CompTIA – Hardware A+ & CompTIA – Network+ (N10-008) Training Course

What the specialist says

This program is structured so you can actually apply it on client or company projects. This CompTIA – Hardware A+ & CompTIA – Network+ (N10-008) Training Course helps you do that faster.

Karthik Shenoy Senior Technical Mentor

Acquire Key hardware and network Skills: Master hardware and network systems, Earn Certification, Launch Your Dev Career! DevLustro Academy has established itself as a leader in IT education, offering a comprehensive program that equips participants with the skills to manage, troubleshoot, and optimize hardware and network systems. DevLustro Academy delivers an all-encompassing course that ensures participants are prepared to handle IT challenges with expertise. Course was selected for our collection of top-rated courses trusted by businesses worldwide.

Our Core Highlights

World Class Instructor
World Class Instructor Mentorship from global experts
1:1 with Industry Expert
1:1 with Industry Expert Personalised coaching tailored to you
Global Hiring Network
Global Hiring Network 400+ hiring partners around the world
Average Salary Hike
Average Salary Hike 55% average hike for our alumni

Course Description

Acquire Key hardware and network Skills: Master hardware and network systems, Earn Certification, Launch Your Dev Career! Elysium Academy has established itself as a leader in IT education, offering a comprehensive program that equips participants with the skills to manage, troubleshoot, and optimize hardware and network systems. Elysium Academy delivers an all-encompassing course that ensures participants are prepared to handle IT challenges with expertise. Course was selected for our collection of top-rated courses trusted by businesses worldwide.

CompTIA – Hardware A+ & CompTIA – Network+ (N10-008) Training Course

Cybersecurity and Networking Course

Course Details

Gain proficiency in network infrastructure essentials and network security.

Practice real-world scenarios with hands-on labs and simulations.

Prepare thoroughly for CompTIA A+ and Network+ certification exams.

IT hardware expertise forms the foundation of effective system management.

Networking is the backbone of communication in modern organizations.

Data scrubbing and system maintenance ensure efficient and reliable IT operations.

IT professionals interpret network data to enhance performance and security.

Networking skills support the infrastructure on which advanced IT solutions are built.

Course Goals

  • Master hardware fundamentals, including components, assembly, and troubleshooting techniques.
  • Dive into advanced networking concepts, protocols, and best practices.

Future Scope of this Course

  • Industry Based Projects
  • Recognized worldwide
  • Learn from experienced instructors with industry expertise.

Our Career Service

  • Personalized coordinator.
  • Trainer feedback.
  • Trainer availability post sessions.
  • Get your staff certified.
  • Certificate from governing bodies.

