CompTIA Network+ N10-008 Certification Guide - Second Edition

Book description

Become a network specialist by developing your skills in network implementation, operations and security while covering all the exam topics for CompTIA Network+ N10-008 certification in an easy-to-follow guide.

Purchase of the print or Kindle book includes a free eBook in the PDF format.

Key Features

  • A step-by-step guide to gaining a clear understanding of the Network+ certification
  • Learn about network architecture, protocols, security, and network troubleshooting
  • Confidently ace the N10-008 exam with the help of 200+ practice test questions and answers

Book Description

This book helps you to easily understand core networking concepts without the need of prior industry experience or knowledge within this fi eld of study. This updated second edition of the CompTIA Network+ N10-008 Certification Guide begins by introducing you to the core fundamentals of networking technologies and concepts, before progressing to intermediate and advanced topics using a student-centric approach.

You'll explore best practices for designing and implementing a resilient and scalable network infrastructure to support modern applications and services. Additionally, you'll learn network security concepts and technologies to effectively secure organizations from cyber attacks and threats. The book also shows you how to efficiently discover and resolve networking issues using common troubleshooting techniques.

By the end of this book, you'll have gained sufficient knowledge to efficiently design, implement, and maintain a network infrastructure as a successful network professional within the industry. You'll also have gained knowledge of all the official CompTIA Network+ N10-008 exam objectives, networking technologies, and how to apply your skills in the real world.

What you will learn

  • Explore common networking concepts, services, and architecture
  • Identify common cloud architecture and virtualization concepts
  • Discover routing and switching technologies
  • Implement wireless technologies and solutions
  • Understand network security concepts to mitigate cyber attacks
  • Explore best practices to harden networks from threats
  • Use best practices to discover and resolve common networking issues

Who this book is for

This book is for students, network administrators, network engineers, NOC engineers, systems administrators, cybersecurity professionals, and enthusiasts. No prior knowledge in networking is required to get started with this book.

Table of contents

  1. CompTIA Network+ N10-008 Certification Guide
  2. Contributors
  3. About the author
  4. About the reviewer
  5. Preface
    1. Who this book is for
    2. What this book covers
    3. To get the most out of this book
    4. Download the color images
    5. Conventions used
    6. Get in touch
    7. Share your thoughts
    8. Download a free PDF copy of this book
  6. Part 1: Networking Concepts
  7. Chapter 1: Exploring the OSI Model and TCP/IP
    1. Technical requirements
    2. The need for networking models
    3. Exploring the OSI model
      1. Application layer
      2. Presentation layer
      3. Session layer
      4. Transport layer
      5. Network layer
      6. Data Link layer
      7. Physical layer
    4. Understanding TCP/IP
    5. Data encapsulation concepts
      1. Ethernet header
      2. IP headers
      3. TCP header
      4. UDP headers
    6. Analyzing network packets
    7. Summary
    8. Questions
    9. Further reading
  8. Chapter 2: Network Topologies and Connections
    1. Understanding network topologies
      1. Types of network topologies
    2. Discovering network types
      1. Peer-to-peer
      2. Client-server
      3. Personal area network
      4. Local area network
      5. Wide area network
      6. Metropolitan area network
      7. Wireless local area network
      8. Campus area network
      9. Storage area network
      10. Software-defined wide area network
      11. Multiprotocol label switching
      12. Multipoint generic routing encapsulation
    3. Identifying service-related entry points
    4. Comparing provider links
      1. Satellite
      2. Digital Subscriber Line
      3. Cable
      4. Leased line
      5. Metro optical
    5. Summary
    6. Questions
    7. Further reading
  9. Chapter 3: Ethernet Technology and Virtualization
    1. Technical requirements
    2. Types of connections
      1. Copper cables
      2. Fiber optic cables
      3. Cable management
    3. Ethernet standards
    4. Virtual network concepts
      1. Hypervisors
      2. Virtual networking components
      3. Lab – creating a virtual machine
    5. Summary
    6. Questions
    7. Further reading
  10. Chapter 4: Understanding IPv4 and IPv6 Addressing
    1. Technical requirements
    2. The need for IP addressing
      1. Public versus private address spaces
      2. Network Address Translation (NAT)
    3. Exploring the structure of IPv4 and IPv6
      1. Fundamentals of IPv4
      2. Fundamentals of IPv6
    4. Types of IPv4 and IPv6 addresses
      1. Automatic Private IP Addressing (APIPA)
      2. Extended unique identifier (EUI-64)
      3. Unicast
      4. Multicast
      5. Broadcast
      6. Anycast
      7. Link-local
      8. Loopback
      9. Unique local address
      10. Default gateway
    5. Delving into IPv6 concepts
      1. Tunneling
      2. Dual stack
      3. Translation
      4. Router advertisement
      5. Stateless Address Autoconfiguration (SLAAC)
    6. Configuring IP addresses
      1. Windows operating system
      2. Linux operating system
      3. Cisco IOS router
    7. Summary
    8. Questions
    9. Further reading
  11. Chapter 5: Applied IPv4 Subnetting
    1. Understanding the purpose of the subnet mask
    2. Delving into network prefixes and subnet masks
    3. Determining the network ID
    4. Understanding the importance of subnetting
    5. IPv4 subnetting and VLSM
      1. Step 1 – determining the appropriate IPv4 block
      2. Step 2 – creating new subnets (subnetworks)
      3. Step 3 – assigning subnets to each network
      4. Step 4 – performing Variable-Length Subnet Masking (VLSM)
    6. Summary
    7. Questions
    8. Further reading
  12. Chapter 6: Exploring Network Protocols and Services
    1. Technical requirements
    2. Network protocols
      1. File protocols
      2. Remote access protocols
      3. Email protocols
      4. HTTP and HTTPS
      5. SQL database protocols
      6. Lightweight Directory Access Protocol
      7. Syslog
      8. Session Initiation Protocol
    3. Network protocol types
      1. Internet Control Message Protocol
      2. TCP
      3. UDP
    4. Network services
      1. Network Time Protocol
      2. Dynamic Host Configuration Protocol
      3. DNS
      4. Simple Network Management Protocol
    5. Lab – analyzing FTP packets
    6. Lab – analyzing TFTP packets
    7. Lab – analyzing SMB packets
    8. Lab – analyzing Telnet packets
    9. Lab – reassembling a SIP telephone conversation
    10. Summary
    11. Questions
    12. Further reading
  13. Chapter 7: Data Center Architecture and Cloud Computing
    1. Understanding network architecture
      1. Cisco 3-tier architecture
      2. Cisco 2-tier architecture
    2. Discovering software-defined networking
      1. Components of SDN
    3. Exploring data center architectures
      1. Branch office versus on-premises
      2. Spine and leaf
    4. Delving into storage area networks
      1. Connection types
    5. Fundamentals of cloud computing
      1. Deployment models
      2. Cloud service models
      3. Cloud connectivity solutions
    6. Summary
    7. Questions
    8. Further reading
  14. Part 2: Network Implementation
  15. Chapter 8: Networking Devices
    1. Understanding networking devices
      1. Hub
      2. Layer 2 switch
      3. Layer 3 capable switch
      4. Bridge
      5. Router
      6. Access point
      7. Wireless LAN controller
      8. Load balancer
      9. Proxy server
      10. Internet modems
      11. Repeater
      12. Voice gateways and media converters
    2. Exploring security appliances
      1. Firewall
      2. IPS/IDS
    3. Types of networked devices
    4. Summary
    5. Questions
    6. Further reading
  16. Chapter 9: Routing and Switching Concepts
    1. Exploring routing concepts
    2. Understanding routing protocols
      1. Dynamic routing
      2. Static routing
    3. Bandwidth management
    4. Delving into switching concepts
      1. PoE
      2. Spanning-Tree
      3. Port aggregation
      4. Neighbor discovery protocol
    5. Exploring VLAN
      1. Types of VLANs
    6. Understanding switch port configurations
      1. Duplex and speed
      2. Port mirroring
      3. Port security
      4. Auto MDI-X
    7. Summary
    8. Questions
    9. Further reading
  17. Chapter 10: Exploring Wireless Standards and Technologies
    1. Exploring wireless networking
      1. Beacons, probes, stations, and SSIDs
      2. Frequencies, ranges, and channels
      3. SSID
      4. Antenna types
      5. MIMO concepts
    2. Delving into wireless security
      1. Wireless encryption standards
      2. Authentication methods
    3. Exploring cellular technologies
    4. Summary
    5. Questions
    6. Further reading
  18. Part 3: Network Operations
  19. Chapter 11: Assuring Network Availability
    1. Network performance metrics
      1. SNMP
      2. Network device logs
    2. Understanding interface issues
      1. Checking the link state (up/down)
      2. Checking the speed
      3. Checking the duplex
      4. Checking the uptime/downtime
      5. Interface errors or alerts
    3. Environmental factors and sensors
    4. Summary
    5. Questions
    6. Further reading
  20. Chapter 12: Organizational Documents and Policies
    1. Plans and procedures
      1. Change management
      2. Incident response plans
      3. The business continuity plan
      4. Disaster recovery plans
      5. The system life cycle
      6. Standard operating procedures
    2. Hardening and security policies
      1. Password policies
      2. Acceptable use policy
      3. Bring your own device policies
      4. Remote access policies
      5. Onboarding and off-boarding policies
      6. Security policies
      7. Data loss prevention
    3. Common documentation
    4. Common agreements
    5. Summary
    6. Questions
    7. Further reading
  21. Chapter 13: High Availability and Disaster Recovery
    1. High availability concepts
      1. Diverse paths
      2. Infrastructure redundancy
      3. Active-active versus active-passive configurations
      4. First hop redundancy
    2. Disaster recovery concepts
      1. Recovery sites
      2. Facilities and infrastructure support
      3. Network device backup/restore
    3. Summary
    4. Questions
    5. Further reading
  22. Part 4: Network Security and Troubleshooting
  23. Chapter 14: Network Security Concepts
    1. Understanding network security
      1. Confidentiality, integrity, and availability
      2. Threats, vulnerabilities, and exploits
      3. Least privilege and RBAC
      4. Defense in Depth and zero trust
    2. Exploring authentication methods
      1. Multi-factor authentication
      2. Kerberos, single sign-on, and LDAP
    3. Risk management
      1. Security risk assessments
    4. Summary
    5. Questions
    6. Further reading
  24. Chapter 15: Exploring Cyberattacks and Threats
    1. Exploring network-based attacks
      1. Denial of service
      2. Botnets
      3. On-path attack
      4. DNS-based attack
      5. VLAN hopping
      6. Rogue DHCP
      7. Password attacks
    2. Understanding wireless attacks
      1. Rogue access points and evil twins
      2. Deauthentication attacks
    3. Delving into human and environmental attacks
      1. Social engineering
      2. Types of social engineering attacks
    4. Summary
    5. Questions
    6. Further reading
  25. Chapter 16: Implementing Network Security
    1. Network hardening techniques
    2. Wireless security techniques
      1. SSID considerations
      2. Password considerations
      3. MAC filtering
      4. Antennas and power levels
      5. Geofencing and captive portals
      6. Client isolation
      7. Wireless authentication protocols
      8. Installation considerations
    3. Remote connectivity methods
      1. Remote access methods
    4. Importance of physical security
    5. Summary
    6. Questions
    7. Further reading
  26. Chapter 17: Network Troubleshooting
    1. Network troubleshooting methodology
    2. Cable connectivity issues
      1. Link lights/status indicators
      2. Damaged cables and connectors
      3. Incorrect TX/RX alignment
      4. Attenuation
      5. Crosstalk and Electro-Magnetic Interference (EMI)
      6. Bad ports/transceivers
      7. VLAN mismatch
      8. Sub-optimal performance
    3. Wireless connectivity issues
      1. Physical layer issues
      2. Antenna issues
      3. Signal power issues
      4. Interference
      5. Client configuration issues
    4. Common network issues
    5. Hardware-based troubleshooting tools
    6. Software-based tools and commands
      1. Packet sniffer
      2. Port scanner
      3. Wi-Fi analyzer
      4. Bandwidth speed tester
      5. Command-line tools
    7. Summary
    8. Questions
    9. Further reading
  27. Chapter 18: Practice Exam
    1. Questions
    2. Answers
  28. Assessments
    1. Chapter 1 – Exploring the OSI Model and TCP/IP
    2. Chapter 2 – Network Topologies and Connections
    3. Chapter 3 – Ethernet Technology and Virtualization
    4. Chapter 4 – Understanding IPv4 and IPv6 Addressing
    5. Chapter 5 – Applied IPv4 Subnetting
    6. Chapter 6 – Exploring Network Protocols and Services
    7. Chapter 7 – Data Center Architecture and Cloud Computing
    8. Chapter 8 – Network Devices
    9. Chapter 9 – Routing and Switching Concepts
    10. Chapter 10 – Exploring Wireless Standards and Technologies
    11. Chapter 11 – Assuring Network Availability
    12. Chapter 12 – Organizational Documents and Policies
    13. Chapter 13 – High Availability and Disaster Recovery
    14. Chapter 14 – Network Security Concepts
    15. Chapter 15 – Exploring Cyber Attacks and Threats
    16. Chapter 16 – Implementing Network Security
    17. Chapter 17 – Network Troubleshooting
  29. Index
    1. Why subscribe?
  30. Other Books You May Enjoy
    1. Packt is searching for authors like you
    2. Share your thoughts
    3. Download a free PDF copy of this book

Product information

  • Title: CompTIA Network+ N10-008 Certification Guide - Second Edition
  • Author(s): Glen D. Singh
  • Release date: November 2022
  • Publisher(s): Packt Publishing
  • ISBN: 9781803236063