CompTIA CompTIA Network+

CompTIA Network+

495.00 396.00
$495.00 $396.00

You Can Save Big With Group Enrollment

X
PRICE PER USER
$
X
USERS


=
SUBTOTAL
$

1 - 10 Users = $396.00 (Per User)

11 - 25 Users = $336.60 (Per User)

26 - 50 Users = $252.45 (Per User)

51 - 100 Users = $159.04 (Per User)

Enroll Now
More Than 1 User? Save Money With Group Enrollment! Click Here
This Package Contains Courses - See More
  • Course Delivery: On Demand

Chat Live | Contact Us | Toll Free: (888) 360-8764

 

Description

The CompTIA Network+ Certification course builds on existing user-level knowledge and experience with personal computer operating systems and networks to present fundamental skills and concepts that students will use on the job in any type of networking career. If students are pursuing a CompTIA technical certification path, the CompTIA A+ certification is an excellent first step to take before preparing for the CompTIA Network+ certification.

This course features:

Video Lectures and Expert Instruction:

Our unique delivery simulates a one-on-one classroom environment, creating a more personal learning experience. Our highly certified expert instructors possess a superior understanding of the subject matter in their fields and have the ability to convey this knowledge in an effective, engaging, and professional manner to a wide audience. Practical knowledge is essential for success in a real world environment and we have chosen our instructors with this in mind - many of our instructors are business owners and have been employed in their respective fields for decades!

Demonstrations:

The hands-on demonstrations in our training allow the student to view practical application of concepts in real-world environments. Demonstrations are a way for the instructor to present how to perform a task on-screen in front of the student. This feature gives the student the power to see tasks performed by a professional in the intended environment as many times as they would like, without purchasing expensive software.

PowerPoint Slides and Visuals:

Our courses feature PowerPoint slides to illustrate concepts and complement the expert instruction. Many of the in-depth theories and processes discussed in our courses can be learned most efficiently through the detailed PowerPoint slides we provide. These slides are accompanied by an instructor voiceover to provide our students with a clear, efficient, and complete presentation of concepts.

Student Workbooks

Our courses feature printable Student Workbooks for every chapter. Our printable Student Workbooks are a study tool that allows students to take notes and bring the course material with them when they may not have access to a computer. Workbooks can also be used electronically to quickly review PowerPoint slides and training topics.

The Following Courses Are Included In This Package:

