0% found this document useful (0 votes)
67 views21 pages

Mapping Course Content To CompTIA Network+ (Exam N10-008)

This document outlines the mapping of course content to the CompTIA Network+ certification Exam N10-008, detailing the specific lessons and topics that cover each exam objective. It includes sections on networking fundamentals, network topologies, types of cables and connectors, IP addressing schemes, common ports and protocols, network services, and basic network architecture. Each objective is linked to corresponding lessons to facilitate study and preparation for the certification exam.

Uploaded by

esamazzam50
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views21 pages

Mapping Course Content To CompTIA Network+ (Exam N10-008)

This document outlines the mapping of course content to the CompTIA Network+ certification Exam N10-008, detailing the specific lessons and topics that cover each exam objective. It includes sections on networking fundamentals, network topologies, types of cables and connectors, IP addressing schemes, common ports and protocols, network services, and basic network architecture. Each objective is linked to corresponding lessons to facilitate study and preparation for the certification exam.

Uploaded by

esamazzam50
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

Appendix A

Mapping Course Content to


CompTIA Certification
1

Achieving CompTIA Network+ certification requires candidates to pass Exam


N10-008. This table describes where the exam objectives for Exam N10-008 are
covered in this course.

1.0 Networking Fundamentals


1.1 Compare and contrast the Open Systems
Interconnection (OSI) model layers and
encapsulation concepts. Covered in
OSI Model Lesson 1, Topic A
Layer 1 – Physical Lesson 1, Topic A
Layer 2 – Data link Lesson 1, Topic A
Layer 3 – Network Lesson 1, Topic A
Layer 4 – Transport Lesson 1, Topic A
Layer 5 – Session Lesson 1, Topic A
Layer 6 – Presentation Lesson 1, Topic A
Layer 7 – Application Lesson 1, Topic A
Data encapsulation and decapsulation within Lesson 1, Topic A
the OSI model context Lesson 3, Topic B
Lesson 5, Topic A
Lesson 9, Topic A
Ethernet header Lesson 3, Topic B
Internet Protocol (IP) header Lesson 5, Topic A
Transmission Control Protocol (TCP)/User Datagram Lesson 9, Topic A
Protocol (UDP) headers
TCP flags Lesson 9, Topic A
Payload Lesson 1, Topic A
Maximum transmission unit (MTU) Lesson 3, Topic B

1.2 Explain the characteristics of network


topologies and network types. Covered in
Mesh Lesson 8, Topic A
Star/hub-and-spoke Lesson 8, Topic A
Bus Lesson 8, Topic A
Ring Lesson 8, Topic A
Hybrid Lesson 8, Topic A
Network types and characteristics Lesson 8, Topic A
Lesson 20, Topic B
Lesson 20, Topic C
A-2 | Appendix A

1.2 Explain the characteristics of network


topologies and network types. Covered in
Peer-to-peer Lesson 8, Topic A
Client-server Lesson 8, Topic A
Local area network (LAN) Lesson 8, Topic A
Metropolitan area network (MAN) Lesson 8, Topic A
Wide area network (WAN) Lesson 8, Topic A
Wireless local area network (WLAN) Lesson 8, Topic A
Personal area network (PAN) Lesson 8, Topic A
Campus area network (CAN) Lesson 8, Topic A
Storage area network (SAN) Lesson 20, Topic B
Software-defined wide area network (SDWAN) Lesson 20, Topic C
Multiprotocol label switching (MPLS) Lesson 20, Topic C
Multipoint generic routing encapsulation (mGRE) Lesson 20, Topic C
Service-related entry point Lesson 16, Topic A
Demarcation point Lesson 16, Topic A
Smartjack Lesson 16, Topic A
Virtual network concepts Lesson 20, Topic B
vSwitch Lesson 20, Topic B
Virtual network interface card (vNIC) Lesson 20, Topic B
Network function virtualization (NFV) Lesson 20, Topic B
Hypervisor Lesson 20, Topic B
Provider links Lesson 16, Topic A
Satellite Lesson 16, Topic A
Digital subscriber line (DSL) Lesson 16, Topic A
Cable Lesson 16, Topic A
Leased line Lesson 16, Topic A
Metro-optical Lesson 16, Topic A

1.3 Summarize the types of cables and connectors


and explain which is the appropriate type
for a solution. Covered in
Copper Lesson 2, Topic B
Twisted pair Lesson 2, Topic B
Cat 5 Lesson 2, Topic B
Cat 5e Lesson 2, Topic B
Cat 6 Lesson 2, Topic B
Cat 6a Lesson 2, Topic B
Cat 7 Lesson 2, Topic B
Cat 8 Lesson 2, Topic B
Coaxial/RG-6 Lesson 2, Topic B
Twinaxial Lesson 2, Topic B

