CompTIA Network + 5 Days Boot Camp @ Edinburgh

When:
March 11, 2019 @ 9:00 am – March 15, 2019 @ 5:00 pm
2019-03-11T09:00:00+00:00
2019-03-15T17:00:00+00:00
Where:
IT Professional Training
62 West Harbour
Granton
Edinburgh EH5 1PW
Cost:
£1666.80
Contact:
IT Professional Training
01315525558

 Troubleshoot WAN Issues

  • Common WAN Issues

 Troubleshoot Security Issues

  • Security Configuration Issues
  • Other Security Issues

 Troubleshoot Network Issues

  • Physical Layer Issues
  • Data Link Layer Issues
  • Network Layer Issues

 Troubleshoot Copper and Fiber Cabling Issues

  • Common Copper Cable Issues
  • Common Fiber Cable Issues

 Troubleshoot Wireless Issues

  • Wireless Transmission Issues
  • Wireless Configuration Issues

 Troubleshooting Tools

  • Command-Line Tools
  • The ipconfig Command
  • The tracert Command
  • The ping Command
  • Windows pathping Command
  • The arp Command
  • The netstat Command
  • The nbtstat Command
  • The nslookup Command
  • The Cisco show mac-address-table Command
  • Hardware and Software Tools

 Troubleshooting Methodology

  • Identify the Problem
  • Establish a Theory
  • Test the Theory
  • Establish a Plan of Action
  • Implement the Solution or Escalate
  • Verify the Solution and Implement Preventative Measures
  • Document Findings, Actions, and Outcomes

 Implement Ports and Protocols

  • Transport Protocols: TCP and UDP
  • TCP and UDP Headers
  • Error Recovery
  • Flow Control
  • Connection Establishment and Termination
  • UDP
  • Port Numbers

 Best Practices and Change Management

  • Best Practices
  • Change Management

 Implement Policies, Procedures, and Safety Practices

  • Policies and Procedures
  • Safety Policies

 Wired and Wireless Standards

  • Ethernet Standards
  • Wired Standards
  • TIA/EIA 568A and 568B Standards
  • Wireless Standards

 Network Theory

  • The TCP/IP Application Layer
  • The TCP/IP Transport Layer
  • The TCP/IP Internet Layer
  • The TCP/IP Network Access Layer
  • Collisions
  • Transmission Techniques
  • End-to-End Communication
  • Numbering Systems

 Network Models

  • The OSI and TCP/IP Models
  • OSI Layers
  • TCP/IP Layers and Protocols
  • Data Flow Through the Layers

 Physical Security, Firewalls, Access Control, and Forensics

  • Physical Security
  • Firewalls
  • Firewall Placement and Configuration
  • Access Control Models
  • Forensic Concepts

 Hardening Devices

  • Anti-malware Software
  • Device Hardening
  • Disable Unused Network Services
  • Use Secure Protocols
  • Configure Switch Port Security
  • User Authentication
  • Data Integrity and Hashing
  • Wireless Security

 Risks, Threats, and Vulnerabilities

  • Denial of Service
  • Distributed DoS
  • Reflected and Amplified Attacks
  • Other Attack and Threat Terminology
  • Wireless Attacks
  • Vulnerabilities
  • Risk Management

 WLAN Implementation

  • WLAN Features
  • Frequencies
  • Transmission Methods
  • Channels
  • Antennas
  • WLAN Topologies
  • WLAN Devices
  • Wireless Routers
  • Wireless Access Points
  • Wireless LAN Controllers
  • Wireless Bridge
  • Wireless Installation
  • Channels and Frequency Bands
  • Wireless Site Surveys
  • Wireless Router Configuration

 STP, VLANs, Trunking, and VTP

  • STP and RSTP Concepts and Operation
  • STP Algorithm
  • STP Convergence
  • Port Costs
  • RSTP Operation
  • RSTP Port Roles
  • VLAN Concepts
  • Reasons for and Benefit of Using VLANs
  • Types of VLANs
  • Trunking VLANs
  • VTP Concepts
  • VTP Modes
  • VTP Operation
  • VTP Pruning

 Switch Configuration

  • Evolution to Switching
  • From Bridges to Switches
  • Switch Types
  • Switching Logic
  • Basic Switch Configuration
  • AAA Configuration
  • Link Aggregation Configuration
  • LACP Modes
  • Configuring EtherChannel
  • Port Mirroring Configuration