Course Name Industry Course Delivery
CompTIA Network+ Certification: Module 01 - The OSI and TCP IP Models NewPage SCORM
CompTIA Network+ Certification: Module 02 - Applications, Devices, and Protocols NewPage SCORM
CompTIA Network+ Certification: Module 03 - IP Addressing NewPage SCORM
CompTIA Network+ Certification: Module 04 - Routing and Switching NewPage SCORM
CompTIA Network+ Certification: Module 05 - TCP and UDP Ports NewPage SCORM
CompTIA Network+ Certification: Module 06 - Protocols NewPage SCORM
CompTIA Network+ Certification: Module 07 - The Domain Name System (DNS) NewPage SCORM
CompTIA Network+ Certification: Module 08 - Troubleshooting Methodology NewPage SCORM
CompTIA Network+ Certification: Module 09 - Virtual Networks NewPage SCORM
CompTIA Network+ Certification: Module 10 - Installing and Configuring Routers and Switches NewPage SCORM
CompTIA Network+ Certification: Module 11 - The OSI and TCP IP Models NewPage SCORM
CompTIA Network+ Certification: Module 12 - DHCP NewPage SCORM
CompTIA Network+ Certification: Module 13 - Troubleshooting Wireless Networks NewPage SCORM
CompTIA Network+ Certification: Module 14 - Troubleshooting Router and Switch Problems NewPage SCORM
CompTIA Network+ Certification: Module 15 - Planning and Implementing a SOHO Network NewPage SCORM
CompTIA Network+ Certification: Module 16 - Standard Media Types NewPage SCORM
CompTIA Network+ Certification: Module 17 - Standard Connector Types NewPage SCORM
CompTIA Network+ Certification: Module 18 - Wireless Standards NewPage SCORM
CompTIA Network+ Certification: Module 19 - WAN Technologies NewPage SCORM
CompTIA Network+ Certification: Module 20 - Network Topologies NewPage SCORM
CompTIA Network+ Certification: Module 21 - Troubleshooting Physical Connectivity NewPage SCORM
CompTIA Network+ Certification: Module 22 - LAN Technologies NewPage SCORM
CompTIA Network+ Certification: Module 23 - Wiring Distribution Components NewPage SCORM
CompTIA Network+ Certification: Module 24 - Network Appliances NewPage SCORM
CompTIA Network+ Certification: Module 25 - Network Hardware Tools NewPage SCORM
CompTIA Network+ Certification: Module 26 - Network Software Tools NewPage SCORM
CompTIA Network+ Certification: Module 27 - Monitoring Network Traffic NewPage SCORM
CompTIA Network+ Certification: Module 28 - Management Documentation NewPage SCORM
CompTIA Network+ Certification: Module 29 - Optimizing Network Performance NewPage SCORM
CompTIA Network+ Certification: Module 30 - Implementing Wireless Security NewPage SCORM
CompTIA Network+ Certification: Module 31 - Network Access Security Methods NewPage SCORM
CompTIA Network+ Certification: Module 32 - User Authentication NewPage SCORM
CompTIA Network+ Certification: Module 33 - Network Security Threats NewPage SCORM
CompTIA Network+ Certification: Module 34 - Installing and Configuring a Firewall NewPage SCORM
CompTIA Network+ Certification: Module 35 - Network Security Appliances and Methods NewPage SCORM
 

Topics Covered

CompTIA Network+ covers the configuration, management, and troubleshooting of common wired and wireless network devices. Also included are emerging technologies such as unified communications, mobile, cloud, and virtualization technologies.

Course Introduction - Duration: 2m

Lesson 01 - Network Theory - Duration: 1h 40m

  • Network Theory
  • OSI Model Location
  • The IEEE 802.11 Standard
  • The OSI and TCP/IP Models
  • OSI Layer 7
  • OSI Layer 6
  • OSI Layer 5
  • OSI Layer 4
  • OSI Layer 3
  • OSI Layer 2
  • OSI Layer 1
  • LAN Compared with the OSI Model
  • TCP/IP Architecture
  • Demo - OSI Review
  • LANs
  • WANs
  • Network Coverage Areas
  • The Internet
  • Intranets
  • Extranets
  • Enterprise Networks
  • Specialized Network Types
  • Network Configurations
  • Centralized Networks
  • Client/Server Networks
  • Peer-to-Peer Networks
  • Mixed Mode Networks
  • Network Topologies
  • Frequencies and Overlap of Wireless Channels
  • Radio Networking
  • Broadcast Radio
  • Spread Spectrum
  • Infrared Transmission
  • Bluetooth
  • Microwave Transmission
  • Data Transmission
  • Analog Signals
  • Digital Signals
  • Digital Data Transmission
  • Unicast Transmission
  • Broadcast Transmission
  • Multicast Transmission
  • Anycast Transmission
  • Serial Data Transmission
  • Parallel Data Transmission
  • Baseband Transmission
  • Broadband Transmission
  • Transmission Speeds
  • Types of Media Access
  • Polling
  • CSMA/CA
  • CSMA/CD
  • Multiplexing

