CompTIA Network+ Domain 1: Networking Concepts

Introduction

The CompTIA Network+ certification can help launch your career to the next level and is a strong professional asset to have on your side. To earn this certification, you are required to earn a passing score on the Network+ certification exam.

This exam is composed of five different Domains of knowledge that certification candidates will need to master. This article will detail Domain 1.0 — Networking Concepts, complete with its different objectives and what you will need to cover. This article should not serve as your sole means of preparing for the Network+ certification exam, but rather as a general review or an outline foundation.

Networking Concepts Outline

The following objectives can be expected to be tested in the Network Concepts section of the Network+ exam:

  • 1.1 Ports and protocols — their purposes and uses
  • 1.2 Devices, applications, services and protocols at appropriate OSI layers
  • 1.3 Concepts and characteristics of switching and routing
  • 1.4 Scenario-specific configuration of appropriate IP addressing components
  • 1.5 Comparing and contrasting characteristics of network topologies, technologies and types
  • 1.6 Scenario-specific implementation and configuration of appropriate wireless technologies
  • 1.7 Cloud concepts
  • 1.8 Functions of network services

1.1 Ports and Protocols — Their Purposes and Uses

Knowing the meaning of the seemingly countless acronyms in Networking Concepts is only the beginning. Candidates are expected to fully understand the purpose and use of all ports and protocols covered.

Protocol Types

This objective covers the types of protocols most commonly encountered — you will be expected to understand their different uses. Types covered include:

  • ICMP
  • TCP
  • UDP
  • IP

Protocols and Ports

The meat of this objective is really in this subtopic. Protocols and their related ports covered include:

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Greg Belding. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/8Fyg_K1EXk0/