N+

User Avatar
Free

NETWORKING ESSENTIALS (LAN)
N+ Training In Bangalore
CompTIA Network+ certification training

Course content
Module 1 – Introducing Computer Network

Session No. 1
• Networking Fundamentals
• What is a Computer Network?
• Application of Computer Network
• Overview of Network Topology – Star, Bus, Mesh & Ring
• IEEE features base on Speed, Access Method, Topology and Media – 802.2, 802.3, 802.5,802.11

Module 2: Transmission Media

Session 2
• Media Standard
• CAT 3, 5, 5e and 6
• Twisted Pair – UTP & STP
• Coaxial Cable
• Fiber Optics – SMF & MMF

Session 3
• Media Characteristics
• 100BASE-TX and 10BASE-FX
• 1000BASE-T, 1000BASE-CX, 1000BASE-SX and 1000BASE-LX
• 10 GBASE-SR, 10 GBASE-LR and 10 GBASE-ER
• Media Connectors
• RJ, F-type, IEEE-1394 & USB

Module 3 : Transmission Media Connections

Session 4
• NIC Overview
• Modems Overview
• ISDN Overview
• CSU / DSU
• Introduction to Hubs
• Introduction to Bridges and Switches
• Introduction to Routers
• Introduction to Gateways
• Introduction to Wireless Access Point
• Firewalls Basics

Session 5
• Various Wireless Technologies
• An Overview of Commonly Used Wireless Technologies
• Introduction to Bluetooth Technology
• Various IEEE 802.11 Standards
• Introduction to Infrared

Session 6
• Introduction to Wireless Networking
• What is Wireless Network?
• Identifying Various Wireless Network Standards
• Identifying Medium Access Mechanisms in Wireless Networks
• Identifying Data Communication Mechanism in Wireless Networks

Module 4: Network Models and Protocols

Session 7
• Overview of OSI Reference Model
• What is the OSI Reference Model?
• Defining Seven Layers of OSI Model
• Incorporating Network Components (Hub, Switch, Bridge, Router, NIC & WAP) at various level of OSI model.

Session 8
• Differentiate between the following network protocols in terms of routing, addressing
• schemes, interoperability and naming conventions:
• IPX / SPX (Internetwork Packet Exchange / Sequence Packet Exchange)
• NetBEUI (Network Basic Input / Output System Extended User Interface)
• AppleTalk / AppleTalk over IP (Internet Protocol)
• TCP / IP (Transmission Control Protocol / Internet Protocol)

Session 9
• Internetworking Basics
• Defining Internetwork
• Differentiating Connection-Oriented and Connectionless Network
• Understanding Data Link Layer Addresses
• Understanding MAC Addresses
• Mapping the Addresses

Session 10
• Internet Addressing
• Defining Internet Addressing Scheme – Classful IP (Class A,B & C)
• Default Subnet Masks
• Purpose of subnetting
• Public and Private Network addressing schemes.
• Identifying Type of Internet Addressing – static , dynamic

Session 11
• Purpose , functionality of the following protocols used in the TCP/IP suite:
• TCP
• UDP
• FTP, SFTP & TFTP
• SMTP
• HTTP & HTTPS
• POP3 / IMAP4
• SSH
• ICMP
• ARP / RARP
• NTP & NNTP
• SCP
• LDAP
• IGMP
• LPR

Session 12
• Services and Protocols incorporated on the well known ports
• FTP & TFTP
• SSH
• Telnet
• SMTP
• DNS
• HTTP & HTTPS
• POP3 & IMAP4
• NTP & NNTP

Session 13
• Network Services and Protocols
• DNS
• NAT
• ICS
• WINS
• SNMP
• NFS
• SMB
• Samba

Session 14
• Overview of WAN Technology
• Identifying Position of WAN in OSI Model
• Implementing WAN
• Dialup Connection
• Virtual Circuits
• Overview of ATMk

Session 15
• Explaining Various Switching Technology
• Understanding Circuit Switching
• Understanding Packet Switching

Session 16
• Identifying Various WAN Devices
• Identifying WAN Switches
• Identifying Access Servers
• Identifying Modems
• Identifying CSU/DSUs
• Identifying ISDN Terminal Adapters
• Identifying FDDI Adapters

Session 17
• Significance of the following internet access technologies:
• xDSL
• Broadband Cable
• POTS / PSTN
• Satellite
• Wireless

Session 18
• An Overview of Remote Network Access
• Remote Network Access Using Dial-Up Technology
• An Overview of Dial-Up Methods
• Identifying Various Dial-Up Methods
• Understanding Advantages and Disadvantages of Dial-Up Technology

