Network+

Introduction to Networking Introduction

Useful Expressions

Tools for Professional Approach: It’s not just about learning, it’s about having the confidence to use English in real life and upgrade your business communication skills.

8 videos, 17 readings
Reading: The Functions of a Network
Reading: Peer-to-Peer Versus Client/Server Networks
Reading: The Peer-to-Peer Networking Model
Reading: The Client/Server Networking Model
Reading: Characteristics Specified in the IEEE 802 Standards
Reading: The IEEE 802 Standards
Reading: Introduction to Wireless Networks
Reading: Establishing Communications Between Wireless Devices
Reading: Spread Spectrum Technology
Reading: Frequency-Hopping Spread Spectrum (FHSS) Technology
Reading: Direct-Sequence Spread Spectrum (DSSS) Technology
Reading: Infrared Wireless Networking
Reading: Bluetooth
Reading: Factors Affecting Wireless Signals
Reading: Wireless Antennas
Reading: Antenna Ratings
Reading: Antenna Coverage

Cabling Standards, Media and Connectors

Diplomatic Language

Tools for Professional Approach - Step 2: It’s not just about learning, it’s about having the confidence to use English in real life and upgrade your business communication skills.

11 readings
Reading: Features and Characteristics of Ethernet 802.3 Standards
Reading: 10Base2, 10BaseT, 10BaseFL, Fast Ethernet
Reading: Gigabit Ethernet: 1000BaseX, 10 Gigabit Ethernet
Reading: Media Connectors, RJ Connectors
Reading: F-Type Connectors, Fiber Connectors
Reading: IEEE 1394 (FireWire), Universal Serial Bus (USB)
Reading: Networking Media, Media Interference
Reading: Transmission Speed, Media Length
Reading: Installation and Repair, Baseband Versus Broadband Signaling
Reading: Baseband, Broadband, Simplex, Half-Duplex, and Full-Duplex
Reading: Common Network Cable, Cable Media

Networking Components and Devices

16 readings
Reading: Hubs, Switches, Switching Methods
Reading: Working with Hubs and Switches
Reading: Hub and Switch Ports
Reading: Cables Connecting Hubs and Switches
Reading: Hub and Switch Indicator Lights
Reading: Rack-Mount, Stackable, and Freestanding Devices
Reading: Managed Hubs and Switches
Reading: Bridges, Bridge Implementation Considerations
Reading: Types of Bridges, Routers
Reading: Routable Protocols and Routing Protocols
Reading: Dedicated Hardware Versus Server-Based Routers
Reading: Gateways, CSUs/DSUs, Modems
Reading: Modem Connection Speeds, Network Interface Cards (NICs)
Reading: Types of Network Interfaces, Installing Network Cards
Reading: ISDN Terminal Adapters, Wireless Access Point (WAP)
Reading: Transceivers, Firewalls, Identifying MAC Addresses

The OSI Model

12 readings
Reading: Why Do We Need a Network Model?
Reading: OSI Reference Model 101
Reading: Layer 1: The Physical Layer
Reading: Layer 2: The Data-Link Layer
Reading: Layer 3: The Network Layer
Reading: Layer 4: The Transport Layer
Reading: Layer 5: The Session Layer
Reading: Layer 6: The Presentation Layer
Reading: Layer 7: The Application Layer
Reading: The Layers at Which Devices Operate
Reading: Hubs, Switches, Bridges, Routers, NICs
Reading: Wireless Access Points (WAPs)

Overview of Network Protocols

28 readings
Reading: Introduction to Protocols
Reading: The Function of Protocols
Reading: Mapping Protocols to the OSI Model
Reading: Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX)
Reading: The IPX/SPX Protocol Suite
Reading: IPX Addressing
Reading: Mapping IPX/SPX to the OSI Model
Reading: IPX/SPX Interoperability
Reading: IPX/SPX Naming
Reading: NetBEUI
Reading: Mapping NetBEUI to the OSI Model
Reading: NetBEUI Addressing
Reading: AppleTalk/AppleTalk over IP (Internet Protocol)
Reading: AppleTalk Addressing
Reading: Mapping AppleTalk to the OSI Model
Reading: AppleTalk Interoperability
Reading: AppleTalk Routing
Reading: AppleTalk Naming
Reading: Transmission Control Protocol/Internet Protocol (TCP/IP)
Reading: A Brief History of TCP/IP
Reading: The TCP/IP Protocol Suite
Reading: TCP/IP Standards
Reading: TCP/IP Addressing
Reading: TCP/IP Interoperability
Reading: TCP/IP Naming
Reading: TCP/IP Routing Protocols
Reading: Mapping TCP/IP to the OSI Model
Reading: Protocol Overview and Comparison

