Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ Microsoft AZ-900
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Personal Development Mindfulness Personal Transformation Life Purpose Meditation CBT Emotional Intelligence
Web Development JavaScript React CSS Angular PHP Node.Js WordPress Vue JS
Google Flutter Android Development iOS Development React Native Swift Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
Microsoft Power BI SQL Tableau Business Analysis Data Modeling Business Intelligence MySQL Data Analysis Blockchain
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Business Plan Startup Online Business Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
IT & Software IT Certification CompTIA Network+

CompTIA Network+ Exam N10-006 (Part 2 of 2)

CompTIA Network+ Exam N10-006 (Part 2 of 2)
Rating: 0.0 out of 50.0 (0 ratings)
15 students
Created by Stone River eLearning
Last updated 10/2018
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • Prepare for the CompTIA Network+ certification exam (N10-006)
  • Learn the basic networking concepts
  • Implement industry standard networking methods
  • Understand and describe the components of a TCP/IP network
  • Implement a TCP/IP addressing scheme
  • Learn about the components of local area networks (LANs)
  • Understand the concept of wide area network (WAN) and associated technologies
  • Secure systems on a network
  • Troubleshoot issues in network security
  • Learn the tools, methods, and techniques used in managing a network

Requirements

  • The students are recommended to have a minimum of six months to one year experience of network-related IT experience. Alternatively, the students possessing equivalent knowledge can also enroll in this course.

Description

The CompTIA Network+ training course focuses on increasing knowledge, skills, and ability to manage, maintain, troubleshoot, install, operate, and configure a basic network infrastructure. The Network+ training course allows the students to fully understand and implement the concepts covered on the CompTIA’s Network+ exam using a sophisticated teaching methodology. The course prepares the students and reinforces the essential knowledge and skills for devices such as routers, switches, access points, and others.

CompTIA's Network+ is the premier vendor-neutral networking certification. This preparatory course is designed to provide the foundation you need not only to be productive on the job but also to be successful in more specialized topics and in your pursuit of the vendor-neutral certifications offered by CompTIA.

** This course is in 2 parts. Please purchase Part 1 as well for complete course.**

Who this course is for:

  • IT personnel who need a solid foundation in networking
  • Individuals interested in pursuing the CompTIA Network+ certification exam N10-006
  • Managers and supervisors who must oversee network-related activities

Course content

6 sections • 264 lectures • 6h 17m total length

  • Preview01:05
  • Preview00:48
  • Preview00:34
  • Preview00:45
  • Preview00:26
  • Preview00:58
  • Preview00:46
  • Preview00:51
  • Preview01:25
  • Preview00:35
  • Preview00:49
  • Preview00:47
  • Preview00:38
  • Group Policy
    00:47
  • Permissions
    00:35
  • Segmentation
    01:23
  • Wireless Security
    00:46
  • Disaster Recovery
    00:45
  • Single Point of Failure
    00:53
  • Vulnerabilities
    00:33
  • Physical Security Threats and Vulnerabilities
    00:55
  • Environmental Threats and Vulnerabilities
    00:23
  • Unnecessary Running Services
    00:56
  • Open Ports
    00:43
  • Unpatched and Legacy Systems
    01:04
  • Unencrypted Channels
    00:22
  • Cleartext Credentials
    00:23
  • Unsecure Protocols
    01:00
  • Radio Frequency Emanation
    01:14
  • Network Access Control
    02:19
  • Access Control Lists
    00:54
  • NAT
    04:57
  • Threats
    00:49
  • Attacks
    01:21
  • Data Theft
    00:59
  • Social Engineering Attacks
    00:34
  • Types of Social Engineering Attacks
    01:55
  • Insider Threats
    00:32
  • Malware Attacks
    00:36
  • Types of Malware Attacks
    03:43
  • Types of Viruses
    01:05
  • Effect of Malware on the Network
    00:49
  • Compromised Systems
    00:28
  • Buffer Overflows
    00:39
  • Password Attacks
    00:20
  • Types of Password Attacks
    02:35
  • Packet and Protocol Abuse
    01:18
  • IP Spoofing Attacks
    00:50
  • DoS Attacks
    00:32
  • Types of DoS Attacks
    00:44
  • Man-in-the-Middle Attacks
    00:41
  • Session Hijacking Attacks
    00:40
  • Port Scanning Attacks
    00:52
  • Replay Attacks
    01:01
  • FTP Bounce Attacks
    00:43
  • ARP Cache Poisoning Attacks
    00:56
  • VLAN Hopping
    01:40
  • Zero Day Attacks
    00:23
  • Wireless Threats and Attacks
    04:14
  • Firewalls and Proxies
    02:28
  • Firewall Categories
    00:59
  • Security Zones
    01:36
  • Intranet Zone
    00:29
  • Perimeter Network
    00:41
  • DMZ Options
    00:11
  • Screened Host
    00:28
  • Bastion Host
    00:38
  • Three-homed Firewall
    00:39
  • Back-to-back Firewalls
    01:02
  • Traffic Filtering
    00:40
  • Dead Zone
    01:28
  • NAT and PAT
    01:05
  • Port Address Translation
    01:47
  • Firewall Administration
    01:40
  • Rule Planning
    00:57
  • Port Security
    00:41
  • Intrusion Detection
    02:46
  • Events
    01:33
  • NIDS
    01:44
  • IDScenter for Snort
    00:55
  • Example Snort Rule
    00:43
  • HIDS
    01:02
  • Advantages of HIDS over NIDS
    01:01
  • Authentication
    00:25
  • Authentication Factors
    01:20
  • User Name and Password Authentication
    00:24
  • Two-Factor Authentication
    00:21
  • Multifactor Authentication
    00:28
  • Strong Passwords
    01:58
  • Patch Management
    00:54
  • Security Policies
    04:02
  • SSH
    01:31
  • Demo - Network Security
    04:30
  • Securing the Operating System
    02:28
  • Windows Update
    01:25
  • Updates
    00:41
  • Demo - Vulnerability
    04:36
  • Honeypots and Honeynets
    02:17
  • Honeypot Examples
    00:22
  • Honeypot Deployment
    00:59
  • Account Expiration
    00:50
  • Education
    01:34
  • Communication
    01:17
  • User Awareness
    00:56
  • Review - Question
    5 questions

