+Network

شکل یک تصویر

معرفی دوره  +Network

اگر قصد داشته باشیدکه در حوزه شبکه‌های کامپیوتری فعالیت کنید، باید بدانید که دوره نتورک پلاس (+CompTIA Network) به عنوان دوره مقدماتی شبکه، در حقیقت مانند الفبای شبکه‌های کامپیوتری است که افزون بر این‌که مقدمه‌ای برای آموزش تمامی مهارت‌های مرتبط با شبکه‌های کامپیوتری است،‌پیش‌نیاز دوره‌های تخصصی مایکروسافت (MCSE) و سیسکو (CCNA) نیز محسوب می‌گردد.
این دوره توسط انجمن CompTIA (Computing Technology Industry Association) که در واقع انجمن صنایع فناوری‌های کامپیوتری است، ارائه گردیده است که در آن مبانی شبکه آموزش داده می‌شود. بنابراین مدرکی که افراد در پایان دوره دریافت می‌کنند، به کمپانی یا دستگاه‌های مخصوصی تعلق ندارد و این مفاهیم اولیه در کل حوزه شبکه مورد استفاده قرار خواهد گرفت. vendor-neutral ویژگی تمامی مدارکی است که انجمن   CompTIA ارائه می‌دهد و معنای آن همان عمومی بودن مدرک دریافتی در حوزه شبکه و عدم وابستگی آن به یک کمپانی تولیدکننده خاص است.
افرادی در دوره نتورک پلاس شرکت می‌کنند با شیوه‌های مسیریابی، IP‌، انواع پروتکل، انواع تجهیزات شبکه و …. آشنا می‌شوند و پس از پایان دوره به مهارت‌های زیر دست پیدا می کنند:

آشنایی با چگونگی نصب، راه‌اندازی و پیاده‌سازی شبکه

آشنایی با انواع شبکه

آشنایی با انواع توپولوژی‌های شبکه

قابلیت تشخیص عیوب شیکه

آشنایی با شیوه‌های انتقال اطلاعات، محیط و تجهیزات شبکه

کسب دانش و مهارت لازم برای ورود به دوره‌های تخصصی و حرفه‌ای شبکه

علاقه‌مندان بعد از طی دوره مقدماتی نتورک پلاس می‌توانند با توجه به علاقه‌ی خود، در هرکدام از گرایش‌های تخصصی مایکروسافت و یا سیسکو آموزش ببینند. این دو گرایش هیچ اولویتی به دیگری ندارد.

مدت زمان دوره :  40 ساعت

نام مدرس : مسعود کیمیایی

سرفصل های دوره :

OSI Layers, Ports, and Protocols

OSI Layers, Ports & Protocols: A Tale of Two Kings

OSI Layers, Ports & Protocols: The 7 Layers of the OSI Model

OSI Layers, Ports & Protocols: TCP/IP Suite Layers

OSI Layers, Ports & Protocols: Core TCP/IP Protocols

OSI Layers, Ports & Protocols: Wireshark Views of Core TCP/IP Protocols

OSI Layers, Ports & Protocols: How Ports Are Used in TCP/IP

OSI Layers, Ports & Protocols: Verifying L4 Ports with Wireshark

OSI Layers, Ports & Protocols: Common Protocols and Their Well-known Ports

OSI Layers, Ports & Protocols: TCP’s Three-way Handshake

OSI Layers, Ports & Protocols: Wireshark Verification of a TCP 3-Way Handshake

Ethernet Switching

Ethernet Switching: Properties of Network Traffic

Ethernet Switching: Layer 2 Ethernet Addresses

Ethernet Switching: How a Layer 2 Switch Works

Ethernet Switching: Demonstration: Switch Dynamic Learning

Ethernet Switching: Understanding VLANs

Ethernet Switching: Configuring a VLAN

Ethernet Switching: Overview of 802.1Q and Trunks

Ethernet Switching: Configuring an 802.1Q Ethernet Trunk

Ethernet Switching: How Address Resolution Protocol (ARP) Operates

Ethernet Switching: Predicting the MAC Address Table

Ethernet Switching: Validating MAC Address Table Predictions

Ethernet Switching Game: Predict MAC Table After PC1 Pings PC4

Ethernet Switching Game: Predict MAC Table After PC3 Pings PC5

Ethernet Switching: Switching Loops and Spanning Tree Protocol (STP)