Lesson 02 - Bounded Network Media - Duration: 1h 24m

  • Bounded Network Media
  • Twisted-pair Cable
  • Common UTP Categories
  • Additional TP Categories
  • Stranded vs. Solid
  • Straight-through, Cross-over, Rollover
  • Pin Numbering of RJ-45 Connector
  • T1 Crossover Cable
  • Coaxial Cable
  • RG Standards
  • Single-mode Fiber to UTP
  • Broadband Over Power Line
  • Access BPL
  • BPL Modem
  • Twisted-pair Connectors
  • Pin Numbering of RJ-45 Connector (Cont.)
  • Serial Connectors
  • Serial Cable
  • Serial Console Connections
  • Serial Cable Types
  • Serial Data Rates
  • Typical UTP Installation
  • Fiber Optic Cable
  • Fiber Optic Connectors
  • Fiber Optic Connector Types
  • Thinnet Connectors
  • Terminating Coax with BNC
  • RG-6 and RG-59 Connectors
  • Plenums
  • Media Converters
  • Telecommunications Room
  • Termination Choices
  • Punchdown Block Wire Placement Cross-connects MDF to IDF Connections Workstation Drops Classifying Network Components

Lesson 03 - Unbounded Network Media - Duration: 51m

  • Unbounded Network Media
  • The 802.11 Standard
  • The 802.11 Family
  • 802.11 Networking
  • The 802.1x Standard
  • The 802.11 Standard (Cont.)
  • Channels
  • Channel Bonding
  • Wireless Access Points
  • Wireless Controllers
  • Wireless Bridges
  • Wireless Antennas
  • Wireless Antenna Types
  • Wireless Antenna Performance Factors
  • SSID Broadcasts
  • MIMO
  • Configuration Options
  • Configuring Wireless Clients
  • Demo - Setting Up Wi-Fi
  • Access Point
  • Device Compatibility
  • Troubleshooting Connections
  • Common Problems
  • Major Wireless Protocols

Lesson 04 - Network Implementations - Duration: 4h 9m

  • Network Implementations
  • Repeaters
  • Repeater Placement
  • Wireless Repeater
  • Repeater Operation
  • Limitations of Repeaters
  • Local Area Networks
  • Network Topologies
  • Logical Network Topologies
  • Peer-to-peer Model
  • Decentralized
  • Peer-to-peer Authentication
  • Client/Server Model
  • A Client/Server LAN
  • Client/Server Authentication
  • Star Topology
  • Bus Topology
  • Ring Topology
  • Mesh Topology
  • Hybrid Topology
  • Point-to-point vs. Point-to-multipoint
  • MPLS
  • Demo - Topology
  • NICs
  • Transceivers
  • IEEE 802.x Standards
  • Ethernet (IEEE 802.3)
  • Ethernet Frames
  • MAC Addresses
  • The 10Base Standards
  • Fast Ethernet
  • Gigabit Ethernet
  • 10 Gigabit Ethernet
  • PoE
  • Ethernet Hub
  • Ethernet
  • Ethernet Media
  • 10-Gigabit Ethernet Standards
  • Gigabit Ethernet Standards
  • Fast Ethernet Standards
  • 10BASE-T
  • Ethernet Bonding
  • Data Transmission
  • Data Collisions
  • Channel Access Methods
  • Demo - LAN Cable Types
  • Network Access Points
  • LAN Installation Components
  • MAC Address
  • Switches
  • Routers
  • Types of Routers
  • Gateways
  • Firewalls
  • Analog Modems
  • Network Controllers
  • Legacy Network Connectivity Devices
  • Collision and Broadcast Domains
  • Switches and Network Performance
  • Switch Types and Operating Modes
  • STP (IEEE 802.1d)
  • Internetworking Devices
  • Bridges
  • Bridge Operation
  • Bridge Types
  • Bridge Routing Management
  • Bridge Filtering and Intelligence
  • Local and Remote Bridges
  • Layer 2 Switch
  • Configurations for Switched Networks
  • Switched Network with Bottlenecks
  • Switched Network without Bottlenecks
  • Benefits of Switches
  • Higher-level Switches
  • Managed Layer 3 Switch
  • Installing Routers and Switches
  • Demo - Routing NAT
  • Label Edge Routers
  • Networking Appliances
  • Demo - The Purpose of Network Devices
  • Demo - Interface Monitoring
  • Demo - Interface Configuration
  • VLANs
  • VLAN Assignment
  • Port Mirroring
  • Trunking
  • IEEE 802.1q
  • VLAN Pooling
  • Virtual LAN
  • VLAN Filtering
  • VLAN Trunking
  • Trunking Example
  • Demo - Intro to Routing and Switching VLANs
  • Spanning Tree
  • Demo - Spanning Tree
  • Demo - Packet Tracing
  • Internet Service Providers (ISPs)
  • Small ISPs
  • Regional ISP
  • Typical UTP Installation
  • Telecommunications Room
  • Standards

