You are on page 1of 7

CompTIA Network+ 2009 Training

Video 1 Welcome to CompTIA Network+ 2009 Training About Your Instructor and Train Signal What's Covered in This Course Are You Ready to Get Started? What is a Network? Client/Server Peer-to-Peer LAN - Local Area Network CAN - Campus Area Network MAN - Metropolitan Area Network WAN - Wide Area Network How Do We Make Connections? What is a Protocol? Introduction to Addressing Wired Media Twisted Pair Wired Media Coaxial Wired Media Fiber Optic What is the Plenum? Common Connectors Wiring Standards LAN Technology Types Ethernet Standard Ethernet Fast Ethernet Gigabit Ethernet 10 Gigabit Ethernet Wiring Distribution
Page 1 of 7

Video 2 Basic Networking Fundamentals

Video 3 Network Media

Video 4 Network Topologies What Does Topology Mean? Bus Star Ring Mesh Hybrid WAN Technologies - Circuit and Pocket Switching POTS, PSTN, T1/E1, and T3/E3 ISDN SONET/OC-x Frame Relay and ATM MPLS - Multiprotocol Label Switching DSL Cable Modem, Satellite and Wireless What is a VPN? What is a VLAN? Definition of a Protocol Standards of Communication What is the OSI Model? Defining OSI Model Layers How Data Travels Through OSI Model Networking Hardware in OSI Model TCP/IP Protocol Suite What is the TCP/IP (DARPA) Model? Transport Layer Protocols Internet Layer Protocols Types of TCP/IP Communication
Page 2 of 7

Video 5 OSI Model

Video 6 TCP/IP

Working with IP Addresses Planning an IP Addressing Scheme Rules for IP Addressing What is Classful IP Addressing? Private vs. Public IP Addressing What is NAT? How Computers Get IP Addresses Working with Binary Numbers Converting Binary to Decimal and Vice Versa Binary IP Addresses Binary Subnet Masks Internetworking - What is a Router? What is a Default Gateway? What is Subnetting? Classful vs. Classless Interdomain Routing (CIDR) Subnetting with CIDR & VLSM CIDR Notation Fundamentals of IPv6 IPv6 Addressing Types of IPv6 Addresses FTP - File Transfer Protocol TFTP - Trivial File Transfer Protocol HTTP and HTTPS NTP - Network Time Protocol POP3 and IMAP4 SMTP - Simple Mail Transfer Protocol DHCP - Dynamic Host Configuration Protocol DNS - Domain Naming System Telnet and SSH
Page 3 of 7

Video 7 TCP/IP Protocols

SNMP - Simple Network Management Protocol SIP and RTP TLS - Transport Layer Security Modem and NIC Repeater and Hub Bridge and Switch Router Different Types of Switches Advanced Switch Functionality Firewall and Proxy Server Wireless Access Point Basic DHCP Server and DNS Server CSU/DSU Media Converters Load Balancer and Bandwidth Shaper Understanding Routing Tables Adding and Deleting Routes Static vs. Dynamic Routing Routing Protocols Distance Vector Protocols: RIP, RIPv2, and BGP Link State Protocols: OSPF and IS-IS Hybrid Routing Protocol: EIGRP What is Convergence? IGP vs. EGP Benefits of Wireless Networking Components of a Wireless Access Point Where to Place a WAP
Page 4 of 7

Video 8 Network Devices

Video 9 - Routing

Video 10 Wireless Networking

Wireless Networking Standards RF Channels How to Secure a Wireless Network WEP - Wired Equivalency Privacy WPA - Wi-Fi Protected Access 802.1x Setting Up a Wireless Access Point ipconfig/ifconfig/arp Utilities Overview ping/arp ping Utilities Overview tracert/traceroute Utilities Overview mtr Utility Overview netstat/nbstat/route Utilities Overview nslookup/dig/host Utilities Overview ipconfig Command arp Command ping Command tracert Command netstat Command nslookup Command Reasons for Network Performance Optimization Quality of Service (QoS) Traffic Shaping Load Balancing Fault Tolerance RAID 0 - Disk Striping RAID 1 - Disk Mirroring and Duplexing RAID 5 - Disk Striping with Parity Other Popular Forms of RAID
Page 5 of 7

Video 11 Networking Command Line Tools

Video 12 Network Performance Optimization

Caching Engines Cable Strippers Snips and Crimpers Punch Down Tool Cable Testers and Certifiers Time Domain Reflectometer (TDR) and Optical Time Domain Reflectometer (OTDR) Toner Probe Voltage Event Recorder Multimeter Protocol Analyzer, Temperature Monitor, and Butt Set Packet Sniffers Port Scanners Intrusion Detection Software (IDS) and Intrusion Prevention Software (IPS) System, Event, and History Logs Why is Documentation so Important? What Should I Document? Wiring Schematics Physical and Logical Network Diagrams Baseline Network Policies Network Procedures Network Configuration Regulations The Process of Troubleshooting - Gather Information Who is Affected?
Page 6 of 7

Video 13 Network Tools

Video 14 Network Monitoring

Video 15 - Documentation

Video 16 - Troubleshooting

What's Changed? Why is This Happening? Can I Handle It? Process of Finding a Solution Document Everything Physical Issues Logical Issues Issues to Escalate Wireless Issues Firewalls Other Security Devices Filtering and Access Control Lists (ACLs) Tunneling and Encryption Remote Access and Control Protocols Authentication, Authorization, and Accounting (AAA) Public Key Infrastructure (PKI) Cryptography Symmetric Key Encryption Asymmetric Key Encryption PKI Examples 802.1x Standard Kerberos Remote Access Authentication Protocols Device Security Viruses, Worms, and Trojan Horses Denial of Service (DoS) and Smurf Social Engineering, Man in the Middle, and Rogue Access Points Who are Your Attackers? What Can Be Done to Protect the Network?
Page 7 of 7

Video 17 Network Security

You might also like