Corso CompTIA Network+

Corso CompTIA Network+

Corso CompTIA Network+

Durata: 40 ore

icona web

Live Online

in presenza

In presenza

icona web

Live Online

in presenza

In presenza

Formazione CompTIA Network+

Il corso CompTIA Network+ fornisce una solida preparazione sui concetti fondamentali del networking, affrontando troubleshooting, configurazione e gestione delle reti. Ideale per chi è all’inizio della carriera IT o desidera rafforzare le proprie competenze, il corso prepara alla certificazione CompTIA Network+ N10-009, riconosciuta anche dal DoD 8140.03. I partecipanti acquisiscono competenze pratiche spendibili in ruoli come Technical Support Specialist, Network Operations Specialist e Systems Administrator.

Cosa imparerai

  • Descrivere le caratteristiche dei diversi protocolli e prodotti di rete per le LAN, WAN e reti wireless
  • Comprendere le funzioni e le caratteristiche dell’indirizzamento e dei protocolli TCP/IP
  • Identificare le minacce alla sicurezza della rete e implementare contromisure e controlli appropriati
  • Installare e configurare il cablaggio e le apparecchiature di rete
  • Gestire, monitorare e risolvere i problemi delle reti

Questo corso offre una solida base di conoscenze e competenze per intraprendere una carriera nel campo della gestione delle reti, fornendo ai partecipanti le abilità necessarie per progettare, implementare e mantenere reti informatiche sicure ed efficienti.

Programma del Corso

Module 1: Explaining Network Topologies

  • 1.1 Networking Overview
    • 1.1.1 Networking Concepts
    • 1.1.2 Network Types
    • 1.1.3 Network Topology
    • 1.1.4 Star Topology
    • 1.1.5 Mesh Topology
    • 1.1.6 Network Topologies
    • 1.1.7 Lab: Create Network Topologies
    • 1.1.8 Lesson Review
  • 1.2 OSI Model Concepts
    • 1.2.1 Open Systems Interconnection Model
    • 1.2.2 Data Encapsulation and Decapsulation
    • 1.2.3 Layer 1 – Physical
    • 1.2.4 Layer 2 – Data Link
    • 1.2.5 Layer 3 – Network
    • 1.2.6 Layer 4 – Transport
    • 1.2.7 Upper Layers
    • 1.2.8 OSI Model Summary
    • 1.2.9 Lesson Review
  • 1.3 SOHO Networks
    • 1.3.1 SOHO Routers
    • 1.3.2 Physical Layer Functions
    • 1.3.3 Data Link Layer Functions
    • 1.3.4 Network Layer Functions
    • 1.3.5 Transport and Application Layer and Security Functions
    • 1.3.6 The Internet
    • 1.3.7 Binary and Hexadecimal
    • 1.3.8 Lab: Explore a Single Location in a Lab
    • 1.3.9 Lab: Create a Home Wireless Network
    • 1.3.10 Lab: Create a SOHO Network
    • 1.3.11 Lesson Review
  • 1.4 Troubleshooting Methodology
    • 1.4.1 Network Troubleshooting Methodology
    • 1.4.2 Identify the Problem
    • 1.4.3 Identify Problem Symptoms
    • 1.4.4 Establish a Theory of Probable Cause
    • 1.4.5 Test the Theory to Determine the Cause
    • 1.4.6 Establish a Plan of Action
    • 1.4.7 Implement the Solution
    • 1.4.8 Verify the Solution
    • 1.4.9 Document Findings, Actions, and Outcomes
    • 1.4.10 Lab: Troubleshooting Methodology
    • 1.4.11 Lesson Review
  • 1.5 Module Quiz

