Network+ Notes
Ch 1
/notes/ch1/1.1 - OSI Model/
/notes/ch1/1.2 - Networking Devices/
/notes/ch1/1.4 - Common Ports/
/notes/ch1/1.5 - Copper Connectors/
/notes/ch1/1.5 - Fiber Connectors/
/notes/ch1/1.5 - Optical Fiber/
/notes/ch1/1.6 - Network Architectures/
/notes/ch1/1.6 - Network Topologies/
/notes/ch1/1.7 - Classful Subnetting/
/notes/ch1/1.7 - IPv4 Addressing/
/notes/ch1/1.7 - Magic Number Subnetting/
/notes/ch1/1.7 - Seven Second Subnetting/
Ch 2
/notes/ch2/2.1 - Dynamic Routing/
/notes/ch2/2.1 - Network Address Translation/
/notes/ch2/2.1 - Routing Technologies/
/notes/ch2/2.1 - Static Routing/
/notes/ch2/2.2 - Interface Configurations/
/notes/ch2/2.2 - Spanning Tree Protocol/
/notes/ch2/2.2 - VLANs and Trunking/
/notes/ch2/2.3 - Network Types/
/notes/ch2/2.3 - Wireless Encryption/
/notes/ch2/2.3 - Wireless Networking/
/notes/ch2/2.3 - Wireless Technologies/
/notes/ch2/2.4 - Environmental Factors/
/notes/ch2/2.4 - Installing Networks/
/notes/ch2/2.4 - Power/
Ch 3
/notes/ch3/3.1 - Configuration Management/
/notes/ch3/3.1 - Life Cycle Management/
/notes/ch3/3.1 - Network Documentation/
/notes/ch3/3.1 - SNMP/
/notes/ch3/3.2 - Logs and Monitoring/
/notes/ch3/3.2 - Network Solutions/
/notes/ch3/3.3 - Disaster Recovery/
/notes/ch3/3.3 - Network Redundancy/
/notes/ch3/3.4 - An Overview of DNS/
/notes/ch3/3.4 - Configuring DHCP/
/notes/ch3/3.4 - DHCP/
/notes/ch3/3.4 - DNS Records/
/notes/ch3/3.4 - IPv6 and SLAAC/
/notes/ch3/3.4 - Time Protocols/
/notes/ch3/3.5 - Remote Access/
/notes/ch3/3.5 - VPNs/
Ch 4
/notes/ch4/4.1 - Authentication/
/notes/ch4/4.1 - Regulatory Compliance/
/notes/ch4/4.1 - Security Concepts/
/notes/ch4/4.1 - Security Technologies/
/notes/ch4/4.1 - Segmentation Enforcement/
/notes/ch4/4.2 - ARP and DNS Poisoning/
/notes/ch4/4.2 - Denial of Service/
/notes/ch4/4.2 - MAC Flooding/
/notes/ch4/4.2 - Malware/
/notes/ch4/4.2 - Rogue Services/
/notes/ch4/4.2 - Social Engineering/
/notes/ch4/4.2 - VLAN Hopping/
/notes/ch4/4.3 - Device Security/
/notes/ch4/4.3 - Security Rules/