- 課程時間
- 課程簡介
- 課程特點
- 認證要求
- 考試須知
- 課程內容
傳統服務:課程上堂時間表 (地點:旺角 總費用:$4,260) 學員使用電話或本網頁報名,待本中心確認已為學員留位後,即可使用 繳付學費,過程簡便!
超震撼: |
凡於 2022年 7月 8日 (五) 或之前報讀本課程, 原價 $5,325,現只需
$4,260! |
|
* 各政府部門可使用 P Card 付款
如使用 P Card 繳付考試費,考試費需另加 1.3% 附加費
*** 質素保證:
免費於任何地點試睇首 3 小時課堂錄影,從而可預先了解導師及教材的質素,才報讀課程來上堂。***
請致電與本中心職員預約。
查看各地點電話
旺角 |
2332-6544 |
觀塘 |
3563-8425 |
北角 |
3580-1893 |
沙田 |
2151-9360 |
屯門 |
3523-1560 |
免費補堂: |
學員可於任何地點補看課堂錄影,從而可銜接往後的課堂! |
免費重讀: |
學員可於課程結束後三個月內於任何地點不限次數地重看課堂錄影,從而可反覆重溫整個課程! |
課時: |
30 小時 |
課堂導師: |
Larry (任教課程清單) |
傳統服務的免費補堂或免費重讀,若選擇旺角或觀塘的閒日星期一至四,便需於 6:30p.m. 或之前完成觀看課堂錄影。
|
注意! 客戶必須查問報讀學校的教育局註冊編號,以確認該校為註冊學校,以免蒙受不必要的損失!
CompTIA (The Computing Technology Industry Association) 於 1982 年成立,其推行的 Network+ 認證是一套中立的 (Vendor Neutral) 國際認證,目的是要確認您擁有建立、管理、保護與優化網絡的能力。

CompTIA
為何要考取 CompTIA Network+ 認證?
- 因其中立的特性,通常成為 I.T. 專業人士首先考取的認證。
- 全球 50 萬人持有,反映其受歡迎程度。
- 根據美國勞工統計局 (Bureau of Labor Statistics) 的分析,網絡管理人員的需求將於 2012 至 2022 年間提升 12%。
- 領先而中立的認證,會被全球各地的國際級機構重視,並被設定為必要的入職條件。例如 Dell、HP、Ricoh、Sharp、Xerox 及 Apple Consultant Network 技術人員便必需持有 CompTIA Network+ 認證。
- 為進修 Cisco、Microsoft、Oracle、IBM 等等更高級的商業認證作準備。
- “Network+ provides a solid foundation for networking professionals to pursue vendor-specific certifications such as the Cisco CCNA” - By Cisco.

|
課程名稱: |
CompTIA Network+ 國際認可證書課程 - 簡稱:CompTIA Network+ Training Course |
課程時數: |
合共 30 小時 (共 10 堂),共 1 科 |
適合人士: |
有志投身 I.T. 界的人士 |
授課語言: |
以廣東話為主,輔以英語 |
課程筆記: |
本中心導師親自編寫英文為主筆記,而部份英文字附有中文對照。 |
1. 模擬考試題目: |
本中心為學員提供模擬考試題目,每條考試題目均附有標準答案。 |
2. 時數適中: |
本中心的 CompTIA Network+ 國際認可證書課程時數適中,有 30 小時。令學員能真正了解及掌握課程內容,而又能於 3 個月內考獲 CompTIA Network+ 國際認可證書。 |
3. Larry Chan 親自教授: |
Larry 具備了
26 年以上電腦、網絡、數據庫及保安系統的工作經驗,而最近
22 年更於本中心全職教學。 |
4. Larry Chan 親身編寫筆記: |
Larry 親自編寫筆記,絕對適合考試及實際管理網路之用,令你無須「死鋤」如字典般厚及不適合香港讀書格調的書本。 |
5. 一人一機上課: |
本課程以一人一機模式上課。 |
6. 免費重讀: |
傳統課堂學員可於課程結束後三個月內免費重看課堂錄影。 |
CompTIA 已公佈考生必須通過以下 1 個 CompTIA Network+ 相關科目的考試,便可獲發 CompTIA Network+ 國際認可證書:
考試編號 |
科目名稱 |
N10-008 |
CompTIA Network+ |
本中心為 CompTIA 指定的考試試場。報考時請致電本中心,登記欲報考之科目、考試日期及時間 (最快可即日報考)。臨考試前考生須出示身份證及繳付考試費。
考試編號 N10-008 考試費為 HK$2,854。
考試題目由澳洲考試中心傳送到你要應考的電腦,考試時以電腦作答。所有考試題目均為英文,而大多數的考試題目為選擇題。作答完成後會立即出現你的分數,結果即考即知!考試不合格便可重新報考,不限次數。欲知道作答時間、題目總數、合格分數等詳細考試資料,可瀏覽本中心網頁 "各科考試分數資料"。
|
課程名稱:CompTIA Network+ 國際認可證書課程 - 簡稱:CompTIA Network+ Training Course |
N10-008 CompTIA Network+ (30 Hours)
Network Technologies, Topologies, and Types
- Wired and Wireless Network Topologies
- Bus Topology
- Ring Topology
- Star Topology (Hub-and-Spoke)
- Mesh Topology
- Hybrid Topology
- Bringing Wireless to a Topology
- Infrastructure Wireless Topology
- Ad Hoc Wireless Topology
- Wireless Mesh Topology
