Network+/Objectives
Appearance
< Network+
1.0 Networking Concepts
[edit | edit source]1.1 Explain concepts related to the Open Systems Interconnection (OSI) reference model.
[edit | edit source]- OSI model
- Layer 1 - Physical
- Layer 2 - Data link
- Layer 3 - Network
- Layer 4 - Transport
- Layer 5 - Session
- Layer 6 - Presentation
- Layer 7 - Application
1.2 Compare and contrast networking appliances, applications, and functions.
[edit | edit source]
|
|
1.3 Summarize cloud concepts and connectivity options.
[edit | edit source]
|
|
1.4 Explain common networking ports, protocols, services, and traffic types.
[edit | edit source]Protocols | Ports |
---|---|
File Transfer Protocol (FTP) | 20/21 |
Secure File Transfer Protocol (SFTP) | 22 |
Secure Shell (SSH) | 22 |
Telnet | 23 |
Simple Mail Transfer Protocol (SMTP) | 25 |
Domain Name System (DNS) | 53 |
Dynamic Host Configuration Protocol (DHCP) | 67/68 |
Trivial File Transfer Protocol (TFTP) | 69 |
Hypertext Transfer Protocol (HTTP) | 80 |
Network Time Protocol (NTP) | 123 |
Simple Network Management Protocol (SNMP) | 161/162 |
Lightweight Directory Access Protocol (LDAP) | 389 |
Hypertext Transfer Protocol Secure (HTTPS) | 443 |
Server Message Block (SMB) | 445 |
Syslog | 514 |
Simple Mail Transfer Protocol Secure (SMTPS) | 587 |
Lightweight Directory Access Protocol over SSL (LDAPS) | 636 |
Structured Query Language (SQL) Server | 1433 |
Remote Desktop Protocol (RDP) | 3389 |
Session Initiation Protocol (SIP) | 5060/5061 |
- Internet Protocol (IP) types
- Internet Control Message Protocol (ICMP)
- Transmission Control Protocol (TCP)
- User Datagram Protocol (UDP)
- Generic Routing Encapsulation (GRE)
- Internet Protocol Security (IPSec)
- Authentication Header (AH)
- Encapsulating Security Payload (ESP)
- Internet Key Exchange (IKE)
- Traffic types
1.5 Compare and contrast transmission media and transceivers.
[edit | edit source]
|
|
1.6 Compare and contrast network topologies, architectures, and types.
[edit | edit source]
|
|
1.7 Given a scenario, use appropriate IPv4 network addressing.
[edit | edit source]
|
|
1.8 Summarize evolving use cases for modern network environments
[edit | edit source]
|
|
2.0 Network Implementation
[edit | edit source]2.1 Explain characteristics of routing technologies.
[edit | edit source]
|
|
2.2 Given a scenario, configure switching technologies and features.
[edit | edit source]
|
|
2.3 Given a scenario, select and configure wireless devices and technologies.
[edit | edit source]
|
|
2.4 Explain important factors of physical installations.
[edit | edit source]
|
|
3.0 Network Operations
[edit | edit source]3.1 Explain the purpose of organizational processes and procedures.
[edit | edit source]
|
|
3.2 Given a scenario, use network monitoring technologies.
[edit | edit source]
|
|
3.3 Explain disaster recovery (DR) concepts.
[edit | edit source]
|
|
3.4 Given a scenario, implement IPv4 and IPv6 network services.
[edit | edit source]
|
|
3.5 Compare and contrast network access and management methods.
[edit | edit source]- Site-to-site VPN
- Client-to-site VPN
- Clientless
- Split tunnel vs. full tunnel
- Connection methods
- SSH
- Graphical user interface (GUI)
- API
- Console
- Jump box/host
- In-band vs. out-of-band management
4.0 Network Security
[edit | edit source]4.1 Explain the importance of basic network security concepts.
[edit | edit source]
|
|
4.2 Summarize various types of attacks and their impact to the network.
[edit | edit source]
|
|
4.3 Given a scenario, apply network security features, defense techniques, and solutions.
[edit | edit source]
|
|
5.0 Network Troubleshooting
[edit | edit source]5.1 Explain the troubleshooting methodology.
[edit | edit source]
1. Identify the problem
2. Establish a theory of probable cause
|
3. Test the theory to determine the cause
4. Establish a plan of action to resolve the problem and identify potential effects 5. Implement the solution or escalate as necessary 6. Verify full system functionality and implement preventive measures if applicable 7. Document findings, actions, outcomes, and lessons learned throughout the process |
5.2 Given a scenario, troubleshoot common cabling and physical interface issues.
[edit | edit source]
|
|
5.3 Given a scenario, troubleshoot common issues with network services.
[edit | edit source]
|
|
5.4 Given a scenario, troubleshoot common performance issues.
[edit | edit source]
|
|
5.5 Given a scenario, use the appropriate tool or protocol to solve networking issues.
[edit | edit source]
|
|