CompTIA A+ / Network+ Training Description
Duration: 7 days
About the Course
Fast-track your training with this 7-day intensive where you will cover two in-demand certifications. The CompTIA A+, which provides the background knowledge and skills you will require to be a successful IT technician. And the CompTIA Network+, which ensures that the successful candidate has the important knowledge and skills necessary to manage, maintain, troubleshoot, install, operate and configure basic network infrastructure.
The CompTIA A+ / Network +Certification bootcamp provides technical skills training on supporting operating systems, installing, and configuring PC systems unit components and peripheral devices, troubleshooting display and multimedia devices, troubleshooting storage and internal system components. Additionally, students will learn to install and configure operating systems, troubleshoot network connections, manage users, workstations, and shared resources, implementing client virtualization and cloud computing and implementing physical security. Finally, students will learn basic network theory concepts and major network communication methods, bounded and unbounded network media, network implementations, TCP/IP addressing and data delivery methods. Additionally, students will learn routing technologies, major series deployed on TCP/IP, wan implementation, cloud computing, virtualization, and network security. This training course prepares students for Exam CompTIA Exam CompTIA A+ Core 1 220-1101 and CompTIA A+ Core 2 220-1102 and Exam Network+ N10-008.
Audience Profile
This course is intended for those who are looking for a 7-day intensive to certify in both Network+ and CompTIA A+
Learning Objectives
CompTIA A+:
- Configure, install and upgrade operating systems, including: Windows, Apple OS X, Linux, iOS, Android and Windows Mobile
- Install and image virtual machines
- Set up and troubleshoot peripheral devices
- Assemble and disassemble computing hardware
- Set up and support basic home and small office networks
- Implement cybersecurity controls appropriate to helpdesk and technical support roles
- Troubleshoot and support end-user access to applications and data
CompTIA Network+:
- Design and implement functional networks
- Configure, manage, and maintain essential network devices
- Use devices such as switches and routers to segment network traffic and create resilient networks
- Identify benefits and drawbacks of existing network configurations
- Implement network security, standards and protocols
- Troubleshoot network problems
- Support the creation of virtualized networks
Certification Exam
This training course prepares students for:
- CompTIA A+ Core 1 220-1101
- CompTIA A+ Core 2 220-1102
- Network+ N10-008.
Prerequisites
There are no prerequisites for this bootcamp, however basic computer skills would be beneficial.
What’s included?
- Authorized Courseware
- Intensive Hands on Skills Development with an Experienced Subject Matter Expert
- Hands-on practice on real Servers and extended lab support 1.800.482.3172
- Examination Vouchers & Onsite Certification Testing- (excluding Adobe and PMP Boot Camps)
- Academy Code of Honor: Test Pass Guarantee
- Optional: Package for Hotel Accommodations, Lunch and Transportation
With several convenient training delivery methods offered, The Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Academy for an engaging and effective learning experience.
Methods
- Instructor Led (the best training format we offer)
- Live Online Classroom – Online Instructor Led
- Self-Paced Video
Speak to an Admissions Representative for complete details
Start | Finish | Public Price | Public Enroll | Private Price | Private Enroll |
---|---|---|---|---|---|
9/2/2024 | 9/8/2024 | ||||
9/23/2024 | 9/29/2024 | ||||
10/14/2024 | 10/20/2024 | ||||
11/4/2024 | 11/10/2024 | ||||
11/25/2024 | 12/1/2024 | ||||
12/16/2024 | 12/22/2024 | ||||
1/6/2025 | 1/12/2025 | ||||
1/27/2025 | 2/2/2025 | ||||
2/17/2025 | 2/23/2025 | ||||
3/10/2025 | 3/16/2025 | ||||
3/31/2025 | 4/6/2025 | ||||
4/21/2025 | 4/27/2025 | ||||
5/12/2025 | 5/18/2025 | ||||
6/2/2025 | 6/8/2025 | ||||
6/23/2025 | 6/29/2025 | ||||
7/14/2025 | 7/20/2025 | ||||
8/4/2025 | 8/10/2025 | ||||
8/25/2025 | 8/31/2025 | ||||
9/15/2025 | 9/21/2025 | ||||
10/6/2025 | 10/12/2025 | ||||
10/27/2025 | 11/2/2025 | ||||
11/17/2025 | 11/23/2025 | ||||
12/8/2025 | 12/14/2025 | ||||
12/29/2025 | 1/4/2026 |
Curriculum
CORE 1 (220-1101)
1.0 Mobile Devices
1.1 Given a scenario, install and configure laptop hardware and components.
• Hardware/device replacement
– Keyboard
– Hard drive
– SSD vs. hybrid vs. magnetic disk
– 1.8in vs. 2.5in
– Memory
– Smart card reader
– Optical drive
– Wireless card/Bluetooth module
– Cellular card
– Video card
– Mini PCIe
– Screen
– DC jack
– Battery
– Touchpad
– Plastics/frames
– Speaker
– System board
– CPU
1.2 Given a scenario, install components within the display of a laptop.
• Types
– LCD
– OLED
• WiFi antenna connector/placement
• Webcam
• Microphone
• Inverter
• Digitizer/touchscreen
1.3 Given a scenario, use appropriate laptop features.
• Special function keys
– Dual displays
– Wireless (on/off)
– Cellular (on/off)
– Volume settings
– Screen brightness
– Bluetooth (on/off)
– Keyboard backlight
– Touchpad (on/off)
– Screen orientation
– Media options (fast forward/rewind)
– GPS (on/off)
– Airplane mode
• Docking station
• Port replicator
• Physical laptop lock and cable lock
• Rotating/removable screens
1.4 Compare and contrast characteristics of various types of other mobile devices.
• Tablets
• Smartphones
• Wearable technology devices
– Smart watches
– Fitness monitors
– VR/AR headsets
• E-readers
• GPS
1.5 Given a scenario, connect and configure accessories and ports of other mobile devices.
• Connection types
– Wired
– Micro-USB/Mini-USB/USB-C
– Lightning
– Tethering
– Proprietary vendor-specific ports (communication/power)
– Wireless
– NFC
– Bluetooth
– IR
– Hotspot
• Accessories
– Headsets
– Speakers
– Game pads
– Extra battery packs/battery chargers
– Protective covers/waterproofing
– Credit card readers
– Memory/MicroSD
1.6 Given a scenario, configure basic mobile device network connectivity and application support.
• Wireless/cellular data network (enable/disable)