Module 2: Supporting Cabling and Physical Installations

  • 2.1 Ethernet
    • 2.1.1 Network Data Transmission
    • 2.1.2 Ethernet Standards
    • 2.1.3 Media Access Control and Collision Domains
    • 2.1.4 100BASE-TX Fast Ethernet Standards
    • 2.1.5 Gigabit Ethernet Standards
    • 2.1.6 Fiber Ethernet Standards
    • 2.1.7 Ethernet Specifications
    • 2.1.8 Lab: Reconnect to an Ethernet Network
    • 2.1.9 Lesson Review
  • 2.2 Copper Cables and Connectors
    • 2.2.1 Unshielded Twisted Pair Cable
    • 2.2.2 Shielded and Screened Twisted Pair Cable
    • 2.2.3 Cat Cable Standards
    • 2.2.4 Twisted Pair Connector Types
    • 2.2.5 Plenum and Riser-rated Cable
    • 2.2.6 Coaxial and Twinaxial Cable and Connectors
    • 2.2.7 Lab: Connect to an Ethernet Network
    • 2.2.8 Lab: Connect a Cable Modem
    • 2.2.9 Identify Cabling
    • 2.2.10 Identify Connectors
    • 2.2.11 Lesson Review
  • 2.3 Wiring Implementation
    • 2.3.1 Structured Cabling System
    • 2.3.2 T568A and T568B Termination Standards
    • 2.3.3 Patch Panels
    • 2.3.4 Structured Cable Installation
    • 2.3.5 Termination Tools and Techniques
    • 2.3.6 Lab: Explore Multiple Locations in a Lab
    • 2.3.7 Lab: Connect Network Devices
    • 2.3.8 Lab: Connect Patch Panel Cables 1
    • 2.3.9 Lab: Connect Patch Panel Cables 2
    • 2.3.10 Lesson Review
  • 2.4 Fiber Optic Cables and Connectors
    • 2.4.1 Fiber Optic Cable Considerations
    • 2.4.2 Single Mode Fiber and Multimode Fiber
    • 2.4.3 Fiber Optic Connector Types
    • 2.4.4 Fiber Optic Cable Installation
    • 2.4.5 Fiber Distribution Panels
    • 2.4.6 Multi-Fiber Push On Connectors
    • 2.4.7 Wavelength Division Multiplexing
    • 2.4.8 Lab: Connect Fiber Optic Cables
    • 2.4.9 Identify Fiber Optic Connectors
    • 2.4.10 Lesson Review
  • 2.5 Physical Installation Factors
    • 2.5.1 Rack Systems
    • 2.5.2 Humidity and Temperature
    • 2.5.3 Power Management
    • 2.5.4 Fire Suppression
    • 2.5.5 Lesson Review
  • 2.6 Cable Troubleshooting
    • 2.6.1 Specification and Limitations
    • 2.6.2 Cable Issues
    • 2.6.3 Cable Category Issues
    • 2.6.4 Cable Testers
    • 2.6.5 Wire Map Testers and Tone Generators
    • 2.6.6 Attenuation and Interference Issues
    • 2.6.7 Crosstalk Issues
    • 2.6.8 Fiber Optic Cable Testing Tools
    • 2.6.9 Cable Troubleshooting Strategies
    • 2.6.10 Lab: Explore Physical Connectivity 1
    • 2.6.11 Lab: Explore Physical Connectivity 2
    • 2.6.12 Lab: Troubleshoot Physical Connectivity 1
    • 2.6.13 Lab: Troubleshoot Physical Connectivity 2
    • 2.6.14 Lab: Troubleshoot Physical Connectivity 3
    • 2.6.15 Lab: Troubleshoot Physical Connectivity 4
    • 2.6.16 Lesson Review
  • 2.7 Module Quiz

Module 3: Configuring Interfaces and Switches

  • 3.1 Network Interfaces
    • 3.1.1 Network Interface Cards
    • 3.1.2 Modular Transceivers
    • 3.1.3 Transceiver Mismatch Issues
    • 3.1.4 Transceiver Signal Strength Issues
    • 3.1.5 Ethernet Frame Format
    • 3.1.6 Media Access Control Address Format
    • 3.1.7 Compare Network Adapters
    • 3.1.8 Lab: Select and Install a Network Adapter
    • 3.1.9 Lab: Connect a Media Converter
    • 3.1.10 Lesson Review
  • 3.2 Ethernet Switches
    • 3.2.1 Hubs
    • 3.2.2 Bridges
    • 3.2.3 Switches
    • 3.2.4 Ethernet Switch Types
    • 3.2.5 Switch Interface Configuration
    • 3.2.6 Cisco IoS Basics (8:37)
    • 3.2.7 Lab: Install a Switch in the Rack
    • 3.2.8 Lab: Secure a Switch
    • 3.2.9 Lab: Cisco IoS Basics
    • 3.2.10 Lesson Review
  • 3.3 Switch Port Configuration
    • 3.3.1 Link Aggregation and NIC Teaming
    • 3.3.2 Maximum Transmission Unit
    • 3.3.3 Spanning Tree Protocol
    • 3.3.4 Spanning Tree Protocol Configuration
    • 3.3.5 Power Over Ethernet
    • 3.3.6 Lab: Configure Port Aggregation
    • 3.3.7 Lab: Enable Jumbo Frame Support
    • 3.3.8 Lab: Configure PoE
    • 3.3.9 Lesson Review
  • 3.4 Switch Troubleshooting
    • 3.4.1 Hardware Failure Issues
    • 3.4.2 Port Status Indicators
    • 3.4.3 Switch Show Commands
    • 3.4.4 Interface Error Counters
    • 3.4.5 MAC Address Table
    • 3.4.6 Network Loop and Broadcast Storm Issues
    • 3.4.7 Power Over Ethernet Issues
    • 3.4.8 Lab: Troubleshoot Disabled Ports
    • 3.4.9 Lab: Switching Loop
    • 3.4.10 Lesson Review
  • 3.5 Module Quiz
  • 3.6 Checkpoint Review

