SlideShare a Scribd company logo
1 of 15
Download to read offline
www.infosectrain.com
Introduction to CompTIA Network+ Certification (N10-007)
InfosecTrain
About Us
InfosecTrain is one of the finest Security and Technology Training and Consulting organization, focusing on a range of IT Security Trainings
and Information Security Services. InfosecTrain was established in the year 2016 by a team of experienced and enthusiastic professionals,
who have more than 15 years of industry experience. We provide professional training, certification & consulting services related to all areas
of Information Technology and Cyber Security.
4
I nt ro d u c t i o n to C o m p T I A N et wo r k + C e r t i f i cat i o n ( N 1 0 - 0 0 7 )
A b o u t T h e C o m p T I A N e t w o r k + ( P l u s )
I n t h e I T s e c t o r, t h e N e t w o r k + c e r t i f i c a t i o n i s a v a l u a b l e c e r t i f i c a t i o n . T h i s N e t w o r k +
c e r t i f i c a t e f o c u s e s o n a p e r s o n ’s s k i l l a n d e x p e r t i s e i n n e t w o r k a r c h i t e c t u r e , r e p a i r,
m a n a g e m e n t , a n d m a i n t e n a n c e .
F o r n e t w o r k t e c h n i c i a n s , N e t w o r k + ( N e t w o r k P l u s ) i s a m i d - l e v e l c e r t i f i c a t e . T h i s
e x a m i s i n t e n d e d t o t e s t t h e k n o w l e d g e o f t h e n e t w o r k t e c h n i c i a n i n t e r m s o f
n e t w o r k a r c h i t e c t u r e , i n s t a l l a t i o n , c o n f i g u r a t i o n , a n d t r o u b l e s h o o t i n g .
T h e N e t w o r k + ( N e t w o r k P l u s ) c e r t i f i c a t e e x a m i n a t i o n i s p r o v i d e d b y C o m p T I A (
C o m p u t i n g Te c h n o l o g y I n d u s t r y A s s o c i a t i o n ) , w h i c h i s o n e o f t h e l e a d i n g c e r t i f i c a t i o n
p r o v i d e r s i n t h e m a r k e t . I f y o u w a n t t o k n o w m o r e a b o u t C o m p T I A c l i c k h e r e . T h e
C o m p T I A N e t w o r k + i s t h e o n l y e x a m c e r t i f i c a t i o n t h a t i n c l u d e s b o t h w i r e d a n d
w i r e l e s s n e t w o r k i n g .
Ta r g e t A u d i e n c e
T h i s e x a m i s u s e f u l f o r t h e f o l l o w i n g i n d i v i d u a l s :
• J u n i o r N e t w o r k A d m i n i s t r a t o r
• I S C o n s u l t a n t
• N e t w o r k F i e l d E n g i n e e r
• J u n i o r S y s t e m E n g i n e e r
C C I S O C e r t i f i c a t i o n
5
• C o m p u t e r Te c h n i c i a n
• H e l p D e s k Te c h n i c i a n
• S y s t e m E n g i n e e r
• N e t w o r k A n a l y s t
P r e r e q u i s i t e : C o m p T I A A + c e r t i f i c a t i o n i s r e c o m m e n d e d f o r t h i s c e r t i f i c a t i o n b u t
m a n y I T e x p e r t s p r e f e r t o s k i p t h e C o m p T I A A + q u a l i f i c a t i o n a n d i n s t e a d , d i r e c t l y
p u r s u e t h e C o m p T I A N e t w o r k + c e r t i f i c a t i o n t r a i n i n g b e c a u s e t h e y a l r e a d y h a v e a
b a s i c u n d e r s t a n d i n g o f c o m p u t e r s .
W h i l e e v e r y o n e c a n t a k e t h e N e t w o r k + t e s t , i t i s r e c o m m e n d e d t h a t y o u h a v e a t
l e a s t 9 m o n t h s o f e x p e r i e n c e a s a n e t w o r k t e c h n i c i a n . C a n d i d a t e s s h o u l d h a v e
K n o w l e d g e o f m e d i a , n e t w o r k i n g t e c h n o l o g y, s e c u r i t y, t o p o l o g i e s , s e t u p , a n d
i n s t a l l a t i o n .