 Network: Network Segmentation, Patches, and Updates

  • Network Segmentation
  • Patches and Updates

 Network Monitoring and Metrics

  • Types of Metrics
  • SNMP
  • SNMP Message Types
  • SNMP Versions
  • The Management Information Base
  • Syslog
  • Syslog Operation
  • Severity Levels
  • Syslog Message Format
  • Port Scanners
  • Packet Sniffers
  • Packet Flow Monitors (NetFlow)

 Network Design and Documentation

  • Network Design
  • Sample Design Approach
  • Design Considerations for Layers 1, 2, and 3
  • Wireless Design Considerations
  • Documentation
  • IP Addressing Scheme
  • Network Diagrams
  • Baselines
  • Asset Management
  • Policies and Procedures

 Unified Communications, Virtualization, and Cloud

  • Unified Communications
  • Quality of Service
  • Virtualization
  • Server Virtualization
  • Networking Device Virtualization
  • Software-Defined Networking
  • Cloud Concepts
  • Storage Area Networks
  • Directly Attached Storage
  • Network-Attached Storage
  • Fibre Channel
  • Fibre Channel over Ethernet
  • iSCSI

 Routing Concepts

  • Static and Default Routing Overview
  • Dynamic Routing Protocols
  • Route Redistribution
  • IGP and EGP Routing Protocols
  • Distance Vector Routing Protocols
  • Link-State Routing Protocols
  • Classful Routing Protocols
  • Classless Routing Protocols
  • Dynamic Routing Metrics
  • Administrative Distance
  • Routing Loop Prevention
  • Link-State Routing Protocol Features
  • Building the LSDB
  • Calculating the Dijkstra Algorithm
  • Convergence with Link-State Protocols
  • Route Aggregation
  • High Availability

 Implement IPv6 Addressing

  • IPv6 Addressing Overview
  • Representing the IPv6 Address
  • Conventions for Writing IPv6 Addresses
  • Conventions for Writing IPv6 Prefixes
  • IPv6 Address Types
  • Global Unicast Addresses
  • Link-Local Addresses
  • Configuring IPv6 Addressing
  • EUI-64 Concept
  • Stateless Address Autoconfiguration
  • Migration to IPv6
  • Dual-Stack
  • Tunnelling

 Implement IPv4 Addressing

  • Local Addressing
  • MAC Addresses
  • Collision and Broadcast Domains
  • IPv4 Addressing
  • IPv4 Address Structure
  • Private and Public IP Addressing
  • IPv4 Address Types
  • Subnetting in Four Steps
  • Determine How Many Bits to Borrow
  • Determine the New Subnet Mask
  • Determine the Subnet Multiplier
  • List the Subnets, Host Ranges, and Broadcast Addresses
  • Subnetting Example 1
  • Subnetting Example 2
  • Subnetting Example 3
  • VLSM and Classless Addressing

 Network Topologies and Infrastructure

  • Network Topologies
  • Bus
  • Ring
  • Star, Extended Star, and Hub-and-Spoke
  • Full and Partial Mesh
  • Client-Server and Peer-to-Peer
  • Network Infrastructures
  • PANs
  • LANs and WLANs
  • CANs
  • MANs
  • WANs
  • Other Network Infrastructures
  • Industrial Networks
  • Mediantes

 Cable Installation

  • Copper
  • Copper Cables
  • Copper Connectors
  • Fibre
  • Fibre-Optic Cables
  • Fibre Connectors
  • Media Converters
  • Tools

 WAN Technologies

  • Packet Switching and Circuit Switching
  • WAN Link Options
  • Home and Small Office
  • Wireless
  • SONET
  • Dedicated Leased Lines
  • Enterprise WANs

 Network Services and Applications

  • VPN
  • Types
  • IPsec and IKE
  • Other VPN Technologies
  • Remote Access Services
  • AAA Services
  • Microsoft’s RAS
  • Other Remote Access Services
  • Unified Communications
  • DHCP
  • DNS
  • NAT

 Network Devices

  • Common Network Devices
  • Specialty Devices
  • Firewalls
  • IDS and IPS
  • Proxy Server
  • Load Balancer
  • Packet Shaper
  • VPN Concentrator

 

February 1, 2019

COPYRIGHT © 15-18 IT PROFESSIONAL TRAINING LTD REGISTERED IN SCOTLAND UNDER REGISTRATION NUMBER SC423952. VAT REGISTRATION NO 137653694.

X