O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CompTIA Network+ N10-006

Video Description

CompTIA's Network+ N10-006 is a vendor-neutral certification that validates technical competency in networking administration and support. The Network Plus certification confirms a technician's critical knowledge of media and topologies, protocols and standards, network implementation and network support. The exams also cover domains such as security, safety and environmental issues and communication and professionalism.

Table of Contents

  1. Chapter 1
    1. Course Introduction 00:00:25
    2. Introduction to Networks Overview Part1 00:00:09
    3. Introduction to Networks Overview Part2 00:00:21
    4. What is a Network? 00:00:34
    5. Peer to Peer Networking 00:01:10
    6. Client Server Networks 00:01:05
    7. Physical Topologies 00:00:22
    8. Physical Bus Topologies 00:00:53
    9. Physical Star Topologies 00:00:51
    10. Physical Ring Topologies 00:00:43
    11. Physical Mesh Topologies 00:00:54
    12. Point to Point Topologies 00:03:06
    13. Hybrid Topologies 00:00:29
    14. Backbones and Segments 00:00:22
  2. Chapter 2
    1. OSI Model Overview Part1 00:00:18
    2. OSI Model Overview Part2 00:00:50
    3. Internetworking Models 00:00:45
    4. Advantages of Reference Models 00:01:07
    5. OSI Model and Layer Functions 00:05:37
    6. TCP Reliability 00:03:00
    7. TCP Flow Control and Packet Acknowledgement 00:02:59
    8. Multiplexing 00:01:12
    9. Routing at Layer 3 00:03:16
    10. Numbering Systems 00:01:21
    11. Data Encapsulation 00:02:44
    12. Base and Broad Band 00:00:51
    13. Bit Rate and Baud Rate 00:00:36
    14. Wavelength 00:00:30
  3. Chapter 3
    1. Media Cables and Connectors Overview Part1 00:00:18
    2. Media Cables and Connectors Overview Part2 00:00:50
    3. Physical Media 00:00:26
    4. Coax Media Cables and Connectors 00:02:28
    5. Broadband Over Power Lines 00:00:50
    6. Twisted-Pair Media Cables and Connectors 00:03:11
    7. FiberOptic Media Cables and Connectors 00:04:24
    8. Serial and USB Connectors 00:01:21
    9. Cable Properties 00:00:29
    10. UTP and BNC Couplers 00:01:16
    11. Wiring Standards 00:04:22
    12. T1 Crossover Cable 00:00:18
    13. Wiring Distribution Installation 00:01:42
    14. Troubleshooting Wiring 00:03:28
  4. Chapter 4
    1. Ethernet Standards and Properties Overview Part1 00:00:25
    2. Ethernet Standards and Properties Overview Part2 00:00:25
    3. Collision and Broadcast Domains 00:01:02
    4. Carrier Sense Multiple Access/Collision Detection 00:03:33
    5. Ethernet Frames 00:00:33
    6. Duplexe Ethernet 00:01:58
    7. Binary to Decimal 00:01:37
    8. IEEE Standards 00:02:41
    9. 802.3 Standards 00:01:07
    10. Hex to Binary to Decimal 00:00:32
    11. Ethernet Addressing 00:01:10
    12. IEEE 1901-2013 00:00:35
  5. Chapter 5
    1. Network Devices Overview Part1 00:00:16
    2. Firewalls and Other Devices Part2 00:01:39
    3. Common Network Device 00:00:27
    4. Hubs 00:01:58
    5. Switches and Routers 00:02:06
    6. Network Interface Cards 00:01:19
    7. Network Bridges 00:01:02
    8. Dynamic Host Configuration Protocol 00:02:47
    9. Specialized Devices 00:02:02
    10. Firewalls and Other Devices Part1 00:00:52
    11. Network Devices Overview Part2 00:00:52
    12. Multilayer Switch and Domain Name Services 00:05:07
    13. Proxy Servers 00:00:29
    14. Encryption Devices 00:00:40
    15. VPN Concentrator 00:00:23
    16. Planning and Implementing a Network 00:02:49
  6. Chapter 6
    1. Internet Protocol Overview Part1 00:00:19
    2. Internet Protocol Overview Part2 00:00:20
    3. What is TCP/IP? 00:00:59
    4. DoD and OSI Model 00:01:10
    5. TCP/IP Protocol Suite 00:04:23
    6. TCP and UDP 00:02:56
    7. Port Number Examples 00:01:26
    8. IP Header 00:00:35
    9. ICMP 00:00:49
    10. ARP 00:01:04
    11. Data Encapsulation and De-Encapsulation 00:00:19
    12. Protocol Data Units 00:00:46
    13. Port Numbers at the Transport Layer 00:00:29
  7. Chapter 7
    1. Internet Protocol Addressing Overview Part1 00:00:20
    2. Internet Protocol Addressing Overview Part2 00:00:33
    3. Internet Protocol Version 6 00:04:45
    4. Auto Configuration EUI-64 00:01:03
    5. Addressing Terminology 00:02:24
    6. Link Local and Global Addressing 00:00:46
    7. Transition Mechanisms 00:01:16
    8. IP Addressing Hierarchical Scheme 00:01:33
    9. Classful IP Addressing 00:03:55
    10. Dynamic Host Configuration Protocol 6 00:00:45
    11. Private IP Addressing 00:02:44
    12. IP Addressing Terms 00:00:55
  8. Chapter 8
    1. Subnetting Overview Part1 00:00:17
    2. Subnetting Overview Part2 00:00:25
    3. Classless Inter-Domain Routing 00:01:01
    4. Troubleshooting IP Addresses 00:01:00
    5. Command Line Tools 00:01:47
    6. Network Address Translation 00:01:47
    7. Subnetting Basics 00:01:39
    8. Creating a Subnet Portion 00:04:40
    9. How NAT Works 00:00:46
    10. Determining Number of Computers Through Subnetting 00:01:55
    11. Locating Network ID's 00:01:37
    12. Determining Block Size or Interval 00:04:02
  9. Chapter 9
    1. Routing Concepts Overview Part1 00:00:11
    2. Routing Concepts Overview Part2 00:00:24
    3. IP Routing Basics 00:02:56
    4. IP Routing Process 00:02:44
    5. Static and Dynamic Routing 00:03:26
    6. Additional Routing Terms 00:02:12
    7. Default Routing 00:00:47
    8. Gateway Redundancy 00:01:37
  10. Chapter 10
    1. Dynamic Routing Protocols Overview Part1 00:00:14
    2. Dynamic Routing Protocols Overview Part2 00:00:13
    3. Routing Protocol Basics 00:00:38
    4. Administrative Distance 00:01:17
    5. Routing Protocol Classes 00:01:02
    6. Distance Vector Routing Protocols 00:01:11
    7. Routing Information Protocol 00:00:57
    8. Classful and Classless Networks 00:02:00
    9. Discontiguous Network 00:01:51
    10. EIGRP and BGP 00:01:02
    11. RIP 00:01:51
    12. IPv6 Routing Protocols 00:00:57
  11. Chapter 11
    1. Switching and VLAN Configuration Overview Part1 00:00:15
    2. Switching and VLAN Configuration Overview Part2 00:00:33
    3. Switching and Virtual LANs 00:01:09
    4. Switching Services 00:01:57
    5. Address Learning and Forward/Filter Decisions 00:01:51
    6. Loop Avoidance 00:01:37
    7. Spanning Tree Protocol 00:04:05
    8. VLAN Broadcast Domains 00:02:13
    9. Access and Trunk Links 00:02:26
    10. VTP Modes of Operation and Configuration 00:01:43
    11. Advanced Features of Switches 00:02:32
    12. Switch Management 00:02:19
    13. VLAN Switch Configuration Demonstration 00:02:35
  12. Chapter 12
    1. Wireless Technologies Overview Part1 00:00:15
    2. Wireless Technologies Overview Part2 00:00:20
    3. Wireless Technologies Basics 00:01:13
    4. Wireless Agencies and Standards 00:01:33
