Skip to main content

CompTIA Network+

A collection of notes taken while studying for the Network+ certification.

Networking Concepts

cmd: msg ZCM-33126123 * /w hi! Networks can be defined as a set of nodes and links, where nodes a...

The Internet

the public internet's basic structure The WAN interface of the SOHO router connects the local net...

Mesh Topology

everybody is plugged in with everyone else For every node n in the network, the mesh topology req...

Enterprise Cabling

big hub small hub organize by floors internet for all yippie! Main Distribution Frame -> primary ...

Ethernet Standards

the IEEE defines 802.3 standards for ethernet cables Official documentation for the 802.3 standa...

Network Link Aggregation

merge two network links logically for redundancy Link aggregation can be used to boost the bandwi...

Ethernet Frame Format

grr ethernet packet header formatting preamble start frame delimiter destination MAC address sou...

Data Link Speeds

sometimes you can't go 30 over because traffic When troubleshooting a link, learn to differentiat...

Spanning Tree Protocol

grr avoiding traffic jams across redundant links The Spanning Tree Protocol and other network pr...

Network Switch Configuration

hijack and configure switch using terminal >:) Most network switch OS's run in three main modes: ...

Hybrid Topology

urban design & planning but it's networking we have the basic network topologies: star mesh p2p ...

VoIP over vLANs

i need an entire network segment for microsoft teams calls VoIP transmits using data packets inst...

Ports and Connections

what if we (Internet-Assigned-Numbers-Authority) hijacked the first 1024 ports that's exactly wha...

DHCPv6 Server Configuration

i need a post office to specifically handle foreign mail IPv6 has an address autoconfiguration pr...

First Hop Redundancy

having a single gate to your gated neighborhood is bad because what if they just lock you in one ...

Configuration and Backups

what if something goes wrong? Configuration management means identifying and documenting all the ...

Packet Capturing

i need to plant a bug in the oval office Protocol analyzers, often called 'packet sniffers,' are ...

Bandwidth Management

I NEED MORE LANES ON THE INTERSTATE Latency and jitter are hard to control and predict due to the...

Traffic Testing Tools

i need my handy handy spy device How do I detect poor network performance? Throughput Testers Tra...

Attack Types

ranged, mental, physical, etc. Fingerprinting and Footprinting The attacker wishes to list all th...

MAC Flooding

i have the flipper zero to spam light changes at traffic lights While other on-path attacks like ...

VLAN Hopping Attacks

what am i a frog VLAN hopping is designed to send packets that escape the current VLAN. This is d...

Encryption

keys. lots of keys. you have the two big boys of encryption. Encryption Algorithm A function that...

Common Security Terminology

911 hehehehehehehehehe fnuuy CIA and FBI i mean VTR Confidentiality, Integrity, and Availability ...

DHCP Snooping

i need a soviet grade wiretap for spying on the white house in the form of a trojan horse This wa...

Network Federation

what if people that aren't exactly employees need to access the company network This idea is call...

Authentication Providers

oh yes we all need government-issued digital IDs that compromise all forms of privacy and are pro...

Access Control

license and registration please Access Control Systems govern how subjects and principals interac...

Advanced VLAN Configuration

i need a superhighway that destroys all the poor neighborhoods but instead it's a network ok so s...

Access Control Methods

now how exactly should i go about ensuring that employee's can't see the 15 terabytes of data i'v...

IEEE 802.1X

what if i just used a specific port and trusted everything on that 802.1X: Port-Based Network Acc...

Network Access Control

you better be able to trust your network administrators (i.e. pay them well) Network Access Contr...

Device Hardening

the device needs to be rock hard Hardening is basically making any device secure against tamperin...

Content Filtering

im so tired i can't do this anymore i can't think Content filtering can apply Application layer f...

Proxy Servers

A server that mediates the communications between a client and another server. Proxies often have...

Network Security Zones

separate but NOT equal mwahahahaha Effective placement of security appliances depends on segmenti...

IEEE 802.11ax

even bigger! even better! come on, let's go! never give up! Wifi 6 uses advanced modulation and s...

