CompTIA Network+
A collection of notes taken while studying for the Network+ certification.
Networking Concepts
cmd: msg ZCM-33126123 * /w hi! Networks can be defined as a set of nodes and links, where nodes a...
The Internet
the public internet's basic structure The WAN interface of the SOHO router connects the local net...
Mesh Topology
everybody is plugged in with everyone else For every node n in the network, the mesh topology req...
Enterprise Cabling
big hub small hub organize by floors internet for all yippie! Main Distribution Frame -> primary ...
Ethernet Standards
the IEEE defines 802.3 standards for ethernet cables Official documentation for the 802.3 standa...
Network Link Aggregation
merge two network links logically for redundancy Link aggregation can be used to boost the bandwi...
Ethernet Frame Format
grr ethernet packet header formatting preamble start frame delimiter destination MAC address sou...
Data Link Speeds
sometimes you can't go 30 over because traffic When troubleshooting a link, learn to differentiat...
Spanning Tree Protocol
grr avoiding traffic jams across redundant links The Spanning Tree Protocol and other network pr...
Network Switch Configuration
hijack and configure switch using terminal >:) Most network switch OS's run in three main modes: ...
Hybrid Topology
urban design & planning but it's networking we have the basic network topologies: star mesh p2p ...
VoIP over vLANs
i need an entire network segment for microsoft teams calls VoIP transmits using data packets inst...
Ports and Connections
what if we (Internet-Assigned-Numbers-Authority) hijacked the first 1024 ports that's exactly wha...
DHCPv6 Server Configuration
i need a post office to specifically handle foreign mail IPv6 has an address autoconfiguration pr...
First Hop Redundancy
having a single gate to your gated neighborhood is bad because what if they just lock you in one ...
Configuration and Backups
what if something goes wrong? Configuration management means identifying and documenting all the ...
Packet Capturing
i need to plant a bug in the oval office Protocol analyzers, often called 'packet sniffers,' are ...
Bandwidth Management
I NEED MORE LANES ON THE INTERSTATE Latency and jitter are hard to control and predict due to the...
Traffic Testing Tools
i need my handy handy spy device How do I detect poor network performance? Throughput Testers Tra...
Attack Types
ranged, mental, physical, etc. Fingerprinting and Footprinting The attacker wishes to list all th...
MAC Flooding
i have the flipper zero to spam light changes at traffic lights While other on-path attacks like ...
VLAN Hopping Attacks
what am i a frog VLAN hopping is designed to send packets that escape the current VLAN. This is d...
Encryption
keys. lots of keys. you have the two big boys of encryption. Encryption Algorithm A function that...
Common Security Terminology
911 hehehehehehehehehe fnuuy CIA and FBI i mean VTR Confidentiality, Integrity, and Availability ...
DHCP Snooping
i need a soviet grade wiretap for spying on the white house in the form of a trojan horse This wa...
Network Federation
what if people that aren't exactly employees need to access the company network This idea is call...
Authentication Providers
oh yes we all need government-issued digital IDs that compromise all forms of privacy and are pro...
Access Control
license and registration please Access Control Systems govern how subjects and principals interac...
Advanced VLAN Configuration
i need a superhighway that destroys all the poor neighborhoods but instead it's a network ok so s...
Access Control Methods
now how exactly should i go about ensuring that employee's can't see the 15 terabytes of data i'v...
IEEE 802.1X
what if i just used a specific port and trusted everything on that 802.1X: Port-Based Network Acc...
Network Access Control
you better be able to trust your network administrators (i.e. pay them well) Network Access Contr...
Device Hardening
the device needs to be rock hard Hardening is basically making any device secure against tamperin...
Content Filtering
im so tired i can't do this anymore i can't think Content filtering can apply Application layer f...
Proxy Servers
A server that mediates the communications between a client and another server. Proxies often have...
Network Security Zones
separate but NOT equal mwahahahaha Effective placement of security appliances depends on segmenti...
IEEE 802.11ax
even bigger! even better! come on, let's go! never give up! Wifi 6 uses advanced modulation and s...
