Medicine Industry: News and Marketplace



  Home News White Papers Buyers Guide  


Perpetual Solutions

LTE Training

 LTE Technical Overview
 LTE Non-Technical Overview
 LTE Fundamentals
 MIMO and Antenna Technology
 LTE Signalling and Protocols
 LTE Interworking
 LTE Core Network

WiMAX Training

 Radio Principles Fundamentals
 WiMAX Overview
 Understanding WiMAX Wireless
 Implementing WiMAX Networks
 WiMAX, WiFi & Wireless Planning
 Wireless MESH Networking
 WiMAX Fixed BWA

CDMA Training

 CDMA Networking and Security

IMS, SIP, CAMEL Training

 Next Gen Networks, SIP, SigTran
 IMS & SIP Technical Description

 Intelligent Networks, INAP &

 Wireless IN and CAMEL
 Mobile IP

Prerequisite Courses

Follow Up Courses

 Request Info/Contact

Industry Highlights

3650MHz Band

WiMAX White Papers
WiMAX Company List
WiMAX Trade Shows

WiMAX Jobs

WiMAX Books
WiMAX Buyer's Guide
WiMAX Forums
WiMAX Stocks
WiMAX Market Reports

WiMAX Antennas

WiMAX Resources

WiMAX Training

      WiMAX News
      WiMAX Equipment
      WiMAX Billing Solutions
      VoIP over WiMAX
      WiMAX Vendors
      WiMAX Test Tools
      WiMAX Development
      WiMAX RSS Feeds


WiMAX Buyers Guide

WiMAX Hardware

WiMAX Base Station


WiMAX Antenna

TeleMedicine Equipment

WiMAX Cooling Systems

WiMAX Chips, Chipsets,
Boards & Components

Turnkey TeleMedicine

WiMAX PtP - Point-to-Point

WiMAX PtMP - Point-to-Multipoint

WiMAX Test Equipment

WiMAX Equipment Distributors

WiMAX Towers

WiMAX Shelters and Cabinets

TeleMedicine Software

Telemedicine Billing Software

WiMAX Test Software

WiMAX Mesh Networks

WiMAX Network Monitoring

WiMAX QoS Solutions -
Quality of Service

WiMAX Provisioning

TeleMedicine Monitoring Software

WiMAX Software Distributors

WiMAX Services

WiMAX Test Certification

WiMAX Installation

WiMAX Business Case

WiMAX Network Design

WiMAX Hosted Billing

WiMAX Networking


TeleMedicine Integrators

TeleMedicine Training

WiMAX Consulting

TeleMedicine Solutions

WiMAX Metro Area Networks (MANs)

WiMAX Campus Area

Military WiMAX Systems


WiMAX Backhaul



Submit your Site







Network+ Certification Support Skills 2005

Training Course Outline

Course Duration:

5 Days

Training Course Description:
This practical five-day hands-on course is intended for students wishing to qualify with Network+ Certification. It specifically prepares for the new exam content that launched in 2005.

This course has been created for students with the responsibility for installing, maintaining and troubleshooting local area networks, with particular emphasis on Microsoft Windows and Novell NetWare. The course has been developed to produce competent network support engineers that are capable of taking and passing CompTIA’s Network+ Certification exam. This qualification is particularly recommended for students who wish to progress to the Microsoft Certified Systems Engineer qualification.

On course completion, students will be able to:
  • Identify network topologies, cabling, connectors, and components
  • Install and configure a network card and client software
  • Identify network protocols and define the concepts of network layers
  • Understand and implement the TCP/IP protocol
  • Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)
  • Configure remote and wireless network connections
  • Configure user and security settings for an operating system
  • Use test equipment to troubleshoot network connectivity
  • This course has been approved under the CompTIA Authorized Quality Curriculum program

A typical student will have 6-12 months of post A+ Certification experience (or equivalent). The key objective of the course is to provide enough information for a student to become a competent network support engineer, capable of taking and passing the Network+ Certification test. Students should meet the following criteria prior to attending the course: - Taken and passed both A+ Certification exams or have equivalent knowledge and experience. - Six months to one year of post A+ Certification support experience. - Extensive experience of supporting end-users and PC-based systems.