– Hotspot
– Tethering
– Airplane mode
• Bluetooth
– Enable Bluetooth
– Enable pairing
– Find a device for pairing
– Enter the appropriate pin code
– Test connectivity
• Corporate and ISP email configuration
– POP3
– IMAP
– Port and SSL settings
– S/MIME
• Integrated commercial provider email configuration
– iCloud
– Google/Inbox
– Exchange Online
– Yahoo
• PRI updates/PRL updates/baseband updates
• Radio firmware
• IMEI vs. IMSI
• VPN
1.7 Given a scenario, use methods to perform mobile device synchronization.
• Synchronization methods
– Synchronize to the cloud
– Synchronize to the desktop
– Synchronize to the automobile
• Types of data to synchronize
– Contacts
– Applications
– Email
– Pictures
– Music
– Videos
– Calendar
– Bookmarks
– Documents
– Location data
– Social media data
– E-books
– Passwords
• Mutual authentication for multiple services (SSO)
• Software requirements to install the application on the PC
• Connection types to enable synchronization
2.0 Networking
2.1 Compare and contrast TCP and UDP ports, protocols, and their purposes.
• Ports and protocols
– 21 – FTP
– 22 – SSH
– 23 – Telnet
– 25 – SMTP
– 53 – DNS
– 80 – HTTP
– 110 – POP3
– 143 – IMAP
– 443 – HTTPS
– 3389 – RDP
– 137-139 – NetBIOS/NetBT
– 445 – SMB/CIFS
– 427 – SLP
– 548 – AFP
– 67/68 – DHCP
– 389 – LDAP
– 161/162 – SNMP
• TCP vs. UDP
2.2 Compare and contrast common networking hardware devices.
• Routers
• Switches
– Managed
– Unmanaged
• Access points
• Cloud-based network controller
• Firewall
• Network interface card
• Repeater
• Hub
• Cable/DSL modem
• Bridge
• Patch panel
• Power over Ethernet (PoE)
– Injectors
– Switch
• Ethernet over Power
2.3 Given a scenario, install and configure a basic wired/wireless SOHO network.
• Router/switch functionality
• Access point settings
• IP addressing
• NIC configuration
– Wired
– Wireless
• End-user device configuration
• IoT device configuration
– Thermostat
– Light switches
– Security cameras
– Door locks
– Voice-enabled, smart speaker/digital assistant
• Cable/DSL modem configuration
• Firewall settings
– Screened subnet (previously known as demilitarized zone)
– Port forwarding
– NAT
– UPnP
– Allow list/deny list
– MAC filtering
• QoS
• Wireless settings
– Encryption
– Channels
– QoS
2.4 Compare and contrast wireless networking protocols.
• 802.11a
• 802.11b
• 802.11g
• 802.11n
• 802.11ac
• Frequencies
– 2.4Ghz
– 5Ghz
• Channels
– 1–11
• Bluetooth
• NFC
• RFID
• Zigbee
• Z-Wave
• 3G
• 4G
• 5G
• LTE
2.5 Summarize the properties and purposes of services provided by networked hosts.
• Server roles
– Web server
– File server
– Print server
– DHCP server
– DNS server
– Proxy server
– Mail server
– Authentication server
– syslog
• Internet appliance
– UTM
– IDS
– IPS
– End-point management server
• Legacy/embedded systems
2.6 Explain common network configuration concepts.
• IP addressing
– Static
– Dynamic
– APIPA
– Link local
• DNS
• DHCP
– Reservations
• IPv4 vs. IPv6
• Subnet mask
• Gateway
• VPN
• VLAN
• NAT
2.7 Compare and contrast Internet connection types, network types, and their features.
• Internet connection types
– Cable
– DSL
– Dial-up
– Fiber
– Satellite
– ISDN
– Cellular
– Tethering
– Mobile hotspot
– Line-of-sight wireless Internet service
• Network types
– LAN
– WAN
– PAN
– MAN
– WMN
2.8 Given a scenario, use appropriate networking tools.
• Crimper
• Cable stripper
• Multimeter
• Tone generator and probe
• Cable tester
• Loopback plug
• Punchdown tool
• WiFi analyzer
3.0 Hardware
3.1 Explain basic cable types, features, and their purposes.
• Network cables
– Ethernet
– Cat 5
– Cat 5e
– Cat 6
– Plenum
– Shielded twisted pair
– Unshielded twisted pair
– 568A/B
– Fiber
– Coaxial
– Speed and transmission limitations
• Video cables
– VGA
– HDMI
– Mini-HDMI
– DisplayPort
– DVI ( DVI-D/DVI-I)
• Multipurpose cables
– Lightning
– Thunderbolt
– USB
– USB-C
– USB 2.0
– USB 3.0
• Peripheral cables
– Serial
• Hard drive cables
– SATA
– IDE
– SCSI
• Adapters
– DVI to HDMI
– USB to Ethernet
– DVI to VGA
3.2 Identify common connector types.
• RJ-11
• RJ-45
• RS-232
• BNC
• RG-59
• RG-6
• USB
• Micro-USB
• Mini-USB
• USB-C
• DB-9
• Lightning
• SCSI
• eSATA
• Molex
3.3 Given a scenario, install RAM types.
• RAM types
– SODIMM
– DDR2
– DDR3
– DDR4
• Single channel
• Dual channel
• Triple channel
• Error correcting
• Parity vs. non-parity
3.4 Given a scenario, select, install and configure storage devices.
• Optical drives
– CD-ROM/CD-RW
– DVD-ROM/DVD-RW/DVD-RW DL
– Blu-ray
– BD-R
– BD-RE
• Solid-state drives
– M2 drives
– NVME
– SATA 2.5
• Magnetic hard drives
– 5,400rpm
– 7,200rpm
– 10,000rpm
– 15,000rpm
– Sizes:
-2.5
-3.5
• Hybrid drives
• Flash
– SD card
– CompactFlash
– Micro-SD card
– Mini-SD card
– xD
• Configurations
– RAID 0, 1, 5, 10
– Hot swappable
3.5 Given a scenario, install and configure motherboards, CPUs, and add-on cards.
• Motherboard form factor
– ATX
– mATX
– ITX
– mITX
• Motherboard connectors types
– PCI
– PCIe
– Riser card
– Socket types
– SATA
– IDE
– Front panel connector
– Internal USB connector
• BIOS/UEFI settings
– Boot options
– Firmware updates
– Security settings
– Interface configurations
– Security
– Passwords
– Drive encryption
– TPM
– LoJack
– Secure boot
• CMOS battery
• CPU features
– Single-core
– Multicore
– Virtualization
– Hyperthreading
– Speeds
– Overclocking
– Integrated GPU
• Compatibility
– AMD
– Intel
• Cooling mechanism
– Fans
– Heat sink
– Liquid
– Thermal paste
• Expansion cards
– Video cards
– Onboard
– Add-on card
– Sound cards
– Network interface card
– USB expansion card
– eSATA card
3.6 Explain the purposes and uses of various peripheral types.
• Printer
• ADF/flatbed scanner
• Barcode scanner/QR scanner
• Monitors
• VR headset
• Optical drive types
• Mouse
• Keyboard
• Touchpad
• Signature pad
• Game controllers
• Camera/webcam
• Microphone
• Speakers
• Headset
• Projector
– Lumens/brightness
• External storage drives
• KVM
• Magnetic reader/chip reader
• NFC/tap pay device
• Smart card reader
3.7 Summarize power supply types and features.
• Input 115V vs. 220V
• Output 5V vs. 12V
• 24-pin motherboard adapter
• Wattage rating
• Number of devices/types of devices to be powered
3.8 Given a scenario, select and configure appropriate components for a custom PC configuration to meet customer specifications or needs.
