Course Syllabus N+
Course Syllabus N+
Course Syllabus N+
u
it
st
In
COURSE SYLLABUS
st
In
TE
it
Network+
TE
Syllabus
it
Instructor:
Course Duration:
Date/Time:
Training Location:
st
Course Description
In
In this course students will prepare for CompTIAs Network+ certification exam N10-003.
Based on Windows Server 2003, this course covers the full range of skills and concepts students
need to learn, such as basic networking concepts and configurations, the OSI model, working
with network-related hardware, network configuration with TCP/IP, network operating system
basics, fault tolerance and backup issues, and troubleshooting hardware and software problems.
Learning Objectives
it
st
1.1. Recognize the logical or physical network topologies given a diagram, schematic, or
description of Star, Bus, Mesh, and Ring.
1.2. Specify the main features of 802.2 (Logical Link Control), 802.3 (Ethernet), 802.5
(Token Ring), 802.11 (wireless), and Fiber Distributed Data Interface (FDDI)
networking technologies, including: Speed, Access method (CSMA/CA [Carrier Sense
Multiple Access/Collision Avoidance] and CSMA/CD [Carrier Sense Multiple Access /
Collision Detection]), Topology, and Media.
1.3. Specify the characteristics (for example, speed, length, topology, and cable type) of the
following cable standards: 10Base-T, 10Base-FL, 100Base-TX, 100Base-FX, 1000BaseTX, 1000Base-CX, 1000Base-SX, 1000Base-LX, 10GBase-SR, 10GBase-LR, and
10GBase-ER
1.4. Recognize the following media connectors and describe their uses: RJ11 (Registered
Jack), RJ-45, F-Type, ST (Straight tip), SC (subscriber connector), IEEE 1394
(FireWire), LC (local connector), MTRJ (Mechanical Transfer Registered Jack), USB
(Universal Serial Bus)
1.5. Recognize the following media types and describe their uses: Category 3, 5, 5e, and 6,
UTP (Unshielded twisted-pair), STP (shielded twisted-pair), Coaxial cable, SMF (singlemode fiber) optic cable, and MMF (multimode fiber) optic cable.
1.6. Identify the purposes, features, and functions of the following network components:
Hubs, Switches, Bridges, Routers, Gateways, CSU/DSU (Channel Service Unit/Data
Service Unit), NICs (network interface cards, ISDN (integrated Services Digital
TE
In
TE
te
N+ Maintaining PC Network
Avtech Institute
Page 2
Syllabus
te
N+ Maintaining PC Network
it
In
st
it
2.1. Identify a MAC (Media Access Control) address and its parts.
2.2. Identify the seven layers of the OSI (Open Systems Interconnect) model and their
functions.
2.3. Identify the OSI (Open Systems Interconnect) layers at which the following network
components operate: Hubs, Switches, Bridges, Routers, NICs (network interface cards),
and WAPs (wireless access points).
2.4. Differentiate between the following network protocols in terms of routing, addressing
schemes, interoperability, and naming conventions; IPX/SPX (Internet-work Packet
Exchange/Sequenced Packet Exchange), NetBEUI (Network Basic Input/Output System
Extended User Interface), AppleTalk/AppleTalk over IP (Internet Protocol), and TCP/IP
(Transmission Control Protocol/Internet Protocol). Broad overview and understand the
functions of the OSI Model and its seven layers: (Physical, Data Link, Network,
Transport, Session, Presentation, and Application).
In
3.2. Identify the purpose of subnetting, the differences between private and public
network addressing schemes, the differences between IP addressing methods: Static,
Dynamic, and Self-assigned (APIPA).
3.3. Define the purpose, function and use of the following protocol used in the TCP/IP
suite: TCP, UDP, FTP, SFTP, TFTP, SMTP, HTTP, HTTPS, POP3/IMAP4, Telnet,
SSH, ICMP. ARP/RARP, NTP, NNTP, SCP, LDAP, IGMP, LPR.
3.4. Define the function of TCP/UDO ports.
TE
3.5. Identify the well-known ports associated with the following commonly used
services and protocols: 20 FTP, 21 FTP, 22 SSH, 23 Telnet, 25 SMTP, 53 DNS, 69
TFTP, 80 HTTP, 110 POP3, 119 NNTP, 123 NTP, 143 IMAP4, 443 HTTPS.