- Network Types and Characteristics
- To Server or Not
- LANs
- WLANs
- WANs
- MANs
- CANs
- SANs
- PANs
- SDWANs
- MPLS
- mGRE
- Network Links and Concepts
- DSL Internet Access
- Cable Broadband
- The Public Switched Telephone Network
- Leased Lines
- T3 Lines
- Metro-Optical
- Satellite Internet Access
- Termination Points
- Demarc, Demarc Extension, and Smart Jacks
- CSUs/DSUs
- Verify Wiring Installation and Termination
- Virtual Networking
Models, Ports, Protocols, and Network Services
- The OSI Networking Model
- The OSI Seven-Layer Model
- Physical Layer (Layer 1)
- Data Link Layer (Layer 2)
- Network Layer (Layer 3)
- Transport Layer (Layer 4)
- Session Layer (Layer 5)
- Presentation Layer (Layer 6)
- Application Layer (Layer 7)
- OSI Model Summary
- Comparing OSI to the Four-Layer TCP/IP Model
- Identifying the OSI Layers at Which Various Network Components
- Operate
- Data Encapsulation/Decapsulation and OSI
- Ports and Protocols
- Connection-Oriented Protocols Versus Connectionless Protocols
- Internet Protocol
- Transmission Control Protocol
- How TCP Works
- User Datagram Protocol
- Internet Control Message Protocol
- IPSec
- Generic Routing Encapsulation
- File Transfer Protocol
- Secure Shell
- Secure File Transfer Protocol
- Telnet
- Simple Mail Transfer Protocol
- Domain Name System (DNS)
- Dynamic Host Configuration Protocol (DHCP)
- Trivial File Transfer Protocol
- Hypertext Transfer Protocol
- Network Time Protocol (NTP)
- Post Office Protocol Version 3/Internet Message Access Protocol
- Version 4
- Simple Network Management Protocol
- Components of SNMP
- SNMP Management Systems
- SNMP Agents
- Management Information Bases
- SNMP Communities
- SNMPv3
- Lightweight Directory Access Protocol
- Hypertext Transfer Protocol Secure
- Server Message Block
- Syslog
- SMTP TLS
- LDAPS
- IMAP over SSL
- POP3 over SSL
- SQL, SQLnet, and MySQL
- Remote Desktop Protocol
- Session Initiation Protocol
- Understanding Port Functions
- Network Services
- Domain Name Service (DNS)
- The DNS Namespace
- Types of DNS Entries
- DNS Records
- DNS in a Practical Implementation
- Dynamic Host Configuration Protocol
- The DHCP Process
- DHCP and DNS Suffixes
- DHCP Relays and IP Helpers
- Network Time Protocol
Addressing, Routing, and Switching
- IP Addressing
- IPv4
- IP Address Classes
- Subnet Mask Assignment
- Subnetting
- Identifying the Differences Between IPv4 Public and Private
- Networks
- Private Address Ranges
- Classless Interdomain Routing
- Default Gateways
- Virtual IP
- IPv4 Address Types
- Unicast Address
- Broadcast Address
- Multicast
- IPv6 Addressing
- Where Have All the IPv4 Addresses Gone?
