The Complete CompTIA Network+ Mastery Course

If you're serious about IT and cybersecurity, CompTIA Network+ is a must-have certification! It's the gold standard for entry-level networking skills and is vendor-neutral, meaning you can work with any network infrastructure, whether Cisco, UniFi, or Juniper Networks. 

The Complete CompTIA Network+ Mastery Course

  1. Domain 0: Introduction

    15 lessons
    1. 0.1 Course Overview

      1. 1: Welcome to CompTIA Network+ Mastery Course
      2. 2: Whoami - About Me (Your Instructor)
      3. 3: Why are you here?
      4. 4: About the CompTIA Network+ Exam
      5. 5: How to take the Network+ Certification Exam
      6. 6: Tips for Taking the Network+ Exam
      7. 7: Keep the Network+ in good standing
    2. 0.2 Network+ LabSetup

      1. 1: LabSetup (Packet Tracer)
      2. 2: LabSetup VMware Workstation (Kali Linux + Metasploitable)
    3. 0.2 Overview of the 5 Domains

      1. Domain 0: Overview of the 5 Domains
      2. Domain 1: Networking Concepts
      3. Domain 2: Network Implementation
      4. Domain 3: Network Operations
      5. Domain 4: Network Security
      6. Domain 5: Network Troubleshooting
  2. Domain 1: Networking Concepts

    95 lessons
    1. Module 1.1: Network Fundamentals and Architectures

      1. 1. Module Roadmap
      2. 2: The Evolution of Computer Networking
      3. 3: The Rise of Local Area Networks (LANs) & Internet
      4. 4: What is a Network?
      5. 5: Types of Networks (Overview)
      6. 6: Network Topologies
      7. 7: Star Topology
      8. 8: Mesh Topology
      9. 9: Hybrid Topology
      10. 10: Spine and Leaf Network Topologies
      11. 11: Point to Point Topology
      12. 12: Network Architecture Concepts
      13. 13: Three-Tier Architecture Model
      14. 14: Collapsed Core Model
      15. 15: North-South and East-West
    2. Module 1.2: The OSI Reference Model Deep Dive

      1. 3: OSI Layer 7: Application Layer
      2. 4: OSI Layer 6 (Presentation Layer)
      3. 5: OSI Layer 5 (Session Layer)
      4. 6: OSI Layer 4 (Transport Layer)
      5. 7: OSI Layer 3: Network Layer
      6. 8: OSI Layer 2 (Data Link Layer)
      7. 9: OSI Layer (Physical Layer)
      8. 10: TCP/IP Model Overview
      9. 11: Application and Transport Layers
      10. 12: Internet and Link Layers
      11. 13: Protocol Encapsulation in OSI and TCP/IP
      12. 14: Protocol Decapsulation in OSI and TCP/IP
    3. Module 1.3: IPv4 and IPv6 Addressing Mastery

      1. 1. Module Roadmap
      2. 2. What is an IP Address?
      3. 3. IPv4 Addressing - The Basics
      4. 4. IPv4 Address Types
      5. 5. IPv4 Address Classes
      6. 6. Subnet Mask and CIDR Notation
      7. 7. Subnetting in IPv4
      8. 8. How to Calculate Subnets
      9. 9. Variable Length Subnet Mask (VLSM) and CIDR
      10. 10. IPV6: Why IPv6? The Need for a New Protocol
      11. 11. IPv6 Addressing Structure
      12. 12. IPv6 Address Allocation
      13. 13. IPv6 Autoconfiguration and Addressing
      14. 14. IPv6 Security Features
      15. 15. IPV6 Transition Technologies
      16. 16. IPV4 vs. IPV6
      17. 17. Troubleshooting IP Addressing
      18. LAB: Creating a Basic NAT Network - Using Cisco Packet Tracer
    4. Module 1.4: Network Protocols, Ports, and Services

      1. 1. Module Roadmap
      2. 2. Transmission Control Protocol (TCP)
      3. 3. Transmission Control Protocol (TCP) Header
      4. 4. User Datagram Protocol (UDP)
      5. 5. UDP vs. TCP
      6. 6. Dynamic Host Configuration Protocol (DHCP)
      7. 7. DHCP Configuration
      8. 8. Reservations for Static Assignments
      9. 9. Domain Name System (DNS)
      10. 10. Types of DNS Records
      11. 12. Domain Name System Security Extensions (DNSSEC)
      12. 13. DNS over HTTPS (DOH)
      13. 14. Network TIme Protocol (NTP)
      14. 15. Internet Protocol Security (IPSec)
      15. 16. File Transfer Protocol (FTP)
      16. 17. Remote Access Protocols
      17. 18. Web Protocols and Email Services
      18. 19. Directory Services and Network Management
      19. Lab: Nmap
    5. Module 1.6: Cloud Computing and Modern Network Environments

