| Introduction | |||
| Introduction to Network+ | 00:03:00 | ||
| What’s on the Network+ Exam | 00:02:00 | ||
| What Can You Do with a Network+ Certification | 00:03:00 | ||
| Section 01: Network Models | |||
| The OSI Model | 00:13:00 | ||
| Meet the Frame | 00:06:00 | ||
| The MAC Address | 00:07:00 | ||
| Broadcast vs. Unicast | 00:04:00 | ||
| Introduction to IP Addressing | 00:08:00 | ||
| Packets and Ports | 00:05:00 | ||
| Section 02: Cabling and Topology | |||
| Network Topologies | 00:05:00 | ||
| Coaxial Cabling | 00:05:00 | ||
| Twisted Pair Cabling | 00:05:00 | ||
| Fiber Optic Cabling | 00:09:00 | ||
| Fire Ratings | 00:05:00 | ||
| Section 03: Ethernet Basics | |||
| What is Ethernet? | 00:06:00 | ||
| Ethernet Frames | 00:07:00 | ||
| Terminating Twisted Pair | 00:08:00 | ||
| Hubs vs. Switches | 00:12:00 | ||
| Connecting Switches | 00:05:00 | ||
| Section 04: Ethernet Standards | |||
| 100BaseT | 00:05:00 | ||
| Gigabit Ethernet and 10-Gigabit Ethernet | 00:05:00 | ||
| Transceivers | 00:07:00 | ||
| Connecting Ethernet Scenarios | 00:14:00 | ||
| Section 05: Installing a Physical Network | |||
| Introduction to Structured Cabling | 00:04:00 | ||
| Terminating Structured Cabling | 00:08:00 | ||
| Equipment Room | 00:07:00 | ||
| Alternative Distribution Panels | 00:04:00 | ||
| Testing Cable | 00:09:00 | ||
| Troubleshooting Structured Cabling, Part-1 | 00:04:00 | ||
| Troubleshooting Structured Cabling, Part-2 | 00:04:00 | ||
| Using a Toner and Probe | 00:03:00 | ||
| Wired Connection Scenarios | 00:10:00 | ||
| Section 06: TCP/IP Basics | |||
| Introduction to IP Addressing and Binary | 00:13:00 | ||
| Introduction to ARP | 00:04:00 | ||
| Subnet Masks | 00:12:00 | ||
| Classful Addressing | 00:10:00 | ||
| Subnetting with CIDR | 00:10:00 | ||
| More CIDR Subnetting Practice | 00:10:00 | ||
| Dynamic and Static IP Addressing | 00:05:00 | ||
| Special IP Addresses | 00:07:00 | ||
| IP Addressing Scenarios | 00:15:00 | ||
| Section 07: Routing | |||
| Introducing Routers | 00:15:00 | ||
| Understanding Ports | 00:05:00 | ||
| Network Address Translation (NAT) | 00:06:00 | ||
| Implementing NAT | 00:02:00 | ||
| Forwarding Ports | 00:18:00 | ||
| Tour of a SOHO Router | 00:12:00 | ||
| SOHO vs. Enterprise | 00:09:00 | ||
| Static Routes | 00:13:00 | ||
| Dynamic Routing | 00:10:00 | ||
| Routing Information Protocol (RIP) | 00:04:00 | ||
| Open Shortest Path First (OSPF) | 00:03:00 | ||
| Border Gateway Protocol | 00:06:00 | ||
| Section 08: TCP/IP Applications | |||
| Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) | 00:07:00 | ||
| ICMP and IGMP | 00:06:00 | ||
| Handy Tools | 00:07:00 | ||
| Introduction to Wireshark | 00:10:00 | ||
| Introduction to netstat | 00:09:00 | ||
| Web Servers | 00:12:00 | ||
| File Transfer Protocol (FTP) | 00:12:00 | ||
| E-mail Servers and Clients | 00:09:00 | ||
| Securing E-mail | 00:06:00 | ||
| Telnet and SSH | 00:09:00 | ||
| Network Time Protocol (NTP) | 00:03:00 | ||
| Network Service Scenarios | 00:09:00 | ||
| Section 09: Network Naming | |||
| Understanding DNS | 00:07:00 | ||
| Applying DNS | 00:19:00 | ||
| net Command | 00:08:00 | ||
| Windows Name Resolution | 00:11:00 | ||
| Dynamic DNS | 00:05:00 | ||
| DNS Troubleshooting | 00:13:00 | ||
| Section 10: Securing TCP/IP | |||
| Making TCP/IP Secure | 00:04:00 | ||
| Symmetric Encryption | 00:05:00 | ||
| Asymmetric Encryption | 00:03:00 | ||
| Cryptographic Hashes | 00:05:00 | ||
| Identification | 00:08:00 | ||
| Access Control | 00:04:00 | ||
| AAA | 00:05:00 | ||
| Kerberos/EAP | 00:07:00 | ||
| Single Sign-On | 00:10:00 | ||
| Certificates and Trust | 00:14:00 | ||
| Certificate Error Scenarios | 00:08:00 | ||
| Section 11: Switch Features | |||
| Switch Management | 00:09:00 | ||
| Introduction to VLANs | 00:10:00 | ||
