CompTIA Network+ N10-007

CompTIA Network+ N10-007
Test scorm
Enquire Now

Looking to learn basic networking skills? The CompTIA Network+ is an internationally recognized certification, validating an individual’s fundamental IT networking knowledge and skills. This path covers the certification's objectives in order to help you get ready for the exam.

The course covers all the exam topics including:

  • Network architectures
  • Network Installation
  • Routing
  • Network operations
  • Ethernet basics
  • Network naming
  • TCP/IP applications and network protocols
  • Ipv6
  • Remote connectivity
  • Wireless networking
  • Managing risk
  • Cabling and topology
  • Advanced networking devices
  • Virtualization and more

Module 1 – Networking Concepts

1.1 Basic Networking
You will explain basic networking.

  • Intro to networking
  • Networking architectures
  • Activity Basic Networking

1.2 OSI Model
You will explain devices, applications, protocols, and services at their appropriate OSI layers.

  • Layer 7 – Application
  • Layer 6 – Presentation
  • Layer 5 – Session
  • Layer 4 – Transport
  • Layer 3 – Network
  • Layer 2 – Data Link
  • Layer 1 – Physical
  • Activity Exploring the OSI Model

1.3 Protocols and Ports
You will explain the purposes and uses of ports and protocols.

  • Protocols and ports overview
  • Activity Examining Protocols and Ports
  • Connection-oriented vs. connectionless
  • Transmission Control Protocol (TCP)
  • User Datagram Protocol (UDP)
  • Activity Comparing TCP and UDP
  • Internet Protocol (IP)
  • Internet Control Messaging Protocol (ICMP)
  • Internet Group Messaging Protocol (IGMP)
  • Activity Examining the Lower Layer Protocols
  • Layer 7 Remote Control Protocols
  • Layer 7 File Transfer Protocols
  • Layer 7 Messaging Protocols
  • Activity Examining Messaging Protocols
  • Layer 7 Web Traffic Protocols
  • Layer 7 Streaming Media Protocols
  • Layer 7 Infrastructure Management Protocols

1.4 Switching
You will explain the concepts and characteristics of switching.

  • Packet-switched vs. circuit-switched networks
  • Properties of Network Traffic
  • Contention Management
  • Activity Creating Collision and Broadcast Domains
  • Interface Properties and Segmentation
  • Activity Creating a Basic Network Segment
  • Switching part 2
  • Activity Switching
  • Switching Loop Management
  • Activity Managing Switching Loops
  • VLANs
  • Activity Creating VLANs

1.5 Routing
You will explain the concepts and characteristics of routing.

  • ARP
  • Activity Examining ARP
  • IP Addressing Basics
  • Activity Configuring IP
  • Routers
  • Activity Setting Up a Router
  • Routing Basics
  • Activity Adding Static Routes
  • VLAN Routing
  • Activity Routing Between VLANs
  • Activity Configuring NAT/PAT
  • Routing Protocols
  • Activity Configuring a Routing Protocol
  • Firewalls
  • Activity Configuring Firewalls

1.6 Advanced Switching and Routing Concepts
You will explain advanced switching and routing concepts.

  • IPv6 Concepts
  • Activity Exploring IPv6
  • Performance Concepts
  • Distributed Switching
  • Software-defined Networking

1.7 IP Addressing
You will, given a scenario, configure the appropriate IP addressing components.

  • Public vs. Private
  • Loopback and Reserved
  • Subnet Mask
  • Default Gateway
  • Virtual IP
  • Subnetting
  • Activity Learning to Subnet
  • Address Assignments

1.8 Network Types and Topologies
You will compare and contrast the characteristics of network topologies, types and technologies.

  • Wired Topologies
  • Wireless Topologies
  • Network Types
  • Technologies that Facilitate the Internet Of Things (IoT)
  • (No activity for this chapter)

1.9 Wireless Technologies
You will, given a scenario, implement the appropriate wireless technologies and configurations.

  • Radio Basics
  • 802.11 Standards
  • Wi-Fi Frequencies
  • Wi-Fi Antenna Concepts
  • Bluetooth
  • Cellular
  • Site Surveys
  • Activity Using an RF Spectrum Analyzer

1.10 Cloud Concepts
You will summarize cloud concepts and their purposes.

  • Types of Services
  • Cloud Delivery Models
  • Security Implications/Considerations
  • Activity Exploring Cloud Services

1.11 Network Services
You will explain the functions of network services.

  • DNS Service
  • Activity Setting up DNS
  • DHCP Service
  • Activity Setting Up DHCP
  • NTP
  • IPAM

Module 2 – Infrastructure

2.1 Cabling Solutions
You will, given a scenario, deploy the appropriate cabling solution.

  • Media Types
  • Activity Testing a Fiber Optic Cable
  • Plenum vs. PVC
  • Connector Types
  • Activity Crimping on an RJ-45 Connector
  • Transceivers
  • Termination Points
  • Activity Terminating Cable to a 110 Block
  • Copper Cable Standards
  • Copper Termination Standards
  • Activity Creating a Crossover Cable
  • Ethernet Deployment Standards

2.2 Network Device Placement and Installation
You will, given a scenario, determine the appropriate placement of networking devices on a network and install/configure them.

  • Network Interface
  • Repeater
  • Hub
  • Bridge
  • Switch
  • Router
  • Modem
  • Wireless Access Point
  • Activity Setting up a WAP
  • Firewall
  • Media Converter
  • Wireless Range Extender
  • VoIP Endpoint

2.3 Advanced Network Devices
You will explain the purposes and use cases for advanced networking devices.

  • Multilayer Switch
  • Wireless Controller
  • Load Balancer
  • Proxy Server
  • Activity Configuring Proxy Settings
  • VPN Concentrator
  • AAA/RADIUS Server
  • UTM Appliance
  • NGFW/Layer 7 Firewall
  • VoIP PBX
  • VoIP Gateway
  • Content Filter

2.4 Virtualization and Network Storage Technologies
You will explain the purposes of virtualization and network storage technologies.

  • Virtual Networking Components
  • Network Storage Types
  • Connection Types
  • Jumbo Frames
  • (No activity for this chapter)

2.5 WAN Technologies
You will compare and contrast WAN technologies.

  • Service Types
  • Transmission Mediums
  • Characteristics of Service
  • Activity Configuring WAN Links
  • Termination

Module 3 – Network Operations

3.1 Documentation
You will, given a scenario, use appropriate documentation and diagrams to manage the network.

  • Diagram Symbols
  • Standard Operating Procedures/Work Instructions
  • Logical vs. Physical Diagrams
  • Rack Diagrams
  • Change Management Documentation
  • Wiring and Port Locations
  • IDF/MDF Documentation
  • Labeling
  • Network Configuration and Performance Baselines
  • Inventory Management
  • Activity Using Documentation

3.2 Business Continuity and Disaster Recovery
You will compare and contrast business continuity and disaster recovery concepts.

  • Availability Concepts
  • Recovery
  • Activity Backing Up Your Data
  • MTTR
  • MTBF
  • SLA Requirements

3.3 Scanning, Monitoring, and Patching
You will explain common scanning, monitoring and patching processes and summarize their expected outputs.

  • Processes
  • Event Management
  • SNMP Monitors
  • Metrics
  • Activity Testing the Network

3.4 Remote Access Methods
You will, given a scenario, use remote access methods.

  • VPN
  • RDP
  • SSH
  • VNC
  • Telnet
  • HTTPS/Management URL
  • Remote File Access
  • Out-of-Band Management
  • Activity Making Remote Connections

3.5 Policies and Best Practices
You will identify policies and best practices.

  • Privileged User Agreement
  • Password Policy
  • On-boarding/Off-boarding Procedures
  • Licensing Restrictions
  • International Export Controls
  • Data Loss Prevention
  • Remote Access Policies
  • Incident Response Policies
  • BYOD
  • AUP
  • NDA
  • System Life Cycle
  • Safety Procedures And Policies
  • Activity Creating Policies and Procedures

Module 4 – Network Security

4.1 Physical Security Devices
You will summarize the purposes of physical security devices.

  • Detection
  • Prevention
  • (No activity for this chapter)

4.2 Authentication and Access Control
You will explain authentication and access controls.

  • Authorization, Authentication, and Accounting
  • Multifactor Authentication
  • Access Control
  • Activity Examining Access Control Mechanisms
  • 4.3 Basic Wireless Network Security

You will, given a scenario, secure a basic wireless network.

  • WPA
  • WPA2
  • TKIP-RC4
  • Authentication and Authorization
  • Geofencing
  • Activity Demonstrating the Need for Wireless Security

4.4 Common Network Attacks
You will summarize common networking attacks.

  • DoS
  • Social Engineering
  • Insider Threat
  • Logic Bomb
  • Rogue Access Point
  • Evil Twin
  • War-driving
  • Phishing
  • Ransomware
  • DNS Poisoning
  • ARP Poisoning
  • Spoofing
  • Deauthentication
  • Brute Force
  • VLAN Hopping
  • Man-in-the-Middle
  • Exploits vs. Vulnerabilities
  • Activity Conducting a Phishing Attack

4.5 Network Device Hardening
You will, given a scenario, implement network device hardening.

  • Changing Default Credentials
  • Avoiding Common Passwords
  • File Hashing
  • Generating New Keys
  • Activity Supporting Secure Authentication and Encryption
  • Upgrading Firmware
  • Patching and Updates
  • Disabling Unnecessary Services
  • Using Secure Protocols
  • Disabling Unused Ports

4.6 Common Mitigation Techniques
You will explain common mitigation techniques and their purposes.

  • Signature Management
  • Device Hardening
  • Change Native VLAN
  • Switchport Protection
  • Network Segmentation
  • Privileged User Account
  • File Integrity Monitoring
  • Role Separation
  • Restricting Access Via ACLs
  • Honeypot/Honeynet
  • Penetration Testing
  • Activity Implementing a Honeypot

Module 5 – Network Troubleshooting and Tools

5.1 Network Troubleshooting Methodology
You will explain the network troubleshooting methodology.

  • Identify the Problem
  • Establish a Theory of Probable Cause
  • Test the Theory to Determine the Cause
  • Establish a Plan of Action to Resolve the Problem and Identify Potential Effects
  • Implement the Solution or Escalate as Necessary
  • Verify Full System Functionality and , if Applicable, Implement Preventive Measures
  • Document Findings, Actions, and Outcomes
  • (No activity for this chapter)

5.2 Using the Appropriate Tool
You will, given a scenario, use the appropriate tool.

  • Hardware Tools – Basic Hand Held
  • Hardware Tools – Analyzers
  • Activity Troubleshooting with Hardware Tools
  • Software Tools – Testers and Analyzers
  • Activity Troubleshooting with Software Tools
  • Software Tools – Command Line
  • Activity Using Command Line Tools

5.3 Troubleshoot Wired Connectivity and Performance
You will, given a scenario, troubleshoot common wired connectivity and performance issues.
Signal Issues:

  • Attenuation
  • Latency
  • Jitter
  • Crosstalk
  • EMI
  • Activity Troubleshooting Signal Problems

Physical Issues:

  • Open/short
  • Incorrect pin-out
  • Incorrect Cable Type
  • Bad Port
  • Damaged cable
  • Bent pins

Transceiver Issues:

  • Transceiver mismatch
  • TX/RX reverse
  • Duplex/speed mismatch
  • Activity Troubleshooting Transceiver Problems

Traffic Flow Issues:

  • Bottleneck
  • VLAN mismatch
  • Network connection LED status indicators

5.4 Troubleshoot Wireless Connectivity and Performance
You will, given a scenario, troubleshoot common wireless connectivity and performance issues.
Signal Loss:

  • Attenuation
  • Reflection
  • Refraction
  • Absorption
  • Latency & Jitter

Antenna Issues:

  • Incorrect antenna type
  • Incorrect antenna placement
  • Incorrect WAP type

WAP Issues:

  • Interference
  • Channel overlap
  • Overcapacity
  • Distance limitations
  • Frequency mismatch
  • Power levels
  • Signal-to-noise ratio

WAP Misconfiguration:

  • Wrong SSID
  • Wrong passphrase
  • Security type mismatch
  • Activity Troubleshooting WAP Issues

5.5 Troubleshoot Common Network Service Issues
You will, given a scenario, troubleshoot common network service issues.

Common Network Issues:

  • Physical Connectivity
  • Incorrect IP Address
  • Incorrect Gateway
  • Incorrect Netmask
  • Names Not Resolving
  • Untrusted SSL Certificate

DHCP Issues:

  • Duplicate IP Addresses
  • Expired IP Address
  • Rogue DHCP
  • Exhausted DHCP Scope

Firewall/ACL Issues:

  • Blocked TCP/UDP Ports
  • Incorrect Host-based Firewall Settings
  • Incorrect ACL Settings

Advanced Network Issues:

  • DNS Server Issues
  • Duplicate MAC Addresses
  • Incorrect Time
  • Unresponsive Service
  • Hardware Failure

Activity Case Study:

  • Troubleshooting an Unusual

What learning resources are included?

Expert-led Video Courses

Our courses are video-based, expert instructor-led E-Learning, set in an advanced self-study format with enhanced user controls which offer a much better learning experience compared to traditional classroom training.

Unlike classroom-based training, you can play, pause, forward, rewind and repeat courses and learn at your own pace – anytime, anywhere.

Also included in the videos are demonstrations and visual presentations that allow students to develop their skills, based on real-world scenarios.

Our courses combine proven learning methodologies with the latest technology, ensuring that you have the tools you need to succeed and that you get the most value from your IT training investment.


Each course includes quizzes that measure your skills growth as you progress through your course as well as assess your readiness before you take the official certification exam. This allows you to gain confidence in preparation for the exam and helps ensure that you pass the exam the first time around.

Flash Cards & Educational Games

Students learn in different ways using different learning tools. That is why, in addition to the course videos and quizzes, we provide Flash Cards and Education Games for our courses. This will allow you to train in ways that keep you engaged and focused. Each course has dozens of Flash Cards so you can sharpen your skill-sets throughout your training as well as educational games designed to ensure optimized retention levels of the material.

Navigation & Controls

Our self-paced training programs are designed in a modular fashion that allows you the flexibility to work with expert level instruction anytime, anywhere. All courses are arranged in defined sections with navigation controls allowing you to control the pace of your training.

Discussion Board

Each course contains a discussion-board section where students can engage with one another. Ask questions, get advice and join in-group conversations as it relates to the particular course.

For how long will I be able to access the course?

The standard subscription period is one year. This can sometimes be longer, depending on if you have purchased courses on a promotion that specifically provides a longer access period.

If the access period is longer than one year, it will be indicated in the promotion.

Who presents the courses?

We only use the industry’s finest instructors. They have a minimum of 15 years’ experience, are subject matter experts in their fields and hold all the qualifications that are relevant to the particular certification.

Our instructors not only prepare you for your exams but also provides practical examples and scenarios based on real-world experience.

What Are The Requirements?


All our courses require an acumen for information technology, basic knowledge of computers, and experience in working with Microsoft Windows and internet browsers. All courses are presented in English and a good knowledge and understanding of English is essential.

In addition, each individual certification program has its own academic requirements. The prerequisite knowledge and experience required for each certification is available on the website of the respective certification vendor (CompTIA, Microsoft, Cisco etc.). It is of paramount importance that you ensure that you meet all the requirements (as set-out on the certification vendor’s website) before you enroll in a course.


  • A laptop or desktop computer with Microsoft Windows
  • An internet browser (Google Chrome, Internet Explorer, Firefox) that is up to date
  • High-speed/broadband internet access
  • Speakers or earphones

Can I view a course before I buy?


Yes. If you would like to view a demo of the course, please contact us and we will arrange an access to a demo for you.

What if I am not happy with the course I have purchased?

If for any reason you are not satisfied with your purchase, we will give you your money back – no hassle and no questions asked. Our refund policy is valid for 10 days from the date of your purchase and applies to all course purchases. To request a refund, simply contact us and we will process your refund within 24 hours.

What else do I need to know?

  • This is an online course - classroom training is not included.
  • You will only receive a qualification – from the relevant vendor - once you have passed the official international certification exam(s).
  • For detailed information on specific exam requirements, prerequisites, costs and other information, please visit the respective certification vendor’s website (CompTIA, Microsoft, Cisco etc.).
  • International certification centres – Prometric, VUE, CertiPort and others - depending on the particular vendor and certification, administer the official exams.
  • The cost of exams are not included in the course fees.
  • This course does not include Live Labs. Live Labs are available as stand-alone programs and in our CertKit’s where courses and labs are combined as bundles.

Why get certified?

Get a Job

Certification holds significant benefits for organizations – increasing your chances to gain employment and securing a career towards success.

  • Teams are trained to consistent skills levels.
  • Certification provides a recognised benchmark of skills that can be aligned to organisational skills frameworks.
  • Certificated people are typically more productive and work to consistent standards. A recent survey by Novell found that certification can reduce downtime, because staff members have the skills needed to cope with issues as they arise - and that certified people made more use of a product's advanced features and could deploy new products with greater ease.
  • More reliable project completion: a Microsoft survey showed that when 60% of a team is Microsoft-certified, 80% of projects are delivered on time and within budget, compared to just 40% when only 25% of the team is certified.
  • Gaining certifications can be aligned to performance-related pay.
  • Certification ensures that knowledge has been retained.
  • Greater customer satisfaction (internal and external customers).
  • Lower staff turnover.

Get Recognized

A professional certification sets a person apart as someone who is exceptional, who really knows his/her job. Gaining a professional certification is not easy - but then again, it is not meant to be. Sixty four per cent of IT recruiters rate certifications as having extremely high or high value in validating the skills and expertise of job candidates. (CompTIA, Employer Perceptions of IT Training and Certification, January 2011). Some of the benefits to individuals include:

  • Certified people are more employable: according to an IDC white paper, "Sixty-three percent of hiring managers believe certified individuals are more productive than their non-certified counterparts."
  • You could earn more: a survey of MCPs by IDC found that 43% got a pay rise after gaining their certification.
  • Some certifications make you part of a professional network, for example, Microsoft Certified Professionals belong to a community that only they can access.

Get Ahead

Professional certifications (whether IT or not) have been with us more than two decades - and, during that time, there has been considerable research undertaken to assess the benefits of certification.

Key findings from 'Measuring the pulse of the IT industry' - research undertaken by CompTIA:

  • 56% of managers consider CompTIA certification to be an important factor when hiring people and 34% go as far as to require it.
  • 53% of managers would offer a higher salary to a job candidate with CompTIA certification.
  • 74% of managers say that CompTIA certification is an important factor in considering a person for promotion.
  • 78% of managers believe that CompTIA certification is an important step in validating an employee's skills.
  • 53% of managers feel that having CompTIA-certified employees makes the organisation more attractive to business partners and clients.
  • A help desk with certified professionals can handle 11% more phone calls and 28% more field service calls, with a lower staff turnover rate (16% versus 24%).
  • Fewer certified staff are required to manage a network, resulting in lower salary costs.

Key findings from 'Financial Benefits to Supporters of Microsoft Professional Certification', a report by market research company IDC:

  • Companies with Microsoft Certified Professionals experienced shorter server downtimes and greater productivity in the help-desk function, which more than paid for the direct and indirect costs associated with certification.
  • The cost of certification in an average organisation is recouped in about four months. Its supporting survey showed that Microsoft Certified Professionals are more productive than non-certified support staff.

Key findings from an IDC study, 'Benefits and Productivity Gains Realised through IT Certification':

  • Certified professionals handled 40% more support calls per person, per day, than non-certified staff.
  • Companies that advocated for certification reported 49% less downtime than companies that did not.
  • For the majority of companies, the savings from increased effectiveness paid the costs of certification in fewer than 9 months.