      1. 1. Lesson Agenda
      2. 2. What is Virtualization?
      3. 3. Container Virtualization
      4. 4. Network Functions Virtualization (NFV)
      5. 5. Cloud Service Models (IaaS, PaaS, SaaS)
      6. 6. Public, Private, Hybrid, Community
      7. 7. Cloud Network Connectivity
      8. 8. Virtual Private Cloud (VPC)
      9. 9. Network Segmentation in the Cloud
      10. 10. Shared Responsibility Model
      11. 11. Who’s responsible for what?
      12. 12. Cloud Data Security
      13. 13. Identity and Access Management (IAM)
      14. 14. Cloud Security Posture Management (CSPM)
      15. 15. Cloud Workload Protection Platform (CWPP)
      16. 16. Cloud Access Security Broker (CASB)
      17. 17. Software-Defined Networking
      18. 18. Software-Defined WAN (SD-WAN)
      19. 19. Virtual Extensible LAN (VXLAN)
      20. 20: The History of Zero Trust
      21. 21: What is Zero Trust by John Kindervag (The Creator of Zero Trust)
      22. 13: Zero Trust Architecture (ZTA)
      23. 24: The Zero Trust Model
      24. 25: Case Study (Google’s Approach to Zero Trust)
      25. 26: Federal Zero Trust Directives and Guidance
      26. 27. Secure Access Service Edge (SASE)
      27. 28. Security Service Edge (SSE) vs. Secure Web Gateway (SWG)
      28. 29. Infrastructure as Code (IaC) Security
      29. 30. Serverless Computing
      30. 31: Defensible Network Architecture 2.0
      31. 31: Architecture and Infrastructure Security
  3. Domain 2: Network Implementation

    37 lessons
    1. Module 2.1: Switching Fundamentals and VLAN Implementation

      1. 1. Lesson Agenda
      2. 2. Introduction Networking Switch
      3. 3. Layer 2 Switching
      4. 4. Modern Ethernet Switches
      5. 5. MAC Address Learning Process
      6. 6. Understanding Collision & Broadcast Domains in Switched Networks
      7. 7. Virtual Local Area Networks (VLANs)
      8. 8. VLAN Database Management
      9. 9. Native VLAN Configuration and Security
      10. 10. Native VLAN Configuration and Security
      11. 11. Voice VLAN Implementation
      12. 12. 802.1Q VLAN Tagging Protocol
      13. 13. Advanced Switching Features
    2. Module 2.2: Routing Technologies and Implementation

      1. 1. The Brain of the Network (Routers)
      2. 2. Introduction to Layer 3 Operations
      3. 3. How Routers Choose the Best Path
      4. 4. Static Routing Configuration and Implementation
      5. 5. Default Routes and Gateway of Last Resort
      6. 6. Border Gateway Protocol (BGP)
      7. 7. Enhanced Interior Gateway Routing Protocol (EIGRP)
      8. 8. Open Shortest Path First (OSPF) Protocol
      9. 9. First Hop Redundancy Protocol (FHRP)
      10. 10. Firewall Appliances and Security Functions
      11. 12. Intrusion Detection and Prevention Systems (IDS/IPS)
      12. 13. Load Balancer & Proxy Server
      13. 14. Network-Attached Storage (NAS) & Storage Area Network (SAN)
    3. Module 2.3: Wireless Network Technologies

      1. 1. Agenda
      2. 2. Why Wireless Networking Matters
      3. 3. Introduction to Wireless Communication
      4. 4. Wireless Network Standards (IEEE 802.11 Family)
      5. 5. Wireless Network Modes
      6. 6. WPAN vs. WWAN
      7. 7. Service Set Identifiers (SSIDs vs. BSS vs. ESS)
      8. 8. Wireless Security and Authentication
      9. 9. WPA2 vs. WPA3
      10. 10. Authentication Methods (PSK vs. 802.1X)
      11. 11. Additional Wireless Security Measures
  4. Domain 3: Network Operations

