معرفی دوره +Network
اگر قصد داشته باشیدکه در حوزه شبکههای کامپیوتری فعالیت کنید، باید بدانید که دوره نتورک پلاس (+CompTIA Network) به عنوان دوره مقدماتی شبکه، در حقیقت مانند الفبای شبکههای کامپیوتری است که افزون بر اینکه مقدمهای برای آموزش تمامی مهارتهای مرتبط با شبکههای کامپیوتری است،پیشنیاز دورههای تخصصی مایکروسافت (MCSE) و سیسکو (CCNA) نیز محسوب میگردد.
این دوره توسط انجمن CompTIA (Computing Technology Industry Association) که در واقع انجمن صنایع فناوریهای کامپیوتری است، ارائه گردیده است که در آن مبانی شبکه آموزش داده میشود. بنابراین مدرکی که افراد در پایان دوره دریافت میکنند، به کمپانی یا دستگاههای مخصوصی تعلق ندارد و این مفاهیم اولیه در کل حوزه شبکه مورد استفاده قرار خواهد گرفت. vendor-neutral ویژگی تمامی مدارکی است که انجمن CompTIA ارائه میدهد و معنای آن همان عمومی بودن مدرک دریافتی در حوزه شبکه و عدم وابستگی آن به یک کمپانی تولیدکننده خاص است.
افرادی در دوره نتورک پلاس شرکت میکنند با شیوههای مسیریابی، IP، انواع پروتکل، انواع تجهیزات شبکه و …. آشنا میشوند و پس از پایان دوره به مهارتهای زیر دست پیدا می کنند:
- آشنایی با چگونگی نصب، راهاندازی و پیادهسازی شبکه
- آشنایی با انواع شبکه
- آشنایی با انواع توپولوژیهای شبکه
- قابلیت تشخیص عیوب شیکه
- آشنایی با شیوههای انتقال اطلاعات، محیط و تجهیزات شبکه
- کسب دانش و مهارت لازم برای ورود به دورههای تخصصی و حرفهای شبکه
علاقهمندان بعد از طی دوره مقدماتی نتورک پلاس میتوانند با توجه به علاقهی خود، در هرکدام از گرایشهای تخصصی مایکروسافت و یا سیسکو آموزش ببینند. این دو گرایش هیچ اولویتی به دیگری ندارد.
مدت زمان دوره : 40 ساعت
نام مدرس : مسعود کیمیایی
سرفصل های دوره :
OSI Layers, Ports, and Protocols
OSI Layers, Ports & Protocols: A Tale of Two Kings
OSI Layers, Ports & Protocols: The 7 Layers of the OSI Model
OSI Layers, Ports & Protocols: TCP/IP Suite Layers
OSI Layers, Ports & Protocols: Core TCP/IP Protocols
OSI Layers, Ports & Protocols: Wireshark Views of Core TCP/IP Protocols
OSI Layers, Ports & Protocols: How Ports Are Used in TCP/IP
OSI Layers, Ports & Protocols: Verifying L4 Ports with Wireshark
OSI Layers, Ports & Protocols: Common Protocols and Their Well-known Ports
OSI Layers, Ports & Protocols: TCP’s Three-way Handshake
OSI Layers, Ports & Protocols: Wireshark Verification of a TCP 3-Way Handshake
Ethernet Switching
Ethernet Switching: Properties of Network Traffic
Ethernet Switching: Layer 2 Ethernet Addresses
Ethernet Switching: How a Layer 2 Switch Works
Ethernet Switching: Demonstration: Switch Dynamic Learning
Ethernet Switching: Understanding VLANs
Ethernet Switching: Configuring a VLAN
Ethernet Switching: Overview of 802.1Q and Trunks
Ethernet Switching: Configuring an 802.1Q Ethernet Trunk
Ethernet Switching: How Address Resolution Protocol (ARP) Operates
Ethernet Switching: Predicting the MAC Address Table
Ethernet Switching: Validating MAC Address Table Predictions
Ethernet Switching Game: Predict MAC Table After PC1 Pings PC4
Ethernet Switching Game: Predict MAC Table After PC3 Pings PC5
Ethernet Switching: Switching Loops and Spanning Tree Protocol (STP)
Ethernet Switching: STP Reacting to a Network Change
Ethernet Switching: Design Considerations and PoE
Ethernet Switching: Switch Port Mirroring
IP Routing and Forwarding
IP Routing and Forwarding: Introduction to IP Routing
IP Routing and Forwarding: How to Train a Router
IP Routing and Forwarding: Options for Static Routes
IP Routing and Forwarding: Configuring Static Routes
IP Routing and Forwarding: Dynamic Routing Protocol Overview
IP Routing and Forwarding: Dynamic Routing Protocol Demonstration
IP Routing and Forwarding: Address Translation with PAT
IP Routing and Forwarding: One-to-one Translations with NAT
IP Routing and Forwarding: Using Wireshark to Verify IP Translations
IP Routing and Forwarding: Access Control Lists
IP Routing and Forwarding: ACL Demonstration
IP Routing and Forwarding: Enterprise Network Forwarding
IP Addressing and Subnetting
IP Addressing and Subnetting: IPv4 Overview
IP Addressing and Subnetting: Binary Basics
IP Addressing and Subnetting: Converting Decimal to Binary
IP Addressing and Subnetting: Converting Binary to Decimal
IP Addressing and Subnetting: The IP Mask
IP Addressing and Subnetting: Practice Using a Different IP Mask
IP Addressing and Subnetting: Borrowing Host Bits
IP Addressing and Subnetting: Practicing the Finger Game
IP Addressing and Subnetting: Identifying New Subnets
IP Addressing and Subnetting Exercise 1: Identify the New Subnets
IP Addressing and Subnetting Exercise 2: Identify the New Subnets
IP Addressing and Subnetting: ID Valid Host Addresses on a Subnet
IP Addressing and Subnetting Exercise 1: ID Valid Host Addresses
IP Addressing and Subnetting Exercise 2: ID Valid Host Addresse
IP Addressing and Subnetting: Calculate the Number of Hosts per Subnet
IP Addressing and Subnetting: Determine the Subnet Based on a Host’s IP Address
IP Addressing and Subnetting: Planning and Assigning IP Addresses
IP Addressing and Subnetting: Test Your IPv4 Knowledge Lab
IP Addressing and Subnetting: IPv6 Concepts
Network Topologies, Types, and Technologies
Network Topologies: Wired Topologies
Network Topologies: Wireless Topologies
Network Topologies: Types of Networks
Network Topologies: Introducing the Internet of Things (IoT)
Network Topologies: Internet of Things (IoT) Technologies
Wireless Technologies, Configurations, and Security
Wireless Technologies and Configurations: The Purpose of Wireless
Wireless Technologies and Configurations: Understanding Radio Frequency
Wireless Technologies and Configurations: Understanding Radio Channels
Wireless Technologies and Configurations: Wireless Communication Technologies
Wireless Technologies and Configurations: Designing for Wireless Speed and Coverage
Wireless Technologies and Configurations: Understanding Wireless Antennas
Wireless Technologies and Configurations: Wireless Performance Improvements
Network Services
Network Services: DHCP Overview
Network Services: Verify DHCP with Wireshark
Network Services: DNS Overview
Network Services: DNS Methods, Records, and Design Options
Network Services: DNS Testing and Validation
Network Services: Network Time Protocol (NTP)
Network Services: IP Address Management (IPAM)
Deploying Appropriate Cable Solutions
Deploying Appropriate Cabling Solutions: Copper Network Media Types
Deploying Appropriate Cabling Solutions: Fiber Network Media Types
Deploying Appropriate Cabling Solutions: Network Termination Points
Deploying Appropriate Cabling Solutions: Network Transceivers
Device Placement and Configuration
Device Placement and Configuration: Network Device Placement
Device Placement and Configuration: Device Configuration Overview
Device Placement and Configuration: Configure Switch Ports Lab
Device Placement and Configuration: Configure IP Addresses Lab
Device Placement and Configuration: Configure IP Routing Lab
Device Placement and Configuration: Configuring DHCP Services Lab
Device Placement and Configuration: Configuring a VLAN Interface Lab
Device Placement and Configuration: Configuring NAT Lab
Advanced Networking Devices
Advanced Networking Devices: Multi-Layer Switch Overview
Advanced Networking Devices: Configure Multi-Layer Switch: Lab
Advanced Networking Devices: Load Balancer Overview
Advanced Networking Devices: IDS and IPS
Advanced Networking Devices: Proxy Servers and Content Filtering
Advanced Networking Devices: Security Network Devices
Advanced Networking Devices: AAA/RADIUS Server
Advanced Networking Devices: VoIP PBX and Gateway
Advanced Networking Devices: Wireless Controller
Virtualization and Network Storage
Virtualization & Network Storage: Hypervisor Introduction
Virtualization & Network Storage: Virtual Networking Components
Virtualization & Network Storage: Creating a Virtual Switch and VM Lab
Virtualization & Network Storage: Network Storage
WAN Technologies
WAN Technologies: Understanding the LAN, MAN, and WAN Difference
WAN Technologies: WAN Transmission over Copper, Fiber, Wireless, and Satellite
WAN Technologies: WAN Types – ISDN/PRI, T1-T3, E1-E3, and OC
WAN Technologies: WAN Types – Cable, DSL, Dial-up
WAN Technologies: WAN Characteristics – Frame Relay, ATM, MPLS, and DMVPN
WAN Technologies: What is PPP and PPPoE?
WAN Technologies: What is SIP Trunking?
WAN Technologies: The Physical Reality of a WAN Connection
Business Continuity and Disaster Recovery
Business Continuity: Availability Concepts
Business Continuity: Load Sharing and Balancing
Business Continuity: Power Management
Business Continuity: Site Recovery Options
Business Continuity: Backups
Business Continuity: Backup and Restore Hands On Lab
Business Continuity: MTTR and MTBF
Business Continuity: SLA Requirements
Microsoft Windows Server 2016: Identity (70-742)
Scanning, Monitoring, and Patching
Scanning, Monitoring & Patching: Scanning Overview
Scanning, Monitoring & Patching: Network Scanning Methodology
Scanning, Monitoring & Patching: Port Scanning and Discovery
Scanning, Monitoring & Patching: OS Discovery and Fingerprinting
Scanning, Monitoring & Patching: Motivators for Vulnerability Management
Scanning, Monitoring & Patching: Vulnerability Scanning
Scanning, Monitoring & Patching: Logging and Review
Scanning, Monitoring & Patching: Packet and Traffic Analysis
Scanning, Monitoring & Patching: Packet Capture and Analysis Lab
Scanning, Monitoring & Patching: Remediation and Patch Management
Scanning, Monitoring & Patching: Network Scanning with NMAP and Zenmap Lab
Scanning, Monitoring & Patching: Baselines
Remote Access Method
Remote Access Methods: Telnet and SSH for CLI Remote Access
Remote Access Methods: HTTPS Management URLs
Remote Access Methods: VPNs
Remote Access Methods: Remote Desktop Access
Remote Access Methods: Out-of-Band Management
Identify Policies and Best Practices
Identify Policies & Best Practices: Privileged User Agreement
Identify Policies & Best Practices: Password Policy
Identify Policies & Best Practices: On-boarding and Off-boarding
Identify Policies & Best Practices: Licensing Restrictions
Identify Policies & Best Practices: International Export Controls
Identify Policies & Best Practices: Data Loss Prevention
Identify Policies & Best Practices: Remote Access Policies
Identify Policies & Best Practices: Incident Response Policies
Identify Policies & Best Practices: Bring Your Own Device (BYOD)
Identify Policies & Best Practices: Acceptable Use Policy (AUP)
Identify Policies & Best Practices: Non-disclosure Agreements (NDA)
Identify Policies & Best Practices: System Life Cycle
Identify Policies & Best Practices: Safety Procedures and Policies
Microsoft Windows Server 2016: Identity (70-742)
Physical Security and Network Attacks
Physical Security & Network Attacks: Let’s Break into a Data Center
Physical Security & Network Attacks: Video Surveillance and Motion Detection
Physical Security & Network Attacks: Badges and Smart Cards
Physical Security & Network Attacks: Biometrics
Physical Security & Network Attacks: Locks, Asset Tags, and Tamper Detection
Physical Security & Network Attacks: DoS and PDoS (Permanent Denial of Service)
Physical Security & Network Attacks: DDoS (Distributed Denial of Service)
Physical Security & Network Attacks: DDoS with ICMP and Smurfing
Physical Security & Network Attacks: DDoS with DNS and NTP
Physical Security & Network Attacks: Let’s Go Phishing
Physical Security & Network Attacks: Social Engineering and Insider Threats
Physical Security & Network Attacks: Ransomware and Scareware
Physical Security & Network Attacks: Cryptolocker and Logic Bombs
Physical Security & Network Attacks: DNS Spoofing (Poisoning)
Physical Security & Network Attacks: Man-In-The-Middle with ARP Spoofing
Physical Security & Network Attacks: Wardriving and Deauthentication
Physical Security & Network Attacks: Evil Twins and Rogue Access Points
Authentication and Access Control
Authentication & Access Control: AAA
Authentication & Access Control: Multi-factor Authentication Overview
Authentication & Access Control: Using Two-Factor Authentication (2FA)
Authentication & Access Control Demo: Implementing 2FA
Authentication & Access Control: Switch Port Security
Authentication & Access Control: Access Control Methods
Basic Wireless Network Security
Basic Wireless Network Security: The Wireless Security Evolution
Basic Wireless Network Security: Wireless Authentication and Authorization Types
Mitigation Techniques
Mitigation Techniques: Network Device Hardening
Mitigation Techniques: Hardening a Windows Server System
Mitigation Techniques: Signature Management
Mitigation Techniques: File Integrity Monitoring
Mitigation Techniques: Privileged User Accounts and Role Separation
Mitigation Techniques: Network Segmentation
Mitigation Techniques: Switch Port Protections
Mitigation Techniques: The Native VLAN
Mitigation Techniques: Filtering with Access Control Lists (ACLs)
Mitigation Techniques: Honeypots and Honeynets
Mitigation Techniques: Penetration Testing
Microsoft Windows Server 2016: Identity (70-742)
Troubleshooting Methodology
Troubleshooting Methodology: A Network Troubleshooting Methodology
Troubleshooting Methodology: Identify the Problem
Troubleshooting Methodology: Establish a Theory of Probable Cause
Troubleshooting Methodology: Test the Theory to Determine the Root Cause
Troubleshooting Methodology: Establish a Plan of Action to Solve the Problem
Troubleshooting Methodology: Problem Solving, Verification, and Documentation
Network Troubleshooting
Network Troubleshooting: Hardware Tools
Network Troubleshooting: Software Tools
Network Troubleshooting: Using CLI Network Tools: ipconfig, ping, arp
Network Troubleshooting: Using CLI Network Tools: nslookup, dig
Network Troubleshooting: Using CLI Network Tools: tracert, pathping, nmap, route
Network Troubleshooting: Using CLI Network Tools: ifconfig, iptables, tcpdump, and netstat
Wired Connectivity and Performance Issues
Wired Connectivity & Performance Issues: Attenuation, Latency, and Jitter
Wired Connectivity & Performance Issues: Crosstalk, EMI, Open/Short
Wired Connectivity & Performance Issues: Incorrect Pin-Outs or Cable Types
Wired Connectivity & Performance Issues: Mismatched and Damaged Cables
Wired Connectivity & Performance Issues: Bad Ports and LED Status Indicators
Wired Connectivity & Performance Issues: Duplex and Speed Mismatches
Wired Connectivity & Performance Issues: VLAN Mismatches
Wired Connectivity & Performance Issues: Native VLAN Mismatches
Wired Connectivity & Performance Issues: Bottlenecks
Troubleshooting Wireless Networks
Troubleshooting Wireless: The Nature of Airwaves
Troubleshooting Wireless: Fighting Frequencies
Troubleshooting Wireless: Understanding Antenna Types
Troubleshooting Wireless: Misconfigurations
Common Network Service Issues
Common Network Service Issues: Troubleshooting Name Resolution
Common Network Service Issues: Troubleshooting MAC Addressing
Common Network Service Issues: Troubleshooting IP Addressing
Common Network Service Issues: Troubleshooting Security Settings
Common Network Service Issues: Troubleshooting Miscellaneous Service Issues
آخرین دیدگاهها