  • Human Resources Policies
    01:15
  • Incident Response Policy
    00:47
  • Preparation
    00:30
  • Detection
    00:05
  • Containment
    00:35
  • Eradication
    00:15
  • Recovery
    00:32
  • Follow -up
    00:18
  • Review - Question
    5 questions

  • RADIUS
    00:31
  • RADIUS Authentication
    00:36
  • TACACS+ vs. RADIUS
    00:47
  • Remote Desktop Services
    01:36
  • RADIUS
    03:05
  • VPN Technologies
    04:14
  • VPN Security Models
    01:52
  • VPN Protocols
    01:55
  • PPTP vs. L2TP
    01:23
  • IPSec Protocols
    03:04
  • IPSec Encryption
    02:49
  • PPPoE
    00:34
  • Tunneling Protocols
    05:10
  • Review - Question
    5 questions

  • Acceptable Use
    00:19
  • Due Care
    00:37
  • Privacy
    00:42
  • Separation of Duties
    00:43
  • Need to Know
    00:37
  • Service -level Agreement
    00:31
  • Network Analyzer
    02:06
  • TCP/IP Utilities
    11:37
  • IPConfig
    02:39
  • Ifconfig
    00:51
  • Ping (Packet Internet Groper)
    02:51
  • Ping Troubleshooting
    01:30
  • NSLookup and Tracert
    01:02
  • Demo - Software Tools
    07:51
  • Performance Monitor
    01:55
  • Performance Objects
    02:28
  • Bottlenecks
    00:57
  • Configuration
    00:42
  • Event Viewer
    01:46
  • Event Information
    00:40
  • Event Types
    00:56
  • Device and Application Logging
    01:56
  • Syslog
    00:37
  • Syslog Alert Levels
    00:33
  • SNMP
    02:23
  • Network Monitor
    00:46
  • Demo - Network Monitoring
    03:34
  • Troubleshooting
    02:36
  • Troubleshooting (continued)
    03:44
  • Troubleshooting (continued)
    01:30
  • Review - Question
    5 questions

