Course Overview

Ch 1: Introduction

This chapter introduces the TestOut Network Pro course. It discusses the basics of the TestOut Network Pro and the CompTIA Network+ certifications. 

Ch 2: Networking Basics

This chapter introduces the OSI model along with terms and acronyms the student should be familiar with before proceeding. Students are taught about the three-way handshake, and network ports and protocols that will be elaborated on in later chapters.  

Ch 3: Networking Cabling and Hardware Devices

This chapter discusses both copper and fiber cabling, and the differences between the two. Students are also taught about network devices including routers and switches, and how to install those devices in both a home and a data center.

Ch 4: Network Addressing and Services

Chapter 4 introduces IP addresses (both IPv4 and IPv6) and subnetting networks. It teaches students about Dynamic Host Configuration Protocol (DHCP) and Doman Name Services (DNS).

Ch 5: Ethernet

Students will learn about networking architecture and connecting devices to each other. This chapter also discusses new ethernet standards, and teaches the basics of troubleshooting network connectivity.  

Ch 6: Firewalls and Intrusion Detection

This chapter covers enabling and configuring firewalls in both Windows and Linux. Students are taught about both threat management and security appliances to help monitor network traffic for intrusion detection and block unwanted traffic on your network.

Ch 7: Switching and Routing

Go in-depth with managing switches. This chapter also introduces students to Virtual Local Area Networks (VLANs). Students are taught about Power Over Ethernet (PoE), Quality of Service (QoS), and Network Address Translation (NAT).

Ch 8: Specialized Networks

This chapter covers configuring Software Defined Networking (SDN) and Voice over IP (VOIP), and discusses virtual networking both on-premise and in the cloud. It discusses the Internet of Things (IoT), and their increasing prevalence in the industry.

Ch 9: Wireless Networking

Students are introduced to wireless architecture, infrastructure and new standards, designing and implementing both enterprise and home networking wireless equipment.

Ch 10: Wide Area Networks (WANs)

Students will learn about Wide Area Networks (WANs), connecting networks that are in different geographic locations. Students will implement and support Virtual Private Networks (VPNs) for employees that work from home, or on the road.

Ch 11: Network Operations and Management

Monitor your networks with Simple Network Management Protocol (SNMP), and configure logging on routers, switches, network appliances and other hardware to quickly and accurately troubleshoot issues with your network.  

Ch 12: Network Security

Learn networking security concepts, and learn about cybersecurity attacks and implementing countermeasures to keep your network secure from spoofing, man-in-the-middle, and poisoning DNS, among other common networking hacks.

Ch 13: Hardening and Update Management

Harden your authentication methods, and configure account policies to keep unwanted people out of your network. Configure update servers, update firmware, and deploy updates to keep your network up-to-date and repel attacks that target out-of-date software.  

Ch 14: Network Optimization and Troubleshooting

Learn about troubleshooting your network using different tools and techniques from industry professionals including Wireshark, Zenmap, and command line troubleshooting utilities.

Ch 2: Networking Basics

Networking Overview

  • Introduction to Networking
  • Network Types
  • Networking Terms
  • Network Topologies

OSI Model and Data Encapsulation

  • The OSI Model
  • OSI Model Layers
  • OSI Model Communications

Data Encapsulation

  • Data Encapsulation
  • Address Resolution Protocol (ARP)
  • Packets and Frames
  • Network Communication Process
  • Three-Way Handshake and TCP Flags

Network Protocols

  • TCP/IP Protocols
  • Common Network Services
  • Exploring Network Services
  • Network Port and Protocol
  • Common Ports

Ch 3: Networking Cabling and Hardware Devices

Copper Cables and Connectors

  • Twisted Pair
  • Ethernet Network
  • Coaxial Cables

Fiber Optic Cables and Connectors

  • Fiber Optic

Wiring Implementation

  • Twisted-Pair Cable Construction
  • Wiring Distribution
  • Punchdown Blocks
  • Wiring Distribution
  • Patching Panel Cables

Troubleshoot Network Media

  • Troubleshooting Copper Wiring Issues
  • Troubleshooting Fiber Optic Wiring Issues
  • Troubleshooting Tools

Network Adapters

  • Network Adapters
  • Media Converter

Networking Devices

  • Networking Devices
  • Switch Installation
  • Internetwork Devices
  • Router Configuration
  • Data Center Device Installation

Ch 4: Network Addressing and Services

IP Addressing

  • Numbering Systems
  • IP Addresses
  • Subnets
  • IP Address Assignment
  • IP Settings on Workstation
  • Configuring IP Addresses

APIPA and Alternate Addressing

  • APIPA Overview
  • Alternate Addressing


  • DHCP Overview
  • DHCP Server
  • DHCP Options
  • DHCP Exclusions
  • DHCP Client Reservations
  • Client Addressing
  • DHCP Exhaustion