Prerequisite courses:
A+ Hardware Support Skills v10.5
A+ Operating System Support Skills v10

Follow on courses:
Security+ Certification

Network+ Certification Support Skills 2005 includes the following modules:

Troubleshooting Troubleshooting Equipment

  • Terminators
  • Loopback Test
  • Crossover Cable
  • Volt-Ohm Meters
  • Tone Generators and Probe
  • Cable Testers and Certifiers
  • Time-Domain Reflectometer (TDR)
  • Product Indicators Test Frame and Packet Generators
  • Network Monitors
  • Protocol Analyzer
  • SNMP
  • Overview of Troubleshooting Procedures Troubleshooting Networks
  • Troubleshooting Cabling
  • Troubleshooting Infrastructure
  • Routing Issues
  • Troubleshooting Name Resolution Establishing a Session Troubleshooting Services User Problems
  • Service Packs and Driver Updates Performance Monitor Network Monitor

Module 1 : Networking fundamentals

  • LANs, WANs and the Internet
  • Uses and Benefits of a LAN
  • Network Components
  • Server-based Networks
  • Peer-to-Peer Networks
  • Introduction to Topologies
  • Physical and Logical Topologies
  • Star, Bus, Ring and other Topologies
  • Introduction to Transmission Media
  • Media Bandwidth
  • Media Types
  • Twisted-pair Cable (TP)
  • Coaxial Cable
  • Fiber Optic Cable
  • Firewire (IEEE 1394)
  • USB
  • Structured Wiring Systems
  • Crimping Cables
  • Wiring for UTP Cable
  • Wiring for a Cross-over Cable
  • Installing a NIC
  • Network Card Drivers

Module 2: The OSI Model

  • Introducing the OSI Model
  • The OSI Model
  • Concept behind the OSI Model, Network communication and the OSI Model, The OSI Model and 'real system' networking
  • OSI Model summary
  • Physical Layer
  • Data Link Layer
  • Media Access
  • Contention
  • Advantages of Contention Based Protocols, Disadvantages of Contention Based Protocols, Network Card Selection
  • Token Passing
  • Advantages of Token Passing, Disadvantages of Token Passing
  • Demand Priority
  • Advantages, Disadvantages
  • Ethernet
  • 10BaseT, 10Base2, 10Base5, 10BaseF
  • Fast Ethernet
  • Gigabit Ethernet
  • Benefits, Standards
  • Ethernet Restrictions
  • Token Ring
  • Fiber Distributed Data Interface (FDDI)
  • FDDI and Fault Tolerance
  • VGAnyLAN
  • Asynchronous Transfer Mode (ATM)
  • AppleTalk
  • LocalTalk, Cabling, Zones, AppleShare, EtherTalk and TokenTalk
  • ARCnet
  • Media Access and Topology, ARCnet Addressing, Configuration, ARCnet Components
  • 802 Standards
  • 802.2, 802.3 (802.3u), 802.5 - Based on IBM's Token Ring Implementation, 802.12 - 100VG-AnyLAN
  • Network Layer
  • Transport Layer
  • Routers
  • Network Addresses
  • Choosing Paths
  • The Routing Table, The Routing Process
  • Static and Dynamic Routers
  • Static Routers, Dynamic Routers
  • Brouters
  • Layer 3 Switches
  • Overview of Transport Protocols
  • TCP/IP, IPX/SPX (or NWLink), NetBEUI
  • Other Protocols
  • AppleTalk, Data Link Control (DLC)
  • Characteristics of Network Protocols
  • Interoperability, Open or Proprietary Specification, Configuration and Administration, Segmentation of Networks and Routing, Memory Requirements, Performance
  • Choosing a Protocol
  • Scenarios
  • Adding and Removing Protocols
  • Loading Multiple Protocols, Bindings
  • Other Layers of the OSI Model
  • Session Layer, Presentation Layer, Application Layer
  • Client/Server Protocols
  • Server Message Blocks (SMBs), NetWare Core Protocols (NCPs), Service
  • Advertising Protocol (SAP), Network Client Software

Module 3: Major Network Operating Systems

  • Server Network Operating Systems
  • Directory Services
  • Workstation Software
  • Hardware Requirements for a Workstation
  • Identifying a Machine on the Network
  • Connecting to Network Resources
  • Mapping Drives to Disk Resources, MAP and NET USE
  • Using Network Printers
  • Configuring Network Printing
  • Capturing Printer Ports
  • Managing Network Printers
  • Shared Fax Systems
  • Macintosh Clients
  • Network Applications
  • E-mail
  • Components of an E-mail System, E-mail Standards
  • X.400
  • X.400 Addresses, The X.500 Directory Standard
  • Other E-mail Standards
  • Scheduling
  • GroupWare
  • GroupWare Products
  • Shared Network Applications
  • Novell NetWare
  • NDS
  • Windows NT
  • Directory Services in NT
  • The Windows 2000 Family
  • Directory Services in Windows 2000
  • Combining NT and NetWare
  • Client-based Solution, Server-based Solution
  • The Network File System (NFS)
  • UNIX
  • Connecting UNIX to a Network
  • Linux
  • Key Features, Connecting Linux to a Network
  • OS/2
  • Key Features, Connecting OS/2 to a Network
  • Apple Macintosh
  • Connecting to a Network
  • Client-Server Systems
  • Centralized versus Distributed Processing
  • Centralized Processing Model, Distributed Processing Model
  • The Client-Server Model
  • Front-end Applications, Stored Procedures, Structured Query Language (SQL)
  • Client-Server Architectures
  • Single Server, Multiple or Distributed Server, Data Warehousing, Periodic
  • Synchronization
  • Network Attached Storage
  • What's Wrong with Traditional Storage?, How to NAS Work?, Alternatives

Module 4: TCP/IP Fundamentals

  • Development of TCP/IP
  • Why is TCP/IP so Popular?
  • TCP/IP as an Open Standard
  • Internet Society (ISOC), Internet Activities Board (IAB), Request for Comment (RFC), Internet Network Information Center (InterNIC)
  • The TCP/IP Protocol Suite
  • Network Interface, Internet Layer, Transport Layer, Application Layer
  • Transmission Control Protocol (TCP)
  • User Datagram Protocol (UDP)
  • Internet Protocol
  • Route Selection
  • TCP/IP Services
  • E-mail: The SMTP Protocol The Format of a Mail Message, Electronic Mail
  • Addresses, SMTP Protocol
  • Post Office Protocol (POP)
  • Sending E-mail
  • The World Wide Web: HTTP
  • What is the Web?, The Structure of a URL, Web Software, Establishing a Web Site, Creating Web Pages
  • Other TCP/IP Services
  • Internet News Groups, File Transfer Protocol (FTP), Telnet, Simple Network
  • Management Protocol (SNMP)
  • TCP/IP Ports
  • TCP/IP Filtering
  • IP Addresses
  • Converting Between Binary Format And Decimal Format
  • Creating Subnets
  • Subnet Mask
  • Address Class, The Subnet Mask in Action, Summary of Addressing Rules
  • Planning your IP addressing Scheme
  • Applying for an Internet Network Address
  • Address Allocation for Private Networks
  • Default Gateway
  • Supernetting
  • IP Version 6
  • The Need for Change, New Addressing Scheme, Configuring Computers
  • TCP/IP Configuration Parameters
  • Installing the TCP/IP Protocol, Checking TCP/IP Configuration, PING Utility
  • Dynamic Host Configuration Protocol
  • The DHCP Server, DHCP Client Initialization
  • Host Names and FQDNs
  • Host Names, FQDNs
  • Resolving Host Names using the HOSTS File
  • HOSTS file
  • Using DNS
  • The Name Resolution Process
  • Server (NetBIOS) Names
  • UNC Names
  • Name Discovery
  • Resolving NetBIOS Names Using Broadcasts
  • Using an LMHOSTS File
  • Problems with LMHOSTS Files
  • WINS Servers

Network Remote Access Wireless Networks

  • Wireless Transmission Techniques
  • Microwave
  • Infrared
  • Radio
  • Single Frequency and Spread Spectrum
  • Bluetooth
  • Setting Up a Wireless Network
  • WAN Overview
  • Dedicated / Leased Lines
  • Digital Leased Lines
  • Switched Networks
  • Circuit Switching
  • Packet Switching
  • X.25
  • Frame Relay
  • ISDN
  • Fiber Distributed Data Interface (FDDI)
  • Public Networks
  • The Internet
  • Protocols (SLIP / PPP)
  • Tunneling / Encapsulation (PPTP / L2TP)Requirements for Remote Connectivity
  • Remote Client and Server Configuration
  • Virtual Private Networks (VPN)
  • Remote Desktop Protocol (RDP)
  • Intranets and Extranets
  • VLANs
  • Troubleshooting Remote Connectivity for Small Offices

Network Administration and Security Network Operating System Security

  • Administrative / Supervisory Account
  • Creating and Managing User Accounts
  • Groups
  • Setting Share Permissions
  • Auditing
  • Windows NTFS Security
  • Setting File and Directory Permissions
  • What Makes an Operating System Secure?
  • Types of Attack
  • Types of Defense
  • Password Principles
  • Authenticating User Logon Requests (Kerberos, RADIUS, Wireless Security)
  • Encryption and Password Hashing
  • Encryption Technology
  • Encryption Systems
  • IPSec
  • Firewalls
  • Proxy Servers
  • NAT and ICS
  • Fault Tolerance and Redundancy
  • Backup Strategies
  • Virus Prevention
  • Power Management
  • UPS
  • Disk Fault Tolerance


Request Info/Contact