The Complete CompTIA Network+ Mastery Course
If you're serious about IT and cybersecurity, CompTIA Network+ is a must-have certification! It's the gold standard for entry-level networking skills and is vendor-neutral, meaning you can work with any network infrastructure, whether Cisco, UniFi, or Juniper Networks.

The Complete CompTIA Network+ Mastery Course
-
Domain 0: Introduction
15 lessons-
0.1 Course Overview
- 1: Welcome to CompTIA Network+ Mastery Course
- 2: Whoami - About Me (Your Instructor)
- 3: Why are you here?
- 4: About the CompTIA Network+ Exam
- 5: How to take the Network+ Certification Exam
- 6: Tips for Taking the Network+ Exam
- 7: Keep the Network+ in good standing
-
0.2 Network+ LabSetup
- 1: LabSetup (Packet Tracer)
- 2: LabSetup VMware Workstation (Kali Linux + Metasploitable)
-
0.2 Overview of the 5 Domains
- Domain 0: Overview of the 5 Domains
- Domain 1: Networking Concepts
- Domain 2: Network Implementation
- Domain 3: Network Operations
- Domain 4: Network Security
- Domain 5: Network Troubleshooting
-
-
Domain 1: Networking Concepts
95 lessons-
Module 1.1: Network Fundamentals and Architectures
- 1. Module Roadmap
- 2: The Evolution of Computer Networking
- 3: The Rise of Local Area Networks (LANs) & Internet
- 4: What is a Network?
- 5: Types of Networks (Overview)
- 6: Network Topologies
- 7: Star Topology
- 8: Mesh Topology
- 9: Hybrid Topology
- 10: Spine and Leaf Network Topologies
- 11: Point to Point Topology
- 12: Network Architecture Concepts
- 13: Three-Tier Architecture Model
- 14: Collapsed Core Model
- 15: North-South and East-West
-
Module 1.2: The OSI Reference Model Deep Dive
- 3: OSI Layer 7: Application Layer
- 4: OSI Layer 6 (Presentation Layer)
- 5: OSI Layer 5 (Session Layer)
- 6: OSI Layer 4 (Transport Layer)
- 7: OSI Layer 3: Network Layer
- 8: OSI Layer 2 (Data Link Layer)
- 9: OSI Layer (Physical Layer)
- 10: TCP/IP Model Overview
- 11: Application and Transport Layers
- 12: Internet and Link Layers
- 13: Protocol Encapsulation in OSI and TCP/IP
- 14: Protocol Decapsulation in OSI and TCP/IP
-
Module 1.3: IPv4 and IPv6 Addressing Mastery
- 1. Module Roadmap
- 2. What is an IP Address?
- 3. IPv4 Addressing - The Basics
- 4. IPv4 Address Types
- 5. IPv4 Address Classes
- 6. Subnet Mask and CIDR Notation
- 7. Subnetting in IPv4
- 8. How to Calculate Subnets
- 9. Variable Length Subnet Mask (VLSM) and CIDR
- 10. IPV6: Why IPv6? The Need for a New Protocol
- 11. IPv6 Addressing Structure
- 12. IPv6 Address Allocation
- 13. IPv6 Autoconfiguration and Addressing
- 14. IPv6 Security Features
- 15. IPV6 Transition Technologies
- 16. IPV4 vs. IPV6
- 17. Troubleshooting IP Addressing
- LAB: Creating a Basic NAT Network - Using Cisco Packet Tracer
-
Module 1.4: Network Protocols, Ports, and Services
- 1. Module Roadmap
- 2. Transmission Control Protocol (TCP)
- 3. Transmission Control Protocol (TCP) Header
- 4. User Datagram Protocol (UDP)
- 5. UDP vs. TCP
- 6. Dynamic Host Configuration Protocol (DHCP)
- 7. DHCP Configuration
- 8. Reservations for Static Assignments
- 9. Domain Name System (DNS)
- 10. Types of DNS Records
- 12. Domain Name System Security Extensions (DNSSEC)
- 13. DNS over HTTPS (DOH)
- 14. Network TIme Protocol (NTP)
- 15. Internet Protocol Security (IPSec)
- 16. File Transfer Protocol (FTP)
- 17. Remote Access Protocols
- 18. Web Protocols and Email Services
- 19. Directory Services and Network Management
- Lab: Nmap
-
Module 1.6: Cloud Computing and Modern Network Environments
- 1. Lesson Agenda
- 2. What is Virtualization?