Working with TCP/IP

53 readings
Reading: IP Addressing
Reading: General IP Addressing Principles
Reading: IPv4
Reading: Subnet Mask Assignment
Reading: Broadcast Addresses and “This Network”
Reading: Classless Interdomain Routing (CIDR)
Reading: IPv6
Reading: Default Gateways
Reading: IP Address Classes
Reading: Subnet Masks
Reading: Understanding Subnetting
Reading: Reasons to Subnet
Reading: Public and Private IP Address Schemes
Reading: Private Address Ranges
Reading: Practical Uses of Public and Private IP Addressing
Reading: Assigning IP Addresses
Reading: Static Addressing
Reading: Dynamic Addressing
Reading: BOOT Protocol (BOOTP)
Reading: APIPA
Reading: Common TCP/IP Protocols
Reading: Internet Protocol (IP)
Reading: Transmission Control Protocol (TCP)
Reading: User Datagram Protocol (UDP)
Reading: File Transfer Protocol (FTP)
Reading: Secure File Transfer Protocol (SFTP)
Reading: Trivial File Transfer Protocol (TFTP)
Reading: Simple Mail Transfer Protocol (SMTP)
Reading: Hypertext Transfer Protocol (HTTP)
Reading: Hypertext Transfer Protocol Secure (HTTPS)
Reading: Post Office Protocol Version 3/Internet Message Access Protocol Version 4 (POP3/IMAP4)
Reading: Telnet
Reading: Secure Shell (SSH)
Reading: Internet Control Message Protocol (ICMP)
Reading: Address Resolution Protocol (ARP)/Reverse Address Resolution Protocol (RARP)
Reading: Network Time Protocol (NTP)
Reading: Network News Transfer Protocol (NNTP)
Reading: Secure Copy Protocol (SCP)
Reading: Lightweight Directory Access Protocol (LDAP)
Reading: Internet Group Management Protocol (IGMP)
Reading: Line Printer Remote (LPR)
Reading: TCP/UDP Ports
Reading: Identifying Common TCP/IP Port Numbers
Reading: TCP/IP-Based Network Services
Reading: Domain Name System (DNS)
Reading: Internet Connection Sharing (ICS)
Reading: Windows Internet Name Service (WINS)
Reading: Simple Network Management Protocol (SNMP)
Reading: Network File System (NFS)
Reading: Zero Configuration (Zeroconf)
Reading: Server Message Block (SMB)
Reading: Apple File Protocol (AFP)
Reading: Line Printer Daemon (LPD)

WAN and Internet Access Technologies

21 readings
Reading: Introduction to Wide Area Networking
Reading: Public Networks
Reading: Private Networks
Reading: Switching Methods
Reading: Packet Switching
Reading: Circuit Switching
Reading: Message Switching
Reading: WAN Technologies
Reading: Dial-up Modem Connections
Reading: Integrated Services Digital Network (ISDN)
Reading: T-carrier Lines
Reading: Fiber Distributed Data Interface (FDDI)
Reading: X.25
Reading: SONET/Ocx Levels
Reading: Asynchronous Transfer Mode (ATM) and Frame Relay
Reading: xDSL Internet Access
Reading: Cable Internet Access
Reading: Cable Versus DSL
Reading: Satellite Internet Access
Reading: Wireless Internet Access
Reading: POTS Internet Access

Remote Access and Security Protocols

21 readings
Reading: Remote Access Protocols and Services
Reading: Remote Access Service (RAS)
Reading: Point-to-Point Protocol (PPP)
Reading: Serial Line Internet Protocol (SLIP)
Reading: Point-to-Point Protocol over Ethernet (PPPoE)
Reading: Point-to-Point Tunneling Protocol (PPTP)
Reading: Virtual Private Networks (VPN)
Reading: Remote Desktop Protocol (RDP)
Reading: Security Protocols
Reading: IPSec
Reading: Layer Two Tunneling Protocol (L2TP)
Reading: Secure Sockets Layer (SSL)
Reading: Securing Wireless Networks
Reading: Wired Equivalent Privacy (WEP)
Reading: Wi-Fi Protected Access (WPA)
Reading: 802.1x
Reading: Authentication Protocols
Reading: Extensible Authentication Protocol (EAP)
Reading: Password Authentication Protocol (PAP)
Reading: Remote Authentication Dial-In User Service (RADIUS)
Reading: Kerberos

