->
Oreilly - CompTIA Network+ N10-007 - 300000006A0172
Oreilly - CompTIA Network+ N10-007
by Integrity Training | Publisher: Stone River eLearning | Release Date: June 2018 | ISBN: 300000006A0172


The CompTIA Network+ (N10-007) course is the next update in the CompTIA Network+ series. The course has been updated to include the latest trends and technologies in the networking domain and expanded the knowledgebase to include the critical security concepts, cloud computing best practices, virtualization techniques and newer hardware. The CompTIA Network+ (N10-007) course is covers the full range of topics which are part of the official exam objectives of the CompTIA Network+ N10-007 exam. This course comprehensively covers the complete exam objectives and enables the candidates to sit for the certification exam with confidence. In addition to this, the course is equally helpful for IT professionals looking to increase their knowledge and improve work efficiency at their workplace. The candidates are able to configure, troubleshoot and operate real-world networks after successful completion of this course.
  1. Introduction
    • Course Introduction 00:03:17
    • Instructor Introduction 00:01:26
  2. Chapter 01 - Introduction to Networking
    • Introduction to Networking 00:01:41
    • Topic A: Networking Fundamentals 00:00:06
    • What is a Network? 00:02:03
    • Network Building Blocks 00:03:57
    • Types of Networks 00:05:20
    • Host Requirements 00:02:45
    • Numbering Systems 00:03:16
    • Demo - Working with Numbering Systems 00:20:14
    • Communication Types 00:01:55
    • Communication Concepts 00:01:50
    • Other Communication Methods 00:01:43
    • Topic B: Network Models and Topologies 00:00:41
    • Networking Models 00:02:48
    • Workgroup vs. Domain 00:01:41
    • Network Topologies 00:00:39
    • Physical Bus 00:02:10
    • Physical Star 00:01:21
    • Physical Ring 00:01:59
    • Physical Mesh 00:01:28
    • Demo - Identifying Network Topology 00:04:48
    • Logical Topologies 00:03:03
    • Wireless Topologies 00:02:10
    • Topic C: Network Components and Services 00:00:11
    • Network Components and Services 00:01:56
    • Network Components and Services (cont.) 00:01:31
    • Topic D: Becoming a Network Professional 00:00:24
    • Technical Challenges 00:03:12
    • Knowledge Specialization 00:03:36
    • Developing Soft Skills 00:00:43
    • Achieving the Certification 00:02:24
    • Planning for Certification 00:02:12
    • Chapter 01 Review 00:01:03
  3. Chapter 02 - Network Standards
    • Network Standards 00:01:02
    • Topic A: Introducing Networking Standards 00:00:09
    • What is a Standard? 00:02:26
    • Why Use Standards? 00:02:37
    • Standards Organizations 00:01:57
    • Topic B: Open Interconnection Systems / Reference Model 00:00:13
    • What is OSI/RM 00:03:34
    • Upper Layers 00:03:05
    • Lower Layers 00:05:06
    • Topic C: IEEE Network Standards 00:00:14
    • IEEE Networking Standards 00:02:06
    • Ethernet 00:01:16
    • Ethernet Frames 00:01:38
    • MAC Addresses 00:02:38
    • Access Methods 00:03:01
    • 10Base Standards 00:03:08
    • Demo - Ethernet Standards 00:03:37
    • Chapter 02 Review 00:01:42
  4. Chapter 03 - Network Communications
    • Network Communications 00:01:21
    • Topic A: Fundamentals of Network Transmission 00:00:05
    • Transmission Methods 00:01:34
    • Network Performance Factors 00:01:59
    • Serial vs. Parallel 00:01:27
    • Baseband vs. Broadband 00:01:21
