معرفی دوره  Network+

 

اگر قصد داشته باشیدکه در حوزه شبکه‌های کامپیوتری فعالیت کنید، باید بدانید که دوره نتورک پلاس (+CompTIA Network) به عنوان دوره مقدماتی شبکه، در حقیقت مانند الفبای شبکه‌های کامپیوتری است که افزون بر این‌که مقدمه‌ای برای آموزش تمامی مهارت‌های مرتبط با شبکه‌های کامپیوتری است،‌پیش‌نیاز دوره‌های تخصصی مایکروسافت (MCSE) و سیسکو (CCNA) نیز محسوب می‌گردد.

این دوره توسط انجمن CompTIA (Computing Technology Industry Association) که در واقع انجمن صنایع فناوری‌های کامپیوتری است، ارائه گردیده است که در آن مبانی شبکه آموزش داده می‌شود. بنابراین مدرکی که افراد در پایان دوره دریافت می‌کنند، به کمپانی یا دستگاه‌های مخصوصی تعلق ندارد و این مفاهیم اولیه در کل حوزه شبکه مورد استفاده قرار خواهد گرفت. vendor-neutral ویژگی تمامی مدارکی است که انجمن   CompTIA ارائه می‌دهد و معنای آن همان عمومی بودن مدرک دریافتی در حوزه شبکه و عدم وابستگی آن به یک کمپانی تولیدکننده خاص است.

افرادی در دوره نتورک پلاس شرکت می‌کنند با شیوه‌های مسیریابی، IP‌، انواع پروتکل، انواع تجهیزات شبکه و …. آشنا می‌شوند و پس از پایان دوره به مهارت‌های زیر دست پیدا می کنند:

  • آشنایی با چگونگی نصب، راه‌اندازی و پیاده‌سازی شبکه
  • آشنایی با انواع شبکه
  • آشنایی با انواع توپولوژی‌های شبکه
  • قابلیت تشخیص عیوب شیکه
  • آشنایی با شیوه‌های انتقال اطلاعات، محیط و تجهیزات شبکه
  • کسب دانش و مهارت لازم برای ورود به دوره‌های تخصصی و حرفه‌ای شبکه

علاقه‌مندان بعد از طی دوره مقدماتی نتورک پلاس می‌توانند با توجه به علاقه‌ی خود، در هرکدام از گرایش‌های تخصصی مایکروسافت و یا سیسکو آموزش ببینند. این دو گرایش هیچ اولویتی به دیگری ندارد.

 

مدت زمان دوره :  40 ساعت

 

نام مدرس : مسعود کیمیایی

 

سرفصل های دوره :

 

 

OSI Layers, Ports, and Protocols

  • OSI Layers, Ports & Protocols: A Tale of Two Kings
  • OSI Layers, Ports & Protocols: The 7 Layers of the OSI Model
  • OSI Layers, Ports & Protocols: TCP/IP Suite Layers
  • OSI Layers, Ports & Protocols: Core TCP/IP Protocols
  • OSI Layers, Ports & Protocols: Wireshark Views of Core TCP/IP Protocols
  • OSI Layers, Ports & Protocols: How Ports Are Used in TCP/IP
  • OSI Layers, Ports & Protocols: Verifying L4 Ports with Wireshark
  • OSI Layers, Ports & Protocols: Common Protocols and Their Well-known Ports
  • OSI Layers, Ports & Protocols: TCP’s Three-way Handshake
  • OSI Layers, Ports & Protocols: Wireshark Verification of a TCP 3-Way Handshake

Ethernet Switching

  • Ethernet Switching: Properties of Network Traffic
  • Ethernet Switching: Layer 2 Ethernet Addresses
  • Ethernet Switching: How a Layer 2 Switch Works
  • Ethernet Switching: Demonstration: Switch Dynamic Learning
  • Ethernet Switching: Understanding VLANs
  • Ethernet Switching: Configuring a VLAN
  • Ethernet Switching: Overview of 802.1Q and Trunks
  • Ethernet Switching: Configuring an 802.1Q Ethernet Trunk
  • Ethernet Switching: How Address Resolution Protocol (ARP) Operates
  • Ethernet Switching: Predicting the MAC Address Table
  • Ethernet Switching: Validating MAC Address Table Predictions
  • Ethernet Switching Game: Predict MAC Table After PC1 Pings PC4
  • Ethernet Switching Game: Predict MAC Table After PC3 Pings PC5
  • Ethernet Switching: Switching Loops and Spanning Tree Protocol (STP)
  • Ethernet Switching: STP Reacting to a Network Change
  • Ethernet Switching: Design Considerations and PoE
  • Ethernet Switching: Switch Port Mirroring

