CompTIA Network+ Training Course Training 課程
  Facebook: CompTIA Network+ Training Course Training 課程
 
CompTIA Network+ Training Course Training 課程
CompTIA Network+ Training Course Training 課程 CompTIA Network+ Training Course Training 課程 CompTIA Network+ Training Course Training 課程 CompTIA Network+ Training Course Training 課程 CompTIA Network+ Training Course Training 課程 CompTIA Network+ Training Course Training 課程 CompTIA Network+ Training Course Training 課程 CompTIA Network+ Training Course Training 課程 CompTIA Network+ Training Course Training 課程 CompTIA Network+ Training Course Training 課程 CompTIA Network+ Training Course Training 課程  
CompTIA Network+ Training Course Training 課程 CompTIA Network+ Training Course Training 課程

想定期知道最新課程及優惠嗎?
免費訂閱本中心的課程通訊!

課堂錄影隨時睇 10 大優點之視像清晰:使用 LCD 闊螢幕來播放視像,可同時清楚觀看導師動作表情、白板上的圖畫文字、全螢幕的電腦實習畫面!

CompTIA Network+ 國際認可證書課程
課程簡稱:CompTIA Network+ Training Course

  • 課程時間
  • 課程簡介
  • 課程特點
  • 認證要求
  • 考試須知
  • 課程內容

傳統服務:課程上堂時間表 (地點:旺角   總費用:$4,260)
學員使用電話或本網頁報名,待本中心確認已為學員留位後,即可使用 轉數快 繳付學費,過程簡便!

超震撼: 凡於 2022年 7月 8日 (五) 或之前報讀本課程,
原價 $5,325,現只需
$4,260!

編號 日期 (dd/mm) 星期 時間 費用 導師  
UE0870A1 第 1 部份課程:  07/08 - 04/09
7/8, 14/8, 21/8, 28/8, 4/9
 下載詳細上課日期
10:30am - 1:30pm $2,130 Larry 按此報名:CompTIA Network+ Training Course Training 課程
UE0870A2 第 2 部份課程:  18/09 - 16/10
18/9, 25/9, 2/10, 9/10, 16/10
 下載詳細上課日期
10:30am - 1:30pm $2,130 Larry 按此報名:CompTIA Network+ Training Course Training 課程
* 各政府部門可使用 P Card 付款  
如使用 P Card 繳付考試費,考試費需另加 1.3% 附加費  

*** 質素保證: 免費於任何地點試睇首 3 小時課堂錄影,從而可預先了解導師及教材的質素,才報讀課程來上堂。***
請致電與本中心職員預約。 查看各地點電話
旺角 2332-6544
觀塘 3563-8425
北角 3580-1893
沙田 2151-9360
屯門 3523-1560

免費補堂: 學員可於任何地點補看課堂錄影,從而可銜接往後的課堂!
免費重讀: 學員可於課程結束後三個月內於任何地點不限次數地重看課堂錄影,從而可反覆重溫整個課程!
課時: 30 小時
課堂導師: Larry (任教課程清單)

傳統服務的免費補堂或免費重讀,若選擇旺角或觀塘的閒日星期一至四,便需於 6:30p.m. 或之前完成觀看課堂錄影。

地區 地址 電話 教育局註冊編號
旺角 九龍旺角亞皆老街 109 號,皆旺商業大廈 18 樓 1802 - 1807 室 2332-6544 533459
觀塘 九龍觀塘成業街 7 號寧晉中心 12 樓 G2 室 3563-8425 588571
北角 香港北角馬寶道 41-47 號華寶商業大廈 3 樓 01-02 號舖 3580-1893 591262
沙田 新界沙田石門安群街 3 號京瑞廣場 1 期 10 樓 M 室 2151-9360 604488
屯門 新界屯門屯喜路 2 號屯門柏麗廣場 17 樓 1708 室 3523-1560 592552
注意! 客戶必須查問報讀學校的教育局註冊編號,以確認該校為註冊學校,以免蒙受不必要的損失!


