- Design and implement functional networks
- Configure, manage, and maintain essential network devices
- Use devices such as switches and routers to segment network traffic and create resilient networks
- Identify benefits and drawbacks of existing network configurations
- Implement network security, standards, and protocols
- Troubleshoot network problems

CompTIA Network+ N10-007 Certification Training
Become CompTIA Network+ Certified & Jumpstart Your Career as a Network Specialist
Course Price: $1000
Companies currently employing Certified CompTIA Network+ Specialists include:


Skills you will learn

Networking Concepts
Learn the implementation of various networking concepts

Network Security
Determine & explain the appropriate cabling, device and storage technologies

Network Troubleshooting & Tools
Learn to protect connectivity & performance and network troubleshooting methodology

Infrastructure
Determine & explain the appropriate cabling, device and storage technologies

Network Operations
Use best practices to manage the network, determine policies & ensure business continuity

CompTIA Network+
Certified Professionals
$72,337Min $48K - Max $108K

YOU CAN GET:
- Network Administrator
- Computer Technician
- Network Technician
- Help Desk Technician
- System Engineer
- IS Consultant
- Network Support Specialist
- Network Engineer
- Network Analyst
- IT Manager
About the Training
The training helps you with exam preparation for the CompTIA Net+ (N10-007) certification. The skillset you develop from this course will help you land a job in networking.
About the Certification:
The Network+ certification is brought to you by CompTIA and is the go-to certification when it
comes to learn and get a job in networking field.
The CompTIA Network Plus bootcamp is ideal for anyone seeking network security jobs or wanting to improve his/her portfolio by completing the CompTIA Network+ certification.
Course Outline
- Networking Fundamentals - Part 1
- Networking Fundamentals - Part 2
- What is a Network?
- Network Building Blocks
- Types of Networks
- Host Requirements
- Numbering Systems
- Demo - Working with Numbering Systems
- Communication Types
- Communication Concepts
- Other Communication Methods
- Networking Models
- Workgroup vs. Domain
- Network Topologies
- Physical Bus
- Physical Star
- Physical Ring
- Physical Mesh
- Demo - Identifying Network Topology
- Logical Topologies
- Wireless Topologies
- Network Components and Services - Part 1
- Network Components and Services - Part 2
- Technical Challenges
- Knowledge Specialization
- Developing Soft Skills
- Achieving the Certification
- Planning for Certification
- Chapter 01 Review
- Review
- Introducing Networking Standards - Part 1
- Introducing Networking Standards - Part 2
- What is a Standard?
- Why Use Standards?
- Standards Organizations
- What is OSI/RM
- Upper Layers
- Lower Layers
- IEEE Networking Standards
- Ethernet
- Ethernet Frames
- MAC Addresses
- Access Methods
- 10Base Standards
- Demo - Ethernet Standards
- Chapter 02 Review
- Review
- Fundamentals of Network Transmission - Part 1
- Fundamentals of Network Transmission - Part 2
- Transmission Methods
- Network Performance Factors
- Serial vs. Parallel
- Baseband vs. Broadband
- Data Access Methods
- Communication Domains
- Data Access Methods (Cont.)
- Digital Signals
- Units of Measurement
- Transmission Media
- Twisted Pair Cabling
- Cable Media Categories
- Twisted Pair Connectors
- Copper Media Types
- Wiring Differences
- Coaxial Cabling
- Demo - Media Types
- Fiber Optic Cabling
- Connection Options
- Fiber Optic Connectors
- Demo - Optical Cables and Connectors
- Specialty Connectors and Cabling
- Media Converters
- Demarcation Point
- Other LAN Components
- Wiring Individual Workstations
- Connecting Cables
- Punchdown Blocks
- Introduction to Wireless LANs
- Wireless Networking Fundamentals
- Types of Wireless
- Wireless Networking Components
- Demo - Configuring an Access Point
- Wireless Modes
- Wireless Devices
- Wireless Networking Standards
- 802.11 Standards
- Enhancing Wireless Performance
- Wired Equivalent Privacy
- Wi-Fi Protected Access
- 802.1x
- Demo - Examining Wireless Security
- Planning Wireless Networks
- Choosing Antennas
- Antenna Types
- Wireless Channels
- Site Surveys
- Other Considerations
- Chapter 03 Review
- Review
- Understanding TCP/IP - Part 1
- Understanding TCP/IP - Part 2
- Overview of TCP/IP
- TCP/IP Layers
- Core Protocols
- Transport Protocols
- Transmission Control Protocol
- User Datagram Protocol
- What is a Socket?
- Internet Layer
- Core Internet Layer Protocols
- IP Datagrams
- Application Layer
- Application Layer Protocols
- Well Known Ports
- Introduction to IP Addresses
- Subnet Masks
- Demo - Working with Binary IP Addresses
- IPv4 Address Rules
- Valid Masks
- Default Gateway
- Demo - Configuring IP Addresses
- Address Categories
- Public vs. Private Addresses
