CompTIA Network+
Course
In London
Description
-
Type
Course
-
Location
London
-
Duration
5 Days
The key objective of the course is to provide enough information for a student to become a competent network support engineer, capable of taking and passing the Network+ Certification test.
Facilities
Location
Start date
Start date
Reviews
Course programme
- LANs, WANs and the Internet
- Uses and Benefits of aLAN
- Network Components
- Server-based Networks
- Peer-to-Peer Networks
- Introduction to Topologies
- Physical and Logical Topologies
- Star
- Bus
- Ring
- Other Topologies
- Introduction to Transmission Media
- Media Bandwidth
- Media Types
- Twisted-pair Cable (TP)
- Coaxial Cable
- Fiber Optic Cable
- Firewire (IEEE 1394)
- USB
- Structured Wiring Systems
- Crimping Cables
- Wiring forUTPCable
- Wiring for a Cross-over Cable
- Installing aNIC
- Network Card Drivers
- Introducing theOSImodel
- Physical Layer
- Data Link Layer
- 802 Standards
- Media Access
- Contention
- Token Passing
- Demand Priority
- Ethernet
- Token Ring
- Fiber Distributed Data Interface (FDDI)
- AppleTalk
- Network components (Repeaters, Hubs, MAUs, Switches, Bridges)
- Network Layer
- Transport Layer
- Routers
- Static and Dynamic Routers
- B Routers
- Layer 3 Switches
- Overview of Transport Protocols
- Characteristics of Network Protocols
- Choosing a Protocol
- Adding and Removing Protocols
- Session, Presentation and Application Layers
- Client/Server Protocols
- Server Network Operating Systems
- Workstation Software
- Identifying a Machine on the Network
- Connecting to Network Resources
- Using Network Printers
- Shared Fax Systems
- Macintosh Clients
- Network Applications
- Scheduling
- GroupWare
- Shared Network Applications
- Novell NetWare
- Windows NT
- The Windows 2000 Family
- The Windows 2003 Family
- Combining Windows and NetWare
- The Network File System (NFS)
- UNIX
- Linux
- OS/2
- Apple Macintosh
- Client-Server Systems
- Network Attached Storage
- Configuring network services
- Development ofTCP/IP
- Why isTCP/IP so Popular?
- TCP/IP as an Open Standard
- TheTCP/IP Protocol Suite
- Transmission Control Protocol (TCP)
- User Datagram Protocol (UDP)
- Internet Protocol
- TCP/IP Services
- E-mail (SMTP Protocol)
- Post Office Protocol (POP)
- Internet Message Access Protocol (IMAP)
- The World Wide Web:HTTP
- OtherTCP/IP Services
- TCP/IP Ports
- TCP/IP Filtering
- IP Addresses
- Subnet Mask
- Creating Subnets
- Planning an IP Addressing Scheme
- Applying for an Internet Network Address
- Address Allocation for Private Networks
- Default Gateway
- Supernetting
- IP Version 6
- ZEROCONFNetworks
- TCP/IP Configuration Parameters
- Dynamic Host Configuration Protocol
- Host Names and FQDNs
- Name Resolution using theHOSTSFile
- Name Resolution usingDNS
- Server (NetBIOS) Names
- UNCNames
- Name Discovery
- Using anLMHOSTSFile
- WINSServers
- TCP/IP Utilities
- ARP/RARP
- PING
- TRACERT/TRACEROUTE
- NETSTAT
- ROUTE
- NBTSTAT
- IPCONFIG
- IFCONFIG
- NSLOOKUP
- FTP
- Wireless Networks
- Wireless Transmission Techniques
- Microwave
- Infrared
- Radio Single Frequency and Spread Spectrum
- Bluetooth
- Setting Up a Wireless Network
- WANOverview
- Dedicated / Leased Lines
- Digital Leased Lines
- Switched Networks
- Circuit Switching
- Packet Switching
- X.25
- Frame Relay
- ISDN
- Fiber Distributed Data Interface (FDDI)
- Public Networks
- The Internet
- Protocols (SLIP /PPP)
- Tunnelling / Encapsulation (PPTP / L2TP)
- Requirements for Remote Connectivity
- Remote Client and Server Configuration
- Virtual Private Networks (VPN)
- Remote Desktop Protocol (RDP)
- Intranets and Extranets
- VLANs
- Troubleshooting Remote Connectivity for Small Offices
- Network Operating System Security
- Administrative / Supervisory Account
- Creating and Managing User Accounts
- Groups
- Setting Share Permissions
- Auditing
- WindowsNTFSSecurity
- Setting File and Directory Permissions
- What Makes an Operating System Secure?
- Types of Attack
- Types of Defense
- Password Principles
- Authenticating User Logon Requests (Kerberos,RADIUS, Wireless Security)
- Encryption and Password Hashing
- Encryption Technology
- Encryption Systems
- IPSec
- Firewalls
- Proxy Servers
- NATandICS
- Fault Tolerance and Redundancy
- Backup Strategies
- Virus Prevention
- Power Management
- UPS
- Disk Fault Tolerance
- Troubleshooting Equipment
- Terminators
- Loopback Test
- Crossover Cable
- Volt-Ohm Meters
- Tone Generators and Probe
- Cable Testers and Certifiers
- Time-Domain Reflectometer (TDR)
- Product
- Test Frame and Packet Generators
- Network Monitors
- Protocol Analyzer
- SNMP
- Overview of Troubleshooting Procedures
- Troubleshooting Networks
- Troubleshooting Cabling
- Troubleshooting Infrastructure
- Routing Issues
- Troubleshooting Name Resolution
- Establishing a Session
- Troubleshooting Services
- User Problems Service Packs and Driver Updates
- Performance Monitor
- Network Monitor
CompTIA Network+