Lesson 05 - TCP/IP Addressing and Data Delivery - Duration: 2h

  • TCP/IP Addressing and Data Delivery
  • Network Communication Protocols
  • TCP
  • TCP Three-way Handshake
  • Internet Protocol (IP)
  • UDP
  • Protocols
  • Demo - Examining Ports and Protocols
  • The TCP/IP Model
  • Encapsulation on TCP/IP Networks
  • Connection-Oriented and Connectionless Protocols
  • The Three-Way Handshake
  • ICMP
  • IGMP
  • ARP
  • Protocol Analyzers
  • IPv4
  • Subnet Masks
  • Network IDs
  • IPv4 Subnet Masks
  • IPv4 Custom Subnets
  • Routing Example
  • Demo - Examining IP Settings
  • Classful IPv4 Addresses
  • Special Addresses
  • APIPA
  • Default Gateway
  • CIDR
  • CIDR Address
  • Demo - Convert Binary
  • IPv6
  • IPv6 Address Types
  • IPv6 Address Scopes
  • IPv6 Subnets
  • IPv6 Custom Subnets
  • IPCONFIG and IFCONFIG
  • Connections
  • Flow Control
  • Buffering
  • Data Windows
  • Error Detection
  • Parity Checking
  • Cyclic Redundancy Checking

Lesson 06 - Routing - Duration: 1h 17m

  • Routing
  • Routes
  • Comparing Routing and Switching
  • The IP Data Packet Delivery Process
  • The Local and Remote Delivery Process
  • Static Routing
  • Routing Tables
  • Static Routing Tables
  • Routing Table Entries
  • Routing Entry Components
  • The Route Command
  • The Routing Process
  • Autonomous Systems
  • Router Roles in Autonomous Systems
  • Routing Methods in Autonomous Systems
  • Dynamic Routing
  • Comparing Static and Dynamic Routing
  • Distance-Vector Routing
  • Link-State Routing
  • Comparing Distance-Vector and Link-State Routing
  • Routers
  • Router Operation
  • About Routers
  • Router Features
  • Types of Routers
  • Routing Table Contents
  • Routing Metrics
  • Routing Examples
  • Brouters
  • Bridges vs. Routers
  • Virtual Routers
  • Hybrid Routing
  • Path-Vector Routing
  • Route Convergence
  • Routing Loops
  • Count-to-Infinity Loops
  • Split Horizon and Poison Reverse
  • Router Discovery Protocols
  • Link State Routing Protocols

Lesson 07 - TCP/IP Services - Duration: 1h 20m

  • TCP/IP Services
  • TCP
  • Data Transmission on IP Networks
  • Static and Dynamic IP Addressing
  • Static IP Address Assignment
  • APIPA
  • IP Configuration Utilities
  • DHCP
  • Port Addresses
  • Service Port Numbers
  • Demo - Port Numbers
  • Demo - netstat
  • DHCP and DHCPv6
  • IPv4 Lease Process
  • IPv6 Lease Process
  • IPv6 Router Flags
  • Demo - DHCP
  • FQDN
  • Name Resolution
  • DNS
  • DNS Components
  • Types of DNS Servers
  • Types of DNS Records
  • The DNS Hierarchy
  • The DNS Name Resolution Process
  • Legacy Name Resolution Methods
  • DNS (Cont.)
  • Top-level Domains
  • DNS Namespace
  • DNS Records
  • Demo - Examining DNS
  • Transport-layer Protocols
  • M and O Flags
  • UDP
  • IP
  • Static IP Addressing

