CompTIA Network+ : N10-007
Module 1 - Networking Concepts
Explain the purposes and uses of ports and protocols
- Protocols and port
- Protocol type
- Connection-oriented vs. connectionles
Explain devices, applications, protocols and services at their appropriate OSI layers.
- Layer 1 – Physical
- Layer 2 – Data link
- Layer 3 – Network
- Layer 4 – Transport
- Layer 5 – Session
- Layer 6 – Presentation
- Layer 7 – Application
Explain the concepts and characteristics of routing and switching.
- Properties of network traffic
- Segmentation and interface properties
- Routing
- IPv6 concepts
- Performance concepts
- NAT/PAT
- Port forwarding
- Access control list
- Packet-switched vs. circuit- switched network
- Software-defined networking
Configure the appropriate IP addressing components.
- Private vs. public
- Loopback and reserved
- Default gateway
- Virtual IP
- Subnet mask
- Subnetting
- Address assignments
Compare and contrast the characteristics of network topologies, types and technologies.
- Wired topologies
- Wireless topologies
- Types
- Technologies that facilitate the Internet of Things (IoT)
Implement the appropriate wireless technologies and configurations.
- 802.11 standards
- Cellular
- Frequencies
- Speed and distance requirements
- Channel bandwidth
- Channel bonding
- MIMO/MU-MIMO
- Unidirectional/omnidirectional
- Site surveys
Summarize cloud concepts and their purposes.
- Types of services
- Cloud delivery models
- Connectivity methods
- Security implications/considerations
- Relationship between local and cloud resources
Explain the functions of network services.
- DNS service
- DHCP servic
- NTP
- IPAM
Module 2 - Infrastructure
Given a scenario, deploy the appropriate cabling solution.
- Media types
- Plenum vs. PVC
- Connector types
- Transceivers
- Termination points
- Copper cable standards
- Copper termination standards
- Ethernet deployment standards
Determine the appropriate placement of networking devices on a network and install/configure them.
- Firewall
- Router
- Switch
- Hub
- Bridge
- Modems
- Wireless access point
- Media converter
- Wireless range extender
- VoIP endpoint
Explain the purposes and use cases for advanced networking devices.
- Multilayer switch
- Wireless controller
- Load balancer
- IDS/IPS
- Proxy server
- VPN concentrator
- AAA/RADIUS server
- UTM appliance
- NGFW/Layer 7 firewall
- VoIP PBX
- VoIP gateway
- Content filter
Explain the purposes of virtualization and network storage technologies.
- Virtual networking components
- Network storage types
- Connection type
- Jumbo frame
Compare and contrast WAN technologies.
- Service type
- Transmission mediums
- Characteristics of service
- Termination
Module 3 - Network Operations
Use appropriate documentation and diagrams to manage the network.
- Diagram symbols
- Standard operating procedures/ work instructions
- Logical vs. physical diagrams
- Rack diagrams
- Change management documentation
- Wiring and port locations
- IDF/MDF documentation
- Labeling
- Network configuration and performance baselines
- Inventory managemen
Compare and contrast business continuity and disaster recovery concepts.
- Availability concepts
- Recovery
- MTTR
- MTBF
- SLA requirements
Explain common scanning, monitoring and patching processes and summarize their expected outputs.
- Processes
- Event management
- SNMP monitors
- Metrics
Given a scenario, use remote access methods.
- VPN
- RDP
- SSH
- VNC
- Telnet
- HTTPS/management URL
- Remote file access
- Out-of-band management
Identify policies and best practices.
- Privileged user agreement
- Password policy
- On-boarding/off-boarding procedures
- Licensing restrictions
- International export controls
- Data loss prevention
- Remote access policies
- Incident response policies
- BYOD
- AUP
- NDA
- System life cycle
- Safety procedures and policies
Module 4 - Network Security
Summarize the purposes of physical security devices.
Explain authentication and access controls.
- Authorization, authentication and accounting
- Multifactor authentication
- Access control
Given a scenario, secure a basic wireless network.
- WPA
- WPA2
- TKIP-RC4
- CCMP-AES
- Authentication and authorization
- Geofencing
Summarize common networking attacks.
- DoS
- Social engineering
- Insider threat
- Logic bomb
- Rogue access poin
- Evil twin
- War-driving
- Phishing
- Ransomware
- DNS poisoning
- ARP poisoning
- Spoofing
- Deauthentication
- Brute force
- VLAN hopping
- Man-in-the-middle
- Exploits vs. vulnerabilities
Given a scenario, implement network device hardening.
- Changing default credentials
- Avoiding common passwords
- Upgrading firmware
- Patching and updates
- File hashing
- Disabling unnecessary services
- Using secure protocols
- Generating new keys
- Disabling unused ports
Explain common mitigation techniques and their purposes.
- Signature management
- Device hardening
- Change native VLAN
- Switch port protection
- Network segmentation
- Privileged user account
- File integrity monitoring
- Role separation
- Restricting access via ACLs
- Honeypot/honeynet
- Penetration testing
Module 5 - Network Troubleshooting and Tools
Explain the network troubleshooting methodology
- Identify the problem
- Establish a theory of probable caus
- Test the theory to determine the cause
- Establish a plan of action to resolve the problem and identify potential effects
- Implement the solution or escalate as necessary
- Verify full system functionality and, if applicable, implement preventive measures
- Document findings, actions, and outcomes
Given a scenario, use the appropriate tool.
- Hardware tools
- Software tools
Given a scenario, troubleshoot common wired connectivity and performance issues.
- Attenuation
- Latency
- Jitter
- Crosstalk
- EMI
- Open/short
- Incorrect pin-out
- Incorrect cable typ
- Bad por
- Transceiver mismatch
- TX/RX reverse
- Duplex/speed mismatch
- Damaged cables
- Bent pins
- Bottlenecks
- VLAN mismatch
- Network connection LED status indicators
Troubleshoot common wireless connectivity and performance issues.
- Reflection
- Refraction
- Absorption
- Latency
- Jitter
- Attenuation
- Incorrect antenna type
- Interference
- Incorrect antenna placement
- Channel overlap
- Overcapacity
- Distance limitations
- Frequency mismatch
- Wrong SSID
- Wrong passphrase
- Security type mismatch
- Power levels
- Signal-to-noise ratio
Troubleshoot common network service issues.
- Names not resolving
- Incorrect gateway
- Incorrect netmask
- Duplicate IP addresses
- Duplicate MAC addresses
- Expired IP address
- Rogue DHCP server
- Untrusted SSL certificate
- Incorrect time
- Exhausted DHCP scope
- Blocked TCP/UDP ports
- Incorrect host-based firewall settings
- Incorrect ACL settings
- Unresponsive service
- Hardware failure
More CompTIA