Introduction | |||
Introduction to Network+ | 00:03:00 | ||
What’s on the Network+ Exam | 00:02:00 | ||
What Can You Do with a Network+ Certification | 00:03:00 | ||
Section 01: Network Models | |||
The OSI Model | 00:13:00 | ||
Meet the Frame | 00:06:00 | ||
The MAC Address | 00:07:00 | ||
Broadcast vs. Unicast | 00:04:00 | ||
Introduction to IP Addressing | 00:08:00 | ||
Packets and Ports | 00:05:00 | ||
Section 02: Cabling and Topology | |||
Network Topologies | 00:05:00 | ||
Coaxial Cabling | 00:05:00 | ||
Twisted Pair Cabling | 00:05:00 | ||
Fiber Optic Cabling | 00:09:00 | ||
Fire Ratings | 00:05:00 | ||
Section 03: Ethernet Basics | |||
What is Ethernet? | 00:06:00 | ||
Ethernet Frames | 00:07:00 | ||
Terminating Twisted Pair | 00:08:00 | ||
Hubs vs. Switches | 00:12:00 | ||
Connecting Switches | 00:05:00 | ||
Section 04: Ethernet Standards | |||
100BaseT | 00:05:00 | ||
Gigabit Ethernet and 10-Gigabit Ethernet | 00:05:00 | ||
Transceivers | 00:07:00 | ||
Connecting Ethernet Scenarios | 00:14:00 | ||
Section 05: Installing a Physical Network | |||
Introduction to Structured Cabling | 00:04:00 | ||
Terminating Structured Cabling | 00:08:00 | ||
Equipment Room | 00:07:00 | ||
Alternative Distribution Panels | 00:04:00 | ||
Testing Cable | 00:09:00 | ||
Troubleshooting Structured Cabling, Part-1 | 00:04:00 | ||
Troubleshooting Structured Cabling, Part-2 | 00:04:00 | ||
Using a Toner and Probe | 00:03:00 | ||
Wired Connection Scenarios | 00:10:00 | ||
Section 06: TCP/IP Basics | |||
Introduction to IP Addressing and Binary | 00:13:00 | ||
Introduction to ARP | 00:04:00 | ||
Subnet Masks | 00:12:00 | ||
Classful Addressing | 00:10:00 | ||
Subnetting with CIDR | 00:10:00 | ||
More CIDR Subnetting Practice | 00:10:00 | ||
Dynamic and Static IP Addressing | 00:05:00 | ||
Special IP Addresses | 00:07:00 | ||
IP Addressing Scenarios | 00:15:00 | ||
Section 07: Routing | |||
Introducing Routers | 00:15:00 | ||
Understanding Ports | 00:05:00 | ||
Network Address Translation (NAT) | 00:06:00 | ||
Implementing NAT | 00:02:00 | ||
Forwarding Ports | 00:18:00 | ||
Tour of a SOHO Router | 00:12:00 | ||
SOHO vs. Enterprise | 00:09:00 | ||
Static Routes | 00:13:00 | ||
Dynamic Routing | 00:10:00 | ||
Routing Information Protocol (RIP) | 00:04:00 | ||
Open Shortest Path First (OSPF) | 00:03:00 | ||
Border Gateway Protocol | 00:06:00 | ||
Section 08: TCP/IP Applications | |||
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) | 00:07:00 | ||
ICMP and IGMP | 00:06:00 | ||
Handy Tools | 00:07:00 | ||
Introduction to Wireshark | 00:10:00 | ||
Introduction to netstat | 00:09:00 | ||
Web Servers | 00:12:00 | ||
File Transfer Protocol (FTP) | 00:12:00 | ||
E-mail Servers and Clients | 00:09:00 | ||
Securing E-mail | 00:06:00 | ||
Telnet and SSH | 00:09:00 | ||
Network Time Protocol (NTP) | 00:03:00 | ||
Network Service Scenarios | 00:09:00 | ||
Section 09: Network Naming | |||
Understanding DNS | 00:07:00 | ||
Applying DNS | 00:19:00 | ||
net Command | 00:08:00 | ||
Windows Name Resolution | 00:11:00 | ||
Dynamic DNS | 00:05:00 | ||
DNS Troubleshooting | 00:13:00 | ||
Section 10: Securing TCP/IP | |||
Making TCP/IP Secure | 00:04:00 | ||
Symmetric Encryption | 00:05:00 | ||
Asymmetric Encryption | 00:03:00 | ||
Cryptographic Hashes | 00:05:00 | ||
Identification | 00:08:00 | ||
Access Control | 00:04:00 | ||
AAA | 00:05:00 | ||
Kerberos/EAP | 00:07:00 | ||
Single Sign-On | 00:10:00 | ||
Certificates and Trust | 00:14:00 | ||
Certificate Error Scenarios | 00:08:00 | ||
Section 11: Switch Features | |||
Switch Management | 00:09:00 | ||
Introduction to VLANs | 00:10:00 | ||
InterVLAN Routing | 00:03:00 | ||
Trunking | 00:08:00 | ||
Cisco Commands | 00:06:00 | ||
