Booking options
£12
£12
On-Demand course
22 hours 43 minutes
All levels
This comprehensive course on CompTIA Network (N10-007) will deepen your understanding on this topic.
After successful completion of this course you can acquire the required skills in this sector. This CompTIA Network (N10-007) comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market.
So enrol in this course today to fast track your career ladder.
You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate.
There is no experience or previous qualifications required for enrolment on this CompTIA Network (N10-007). It is available to all students, of all academic backgrounds.
Our CompTIA Network (N10-007) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G.
There is no time limit for completing this course, it can be studied in your own time at your own pace.
Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to-
Open doors of opportunities
Increase your adaptability
Keep you relevant
Boost confidence
And much more!
22 sections • 172 lectures • 22:43:00 total length
•Introduction: 00:03:00
•What is a Model?: 00:02:00
•OSI vs. TCP/IP Model: 00:07:00
•Walking Through OSI and TCP/IP: 00:12:00
•Meet the Frame: 00:06:00
•The MAC Address: 00:07:00
•Broadcast vs. Unicast: 00:04:00
•Introduction to IP Addressing: 00:08:00
•Packets and Ports: 00:05:00
•Network Topologies: 00:10:00
•Coaxial Cabling: 00:05:00
•Twisted Pair Cabling: 00:06:00
•Cat Ratings: 00:06:00
•Fiber Optic Cabling: 00:09:00
•Fire Ratings: 00:05:00
•Legacy Network Connections: 00:07:00
•What is Ethernet?: 00:07:00
•Ethernet Frames: 00:07:00
•Early Ethernet: 00:08:00
•The Daddy of Ethernet, 10BaseT: 00:03:00
•Terminating Twisted Pair: 00:14:00
•Hubs vs. Switches: 00:13:00
•100BaseT: 00:05:00
•Connecting Switches: 00:05:00
•Gigabit Ethernet and 10-Gigabit Ethernet: 00:05:00
•Transceivers: 00:07:00
•Connecting Ethernet Scenarios: 00:14:00
•Introduction to Structured Cabling: 00:04:00
•Terminating Structured Cabling: 00:08:00
•Equipment Room: 00:07:00
•Alternative Distribution Panels: 00:04:00
•Testing Cable: 00:09:00
•Troubleshooting Structured Cabling, Part 1: 00:05:00
•Troubleshooting Structured Cabling, Part 2: 00:05:00
•Using a Toner and Probe: 00:03:00
•Wired Connection Scenarios: 00:11:00
•Introduction to IP Addressing and Binary: 00:13:00
•Introduction to ARP: 00:04:00
•Classful Addressing: 00:10:00
•Subnet Masks: 00:12:00
•Subnetting with CIDR: 00:10:00
•More CIDR Subnetting Practice: 00:10:00
•Dynamic and Static IP Addressing: 00:18:00
•Rogue DHCP Servers: 00:07:00
•Special IP Addresses: 00:07:00
•IP Addressing Scenarios: 00:15:00
•Introducing Routers: 00:15:00
•Understanding Ports: 00:05:00
•Network Address Translation: 00:06:00
•Implementing NAT: 00:03:00
•Forwarding Ports: 00:18:00
•Tour of a SOHO Router: 00:12:00
•SOHO vs. Enterprise: 00:09:00
•Static Routes: 00:13:00
•Dynamic Routing: 00:11:00
•RIP: 00:04:00
•OSPF: 00:04:00
•BGP: 00:06:00
•TCP and UDP: 00:07:00
•ICMP and IGMP: 00:06:00
•Handy Tools: 00:07:00
•Introduction to Wireshark: 00:11:00
•Introduction to netstat: 00:09:00
•Web Servers: 00:12:00
•FTP: 00:12:00
•E-mail Servers and Clients: 00:09:00
•Securing E-mail: 00:06:00
•Telnet and SSH: 00:09:00
•Network Time Protocol: 00:02:00
•Network Service Scenarios: 00:10:00