- 3. Container Virtualization
- 4. Network Functions Virtualization (NFV)
- 5. Cloud Service Models (IaaS, PaaS, SaaS)
- 6. Public, Private, Hybrid, Community
- 7. Cloud Network Connectivity
- 8. Virtual Private Cloud (VPC)
- 9. Network Segmentation in the Cloud
- 10. Shared Responsibility Model
- 11. Who’s responsible for what?
- 12. Cloud Data Security
- 13. Identity and Access Management (IAM)
- 14. Cloud Security Posture Management (CSPM)
- 15. Cloud Workload Protection Platform (CWPP)
- 16. Cloud Access Security Broker (CASB)
- 17. Software-Defined Networking
- 18. Software-Defined WAN (SD-WAN)
- 19. Virtual Extensible LAN (VXLAN)
- 20: The History of Zero Trust
- 21: What is Zero Trust by John Kindervag (The Creator of Zero Trust)
- 13: Zero Trust Architecture (ZTA)
- 24: The Zero Trust Model
- 25: Case Study (Google’s Approach to Zero Trust)
- 26: Federal Zero Trust Directives and Guidance
- 27. Secure Access Service Edge (SASE)
- 28. Security Service Edge (SSE) vs. Secure Web Gateway (SWG)
- 29. Infrastructure as Code (IaC) Security
- 30. Serverless Computing
- 31: Defensible Network Architecture 2.0
- 31: Architecture and Infrastructure Security
-
-
Domain 2: Network Implementation
37 lessons-
Module 2.1: Switching Fundamentals and VLAN Implementation
- 1. Lesson Agenda
- 2. Introduction Networking Switch
- 3. Layer 2 Switching
- 4. Modern Ethernet Switches
- 5. MAC Address Learning Process
- 6. Understanding Collision & Broadcast Domains in Switched Networks
- 7. Virtual Local Area Networks (VLANs)
- 8. VLAN Database Management
- 9. Native VLAN Configuration and Security
- 10. Native VLAN Configuration and Security
- 11. Voice VLAN Implementation
- 12. 802.1Q VLAN Tagging Protocol
- 13. Advanced Switching Features
-
Module 2.2: Routing Technologies and Implementation
- 1. The Brain of the Network (Routers)
- 2. Introduction to Layer 3 Operations
- 3. How Routers Choose the Best Path
- 4. Static Routing Configuration and Implementation
- 5. Default Routes and Gateway of Last Resort
- 6. Border Gateway Protocol (BGP)
- 7. Enhanced Interior Gateway Routing Protocol (EIGRP)
- 8. Open Shortest Path First (OSPF) Protocol
- 9. First Hop Redundancy Protocol (FHRP)
- 10. Firewall Appliances and Security Functions
- 12. Intrusion Detection and Prevention Systems (IDS/IPS)
- 13. Load Balancer & Proxy Server
- 14. Network-Attached Storage (NAS) & Storage Area Network (SAN)
-
Module 2.3: Wireless Network Technologies
- 1. Agenda
- 2. Why Wireless Networking Matters
- 3. Introduction to Wireless Communication
- 4. Wireless Network Standards (IEEE 802.11 Family)
- 5. Wireless Network Modes
- 6. WPAN vs. WWAN
- 7. Service Set Identifiers (SSIDs vs. BSS vs. ESS)
- 8. Wireless Security and Authentication
- 9. WPA2 vs. WPA3
- 10. Authentication Methods (PSK vs. 802.1X)
- 11. Additional Wireless Security Measures
-
-
Domain 3: Network Operations
0 lessons -
Domain 4: Network Security
41 lessons-
Module 4.1: Security Concepts and Terminology
- 1. The CIA Triad: What is it?