    5. Wireless Frequency Ranges 00:01:19
    6. 802.11 Committees and Subcommittees 00:07:19
    7. Wireless LAN Modulation Techniques 00:01:58
    8. Wireless Access Points and NIC Cards 00:00:58
    9. Wireless Network Types 00:01:35
    10. Installing and Configuring Hardware 00:01:36
    11. Wireless Security 00:06:08
    12. Troubleshooting Issues 00:05:15
    13. Environmental Factors 00:01:16
    14. Rougue Access Point 00:01:18
  13. Chapter 13
    1. Network Hardening Techniques Overview Part1 00:00:11
    2. Network Hardening Techniques Overview Part2 00:00:24
    3. Access Control Lists 00:01:07
    4. Tunneling Protocols 00:06:54
    5. Encryption Standards 00:02:45
    6. Remote Access 00:02:17
    7. User Account and Resource Security 00:01:14
    8. User Authentication Methods 00:01:06
    9. Authentication 00:03:48
    10. Secure and Unsecure Protocols 00:00:50
    11. Access Control List Demonstration 00:03:04
  14. Chapter 14
    1. Network Security Vulnerabilities Overview Part1 00:00:13
    2. Network Security Vulnerabilities Overview Part2 00:00:58
    3. Denial of Service Attacks 00:04:43
    4. Viruse Attacks 00:03:08
    5. Attackers and Their Tools 00:05:41
    6. ARP Cache Poisoning and VLAN Hoping 00:02:29
    7. Mitigation Techniques 00:00:40
    8. Policies and Procedures 00:02:30
    9. NSA Specifications 00:00:51
  15. Chapter 15
    1. Firewalls Overview Part1 00:00:11
    2. Firewalls Overview Part2 00:00:19
    3. Firewalls Types 00:02:40
    4. Firewall Technologies 00:04:11
    5. Intrusion Detection and Prevention Systems 00:02:19
    6. Vulnerability Scanning and VPN Concentrators 00:01:37
    7. Device Security 00:01:16
    8. Forward and Reverse Proxy Servers 00:00:51
    9. Network Address Translation and Port Forwarding 00:01:35
    10. Port Security Demonstration 00:02:09
  16. Chapter 16
    1. Defining Wide Area Networks 00:02:07
    2. WAN Connection Types 00:02:38
    3. Dense and Course Wavelength Division Multiplexing 00:01:26
    4. Passive Optical Network and SONET 00:00:53
    5. Wireless Technologies 00:01:24
    6. Broadband Services 00:02:16
    7. WAN Protocols 00:03:19
    8. Cellular WAN 00:01:29
    9. Metro Ethernet 00:01:21
    10. Wide Area Network Technologies Overview Part1 00:00:17
    11. Wide Area Network Technologies Overview Part2 00:00:24
  17. Chapter 17
    1. Network Troubleshooting Overview Part1 00:00:15
    2. Network Troubleshooting Overview Part2 00:00:16
    3. Protocol Analyzers 00:01:19
    4. Network Scanners 00:04:37
    5. Throughput Testers and Connectivity Software 00:03:23
    6. Command Line Tool traceroute 00:01:40
    7. ipconfig and ifconfig Utility 00:01:44
    8. Ping and IPv6 Utility 00:03:12
    9. Address Resolution Protocol 00:00:48
    10. nslookup Utility 00:01:30
    11. My traceroute Command 00:00:53
    12. nbtstat and netstat Utility 00:01:31
    13. File Transfer Protocol 00:00:34
    14. Telnet Utility 00:00:32
    15. Command Line Tool Guidelines 00:00:25
    16. Windows Command Line Tools Demonstration 00:07:20
  18. Chapter 18
    1. Network Management Hardware Tools Overview 00:00:12
    2. Hardware Tools Overview 00:06:11
  19. Chapter 19
    1. Troubleshooting Methodologies Overview Part1 00:00:13
    2. Troubleshooting Methodologies Overview Part2 00:00:18
    3. Troubleshooting Approaches 00:01:26
    4. Narrowing Down the Problem Part1 00:05:34
