A+ Network+ CySA+ Pen Test+ CASP Linux+ Mobility+ Cloud+

CompTIA Network+ Training

A CompTIA Network+ certification is the ideal way to get into the complex area of IT networking, with the vendor neutral nature of the qualification meaning it is a great starting point for more specific networking qualifications

Online
Classroom
In-House
New CompTIA Network+ 5 Day Classroom Special Offer. Exams Included Guaranteed pass. Enquire for more pricing/information.

What Is The CompTIA Network+?

The CompTIA Network+ certification is a worldwide recognised qualification that validates the skills of networking professionals. The qualification recognises a technician's ability to describe the features and functions of network components and to manage, maintain, troubleshoot, install, operate and configure basic network infrastructure.

This certification will verify that the successful candidate has the knowledge and skills required to implement a defined network architecture with basic network security. Furthermore, a successful candidate will be able to configure, maintain, and troubleshoot network devices using appropriate network tools and understand the features and purpose of network technologies. Candidates will be able to make basic solution recommendations, analyse network traffic, and be familiar with common protocols and media types.

We were the first company in the world to have online course content for the CompTIA Network+ N10-006 (2015) accredited by CompTIA themselves*, so when you study with us you know that you are studying only the most up-to-date and relevant course materials. If you are looking to complete a CompTIA Network+ qualification we strongly recommend that you enrol to a training program that features the brand new N10-006 materials, as the old N10-005 exam was expired by CompTIA in August 2015.

* This can be verified at the search tool at the following CompTIA site: Certification.comptia.org

Key Areas

The main areas that are covered in this course are:

Course Breakdown

  • 1.0 Network Architecture
    • 1.1 Explain the functions and applications of various network devices.
      • Router
      • Switch
      • Multilayer switch
      • Firewall
      • HIDS
      • IDS/IPS
      • Access point (wireless/wired)
      • Content filter
      • Load balancer
      • Hub
      • Analog modem
      • Packet shaper
      • VPN concentrator
    • 1.2 Compare and contrast the use of networking services and applications.
      • VPN
        • Site-to-site/host-to-site/host-to-host
        • Protocols
          • IPsec
          • GRE
          • SSL VPN
          • PTP/PPTP
      • TACACS/RADIUS
      • RAS
      • Web services
      • Unified voice services
      • Network controllers
    • 1.3 Install and configure the following networking services/applications.
      • DHCP
        • Static vs. dynamic IP addressing
        • Reservations
        • Scopes
        • Leases
        • Options (DNS servers, suffixes)
        • IP helper/DHCP relay
      • DNS
        • DNS servers
        • DNS records (A, MX, AAAA, CNAME, PTR)
        • Dynamic DNS
      • Proxy/reverse proxy
      • NAT
        • PAT
        • SNAT
        • DNAT
      • Port forwarding
    • 1.4 Explain the characteristics and benefits of various WAN technologies.
      • Fiber
        • SONET
        • DWDM
        • CWDM
      • Frame relay
      • Satellite
      • Broadband cable
      • DSL/ADSL
      • ISDN
      • ATM
      • PPP/multilink PPP
      • MPLS
      • GSM/CDMA
        • LTE/4G
        • HSPA+
        • 3G
        • Edge
      • Dialup
      • WiMAX
      • MetroEthernet
      • Leased lines
        • T-1
        • T-3
        • E-1
        • E-3
        • OC3
        • OC12
      • Circuit switch vs. packet switch
    • 1.5 Install and properly terminate various cable types and connectors using appropriate tools.
      • Copper connectors
        • RJ-11
        • RJ-45
        • RK-48C
        • DB-9/RS-232
        • DB-25
        • UTP coupler
        • BNC coupler
        • BNC
        • F-connector
        • 110 block
        • 66 block
      • Copper cables
        • Shielded vs. unshielded
        • CAT3, CAT5, CAT5e, CAT6, CAT6a
        • PVC vs. plenum
        • RG-59
        • RG-6
        • Straight-through vs. crossover vs. rollover
      • Fiber connectors
        • ST
        • SC
        • LC
        • MTRJ
        • FC
        • Fiber coupler
      • Fiber cables
        • Single-mode
        • Multimode
        • APC vs. UPC
      • Media converters
        • Single-mode fiber to Ethernet
        • Multimode fiber to Ethernet
        • Fiber to coaxial
        • Single-mode to multimode fiber
      • Tools
        • Cable crimpers
        • Punchdown tool
        • Wire strippers
        • Snips
        • OTDR
        • Cable certifier
    • 1.6 Differentiate between common network topologies.
      • Mesh
        • Partial
        • Full
      • Bus
      • Ring
      • Star
      • Hybrid
      • Point-to-point
      • Point-to-multipoint
      • Client-server
      • Peer-to-peer
    • 1.7 Differentiate between network infrastructure implementations.
      • WAN
      • MAN
      • LAN
      • WLAN
        • Hotspot
      • PAN
        • Bluetooth
        • IR
        • NFC
      • SCADA/ICS
        • ICS server
        • DCS/closed network
        • Remote terminal unit
        • Programmable logic controller
      • Medianets
        • VTC
          • ISDN
          • IP/SIP
    • 1.8 Given a scenario, implement and configure the appropriate addressing schema.
      • IPv6
        • Auto-configuration
          • EUI 64
        • DHCP6
        • Link local
        • Address structure
        • Address compression
        • Tunneling 6to4, 4to6
          • Teredo, miredo
      • IPv4
        • Address structure
        • Subnetting
        • APIPA
        • Classful A, B, C, D
        • Classless
      • Private vs. public
      • NAT/PAT
      • MAC addressing
      • Multicast
      • Unicast
      • Broadcast
      • Broadcast domains vs. collision domains
    • 1.9 Explain the basics of routing concepts and protocols.
      • Loopback interface
      • Routing loops
      • Routing tables
      • Static vs. dynamic routes
      • Default route
      • Distance vector routing protocols
        • RIPv2
      • Hybrid routing protocols
        • BGP
      • Link state routing protocols
        • OSPF
        • IS-IS
      • Interior vs. exterior gateway routing protocols
      • Autonomous system numbers
      • Route redistribution
      • High availability
        • VRRP
        • Virtual IP
        • HSRP
      • Route aggregation
      • Routing metrics
        • Hop counts
        • MTU, bandwidth
        • Costs
        • Latency
        • Administrative distance
        • SPB
    • 1.10 Identify the basics elements of unified communication technologies.
      • VoIP
      • Video
      • Real-time services
        • Presence
        • Multicast vs. unicast
