CompTIA Network+ Certification Preparation: Learn Networking
3.5 (64 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,276 students enrolled
Wishlisted Wishlist

Please confirm that you want to add CompTIA Network+ Certification Preparation: Learn Networking to your Wishlist.

Add to Wishlist

CompTIA Network+ Certification Preparation: Learn Networking

Learn the basics of Networking and pass the CompTIA Network+ certification exam.
3.5 (64 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,276 students enrolled
Last updated 12/2016
English
Current price: $10 Original price: $150 Discount: 93% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 7 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Understand the most important System Interconnection Models
  • Know the 7 Layers of the Open Systems Interconnect (OSI) Model
  • Understand the TCP/IP System Interconnect Model and its 4 layers
  • Distinguish between the OSI Model, TCP/IP Model (DoD Model), and TCP/IP - Internet Protocol Suite.
  • IPv4 and IPv6
  • Network Management
View Curriculum
Requirements
  • Recommended A+ certification and 9 months of networking experience or equivalent education
Description

CompTIA’s Network+ certification training readies students for a vendor neutral certification making IT professionals gain expertise in configuring, managing, installing, troubleshooting and maintaining basic computer networks. Thought by top experts, students gather essential knowledge of network configuration, technologies and installations as well as topologies and media security and management. The Network+ certification by CompTIA is an internationally recognized and coveted credential providing proof of a student’s knowledge, skills and ability to manage, maintain, troubleshoot, install, operate and configure a basic network infrastructure. These courses prepare the student for the CompTIA Network+ Certification Exam N10-006.

What You Will Learn

The curriculum for CompTIA’s Network+ Certification Course begins with the 7 Layers of the Open Systems Interconnect (OSI) ModelOSI Data Flow and Terminology. After a basic knowledge of OSI has been built, we begin discussing Communication Between Layers. Then we delve into TCP/IP System Interconnect Model LayersOpen Systems Interconnect Model Comparisons and Application Layer Examples. Next we cover Binary Numbers and iPv4 Addressing (addressing the how’s, why’s and The Big Picture. Once broader concepts are established, student’s learn the Purpose and Properties of IP AddressingiPv4 Bitwise NotationPrivate IPv4 Networks, and Subnetting. After an extensive overview of IPv6 Addressing we switch modes to The Purpose of Routing and SwitchingCommon Networking Protocols and finally Installing and Configuring. At the end of this course, a student walks away having had practical experience and comprehensive knowledge allowing confident execution of the CompTIA N+ N10-006 exam.

Who is the target audience?
  • Network Field ​Technician/​Engineers
  • Network ​Administrator
  • Help ​Desk ​Technician
  • Network ​Support ​Specialist
  • Network ​Analyst
Compare to Other CompTIA Network+ Courses
Curriculum For This Course
69 Lectures
07:00:45
+
7 Layers of the Open Systems Interconnect (OSI) Model
6 Lectures 43:16

This class covers OSI Data Flow of the Open Systems Interconnect (OSI) which covers the layers of the data flow from the transmit to the receive.

Preview 06:57

This class covers Layer 6 of the Open Systems Interconnect (OSI) Model, the presentation layer. Layer 6: Presentation is responsible for presenting the data in standard forms. Also, this class covers Layer 5:Session layer, which is responsible for facilitating communication. Layer 4:Transport Layer, which is responsible for multiplexing upper layer applications. And Layer 3: Network layer, which is responsible for network paths

OSI Model Overview - Layer 6-3
07:48

This class covers Layer 2 and 1 of the Open Systems Interconnect (OSI) Model. Layer 2: Data Link Layer, which is responsible for Logical Link Control and Media Access Control. Layer 1: Physical Layer is responsible for the flow of signals.

OSI Model Overview - Layer 2-1
08:02

This class cover OSI Data Flow of the Open Systems Interconnect (OSI) This covers the layers of the data flow from the transmit to the receive

OSI Data Flow
05:59

This class covers Terminology Open Systems Interconnect (OSI) . Terms will be explained to help understand.

Terminology
06:17

This class cover Communication between layers, Layer 3 & 4 Examples, and Memory Mnemonics of the Open Systems Interconnect (OSI). Communication layer, verticle communication, explains the data moving. Layer 3 and Layer 4 examples are shown. And Memory Mnemonics to help you remember prevous terms.

Communication between layers, Layer 3 & 4 Examples, and Memory Mnemonics
08:13
+
TCP/IP System Interconnect Model
2 Lectures 10:04

TCP/IP System Interconnect Model - Layer 3-1
06:09
+
Open Systems Interconnect Model Comparison
2 Lectures 09:53

Application Layer Examples
06:03
+
IPv4 Notation
10 Lectures 52:26

This class covers iPv4 and Base 2 Binary Numbers. IPv4 will cover the format, and Base 2 Binary Numbers explains how binary numbers work.

Preview 04:20

This class covers Decimal numbers and how they relate to Bionary numbers

Decimal - Binary Numbers
06:02

This class covers why to use iPv4 Addressing, this is part 1 of part 2.

Why iPv4 Addressing Part 1
04:17

This class covers why to use iPv4 Addressing, this is part 2 of part 2

Why iPv4 Addressing Part 2
06:40

This class covers the big picture of DNS, IPv4, and Mac, this is part 1 of part 2.


The Big Picture (DNS, IPv4, MAC) Part 1
05:21

This class covers the big picture of DNS, IPv4, and Mac, this is part 2 of part 2.

The Big Picture (DNS, IPv4, MAC) Part 2
07:10

This class covers and explains the purpose of IP Addressing, and properties of IP Addressing.

Purpose and Properties of IP Addressing
05:01

This class covers iPv4 Bitwise Notation, and walks through a bitwise representation.

iPv4 Bitwise Notation
05:00

This class covers iPv4 Classful Addressing Notation, and demonstates an example.

IPv4 Classful Addressing Notation
03:57

This class covers Subnetting, the practice of dividing a network intro two or more networks.

Subnetting
04:38
+
Private IPv4 Networks
4 Lectures 24:58

This class covers Private IPv4 Networks, and shows examples of Non-routable IP Addresses.

Preview 04:48

This class covers NAT'ing, and how IPv4 Non-routable networks are used for it. This is part 1 of part 2.

NAT’ing Part 1
09:03

This class covers NAT'ing, the drawbacks, 3 main types of NATing, this is part 2 of part 2.

NAT’ing Part 2
03:01

Unicast, Broadcast, Multicast, and APIPA (Automatic Private IP Addressing)
08:06
+
IPv6 Addressing
3 Lectures 15:23

This class covers IPv6, and explaining characteristics of IPv6. This is part 1 or part 2.

Preview 05:59

This class covers IPv6, and explaining the features of IPv6. This part 2 or part 2.

iPv6 Addressing Part 2
04:59

This class covers MAC Addressing, and how it is a unique hardware address or physical address of a network device.

MAC Addressing
04:25
+
The Purpose of Routing and Switching
5 Lectures 39:23

This class covers explaining Routing and Switching, due to complecity of the protocols, and user requirements, several routing protocols hace come into existence. This is part 1 of part 2.

Preview 07:59

This class covers the purpose of Routing and Switching. Routing metrics are reviewed, EIGRP Terminology is reviewed, and the IGRP is covered. This is part 2 of part 2.

The Purpose of Routing and Switching Part 2
07:31

This class covers the Open Shortest Path First Routing. This class reviews the area types, determining ID, priority commands.

Open Shortest Path First (OSPF) Routing
06:18

This class covers Spanning Tree Protocol, and how the STP is responsible for preventing loops with a switch network, and how it uses a Spanning Tree Algorithm, along with reviewing Port States, and Port Desgnations.

Spanning Tree Protocol
11:30

This class covers Virtual Local Area Networking, and methods on how to create a VLAN, and terms associated with VLAN.

Virtual Local Area Networking
06:05
+
Explain the Common Networking Protocols
5 Lectures 27:10

This class covers Default TCP/UDP Ports, TCP/IP Protocol, IPX/SPX, UDP, Telnet, FTP, TFTP, SNMP, and HTTP.

Preview 08:04

This class covers DNS Concepts and Components. This class reviews the DNS basics, and DNS Alias.

DNS Concepts and Components
04:49

This class covers Network Troubleshooting. It reviews the methodology for Network Troubleshooting.

Network Troubleshooting
01:58

This class covers Identify Virtual Network Components. It reviews the virtual switch, virtual server, and virtual desktops.

Identify Virtual Network Components
05:24

This class covers VTP Configuration. It reviews the typical CISCO configuration commands, and reviews things to remember.

VTP Configuration
06:55
+
Installing and Configuring
19 Lectures 01:50:29

This class goes over Repeaters which are used to boost signal.

Preview 04:23

This class continues going over Repeaters which are used to boost signal.