Appendix A: Mapping Course Content to CompTIA Certification

LICENSED FOR USE ONLY BY: ESAM ABU YOUSIF · 33983941 · DEC 19 2022
Appendix A | A-3

1.3 Summarize the types of cables and connectors


and explain which is the appropriate type
for a solution. Covered in
Termination standards Lesson 2, Topic B
TIA/EIA-568A Lesson 2, Topic B
TIA/EIA-568B Lesson 2, Topic B
Fiber Lesson 2, Topic C
Single-mode Lesson 2, Topic C
Multimode Lesson 2, Topic C
Connector types Lesson 2, Topic B
Lesson 2, Topic C
Lesson 2, Topic D
Local connector (LC), straight tip (ST), subscriber connector Lesson 2, Topic C
(SC), mechanical transfer (MT), registered jack (RJ)
Angled physical contact (APC) Lesson 2, Topic C
Ultra-physical contact (UPC) Lesson 2, Topic C
RJ11 Lesson 2, Topic B
RJ45 Lesson 2, Topic B
F-type connector Lesson 2, Topic B
Transceivers/media converters Lesson 2, Topic D
Transceiver type Lesson 2, Topic D
Small form-factor pluggable (SFP) Lesson 2, Topic D
Enhanced form-factor pluggable (SFP+) Lesson 2, Topic D
Quad small form-factor pluggable (QSFP) Lesson 2, Topic D
Enhanced quad small form-factor pluggable (QSFP+) Lesson 2, Topic D
Cable management Lesson 2, Topic D
Patch panel/patch bay Lesson 2, Topic D
Fiber distribution panel Lesson 2, Topic D
Punchdown block Lesson 2, Topic D
66 Lesson 2, Topic D
110 Lesson 2, Topic D
Krone Lesson 2, Topic D
Bix Lesson 2, Topic D
Ethernet standards Lesson 2, Topic A
Lesson 2, Topic C
Lesson 2, Topic D
Copper Lesson 2, Topic A
10BASE-T Lesson 2, Topic A
100BASE-TX Lesson 2, Topic A
1000BASE-T Lesson 2, Topic A
10GBASE-T Lesson 2, Topic A
40GBASE-T Lesson 2, Topic A

Appendix A: Mapping Course Content to CompTIA Certification

LICENSED FOR USE ONLY BY: ESAM ABU YOUSIF · 33983941 · DEC 19 2022
A-4 | Appendix A

1.3 Summarize the types of cables and connectors


and explain which is the appropriate type
for a solution. Covered in
Fiber Lesson 2, Topic C
Lesson 2, Topic D
100BASE-FX Lesson 2, Topic C
100BASE-SX Lesson 2, Topic C
1000BASE-SX Lesson 2, Topic C
1000BASE-LX Lesson 2, Topic C
10GBASE-SR Lesson 2, Topic C
10GBASE-LR Lesson 2, Topic C
Coarse wavelength division multiplexing (CWDM) Lesson 2, Topic D
Dense wavelength division multiplexing (DWDM) Lesson 2, Topic D
Bidirectional wavelength division multiplexing (WDM) Lesson 2, Topic D

1.4 Given a scenario, configure a subnet and


use appropriate IP addressing schemes. Covered in
Public vs. private Lesson 5, Topic C
Lesson 14, Topic A
RFC1918 Lesson 5, Topic C
Network address translation (NAT) Lesson 14, Topic A
Port address translation (PAT) Lesson 14, Topic A
IPv4 vs. IPv6 Lesson 5, Topic B
Lesson 5, Topic C
Lesson 6, Topic C
Automatic Private IP Addressing (APIPA) Lesson 5, Topic C
Extended unique identifier (EUI-64) Lesson 6, Topic C
Multicast Lesson 5, Topic B
Unicast Lesson 5, Topic B
Anycast Lesson 5, Topic B
Broadcast Lesson 5, Topic B
Link local Lesson 6, Topic C
Loopback Lesson 5, Topic C
Default gateway Lesson 5, Topic B
IPv4 subnetting Lesson 5, Topic C
Lesson 7, Topic B
Classless (variable-length subnet mask) Lesson 7, Topic B
Classful Lesson 5, Topic C
A Lesson 5, Topic C
B Lesson 5, Topic C
C Lesson 5, Topic C
D Lesson 5, Topic C
E Lesson 5, Topic C

Appendix A: Mapping Course Content to CompTIA Certification

LICENSED FOR USE ONLY BY: ESAM ABU YOUSIF · 33983941 · DEC 19 2022
Appendix A | A-5

1.4 Given a scenario, configure a subnet and


use appropriate IP addressing schemes. Covered in
Classless Inter-Domain Routing (CIDR) notation Lesson 7, Topic B
IPv6 concepts Lesson 6, Topic C
Tunneling Lesson 6, Topic C
Dual stack Lesson 6, Topic C
Shorthand notation Lesson 6, Topic C
Router advertisement Lesson 6, Topic C
Stateless address autoconfiguration (SLAAC) Lesson 6, Topic C
Virtual IP (VIP) Lesson 18, Topic B
Subinterfaces Lesson 7, Topic C

1.5 Explain common ports and


protocols, their application,
and encrypted alternatives.
Protocols Port(s) Covered in
File Transfer Protocol (FTP) 20/21 Lesson 11, Topic A
Secure Shell (SSH) 22 Lesson 12, Topic A
Secure File Transfer Protocol (SFTP) 22 Lesson 11, Topic A
Telnet 23 Lesson 12, Topic A
Simple Mail Transfer Protocol (SMTP) 25 Lesson 11, Topic B
Domain Name System (DNS) 53 Lesson 10, Topic B
Dynamic Host Configuration Protocol 67/68 Lesson 10, Topic A
(DHCP)
Trivial File Transfer Protocol (TFTP) 69 Lesson 11, Topic A
Hypertext Transfer Protocol (HTTP) 80 Lesson 11, Topic A
Post Office Protocol v3 (POP3) 110 Lesson 11, Topic B
Network Time Protocol (NTP) 123 Lesson 12, Topic A
Internet Message Access Protocol (IMAP) 143 Lesson 11, Topic B
Simple Network Management Protocol 161/162 Lesson 12, Topic B
(SNMP)
Lightweight Directory Access Protocol 389 Lesson 13, Topic B
(LDAP)
Hypertext Transfer Protocol Secure (HTTPS) 443 Lesson 11, Topic A
[Secure Sockets Layer (SSL)]
HTTPS [Transport Layer Security (TLS)] 443 Lesson 11, Topic A
Server Message Block (SMB) 445 Lesson 11, Topic A
Syslog 514 Lesson 12, Topic B
SMTP TLS 587 Lesson 11, Topic B
Lightweight Directory Access Protocol (over 636 Lesson 13, Topic B
SSL) (LDAPS)
IMAP over SSL 993 Lesson 11, Topic B
POP3 over SSL 995 Lesson 11, Topic B