| InterVLAN Routing | 00:03:00 | ||
| Trunking | 00:08:00 | ||
| Cisco Commands | 00:06:00 | ||
| Switch Port Protection | 00:07:00 | ||
| Port Bonding | 00:07:00 | ||
| Port Mirroring | 00:03:00 | ||
| Quality of Service | 00:05:00 | ||
| IDS vs. IPS | 00:04:00 | ||
| Proxy Servers | 00:13:00 | ||
| Load Balancing | 00:08:00 | ||
| Device Placement Scenarios | 00:13:00 | ||
| Section 12: IPv6 | |||
| Introduction to IPv6 | 00:13:00 | ||
| IPv6 Addressing | 00:15:00 | ||
| IPv6 in Action | 00:13:00 | ||
| IPv4 and IPv6 Tunneling | 00:05:00 | ||
| Section 13: WAN Connectivity | |||
| Understanding IP Tunneling | 00:06:00 | ||
| WAN Technologies | 00:06:00 | ||
| Digital Subscriber Line (DSL) | 00:04:00 | ||
| Connecting with Cable Modems | 00:04:00 | ||
| Connecting with Satellites | 00:02:00 | ||
| Cellular Technologies | 00:04:00 | ||
| Remote Desktop Connectivity | 00:04:00 | ||
| Virtual Private Networks (VPNs) | 00:09:00 | ||
| WAN Troubleshooting Scenarios | 00:05:00 | ||
| Section 14: Wireless Networking | |||
| Introduction to 802.11 | 00:12:00 | ||
| 802.11 Standards | 00:12:00 | ||
| Power Over Ethernet (PoE) | 00:04:00 | ||
| Antennas | 00:09:00 | ||
| Wireless Security Standards | 00:06:00 | ||
| Implementing Wireless Security | 00:07:00 | ||
| Threats to Your Wireless Network | 00:07:00 | ||
| Enterprise Wireless | 00:06:00 | ||
| Installing a Wireless Network | 00:15:00 | ||
| Wireless Scenarios | 00:06:00 | ||
| More Wireless Scenarios | 00:09:00 | ||
| Section 15: Virtualization and Cloud Computing | |||
| Virtualization Basics | 00:07:00 | ||
| Your First Virtual Machine | 00:07:00 | ||
| Cloud Basics | 00:03:00 | ||
| Cloud Services | 00:07:00 | ||
| Cloud Ownership | 00:02:00 | ||
| Infrastructure as Code (IaC) | 00:03:00 | ||
| Heroku Demo | 00:09:00 | ||
| Enterprise Virtualization | 00:06:00 | ||
| Cloud Implementation | 00:11:00 | ||
| Section 16: Datacenters | |||
| Classic Data Center Architecture | 00:12:00 | ||
| NAS and SAN | 00:16:00 | ||
| The Modern Data Center | 00:09:00 | ||
| High Availability | 00:11:00 | ||
| Documenting the Datacenter | 00:08:00 | ||
| Section 17: Integrating Networked Devices | |||
| Network Types | 00:04:00 | ||
| Internet of Things (IoT) | 00:07:00 | ||
| Voice Over IP (VoIP) | 00:11:00 | ||
| Industrial Control Systems and SCADA | 00:09:00 | ||
| Section 18: Network Operations | |||
| What are Network Operations? | 00:03:00 | ||
| Hardening and Security Policies | 00:06:00 | ||
| Change Management | 00:07:00 | ||
| Patching and Updating | 00:07:00 | ||
| Security Risk Management | 00:05:00 | ||
| Points of Failure | 00:04:00 | ||
| Standard Business Documentation | 00:05:00 | ||
| Incident Response and Forensics | 00:05:00 | ||
| Disaster Recovery and Backups | 00:12:00 | ||
| Business Continuity | 00:12:00 | ||
| Deployment Models | 00:05:00 | ||
| Section 19: Protecting Networks | |||
| Security Concepts | 00:06:00 | ||
| Defense in Depth | 00:05:00 | ||
| Rogue DHCP Servers | 00:04:00 | ||
| Denial of Service (DoS) | 00:10:00 | ||
| On-Path and Spoofing Attacks | 00:23:00 | ||
| Password Attacks | 00:06:00 | ||
| VLAN Hopping | 00:06:00 | ||
| System Life Cycle | 00:04:00 | ||
| Malware | 00:06:00 | ||
| Social Engineering | 00:08:00 | ||
| Common Vulnerabilities | 00:03:00 | ||
| Physical Security | 00:13:00 | ||
| Network Hardening | 00:08:00 | ||
| Demilitarized Zone (DMZ) | 00:05:00 | ||
| Introduction to Firewalls | 00:04:00 | ||
| Firewalls | 00:10:00 | ||
| Section 20: Networking Monitoring | |||
| Networking Monitoring | 00:08:00 | ||
| SNMP | 00:15:00 | ||
| Documenting Logs | 00:07:00 | ||
| System Monitoring | 00:08:00 | ||
| Security Information and Event Management (SIEM) | 00:07:00 | ||
| Section 21: Network Troubleshooting | |||
| Network Troubleshooting Theory | 00:05:00 | ||