      • QoS
        • DSCP
        • COS
      • Devices
        • UC servers
          • UC devices
        • UC gateways
    • 1.11 1.11 Compare and contrast technologies that support cloud and virtualization.
      • Virtualization
        • Virtual switches
        • Virtual routers
        • Virtual firewall
        • Virtual vs. physical NICs
        • Software-defined networking
      • Storage area network
        • iSCSI
        • Jumbo frame
        • Fibre Channel
        • Network attached storage
      • Cloud concepts
        • Public IaaS, SaaS, PaaS
        • Private IaaS, SaaS, PaaS
        • Hybrid IaaS, SaaS, PaaS
        • Community IaaS, SaaS, PaaS
    • 1.12 Given a set of requirements, implement a basic network.
      • List of requirements
      • Device types/requirements
      • Environment limitations
      • Equipment limitations
      • Compatibility requirements
      • Wired/wireless considerations
      • Security considerations
    For more information, contact one of our course advisors
  • 2.0 Network Operations
    • 2.1 Given a scenario, use appropriate monitoring tools.
      • Packet/network analyzer
      • Interface monitoring tools
      • Port scanner
      • Top talkers/listeners
      • SNMP management software
        • Trap
        • Get
        • Walk
        • MIBS
      • Alerts
        • Email
        • SMS
      • Packet flow monitoring
      • SYSLOG
      • SIEM
      • Environmental monitoring tools
        • Temperature
        • Humidity
      • Power monitoring tools
      • Wireless survey tools
      • Wireless analyzers
    • 2.2 Given a scenario, analyze metrics and reports from monitoring and tracking performance tools.
      • Baseline
      • Bottleneck
      • Log management
      • Graphing
      • Utilization
        • Bandwidth
        • Storage
        • Network device CPU
        • Network device memory
        • Wireless channel utilization
      • Link status
      • Interface monitoring
        • Errors
        • Utilization
        • Discards
        • Packet drops
        • Interface resets
        • Speed and duplex
    • 2.3 Given a scenario, use appropriate resources to support configuration management.
      • Archives/backups
      • Baselines
      • On-boarding and off-boarding of mobile devices
      • NAC
      • Documentation
        • Network diagrams (logical/physical)
        • IP address utilization
        • Vendor documentation
        • Internal operating procedures/policies/standards
    • 2.4 Explain the importance of implementing network segmentation.
      • SCADA systems/industrial control systems
      • Protocols
      • TCP vs. UDP
      • Honeypot/honeynet
      • Testing lab
      • Load balancing
      • Performance optimization
      • Security
      • Compliance
    • 2.5 Given a scenario, install and apply patches and updates.
      • OS updates
      • Firmware updates
      • Driver updates
      • Feature changes/updates
      • Major vs. minor updates
      • Vulnerability patches
      • Upgrading vs. downgrading
        • Configuration backup
    • 2.6 Given a scenario, configure a switch using proper features.
      • VLAN
        • Native VLAN/default VLAN
        • VTP
      • Spanning tree (802.1d)/rapid spanning tree (802.1w)
        • Flooding
        • Forwarding/blocking
        • Filtering
      • Interface configuration
        • Trunking/802.1q
        • Tag vs. untag VLANs
        • Port bonding (LACP)
        • Port mirroring (local vs. remote)
        • Speed and duplexing
        • IP address assignment
        • VLAN assignment
      • Default gateway
      • PoE and PoE+ (802.3af, 802.3at)
      • Switch management
        • User/passwords
        • AAA configuration
        • Console
        • Virtual terminals
        • In-band/out-of-band management
      • Managed vs. unmanaged
    • 2.7 Install and configure wireless LAN infrastructure and implement the appropriate technologies in support of wireless capable devices.
      • Small office, home office wireless router
      • Wireless access points
        • Device density
        • Roaming
        • Wireless controllers
          • VLAN pooling
          • LWAPP
      • Wireless bridge
      • Site surveys
        • Heat maps
      • Frequencies
        • 2.4 Ghz
        • 5.0 Ghz
      • Channels
      • Goodput
      • Connection types
        • 802.11a-ht
        • 802.11g-ht
      • Antenna placement
      • Antenna types
        • Omnidirectional
        • Unidirectional
      • MIMO/MU-MIMO
      • Signal strength
        • Coverage
        • Differences between device antennas
      • SSID broadcast
      • Topologies
        • Adhoc
        • Mesh
        • Infrastructure
      • Mobile devices
        • Cell phones
        • Laptops
        • Tablets
        • Gaming devices
        • Media devices
    For more information, contact one of our course advisors
  • 3.0 Network Security