Network Operating Systems and Clients

50 readings
Reading: Introduction to Network Operating Systems
Reading: Choosing a Network Operating System
Reading: Which Network Operating System Is Best?
Reading: Unix/Linux File Systems
Reading: System Requirements
Reading: Monitoring and Performance Tools
Reading: Managing Linux Disk Drives
Reading: Linux User Management Basics
Reading: Unix/Linux File Systems
Reading: Verifying Linux Network Settings
Reading: Linux Authentication
Reading: Linux File and Print Services
Reading: Linux Application Support
Reading: Linux Security
Reading: Mac OS X Server
Reading: Mac OS Basics
Reading: Mac OS X File Systems and File and Print Services
Reading: Mac OS X Security
Reading: Novell NetWare
Reading: NetWare System Requirements
Reading: NetWare File Systems
Reading: NetWare Performance-Monitoring Tools
Reading: NetWare User Administration
Reading: NetWare Server Configuration
Reading: Viewing and Testing NetWare Network Configuration
Reading: NetWare Authentication
Reading: NetWare File and Print Services
Reading: NetWare Application Support
Reading: NetWare Security
Reading: Windows 2000 and Windows Server 2003
Reading: Microsoft Active Directory
Reading: Windows Server System Requirements
Reading: Windows Server File Systems
Reading: Windows Server Performance Monitoring Tools
Reading: Viewing Network Configurations and Testing Connectivity
Reading: Managing Windows Server Storage
Reading: Windows Server User Management Basics
Reading: Windows Server Authentication
Reading: Windows Server File and Print Services
Reading: Windows Server Application Support
Reading: Windows Server Security
Reading: AppleShare IP
Reading: Operating System Interoperability
Reading: Using Windows with NetWare
Reading: Using Windows and Linux/Unix Servers
Reading: Using NetWare and Linux Servers
Reading: Network Operating System Client Support
Reading: Windows Server Client Support
Reading: NetWare Server Client Support
Reading: Linux Client Support

Configuring Network Connectivity

13 readings
Reading: Configuring Client Connectivity
Reading: Configuring Client Physical Connections
Reading: Connecting to Network Media
Reading: Configuring Protocol Settings
Reading: Reviewing Network Connectivity
Reading: Networking Tools
Reading: Selecting the Appropriate Tool for Wiring
Reading: Wire Crimpers
Reading: Punchdown Tools, Tone Generators
Reading: Media Testers, Hardware Loopback Connectors
Reading: Wireless Detection, Configuring Remote Connectivity
Reading: Physical Connections, Protocols
Reading: Software, Dial-up Access, Security

Securing the Network

1 video, 18 readings
Reading: Security Responsibilities of a Network Administrator
Reading: Physical and Logical Security
Reading: Physical Security
Reading: Logical Security
Reading: Auditing
Reading: Firewalls
Reading: The Purpose and Function of a Firewall
Reading: Demilitarized Zones
Reading: Proxy Services
Reading: Caching Proxy Servers
Reading: Using a Proxy Server
Reading: Understanding How Security Affects a Network
Reading: Port Blocking/Filtering
Reading: Authentication
Reading: Encryption
Reading: Intranets and Extranets
Reading: Intranets
Reading: Extranets

VLANs, Antivirus, Fault Tolerance, and Disaster Recovery

18 readings
Reading: VLANs
Reading: VLAN Membership
Reading: Viruses, Virus Solutions, and Malicious Software
Reading: Trojans, Worms, Spyware, and Hoaxes
Reading: Protecting Computers from Viruses
Reading: Understanding Fault Tolerance
Reading: RAID
Reading: Other Fault-Tolerance Measures
Reading: Disaster Recovery
Reading: Backup Methods
Reading: A Comparison of Backup Methods
Reading: Backup Rotation Schedules
Reading: Backup Best Practices
Reading: Offsite Storage
Reading: Hot and Cold Spares
Reading: Hot Spare and Hot Swapping
Reading: Cold Spare and Cold Swapping
Reading: Hot, Warm, and Cold Sites

Troubleshooting Tools and Utilities

12 readings
Reading: Troubleshooting Tools
Reading: The ping Utility
Reading: The Trace Route Utility (Tracert/traceroute)
Reading: The arp Utility, The netstat Utility
Reading: The nbtstat Utility, The ipconfig and ifconfig Utilities
Reading: The winipcfg Utility, DNS Diagnostic Tools (nslookup/dig)
Reading: The route Utility, Using Diagnostic Utilities
Reading: Ping, The tracert Command, The traceroute Command
Reading: The arp Command, The netstat Command
Reading: The nbtstat Command, The ipconfig Command
Reading: The ifconfig Command, The winipcfg Command
Reading: The Nslookup/dig Commands

