Live Online Style Video +Live Instructor + Official Course-Book + Hands-on Labs

CompTIA Network+ (N10-007)

Includes:

  1. Power Packed 28 Hours (Edited from 40 hours of Live Training)
  2. 6 months access to videos.
  3. Access via Laptop, Tab, Mobile, and Smart TV.
  4. Certificate of Completion.
  5. Official Course-Book
  6. 1,230+ Tests Questions (Qubits42)
You can also purchase an annual plan for USD 999. For one year, all Flexi Videos will be free for you. Buy Annual Plan

You will get access to Flexi Video within 30 minutes.

Flexi Video

USD 199

Official Course-Book Instructor Hand-outs

USD 0

Hands-On-Labs

NA

Total

USD 199

100% Refund for Flexi Video (Course-Book is non-refundable) if user is not satisfied with the Video and seeks refund within 30 days of purchase.

Download Course Contents
Chapter 1. Computer Network Fundamentals
  • What is the purpose of a network?
  •   What are some examples of network components?
  • How are networks defined by geography?
  • How are networks defined by topology?
  • How are networks defined by resource location?
  • What is the purpose of a network model?
  • What are the layers of the OSI model?
  • What are the characteristics of each layer of the OSI model?
  • How does the TCP/IP stack compare to the OSI model?
  • What are the well-known TCP and/or UDP port numbers for a given collection of common applications?
  • What are the characteristics of various media types?
  • What is the role of a given network infrastructure component?
  • Specialized network devices offer what features?
  • How are virtualization technologies changing traditional corporate data center designs?
  • What are some of the primary protocols and hardware components found in a Voice over IP (VoIP) network?
  • What are the characteristics of Ethernet networks, in terms of media access, collisions domains, broadcast domains, and distance/speed limitations of various Ethernet standards?
  • Ethernet switches perform what functions? How are these functions related to VLANs, trunks, Spanning Tree Protocol, link aggregation, Power over Ethernet, port monitoring, user authentication, and first-hop redundancy?
  • How are decimal numbers represented in binary format?
  • What is the format of an IP Version 4 (IPv4) address, and what are the distinctions between unicast, broadcast, and multicast addresses?
  • Which options are available for assigning IP addresses to networked devices?
  • Given a subnet design need (for example, a number of required subnets and a number of required hosts per subnet), how do you decide the right subnet mask for a network?
  • Given a subnet design need (for example, a number of required subnets and a number of required hosts per subnet), how do you decide the right subnet mask for a network?
  • How are source and destination IP addresses used to route traffic through a network?
  • What are sources for routing information used to populate a router’s routing table?
  • What are sources for routing information used to populate a router’s routing table?
  • When multiple routing protocols know how to reach a destination network, which route is chosen?
  • When a single routing protocol knows of multiple routes to reach a destination network, how is the preferred path (or paths) chosen?
  •    What is the distinction between an Interior Gateway Protocol (IGP) and an Exterior Gateway Protocol (EGP)?
  • What are the primary differences between distance-vector and link-state routing ...?
  • What are three categories of wide area network (WAN) connections?
  • How are data rates measured on various WAN technologies?
  • Which types of media (or wireless technologies) might you use in WAN connections?
  • What are the characteristics of the following WAN technologies? Dedicated leased line, digital subscriber line (DSL), cable modem, Synchronous Optical Network (SONET), satellite, plain old telephone service (POTS), Integrated Services Digital Network (ISD
  • How do various wireless LAN technologies function, and what wireless standards are in common use?
  • What are some of the most important WLAN design considerations?
  • What WLAN security risks exist, and how can you mitigate those risks?
  • Why is high availability a requirement in today’s network designs, and what mechanisms can help provide that high availability?
  • What various technologies optimize network performance?
  • What QoS mechanisms can help optimize network performance?
  • Using what you have learned in this and previous chapters, how do you design a SOHO network based on a set of requirements?
  • What are some of the more useful Microsoft Windows commands for configuring and troubleshooting network clients and servers?
  • What are some of the more useful UNIX commands for configuring and troubleshooting network clients and servers?
  • What are some of the more common tools used to physically maintain a network?
  • What are components found in effective network documentation?
  • What are components found in effective network documentation?
  • What are the goals of network security, and what sorts of attacks do you need to defend against?
  • What best practices can be implemented to defend against security threats?
  • What are the characteristics of various remote-access security technologies?
  • How can firewalls be used to protect an organization’s internal network, while allowing connectivity to an untrusted network such as the Internet?
  • How can virtual private networks (VPNs) be used to secure traffic as that traffic flows over an untrusted network?
  • What is the difference between intrusion prevention and intrusion detection systems, and how do they protect an organization ...?
  • What are the common policies used in the modern network?
  • What are the common best practices?
  • What are the elements in a structured troubleshooting model?
  • What common physical layer troubleshooting issues might you encounter?
  • What potential Layer 2 issues are you most likely to face when troubleshooting a network containing Ethernet switches?
  • Aside from routing protocol troubleshooting, what Layer 3 troubleshooting issues are common in a routed network?
  • How do characteristics unique to wireless networks impact your troubleshooting of a network containing wireless access points?

Learn more about Koenig. Download Presentation Buy Other Flexi

FAQ's

Yes, you do. Flexi Videos do not include Course-Book or Labs.
Yes, Course-Book and Lab are not included in the annual plan. All Flexi videos are included.
Videos can only be streamed and not downloaded.
We do not track the pass rate of Flexi students. However, we trust it will be lower than for Live Online.
6 months from the date of delivery.
We use the best standards in Internet security. Any data retained is not shared with third parties.
You will be provided access to LET ( Learning Enhancement Tool), where you will get the links to access all your purchases.
Flexi video for the new version will be provided free of cost.
Yes, you can pay from this web page.
Yes, the site is secure by utilizing Secure Sockets Layer (SSL) Technology. SSL technology enables the encryption of sensitive information during online transactions. We use the highest assurance SSL/TLS certificate, which ensures that no unauthorized person can get to your sensitive payment data over the web.
It is only for one user.
Yes, contact us for corporate packages.
Presently, Flexi is only available in English.
It’s a unique subscription plan where customers can avail unlimited Flexi courses within a year.
The subscription plan is valid for 1 year from the date of purchase.
No, this is limited to one user and its non-transferable.

Feedbacks from Clients