CompTIA (The Computing Technology Industry Association) 於 1982 年成立,其推行的 Network+ 認證是一套中立的 (Vendor Neutral) 國際認證,目的是要確認您擁有建立、管理、保護與優化網絡的能力。


CompTIA

為何要考取 CompTIA Network+ 認證?

  • 因其中立的特性,通常成為 I.T. 專業人士首先考取的認證。

  • 全球 50 萬人持有,反映其受歡迎程度。

  • 根據美國勞工統計局 (Bureau of Labor Statistics) 的分析,網絡管理人員的需求將於 2012 至 2022 年間提升 12%。

  • 領先而中立的認證,會被全球各地的國際級機構重視,並被設定為必要的入職條件。例如 Dell、HP、Ricoh、Sharp、Xerox 及 Apple Consultant Network 技術人員便必需持有 CompTIA Network+ 認證。

  • 為進修 Cisco、Microsoft、Oracle、IBM 等等更高級的商業認證作準備。

  • “Network+ provides a solid foundation for networking professionals to pursue vendor-specific certifications such as the Cisco CCNA” - By Cisco.


課程名稱: CompTIA Network+ 國際認可證書課程
- 簡稱:CompTIA Network+ Training Course
課程時數: 合共 30 小時 (共 10 堂),共 1 科
適合人士: 有志投身 I.T. 界的人士
授課語言: 以廣東話為主,輔以英語
課程筆記: 本中心導師親自編寫英文為主筆記,而部份英文字附有中文對照。

1. 模擬考試題目: 本中心為學員提供模擬考試題目,每條考試題目均附有標準答案。
2. 時數適中: 本中心的 CompTIA Network+ 國際認可證書課程時數適中,有 30 小時。令學員能真正了解及掌握課程內容,而又能於 3 個月內考獲 CompTIA Network+ 國際認可證書。
3. Larry Chan 親自教授: Larry 具備了 26 年以上電腦、網絡、數據庫及保安系統的工作經驗,而最近 22 年更於本中心全職教學。
4. Larry Chan 親身編寫筆記: Larry 親自編寫筆記,絕對適合考試及實際管理網路之用,令你無須「死鋤」如字典般厚及不適合香港讀書格調的書本。
5. 一人一機上課: 本課程以一人一機模式上課。
6. 免費重讀: 傳統課堂學員可於課程結束後三個月內免費重看課堂錄影。

CompTIA 已公佈考生必須通過以下 1 個 CompTIA Network+ 相關科目的考試,便可獲發 CompTIA Network+ 國際認可證書:

考試編號 科目名稱
N10-008 CompTIA Network+




本中心為 CompTIA 指定的考試試場。報考時請致電本中心,登記欲報考之科目、考試日期及時間 (最快可即日報考)。臨考試前考生須出示身份證及繳付考試費。

考試編號 N10-008 考試費為 HK$2,854。

考試題目由澳洲考試中心傳送到你要應考的電腦,考試時以電腦作答。所有考試題目均為英文,而大多數的考試題目為選擇題。作答完成後會立即出現你的分數,結果即考即知!考試不合格便可重新報考,不限次數。欲知道作答時間、題目總數、合格分數等詳細考試資料,可瀏覽本中心網頁
"各科考試分數資料"。





課程名稱:CompTIA Network+ 國際認可證書課程
- 簡稱:CompTIA Network+ Training Course

N10-008 CompTIA Network+ (30 Hours)

