image
The Ultimate Drawing Course Beginner to Advanced...
$179
$79
image
User Experience Design Essentials - Adobe XD UI UX...
$179
$79
Total:
$659

Description

This course is your one-stop resource to prepare for the CompTIA Network+ (N10-007) certification exam. The entire curriculum is covered, and we have included full-length practice tests to help you gauge where you stand when it comes to the actual certification exam.
Across the landscape of self-paced online courses, users generally get troubled on account of the following concerns
what happens if I get stuck - will my questions really be promptly answered?
what happens if and when the exam changes - will whatever I have learned go to waste?
We intend to resolve these concerns by a) leveraging our global pool of subject matter experts and instructors to answer every course-related question within one business day, and b) committing to a course update frequency of at least 1 update every six months, and an update within 1 month in the event of any update to the certification exam.
Course coverage
This course is intended solely as an exam prep solution to help prepare you for the CompTIA Network+ (N10-007) certification exam. The topics covered include the Basics of Networking, Network Infrastructure, Network Security, Network Management, and Network Troubleshooting.
About the CompTIA Network+ certification exam
The current version of the Network+ certification exam - N10-007 - is a 90-minute exam that uses a scaled scoring system to assess your knowledge on a scale of 100- 900 (with 720 being the passing score). The exam tests you across the design and implementation of networks, managing essential network devices, ensuring the resilience of networks, implementing network security, troubleshooting problems, and creating virtualized networks.
The certification exam can be taken at PearsonVue test centers, or online at home through the Pearson OnVUE system. The question types include multiple-choice questions, drag and drops, and CompTIA’s performance-based question format.
Note:
A new exam for the CompTIA Network+ certification -
N10-008
- is set to launch in September 2021. However, the current exam -
N10-007
- will be valid till its retirement in Summer 2022.
Included in this course
1 business day’s turn-around-time to resolve all your queries by our experts
Updates to our course content every 6 months (
minimum frequency
)
18+ hours of video lectures
Downloadable copy of our Network+ (N10-007) Study Notes for the course
A set of two Simulated Exams that will make you confident to pass the Network+ (N10-007) exam
Who this course is for:
Anyone who wants to pass the CompTIA N10-007 Certification Exam
Anyone who is seeking a career in the network and security domain

What you'll learn

To Pass the CompTIA N10-007 certification exam

To Design and implement functional networks

To Configure, manage, and maintain essential network devices

To use devices such as switches and routers to segment network traffic and create resilient networks

To identify benefits and drawbacks of existing network configurations

To implement network security, standards, and protocols

To Troubleshoot network problems

To Support the creation of virtualized networks

Requirements

  • You will need a copy of Adobe XD 2019 or above. A free trial can be downloaded from Adobe.
  • No previous design experience is needed.
  • No previous Adobe XD skills are needed.