Module 4: Configuring Network Addressing

  • 4.1 Internet Protocol Basics
    • 4.1.1 IPv4 Datagram Header
    • 4.1.2 Layer 2 vs. Layer 3 Addressing and Forwarding
    • 4.1.3 Address Resolution Protocol
    • 4.1.4 Unicast and Broadcast Addressing
    • 4.1.5 Multicast and Anycast Addressing
    • 4.1.6 Lab: Explore Packets and Frames
    • 4.1.7 Lab: Explore ARP in Wireshark
    • 4.1.8 Lesson Review
  • 4.2 IP Version 4 Addressing
    • 4.2.1 IPv4 Address Format
    • 4.2.2 Network Masks
    • 4.2.3 Subnet Masks
    • 4.2.4 Host Address Ranges
    • 4.2.5 Default Gateway
    • 4.2.6 Broadcast Addresses
    • 4.2.7 IP Interface Configuration in Windows
    • 4.2.8 IP Interface Configuration in Linux
    • 4.2.9 Lab: Configure IP Addresses
    • 4.2.10 Lab: Configure IP Addresses on Mobile Devices
    • 4.2.11 Lab: Configure IP Addresses on Linux
    • 4.2.12 Lesson Review
  • 4.3 IP Version 4 Subnetting
    • 4.3.1 Classful Addressing
    • 4.3.2 Public vs Private Addressing
    • 4.3.3 Other Reserved Address Ranges
    • 4.3.4 IPv4 Address Scheme Design
    • 4.3.5 Classless Inter-Domain Routing
    • 4.3.6 Variable Length Subnet Masks
    • 4.3.7 Lab: Configure IP Networks and Subnets
    • 4.3.8 Lesson Review
  • 4.4 IP Troubleshooting Tools
    • 4.4.1 ipconfig
    • 4.4.2 ifconfig and ip
    • 4.4.3 arp
    • 4.4.4 ping
    • 4.4.5 Lab: IPv4 Troubleshooting Tools
    • 4.4.6 Lab: IPv4 Troubleshooting tools for Linux
    • 4.4.7 Lab: Use IPv4 Test Tools
    • 4.4.8 Lesson Review
  • 4.5 IP Version 6
    • 4.5.1 IPv4 vs IPv6
    • 4.5.2 IPv6 Address Format
    • 4.5.3 IPv6 Network Prefixes
    • 4.5.4 IPv6 Unicast Addressing
    • 4.5.5 IPv6 Link Local Addressing
    • 4.5.6 IPv6 Multicast and Anycast Addressing
    • 4.5.7 IPv4 and IPv6 Transition Mechanisms
    • 4.5.8 Common IPv6 Address Prefixes
    • 4.5.9 Lab: Configure an IPv6 Address
    • 4.5.10 Lesson Review
  • 4.6 IP Troubleshooting
    • 4.6.1 IP Configuration Issues
    • 4.6.2 Duplicate IP and MAC Address Issues
    • 4.6.3 IP Forwarding Issues
    • 4.6.4 Lab: Use ping and tracert on Windows
    • 4.6.5 Lab: Use ping and traceroute on Linux
    • 4.6.6 Lab: Assisted Troubleshooting 1
    • 4.6.7 Lab: Assisted Troubleshooting 2
    • 4.6.8 Lab: Assisted Troubleshooting 3
    • 4.6.9 Lesson Review
  • 4.7 Module Quiz

Module 5: Configuring Routing and Advanced Switching

  • 5.1 Routing Technologies
    • 5.1.1 Routing Tables and Path Selection
    • 5.1.2 Static and Default Routes
    • 5.1.3 Routing Table Example
    • 5.1.4 Packet Forwarding
    • 5.1.5 Fragmentation
    • 5.1.6 Router Configuration
    • 5.1.7 Routing Table Tools
    • 5.1.8 tracert and traceroute
    • 5.1.9 Lab: Install an Enterprise Router
    • 5.1.10 Lab: Cisco Troubleshooting Tools
    • 5.1.11 Lesson Review
  • 5.2 Dynamic Routing Technologies
    • 5.2.1 Dynamic Routing Protocols
    • 5.2.2 Routing Information Protocol
    • 5.2.3 Enhanced Interior Gateway Routing Protocol
    • 5.2.4 Open Shortest Path First
    • 5.2.5 Border Gateway Protocol
    • 5.2.6 Route Selection
    • 5.2.7 Lesson Review
  • 5.3 Network Address Translation
    • 5.3.1 Edge Routers
    • 5.3.2 Network Address Translation Types
    • 5.3.3 Port Address Translation
    • 5.3.4 Lab: Configure NAT
    • 5.3.5 Lesson Review
  • 5.4 Firewalls
    • 5.4.1 Firewall Uses and Types
    • 5.4.2 Firewall Selection and Placement
    • 5.4.3 Lesson Review
  • 5.5 Enterprise Network Topologies
    • 5.5.1 Hybrid Topology
    • 5.5.2 Three-Tiered Network Hierarchy
    • 5.5.3 Compare Three-Tier Hierarchical Model
    • 5.5.4 Lab: Create a Three-Tier Network
    • 5.5.5 Lesson Review
  • 5.6 Virtual LANs
    • 5.6.1 Virtual LANs and Subnets
    • 5.6.2 Virtual LAN IDs and Membership
    • 5.6.3 Trunking and IEEE 802.1Q
    • 5.6.4 Tagged and Untagged Ports
    • 5.6.5 Voice VLANs
    • 5.6.6 Default VLAN and Native VLAN
    • 5.6.7 VLAN Routing
    • 5.6.8 Lab: Configure Switch IP and VLAN – GUI
    • 5.6.9 Lab: Create VLANs – GUI
    • 5.6.10 Lab: Configure Trunking
    • 5.6.11 Lab: Configure Switch IP Settings – CLI
    • 5.6.12 Lab: Configure Management VLAN Settings – CLI
    • 5.6.13 Lesson Review
  • 5.7 Routing and VLAN Troubleshooting
    • 5.7.1 Routing Table Issues
    • 5.7.2 Default Route and Routing Loop Issues
    • 5.7.3 VLAN Assignment Issues
    • 5.7.4 Lesson Review
  • 5.8 Module Quiz