Ethernet Switching: STP Reacting to a Network Change

Ethernet Switching: Design Considerations and PoE

Ethernet Switching: Switch Port Mirroring

IP Routing and Forwarding

IP Routing and Forwarding: Introduction to IP Routing

IP Routing and Forwarding: How to Train a Router

IP Routing and Forwarding: Options for Static Routes

IP Routing and Forwarding: Configuring Static Routes

IP Routing and Forwarding: Dynamic Routing Protocol Overview

IP Routing and Forwarding: Dynamic Routing Protocol Demonstration

IP Routing and Forwarding: Address Translation with PAT

IP Routing and Forwarding: One-to-one Translations with NAT

IP Routing and Forwarding: Using Wireshark to Verify IP Translations

IP Routing and Forwarding: Access Control Lists

IP Routing and Forwarding: ACL Demonstration

IP Routing and Forwarding: Enterprise Network Forwarding

IP Addressing and Subnetting

IP Addressing and Subnetting: IPv4 Overview

IP Addressing and Subnetting: Binary Basics

IP Addressing and Subnetting: Converting Decimal to Binary

IP Addressing and Subnetting: Converting Binary to Decimal

IP Addressing and Subnetting: The IP Mask

IP Addressing and Subnetting: Practice Using a Different IP Mask

IP Addressing and Subnetting: Borrowing Host Bits

IP Addressing and Subnetting: Practicing the Finger Game

IP Addressing and Subnetting: Identifying New Subnets

IP Addressing and Subnetting Exercise 1: Identify the New Subnets

IP Addressing and Subnetting Exercise 2: Identify the New Subnets

IP Addressing and Subnetting: ID Valid Host Addresses on a Subnet

IP Addressing and Subnetting Exercise 1: ID Valid Host Addresses

IP Addressing and Subnetting Exercise 2: ID Valid Host Addresse

IP Addressing and Subnetting: Calculate the Number of Hosts per Subnet

IP Addressing and Subnetting: Determine the Subnet Based on a Host’s IP Address

IP Addressing and Subnetting: Planning and Assigning IP Addresses

IP Addressing and Subnetting: Test Your IPv4 Knowledge Lab

IP Addressing and Subnetting: IPv6 Concepts

Network Topologies, Types, and Technologies

Network Topologies: Wired Topologies

Network Topologies: Wireless Topologies

Network Topologies: Types of Networks

Network Topologies: Introducing the Internet of Things (IoT)

Network Topologies: Internet of Things (IoT) Technologies

Wireless Technologies, Configurations, and Security

Wireless Technologies and Configurations: The Purpose of Wireless

Wireless Technologies and Configurations: Understanding Radio Frequency

Wireless Technologies and Configurations: Understanding Radio Channels

Wireless Technologies and Configurations: Wireless Communication Technologies

Wireless Technologies and Configurations: Designing for Wireless Speed and Coverage

Wireless Technologies and Configurations: Understanding Wireless Antennas

Wireless Technologies and Configurations: Wireless Performance Improvements

Network Services

Network Services: DHCP Overview

Network Services: Verify DHCP with Wireshark

Network Services: DNS Overview

Network Services: DNS Methods, Records, and Design Options

Network Services: DNS Testing and Validation

Network Services: Network Time Protocol (NTP)

Network Services: IP Address Management (IPAM)

Deploying Appropriate Cable Solutions

Deploying Appropriate Cabling Solutions: Copper Network Media Types

Deploying Appropriate Cabling Solutions: Fiber Network Media Types

Deploying Appropriate Cabling Solutions: Network Termination Points

Deploying Appropriate Cabling Solutions: Network Transceivers

Device Placement and Configuration

Device Placement and Configuration: Network Device Placement

Device Placement and Configuration: Device Configuration Overview

Device Placement and Configuration: Configure Switch Ports Lab

Device Placement and Configuration: Configure IP Addresses Lab

Device Placement and Configuration: Configure IP Routing Lab

Device Placement and Configuration: Configuring DHCP Services Lab

Device Placement and Configuration: Configuring a VLAN Interface Lab

Device Placement and Configuration: Configuring NAT Lab

Advanced Networking Devices

Advanced Networking Devices: Multi-Layer Switch Overview

Advanced Networking Devices: Configure Multi-Layer Switch: Lab

Advanced Networking Devices: Load Balancer Overview

Advanced Networking Devices: IDS and IPS

Advanced Networking Devices: Proxy Servers and Content Filtering

Advanced Networking Devices: Security Network Devices

Advanced Networking Devices: AAA/RADIUS Server

Advanced Networking Devices: VoIP PBX and Gateway

Advanced Networking Devices: Wireless Controller

Virtualization and Network Storage

Virtualization & Network Storage: Hypervisor Introduction

Virtualization & Network Storage: Virtual Networking Components

Virtualization & Network Storage: Creating a Virtual Switch and VM Lab

Virtualization & Network Storage: Network Storage

WAN Technologies

WAN Technologies: Understanding the LAN, MAN, and WAN Difference

WAN Technologies: WAN Transmission over Copper, Fiber, Wireless, and Satellite

WAN Technologies: WAN Types – ISDN/PRI, T1-T3, E1-E3, and OC

WAN Technologies: WAN Types – Cable, DSL, Dial-up

WAN Technologies: WAN Characteristics – Frame Relay, ATM, MPLS, and DMVPN

WAN Technologies: What is PPP and PPPoE?

WAN Technologies: What is SIP Trunking?

WAN Technologies: The Physical Reality of a WAN Connection

Business Continuity and Disaster Recovery

Business Continuity: Availability Concepts

Business Continuity: Load Sharing and Balancing

Business Continuity: Power Management

Business Continuity: Site Recovery Options

Business Continuity: Backups

Business Continuity: Backup and Restore Hands On Lab

Business Continuity: MTTR and MTBF

Business Continuity: SLA Requirements

Microsoft Windows Server 2016: Identity (70-742)

Scanning, Monitoring, and Patching

Scanning, Monitoring & Patching: Scanning Overview

Scanning, Monitoring & Patching: Network Scanning Methodology

Scanning, Monitoring & Patching: Port Scanning and Discovery

Scanning, Monitoring & Patching: OS Discovery and Fingerprinting

Scanning, Monitoring & Patching: Motivators for Vulnerability Management

Scanning, Monitoring & Patching: Vulnerability Scanning

Scanning, Monitoring & Patching: Logging and Review

Scanning, Monitoring & Patching: Packet and Traffic Analysis

Scanning, Monitoring & Patching: Packet Capture and Analysis Lab

Scanning, Monitoring & Patching: Remediation and Patch Management

Scanning, Monitoring & Patching: Network Scanning with NMAP and Zenmap Lab

Scanning, Monitoring & Patching: Baselines

Remote Access Method

Remote Access Methods: Telnet and SSH for CLI Remote Access

Remote Access Methods: HTTPS Management URLs

Remote Access Methods: VPNs

Remote Access Methods: Remote Desktop Access

Remote Access Methods: Out-of-Band Management

Identify Policies and Best Practices

Identify Policies & Best Practices: Privileged User Agreement

Identify Policies & Best Practices: Password Policy

Identify Policies & Best Practices: On-boarding and Off-boarding

Identify Policies & Best Practices: Licensing Restrictions

Identify Policies & Best Practices: International Export Controls

Identify Policies & Best Practices: Data Loss Prevention

Identify Policies & Best Practices: Remote Access Policies

Identify Policies & Best Practices: Incident Response Policies

Identify Policies & Best Practices: Bring Your Own Device (BYOD)

Identify Policies & Best Practices: Acceptable Use Policy (AUP)

Identify Policies & Best Practices: Non-disclosure Agreements (NDA)

Identify Policies & Best Practices: System Life Cycle

Identify Policies & Best Practices: Safety Procedures and Policies

Microsoft Windows Server 2016: Identity (70-742)

Physical Security and Network Attacks

Physical Security & Network Attacks: Let’s Break into a Data Center

Physical Security & Network Attacks: Video Surveillance and Motion Detection

Physical Security & Network Attacks: Badges and Smart Cards

Physical Security & Network Attacks: Biometrics

Physical Security & Network Attacks: Locks, Asset Tags, and Tamper Detection

Physical Security & Network Attacks: DoS and PDoS (Permanent Denial of Service)

Physical Security & Network Attacks: DDoS (Distributed Denial of Service)

Physical Security & Network Attacks: DDoS with ICMP and Smurfing

Physical Security & Network Attacks: DDoS with DNS and NTP

Physical Security & Network Attacks: Let’s Go Phishing

Physical Security & Network Attacks: Social Engineering and Insider Threats

Physical Security & Network Attacks: Ransomware and Scareware

Physical Security & Network Attacks: Cryptolocker and Logic Bombs

Physical Security & Network Attacks: DNS Spoofing (Poisoning)

Physical Security & Network Attacks: Man-In-The-Middle with ARP Spoofing

Physical Security & Network Attacks: Wardriving and Deauthentication

Physical Security & Network Attacks: Evil Twins and Rogue Access Points

Authentication and Access Control

Authentication & Access Control: AAA

Authentication & Access Control: Multi-factor Authentication Overview

Authentication & Access Control: Using Two-Factor Authentication (2FA)

Authentication & Access Control Demo: Implementing 2FA

Authentication & Access Control: Switch Port Security

Authentication & Access Control: Access Control Methods

Basic Wireless Network Security

Basic Wireless Network Security: The Wireless Security Evolution

Basic Wireless Network Security: Wireless Authentication and Authorization Types

Mitigation Techniques

Mitigation Techniques: Network Device Hardening

Mitigation Techniques: Hardening a Windows Server System

Mitigation Techniques: Signature Management

Mitigation Techniques: File Integrity Monitoring

Mitigation Techniques: Privileged User Accounts and Role Separation

Mitigation Techniques: Network Segmentation

Mitigation Techniques: Switch Port Protections

Mitigation Techniques: The Native VLAN

Mitigation Techniques: Filtering with Access Control Lists (ACLs)

Mitigation Techniques: Honeypots and Honeynets

Mitigation Techniques: Penetration Testing

Microsoft Windows Server 2016: Identity (70-742)

Troubleshooting Methodology

Troubleshooting Methodology: A Network Troubleshooting Methodology

Troubleshooting Methodology: Identify the Problem

Troubleshooting Methodology: Establish a Theory of Probable Cause

Troubleshooting Methodology: Test the Theory to Determine the Root Cause

Troubleshooting Methodology: Establish a Plan of Action to Solve the Problem

Troubleshooting Methodology: Problem Solving, Verification, and Documentation

Network Troubleshooting

Network Troubleshooting: Hardware Tools

Network Troubleshooting: Software Tools

Network Troubleshooting: Using CLI Network Tools: ipconfig, ping, arp

Network Troubleshooting: Using CLI Network Tools: nslookup, dig

Network Troubleshooting: Using CLI Network Tools: tracert, pathping, nmap, route

Network Troubleshooting: Using CLI Network Tools: ifconfig, iptables, tcpdump, and netstat

Wired Connectivity and Performance Issues

Wired Connectivity & Performance Issues: Attenuation, Latency, and Jitter

Wired Connectivity & Performance Issues: Crosstalk, EMI, Open/Short

Wired Connectivity & Performance Issues: Incorrect Pin-Outs or Cable Types

Wired Connectivity & Performance Issues: Mismatched and Damaged Cables

Wired Connectivity & Performance Issues: Bad Ports and LED Status Indicators

Wired Connectivity & Performance Issues: Duplex and Speed Mismatches

Wired Connectivity & Performance Issues: VLAN Mismatches

Wired Connectivity & Performance Issues: Native VLAN Mismatches

Wired Connectivity & Performance Issues: Bottlenecks

Troubleshooting Wireless Networks

Troubleshooting Wireless: The Nature of Airwaves

Troubleshooting Wireless: Fighting Frequencies

Troubleshooting Wireless: Understanding Antenna Types

Troubleshooting Wireless: Misconfigurations

Common Network Service Issues

Common Network Service Issues: Troubleshooting Name Resolution

Common Network Service Issues: Troubleshooting MAC Addressing

Common Network Service Issues: Troubleshooting IP Addressing

Common Network Service Issues: Troubleshooting Security Settings

Common Network Service Issues: Troubleshooting Miscellaneous Service Issues