Course Content

27 sections • 95 lectures
Expand All Sections
1-Introduction
1
1.1-Course Overview
2-The Basis for Networking
41
2.1-Key Terms Used
2.2-Introduction
2.3-Networking Basics
2.4-Networking Basics Diagram
2.5-Devices and Nodes
2.6-Node Diagram
2.7-Media
2.8-Media Connect Nodes
2.9-Network Adaptors0.1
2.10-Network Adaptors/Network Interface Cards (NIC)
2.11-Addresses
2.12-Addressing
2.13-Signals and Protocols
2.14-Protocols
2.15-Network Models
2.16-Introduction to Networking Multiple Devices
2.17-TCP-UDP
2.18-P2P Server
2.19-Bridges and Switches
2.20-Hardware
2.21-Routers
2.22-Networking Multiple Networks - Text Document
2.23-Networking Multiple Networks
2.24-OSI Model
2.25-Introduction to OSI
2.26-OSI Model Key Terms Used
2.27-OSI Layers
2.28-Encapsulation
2.29-Encapsulation Part 1
2.30-Encapsulation Part 2
2.31-TCP/IP Protocol Model (or Stack)
2.32-TCP IP Protocol Model
2.33-Ports and Protocols
2.34-Interactive Ports and Protocols
2.35-Ports and Protocols
2.36-Internet Ports
2.37-Remote Access
2.38-File Transfer Protocol
2.39-Email
2.40-SMB Server
2.41-The Basis for Networking - End of Module Questions
3-Design a Network
55
3.1-Introduction to Design a Network
3.2-Introduction - Determine Network Type
3.3-Design a Network - Text Document
3.4-Area Networks Part - 1
3.5-Area Networks - Part 2
3.6-Area Networks - Part 3
3.7-Intranets and Extranets
3.8-Wired vs Wireless Networks - Text Document
3.9-Intranets and Extranets - Text Document
3.10-Wired vs Wireless
3.11-Introduction - Choose Topology
3.12-Network Topology - Text Document
3.13-Network Topology
3.14-Bus Topology
3.15-Ring Topology
3.16-Mesh Topology
3.17-Star Topology
3.18-Key Terms Used - Use Appropriate Hardware and Media - Text Document
3.19-Designing Wired Network Introduction
3.20-Hardware used to build networks - Text Document
3.21-Hardware
3.22-Modems Firewalls Routers - Text Document
3.23-Modems Firewalls Routers
3.24-Switches - Text Document
3.25-Switches - Part 1
3.26-Switches - Part 2
3.27-Bridges vs. Switches vs Bridge Mode - Text Document
3.28-Bridge Switches
3.29-Bridge Mode Wireless Bridge
3.30-Physical Media Introduction - Part 1
3.31-Physical Media Introduction - Part 2
3.32-Physical Media - Text Document
3.33-Twisted Pair - Part 1
3.34-Twisted Pair - Part 2
3.35-Twisted Pair - Part 3
3.36-Coaxial Cables
3.37-Fiber - Part 1
3.38-Fiber - Part 2
3.39-Ethernet Standards - Part 1
3.40-Ethernet Standards - Part 2
3.41-Ethernet Standards - Part 3
3.42-Twisted Pair Cabling - Text Document
3.43-Ethernet Standards Introduction
3.44-Ethernet Standards for Twisted Pair - Text Document
3.45-Introduction - Designing Wireless Networks
3.46-802dot11 - Part 1
3.47-Antennas - Part 2
3.48-Designing Wireless networks
3.49-Introduction - IOT (Internet of Things)
3.50-IOT Screen
3.51-IOT (Internet of Things) - Text Document
3.52-Introduction - Phone Networks
3.53-Phone Networks
3.54-Implementing Phones VoIP - Text Document
3.55-Design a Network - End of Module Questions
4-Connect Device to Networks
81
4.1-Introduction
4.2-Learn Binary
4.3-Binary 0.3
4.4-Counting in Binary - Text Document
4.5-Binary 3.9
4.6-Binary 10.16 and 255
4.7-Hexadecimal
4.8-Binary to Hexadecimal - Text Document
4.9-Binary to Hexadecimal
4.10-Binary to Decimal
4.11-Binary to Decimal and Decimal to Binary - Text Document
4.12-Decimal to Binary
4.13-Introduction - Addressing
4.14-MAC Addressing
4.15-MAC (Media Access Control) Addressing - Text Document
4.16-MAC Addressing - Part 1
4.17-MAC Addressing - Part 2
4.18-MAC (Media Access Control) Address Breakdown - Text Document