Module 6: Implementing Network Services

  • 6.1 Transport and Application Layer Protocols
    • 6.1.1 Transport Layer Ports and Connections
    • 6.1.2 Transmission Control Protocol
    • 6.1.3 TCP Handshake and Teardown
    • 6.1.4 User Datagram Protocol
    • 6.1.5 netstat
    • 6.1.6 Common TCP and UDP Ports
    • 6.1.7 Lab: Explore Three-Way Handshake in Wireshark
    • 6.1.8 Lab: View Open Ports with netstat
    • 6.1.9 Lesson Review
  • 6.2 Dynamic Host Configuration Protocol
    • 6.2.1 DHCP Process
    • 6.2.2 DHCP Server Configuration
    • 6.2.3 DHCP Options
    • 6.2.4 DHCP Reservations and Exclusions
    • 6.2.5 Lab: Configure a DHCP Server
    • 6.2.6 Lab: Configure DHCP Server Options
    • 6.2.7 Lab: Create DHCP Exclusions
    • 6.2.8 Lab: Create DHCP Client Reservations
    • 6.2.9 Configure Client Addressing (2:22)
    • 6.2.10 Lab: Configure Client Addressing for DHCP
    • 6.2.11 Lesson Review
  • 6.3 APIPA and SLAAC
    • 6.3.1 Automatic Private IP Addressing
    • 6.3.2 IPv6 Interface Autoconfiguration and Testing
    • 6.3.3 DHCPv6 Server Configuration
    • 6.3.4 Lab: Explore APIPA Addressing
    • 6.3.5 Lab: Explore APIPA Addressing in Network Modeler
    • 6.3.6 Set Up Alternate Addressing (3:33)
    • 6.3.7 Lesson Review
  • 6.4 DHCP Relay and Troubleshooting
    • 6.4.1 DHCP Relay and IP Helper
    • 6.4.2 DHCP Issues
    • 6.4.3 Troubleshooting DHCP Exhaustion (4:09)
    • 6.4.4 Lab: Configure a DHCP Relay Agent
    • 6.4.5 Lab: Add a DHCP Server on Another Subnet
    • 6.4.6 Lab: Troubleshoot Address Pool Exhaustion
    • 6.4.7 Lab: Explore DHCP Troubleshooting
    • 6.4.8 Lab: Troubleshoot IP Configuration 1
    • 6.4.9 Lab: Troubleshoot IP Configuration 2
    • 6.4.10 Lab: Troubleshoot IP Configuration 3
    • 6.4.11 Lesson Review
  • 6.5 Domain Name System
    • 6.5.1 Host Names and Domain Names
    • 6.5.2 DNS Hierarchy
    • 6.5.3 Name Resolution Using DNS
    • 6.5.4 Resource Record Types
    • 6.5.5 Host Address and Canonical Name Records
    • 6.5.6 Mail Exchange, Service, and Text Records
    • 6.5.7 Pointer Records
    • 6.5.8 DNS Server Configuration
    • 6.5.9 Internal vs External DNS
    • 6.5.10 DNS Security
    • 6.5.11 Lab: Configure DNS Addresses
    • 6.5.12 Lab: Create Standard DNS Zones
    • 6.5.13 Lab: Create Host Records
    • 6.5.14 Lab: Create CNAME Records
    • 6.5.15 Lab: Troubleshoot DNS Records
    • 6.5.16 Configuring DNS Caching on Linux (4:24)
    • 6.5.17 Lesson Review
  • 6.6 DNS Troubleshooting
    • 6.6.1 Client DNS Issues
    • 6.6.2 Name Resolution Issues
    • 6.6.3 nslookup
    • 6.6.4 dig
    • 6.6.5 Lab: Explore nslookup
    • 6.6.6 Lab: Use nslookup
    • 6.6.7 Lesson Review
  • 6.7 Module Quiz
  • 6.8 Checkpoint Review