Troubleshooting Network Connectivity

14 readings
Reading: Interpreting Visual Indicators, LEDs on Networking Devices
Reading: LEDs on NICs and Other Devices, Troubleshooting Remote Connectivity
Reading: Troubleshooting Physical Connectivity, Calling Technical Support
Reading: Troubleshooting Authentication Failure, Troubleshooting Protocol Configuration Problems
Reading: Troubleshooting a Small Office/Home Office Router
Reading: Troubleshooting Client Connectivity Errors
Reading: Protocol Errors, Authentication, Permissions Errors, Physical Connectivity Errors
Reading: Troubleshooting Checklists, Troubleshooting Cable Problems
Reading: Troubleshooting Network Connectivity
Reading: Troubleshooting Network Printing
Reading: Troubleshooting Data Access, Troubleshooting NICs
Reading: Adding, Modifying, or Removing Network Services
Reading: Adding, Modifying, or Removing DHCP, Adding, Modifying, or Removing DNS
Reading: Adding, Modifying, or Removing WINS

Troubleshooting Procedures and Best Practices

13 readings
Reading: Troubleshooting Basics, Troubleshooting Servers and Workstations
Reading: General Troubleshooting Considerations
Reading: The Art of Troubleshooting, Identify the Symptoms and Potential Causes
Reading: Identifying the Affected Area, Establishing What Has Changed
Reading: Selecting the Most Probable Cause of the Problem
Reading: Implement an Action Plan and Solution, Including Potential Effects
Reading: Testing the Results, Identify the Results and Effects of the Solution
Reading: Documenting the Solution, Troubleshooting Topology Errors
Reading: Bus Network Errors, Star Network Errors
Reading: Ring Network Errors, Mesh Network Errors
Reading: Troubleshooting Wired and Wireless Infrastructure-Related Problems
Reading: Troubleshooting Wiring, Troubleshooting Infrastructure Hardware
Reading: Troubleshooting Wireless Connections

+1 540-429-9960

Network+

$1500
Instructor:
Categories:
Reviews:

About this course

Network+ ensures an IT professional has the knowledge and skills to Design and implement functional networks,Configure, manage, and maintain essential network devices,Troubleshoot network problems,Support the creation of virtualized networks, and many more…
 

COURSE SUMMARY

CompTIA Network+ is a vendor neutral networking certification that is trusted around the world. It validates the essential knowledge and skills needed to confidently design, configure, manage and troubleshoot any wired and wireless networks. CompTIA Network+ certified individuals are in-demand worldwide.
 

COURSE OVERVIEW

If you are considering joining the Information Technology field, one of the first things you should do is to get certified. In the world of Information Technology having certifications will put you in a league of your own. Companies looking to hire IT Specialist almost always request this certification before even considering hiring a candidate. Having a certification will significantly improve your chances of getting hired.
 

Duration: 1 week – 20hrs (4hrs per session)
Days: Monday thru Friday
Awarded by: COMPTIA
Type: Online
Price: $1500

Syllabus

Network+ ensures an IT professional has the knowledge and skills to Design and implement functional networks,Configure, manage, and maintain essential network devices,Troubleshoot network problems,Support the creation of virtualized networks, and many more.

Introduction to Networking Introduction 0/25

Useful Expressions

Tools for Professional Approach: It’s not just about learning, it’s about having the confidence to use English in real life and upgrade your business communication skills.

8 videos, 17 readings
Reading: The Functions of a Network
minutes
Reading: Peer-to-Peer Versus Client/Server Networks
minutes
Reading: The Peer-to-Peer Networking Model
minutes
Reading: The Client/Server Networking Model
minutes
Reading: Characteristics Specified in the IEEE 802 Standards
minutes
Reading: The IEEE 802 Standards
minutes
Reading: Introduction to Wireless Networks
minutes
Reading: Establishing Communications Between Wireless Devices
minutes
Reading: Spread Spectrum Technology
minutes
Reading: Frequency-Hopping Spread Spectrum (FHSS) Technology
minutes
Reading: Direct-Sequence Spread Spectrum (DSSS) Technology
minutes
Reading: Infrared Wireless Networking
minutes
Reading: Bluetooth
minutes
Reading: Factors Affecting Wireless Signals
minutes
Reading: Wireless Antennas
minutes
Reading: Antenna Ratings
minutes
Reading: Antenna Coverage
minutes
10 minutes

Cabling Standards, Media and Connectors 0/11

Diplomatic Language

Tools for Professional Approach - Step 2: It’s not just about learning, it’s about having the confidence to use English in real life and upgrade your business communication skills.

