CompTIA Network+ (including exam)
IT Certify
All inclusive courses and exam fees - Engaging and expert online teachers - Highest pass rates
Summary
Limited Special offer ends 31st December 2025**
Pay with a single payment or spread over monthly...
- Digital Certificate (included in price)
Add to basket or enquire
AI summary
The CompTIA Network+ course equips learners with essential networking skills, covering concepts, infrastructure, operations, security, and troubleshooting. It prepares candidates for the CompTIA Network+ certification exam, a globally recognized credential for network professionals.
- Networking concepts and protocols
- Network infrastructure and components
- Network operations and support
- Network security best practices
- Troubleshooting network issues
- Anyone interested in a career in IT, with no prior experience required
- Suitable for those seeking to validate their network skills with a globally recognized certification
- Suitable for learners wanting flexibility
- Includes the CompTIA Network+ certification exam
- CompTIA Network+ certification
AI generated summary, may contain mistakes. Full details in course description.
Was this helpful?
Overview
Certification
CompTIA Network+ All exam fees included
Assessment details
Digital Certificate
Included in course price
Course media
Description
CompTIA Network + Module Outline
The CompTIA Network + course will enhance and develop your career in IT infrastructure and prove your different elements of Network skills:
• Networking concepts
• Network infrastructure and deploying common network components
• Network operations and supporting a production network
• Network security concepts and implementing basic network security
• Network troubleshooting
Networking concepts:
- Intro Network Plus N10-007
- Basic networking
- Activity basic networking
- OSI model
- Exploring the OSI model act
- Protocol and ports
- Activity examining protocols and ports
- Connection oriented vs connectionless
- Activity comparing TCP and UDP
- Internet protocol (IP)
- Activity examining the lower layer protocols
- Layer 7 remote control protocols
- Layer 7 file transfer protocols
- Layer 7 file transfer protocols
- Layer 7 messaging protocols
- Activity examining messaging protocols
- Layer 7 web traffic protocols
- layer 7 streaming media protocols
- Layer 7 infrastructure management protocols
- Switching
- Activity creating collision and broadcast domains
- Interface properties and segmentation
- Activity creating a basic network segment
- Switching part 2
- Activity switching
- Switching loop management
- Activity managing switching loops
- VLANs
- Activity creating VLANs
- Routing
- Activity examining ARP
- IP addressing basics
- Activity configuring IP
- Routers
- Activity setting up a router
- Routing basics
- Activity adding static routes
- VLAN routing
- Activity routing between VLANs
- NAT/PAT
- Activity configuring NAT/PAT
- Routing protocols
- Activity configuring a routing protocol
- Firewalls
- Activity configuring firewalls
- Advanced switching and routing concepts
- Activity exploring IPv6
- Performance concepts
- IP addressing
- Subnetting
- Activity learning to subnet
- Address assignments
- Network types and topologies
- Wireless topologies
- Network types
- Technologies that facilitate the internet of things (IoT)
- Wireless technologies
- 802.11 standards
- Wi-Fi frequencies
- Wi-Fi antenna concepts
- Bluetotoh
- Cellular
- Activity using an RF spectrum analyzer
- Cloud concepts
- Activity exploring cloud services
- Network services
- Activity setting up DNS
- DHCP service
- Activity setting up DHCP
- NTP
Infrastructure:
- Infrastructure
- Activity testing a fiber optic cable
- Plenum vs. PVC
- Activity crimping on an RJ-45 connector
- Transceivers
- Activity terminating cable to a 110 block
- Copper cable standards
- Activity creating a crossover cable
- Ethernet deployment standards
- Network device placement and installation
- Repeater
- Router
- Modem
- Activity setting up a WAP
- Firewall
- Media converter
- Advanced network devices
- Wireless controller
- Proxy server
- Activity configuring proxy settigns
- VPN concentrator
- Virtual networking components
- Network storage types
- WAN technologies
- Transmission mediums
- Activity configuring WAN links
- Termination
Network Operation
- Change management
- IDF-MDF documentation
- Labeling
- Logical vs physical diagrams
- Network operations documentation
- Rack diagrams
- Standard operation procedures
- Using documentation act
- Wiring and ports locations
- Continuity and disaster
- MTTR mean time repair
- Recovery
- Backing up your data act
- Event management
- Metrics
- Scanning monitoring patching
- Testing the network act
- HTTPS management
- Out of band management
- RDP
- Remote access methods
- Remote file access
- making remote connections act
- SSH
- VNC
- Policies and best practices
- Creating policies and procedures act
Network Security
Physical Security Devices
• Detection
• Prevention
Authentication and Access Control
• Authorization, Authentication, and Accounting
• Multifactor Authentication
• Access Control
• Activity: Examining Access Control Mechanisms
Basic Wireless Network Security
• WPA
• WPA2
• TKIP-RC4
• CCMP-AES
• Authentication and Authorization
• Geofencing
• Activity: Demonstrating the Need for Wireless Security
Common Network Attacks
• DoS
• Social Engineering
• Insider Threat
• Logic Bomb
• Rogue Access Point
• Evil Twin
• War-driving
• Phishing
• Ransomware
• DNS Poisoning
• ARP Poisoning
• Spoofing
• Deauthentication
• Brute Force
• VLAN Hopping
• Man-in-the-Middle
• Exploits vs. Vulnerabilities
• Activity Conducting a Phishing Attack
Network Device Hardening
• Changing Default Credentials
• Avoiding Common Passwords
• File Hashing
• Generating New Keys
• Activity Supporting Secure Authentication and Encryption
• Upgrading Firmware
• Patching and Updates
• Disabling Unnecessary Services
• Using Secure Protocols
• Disabling Unused Ports
Common Mitigation Techniques
• Signature Management
• Device Hardening
• Change Native VLAN
• Switchport Protection
• Network Segmentation
• Privileged User Account
• File Integrity Monitoring
• Role Separation
• Restricting Access Via ACLs
• Honeypot/Honeynet
• Penetration Testing
• Activity: Implementing a Honeypot
Network Troubleshooting and Tools
• Network Troubleshooting Methodology
• Troubleshoot Wired Connectivity and Performance
• Troubleshoot Wireless Connectivity and Performance
Who is this course for?
Anyone with an interest in a career in IT
No age limits and no experience needed
Requirements
Just the dedication and passion to start your career path in IT
Computer / laptop / internet connection
Career path
Just some of the jobs you can move into when you pass with IT Certify:
1st and 2nd Line Support Technician
Computer Support Specialist
IT Technician
IT Support Engineer
IT Support Analyst
Network Administrator
Network Technician
Network Support Engineer
Desktop Support Technician
Service Desk Administrator
Computer Support Administrator
IT Support Technician
Helpdesk Manager
Senior IT Technician
Questions and answers
Reviews
Currently there are no reviews for this course. Be the first to leave a review.
Legal information
This course is advertised on Reed.co.uk by the Course Provider, whose terms and conditions apply. Purchases are made directly from the Course Provider, and as such, content and materials are supplied by the Course Provider directly. Reed is acting as agent and not reseller in relation to this course. Reed's only responsibility is to facilitate your payment for the course. It is your responsibility to review and agree to the Course Provider's terms and conditions and satisfy yourself as to the suitability of the course you intend to purchase. Reed will not have any responsibility for the content of the course and/or associated materials.