Network+/Objectives
< Network+
1.0 Networking Concepts
edit1.1 Explain concepts related to the Open Systems Interconnection (OSI) reference model.
edit- OSI model
- Layer 1 - Physical
- Layer 2 - Data link
- Layer 3 - Network
- Layer 4 - Transport
- Layer 5 - Session
- Layer 6 - Presentation
- Layer 7 - Application
1.2 Compare and contrast networking appliances, applications, and functions.
edit
|
|
1.3 Summarize cloud concepts and connectivity options.
edit
|
|
1.4 Explain common networking ports, protocols, services, and traffic types.
editProtocols | Ports |
---|---|
File Transfer Protocol (FTP) | 20/21 |
Secure File Transfer Protocol (SFTP) | 22 |
Secure Shell (SSH) | 22 |
Telnet | 23 |
Simple Mail Transfer Protocol (SMTP) | 25 |
Domain Name System (DNS) | 53 |
Dynamic Host Configuration Protocol (DHCP) | 67/68 |
Trivial File Transfer Protocol (TFTP) | 69 |
Hypertext Transfer Protocol (HTTP) | 80 |
Network Time Protocol (NTP) | 123 |
Simple Network Management Protocol (SNMP) | 161/162 |
Lightweight Directory Access Protocol (LDAP) | 389 |
Hypertext Transfer Protocol Secure (HTTPS) | 443 |
Server Message Block (SMB) | 445 |
Syslog | 514 |
Simple Mail Transfer Protocol Secure (SMTPS) | 587 |
Lightweight Directory Access Protocol over SSL (LDAPS) | 636 |
Structured Query Language (SQL) Server | 1433 |
Remote Desktop Protocol (RDP) | 3389 |
Session Initiation Protocol (SIP) | 5060/5061 |
- Internet Protocol (IP) types
- Internet Control Message Protocol (ICMP)
- Transmission Control Protocol (TCP)
- User Datagram Protocol (UDP)
- Generic Routing Encapsulation (GRE)
- Internet Protocol Security (IPSec)
- Authentication Header (AH)
- Encapsulating Security Payload (ESP)
- Internet Key Exchange (IKE)
- Traffic types
1.5 Compare and contrast transmission media and transceivers.
edit
|
|
1.6 Compare and contrast network topologies, architectures, and types.
edit
|
|
1.7 Given a scenario, use appropriate IPv4 network addressing.
edit
|
|
1.8 Summarize evolving use cases for modern network environments
edit
|
|
2.0 Network Implementation
edit2.1 Explain characteristics of routing technologies.
edit
|
|
2.2 Given a scenario, configure switching technologies and features.
edit
|
|
2.3 Given a scenario, select and configure wireless devices and technologies.
edit
|
|
2.4 Explain important factors of physical installations.
edit
|
|
3.0 Network Operations
edit3.1 Explain the purpose of organizational processes and procedures.
edit
|
|
3.2 Given a scenario, use network monitoring technologies.
edit
|
|
3.3 Explain disaster recovery (DR) concepts.
edit
|
|
3.4 Given a scenario, implement IPv4 and IPv6 network services.
edit
|
|
3.5 Compare and contrast network access and management methods.
edit- Site-to-site VPN
- Client-to-site VPN
- Clientless
- Split tunnel vs. full tunnel
- Connection methods
- SSH
- Graphical user interface (GUI)
- API
- Console
- Jump box/host
- In-band vs. out-of-band management
4.0 Network Security
edit4.1 Explain the importance of basic network security concepts.
edit
|
|
4.2 Summarize various types of attacks and their impact to the network.
edit
|
|
4.3 Given a scenario, apply network security features, defense techniques, and solutions.
edit
|
|
5.0 Network Troubleshooting
edit5.1 Explain the troubleshooting methodology.
edit
1. Identify the problem
2. Establish a theory of probable cause
|
3. Test the theory to determine the cause
4. Establish a plan of action to resolve the problem and identify potential effects 5. Implement the solution or escalate as necessary 6. Verify full system functionality and implement preventive measures if applicable 7. Document findings, actions, outcomes, and lessons learned throughout the process |
5.2 Given a scenario, troubleshoot common cabling and physical interface issues.
edit
|
|
5.3 Given a scenario, troubleshoot common issues with network services.
edit
|
|
5.4 Given a scenario, troubleshoot common performance issues.
edit
|
|
5.5 Given a scenario, use the appropriate tool or protocol to solve networking issues.
edit
|
|