11 readings
Reading: Features and Characteristics of Ethernet 802.3 Standards
minutes
Reading: 10Base2, 10BaseT, 10BaseFL, Fast Ethernet
minutes
Reading: Gigabit Ethernet: 1000BaseX, 10 Gigabit Ethernet
minutes
Reading: Media Connectors, RJ Connectors
minutes
Reading: F-Type Connectors, Fiber Connectors
minutes
Reading: IEEE 1394 (FireWire), Universal Serial Bus (USB)
minutes
Reading: Networking Media, Media Interference
minutes
Reading: Transmission Speed, Media Length
minutes
Reading: Installation and Repair, Baseband Versus Broadband Signaling
minutes
Reading: Baseband, Broadband, Simplex, Half-Duplex, and Full-Duplex
minutes
Reading: Common Network Cable, Cable Media
minutes

Networking Components and Devices 0/16

16 readings
Reading: Hubs, Switches, Switching Methods
minutes
Reading: Working with Hubs and Switches
minutes
Reading: Hub and Switch Ports
minutes
Reading: Cables Connecting Hubs and Switches
minutes
Reading: Hub and Switch Indicator Lights
minutes
Reading: Rack-Mount, Stackable, and Freestanding Devices
minutes
Reading: Managed Hubs and Switches
minutes
Reading: Bridges, Bridge Implementation Considerations
minutes
Reading: Types of Bridges, Routers
minutes
Reading: Routable Protocols and Routing Protocols
minutes
Reading: Dedicated Hardware Versus Server-Based Routers
minutes
Reading: Gateways, CSUs/DSUs, Modems
minutes
Reading: Modem Connection Speeds, Network Interface Cards (NICs)
minutes
Reading: Types of Network Interfaces, Installing Network Cards
minutes
Reading: ISDN Terminal Adapters, Wireless Access Point (WAP)
minutes
Reading: Transceivers, Firewalls, Identifying MAC Addresses
minutes

The OSI Model 0/12

12 readings
Reading: Why Do We Need a Network Model?
minutes
Reading: OSI Reference Model 101
minutes
Reading: Layer 1: The Physical Layer
minutes
Reading: Layer 2: The Data-Link Layer
minutes
Reading: Layer 3: The Network Layer
minutes
Reading: Layer 4: The Transport Layer
minutes
Reading: Layer 5: The Session Layer
minutes
Reading: Layer 6: The Presentation Layer
minutes
Reading: Layer 7: The Application Layer
minutes
Reading: The Layers at Which Devices Operate
minutes
Reading: Hubs, Switches, Bridges, Routers, NICs
minutes
Reading: Wireless Access Points (WAPs)
minutes

Overview of Network Protocols 0/28

28 readings
Reading: Introduction to Protocols
minutes
Reading: The Function of Protocols
minutes
Reading: Mapping Protocols to the OSI Model
minutes
Reading: Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX)
minutes
Reading: The IPX/SPX Protocol Suite
minutes
Reading: IPX Addressing
minutes
Reading: Mapping IPX/SPX to the OSI Model
minutes
Reading: IPX/SPX Interoperability
minutes
Reading: IPX/SPX Naming
minutes
Reading: NetBEUI
minutes
Reading: Mapping NetBEUI to the OSI Model
minutes
Reading: NetBEUI Addressing
minutes
Reading: AppleTalk/AppleTalk over IP (Internet Protocol)
minutes
Reading: AppleTalk Addressing
minutes
Reading: Mapping AppleTalk to the OSI Model
minutes
Reading: AppleTalk Interoperability
minutes
Reading: AppleTalk Routing
minutes
Reading: AppleTalk Naming
minutes
Reading: Transmission Control Protocol/Internet Protocol (TCP/IP)
minutes
Reading: A Brief History of TCP/IP
minutes
Reading: The TCP/IP Protocol Suite
minutes
Reading: TCP/IP Standards
minutes
Reading: TCP/IP Addressing
minutes
Reading: TCP/IP Interoperability
minutes
Reading: TCP/IP Naming
minutes
Reading: TCP/IP Routing Protocols
minutes
Reading: Mapping TCP/IP to the OSI Model
minutes
Reading: Protocol Overview and Comparison
minutes