Our Training Program Benefits

  • Hands on assignment
  • Curriculum that focuses on the learner.
  • Live, interactive training by DevLustro experts.
  • Curriculum aligned with current industry practices.
  • Portfolio / project support for real-world use.
01Chapter-1 Install and Configure Laptop Hardware
  • 01.01Install and Configure Laptop Hardware
  • 01.02Hardware/device Replacement
  • 01.03Battery
  • 01.04Keyboard/keys
  • 01.05Random-access memory (RAM)
  • 01.06Hard disk drive (HDD)/solid state drive (SSD) migration
  • 01.07HDD/SSD replacement
  • 01.08Wireless cards
  • 01.09Physical Privacy and Security Components
  • 01.10Biometrics
  • 01.11Near-field scanner features
  • 01.12Display Components of Mobile Device Types
  • 01.13Liquid crystal display (LCD)
  • 01.14In-plane switching (IPS)
  • 01.15Twisted nematic (TN)
  • 01.16Vertical alignment (VA)
  • 01.17Organic light-emitting diode (OLED)
  • 01.18Mobile display components
  • 01.19WiFi antenna connector/placement
  • 01.20Camera/webcam
  • 01.21Microphone
  • 01.22Touch screen/digitizer
  • 01.23Inverter
02Chapter-2 Configure Accessories
  • 02.01Configure Accessories
  • 02.02Accessories
03Chapter-3 Mobile-Device Network Connectivity
  • 03.01Mobile-Device Network Connectivity
  • 03.02Bluetooth
  • 03.03Mobile Device Management (MDM) / Mobile Application Management (MAM)
04Chapter-4 Ports and protocols
  • 04.0120/21 – File Transfer Protocol (FTP)
  • 04.0222 – Secure Shell (SSH)
  • 04.0323 – Telnet
  • 04.0425 – Simple Mail Transfer Protocol (SMTP)
  • 04.0553 – Domain Name System (DNS)
  • 04.0667/68 – Dynamic Host Configuration Protocol (DHCP)
  • 04.0780 – Hypertext Transfer Protocol (HTTP)
  • 04.08110 – Post Office Protocol 3 (POP3)
  • 04.09137/139 – Network Basic Input/Output System (NetBIOS)/NetBIOS over TCP/IP (NetBT)
  • 04.10143 – Internet Mail Access Protocol (IMAP)
  • 04.11161/162 – Simple Network Management Protocol (SNMP)
  • 04.12389 – Lightweight Directory Access Protocol (LDAP)
  • 04.13443 – Hypertext Transfer Protocol Secure (HTTPS)
  • 04.14445 – Server Message Block (SMB)/Common Internet File System (CIFS)
  • 04.153389 – Remote Desktop Protocol (RDP)
  • 04.16Connectionless
  • 04.17DHCP
  • 04.18Trivial File Transfer Protocol (TFTP)
  • 04.19Connection-oriented
  • 04.20HTTPS
05Chapter-5 Common Networking Hardware
  • 05.01Routers
  • 05.02Switches
  • 05.03Managed
  • 05.04Unmanaged
  • 05.05Access points
  • 05.06Patch panel
  • 05.07Firewall
  • 05.08Power over Ethernet (PoE)
  • 05.09Injectors (PoE)
  • 05.10Switch (PoE)
  • 05.11PoE standards (PoE)
  • 05.12Cable modem
  • 05.13Digital subscriber line (DSL)
  • 05.14Optical network terminal (ONT)
  • 05.15Network interface card (NIC)
  • 05.16Software-defined networking (SDN)
  • 05.17Connectionless
  • 05.18DHCP
  • 05.19Trivial File Transfer Protocol (TFTP)
  • 05.20Connection-oriented
  • 05.21HTTPS
06Chapter-6 Contrast Protocols for Wireless Networking
  • 06.01Frequencies
  • 06.022.4GHz
  • 06.035GHz
  • 06.04Channels
  • 06.05Regulations
  • 06.062.4GHz vs. 5GHz
  • 06.07Bluetooth
  • 06.08802.11
  • 06.09ac (WiFi 5)
  • 06.10ax (WiFi 6)
  • 06.11Long-range fixed wireless
  • 06.12Licensed
  • 06.13Unlicensed
  • 06.14Power
  • 06.15Regulatory requirements for wireless power
  • 06.16Radio-frequency identification (RFID)
  • 06.17Networked Hosts
  • 06.18Server Roles
  • 06.19DHCP
  • 06.20Fileshare
  • 06.21Print servers
  • 06.22Mail servers
  • 06.23Syslog
  • 06.24Web servers
  • 06.25Authentication, authorization, and accounting (AAA)
  • 06.26Internet Appliances
  • 06.27Spam gateways
  • 06.28Unified threat management (UTM)
  • 06.29Load balancers
  • 06.30Proxy servers
  • 06.31Legacy/Embedded Systems
  • 06.32Supervisory control and data acquisition (SCADA)
  • 06.33Internet of Things (IoT) Devices
07Chapter-7 Hypertunning Model and Clustering
  • 07.01What is Hyper Parameter Tuning?
  • 07.02Grid Search and Randomized Search Approach
  • 07.03GridSearchCV Parameters Explained
  • 07.04Create GridSearchCV Object
  • 07.05Fit Data to GridSearchCV
  • 07.06Understand GridSearchCV Results
  • 07.07GridSearchCV using Logistic Regression
  • 07.08GridSearchCV using Support Vector
  • 07.09Randomized Search using Random Forest
  • 07.10Select Best Model
  • 07.11Randomized Search
  • 07.12Model Selection Summary
  • 07.13What is Clustering?
  • 07.14How the Clusters are Formed?
  • 07.15Problem Understanding: Customer Segmentation
  • 07.16Get, Visualize and Normalize the Data
  • 07.17Import KMeans and Understand Parameters
  • 07.18Understanding KMeans++ Initialization Method
  • 07.19Create Clusters
  • 07.20Visualize and Create Different Number of Clusters
  • 07.21Understand Elbow Method to Decide Number of Clusters
  • 07.22Implement Elbow Method
08Chapter-8 Internet Connection & Network Types
  • 08.01Satellite
  • 08.02Fiber
  • 08.03Cable
  • 08.04Cellular
