This course covers everything you need to know to pass your CompTIA Network+ Certification Exam. The first goal of the course is to make you a good Network Tech and in the process make sure you are ready to pass the CompTIA exam.
The course covers all the exam topics including:
- Network architectures
- Cabling and topology
- Ethernet basics
- Network Installation
- TCP/IP applications and network protocols
- Routing
- Network naming
- Advanced networking devices
- IPv6
- Remote connectivity
- Wireless networking
- Virtualization and cloud computing
- Network operations
- Managing risk
This is a Total Network+ Course and covers everything a good tech needs to know and prepares you to pass the CompTIA Network+ Certification exam.
Course Curriculum
Understanding Network Security Risks
Available in
days
days
after you enroll
-
Preview01. Overview (3:47)
-
Preview02. Case Study Network (2:00)
-
Start03. Uptime vs. Availability (3:08)
-
Start04. DR vs. Business Continuity (2:01)
-
Start05. Risk (1:46)
-
Start06. Critical Nodes and Assets (1:42)
-
Start07. Avoiding a Single Point of Failure (4:20)
-
Start08. Data Breaches (3:41)
-
Start09. DR Standards and Policies (1:58)
-
Start10. Demo 1 Reviewing Security Plan Documents (2:07)
-
Start11. Proactive Network Protection (2:14)
-
Start12. Demo 2 Using Nessus (3:58)
-
Start13. Case Study Network, Revisited (1:01)
-
Start14. For Further Learning (0:28)
-
Start15. Summary (1:04)
Analyzing Network Attacks and Threats
Available in
days
days
after you enroll
-
Start01. Overview (3:43)
-
Start02. Denial of Service (5:06)
-
Start03. Distributed Denial of Service (2:50)
-
Start04. IRC and LOIC (2:06)
-
Start05. Smurf Attack (1:35)
-
Start06. ReflectionAmplification Attack (1:24)
-
Start07. Ethernet Protocol Abuse (3:04)
-
Start08. Man-in-the-middle Attack (1:03)
-
Start09. The Importance of ARP (0:54)
-
Start10. SYN Flood Attack (1:17)
-
Start11. VLAN Hopping and Brute Force Attacks (3:09)
-
Start12. Demo 1 Executing an MITM Attack (3:52)
-
Start13. Human Factors (0:46)
-
Start14. Compromised System (2:00)
-
Start15. Demo 2 Cracking Passwords (3:00)
-
Start16. For Further Learning (0:32)
-
Start17. Summary (1:14)
Identifying Network Vulnerabilities
Available in
days
days
after you enroll
-
Start01. Overview (3:10)
-
Start02. Evil Twin (4:15)
-
Start03. Wardriving and Warchalking (3:18)
-
Start04. Understanding Wi-Fi Statistics (3:23)
-
Start05. Bluejacking and Bluesnarfing (1:34)
-
Start06. WEPWPAWPS Vulnerabilities (2:31)
-
Start07. WLAN Protection Mechanisms (2:31)
-
Start08. Demo 1 Introducing Wi-Fi Monitoring Tools (3:36)
-
Start09. ClientServer Vulnerabilities (2:45)
-
Start10. Open Ports (2:26)
-
Start11. Unsecure Protocols (1:59)
-
Start12. Verifying File Integrity (1:47)
-
Start13. TEMPEST (1:04)
-
Start14. Demo 2 Exposing Unsecure Protocols (3:25)
-
Start15. For Further Learning (0:32)
-
Start16. Summary (1:03)
Frequently Asked Questions
When does the course start and finish?
The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 30 days and we will give you a full refund.