Appendix A: Mapping Course Content to CompTIA Certification

LICENSED FOR USE ONLY BY: ESAM ABU YOUSIF · 33983941 · DEC 19 2022
A-6 | Appendix A

1.5 Explain common ports and


protocols, their application,
and encrypted alternatives.
Protocols Port(s) Covered in
Structured Query Language (SQL) Server 1433 Lesson 11, Topic A
SQLnet 1521 Lesson 11, Topic A
MySQL 3306 Lesson 11, Topic A
Remote Desktop Protocol (RDP) 3389 Lesson 12, Topic A
Session Initiation Protocol (SIP) 5060/5061 Lesson 11, Topic B
IP protocol types Lesson 6, Topic A
Lesson 9, Topic A
Lesson 16, Topic B
Internet Control Message Protocol (ICMP) Lesson 6, Topic A
TCP Lesson 9, Topic A
UDP Lesson 9, Topic A
Generic Routing Encapsulation (GRE) Lesson 16, Topic B
Internet Protocol Security (IPSec) Lesson 16, Topic B
Authentication Header (AH)/Encapsulating Lesson 16, Topic B
Security Payload (ESP)
Connectionless vs. connection-oriented Lesson 9, Topic A

1.6 Explain the use and purpose of


network services. Covered in
DHCP Lesson 10, Topic A
Scope Lesson 10, Topic A
Exclusion ranges Lesson 10, Topic A
Reservation Lesson 10, Topic A
Dynamic assignment Lesson 10, Topic A
Static assignment Lesson 10, Topic A
Lease time Lesson 10, Topic A
Scope options Lesson 10, Topic A
Available leases Lesson 10, Topic A
DHCP relay Lesson 10, Topic A
IP helper/UDP forwarding Lesson 10, Topic A
DNS Lesson 10, Topic B
Lesson 10, Topic C
Record types Lesson 10, Topic B
Address (A vs. AAAA) Lesson 10, Topic B
Canonical name (CNAME) Lesson 10, Topic B
Mail exchange (MX) Lesson 10, Topic B
Start of authority (SOA) Lesson 10, Topic B
Pointer (PTR) Lesson 10, Topic B
Text (TXT) Lesson 10, Topic B
Service (SRV) Lesson 10, Topic B
Name server (NS) Lesson 10, Topic B

Appendix A: Mapping Course Content to CompTIA Certification

LICENSED FOR USE ONLY BY: ESAM ABU YOUSIF · 33983941 · DEC 19 2022
Appendix A | A-7

1.6 Explain the use and purpose of


network services. Covered in
Global hierarchy Lesson 10, Topic B
Root DNS servers Lesson 10, Topic B
Internal vs. external Lesson 10, Topic C
Zone transfers Lesson 10, Topic C
Authoritative name servers Lesson 10, Topic B
Time to live (TTL) Lesson 10, Topic C
DNS caching Lesson 10, Topic C
Reverse DNS/reverse lookup/forward lookup Lesson 10, Topic B
Recursive lookup/iterative lookup Lesson 10, Topic B
NTP Lesson 12, Topic A
Stratum Lesson 12, Topic A
Clients Lesson 12, Topic A
Servers Lesson 12, Topic A

1.7 Explain basic corporate and datacenter network


architecture. Covered in
Three-tiered Lesson 8, Topic B
Core Lesson 8, Topic B
Distribution/aggregation layer Lesson 8, Topic B
Access/edge Lesson 8, Topic B
Software-defined networking Lesson 20, Topic C
Application layer Lesson 20, Topic C
Control layer Lesson 20, Topic C
Infrastructure layer Lesson 20, Topic C
Management plane Lesson 20, Topic C
Spine and leaf Lesson 20, Topic C
Software-defined network Lesson 20, Topic C
Top-of-rack switching Lesson 20, Topic C
Backbone Lesson 20, Topic C
Traffic flows Lesson 20, Topic C
North-South Lesson 20, Topic C
East-West Lesson 20, Topic C
Branch office vs. on-premises datacenter vs. colocation Lesson 20, Topic C
Storage area networks Lesson 20, Topic B
Connection types Lesson 20, Topic B
Fibre Channel over Ethernet (FCoE) Lesson 20, Topic B
Fibre Channel Lesson 20, Topic B
Internet Small Computer Systems Interface (iSCSI) Lesson 20, Topic B

Appendix A: Mapping Course Content to CompTIA Certification

LICENSED FOR USE ONLY BY: ESAM ABU YOUSIF · 33983941 · DEC 19 2022
A-8 | Appendix A

1.8 Summarize cloud concepts and


connectivity options. Covered in
Deployment models Lesson 20, Topic A
Public Lesson 20, Topic A
Private Lesson 20, Topic A
Hybrid Lesson 20, Topic A
Community Lesson 20, Topic A
Service models Lesson 20, Topic A
Software as a service (SaaS) Lesson 20, Topic A
Infrastructure as a service (IaaS) Lesson 20, Topic A
Platform as a service (PaaS) Lesson 20, Topic A
Desktop as a service (DaaS) Lesson 20, Topic A
Infrastructure as code Lesson 20, Topic A
Automation/orchestration Lesson 20, Topic A
Connectivity options Lesson 20, Topic A
Virtual private network (VPN) Lesson 20, Topic A
Private-direct connection to cloud provider Lesson 20, Topic A
Multitenancy Lesson 20, Topic A
Elasticity Lesson 20, Topic A
Scalability Lesson 20, Topic A
Security implications Lesson 20, Topic A