4.19-Private Networks
4.20-Introduction - IP
4.21-IP Story So Far
4.22-IP Addressing Introduction and Review - Text Document
4.23-Network Host Portions
4.24-IP Addressing: Network and Host Portions - Text Document
4.25-Determine Network Portion
4.26-Network Importance and Practice
4.27-Determine Network Portion - Part 1
4.28-Network Importance and Practice - Part 2
4.29-IP Addressing: How to Determine the Network Portion - Text Document
4.30-Network Sizes
4.31-IP Addressing Network Sizes - Text Document
4.32-Private IP Addresses
4.33-IP Addressing Private IP Addresses - Text Document
4.34-Reserved IP - Part 1
4.35-Reserved Available - Part 2
4.36-IP Addressing Reserved IP Addresses - Text Document
4.37-Why Subnetting - Part 1
4.38-Classful Subnetting - Part 2
4.39-Ones and Zeros - Part 3
4.40-VLSM - Part 4
4.41-CIDR - Part 5
4.42-IP Addressing: Subnetting with CIDR and VLSM - Text Document
4.43-Case Study
4.44-Q1.. Answer Subnetting Questions
4.45-Q2. Answer Subnetting Questions
4.46-Q3. Answer Subnetting Questions - Part 1
4.47-Q3. Answer Subnetting Questions - Part 2
4.48-How to do the Exam Questions on Subnetting - Text Document
4.49-Introduction - IPv6
4.50-IPv6: The Future is Lots - Text Document
4.51-IPv6
4.52-IPv6 Concatenation
4.53-Introduction - DHCP
4.54-DHCP - Text Document
4.55-DHCP How Nodes Get IP Addresses MW
4.56-DHCP How Nodes Get IP Addresses
4.57-DHCP AP IP A and Leases
4.58-DHCP Reservation
4.59-Static IP - Demo 1
4.60-IP MAC Reservation - Demo 2
4.61-Introduction - Domain Name System (DNS)
4.62-DNS Demo
4.63-DNS - Part 1
4.64-DNS - Part 2
4.65-DNS - Part 3
4.66-DNS Makes Networks Work - Text Document
4.67-Introduction - Wired Networks
4.68-Configuring an IPv4 Network - Part 1
4.69-Configuring an IPv4 Network - Part 2
4.70-Configuring an IPv4 Network - Part 3
4.71-Configuring a Wired Network - Text Document
4.72-Building a WiFI Network Introduction
4.73-Part 1 Building a WiFI Network
4.74-Part 2 Building a WiFI Network
4.75-Part 3 Building a WiFI Network
4.76-WiFi Bands - Text Document
4.77-Connecting to an IPv6 Network Headshot
4.78-Network Portion - Text Document
4.79-Part 1 Connecting to an IPv6 Network
4.80-Part 2 Connecting to an IPv6 Network
4.81-Connect Device to Networks - End of Module Questions
5-Network Security
44
5.1-Introduction - Network Security
5.2-Securing a Network - Text Document
5.3-Introduction Security Basics
5.4-Part 1 Security Basics
5.5-Part 2 Security Basics
5.6-Part 3 Security Basics
5.7-Part 4 Security Basics
5.8-Part 5 Security Basics
5.9-Security Basics - Text Document
5.10-Introduction Baseline Hardening
5.11-Part 1 Baseline Hardening
5.12-Baseline Hardening - Text Document
5.13-Part 2 Patch Management
5.14-Part 3 Disable Ports
5.15-Part 4 Secure Power
5.16-Part 5.1 Basic Backup
5.17-Part 5.2 Advanced Backup
5.18-Always Back Up Data - Text Document
5.19-Introduction Network Hardening
5.20-Fire Wall Introduction
5.21-Fire wall Types
5.22-Network Hardening - Text Document
5.23-Network Segmentation - Part 1
5.24-Network Segmentation - Part 2
5.25-Network Segmentation - Text Document
5.26-Authentication Access Control
5.27-Authentication and Access Control - Text Document
5.28-8021x SSO
5.29-Network Authentication and Access Control - Text Document
5.30-MFA 2FA
5.31-Multi-factor Authentication - Text Document
5.32-RADIUS
5.33-Kerberos
5.34-Kerberos: The SSO mechanism - Text Document
5.35-Hashes
5.36-Hashes - Text Document
5.37-Keys Certificates
5.38-Encryption, Certificates, and Keys - Text Document
5.39-Wireless Hardening
5.40-Part 1 WiFi Terminology
5.41-Part 2 WiFi Security Steps