4.1. Learning how to use the Address Resolution Protocol (ARP), the netstat Utility, the
nbstat Utility, the File Transfer Protocol (FTP), the ping Utility, winipcfg, ipconfig,
ifconfig, the tracert Utility, the Telnet Utility, and the nslookup Utility.
4.2. Given a troubleshooting scenario, select the appropriate network utility from the
following: tracert/traceroute, ping, arp, netstat, ipconfig/ifconfig, winipcfg, nslookup/dig
TE
st
3.1. Describe the TCP/IP family of protocols, IP Addressing, address classification, and
name resolutions services. Discuss of how to setup and configure TCP/IP on Windows
2000 and a brief discussion of VLAN technologies
Avtech Institute
Page 3
Syllabus
te
N+ Maintaining PC Network
4.3. Given output from a network diagnostic utility, identify the utility and interpret the output.
In
st
it
5.1. Identify the basic capabilities (for example, features, client support, interoperability,
authentication, Directory Structure, file and print services, application support and
security) of the following server operating systems to access network resources:
5.1.1. Unix/Linux/Mac OS X Server
5.1.2. Novell Netware
5.1.3. Microsoft Windows
5.1.4. AppleShare IP (Internet Protocol)
In
TE
7.1. Identify the basic characteristics (for example, speed, capacity, and media) of the
following WAN (wide area network) technologies: Packet switching, Circuit switching,
ISDN, FDDI, T1/E1/J1, T3/E3/J3, OC-s, X.25
7.2. Identify the basic characteristics of the following internet access technologies: xDSL,
Broadband Cable (Cable modem), POTS/PSTN (Plain Old Telephone Service/Public
Switched Telephone Network), Satellite, Wireless
7.3. Define the function of the following remote access protocols and services: RAS Remote
Access Service), PPP (Point-to-Point Protocol), SLIP(Serial Line Internet Protocol),
PPP0E (Point-to-Point Protocol over Ethernet), PPTP (point-to-Point Tunneling
Protocol), VPN (Virtual Private Network), RDP (Remote Desktop Protocol)
7.4. Given a remote connectivity scenario comprising a protocol, authentication scheme,
physical connectivity, and configure the connection. Includes connection to the
following servers: UNIX/Linux/Mac OS X Server, NetWare, Windows, AppleShare IP
(Internet protocol).
TE
st
it
6.1. Specify the general characteristics (for example, carrier speed, frequency, transmission
type, and topology) of the following wireless technologies: 802.11 (frequency hopping
spread spectrum), 802.11x (direct sequence spread spectrum), Infrared, Bluetooth.
6.2. Identify factors which affect the range and speed of wireless service (for example,
interference, antenna type, and environmental factors).
6.3. The ability to install the most common network connectivity device, the network
interface card, or NIC. Knowing how to configure the workstation to components and
get them functional on Windows systems.
6.4. Identify the appropriate tool for a given wiring task (For example: wire crimper, media
tester/certifier, and punch down tool or tone generator).
Avtech Institute
Page 4
Syllabus
te
N+ Maintaining PC Network
st
9.1. Identify the purpose, benefits, and characteristics of using antivirus software for virus
protection.
9.2. Identify the purpose and characteristics of how to asses fault tolerance disaster recovery
needs: for example, disk system fault tolerance methods, Power, Link redundancy,
Storage, and Services.
9.3. Identify the purpose and characteristics of disaster recovery for backup consideration:
9.3.1. Backup/restore
9.3.2. Offsite storage
9.3.3. Hot and cold spares
9.3.4. Hot, warm, and cold sites
In
TE
TE
10.1. Giving a network scenario, interpret visual indicators (for example, link LEDs [lightemitting diodes] and collision LEDs) to determine the nature of a stated problem.
10.2. Given a troubleshooting scenario involving a client accessing remote network services,
identify the cause of the problem (for example, file services, print services,
authentication failure, protocol configuration, physical connectivity, and SOHO [small
office, home office] router).
10.3. Given a troubleshooting scenario between a client and the following server
environments, identify the cause of a stated problem: UNIX/xMac OS X Server,
it
In
st
it
8.1. Identify the following security protocols and describe their purpose and function: IPSec
(Internet Protocol Security), L2TP (Layer 2 Tunneling Protocol), SSL (Secure Sockets
Layer), WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access), 802.1x
8.2. Identify authentication protocols (for example, CHAP [Challenge Handshake
Authentication Protocol], MS-CHAP [Microsoft Challenge Handshake Authentication
Protocol], PAP [Password Authentication Protocol], RADIUS [Remote Authentication
Dial-In User Service], Kerberos, and EAP [Extensible Authentication Protocol]).