  • 08.05Wireless Internet service provider (WISP)
  • 08.06Local area network (LAN)
  • 08.07Wide area network (WAN)
  • 08.08Personal area network (PAN)
  • 08.09Metropolitan area network (MAN)
  • 08.10Storage area network (SAN)
  • 08.11Wireless local area network (WLAN)
09Chapter-9 Networking Tools
  • 09.01Crimper
  • 09.02Cable stripper
  • 09.03WiFi analyzer
  • 09.04Toner probe
  • 09.05Punchdown tool
  • 09.06Cable tester
  • 09.07Loopback plug
  • 09.08Network tap
10Chapter-10 Cable Types and Their Connectors
  • 10.01Advanced Technology eXtended (ATX)
  • 10.02Information Technology eXtended (ITX)
  • 10.03Peripheral Component Interconnect (PCI)
  • 10.04PCI Express (PCIe)
  • 10.05Power Connectors
  • 10.06SATA
  • 10.07eSATA
  • 10.08Headers
  • 10.09CPU Sockets
  • 10.10Advanced Micro Devices, Inc. (AMD)
  • 10.11Intel
  • 10.12Server
  • 10.13Multisocket
  • 10.14Desktop
  • 10.15Mobile
  • 10.16Boot Options
  • 10.17USB Permissions
  • 10.18Trusted Platform Module (TPM) Security Features
  • 10.19Fan Considerations
  • 10.20Secure Boot
  • 10.21Boot Password
  • 10.22Trusted Platform Module (TPM)
  • 10.23Hardware Security Module (HSM)
  • 10.24x64/x86
  • 10.25Advanced RISC Machine (ARM)
  • 10.26Single-core
  • 10.27Multicore
  • 10.28Multithreading
  • 10.29Virtualization Support
  • 10.30Sound Card
  • 10.31Video Card
  • 10.32Capture Card
  • 10.33NIC (Network Interface Card)
  • 10.34Fans
  • 10.35Heat Sink
  • 10.36Thermal Paste/Pads
  • 10.37Liquid Cooling
11Chapter-11 Install the Appropriate RAM
  • 11.01Virtual RAM
  • 11.02Small outline dual inline memory module (SODIMM)
  • 11.03Double Data Rate 3 (DDR3)
  • 11.04Double Data Rate 4 (DDR4)
  • 11.05Double Data Rate S (DDRS)
  • 11.06Error correction code (ECC) RAM
12Chapter-12 Install Storage Devices
  • 12.01Speeds
  • 12.025,400rpm
  • 12.037,200rpm
  • 12.0410,000rpm
  • 12.0515,000rpm
  • 12.06Form factor
13Chapter-13 Configure Motherboards, Central Processing Units (CPUS)
  • 13.01Advanced Technology eXtended (ATX)
  • 13.02Information Technology eXtended (ITX)
  • 13.03Peripheral Component Interconnect (PCI)
  • 13.04PCI Express (PCIe)
  • 13.05Power Connectors
  • 13.06SATA
  • 13.07eSATA
  • 13.08Headers
  • 13.09CPU Sockets
  • 13.10Advanced Micro Devices, Inc. (AMD)
  • 13.11Intel
  • 13.12Server
  • 13.13Multisocket
  • 13.14Desktop
  • 13.15Mobile
  • 13.16Boot Options
  • 13.17USB Permissions
  • 13.18Trusted Platform Module (TPM) Security Features
  • 13.19Fan Considerations
  • 13.20Secure Boot
  • 13.21Boot Password
  • 13.22Trusted Platform Module (TPM)
  • 13.23Hardware Security Module (HSM)
  • 13.24x64/x86
  • 13.25Advanced RISC Machine (ARM)
  • 13.26Single-core
  • 13.27Multicore
  • 13.28Multithreading
  • 13.29Virtualization Support
  • 13.30Sound Card
  • 13.31Video Card
  • 13.32Capture Card
  • 13.33NIC (Network Interface Card)
  • 13.34Fans
  • 13.35Heat Sink
  • 13.36Thermal Paste/Pads
  • 13.37Liquid Cooling
14Chapter-14 Power Supply
  • 14.01lnput 110-120 VAC vs. 220-240 VAC
  • 14.02Output 3.3V vs. 5V vs. 12V
  • 14.0320-pin to 24-pin motherboard adapter
  • 14.04Redundant power supply
  • 14.05Modular power supply
  • 14.06Wattage rating
15Chapter-15 Printer and Settings
  • 15.01Printer Control Language (PCL) vs. PostScript
  • 15.02Ethernet
  • 15.03Wireless
  • 15.04Printer share
  • 15.05Print server
  • 15.06Duplex
  • 15.07Orientation
  • 15.08Tray settings
  • 15.09Quality
  • 15.10User authentication
  • 15.11Badging
  • 15.12Audit logs
  • 15.13Secured prints
  • 15.14Email
  • 15.15Cloud services
16Chapter-16 Install and Replace Printer Consumables
  • 16.01Laser
  • 16.02Imaging drum, fuser assembly, transfer belt, transfer roller, pickup rollers, separation pads, duplexing assembly
  • 16.03Imaging process: processing, charging, exposing, developing, transferring, fusing, and cleaning
  • 16.04Maintenance: Replace toner, apply maintenance kit, calibrate, clean
  • 16.05Inkjet
  • 16.06Ink cartridge, print head, roller, feeder, duplexing assembly, carriage belt
  • 16.07Calibration
  • 16.08Maintenance: Clean heads, replace cartridges, calibrate, clear jams
  • 16.09Thermal
  • 16.10Feed assembly, heating element
  • 16.11Special thermal paper
  • 16.12Maintenance: Replace paper, clean heating element, remove debris
  • 16.13Heat sensitivity of paper
  • 16.14Impact
  • 16.15Print head, ribbon, tractor feed
  • 16.16Impact paper
  • 16.17Maintenance: Replace ribbon, replace print head, replace paper
  • 16.183D printer
  • 16.19Filament
  • 16.20Resin
  • 16.21Print bed
17Chapter-17 Cloud - Computing Concepts
  • 17.01Private cloud
  • 17.02Public cloud
  • 17.03Hybrid cloud
  • 17.04Community cloud
  • 17.05Infrastructure as a service (IaaS)
  • 17.06Software as a service (SaaS)
  • 17.07Platform as a service (PaaS)
  • 17.08Cloud characteristics
  • 17.09Shared resources
  • 17.10Metered utilization
  • 17.11Rapid elasticity