    5. Narrowing Down the Problem Part2 00:03:57
    6. Troubleshooting Steps 00:03:13
    7. Troubleshooting Tips 00:01:22
  20. Chapter 20
    1. Network Monitoring Tools Overview Part1 00:00:12
    2. Network Monitoring Tools Overview Part2 00:01:54
    3. Simple Network Management Protocol 00:01:51
    4. Schematics and Diagrams 00:03:16
    5. Policies 00:03:27
    6. Network Performance Monitoring 00:04:50
    7. MetricsMetrics 00:02:16
    8. Configuration Management 00:01:11
    9. Virtual Networking 00:01:17
    10. Storage Area Network 00:01:53
    11. Cloud Architectures 00:02:09
    12. Protocol Analyzer Demonstration 00:04:10
  21. Chapter 21
    1. Troubleshooting Wide Area Networks Overview Part1 00:00:10
    2. Troubleshooting Wide Area Networks Overview Part2 00:00:12
    3. Local and Wide Area Networks 00:00:59
    4. Wireless Local Area Network 00:00:54
    5. Personal Area Network 00:00:48
    6. SCADA and ICS 00:02:07
    7. Medianets 00:01:22
    8. WAN Connection Issues 00:02:37
    9. Customer Equipment 00:01:18
    10. Company ISP Security Policies and Satellite Issues 00:01:14
  22. Chapter 22
    1. Physical Security Overview Part1 00:00:11
    2. Physical Security Overview Part2 00:00:25
    3. SCADA Review 00:01:12
    4. Network Segmentation 00:03:20
    5. Additional Physical Security and Specific Dangers 00:02:30
    6. Access Controls and Monitoring 00:00:52
    7. Environmental Controls and Electrical Power 00:01:34
    8. Access Control Authentication Types 00:02:27
    9. Multiple Factor Authentication 00:01:10
  23. Chapter 23
    1. Network Access Control Overview Part1 00:00:18
    2. Network Access Control Overview Part2 00:00:23
    3. IEEE 802.1x 00:01:25
    4. Network Access Control 00:03:56
    5. Computer Forensics 00:04:25
    6. Investigative Process 00:01:46
    7. Free Space vs. Slack Space 00:02:05
    8. Disaster Recovery 00:01:38
    9. Business Impact Assessment 00:01:36
    10. Backup Considerations 00:04:25
    11. RAID Backup Solutions 00:02:13
    12. Redundancy and Single Points of Failure 00:01:11
  24. Chapter 24
    1. Troubleshooting Security Overview Part1 00:00:13
    2. Troubleshooting Security Overview Part2 00:00:18
    3. Firewall Security Issues 00:01:45
    4. Avenues of Attack 00:03:19
    5. Denial of Service Attacks 00:03:49
    6. Types of DDOS Attacks 00:02:29
    7. IP Address Spoofing 00:02:00
    8. Replay Attacks and TCP/IP Hijacking 00:01:04
    9. Encryption Attacks 00:01:13
    10. Address System and Password Attacks 00:02:26
    11. Software Exploitation 00:02:57
    12. Viruses and Malware 00:04:16
    13. Anti Malware Software 00:01:15
    14. Switch Port Security 00:02:51
  25. Chapter 25
    1. Voice Over IP Overview Par1 00:00:20
    2. Voice Over IP Overview Part2 00:00:12
    3. VOIP 00:04:01
  26. Chapter 26
    1. Security Policies and Programs Overview Part1 00:00:16
    2. Security Policies and Programs Overview Part2 00:00:09
    3. Security Programs 00:01:49
    4. Security Policy Types 00:03:06
    5. Security Policy Concepts 00:01:56
    6. Human Resource Policies 00:01:47
    7. Installation Safety Issues 00:00:54
  27. Chapter 27
    1. IT Distribution and Change Management Overview Part1 00:00:16
    2. IT Distribution and Change Management Overview Part2 00:00:14
    3. IT Distribution Concepts and Procedures 00:05:06
    4. Change Management 00:04:40
    5. Course Review 00:00:15