CompTIA Network+ Certification Program by GlobalKnowledge Philippines - SpeedyCourse Philippines
We've noticed this is not your region.
Redirect me to my region
What do you want to learn today?

Details

In this course students will identify and describe all the major networking technologies, systems, and skill in use in modern PC-based computer networks, and learn information to prepare for the CompTIA Network+ (2009 Objectives) cert exam (N10-004).

Objective :
Upon successful completion of this course, students will be able to:
- identify the basic components of network theory.
- identify the major network communications methods.
- identify network data delivery methods.
- list and describe network media and hardware components.
- identify the major types of network implementations.
- identify the components of a TCP/IP network implementation.
- identify the major services deployed on TCP/IP networks.
- identify the components of a LAN implementation.
- identify the components of a WAN implementation.
- identify major issues and technologies in network security.
- identify the components of a remote network implementation.
- identify major issues and technologies in disaster recovery.
- identify major data storage technologies and implementations.
- identify the primary network operating systems.
- explore tools, methods, and techniques used in managing a network.
- describe how to troubleshoot network issues. At Course Completion: Upon successful completion of this course, students will be able to:
- Identify the basic components of network theory.
- Identify the major network communications methods.
- Identify network data delivery methods.
- List and describe network media and hardware components.
- Identify the major types of network implementations.
- Identify the components of a TCP/IP network implementation.
- Identify the major services deployed on TCP/IP networks.
- Identify characteristics of a variety of network protocols.
- Identify the components of a LAN implementation.
- Identify the components of a WAN implementation.
- Identify major issues and technologies in network security.
- Identify the components of a remote network implementation.
- Identify major issues and technologies in disaster recovery.
- Identify major data storage technologies and implementations.
- Identify the primary network operating systems.
- Identify major issues, models, tools, and techniques in network troubleshooting.

Outline

Outline :
Lesson 1: Network Theory Networking Terminology Network Building Blocks Standard Network Models Physical Network Topologies Logical Network Topologies Network Categories

Lesson 2: Network Communications Methods Transmission Methods Media Access Methods Signaling Methods L

esson 3: Network Data Delivery Data Addressing and Delivery Delivery Techniques

Lesson 4: Network Media and Hardware Bounded Network Media Unbounded Network Media Noise Control Network Connectivity Devices Wiring Distribution Components

Lesson 5: Network Implementations The OSI Model Ethernet Networks Token Ring Networks Fiber Distributed Data Interface (FDDI) Networks Wireless Technologies and Standards

Lesson 6: Networking with TCP/IP Families of Protocols The TCP/IP Protocol IP Address Basics Custom IP Addresses The IP Version 6 Protocol The TCP/IP Protocol Suite

Lesson 7: TCP/IP Services IP Address Assignment Methods Host Name Resolution TCP/IP Utilities TCP/IP Upper-Layer Services TCP/IP Interoperability Services

Lesson 8: Local Area Network Infrastructure Bridges and Switches IP Routing Static IP Routing Dynamic IP Routing Control Data Movement with Filters and VLANs

Lesson 9: WAN Infrastructure WAN Switching Technologies WAN Transmission Technologies WAN Connectivity Methods Voice Over Data Systems

Lesson 10: Network Security Computer Security Basics Authentication Data Encryption Protect Network Traffic with IP Security (IPsec) Internet Security Local Security Common Threats Threat Mitigation Techniques Intrusion Detection and Prevention Educate Users

Lesson 11: Remote Networking Remote Network Architectures Remote Access Networking Implementations Virtual Private Networking Remote Control Computing

Lesson 12: Disaster Recovery Examine Configuration Management Documentation Plan for Disaster Recovery Fault Tolerance Methods Data Backup

Lesson 13: Network Data Storage Enterprise Data Storage Network-Attached Storage (NAS) Storage Area Network (SAN) Implementations Clustering

Lesson 14: Network Operating Systems UNIX and Linux Operating Systems Apple Mac OS X Microsoft Operating Systems Novell Open Enterprise Server

Lesson 15: Network Management Monitoring Tools Network Baselining Network Optimization

Lesson 16: Network Troubleshooting Troubleshooting Models TCP/IP Troubleshooting Utilities Hardware Troubleshooting Tools Common Connectivity Issues
Reviews
Be the first to write a review about this course.
Write a Review

Global KMC is a private training company that certifies individuals in various IT and business skills.  It is an Authorized Training Center for the International Council of E-Commerce Consultants (EC-Council) - the owner and developer of the world famous Certified Ethical Hacker (CEH) course, Computer Hacking Forensics Investigators (CHFI) program, License Penetration Tester (LPT) program and various other programs offered in over 60 countries around the globe.  It is an authority in Digital Forensics training and solutions including multi-media and mobile forensics.  The company is also anAuthorized Training Partner for CompTia offering Security+, A+, Project+, Mobile+, Network+, Cloud+.  Global also offers various technical training on Cisco (CCNA, CCNP);  Microsoft (MCSA, MCSE, Desktop Technician, etc); Linux (Fundamentals, System Admin, Network Admin); CISSPITILIBM-i2 Analysts Notebook, to name a few.

For the Softskills training, Global is known in areas of: Project Management (PMP); Six Sigma (Yellow Belt, Green Belt, Black Belt); Communication; Train-the-Trainers; Risk Management, etc. ...

Sending Message
Please wait...
× × Speedycourse.com uses cookies to deliver our services. By continuing to use the site, you are agreeing to our use of cookies, Privacy Policy, and our Terms & Conditions.