    • 3.1 Compare and contrast risk related concepts.
      • Disaster recovery
      • Business continuity
      • Battery backups/UPS
      • First responders
      • Data breach
      • End user awareness and training
      • Single point of failure
        • Critical nodes
        • Critical assets
        • Redundancy
      • Adherence to standards and policies
      • Vulnerability scanning
      • Penetration testing
    • 3.2 Compare and contrast common network vulnerabilities and threats.
      • Attacks/threats
        • DoS
          • Distributed DoS
            • Botnet
            • Traffic spike
            • Coordinated attack
          • Reflective/amplified
            • DNS
            • NTP
            • Smurfing
          • Friendly/unintentional DoS
          • Physical attack
            • Permanent DoS
      • ARP cache poisoning
      • Packet/protocol abuse
      • Spoofing
      • Wireless
        • Evil twin
        • Rogue AP
        • War driving
        • War chalking
        • Bluejacking
        • Bluesnarfing
        • WPA/WEP/WPS attacks
      • Brute force
      • Session hijacking
      • Social engineering
      • Man-in-the-middle
      • VLAN hopping
      • Compromised system
      • Effect of malware on the network
      • Insider threat/malicious employee
        • Zero-day attacks
      • Vulnerabilities
        • Unnecessary running services
        • Open ports
        • Unpatched/legacy systems
        • Unencrypted channels
        • Clear text credentials
        • Unsecure protocols
          • TELNET
          • HTTP
          • SLIP
          • FTP
          • TFTP
          • SNMPv1 and SNMPv2
        • TEMPEST/RF emanation
    • 3.3 Given a scenario, implement network hardening techniques.
      • Anti-malware software
        • Host-based
        • Cloud/server-based
        • Network-based
      • Switch port security
        • DHCP snooping
        • ARP inspection
        • MAC address filtering
        • VLAN assignments
          • Network segmentation
      • Security policies
      • Disable unneeded network services
      • Use secure protocols
        • SSH
        • SNMPv3
        • TLS/SSL
        • SFTP
        • HTTPS
        • IPsec
      • Access lists
        • Web/content filtering
        • Port filtering
        • IP filtering
        • Implicit deny
      • Wireless security
        • WEP
        • WPA/WPA2
          • Enterprise
          • Personal
        • TKIP/AES
        • 802.1x
        • TLS/TTLS
        • MAC filtering
      • User authentication
        • CHAP/MSCHAP
        • PAP
        • EAP
        • Kerberos
        • Multifactor authentication
        • Two-factor authentication
        • Single sign-on
      • Hashes
        • MD5
        • SHA
    • 3.4 Compare and contrast physical security controls.
      • Mantraps
      • Network closets
      • Video monitoring
        • IP cameras/CCTVs
      • Door access controls
      • Proximity readers/key fob
      • Biometrics
      • Keypad/cipher locks
      • Security guard
    • 3.5 Given a scenario, install and configure a basic firewall.
      • Types of firewalls
        • Host-based
        • Network-based
        • Software vs. hardware
        • Application aware/context aware
        • Small office, home office firewall
        • Stateful vs. stateless inspection
        • UTM
      • Settings/techniques
        • ACL
        • Virtual wire vs. routed
        • DMZ
        • Implicit deny
        • Block/allow
          • Outbound traffic
          • Inbound traffic
        • Firewall placement
          • Internal/external
    • 3.6 Explain the purpose of various network access control models.
      • 802.1x
      • Posture assessment
      • Guest network
      • Persistent vs. non-persistent agents
      • Quarantine network
      • Edge vs. access control
    • 3.7 Summarize basic forensic concepts.
      • First responder
      • Secure the area
        • Escalate when necessary
      • Document the scene
      • eDiscovery
      • Evidence/data collection
      • Chain of custody
      • Data transport
      • Forensics report
      • Legal hold
    For more information, contact one of our course advisors
  • 4.0 Troubleshooting
    • 4.1 Given a scenario, implement the following network troubleshooting methodology.
      • Identify the problem
        • Gather information
        • Duplicate the problem, if possible
        • Question users
        • Identify symptoms
        • Determine if anything has changed
        • Approach multiple problems individually
      • Establish a theory of probable cause
        • Question the obvious
        • Consider multiple approaches
        • Top-to-bottom/bottom-to-top OSI model
        • Divide and conquer
      • Test the theory to determine cause
        • Once theory is confirmed, determine next steps to resolve problem
        • If theory is not confirmed, re-establish new theory or escalate