    • Data Access Methods 00:00:33
    • Communication Domains 00:05:45
    • Data Access Methods (Cont.) 00:01:30
    • Digital Signals 00:01:37
    • Units of Measurement 00:01:49
    • Topic B: Copper Media 00:00:13
    • Transmission Media 00:01:00
    • Twisted Pair Cabling 00:01:36
    • Cable Media Categories 00:01:55
    • Twisted Pair Connectors 00:01:21
    • Copper Media Types 00:02:20
    • Wiring Differences 00:01:31
    • Coaxial Cabling 00:01:32
    • Demo - Media Types 00:04:25
    • Topic C: Optical Media 00:00:13
    • Fiber Optic Cabling 00:02:21
    • Connection Options 00:00:46
    • Fiber Optic Connectors 00:01:45
    • Demo - Optical Cables and Connectors 00:02:58
    • Topic D: Specialty Cables and Connectors 00:00:12
    • Specialty Connectors and Cabling 00:01:32
    • Media Converters 00:01:08
    • Topic E: LAN Infrastructure Wiring 00:00:12
    • Demarcation Point 00:01:19
    • Other LAN Components 00:01:11
    • Wiring Individual Workstations 00:02:03
    • Connecting Cables 00:00:41
    • Punchdown Blocks 00:00:56
    • Topic F: Wireless Networking 00:00:18
    • Introduction to Wireless LANs 00:01:35
    • Wireless Networking Fundamentals 00:02:15
    • Types of Wireless 00:02:51
    • Wireless Networking Components 00:03:50
    • Demo - Configuring an Access Point 00:11:13
    • Wireless Modes 00:01:01
    • Wireless Devices 00:00:49
    • Wireless Networking Standards 00:00:32
    • 802.11 Standards 00:04:40
    • Enhancing Wireless Performance 00:01:23
    • Wired Equivalent Privacy 00:01:58
    • Wi-Fi Protected Access 00:02:51
    • 802.1x 00:02:16
    • Demo - Examining Wireless Security 00:03:26
    • Planning Wireless Networks 00:00:36
    • Choosing Antennas 00:00:50
    • Antenna Types 00:00:46
    • Wireless Channels 00:01:36
    • Site Surveys 00:00:56
    • Other Considerations 00:01:30
    • Chapter 03 Review 00:02:23
  5. Chapter 04 - Working with TCP/IP
    • Working with TCP/IP 00:01:19
    • Topic A: Understanding TCP/IP 00:00:10
    • Overview of TCP/IP 00:02:53
    • TCP/IP Layers 00:02:56
    • Core Protocols 00:01:34
    • Transport Protocols 00:01:21
    • Transmission Control Protocol 00:02:16
    • User Datagram Protocol 00:01:22
    • What is a Socket? 00:02:33
    • Internet Layer 00:02:50
    • Core Internet Layer Protocols 00:03:17
    • IP Datagrams 00:05:43
    • Application Layer 00:01:00
    • Application Layer Protocols 00:01:25
    • Well Known Ports 00:08:20
    • Topic B: Working with IPv4 Addresses 00:00:16
    • Introduction to IP Addresses 00:03:01
    • Subnet Masks 00:02:59
    • Demo - Working with Binary IP Addresses 00:18:26
    • IPv4 Address Rules 00:02:24
    • Valid Masks 00:01:37
    • Default Gateway 00:01:19
    • Demo - Configuring IP Addresses 00:08:06
    • Address Categories 00:00:18
    • Public vs. Private Addresses 00:04:21
    • Classful Addressing 00:04:26
    • Classless Addressing 00:02:34
    • Demo - CIDR Notation 00:10:02
    • Create IPv4 Subnets 00:01:42
    • Simple Subnetting 00:03:31
    • Complex Subnetting 00:01:38
    • Demo - Creating Subnets 00:19:54
    • Topic C: Working With IPv6 Addresses 00:00:17
    • Introduction to IPv6 00:03:36
    • IPv6 Advantages 00:01:08
    • IPv6 Addresses 00:04:53
    • IPv6 Addressing 00:01:52
    • Global Unicast 00:01:25
    • Unique Local Unicast 00:01:26
    • Link Local Address 00:01:35
    • Special Addresses 00:00:50
    • Autoconfiguration in IPv6 00:01:37
    • Demo - Viewing and Configuring IPV6 00:07:10