2.0 Network Implementations


2.1 Compare and contrast various devices, their
features, and their appropriate placement
on the network. Covered in
Networking devices Lesson 3, Topic A
Lesson 7, Topic C
Lesson 11, Topic B
Lesson 14, Topic A
Lesson 15, Topic B
Lesson 16, Topic A
Lesson 16, Topic B
Lesson 18, Topic B
Layer 2 switch Lesson 3, Topic A
Layer 3 capable switch Lesson 7, Topic C
Router Lesson 7, Topic C
Hub Lesson 3, Topic A
Access point Lesson 15, Topic B
Bridge Lesson 3, Topic A
Wireless LAN controller Lesson 15, Topic B
Load balancer Lesson 18, Topic B
Proxy server Lesson 14, Topic A
Cable modem Lesson 16, Topic A
DSL modem Lesson 16, Topic A

Appendix A: Mapping Course Content to CompTIA Certification

LICENSED FOR USE ONLY BY: ESAM ABU YOUSIF · 33983941 · DEC 19 2022
Appendix A | A-9

2.1 Compare and contrast various devices, their


features, and their appropriate placement
on the network. Covered in
Repeater Lesson 3, Topic A
Voice gateway Lesson 11, Topic B
Media converter Lesson 3, Topic A
Intrusion prevention system (IPS)/intrusion detection Lesson 14, Topic A
system (IDS) device
Firewall Lesson 14, Topic A
VPN headend Lesson 16, Topic B
Networked devices Lesson 11, Topic A
Lesson 18, Topic B
Lesson 17, Topic C
Voice over Internet Protocol (VoIP) phone Lesson 11, Topic B
Printer Lesson 11, Topic A
Physical access control devices Lesson 17, Topic C
Cameras Lesson 17, Topic C
Heating, ventilation, and air conditioning (HVAC) sensors Lesson 17, Topic C
Internet of Things (IoT) Lesson 17, Topic C
Refrigerators Lesson 17, Topic C
Smart speakers Lesson 17, Topic C
Smart thermostats Lesson 17, Topic C
Smart doorbells Lesson 17, Topic C
Industrial control systems/supervisory control and Lesson 17, Topic C
data acquisition (SCADA)

2.2 Compare and contrast routing technologies


and bandwidth management concepts. Covered in
Routing Lesson 7, Topic A
Lesson 7, Topic B
Dynamic routing Lesson 7, Topic B
Protocols [Routing Internet Protocol (RIP), Open Shortest Lesson 7, Topic B
Path First (OSPF), Enhanced Interior
Gateway Routing Protocol (EIGRP), Border
Gateway Protocol (BGP)]
Link state vs. distance vector vs. hybrid Lesson 7, Topic B
Static routing Lesson 7, Topic A
Default route Lesson 7, Topic A
Administrative distance Lesson 7, Topic B
Exterior vs. interior Lesson 7, Topic B
Time to live Lesson 7, Topic A
Bandwidth management Lesson 12, Topic C
Traffic shaping Lesson 12, Topic C
Quality of service (QoS) Lesson 12, Topic C

Appendix A: Mapping Course Content to CompTIA Certification

LICENSED FOR USE ONLY BY: ESAM ABU YOUSIF · 33983941 · DEC 19 2022
A-10 | Appendix A

2.3 Given a scenario, configure and deploy common


Ethernet switching features. Covered in
Data virtual local area network (VLAN) Lesson 8, Topic C
Voice VLAN Lesson 8, Topic C
Port configurations Lesson 3, Topic C
Port tagging/802.1Q Lesson 3, Topic C
Port aggregation Lesson 3, Topic C
Link Aggregation Control Protocol (LACP) Lesson 3, Topic C
Duplex Lesson 3, Topic C
Speed Lesson 3, Topic C
Flow control Lesson 3, Topic C
Port mirroring Lesson 3, Topic C
Port security Lesson 3, Topic C
Jumbo frames Lesson 3, Topic C
Auto-medium-dependent interface crossover (MDI-X) Lesson 3, Topic C
Media access control (MAC) address tables Lesson 3, Topic C
Power over Ethernet (PoE)/Power over Lesson 3, Topic C
Ethernet plus (PoE+)
Spanning Tree Protocol Lesson 8, Topic B
Carrier-sense multiple access with collision Lesson 2, Topic A
detection (CSMA/CD)
Address Resolution Protocol (ARP) Lesson 5, Topic B
Neighbor Discovery Protocol Lesson 6, Topic C

2.4 Given a scenario, install and configure


the appropriate wireless standards and
technologies. Covered in
802.11 standards Lesson 15, Topic A
a Lesson 15, Topic A
b Lesson 15, Topic A
g Lesson 15, Topic A
n (WiFi 4) Lesson 15, Topic A
ac (WiFi 5) Lesson 15, Topic A
ax (WiFi 6) Lesson 15, Topic A
Frequencies and range Lesson 15, Topic A
2.4GHz Lesson 15, Topic A
5GHz Lesson 15, Topic A
Channels Lesson 15, Topic A
Regulatory impacts Lesson 15, Topic A
Channel bonding Lesson 15, Topic A
Service set identifier (SSID) Lesson 15, Topic B
Basic service set Lesson 15, Topic B
Extended service set Lesson 15, Topic B