Module 7: Explaining Application Services

  • 7.1 Application Security and Time Synchronization
    • 7.1.1 Transport Layer Security
    • 7.1.2 Network Time Protocol
    • 7.1.3 Precision Time Protocol
    • 7.1.4 Lab: Configure NTP on Linux
    • 7.1.5 Lesson Review
  • 7.2 Web, File, Print, and Database Services
    • 7.2.1 Hyper Text Transfer Protocol
    • 7.2.2 HTTP Secure
    • 7.2.3 File Transfer Protocol
    • 7.2.4 Secure File Transfer Protocol
    • 7.2.5 Server Message Block
    • 7.2.6 Network Attached Storage
    • 7.2.7 Database Services
    • 7.2.8 Lab: Scan for Web Services with Nmap
    • 7.2.9 Lesson Review
  • 7.3 Email and Voice Services
    • 7.3.1 Simple Mail Transfer Protocol
    • 7.3.2 Internet Message Access Protocol
    • 7.3.3 Voice and Video Services
    • 7.3.4 VoIP Protocols
    • 7.3.5 VoIP Phones
    • 7.3.6 Lab: Connect VoIP 1
    • 7.3.7 Lab: Connect VoIP 2
    • 7.3.8 Lesson Review
  • 7.4 Disaster Recovery and High Availability
    • 7.4.1 Disaster Recovery Concepts
    • 7.4.2 Disaster Recovery Metrics
    • 7.4.3 Disaster Recovery Sites
    • 7.4.4 Fault Tolerance and Redundancy
    • 7.4.5 Load Balancers
    • 7.4.6 High Availability Clusters
    • 7.4.7 First Hop Redundancy
    • 7.4.8 Lab: Configure NIC Teaming
    • 7.4.9 Lesson Review
  • 7.5 Module Quiz

Module 8: Supporting Network Management

  • 8.1 Organizational Policies and Documentation
    • 8.1.1 Configuration Management
    • 8.1.2 Network Device Backup Management
    • 8.1.3 Change Management
    • 8.1.4 Asset Inventory Documentation
    • 8.1.5 Lifecycle Management
    • 8.1.6 Decommissioning
    • 8.1.7 Physical Network Diagrams
    • 8.1.8 Logical Network Diagrams
    • 8.1.9 IP Address Management
    • 8.1.10 Common Agreements
    • 8.1.11 Lab: Update Firmware
    • 8.1.12 Lesson Review
  • 8.2 Host Discovery and Monitoring
    • 8.2.1 Network Discovery
    • 8.2.2 Nmap
    • 8.2.3 Nmap Port Scanning
    • 8.2.4 Discovery Protocols
    • 8.2.5 Performance Monitoring
    • 8.2.6 Availability Monitoring
    • 8.2.7 Configuration Monitoring
    • 8.2.8 Lab: Scan Using Zenmap
    • 8.2.9 Lesson Review
  • 8.3 Simple Network Management Protocol
    • 8.3.1 SNMP Agents and Monitors
    • 8.3.2 SNMP Security
    • 8.3.3 Configuring an SNMP System on a Router (2:39)
    • 8.3.4 Monitoring a Switch with SNMP (1:56)
    • 8.3.5 Configuring SNMP Trap (5:42)
    • 8.3.6 Lesson Review
  • 8.4 Event Management
    • 8.4.1 Network Device Logs
    • 8.4.2 Log Collectors and Syslog
    • 8.4.3 Event Prioritization and Alerting
    • 8.4.4 Security Information and Event Management
    • 8.4.5 Log Reviews
    • 8.4.6 Lab: Configure Logging in pfSense
    • 8.4.7 Lab: Evaluate Event Logs in pfSense
    • 8.4.8 Lab: Auditing Device Logs on a Cisco Switch
    • 8.4.9 Lab: Configure Logging on Linux
    • 8.4.10 Lab: View Event Logs
    • 8.4.11 Lesson Review
  • 8.5 Packet Capture and Analysis
    • 8.5.1 Packet Capture
    • 8.5.2 tcpdump
    • 8.5.3 Protocol Analyzers
    • 8.5.4 Using Wireshark to Troubleshoot Network Issues (4:23)
    • 8.5.5 Lab: Troubleshoot with Wireshark
    • 8.5.6 Lab: Configure Port Mirroring
    • 8.5.7 Lesson Review
  • 8.6 Traffic Monitoring
    • 8.6.1 Common Performance Issues
    • 8.6.2 Interface Statistics
    • 8.6.3 Flow Data
    • 8.6.4 Traffic Testing Tools
    • 8.6.5 Bandwidth Management
    • 8.6.6 Traffic Shaping
    • 8.6.7 Lab: Configure QoS
    • 8.6.8 Monitoring Interface Statistics (5:09)
    • 8.6.9 Lesson Review
  • 8.7 Module Quiz