8.3. Identify the basic capabilities needed for client workstations to connect to and use
network resources (for example, media, network protocols, and peer and server
services).
8.4. Identify the purpose, benefits, and characteristics of using a firewall.
8.5. Identify the purpose, benefits, and characteristics of using a proxy service.
8.6. Giving a connectivity scenario, determine the impact on network functionality of a
particular security implementation (for example, port blocking/filtering, authentication,
and encryption).
Avtech Institute
Page 5
Syllabus
te
N+ Maintaining PC Network
In
st
it
it
10.7. Given a network problem scenario, select an appropriate course of action based on a
logical troubleshooting strategy. This strategy can include the following steps: 1.
Identify the symptoms and potential causes, 2. Identify the affected area, 3. Establish
what has changed, 4. Select the most probable cause, 5.Implement an action plan and
solution, including potential effects, 6.Test the Result, 7.Identify the results and effects
of the solution, 8.Document the solution and process.
st
Prerequisite
In
Contact Hours
TE
ISBN 0-7821-4416-0
TE
Avtech Institute
Page 6
Teaching Strategies
it
A variety of teaching strategies may be utilized in this course, including but not limited to,
lecture, discussion, written classroom exercises, written lab exercises, performance based lab
exercises, demonstrations, quizzes and examinations. Some quizzes may be entirely or contain
lab based components. A mid-course and end course examination will be given.
st
Class Attendance
Mid Term
In
Finals
100%
Total
it
Grading Policy
Point Range
Interpretation
Grade
90 100
Excellent
80 89
Very Good
70 79
Average
60 69
Poor
Below 60
Failure
N/A
Withdrawal
N/A
Pass
N/A
Incomplete
Quality Points
st
At the end of each course, each student is assigned a final grade as follows:
4.0
In
3.0 3.9
2.0 2.9
1.0 1.9
0
0
TE
TE
A student earning a grade of D or above is considered to have passed the course and is eligible to
pursue further studies. A student receiving a grade of F has failed the course. A failed course
must be repeated and passed to meet Avtech Institutes graduation requirements, in addition to
an overall program GPA of 2.0.
Syllabus
te
N+ Maintaining PC Network
Avtech Institute
Page 7
Syllabus
te
N+ Maintaining PC Network
it
Equipment Needed
st
In
Library Assignments
Portfolio Assignment
it
Course Policies
st
Disruptive Behavior
In
Copyright Infringement
Specific exemptions to copyright infringement are made for student use in the context of learning
activities. Graphic design students often download images from the Internet, or scan images
from publications. As long as this work is for educational purpose, and subject to faculty
permission, this is not a problem.
Plagiarism
Attendance
TE
Faculty cannot tolerate the misrepresentation of work as the students own. This often involves
the use by one student or another students design, whether voluntarily or involuntarily. In the
event that plagiarism is evident and documented, all students involved in the conscious decision
to misrepresent work must receive an F as the grade for the project. A second occurrence may
result in suspension for the rest of the quarter, and return to the school only after a review by the
Academic Standards Committee.
In education and the workplace, regular attendance is necessary if individuals are to excel. There
is a direct correlation between attendance and academic success. Attendance is mandatory. All
TE
Disruptive behavior is an activity that interferes with learning and teaching. Inappropriate
talking during class, surfing inappropriate website, tardiness, cheating, alcohol or drug use, use
of cell phone, playing lout music during class, etc. all disrupt the learning process.
Avtech Institute
Page 8
Syllabus
te
N+ Maintaining PC Network
students must arrive on time and prepared to learn at each class session. At the faculty members
discretion, students may be marked absent if they arrive more than 15 minutes late to any class.
More that five absences in a class that meets twice per week or more that two absences in a class
that meets once per week may result in a failure.
Make-Up Work
it
TE
In
TE
st
it
In
st
All projects and homework must be handed in on time. Homework should be emailed to your
instructor if you are going to miss a class. Work that is submitted one week late will result in the
loss of one full grade; and work that is submitted two weeks late will result in the loss of two full
grades; more than two weeks late you will receive a failing grade on the project.
Avtech Institute
Page 9