Appendix A: Mapping Course Content to CompTIA Certification

LICENSED FOR USE ONLY BY: ESAM ABU YOUSIF · 33983941 · DEC 19 2022
Appendix A | A-11

2.4 Given a scenario, install and configure


the appropriate wireless standards and
technologies. Covered in
Independent basic service set (Ad-hoc) Lesson 15, Topic B
Roaming Lesson 15, Topic B
Antenna types Lesson 15, Topic C
Omni Lesson 15, Topic C
Directional Lesson 15, Topic C
Encryption standards Lesson 15, Topic D
WiFi Protected Access (WPA)/WPA2 Personal [Advanced Lesson 15, Topic D
Encryption Standard (AES)/Temporal Key Integrity
Protocol (TKIP)]
WPA/WPA2 Enterprise (AES/TKIP) Lesson 15, Topic D
Cellular technologies Lesson 15, Topic A
Code-division multiple access (CDMA) Lesson 15, Topic A
Global System for Mobile Communications (GSM) Lesson 15, Topic A
Long-Term Evolution (LTE) Lesson 15, Topic A
3G, 4G, 5G Lesson 15, Topic A
Multiple input, multiple output (MIMO) and Lesson 15, Topic A
multi-user MIMO (MU-MIMO)

3.0 Network Operations


3.1 Given a scenario, use the appropriate
statistics and sensors to ensure network
availability. Covered in
Performance metrics/sensors Lesson 12, Topic B
Device/chassis Lesson 12, Topic B
Temperature Lesson 12, Topic B
Central processing unit (CPU) usage Lesson 12, Topic B
Memory Lesson 12, Topic B
Network metrics Lesson 12, Topic B
Bandwidth Lesson 12, Topic B
Latency Lesson 12, Topic B
Jitter Lesson 12, Topic B
SNMP Lesson 12, Topic B
Traps Lesson 12, Topic B
Object identifiers (OIDs) Lesson 12, Topic B
Management information bases (MIBs) Lesson 12, Topic B
Network device logs Lesson 12, Topic B
Log reviews Lesson 12, Topic B
Traffic logs Lesson 12, Topic B
Audit logs Lesson 12, Topic B
Syslog Lesson 12, Topic B
Logging levels/severity levels Lesson 12, Topic B

Appendix A: Mapping Course Content to CompTIA Certification

LICENSED FOR USE ONLY BY: ESAM ABU YOUSIF · 33983941 · DEC 19 2022
A-12 | Appendix A

3.1 Given a scenario, use the appropriate


statistics and sensors to ensure network
availability. Covered in
Interface statistics/status Lesson 12, Topic C
Link state (up/down) Lesson 12, Topic C
Speed/duplex Lesson 12, Topic C
Send/receive traffic Lesson 12, Topic C
Cyclic redundancy checks (CRCs) Lesson 12, Topic C
Protocol packet and byte counts Lesson 12, Topic C
Interface errors or alerts Lesson 12, Topic C
CRC errors Lesson 12, Topic C
Giants Lesson 12, Topic C
Runts Lesson 12, Topic C
Encapsulation errors Lesson 12, Topic C
Environmental factors and sensors Lesson 12, Topic B
Temperature Lesson 12, Topic B
Humidity Lesson 12, Topic B
Electrical Lesson 12, Topic B
Flooding Lesson 12, Topic B
Baselines Lesson 12, Topic B
NetFlow data Lesson 12, Topic C
Uptime/downtime Lesson 12, Topic C

3.2 Explain the purpose of organizational


documents and policies. Covered in
Plans and procedures Lesson 17, Topic A
Change management Lesson 17, Topic A
Incident response plan Lesson 17, Topic A
Disaster recovery plan Lesson 17, Topic A
Business continuity plan Lesson 17, Topic A
System life cycle Lesson 17, Topic A
Standard operating procedures Lesson 17, Topic A
Hardening and security policies Lesson 17, Topic A
Password policy Lesson 17, Topic A
Acceptable use policy Lesson 17, Topic A
Bring your own device (BYOD) policy Lesson 17, Topic A
Remote access policy Lesson 17, Topic A
Onboarding and offboarding policy Lesson 17, Topic A
Security policy Lesson 17, Topic A
Data loss prevention Lesson 17, Topic A

Appendix A: Mapping Course Content to CompTIA Certification

LICENSED FOR USE ONLY BY: ESAM ABU YOUSIF · 33983941 · DEC 19 2022
Appendix A | A-13

3.2 Explain the purpose of organizational


documents and policies. Covered in
Common documentation Lesson 17, Topic A
Physical network diagram Lesson 17, Topic A
Floor plan Lesson 17, Topic A
Rack diagram Lesson 17, Topic A
Intermediate distribution frame (IDF)/main Lesson 17, Topic A
distribution frame (MDF) documentation
Logical network diagram Lesson 17, Topic A
Wiring diagram Lesson 17, Topic A
Site survey report Lesson 17, Topic A
Audit and assessment report Lesson 17, Topic A
Baseline configurations Lesson 17, Topic A
Common agreements Lesson 17, Topic A
Non-disclosure agreement (NDA) Lesson 17, Topic A
Service-level agreement (SLA) Lesson 17, Topic A
Memorandum of understanding (MOU) Lesson 17, Topic A

3.3 Explain high availability and disaster recovery


concepts and summarize which is the best
solution. Covered in
Load balancing Lesson 18, Topic B
Multipathing Lesson 18, Topic B
Network interface card (NIC) teaming Lesson 18, Topic B
Redundant hardware/clusters Lesson 18, Topic B
Switches Lesson 18, Topic B
Routers Lesson 18, Topic B
Firewalls Lesson 18, Topic B
Facilities and infrastructure support Lesson 18, Topic A
Uninterruptible power supply (UPS) Lesson 18, Topic A
Power distribution units (PDUs) Lesson 18, Topic A
Generator Lesson 18, Topic A
HVAC Lesson 18, Topic A
Fire suppression Lesson 18, Topic A
Redundancy and high availability (HA) concepts Lesson 18, Topic A
Lesson 18, Topic B
Cold site Lesson 18, Topic A
Warm site Lesson 18, Topic A
Hot site Lesson 18, Topic A
Cloud site Lesson 18, Topic A
Active-active vs. active-passive Lesson 18, Topic B
Multiple Internet service providers (ISPs)/diverse paths Lesson 18, Topic B
Virtual Router Redundancy Protocol (VRRP)/First Hop Lesson 18, Topic B
Redundancy Protocol (FHRP)