• Graphic/CAD/CAM design workstation
– SSD
– High-end video
– Maximum RAM
• Audio/video editing workstation
– Specialized audio and video card
– Large, fast hard drive
– Dual monitors
• Virtualization workstation
– Maximum RAM and CPU cores
• Gaming PC
– SSD
– High-end video/specialized GPU
– High-definition sound card
– High-end cooling
• Network attached storage device
– Media streaming
– File sharing
– Gigabit NIC
– RAID array
– Hard drive
• Standard thick client
– Desktop applications
– Meets recommended requirements for selected OS
• Thin client
– Basic applications
– Meets minimum requirements for selected OS
– Network connectivity
3.9 Given a scenario, install and configure common devices.
• Desktop
– Thin client
– Thick client
– Account setup/settings
• Laptop/common mobile devices
– Touchpad configuration
– Touchscreen configuration
– Application installations/configurations
– Synchronization settings
– Account setup/settings
– Wireless settings
3.10 Given a scenario, configure SOHO multifunction devices/printers and settings.
• Use appropriate drivers for a given operating system
– Configuration settings
– Duplex
– Collate
– Orientation
– Quality
• Device sharing
– Wired
– USB
– Serial
– Ethernet
– Wireless
– Bluetooth
– 802.11(a, b, g, n, ac)
– Infrastructure vs. ad hoc
– Integrated print server (hardware)
– Cloud printing/remote printing
• Public/shared devices
– Sharing local/networked device via operating system settings
– TCP/Bonjour/AirPrint
– Data privacy
– User authentication on the device
– Hard drive caching
3.11 Given a scenario, install and maintain various print technologies.
• Laser
– Imaging drum, fuser assembly, transfer belt, transfer roller, pickup rollers, separate pads, duplexing assembly
– Imaging process: processing, charging, exposing, developing, transferring, fusing, and cleaning
– Maintenance: Replace toner, apply maintenance kit, calibrate, clean
• Inkjet
– Ink cartridge, print head, roller, feeder, duplexing assembly, carriage, and belt
– Calibrate
– Maintenance: Clean heads, replace cartridges, calibrate, clear jams
• Thermal
– Feed assembly, heating element
– Special thermal paper
– Maintenance: Replace paper, clean heating element, remove debris
• Impact
– Print head, ribbon, tractor feed
– Impact paper
– Maintenance: Replace ribbon, replace print head, replace paper
• Virtual
– Print to file
– Print to PDF
– Print to XPS
– Print to image
• 3D printers
– Plastic filament
4.0 Virtualization and Cloud Computing
4.1 Compare and contrast cloud computing concepts.
• Common cloud models
– IaaS
– SaaS
– PaaS
– Public vs. private vs. hybrid vs. community
• Shared resources
– Internal vs. external
• Rapid elasticity
• On-demand
• Resource pooling
• Measured service
• Metered
• Off-site email applications
• Cloud file storage services
– Synchronization apps
• Virtual application streaming/cloud-based applications
– Applications for cell phones/tablets
– Applications for laptops/desktops
• Virtual desktop
– Virtual NIC
4.2 Given a scenario, set up and configure client-side virtualization.
• Purpose of virtual machines
• Resource requirements
• Emulator requirements
• Security requirements
• Network requirements
• Hypervisor
5.0 Hardware and Network Troubleshooting
5.1 Given a scenario, use the best practice methodology to resolve problems.
• Always consider corporate policies, procedures, and impacts before implementing changes
1. Identify the problem
– Question the user and identify user changes to computer and perform backups before making changes
– Inquire regarding environmental or infrastructure changes
– Review system and application logs
2. Establish a theory of probable cause (question the obvious)
– If necessary, conduct external or internal research based on symptoms
3. Test the theory to determine cause
– Once the theory is confirmed, determine the next steps to resolve problem
– If theory is not confirmed reestablish new theory or escalate
4. Establish a plan of action to resolve the problem and implement the solution
5. Verify full system functionality and, if applicable, implement preventive measures
6. Document findings, actions, and outcomes
5.2 Given a scenario, troubleshoot problems related to motherboards, RAM, CPUs, and power.
• Common symptoms
– Unexpected shutdowns
– System lockups
– POST code beeps
– Blank screen on bootup
– BIOS time and setting resets
– Attempts to boot to incorrect device
– Continuous reboots
– No power
– Overheating
– Loud noise
– Intermittent device failure
– Fans spin – no power to other devices
– Indicator lights
– Smoke
– Burning smell
– Proprietary crash screens (BSOD/pin wheel)
– Distended capacitors
– Log entries and error messages
5.3 Given a scenario, troubleshoot hard drives and RAID arrays.
• Common symptoms
– Read/write failure
– Slow performance
– Loud clicking noise
– Failure to boot
– Drive not recognized
– OS not found
– RAID not found
– RAID stops working
– Proprietary crash screens (BSOD/pin wheel)
– S.M.A.R.T. errors
5.4 Given a scenario, troubleshoot video, projector, and display issues.
• Common symptoms
– VGA mode
– No image on screen
– Overheat shutdown
– Dead pixels
– Artifacts
– Incorrect color patterns
– Dim image
– Flickering image
– Distorted image
– Distorted geometry
– Burn-in
– Oversized images and icons
5.5 Given a scenario, troubleshoot common mobile device issues while adhering to the appropriate procedures.
• Common symptoms
– No display
– Dim display
– Flickering display
– Sticking keys
– Intermittent wireless
– Battery not charging
– Ghost cursor/pointer drift
– No power
– Num lock indicator lights
– No wireless connectivity
– No Bluetooth connectivity
– Cannot display to external monitor
– Touchscreen non-responsive
– Apps not loading
– Slow performance
– Unable to decrypt email
– Extremely short battery life
– Overheating
– Frozen system
– No sound from speakers
– GPS not functioning
– Swollen battery
• Disassembling processes for proper reassembly
– Document and label cable and screw locations
– Organize parts
– Refer to manufacturer resources
– Use appropriate hand tools
5.6 Given a scenario, troubleshoot printers.
• Common symptoms
– Streaks
– Faded prints
– Ghost images
– Toner not fused to the paper
– Creased paper
– Paper not feeding
– Paper jam
– No connectivity
– Garbled characters on paper
– Vertical lines on page
– Backed-up print queue
– Low memory errors
– Access denied
– Printer will not print
– Color prints in wrong print color
– Unable to install printer
– Printing blank pages
– No image on printer display
– Multiple failed jobs in logs
5.7 Given a scenario, troubleshoot common wired and wireless network problems.
• Common symptoms
– Limited connectivity
– Unavailable resources
– Internet
– Local resources
– Shares
– Printers
– Email
– No connectivity
– APIPA/link local address
– Intermittent connectivity
– IP conflict
– Slow transfer speeds
– Low RF signal
– SSID not found
CORE 2 (220-1102)