Session 19
• Significance of the Remote Access Protocols and Services
• RAS (Remote Access Service)
• PPP (Point-to-Point Protocol)
• SLIP (Serial Line Internet Protocol)
• PPPoE (Point-to-Point Protocol over Ethernet)
• PPTP (Point-to-Point Tunneling Protocol)
• VPN (Virtual Private Network)
• RDP (Remote Desktop Protocol)

Session 20
• Various Security protocols and describe their purpose and function:
• IPSec (Internet Protocol Security)
• L2TP (Layer 2 Tunneling Protocol)
• SSL (Secure Sockets Layer)
• WEP (Wired Equivalent Privacy)
• WPA (Wi-Fi Protected
• 802.1x

Session 21
• Identify authentication protocols
• CHAP
• MS-CHAP
• PAP
• RADIUS
• Kerberos and EAP

Module 5: Network Management System

Session 22
• An Overview of Network Management System
• Defining Network Management
• Discussing Network Management Architecture
• Understanding ISO Network Management Model
• Explaining Performance Management
• Explaining Configuration Management
• Explaining Accounting Management
• Explaining Fault Management
• Explaining Security Management
• Basics of Network Operating System
• Defining NOS
• Identifying Need of NOS
• Implementing Network Using Windows OS
• Implementing Network Using Linux OS

Module 6: Planning Network Installation

Session 23
• Identifying Network Needs
• Determining Business Requirement
• Examining Installation Site
• Selecting Network Hardware
• Providing Fault Tolerance
• Defining Fault Tolerance Mechanism
• Making Data Available
• Making Server Available
• Incorporating Network Redundancy

Module 7: Installing the Network

Session 24
• Wiring Original Ethernet
• Wiring Thin Ethernet
• Wiring Network Ethernet
• Wiring Fast Ethernet
• Wiring Gigabit Ethernet
• Identifying Guidelines to Follow for Network Installation
• Identifying Problems Encountered during Network Installation
• Testing the Network Connectivity

Module 8: Network Security & Backup Systems

Session 25
• An Overview of Network Maintenance
• Taking Backups
• Why Need Backups?
• Identifying Hardware Devices for Taking Backups
• Identifying Characteristics of Backup Software Tools

Session 26
• Using Antivirus Software
• Defining Virus
• Identifying Various Types of Viruses
• Preventing From Virus Attacks
• Using Patches and Updates
• Understanding Patches
• Understanding Updates
• Understanding Driver Updates
• Understanding Software Upgrades

Session 27
• Securing Network Using Password Mechanism
• Overview of Password Mechanism
• Managing Password Policies
• Setting Password Length
• Specifying Password Expiry Time Period
• Enforcing Password Complexity
• Encrypting User Passwords
• Controlling Account Lockout Policy

Session 28
• Securing Network Using Security Models
• Using User-Level Security Model
• Using Share-Level security Model

Session 29
• Securing Network Using Firewall
• Explaining Firewall
• Explaining Packet Filtering
• Explaining NAT
• Explaining Proxies

Session 30
• Securing Network Using Security Protocols
• Introduction to Security Protocols
• Using IPSec Protocol
• Using L2TP Protocol
• Using SSL Protocol

Session 31
• Applying Remote Network Access Using VPN
• Defining VPN
• Building VPN
• Understanding Operational Mechanics of VPN
• Overview of VPN Operation Procedure
• Implementation Topologies

Module 9: Troubleshooting Network Problems

Session 32
• Recognizing Network Components
• Identifying Various Ports
• Identifying Connectors
• Identifying Other Network Components
• Troubleshooting Network
• Identifying the Symptoms
• Identifying the Affected Area
• Identifying the Changes
• Identifying the Most Probable Cause
• Implementing a Solution
• Testing the Solution
• Identifying the Effects of the Solution
• Documenting the Solution

Session 33
• Using Documentation and Other Resources for Troubleshooting
• Reading Product Documentation
• Reading Books and Periodicals
• Taking Telephonic Support
• Using Online Resources
• Using CD-ROM Resources
• Using Network Troubleshooting Tools
• Viewing Error Messages
• Viewing Event Logs
• Using Crossover Cable
• Using Tone Generator and Tone Locator
• Using Multi-meter
• Using Cable Continuity Testers
• Using Cable Performance Testers
• Using Network Monitors
• Using Protocol Analyzers
• Using Wireless Network Testers

Session 34
• Using TCP/IP Services
• Blocking Unwanted Programs Using Hosts File
• Configuring IP Settings Using DHCP
• Retrieving IP Address Using DNS
• Finding Other Window-Based Computers Using WINS

Course Features

  • Lectures 0
  • Quizzes 0
  • Duration 50 hours
  • Skill level All levels
  • Language English
  • Students 0
  • Assessments Yes

You have 10 weeks remaining for the course

Curriculum is empty
Free

Leave A Reply

Your email address will not be published. Required fields are marked *