Network+ (NET+)
  • What You Will Learn

    This certification preparation program for the CompTIA Network+ improves a technician’s competency in managing, maintaining, troubleshooting, installing, and configuring basic network infrastructure. This program validates the essential knowledge and skills needed to confidently design, configure, manage and troubleshoot any wired and wireless networks. With a CompTIA Network+ certification, you will possess the key skills to troubleshoot, configure and manage these systems and keep your company productive.

    PRICE: $3,695
  • Course Details

    Course Duration

    12 weeks, 15 hours a week

    Credit to be Awarded

    Network+ (NET+) Certification

    Learning method


  • Prequisites

    General Requirement

    Students must be 18 years of age, possess a high school diploma, or General Equivalency Diploma (GED), or Home School Diploma.

    CompTIA Organization Certification Recommendations/ Prerequisites

    CompTIA recommends that students have certification in CompTIA A+, as well as nine months’ experience in networking. These are recommendations and are not required in order to be eligible to sit for the Network+ certification examination.

    CompTIA Organization Certification Exam Requirements

    To be certified, students must pass the certification exam with a minimum score of 720 on a scale of 100-900 during the allotted 90 minutes for the 90-question exam.

  • Outline

    1. Network Theory, Communications, Media and Hardware 
    2. Network Implementations, Models, TC/IP Addressing and Data Recovery  
    3. TC/IP Services, LAN Infrastructure, and WAN Infrastructure 
    4. Remote Networking, System Security, and Network Security  
    5. Network Security Threats and Attacks, Network Management, and Network Troubleshooting
  • Module Group 1

    Network Theory, Communications, Media and Hardware

    • Topic A: Networking Terminology
    • Topic B: Network Categories
    • Topic C: Standard Network Models
    • Topic D: Physical Network Topologies
    • Topic E: Logical Network Topologies
    • Topic F: Data Transmission Methods
    • Topic G: Media Access Methods
    • Topic H: Signaling Methods
    • Topic I: Bounded Network Media
    • Topic J: Unbounded Network Media
    • Topic K: Noise Control
    • Topic L: Network Connectivity Devices
  • Module Group 2

    Network Implementations, Models, TC/IP Addressing and Data Recovery

    • Topic A: Ethernet Networks
    • Topic B: Wireless Networks
    • Topic C: The OSI Model
    • Topic D: The TCP/IP Model
    • Topic E: The TCP/IP Protocol Suite
    • Topic F: IP Addressing
    • Topic G: Default IP Addressing Schemes
    • Topic H: Create Custom IP Addressing Schemes
    • Topic I: Implement IPv6 Addresses
    • Topic J: Delivery Techniques
  • Module Group 3

    TC/IP Services, LAN Infrastructure, and WAN Infrastructure

    • Topic A: Assign IP Addresses
    • Topic B: Domain Naming Services
    • Topic C: TCP/IP Commands
    • Topic D: Common TCP/IP Protocols
    • Topic E: TCP/IP Interoperability Services
    • Topic F: Switching
    • Topic G: Enable Static Routing
    • Topic H: Implement Dynamic IP Routing
    • Topic I: Virtual LANs
    • Topic J: Plan a SOHO Network
    • Topic K: WAN Transmission Technologies
    • Topic L: WAN Connectivity Methods
    • Topic M: Voice over Data Transmission
  • Module Group 4

    Remote Networking, System Security, and Network Security

    • Topic A: Remote Network Architectures
    • Topic B: Remote Access Networking Implementations
    • Topic C: Virtual Private Networking
    • Topic D: VPN Protocols
    • Topic E: Computer Security Basics
    • Topic F: System Security Tools
    • Topic G: Authentication Methods
    • Topic H: Encryption Methods
    • Topic I: Network Perimeter Security
    • Topic J: Intrusion Detection and Prevention
    • Topic K: Protect Network Traffic Using IPSec
  • Module Group 5

    Network Security Threats and Attacks, Network Management, and Network Troubleshooting

    • Topic A: Network-Based Security Threats and Attacks
    • Topic B: Apply Threat Mitigation Techniques
    • Topic C: Educate Users
    • Topic D: Network Monitoring
    • Topic E: Configuration Management Documentation
    • Topic F: Network Performance Optimization
    • Topic G: Network Troubleshooting Models
    • Topic H: Network Troubleshooting Utilities
    • Topic I: Hardware Troubleshooting Tools
    • Topic J: Common Connectivity Issues

ABL Cyber Range and Academy
an Arizona Licensed School

ABL Cyber Academy - All Rights Reserved ©