IEEE 802.11ac

i need bigger and better wifi NOW Wifi 5 only works in the 5 GHz band. 2.4 GHz support only works...

IEEE 802.11bg

the second wifi standard of all time (OAT). 802.11b uses the 2.4 GHz frequency band, and was the ...

IEEE 802.11n

this is a lot of yap for a wifi standard 802.11n increased bandwidth over it's predecessors by mu...

IEEE 802.11a

the first wifi standard of all time i think Wireless radios are configured to use a frequency ban...

Wireless Surveys

i need a map that dictates where all the ______ people are Range, interference, and signal streng...

Wireless Range and Signal Strength

signal jamming but instead it's wifi Wifi-enabled devices should have an indoor range of 100 feet...

Infrastructure Network

i am tired of taking notes let me out of here Wireless Access Points are configured to use a MAC ...

Band Steering

yes we need to shut down three lanes of traffic to fix this pothole Many Wifi access points have ...

Wifi Encryption Standards

lockdown! lockdown! this is a (maybe) drill! lockdown! lockdown! Wifi networks need to be configu...

Other Wireless Network Types

miscellaneous stuff The lesson sites two more types, ad hoc, mesh, and p2p. We kinda already know...

Wireless Network Attacks

grrr you have the three main attack vectors (yes im getting lazier and lazier with these notes, s...

Zero Trust Architecture

i can't trust any of you. all of you are fake. except you. i trust this one person. nobody else. ...

Merge all notes

You must manually set $VaultPath before you run the script. $AllFiles = Get-ChildItem -Path $Vaul...

Classless Interdomain Routing

what if i have four small ip addresses instead of one big overkill one Classless Interdomain Rout...

Network Broadcasts

there are a lot of ways to shout at people nodes unicast vs broadcast vs anycast vs multicast ...

IP Address Configuration

but what if i was special...? Each OS has their own way of setting up a static IP address for the...

IPv4 Header

packets are complicated kinda maybe somewhat Ethernet only runs at OSI Layer 1 and Layer 2, so it...

Data Encapsulation

network protocols define the shape of data being transmitted Network protocols have two main part...

IPv6 Broadcasting

yelling at nodes but in mandarin a foreign language now Unicast addressing in IPv6 also refers to...

IPv4 and IPv6 Crossplay

i need them both, but on a single network Most networks run both IPv4 and IPv6 in some or all seg...

Routing Tables

what if i had a gps but for packets >:) Most hosts on a network don't have the necessary capabili...

Dynamic Routing Protocols

i need multiple gps apps for some reason Dynamic routing protocols implement algorithms that use ...

SOHO Networks

how home network routers work Every home has a SOHO router provided by an ISP that links the LAN ...

The OSI Model

the International Organization for Standardization came together one day The official documentat...

Star Topology

everyone knows the plug, but not everyone else Star Topology is used most commonly in small LAN n...

Network Types

how big? how wide? where? Network sizes are determined by the number of connected hosts, while it...

Network Topology

physical layout vs logical layout Physical topology refers to the placement of nodes and what typ...

DNS Server Configuration

grr i have four different gps apps again DNS is very very very very very very very∞ important to ...

Voice and Video Services

i need to watch my employees work from my beach chair in hawaii We love our telecommunications st...

Network Services

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa I need a lot of services for m...

Database Services

IM NOT A BIG FAN OF SQL (30 on 30) We love databases. It allows us to interact with and manage la...

Fault Tolerance and Redundancy

i need more numbers Mean Time Between Failures - expected lifetime of an asset. (total operation ...

Disaster Recovery Sites

i need several popeyes locations in the hood in case one gets shut down A Disaster Recovery Plan ...

Disaster Recovery Metrics

i need a number that tells me how good we are at not imploding We love a number that directly st...

Wireless Roaming

i wanna walk around my house with epic amounts of internet Clients can roam around an ESA using ...

Encryption Key Management

The operational considerations for the various stages in the lifecycle of an encryption key or ke...