CompTIA Network+ Exam N10-006 (Part 2 of 2)
What you'll learn
- Prepare for the CompTIA Network+ certification exam (N10-006)
- Learn the basic networking concepts
- Implement industry standard networking methods
- Understand and describe the components of a TCP/IP network
- Implement a TCP/IP addressing scheme
- Learn about the components of local area networks (LANs)
- Understand the concept of wide area network (WAN) and associated technologies
- Secure systems on a network
- Troubleshoot issues in network security
- Learn the tools, methods, and techniques used in managing a network
Requirements
- The students are recommended to have a minimum of six months to one year experience of network-related IT experience. Alternatively, the students possessing equivalent knowledge can also enroll in this course.
Description
The CompTIA Network+ training course focuses on increasing knowledge, skills, and ability to manage, maintain, troubleshoot, install, operate, and configure a basic network infrastructure. The Network+ training course allows the students to fully understand and implement the concepts covered on the CompTIA’s Network+ exam using a sophisticated teaching methodology. The course prepares the students and reinforces the essential knowledge and skills for devices such as routers, switches, access points, and others.
CompTIA's Network+ is the premier vendor-neutral networking certification. This preparatory course is designed to provide the foundation you need not only to be productive on the job but also to be successful in more specialized topics and in your pursuit of the vendor-neutral certifications offered by CompTIA.
** This course is in 2 parts. Please purchase Part 1 as well for complete course.**
Who this course is for:
- IT personnel who need a solid foundation in networking
- Individuals interested in pursuing the CompTIA Network+ certification exam N10-006
- Managers and supervisors who must oversee network-related activities
Course content
- Preview01:05
- Preview00:48
- Preview00:34
- Preview00:45
- Preview00:26
- Preview00:58
- Preview00:46
- Preview00:51
- Preview01:25
- Preview00:35
- Preview00:49
- Preview00:47
- Preview00:38
- 00:47Group Policy
- 00:35Permissions
- 01:23Segmentation
- 00:46Wireless Security
- 00:45Disaster Recovery
- 00:53Single Point of Failure
- 00:33Vulnerabilities
- 00:55Physical Security Threats and Vulnerabilities
- 00:23Environmental Threats and Vulnerabilities
- 00:56Unnecessary Running Services
- 00:43Open Ports
- 01:04Unpatched and Legacy Systems
- 00:22Unencrypted Channels
- 00:23Cleartext Credentials
- 01:00Unsecure Protocols
- 01:14Radio Frequency Emanation
- 02:19Network Access Control
- 00:54Access Control Lists
- 04:57NAT
- 00:49Threats
- 01:21Attacks
- 00:59Data Theft
- 00:34Social Engineering Attacks
- 01:55Types of Social Engineering Attacks
- 00:32Insider Threats
- 00:36Malware Attacks
- 03:43Types of Malware Attacks
- 01:05Types of Viruses
- 00:49Effect of Malware on the Network
- 00:28Compromised Systems
- 00:39Buffer Overflows
- 00:20Password Attacks
- 02:35Types of Password Attacks
- 01:18Packet and Protocol Abuse
- 00:50IP Spoofing Attacks
- 00:32DoS Attacks
- 00:44Types of DoS Attacks
- 00:41Man-in-the-Middle Attacks
- 00:40Session Hijacking Attacks
- 00:52Port Scanning Attacks
- 01:01Replay Attacks
- 00:43FTP Bounce Attacks
- 00:56ARP Cache Poisoning Attacks
- 01:40VLAN Hopping
- 00:23Zero Day Attacks
- 04:14Wireless Threats and Attacks
- 02:28Firewalls and Proxies
- 00:59Firewall Categories
- 01:36Security Zones
- 00:29Intranet Zone
- 00:41Perimeter Network
- 00:11DMZ Options
- 00:28Screened Host
- 00:38Bastion Host
- 00:39Three-homed Firewall
- 01:02Back-to-back Firewalls
- 00:40Traffic Filtering
- 01:28Dead Zone
- 01:05NAT and PAT
- 01:47Port Address Translation
- 01:40Firewall Administration
- 00:57Rule Planning
- 00:41Port Security
- 02:46Intrusion Detection
- 01:33Events
- 01:44NIDS
- 00:55IDScenter for Snort
- 00:43Example Snort Rule
- 01:02HIDS
- 01:01Advantages of HIDS over NIDS
- 00:25Authentication
- 01:20Authentication Factors
- 00:24User Name and Password Authentication
- 00:21Two-Factor Authentication
- 00:28Multifactor Authentication
- 01:58Strong Passwords
- 00:54Patch Management
- 04:02Security Policies
- 01:31SSH
- 04:30Demo - Network Security
- 02:28Securing the Operating System
- 01:25Windows Update
- 00:41Updates
- 04:36Demo - Vulnerability
- 02:17Honeypots and Honeynets
- 00:22Honeypot Examples
- 00:59Honeypot Deployment
- 00:50Account Expiration
- 01:34Education
- 01:17Communication
- 00:56User Awareness
- 5 questionsReview - Question
Instructor
At Stone River eLearning, technology is all we teach. If you're interested in IT, programming, development or design - we have it covered.
Check out our huge catalog of courses and join the over 1,200,000+ students currently taking Stone River eLearning courses. We currently offer 800+ different technology training courses on our Stone River eLearning website and are adding new courses on hot and trending topics every month. A subscription option is available for those with a real passion for learning.