1.0 Operating Systems
1.1 Compare and contrast common operating system types and their purposes.
• 32-bit vs. 64-bit
– RAM limitations
– Software compatibility
• Workstation operating systems
– Microsoft Windows
– Apple Macintosh OS
– Linux
• Cell phone/tablet operating systems
– Microsoft Windows
– Android
– iOS
– Chrome OS
• Vendor-specific limitations
– End-of-life
– Update limitations
• Compatibility concerns between operating systems
1.2 Compare and contrast features of Microsoft Windows versions.
• Windows 7
• Windows 8
• Windows 8.1
• Windows 10
• Corporate vs. personal needs
– Domain access
– BitLocker
– Media center
– BranchCache
– EFS
• Desktop styles/user interface
1.3 Summarize general OS installation considerations and upgrade methods.
• Boot methods
– Optical disc(CD-ROM, DVD, Blu-ray)
– External drive/flash drive (USB/eSATA)
– Network boot (PXE)
– Internal fixed disk (HDD/SSD)
– Internal hard drive (partition)
• Type of installations
– Unattended installation
– In-place upgrade
– Clean install
– Repair installation
– Multiboot
– Remote network installation
– Image deployment
– Recovery partition
– Refresh/restore
• Partitioning
– Dynamic
– Basic
– Primary
– Extended
– Logical
– GPT
• File system types/formatting
– ExFAT
– FAT32
– NTFS
– CDFS
– NFS
– ext3, ext4
– HFS
– Swap partition
– Quick format vs. full format
• Load alternate third-party drivers when necessary
• Workgroup vs. Domain setup
• Time/date/region/language settings
• Driver installation, software, and Windows updates
• Factory recovery partition
• Properly formatted boot drive with the correct partitions/format
• Prerequisites/hardware compatibility
• Application compatibility
• OS compatibility/upgrade path
1.4 Given a scenario, use appropriate Microsoft command line tools.
• Navigation
– dir
– cd
– ..
• ipconfig
• ping
• tracert
• netstat
• nslookup
• shutdown
• dism
• sfc
• chkdsk
• diskpart
• taskkill
• gpupdate
• gpresult
• format
• copy
• xcopy
• robocopy
• net use
• net user
• [command name] /?
• Commands available with standard privileges vs. administrative privileges
1.5 Given a scenario, use Microsoft operating system features and tools.
• Administrative
– Computer Management
– Device Manager
– Local Users and Groups
– Local Security Policy
– Performance Monitor
– Services
– System Configuration
– Task Scheduler
– Component Services
– Data Sources
– Print Management
– Windows Memory Diagnostics
– Windows Firewall
– Advanced Security
– Event Viewer
– User Account Management
• MSConfig
– General
– Boot
– Services
– Startup
– Tools
• Task Manager
– Applications
– Processes
– Performance
– Networking
– Users
• Disk Management
– Drive status
– Mounting
– Initializing
– Extending partitions
– Splitting partitions
– Shrink partitions
– Assigning/changing drive letters
– Adding drives
– Adding arrays
– Storage spaces
• System utilities
– Regedit
– Command
– Services.msc
– MMC
– MSTSC
– Notepad
– Explorer
– Msinfo32
– DxDiag
– Disk Defragmenter
– System Restore
– Windows Update
1.6 Given a scenario, use Microsoft Windows Control Panel utilities.
• Internet Options
– Connections
– Security
– General
– Privacy
– Programs
– Advanced
• Display/Display Settings
– Resolution
– Color depth
– Refresh rate
• User Accounts
• Folder Options
– View hidden files
– Hide extensions
– General options
– View options
• System
– Performance (virtual memory)
– Remote settings
– System protection
• Windows Firewall
• Power Options
– Hibernate
– Power plans
– Sleep/suspend
– Standby
• Credential Manager
• Programs and features
• HomeGroup
• Devices and Printers
• Sound
• Troubleshooting
• Network and Sharing Center
• Device Manager
• BitLocker
• Sync Center
1.7 Summarize application installation and configuration concepts.
• System requirements
– Drive space
– RAM
• OS requirements
– Compatibility
• Methods of installation and deployment
– Local (CD/USB)
– Network-based
• Local user permissions
– Folder/file access for installation
• Security considerations
– Impact to device
– Impact to network
1.8 Given a scenario, configure Microsoft Windows networking on a client/desktop.
• HomeGroup vs. Workgroup
• Domain setup
• Network shares/administrative shares/mapping drives
• Printer sharing vs. network printer mapping
• Establish networking connections
– VPN
– Dial-ups
– Wireless
– Wired
– WWAN (Cellular)
• Proxy settings
• Remote Desktop Connection
• Remote Assistance
• Home vs. Work vs. Public network settings
• Firewall settings
– Exceptions
– Configuration
– Enabling/disabling Windows Firewall
• Configuring an alternative IP address in Windows
– IP addressing
– Subnet mask
– DNS
– Gateway
• Network card properties
– Half duplex/full duplex/auto
– Speed
– Wake-on-LAN
– QoS
– BIOS (on-board NIC)
1.9 Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems.