IEEE 802.11ac
i need bigger and better wifi NOW Wifi 5 only works in the 5 GHz band. 2.4 GHz support only works...
IEEE 802.11bg
the second wifi standard of all time (OAT). 802.11b uses the 2.4 GHz frequency band, and was the ...
IEEE 802.11n
this is a lot of yap for a wifi standard 802.11n increased bandwidth over it's predecessors by mu...
IEEE 802.11a
the first wifi standard of all time i think Wireless radios are configured to use a frequency ban...
Wireless Surveys
i need a map that dictates where all the ______ people are Range, interference, and signal streng...
Wireless Range and Signal Strength
signal jamming but instead it's wifi Wifi-enabled devices should have an indoor range of 100 feet...
Infrastructure Network
i am tired of taking notes let me out of here Wireless Access Points are configured to use a MAC ...
Band Steering
yes we need to shut down three lanes of traffic to fix this pothole Many Wifi access points have ...
Wifi Encryption Standards
lockdown! lockdown! this is a (maybe) drill! lockdown! lockdown! Wifi networks need to be configu...
Other Wireless Network Types
miscellaneous stuff The lesson sites two more types, ad hoc, mesh, and p2p. We kinda already know...
Wireless Network Attacks
grrr you have the three main attack vectors (yes im getting lazier and lazier with these notes, s...
Zero Trust Architecture
i can't trust any of you. all of you are fake. except you. i trust this one person. nobody else. ...
Merge all notes
You must manually set $VaultPath before you run the script. $AllFiles = Get-ChildItem -Path $Vaul...
Classless Interdomain Routing
what if i have four small ip addresses instead of one big overkill one Classless Interdomain Rout...
Network Broadcasts
there are a lot of ways to shout at people nodes unicast vs broadcast vs anycast vs multicast ...
IP Address Configuration
but what if i was special...? Each OS has their own way of setting up a static IP address for the...
IPv4 Header
packets are complicated kinda maybe somewhat Ethernet only runs at OSI Layer 1 and Layer 2, so it...
Data Encapsulation
network protocols define the shape of data being transmitted Network protocols have two main part...
IPv6 Broadcasting
yelling at nodes but in mandarin a foreign language now Unicast addressing in IPv6 also refers to...
IPv4 and IPv6 Crossplay
i need them both, but on a single network Most networks run both IPv4 and IPv6 in some or all seg...
Routing Tables
what if i had a gps but for packets >:) Most hosts on a network don't have the necessary capabili...
Dynamic Routing Protocols
i need multiple gps apps for some reason Dynamic routing protocols implement algorithms that use ...
SOHO Networks
how home network routers work Every home has a SOHO router provided by an ISP that links the LAN ...
The OSI Model
the International Organization for Standardization came together one day The official documentat...
Star Topology
everyone knows the plug, but not everyone else Star Topology is used most commonly in small LAN n...
Network Types
how big? how wide? where? Network sizes are determined by the number of connected hosts, while it...
Network Topology
physical layout vs logical layout Physical topology refers to the placement of nodes and what typ...
DNS Server Configuration
grr i have four different gps apps again DNS is very very very very very very very∞ important to ...
Voice and Video Services
i need to watch my employees work from my beach chair in hawaii We love our telecommunications st...
Network Services
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa I need a lot of services for m...
Database Services
IM NOT A BIG FAN OF SQL (30 on 30) We love databases. It allows us to interact with and manage la...
Fault Tolerance and Redundancy
i need more numbers Mean Time Between Failures - expected lifetime of an asset. (total operation ...
Disaster Recovery Sites
i need several popeyes locations in the hood in case one gets shut down A Disaster Recovery Plan ...
Disaster Recovery Metrics
i need a number that tells me how good we are at not imploding We love a number that directly st...
Wireless Roaming
i wanna walk around my house with epic amounts of internet Clients can roam around an ESA using ...
Encryption Key Management
The operational considerations for the various stages in the lifecycle of an encryption key or ke...