Module 9: Explaining Network Security Concepts

  • 9.1 Security Concepts
    • 9.1.1 Common Security Terminology
    • 9.1.2 Security Audits and Assessments
    • 9.1.3 Regulatory Compliance
    • 9.1.4 Encryption
    • 9.1.5 Vulnerability and Exploit Types
    • 9.1.6 Deception Technologies
    • 9.1.7 Lab: Create a Honeypot
    • 9.1.8 Lesson Review
  • 9.2 Network Threats and Attacks
    • 9.2.1 Threat Types and Assessment
    • 9.2.2 Attack Types
    • 9.2.3 Distributed DoS Attacks and Botnets
    • 9.2.4 Malware Attacks
    • 9.2.5 Lab: Analyze a DoS Attack
    • 9.2.6 Lab: Analyze a DDoS Attack
    • 9.2.7 Lesson Review
  • 9.3 Spoofing Attacks
    • 9.3.1 On-Path Attacks
    • 9.3.2 Performing an On-Path DHCP Attack (6:59)
    • 9.3.3 Poison ARP (5:45)
    • 9.3.4 MAC Flooding Attack
    • 9.3.5 Using SMAC to Spoof MAC Addresses (3:46)
    • 9.3.6 VLAN Hopping Attacks
    • 9.3.7 Lab: Poison ARP and Analyze with Wireshark
    • 9.3.8 Lab: Spoof MAC Addresses with SMAC
    • 9.3.9 Lab: Perform a DHCP Spoofing On-Path Attack
    • 9.3.10 Lesson Review
  • 9.4 Rogue System Attacks
    • 9.4.1 Rogue Devices and Services
    • 9.4.2 Rogue DHCP
    • 9.4.3 Setting Up DHCP Snooping (1:45)
    • 9.4.4 DNS Attacks
    • 9.4.5 Poisoning DNS (6:19)
    • 9.4.6 Lab: Discover a Rogue DHCP Server
    • 9.4.7 Lab: Configure DHCP Snooping
    • 9.4.8 Lab: Poison DNS
    • 9.4.9 Lab: Analyze DNS Spoofing
    • 9.4.10 Lesson Review
  • 9.5 Social Engineering
    • 9.5.1 Social Engineering Attacks
    • 9.5.2 Password Attacks
    • 9.5.3 Lab: Respond to Social Engineering Exploits
    • 9.5.4 Lab: Crack a Password with John the Ripper
    • 9.5.5 Lesson Review
  • 9.6 Module Quiz
  • 9.7 Checkpoint Review

Module 10: Applying Network Security Features

  • 10.1 Authentication
    • 10.1.1 Access Control
    • 10.1.2 Authentication Methods
    • 10.1.3 Local Authentication
    • 10.1.4 Single Sign-On and Kerberos
    • 10.1.5 Digital Certificates and PKI
    • 10.1.6 Key Management
    • 10.1.7 Federated Identity and SAML
    • 10.1.8 Remote Authentication
    • 10.1.9 Lesson Review
  • 10.2 Authorization and Account Management
    • 10.2.1 Authorization and Role-Based Access Control
    • 10.2.2 Privileged Access Management
    • 10.2.3 Lightweight Directory Access Protocol
    • 10.2.4 LDAP Secure
    • 10.2.5 Lab: Manage Account Policies
    • 10.2.6 Lesson Review
  • 10.3 Network Hardening
    • 10.3.1 Defense in Depth
    • 10.3.2 Device and Service Hardening
    • 10.3.3 View Linux Services
    • 10.3.4 Scanning for Unsecure Protocols (4:51)
    • 10.3.5 Lab: Scan for Unsecure Protocols
    • 10.3.6 Lab: Enable and Disable Linux Services
    • 10.3.7 Lab: Disable Network Service
    • 10.3.8 Lesson Review
  • 10.4 Switch Security
    • 10.4.1 Network Access Control and Port Security
    • 10.4.2 Lab: Secure Access to a Switch
    • 10.4.3 Lab: Secure Access to a Switch 2
    • 10.4.4 Lab: Disable Switch Ports – GUI
    • 10.4.5 Extensible Authentication Protocol and IEEE 802.1X
    • 10.4.6 Port Guards
    • 10.4.7 Lab: Harden a Switch
    • 10.4.8 Port Mirroring
    • 10.4.9 Lesson Review
  • 10.5 Network Security Rules
    • 10.5.1 Security Rules and ACL Configuration
    • 10.5.2 Proxy Servers
    • 10.5.3 Content Filtering
    • 10.5.4 Misconfigured Firewall and ACL Issues
    • 10.5.5 Creating Firewall ACLs (5:51)
    • 10.5.6 Lab: Configure Network Security Appliance Access
    • 10.5.7 Lab: Configure a Security Appliance
    • 10.5.8 Lab: Configure a Perimeter Firewall
    • 10.5.9 Lab: Restrict Telnet and SSH Access
    • 10.5.10 Lab: Permit Traffic
    • 10.5.11 Lab: Block Source Hosts
    • 10.5.12 Lesson Review
  • 10.6 Module Quiz

