N10-006 : Pearson - Networking Essentials (Course & lab)

networking-essentials-complete
Pearson - Networking Essentials (Course & lab)
ISBN : 978-1-61691-562-9

Gain hands-on experience in CompTIA Network+ certification exam by Pearson Network-Essentials course and performance based labs. Performance based labs simulate real-world, hardware, software & command line interface environments and can be mapped to any text-book, course & training. CompTIA Network+ is a globally recognized, foundational-level credential designed for IT professionals, IT network practitioners. CompTIA Network+ N10-006 exam validates the expertise and technical knowledge required to identify network limitations and weaknesses; establish basic network design and connectivity; understand and maintain network documentation; troubleshoot, configure, and manage common network wireless and wired devices; and implement network security, standards, and protocols.

Here's what will you get

In CompTIA Network+, the topics are mostly generic in that they can apply to networking equipment regardless of vendor. The Network+ exam was designed to test the skills of network technicians with 18 to 24 months of experience in the field. It tests areas of networking technologies such as the definition of a protocol, the Open Systems Interconnection (OSI) model and its layers, and the concepts of network design and implementation.

Lessons
14+
Exercises
435+
Quizzes
155+
Flashcards
505+
Glossary of terms
505+
Pre-assessment Questions
124+
Full Length Tests
4+
Post-Assessment Questions
121+
Performance based lab
138+
Video tutorials
42+
Hours
02:17+

Videos and How To..

uCertify course includes videos to help understand concepts. It also includes How Tos that help learners with how to accomplish certain tasks.

Videos
18+
Hours
04:55+
Exam FAQs
What is the exam registration fee?
USD 294
Where do I take the exam? Pearson VUE
What is the format of the exam? Multiple Choice Questions (single and multiple response), drag and drops and performance-based
How many questions are asked in the exam? The exam contains 90 questions.
What is the duration of the exam? 90 minutes
What is the passing score? 720

(on a scale of 100-900)

What is the exam's retake policy?

In the event that you fail your first attempt at passing the Networking Essential examination, CompTIA's retake policy is:

  • There is no limit to the number of retakes for a candidate who has failed their exam.
  • There is no waiting period between the first and second attempt to pass such examination. However, if you need a third or subsequent attempt to pass the certification, you shall be required to wait for a period of at least fourteen (14) calendar days from the date of your last attempt before you can retake the exam.
  • If you have already passed the exam, it cannot be taken again without prior consent from CompTIA.
  • Candidates must pay the exam price each time they attempt the exam. CompTIA does not offer any free re-tests or discounts on retakes.
Where can I find more information about this exam? To know more about the networking-essentials-complete, click here.
Which certification covers this exam?
What are the career opportunities after passing this exam?
  • IT Cable Installer
  • Network Installer
  • Network Technician
  • Helpdesk Technician
  • Network Administrator

Here's what will you learn

  • ORGANIZATION OF THE TEXT
  • Key Pedagogical Features
  • Introduction
  • Network Topologies
  • The OSI Model
  • The Ethernet LAN
  • Home Networking
  • Assembling an Office LAN
  • Testing and Troubleshooting a LAN
  • Summary
  • Questions and Problems
  • Introduction
  • Structured Cabling
  • Unshielded Twisted-Pair Cable
  • Terminating CAT6/5e/5 UTP Cables
  • Cable Testing and Certification
  • 10 Gigabit Ethernet over Copper
  • Troubleshooting Cabling Systems
  • Summary
  • Questions and Problems
  • Introduction
  • The Nature of Light
  • Fiber Attenuation and Dispersion
  • Optical Components
  • Optical Networking
  • Safety
  • Summary
  • Questions and Problems
  • Introduction
  • The IEEE 802.11 Wireless LAN Standard
  • 802.11 Wireless Networking
  • Bluetooth, WiMAX, and RFID
  • Securing Wireless LANs
  • Configuring a Point-to-Multipoint Wireless LAN: A Case Study
  • Summary
  • Questions and Problems
  • Introduction
  • The Network Bridge
  • The Network Switch
  • The Router
  • Interconnecting LANs with the Router
  • Configuring the Network Interface-Auto-negotiation
  • Summary
  • Questions and Problems
  • Introduction
  • The TCP/IP Layers
  • Number Conversion
  • IPv4 Addressing
  • Subnet Masks
  • CIDR Blocks
  • IPv6 Addressing
  • Summary
  • Questions and Problems
  • Introduction
  • Router Fundamentals
  • The Console Port Connection
  • The Router's User EXEC Mode (Router>)
  • The Router's Privileged EXEC Mode (Router#)
  • Summary
  • Questions and Problems
  • Introduction
  • Introduction to VLANs
  • Introduction to Switch Configuration
  • Spanning-Tree Protocol
  • Network Management
  • Power Over Ethernet
  • Summary
  • Questions and Problems
  • Introduction
  • Static Routing
  • Dynamic Routing Protocols
  • Distance Vector Protocols
  • Link State Protocols
  • Hybrid Protocols
  • Configuring RIP and RIPv2
  • Summary
  • Questions and Problems
  • Introduction
  • The Line Connection
  • Remote Access
  • Metro Ethernet/Carrier Ethernet
  • Network Services-DHCP and DNS
  • Internet Routing-BGP
  • Analyzing Internet Data Traffic
  • Summary
  • Questions and Problems
  • Introduction
  • Analyzing Computer Networks
  • Analyzing Computer Networks-FTP Data Packets
  • Analyzing Campus Network Data Traffic
  • Troubleshooting the Router Interface
  • Troubleshooting the Switch Interface
  • Troubleshooting Fiber Optics-the OTDR
  • Summary
  • Questions and Problems
  • Introduction
  • Intrusion (How an Attacker Gains Control of a Network)
  • Denial of Service
  • Security Software and Hardware
  • Introduction to Virtual Private Network
  • Summary
  • Questions and Problems
  • Supplemental Labs