Working with TCP/IP 0/53

53 readings
Reading: IP Addressing
minutes
Reading: General IP Addressing Principles
minutes
Reading: IPv4
minutes
Reading: Subnet Mask Assignment
minutes
Reading: Broadcast Addresses and “This Network”
minutes
Reading: Classless Interdomain Routing (CIDR)
minutes
Reading: IPv6
minutes
Reading: Default Gateways
minutes
Reading: IP Address Classes
minutes
Reading: Subnet Masks
minutes
Reading: Understanding Subnetting
minutes
Reading: Reasons to Subnet
minutes
Reading: Public and Private IP Address Schemes
minutes
Reading: Private Address Ranges
minutes
Reading: Practical Uses of Public and Private IP Addressing
minutes
Reading: Assigning IP Addresses
minutes
Reading: Static Addressing
minutes
Reading: Dynamic Addressing
minutes
Reading: BOOT Protocol (BOOTP)
minutes
Reading: APIPA
minutes
Reading: Common TCP/IP Protocols
minutes
Reading: Internet Protocol (IP)
minutes
Reading: Transmission Control Protocol (TCP)
minutes
Reading: User Datagram Protocol (UDP)
minutes
Reading: File Transfer Protocol (FTP)
minutes
Reading: Secure File Transfer Protocol (SFTP)
minutes
Reading: Trivial File Transfer Protocol (TFTP)
minutes
Reading: Simple Mail Transfer Protocol (SMTP)
minutes
Reading: Hypertext Transfer Protocol (HTTP)
minutes
Reading: Hypertext Transfer Protocol Secure (HTTPS)
minutes
Reading: Post Office Protocol Version 3/Internet Message Access Protocol Version 4 (POP3/IMAP4)
minutes
Reading: Telnet
minutes
Reading: Secure Shell (SSH)
minutes
Reading: Internet Control Message Protocol (ICMP)
minutes
Reading: Address Resolution Protocol (ARP)/Reverse Address Resolution Protocol (RARP)
minutes
Reading: Network Time Protocol (NTP)
minutes
Reading: Network News Transfer Protocol (NNTP)
minutes
Reading: Secure Copy Protocol (SCP)
minutes
Reading: Lightweight Directory Access Protocol (LDAP)
minutes
Reading: Internet Group Management Protocol (IGMP)
minutes
Reading: Line Printer Remote (LPR)
minutes
Reading: TCP/UDP Ports
minutes
Reading: Identifying Common TCP/IP Port Numbers
minutes
Reading: TCP/IP-Based Network Services
minutes
Reading: Domain Name System (DNS)
minutes
Reading: Internet Connection Sharing (ICS)
minutes
Reading: Windows Internet Name Service (WINS)
minutes
Reading: Simple Network Management Protocol (SNMP)
minutes
Reading: Network File System (NFS)
minutes
Reading: Zero Configuration (Zeroconf)
minutes
Reading: Server Message Block (SMB)
minutes
Reading: Apple File Protocol (AFP)
minutes
Reading: Line Printer Daemon (LPD)
minutes

WAN and Internet Access Technologies 0/21

21 readings
Reading: Introduction to Wide Area Networking
minutes
Reading: Public Networks
minutes
Reading: Private Networks
minutes
Reading: Switching Methods
minutes
Reading: Packet Switching
minutes
Reading: Circuit Switching
minutes
Reading: Message Switching
minutes
Reading: WAN Technologies
minutes
Reading: Dial-up Modem Connections
minutes
Reading: Integrated Services Digital Network (ISDN)
minutes
Reading: T-carrier Lines
minutes
Reading: Fiber Distributed Data Interface (FDDI)
minutes
Reading: X.25
minutes
Reading: SONET/Ocx Levels
minutes
Reading: Asynchronous Transfer Mode (ATM) and Frame Relay
minutes
Reading: xDSL Internet Access
minutes
Reading: Cable Internet Access
minutes
Reading: Cable Versus DSL
minutes
Reading: Satellite Internet Access
minutes
Reading: Wireless Internet Access
minutes
Reading: POTS Internet Access
minutes

Remote Access and Security Protocols 0/21

21 readings
Reading: Remote Access Protocols and Services
minutes
Reading: Remote Access Service (RAS)
minutes
Reading: Point-to-Point Protocol (PPP)
minutes
Reading: Serial Line Internet Protocol (SLIP)
minutes
Reading: Point-to-Point Protocol over Ethernet (PPPoE)
minutes
Reading: Point-to-Point Tunneling Protocol (PPTP)
minutes
Reading: Virtual Private Networks (VPN)
minutes
Reading: Remote Desktop Protocol (RDP)
minutes
Reading: Security Protocols
minutes
Reading: IPSec
minutes
Reading: Layer Two Tunneling Protocol (L2TP)
minutes
Reading: Secure Sockets Layer (SSL)
minutes
Reading: Securing Wireless Networks
minutes
Reading: Wired Equivalent Privacy (WEP)
minutes
Reading: Wi-Fi Protected Access (WPA)
minutes
Reading: 802.1x
minutes
Reading: Authentication Protocols
minutes
Reading: Extensible Authentication Protocol (EAP)
minutes
Reading: Password Authentication Protocol (PAP)
minutes
Reading: Remote Authentication Dial-In User Service (RADIUS)
minutes
Reading: Kerberos
minutes