• Best practices
– Scheduled backups
– Scheduled disk maintenance
– System updates/App Store
– Patch management
– Driver/firmware updates
– Antivirus/Anti-malware updates
• Tools
– Backup/Time Machine
– Restore/Snapshot
– Image recovery
– Disk maintenance utilities
– Shell/Terminal
– Screen sharing
– Force Quit
• Features
– Multiple desktops/Mission Control
– Key Chain
– Spot Light
– iCloud
– Gestures
– Finder
– Remote Disc
– Dock
– Boot Camp
• Basic Linux commands
– ls
– grep
– cd
– shutdown
– pwd vs. passwd
– mv
– cp
– rm
– chmod
– chown
– iwconfig/ifconfig
– ps
– su/sudo
– apt-get
– vi
– dd
– kill
2.0 Security
2.1 Summarize the importance of physical security measures.
• Access control vestibule
• Badge reader
• Smart card
• Security guard
• Door lock
• Biometric locks
• Hardware tokens
• Cable locks
• Server locks
• USB locks
• Privacy screen
• Key fobs
• Entry control roster
2.2 Explain logical security concepts.
• Active Directory
– Login script
– Domain
– Group Policy/Updates
– Organizational Units
– Home Folder
– Folder redirection
• Software tokens
• MDM policies
• Port security
• MAC address filtering
• Certificates
• Antivirus/Anti-malware
• Firewalls
• User authentication/strong passwords
• Multifactor authentication
• Directory permissions
• VPN
• DLP
• Access control lists
• Smart card
• Email filtering
• Trusted/untrusted software sources
• Principle of least privilege
2.3 Compare and contrast wireless security protocols and authentication methods.
• Protocols and encryption
– WEP
– WPA
– WPA2
– TKIP
– AES
• Authentication
– Single-factor
– Multifactor
– RADIUS
– TACACS
2.4 Given a scenario, detect, remove, and prevent malware using appropriate tools and methods.
• Malware
– Ransomware
– Trojan
– Keylogger
– Rootkit
– Virus
– Botnet
– Worm
– Spyware
• Tools and methods
– Antivirus
– Anti-malware
– Recovery console
– Backup/restore
– End user education
– Software firewalls
– DNS configuration
2.5 Compare and contrast social engineering, threats, and vulnerabilities.
• Social engineering
– Phishing
– Spear phishing
– Impersonation
– Shoulder surfing
– Tailgating
– Dumpster diving
• DDoS
• DoS
• Zero-day
• On-path attack (previously known as man-in-the-middle attack)
• Brute force
• Dictionary
• Rainbow table
• Spoofing
• Non-compliant systems
• Zombie
2.6 Compare and contrast the differences of basic Microsoft Windows OS security settings.
• User and groups
– Administrator
– Power user
– Guest
– Standard user
• NTFS vs. share permissions
– Allow vs. deny
– Moving vs. copying folders and files
– File attributes
• Shared files and folders
– Administrative shares vs. local shares
– Permission propagation
– Inheritance
• System files and folders
• User authentication
– Single sign-on
• Run as administrator vs. standard user
• BitLocker
• BitLocker To Go
• EFS
2.7 Given a scenario, implement security best practices to secure a workstation.
• Password best practices
– Setting strong passwords
– Password expiration
– Screensaver required password
– BIOS/UEFI passwords
– Requiring passwords
• Account management
– Restricting user permissions
– Logon time restrictions
– Disabling guest account
– Failed attempts lockout
– Timeout/screen lock
– Change default admin user account/password
– Basic Active Directory functions
– Account creation
– Account deletion
– Password reset/unlock account
– Disable account
• Disable autorun
• Data encryption
• Patch/update management
2.8 Given a scenario, implement methods for securing mobile devices.
• Screen locks
– Fingerprint lock
– Face lock
– Swipe lock
– Passcode lock
• Remote wipes
• Locator applications
• Remote backup applications
• Failed login attempts restrictions
• Antivirus/Anti-malware
• Patching/OS updates
• Biometric authentication
• Full device encryption
• Multifactor authentication
• Authenticator applications
• Trusted sources vs. untrusted sources
• Firewalls
• Policies and procedures
– BYOD vs. corporate-owned
– Profile security requirements
2.9 Given a scenario, implement appropriate data destruction and disposal methods.
• Physical destruction
– Shredder
– Drill/hammer
– Electromagnetic (Degaussing)
– Incineration
– Certificate of destruction
• Recycling or repurposing best practices
– Low-level format vs. standard format
– Overwrite
– Drive wipe
2.10 Given a scenario, configure security on SOHO wireless and wired networks.
• Wireless-specific
– Changing default SSID
– Setting encryption
– Disabling SSID broadcast
– Antenna and access point placement
– Radio power levels
– WPS
• Change default usernames and passwords
• Enable MAC filtering
• Assign static IP addresses
• Firewall settings
• Port forwarding/mapping
• Disabling ports
• Content filtering/parental controls
• Update firmware
• Physical security
3.0 Software Troubleshooting
3.1 Given a scenario, troubleshoot Microsoft Windows OS problems.
• Common symptoms
– Slow performance
– Limited connectivity
– Failure to boot
– No OS found
– Application crashes
– Blue screens
– Blank screens
– Printing issues
– Services fail to start
– Slow bootup
– Slow profile load
• Common solutions
– Defragment the hard drive
– Reboot
– Kill tasks
– Restart services
– Update network settings
– Reimage/reload OS
– Roll back updates
– Roll back devices drivers
– Apply updates
– Repair application
– Update boot order
– Disable Windows services/applications
– Disable application startup
– Safe boot
– Rebuild Windows profiles
3.2 Given a scenario, troubleshoot and resolve PC security issues.
• Common symptoms
– Pop-ups
– Browser redirection
– Security alerts
– Slow performance
– Internet connectivity issues
– PC/OS lockup
– Application crash
– OS updates failures
– Rogue antivirus
– Spam
– Renamed system files
– Disappearing files
– File permission changes
– Hijacked email
– Responses from users regarding email
– Automated replies from unknown sent email
– Access denied
– Invalid certificate (trusted root CA)
– System/application log errors
3.3 Given a scenario, use best practice procedures for malware removal.
1. Identify and research malware symptoms.
2. Quarantine the infected systems.
3. Disable System Restore (in Windows).
4. Remediate the infected systems.
a. Update the anti-malware software.
b. Scan and use removal techniques (safe mode, pre-installation environment).
5. Schedule scans and run updates.
6. Enable System Restore and create a restore point (in Windows).
7. Educate the end user.
3.4 Given a scenario, troubleshoot mobile OS and application issues.
• Common symptoms
– Dim display
– Intermittent wireless
– No wireless connectivity
– No Bluetooth connectivity
– Cannot broadcast to external monitor
– Touchscreen non-responsive
– Apps not loading
– Slow performance
– Unable to decrypt email
– Extremely short battery life
– Overheating
– Frozen system
– No sound from speakers
– Inaccurate touch screen response
– System lockout
– App log errors
3.5 Given a scenario, troubleshoot mobile OS and application security issues.
• Common symptoms
– Signal drop/weak signal
– Power drain
– Slow data speeds
– Unintended WiFi connection
– Unintended Bluetooth pairing
– Leaked personal files/data
– Data transmission over limit
– Unauthorized account access
– Unauthorized location tracking
– Unauthorized camera/microphone activation
– High resource utilization
4.0 Operational Procedures
4.1 Compare and contrast best practices associated with types of documentation.
• Network topology diagrams
• Knowledge base/articles
• Incident documentation
• Regulatory and compliance policy
• Acceptable use policy
• Password policy
• Inventory management
– Asset tags
– Barcodes
4.2 Given a scenario, implement basic change management best practices.
• Documented business processes
• Purpose of the change
• Scope the change
• Risk analysis
• Plan for change
• End-user acceptance
• Change board
– Approvals
• Backout plan
• Document changes
4.3 Given a scenario, implement basic disaster prevention and recovery methods.
• Backup and recovery
– Image level
– File level
– Critical applications
• Backup testing
• UPS
• Surge protector
• Cloud storage vs. local storage backups
• Account recovery options
4.4 Explain common safety procedures.
• Equipment grounding
• Proper component handling and storage
– Antistatic bags
– ESD straps
– ESD mats
– Self-grounding
• Toxic waste handling
– Batteries
– Toner
– CRT
– Cell phones
– Tablets
• Personal safety
– Disconnect power before repairing PC
– Remove jewelry
– Lifting techniques
– Weight limitations
– Electrical fire safety
– Cable management
– Safety goggles
– Air filter mask
• Compliance with government regulations
4.5 Explain environmental impacts and appropriate controls.
• MSDS documentation for handling and disposal
• Temperature, humidity level awareness, and proper ventilation
• Power surges, under-voltage events, and power loss
– Battery backup
– Surge suppressor
• Protection from airborne particles
– Enclosures
– Air filters/mask
• Dust and debris
– Compressed air
– Vacuums
• Compliance to government regulations
4.6 Explain the processes for addressing prohibited content/activity, and privacy, licensing, and policy concepts.
• Incident response
– First response
– Identify
– Report through proper channels
– Data/device preservation
– Use of documentation/documentation changes
– Chain of custody
– Tracking of evidence/documenting process
• Licensing/DRM/EULA
– Open-source vs. commercial license
– Personal license vs. enterprise licenses
• Regulated data
– PII
– PCI
– GDPR
– PHI
• Follow all policies and security best practices
4.7 Given a scenario, use proper communication techniques and professionalism.
• Use proper language and avoid jargon, acronyms, and slang, when applicable
• Maintain a positive attitude/project confidence
• Actively listen (taking notes) and avoid interrupting the customer
• Be culturally sensitive
– Use appropriate professional titles, when applicable
• Be on time (if late, contact the customer)
• Avoid distractions
– Personal calls
– Texting/social media sites
– Talking to coworkers while interacting with customers
– Personal interruptions
• Dealing with difficult customers or situations
– Do not argue with customers and/or be defensive
– Avoid dismissing customer problems
– Avoid being judgmental
– Clarify customer statements (ask open-ended questions to narrow the scope of the problem, restate the issue, or question to verify understanding)
– Do not disclose experiences via social media outlets
• Set and meet expectations/timeline and communicate status with the customer
– Offer different repair/replacement options, if applicable
– Provide proper documentation on the services provided
– Follow up with customer/user at a later date to verify satisfaction
• Deal appropriately with customers’ confidential and private materials
– Located on a computer, desktop, printer, etc.