- Classful Addressing
- Classless Addressing
- Demo - CIDR Notation
- Create IPv4 Subnets
- Simple Subnetting
- Complex Subnetting
- Demo - Creating Subnets
- Introduction to IPv6
- IPv6 Advantages
- IPv6 Addresses
- IPv6 Addressing
- Global Unicast
- Unique Local Unicast
- Link Local Address
- Special Addresses
- Autoconfiguration in IPv6
- Demo - Viewing and Configuring IPV6
- Introducing DHCP
- DHCP Leases
- Lease Renewal
- DHCP Server Placement
- DHCP Implementations
- DHCP Servers
- What is Name Resolution
- Types of Names
- Introduction to DNS
- DNS Components
- Resource Records
- DNS Zones and Domains
- Name Resolution Process
- Types of Queries
- Chapter 04 Review
- Review
- Introduction to Network Devices - Part 1
- Introduction to Network Devices - Part 2
- Common Network Devices
- Device Capabilities
- OSI / RM Layers and Devices
- Introduction to Physical Devices
- Network Interface Cards
- Repeaters
- Repeater Types
- Hubs
- Data Link Filtering
- What is a Bridge?
- Network Switches
- Introduction to the Layer 2 Switch
- Switch Categories
- Switch Characteristics
- Power Over Ethernet
- Virtual Capabilities
- Virtual LAN (VLAN)
- Initial Switch Configuration
- Interface Configuration
- Introduction to STP
- STP Port States
- RSTP Differences
- Understanding Trunking
- Trunking Protocols
- Additional Management for Switches
- The Layer 3 Job
- Routing Tables
- Demo - Reading a Routing Table
- Network Segmentation Benefits
- Hardware vs. Software Routers
- Static vs. Dynamic Routing
- Routing Protocols
- Dynamic Routing
- What is a Metric?
- Distance Vector vs. Link State
- Path Vector
- Interior Routing Protocols
- Exterior Routing Protocols
- Routing Problems
- Router Redundancy
- Additional Network Devices
- Load Balancers
- Traffic Shapers
- Chapter 05 Review
- Review
- WAN Fundamentals - Part 1
- WAN Fundamentals - Part 2
- What is a Wide Area Network (WAN)?
- WAN Options
- WAN Categories
- Public Switched Telephone Network
- Integrated Services Digital Network
- Digital Subscriber Line
- Cable Modems
- MPLS
- ATM
- Frame Relay
- Leased Lines
- Metropolitan Ethernet
- Satellite WANs
- Wireless Local Loop
- WiMAX
- Cellular Connections
- GSM vs. CDMA
- 3G Technologies
- 4G Technology
- Fiber WAN Connections
- OC Levels
- Demo - Choosing a WAN Provider
- Chapter 06 Review
- Review
- Introduction to Remote Networking - Part 1
- Introduction to Remote Networking - Part 2
- Introduction to Remote Networking
- Remote Node
- Remote Desktop Control
- Remote Control Concepts
- ooDemo - Configuring Remote Control
- Understanding Authentication
- Authentication, Authorization, and Accounting (AAA)
- CHAP and MS-CHAP
- EAP and Other Authentication Protocols
- RADIUS
- TACACS+
- What is a VPN?
- VPN Tunnel Types
- What is Encapsulation?
- VPN Components
- Encryption Types
- VPN Concentrators
- VPN Protocols
- Demo - Create and Configure a VPN
- Chapter 07 Review
- Review
- Network Security Fundamentals - Part 1
- Network Security Fundamentals - Part 2
- Introduction to Network Security
- The CIA Triad
- Network Threats
- Network Vulnerabilities
- Understanding Risk
- What is AAAA?
- Cryptography
- Algorithms and Keys
- Digital Signatures
- Best Practices for Permissions
- Best Practices for Employees
- Planning for Network Security
- Types of Threats
- Threat-Vulnerability Pairs
- Identifying Vulnerabilities
- Types of Vulnerabilities
- Mitigating Risks
- User Awareness
- Understanding Compliance
- Business Continuity
- Change Management
- Network Documentation
- Threat Categories
- Introduction to Software Attacks
- Malicious Code Attacks
- Types of Malicious Code
- Network Threats
- Port Scanning and Eavesdropping
- IP Spoofing
- Denial of Service (DoS)
- Man-in-the-Middle Attacks
- Human Attacks
- Wireless Vulnerabilities and Threats
- Protecting the Network
- Implementing Physical Protection
- Physical Security Options
- Demo - Examining Physical Security Devices
- Anti-Malware
- Demo - Anti-malware Options
- Network Hardening
- Securing Network Communications
- Introduction to Firewalls
- Types of Firewalls
- Demo - Using Firewalls
- Authentication
- Authentication Factors
- Network Access Control
- Chapter 08 Review
- Review
- Maintaining Business Continuity - Part 1
- Maintaining Business Continuity - Part 2
- Maintaining Business Continuity - Part 3
- Understanding High Availability
- High Availability Options
- Disaster Recovery
- Monitoring Network Devices
- Patch Management
- What is Virtualization?
- Virtualization Benefits
- Virtualization and Cloud Computing
- Virtual Machine Hosts
- Virtualization Components
- The Importance of Storage
- Storage Options
- Storage Area Networks
- Virtual Devices and Networks
- What is Cloud Computing?
- The Cloud Advantage
- Cloud Models
- Cloud Services Models
- Demo - Working in the Cloud
- Unified Communications
- Unified Communication Components
- Unified Communication Technologies
- Chapter 09 Review
- Review
