課程名稱:CompTIA Network+ 國際認可證書課程 - 簡稱:CompTIA Network+ Training Course |
N10-007 CompTIA Network+ (24 Hours)
1. Computer Network Basics
1.1 Defining Network
1.2 Networks Defined by Geography
1.3 Networks Defined by Topology
1.4 Networks Defined by Resource Location
2. OSI Reference Model
2.1 The Purpose of Reference Model
2.2 The OSI 7-Layer Reference Model
2.3 Layer 1: Physical Layer
2.4 Layer 2: Data Link Layer
2.5 Layer 3: Network Layer
2.6 Layer 4: Transport Layer
2.7 Layer 5: Session Layer
2.8 Layer 6: Presentation Layer
2.9 Layer 7: Application Layer
2.10 TCP/IP Stack
2.11 Layers in TCP/IP Stack
2.12 Common Applications that uses TCP/IP Stack
3. Network Components
3.1 Coaxial Cable
3.2 Twisted-Pair Cable
3.3 Shielded Twisted Pair
3.4 Unshielded Twisted Pair
3.5 Connectors
3.6 Plenum (防火夾層) Versus Nonplenum Cable
3.7 Fiber-Optic Cable
3.8 Multimode Fiber
3.9 Single-Mode Fiber
3.10 Fiber Connector Polishing (拋光) Styles
3.11 Media Converters
3.12 Cable Distribution
3.13 Wireless Technologies
3.14 Network Infrastructure Devices
3.15 Specialized Network Devices
3.16 Virtual Network Devices
3.17 Voice over IP Protocols and Components
4. Ethernet Topology
4.1 Principles of Ethernet
4.2 Ethernet Origins
4.3 Carrier Sense Multiple Access Collision Detect
4.4 Distance and Speed Limitations
4.5 Ethernet Switch Features
4.6 Virtual LANs
4.7 Switch Configuration for an Access Port
4.8 Trunks
4.9 Switch Configuration for a Trunk Port
4.10 Spanning Tree Protocol
4.11 Corruption of MAC Address Table
4.12 Broadcast Storms
4.13 STP Operation
4.14 Link Aggregation
4.15 Power over Ethernet 802.3af
4.16 Port Monitoring
4.17 User Authentication
4.18 Management Access and Authentication
4.19 First-Hop Redundancy
4.20 Miscellaneous Switch Features
5. IPv4 and IPv6 Address
5.1 Structure (結構) of IP Address
5.2 Concept of Binary Number
5.3 Network ID and Host ID
5.4 Identifying (辨認) the Network ID
5.5 重要事實
5.6 更改IP Address的步驟
5.7 Subnet Mask (子網路遮罩)
5.8 Use of Subnet Mask
5.9 Subnetting (子網路化)
5.10 Default Gateway
5.11 Basic Concepts of IPv6
5.12 The Next Generation TCP/IP stack
5.13 IPv6 Overview
5.14 Aggregatable Global Address
5.15 Site-Local Address
5.16 Unique-Local Address
5.17 Link-Local Address
6. Basic Concept of Routing
6.1 Concept of the Routing Processes and Sources of Routing Information
6.2 Directly Connected Routes
6.3 Static Routes
6.4 Dynamic Routing Protocols
6.5 Characteristics of Routing Protocol
6.6 IGPs and EGPs
6.7 Method of Routing Information Exchanges
6.8 Metric Value
6.9 Routing Protocols Example
6.10 Address Translation
6.11 Routing for Multicast traffic
6.12 Internet Group Management Protocol (IGMP)
6.13 Protocol Independent Multicast (PIM)
7. Wide Area Networks
7.1 WAN Connection Types
7.2 WAN Data Rates
7.3 WAN Media Types
7.4 Dedicated Leased Line
7.5 T1
7.6 E1
7.7 T3
7.8 E3
7.9 CSU/DSU
7.10 Metro Ethernet
7.11 Point-to-Point Protocol
7.12 Point-to-Point Protocol over Ethernet
7.13 Microsoft Routing and Remote Access Server (RRAS)
7.14 Digital Subscriber Line (DSL)
7.15 Cable Modem
7.16 Synchronous Optical Network
7.17 Satellite
7.18 Plain Old Telephone Service
7.19 Integrated Services Digital Network
7.20 Frame Relay (幀中繼)
7.21 Asynchronous Transfer Mode
7.22 Multiprotocol Label Switching
7.23 Overlay Networks
8. Wireless LANs
8.1 Introducing Wireless LANs
8.2 WLAN Concepts and Components
8.3 Wireless Routers
8.4 Wireless Access Point
8.5 Antennas
8.6 Frequencies and Channels
8.7 CSMA/CA
8.8 Transmission Methods
8.9 WLAN Standards
8.10 802.11 Standard Summary
8.11 Deploying Wireless LANs
8.12 Sources of Interference
8.13 Wireless AP Placement
8.14 Securing Wireless LANs
8.15 Approaches to WLAN Security
8.16 Security Standards
9. Network Optimization
9.1 High Availability (HA)
9.2 High-Availability Measurement
9.3 Fault-Tolerant Network Design
9.4 Hardware Redundancy
9.5 Layer 3 Redundancy
9.6 Design Considerations for High-Availability Networks
9.7 High-Availability Best Practices
9.8 QoS Technologies
9.9 Introduction to QoS
9.10 QoS Configuration Steps
9.11 Traffic Components
9.12 QoS Mechanisms
9.13 Policing and Shaping
9.14 Link Efficiency
10. Networking Command Line Tools
10.1 Windows-based Command Line Tools
11. Network Management
11.1 Maintenance Tools
11.2 Bit-Error Rate Tester
11.3 Butt Set
11.4 Cable Certifier
11.5 Cable Tester
11.6 Connectivity Software
11.7 Crimper
11.8 Electrostatic Discharge Wrist Strap
11.9 Environmental Monitor
11.10 Loopback plug
11.11 Multimeter
11.12 Protocol Analyzer
11.13 WiFi Analyzer/Spectrum Analyzer
11.14 Looking-Glass Sites
11.15 Speed Test Sites
11.16 Punch-Down Tool
11.17 Throughput Tester
11.18 Time Domain Reflectometer/Optical Time Domain Reflectometer
11.19 Toner Probe
11.20 Monitoring Resources and Reports
11.21 SNMP
11.22 Syslog
11.23 Event Logs
11.24 Application Logs
11.25 Security Log
11.26 System Logs
12. Network Attacks and Security
12.1 Network Security Goals
12.2 Confidentiality
12.3 Integrity
12.4 Availability
12.5 Categories of Network Attacks
12.6 Confidentiality Attacks
12.7 Integrity Attacks
12.8 Availability Attacks
12.9 Denial of Service
12.10 TCP SYN Flood
12.11 Buffer Overflow
12.12 ICMP Attacks
12.13 Electrical Disturbances
12.14 Defending Against Attacks
12.15 End User Awareness Training
12.16 Patching
12.17 Security Policies
12.18 Incident Response
12.19 Vulnerability Scanners
12.20 Honey Pots and Honey Nets
12.21 Access Control Lists
12.22 Firewalls
12.23 Firewall Types
12.24 Firewall Inspection Types
12.25 Stateful Firewall
12.26 Firewall Zones
12.27 Unified Threat Management Firewalls
12.28 Virtual Private Networks
12.29 Intrusion Detection and Prevention
12.30 IDS and IPS Device Categories
12.31 Network-Based and Host-Based Solutions
12.32 Security Information and Event Management
|