Lesson 08 - WAN Infrastructure - Duration: 1h 4m

  • WAN Infrastructure
  • Key Points
  • Wide Area Networks
  • Packet vs. Circuit Switching
  • Demo - Packet Switching
  • WAN Connections
  • QoS
  • Mobile Devices
  • Cable Internet Access
  • MPLS
  • DSL
  • Metro-Ethernet
  • POTS/PSTN
  • ISDN
  • DSL (Cont.)
  • Cable
  • Satellite
  • Wireless
  • WiMAX
  • Cellular
  • T and E Lines
  • X.25 and Frame Relay
  • ATM
  • SONET and SDH
  • DWDM
  • PON
  • Voice-over-Data Systems
  • VoIP
  • VoIP Protocols
  • VoIP Software
  • Video Conferencing

Lesson 09 - Cloud and Virtualization Technologies - Duration: 57m

  • Cloud and Virtualization Technologies
  • Types of Server Virtualization
  • Virtual NICs
  • Virtual Switches
  • Virtual Firewalls
  • Virtual PBX
  • SANs
  • Virtual Computers
  • Virtualization Concerns and Risks
  • Demo - Viewing VM Components
  • Fibre Channel
  • iSCSI
  • NAS
  • Jumbo Frames
  • Cloud Concepts
  • Cloud Computing Features
  • Cloud Computing Implementations
  • IaaS
  • SaaS
  • PaaS
  • IDaaS
  • NaaS
  • Cloud Computing
  • Cloud Deployment
  • Cloud Categories
  • Risks and Concerns

Lesson 10 - Network Security Basics - Duration: 1h 43m

  • Network Security Basics
  • Wireless Security
  • Transmission Encryption
  • Demo - Wireless Security
  • Business Continuity
  • Disposal and Destruction
  • AAA
  • Authentication Factors
  • One-factor Authentication
  • Two-factor Authentication
  • Three-factor Authentication
  • Single Sign-on
  • Kerberos
  • Kerberos System Components
  • Kerberos Data Types
  • Kerberos Authentication Process
  • CHAP
  • EAP
  • PPPoE
  • Mutual Authentication
  • Cryptography
  • ROT13 Cipher
  • Wireless Security Threats
  • Vulnerabilities of Access Points
  • Wi-Fi Scanners
  • War Chalking Symbols
  • Denial-of-Service Attacks
  • Distributed DoS Attacks
  • DDoS Countermeasures
  • Man-in-the-Middle Attacks
  • Buffer Overflow
  • FTP Bounce Attacks
  • Smurf Attacks
  • Malware
  • Social Engineering
  • Attack Types
  • Social Engineering Countermeasures
  • TACACS+
  • 802.1x
  • Tokens
  • Biometrics
  • Mutual Authentication (Cont.)
  • SSO
  • EAP (Cont.)
  • Kerberos (Cont.)
  • Wireless Authentication Methods
  • Password Management
  • Keys
  • Symmetric Encryption in Action
  • Public Key Cryptography
  • Asymmetric Encryption in Action
  • Demo - Encryption
  • Public Key Cryptography (Cont.)
  • Public Key Infrastructure
  • Setup and Initialization Phase
  • Encryption
  • Encryption and Security Goals
  • Hashing Encryption
  • Key-Based Encryption
  • Digital Certificates
  • Certificates and Encryption
  • Encryption Devices
  • Benefits of Encryption Devices
  • SSL and Encryption
  • TLS
  • Wireless Encryption Protocols