4.8 Identify the basics of scripting.
• Script file types
– .bat
– .ps1
– .vbs
– .sh
– .py
– .js
• Environment variables
• Comment syntax
• Basic script constructs
– Basic loops
– Variables
• Basic data types
– Integers
– Strings
4.9 Given a scenario, use remote access technologies.
• RDP
• Telnet
• SSH
• Third-party tools
– Screen share feature
– File share
• Security considerations of each access method
N10-008
1.0 Networking Fundamentals
1.1 Compare and contrast the Open Systems Interconnection (OSI) model layers and encapsulation concepts.
• OSI model
– Layer 1 – Physical
– Layer 2 – Data link
– Layer 3 – Network
– Layer 4 – Transport
– Layer 5 – Session
– Layer 6 – Presentation
– Layer 7 – Application
• Data encapsulation and decapsulation within the OSI model context
– Ethernet header
– Internet Protocol (IP) header
– Transmission Control Protocol (TCP)/User Datagram Protocol (UDP) headers
– TCP flags
– Payload
– Maximum transmission unit (MTU)
1.2 Explain the characteristics of network topologies and network types.
• Mesh
• Star/hub-and-spoke
• Bus
• Ring
• Hybrid
• Network types and characteristics
– Peer-to-peer
– Client-server
– Local area network (LAN)
– Metropolitan area network (MAN)
– Wide area network (WAN)
– Wireless local area network (WLAN)
– Personal area network (PAN)
– Campus area network (CAN)
– Storage area network (SAN)
– Software-defined wide area network (SDWAN)
– Multiprotocol label switching (MPLS)
– Multipoint generic routing encapsulation (mGRE)
• Service-related entry point
– Demarcation point
– Smartjack
• Virtual network concepts
– vSwitch
– Virtual network interface card (vNIC)
– Network function virtualization (NFV)
– Hypervisor
• Provider links
– Satellite
– Digital subscriber line (DSL)
– Cable
– Leased line
– Metro-optical
1.3 Summarize the types of cables and connectors and explain which is the appropriate type for a solution.
• Copper
– Twisted pair
– Cat 5
– Cat 5e
– Cat 6
– Cat 6a
– Cat 7
– Cat 8
– Coaxial/RG-6
– Twinaxial
– Termination standards
– TIA/EIA-568A
– TIA/EIA-568B
• Fiber
– Single-mode
– Multimode
• Connector types
– Local connector (LC), straight tip (ST), subscriber connector (SC), mechanical transfer (MT), registered jack (RJ)
– Angled physical contact (APC)
– Ultra-physical contact (UPC)
– RJ11
– RJ45
– F-type connector
– Transceivers/media converters
– Transceiver type
– Small form-factor pluggable (SFP)
– Enhanced form-factor pluggable (SFP+)
– Quad small form-factor pluggable (QSFP)
– Enhanced quad small form-factor pluggable (QSFP+)
• Cable management
– Patch panel/patch bay
– Fiber distribution panel
– Punchdown block
– 66
– 110
– Krone
– Bix
• Ethernet standards
– Copper
– 10BASE-T
– 100BASE-TX
– 1000BASE-T
– 10GBASE-T
– 40GBASE-T
– Fiber
– 100BASE-FX
– 100BASE-SX
– 1000BASE-SX
– 1000BASE-LX
– 10GBASE-SR
– 10GBASE-LR
– Coarse wavelength division multiplexing (CWDM)
– Dense wavelength division multiplexing (DWDM)
– Bidirectional wavelength division multiplexing (WDM)
1.4 Given a scenario, configure a subnet and use appropriate IP addressing schemes.
• Public vs. private
– RFC1918
– Network address translation (NAT)
– Port address translation (PAT)
• IPv4 vs. IPv6
– Automatic Private IP Addressing (APIPA)
– Extended unique identifier (EUI-64)
– Multicast
– Unicast
– Anycast
– Broadcast
– Link local
– Loopback
– Default gateway
• IPv4 subnetting
– Classless (variable-length subnet mask)
– Classful
– A
– B
– C
– D
– E
– Classless Inter-Domain Routing (CIDR) notation
• IPv6 concepts
– Tunneling
– Dual stack
– Shorthand notation
– Router advertisement
– Stateless address autoconfiguration (SLAAC)
• Virtual IP (VIP)
• Subinterfaces
1.5 Explain common ports and protocols, their application, and encrypted alternatives.
Protocols & Ports
• File Transfer Protocol (FTP) 20/21
• Secure Shell (SSH) 22
• Secure File Transfer Protocol (SFTP) 22
• Telnet 23
• Simple Mail Transfer Protocol (SMTP) 25
• Domain Name System (DNS) 53
• Dynamic Host Configuration Protocol (DHCP) 67/68
• Trivial File Transfer Protocol (TFTP) 69
• Hypertext Transfer Protocol (HTTP) 80
• Post Office Protocol v3 (POP3) 110
• Network Time Protocol (NTP) 123
• Internet Message Access Protocol (IMAP) 143
• Simple Network Management Protocol (SNMP) 161/162
• Lightweight Directory Access Protocol (LDAP) 389
• Hypertext Transfer Protocol Secure (HTTPS) [Secure Sockets Layer (SSL)] 443
• HTTPS [Transport Layer Security (TLS)] 443
• Server Message Block (SMB) 445
• Syslog 514
• SMTP TLS 587
• Lightweight Directory Access Protocol (over SSL) (LDAPS) 636
• IMAP over SSL 993
• POP3 over SSL 995
• Structured Query Language (SQL) Server 1433
• SQLnet 1521
• MySQL 3306
• Remote Desktop Protocol (RDP) 3389
• Session Initiation Protocol (SIP) 5060/5061
• IP protocol types
– Internet Control Message Protocol (ICMP)
– TCP
– UDP
– Generic Routing Encapsulation (GRE)
– Internet Protocol Security (IPSec)
– Authentication Header (AH)/Encapsulating Security Payload (ESP)