  • 17.12High availability
  • 17.13File synchronization
  • 17.14Desktop virtualization
  • 17.15Virtual desktop infrastructure (VDI) on premises
  • 17.16VDI in the cloud
18Chapter-18 Client - Side Virtualization
  • 18.01Sandbox
  • 18.02Test development
  • 18.03Application virtualization
  • 18.04Legacy software/OS
  • 18.05Cross-platform virtualization
  • 18.06Resource requirements
  • 18.07Security requirements
19Chapter-19 Practice Methodology to Resolve Problems
  • 19.01Identify the problem
  • 19.02Gather information from the user, identify user changes, and, if applicable, perform backups before making changes
  • 19.03Inquire regarding environmental or infrastructure changes
  • 19.04If necessary, conduct external or internal research based on symptoms
  • 19.05Once the theory is confirmed, determine the next steps to resolve the problem
  • 19.06If the theory is not confirmed, re-establish a new theory or escalate
  • 19.07Refer to the vendor's instructions for guidance
20Chapter- 20 Troubleshoot Motherboards, RAM, CPU, and Power
  • 20.01Power-on self-test (POST) beeps
  • 20.02Proprietary crash screens (blue screen of death [BSOD] / pinwheel)
  • 20.03Black screen
  • 20.04No power
  • 20.05Sluggish performance
  • 20.06Overheating
  • 20.07Burning smell
  • 20.08Intermittent shutdown
  • 20.09Application crashes
  • 20.10Grinding noise
  • 20.11Capacitor swelling
  • 20.12Inaccurate system date/time
21Chapter- 21 Diagnose Problems with Storage Drives
  • 21.01Light-emitting diode (LED) status indicators
  • 21.02Grinding noises
  • 21.03Clicking sounds
  • 21.04Bootable device not found
22Chapter- 22 Troubleshoot Video, Projector, and Display Issues
  • 22.01Incorrect data source
  • 22.02Physical cabling issues
  • 22.03Burned-out bulb
  • 22.04Fuzzy image
  • 22.05Display burn-in
  • 22.06Dead pixels
  • 22.07Flashing screen
  • 22.08Incorrect color display
  • 22.09Audio issues
  • 22.10Dim image
  • 22.11Intermittent projector shutdown
23Chapter- 23 Troubleshoot Mobile Devices
  • 23.01Poor battery health
  • 23.02Swollen battery
  • 23.03Broken screen
  • 23.04Improper charging
  • 23.05Poor/no connectivity
  • 23.06Liquid damage
  • 23.07Overheating
  • 23.08Digitizer issues
  • 23.09Physically damaged ports
  • 23.10Malware
  • 23.11Cursor drift/touch calibration
24Chapter- 24 Troubleshoot and Resolve Printer Issues
  • 24.01Lines down the printed pages
  • 24.02Garbled print
  • 24.03Toner not fusing to paper
  • 24.04Paper jams
  • 24.05Faded print
  • 24.06Incorrect paper size
  • 24.07Paper not feeding
  • 24.08Multipage misfeed
  • 24.09Multiple prints pending in queue
  • 24.10Speckling on printed pages
  • 24.11Double echo images on the print
  • 24.12Incorrect color settings
  • 24.13Grinding noise
  • 24.14Finishing issues
  • 24.15Staple jams
  • 24.16Hole punch issues
  • 24.17Incorrect page orientation
25Chapter- 25 Troubleshoot Problems with Wired and Wireless Networks
  • 25.01Intermittent wireless connectivity
  • 25.02Slow network speeds
  • 25.03Limited connectivity
  • 25.04Jitter
  • 25.05Poor Voice over Internet Protocol (VoIP) quality
  • 25.06Port flapping
  • 25.07High latency
  • 25.08External interference
26Chapter- 26 Network Fundamentals
  • 26.01Data Networking
  • 26.02Communication Process
  • 26.03Data Encapsulation and Decapsulation within the OSI Model Context.
  • 26.04Ethernet Header
  • 26.05Internet Protocol (IP) Header
  • 26.06Transmission Control Protocol (TCP) / User Datagram Protocol (UDP) Headers
  • 26.07TCP Flags
  • 26.08Payload
  • 26.09Maximum Transmission Unit (MTU)
27Chapter- 27 Network Topologies and Network Types
  • 27.01Star / Hub - and - Spoke
  • 27.02Mesh
  • 27.03Ring
  • 27.04Hybrid
  • 27.05Peer - To - Peer
  • 27.06Client - Server
  • 27.07Local Area Network (LAN)
  • 27.08Metropolitan Area Network (MAN)
  • 27.09Wide Area Network (WAN)
  • 27.10Wireless Local Area Network (WLAN)
  • 27.11Personal Area Network (PAN)
  • 27.12Campus Area Network (CAN)
  • 27.13Storage Area Network (SAN)
  • 27.14Software - Defined Wide Area Network (SDWWAN)
  • 27.15Multiprotocol Label Switching (MPLS)
  • 27.16Multipoint Generic Routing Encapsulation (MGRE)
  • 27.17V- Switch
  • 27.18Virtual Network Interface Card (VNIC)
  • 27.19Network Function Virtualization (NFV)
  • 27.20Hypervisor
  • 27.21Satellite
  • 27.22Digital Subscriber Line (DSL)
  • 27.23Cable
  • 27.24Leased Line
  • 27.25Metro - Optical
28Chapter- 28 Network Topologies and Network Types
  • 28.01Twisted Pair
  • 28.02CAT 5
  • 28.03CAT 5e
  • 28.04CAT 6
  • 28.05CAT 6a
  • 28.06CAT 7
  • 28.07CAT 8
  • 28.08Coaxial / RG 6
  • 28.09Twin Axial
  • 28.10Termination Standards
  • 28.11TIA/EIA-568 A
  • 28.12TIA/EIA-568 B
  • 28.13Single Mode
  • 28.14Multimode
  • 28.15Local Connector (LC)
  • 28.16Straight Tip (ST)
  • 28.17Subscriber Connector (SC)
  • 28.18Mechanical Transfer (MT)
  • 28.19Registered Jack (RJ)