  • Common Problems
    07:39
  • Troubleshooting
    02:40
  • Troubleshooting Models
    01:32
  • The Network+ Troubleshooting Model
    01:49
  • Troubleshooting Documentation Template
    02:05
  • Change Management
    03:34
  • Configuration Documentation
    02:29
  • Rationales
    03:06
  • Methods
    07:25
  • Troubleshooting with IP Configuration Utilities
    00:49
  • The ping Utility
    02:47
  • The traceroute and tracert Utilities
    02:37
  • The arp Utility
    00:52
  • The NBTSTAT Utility
    00:48
  • The NETSTAT Utility
    00:34
  • The nslookup Utility
    01:11
  • WLAN Survey Software
    01:16
  • SNIPS
    01:08
  • Loopback Interface
    00:47
  • Speed Test Sites
    00:42
  • Looking Glass Sites
    01:09
  • Demo - Troubleshooting a Switch
    08:34
  • Demo - Troubleshooting a Router
    04:11
  • Network Technician's Hand Tools
    01:42
  • Hardware Toolkit
    03:17
  • Additional Tools
    02:12
  • Software Toolkit
    02:09
  • Cable Testing Devices
    00:33
  • Cable Testing Device
    00:39
  • Physical Cable Tests
    00:28
  • Physical Cable Test
    02:49
  • Network Function Tests
    00:48
  • Cable Certifier
    00:25
  • Additional Features
    00:50
  • Testing a Basic Permanent Link
    00:33
  • Crimpers
    00:38
  • Coax Crimper
    00:29
  • Twisted-pair Cable Crimper
    01:00
  • Using a Fiber Optic Cable Crimper
    00:42
  • Terminating Fiber Optic Cable
    00:28
  • Butt Set
    00:27
  • Butt Set Uses
    00:23
  • Modapt Device
    00:33
  • Toner Probe
    00:38
  • Using a Toner Probe
    00:25
  • Punchdown Tools
    00:47
  • Using a Punchdown Tool
    00:21
  • Network Analyzer
    00:23
  • Loopback Plugs
    00:30
  • TDR
    00:22
  • OTDR
    00:17
  • Multimeters
    00:20
  • Measuring Resistance
    00:20
  • Measuring Voltage
    00:12
  • Measuring Current
    00:13
  • Measuring Continuity
    00:18
  • Environmental Monitor
    00:19
  • ASHRAE 9.9 Guidelines
    00:25
  • Safety Rules
    02:14
  • Safety Rules (Cont.)
    01:24
  • Wire Crimpers
    00:24
  • Cable Strippers
    00:49
  • Punch Down Tools
    00:56
  • Circuit Testers
    00:12
  • Multimeters
    00:25
  • Voltmeters
    00:42
  • Cable Testers
    00:24
  • Cable Certifiers
    00:34
  • Types of Cable Testers and Certifiers
    00:32
  • Crossover Cables
    02:17
  • Hardware Loopback Plugs
    00:25
  • Time-Domain Reflectometers
    00:52
  • Tone Generators and Tone Locators
    01:39
  • Environment Monitors
    00:33
  • Butt Sets
    01:00
  • LED Indicators
    00:37
  • Network Analyzers
    00:31
  • Demarc
    00:32
  • Wireless Testers
    00:47
  • Light Meters
    00:40
  • Physical Issues
    02:08
  • Logical Issues
    01:58
  • Logical Issues (cont.)
    00:50
  • Routing and Switching Issues
    01:55
  • Wireless Issues
    05:56
  • Simultaneous Wired/Wireless Connections
    01:00
  • Discovery of Neighboring Devices and Nodes
    01:02
  • Common Security Configuration Issues
    00:42
  • Misconfigured Firewalls
    00:54
  • Misconfigured ACLs and Applications
    02:52
  • Open or Closed Ports
    00:57
  • Authentication Issues
    01:58
  • Domain or Local Group Configuration
    01:26
  • Malware
    00:48
  • DoS Attacks
    00:48
  • ICMP-Related Issues
    01:59
  • Malicious Users
    00:30
  • Improper Access
    00:43
  • ARP Issues
    02:36
  • Banner Grabbing
    00:44
  • Jamming
    00:34
  • Troubleshooting Wired Connections
    07:34
  • Antivirus Software
    01:36
  • Review - Question
    5 questions

  • Planning and Implementing a SOHO Network
    00:17
  • Purposes of a Plan
    02:07
  • Creating a Plan
    03:50
  • Ongoing Planning
    01:49
  • Implementing a Plan
    04:10
  • Network Cable
    03:13
  • Review - Question
    5 questions

Instructor

Stone River eLearning
500,000+ Happy Udemy Students
Stone River eLearning
  • 4.2 Instructor Rating
  • 53,822 Reviews
  • 677,898 Students
  • 308 Courses

At Stone River eLearning, technology is all we teach. If you're interested in IT, programming, development or design - we have it covered. 

Check out our huge catalog of courses and join the over 1,200,000+ students currently taking Stone River eLearning courses. We currently offer 800+ different technology training courses on our Stone River eLearning website and are adding new courses on hot and trending topics every month. A subscription option is available for those with a real passion for learning.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Impressum Kontakt
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.