DHCP Relay

  • DHCP Relay Overview
  • DHCP Relay
  • DHCP Relay Agent
  • DHCP Server on Another Subnet


  • DNS Overview
  • DNS Configuration
  • DNS Addresses
  • Standard DNS Zones
  • Host Records
  • CNAME Records
  • DNS Records
  • DNS Caching on Linux


  • NTP Overview
  • NTP Configuration

IP Version 6

  • IP Version 6 Overview
  • IPv4 to IPv6 Migration
  • IPv6 Address Assignment
  • IPv6 Addresses
  • DHCP6 Server


  • Multicast Basics

Troubleshoot IP Configuration Issues

  • IP Configuration Troubleshooting
  • The ipconfig Command
  • The ip Command
  • Ipconfig Utility Facts
  • IP Configuration Troubleshooting

Troubleshoot IP Communications

  • Network Communication Troubleshooting
  • The ping and tracert Command
  • The arp and netstat Command

Troubleshoot DNS

  • DNS Troubleshooting
  • Examining DNS Attacks
  • The nslookup Command
  • The dig Command
  • The nslookup Command

Ch 5: Ethernet


  • Ethernet Architecture
  • Ethernet Specifications
  • Ethernet Network

Connect Network Devices

  • Device Connection
  • Connecting Network Devices

Troubleshoot Physical Connectivity

  • Troubleshooting Physical Network Topology
  • Troubleshooting the Link Status
  • Exploring Physical Connectivity
  • Troubleshooting Physical Connectivity

Ch 6: Firewalls and Intrusion Detection


  • Firewalls
  • Firewall Types
  • Windows Firewall
  • Linux Firewall
  • Host Firewall

Firewall Design and Implementation

  • Unified Threat Management (UTM) Appliances
  • Firewall Network Design Principles
  • Security Appliance
  • Network Security Appliance Access
  • Firewall Rules
  • Perimeter Firewall
  • Firewall ACLs
  • Proxy Server

Screened Subnets (DMZ)

  • Screened Subnets Overview
  • Configuring a Screened Subnet

Intrusion Detection and Prevention

  • Intrusion Detection and Prevention Overview
  • Implementing Intrusion Detection and Prevention

Ch 7: Switching and Routing


  • Switch Features
  • Switch Access
  • Securing a Switch
  • Cisco IoS Basics

Basic Switch Configuration

  • VLAN Overview
  • Switch IP and VLAN
  • Creating VLANs
  • Switch IP Settings
  • Management VLAN Settings

Switch Ports

  • Switch Port Configurations
  • Trunking
  • Port Aggregation
  • Jumbo Frame Support
  • Switch Port Features
  • Port Mirroring
  • PoE
  • Spanning Tree

Switch Security

  • Securing Network Switches
  • Switch Attacks
  • Disabling Switch Ports
  • Hardening a Switch


  • Routing Overview
  • Routing Protocol Characteristics
  • Routing High Availability
  • Configure QoS

Network Address Translation

  • Network Address Translation (NAT)
  • Configuring NAT

Switching and Routing Troubleshooting

  • Switching and Routing Troubleshooting Overview
  • Troubleshooting Switching
  • Troubleshooting Routing

Ch 8: Specialized Networks

Corporate and Datacenter Networks

  • Storage Area Networks (SAN)
  • iSCSI Target
  • iSCSI Initiator
  • Software-defined Networking

Voice over IP (VoIP)

  • Voice over IP Overview
  • Connecting VoIP
  • VoIP Server
  • VoIP Phone


  • Virtualization Overview
  • Virtual Machine

Virtual Networking

  • Virtual Networking Implementations
  • Virtual Network Devices

Cloud Concepts and Connectivity

  • Cloud Models
  • Cloud Delivery Methods
  • Virtual Private Networks
  • IPsec Virtual Private Networks

Internet of Things (IoT)

  • Internet of Things
  • Smart Devices
  • IoT Security Challenges
  • Scanning for IoT Devices

Ch 9: Wireless Networking

Wireless Concepts and Standards

  • Radio Frequency Wireless
  • Wireless Architecture
  • Wireless Infrastructure Facts
  • Wireless Standards

Wireless Configuration

  • Wireless Network Configuration
  • Wireless Configuration Tasks
  • Configuring Wireless Client
  • Home Wireless Network
  • Configuring Wireless Profiles

Wireless Network Design

  • Wireless Network Design                      
  • Site Survey
  • Wireless Antenna Types
  • Wireless Network Design
  • Wireless Site Survey Facts
  • Design an Indoor Wireless Network
  • Design an Outdoor Wireless Network

Wireless Network Implementation

  • Enterprise Wireless Equipment
  • Implement and Configure Enterprise Wireless Networks

Wireless Security

  • Wireless Attacks
  • Secure a Wireless Network
  • Secure an Enterprise Wireless Network
  • Enable Wireless Intrusion Prevention
  • Configuring a Captive Portal
  • Creating a Guest Network for BYOD
  • Configure a Secure Email Account on Mobile Device

