Network+ Certification Prep


Network+ Certification Prep, Singapore elarning online course

Course Description

The Network+ Certification Prep Course readies students for CompTIA's Network+ Certification exam which is a vendor-neutral certification allowing IT professionals to gain expertise in configuring, managing, installing, troubleshooting and maintaining basic computer networks. With top experts and an interactive, lab-filled environment, students gather essential knowledge of network configuration, technologies and installations as well as topologies and media security and management. The Network+ certification by CompTIA is an internationally recognized and coveted credential providing proof of a student's knowledge, skills and ability to manage, maintain, troubleshoot, install, operate and configure a basic network infrastructure. This course prepares the student for the CompTIA Network+ Certification exam N10-006.


Course Objectives

1. 7 Layers of the Open Systems Interconnect (OSI) Model
2. TCP/IP System Interconnect Model
3. Open Systems Interconnect Model Comparison
4. IPv4 Notation
5. Private IPv4 Networks
6. IPv6 Addressing
7. The Purpose of Routing and Switching
8. Explain the Common Networking Protocols
9. Installing and Configuring
10. Network Management


Related Courses

  • Certified Ethical Hacker Bootcamp

    Certified Ethical Hacker Bootcamp

    SGD $299.00

    Course Description

    Penetration Testing and Ethical Hacker Bootcamp This bootcamp prepares aspiring and current security professionals for industry certification exams and interviews to enhance their careers. With top experts and an interactive environment, students learn about key issues plaguing the information security world, incident management processes and penetration testing. This bootcamp was designed for those who wish to take an immersive look at the various in-demand security professional careers. You'll examine not just the theories and tools a professional hacker would use when conducting a penetration test, but also gain an insight into the day to day workflow of an ethical hacker. Students gain practical experience and in-depth knowledge about common ethical hacking topics such as intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows and virus creation. Without harming any real networks, students will learn about perimeter defenses, scanning and attacking their own networks as well as how intrusions escalate the impact of their breaches and the tools and steps necessary to secure a system

    Read more...

  • Intro to Blockchain Technology, Blockchain Security  and R3 Corda

    Intro to Blockchain Technology, Blockchain Security and R3 Corda

    SGD $29.00

    Course Description

    This course will help you identify and differentiate between security threats and attacks on a Blockchain network. Blockchain security methods, best practices, risk mitigation, and all known (to date) cyber-attack vectors on the Blockchain will be covered. You will also learn how to perform a Blockchain network security risk analysis and glean a complete understanding of Blockchain's inherent security features and risks. You will learn the key aspects around Blockchain and Bitcoin, including: What is a blockchain? What is Bitcoin? What are smart contracts? What is a cryptocurrency? What are digital tokens? How blockchain and Bitcoin are related and why it is so important to know the relationship. Some common misconceptions about blockchain and Bitcoin. R3 Corda Blockchain is an enterprise blockchain distributed ledger. A blockchain is a tamper-evident, shared digital ledger that records transactions in a public or private peer-to-peer network. Distributed to all member nodes in the network, the ledger permanently records, in a sequential chain of cryptographic hash-linked blocks, the history of asset exchanges that take place between the peers in the network. This course has been designed for technical architects, pre sales architects, developers and project managers who must make technical decisions about distributed architectures and development platform  

    Read more...

  • Certified Security Analyst Training

    Certified Security Analyst Training

    SGD $299.00

    Course Description

    The Certified Security Analyst Training course prepares students for gaining practical experience with conducting realistic penetration tests. Thought by top experts in the field, students learn advanced knowledge and experience regarding the available methodologies, tools and techniques which are required to perform comprehensive information security penetration tests.  Students gain practical experience with the Licensed Penetration Tester in order to perform the intensive assessments required to effectively identify and mitigate risks to an infrastructure's security. Students not only learn to identify information security problems in this course, but also how to avoid and eliminate them with complete coverage of analysis and network security testing methods and tools.

    Read more...


Content

7 Layers of the Open Systems Interconnect (OSI) Model

+

OSI Model Overview - Layer 7

OSI Model Overview - Layer 6-3

OSI Model Overview - Layer 2-1

OSI Data Flow

Terminology

Communication between layers, Layer 3 & 4 Examples, and Memory Mnemonics

TCP/IP System Interconnect Model

+

TCP/IP System Interconnect Model - Layer 4

TCP/IP System Interconnect Model - Layer 3-1

Open Systems Interconnect Model Comparison

+

Open Systems Interconnect Model Comparisons

Application Layer Examples

IPv4 Notation

+

iPv4 Addresses and Base 2 Binary Numbers

Decimal - Binary Numbers

Why iPv4 Addressing Part 1

Why iPv4 Addressing Part 2

The Big Picture (DNS, IPv4, MAC) Part 1

The Big Picture (DNS, IPv4, MAC) Part 2

Purpose and Properties of IP Addressing

iPv4 Bitwise Notation

IPv4 Classful Addressing Notation

Subnetting

Private IPv4 Networks

+

Private IPv4 Networks

NAT’ing Part 1

NAT’ing Part 2

Unicast, Broadcast, Multicast, and APIPA (Automatic Private IP Addressing)

IPv6 Addressing

+

iPv6 Addressing Part 2

MAC Addressing

iPv6 Addressing Part 1

The Purpose of Routing and Switching

+

The Purpose of Routing and Switching Part 1

The Purpose of Routing and Switching Part 2

Open Shortest Path First (OSPF) Routing

Spanning Tree Protocol

Virtual Local Area Networking

Explain the Common Networking Protocols

+

Default TCP/UDP Ports and Common Networking Protocols

DNS Concepts and Components

Network Troubleshooting

Identify Virtual Network Components

VTP Configuration

Installing and Configuring

+

Things to Remember

Repeaters Part 1

Repeaters Part 2

Backhauling

Antennae

Purpose and Properties DHCP

Troubleshooting Wireless Networks

Troubleshooting Routers and Switches Part 1

Troubleshooting Routers and Switches Part 2

Environment limitations in a SOHO Network

Standard Media Types and Associated Properties Part 1

Standard Media Types and Associated Properties Part 2

Standard Media Types and Associated Properties Part 3

Standard Media Types and Associated Properties Part 4

Compare and Contrast Wireless Standards

WAN Types and Properties Part 1

WAN Types and Properties Part 2

Network Topologies Part 1

Network Topologies Part 2

Troubleshooting Common Physical Connectivity Problems

Network Management

+

Compare and Contrast Different LAN Technologies

The Purpose and Features of Various Network Appliances and Troubleshooting Connectivity Issues

Software Tools to Troubleshoot Connectivity Issues

Network Traffic Analysis and Configuration Management Documentation

Appropriate Wireless Security Measures

Network Access Security and Methods of User Authentication

Methods of User Authentication Part 2

Network Threats, Vulnerabilities, and Mitigation techniques Part 1

Network Threats, Vulnerabilities, and Mitigation techniques Part 2

Network Threats, Vulnerabilities, and Mitigation techniques Part 3

Install and Configure a Basic Firewall

Types of Network Security Appliances and Methods

SGD $299.00
(Price excludes GST)
GET ACCESS NOW
Convince your boss email
This site is best viewed using the latest versions of Google Chrome, Apple Safari, Mozilla FireFox, Microsoft Internet Explorer 11 and Edge which supports HTML5/Webkit technologies.