Network Operating Systems and Clients 0/50

50 readings
Reading: Introduction to Network Operating Systems
minutes
Reading: Choosing a Network Operating System
minutes
Reading: Which Network Operating System Is Best?
minutes
Reading: Unix/Linux File Systems
minutes
Reading: System Requirements
minutes
Reading: Monitoring and Performance Tools
minutes
Reading: Managing Linux Disk Drives
minutes
Reading: Linux User Management Basics
minutes
Reading: Unix/Linux File Systems
minutes
Reading: Verifying Linux Network Settings
minutes
Reading: Linux Authentication
minutes
Reading: Linux File and Print Services
minutes
Reading: Linux Application Support
minutes
Reading: Linux Security
minutes
Reading: Mac OS X Server
minutes
Reading: Mac OS Basics
minutes
Reading: Mac OS X File Systems and File and Print Services
minutes
Reading: Mac OS X Security
minutes
Reading: Novell NetWare
minutes
Reading: NetWare System Requirements
minutes
Reading: NetWare File Systems
minutes
Reading: NetWare Performance-Monitoring Tools
minutes
Reading: NetWare User Administration
minutes
Reading: NetWare Server Configuration
minutes
Reading: Viewing and Testing NetWare Network Configuration
minutes
Reading: NetWare Authentication
minutes
Reading: NetWare File and Print Services
minutes
Reading: NetWare Application Support
minutes
Reading: NetWare Security
minutes
Reading: Windows 2000 and Windows Server 2003
minutes
Reading: Microsoft Active Directory
minutes
Reading: Windows Server System Requirements
minutes
Reading: Windows Server File Systems
minutes
Reading: Windows Server Performance Monitoring Tools
minutes
Reading: Viewing Network Configurations and Testing Connectivity
minutes
Reading: Managing Windows Server Storage
minutes
Reading: Windows Server User Management Basics
minutes
Reading: Windows Server Authentication
minutes
Reading: Windows Server File and Print Services
minutes
Reading: Windows Server Application Support
minutes
Reading: Windows Server Security
minutes
Reading: AppleShare IP
minutes
Reading: Operating System Interoperability
minutes
Reading: Using Windows with NetWare
minutes
Reading: Using Windows and Linux/Unix Servers
minutes
Reading: Using NetWare and Linux Servers
minutes
Reading: Network Operating System Client Support
minutes
Reading: Windows Server Client Support
minutes
Reading: NetWare Server Client Support
minutes
Reading: Linux Client Support
minutes

Configuring Network Connectivity 0/13

13 readings
Reading: Configuring Client Connectivity
minutes
Reading: Configuring Client Physical Connections
minutes
Reading: Connecting to Network Media
minutes
Reading: Configuring Protocol Settings
minutes
Reading: Reviewing Network Connectivity
minutes
Reading: Networking Tools
minutes
Reading: Selecting the Appropriate Tool for Wiring
minutes
Reading: Wire Crimpers
minutes
Reading: Punchdown Tools, Tone Generators
minutes
Reading: Media Testers, Hardware Loopback Connectors
minutes
Reading: Wireless Detection, Configuring Remote Connectivity
minutes
Reading: Physical Connections, Protocols
minutes
Reading: Software, Dial-up Access, Security
minutes

Securing the Network 0/19

1 video, 18 readings
Reading: Security Responsibilities of a Network Administrator
minutes
Reading: Physical and Logical Security
minutes
Reading: Physical Security
minutes
Reading: Logical Security
minutes
Reading: Auditing
minutes
Reading: Firewalls
minutes
Reading: The Purpose and Function of a Firewall
minutes
Reading: Demilitarized Zones
minutes
Reading: Proxy Services
minutes
Reading: Caching Proxy Servers
minutes
Reading: Using a Proxy Server
minutes
Reading: Understanding How Security Affects a Network
minutes
Reading: Port Blocking/Filtering
minutes
Reading: Authentication
minutes
Reading: Encryption
minutes
Reading: Intranets and Extranets
minutes
Reading: Intranets
minutes
Reading: Extranets
minutes