  • 28.20Angled Physical Contact (APC)
  • 28.21Ultra - Physical Contact (UPC)
  • 28.22RJ 11
  • 28.23RJ 45
  • 28.24F Type Connector
  • 28.25Small Form - Factor Pluggable (SFP)
  • 28.26Enhanced Form - Factor Pluggable (SFP+)
  • 28.27Quad Small Form Factor Pluggable (QSFP)
  • 28.28Enhanced Quad Small Form Factor Pluggable (QSFP+)
  • 28.29Patch Panel I Patch Bay
  • 28.30Fiber Distribution Panel
  • 28.31Punch Down Block
  • 28.32Krone
  • 28.33Copper
  • 28.3410 BASE - T
  • 28.35100 BASE - TX
  • 28.361000 BASE - T
  • 28.3710 G BASE - T
  • 28.3840 G BASE - T
  • 28.39Fiber
  • 28.40100 BASE - FX
  • 28.41100 BASE - SX
  • 28.421000 BASE - SX
  • 28.431000 BASE - LX
  • 28.4410 G BASE - SR
  • 28.4510 G BASE - LR
  • 28.46Coarse Wavelength Division Multiplexing (CWDM)
  • 28.47Dense Wavelength Division Multiplexing (DWDM)
  • 28.48Bidirectional Wavelength Division Multiplexing (WDM)
29Chapter- 29 Configure a Subnet and Use Appropriate IT Addressing Scheme
  • 29.01TFC1918
  • 29.02Network Address Translation (NAT)
  • 29.03Port Address Translation (PAT)
  • 29.04Automatic Private IP Addressing (APIPA)
  • 29.05Extended Unique Identifier (EUI 64)
  • 29.06Multicast
  • 29.07Unicast
  • 29.08Anycast
  • 29.09Broadcast
  • 29.10Link Local
  • 29.11Loop Back
  • 29.12Default Gateway
  • 29.13Classless (Variable Length Subnet Mask)
  • 29.14Classful
  • 29.15Classless Inter-Domain Routing (CIDR) Notation
  • 29.16Tunneling
  • 29.17Dual Stack
  • 29.18Shorthand Notation
  • 29.19Router Advertisement
  • 29.20Stateless Address Auto Configure (SLAAC)
  • 29.21Virtual IP (VIP)
  • 29.22Sub Interfaces
  • 29.23Ports and Protocols
  • 29.24Internet Control Message Protocol (ICMP)
  • 29.25Generic Routing Encapsulation (GRE)
  • 29.26Internet Protocol Security (IPSec) Since 2007
  • 29.27Authentication Header (AH) / Encapsulation Security Payload (ESP)
  • 29.28Connection Less Vs. Connection
30Chapter- 30 Use and Purpose of Network Service
  • 30.01Scope
  • 30.02Exclusion Ranges
  • 30.03Reservation
  • 30.04Dynamic Assignment
  • 30.05Static Assignment
  • 30.06Lease Time
  • 30.07Scope Options
  • 30.08Available Leases
  • 30.09DHCP Relay
  • 30.10IP Helper / UDP Forwarding
  • 30.11Record Types
  • 30.12Address (A vs. AAAA)
  • 30.13Canonical Name (CNAME)
  • 30.14Mail Exchange (MX)
  • 30.15Start of Authority (SOA)
  • 30.16Pointer (PTR)
  • 30.17Text (TXT)
  • 30.18Service (SRV)
  • 30.19Name Server (NS)
  • 30.20Global Hierarchy
  • 30.21Root DNS Server
  • 30.22Internal vs. External
  • 30.23Zone Transfers
  • 30.24Authoritative Name Servers
  • 30.25Time to Live (TTL)
  • 30.26DNS Caching
  • 30.27Reverse DNS / Reverse Lookup / Forward Lookup
  • 30.28Recursive Lookup / Iterative Lookup
  • 30.29Stratum
  • 30.30Clients
  • 30.31Servers
31Chapter- 31 Basic Corporate and Data
  • 31.01Core
  • 31.02Distribution/aggregation layer
  • 31.03Access/edge
  • 31.04Application layer
  • 31.05Control layer
  • 31.06Infrastructure layer
  • 31.07Management plane
  • 31.08Software-defined network
  • 31.09Top-of-rack switching
  • 31.10Backbone
  • 31.11North-South
  • 31.12East-West
  • 31.13Connection types
  • 31.14Fibre Channel over Ethernet (FCoE)
  • 31.15Fibre Channel
  • 31.16Internet Small Computer Systems Interface (iSCSI)
32Chapter- 32 Cloud Concepts and Connectivity
  • 32.01Public
  • 32.02Private
  • 32.03Hybrid
  • 32.04Community
  • 32.05Software as a service (SaaS)
  • 32.06Infrastructure as a service (IaaS)
  • 32.07Platform as a service (PaaS)
  • 32.08Desktop as a service (DaaS)
  • 32.09Automation/orchestration
  • 32.10Virtual private network (VPN)
  • 32.11Private-direct connection to cloud provider
33Chapter- 33 Contrast Various Devices , Appropriate Placement on the Network
  • 33.01Layer 2 switch
  • 33.02Layer 3 capable switch
  • 33.03Router
  • 33.04Access point
  • 33.05Bridge
  • 33.06Wireless LAN controller
  • 33.07Load balancer
  • 33.08Proxy server
  • 33.09Cable modem
  • 33.10DSL modem
  • 33.11Repeater
  • 33.12Voice gateway
  • 33.13Media converter
  • 33.14Intrusion prevention system (IPS)/intrusion detection system (IDS) device
  • 33.15Firewall
  • 33.16VPN headend
  • 33.17Voice over Internet Protocol (VoIP) phone
  • 33.18Printer
  • 33.19Physical access control devices
  • 33.20Cameras
  • 33.21Heating, ventilation, and air conditioning (HVAC) sensors
  • 33.22Internet of Things (IoT)
  • 33.23Refrigerator
  • 33.24Smart speakers
  • 33.25Smart thermostats
  • 33.26Smart doorbells
  • 33.27Industrial control systems/supervisory control and data acquisition (SCADA)
34Chapter- 34 Routing Technologies and Bandwidth Management
  • 34.01Dynamic routing
  • 34.02Protocols [Routing Internet Protocol (RIP)/ Open Shortest Path First (OSPF)/Enhanced Interior Gateway Routing Protocol (EIGRP)/Border Gateway Protocol (BGP)]
  • 34.03Link state vs. distance vector vs. hybrid
  • 34.04Static routing
  • 34.05Default route