Network Technologies, Topologies, and Types

  • Wired and Wireless Network Topologies
    • Bus Topology
    • Ring Topology
    • Star Topology (Hub-and-Spoke)
    • Mesh Topology
    • Hybrid Topology
    • Bringing Wireless to a Topology
    • Infrastructure Wireless Topology
    • Ad Hoc Wireless Topology
    • Wireless Mesh Topology
  • Network Types and Characteristics
    • To Server or Not
    • LANs
    • WLANs
    • WANs
    • MANs
    • CANs
    • SANs
    • PANs
    • SDWANs
    • MPLS
    • mGRE
  • Network Links and Concepts
    • DSL Internet Access
    • Cable Broadband
    • The Public Switched Telephone Network
    • Leased Lines
    • T3 Lines
    • Metro-Optical
    • Satellite Internet Access
    • Termination Points
    • Demarc, Demarc Extension, and Smart Jacks
    • CSUs/DSUs
    • Verify Wiring Installation and Termination
    • Virtual Networking

Models, Ports, Protocols, and Network Services

  • The OSI Networking Model
    • The OSI Seven-Layer Model
    • Physical Layer (Layer 1)
    • Data Link Layer (Layer 2)
    • Network Layer (Layer 3)
    • Transport Layer (Layer 4)
    • Session Layer (Layer 5)
    • Presentation Layer (Layer 6)
    • Application Layer (Layer 7)
    • OSI Model Summary
    • Comparing OSI to the Four-Layer TCP/IP Model
    • Identifying the OSI Layers at Which Various Network Components
    • Operate
    • Data Encapsulation/Decapsulation and OSI
  • Ports and Protocols
    • Connection-Oriented Protocols Versus Connectionless Protocols
    • Internet Protocol
    • Transmission Control Protocol
    • How TCP Works
    • User Datagram Protocol
    • Internet Control Message Protocol
    • IPSec
    • Generic Routing Encapsulation
    • File Transfer Protocol
    • Secure Shell
    • Secure File Transfer Protocol
    • Telnet
    • Simple Mail Transfer Protocol
    • Domain Name System (DNS)
    • Dynamic Host Configuration Protocol (DHCP)
    • Trivial File Transfer Protocol
    • Hypertext Transfer Protocol
    • Network Time Protocol (NTP)
    • Post Office Protocol Version 3/Internet Message Access Protocol
    • Version 4
    • Simple Network Management Protocol
    • Components of SNMP
    • SNMP Management Systems
    • SNMP Agents
    • Management Information Bases
    • SNMP Communities
    • SNMPv3
    • Lightweight Directory Access Protocol
    • Hypertext Transfer Protocol Secure
    • Server Message Block
    • Syslog
    • SMTP TLS
    • LDAPS
    • IMAP over SSL
    • POP3 over SSL
    • SQL, SQLnet, and MySQL
    • Remote Desktop Protocol
    • Session Initiation Protocol
    • Understanding Port Functions
    • Network Services
    • Domain Name Service (DNS)
    • The DNS Namespace
    • Types of DNS Entries
    • DNS Records
    • DNS in a Practical Implementation
    • Dynamic Host Configuration Protocol
    • The DHCP Process
    • DHCP and DNS Suffixes
    • DHCP Relays and IP Helpers
    • Network Time Protocol

Addressing, Routing, and Switching

  • IP Addressing
    • IPv4
    • IP Address Classes
    • Subnet Mask Assignment
    • Subnetting
    • Identifying the Differences Between IPv4 Public and Private
    • Networks
    • Private Address Ranges
    • Classless Interdomain Routing
    • Default Gateways
    • Virtual IP
    • IPv4 Address Types
    • Unicast Address
    • Broadcast Address
    • Multicast
    • IPv6 Addressing
    • Where Have All the IPv4 Addresses Gone?
    • Identifying IPv6 Addresses
    • IPv6 Address Types
    • Global Unicast Addresses
    • Link-Local Addresses
    • Site-Local Addresses
    • Neighbor Discovery
    • Comparing IPv4 and IPv6 Addressing
    • Assigning IP Addresses
    • Static Addressing
    • Dynamic Addressing
    • BOOT Protocol (BOOTP)
    • Automatic Private IP Addressing
    • Identifying MAC Addresses
    • NAT and PAT
    • NAT
    • PAT
    • SNAT
    • DNAT
  • Managing Routing and Switching
    • The Default Gateway
    • Routing Tables
    • Static Routing
    • Default Route
    • Switching Methods
    • Packet Switching
    • Circuit Switching
    • Comparing Switching Methods
    • Dynamic Routing
    • Distance-Vector Routing
    • Link-State Routing
    • Hybrid Routing Protocols
    • Network Traffic
    • Routing Metrics
    • Virtual Local-Area Networks
    • VLAN Membership
    • VLAN Segmentation
    • The Spanning Tree Protocol
    • Interface Configuration and Switch Management
    • MDI-X
    • Trunking
    • Port Mirroring
    • Port Authentication
    • Power over Ethernet (PoE and PoE+)
    • MAC Address Table
    • Switch Management
    • Managed and Unmanaged
    • Quality of Service
    • Traffic Shaping
    • Access Control Lists
    • ARP and RAR