IP Routing and Forwarding

  • IP Routing and Forwarding: Introduction to IP Routing
  • IP Routing and Forwarding: How to Train a Router
  • IP Routing and Forwarding: Options for Static Routes
  • IP Routing and Forwarding: Configuring Static Routes
  • IP Routing and Forwarding: Dynamic Routing Protocol Overview
  • IP Routing and Forwarding: Dynamic Routing Protocol Demonstration
  • IP Routing and Forwarding: Address Translation with PAT
  • IP Routing and Forwarding: One-to-one Translations with NAT
  • IP Routing and Forwarding: Using Wireshark to Verify IP Translations
  • IP Routing and Forwarding: Access Control Lists
  • IP Routing and Forwarding: ACL Demonstration
  • IP Routing and Forwarding: Enterprise Network Forwarding

IP Addressing and Subnetting

  • IP Addressing and Subnetting: IPv4 Overview
  • IP Addressing and Subnetting: Binary Basics
  • IP Addressing and Subnetting: Converting Decimal to Binary
  • IP Addressing and Subnetting: Converting Binary to Decimal
  • IP Addressing and Subnetting: The IP Mask
  • IP Addressing and Subnetting: Practice Using a Different IP Mask
  • IP Addressing and Subnetting: Borrowing Host Bits
  • IP Addressing and Subnetting: Practicing the Finger Game
  • IP Addressing and Subnetting: Identifying New Subnets
  • IP Addressing and Subnetting Exercise 1: Identify the New Subnets
  • IP Addressing and Subnetting Exercise 2: Identify the New Subnets
  • IP Addressing and Subnetting: ID Valid Host Addresses on a Subnet
  • IP Addressing and Subnetting Exercise 1: ID Valid Host Addresses
  • IP Addressing and Subnetting Exercise 2: ID Valid Host Addresse
  • IP Addressing and Subnetting: Calculate the Number of Hosts per Subnet
  • IP Addressing and Subnetting: Determine the Subnet Based on a Host’s IP Address
  • IP Addressing and Subnetting: Planning and Assigning IP Addresses
  • IP Addressing and Subnetting: Test Your IPv4 Knowledge Lab
  • IP Addressing and Subnetting: IPv6 Concepts

Network Topologies, Types, and Technologies

  • Network Topologies: Wired Topologies
  • Network Topologies: Wireless Topologies
  • Network Topologies: Types of Networks
  • Network Topologies: Introducing the Internet of Things (IoT)
  • Network Topologies: Internet of Things (IoT) Technologies

Wireless Technologies, Configurations, and Security

  • Wireless Technologies and Configurations: The Purpose of Wireless
  • Wireless Technologies and Configurations: Understanding Radio Frequency
  • Wireless Technologies and Configurations: Understanding Radio Channels
  • Wireless Technologies and Configurations: Wireless Communication Technologies
  • Wireless Technologies and Configurations: Designing for Wireless Speed and Coverage
  • Wireless Technologies and Configurations: Understanding Wireless Antennas
  • Wireless Technologies and Configurations: Wireless Performance Improvements

Network Services

  • Network Services: DHCP Overview
  • Network Services: Verify DHCP with Wireshark
  • Network Services: DNS Overview
  • Network Services: DNS Methods, Records, and Design Options
  • Network Services: DNS Testing and Validation
  • Network Services: Network Time Protocol (NTP)
  • Network Services: IP Address Management (IPAM)

Deploying Appropriate Cable Solutions

  • Deploying Appropriate Cabling Solutions: Copper Network Media Types
  • Deploying Appropriate Cabling Solutions: Fiber Network Media Types
  • Deploying Appropriate Cabling Solutions: Network Termination Points
  • Deploying Appropriate Cabling Solutions: Network Transceivers

Device Placement and Configuration

  • Device Placement and Configuration: Network Device Placement
  • Device Placement and Configuration: Device Configuration Overview
  • Device Placement and Configuration: Configure Switch Ports Lab
  • Device Placement and Configuration: Configure IP Addresses Lab
  • Device Placement and Configuration: Configure IP Routing Lab
  • Device Placement and Configuration: Configuring DHCP Services Lab
  • Device Placement and Configuration: Configuring a VLAN Interface Lab
  • Device Placement and Configuration: Configuring NAT Lab

Advanced Networking Devices

  • Advanced Networking Devices: Multi-Layer Switch Overview
  • Advanced Networking Devices: Configure Multi-Layer Switch: Lab
  • Advanced Networking Devices: Load Balancer Overview
  • Advanced Networking Devices: IDS and IPS
  • Advanced Networking Devices: Proxy Servers and Content Filtering
  • Advanced Networking Devices: Security Network Devices
  • Advanced Networking Devices: AAA/RADIUS Server
  • Advanced Networking Devices: VoIP PBX and Gateway
  • Advanced Networking Devices: Wireless Controller

Virtualization and Network Storage

  • Virtualization & Network Storage: Hypervisor Introduction
  • Virtualization & Network Storage: Virtual Networking Components
  • Virtualization & Network Storage: Creating a Virtual Switch and VM Lab
  • Virtualization & Network Storage: Network Storage

WAN Technologies

  • WAN Technologies: Understanding the LAN, MAN, and WAN Difference
  • WAN Technologies: WAN Transmission over Copper, Fiber, Wireless, and Satellite
  • WAN Technologies: WAN Types – ISDN/PRI, T1-T3, E1-E3, and OC
  • WAN Technologies: WAN Types – Cable, DSL, Dial-up
  • WAN Technologies: WAN Characteristics – Frame Relay, ATM, MPLS, and DMVPN
  • WAN Technologies: What is PPP and PPPoE?
  • WAN Technologies: What is SIP Trunking?
  • WAN Technologies: The Physical Reality of a WAN Connection

Business Continuity and Disaster Recovery

  • Business Continuity: Availability Concepts
  • Business Continuity: Load Sharing and Balancing
  • Business Continuity: Power Management
  • Business Continuity: Site Recovery Options
  • Business Continuity: Backups
  • Business Continuity: Backup and Restore Hands On Lab
  • Business Continuity: MTTR and MTBF
  • Business Continuity: SLA Requirements
  • Microsoft Windows Server 2016: Identity (70-742)

Scanning, Monitoring, and Patching

  • Scanning, Monitoring & Patching: Scanning Overview
  • Scanning, Monitoring & Patching: Network Scanning Methodology
  • Scanning, Monitoring & Patching: Port Scanning and Discovery
  • Scanning, Monitoring & Patching: OS Discovery and Fingerprinting
  • Scanning, Monitoring & Patching: Motivators for Vulnerability Management
  • Scanning, Monitoring & Patching: Vulnerability Scanning
  • Scanning, Monitoring & Patching: Logging and Review
  • Scanning, Monitoring & Patching: Packet and Traffic Analysis
  • Scanning, Monitoring & Patching: Packet Capture and Analysis Lab
  • Scanning, Monitoring & Patching: Remediation and Patch Management
  • Scanning, Monitoring & Patching: Network Scanning with NMAP and Zenmap Lab
  • Scanning, Monitoring & Patching: Baselines

Remote Access Method

  • Remote Access Methods: Telnet and SSH for CLI Remote Access
  • Remote Access Methods: HTTPS Management URLs
  • Remote Access Methods: VPNs
  • Remote Access Methods: Remote Desktop Access
  • Remote Access Methods: Out-of-Band Management
  • Identify Policies and Best Practices
  • Identify Policies & Best Practices: Privileged User Agreement
  • Identify Policies & Best Practices: Password Policy
  • Identify Policies & Best Practices: On-boarding and Off-boarding
  • Identify Policies & Best Practices: Licensing Restrictions
  • Identify Policies & Best Practices: International Export Controls
  • Identify Policies & Best Practices: Data Loss Prevention
  • Identify Policies & Best Practices: Remote Access Policies
  • Identify Policies & Best Practices: Incident Response Policies
  • Identify Policies & Best Practices: Bring Your Own Device (BYOD)
  • Identify Policies & Best Practices: Acceptable Use Policy (AUP)
  • Identify Policies & Best Practices: Non-disclosure Agreements (NDA)
  • Identify Policies & Best Practices: System Life Cycle
  • Identify Policies & Best Practices: Safety Procedures and Policies
  • Microsoft Windows Server 2016: Identity (70-742)

Physical Security and Network Attacks

  • Physical Security & Network Attacks: Let’s Break into a Data Center
  • Physical Security & Network Attacks: Video Surveillance and Motion Detection
  • Physical Security & Network Attacks: Badges and Smart Cards
  • Physical Security & Network Attacks: Biometrics
  • Physical Security & Network Attacks: Locks, Asset Tags, and Tamper Detection
  • Physical Security & Network Attacks: DoS and PDoS (Permanent Denial of Service)
  • Physical Security & Network Attacks: DDoS (Distributed Denial of Service)
  • Physical Security & Network Attacks: DDoS with ICMP and Smurfing
  • Physical Security & Network Attacks: DDoS with DNS and NTP
  • Physical Security & Network Attacks: Let’s Go Phishing
  • Physical Security & Network Attacks: Social Engineering and Insider Threats
  • Physical Security & Network Attacks: Ransomware and Scareware
  • Physical Security & Network Attacks: Cryptolocker and Logic Bombs
  • Physical Security & Network Attacks: DNS Spoofing (Poisoning)
  • Physical Security & Network Attacks: Man-In-The-Middle with ARP Spoofing
  • Physical Security & Network Attacks: Wardriving and Deauthentication
  • Physical Security & Network Attacks: Evil Twins and Rogue Access Points

Authentication and Access Control

  • Authentication & Access Control: AAA
  • Authentication & Access Control: Multi-factor Authentication Overview
  • Authentication & Access Control: Using Two-Factor Authentication (2FA)
  • Authentication & Access Control Demo: Implementing 2FA
  • Authentication & Access Control: Switch Port Security
  • Authentication & Access Control: Access Control Methods

Basic Wireless Network Security

  • Basic Wireless Network Security: The Wireless Security Evolution
  • Basic Wireless Network Security: Wireless Authentication and Authorization Types

Mitigation Techniques

  • Mitigation Techniques: Network Device Hardening
  • Mitigation Techniques: Hardening a Windows Server System
  • Mitigation Techniques: Signature Management
  • Mitigation Techniques: File Integrity Monitoring
  • Mitigation Techniques: Privileged User Accounts and Role Separation
  • Mitigation Techniques: Network Segmentation
  • Mitigation Techniques: Switch Port Protections
  • Mitigation Techniques: The Native VLAN
  • Mitigation Techniques: Filtering with Access Control Lists (ACLs)
  • Mitigation Techniques: Honeypots and Honeynets
  • Mitigation Techniques: Penetration Testing
  • Microsoft Windows Server 2016: Identity (70-742)

Troubleshooting Methodology

  • Troubleshooting Methodology: A Network Troubleshooting Methodology
  • Troubleshooting Methodology: Identify the Problem
  • Troubleshooting Methodology: Establish a Theory of Probable Cause
  • Troubleshooting Methodology: Test the Theory to Determine the Root Cause
  • Troubleshooting Methodology: Establish a Plan of Action to Solve the Problem
  • Troubleshooting Methodology: Problem Solving, Verification, and Documentation

Network Troubleshooting

  • Network Troubleshooting: Hardware Tools
  • Network Troubleshooting: Software Tools
  • Network Troubleshooting: Using CLI Network Tools: ipconfig, ping, arp
  • Network Troubleshooting: Using CLI Network Tools: nslookup, dig
  • Network Troubleshooting: Using CLI Network Tools: tracert, pathping, nmap, route
  • Network Troubleshooting: Using CLI Network Tools: ifconfig, iptables, tcpdump, and netstat

Wired Connectivity and Performance Issues

  • Wired Connectivity & Performance Issues: Attenuation, Latency, and Jitter
  • Wired Connectivity & Performance Issues: Crosstalk, EMI, Open/Short
  • Wired Connectivity & Performance Issues: Incorrect Pin-Outs or Cable Types
  • Wired Connectivity & Performance Issues: Mismatched and Damaged Cables
  • Wired Connectivity & Performance Issues: Bad Ports and LED Status Indicators
  • Wired Connectivity & Performance Issues: Duplex and Speed Mismatches
  • Wired Connectivity & Performance Issues: VLAN Mismatches
  • Wired Connectivity & Performance Issues: Native VLAN Mismatches
  • Wired Connectivity & Performance Issues: Bottlenecks

Troubleshooting Wireless Networks

  • Troubleshooting Wireless: The Nature of Airwaves
  • Troubleshooting Wireless: Fighting Frequencies
  • Troubleshooting Wireless: Understanding Antenna Types
  • Troubleshooting Wireless: Misconfigurations

Common Network Service Issues

  • Common Network Service Issues: Troubleshooting Name Resolution
  • Common Network Service Issues: Troubleshooting MAC Addressing
  • Common Network Service Issues: Troubleshooting IP Addressing
  • Common Network Service Issues: Troubleshooting Security Settings
  • Common Network Service Issues: Troubleshooting Miscellaneous Service Issues