We use cookies to offer you a better experience and to analyse how visitors use our site, you may consent to our cookies by continuing to use our site, or you may view more information and choose to reject cookies by clicking here. Thank you

Contact us online or call us on 0191 377 8377

  • Name*:*
  • Organisation:
  • Telephone:
  • Email:*
  • Message*:*
  • Send me a copy of this email
  • Send me course updates from time to time via email

    Your subscription will naturally terminate after your chosen time limit. We will get in touch just before the end so that you can subscribe again if you would like to continue receiving information after that point.

* Required Fields

Course CompTIA Network+ Certification Support Skills (2015 Objectives)
  • Course Duration5 Days
  • Course Options
    Public Scheduled
    Public Scheduled
    Fixed content, fixed date, fixed location, fixed length, multiple organisations - All you need to do is choose which course you would like to attend and contact us to book!

This 5-day course is intended for those wishing to qualify with CompTIA Network+ Certification.

Network+ is foundation-level certification designed for IT professionals with 1 year's experience whose job role is focused on network administration. CompTIA Network+ is aimed at IT professionals with job roles such as network administrator, network technician, network installer, help desk technician and IT cable installer
    • Understand the use of basic access control measures, such as authentication, security policy, encryption, and firewalls
    • Configure and manage users, groups, and shared resources in a simple SOHO network.
    • Know basic network terminology and functions (such as Ethernet, TCP/IP, switches, routers).
    • Be able to: Configure and support PC, laptop, mobile (smartphone/tablet), and print devices.
    • Taken and passed both CompTIA A+ Certification exams or have equivalent knowledge and experience
    • Identify the basic network theory concepts.
    • Identify the major network communications methods.
    • Describe network media and hardware components.
    • Identify the major types of network implementations.
    • Identify the components of a TCP/IP network implementation.
    • Identify TCP/IP addressing and data delivery methods.
    • Identify the major services deployed on TCP/IP networks.
    • Identify the components of a LAN implementation.
    • Identify the infrastructure of a WAN implementation.
    • Identify the components of a remote network implementation.
    • Identify the major issues and methods to secure systems on a network.
    • Identify the major issues and technologies in network security.
    • Identify network security threats and attacks.
    • Identify the tools, methods, and techniques used in managing a network.
    • Describe troubleshooting of issues on a network.
What's included
    • For courses held on our premises, complimentary tea, coffee and biscuits are available. Lunch is not provided, however, there is a wide variety of eateries within a short walk of the centre.
    • Comprehensive course materials and exercises
Course Content
    • Topologies and Infrastructure
      Topologies and the OSI Model
      Key Features of Networks
      Clients and Servers
      Network Topologies
      The OSI Model
      Physical Layer
      Data Link Layer
      Network Layer
      Upper Layers
      OSI Model Summary
      Media Types and Modulation
      Media Access Control
      Ethernet Frames
      Legacy Ethernet Standards
      Modern Ethernet Standards
      MAC Addressing
      Address Resolution Protocol (ARP)
      Protocol Analyzers

      Configuring a Network Adapter
      Using Hyper-V
      ARP and Packet Analysis
      Hubs, Bridges, and Switche
      Hubs and Bridges
      Managing a Switch
      Switch Interface Configuration
      Virtual LANs (VLAN)
      Spanning Tree Protocol (STP)
      Power over Ethernet (PoE)
      Infrastructure and Design
      Network Infrastructure Implementations
      Planning an Enterprise Campus Network
      Planning a SOHO Network Installation
      Planning an Industrial Control System
      TCP/IP Protocol Suite
    • Addressing and Routing
      Internet Protocol
      Internet Protocol Basics
      Subnet Masks
      ipconfig / ifconfig
      IP Routing Basics
      ICMP and ping

      IP Address Configuration
      IPv4 Addressing
      IP Addressing Schemes
      Subnetting and Classless Addressing
      Planning an IP Addressing Scheme
      Public Internet Addressing
      Multicast and IGMP

      IP Addressing Schemes
      DHCP and APIPA
      Static versus Dynamic IP Addressing
      Configuring DHCP

      Configuring DHCP Clients and Servers

      Configuring DHCP in Windows
      Configuring DHCP in Linux
      IPv6 Addressing
      IPv6 Address Format
      IPv6 Addressing Schemes
      Configuring IPv6 Addresses
      Migrating to IPv6