Appendix A: Mapping Course Content to CompTIA Certification

LICENSED FOR USE ONLY BY: ESAM ABU YOUSIF · 33983941 · DEC 19 2022
A-14 | Appendix A

3.3 Explain high availability and disaster recovery


concepts and summarize which is the best
solution. Covered in
Mean time to repair (MTTR) Lesson 18, Topic A
Mean time between failure (MTBF) Lesson 18, Topic A
Recovery time objective (RTO) Lesson 18, Topic A
Recovery point objective (RPO) Lesson 18, Topic A
Network device backup/restore Lesson 18, Topic A
State Lesson 18, Topic A
Configuration Lesson 18, Topic A

4.0 Network Security


4.1 Explain common security concepts. Covered in
Confidentiality, integrity, availability (CIA) Lesson 13, Topic A
Threats Lesson 13, Topic A
Internal Lesson 13, Topic A
External Lesson 13, Topic A
Vulnerabilities Lesson 13, Topic A
Common vulnerabilities and exposures (CVE) Lesson 13, Topic A
Zero-day Lesson 13, Topic A
Exploits Lesson 13, Topic A
Least privilege Lesson 13, Topic A
Role-based access Lesson 13, Topic A
Zero Trust Lesson 13, Topic A
Defense in depth Lesson 14, Topic A
Network segmentation enforcement Lesson 14, Topic A
Screened subnet [previously known as Lesson 14, Topic A
demilitarized zone (DMZ)]
Separation of duties Lesson 14, Topic A
Network access control Lesson 14, Topic A
Honeypot Lesson 14, Topic A
Authentication methods Lesson 13, Topic B
Multifactor Lesson 13, Topic B
Terminal Access Controller Access-Control System Lesson 13, Topic B
Plus (TACACS+)
Single sign-on (SSO) Lesson 13, Topic B
Remote Authentication Dial-in User Service (RADIUS) Lesson 13, Topic B
LDAP Lesson 13, Topic B
Kerberos Lesson 13, Topic B
Local authentication Lesson 13, Topic B
802.1X Lesson 13, Topic B
Extensible Authentication Protocol (EAP) Lesson 13, Topic B

Appendix A: Mapping Course Content to CompTIA Certification

LICENSED FOR USE ONLY BY: ESAM ABU YOUSIF · 33983941 · DEC 19 2022
Appendix A | A-15

4.1 Explain common security concepts. Covered in


Risk Management Lesson 13, Topic A
Security risk assessments Lesson 13, Topic A
Threat assessment Lesson 13, Topic A
Vulnerability assessment Lesson 13, Topic A
Penetration testing Lesson 13, Topic A
Posture assessment Lesson 13, Topic A
Business risk assessments Lesson 13, Topic A
Process assessment Lesson 13, Topic A
Vendor assessment Lesson 13, Topic A
Security information and event management (SIEM) Lesson 13, Topic A

4.2 Compare and contrast common types of attacks. Covered in


Technology-based Lesson 19, Topic A
Denial-of-service (DoS)/distributed denial-of-service (DDoS) Lesson 19, Topic A
Botnet/command and control Lesson 19, Topic A
On-path attack (previously known as man-in-the-middle Lesson 19, Topic A
attack)
DNS poisoning Lesson 19, Topic A
VLAN hopping Lesson 19, Topic A
ARP spoofing Lesson 19, Topic A
Rogue DHCP Lesson 19, Topic A
Rogue access point (AP) Lesson 19, Topic A
Evil twin Lesson 19, Topic A
Ransomware Lesson 19, Topic A
Password attacks Lesson 19, Topic A
Brute-force Lesson 19, Topic A
Dictionary Lesson 19, Topic A
MAC spoofing Lesson 19, Topic A
IP spoofing Lesson 19, Topic A
Deauthentication Lesson 19, Topic A
Malware Lesson 19, Topic A
Human and environmental Lesson 19, Topic A
Social engineering Lesson 19, Topic A
Phishing Lesson 19, Topic A
Tailgating Lesson 19, Topic A
Piggybacking Lesson 19, Topic A
Shoulder surfing Lesson 19, Topic A

Appendix A: Mapping Course Content to CompTIA Certification

LICENSED FOR USE ONLY BY: ESAM ABU YOUSIF · 33983941 · DEC 19 2022
A-16 | Appendix A

4.3 Given a scenario, apply network hardening


techniques. Covered in
Best practices Lesson 19, Topic B
Secure SNMP Lesson 19, Topic B
Router Advertisement (RA) Guard Lesson 19, Topic B
Port security Lesson 19, Topic B
Dynamic ARP inspection Lesson 19, Topic B
Control plane policing Lesson 19, Topic B
Private VLANs Lesson 19, Topic B
Disable unneeded switchports Lesson 19, Topic B
Disable unneeded network services Lesson 19, Topic B
Change default passwords Lesson 19, Topic B
Password complexity/length Lesson 19, Topic B
Enable DHCP snooping Lesson 19, Topic B
Change default VLAN Lesson 19, Topic B
Patch and firmware management Lesson 19, Topic B
Access control list Lesson 19, Topic B
Role-based access Lesson 19, Topic B
Firewall rules Lesson 19, Topic B
Explicit deny Lesson 19, Topic B
Implicit deny Lesson 19, Topic B
Wireless security Lesson 19, Topic B
MAC filtering Lesson 19, Topic B
Antenna placement Lesson 19, Topic B
Power levels Lesson 19, Topic B
Wireless client isolation Lesson 19, Topic B
Guest network isolation Lesson 19, Topic B
Preshared keys (PSKs) Lesson 19, Topic B
EAP Lesson 19, Topic B
Geofencing Lesson 19, Topic B
Captive portal Lesson 19, Topic B
IoT access considerations Lesson 19, Topic B