- Identifying IPv6 Addresses
- IPv6 Address Types
- Global Unicast Addresses
- Link-Local Addresses
- Site-Local Addresses
- Neighbor Discovery
- Comparing IPv4 and IPv6 Addressing
- Assigning IP Addresses
- Static Addressing
- Dynamic Addressing
- BOOT Protocol (BOOTP)
- Automatic Private IP Addressing
- Identifying MAC Addresses
- NAT and PAT
- NAT
- PAT
- SNAT
- DNAT
- Managing Routing and Switching
- The Default Gateway
- Routing Tables
- Static Routing
- Default Route
- Switching Methods
- Packet Switching
- Circuit Switching
- Comparing Switching Methods
- Dynamic Routing
- Distance-Vector Routing
- Link-State Routing
- Hybrid Routing Protocols
- Network Traffic
- Routing Metrics
- Virtual Local-Area Networks
- VLAN Membership
- VLAN Segmentation
- The Spanning Tree Protocol
- Interface Configuration and Switch Management
- MDI-X
- Trunking
- Port Mirroring
- Port Authentication
- Power over Ethernet (PoE and PoE+)
- MAC Address Table
- Switch Management
- Managed and Unmanaged
- Quality of Service
- Traffic Shaping
- Access Control Lists
- ARP and RAR
Network Implementations
- Common Networking Devices
- Firewall
- IDS/IPS
- Router
- Switch
- Hub and Switch Cabling
- Multilayer Switch
- Hub
- Bridge
- DSL and Cable Modems
- Access Point
- Media Converter
- Voice Gateway
- Repeater
- Wireless LAN Controller
- Load Balancer
- Proxy Server
- VPN Concentrators and Headends
- Networked Devices
- Networking Architecture
- Three-Tiered Architecture
- Core Layer
- Distribution/Aggregation Layer
- Access/Edge Layer
- Software-Defined Networking
- Application Layer
- Control Layer
- Infrastructure Layer
- Management Plane
- Spine and Leaf
- Traffic Flows
- Datacenter Location Types
- Storage-Area Networks
- iSCSI
- Fibre Channel and FCoE
- Network-Attached Storag
Cabling Solutions and Issues
- General Media Considerations
- Broadband Versus Baseband Transmissions
- Simplex, Half-Duplex, and Full-Duplex Modes
- Data Transmission Rates
- Types of Network Media
- Twisted-Pair Cabling (Copper)
- Coaxial Cables
- Twinaxial Cables
- Fiber-Optic Cables
- Plenum Versus PVC Cables
- Types of Media Connectors
- BNC Connectors
- RJ-11 Connectors
- RJ-45 Connectors
- F-Type Connectors and RG-59 and RG-6 Cables
- Fiber Connectors
- Transceivers
- Media Couplers/Converters
- TIA/EIA 568A and 568B Wiring Standards
- Straight-Through Versus Crossover Cables
- Rollover and Loopback Cables
- Components of Wiring Distribution
- Network Cross-Connects
