O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CompTIA Network+ N10-007

Video Description

This course prepares the student to take the CompTIA Network+ N10-007 certification exam. It covers all exam objectives, as well as additional topics that provide background and context. Demonstrations and instructor commentary throughout the course come from real-world experience, with examples and tips that the network professional can use in a production environment. In this course, you will: Describe networking concepts Explain the function and installation of network infrastructure components Describe network operations concepts and implementation Describe network security concepts and implementation Explain network troubleshooting techniques and tool usage

Table of Contents

  1. 1.0 Intro Network Plus N10 007 00:00:46
  2. 1.1 Basic Networking Act 00:03:35
  3. 1.1 Basic Networking 00:11:39
  4. 1.2 Exploring the OSI Model- Act 00:10:36
  5. 1.2 OSI Model 00:24:13
  6. 1.3 Comparing TCP and UDP Act 00:20:19
  7. 1.3 Connections Oriented vs Connectionless 00:14:26
  8. 1.3 Examining Messaging Protocols Act 00:04:03
  9. 1.3 Examining Protocols and Ports Act 00:11:13
  10. 1.3 Examining the Lower Layer Protocols- Act 00:10:21
  11. 1.3 IP 00:16:10
  12. 1.3 Layer 7 Infrastructure Mgmt Protocols 00:15:08
  13. 1.3 Layer 7 Messaging 00:08:33
  14. 1.3 Layer 7 Remote Control Protocol 00:07:13
  15. 1.3 Layer 7 Streaming Media 00:03:40
  16. 1.3 Layer 7 Transfer 00:09:42
  17. 1.3 Layer 7 Web Traffic Protocol 00:08:10
  18. 1.3 Protocol and Ports 00:13:16
  19. 1.4 Creating a Basic Network Segment Act 00:02:43
  20. 1.4 Creating Collision and Broadcast Domains Act 00:24:35
  21. 1.4 Creating VLANs Act 00:18:18
  22. 1.4 Interface Properties and Segmentation 00:12:00
  23. 1.4 Managing Switching Loops Act 00:08:17
  24. 1.4 Switching Act 00:15:18
  25. 1.4 Switching Loop Management 00:06:15
  26. 1.4 Switching prt 2 00:20:59
  27. 1.4 Switching 00:22:19
  28. 1.4 VLANs 00:11:28
  29. 1.5 Adding Static Routes Act 00:15:11
  30. 1.5 Configuring a Routing Protocol Act 00:18:13
  31. 1.5 Configuring Firewalls Act 00:09:18
  32. 1.5 Configuring IP Act 00:09:05
  33. 1.5 Configuring NAT-PAT Act 00:25:59
  34. 1.5 Examining ARP Act 00:05:32
  35. 1.5 Firewalls 00:09:54
  36. 1.5 IP Addressing Basics 00:11:04
  37. 1.5 NAT-PAT 00:03:16
  38. 1.5 Routers 00:03:03
  39. 1.5 Routing Basics 00:06:24
  40. 1.5 Routing Between VLANs Act 00:11:46
  41. 1.5 Routing Protocols 00:23:14
  42. 1.5 Routing 00:02:57
  43. 1.5 Setting Up a Router Act 00:20:06
  44. 1.5 VLAN Routing 00:04:12
  45. 1.6 Advanced Switching 00:12:53
  46. 1.6 Exploring IPv6 Act 00:04:58
  47. 1.6 Performance Concepts 00:08:12
  48. 1.7 Address Assignment 00:07:29
  49. 1.7 Addressing 00:20:05
  50. 1.7 Learning to Subnet- Act 00:43:39
  51. 1.7 Subnetting 00:10:48
  52. 1.8 Network Types and Topologies 00:07:28
  53. 1.8 Network Types 00:13:56
  54. 1.8 Technologies that Facilitate IOT 00:19:53
  55. 1.8 Wireless Topologies 00:02:17
  56. 1.9 802.11 Standards 00:14:42
  57. 1.9 Bluetooth 00:08:13
  58. 1.9 Cellular 00:18:23
  59. 1.9 Using an RF Spectrum Analyzer Act 00:07:39
  60. 1.9 Wi-Fi Antenna Concepts 00:10:35
  61. 1.9 Wi-Fi Frequencies 00:10:46
  62. 1.9 Wireless Technologies 00:20:59
  63. 1.10 Cloud 00:20:32
  64. 1.10 Exploring Cloud Services Act 00:05:41
  65. 1.11 DHCP Services 00:11:48
  66. 1.11 Network Services 00:22:15
  67. 1.11 NTP 00:05:21
  68. 1.11 Setting Up DHCP Act 00:07:58
  69. 1.11 Setting up DNS Act 00:10:49
  70. 2.1 Copper Cable Standards 00:12:22
  71. 2.1 Creating a Crossover Cable Act 00:07:39
  72. 2.1 Crimping on an RJ-45 Act 00:11:02
  73. 2.1 Ethernet Development 00:02:54
  74. 2.1 Infrastructure 00:32:38