• Connectionless vs. connection-oriented
1.6 Explain the use and purpose of network services.
• DHCP
– Scope
– Exclusion ranges
– Reservation
– Dynamic assignment
– Static assignment
– Lease time
– Scope options
– Available leases
– DHCP relay
– IP helper/UDP forwarding
• DNS
– Record types
– Address (A vs. AAAA)
– Canonical name (CNAME)
– Mail exchange (MX)
– Start of authority (SOA)
– Pointer (PTR)
– Text (TXT)
– Service (SRV)
– Name server (NS)
– Global hierarchy
– Root DNS servers
– Internal vs. external
– Zone transfers
– Authoritative name servers
– Time to live (TTL)
– DNS caching
– Reverse DNS/reverse lookup/forward lookup
– Recursive lookup/iterative lookup
• NTP
– Stratum
– Clients
– Servers
1.7 Explain basic corporate and datacenter network architecture.
• Three-tiered
– Core
– Distribution/aggregation layer
– Access/edge
• Software-defined networking
– Application layer
– Control layer
– Infrastructure layer
– Management plane
• Spine and leaf
– Software-defined network
– Top-of-rack switching
– Backbone
• Traffic flows
– North-South
– East-West
• Branch office vs. on-premises datacenter vs. colocation
• Storage area networks
– Connection types
– Fibre Channel over Ethernet (FCoE)
– Fibre Channel
– Internet Small Computer Systems Interface (iSCSI)
1.8 Summarize cloud concepts and connectivity options.
• Deployment models
– Public
– Private
– Hybrid
– Community
• Service models
– Software as a service (SaaS)
– Infrastructure as a service (IaaS)
– Platform as a service (PaaS)
– Desktop as a service (DaaS)
• Infrastructure as code
– Automation/orchestration
• Connectivity options
– Virtual private network (VPN)
– Private-direct connection to cloud provider
• Multitenancy
• Elasticity
• Scalability
• Security implications
2.0 Network Implementations
2.1 Compare and contrast various devices, their features, and their appropriate placement on the network.
• Networking devices
– Layer 2 switch
– Layer 3 capable switch
– Router
– Hub
– Access point
– Bridge
– Wireless LAN controller
– Load balancer
– Proxy server
– Cable modem
– DSL modem
– Repeater
– Voice gateway
– Media converter
– Intrusion prevention system (IPS)/intrusion detection system (IDS) device
– Firewall
– VPN headend
• Networked devices
– Voice over Internet Protocol (VoIP) phone
– Printer
– Physical access control devices
– Cameras
– Heating, ventilation, and air conditioning (HVAC) sensors
– Internet of Things (IoT)
– Refrigerator
– Smart speakers
– Smart thermostats
– Smart doorbells
– Industrial control systems/supervisory control and data acquisition (SCADA)
2.2 Compare and contrast routing technologies and bandwidth management concepts.
• Routing
– Dynamic routing
– Protocols [Routing Internet Protocol (RIP), Open Shortest Path First (OSPF), Enhanced Interior Gateway Routing Protocol (EIGRP), Border Gateway Protocol (BGP)]
– Link state vs. distance vector vs. hybrid
– Static routing
– Default route
– Administrative distance
– Exterior vs. interior
– Time to live
• Bandwidth management
– Traffic shaping
– Quality of service (QoS)
2.3 Given a scenario, configure and deploy common Ethernet switching features.
– Data virtual local area network (VLAN)
– Voice VLAN
– Port configurations
– Port tagging/802.1Q
– Port aggregation
– Link Aggregation Control Protocol (LACP)
– Duplex
– Speed
– Flow control
– Port mirroring
– Port security
– Jumbo frames
– Auto-medium-dependent interface crossover (MDI-X)
– Media access control (MAC) address tables
– Power over Ethernet (PoE)/Power over Ethernet plus (PoE+)
– Spanning Tree Protocol
– Carrier-sense multiple access with collision detection (CSMA/CD)
• Address Resolution Protocol (ARP)
• Neighbor Discovery Protocol
2.4 Given a scenario, install and configure the appropriate wireless standards and technologies.
• 802.11 standards
– a
– b
– g
– n (WiFi 4)
– ac (WiFi 5)
– ax (WiFi 6)
• Frequencies and range
– 2.4GHz
– 5GHz
• Channels
– Regulatory impacts
• Channel bonding
• Service set identifier (SSID)
– Basic service set
– Extended service set
– Independent basic service set (Ad-hoc)
– Roaming
• Antenna types
– Omni
– Directional
• Encryption standards
– WiFi Protected Access (WPA)/WPA2 Personal [Advanced Encryption Standard (AES)/Temporal Key Integrity Protocol (TKIP)]
– WPA/WPA2 Enterprise (AES/TKIP)
• Cellular technologies
– Code-division multiple access (CDMA)
– Global System for Mobile Communications (GSM)
– Long-Term Evolution (LTE)
– 3G, 4G, 5G
• Multiple input, multiple output (MIMO) and multi-user MIMO (MU-MIMO)
3.0 Network Operations
3.1 Given a scenario, use the appropriate statistics and sensors to ensure network availability.
• Performance metrics/sensors
– Device/chassis
– Temperature
– Central processing unit (CPU) usage
– Memory
– Network metrics
– Bandwidth
– Latency
– Jitter
• SNMP
– Traps
– Object identifiers (OIDs)
– Management information bases (MIBs)
• Network device logs
– Log reviews
– Traffic logs
– Audit logs
– Syslog
– Logging levels/severity levels
• Interface statistics/status
– Link state (up/down)
– Speed/duplex
– Send/receive traffic
– Cyclic redundancy checks (CRCs)
– Protocol packet and byte counts
• Interface errors or alerts
– CRC errors
– Giants
– Runts
– Encapsulation errors
• Environmental factors and sensors
– Temperature
– Humidity
– Electrical
– Flooding
• Baselines
• NetFlow data
• Uptime/downtime
3.2 Explain the purpose of organizational documents and policies.
• Plans and procedures
– Change management
– Incident response plan
– Disaster recovery plan
– Business continuity plan
– System life cycle
– Standard operating procedures
• Hardening and security policies
– Password policy
– Acceptable use policy
– Bring your own device (BYOD) policy
– Remote access policy
– Onboarding and offboarding policy
– Security policy
– Data loss prevention
• Common documentation
– Physical network diagram
– Floor plan
– Rack diagram
– Intermediate distribution frame (IDF)/main distribution frame (MDF) documentation
– Logical network diagram
– Wiring diagram
– Site survey report
– Audit and assessment report
– Baseline configurations
• Common agreements
– Non-disclosure agreement (NDA)
– Service-level agreement (SLA)
– Memorandum of
understanding (MOU)
3.3 Explain high availability and disaster recovery concepts and summarize which is the best solution.
• Load balancing
• Multipathing
• Network interface card (NIC) teaming
• Redundant hardware/clusters
– Switches
– Routers
– Firewalls
• Facilities and infrastructure support
– Uninterruptible power supply (UPS)
– Power distribution units (PDUs)
– Generator
– HVAC
– Fire suppression
• Redundancy and high availability (HA) concepts
– Cold site
– Warm site
– Hot site
– Cloud site
– Active-active vs. active-passive
– Multiple Internet service providers (ISPs)/diverse paths
– Virtual Router Redundancy Protocol (VRRP)/First Hop Redundancy Protocol (FHRP)
– Mean time to repair (MTTR)
– Mean time between failure (MTBF)
– Recovery time objective (RTO)
– Recovery point objective (RPO)