- Horizontal Cabling
- Vertical Cables
- Patch Panels
- Fiber Distribution Panels
- 66 and 110 Blocks (T568A, T568B)
- MDF and IDF Wiring Closets
- Ethernet Copper and Fiber Standards
- 10BASE-T
- 100BASE-TX
- 1000BASE-T
- 10GBASE-T
- 40GBASE-T
- 1000BASE-LX and 1000BASE-SX
- 10GBASE-LR and 10GBASE-SR
- Multiplexing Options
- Troubleshooting Common Cable Connectivity Issues
- Limitations, Considerations, and Issues
- Throughput, Speed, and Distance
- Cabling Specifications/Limitations
- Cabling Considerations
- Cabling Applications
- Attenuation and dB Loss
- Interference
- Incorrect Pinout
- Bad Ports
- Open/Short
- LED Status Indicators
- Incorrect Transceivers
- Duplexing Issues
- TX/RX Reversed
- Dirty Optical Cables
- Common Tools
- Cable Crimpers, Strippers, and Snips/Cutters
- Punchdown Tools
- Tone Generator
- Loopback Adapter
- OTDR
- Multimeter
- Cable Tester
- Wire Map
- Tap
- Fusion Splicer
- Spectrum Analyzer
- Fiber Light Meter
Wireless Solutions and Issues
- Understanding Wireless Basics
- Wireless Channels and Frequencies
- Cellular Technology Access
- Speed, Distance, and Bandwidth
- Channel Bonding
- MIMO/MU-MIMO/Directional/Omnidirectional
- Antenna Ratings
- Antenna Coverage
- Establishing Communications Between Wireless Devices
- Configuring the Wireless Connection
- Troubleshooting Wireless Issues
- Site Surveys
- Factors Affecting Wireless Signals
- Interference
- Reflection, Refraction, and Absorption
- Troubleshooting AP Coverage
Cloud Computing Concepts and Options
- Cloud Concepts
- Service Models
- Software as a Service
- Platform as a Service
- Infrastructure as a Service
- Desktop as a Service
- Deployment Models
- Private Cloud
- Public Cloud
- Hybrid and Community Clouds
- Infrastructure as Code
- Connectivity Options
- Multitenancy
- Elasticity
- Scalability
- Security Implications
- The Relationship Between Resources
Network Operations
- Organizational Documents and Policies
- Wiring and Port Locations
- Troubleshooting Using Wiring Schematics
- Physical and Logical Network Diagrams
- Baseline Configurations
- Policies, Procedures, Configurations, and Regulations
- Policies
- Password-Related Policies
- Procedures
- Change Management Documentation
- Configuration Documentation
- Regulations
- Labeling
- High Availability and Disaster Recovery
- Backups
- Full Backups
- Differential Backups
- Incremental Backups
- Snapshots
- Backup Best Practices
- Using Uninterruptible Power Supplies
- Why Use a UPS?