      • Establish a plan of action to resolve the problem and identify potential effects
      • Implement the solution or escalate as necessary
      • Verify full system functionality and, if applicable, implement preventative measures
      • Document findings, actions and outcomes
    • 4.2 Given a scenario, analyze and interpret the output of troubleshooting tools.
      • Command line tools
        • ipconfignetstat
        • ifconfig
        • ping/ping6/ping -6
        • tracert/tracert -6/traceroute6/traceroute -6
        • nbtstat
        • nslookup
        • arp
        • mac address lookup table
        • pathping
      • Line testers
      • Certifiers
      • Multimeter
      • Cable tester
      • Light meter
      • Toner probe
      • Speed test sites
      • Looking glass sites
      • WiFi analyzer
      • Protocol analyzer
    • 4.3 Given a scenario, troubleshoot and resolve common wireless issues.
      • Signal loss
      • Interference
      • Overlapping channels
        • Mismatched channels
      • Signal-to-noise ratio
      • Device saturation
      • Bandwidth saturation
      • Untested updates
      • Wrong SSID
      • Power levels
      • Open networks
      • Rogue access point
      • Wrong antenna type
      • Incompatibilities
      • Wrong encryption
      • Bounce
      • MIMO
      • AP placement
      • AP configurations
        • LWAPP
        • Thin vs. thick
      • Environmental factors
        • Concrete walls
        • Window film
        • Metal studs
      • Wireless standard related issues
        • Throughput
        • Frequency
        • Distance
        • Channels
    • 4.4 Given a scenario, troubleshoot and resolve common copper cable issues.
      • Shorts
      • Opens
      • Incorrect termination (mismatched standards)
        • Straight-through
        • Crossover
      • Cross-talk
        • Near end
        • Far end
      • EMI/RFI
      • Distance limitations
      • Attenuation/Db loss
      • Bad connector
      • Bad wiring
      • Split pairs
      • Tx/Rx reverse
      • Cable placement
      • Bad SFP/GBIC - cable or transceiver
    • 4.5 Given a scenario, troubleshoot and resolve common fiber cable issues.
      • Attenuation/Db loss
      • SFP/GBIC - cable mismatch
      • Bad SFP/GBIC - cable or transceiver
      • Wavelength mismatch
      • Fiber type mismatch
      • Dirty connectors
      • Connector mismatch
      • Bend radius limitations
      • Distance limitations
    • 4.6 Given a scenario, troubleshoot and resolve common network issues.
      • Incorrect IP configuration/default gateway
      • Broadcast storms/switching loop
      • Duplicate IP
      • Speed and duplex mismatch
      • End-to-end connectivity
      • Incorrect VLAN assignment
      • Hardware failure
      • Misconfigured DHCP
      • Misconfigured DNS
      • Incorrect interface/interface misconfiguration
      • Cable placement
      • Interface errors
      • Simultaneous wired/wireless connections
      • Discovering neighboring devices/nodes
      • Power failure/power anomalies
      • MTU/MTU black hole
      • Missing IP routes
      • NIC teaming misconfiguration
        • Active-active vs. active-passive
        • Multicast vs. broadcast
    • 4.7 Given a scenario, troubleshoot and resolve common security issues.
      • Misconfigured firewall
      • Misconfigured ACLs/applications
      • Malware
      • DoS
      • Open/closed ports
      • ICMP related issues
        • Ping of death
        • Unreachable default gateway
      • Unpatched firmware/OSs
      • Malicious users
        • Trusted
        • Untrusted users
        • Packet sniffing
      • Authentication issues
        • TACACS/RADIUS misconfigurations
        • Default passwords/settings
      • Improper access/backdoor access
      • ARP issues
      • Banner grabbing/OUI
      • Domain/local group configurations
      • Jamming
    • 4.8 Given a scenario, troubleshoot and resolve common WAN issues.
      • Loss of Internet connectivity
      • Interface errors
      • Split horizon
      • DNS issues
      • Interference
      • Router configurations
      • Customer premise equipment
        • Smart jack/NIU
        • Demarc
        • Loopback
        • CSU/DSU
        • Copper line drivers/repeaters
      • Company security policy
        • Throttling
        • Blocking
        • Fair access policy/utilization limits
      • Satellite issues
        • Latency
    For more information, contact one of our course advisors
  • 5.0 Industry Standards, Practices and Network Theory
    • 5.1 Analyze a scenario and determine the corresponding OSI layer.
      • Layer 1 – Physical
      • Layer 2 – Data link
      • Layer 3 – Network
      • Layer 4 – Transport
      • Layer 5 – Sessions
      • Layer 6 – Presentation
      • Layer 7 – Application
    • 5.2 Explain the basics of network theory and concepts.
      • Encapsulation/de-encapsulation
      • Modulation techniques
        • Multiplexing
        • De-multiplexing
