CompTIA N+ Certification Course in Delhi

image
image
image
image
image
image
IICSEH

CompTIA N+

Section-1 Network architecture:


1.1 Explain the functions and applications of various network devices
  • Router
  • Switch
  • Multilayer switch
  • Firewall
  • HIDS
  • IDS/IPS
  • Analog modem

1.2 Install and configure the following networking services/applications DHCP
  • Static vs dynamic IP addressing
  • Reservations
  • Scopes
  • Leases
  • Options (DNS servers, suffixes)
  • IP helper/DHCP relay

  • DNS
  • DNS servers
  • DNS records (A, MX, AAAA, CNAME, PTR)
  • Dynamic DNS

  • Proxy/reverse proxy NAT
  • PAT
  • SNAT
  • DNAT
  • Port forwarding

1.3 Differentiate between common network topologies
  • Mesh
  • Bus
  • Ring
  • Star
  • Hybrid
  • Point-to-point
  • Point-to-multipoint
  • Client-server
  • Peer-to-peer

1.4 Differentiate between network infrastructure implementations
  • WAN
  • MAN
  • LAN
  • WLAN
  • PAN
  • SCADA/ICS
  • Medianets
  • VTC
  •  ISDN
  •  IP/SIP

1.5 Explain the basics of routing concepts and protocols
  • Loopback interface
  • Routing loops
  • Routing tables
  • Static vs dynamic routes
  • Default route
  • Distance vector routing protocols
  • RIP v2
  • Hybrid routing protocols
  • BGP
  • Link state routing protocols
  • OSPF
  • IS-IS
  • Interior vs exterior gateway routing protocols
  • Autonomous system numbers
  • Route redistribution
  • High availability
  • VRRP
  • Virtual IP
  • HSRP
  • Route aggregation
  • Routing metrics
  • Hop counts
  • MTU, bandwidth
  • Costs
  • Latency
  • Administrative distance
  • SPB

Section-2 Network operations


2.1 Given a scenario, use appropriate monitoring tools
  • Packet/network analyzer
  • Interface monitoring tools
  • Port scanner
  • Top talkers/listeners
  • SNMP management software
  • Trap
  • Get
  • Walk
  • MIBS
  • Alerts
  • Email
  • SMS
  • Packet flow monitoring
  • SYSLOG
  • SIEM
  • Environmental monitoring tools
  • Temperature
  • Humidity
  • Power monitoring tools
  • Wireless survey tools
  • Wireless analyzers

2.2 Given a scenario, configure a switch using proper features
  • VLAN
  • Native VLAN/Default VLAN
  • VTP
  • Spanning tree (802.1d)/rapid spanning tree (802.1w)
  • Flooding
  • Forwarding/blocking
  • Filtering
  • Interface configuration
  • Trunking/802.1q
  • Tag vs untag VLANs
  • Port bonding (LACP)
  • Port mirroring (local vs remote)
  • Speed and duplexing
  • IP address assignment
  • VLAN assignment
  • Default gateway
  • PoE and PoE+ (802.3af, 802.3at)
  • Switch management
  • User/passwords
  • AAA configuration
  • Console
  • Virtual terminals
  • In-band/Out-of-band management
  • Managed vs unmanaged

Section-3 Network security


3.1 Compare and contrast risk related concepts
  • Disaster recovery
  • Business continuity
  • Battery backups/UPS
  • First responders
  • Data breach
  • End user awareness and training
  • Single point of failure
  • Critical nodes
  • Critical assets
  • Redundancy
  • Adherence to standards and policies
  • Vulnerability scanning
  • Penetration testing

3.2 Compare and contrast common network vulnerabilities and threats
  • Attacks/threats
  • Denial of service
  • Distributed DoS
  • Botnet
  • Traffic spike
  • Coordinated attack
  • Reflective/amplified
  • DNS
  • NTP
  • Smurfing
  • Friendly/unintentional DoS
  • Physical attack
  • Permanent DoS
  • ARP cache poisoning
  • Packet/protocol abuse
  • Spoofing
  • Wireless
  • Evil twin
  • Rogue AP
  • War driving
  • War chalking
  • Bluejacking
  • Bluesnarfing
  • WPA/WEP/WPS attacks
  • Brute force
  • Session hijacking
  • Social engineering
  • Man-in-the-middle
  • VLAN hopping
  • Compromised system
  • Effect of malware on the network
  • Insider threat/malicious employee
  • Zero day attacks
  • Vulnerabilities
  • Unnecessary running services
  • Open ports
  • Unpatched/legacy systems
  • Unencrypted channels
  • Clear text credentials
  • Unsecure protocols
  • TELNET
  • HTTP
  • SLIP
  • FTP
  • TFTP
  • SNMPv1 and SNMPv2
  • TEMPEST/RF emanation

