CompTIA Network+ Training Course

    CompTIA’s Network+ certification is an entry level vendor neutral certification for aspiring system and network administrators. The Network+ course provides basic trainin...

    ₹ 20000

    ₹ 25000

    20% off

    SHARE
    Baroda Institute of Technology
    ₹20000  25000

    20% off

    This includes following
    •  150 Hours
    •  Completion certificate : Yes
    •  Language : Hinglish
    CompTIA’s Network+ certification is an entry level vendor neutral certification for aspiring system and network administrators. The Network+ course provides basic training in managing, maintaining, troubleshooting, installing and configuring a network infrastructure. Nine months of experience in network support or administration along with a CompTIA A+ certification is recommended before the Network+ course. Network+ certification is also a step towards attaining higher level vendor specific certifications such as Microsoft (MCSE, MCITP), Cisco (CCNA, CCNP) and Linux (Linux+, RHCE). This course is intended for anyone that is preparing for a network technician position or looking to improve their skills and become CompTIA Network+ Certified. However, it goes beyond that and will give you the skills you need to be a better network tech on the job. This is a complete and comprehensive CompTIA Network+ Certification (N10-007) course. 

        Live Class Practical Oriented Training

        Timely Doubt Resolution

        Dedicated Student Success Mentor

        Certification & Job Assistance

        Free Access to Workshop & Webinar

        No Cost EMI Option

        Identify characteristics of a variety of network protocols and the components of a LAN implementation.

        Identify the components of a WAN implementation, major issues and technologies in network security.

        Identify the components of a remote network implementation and major issues and technologies in disaster recovery.

        Design and implement functional networks. Configure, manage, and maintain essential network devices

        Use devices such as switches and routers to segment network traffic and create resilient networks

        Implement network security, standards, and protocols. Troubleshoot network problems

        Identify the components of a remote network implementation and major issues and technologies in disaster recovery.

       Part 1: Networking Concepts

       Part 2: Infrastructure

       Part 3: Network Operations

       Part 4: Network Security

       Part 5: Network Troubleshooting and Tools

    •   Part 1: Networking Concepts
      Live Lecture 1-8 
      Explain the purpose of a variety of networking concepts and implement them appropriately
      
      Lecture 1: Explain the purposes and uses of ports and protocols. 
      ·         Protocols and ports
      
      ·         Protocol types
      
      ·         Connection-oriented vs. connectionless
      
      Lecture 2: Explain devices, applications, protocols and services at their appropriate OSI layers 
      ·         Layer 1-   Physical
      
      ·         Layer 2 -  Data link
      
      ·         Layer3 - Network
      
      ·         Layer4 – Transport
      
      ·         Layers - Session
      
      ·         Layer6 – Presentation
      
      ·         Layer7 -Application    
      
      Lecture 3: Explain the concepts and characteristics of routing and switching 
      ·         Properties of network traffic
      
      ·         Segmentation and interface properties
      
      ·         Routing
      
      ·         1Pv6 concepts
      
      ·         Performance concepts
      
      ·         NAT/PAT
      
      ·         Port forwarding
      
      ·         Access control list
      
      ·         Distributed switching
      
      ·         Packet-switched vs. circuit
      
      ·         switched network
      
      ·         Software-defined networking 
      
      Lecture 4: Given a scenario, configure the appropriate IP addressing components 
      ·         Private  vs. public
      
      ·         Loop back and reserved
      
      ·         Default  gateway
      
      ·         Virtual  IP
      
      ·         Subnet  mask
      
      ·         Subnetting
      
      ·        Address assignments  
      
      Lecture 5: Compare and contrast the characteristics of network topologies, types and technologies 
      ·         Wired  topologies
      
      ·         Types  
      
      ·         Technologies  that  facilitate the Internet of Things (loT)
      
      ·         Wireless  topologies    
      
      Lecture 6: Given a scenario, implement the appropriate wireless technologies and configurations 
      ·         802.11   standards
      