5.42-Part 3 WiFi Encryption
5.43-Wireless Network Hardening - Text Document
5.44-Network Security - End of Module Questions
6-Troubleshoot the Network
40
6.1-Introduction Troubleshooting
6.2-Troubleshoot a Network - Text Document
6.3-Introduction Troubleshooting Theory
6.4-Troubleshooting Theory
6.5-Troubleshooting Theory - Text Document
6.6-Introduction Troubleshooting Tools
6.7-Introduction Troubleshooting Hardware
6.8-Part 1 Troubleshooting Hardware
6.9-Part 2 Troubleshooting Hardware
6.10-Part 3 Troubleshooting Hardware
6.11-Troubleshooting Hardware Tools - Text Document
6.12-Hardware Tools - Text Document
6.13-Hardware Tools Interactive - Text Document
6.14-Introduction Troubleshooting Software
6.15-Troubleshooting Software Tools - Text Document
6.16-Part 1 Sniffers Scanners.mov
6.17-Port Scanner - Text Document
6.18-Part 2 Mappers Analyzers.mov
6.19-Network Mapping - Text Document
6.20-Part 3 Wireless Analyzer Bandwidth Tester
6.21-WiFi Analyzers - Text Document
6.22-Introduction Troubleshooting CLI
6.23-Command Line Content - Text Document
6.24-Part 1 ipconfig P 1
6.25-Part 2 ipconfig P2 and Help.mov
6.26-Part 3 ping
6.27-Part 4 DNS Ipconfig-nslookup
6.28-Part 5 DNS Tracert
6.29-Part 6 Route-arp-run as Admin
6.30-Introduction Troubleshooting Miscellaneous
6.31-Wired Issues Part 1
6.32-Wired Issues Part 2
6.33-Wired Issues Part 3
6.34-Wired Issues Part 4
6.35-Wireless Issues Part 1
6.36-Wireless Issues Part 2
6.37-Wireless Issues Part 3
6.38-Part 1 Addressing Issues
6.39-Part 2 Other Networking Issues
6.40-Troubleshoot the Network - End of Module Questions
7-Going Global
34
7.1-Introduction - Going Global
7.2-Overview WAN Remote Cloud
7.3-Part 1 Dialup ISDN
7.4-Part 2 ISDN T E Carrier
7.5-Part 3 Fiber Wireless WAN
7.6-Circuit Switching
7.7-Part 2 Packet Switching
7.8-Part 1 WAN to Internal Network
7.9-Part 2 Distribution Frames
7.10-Part 3 Patch Panels
7.11-Fiber Tranceivers
7.12-Multiplexing
7.13-Part 1 Firewalls
7.14-Part 2 VPN Wireless Controllers
7.15-Cellular WAN
7.16-Introduction - Logical Infrastructures
7.17-Part 1 Routing
7.18-Part 2 Routing Protocols
7.19-Part 3 Switches
7.20-Part 5 Traffic Shaping
7.21-Part 6 SDN
7.22-Introduction - Cloud
7.23-Part 1 Virtualization Overview
7.24-Part 2 Virtualization Terminology
7.25-Part 1 What Is The Cloud
7.26-Part 2 Cloud Services
7.27-Part 3 Cloud Delivery
7.28-Virtualization Cloud - Text Document
7.29-Introduction - Data Centers
7.30-Part 1 Data Center Storage Types
7.31-Part 3 Failover
7.32-Part 4 Load Balancing
7.33-Part 5 Fault Tolerance
7.34-Going Global - End of Module Questions
8-Defend a Network from Attacks
34
8.1-Introduction
8.2-Introduction - Attack types
8.3-Denial Of Service
8.4-ARP and DNS poisoning
8.5-Eaves Dropping Attacks
8.6-Part 1 Social Engineering
8.7-Part 2 Social Engineering
8.8-Botnets
8.9-Password Attacks
8.10-WiFi and Switch Attacks
8.11-High Availability - Text Document
8.12-Introduction - Password Security
8.13-Part 1 Malware Delivery Methods
8.14-Part 2 Malware Delivery Methods
8.15-Part 1 Malware Payloads
8.16-Part 2 Malware Payloads
8.17-Introduction - Firewall Security
8.18-Policies - Part 1
8.19-Policies - Part 2
8.20-Policies - Part 3
8.21-Certificates
8.22-VPN
8.23-IP Sec TLS
8.24-Remote Protocol Camparison
8.25-Introduction - Defense in Depth
8.26-Network Baselines
8.27-SIEM
8.28-Port Forwarding Mirroring
8.29-Data Loss Prevention
8.30-Breached Systems
8.31-Diagrams
8.32-Inventory Change Management
8.33-Recovery Sites
8.34-Defend a Network from Attacks - End of Module Questions
9-Mock Paper
2
9.1-Mock Paper 1
9.2-Mock Paper 2