  • 34.06Administrative distance
  • 34.07Exterior vs. interior
  • 34.08Time to live
  • 34.09Traffic shaping
  • 34.10Quality of service (QoS)
35Chapter- 35 Install and Configure Wireless Standards and Technologies
  • 35.01n (WiFi 4)
  • 35.02ac (WiFi 5)
  • 35.03ax (WiFi 6)
  • 35.042.4GHz
  • 35.055GHz
  • 35.06Regulatory impacts
  • 35.07Basic service set
  • 35.08Extended service set
  • 35.09Independent basic service set (Ad-hoc)
  • 35.10Roaming
  • 35.11Omni
  • 35.12Directional
  • 35.13WiFi Protected Access (WPA) / WPA2 Personal [Advanced Encryption Standard (AES) / Temporal Key Integrity Protocol (TKIP)]
  • 35.14WPA/WPA2 Enterprise (AES/TKIP)
  • 35.15Code-division multiple access (CDMA)
  • 35.16Global System for Mobile Communications (GSM)
  • 35.17Long-Term Evolution (LTE)
  • 35.183G, 4G, 5G
36Chapter- 36 Statistics and Sensors to Ensure Network Availability
  • 36.01Device/chassis
  • 36.02Temperature
  • 36.03Central processing unit (CPU) usage
  • 36.04Memory
  • 36.05Network metrics
  • 36.06Bandwidth
  • 36.07Latency
  • 36.08Jitter
  • 36.09Traps
  • 36.10Object identifiers (OIDs)
  • 36.11Management information bases (MIBs)
  • 36.12Log reviews
  • 36.13Traffic logs
  • 36.14Audit logs
  • 36.15Syslog
  • 36.16Logging levels/severity levels
  • 36.17Link state (up/down)
  • 36.18Speed/duplex
  • 36.19Send/receive traffic
  • 36.20Cyclic redundancy checks (CRCs)
  • 36.21Protocol packet and byte counts
  • 36.22CRC errors
  • 36.23Giants
  • 36.24Runts
  • 36.25Encapsulation errors
  • 36.26Temperature
  • 36.27Humidity
  • 36.28Electrical
  • 36.29Flooding
37Chapter- 37 Purpose of Organizational Documents and Policies
  • 37.01Change management
  • 37.02Incident response plan
  • 37.03Disaster recovery plan
  • 37.04Business continuity plan
  • 37.05System life cycle
  • 37.06Standard operating procedures
  • 37.07Password policy
  • 37.08Acceptable use policy
  • 37.09Bring your own device (BYOD) policy
  • 37.10Remote access policy
  • 37.11Onboarding and offboarding policy
  • 37.12Security policy
  • 37.13Data loss prevention
  • 37.14Physical network diagram
  • 37.15Floor plan
  • 37.16Rack diagram
  • 37.17Intermediate distribution frame (IDF)/main distribution frame (MDF) documentation
  • 37.18Logical network diagram
  • 37.19Wiring diagram
  • 37.20Site survey report
  • 37.21Audit and assessment report
  • 37.22Baseline configurations
  • 37.23Non-disclosure agreement (NDA)
  • 37.24Service-level agreement (SLA)
  • 37.25Memorandum of understanding (MOU)
38Chapter- 38 High Availability and Disaster Recovery Concepts
  • 38.01Switches
  • 38.02Routers
  • 38.03Firewalls
  • 38.04Uninterruptible power supply (UPS)
  • 38.05Power distribution units (PDUs)
  • 38.06Generator
  • 38.07HVAC
  • 38.08Fire suppression
  • 38.09Cold site
  • 38.10Warm site
  • 38.11Hot site
  • 38.12Cloud site
  • 38.13Active-active vs. active-passive
  • 38.14Multiple Internet service providers (ISPs)/diverse paths
  • 38.15Virtual Router Redundancy Protocol (VRRP)/First Hop Redundancy Protocol (FHRP)
  • 38.16Mean time to repair (MTTR)
  • 38.17Mean time between failure (MTBF)
  • 38.18Recovery time objective (RTO)
  • 38.19Recovery point objective (RPO)
  • 38.20State
  • 38.21Configuration
39Chapter- 39 Common Security Concepts
  • 39.01Internal
  • 39.02External
  • 39.03Common vulnerabilities and exposures (CVE)
  • 39.04Zero-day
  • 39.05Network segmentation enforcement
  • 39.06Perimeter network (previously known as demilitarized zone [DMZ])
  • 39.07Separation of duties
  • 39.08Network access control
  • 39.09Honeypot
  • 39.10Multifactor
  • 39.11Terminal Access Controller Access-Control System Plus (TACACS+)
  • 39.12Single sign-on (SSO)
  • 39.13Remote Authentication Dial-In User Service (RADIUS)
  • 39.14LDAP
  • 39.15Kerberos
  • 39.16Local authentication
  • 39.17802.1X
  • 39.18Extensible Authentication Protocol (EAP)
  • 39.19Security risk assessments
  • 39.20Threat assessment
  • 39.21Vulnerability assessment
  • 39.22Penetration testing
  • 39.23Posture assessment
  • 39.24Business risk assessments
  • 39.25Process assessment
  • 39.26Vendor assessment
40Chapter- 40 Contrast Common Types of Attacks
  • 40.01Denial-of-service (DoS) / distributed denial-of-service (DDoS)
  • 40.02Botnet/command and control
  • 40.03On-path attack (previously known as man-in-the-middle attack)
  • 40.04DNS poisoning
  • 40.05VLAN hopping
  • 40.06ARP spoofing
  • 40.07Rogue DHCP
  • 40.08Rogue access point (AP)
  • 40.09Evil twin
  • 40.10Ransomware
  • 40.11Password attacks
  • 40.12Brute-force
  • 40.13Dictionary
  • 40.14Dictionary
  • 40.15MAC spoofing
  • 40.16IP spoofing
  • 40.17Deauthentication
  • 40.18Malware
  • 40.19Social engineering
  • 40.20Phishing
  • 40.21Tailgating
  • 40.22Piggybacking
  • 40.23Shoulder surfing
41Chapter- 41 Network Hardening Techniques
  • 41.01Secure SNMP
  • 41.02Router Advertisement (RA) Guard