Module 11: Supporting Network Security Design

  • 11.1 Zone-based Security
    • 11.1.1 Network Security Zones
    • 11.1.2 Configuring a Screened Subnet (3:40)
    • 11.1.3 Perimeter Networks
    • 11.1.4 Screened Subnets
    • 11.1.5 Lab: Configure a Screened Subnet (DMZ)
    • 11.1.6 Lab: Configure Screened Subnets
    • 11.1.7 Intrusion Detection and Prevention Systems
    • 11.1.8 Implementing Intrusion Detection and Prevention (6:18)
    • 11.1.9 Lab: Implement Intrusion Prevention
    • 11.1.10 Lesson Review
  • 11.2 Internet of Things
    • 11.2.1 IoT Devices
    • 11.2.2 Industrial Embedded Systems
    • 11.2.3 IoT Networks
    • 11.2.4 IoT Network Security
    • 11.2.5 Lab: Scan for IoT Devices
    • 11.2.6 Lesson Review
  • 11.3 Physical Security
    • 11.3.1 Locks
    • 11.3.2 Cameras
    • 11.3.3 Geofencing
    • 11.3.4 Lab: Implement Physical Security
    • 11.3.5 Lesson Review
  • 11.4 Module Quiz

Module 12: Configuring Wireless Networks

  • 12.1 Wireless Concepts and Standards
    • 12.1.1 IEEE 802.11 Wireless Standards
    • 12.1.2 IEEE 802.11a and 5GHz Channel Bandwidth
    • 12.1.3 IEEE 8021b/g and 2.4GHz Channel Bandwidth
    • 12.1.4 IEEE 802.11n, MIMO, and Channel Bonding
    • 12.1.5 Wi-Fi 5 and Wi-Fi 6
    • 12.1.6 Multiuser MIMO and Band Steering
    • 12.1.7 Cellular Technologies
    • 12.1.8 Satellite Technologies
    • 12.1.9 Lab: Configure Wireless Profiles
    • 12.1.10 Lesson Review
  • 12.2 Enterprise Wireless Network Design
    • 12.2.1 Infrastructure Network Type
    • 12.2.2 Range and Signal Strength
    • 12.2.3 Wireless Surveys and Heat Maps
    • 12.2.4 Wireless Roaming
    • 12.2.5 Wireless Controllers
    • 12.2.6 Antenna Types
    • 12.2.7 Other Wireless Network Types
    • 12.2.8 Lab: Design an Indoor Wireless Network
    • 12.2.9 Lab: Design an Outdoor Wireless Network
    • 12.2.10 Lab: Implement an Enterprise Wireless Network
    • 12.2.11 Lesson Review
  • 12.3 Wireless Security
    • 12.3.1 Wi-Fi Encryption Standards
    • 12.3.2 Personal Authentication
    • 12.3.3 Enterprise Authentication
    • 12.3.4 Guest Networks and Captive Portals
    • 12.3.5 Bring Your Own Device Issues
    • 12.3.6 Wireless Network Attacks
    • 12.3.7 Lab: Configure a Captive Portal
    • 12.3.8 Lab: Create a Guest Network for BYOD
    • 12.3.9 Lab: Secure an Enterprise Wireless Network
    • 12.3.10 Lab: Secure a Home Wireless Network
    • 12.3.11 Lab: Enable Wireless Intrusion Prevention
    • 12.3.12 Lesson Review
  • 12.4 Wireless Troubleshooting
    • 12.4.1 Wireless Performance Assessment
    • 12.4.2 Insufficient Wireless Coverage Issues
    • 12.4.3 Channel Overlap Issues
    • 12.4.4 Interference Issues
    • 12.4.5 Roaming and Client Disassociation Issues
    • 12.4.6 Overcapacity Issues
    • 12.4.7 Lab: Explore Wireless Network Problems
    • 12.4.8 Lab: Troubleshoot Wireless Network Problems
    • 12.4.9 Lab: Optimize a Wireless Network
    • 12.4.10 Lesson Review
  • 12.5 Module Quiz
  • 12.6 Checkpoint Review