Wireless Troubleshooting

  • Wireless Communications Troubleshooting
  • Optimize a Wireless Network
  • Explore Wireless Network Problems

Ch 10: Wide Area Networks

WAN Concepts

  • WAN Concepts

Internet Connectivity

  • Traditional Internet Connectivity
  • Mobile Internet Connectivity
  • Internet Services
  • Connect to a DSL Network

Remote Access

  • Remote Access
  • Configuring a RADIUS Solution

Virtual Private Networks

  • Virtual Private Networks
  • Configuring a VPN Server
  • Configuring a VPN Client
  • Configure a VPN Connection iPad
  • VPN Protocol

Ch 11: Network Operations and Management

Performance Metrics

  • Performance Metrics

Network Management with SNMP

  • Network Management with SNMP
  • Configure an SNMP System on a Router
  • Monitor Switch with SNMP
  • Configure SNMP Trap
  • SNMP Facts

Log File Management

  • Log File Management
  • Configure a Syslog Server on a Router
  • Configuring Remote Logging on Linux
  • Logging Events on pfSense
  • Log File Management
  • Configure Logging on pfSense
  • Auditing Device Logs on a Cisco Switch


  • Network Monitoring
  • Protocol Analyzers
  • View Event Logs
  • Use Wireshark to Sniff Traffic
  • Monitor Utilization
  • Monitor Interface Statistics
  • Configure Netflow on pfSense
  • Monitor Throughput with iperf
  • Network Monitoring
  • Environmental Monitoring

Organization Policies

  • Plans and Procedures
  • Security Policies
  • Documentation and Agreements

Redundancy and High Availability

  • High Availability
  • Redundancy Solutions
  • Redundancy and High Availability
  • Power Management
  • Configure UPS Settings
  • Hardware Clustering
  • Set Up NIC Teaming
  • Configure NIC Teaming
  • Configure Linux Network Bonding
  • NIC Teaming
  • Configure a Load Balancing Server

Data Backup and Storage

  • Data Backups
  • Backup Storage Options
  • Data Backup and Storage
  • Configure a NAS for Data Backups
  • Implementing File Backups
  • Back Up Files with File History
  • Recover Files
  • Recover a File from File History

Remote Management

  • Remote Management
  • Use Remote Desktop
  • Allow Remote Desktop Connections
  • Remote Management

Ch 12: Network Security

Security Concepts

  • Security Concepts
  • Configure Permissions
  • Secure Protocols
  • Scan for Unsecure Protocols
  • Secure Protocols
  • Defense in Depth
  • Configure a Honeypot

Risk Management

  • Risk Management
  • Penetration Testing
  • Security Information and Event Management
  • Vulnerability Assessment

Physical Security

  • Physical Security
  • Implementing Physical Security

Social Engineering

  • Social Engineering
  • Use the Social Engineer Toolkit
  • Investigating a Social Engineering Attack
  • Responding to Social Engineering Exploits

Network Threats and Attacks

  • Malware
  • Denial of Service (DoS) (6:33)
  • Launch a DoS and DDoS Attack (5:44)
  • Password Attacks (7:26)
  • Crack Passwords (8:03)
  • Crack Password Protected Files (3:22)
  • Crack a Password with John the Ripper

Spoofing Attacks

  • Session and Spoofing Attacks
  • Poison ARP
  • Poison DNS
  • Use SMAC to Spoof MAC Addresses
  • Perform a On-Path DHCP Attack
  • Detect a Rogue DHCP Server
  • Set Up DHCP Snooping
  • Configure DHCP Snooping
  • Respond to Network Attacks

Ch 13: Hardening and Update Management

Network Hardening

  • Network Hardening Techniques
  • View Windows Services
  • Disable Network Services
  • View Linux Services
  • Enable and Disable Linux Services


  • Authentication
  • Authentication Protocols
  • Authentication Issues
  • Digital Certificates

Hardening Authentication

  • Hardening Authentication
  • Configure Multifactor Authentication
  • Configure Windows User Account Restrictions
  • Configuring Account Policies and UAC Settings
  • Configure Account Password Policies
  • Manage Linux Users
  • Linux User Commands and Files
  • Change Your Linux Password
  • Change a User's Linux Password

Update Management

  • Update Deployment and Management
  • Configure an Update Server
  • Update Firmware

Ch 14: Network Optimization and Troubleshooting


  • Optimization
  • Network Segmentation

General Network Issues

  • Troubleshooting Methodology
  • Common Network Issues

Troubleshooting Utilities

  • Command Line Troubleshooting Utilities
  • Use TCPDump
  • Software Troubleshooting Utilities
  • Troubleshoot with Wireshark
  • Scan Network with Angry IP Scanner
  • Scan Network with Zenmap