• Network device backup/restore
– State
– Configuration
4.0 Network Security
4.1 Explain common security concepts.
• Confidentiality, integrity, availability (CIA)
• Threats
– Internal
– External
• Vulnerabilities
– Common vulnerabilities and exposures (CVE)
– Zero-day
• Exploits
• Least privilege
• Role-based access
• Zero Trust
• Defense in depth
– Network segmentation enforcement
– Perimeter network [previously known as demilitarized zone (DMZ)]
– Separation of duties
– Network access control
– Honeypot
• Authentication methods
– Multifactor
– Terminal Access Controller Access-Control System Plus (TACACS+)
– Single sign-on (SSO)
– Remote Authentication Dial-in User Service (RADIUS)
– LDAP
– Kerberos
– Local authentication
– 802.1X
– Extensible Authentication Protocol (EAP)
• Risk Management
– Security risk assessments
– Threat assessment
– Vulnerability assessment
– Penetration testing
– Posture assessment
– Business risk assessments
– Process assessment
– Vendor assessment
• Security information and event management (SIEM)
4.2 Compare and contrast common types of attacks.
• Technology-based
– Denial-of-service (DoS)/distributed denial-of-service (DDoS)
– Botnet/command and control
– On-path attack (previously known as man-in-the-middle attack)
– DNS poisoning
– VLAN hopping
– ARP spoofing
– Rogue DHCP
– Rogue access point (AP)
– Evil twin
– Ransomware
– Password attacks
– Brute-force
– Dictionary
– MAC spoofing
– IP spoofing
– Deauthentication
– Malware
• Human and environmental
– Social engineering
– Phishing
– Tailgating
– Piggybacking
– Shoulder surfing
4.3 Given a scenario, apply network hardening techniques.
• Best practices
– Secure SNMP
– Router Advertisement (RA) Guard
– Port security
– Dynamic ARP inspection
– Control plane policing
– Private VLANs
– Disable unneeded switchports
– Disable unneeded network services
– Change default passwords
– Password complexity/length
– Enable DHCP snooping
– Change default VLAN
– Patch and firmware management
– Access control list
– Role-based access
– Firewall rules
– Explicit deny
– Implicit deny
• Wireless security
– MAC filtering
– Antenna placement
– Power levels
– Wireless client isolation
– Guest network isolation
– Preshared keys (PSKs)
– EAP
– Geofencing
– Captive portal
• IoT access considerations
4.4 Compare and contrast remote access methods and security implications.
• Site-to-site VPN
• Client-to-site VPN
– Clientless VPN
– Split tunnel vs. full tunnel
• Remote desktop connection
• Remote desktop gateway
• SSH
• Virtual network computing (VNC)
• Virtual desktop
• Authentication and authorization considerations
• In-band vs. out-of-band management
4.5 Explain the importance of physical security.
• Detection methods
– Camera
– Motion detection
– Asset tags
– Tamper detection
• Prevention methods
– Employee training
– Access control hardware
– Badge readers
– Biometrics
– Locking racks
– Locking cabinets
– Access control vestibule (previously known as a mantrap)
– Smart lockers
• Asset disposal
– Factory reset/wipe configuration
– Sanitize devices for disposal
5.0 Network Troubleshooting
5.1 Explain the network troubleshooting methodology.
• Identify the problem
– Gather information
– Question users
– Identify symptoms
– Determine if anything has changed
– Duplicate the problem, if possible
– Approach multiple problems individually
• Establish a theory of probable cause
– Question the obvious
– Consider multiple approaches
– Top-to-bottom/bottom-to-top OSI model
– Divide and conquer
• Test the theory to determine the cause
– If the theory is confirmed, determine the next steps to resolve the problem
– If the theory is not confirmed, reestablish a new theory or escalate
• Establish a plan of action to resolve the problem and identify potential effects
• Implement the solution or escalate as necessary
• Verify full system functionality and, if applicable, implement preventive measures
• Document findings, actions, outcomes, and lessons learned
5.2 Given a scenario, troubleshoot common cable connectivity issues and select the appropriate tools.
• Specifications and limitations
– Throughput
– Speed
– Distance
• Cable considerations
– Shielded and unshielded
– Plenum and riser-rated
• Cable application
– Rollover cable/console cable
– Crossover cable
– Power over Ethernet
• Common issues
– Attenuation
– Interference
– Decibel (dB) loss
– Incorrect pinout
– Bad ports
– Open/short
– Light-emitting diode (LED) status indicators
– Incorrect transceivers
– Duplexing issues
– Transmit and receive (TX/RX) reversed
– Dirty optical cables
• Common tools
– Cable crimper
– Punchdown tool
– Tone generator
– Loopback adapter
– Optical time-domain reflectometer (OTDR)
– Multimeter
– Cable tester
– Wire map
– Tap
– Fusion splicers
– Spectrum analyzers
– Snips/cutters
– Cable stripper
– Fiber light meter
5.3 Given a scenario, use the appropriate network software tools and commands.
• Software tools
– WiFi analyzer
– Protocol analyzer/packet capture
– Bandwidth speed tester
– Port scanner
– iperf
– NetFlow analyzers
– Trivial File Transfer Protocol (TFTP) server
– Terminal emulator
– IP scanner
• Command line tool
– ping
– ipconfig/ifconfig/ip
– nslookup/dig
– traceroute/tracert
– arp
– netstat
– hostname
– route
– telnet
– tcpdump
– nmap
• Basic network platform commands
– show interface
– show config
– show route
5.4 Given a scenario, troubleshoot common wireless connectivity issues.
• Specifications and limitations
– Throughput
– Speed
– Distance
– Received signal strength indication (RSSI) signal strength
– Effective isotropic radiated power (EIRP)/power settings
• Considerations
– Antennas
– Placement
– Type
– Polarization
– Channel utilization
– AP association time
– Site survey
• Common issues
– Interference
– Channel overlap
– Antenna cable attenuation/signal loss
– RF attenuation/signal loss
– Wrong SSID
– Incorrect passphrase
– Encryption protocol mismatch
– Insufficient wireless coverage
– Captive portal issues
– Client disassociation issues
5.5 Given a scenario, troubleshoot general networking issues.
• Considerations
– Device configuration review
– Routing tables
– Interface status
– VLAN assignment
– Network performance baselines
• Common issues
– Collisions
– Broadcast storm
– Duplicate MAC address
– Duplicate IP address
– Multicast flooding
– Asymmetrical routing
– Switching loops
– Routing loops
– Rogue DHCP server
– DHCP scope exhaustion
– IP setting issues
– Incorrect gateway
– Incorrect subnet mask
– Incorrect IP address
– Incorrect DNS
– Missing route
– Low optical link budget
– Certificate issues
– Hardware failure
– Host-based/network-based firewall settings
– Blocked services, ports, or addresses
– Incorrect VLAN
– DNS issues
– NTP issues
– BYOD challenges
– Licensed feature issues
– Network performance issues