N e t w o r k + c e r t i f i e s t h a t a n I T s p e c i a l i s t h a s t h e e x p e r i e n c e a n d a b i l i t i e s t o :
• D e s i g n a n d i m p l e m e n t a t i o n o f f u n c t i o n a l n e t w o r k
• C o n f i g u r e , m a i n t a i n , a n d s e c u r e e s s e n t i a l n e t w o r k
• Tr o u b l e s h o o t i n g
• I d e n t i f y i n g t h e b e n e f i t s a n d d r a w b a c k s o f c u r r e n t n e t w o r k s e t u p s
• S u p p o r t t h e d e v e l o p m e n t o f v i r t u a l i z e d n e t w o r k s
6
W h a t ’s N e w ?
C o m p T I A N e t w o r k + h a s b e e n u p d a t e d t h e c u r r e n t n e t w o r k t e c h n o l o g i e s a n d a d d
s e v e r a l d o m a i n :
• C r i t i c a l s e c u r i t y c o n c e p t s t o h e l p i n g n e t w o r k i n g p r o f e s s i o n a l s w o r k w i t h s e c u r i t y
p r a c t i t i o n e r s
• B e s t p r a c t i c e o f c l o u d c o m p u t i n g
• L a t e s t h a r d w a r e a n d v i r t u a l i z a t i o n m e t h o d s a r e c o v e r e d
• C o n c e p t s t o g i v e I n d i v i d u a l s v a r i e t y o f s k i l l s t o k e e p t h e n e t w o r k s t a b l e
S k i l l s Yo u W i l l L e a r n
• E x p l a i n t h e a i m o f v a r i o u s n e t w o r k i n g p r i n c i p l e s a n d h o w t o p u t i t i n t o p r a c t i c e
• D e m o n s t r a t e t h e c a b l i n g , d e v i c e , a n d s t o r a g e t e c h n o l o g i e s
• U s e b e s t p r a c t i c e s t o m a i n t a i n t h e n e t w o r k , p o l i c i e s a n d e n s u r e b u s i n e s s p r o c e s s e s
• A n a l y z e p h y s i c a l s e c u r i t y & c o m m o n a t t a c k s w h i l e p r o t e c t i n g t h e w i r e d a n d w i r e l e s s
n e t w o r k
• N e t w o r k t r o u b l e s h o o t i n g a n d l e a r n i n g a b o u t t o o l s
7
C o u rs e C o nte nt
C h a p t e r 1 : F u n d a m e n t a l s
• M o d u l e A : N e t w o r k i n g c o n c e p t s
• M o d u l e B : C l a s s i f y i n g n e t w o r k s
• M o d u l e C : N e t w o r k m o d e l s
• M o d u l e D : T h e t r o u b l e s h o o t i n g p r o c e s s
C h a p t e r 2 : P h y s i c a l n e t w o r k s
• M o d u l e A : C o n n e c t i o n t e c h n o l o g i e s
• M o d u l e B : N e t w o r k d e v i c e s
• M o d u l e C : C o p p e r m e d i a
• M o d u l e D : O p t i c a l m e d i a
• M o d u l e E : E t h e r n e t s t a n d a r d s
C h a p t e r 3 : T C P / I P n e t w o r k s
• M o d u l e A : I P a d d r e s s i n g
• M o d u l e B : C o r e p r o t o c o l s
• M o d u l e C : N e t w o r k p o r t s a n d a p p l i c a t i o n s
8
C h a p t e r 4 : I n t e r n e t w o r k i n g
• M o d u l e A : S w i t c h i n g
• M o d u l e B : R o u t i n g
C h a p t e r 5 : W i r e l e s s L A N s
• M o d u l e A : W i r e l e s s n e t w o r k s
• M o d u l e B : W i r e l e s s L A N s t a n d a r d s
C h a p t e r 6 : W i d e a r e a n e t w o r k s
• M o d u l e A : I n t e r n e t c o n n e c t i o n s
• M o d u l e B : WA N i n f r a s t r u c t u r e
C h a p t e r 7 : C y b e r s e c u r i t y p r i n c i p l e s
• M o d u l e A : G o a l s a n d t h r e a t s
• M o d u l e B : D i g i t a l s e c u r i t y
• M o d u l e C : Tr a n s p o r t e n c r y p t i o n
C h a p t e r 8 : D e f e n d i n g n e t w o r k s
• M o d u l e A : N e t w o r k s e c u r i t y c o m p o n e n t s
• M o d u l e B : N e t w o r k a u t h e n t i c a t i o n s y s t e m s
