Må vi gemme en cookie?

Vi bruger cookies for at forbedre din oplevelse af vores hjemmeside, målrette indhold samt statistik. Læs mere om cookies

Kurser

Kursusadministration

Brug for hjælp?

  • Gregersensvej 8
  • 2630 Taastrup
Google MapsApple MapsRejseplanen
  • Forskerparken Fyn, Forskerparken 10F
  • 5230 Odense M
Google MapsApple MapsRejseplanen
  • Teknologiparken Kongsvang Allé 29
  • 8000 Aarhus C
Google MapsApple MapsRejseplanen
  • NordsøcentretPostboks 104
  • 9850Hirtshals
Google MapsApple MapsRejseplanen
  • Gammel Ålbovej 1
  • 6092Sønder Stenderup
Google MapsApple MapsRejseplanen
365 dages online kursus

Online kursus: CompTIA Network+

CompTIA Network+ er en leverandøruafhængig certificering inden for IT-netværk. Du får viden om, hvordan du styrer, overvåger, konfigurerer, sikrer og fejlfinder på netværk. Kurset er rettet mod certificeringen N10-007 CompTia Network+ Certification Exam. Kurserne er på engelsk og foregår online, når det passer dig. Du har adgang til online kursuspakken i 365 dage.

online kurser

Værktøjer til netværksstyring

Netværk er de grundlæggende strukturer bag moderne kommunikationsdesign og er sammenkoblingen mellem alle computere – fra hjemme PC’er, til multinationale virksomheder, til internettet. For at forstå hvordan netværk fungerer er man nødt til at starte fra begyndelsen med de fundamentale byggeblokke om hvordan data bevæger sig fra et sted til et andet. Denne kursussamling giver dig en grundlæggende forståelse for netværksteori og arkitekturen bag datanetværk. Du vil få værktøjer til at styre, monitorere og konfigurere netværk samt blive i stand til at fejlfinde og sikre dine netværk ved hjælp af passende sikkerhedsmekanismer. Kurserne bringer dig forbi arkitektoniske koncepter og teknologier, der faciliterer the Internet of Things (IoT) samt koncepter vedrørende wide area networks (WAN).

Video

 

Deltagerprofil

Kursussamlingen henvender sig til administratorer, netværksteknikere, netværksinstallatører, helpdesk teknikkere, IT installatører og andre IT-fagfolk, der arbejder med computernetværk.

Udbytte

  • Lær nøglefærdighederne til at fejlfinde, konfigurere og styre data netværk.
  • Lær at styre netværk, der skal fungere på højeste sikkerhedsmæssige niveau.
  • Lær at arbejde med en bred vifte af hardware, software og netværk – Network+ nemlig leverandør neutral.

Indhold

Ports and Protocols and The OSI Model
  • start the course
  • describe the TCP protocol
  • describe the IP protocol
  • describe the UDP Protocol
  • describe the ICMP Protocol
  • recognize when to use connection-oriented protocols
  • recognize when to use connectionless protocols
  • list the well-known UDP and TCP ports
  • describe which protocols and ports are in use by certain services
  • describe the purpose of the OSI model
  • list the devices, applications, protocols, and services that function at the physical layer
  • list the devices, applications, protocols, and services that function at the data link layer
  • list the devices, applications, protocols, and services that function at the network layer
  • list the devices, applications, protocols, and services that function at the transport layer
  • list the devices, applications, protocols, and services that function at the session layer
  • list the devices, applications, protocols, and services that function at the presentation layer
  • list the devices, applications, protocols, and services that function at the application layer
  • list characteristics of each OSI layer
Routing, Switching, & IP Adressing
  • start the course
  • describe concepts and characteristics of network traffic, such as Broadcast, Multicast, and Unicast
  • describe concepts and characteristics of network traffic such as broadcast domains, CSMA/CD, CSMA/CA, and Collision domains
  • describe concepts and characteristics of segmentation
  • describe the purpose and characteristics of hubs, switches, and routers
  • describe concepts and characteristics of routing protocols
  • describe concepts and characteristics of IPv6 such as addressing, dual stack, router advertisement, and neighbor discovery
  • describe concepts and characteristics of performance concepts such as traffic shaping, QoS, Diffserv, and CoS
  • describe concepts and characteristics of NAT and PAT
  • describe concepts and characteristics of port forwarding
  • describe concepts and characteristics of access control lists
  • provide scenarios on when to use private and public IP addressing options
  • recognize scenarios of when to use loopback and reserved addresses
  • list scenarios of when to implement default gateways and subnet masks
  • provide scenarios and illustrate how to configure virtual IP addresses
  • configure address assignments such as DHCP, static, APIPA, and IP reservations
  • perform base 2 conversions
  • describe concepts of binary to decimal conversion and determining the size of a subnet
  • subnet a class c network
  • subnet a class b network
  • subnet a class a network
  • perform supernetting
  • determine the address ranges of subnets
  • configure a basic subnetting scenario
Network Topologies & Technologies
  • start the course.
  • recognize the characteristics and differences of logical and physical, start, ring, mesh, and bus topologies
  • list the main characteristics of the ad hoc and infrastructure wireless topologies
  • recognize the features and benefits of using LAN, WLAN, MAN, WAN, CAN, and SAN
  • describe technologies that facilitate the Internet of Things, such as Z-Wave, ANT, Bluetooth, NFC, IR, RFID, and 802.11
  • list the various wired and wireless topologies
  • identify scenarios in which to implement 802.11 standards, including a, b, g, n, and ac
  • identify scenarios in which to implement cellular technologies, such as GSM, TDMA, and CDMA
  • provide scenarios in which to configure frequencies, such as 2.4 GHz and 5.0 GHz
  • list the various speed and distance requirements for wireless technologies, based on given scenarios
  • provide a scenario and configure channel bandwidth
  • provide a scenario and configure channel bonding
  • provide scenarios on when and how to configure MIMO/MU-MIMO
  • use unidirectional and omnidirectional antennas, given a certain scenario
  • provide a scenario and configure a wireless site survey
  • configure wireless standards such as a, b, g, n, and ac
Cloud Concepts, Network Services, & Cabling Solutions
  • Start the course
  • describe the types of services available such as SaaS, PaaS, and IaaS
  • list private, public, and hybrid cloud delivery features
  • summarize the available connectivity methods
  • recognize security implications and considerations
  • summarize the relationship between local and cloud resources
  • list features for each cloud delivery model
  • describe how DNS works
  • describe internal vs. external DNS and the structure of DNS namespaces
  • describe the authoritative server of a DNS zone
  • recognize when to use the various types of DNS records such as A, SRV, CNAM, etc.
  • describe how the DHCP service works
  • describe the features and functions of NTP
  • describe the features and functions of IPAM
  • recognize when to implement each DNS record type
  • implement the appropriate media type
  • determine when to deploy plenum vs. pvc
  • recognize when to use copper connector types
  • recognize when to use fiber connector types
  • determine the appropriate transceiver to use
  • recognize when to use certain termination points
  • deploy the proper copper cable standards
  • deploy the appropriate copper termination standards
  • deploy Ethernet standards based on a certain scenarios
  • deploy the appropriate cabling solution in a scenario
Networking Devices
  • start the course
  • determine where to place and configure firewalls
  • recognize where to deploy and how to configure switches depending on the scenario
  • place switches and hubs and configure them based on circumstances
  • deploy a bridge device and configure it based on a certain scenario
  • recognize when to use modems and how to configure them
  • determine where to deploy a wireless access point and configure it
  • recognize where to place media converters and how to configure them based on a given scenario
  • place and configure wireless range extenders appropriately
  • deploy and configure VoIP endpoints
  • describe the characteristics of network devices and how they are used
  • recognize when to use multilayered switches
  • list the features of a wireless controller
  • determine when to deploy a load balancer device
  • recognize when to use Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) devices
  • recognize when and where to place proxy servers on a network
  • determine when and where to implement VPN concentrators
  • recognize when to implement AAA services such as RADIUS and TACACS+
  • determine when to deploy UTM appliances
  • provide use cases for NGFW and layer 7 firewall devices
  • determine when and where to configure VoIP gateways
  • recognize when to deploy devices that filter content
  • configure advanced networking devices
Network Storage, Virtualization, & WAN Technologies
  • start the course
  • describe virtual networking components such as virtual switches, firewalls, NIC, routers, hypervisor
  • describe virtual networking components such as virtual switches, firewalls, NIC, routers, hypervisor
  • describe network storage types such as NAS and SAN
  • describe network storage types such as NAS and SAN
  • recognize when to use certain connection types such as FCoE, Fibre Channel, iSCSI
  • describe jumbo frames
  • configure virtualization features
  • compare and contract difference service types such as ISDN, T1/T3, E1/E3, OC-3 – OC-192, DSL, Metropolitan Ethernet, Cable broadband, Dial-up
  • compare and contract difference service types such as ISDN, T1/T3, E1/E3, OC-3 – OC-192, DSL, Metropolitan Ethernet, Cable broadband, Dial-up
  • compare different WAN transmission mediums such as Satellite, Copper, Fiber
  • compare the various characteristics of service such as MPLS, ATM, Frame relay, PPPoE, PPP, DMVPN, SIP trunk
  • compare the various characteristics of service such as MPLS, ATM, Frame relay, PPPoE, PPP, DMVPN, SIP trunk
  • compare and contract different terminations such as Demarcation point, CSU/DSU, Smart jack
Documentation and Diagrams & Business Continuity
  • start the course
  • use appropriate diagram symbols
  • use standard operating procedures and work instructions
  • use appropriate logical and physical diagrams
  • use rack diagrams
  • implement change management documentation
  • use wiring and port locations
  • implement IDF and MDF documentation
  • ensure proper labeling
  • use network configuration and performance baselines
  • implement an inventory management solution
  • implement appropriate diagrams and documents
  • compare and contrast availability concepts
  • describe power management concepts
  • recognize when to use recovery options
  • recognize when to use backup options
  • implement MTTF
  • use MTBF
  • describe SLA requirements
  • deploy disaster recovery solutions
Network Monitoring & Remote Access Methods
  • start the course
  • describe common processes such as log reviewing, port scanning, and vulnerability scanning
  • describe common maintenance tasks such as patch management, rollback, reviewing baselines, and packet/traffic analysis
  • describe common event management processes such as notifications, alerts, and SIEM
  • recognize and describe common SNMP monitor processes such as MIB
  • describe common metrics such as error rate, utilization, packet drops, and bandwidth/throughput
  • implement patch management, event monitoring, and notifications
  • use a VPN including IPsec, SSL/TLS/DTLS, site-to-site, and client-to-site in a scenario
  • use RDP in a scenario
  • use SSH in a scenario
  • use VNC in a scenario
  • use telnet in a scenario
  • use an HTTPS management URL in a scenario
  • use remote file access such as FTP/FTPS, SFTP, and TFTP
  • use out-of-band management such as a modem or console router
  • configure remote access methods in a given scenario
Policies and Best Practices
  • start the course
  • identify privileged user agreements
  • recognize appropriate password policies
  • describe onboarding and offboarding techniques
  • recognize appropriate licensing restrictions
  • describe international export controls
  • describe data loss prevention techniques
  • deploy remote access policies
  • deploy incident response policies
  • describe appropriate situations to use BYOD, AUP, and NDA
  • describe best practices for system life cycles such as asset disposal
  • recall safety procedures and policies
  • incorporate best practice guidelines
Security Devices, Wireless Security, & Access Control
  • start the course
  • recognize when to implement motion detection and video surveillance
  • identify when to implement asset tracking
  • describe the purpose of tamper detection
  • summarize the purpose of prevention techniques such as badges, biometrics, smart cards, key fobs, and locks
  • recognize when to implement physical security devices
  • describe authentication, authorization, and accounting features such as Kerberos, Single Sign-On, auditing, and logging
  • describe additional authentication types including local authentication, LDAP, and certificates
  • describe multifactor authentication types
  • recognize the various access control features such as 802.1x, NAC, port security, MAC filtering, captive portal, and access control lists
  • implement access control
  • implement WPA and WPA2 in a scenario
  • implement TKIP-RC4 in a scenario
  • implement authentication and authorization features such as EAP, PEAP, EAP-FAST, EAP-TLS, shared or open, preshared key, and MAC filtering
  • implement geofencing in a scenario
  • secure a wireless network
    • start the course
    • summarize DoS attacks such as reflective, amplified, and distributed
    • recognize social engineering
    • recognize insider threats
    • describe logic bombs and evil twin attacks
    • describe wardriving and phishing
    • recognize rogue access points and spoofing
    • summarize DNS and ARP poisoning attacks
    • describe ransomware
    • summarize deauthentication and brute force attacks
    • recognize VLAN hopping and man-in-the-middle attacks
    • differentiate between exploits and vulnerabilities
    • recognize various network attacks
    • choose strong passwords
    • update firmware
    • implement patches and updates
    • implement file hashing
    • disable unnecessary services
    • implement secure protocols
    • implement cryptography
    • generate new keys
    • disable unused ports such as IP ports and device ports
    • implement network device hardening
    Mitigation Techniques
    • start the course
    • describe signature management
    • describe device and host hardening
    • recognize when to change native VLANs
    • recognize switch port configuration using the Spanning Tree Protocol, BPDU guard, and root guard
    • recognize switch port protection such as ARP poisoning, DHCP snooping, and MAC filtering
    • describe network segmentation techniques such as DMZ and VLAN
    • understand when to use privileged user accounts
    • describe file integrity
    • describe role separation
    • recognize when to use access control lists
    • describe honeypots
    • recognize the benefits of penetration testing
    • implement mitigation techniques
    Troubleshooting Methodology & Tools
    • start the course
    • identify a user's problem by following the network troubleshooting methodology
    • establish a theory of probable cause by questioning the obvious and considering multiple approaches
    • test a theory to determine the cause and next steps, and if escalation is required
    • establish a plan of action to resolve problems and identify potential effects
    • implement an appropriate solution or escalate if required
    • verify full system functionality and implement preventative measures
    • document findings, actions, and outcomes
    • apply the network troubleshooting methodology to fix network issues
    • use hardware tools to fix network hardware issues
    • use a packet sniffer to intercept and log network traffic
    • use a port scanner to identify which ports are open on a network
    • use a WiFi analyzer to detect usage
    • use a bandwidth speed tester
    • use network troubleshooting command line tools
    • use Linux command line tools
    • use various network troubleshooting tools
    Troubleshooting Connectivity & Performance Issues
    • start the course
    • troubleshoot attenuation, latency and jitter given a scenario
    • given a scenario troubleshoot crosstalk and EMI
    • given a scenario troubleshoot opens or cable shorts
    • given a scenario troubleshooting incorrect pinouts and cable types
    • troubleshoot duplex and transceiver mismatches given a scenario
    • troubleshoot bad ports, bottlenecks and VLAN mismatches
    • troubleshoot damaged cables and bent pins
    • troubleshoot network connection LED status indicators
    • troubleshoot wired connectivity issues
    • given a scenario toubleshoot reflection, refraction and latency
    • given a scenario troubleshoot latency, jitter and attenuation
    • troubleshoot incorrect antenna types and antenna placements
    • troubleshoot interference, overcapacity, and channel overlap
    • given a scenario, troubleshoot distance limitation issues and frequenc mismatches
    • troubleshoot issues caused by wrong SSIDs and passphrases
    • given a scenario troubleshoot security type mismatches
    • troubleshoot issues related to power levels and signal-to-noise ratio
    • troubleshoot wireless connectivity issues
    Troubleshooting Common Network Service Issues
    • start the course
    • correct issues relating to incorrect gateway or netmask
    • troubleshoot issues caused by duplicate IP and MAC addresses
    • troubleshoot issues where names are not resolving
    • troubleshoot issues caused by expired DHCP scopes and rogue DHCP servers
    • correct issues caused by expired ip addresses and incorrect system times
    • troubleshoot issues caused by untrusted SSL certificates and blocked tcp/udp ports
    • troubleshoot issues cause by incorrect firewall and acl settings
    • correct issues caused by hardware failures and unresponsive services
    • troubleshoot network service issues
    Tidsforbrug

    Kursuspakken består af 15 kurser, hvor hvert kursus gennemsnitligt varer ca. to timer. Hele kursuspakken kan således gennemføres på ca. 28 timer.

    Form

    Denne online kursuspakke består af flere forskellige kurser, som du ved tilmelding har adgang til i 365 dage. Hvert enkelt kursus er opdelt i flere kursusmoduler, som du via en oversigtsmenu kan tage i den rækkefølge, du ønsker. Modulerne indeholder lyd, billeder og tekst, der gennemgår kursusindholdet. Nogle moduler indeholder små videofilm med scenarier og cases. Ved hvert kursus har du mulighed for at teste din forståelse af indholdet med tests, som du kan tage både før, under og efter kurset. Du gennemfører kursusmodulerne via din computer eller tablet med lyd og adgang til Internettet. Du kan selv styre, hvornår du vil tage modulerne – og de kan sættes på pause undervejs. Der bliver indsat bogmærker, der hvor du er nået til, så du altid har mulighed for at fortsætte, hvor du sidst kom til.

    Læs mere om vores online kurser og se svar på dine spørgsmål (FAQ)

    Certificering

    Dette kursus leder hen mod eksamen N10-007 CompTia Network+ Certification Exam. Eksamen bestilles og betales særskilt. Vi henviser til certificeringsudbyderens hjemmeside for nærmere information om aktuelle betingelser for at opnå certificering. Vær venligst opmærksom på, at der er overensstemmelse mellem den certificeringsversion, du har forberedt dig på og den version, du bestiller eksamen i.

    Læs mere om IT-certificering.

    Søgte du et andet online kursus?

    Vi tilbyder over 7.000 forskellige online kurser inden for mange forskellige områder. Kontakt os på tlf. 72203000 eller kurser@teknologisk.dk, så vi kan hjælpe med at imødekomme dit behov.

    Se desuden listen over vores udvalgte online kurser.

    Køb online kurser til flere

    Er I en afdeling, en hel virksomhed eller blot flere personer, der ønsker adgang til online kurser, så kontakt os og få et tilbud på tlf. 72203000 eller kurser@teknologisk.dk

    Downloads
    Har du faglige spørgsmål så kontakt
    Andre kurser