      IPv6 Addressing
      Routing Basics
      Routing Algorithms and Metrics
      Routing Protocols
      Administrative Distance and Route Redistribution
      IPv4 and IPv6 Internet Routing
      High Availability Routing
      Installing and Configuring Routers
      Routing Troubleshooting Tools

      Configuring Routing
    • Troubleshooting and Management
      Transport Protocols
      Transmission Control Protocol (TCP)
      User Datagram Protocol (UDP)
      TCP/IP Ports

      TCP and Port Scanning
      Name Resolution
      Host Names and FQDNs
      Domain Name System (DNS)
      Configuring DNS Servers
      nslookup and nbtstat

      Name Resolution
      Configuring DNS
      Troubleshooting Procedures
      Identifying the Problem
      Establishing a Probable Cause
      Establishing a Plan of Action
      Troubleshooting Connectivity Issues
      Troubleshooting Configuration Issues
      roubleshooting Internetworking
      Troubleshooting Services
      Applications and Services
      TCP/IP Services
      HTTP and HTTPS
      FTP, TFTP, and SMB
      Email (SMTP / POP / IMAP)
      VoIP and VTC
      Real-time Services Protocols
      Quality of Service
      Packet Shapers
      Load Balancers
      Multilayer Switches

      Configuring Email Services
      Management and Monitoring
      Performance Monitoring
      Network Monitoring Utilities
      Analyzing Performance Metrics
      Simple Network Management Protocol
      Remote Administration Tools

      Performance Testing and Monitoring
      Monitoring and Management Tools
      Cloud and Virtualization
      Virtualization Technologies
      Storage Area Networks
      Cloud Computing
    • Installation
      Network Sites
      Wiring Distribution
      Rack Systems
      Safety and ESD
      Power Management
      HVAC (Heating, Ventilation, Air Conditioning)
      Physical Security Controls
      Fire Prevention and Suppression
      Installing Cable
      Twisted Pair Cable (UTP / STP / ScTP)
      Twisted Pair Connectors
      Wiring Tools and Techniques
      Cable Testing and Troubleshooting
      Other Copper Cable Types
      Fiber Optic Cable and Connectors
      Media Converters
      Troubleshooting Fiber Cable Issues
      Installing Wireless Networks
      Wireless Standards (IEEE 802.11)
      Wireless Network Topologies
      Wireless Site Design
      Site Surveys and Antenna Placement
      Troubleshooting Wireless Links
      WAN Technologies
      WAN Basics
      Telecommunications Networks
      Modern Telecommunications Networks
      Packet-switched WAN Services
      Local Loop Services
      Wireless WANs
      Remote Access
      Remote Access Services (RAS)
      Virtual Private Networks (VPN)
      PPTP and SSL VPNs
      IP Security (IPsec)
      Remote Access Servers
      Installing Remote Access Links
      Troubleshooting WAN Issues
    • Security
      Vulnerabilities and Threats
      Security Basics
      Social Engineering
      Network Reconnaissance
      Wireless Security
      Network Attack Strategies
      Denial of Service
      Security Appliances
      Network Segmentation
      Demilitarized Zones (DMZ)
      Network Address Translation
      Configuring a Firewall
      Proxies and Gateways
      Anti-malware Software
      Intrusion Detection Systems (IDS)

      Configuring Certificate Services, HTTPS, and FTPS
      Configuring a NAT Firewall
      Authentication Technologies
      Cryptographic Hash Functions
      NTLM and Kerberos
      RADIUS and TACACS+
      PAP, CHAP, and EAP
      Wi-Fi Authentication
      Endpoint Security
      Network Access Control
      Mobile Device Management
      Troubleshooting Authentication and ACLs

      Authentication Methods and VPNs
      Incident Response
      Business Continuity Concepts
      Disaster Recovery Planning
      IT Contingency Planning
      Incident Response Procedures
      Forensic Procedures
      Collection of Evidence
      Change and Configuration Management
      Change and Configuration Management
      Procedures and Standards
      Employee Policies
      Patch Management
      Backup Plans and Policies


Course Dates Please contact us to discuss dates for this course, thank you

IT Training Solutions Ltd
Oakville, 14 Durham Road West, Bowburn, Durham, DH6 5AU
0191 377 8377

Printed: 17 Jun 19




Contact us

  • Name*:*
  • Organisation:
  • Telephone:
  • Email:*
  • Message*:*
  • Send me a copy of this email
  • Send me course updates from time to time via email

    Your subscription will naturally terminate after your chosen time limit. We will get in touch just before the end so that you can subscribe again if you would like to continue receiving information after that point.

* Required Fields