Network Implementations

  • Common Networking Devices
    • Firewall
    • IDS/IPS
    • Router
    • Switch
    • Hub and Switch Cabling
    • Multilayer Switch
    • Hub
    • Bridge
    • DSL and Cable Modems
    • Access Point
    • Media Converter
    • Voice Gateway
    • Repeater
    • Wireless LAN Controller
    • Load Balancer
    • Proxy Server
    • VPN Concentrators and Headends
    • Networked Devices
  • Networking Architecture
    • Three-Tiered Architecture
    • Core Layer
    • Distribution/Aggregation Layer
    • Access/Edge Layer
    • Software-Defined Networking
    • Application Layer
    • Control Layer
    • Infrastructure Layer
    • Management Plane
    • Spine and Leaf
    • Traffic Flows
    • Datacenter Location Types
    • Storage-Area Networks
    • iSCSI
    • Fibre Channel and FCoE
    • Network-Attached Storag

Cabling Solutions and Issues

  • General Media Considerations
    • Broadband Versus Baseband Transmissions
    • Simplex, Half-Duplex, and Full-Duplex Modes
    • Data Transmission Rates
    • Types of Network Media
    • Twisted-Pair Cabling (Copper)
    • Coaxial Cables
    • Twinaxial Cables
    • Fiber-Optic Cables
    • Plenum Versus PVC Cables
    • Types of Media Connectors
    • BNC Connectors
    • RJ-11 Connectors
    • RJ-45 Connectors
    • F-Type Connectors and RG-59 and RG-6 Cables
    • Fiber Connectors
    • Transceivers
    • Media Couplers/Converters
    • TIA/EIA 568A and 568B Wiring Standards
    • Straight-Through Versus Crossover Cables
    • Rollover and Loopback Cables
    • Components of Wiring Distribution
    • Network Cross-Connects
    • Horizontal Cabling
    • Vertical Cables
    • Patch Panels
    • Fiber Distribution Panels
    • 66 and 110 Blocks (T568A, T568B)
    • MDF and IDF Wiring Closets
    • Ethernet Copper and Fiber Standards
    • 10BASE-T
    • 100BASE-TX
    • 1000BASE-T
    • 10GBASE-T
    • 40GBASE-T
    • 1000BASE-LX and 1000BASE-SX
    • 10GBASE-LR and 10GBASE-SR
    • Multiplexing Options
  • Troubleshooting Common Cable Connectivity Issues
  • Limitations, Considerations, and Issues
    • Throughput, Speed, and Distance
    • Cabling Specifications/Limitations
    • Cabling Considerations
    • Cabling Applications
    • Attenuation and dB Loss
    • Interference
    • Incorrect Pinout
    • Bad Ports
    • Open/Short
    • LED Status Indicators
    • Incorrect Transceivers
    • Duplexing Issues
    • TX/RX Reversed
    • Dirty Optical Cables
  • Common Tools
    • Cable Crimpers, Strippers, and Snips/Cutters
    • Punchdown Tools
    • Tone Generator
    • Loopback Adapter
    • OTDR
    • Multimeter
    • Cable Tester
    • Wire Map
    • Tap
    • Fusion Splicer
    • Spectrum Analyzer
    • Fiber Light Meter