  75. 2.1 Plenum vs PVC 00:19:34
  76. 2.1 Terminating Cable to 110 Block Act 00:20:30
  77. 2.1 Testing a Fiber Optic Cable Act 00:03:55
  78. 2.1 Transceivers 00:10:05
  79. 2.2 Firewall 00:04:54
  80. 2.2 Media Converter 00:08:15
  81. 2.2 Modem WAP 00:11:24
  82. 2.2 Network Devices Placement 00:02:39
  83. 2.2 Repeaters 00:09:34
  84. 2.2 Router 00:09:41
  85. 2.2 Setting up a WAP Act 00:19:02
  86. 2.3 Advance Networking 00:02:05
  87. 2.3 Configuring Proxy Settings Act 00:03:15
  88. 2.3 Proxy Server 00:06:11
  89. 2.3 VPN Concentrator 00:20:47
  90. 2.3 Wireless Controller 00:14:42
  91. 2.4 Network Storage Types 00:20:52
  92. 2.4 Virtual Network 00:09:25
  93. 2.5 Configuring WAN Links Act 00:12:23
  94. 2.5 Termination 00:04:20
  95. 2.5 Transmission Mediums 00:25:00
  96. 2.5 WAN Technologies 00:28:48
  97. 3.1 Change Management 00:04:07
  98. 3.1 IDF-MDF Documentation 00:21:52
  99. 3.1 Labeling 00:12:50
  100. 3.1 Logical vs Physical Diagrams 00:08:01
  101. 3.1 Network Operations Documentation 00:10:50
  102. 3.1 Rack Diagrams 00:07:14
  103. 3.1 Standard Operation Procedures 00:05:24
  104. 3.1 Using Documentation Act 00:26:48
  105. 3.1 Wiring and Ports Locations 00:01:03
  106. 3.2 Backing Up Your Data Act 00:16:16
  107. 3.2 Continuity and Disaster 00:18:04
  108. 3.2 MTTR Mean Time Repair 00:11:34
  109. 3.2 Recovery 00:14:16
  110. 3.3 Event Management 00:10:37
  111. 3.3 Metrics 00:02:04
  112. 3.3 Scanning Monitoring Patching 00:21:28
  113. 3.3 Testing the Network Act 00:13:16
  114. 3.4 HTTPS-Management 00:01:29
  115. 3.4 Making Remote Connections Act 00:44:09
  116. 3.4 Out-of-Band Management 00:04:06
  117. 3.4 RDP 00:03:39
  118. 3.4 Remote Access Methods 00:16:16
  119. 3.4 Remote File Access 00:03:55
  120. 3.4 SSH 00:02:00
  121. 3.4 VNC 00:02:53
  122. 3.5 Creating Policies and Procedures Act 00:04:52
  123. 3.5 Policies and Best Practices 00:28:50
  124. 4.1 Examining Security Devices Act 00:00:46
  125. 4.1 Physical Security Devices 00:12:24
  126. 4.2 Access Controls Methods Act 00:12:20
  127. 4.2 Authentication and Access 00:18:47
  128. 4.2. Multifactor Authentication 00:23:22
  129. 4.3 Basic Wireless Network Security 00:19:31
  130. 4.3 Demonstrating the Need for Wireless Act 00:05:43
  131. 4.4 Common Network Attacks 00:31:12
  132. 4.4 Conducting a Phishing Campaign Act 00:11:49
  133. 4.5 Network Device Hardening 00:07:00
  134. 4.5 Supporting Secure Authentication Encryption Act 00:14:03
  135. 4.5 Updating Firmware 00:08:41
  136. 4.6 Explain Common Mitigation Techniques 00:31:38
  137. 4.6 Implementing a Honey Pot Act 00:05:18
  138. 5.1 Network Troubleshoot 00:35:41
  139. 5.2 Hardware Tools Analyzers 00:09:42
  140. 5.2 Software Tools Command Line 00:15:42
  141. 5.2 Software Tools 00:09:54
  142. 5.2 Troubleshooting with Command Line Tools Act 00:14:30
  143. 5.2 Troubleshooting With Hardware Tools Act 00:22:03
  144. 5.2 Troubleshooting with Software Tools Act 00:05:32
  145. 5.2 Using the Appropriate Tools 00:25:58
  146. 5.3 Physical Issues 00:08:01
  147. 5.3 Traffic Flow Issues 00:04:39
  148. 5.3 Transceiver Issues 00:04:36
  149. 5.3 Troubleshoot Common Wired Connectivity 00:10:14
  150. 5.3 Troubleshooting Signal Problems 00:07:04
  151. 5.3.Troubleshooting Transceiver Problems 00:10:22
  152. 5.4 Incorrect WAP Types 00:18:02
  153. 5.4 Latency and Jitter 00:05:26
  154. 5.4 Troubleshoot Common Wireless Connectivity 00:07:16
  155. 5.4 Troubleshooting WAP Issues 00:04:49
  156. 5.5 Advanced Network Issues 00:04:23
  157. 5.5 Case Study Troubleshooting 00:09:16
  158. 5.5 DHCP Issues 00:08:01
  159. 5.5 Firewall ACL Issues 00:04:07
  160. 5.5 Troubleshooting Common Network 00:05:34
  161. 5.5 Unresponsive Services 00:05:03
  162. 5.6 Outro N10 007 00:00:47