  • 41.03Port security
  • 41.04Dynamic ARP inspection
  • 41.05Control plane policing
  • 41.06Private VLANs
  • 41.07Disable unneeded switchports
  • 41.08Disable unneeded network services
  • 41.09Change default passwords
  • 41.10Password complexity/length
  • 41.11Enable DHCP snooping
  • 41.12Change default VLAN
  • 41.13Patch and firmware management
  • 41.14Access control list
  • 41.15Role-based access
  • 41.16Firewall rules
  • 41.17Explicit deny
  • 41.18Implicit deny
  • 41.19MAC filtering
  • 41.20Antenna placement
  • 41.21Power levels
  • 41.22Wireless client isolation
  • 41.23Guest network isolation
  • 41.24Preshared keys (PSKs)
  • 41.25Geofencing
  • 41.26Captive portal
  • 41.27Clientless VPN
  • 41.28Split tunnel vs. full tunnel
42Chapter- 42 Importance of Physical Security
  • 42.01Camera
  • 42.02Motion detection
  • 42.03Asset tags
  • 42.04Tamper detection
  • 42.05Employee training
  • 42.06Access control hardware
  • 42.07Badge readers
  • 42.08Biometrics
  • 42.09Locking racks
  • 42.10Locking cabinets
  • 42.11Access control vestibule (previously known as a mantrap)
  • 42.12Smart lockers
  • 42.13Factory reset/wipe configuration
  • 42.14Sanitize devices for disposal
43Chapter- 43 Network Troubleshooting
  • 43.01Gather information
  • 43.02Question users
  • 43.03Identify symptoms
  • 43.04Determine if anything has changed
  • 43.05Duplicate the problem, if possible
  • 43.06Approach multiple problems individually
  • 43.07Question the obvious
  • 43.08Consider multiple approaches
  • 43.09Top-to-bottom/bottom-to-top OSI model
  • 43.10Divide and conquer
  • 43.11If the theory is confirmed, determine the next steps to resolve the problem
  • 43.12If the theory is not confirmed, reestablish a new theory or escalate
44Chapter- 44 Troubleshoot Common Cable Connectivity
  • 44.01Throughput
  • 44.02Speed
  • 44.03Distance
  • 44.04Shielded and unshielded
  • 44.05Plenum and riser-rated
  • 44.06Rollover cable/console cable
  • 44.07Crossover cable
  • 44.08Power over Ethernet
  • 44.09Attenuation
  • 44.10Interference
  • 44.11Decibel (dB) loss
  • 44.12Incorrect pinout
  • 44.13Bad ports
  • 44.14Open/short
  • 44.15Light-emitting diode (LED) status indicators
  • 44.16Incorrect transceivers
  • 44.17Duplexing issues
  • 44.18Transmit and receive (TX/RX) reversed
  • 44.19Dirty optical cables
  • 44.20Cable crimper
  • 44.21Punchdown tool
  • 44.22Tone generator
  • 44.23Loopback adapter
  • 44.24Optical time-domain reflectometer (OTDR)
  • 44.25Multimeter
  • 44.26Cable tester
  • 44.27Wire map
  • 44.28Fusion splicers
  • 44.29Spectrum analyzers
  • 44.30Snips/cutters
  • 44.31Cable stripper
  • 44.32Fiber light meter
45Chapter- 45 Network Software Tools and Commands
  • 45.01WiFi analyzer
  • 45.02Protocol analyzer/packet capture
  • 45.03Bandwidth speed tester
  • 45.04Port scanner
  • 45.05iperf
  • 45.06NetFlow analyzers
  • 45.07Trivial File Transfer Protocol (TFTP) server
  • 45.08Terminal emulator
  • 45.09IP scanner
  • 45.10ping
  • 45.11ipconfig/ifconfig/ip
  • 45.12nslookup/dig
  • 45.13traceroute/tracert
  • 45.14netstat
  • 45.15hostname
  • 45.16route
  • 45.17telnet
  • 45.18tcpdump
  • 45.19nmap
  • 45.20show interface
  • 45.21show conftg
  • 45.22show route
46Chapter- 46 Troubleshoot Common Wireless Connectivity Issues
  • 46.01Throughput
  • 46.02Speed
  • 46.03Distance
  • 46.04Received signal strength indication (RSSI) signal strength
  • 46.05Effective isotropic radiated power (EIRP)/power settings
  • 46.06Antennas
  • 46.07Placement
  • 46.08Type
  • 46.09Polarization
  • 46.10Channel utilization
  • 46.11AP association time
  • 46.12Site survey
  • 46.13Interference
  • 46.14Channel overlap
  • 46.15Antenna cable attenuation/signal loss
  • 46.16RF attenuation/signal loss
  • 46.17Wrong SSID
  • 46.18Incorrect passphrase
  • 46.19Encryption protocol mismatch
  • 46.20Insufficient wireless coverage
  • 46.21Captive portal issues
  • 46.22Client disassociation issues
  • 46.23Device configuration review
  • 46.24Routing tables
  • 46.25Interface status
  • 46.26VLAN assignment
  • 46.27Network performance baselines
  • 46.28Collisions
  • 46.29Broadcast storm
  • 46.30Duplicate MAC address
  • 46.31Duplicate IP address
  • 46.32Multicast flooding
  • 46.33Asymmetrical routing
  • 46.34Switching loops
  • 46.35Routing loops
  • 46.36Rogue DHCP server
  • 46.37DHCP scope exhaustion
  • 46.38IP setting issues
  • 46.39Incorrect gateway
  • 46.40Incorrect subnet mask
  • 46.41Incorrect IP address
  • 46.42Incorrect DNS
  • 46.43Missing route
  • 46.44Low optical link budget
  • 46.45Certificate issues
  • 46.46Hardware failure
  • 46.47Host-based/network-based firewall settings
  • 46.48Blocked services, ports, or addresses
  • 46.49Incorrect VLAN
  • 46.50DNS issues
  • 46.51NTP issues
  • 46.52BYOD challenges
  • 46.53Licensed feature issues
  • 46.54Network performance issues