    0 lessons
  5. Domain 4: Network Security

    41 lessons
    1. Module 4.1: Security Concepts and Terminology

      1. 1. The CIA Triad: What is it?
      2. 2. Non-repudiation
      3. 3. Authentication, Authorization, and Accounting (AAA)
      4. 4. Multi-Factor Authentication (MFA) and (2FA)
      5. 5. Authentication Methods
      6. 6. Single Sign-On (SSO) and Federation
      7. 7. OAuth, OpenID Connect, and SAML
      8. 8. Access Control Models
      9. 9. Access Control Models - Part 2
      10. 10. Defense in Depth
      11. 11. Principle of Least Privilege (PoLP) and Need-to-Know
      12. 12. Separation and rotation of duties
      13. 13. Risk Management Fundamentals
      14. 14. Risk Management Process (Lifecycle)
      15. 15. Risk Treatment (Risk Response)
      16. 16. Introduction to Cryptography
      17. 17. Basic Cryptographic Concepts
      18. 18. Other Fundamental Cryptographic Concepts
      19. 19. Symmetric Encryption (Secret Key Cryptography)
      20. 20. Common Symmetric Algorithms (Block Ciphers & Stream Ciphers)
      21. 21. Asymmetric Encryption (Public Key Cryptography)
      22. 22. Common Asymmetric Algorithms
      23. 23. Hashing Algorithms
      24. 24. Common Hashing Algorithms
      25. 25. Public Key Infrastructure (PKI)
      26. 26. Core Components of PKI
      27. 27. Case Study | NotPetya of 2017
    2. Module 4.2: Network Attacks and Threat Mitigation

      1. 1. Lesson Agenda
      2. 2. Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
      3. 3. Common DoS Attack Methods
      4. 4. Man-in-the-Middle (MitM) Attacks
      5. 5. VLAN Hopping Attacks
      6. 6. MAC Flooding Attacks
      7. 7. ARP Poisoning and Spoofing Attacks
      8. 8. Domain Name System (DNS) Attacks
      9. 9. Rogue DHCP Server Attacks
      10. 10. Password Attacks
      11. 11. Password Manager Attacks
      12. 12. Mitigation Techniques for Password Attacks
      13. 13. Wireless Network Attacks
      14. 14. Mitigation Techniques for Network-Based Attacks
  6. Domain 5: Network Troubleshooting

    15 lessons
    1. Module 5.1: Troubleshooting Methodology and Best Practices

      1. 1. Lesson Agenda
      2. 2. Introduction to Troubleshooting Methodology
      3. 3. Step 1: Identify the Problem
      4. 4. Step 2: Establish a Theory of Probable Cause
      5. 5. Step 3: Test the Theory to Determine the Cause
      6. 6. Step 4: Establish a Plan of Action to Resolve the Problem
      7. 7. Step 5: Implement the Solution or Escalate as Necessary
      8. 8. Step 6: Verify Full System Functionality
      9. 9. Step 7: Document Findings, Actions, and Outcomes
    2. Module 5.2: Physical Layer Troubleshooting

      1. 1. Troubleshooting Cabling and Physical Interface Issues
      2. 2. Interface Issues – Errors and Port States
      3. 3. Hardware Issues – PoE and Transceiver Problems
      4. 4. Network Hardware Troubleshooting Tools
    3. Module 5.3: Tools and Protocols for Network Troubleshooting

      1. 1. Tools and Protocols for Network Troubleshooting
      2. 2. Networking Device Troubleshooting Commands
  7. Cyber Pros | Network+ Hands-On Labs

    7 lessons
    1. Lab 0: Net+ LabSetup (Packet Tracer)
    2. Lab 00: Net+ LabSetup VMware Workstation (Kali Linux + Metasploitable)
    3. Lab 1: OSI TCP Packet Analysis with Wireshark
    4. Lab 2: Linux Essential Commands
    5. Lab 3: SOHO Network Setup w with Packet Tracer
    6. Lab 4: Sniffing Network Traffic with Wireshark/TCPdump
    7. Lab 5: System, Port & Vulnerability Discovery with Nmap
  8. Performance-Based Questions (PBQs)

    6 lessons
    1. PBQ #1
    2. PBQ #2
    3. PBQ #3
    4. PBQ #4
    5. PBQ #5
    6. PBQ #6
  9. Practice Exams (QAs)

    2 lessons
    1. Practice Exam #1
    2. Practice Exam #2
  10. 🔴CompTIA Network+ [LIVE] Class Recordings

    25 lessons
    1. Live Community Class Recordings | May 31st - July 27th

      1. May 31st - Class Recording
      2. June 1st - Class Recording
      3. June 7th - Class Recording
      4. June 8th - Class Recording
      5. June 14th - Class Recording
      6. June 15th - Class Recording
      7. June 21st - Class Recording
      8. June 22nd - Class Recording
      9. June 28th - Class Recording
      10. June 29th - Class Recording
      11. July 12th - Class Recording
      12. July 13th - Class Recording
      13. July 19th - Class Recording
      14. July 20th - Class Recording
      15. July 26th - Class Recording
      16. July 27th - Class Recording
    2. Other Network+ Live Training

      1. Day 1
      2. Day 2
      3. Day 3
      4. Day 4
      5. Day 5
      6. Day 6
      7. Day 7
      8. Day 8
      9. Day 9
  11. Supplementary Resources

    3 lessons
    1. Comptia Network+ N10-009 Exam Objectives (4-0)
    2. CompTIA Network+ Study Exam-N10-009-6th Book
    3. CompTIA Network+ N10-009 – 2-Week Study Plan