- Network Safety Fundamentals - Part 1
- Network Safety Fundamentals - Part 2
- The Importance of Safety
- Electrical Safety
- Static Electricity
- Preventing Static Electricity
- Fire Suppression Systems
- Implementing Network Policies
- Types of Monitoring
- Performance Baselines
- Monitoring Tools
- Network Monitoring Tools
- Introduction to Network Tools
- Analyzing Traffic
- Environmental Monitoring
- Using SYSLOG
- Using SIEM
- Using SNMP
- SNMP Components
- Monitoring Operating Systems
- Using Task Manager
- Using Event Viewer
- Maintaining and Monitoring Networks
- Using Performance Monitor
- Additional Monitoring Types
- Introduction to Patch Management
- Operating System Updates
- Updating Windows Systems
- Managing Network Devices
- Introduction to Troubleshooting
- Identifying the Issue
- Establish a Theory of Probable Cause
- Create an Action Plan
- Putting it All Together
- Hardware Troubleshooting Tools
- Network Tool Kit
- Software Toolkits
- OS Troubleshooting Tools
- Demo - OS Troubleshooting Tools
- Introduction to Wireless Issues
- Wireless Signal Issues
- Troubleshooting Hardware and Configuration
- Wireless Security Issues
- Troubleshooting Wired Connectivity Issues
- Troubleshooting Fiber Cable Issues
- Troubleshooting Network Service Issues
- Troubleshooting Security Issues
- Chapter 10 Review
- Review
- Course Closure
- Course Summary
Case Study: Meet John Rema,
a Certified CompTIA Network Engineer
Building a progressive yet sustainable career can sometimes become quite a challenge. There are lots of
obstacles along the way. People lose interest in their field of study midway or in other instances,
stagnancy in a professional role tires them. The only way or another.
Information technology is one of the fields which shows a lot of promise these days. However, the arena
is quite dynamic. From simple web development to cybersecurity and artificial intelligence, a lot has
changed in the past decade. A bachelor’s or even master’s degree can lose its efficiency if newer
avenues are not explored. Thankfully cybersecurity bootcamps allow individuals this opportunity.
From an entry-level position to a budding career
John was one of the people who were severely hit by the collapse of the housing market in 2008. After
completing a degree in computer sciences, his interests began to shift towards real estate. His soft
skills and persuasion techniques made him successful. When the bubble of profits began to grow in the
sector, he was excited about the prospects but then it all came crashing down.
For several years he was broke and jobless. His bachelor’s degree alone was not enough to land him a
sensible position in the market. “I had a little left to go by. I would use friends’ computers to look
for job openings. There weren’t many and the ones which were hiring would only offer peanuts for my
qualifications” John says.
In 2014, he gave the CompTIA A+ Certificate exam. Within a month he was hired as an IT Support
Technician. He enjoyed the job and it was much more stable than his positive as a real estate broker.
Within a few years though, it became a road with no end. He was working in the same position with
occasional bonuses but other than that, nothing seemed to be moving.
He tried several things like trying certificate courses and practicing new skills but none of them were
beneficial. One thing he did discover during this time, was his interest in networking. CompTIA A+ is a
general certification that encompasses fundamentals about computers and diagnosing common issues.
CompTIA Net+ is a vendor-neutral exam that familiarizes people with networking protocols and other
components of the field. He started looking for part-time study options and came across the Wagner
College training program that offers 16 hours of self-paced training which suited his current time
calendar.
Within the same week, John took the training and able to pass the CompTIA Net+ exam. At that time the
cybercrime was taking companies by surprise, causing monumental damages. Within a few months, John was
able to switch jobs to assume the role of the Network Specialist. In the next couple of months, he
became the IT Manager with a team of ten people under him. His department is growing and so are his
take-home salaries.
“I had the ability to make such a drastic change in my life, yet I was unaware of how to do it. I am
glad I discovered the great networking bootcamp which gave me the ability to direct my career growth
appropriately” John Rema
CERTIFICATE OF
COMPLETION
The course prepares you for success with key topics that network standards, network communications, working with TCP/IP, network devices, wide area networks, remote access, network security, building highly available and scalable networks, and maintenance, monitoring, and troubleshooting. Students will receive a certificate of completion upon completing all modules.
Ready to make the commitment?