      ·         Cellula
      
      ·         Frequencies
      
      ·         Speed and distance  requirements
      
      ·         Channel bandwidth
      
      ·         Channel bonding
      
      ·         MIMO/MU-MIMO
      
      ·         Unidirectional/omnidirectional
      
      ·         Site surveys
      
      Lecture 7: Summarize cloud concepts and their purposes 
      ·         Types of services
      
      ·         Cloud delivery models
      
      ·         Connectivity methods
      
      ·         Security implications/considerations
      
      ·         Relationship between  local and cloud resources                  
      
      Lecture 8: Explain the functions of network services 
      ·         DNS  service
      
      ·         DHCP  service
      
      ·         NTP
      
      ·        IPAM
    •   Part 2: Infrastructure
      Live Lecture - 9 - 13 
      Determine & explain the appropriate cabling, device and storage technologies
      
      Lecture 9: Given a scenario, deploy the appropriate cabling solution 
      ·         Media types
      
      ·         Plenum vs. PVC
      
      ·         Connector  types
      
      ·         Transceivers
      
      ·         Termination   points
      
      ·         Copper cable standards
      
      ·         Copper termination  standards
      
      ·         Ethernet  deployment   standards
      
      Lecture 10: Given a scenario, determine the appropriate placement of networking devices on a network and install/configure them 
      ·         Firewall
      
      ·         Router
      
      ·         Switch
      
      ·         Hub    
      
      ·         Bridge
      
      ·         Modems
      
      ·         Wireless  access point
      
      ·         Media converter
      
      ·         Wireless  range extender
      
      ·         VoIP endpoint            
      
      Lecture 11: Explain the purposes and use cases for advanced networking devices 
      ·         Multilayer switch
      
      ·         Proxy server
      
      ·         NGFW/Layer 7 firewall
      
      ·         Wireless  controller
      
      ·         VPN concentrator
      
      ·         VoIP PBX
      
      ·         Load balancer
      
      ·         IDS/IPS         
      
      ·         AANRADIUS server
      
      ·         UTM appliance          
      
      ·         VoIP gateway
      
      ·         Content  filter 
      
      Lecture 12: Explain the purposes of virtualization and network storage technologies 
      ·         Virtual  networking components
      
      ·         Network  storage  types
      
      ·         Connection  type
      
      ·         Jumbo frame   
      
      Lecture 13: Compare and contrast WAN technologies 
      ·         Service type
      
      ·         Transmission  mediums
      
      ·         Characteristics   of service
      
      ·        Termination
    •   Part 3: Network Operations
      Live Lecture - 14 -18 
      Use best practices to manage the network, determine policies & ensure business continuity
      
      Lecture 14: Given a scenario, use appropriate documentation and diagrams to manage the network 
      ·         Diagram symbols
      
      ·         Standard operating procedures/
      
      ·         work instructions
      
      ·         Logical vs. physical diagrams
      
      ·         Rack diagrams
      
      ·         Change management documentation
      
      ·         Wiring and port locations
      
      ·         IDF/MDF documentation
      
      ·         Labelling
      
      ·         Network configuration and performance baselines
      
      ·         Inventory management
      
      Lecture 15: Compare and contrast business continuity and disaster recovery concepts 
      ·         Availability concepts
      
      ·         Recovery
      
      ·         MTBF
      
      ·         SLA  requirements      
      
      Lecture 16: Explain common scanning, monitoring and patching processes and summarize their expected outputs 
      ·         Processes
      
      ·         Event management
      
      ·         Metrics
      
      ·        SNMPmonitors
      
      Lecture 17: Given a scenario, use remote access methods 
      ·         VPN
      
      ·         RDP
      
      ·         SSH
      
      ·         VNC
      
      ·         Telnet
      
      ·         HTTPS/management  URL
      
      ·         Remote tile access
      
      ·         Out-of-band  management
      
      Lecture 18: Identify policies and best practices 
      ·         Privileged  user agreement
      
      ·         Password  policy
      
      ·         On-boarding/off-boarding procedures
      
      ·         Licensing  restrictions
      
      ·         International  export  controls
      
      ·         Data loss prevention
      
      ·         Remote access policies
      
      ·         Incident response  policies
      
      ·         BYOD
      
      ·         AUP
      
      ·         NDA
      
      ·         System life cycle
      
      ·         Safety procedures  and policies
    •   Part 4: Network Security
      Live Lecture - 19 -24 
      Summarize physical security & common attacks while securing the wired and wireless network
      
      Lecture 19: Summarize the purposes of physical security devices 
      ·         Detection
      
      ·         Prevention                  
      
      ·         Lecture 20: Explain authentication and access controls
      
      ·         Authorization, authentication and accounting
      
      ·         Multi factor authentication
      
      ·         Access control
      
      Lecture 21: Given a scenario, secure a basic wireless network 
      ·         WPA
      
      ·         WPA2
      
      ·         TKIP-RC4
      
      ·         CCMP-AES
      
      ·         Authentication  and authorization
      
      ·      Geofencing     
      
      Lecture 22: Summarize common networking attacks 
      ·         Dos
      
      ·         Rogue access point
      
      ·         Spoofing
      
      ·         Evil twin
      
      ·         Deauthentication
      
      ·         War-driving
      
      ·         Brute force
      
      ·         Phishing
      
      ·         VLAN hopping
      
      ·         Social engineering
      
      ·         Ransomware
      
      ·         Man-in-the-middle
      
      ·         Insider  threat
      
      ·         DNS poisoning
      
      ·         Exploits  vs. vulnerabilities
      
      ·         Logic bomb
      
      ·         ARP poisoning
      
      Lecture 23: Given a scenario, implement network device hardening 
      ·         Changing  default  credentials
      
      ·         Avoiding  common  passwords
      
      ·         Upgrading  firmware
      
      ·         Patching  and updates
      
      ·         File hashing
      
      ·         Disabling  unnecessary  services
      
      ·         Using secure protocols
      
      ·         Generating  new keys
      
      ·        Disabling  unused ports
      
      Lecture 24: Explain common mitigation techniques and their purposes 
      ·         Signature  management
      
      ·         Device hardening
      
      ·         Change native  VLAN
      
      ·         Switch  port  protection
      
      ·         Network  segmentation
      
      ·         Privileged  user account
      
      ·         File integrity  monitoring
      
      ·         Role separation
      
      ·         Restricting  access via ACLs
      
      ·         Honeypot/honeynet
      
      ·        Penetration   testing
    •   Part 5: Network Troubleshooting and Tools
      Live Lecture - 25 - 29 
      Explain the network troubleshooting methodology & appropriate tools to support connectivity & performance
      
      Lecture 25: Explain the network troubleshooting methodology 
      ·         Identify the problem
      
      ·         Establish a theory of probable cause
      
      ·         Test the theory to determine the cause
      
      ·         Document findings, actions, and outcomes
      
      ·         Establish a plan of action to resolve the problem and identify potential effects
      
      ·         Implement the solution or escalate as necessary
      
      ·         Verify full system functionality and, if applicable, implement preventive measures
      
      Lecture 26: Given a scenario, use the appropriate tool 
      ·         Hardware tools
      
      ·         Software tools 
      
      Lecture 27: Given a scenario, troubleshoot common wired connectivity and performance issues 
      ·         Attenuation
      
      ·         Latency
      
      ·         Jitter
      
      ·         Crosstalk
      
      ·         EMI
      
      ·         Open/short
      
      ·         Incorrect  pin-out
      
      ·         Incorrect  cable type
      
      ·         Bad port
      
      ·         Transceiver  mismatch
      
      ·         TX/RX reverse
      
      ·         Duplex/speed   mismatch
      
      ·         Damaged cables
      
      ·         Bent pins
      
      ·         Bottlenecks
      
      ·         VLAN mismatch
      
      ·         Network  connection   LED status  indicators
      
      Lecture 28: Given a scenario, troubleshoot common wireless connectivity and performance issues 
      ·         Reflection
      
      ·         Refraction
      
      ·         Absorption
      
      ·         Latency          
      
      ·         Jitter
      
      ·         Attenuation
      
      ·         Incorrect antenna type
      
      ·         Interference
      
      ·         Incorrect antenna placement
      
      ·         Channel overlap
      
      ·         Overcapacity
      
      ·         Distance limitations
      
      ·         Frequency mismatch
      
      ·         Wrong SSID
      
      ·         Wrong passphrase
      
      ·         Security type mismatch
      
      ·         Power levels
      
      ·         Signal-to-noise ratio
      
      Lecture 29: Given a scenario, troubleshoot common network service issues 
      ·         Names not resolving
      
      ·         Incorrect gateway
      
      ·         Incorrect netmask
      
      ·         Duplicate IP addresses
      
      ·         Duplicate MAC addresses
      
      ·         Expired  IP address
      
      ·         Rogue DHCP server
      
      ·         Untrusted SSL certificate
      
      ·         Incorrect  time
      
      ·         Exhausted  DHCP scope
      
      ·         Blocked TCP/UDP ports
      
      ·         Incorrect host-based firewall settings
      
      ·         Incorrect ACL settings
      
      ·         Unresponsive service
      
      ·         Hardware failure
    CompTIA A+ certification or equivalent knowledge, though CompTIA A+ certification is not required.
    The course offers a variety of online training options, including: Live Virtual Classroom Training: Participate in real-time interactive sessions with instructors and peers. 1:1 Doubt Resolution Sessions: Get personalized assistance and clarification on course-related queries. Recorded Live Lectures*: Access recorded sessions for review or to catch up on missed classes. Flexible Schedule: Enjoy the flexibility to learn at your own pace and according to your schedule.
    Live Virtual Classroom Training allows you to attend instructor-led sessions in real-time through an online platform. You can interact with the instructor, ask questions, participate in discussions, and collaborate with fellow learners, simulating the experience of a traditional classroom setting from the comfort of your own space.
    If you miss a live session, you can access recorded lectures* to review the content covered during the session. This allows you to catch up on any missed material at your own pace and ensures that you don't fall behind in your learning journey.
    The course offers a flexible schedule, allowing you to learn at times that suit you best. Whether you have other commitments or prefer to study during specific hours, the course structure accommodates your needs, enabling you to balance your learning with other responsibilities effectively. *Note: Availability of recorded live lectures may vary depending on the course and training provider.
    Education Provider
    Baroda Institute Of Technology - Training Program

    BIT (Baroda Institute Of Technology) Is A Training And Development Organization Catering To The Learning Requirements Of Candidates Globally Through A Wide Array Of Services. Established In 2002. BIT Strength In The Area Is Signified By The Number Of Its Authorized Training Partnerships. The Organization Conducts Trainings For Microsoft, Cisco , Red Hat , Oracle , EC-Council , Etc. Domains / Specialties Corporate Institutional Boot Camp / Classroom Online – BIT Virtual Academy Skill Development Government BIT’s Vision To Directly Associate Learning With Career Establishment Has Given The Right Set Of Skilled Professionals To The Dynamic Industry. Increased Focus On Readying Candidates For On-the-job Environments Makes It A Highly Preferred Learning Provider. BIT Is Valued For Offering Training That Is At Par With The Latest Market Trends And Also Match The Potential Of Candidates. With More Than A Decade Of Experience In Education And Development, The Organization Continues To Explore Wider Avenues In Order To Provide Learners A Platform Where They Find A Solution For All Their Up- Skilling Needs!

    Graduation
    2002
    Data Sciences

    More Courses by : Baroda Institute of Technology


    Baroda Institute of Technology
    ₹20000  25000

    20% off

    This includes following
    •  150 Hours
    •  Completion certificate : Yes
    •  Language : Hinglish

    More Courses by : Baroda Institute of Technology