What is the CompTIA - Core 2 Hardware A+ Course offered by DevLustro Academy?

The CompTIA - Core 2 Hardware A+ Course at DevLustro Academy focuses on advanced hardware troubleshooting, security, and operational procedures, preparing you for the Core 2 portion of the CompTIA A+ certification. This course is perfect for those looking to gain comprehensive IT support skills.

What makes DevLustro Academy the best CompTIA - Core 2 Hardware A+ training center near me?

DevLustro Academy excels in CompTIA - Core 2 Hardware A+ training due to its hands-on labs, experienced instructors, and a curriculum that ensures you gain the practical skills needed to pass the Core 2 exam and succeed in IT support roles.

What are the prerequisites for enrolling in the CompTIA Hardware A+ & Network+ course?

There are no specific prerequisites, but basic knowledge of computer hardware and networking concepts is beneficial.

How will this course benefit my career in IT?

This course will equip you with the skills and knowledge required for IT hardware support and network administration roles, which are in high demand in the industry.

What kind of projects will I work on during the course?

You will work on projects that involve hardware installation, network configuration, troubleshooting scenarios, and network security implementations.

Will I receive a certificate upon completion of the course?

Yes, you will receive a certificate of completion from DevLustro Academy that verifies your proficiency in CompTIA Hardware A+ & Network+.

Can I get support from instructors after completing the course?

Yes, you will have access to post-session support from instructors to help with any questions or clarifications related to IT hardware and networking.

Are there opportunities for hands-on practice and simulations?

Yes, the course includes hands-on labs and simulations to give you practical experience in hardware installation, network setup, and troubleshooting.

Is this course suitable for beginners in IT?

Yes, this course is designed for beginners who want to start a career in IT hardware support and network administration. It covers fundamental to intermediate level topics.

Who are the instructors for this course?

The course is taught by experienced instructors with industry expertise in IT hardware and networking.

What tools and technologies will I learn as part of the course?

You will learn about hardware components, network protocols, security measures, troubleshooting techniques, and system maintenance.

Will I have access to course materials after completion?

Yes, you will have access to the course materials, including videos, slides, and practice tests, even after completing the course.

Ready to begin?

CompTIA – Hardware A+ & CompTIA – Network+ (N10-008) Training Course

Duration: 90 Hours

Enroll in

CompTIA – Hardware A+ & CompTIA – Network+ (N10-008) Training Course

Want to know more?