4.4 Compare and contrast remote access methods


and security implications. Covered in
Site-to-site VPN Lesson 16, Topic B
Client-to-site VPN Lesson 16, Topic B
Clientless VPN Lesson 16, Topic B
Split tunnel vs. full tunnel Lesson 16, Topic B
Remote desktop connection Lesson 16, Topic B
Remote desktop gateway Lesson 16, Topic B
SSH Lesson 16, Topic B

Appendix A: Mapping Course Content to CompTIA Certification

LICENSED FOR USE ONLY BY: ESAM ABU YOUSIF · 33983941 · DEC 19 2022
Appendix A | A-17

4.4 Compare and contrast remote access methods


and security implications. Covered in
Virtual network computing (VNC) Lesson 16, Topic B
Virtual desktop Lesson 16, Topic B
Authentication and authorization considerations Lesson 16, Topic B
In-band vs. out-of-band management Lesson 16, Topic B

4.5 Explain the importance of physical security. Covered in


Detection methods Lesson 17, Topic B
Camera Lesson 17, Topic B
Motion detection Lesson 17, Topic B
Asset tags Lesson 17, Topic B
Tamper detection Lesson 17, Topic B
Prevention methods Lesson 17, Topic B
Employee training Lesson 17, Topic B
Access control hardware Lesson 17, Topic B
Badge readers Lesson 17, Topic B
Biometrics Lesson 17, Topic B
Locking racks Lesson 17, Topic B
Locking cabinets Lesson 17, Topic B
Access control vestibule (previously known as a mantrap) Lesson 17, Topic B
Smart lockers Lesson 17, Topic B
Asset disposal Lesson 17, Topic B
Factory reset/wipe configuration Lesson 17, Topic B
Sanitize devices for disposal Lesson 17, Topic B

5.0 Network Troubleshooting


5.1 Explain the network troubleshooting
methodology. Covered in
Identify the problem Lesson 4, Topic A
Gather information Lesson 4, Topic A
Question users Lesson 4, Topic A
Identify symptoms Lesson 4, Topic A
Determine if anything has changed Lesson 4, Topic A
Duplicate the problem, if possible Lesson 4, Topic A
Approach multiple problems individually Lesson 4, Topic A
Establish a theory of probable cause Lesson 4, Topic A
Question the obvious Lesson 4, Topic A
Consider multiple approaches Lesson 4, Topic A
Top-to-bottom/bottom-to-top OSI model Lesson 4, Topic A
Divide and conquer Lesson 4, Topic A

Appendix A: Mapping Course Content to CompTIA Certification

LICENSED FOR USE ONLY BY: ESAM ABU YOUSIF · 33983941 · DEC 19 2022
A-18 | Appendix A

5.1 Explain the network troubleshooting Covered in


methodology.
Test the theory to determine the cause Lesson 4, Topic A
If the theory is confirmed, determine the next steps to Lesson 4, Topic A
resolve the problem
If the theory is not confirmed, reestablish a new theory Lesson 4, Topic A
or escalate
Establish a plan of action to resolve the problem and Lesson 4, Topic A
identify potential effects
Implement the solution or escalate as necessary Lesson 4, Topic A
Verify full system functionality and, if applicable, Lesson 4, Topic A
implement preventive measures
Document findings, actions, outcomes, and lessons Lesson 4, Topic A
learned

5.2 Given a scenario, troubleshoot common


cable connectivity issues and select the
appropriate tools. Covered in
Specifications and limitations Lesson 4, Topic B
Throughput Lesson 4, Topic B
Speed Lesson 4, Topic B
Distance Lesson 4, Topic B
Cable considerations Lesson 4, Topic B
Shielded and unshielded Lesson 4, Topic B
Plenum and riser-rated Lesson 4, Topic B
Cable application Lesson 4, Topic B
Rollover cable/console cable Lesson 4, Topic B
Crossover cable Lesson 4, Topic B
Power over Ethernet Lesson 4, Topic B
Common issues Lesson 4, Topic B
Attenuation Lesson 4, Topic B
Interference Lesson 4, Topic B
Decibel (dB) loss Lesson 4, Topic B
Incorrect pinout Lesson 4, Topic B
Bad ports Lesson 4, Topic B
Open/short Lesson 4, Topic B
Light-emitting diode (LED) status indicators Lesson 4, Topic B
Incorrect transceivers Lesson 4, Topic B
Duplexing issues Lesson 4, Topic B
Transmit and receive (TX/RX) reversed Lesson 4, Topic B
Dirty optical cables Lesson 4, Topic B
Common tools Lesson 2, Topic D
Lesson 3, Topic B
Lesson 4, Topic B

Appendix A: Mapping Course Content to CompTIA Certification

LICENSED FOR USE ONLY BY: ESAM ABU YOUSIF · 33983941 · DEC 19 2022
Appendix A | A-19

5.2 Given a scenario, troubleshoot common


cable connectivity issues and select the
appropriate tools. Covered in
Cable crimper Lesson 2, Topic D
Punchdown tool Lesson 2, Topic D
Tone generator Lesson 4, Topic B
Loopback adapter Lesson 4, Topic B
Optical time-domain reflectometer (OTDR) Lesson 4, Topic B
Multimeter Lesson 4, Topic B
Cable tester Lesson 4, Topic B
Wire map Lesson 4, Topic B
Tap Lesson 3, Topic B
Fusion splicers Lesson 2, Topic D
Spectrum analyzers Lesson 4, Topic B
Snips/cutters Lesson 2, Topic D
Cable stripper Lesson 2, Topic D
Fiber light meter Lesson 4, Topic B