- Power Threats
- Beyond the UPS
- Cold, Warm, Hot, and Cloud Sites
- High Availability and Recovery Concepts
- Active-Active Versus Active-Passive
- Monitoring Network Performance
- Common Performance Metrics
- SNMP Monitors
- Management Information Base (MIB)
- Network Performance, Load, and Stress Testing
- Performance Tests
- Load Tests and Send/Receive Traffic
- Stress Tests
- Performance Metrics
- Network Device Logs
- Security Logs
- Application Log
- System Logs
- History Logs
- Log Management
- Patch Management
- Environmental Factors
Network Security
- Common Security Concepts
- Access Control
- Mandatory Access Control
- Discretionary Access Control
- Rule-Based Access Control
- Role-Based Access Control
- Defense in Depth
- Network Segmentation
- Screened Subnet
- Separation of Duties
- Honeypots
- RADIUS and TACACS+
- Kerberos Authentication
- Local Authentication
- Lightweight Directory Access Protocol
- Using Certificates
- Auditing and Logging
- Multifactor Authentication Factors
- Additional Access Control Methods
- 802.1X
- Extensible Authentication Protocol (EAP)
- Network Access Control (NAC)
- MAC Filtering
- Risk Management
- Penetration Testing
- Security Information and Event Management
- Common Networking Attacks
- Denial-of-Service and Distributed Denial-of-Service Attacks
- Types of DoS Attacks
- Other Common Attacks
- Social Engineering
- Logic Bomb
- Rogue DHCP
- Rogue Access Points and Evil Twins
- Advertising Wireless Weaknesses
- Phishing
- Ransomware
- DNS Poisoning
- ARP Cache Poisoning
- Spoofing
- Deauthentication
- Brute Force
- On-Path Attack
- VLAN Hopping
- ARP Spoofing
- Vulnerabilities and Prevention
- Network Hardening and Physical Security
- Disposing of Assets
- Implementing Physical Security
- Lock and Key
- Swipe Card and PIN Access
- Biometrics
- Two-Factor and Multifactor Authentication
- Secured Versus Unsecured Protocols
- Hardening Best Practices
- Wireless Security
- MAC Filtering
- Antenna Placement and Power Levels
- Isolation
- Pre-shared Keys
- Geofencing
- Captive Portal
- IoT Access Considerations
- Remote-Access Methods
- Remote File Access
- VPNs
- Components of the VPN Connection
- VPN Connection Types
- VPN Pros and Cons
- IPSec
- SSL/TLS/DTLS
- Site-to-Site and Client-to-Site
- Virtual Desktops
- HTTPS/Management URL
- Authentication and Authorization Considerations
- Out-of-Band Management
Network Troubleshooting
- Troubleshooting Steps and Procedures
- Identify the Problem
- Identify Symptoms
- Determine Whether Anything Has Changed
- Duplicate the Problem if Possible
- Approach Multiple Problems Individually
- Establish a Theory of Probable Cause
- Test the Theory to Determine the Cause
- Establish a Plan of Action
- Implement the Solution or Escalate
- Determine Whether Escalation Is Necessary
- Verify Full System Functionality
- Document Findings, Actions, Outcomes, and Lessons
- Software Troubleshooting Tools
- Wi-Fi Analyzer
- Protocol Analyzer
- Bandwidth Speed Tester
- Port Scanner
- iperf
- NetFlow Analyzer
- TFTP Server
- Terminal Emulator
- IP Scanner
- Command-Line Tools
- The Trace Route Utility (tracert/traceroute)
- ping
- The Destination Host Unreachable Message
- The Request Timed Out Message
- The Unknown Host Message
- The Expired TTL Message
- Troubleshooting with ping
- hostname
- ARP
- arp ping
- The netstat Command
- netstat -e
- netstat -a
- netstat -r
- netstat -s
- telnet
- ipconfig
- ifconfig
- nslookup
- dig
- The tcpdump Command
- The route Utility
- nmap
- Basic Network Platform Commands
- Troubleshooting General Networking Issues
- Common Considerations
- Common Problems to Be Aware Of
- Collisions
- Broadcast Storm
- Multicast Flooding
- Asymmetrical Routing
- Switching Loops
- Routing Loops
- Missing Route
- Low Optical Link Budget
- Incorrect VLAN
- DNS Issues
- Incorrect Gateway
- Incorrect Subnet Mask
- Duplicate or Incorrect IP Address
- Duplicate MAC Addresses
- Expired IP Address
- Rogue DHCP Server
- Certificate Issues
- NTP Issues/Incorrect Time
- DHCP Scope Exhaustion
- Blocked Ports, Services, or Addresses
- Incorrect Firewall Settings
- Incorrect ACL Settings
- Unresponsive Service
- BYOD Challenges
- Licensed Feature Issues
- Hardware Failure
- Network Performance Issues
The course content above may change at any time without notice in order to better reflect the contents of examination.
|
|