Wireless Solutions and Issues

  • Understanding Wireless Basics
    • Wireless Channels and Frequencies
    • Cellular Technology Access
    • Speed, Distance, and Bandwidth
    • Channel Bonding
    • MIMO/MU-MIMO/Directional/Omnidirectional
    • Antenna Ratings
    • Antenna Coverage
    • Establishing Communications Between Wireless Devices
    • Configuring the Wireless Connection
  • Troubleshooting Wireless Issues
    • Site Surveys
    • Factors Affecting Wireless Signals
    • Interference
    • Reflection, Refraction, and Absorption
    • Troubleshooting AP Coverage

Cloud Computing Concepts and Options

  • Cloud Concepts
    • Service Models
    • Software as a Service
    • Platform as a Service
    • Infrastructure as a Service
    • Desktop as a Service
    • Deployment Models
    • Private Cloud
    • Public Cloud
    • Hybrid and Community Clouds
    • Infrastructure as Code
    • Connectivity Options
    • Multitenancy
    • Elasticity
    • Scalability
    • Security Implications
    • The Relationship Between Resources

Network Operations

  • Organizational Documents and Policies
    • Wiring and Port Locations
    • Troubleshooting Using Wiring Schematics
    • Physical and Logical Network Diagrams
    • Baseline Configurations
    • Policies, Procedures, Configurations, and Regulations
    • Policies
    • Password-Related Policies
    • Procedures
    • Change Management Documentation
    • Configuration Documentation
    • Regulations
    • Labeling
  • High Availability and Disaster Recovery
    • Backups
    • Full Backups
    • Differential Backups
    • Incremental Backups
    • Snapshots
    • Backup Best Practices
    • Using Uninterruptible Power Supplies
    • Why Use a UPS?
    • Power Threats
    • Beyond the UPS
    • Cold, Warm, Hot, and Cloud Sites
    • High Availability and Recovery Concepts
    • Active-Active Versus Active-Passive
  • Monitoring Network Performance
    • Common Performance Metrics
    • SNMP Monitors
    • Management Information Base (MIB)
    • Network Performance, Load, and Stress Testing
    • Performance Tests
    • Load Tests and Send/Receive Traffic
    • Stress Tests
    • Performance Metrics
    • Network Device Logs
    • Security Logs
    • Application Log
    • System Logs
    • History Logs
    • Log Management
    • Patch Management
    • Environmental Factors

Network Security

  • Common Security Concepts
    • Access Control
    • Mandatory Access Control
    • Discretionary Access Control
    • Rule-Based Access Control
    • Role-Based Access Control
    • Defense in Depth
    • Network Segmentation
    • Screened Subnet
    • Separation of Duties
    • Honeypots
    • RADIUS and TACACS+
    • Kerberos Authentication
    • Local Authentication
    • Lightweight Directory Access Protocol
    • Using Certificates
    • Auditing and Logging
    • Multifactor Authentication Factors
    • Additional Access Control Methods
    • 802.1X
    • Extensible Authentication Protocol (EAP)
    • Network Access Control (NAC)
    • MAC Filtering
    • Risk Management
    • Penetration Testing
    • Security Information and Event Management
  • Common Networking Attacks
    • Denial-of-Service and Distributed Denial-of-Service Attacks
    • Types of DoS Attacks
    • Other Common Attacks
    • Social Engineering
    • Logic Bomb
    • Rogue DHCP
    • Rogue Access Points and Evil Twins
    • Advertising Wireless Weaknesses
    • Phishing
    • Ransomware
    • DNS Poisoning
    • ARP Cache Poisoning
    • Spoofing
    • Deauthentication
    • Brute Force
    • On-Path Attack
    • VLAN Hopping
    • ARP Spoofing
    • Vulnerabilities and Prevention
  • Network Hardening and Physical Security
    • Disposing of Assets
    • Implementing Physical Security
    • Lock and Key
    • Swipe Card and PIN Access
    • Biometrics
    • Two-Factor and Multifactor Authentication
    • Secured Versus Unsecured Protocols
    • Hardening Best Practices
    • Wireless Security
    • MAC Filtering
    • Antenna Placement and Power Levels
    • Isolation
    • Pre-shared Keys
    • Geofencing
    • Captive Portal
    • IoT Access Considerations
  • Remote-Access Methods
    • Remote File Access
    • VPNs
    • Components of the VPN Connection
    • VPN Connection Types
    • VPN Pros and Cons
    • IPSec
    • SSL/TLS/DTLS
    • Site-to-Site and Client-to-Site
    • Virtual Desktops
    • HTTPS/Management URL
    • Authentication and Authorization Considerations
    • Out-of-Band Management