        • Analog and digital techniques
        • TDM
      • Numbering systems
        • Binary
        • Hexadecimal
        • Octal
      • Broadband/baseband
      • Bit rates vs. baud rate
      • Sampling size
      • CDMA
      • CSMA/CD and CSMA/CA
      • Carrier detect/sense
      • Wavelength
      • TCP/IP suite
        • ICMP
        • UDP
        • TCP
      • Collision
    • 5.3 Given a scenario, deploy the appropriate wireless standard.
      • 802.11a
      • 802.11b
      • 802.11g
      • 802.11n
      • 802.11ac
    • 5.4 Given a scenario, deploy the appropriate wired connectivity standard.
      • Ethernet standards
        • 10BaseT
        • 100BaseT
        • 1000BaseT
        • 1000BaseTX
        • 10GBaseT
        • 100BaseFX
        • 10Base2
        • 10GBaseSR
        • 10GBaseER
        • 10GBaseSW
        • IEEE 1905.1-2013
          • Ethernet over HDMI
          • Ethernet over power line
      • Wiring standards
        • EIA/TIA 568A/568B
      • Broadband standards
        • DOCSIS
    • 5.5 Given a scenario, implement the appropriate policies or procedures.
      • Security policies
        • Consent to monitoring
      • Network policies
      • Acceptable use policy
      • Standard business documents
        • SLA
        • MOU
        • MSA
        • SOW
    • 5.6 Summarize safety practices.
      • Electrical safety
        • ESD
      • ESD
        • ESD
      • Installation safety
        • ESD
        • ESD
        • ESD
        • ESD
      • MSDS
      • Emergency procedures
        • Building layout
        • Fire escape plan
        • Safety/emergency exits
        • Fail open/fail close
        • Emergency alert system
      • Fire suppression systems
      • HVAC
    • 5.7 Given a scenario, install and configure equipment in the appropriate location using best practices.
      • Intermediate distribution frame
      • Main distribution frame
      • Cable management
        • Patch panels
      • Power management
        • Power converters
        • Circuits
        • UPS
        • Inverters
        • Power redundancy
      • Device placement
      • Air flow
      • Cable trays
      • Rack systems
        • Server rail racks
        • Two-post racks
        • Four-post racks
        • Free-standing racks
      • Labeling
        • Port labeling
        • System labeling
        • Circuit labeling
        • Naming conventions
        • Patch panel labeling
      • Rack monitoring
      • Rack security
    • 5.8 Explain the basics of change management procedures.
      • Document reason for a change
      • Change request
        • Configuration procedures
        • Rollback process
        • Potential impact
        • Notification
      • Approval process
      • Maintenance window
        • Authorized downtime
      • Notification of change
      • Documentation
        • Network configurations
        • Additions to network
        • Physical location changes
    • 5.9 Compare and contrast the following ports and protocols.
      • 80 HTTP
      • 443 HTTPS
      • 137-139 NetBIOS
      • 110 POP
      • 143 IMAP
      • 25 SMTP
      • 5060/5061 SIP
      • 2427/2727 MGCP
      • 5004/5005 RTP
      • 1720 H.323
      • TCP
        • Connection-oriented
      • UDP
        • Connectionless
    • 5.10 Given a scenario, configure and apply the appropriate ports and protocols.
      • 20,21 FTP
      • 161 SNMP
      • 22 SSH
      • 23 Telnet
      • 53 DNS
      • 67,68 DHCP
      • 69 TFTP
      • 445 SMB
      • 3389 RDP
    For more information, contact one of our course advisors


  • CompTIA Network+ Exam
    • CompTIA Network+ N10-006
    For more information, contact one of our course advisors
  • Job Role

    Achieving a CompTIA Network+ qualification will unlock a number of doors for you within the IT industry, with salaries for those that hold a Network+ certification averaging at £22,500.

    The roles that you will be qualified for are as follows:

    • IT Support
    • Computer Service Technician
    • Small Office IT maintenance
    • Technical Support
    • Field Service Technician
    For more information, contact one of our course advisors

Training Solution Breakdown:

Free Brochure, Syllabus & Costing

Sign up using the appropriate form below to receive a CompTIA Network+ information pack and free online training demo.

  • Information Pack

    Your Information will never be shared with any third party

Want to Learn about CertMaster?

CompTIA CertMaster is an online learning tool that helps you prepare for your CompTIA certification exam with confidence.

To find out more about CertMaster please click below to...

Find out more »

Train your staff today!

Looking to train your staff? Join the Robust family and be entitled to loads of great benefits:

  • Have 24/7 Email Support
  • Classroom & WebEx Learning
  • Access course anywhere, anytime
  • Many more...

Request a brochure, with a free demo

Please Fill in the form below: