AUCKLAND (09) 378-0411       HAMILTON (07) 838-0700       WELLINGTON (04) 472-4830      CHRISTCHURCH (03) 365-5020      |      
Home Courses CompTIA Network+


CompTIA Network+

Length: 5 Days    Cost: $3,500 + GST    Version: CompTIA

= Scheduled class    = Guaranteed to run    = Fully booked
Click on the dates to book online

Can't find a class in your area? Contact our sales team and request a class date.

About this Course

This 5-day course is intended for those wishing to qualify with CompTIA Network+ Certification. Network+ is a foundation-level certification designed for IT professionals with around 1 year's experience whose job role is focused on network administration.

This course will teach you the fundamental principles of installing, configuring, and troubleshooting network technologies and help you to progress a career in network administration. It will prepare you to take the CompTIA Network+ exam by providing 100% coverage of the objectives and content examples listed on the syllabus


Ideally, you should have successfully completed the "CompTIA A+ Support Skills" course, achieved CompTIA A+ certification, and have around 9-12 months' experience of networking support or IT administration. It is not necessary that you pass the A+ exams before completing Network+ certification, but it is recommended.

Regardless of whether you have passed A+, it is recommended that you have the following skills and knowledge before starting this course:

  • Configure and support PC, laptop, mobile (smartphone / tablet), and print devices.
  • Know basic network terminology and functions (such as Ethernet, TCP/IP, switches, routers).
  • Configure and manage users, groups, and shared resources in a simple SOHO network.
  • Understand the use of basic access control measures, such as authentication, security policy, encryption, and firewalls.

At Course Completion

On course completion, you will be able to:

  • Describe the features of different network protocols and products for LANs, WANs, and wireless networks.
  • Understand the functions and features of TCP/IP addressing and protocols.
  • Identify threats to network resources and appropriate security countermeasures.
  • Install and configure network cabling and appliances.
  • Manage, monitor, and troubleshoot networks.

Course Outline

Module 1 / Topologies and Infrastructure

Topologies and the OSI Model

Key Features of Networks

Clients and Servers

Network Topologies

The OSI Model

Physical Layer

Data Link Layer

Network Layer

Transport Layer

Upper Layers

OSI Model Summary


Transmission Media

Signaling and Modulation

Media Access Control

Ethernet Frames

Legacy Ethernet Standards

Modern Ethernet Standards

MAC Addressing

Address Resolution Protocol (ARP)

Protocol Analyzers


Configuring a Network Adapter

Using Hyper-V

ARP and Packet Analysis

Hubs, Bridges, and Switches

Hubs and Bridges


Virtual LANs (VLAN)

Spanning Tree Protocol (STP)

Power over Ethernet (PoE)

Infrastructure and Design

Network Infrastructure Implementations

Planning an Enterprise Campus Network

Planning a SOHO Network

Planning an Industrial Control System

TCP/IP Protocol Suite

Module 2 / Addressing and Routing

Internet Protocol

Internet Protocol Address Format

Subnet Masks

ipconfig / ifconfig

IP Routing Basics

ICMP and ping


IP Address Configuration

IPv4 Addressing

IPv4 Addressing Schemes

Subnetting and Classless Addressing

Planning an IPv4 Addressing Scheme

Public Internet Addressing

Multicast and IGMP


IP Addressing Schemes


IPv4 Address Autoconfiguration

Configuring DHCP


Configuring DHCP Clients and Servers

Configuring DHCP in Windows

Configuring DHCP in Linux

IPv6 Addressing

IPv6 Address Format

IPv6 Addressing Schemes

IPv6 Address Autoconfiguration

Migrating to IPv6



Routing Basics

Routing Algorithms and Metrics

Routing Protocols

Administrative Distance and Route Redistribution

IPv4 and IPv6 Internet Routing

High Availability Routing

Installing and Configuring Routers

Routing Troubleshooting Tools


Configuring Routing

Module 3 / Troubleshooting and Management

Transport Protocols

Transmission Control Protocol (TCP)

User Datagram Protocol (UDP)

TCP and UDP Ports



TCP and Port Scanning

Name Resolution

Host Names and FQDNs

Domain Name System (DNS)

Configuring DNS Servers

nslookup and nbtstat


Name Resolution

Configuring DNS


Troubleshooting Procedures

Identifying the Problem

Establishing a Probable Cause

Establishing a Plan of Action

Troubleshooting Connectivity Issues

Troubleshooting Configuration Issues

Troubleshooting Internetworking

Troubleshooting Services

Applications and Services

TCP/IP Services

Web Services (HTTP / HTTPS)

File Transfer Services (FTP / TFTP / SMB)

Email Services (SMTP / POP / IMAP)

Voice Services (VoIP and VTC)

Real-time Services Protocols

Quality of Service

Packet Shapers

Load Balancers

Multilayer Switches


Configuring Email Services

Management and Monitoring

Performance Monitoring

Network Monitoring Utilities


Analyzing Performance Metrics

Simple Network Management Protocol

Remote Administration Tools


Performance Testing and Monitoring

Monitoring and Management Tools

Cloud and Virtualization

Virtualization Technologies

Storage Area Networks (SAN)

Cloud Computing

Module 4 / Installation

Network Sites

Wiring Distribution

Rack Systems

Safety and ESD

Power Management

Heating, Ventilation, Air Conditioning (HVAC)

Physical Security Controls

Fire Prevention and Suppression

Installing Cable

Twisted Pair Cable (UTP / STP / ScTP)

Twisted Pair Connectors

Wiring Tools and Techniques

Cable Testing and Troubleshooting

Other Copper Cable Types

Fiber Optic Cable and Connectors

Interface and Media Converters

Troubleshooting Fiber Cable Issues

Installing Wireless Networks

Wireless Standards (IEEE 802.11)

Wireless Network Topologies

Wireless Site Design

Site Surveys and Antenna Placement

Troubleshooting Wireless Links

WAN Technologies

Wide Area Networks (WAN)

Telecommunications Networks

Modern Telecommunications Networks

Packet Switched WAN Services

Local Loop Services

Wireless WAN Services

Remote Access

Remote Access Services (RAS)

Virtual Private Networks (VPN)


IP Security (IPsec)

Remote Access Servers

Installing Remote Access Links

Troubleshooting WAN Issues

Module 5 / Security

Vulnerabilities and Threats

Security Basics

Social Engineering

Network Reconnaissance

Wireless Security

Network Attack Strategies

Denial of Service

Security Appliances

Network Segmentation

Zones and Access Control Lists (ACL)

Network Address Translation (NAT)

Basic Firewalls

Advanced Firewalls

Proxies and Gateways

Anti-malware Software

Intrusion Detection Systems (IDS)


Configuring Certificate Services, HTTPS, and FTPS

Configuring a NAT Firewall


Authentication Technologies

Cryptographic Hash Functions

NTLM and Kerberos



Wi-Fi Authentication

Endpoint Security

Network Access Control

Mobile Device Management

Troubleshooting Authentication and ACLs


Authentication Methods and VPNs

Incident Response

Business Continuity Concepts

IT Contingency Planning

Disaster Recovery Planning


Incident Response Procedures

Forensic Procedures

Collection of Evidence

Change and Configuration Management

Change and Configuration Management


Procedures and Standards

Employee Policies

Patch Management

Backup Plans and Policies

 Print this page