    • Topic D: Assigning Addresses with DHCP 00:00:09
    • Introducing DHCP 00:02:35
    • DHCP Leases 00:02:12
    • Lease Renewal 00:02:40
    • DHCP Server Placement 00:01:52
    • DHCP Implementations 00:01:11
    • DHCP Servers 00:03:03
    • Topic E: Resolving Names Using DNS 00:00:11
    • What is Name Resolution 00:01:30
    • Types of Names 00:01:32
    • Introduction to DNS 00:02:26
    • DNS Components 00:02:06
    • Resource Records 00:02:31
    • DNS Zones and Domains 00:01:15
    • Name Resolution Process 00:04:22
    • Types of Queries 00:01:37
    • Chapter 04 Review 00:01:49
  6. Chapter 05 - Network Devices
    • Network Devices 00:01:01
    • Topic A: Introduction to Network Devices 00:00:14
    • Common Network Devices 00:01:41
    • Device Capabilities 00:03:05
    • OSI / RM Layers and Devices 00:01:36
    • Topic B: Physical Layer Devices 00:00:14
    • Introduction to Physical Devices 00:01:53
    • Network Interface Cards 00:02:41
    • Repeaters 00:01:15
    • Repeater Types 00:00:54
    • Hubs 00:02:33
    • Topic C: Data Link Layer Devices 00:03:10
    • Data Link Filtering 00:02:47
    • What is a Bridge? 00:03:10
    • Network Switches 00:00:25
    • Introduction to the Layer 2 Switch 00:02:21
    • Switch Categories 00:02:42
    • Switch Characteristics 00:02:44
    • Power Over Ethernet 00:00:46
    • Virtual Capabilities 00:02:58
    • Virtual LAN (VLAN) 00:02:21
    • Initial Switch Configuration 00:02:36
    • Interface Configuration 00:02:39
    • Introduction to STP 00:02:40
    • STP Port States 00:03:11
    • RSTP Differences 00:00:55
    • Understanding Trunking 00:01:00
    • Trunking Protocols 00:03:16
    • Additional Management for Switches 00:01:22
    • Topic D: Network Layer Devices 00:00:20
    • The Layer 3 Job 00:02:51
    • Routing Tables 00:03:55
    • Demo - Reading a Routing Table 00:09:08
    • Network Segmentation Benefits 00:03:04
    • Hardware vs. Software Routers 00:02:28
    • Static vs. Dynamic Routing 00:01:01
    • Routing Protocols 00:02:58
    • Dynamic Routing 00:01:18
    • What is a Metric? 00:03:42
    • Distance Vector vs. Link State 00:02:26
    • Path Vector 00:00:55
    • Interior Routing Protocols 00:02:56
    • Exterior Routing Protocols 00:00:48
    • Routing Problems 00:02:18
    • Router Redundancy 00:02:03
    • Topic E: Additional Network Devices 00:00:10
    • Additional Network Devices 00:02:55
    • Load Balancers 00:00:59
    • Traffic Shapers 00:00:35
    • Chapter 05 Review 00:01:09
  7. Chapter 06 - Wide Area Networks
    • Wide Area Networks 00:01:13
    • Topic A: WAN Fundamentals 00:00:06
    • What is a Wide Area Network (WAN)? 00:01:45
    • WAN Options 00:01:26
    • WAN Categories 00:02:46
    • Topic B: Wired WAN Connections 00:00:11
    • Public Switched Telephone Network 00:02:19
    • Integrated Services Digital Network 00:02:09
    • Digital Subscriber Line 00:04:12
    • Cable Modems 00:03:33
    • MPLS 00:01:12
    • ATM 00:01:28
    • Frame Relay 00:01:20
    • Leased Lines 00:02:04
    • Metropolitan Ethernet 00:01:52
    • Topic C: Wireless WAN Connections 00:00:08
    • Satellite WANs 00:01:20
    • Wireless Local Loop 00:01:21
    • WiMAX 00:01:32
    • Cellular Connections 00:00:54
    • GSM vs. CDMA 00:00:30
    • 3G Technologies 00:00:48
    • 4G Technology 00:01:09
    • Topic D: Fiber WAN Connections 00:00:10
    • Fiber WAN Connections 00:00:43
    • OC Levels 00:01:51
    • Demo - Choosing a WAN Provider 00:08:59