Lesson 11 - Preventing Security Breaches - Duration: 2h 3m

  • Preventing Security Breaches
  • CIA Triad
  • Security Factors
  • Non-repudiation
  • Least Privilege
  • Risks
  • Data Breaches
  • Unauthorized Access
  • Hackers and Attackers
  • Security Controls
  • Security Policies
  • Common Security Policy Types
  • Adherence to Standards and Policies
  • Windows Security Policies
  • Group Policy
  • Permissions
  • Segmentation
  • Wireless Security
  • Disaster Recovery
  • Single Point of Failure
  • Vulnerabilities
  • Physical Security Threats and Vulnerabilities
  • Environmental Threats and Vulnerabilities
  • Unnecessary Running Services
  • Open Ports
  • Unpatched and Legacy Systems
  • Unencrypted Channels
  • Cleartext Credentials
  • Unsecure Protocols
  • Radio Frequency Emanation
  • Network Access Control
  • Access Control Lists
  • NAT
  • Threats
  • Attacks
  • Data Theft
  • Social Engineering Attacks
  • Types of Social Engineering Attacks
  • Insider Threats
  • Malware Attacks
  • Types of Malware Attacks
  • Types of Viruses
  • Effect of Malware on the Network
  • Compromised Systems
  • Buffer Overflows
  • Password Attacks
  • Types of Password Attacks
  • Packet and Protocol Abuse
  • IP Spoofing Attacks
  • DoS Attacks
  • Types of DoS Attacks
  • Man-in-the-Middle Attacks
  • Session Hijacking Attacks
  • Port Scanning Attacks
  • Replay Attacks
  • FTP Bounce Attacks
  • ARP Cache Poisoning Attacks
  • VLAN Hopping
  • Zero Day Attacks
  • Wireless Threats and Attacks
  • Firewalls and Proxies
  • Firewall Categories
  • Security Zones
  • Intranet Zone
  • Perimeter Network
  • DMZ Options
  • Screened Host
  • Bastion Host
  • Three-homed Firewall
  • Back-to-back Firewalls
  • Dead Zone
  • Traffic Filtering
  • NAT and PAT
  • Port Address Translation
  • Firewall Administration
  • Rule Planning
  • Port Security
  • Intrusion Detection
  • Events
  • NIDS
  • IDScenter for Snort
  • Example Snort Rule
  • HIDS
  • Advantages of HIDS over NIDS
  • Authentication
  • Authentication Factors
  • User Name and Password Authentication
  • Two-Factor Authentication
  • Multifactor Authentication
  • Strong Passwords
  • Patch Management
  • Security Policies (Cont.)
  • SSH
  • Demo - Network Security
  • Securing the Operating System
  • Windows Update
  • Updates
  • Demo - Vulnerability
  • Honeypots and Honeynets
  • Honeypot Examples
  • Honeypot Deployment
  • Account Expiration
  • Education
  • Communication
  • User Awareness

Lesson 12 - Responding to Security Incidents - Duration: 4m

  • Responding to Security Incidents
  • Human Resources Policies
  • Incident Response Policy
  • Preparation
  • Detection
  • Containment
  • Eradication
  • Recovery
  • Follow-up

Lesson 13 - Remote Networking - Duration: 28m

  • Remote Networking
  • RADIUS
  • RADIUS Authentication
  • TACACS+ vs. RADIUS
  • Remote Desktop Services
  • RADIUS (Cont.)
  • VPN Technologies
  • VPN Security Models
  • VPN Protocols
  • PPTP vs. L2TP
  • IPSec Protocols
  • IPSec Encryption
  • PPPoE
  • Tunneling Protocols

Lesson 14 - Network Management - Duration: 1h 1m

  • Network Management
  • Acceptable Use
  • Due Care
  • Privacy
  • Separation of Duties
  • Need to Know
  • Service-level Agreement
  • Network Analyzer
  • TCP/IP Utilities
  • IPConfig
  • Ifconfig
  • Ping (Packet Internet Groper)
  • Ping Troubleshooting
  • NSLookup and Tracert
  • Demo - Software Tools
  • Performance Monitor
  • Performance Objects
  • Bottlenecks
  • Configuration
  • Event Viewer
  • Event Information
  • Event Types
  • Device and Application Logging
  • Syslog
  • Syslog Alert Levels
  • SNMP
  • Network Monitor
  • Demo - Network Monitoring
  • Troubleshooting