Network Troubleshooting

  • Troubleshooting Steps and Procedures
    • Identify the Problem
    • Identify Symptoms
    • Determine Whether Anything Has Changed
    • Duplicate the Problem if Possible
    • Approach Multiple Problems Individually
    • Establish a Theory of Probable Cause
    • Test the Theory to Determine the Cause
    • Establish a Plan of Action
    • Implement the Solution or Escalate
    • Determine Whether Escalation Is Necessary
    • Verify Full System Functionality
    • Document Findings, Actions, Outcomes, and Lessons
  • Software Troubleshooting Tools
    • Wi-Fi Analyzer
    • Protocol Analyzer
    • Bandwidth Speed Tester
    • Port Scanner
    • iperf
    • NetFlow Analyzer
    • TFTP Server
    • Terminal Emulator
    • IP Scanner
    • Command-Line Tools
    • The Trace Route Utility (tracert/traceroute)
    • ping
    • The Destination Host Unreachable Message
    • The Request Timed Out Message
    • The Unknown Host Message
    • The Expired TTL Message
    • Troubleshooting with ping
    • hostname
    • ARP
    • arp ping
    • The netstat Command
    • netstat -e
    • netstat -a
    • netstat -r
    • netstat -s
    • telnet
    • ipconfig
    • ifconfig
    • nslookup
    • dig
    • The tcpdump Command
    • The route Utility
    • nmap
    • Basic Network Platform Commands
  • Troubleshooting General Networking Issues
    • Common Considerations
    • Common Problems to Be Aware Of
    • Collisions
    • Broadcast Storm
    • Multicast Flooding
    • Asymmetrical Routing
    • Switching Loops
    • Routing Loops
    • Missing Route
    • Low Optical Link Budget
    • Incorrect VLAN
    • DNS Issues
    • Incorrect Gateway
    • Incorrect Subnet Mask
    • Duplicate or Incorrect IP Address
    • Duplicate MAC Addresses
    • Expired IP Address
    • Rogue DHCP Server
    • Certificate Issues
    • NTP Issues/Incorrect Time
    • DHCP Scope Exhaustion
    • Blocked Ports, Services, or Addresses
    • Incorrect Firewall Settings
    • Incorrect ACL Settings
    • Unresponsive Service
    • BYOD Challenges
    • Licensed Feature Issues
    • Hardware Failure
    • Network Performance Issues

The course content above may change at any time without notice in order to better reflect the contents of examination.


 

更多綜合課程
  攝影課程
  • 攝影初級
  • 攝影中級 (風景專題)
  英文課程
  • IPA 拼音:級別 1 2 3 4
  普通話課程
  • 基礎普通話拼音 (免費)
  • 進階普通話拼音
  • 普通話會話:級別 1 2 3
  西班牙語文課程
  • 級別 1 2 3
  中醫課程
  • 濕疹與皮膚敏感病
  • 暗瘡與色斑 | 鼻敏感與感冒
  • 脫髮與白髮 | 從五官看健康
  風水命理課程
  • 紫微斗數:級別 1 2 3
  • 子平八字:級別 1 2 3
  • 八字風水:級別 1 2 3
  • 奇門遁甲:級別 1 2 3