Repeaters Part 2
04:58

This class goes over Backhauling, Antennae, and Powerful Transmitters.

Backhauling
06:00

This class goes over Antennae, including, the energy they use, Omni-Directional Antennae, Semi-directional Antennae, and Highly-Directional Antennae. 

Antennae
05:21

This class goes over Antennae, including, the energy they use, Omni-Directional Antennae, Semi-directional Antennae, and Highly-Directional Antennae. 

Purpose and Properties DHCP
08:43

This class discusses Interference, Signal strength, Configuration, and Encryption type.

Troubleshooting Wireless Networks
06:37

This class discusses Bad/improper cables and Port configuration. 

Troubleshooting Routers and Switches Part 1
07:11

This class discusses VLAN assignment, Mismatched MTU/MTU black hole, Power failure, Bad/missing routes, and Duplicate IP address.

Troubleshooting Routers and Switches Part 2
07:23

This class discusses Cable length, Device types/requirements, Environment limitations, Equipment limitations, and Compatibility requirements.

Environment limitations in a SOHO Network
04:03

This class goes over Multimode fiber and Single mode fiber

Standard Media Types and Associated Properties Part 1
04:15

This class goes over UTP and STP for Shielded Twisted Pair cabling.

Standard Media Types and Associated Properties Part 2
04:29

This class goes over CAT3, CAT5, and CAT5e.

Standard Media Types and Associated Properties Part 3
04:07

This class goes over CAT6, CAT 6a, Straight-through, Plenum cable, ST(Straight tip), SC (Subscriber connector), and LC(Lucent connector).

Standard Media Types and Associated Properties Part 4
06:33

This class goes over Wireless Standards, MIMO – Multiple In Multiple Out, and Typical MIMO Devices.

Compare and Contrast Wireless Standards
05:41

This class covers T1 Circuits, OC – Optical Carrier, and DSL – Digital Subscriber Line.

WAN Types and Properties Part 1
06:59

This class covers Cable Modems, ISDN – Integrated Digital Subscriber Line, ISDN has two access methods, WiMAX, and WiMAX system consists of two parts.

WAN Types and Properties Part 2
05:50

This class goes over LTE – Long Term Evolution, LTE, Features of LTE, Topology, MESH, MESH Advantages and Disadvantages, and What a MESH looks like

Network Topologies Part 1
05:59

This class covers RING Topology, BUS Topology, BUS Topology Advantages and Disadvantages, STAR Topology, and STAR Topology Advantages and Disadvantages.

Network Topologies Part 2
06:21

This class covers DB Loss, TXRX reversed, Cable Placement, EMI/Interference, Distance, and Crosstalk.

Troubleshooting Common Physical Connectivity Problems
05:36
+
Network Management
13 Lectures 01:27:43

This class covers different LAN Technologies along with Identify components of wiring distribution.

Preview 06:51

This class covers Load Balancers, Proxy servers, Content Filters, and dealing with Troubleshoot Connectivity Issues.

The Purpose and Features of Various Network Appliances and Troubleshooting Conne
06:06

This class goes over the following tools to troubleshoot connectivity issues – PING, NBTSTAT, NETSTAT, TRACERT, IPCONFIG, NSLOOKUP, ROUTE, BootP, ARP, RARP, and Protocol Analyzer And Packet Analyzers.

Software Tools to Troubleshoot Connectivity Issues
04:33

This class covers Application log, System log, Security log, Antivirus log, Protocol Analyzers, Network Sniffers, Configuration Management, Policies, Privacy Policies, and Acceptable Use Policy.

Network Traffic Analysis and Configuration Management Documentation
06:24

This class covers Security Policy, Procedures, Configurations, Regulations, Cable Management, Asset Management, Baseline, Network Performance, and Important Elements of a VOIP Network.

Configuration Management Documentation and Network Performance
06:02

This class covers Important Elements of a VOIP Network, WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access), WPA2 (Wi-Fi Protected Access Version 2), and MAC Filtering.

Appropriate Wireless Security Measures
06:06

This class covers Virtual Private Networks (VPNs), EAP (Extensible Authentication Protocol), Public Key Infrastructure (PKI), and Kerberos.

Network Access Security and Methods of User Authentication
08:31

This class continues covering Kerberos, along with, Remote Authentication Dial-In User Service (RADIUS), Terminal Access Controller Access-Control System (TACACS ), CHAP, Multifactor authentication, Evil Twin, War Driving, Rogue APs, and WAR Chalking.