Lesson 15 - Troubleshooting Network Issues - Duration: 2h 27m

  • Troubleshooting Network Issues
  • Common Problems
  • Troubleshooting
  • Troubleshooting Models
  • The Network+ Troubleshooting Model
  • Troubleshooting Documentation Template
  • Change Management
  • Configuration Documentation
  • Rationales
  • Methods
  • Troubleshooting with IP Configuration Utilities
  • The ping Utility
  • The traceroute and tracert Utilities
  • The arp Utility
  • The NBTSTAT Utility
  • The NETSTAT Utility
  • The nslookup Utility
  • WLAN Survey Software
  • SNIPS
  • Loopback Interface
  • Speed Test Sites
  • vLooking Glass Sites
  • Demo - Troubleshooting a Switch
  • Demo - Troubleshooting a Router
  • Network Technician's Hand Tools
  • Hardware Toolkit
  • Additional Tools
  • Software Toolkit
  • Cable Testing Devices
  • Cable Testing Device
  • Physical Cable Tests
  • Network Function Tests
  • Cable Certifier
  • Additional Features
  • Testing a Basic Permanent Link
  • Crimpers
  • Coax Crimper
  • Twisted-pair Cable Crimper
  • Using a Fiber Optic Cable Crimper
  • Terminating Fiber Optic Cable
  • Butt Set
  • Butt Set Uses
  • Modapt Device
  • Toner Probe
  • Using a Toner Probe
  • Punchdown Tools
  • Using a Punchdown Tool
  • Network Analyzer
  • Loopback Plugs
  • TDR
  • OTDR
  • Multimeters
  • Measuring Resistance
  • Measuring Voltage
  • Measuring Current
  • Measuring Continuity
  • Environmental Monitor
  • ASHRAE 9.9 Guidelines
  • Safety Rules
  • Wire Crimpers
  • Cable Strippers
  • Punch Down Tools (Cont.)
  • Circuit Testers
  • Multimeters (Cont.)
  • Voltmeters
  • Cable Testers
  • Cable Certifiers
  • Types of Cable Testers and Certifiers
  • Crossover Cables
  • Hardware Loopback Plugs
  • Time-Domain Reflectometers
  • Tone Generators and Tone Locators
  • Environment Monitors
  • Butt Sets
  • LED Indicators
  • Network Analyzers
  • Demarc
  • Wireless Testers
  • Light Meters
  • Physical Issues
  • Logical Issues
  • Routing and Switching Issues
  • Wireless Issues
  • Simultaneous Wired/Wireless Connections
  • Discovery of Neighboring Devices and Nodes
  • Common Security Configuration Issues
  • Misconfigured Firewalls
  • Misconfigured ACLs and Applications
  • Open or Closed Ports
  • Authentication Issues
  • Domain or Local Group Configuration
  • Malware
  • DoS Attacks
  • ICMP-Related Issues
  • Malicious Users
  • Improper Access
  • ARP Issues
  • Banner Grabbing
  • Jamming
  • Troubleshooting Wired Connections
  • Antivirus Software

Lesson 16 - Planning and Implementing a SOHO Network - Duration: 16m

  • Planning and Implementing a SOHO Network
  • Purposes of a Plan
  • Creating a Plan
  • Ongoing Planning
  • Implementing a Plan
  • Network Cable
 

Quiz Information

Once a topic is completed, our built-in review quiz allows you to assess your progress and identify areas where additional study may be required. After this assessment the student can go back give some extra attention to different subject areas within a topic if necessary.

Got questions? Contact us below or call 877-881-2235

Why Choose 360training.com?

  • Fast and easy courses completion
  • Get an education faster than at traditional colleges!
  • 100% online - No classroom attendance required.
  • Unlimited 24x7 online customer support
  • Over 500,000+ certified nationwide.