Скачать книгу

connectors and cables. I also differentiate the most common network topologies and network infrastructure implementations and the addressing of these networks, as well as the routing of the addresses. Finally, I identify basic elements used in unified communication technologies, such as VoIP, real-time services, virtualization, storage area network, and cloud concepts. At the very end, we implement a basic network together based on a set of constraints and goals!

      Domain 2.0 Network Operations This domain includes the use of appropriate monitoring tools, such as packet analyzers and port scanners, as well as the use of appropriate performance tools such as baselines and logs. I also discuss configuration management and various forms of documentation. In addition, I discuss the implementation of network segmentation to allow for very important and security-sensitive applications such as industrial controls. In regard to security, I also discuss the installation and application of various patches, firmware updates, driver updates, and so on. Finally, I turn your attention to the proper configuration of a switch and to the configuration of a wired as well as a wireless LAN infrastructure.

      Domain 3.0 Network Security This domain concerns risk, vulnerabilities, threats, and the appropriate response in regard to your ongoing network security. First, I discuss risk-related concepts, such as disaster recovery, business continuity, battery backups, single points of failure, and so on. Next, I turn your attention to the various types of threats that face your network and how attacks might be launched by an attacker. Once I’ve discussed the threats, then I discuss the hardening techniques that you can employ to prevent the attacks from succeeding. I compare and contrast various physical security controls, firewalls, and access control methods. Finally, I summarize the basic forensic process that you should consider using if you are attacked.

      Domain 4.0 Troubleshooting In this domain, I start by discussing the troubleshooting methodology that you should know and use to discover the root cause of an issue as quickly as possible. I then discuss various troubleshooting tools for wired and wireless networks. Finally, I discuss troubleshooting the security of your networks in regard to LAN as well as WAN security.

      Domain 5.0 Industry Standards, Practices, and Network Theory This domain wraps it all up and gives you a platform that helps you understand and remember how all the pieces go together. I start with an analysis of the OSI model and the function of each of its seven layers. Then, I explain common network theory such as encapsulation/de-encapsulation and various modulation techniques. I also discuss the various numbering systems that we use for network addresses and how they relate to network theory. Then, I go into detail in regard to wireless and wired connectivity standards. Next, I discuss the various policies and procedures used to secure a network and sustain business viability. I also discuss the installation and configuration of various network equipment and support equipment, such as patch panels, cable trays, server racks, and so on. Finally, I discuss in detail all of the various protocols and services that you can use in your network and give you lists and ways to remember them.

      The Network+ Exam Objectives

      

At the beginning of each chapter, I have included a complete listing of the topics that will be covered in that chapter. These topic selections are developed straight from the test objectives listed on CompTIA’s website. These are provided for easy reference and to assure you that you are on track with learning the objectives. Note that exam objectives are subject to change at any time without prior notice and at CompTIA’s sole discretion. Please visit the Network+ Certification page of CompTIA’s website (http://certification.comptia.org/getCertified/certifications/network.aspx) for the most current listing of exam objectives.

      Chapter 1: Domain 1 Network Architecture

      ✓ 1.1 Explain the functions and applications of the various network devices

      ■ Router

      ■ Switch

      ■ Multilayer switch

      ■ Firewall

      ■ HIDS

      ■ IDS/IPS

      ■ Access point (wireless/wired)

      ■ Content filter

      ■ Load balancer

      ■ Hub

      ■ Analog modem

      ■ Packet shaper

      ■ VPN concentrator

      ✓ 1.2 Compare and contrast the use of networking services and applications

      ■ VPN

      ■ Site to site/host to site/host to host

      ■ Protocols

      ■ IPsec

      ■ GRE

      ■ SSL VPN

      ■ PTP/PPTP

      ■ TACACS/RADIUS

      ■ RAS

      ■ Web services

      ■ Unified voice services

      ■ Network controllers

      ✓ 1.3 Install and configure the following network services and applications

      ■ DHCP

      ■ Static vs. dynamic IP addressing

      ■ Reservations

      ■ Scopes

      ■ Leases

      ■ Options (DNS, servers, suffixes)

      ■ IP helper/DHCP relay

      ■ DNS

      ■ DNS servers

      ■ DNS records (A, MX, AAAA, CNAME, PTR)

      ■ Dynamic DNS

      ■ Proxy/reverse proxy

      ■ NAT

      ■ PAT

      ■ SNAT

      ■ DNAT

      ■ Port forwarding

      ✓ 1.4 Explain the characteristics and benefits of various WAN technologies

      ■ Fiber

      ■ SONET

      ■ DWDM

      ■ CWDM

      ■ Frame Relay

      ■ Satellite

      ■ Broadband cable

      ■ DSL/ADSL

      ■ ISDN

      ■ ATM

      ■ PPP/Multilink PPP

      ■ MPLS

      ■ GSM/CDMA

      ■ LTE/4G

      ■ HSPA+

      ■ 3G

      ■ Edge

      ■ Dialup

      ■ WiMAX

      ■ Metro-Ethernet

      ■ Leased lines

      ■ T-1

      ■ T-3

      ■ E-1

      ■ E-3

      ■ OC3

      ■ OC12

      ■ Circuit switch vs. packet switch

      ✓ 1.5 Install and properly terminate various cable types and connectors using appropriate tools

      ■ Copper connectors

      ■ RJ-11

      ■ RJ-45

      ■ RJ-48C

      ■ DB-9/RS-232

      ■ DB-25

      ■

Скачать книгу