• M o d u l e C : H a r d e n i n g n e t w o r k s
9
C h a p t e r 9 : E v o l v i n g n e t w o r k t e c h n o l o g i e s
• M o d u l e A : N e t w o r k c o n v e r g e n c e
• M o d u l e B : V i r t u a l a n d c l o u d s y s t e m s
C h a p t e r 1 0 : N e t w o r k o p e r a t i o n s
• M o d u l e A : M o n i t o r i n g a n d o p t i m i z a t i o n
• M o d u l e B : F a u l t t o l e r a n c e a n d d i s a s t e r r e c o v e r y
• M o d u l e C : I n c i d e n t r e s p o n s e
C h a p t e r 1 1 : N e t w o r k p l a n n i n g
• M o d u l e A : N e t w o r k p o l i c y d e s i g n
• M o d u l e B : N e t w o r k i n s t a l l a t i o n
• M o d u l e C : M a i n t e n a n c e a n d u p g r a d e s
10
E xa m D eta i l s
11
E xa m O b j e c t i ve s
Yo u c a n f i n d s t u d y m a t e r i a l s f o r t h e C o m p T I A N e t w o r k + e x a m i n a t i o n o n t h e
C o m p T I A o f f i c i a l w e b s i t e . C a n d i d a t e s c a n l e a r n t h e b a s i c c o n c e p t s o f i n s t a l l i n g ,
c o n f i g u r i n g , a n d t r o u b l e s h o o t i n g n e t w o r k t e c h n o l o g i e s w i t h t h i s C o m p T I A
N e t w o r k + ( N 1 0 - 0 0 7 ) e x a m g u i d e . T h e C o m p T I A N e t w o r k + e x a m c o d e i s N 1 0 - 0 0 7 .
C o m p T I A N e t w o r k + e x a m o b j e c t i v e s a r e l i s t e d b e l o w :
12
C o m p T I A N e t w o r k + i s t r u s t e d b y a n u m b e r o f c o m p a n i e s :
• A p p l e
• B l u e c r o s s B l u e S h i e l d
• C a n o n
• D e l l
• H p
• I n t e l
• R i c o h
• D e p a r t m e n t o f D e f e n s e ( U n i t e d S t a t e O f A m e r i c a )
• Ve r i z o n
C o m p T I A L a b s f o r N e t w o r k +
C o m p T I A L a b s f o r N e t w o r k + s u p p o r t s c a n d i d a t e s i n o b t a i n i n g t h e s k i l l s n e c e s s a r y f o r
N e t w o r k + c e r t i f i c a t i o n . T h e y c a n g a i n a b e t t e r u n d e r s t a n d i n g o f t h e s u b j e c t a s w e l l
a s t h e p r a c t i c a l a s p e c t s o f t h e N e t w o r k c e r t i f i c a t i o n e x a m r e q u i r e m e n t s . C o m p T I A
L a b s a l s o s u p p o r t s c a n d i d a t e s i n a d d r e s s i n g t h e p r a c t i c a l i m p l i c a t i o n s o f N e t w o r k
e x a m g o a l s a n d c o m p l e m e n t i n g e x i s t i n g t r a i n i n g b y p r o v i d i n g a c c e s s t o r e a l - w o r l d
e q u i p m e n t / s o f t w a r e e n v i r o n m e n t s .
13
C o m p T I A N e t w o r k + I n s t r u c t o r - L e d Tr a i n i n g
I f y o u a r e i n t e r e s t e d a n d l o o k i n g f o r l i v e o n l i n e t r a i n i n g , I n f o s e c Tr a i n p r o v i d e s t h e
b e s t o n l i n e C o m p T I A N e t w o r k + O n l i n e C e r t i f i c a t i o n Tr a i n i n g . T h e C o m p T I A N e t w o r k +
e x a m i n a t i o n t r a i n i n g s e s s i o n s w i l l s u p p o r t c a n d i d a t e s i n b e t t e r u n d e r s t a n d i n g t h e
c o n c e p t s i n a s h o r t p e r i o d o f t i m e .
14
OUR CONTACT
A B O U T O U R C O M PA N Y
InfosecTrain welcomes overseas customers to come and attend
training sessions in destination cities across the globe and enjoy their
learning experience at the same time.
1800-843-7890
sales@infosectrain.com
www.infosectrain.com
https://www.facebook.com/Infosectrain/
https://www.linkedin.com/company/infosec-train/
https://www.youtube.com/c/InfosecTrain

