Network+

CompTIA Network+ is the premier certification for validating your knowledge of essential networking tools and concepts. You will be assessed on your abilities in network connectivity, documentation, service configuration, data centers, cloud, virtual networking, monitoring, troubleshooting, and security hardening. This certification prepares you for jobs in technical support, network operation, and system administration.

Skills you'll learn

Deploy wired and wireless devices, covering IP addressing, ports, protocols, and network architecture for network deployment.

Understand documentation, life-cycle, change, and configuration management processes and procedures.

Grasp virtualization, cloud service models, elasticity, and scalability to apply cloud concepts.

Monitor networks for high availability and resolve connectivity issues to maintain network performance.

Establish secure networks and mitigate vulnerabilities to strengthen security.

Diagnose and resolve network issues using appropriate tools for effective troubleshooting.

Exam Details

Exam version: V9

Exam series code: N10-009

Launch date: June 20, 2024

Number of questions: maximum of 90, a mix of multiple-choice and performance-based questions

Retirement: usually three years after launch (estimated 2027)

Duration: 90 minutes

Passing score: 720 (on a scale of 100-900)

Languages: English, German, Japanese, Portuguese, and Spanish

Recommended experience: CompTIA A+ certification, with 9 to 12 months of hands-on experience in a junior network administrator or network support technician role

NICE and DoD 8140 work roles: technical support specialist, network operations specialist, and system administrator

Network+ (V9) exam objectives summary

  • OSI model layers: physical, data link, network, transport, session, presentation, application.
  • Networking appliances: routers, switches, firewalls, IDS/IPS, load balancers, proxies, NAS, SAN, and wireless devices.
  • Cloud concepts: NFV, VPC, network security groups, cloud gateways, deployment models (public, private, hybrid), service models (SaaS, IaaS, PaaS).
  • Ports and protocols: FTP, SFTP, SSH, Telnet, SMTP, DNS, DHCP, HTTP, HTTPS, SNMP, LDAP, RDP, SIP.
  • Traffic types: unicast, multicast, anycast, broadcast.
  • Transmission media: wireless (802.11, cellular, satellite), wired (fiber, coaxial, DAC).
  • Transceivers and connectors: SC, LC, ST, MPO, RJ11, RJ45, F-type, BNC.
  • Network topologies: mesh, hybrid, star/hub and spoke, spine and leaf, point-to-point, three-tier, and collapsed core.
  • IPv4 addressing: public vs. private, APIPA, RFC1918, loopback, subnetting (VLSM, CIDR), and address classes (A, B, C, D, E).
  •  

  • Routing technologies: static and dynamic routing (BGP, EIGRP, OSPF), route selection, NAT, PAT, FHRP, VIP, and subinterfaces.
  • Switching technologies: VLANs, interface configuration, spanning tree, MTU, and jumbo frames.
  • Wireless devices: channels, frequency options, SSID, network types, encryption, guest networks, authentication, antennas, and access points.
  • Physical installations: installation implications, power considerations, and environmental factors.
  •  

  • Documentation: physical vs. logical diagrams, rack diagrams, cable maps, network diagrams, asset inventory, IPAM, SLA, and wireless surveys.
  • Life-cycle management: EOL, EOS, software management, and decommissioning.
  • Change management: request process tracking.
  • Configuration management: production, backup, baseline configurations.
  • Network monitoring: SNMP, flow data, packet capture, baseline metrics, log aggregation, API integration, and port mirroring.
  • Disaster recovery: RPO, RTO, MTTR, MTBF, cold/warm/hot sites, active-active/passive, and testing.
  • Network services: DHCP, SLAAC, DNS, NTP, PTP, and NTS.
  • Access and management: VPNs, SSH, GUI, API, and console.
  •  

  • Logical security: encryption (data in transit/rest), PKI, IAM, MFA, SSO, RADIUS, LDAP, SAML, TACACS+, time-based authentication, authorization, least privilege, role-based access control, and geofencing.
  • Physical security: cameras and locks.
  • Deception technologies: honeypot and honeynet.
  • Security terminology: risk, vulnerability, exploit, threat, and CIA triad.
  • Audits and compliance: data locality, PCI DSS, and GDPR.
  • Network segmentation: IoT, IIoT, SCADA, ICS, OT, guest, and BYOD.
  • Types of attacks: DoS/DDoS, VLAN hopping, MAC flooding, ARP poisoning/spoofing, DNS poisoning/spoofing, rogue devices/services, evil twin, on-path attack, and social engineering (phishing, dumpster diving, shoulder surfing, tailgating).
  • Security features and defense: device hardening, NAC, key management, ACL, URL/content filtering, trusted vs. untrusted zones, and screened subnet.
  •  

  • Troubleshooting methodology: identifying the problem, establishing a theory, testing, planning, and implementing a solution, verifying functionality, and documenting findings.

  • Cabling and physical interface issues: cable issues (incorrect type, signal degradation, improper termination, TX/RX transposed), interface issues (increasing counters, port status), and hardware issues (PoE, transceiver mismatch, signal strength).

  • Network services issues: switching issues (STP, VLAN assignment, ACLs), routing issues (routing table and default routes), address pool exhaustion, and incorrect gateway/IP/subnet mask.

  • Performance issues: congestion, latency, packet loss, and wireless interference.

  • Tools and protocols: protocol analyzers, command line tools, cable testers, and Wi-Fi analyzers.

  •  

Contact Us For More Enquiries

Ready to take the next step? Fill out the form below to get started, and our team will reach out to guide you through the enrollment process. We’re excited to help you begin your journey!

Contact Us Form
Shopping Basket