Switch Port Protection | 00:07:00 | ||
Port Bonding | 00:07:00 | ||
Port Mirroring | 00:03:00 | ||
Quality of Service | 00:05:00 | ||
IDS vs. IPS | 00:04:00 | ||
Proxy Servers | 00:13:00 | ||
Load Balancing | 00:08:00 | ||
Device Placement Scenarios | 00:13:00 | ||
Section 12: IPv6 | |||
Introduction to IPv6 | 00:13:00 | ||
IPv6 Addressing | 00:15:00 | ||
IPv6 in Action | 00:13:00 | ||
IPv4 and IPv6 Tunneling | 00:05:00 | ||
Section 13: WAN Connectivity | |||
Understanding IP Tunneling | 00:06:00 | ||
WAN Technologies | 00:06:00 | ||
Digital Subscriber Line (DSL) | 00:04:00 | ||
Connecting with Cable Modems | 00:04:00 | ||
Connecting with Satellites | 00:02:00 | ||
Cellular Technologies | 00:04:00 | ||
Remote Desktop Connectivity | 00:04:00 | ||
Virtual Private Networks (VPNs) | 00:09:00 | ||
WAN Troubleshooting Scenarios | 00:05:00 | ||
Section 14: Wireless Networking | |||
Introduction to 802.11 | 00:12:00 | ||
802.11 Standards | 00:12:00 | ||
Power Over Ethernet (PoE) | 00:04:00 | ||
Antennas | 00:09:00 | ||
Wireless Security Standards | 00:06:00 | ||
Implementing Wireless Security | 00:07:00 | ||
Threats to Your Wireless Network | 00:07:00 | ||
Enterprise Wireless | 00:06:00 | ||
Installing a Wireless Network | 00:15:00 | ||
Wireless Scenarios | 00:06:00 | ||
More Wireless Scenarios | 00:09:00 | ||
Section 15: Virtualization and Cloud Computing | |||
Virtualization Basics | 00:07:00 | ||
Your First Virtual Machine | 00:07:00 | ||
Cloud Basics | 00:03:00 | ||
Cloud Services | 00:07:00 | ||
Cloud Ownership | 00:02:00 | ||
Infrastructure as Code (IaC) | 00:03:00 | ||
Heroku Demo | 00:09:00 | ||
Enterprise Virtualization | 00:06:00 | ||
Cloud Implementation | 00:11:00 | ||
Section 16: Datacenters | |||
Classic Data Center Architecture | 00:12:00 | ||
NAS and SAN | 00:16:00 | ||
The Modern Data Center | 00:09:00 | ||
High Availability | 00:11:00 | ||
Documenting the Datacenter | 00:08:00 | ||
Section 17: Integrating Networked Devices | |||
Network Types | 00:04:00 | ||
Internet of Things (IoT) | 00:07:00 | ||
Voice Over IP (VoIP) | 00:11:00 | ||
Industrial Control Systems and SCADA | 00:09:00 | ||
Section 18: Network Operations | |||
What are Network Operations? | 00:03:00 | ||
Hardening and Security Policies | 00:06:00 | ||
Change Management | 00:07:00 | ||
Patching and Updating | 00:07:00 | ||
Security Risk Management | 00:05:00 | ||
Points of Failure | 00:04:00 | ||
Standard Business Documentation | 00:05:00 | ||
Incident Response and Forensics | 00:05:00 | ||
Disaster Recovery and Backups | 00:12:00 | ||
Business Continuity | 00:12:00 | ||
Deployment Models | 00:05:00 | ||
Section 19: Protecting Networks | |||
Security Concepts | 00:06:00 | ||
Defense in Depth | 00:05:00 | ||
Rogue DHCP Servers | 00:04:00 | ||
Denial of Service (DoS) | 00:10:00 | ||
On-Path and Spoofing Attacks | 00:23:00 | ||
Password Attacks | 00:06:00 | ||
VLAN Hopping | 00:06:00 | ||
System Life Cycle | 00:04:00 | ||
Malware | 00:06:00 | ||
Social Engineering | 00:08:00 | ||
Common Vulnerabilities | 00:03:00 | ||
Physical Security | 00:13:00 | ||
Network Hardening | 00:08:00 | ||
Demilitarized Zone (DMZ) | 00:05:00 | ||
Introduction to Firewalls | 00:04:00 | ||
Firewalls | 00:10:00 | ||
Section 20: Networking Monitoring | |||
Networking Monitoring | 00:08:00 | ||
SNMP | 00:15:00 | ||
Documenting Logs | 00:07:00 | ||
System Monitoring | 00:08:00 | ||
Security Information and Event Management (SIEM) | 00:07:00 | ||
Section 21: Network Troubleshooting | |||
Network Troubleshooting Theory | 00:05:00 |
Upgrade to get UNLIMITED ACCESS to ALL COURSES for only £49/year
Claim Offer & UpgradeMembership renews after 12 months. You can cancel anytime from your account.