More Related Content

What's hot

tse-portfolio-s
tse-portfolio-stse-portfolio-s
tse-portfolio-sAlan Tse
 
All about aws security course
All about aws security courseAll about aws security course
All about aws security courseShivamSharma909
 
Theenlightenment 100608081048-phpapp02 (Mr. Macale)
Theenlightenment 100608081048-phpapp02 (Mr. Macale)Theenlightenment 100608081048-phpapp02 (Mr. Macale)
Theenlightenment 100608081048-phpapp02 (Mr. Macale)Jerome John Gutierrez
 
Orden diplomado
Orden diplomadoOrden diplomado
Orden diplomadoJose8a1980
 
Big data dan data science - kuliah umum IBS
Big data dan data science - kuliah umum IBSBig data dan data science - kuliah umum IBS
Big data dan data science - kuliah umum IBSYudy Yunardy
 
NPPS_Company_Profile
NPPS_Company_ProfileNPPS_Company_Profile
NPPS_Company_ProfileEugen Arnold
 
Conceptos
ConceptosConceptos
Conceptosaly2511
 
The long tail complete
The long tail completeThe long tail complete
The long tail completeAda15
 
Growing business online with Oscaro
Growing business online with OscaroGrowing business online with Oscaro
Growing business online with OscaroRocco Baldassarre
 
Display innovation School Apply
Display innovation   School ApplyDisplay innovation   School Apply
Display innovation School ApplyRocco Baldassarre
 
Supreme Products company profile
Supreme Products company profileSupreme Products company profile
Supreme Products company profileSupreme Products
 
Trabajo de 123
Trabajo  de 123Trabajo  de 123
Trabajo de 123groupo123
 
The Use of English Tenses
The Use of English TensesThe Use of English Tenses
The Use of English TensesFlamur Kastrati
 
2007 affordable housing development competition
2007 affordable housing development competition2007 affordable housing development competition
2007 affordable housing development competitionKelvin Xuna
 

What's hot (19)

tse-portfolio-s
tse-portfolio-stse-portfolio-s
tse-portfolio-s
 
All about aws security course
All about aws security courseAll about aws security course
All about aws security course
 
Colo5 Specs
Colo5 Specs Colo5 Specs
Colo5 Specs
 
Theenlightenment 100608081048-phpapp02 (Mr. Macale)
Theenlightenment 100608081048-phpapp02 (Mr. Macale)Theenlightenment 100608081048-phpapp02 (Mr. Macale)
Theenlightenment 100608081048-phpapp02 (Mr. Macale)
 
Orden diplomado
Orden diplomadoOrden diplomado
Orden diplomado
 
Big data dan data science - kuliah umum IBS
Big data dan data science - kuliah umum IBSBig data dan data science - kuliah umum IBS
Big data dan data science - kuliah umum IBS
 
New Parent Orientation 1
New Parent Orientation  1New Parent Orientation  1
New Parent Orientation 1
 
NPPS_Company_Profile
NPPS_Company_ProfileNPPS_Company_Profile
NPPS_Company_Profile
 
Cognitive perspective
Cognitive perspectiveCognitive perspective
Cognitive perspective
 
Resume-10
Resume-10Resume-10
Resume-10
 
Conceptos
ConceptosConceptos
Conceptos
 
The Preah Vihear Dispute: the Role of ASEAN Mechanisms and Norms in Settlemen...
The Preah Vihear Dispute: the Role of ASEAN Mechanisms and Norms in Settlemen...The Preah Vihear Dispute: the Role of ASEAN Mechanisms and Norms in Settlemen...
The Preah Vihear Dispute: the Role of ASEAN Mechanisms and Norms in Settlemen...
 
The long tail complete
The long tail completeThe long tail complete
The long tail complete
 
Growing business online with Oscaro
Growing business online with OscaroGrowing business online with Oscaro
Growing business online with Oscaro
 
Display innovation School Apply
Display innovation   School ApplyDisplay innovation   School Apply
Display innovation School Apply
 
Supreme Products company profile
Supreme Products company profileSupreme Products company profile
Supreme Products company profile
 
Trabajo de 123
Trabajo  de 123Trabajo  de 123
Trabajo de 123
 
The Use of English Tenses
The Use of English TensesThe Use of English Tenses
The Use of English Tenses
 
2007 affordable housing development competition
2007 affordable housing development competition2007 affordable housing development competition
2007 affordable housing development competition
 

More from ShivamSharma909

Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfShivamSharma909
 
CYBERSECURITY Interview Questions for Freshers.pdf
CYBERSECURITY Interview Questions for Freshers.pdfCYBERSECURITY Interview Questions for Freshers.pdf
CYBERSECURITY Interview Questions for Freshers.pdfShivamSharma909
 
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...ShivamSharma909
 
Top 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfTop 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfShivamSharma909
 
Top 25 Azure Architect Interview Questions and Answers.pdf
Top 25 Azure Architect Interview Questions and Answers.pdfTop 25 Azure Architect Interview Questions and Answers.pdf
Top 25 Azure Architect Interview Questions and Answers.pdfShivamSharma909
 
