise
-
Personal
-
User authentication
-
Hashes
3.3 Compare and contrast physical security controls
-
Mantraps
-
Network closets
-
Video monitoring
-
Door access controls
-
Proximity readers/key fob
-
Biometrics
-
Keypad/cypher locks
-
Security guard
3.4 Given a scenario, install and configure a basic firewall
-
Types of firewalls
-
Settings/techniques
-
Outbound traffic
-
Inbound traffic
-
Internal/external
3.5 Explain the purpose of various network access control models
-
1x
-
Posture assessment
-
Guest network
-
Persistent vs non-persistent agents
-
Quarantine network
-
Edge vs access control
3.6 Summarize basic forensic concepts
-
First responder
-
Secure the area
-
Document the scene
-
eDiscovery
-
Evidence/data collection
-
Chain of custody
-
Data transport
-
Forensics report
-
Legal hold
4.1 Given a scenario, implement the following network troubleshooting methodology
-
Identify the problem
-
Establish a theory of probable cause
-
Top-to-bottom/bottom-to-top OSI model
-
Divide and conquer
-
Test the theory to determine the cause
-
Establish a plan of action to resolve the problem and identify potential effects
-
Implement the solution or escalate as necessary
-
Verify full system functionality and, if applicable implement preventative measures
-
Document findings, actions, and outcomes
4.2 Given a scenario, analyze and interpret the output of troubleshooting tools
-
Command line tools
-
Line testers
-
Certifiers
-
Multimeter
-
Cable tester
-
Light meter
-
Toner probe
-
Speed test sites
-
Looking glass sites
-
Wi-Fi analyzer
-
Protocol analyzer
4.3 Given a scenario, troubleshoot and resolve common wireless issues
-
Signal loss
-
Interference
-
Overlapping channels
-
Signal-to-noise ratio
-
Device saturation
-
Bandwidth saturation
-
Untested updates
-
Wrong SSID
-
Power levels
-
Open networks
-
Rogue access point
-
Wrong antenna type
-
Incompatibilities
-
Wrong encryption
-
Bounce
-
MIMO
-
AP Placement
-
AP configurations
-
Environmental factors
-
Wireless standard-related issues
4.4 Given a scenario, troubleshoot and resolve common copper cable issues
-
Shorts
-
Opens
-
Incorrect termination (mismatched standards)
-
Cross-talk
-
EMI/RFI
-
Distance limitations
-
Attenuation/Db loss
-
Bad connector
-
Bad wiring
-
Split pairs
-
Tx/Rx reverse
-
Cable placement
-
Bad SFP/GBIC - cable or transceiver
4.5 Given a scenario, troubleshoot and resolve common fiber cable issues
-
Attenuation/Db loss
-
SFP/GBIC - cable mismatch
-
Bad SFP/GBIC - cable or transceiver
-
Wavelength mismatch
-
Fiber type mismatch
-
Dirty connectors
-
Connector mismatch
-
Bend radius limitations
-
Distance limitations
4.6 Given a scenario, troubleshoot and resolve common network issues
-
Incorrect IP configuration/default gateway
-
Broadcast storms/switching loop
-
Duplicate IP
-
Speed and duplex mismatch
-
End-to-end connectivity
-
Incorrect VLAN assignment
-
Hardware failure
-
Misconfigured DHCP
-
Misconfigured DNS
-
Incorrect interface/interface misconfiguration
-
Cable placement
-
Interface errors
-
Simultaneous wired/wireless connections
-
Discovering neighbouring devices/nodes
-
Power failure/power anomalies
-
MTU/MTU black hole
-
Missing IP routes
-
NIC teaming misconfiguration
4.7 Given a scenario, troubleshoot and resolve common security issues
-
Misconfigured firewall
-
Misconfigured ACLs/applications
-
Malware
-
Denial of service
-
Open/closed ports
-
ICMP related issues
-
Unpatched firmware/Oss
-
Malicious users
-
Authentication issues
-
Improper access/backdoor access
-
ARP issues
-
Banner grabbing/OUI
-
Domain/local group configurations
-
Jamming
4.8 Given a scenario, troubleshoot and resolve common WAN issues
-
Loss of internet connectivity
-
Interface errors
-
Split horizon
-
DNS issues
-
Interference
-
Router configurations
-
Customer premise equipment
-
Company security policy
-
Satellite issues
5 Industry standards, practices, and network theory
5.1 Analyze a scenario and determine the corresponding OSI layer.
-
Layer 1 – Physical
-
Layer 2 – Datalink
-
Layer 3 – Network
-
Layer 4 – Transport
-
Layer 5 – Session
-
Layer 6 – Presentation
-
Layer 7 – Application
5.2 Explain the basics of network theory and concepts.
-
Encapsulation/de-encapsulation
-
Modulation techniques
-
Numbering systems
-
Broadband/baseband
-
Bit rates vs. baud rate
-
Sampling size
-
CDMA
-
CSMA/CD and CSMA/CA
-
Carrier detects/sense
-
Wavelength
-
TCP/IP suite
-
Collision
5.3 Given a scenario, deploy the appropriate wireless standard.
5.4 5.4 Given a scenario, deploy the appropriate wired connectivity standard.
-
Ethernet standards
-
Ethernet over HDMI
-
Ethernet over power line
-
Wiring standards
-
Broadband standards
5.5 Given a scenario, implement the appropriate policies or procedures.
-
Security policies
-
Network policies
-
Acceptable use policy
-
Standard business documents
5.6 Summarize safety practices.
-
Electrical safety
-
ESD
-
Installation safety
-
MSDS
-
Emergency procedures
-
Fire suppression systems
-
HVAC
5.7 Given a scenario, install and configure equipment in the appropriate location using best practices.
-
Intermediate distribution frame
-
Main distribution frame
-
Cable management
-
Power management
-
Device placement
-
Airflow
-
Cable trays
-
Rack systems
-
Labelling
-
Rack Monitoring
-
Rack security
5.8 Explain the basics of change management procedures.
-
Document the reason for a change
-
Change request
-
Approval process
-
Maintenance window
-
Notification of change
-
Documentation
5.9 Compare and contrast the following ports and protocols.
-
80 HTTP
-
443 HTTPS
-
137-139 NetBIOS
-
110 POP
-
143 IMAP
-
25 SMTP
-
5060/5061 SIP
-
2427/2727 MGCP
-
5004/5005 RTP
-
1720 H.323
-
TCP
-
UDP
5.10 Given a scenario, configure and apply the appropriate ports and protocols.
-
20,21 FTP
-
161 SNMP
-
22 SSH
-
23 Telnet
-
53 DNS
-
67,68 DHCP
-
69 TFTP
-
445 SMB
-
3389 RDP