VLANs, Antivirus, Fault Tolerance, and Disaster Recovery 0/18

18 readings
Reading: VLANs
minutes
Reading: VLAN Membership
minutes
Reading: Viruses, Virus Solutions, and Malicious Software
minutes
Reading: Trojans, Worms, Spyware, and Hoaxes
minutes
Reading: Protecting Computers from Viruses
minutes
Reading: Understanding Fault Tolerance
minutes
Reading: RAID
minutes
Reading: Other Fault-Tolerance Measures
minutes
Reading: Disaster Recovery
minutes
Reading: Backup Methods
minutes
Reading: A Comparison of Backup Methods
minutes
Reading: Backup Rotation Schedules
minutes
Reading: Backup Best Practices
minutes
Reading: Offsite Storage
minutes
Reading: Hot and Cold Spares
minutes
Reading: Hot Spare and Hot Swapping
minutes
Reading: Cold Spare and Cold Swapping
minutes
Reading: Hot, Warm, and Cold Sites
minutes

Troubleshooting Tools and Utilities 0/12

12 readings
Reading: Troubleshooting Tools
minutes
Reading: The ping Utility
minutes
Reading: The Trace Route Utility (Tracert/traceroute)
minutes
Reading: The arp Utility, The netstat Utility
minutes
Reading: The nbtstat Utility, The ipconfig and ifconfig Utilities
minutes
Reading: The winipcfg Utility, DNS Diagnostic Tools (nslookup/dig)
minutes
Reading: The route Utility, Using Diagnostic Utilities
minutes
Reading: Ping, The tracert Command, The traceroute Command
minutes
Reading: The arp Command, The netstat Command
minutes
Reading: The nbtstat Command, The ipconfig Command
minutes
Reading: The ifconfig Command, The winipcfg Command
minutes
Reading: The Nslookup/dig Commands
minutes

Troubleshooting Network Connectivity 0/14

14 readings
Reading: Interpreting Visual Indicators, LEDs on Networking Devices
minutes
Reading: LEDs on NICs and Other Devices, Troubleshooting Remote Connectivity
minutes
Reading: Troubleshooting Physical Connectivity, Calling Technical Support
minutes
Reading: Troubleshooting Authentication Failure, Troubleshooting Protocol Configuration Problems
minutes
Reading: Troubleshooting a Small Office/Home Office Router
minutes
Reading: Troubleshooting Client Connectivity Errors
minutes
Reading: Protocol Errors, Authentication, Permissions Errors, Physical Connectivity Errors
minutes
Reading: Troubleshooting Checklists, Troubleshooting Cable Problems
minutes
Reading: Troubleshooting Network Connectivity
minutes
Reading: Troubleshooting Network Printing
minutes
Reading: Troubleshooting Data Access, Troubleshooting NICs
minutes
Reading: Adding, Modifying, or Removing Network Services
minutes
Reading: Adding, Modifying, or Removing DHCP, Adding, Modifying, or Removing DNS
minutes
Reading: Adding, Modifying, or Removing WINS
minutes

Troubleshooting Procedures and Best Practices 0/13

13 readings
Reading: Troubleshooting Basics, Troubleshooting Servers and Workstations
minutes
Reading: General Troubleshooting Considerations
minutes
Reading: The Art of Troubleshooting, Identify the Symptoms and Potential Causes
minutes
Reading: Identifying the Affected Area, Establishing What Has Changed
minutes
Reading: Selecting the Most Probable Cause of the Problem
minutes
Reading: Implement an Action Plan and Solution, Including Potential Effects
minutes
Reading: Testing the Results, Identify the Results and Effects of the Solution
minutes
Reading: Documenting the Solution, Troubleshooting Topology Errors
minutes
Reading: Bus Network Errors, Star Network Errors
minutes
Reading: Ring Network Errors, Mesh Network Errors
minutes
Reading: Troubleshooting Wired and Wireless Infrastructure-Related Problems
minutes
Reading: Troubleshooting Wiring, Troubleshooting Infrastructure Hardware
minutes
Reading: Troubleshooting Wireless Connections
minutes

Members

Lorem Ipsn gravida nibh vel velit auctor aliquet. Aenean sollicitudin, lorem quis bibendum auci elit consequat ipsutis sem nibh id elit. Duis sed odio sit amet nibh vulputate cursus a sit amet mauris. Morbi accumsan ipsum velit. Nam nec tellus a odio tincidunt auctor a ornare odio. Sed non mauris vitae erat consequat auctor eu in elit.

Total number of students in course:

User registration

You don't have permission to register

Reset Password