Module 13: Comparing Remote Access Methods

  • 13.1 WAN and Internet Connectivity
    • 13.1.1 Wide Area Networks and the OSI Model
    • 13.1.2 Internet Access Types
    • 13.1.3 Fiber to the Curb and Fiber to the Premises
    • 13.1.4 Lesson Review
  • 13.2 Virtual Private Networks
    • 13.2.1 Remote Access Considerations
    • 13.2.2 Tunneling Protocols
    • 13.2.3 Internet Protocol Security
    • 13.2.4 Internet Key Exchange
    • 13.2.5 Client-to-Site VPNs
    • 13.2.6 Clientless VPNs
    • 13.2.7 Site-to-Site VPNs
    • 13.2.8 Lab: Configure a Remote Access VPN
    • 13.2.9 Lab: Configure an iPad VPN Connection
    • 13.2.10 Lab: Configure a RADIUS Solution
    • 13.2.11 Lesson Review
  • 13.3 Remote Management
    • 13.3.1 Remote Host Access
    • 13.3.2 Secure Shell
    • 13.3.3 Telnet
    • 13.3.4 Remote Desktop Protocol
    • 13.3.5 Console Connections and Out-of-Bound Management
    • 13.3.6 Jump Boxes
    • 13.3.7 API Connection Methods
    • 13.3.8 Lab: Allow Remote Desktop Connections
    • 13.3.9 Lab: Use PowerShell Remote
    • 13.3.10 Lesson Review
  • 13.4 Module Quiz

Module 14: Summarizing Cloud Concepts

  • 14.1 Datacenter and Storage Networks
    • 14.1.1 Data Center Network Design
    • 14.1.2 Spine and Leaf Topology
    • 14.1.3 Storage Area Networks
    • 14.1.4 Fibre Channel
    • 14.1.5 Lab: Configure an iSCSI Target
    • 14.1.6 Lab: Configure an iSCSI Initiator
    • 14.1.7 Lesson Review
  • 14.2 Cloud Concepts
    • 14.2.1 Cloud Scalability and Elasticity
    • 14.2.2 Cloud Deployment Models
    • 14.2.3 Cloud Service Models
    • 14.2.4 Content Delivery Networks
    • 14.2.5 Lesson Review
  • 14.3 Cloud Networking
    • 14.3.1 Cloud Instances
    • 14.3.2 Virtual Private Clouds
    • 14.3.3 Cloud Gateways
    • 14.3.4 Cloud Connectivity Options
    • 14.3.5 Cloud Firewall Security
    • 14.3.6 Security Groups and Security Lists
    • 14.3.7 Lesson Review
  • 14.4 Modern Network Environments
    • 14.4.1 Infrastructure as Code
    • 14.4.2 Uses for Infrastructure as Code
    • 14.4.3 Source Control
    • 14.4.4 Software-Defined Networking
    • 14.4.5 Software-Defined WAN
    • 14.4.6 Overlay Networks
    • 14.4.7 Zero Trust Architecture
    • 14.4.8 Secure Access Service Edge
    • 14.4.9 Lesson Review
  • 14.5 Module Quiz

Requisiti

Per svolgere il corso con profitto è consigliato aver completato i corsi CompTIA A+ Core 1 e CompTIA A+ Core 2 e/o possedere circa 9-12 mesi di esperienza nell’amministrazione IT nonché i seguenti prerequisiti:

  • familiarità con i concetti base di rete e comunicazioni.
  • Conoscenza delle tecniche di risoluzione dei problemi di rete.
  • Esperienza pratica con hardware di rete e cablaggio.

Questo corso è progettato per fornire ai partecipanti le competenze necessarie per configurare, gestire e risolvere problemi nelle reti cablate e wireless, preparando così i candidati a sostenere e superare l’esame di certificazione CompTIA Network+.

Perché scegliere il corso

Il corso di formazione CompTIA Network+ è la scelta ideale per acquisire competenze tecniche e pratiche nel networking, fondamentali per supportare infrastrutture di rete aziendali. Una certificazione strategica per avviare una carriera IT solida, valida in ambienti di rete eterogenei e indipendente dal fornitore.

Contattaci per una quotazione dedicata

Il corso è disponibile per la formazione personalizzata

Il corso è disponibile per la formazione personalizzata

A chi è rivolto

    • Professionisti IT specializzati in amministrazione e supporto di rete
    • Amministratori di rete
    • Tecnici di rete
    • Installatori di rete
    • Tecnici dell’help desk
    • Installatori di cavi IT

Cosa troverai

corso comptia network+

Formatori esperti certificati

I nostri docenti operano professionalmente in materia di sicurezza informatica in ambienti aziendali.

corso comptia network+

Risorse formative e laboratori aggiornati

Il corso è aggiornato costantemente per garantire un’esperienza formativa coerente con l’evoluzione degli attacchi Ransomware.

corso comptia network+

Multicanalità

Potrai scegliere di svolgere il corso sia in presenza che online.

corso comptia network+

Certificato di completamento

Riceverai un attestato di partecipazione personalizzato in formato Open Badge.

Corsi correlati

Preferisci compilare il modulo? Scrivi i tuoi dati qui sotto

Il servizio telefonico è attivo dal lunedì al venerdì dalle 8:00 alle 18:00 al numero 0452456669. Puoi anche compilare il modulo sottostante:

Please enable JavaScript in your browser to complete this form.