    • Chapter 06 Review 00:01:21
  8. Chapter 07 - Remote Access
    • Remote Access 00:01:07
    • Topic A: Introduction to Remote Networking 00:00:13
    • Introduction to Remote Networking 00:04:21
    • Remote Node 00:01:38
    • Remote Desktop Control 00:03:10
    • Remote Control Concepts 00:02:09
    • Demo - Configuring Remote Control 00:08:59
    • Topic B: Authenticating Remote Connections 00:00:14
    • Understanding Authentication 00:01:52
    • Authentication, Authorization, and Accounting (AAA) 00:01:35
    • CHAP and MS-CHAP 00:05:23
    • EAP and Other Authentication Protocols 00:03:17
    • RADIUS 00:01:59
    • TACACS+ 00:01:22
    • Topic C: Understanding Virtual Private Networks 00:00:13
    • What is a VPN? 00:03:03
    • VPN Tunnel Types 00:01:43
    • What is Encapsulation? 00:00:54
    • VPN Components 00:02:30
    • Encryption Types 00:02:32
    • VPN Concentrators 00:00:44
    • VPN Protocols 00:02:51
    • Demo - Create and Configure a VPN 00:09:57
    • Chapter 07 Review 00:01:24
  9. Chapter 08 - Network Security
    • Network Security 00:01:56
    • Topic A: Network Security Fundamentals 00:00:11
    • Introduction to Network Security 00:01:08
    • The CIA Triad 00:04:54
    • Network Threats 00:01:11
    • Network Vulnerabilities 00:02:36
    • Understanding Risk 00:01:54
    • What is AAAA? 00:03:08
    • Cryptography 00:02:45
    • Algorithms and Keys 00:04:52
    • Digital Signatures 00:02:49
    • Best Practices for Permissions 00:03:42
    • Best Practices for Employees 00:02:24
    • Topic B: Planning for Network Security 00:00:10
    • Planning for Network Security 00:00:33
    • Types of Threats 00:03:27
    • Threat-Vulnerability Pairs 00:05:09
    • Identifying Vulnerabilities 00:04:51
    • Types of Vulnerabilities 00:03:27
    • Mitigating Risks 00:04:52
    • User Awareness 00:05:35
    • Understanding Compliance 00:02:03
    • Business Continuity 00:06:52
    • Change Management 00:04:15
    • Network Documentation 00:02:23
    • Topic C: Identifying Threats and Vulnerabilities 00:00:13
    • Threat Categories 00:02:14
    • Introduction to Software Attacks 00:01:10
    • Malicious Code Attacks 00:00:43
    • Types of Malicious Code 00:06:39
    • Network Threats 00:01:20
    • Port Scanning and Eavesdropping 00:02:04
    • IP Spoofing 00:01:35
    • Denial of Service (DoS) 00:04:59
    • Man-in-the-Middle Attacks 00:01:32
    • Human Attacks 00:12:47
    • Wireless Vulnerabilities and Threats 00:03:55
    • Topic D: Protecting the Network 00:00:15
    • Protecting the Network 00:00:52
    • Implementing Physical Protection 00:01:58
    • Physical Security Options 00:02:49
    • Demo - Examining Physical Security Devices 00:03:54
    • Anti-Malware 00:04:04
    • Demo - Anti-malware Options 00:07:20
    • Network Hardening 00:03:57
    • Securing Network Communications 00:02:36
    • Introduction to Firewalls 00:03:24
    • Types of Firewalls 00:04:50
    • Demo - Using Firewalls 00:03:56
    • Authentication 00:02:49
    • Authentication Factors 00:04:26
    • Network Access Control 00:02:35
    • Chapter 08 Review 00:00:53
  10. Chapter 09 - Building Highly Available and Scalable Networks
    • Building Highly Available and Scalable Networks 00:01:45
    • Topic A: Maintaining Business Continuity 00:00:05
    • Maintaining Business Continuity 00:02:34
    • Understanding High Availability 00:05:04
    • High Availability Options 00:07:47
    • Disaster Recovery 00:02:57