Methods of User Authentication Part 2
08:09

This class covers WEP Cracking, Distributed Denial of Service (DDoS), and Denial of Service (Dos).

Network Threats, Vulnerabilities, and Mitigation techniques Part 1
05:53

This class continues covering Distributed Denial of Service (DDoS), and Denial of Service.

Network Threats, Vulnerabilities, and Mitigation techniques Part 2
06:10

This class is over Smurf attacks, Man-In-The-Middle attacks, Virus, Worms, Buffer Overflow, and Packet Sniffing.

Network Threats, Vulnerabilities, and Mitigation techniques Part 3
08:21

This class covers Port Security, Dynamic Packet Filters, Implicit deny, Access control lists (ACLs), NAT (Network Address Translation), DMZ (DeMilitalized Zone), and IDS (Intrusion Detection System).

Install and Configure a Basic Firewall
06:41

This class covers Honeypots, Honeynets, Vulnerability Testing, Cabling, 568A/568B, 568B/568A Wiring Standard, Power over Ethernet (PoE), and Crossover Cable – Direct Connection Cable.

Types of Network Security Appliances and Methods
07:56
About the Instructor
CyberTraining 365
4.1 Average rating
2,481 Reviews
47,893 Students
16 Courses
Best Selling Instructor, 30,000+ Students

 Join the Cyber Security Industry in 2017!

Interested in starting a career in the Cyber Security Industry? 2017 is the time! 

Learning the fundamentals of Cyber Security provides you with a powerful, and very useful, set of skills. Learn to think like a hacker so you can better defend your networks and data by studying Penetration Testing and Ethical Hacking.   

Jobs in Cyber Security are plentiful. Receiving your Certified Ethical Hacker, Certified Hacker Forensic Investigator, Penetration Tester and Security+ certification will give you a strong background to more easily tackle and pick up more advanced exams, such as the CISSP certification.  

Get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over one million Cyber Security job openings globally. Demand is greatly outpacing supply which means more opportunity, job security and higher pay for you!   

But, don't take our word for it... take a look at the FREE previews (they are available in all our courses) and see for yourself!

About Us:

CyberTraining 365 is an online academy that offers most in-demand cybersecurity training and certification through different subscription models. Members have access to the ever growing library of quality, engaging videos that are taught by some of industry’s best and most recognized experts.

CyberTraining365 is powered by Social27's patented cloud-based eLearning platform, providing members with an engaging and collaborative learning environment. Through best in class content, social learning tools, and gamification, CyberTraining365 is taking eLearning from Isolation to Collaboration.

Samy Mkacher
4.3 Average rating
1,310 Reviews
37,634 Students
10 Courses
Join my army of 35,000+ superlearners!

(Français plus bas)

Why more than 35,000 students chose me as their instructor?

♜ Enroll in one of my courses and you'll see! ♜ 

1. Each of my courses is organized in a clear and precise manner. I always make sure that you know the prerequisite to teach you a new concept. 

2. I have a background in both humanities and computer science. It gives me an holistic view of teaching and pedagogy. 

3. To me, anything can be learned if you put in enough effort and persistence.

What makes me an ideal instructor?

1. I graduated a Master of Research  in Logics & Epistemology from the Sorbonne, Paris.   2. I have a background in computer sciences and programming languages such as C, C++, Python and Java. 

3. Because I came to learn technical skills quite late in my life, I have a very pedagogical way of teaching things ! 

≫ What can I do for you? Enroll in one of my courses and you'll see! ≪


Pourquoi plus de 35 000 étudiants m'ont choisi comme instructeur ? 

♜ Suis l'un de mes cours et tu verras ! ♜ 

1. Chaque cours que j'instruis est organisé de manière claire et précise. Je m'assure toujours que tu aies les pré-requis pour aborder une notion.
2. J'ai un double background en sciences humaines et sciences informatiques. Cela me permet d'avoir une vision d'ensemble de la pédagogie.
3. À mes yeux, tout peut être appris avec assez de volonté et de persistance.

Qu'est-ce qui fait de moi ton instructeur idéal ?

1. J'ai suivi un cursus universitaire solide et j'ai un Master de recherche de la Sorbonne en Logique et Épistémologie.
2. J'ai un background en sciences informatiques et dans les langages de programmation C, C++, Python et Java.
3. Parce que j'ai appris des sujets techniques assez tard dans ma vie, j'ai une manière très pédagogique d'instruire mes étudiants. 

≫ Que puis-je faire pour toi ? Suis l'un de mes cours et tu verras !