Top 20 Azure Administrator Interview Questions.pdf
Top 20 Azure Administrator Interview Questions.pdfTop 20 Azure Administrator Interview Questions.pdf
Top 20 Azure Administrator Interview Questions.pdfShivamSharma909
 
Threat Hunting Professional Online Training Course
Threat Hunting Professional Online Training CourseThreat Hunting Professional Online Training Course
Threat Hunting Professional Online Training CourseShivamSharma909
 
Why cloud security engineers find CCSE as a perfect fit
Why cloud security engineers find CCSE as a perfect fitWhy cloud security engineers find CCSE as a perfect fit
Why cloud security engineers find CCSE as a perfect fitShivamSharma909
 
Top 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerTop 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerShivamSharma909
 
Top 20 azure interview questions
Top 20 azure interview questionsTop 20 azure interview questions
Top 20 azure interview questionsShivamSharma909
 
Top 15 aws security interview questions
Top 15 aws security interview questionsTop 15 aws security interview questions
Top 15 aws security interview questionsShivamSharma909
 
EC-Council Certified SOC Analyst
EC-Council Certified SOC AnalystEC-Council Certified SOC Analyst
EC-Council Certified SOC AnalystShivamSharma909
 
Domain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingDomain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingShivamSharma909
 
Domain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application HackingDomain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application HackingShivamSharma909
 
Domain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter HackingDomain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter HackingShivamSharma909
 
Domain 3 of CEH v11: System Hacking Phases and Attack Techniques
Domain 3 of CEH v11: System Hacking Phases and Attack TechniquesDomain 3 of CEH v11: System Hacking Phases and Attack Techniques
Domain 3 of CEH v11: System Hacking Phases and Attack TechniquesShivamSharma909
 
Domain 2 of CEH v11: Reconnaissance Techniques
Domain 2 of CEH v11: Reconnaissance TechniquesDomain 2 of CEH v11: Reconnaissance Techniques
Domain 2 of CEH v11: Reconnaissance TechniquesShivamSharma909
 
Domain 1 of CEH v11: Information Security and Ethical Hacking
Domain 1 of CEH v11: Information Security and Ethical HackingDomain 1 of CEH v11: Information Security and Ethical Hacking
Domain 1 of CEH v11: Information Security and Ethical HackingShivamSharma909
 
How is az 303 different from az-304
How is az 303 different from az-304How is az 303 different from az-304
How is az 303 different from az-304ShivamSharma909
 

More from ShivamSharma909 (20)

Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
 
CYBERSECURITY Interview Questions for Freshers.pdf
CYBERSECURITY Interview Questions for Freshers.pdfCYBERSECURITY Interview Questions for Freshers.pdf
CYBERSECURITY Interview Questions for Freshers.pdf
 
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
 
Top 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfTop 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdf
 
Top 25 Azure Architect Interview Questions and Answers.pdf
Top 25 Azure Architect Interview Questions and Answers.pdfTop 25 Azure Architect Interview Questions and Answers.pdf
Top 25 Azure Architect Interview Questions and Answers.pdf
 
Top 20 Azure Administrator Interview Questions.pdf
Top 20 Azure Administrator Interview Questions.pdfTop 20 Azure Administrator Interview Questions.pdf
Top 20 Azure Administrator Interview Questions.pdf
 
Threat Hunting Professional Online Training Course
Threat Hunting Professional Online Training CourseThreat Hunting Professional Online Training Course
Threat Hunting Professional Online Training Course
 
Why cloud security engineers find CCSE as a perfect fit
Why cloud security engineers find CCSE as a perfect fitWhy cloud security engineers find CCSE as a perfect fit
Why cloud security engineers find CCSE as a perfect fit
 
Top 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerTop 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answer
 
Top 20 azure interview questions
Top 20 azure interview questionsTop 20 azure interview questions
Top 20 azure interview questions
 
Top 15 aws security interview questions
Top 15 aws security interview questionsTop 15 aws security interview questions
Top 15 aws security interview questions
 
EC-Council Certified SOC Analyst
EC-Council Certified SOC AnalystEC-Council Certified SOC Analyst
EC-Council Certified SOC Analyst
 
Ctia course outline
Ctia course outlineCtia course outline
Ctia course outline
 
Domain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingDomain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network Hacking
 
Domain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application HackingDomain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application Hacking
 
Domain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter HackingDomain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter Hacking
 
Domain 3 of CEH v11: System Hacking Phases and Attack Techniques
Domain 3 of CEH v11: System Hacking Phases and Attack TechniquesDomain 3 of CEH v11: System Hacking Phases and Attack Techniques
Domain 3 of CEH v11: System Hacking Phases and Attack Techniques
 