    • Monitoring Network Devices 00:02:17
    • Patch Management 00:01:52
    • Topic B: Virtualization and Cloud Computing 00:00:16
    • What is Virtualization? 00:02:32
    • Virtualization Benefits 00:03:52
    • Virtualization and Cloud Computing 00:06:22
    • Virtual Machine Hosts 00:02:36
    • Virtualization Components 00:03:27
    • Importance of Storage 00:02:31
    • Storage Options 00:02:23
    • Storage Area Networks 00:04:08
    • Virtual Devices and Networks 00:03:49
    • What is Cloud Computing? 00:04:10
    • The Cloud Advantage 00:02:31
    • Cloud Models 00:04:41
    • Cloud Services Models 00:05:32
    • Demo - Working in the Cloud 00:11:23
    • Topic C: Unified Communications 00:00:08
    • Unified Communications 00:00:36
    • Unified Communication Components 00:01:33
    • Unified Communication Technologies 00:03:05
    • Chapter 09 Review 00:01:28
  11. Chapter 10 - Maintenance, Monitoring, and Troubleshooting
    • Maintenance, Monitoring, and Troubleshooting 00:00:56
    • Topic A: Network Safety Fundamentals 00:00:06
    • The Importance of Safety 00:01:52
    • Electrical Safety 00:02:20
    • Static Electricity 00:01:37
    • Preventing Static Electricity 00:01:02
    • Fire Suppression Systems 00:02:14
    • Topic B: Network Operations 00:00:07
    • Implementing Network Policies 00:03:50
    • Topic C: Maintaining and Monitoring Networks 00:00:05
    • Types of Monitoring 00:01:06
    • Performance Baselines 00:01:49
    • Monitoring Tools 00:01:15
    • Network Monitoring Tools 00:02:44
    • Introduction to Network Tools 00:00:56
    • Analyzing Traffic 00:01:04
    • Environmental Monitoring 00:00:49
    • Using SYSLOG 00:01:02
    • Using SIEM 00:00:56
    • Using SNMP 00:00:28
    • SNMP Components 00:01:13
    • SNMP Packet Types 00:01:42
    • Monitoring Operating Systems 00:00:29
    • Using Task Manager 00:01:02
    • Using Event Viewer 00:00:56
    • Maintaining and Monitoring Networks 00:00:31
    • Using Performance Monitor 00:01:13
    • Additional Monitoring Types 00:01:53
    • Introduction to Patch Management 00:01:23
    • Operating System Updates 00:03:07
    • Updating Windows Systems 00:00:41
    • Managing Network Devices 00:01:06
    • Topic D: Troubleshooting Methodology 00:00:05
    • Introduction to Troubleshooting 00:06:48
    • Identifying the Issue 00:02:21
    • Establish a Theory of Probable Cause 00:02:35
    • Create an Action Plan 00:03:47
    • Putting it All Together 00:01:18
    • Topic E: Troubleshooting Tools 00:00:08
    • Hardware Troubleshooting Tools 00:00:58
    • Network Tool Kit 00:01:45
    • Software Toolkits 00:01:30
    • OS Troubleshooting Tools 00:01:03
    • Demo - OS Troubleshooting Tools 00:13:35
    • Topic F: Troubleshooting Network Issues 00:00:11
    • Introduction to Wireless Issues 00:00:56
    • Wireless Signal Issues 00:02:51
    • Troubleshooting Hardware and Configuration 00:01:17
    • Wireless Security Issues 00:01:18
    • Troubleshooting Wired Connectivity Issues 00:01:47
    • Troubleshooting Fiber Cable Issues 00:00:54
    • Troubleshooting Network Service Issues 00:02:01
    • Troubleshooting Security Issues 00:01:01
    • Chapter 10 Review 00:00:42
    • Course Closure 00:02:41
  12. Oreilly - CompTIA Network+ N10-007

    300000006A0172.CompTIA.Network.N10007.part1.OR.rar

    300000006A0172.CompTIA.Network.N10007.part2.OR.rar


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Coktum   |  

Information
Members of Guests cannot leave comments.




rss