•Understanding DNS: 00:12:00
•Applying DNS: 00:19:00
•The Hosts File: 00:04:00
•Net Command: 00:08:00
•Windows Name Resolution: 00:11:00
•Dynamic DNS: 00:05:00
•DNS Troubleshooting: 00:13:00
•Making TCP/IP Secure: 00:04:00
•Symmetric Encryption: 00:06:00
•Asymmetric Encryption: 00:03:00
•Cryptographic Hashes: 00:05:00
•Identification: 00:00:00
•Access Control: 00:04:00
•AAA: 00:05:00
•Kerberos/EAP: 00:00:00
•Single Sign-On: 00:10:00
•Certificates and Trust: 00:14:00
•Certificate Error Scenarios: 00:08:00
•Understanding IP Tunneling: 00:06:00
•Virtual Private Networks: 00:13:00
•Introduction to VLANs: 00:12:00
•InterVLAN Routing: 00:03:00
•Interfacing with Managed Switches: 00:11:00
•Switch Port Protection: 00:07:00
•Port Bonding: 00:07:00
•Port Mirroring: 00:04:00
•Quality of Service: 00:05:00
•IDS vs. IPS: 00:04:00
•Proxy Servers: 00:13:00
•Load Balancing: 00:09:00
•Device Placement Scenarios: 00:13:00
•Introduction to IPv6: 00:13:00
•IPv6 Addressing: 00:15:00
•IPv6 in Action: 00:13:00
•IPv4 and IPv6 Tunneling: 00:05:00
•Telephony Technologies: 00:09:00
•Optical Carriers: 00:03:00
•Packet Switching: 00:05:00
•Connecting with Dial-up: 00:05:00
•Digital Subscriber Line (DSL): 00:05:00
•Connecting with Cable Modems: 00:04:00
•Connecting with Satellites: 00:03:00
•ISDN and BPL: 00:04:00
•Remote Desktop Connectivity: 00:05:00
•Advanced Remote Control Systems: 00:09:00
•Introduction to 802.11: 00:12:00
•802.11 Standards: 00:12:00
•Power over Ethernet (PoE): 00:04:00
•Antennas: 00:09:00
•Wireless Security Standards: 00:16:00
•Implementing Wireless Security: 00:07:00
•Threats to Your Wireless Network: 00:07:00
•Retro Threats: 00:05:00
•Wi-Fi Protected Setup (WPS): 00:05:00
•Enterprise Wireless: 00:06:00
•Installing a Wireless Network: 00:15:00
•Wireless Scenarios: 00:07:00
•More Wireless Scenarios: 00:09:00
•Virtualization Basics: 00:07:00
•Cloud Ownership: 00:03:00
•Cloud Implementation: 00:12:00
•Your First Virtual Machine: 00:09:00
•NAS and SAN: 00:16:00
•Platform as a Service (PaaS): 00:09:00
•Software as a Service (SaaS): 00:03:00
•Infrastructure as a Service (IaaS): 00:10:00
•Cellular Technologies: 00:05:00
•Mobile Connectivity: 00:07:00
•Deploying Mobile Devices: 00:05:00
•Mobile Access Control: 00:06:00
•Network Types: 00:04:00
•Network Design: 00:10:00
•Power Management: 00:06:00
•Unified Communications: 00:11:00
•Network Documentation: 00:07:00
•Contingency Planning: 00:10:00
•Predicting Hardware Failure: 00:05:00
•Backups: 00:08:00
•What is Risk Management?: 00:06:00
•Security Policies: 00:08:00
•Change Management: 00:07:00
•User Training: 00:03:00
•Standard Business Documentation: 00:05:00
•Mitigating Network Threats: 00:05:00
•High Availability: 00:05:00
•Denial of Service: 00:09:00
•Malware: 00:10:00
•Social Engineering: 00:04:00
•Access Control: 00:08:00
•Man-in-the-Middle: 00:22:00
•Introduction to Firewalls: 00:05:00
•Firewalls: 00:10:00
•DMZ: 00:06:00
•Hardening Devices: 00:14:00
•Physical Security Controls: 00:09:00
•Testing Network Security: 00:08:00
•Network Protection Scenarios: 00:14:00
•SNMP: 00:15:00
•Documenting Logs: 00:09:00
•System Monitoring: 00:08:00
•SIEM (Security Information and Event Management): 00:07:00
•Network Troubleshooting Theory: 00:05:00
At Apex Learning, we share the goal of millions of people to mak...