Domain 2 of CEH v11: Reconnaissance Techniques
Domain 2 of CEH v11: Reconnaissance TechniquesDomain 2 of CEH v11: Reconnaissance Techniques
Domain 2 of CEH v11: Reconnaissance Techniques
 
Domain 1 of CEH v11: Information Security and Ethical Hacking
Domain 1 of CEH v11: Information Security and Ethical HackingDomain 1 of CEH v11: Information Security and Ethical Hacking
Domain 1 of CEH v11: Information Security and Ethical Hacking
 
How is az 303 different from az-304
How is az 303 different from az-304How is az 303 different from az-304
How is az 303 different from az-304
 

Introduction to comptia network+ certification (n10 007)

  • 1. www.infosectrain.com Introduction to CompTIA Network+ Certification (N10-007)
  • 2. InfosecTrain About Us InfosecTrain is one of the finest Security and Technology Training and Consulting organization, focusing on a range of IT Security Trainings and Information Security Services. InfosecTrain was established in the year 2016 by a team of experienced and enthusiastic professionals, who have more than 15 years of industry experience. We provide professional training, certification & consulting services related to all areas of Information Technology and Cyber Security.
  • 3.
  • 4. 4 I nt ro d u c t i o n to C o m p T I A N et wo r k + C e r t i f i cat i o n ( N 1 0 - 0 0 7 ) A b o u t T h e C o m p T I A N e t w o r k + ( P l u s ) I n t h e I T s e c t o r, t h e N e t w o r k + c e r t i f i c a t i o n i s a v a l u a b l e c e r t i f i c a t i o n . T h i s N e t w o r k + c e r t i f i c a t e f o c u s e s o n a p e r s o n ’s s k i l l a n d e x p e r t i s e i n n e t w o r k a r c h i t e c t u r e , r e p a i r, m a n a g e m e n t , a n d m a i n t e n a n c e . F o r n e t w o r k t e c h n i c i a n s , N e t w o r k + ( N e t w o r k P l u s ) i s a m i d - l e v e l c e r t i f i c a t e . T h i s e x a m i s i n t e n d e d t o t e s t t h e k n o w l e d g e o f t h e n e t w o r k t e c h n i c i a n i n t e r m s o f n e t w o r k a r c h i t e c t u r e , i n s t a l l a t i o n , c o n f i g u r a t i o n , a n d t r o u b l e s h o o t i n g . T h e N e t w o r k + ( N e t w o r k P l u s ) c e r t i f i c a t e e x a m i n a t i o n i s p r o v i d e d b y C o m p T I A ( C o m p u t i n g Te c h n o l o g y I n d u s t r y A s s o c i a t i o n ) , w h i c h i s o n e o f t h e l e a d i n g c e r t i f i c a t i o n p r o v i d e r s i n t h e m a r k e t . I f y o u w a n t t o k n o w m o r e a b o u t C o m p T I A c l i c k h e r e . T h e C o m p T I A N e t w o r k + i s t h e o n l y e x a m c e r t i f i c a t i o n t h a t i n c l u d e s b o t h w i r e d a n d w i r e l e s s n e t w o r k i n g . Ta r g e t A u d i e n c e T h i s e x a m i s u s e f u l f o r t h e f o l l o w i n g i n d i v i d u a l s : • J u n i o r N e t w o r k A d m i n i s t r a t o r • I S C o n s u l t a n t • N e t w o r k F i e l d E n g i n e e r • J u n i o r S y s t e m E n g i n e e r C C I S O C e r t i f i c a t i o n
  • 5. 5 • C o m p u t e r Te c h n i c i a n • H e l p D e s k Te c h n i c i a n • S y s t e m E n g i n e e r • N e t w o r k A n a l y s t P r e r e q u i s i t e : C o m p T I A A + c e r t i f i c a t i o n i s r e c o m m e n d e d f o r t h i s c e r t i f i c a t i o n b u t m a n y I T e x p e r t s p r e f e r t o s k i p t h e C o m p T I A A + q u a l i f i c a t i o n a n d i n s t e a d , d i r e c t l y p u r s u e t h e C o m p T I A N e t w o r k + c e r t i f i c a t i o n t r a i n i n g b e c a u s e t h e y a l r e a d y h a v e a b a s i c u n d e r s t a n d i n g o f c o m p u t e r s . W h i l e e v e r y o n e c a n t a k e t h e N e t w o r k + t e s t , i t i s r e c o m m e n d e d t h a t y o u h a v e a t l e a s t 9 m o n t h s o f e x p e r i e n c e a s a n e t w o r k t e c h n i c i a n . C a n d i d a t e s s h o u l d h a v e K n o w l e d g e o f m e d i a , n e t w o r k i n g t e c h n o l o g y, s e c u r i t y, t o p o l o g i e s , s e t u p , a n d i n s t a l l a t i o n . N e t w o r k + c e r t i f i e s t h a t a n I T s p e c i a l i s t h a s t h e e x p e r i e n c e a n d a b i l i t i e s t o : • D e s i g n a n d i m p l e m e n t a t i o n o f f u n c t i o n a l n e t w o r k • C o n f i g u r e , m a i n t a i n , a n d s e c u r e e s s e n t i a l n e t w o r k • Tr o u b l e s h o o t i n g • I d e n t i f y i n g t h e b e n e f i t s a n d d r a w b a c k s o f c u r r e n t n e t w o r k s e t u p s • S u p p o r t t h e d e v e l o p m e n t o f v i r t u a l i z e d n e t w o r k s
  • 6. 6 W h a t ’s N e w ? C o m p T I A N e t w o r k + h a s b e e n u p d a t e d t h e c u r r e n t n e t w o r k t e c h n o l o g i e s a n d a d d s e v e r a l d o m a i n : • C r i t i c a l s e c u r i t y c o n c e p t s t o h e l p i n g n e t w o r k i n g p r o f e s s i o n a l s w o r k w i t h s e c u r i t y p r a c t i t i o n e r s • B e s t p r a c t i c e o f c l o u d c o m p u t i n g • L a t e s t h a r d w a r e a n d v i r t u a l i z a t i o n m e t h o d s a r e c o v e r e d • C o n c e p t s t o g i v e I n d i v i d u a l s v a r i e t y o f s k i l l s t o k e e p t h e n e t w o r k s t a b l e S k i l l s Yo u W i l l L e a r n • E x p l a i n t h e a i m o f v a r i o u s n e t w o r k i n g p r i n c i p l e s a n d h o w t o p u t i t i n t o p r a c t i c e • D e m o n s t r a t e t h e c a b l i n g , d e v i c e , a n d s t o r a g e t e c h n o l o g i e s • U s e b e s t p r a c t i c e s t o m a i n t a i n t h e n e t w o r k , p o l i c i e s a n d e n s u r e b u s i n e s s p r o c e s s e s • A n a l y z e p h y s i c a l s e c u r i t y & c o m m o n a t t a c k s w h i l e p r o t e c t i n g t h e w i r e d a n d w i r e l e s s n e t w o r k • N e t w o r k t r o u b l e s h o o t i n g a n d l e a r n i n g a b o u t t o o l s
  • 7. 7 C o u rs e C o nte nt C h a p t e r 1 : F u n d a m e n t a l s • M o d u l e A : N e t w o r k i n g c o n c e p t s • M o d u l e B : C l a s s i f y i n g n e t w o r k s • M o d u l e C : N e t w o r k m o d e l s • M o d u l e D : T h e t r o u b l e s h o o t i n g p r o c e s s C h a p t e r 2 : P h y s i c a l n e t w o r k s • M o d u l e A : C o n n e c t i o n t e c h n o l o g i e s • M o d u l e B : N e t w o r k d e v i c e s • M o d u l e C : C o p p e r m e d i a • M o d u l e D : O p t i c a l m e d i a • M o d u l e E : E t h e r n e t s t a n d a r d s C h a p t e r 3 : T C P / I P n e t w o r k s • M o d u l e A : I P a d d r e s s i n g • M o d u l e B : C o r e p r o t o c o l s • M o d u l e C : N e t w o r k p o r t s a n d a p p l i c a t i o n s
  • 8. 8 C h a p t e r 4 : I n t e r n e t w o r k i n g • M o d u l e A : S w i t c h i n g • M o d u l e B : R o u t i n g C h a p t e r 5 : W i r e l e s s L A N s • M o d u l e A : W i r e l e s s n e t w o r k s • M o d u l e B : W i r e l e s s L A N s t a n d a r d s C h a p t e r 6 : W i d e a r e a n e t w o r k s • M o d u l e A : I n t e r n e t c o n n e c t i o n s • M o d u l e B : WA N i n f r a s t r u c t u r e C h a p t e r 7 : C y b e r s e c u r i t y p r i n c i p l e s • M o d u l e A : G o a l s a n d t h r e a t s • M o d u l e B : D i g i t a l s e c u r i t y • M o d u l e C : Tr a n s p o r t e n c r y p t i o n C h a p t e r 8 : D e f e n d i n g n e t w o r k s • M o d u l e A : N e t w o r k s e c u r i t y c o m p o n e n t s • M o d u l e B : N e t w o r k a u t h e n t i c a t i o n s y s t e m s • M o d u l e C : H a r d e n i n g n e t w o r k s
  • 9. 9 C h a p t e r 9 : E v o l v i n g n e t w o r k t e c h n o l o g i e s • M o d u l e A : N e t w o r k c o n v e r g e n c e • M o d u l e B : V i r t u a l a n d c l o u d s y s t e m s C h a p t e r 1 0 : N e t w o r k o p e r a t i o n s • M o d u l e A : M o n i t o r i n g a n d o p t i m i z a t i o n • M o d u l e B : F a u l t t o l e r a n c e a n d d i s a s t e r r e c o v e r y • M o d u l e C : I n c i d e n t r e s p o n s e C h a p t e r 1 1 : N e t w o r k p l a n n i n g • M o d u l e A : N e t w o r k p o l i c y d e s i g n • M o d u l e B : N e t w o r k i n s t a l l a t i o n • M o d u l e C : M a i n t e n a n c e a n d u p g r a d e s
  • 10. 10 E xa m D eta i l s
  • 11. 11 E xa m O b j e c t i ve s Yo u c a n f i n d s t u d y m a t e r i a l s f o r t h e C o m p T I A N e t w o r k + e x a m i n a t i o n o n t h e C o m p T I A o f f i c i a l w e b s i t e . C a n d i d a t e s c a n l e a r n t h e b a s i c c o n c e p t s o f i n s t a l l i n g , c o n f i g u r i n g , a n d t r o u b l e s h o o t i n g n e t w o r k t e c h n o l o g i e s w i t h t h i s C o m p T I A N e t w o r k + ( N 1 0 - 0 0 7 ) e x a m g u i d e . T h e C o m p T I A N e t w o r k + e x a m c o d e i s N 1 0 - 0 0 7 . C o m p T I A N e t w o r k + e x a m o b j e c t i v e s a r e l i s t e d b e l o w :
  • 12. 12 C o m p T I A N e t w o r k + i s t r u s t e d b y a n u m b e r o f c o m p a n i e s : • A p p l e • B l u e c r o s s B l u e S h i e l d • C a n o n • D e l l • H p • I n t e l • R i c o h • D e p a r t m e n t o f D e f e n s e ( U n i t e d S t a t e O f A m e r i c a ) • Ve r i z o n C o m p T I A L a b s f o r N e t w o r k + C o m p T I A L a b s f o r N e t w o r k + s u p p o r t s c a n d i d a t e s i n o b t a i n i n g t h e s k i l l s n e c e s s a r y f o r N e t w o r k + c e r t i f i c a t i o n . T h e y c a n g a i n a b e t t e r u n d e r s t a n d i n g o f t h e s u b j e c t a s w e l l a s t h e p r a c t i c a l a s p e c t s o f t h e N e t w o r k c e r t i f i c a t i o n e x a m r e q u i r e m e n t s . C o m p T I A L a b s a l s o s u p p o r t s c a n d i d a t e s i n a d d r e s s i n g t h e p r a c t i c a l i m p l i c a t i o n s o f N e t w o r k e x a m g o a l s a n d c o m p l e m e n t i n g e x i s t i n g t r a i n i n g b y p r o v i d i n g a c c e s s t o r e a l - w o r l d e q u i p m e n t / s o f t w a r e e n v i r o n m e n t s .
  • 13. 13 C o m p T I A N e t w o r k + I n s t r u c t o r - L e d Tr a i n i n g I f y o u a r e i n t e r e s t e d a n d l o o k i n g f o r l i v e o n l i n e t r a i n i n g , I n f o s e c Tr a i n p r o v i d e s t h e b e s t o n l i n e C o m p T I A N e t w o r k + O n l i n e C e r t i f i c a t i o n Tr a i n i n g . T h e C o m p T I A N e t w o r k + e x a m i n a t i o n t r a i n i n g s e s s i o n s w i l l s u p p o r t c a n d i d a t e s i n b e t t e r u n d e r s t a n d i n g t h e c o n c e p t s i n a s h o r t p e r i o d o f t i m e .
  • 14. 14
  • 15. OUR CONTACT A B O U T O U R C O M PA N Y InfosecTrain welcomes overseas customers to come and attend training sessions in destination cities across the globe and enjoy their learning experience at the same time. 1800-843-7890 sales@infosectrain.com www.infosectrain.com https://www.facebook.com/Infosectrain/ https://www.linkedin.com/company/infosec-train/ https://www.youtube.com/c/InfosecTrain