- 2. Non-repudiation
- 3. Authentication, Authorization, and Accounting (AAA)
- 4. Multi-Factor Authentication (MFA) and (2FA)
- 5. Authentication Methods
- 6. Single Sign-On (SSO) and Federation
- 7. OAuth, OpenID Connect, and SAML
- 8. Access Control Models
- 9. Access Control Models - Part 2
- 10. Defense in Depth
- 11. Principle of Least Privilege (PoLP) and Need-to-Know
- 12. Separation and rotation of duties
- 13. Risk Management Fundamentals
- 14. Risk Management Process (Lifecycle)
- 15. Risk Treatment (Risk Response)
- 16. Introduction to Cryptography
- 17. Basic Cryptographic Concepts
- 18. Other Fundamental Cryptographic Concepts
- 19. Symmetric Encryption (Secret Key Cryptography)
- 20. Common Symmetric Algorithms (Block Ciphers & Stream Ciphers)
- 21. Asymmetric Encryption (Public Key Cryptography)
- 22. Common Asymmetric Algorithms
- 23. Hashing Algorithms
- 24. Common Hashing Algorithms
- 25. Public Key Infrastructure (PKI)
- 26. Core Components of PKI
- 27. Case Study | NotPetya of 2017
-
Module 4.2: Network Attacks and Threat Mitigation
- 1. Lesson Agenda
- 2. Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
- 3. Common DoS Attack Methods
- 4. Man-in-the-Middle (MitM) Attacks
- 5. VLAN Hopping Attacks
- 6. MAC Flooding Attacks
- 7. ARP Poisoning and Spoofing Attacks
- 8. Domain Name System (DNS) Attacks
- 9. Rogue DHCP Server Attacks
- 10. Password Attacks
- 11. Password Manager Attacks
- 12. Mitigation Techniques for Password Attacks
- 13. Wireless Network Attacks
- 14. Mitigation Techniques for Network-Based Attacks
-
-
Domain 5: Network Troubleshooting
15 lessons-
Module 5.1: Troubleshooting Methodology and Best Practices
- 1. Lesson Agenda
- 2. Introduction to Troubleshooting Methodology
- 3. Step 1: Identify the Problem
- 4. Step 2: Establish a Theory of Probable Cause
- 5. Step 3: Test the Theory to Determine the Cause
- 6. Step 4: Establish a Plan of Action to Resolve the Problem
- 7. Step 5: Implement the Solution or Escalate as Necessary
- 8. Step 6: Verify Full System Functionality
- 9. Step 7: Document Findings, Actions, and Outcomes
-
Module 5.2: Physical Layer Troubleshooting
- 1. Troubleshooting Cabling and Physical Interface Issues
- 2. Interface Issues – Errors and Port States
- 3. Hardware Issues – PoE and Transceiver Problems
- 4. Network Hardware Troubleshooting Tools
-
Module 5.3: Tools and Protocols for Network Troubleshooting
- 1. Tools and Protocols for Network Troubleshooting
- 2. Networking Device Troubleshooting Commands
-
-
Cyber Pros | Network+ Hands-On Labs
7 lessons- Lab 0: Net+ LabSetup (Packet Tracer)
- Lab 00: Net+ LabSetup VMware Workstation (Kali Linux + Metasploitable)
- Lab 1: OSI TCP Packet Analysis with Wireshark
- Lab 2: Linux Essential Commands
- Lab 3: SOHO Network Setup w with Packet Tracer
- Lab 4: Sniffing Network Traffic with Wireshark/TCPdump
- Lab 5: System, Port & Vulnerability Discovery with Nmap
-
Performance-Based Questions (PBQs)
6 lessons- PBQ #1
- PBQ #2
- PBQ #3
- PBQ #4
- PBQ #5
- PBQ #6
-
Practice Exams (QAs)
2 lessons- Practice Exam #1
- Practice Exam #2
-
🔴CompTIA Network+ [LIVE] Class Recordings
25 lessons-
Live Community Class Recordings | May 31st - July 27th
- May 31st - Class Recording
- June 1st - Class Recording
- June 7th - Class Recording
- June 8th - Class Recording
- June 14th - Class Recording
- June 15th - Class Recording
- June 21st - Class Recording
- June 22nd - Class Recording
- June 28th - Class Recording
- June 29th - Class Recording
- July 12th - Class Recording
- July 13th - Class Recording
- July 19th - Class Recording
- July 20th - Class Recording
- July 26th - Class Recording
- July 27th - Class Recording
-
Other Network+ Live Training
- Day 1
- Day 2
- Day 3
- Day 4
- Day 5
- Day 6
- Day 7
- Day 8
- Day 9
-
-
Supplementary Resources
3 lessons- Comptia Network+ N10-009 Exam Objectives (4-0)
- CompTIA Network+ Study Exam-N10-009-6th Book
- CompTIA Network+ N10-009 – 2-Week Study Plan