5.3 Given a scenario, use the appropriate network


software tools and commands. Covered in
Software tools Lesson 9, Topic B
Lesson 11, Topic A
Lesson 12, Topic C
Lesson 15, Topic C
WiFi analyzer Lesson 15, Topic C
Protocol analyzer/packet capture Lesson 9, Topic B
Bandwidth speed tester Lesson 12, Topic C
Port scanner Lesson 9, Topic B
iperf Lesson 12, Topic C
NetFlow analyzers Lesson 12, Topic C
Trivial File Transfer Protocol (TFTP) server Lesson 11, Topic A
Terminal emulator Lesson 12, Topic A
IP scanner Lesson 9, Topic B
Command line tool Lesson 3, Topic B
Lesson 6, Topic A
Lesson 7, Topic C
Lesson 9, Topic B
Lesson 10, Topic C
Lesson 12, Topic A
ping Lesson 6, Topic A
ipconfig/ifconfig/ip Lesson 6, Topic A
nslookup/dig Lesson 10, Topic C
traceroute/tracert Lesson 7, Topic C
arp Lesson 6, Topic A

Appendix A: Mapping Course Content to CompTIA Certification

LICENSED FOR USE ONLY BY: ESAM ABU YOUSIF · 33983941 · DEC 19 2022
A-20 | Appendix A

5.3 Given a scenario, use the appropriate network


software tools and commands. Covered in
netstat Lesson 9, Topic B
hostname Lesson 10, Topic C
route Lesson 7, Topic C
telnet Lesson 12, Topic A
tcpdump Lesson 3, Topic B
nmap Lesson 9, Topic B
Basic network platform commands Lesson 3, Topic C
show interface Lesson 3, Topic C
show config Lesson 3, Topic C
show route Lesson 3, Topic C

5.4 Given a scenario, troubleshoot common wireless


connectivity issues. Covered in
Specifications and limitations Lesson 15, Topic C
Throughput Lesson 15, Topic C
Speed Lesson 15, Topic C
Distance Lesson 15, Topic C
Received signal strength indication (RSSI) signal strength Lesson 15, Topic C
Effective isotropic radiated power (EIRP)/power settings Lesson 15, Topic C
Considerations Lesson 15, Topic C
Antennas Lesson 15, Topic C
Placement Lesson 15, Topic C
Type Lesson 15, Topic C
Polarization Lesson 15, Topic C
Channel utilization Lesson 15, Topic C
AP association time Lesson 15, Topic C
Site survey Lesson 15, Topic C
Common issues Lesson 15, Topic C
Lesson 15, Topic D
Interference Lesson 15, Topic C
Channel overlap Lesson 15, Topic C
Antenna cable attenuation/signal loss Lesson 15, Topic C
RF attenuation/signal loss Lesson 15, Topic C
Wrong SSID Lesson 15, Topic D
Incorrect passphrase Lesson 15, Topic D
Encryption protocol mismatch Lesson 15, Topic D
Insufficient wireless coverage Lesson 15, Topic C
Captive portal issues Lesson 15, Topic D
Client disassociation issues Lesson 15, Topic D

Appendix A: Mapping Course Content to CompTIA Certification

LICENSED FOR USE ONLY BY: ESAM ABU YOUSIF · 33983941 · DEC 19 2022
Appendix A | A-21

5.5 Given a scenario, troubleshoot general


networking issues. Covered in
Considerations Lesson 6, Topic B
Lesson 7, Topic C
Lesson 14, Topic B
Device configuration review Lesson 7, Topic C
Routing tables Lesson 7, Topic C
Interface status Lesson 6, Topic B
VLAN assignment Lesson 14, Topic B
Network performance baselines Lesson 14, Topic B
Common issues Lesson 6, Topic B
Lesson 7, Topic C
Lesson 8, Topic B
Lesson 14, Topic B
Collisions Lesson 6, Topic B
Broadcast storm Lesson 8, Topic B
Duplicate MAC address Lesson 6, Topic B
Duplicate IP address Lesson 6, Topic B
Multicast flooding Lesson 6, Topic B
Asymmetrical routing Lesson 7, Topic C
Switching loops Lesson 8, Topic B
Routing loops Lesson 7, Topic C
Rogue DHCP server Lesson 14, Topic B
DHCP scope exhaustion Lesson 14, Topic B
IP setting issues Lesson 6, Topic B
Incorrect gateway Lesson 6, Topic B
Incorrect subnet mask Lesson 6, Topic B
Incorrect IP address Lesson 6, Topic B
Incorrect DNS Lesson 6, Topic B
Missing route Lesson 7, Topic C
Low optical link budget Lesson 7, Topic C
Certificate issues Lesson 14, Topic B
Hardware failure Lesson 6, Topic B
Host-based/network-based firewall settings Lesson 14, Topic B
Blocked services, ports, or addresses Lesson 14, Topic B
Incorrect VLAN Lesson 14, Topic B
DNS issues Lesson 14, Topic B
NTP issues Lesson 14, Topic B
BYOD challenges Lesson 14, Topic B
Licensed feature issues Lesson 14, Topic B
Network performance issues Lesson 14, Topic B

Appendix A: Mapping Course Content to CompTIA Certification

LICENSED FOR USE ONLY BY: ESAM ABU YOUSIF · 33983941 · DEC 19 2022

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy