Welcome to Enlighten Clouds Technologies

We build your carrier to success

Course Details
comptia N+ is a global certification that helps us to develop the base skills in networking. Main topics covered are
Batches Regular Weekend Fast Track
Duration 40-45 Days 8 Weekend 15 Days
Hours Per Day 2 Hours 6 Hours 5 Hours
Demo Class Yes - 2 Days Yes - 1 Weekend Yes - 1 Day
COMPTIA NETWORK PLUS N10-007

001 OSI Layers Ports & Protocols A Tale of Two Kings

002 OSI Layers Ports & Protocols The 7 Layers of the OSI Model

003 OSI Layers Ports & Protocols TCPIP Suite Layers

004 OSI Layers Ports & Protocols Core TCPIP Protocols

005 OSI Layers Ports & Protocols Wireshark Views of Core TCPIP Protocols

006 OSI Layers Ports & Protocols How Ports Are Used in TCPIP

007 OSI Layers Ports & Protocols Verifying L4 Ports with Wireshark

008 OSI Layers Ports & Protocols Common Protocols and Their Well-known Ports

009 OSI Layers Ports & Protocols TCP's Three-way Handshake

010 OSI Layers Ports & Protocols Wireshark Verification of a TCP 3-Way Handshake

011 Ethernet Switching Properties of Network Traffic

012 Ethernet Switching Layer 2 Ethernet Addresses

013 Ethernet Switching How a Layer 2 Switch Works

014 Ethernet Switching Demonstration Switch Dynamic Learning

015 Ethernet Switching Understanding VLANs

016 Ethernet Switching Configuring a VLAN

017 Ethernet Switching Overview of 802.1Q and Trunks

018 Ethernet Switching Configuring an 802.1Q Ethernet Trunk

019 Ethernet Switching How Address Resolution Protocol (ARP) Operates

020 Ethernet Switching Predicting the MAC Address Table

021 Ethernet Switching Validating MAC Address Table Predictions

022 Ethernet Switching Game Predict MAC Table After PC1 Pings PC4

023 Ethernet Switching Game Predict MAC Table After PC3 Pings PC5

024 Ethernet Switching Switching Loops and Spanning Tree Protocol (STP)

025 Ethernet Switching STP Reacting to a Network Change

026 Ethernet Switching Design Considerations and PoE

027 Ethernet Switching Switch Port Mirroring

028 IP Routing and Forwarding Introduction to IP Routing

029 IP Routing and Forwarding How to Train a Router

030 IP Routing and Forwarding Options for Static Routes

031 IP Routing and Forwarding Configuring Static Routes

032 IP Routing and Forwarding Dynamic Routing Protocol Overview

033 IP Routing and Forwarding Dynamic Routing Protocol Demonstration

034 IP Routing and Forwarding Address Translation with PAT

035 IP Routing and Forwarding One-to-one Translations with NAT

036 IP Routing and Forwarding Using Wireshark to Verify IP Translations

037 IP Routing and Forwarding Access Control Lists

038 IP Routing and Forwarding ACL Demonstration

039 IP Routing and Forwarding Enterprise Network Forwarding

040 IP Addressing and Subnetting IPv4 Overview

041 IP Addressing and Subnetting Binary Basics

042 IP Addressing and Subnetting Converting Decimal to Binary

043 IP Addressing and Subnetting Converting Binary to Decimal

044 IP Addressing and Subnetting The IP Mask

045 IP Addressing and Subnetting Practice Using a Different IP Mask

046 IP Addressing and Subnetting Borrowing Host Bits

047 IP Addressing and Subnetting Practicing the Finger Game

048 IP Addressing and Subnetting Identifying New Subnets

049 IP Addressing and Subnetting Exercise 1 Identify the New Subnets

050 IP Addressing and Subnetting Exercise 2 Identify the New Subnets

051 IP Addressing and Subnetting ID Valid Host Addresses on a Subnet

052 IP Addressing and Subnetting Exercise 1 ID Valid Host Addresses

053 IP Addressing and Subnetting Exercise 2 ID Valid Host Addresses

054 IP Addressing and Subnetting Calculate the Number of Hosts per Subnet

055 IP Addressing and Subnetting Determine the Subnet Based on a Host's IP Address

056 IP Addressing and Subnetting Planning and Assigning IP Addresses

057 IP Addressing and Subnetting Test Your IPv4 Knowledge Lab

058 IP Addressing and Subnetting Identifying New Subnets

059 Network Topologies Wired Topologies

060 Network Topologies Wireless Topologies

061 Network Topologies Types of Networks

062 Network Topologies Introducing the Internet of Things (IoT)

063 Network Topologies Internet of Things (IoT) Technologies

064 Wireless Technologies and Configurations The Purpose of Wireless

065 Wireless Technologies and Configurations Understanding Radio Frequency

066 Wireless Technologies and Configurations Understanding Radio Channels

067 Wireless Technologies and Configurations Wireless Communication Technologies

068 Wireless Technologies and Configurations Designing for Wireless Speed and Coverage

069 Wireless Technologies and Configurations Understanding Wireless Antennas

070 Wireless Technologies and Configurations Wireless Performance Improvements

071 Cloud Concepts Types of Services

072 Cloud Concepts Cloud Delivery Models

073 Cloud Concepts Connectivity Methods

074 Cloud Concepts Security Implications Considerations

075 Cloud Concepts Local and Cloud Resource Relationships

076 Network Services DHCP Overview

077 Network Services Verify DHCP with Wireshark

078 Network Services DNS Overview

079 Network Services DNS Methods Records and Design Options

080 Network Services DNS Testing and Validation

081 Network Services Network Time Protocol (NTP)

082 Network Services IP Address Management (IPAM)

083 Deploying Appropriate Cabling Solutions Copper Network Media Types

084 Deploying Appropriate Cabling Solutions Fiber Network Media Types

085 Deploying Appropriate Cabling Solutions Network Termination Points

086 Deploying Appropriate Cabling Solutions Network Transceivers

087 Device Placement and Configuration Network Device Placement

088 Device Placement and Configuration Device Configuration Overview

089 Device Placement and Configuration Configure Switch Ports Lab

090 Device Placement and Configuration Configure IP Addresses Lab

091 Device Placement and Configuration Configure IP Routing Lab

092 Device Placement and Configuration Configuring DHCP Services Lab

093 Device Placement and Configuration Configuring a VLAN Interface Lab

094 Device Placement and Configuration Configuring NAT Lab

095 Advanced Networking Devices Multi-Layer Switch Overview

096 Advanced Networking Devices Configure Multi-Layer Switch Lab

097 Advanced Networking Devices Load Balancer Overview

098 Advanced Networking Devices IDS and IPS

099 Advanced Networking Devices Proxy Servers and Content Filtering

100 Advanced Networking Devices Security Network Devices

101 Advanced Networking Devices AAARADIUS Server

102 Advanced Networking Devices VoIP PBX and Gateway

103 Advanced Networking Devices Wireless Controller

104 Virtualization & Network Storage Hypervisor Introduction

105 Virtualization & Network Storage Virtual Networking Components

106 Virtualization & Network Storage Creating a Virtual Switch and VM Lab

107 Virtualization & Network Storage Network Storage

108 WAN Technologies Understanding the LAN MAN and WAN Difference

109 WAN Technologies WAN Transmission over Copper Fiber Wireless and Satellite

110 WAN Technologies WAN Types ISDNPRI T1-T3 E1-E3 and OC

111 WAN Technologies WAN Types Cable DSL Dial-up

112 WAN Technologies WAN Characteristics Frame Relay ATM MPLS and DMVPN

113 WAN Technologies What is PPP and PPPoE

114 WAN Technologies What is SIP Trunking

115 WAN Technologies The Physical Reality of a WAN Connection

116 Network Diagram & Documentation Network Documentation is Fun

117 Network Diagram & Documentation Creating Logical Network Diagrams

118 Network Diagram & Documentation Creating Physical Diagrams

119 Network Diagram & Documentation Naming Conventions and Labeling

120 Network Diagram & Documentation Documenting Wiring and Port Locations

121 Network Diagram & Documentation SOPs and Work Instructions

122 Network Diagram & Documentation Network Change Management

123 Network Diagram & Documentation Configuration and Monitoring Baselines

124 Network Diagram & Documentation Inventory Management

125 Business Continuity Availability Concepts

126 Business Continuity Load Sharing and Balancing

127 Business Continuity Power Management

128 Business Continuity Site Recovery Options

129 Business Continuity Backups

130 Business Continuity Backup and Restore Hands On Lab

131 Business Continuity MTTR and MTBF

132 Business Continuity SLA Requirements

133 Scanning Monitoring & Patching Scanning Overview

134 Scanning Monitoring & Patching Network Scanning Methodology

135 Scanning Monitoring & Patching Port Scanning and Discovery

136 Scanning Monitoring & Patching OS Discovery and Fingerprinting

137 Scanning Monitoring & Patching Motivators for Vulnerability Management

138 Scanning Monitoring & Patching Vulnerability Scanning

139 Scanning Monitoring & Patching Logging and Review

140 Scanning Monitoring & Patching Packet and Traffic Analysis

141 Scanning Monitoring & Patching Packet Capture and Analysis Lab

142 Scanning Monitoring & Patching Remediation and Patch Management

143 Scanning Monitoring & Patching Network Scanning with NMAP and Zenmap Lab

144 Scanning Monitoring & Patching Baselines

145 Remote Access Methods Telnet and SSH for CLI Remote Access

146 Remote Access Methods HTTPS Management URLs

147 Remote Access Methods VPNs

148 Remote Access Methods Remote Desktop Access

149 Remote Access Methods Out-of-Band Management

150 Identify Policies & Best Practices Privileged User Agreement

151 Identify Policies & Best Practices Password Policy

152 Identify Policies & Best Practices On-boarding and Off-boarding

153 Identify Policies & Best Practices Licensing Restrictions

154 Identify Policies & Best Practices International Export Controls

155 Identify Policies & Best Practices Data Loss Prevention

156 Identify Policies & Best Practices Remote Access Policies

157 Identify Policies & Best Practices Incident Response Policies

158 Identify Policies & Best Practices Bring Your Own Device (BYOD)

159 Identify Policies & Best Practices Acceptable Use Policy (AUP)

160 Identify Policies & Best Practices Non-disclosure Agreements (NDA)

161 Identify Policies & Best Practices System Life Cycle

162 Identify Policies & Best Practices Safety Procedures and Policies

163 Physical Security & Network Attacks Let's Break into a Data Center

164 Physical Security & Network Attacks Video Surveillance and Motion Detection

165 Physical Security & Network Attacks Badges and Smart Cards

166 Physical Security & Network Attacks Biometrics

167 Physical Security & Network Attacks Locks Asset Tags and Tamper Detection

168 Physical Security & Network Attacks DoS and PDoS (Permanent Denial of Service)

169 Physical Security & Network Attacks DDoS (Distributed Denial of Service)

170 Physical Security & Network Attacks DDoS with ICMP and Smurfing

171 Physical Security & Network Attacks DDoS with DNS and NTP

172 Physical Security & Network Attacks Let's Go Phishing

173 Physical Security & Network Attacks Social Engineering and Insider Threats

174 Physical Security & Network Attacks Ransomware and Scareware

175 Physical Security & Network Attacks Cryptolocker and Logic Bombs

176 Physical Security & Network Attacks DNS Spoofing (Poisoning)

177 Physical Security & Network Attacks Man-In-The-Middle with ARP Spoofing

178 Physical Security & Network Attacks Wardriving and Deauthentication

179 Physical Security & Network Attacks Evil Twins and Rogue Access Points

180 Authentication & Access Control AAA

181 Authentication & Access Control Multi-factor Authentication Overview

182 Authentication & Access Control Using Two-Factor Authentication (2FA)

183 Authentication & Access Control Demo Implementing 2FA

184 Authentication & Access Control Switch Port Security

185 Authentication & Access Control Access Control Methods

186 Basic Wireless Network Security The Wireless Security Evolution

187 Basic Wireless Network Security Wireless Authentication and Authorization Types

188 Mitigation Techniques Network Device Hardening

189 Mitigation Techniques Hardening a Windows Server System

190 Mitigation Techniques Signature Management

191 Mitigation Techniques File Integrity Monitoring

192 Mitigation Techniques Privileged User Accounts and Role Separation

193 Mitigation Techniques Network Segmentation

194 Mitigation Techniques Switch Port Protections

195 Mitigation Techniques The Native VLAN

196 Mitigation Techniques Filtering with Access Control Lists (ACLs)

197 Mitigation Techniques Honeypots and Honeynets

198 Mitigation Techniques Penetration Testing

199 Troubleshooting Methodology A Network Troubleshooting Methodology

200 Troubleshooting Methodology Identify the Problem

201 Troubleshooting Methodology Establish a Theory of Probable Cause

202 Troubleshooting Methodology Test the Theory to Determine the Root Cause

203 Troubleshooting Methodology Establish a Plan of Action to Solve the Problem

204 Troubleshooting Methodology Problem Solving Verification and Documentation

205 Network Troubleshooting Hardware Tools

206 Network Troubleshooting Software Tools

207 Network Troubleshooting Using CLI Network Tools ipconfig ping arp

208 Network Troubleshooting Using CLI Network Tools nslookup dig

209 Network Troubleshooting Using CLI Network Tools tracert pathping nmap route

210 Network Troubleshooting Using CLI Network Tools ifconfig iptables tcpdump and netstat

211 Wired Connectivity & Performance Issues Attenuation Latency and Jitter

212 Wired Connectivity & Performance Issues Crosstalk EMI OpenShort

213 Wired Connectivity & Performance Issues Incorrect Pin-Outs or Cable Types

214 Wired Connectivity & Performance Issues Mismatched and Damaged Cables

215 Wired Connectivity & Performance Issues Bad Ports and LED Status Indicators

216 Wired Connectivity & Performance Issues Duplex and Speed Mismatches

217 Wired Connectivity & Performance Issues VLAN Mismatches

218 Wired Connectivity & Performance Issues Native VLAN Mismatches

219 Wired Connectivity & Performance Issues Bottlenecks

220 Troubleshooting Wireless The Nature of Airwaves

221 Troubleshooting Wireless Fighting Frequencies

222 Troubleshooting Wireless Understanding Antenna Types

223 Troubleshooting Wireless Misconfigurations

224 Common Network Service Issues Troubleshooting Name Resolution

225 Common Network Service Issues Troubleshooting MAC Addressing

226 Common Network Service Issues Troubleshooting IP Addressing

227 Common Network Service Issues Troubleshooting Security Settings

228 Common Network Service Issues Troubleshooting Miscellaneous Service Issues

Nature
ENQUIRE US