Hands on Activities (Labs)

  • Identifying a network topology
  • Identifying the topology
  • Identifying internetworking devices
  • Identifying RG standards
  • Identifying client and server
  • Identifying OSI layer functions
  • Identifying connectionless communication
  • Describing OSI layers
  • Identifying application layer protocols
  • Identifying OSI layers
  • Connecting cable internet access for your network
  • Connecting systems to the Internet through a router
  • Connecting computers on a SOHO network to the Internet
  • Connecting patch cables between the patch panel and switch ports
  • Connecting a new workstation to the Internet
  • Creating a dial-up connection
  • Checking properties of and deleting a dial-up connection
  • Installing a NIC
  • Connecting a workstation to the LAN and configuring IPv4 properties
  • Assembling components to complete the workstation
  • Identifying the steps of IP address spoofing
  • Preparing a temporary server for the network/Internet connection
  • Connecting a wireless router to the laptop
  • Identifying components of a coaxial cable
  • Identifying types of cable
  • Identifying an RJ-45 connector
  • Identifying types of cable
  • Terminating a cable with an RJ-45 plug
  • Identifying fiber connectors
  • Identifying various equipments
  • Identifying components of an optical fiber
  • Identifying common fiber optic connectors
  • Identifying the device for Ethernet segment communication
  • Identifying 802.11 standards
  • Identifying the network types
  • Identifying network and mail protocols
  • Identifying wireless protocols
  • Identifying VPN protocols
  • Identifying VPN protocols
  • Identifying the network device
  • Identifying Interior Gateway Protocols (IGPs)
  • Creating a network manually
  • Configuring a wireless client
  • Connecting a system to a wireless network
  • Connecting computers and a printer to the Internet
  • Configuring a DHCP role in Server 2012
  • Installing Active Directory Domain Services on Windows Server 2012
  • Identifying TCP/IP protocol layers
  • Identifying TCP/IP layers
  • Identifying TCP utilities
  • Identifying FTP commands
  • Identifying abbreviations for various Internet layer protocols
  • Identifying Internet protocols and their standards
  • Identifying TCP/IP troubleshooting tools
  • Viewing TCP frame details using Network Monitor
  • Configuring a Local Area Connection's TCP/IP Version 4 properties
  • Identifying IPv4 protocol
  • Identifying devices used in an internetwork
  • Connecting a workstation to the Ethernet and to the Internet
  • Identifying network protocol features
  • Checking system performance
  • Configuring monitoring tools
  • Providing a remote connection to a server on a client computer
  • Configuring a wireless access point
  • Identifying uses of a network analyzer
  • Configuring Windows logs
  • Adding counters in the Performance Monitor
  • Identifying incident response steps
  • Configuring ICS (Internet Connection Sharing)
  • Identifying internetworking devices
  • Identifying remote access methods
  • Identifying networking components
  • Identifying network infrastructure devices
  • Identifying the POTS terms
  • Identifying network device log information
  • Replacing a faulty NIC
  • Understanding wireless technology
  • Configuring Windows Update Services
  • Identifying the network topology
  • Identifying network topologies
  • Determining reference point maximum distances
  • Identifying WAN bandwidth features
  • Troubleshooting errors occurring on a server
  • Learning about change management software
  • Identifying network security threats
  • Describing malicious threats to networks
  • Identifying protocols
  • Troubleshooting a network problem
  • Diagnosing a network problem
  • Identifying combinational values of flags
  • Identifying Ethernet standards
  • Identifying T-carrier line transmission speeds
  • Comparing authentication systems
  • Identifying types of IDS
  • Identifying utilities of DOS and UNIX/LINUX
  • Identifying an encapsulating bridge
  • Identifying causes of transmission failure
  • Identifying protocols and devices
  • Identifying NICs
  • Downloading a graphics card driver for Windows 7
  • Identifying types of hubs
  • Identifying speed of bandwidth technologies
  • Identifying Fast Ethernet standards
  • Identifying strategies for password protection
  • Identifying security-threats
  • Avoiding redundant paths within ports
  • Identifying DSL (Digital Subscriber Line) variations
  • Identifying components of the Kerberos authentication protocol
  • Identifying features of cipher locks
  • Identifying types of attacks
  • Identifying attack methods
  • Identifying authentication factor types
  • Identifying types of Denial of Service attacks
  • Installing the AVG antivirus and scanning a drive
  • Viewing driver details and the install date of a keyboard
  • Identifying documentation types
  • Learning about Cisco IOS firewall
  • Learning about Cisco Intrusion Prevention System
  • Identifying phases of key management
  • Identifying phases of key management
  • Identifying the diameter protocol features
  • Identifying warchalking symbols
  • Identifying toolkit items
  • Identifying encryption methods
  • Evaluating security practices
  • Identifying a back-to-back firewall
  • Identifying firewall techniques
  • Identifying hardware firewall features
  • Examining advanced Windows Firewall settings
  • Identifying insecure items
  • Identifying Syslog severity levels
  • Identifying network devices
  • Configuring a new server
  • Configuring a DHCP role with error notification
  • Configuring a client system to get event logs
  • Identifying wireless acronyms
  • Establishing a remote desktop connection
  • Identifying drawbacks of Kerberos authentication
uCertify

uCertify provides courses, simulator, labs, test prep kits for IT certifications including Microsoft, Oracle, Cisco, CompTIA, CIW, PMI, ISC2, Linux, Zend, Google, IC3 , Adobe and many more.

© 2002-2017 uCertify. All Rights Reserved
app_store
google_play