3.3 Given a scenario, install and configure a basic firewall
  • Types of firewalls
  • Host-based
  • Network-based
  • Software vs hardware
  • Application aware/context aware
  • Small office/home office firewall
  • Stateful vs stateless inspection
  • UTM
  • Settings/techniques
  • ACL
  • Virtual wire vs routed
  • DMZ
  • Implicit deny
  • Block/allow
  • Outbound traffic
  • Inbound traffic
  • Firewall placement
  • Internal/external

3.4 Explain the purpose of various network access control models
  • 802.1x
  • Posture assessment
  • Guest network
  • Persistent vs non-persistent agents
  • Quarantine network
  • Edge vs access control
    • Section-4 Troubleshooting


      4.1 Given a scenario, implement the following network troubleshooting methodology
      • Identify the problem
      • Gather information
      • Duplicate the problem, if possible
      • Question users
      • Identify symptoms
      • Determine if anything has changed
      • Approach multiple problems individually
      • Establish a theory of probable cause
      • Question the obvious
      • Consider multiple approaches
      • Top-to-bottom/bottom-to-top OSI model
      • Divide and conquer
      • Test the theory to determine cause
      • Once theory is confirmed, determine next steps to resolve problem
      • If theory is not confirmed, re-establish new theory or escalate
      • Establish a plan of action to resolve the problem and identify potential effects
      • Implement the solution or escalate as necessary
      • Verify full system functionality and if applicable implement preventative
      • measures
      • Document findings, actions, and outcomes

      4.2 Given a scenario, analyze and interpret the output of troubleshooting tools
      • Command line tools
      • ipconfig
      • netstat
      • ifconfig
      • ping/ping6/ping -6
      • tracert/tracert -6/traceroute6/traceroute -6
      • nbtstat
      • nslookup
      • arp
      • mac address lookup table
      • pathping
      • Line testers
      • Certifiers
      • Multimeter
      • Cable tester
      • Light meter
      • Toner probe
      • Speed test sites
      • Looking glass sites
      • WiFi analyzer
      • Protocol analyzer

      4.3 Given a scenario, troubleshoot and resolve common copper cable issues
      • Shorts
      • Opens
      • Incorrect termination (mismatched standards)
      • Straight-through
      • Crossover
      • Cross-talk
      • Near end
      • Far end
      • EMI/RFI
      • Distance limitations
      • Attenuation/Db loss
      • Bad connector
      • Bad wiring
      • Split pairs
      • Tx/Rx reverse
      • Cable placement
      • Bad SFP/GBIC - cable or transceiver

      4.4 Given a scenario, troubleshoot and resolve common security issues
      • Misconfigured firewall
      • Misconfigured ACLs/applications
      • Malware
      • Denial of service
      • Open/closed ports
      • ICMP related issues
      • Ping of death
      • Unreachable default gateway
      • Unpatched firmware/OSs
      • Malicious users
      • Trusted
      • Untrusted users
      • Packet sniffing
      • Authentication issues
      • TACACS/RADIUS misconfigurations
      • Default passwords/settings
      • Improper access/backdoor access
      • ARP issues
      • Banner grabbing/OUI
      • Domain/local group configurations
      • Jamming

      Section-5 Industry standards, practices, and network theory


      5.1 Analyze a scenario and determine the corresponding OSI layer
      • Layer 1 – Physical
      • Layer 2 – Data link
      • Layer 3 – Network
      • Layer 4 – Transport
      • Layer 5 – Session
      • Layer 6 – Presentation
      • Layer 7 – Application

      5.2 Explain the basics of network theory and concepts
      • Encapsulation/de-encapsulation
      • Modulation techniques
      • Multiplexing
      • De-multiplexing
      • Analog and digital techniques
      • TDM
      • Numbering systems
      • Binary
      • Hexadecimal
      • Octal
      • Broadband/base band
      • Bit rates vs baud rate
      • Sampling size
      • CDMA/CD and CSMA/CA
      • Carrier detect/sense
      • Wavelength
      • TCP/IP suite
      • ICMP
      • UDP
      • TCP
      • Collision

      5.3 Given a scenario, deploy the appropriate wireless standard
      • 802.11a
      • 802.11b
      • 802.11g
      • 802.11n
      • 802.11ac

      5.4 Given a scenario, implement the appropriate policies or procedures
      • Security policies
      • Consent to monitoring
      • Network policies
      • Acceptable use policy
      • Standard business documents
      • SLA
      • MOU
      • MLA
      • SOW

      5.5 Compare and contrast the following ports and protocols
      • 80 HTTP
      • 443 HTTPS
      • 137-139 Netbios
      • 110 POP
      • 143 IMAP
      • 25 SMTP
      • 5060/5061 SIP
      • 2427/2727 MGCP
      • 5004/5005 RTP
      • 1720 H.323
      • TCP
      • Connection-oriented
      • UDP
      • Connectionless