Course Curriculum
- 23 sections
- 173 lectures
- 22 hours, 43 minutes total length
-
Introduction00:03:00
-
What is a Model?00:02:00
-
OSI vs. TCP/IP Model00:07:00
-
Walking Through OSI and TCP/IP00:12:00
-
Meet the Frame00:06:00
-
The MAC Address00:07:00
-
Broadcast vs. Unicast00:04:00
-
Introduction to IP Addressing00:08:00
-
Packets and Ports00:05:00
-
Network Topologies00:10:00
-
Coaxial Cabling00:05:00
-
Twisted Pair Cabling00:06:00
-
Cat Ratings00:06:00
-
Fiber Optic Cabling00:09:00
-
Fire Ratings00:05:00
-
Legacy Network Connections00:07:00
-
What is Ethernet?00:07:00
-
Ethernet Frames00:07:00
-
Early Ethernet00:08:00
-
The Daddy of Ethernet, 10BaseT00:03:00
-
Terminating Twisted Pair00:14:00
-
Hubs vs. Switches00:13:00
-
100BaseT00:05:00
-
Connecting Switches00:05:00
-
Gigabit Ethernet and 10-Gigabit Ethernet00:05:00
-
Transceivers00:07:00
-
Connecting Ethernet Scenarios00:14:00
-
Introduction to Structured Cabling00:04:00
-
Terminating Structured Cabling00:08:00
-
Equipment Room00:07:00
-
Alternative Distribution Panels00:04:00
-
Testing Cable00:09:00
-
Troubleshooting Structured Cabling, Part 100:05:00
-
Troubleshooting Structured Cabling, Part 200:05:00
-
Using a Toner and Probe00:03:00
-
Wired Connection Scenarios00:11:00
-
Introduction to IP Addressing and Binary00:13:00
-
Introduction to ARP00:04:00
-
Classful Addressing00:10:00
-
Subnet Masks00:12:00
-
Subnetting with CIDR00:10:00
-
More CIDR Subnetting Practice00:10:00
-
Dynamic and Static IP Addressing00:18:00
-
Rogue DHCP Servers00:07:00
-
Special IP Addresses00:07:00
-
IP Addressing Scenarios00:15:00
-
Introducing Routers00:15:00
-
Understanding Ports00:05:00
-
Network Address Translation00:06:00
-
Implementing NAT00:03:00
-
Forwarding Ports00:18:00
-
Tour of a SOHO Router00:12:00
-
SOHO vs. Enterprise00:09:00
-
Static Routes00:13:00
-
Dynamic Routing00:11:00
-
RIP00:04:00
-
OSPF00:04:00
-
BGP00:06:00
-
TCP and UDP00:07:00
-
ICMP and IGMP00:06:00
-
Handy Tools00:07:00
-
Introduction to Wireshark00:11:00
-
Introduction to netstat00:09:00
-
Web Servers00:12:00
-
FTP00:12:00
-
E-mail Servers and Clients00:09:00
-
Securing E-mail00:06:00
-
Telnet and SSH00:09:00
-
Network Time Protocol00:02:00
-
Network Service Scenarios00:10:00
-
Understanding DNS00:12:00
-
Applying DNS00:19:00
-
The Hosts File00:04:00
-
Net Command00:08:00
-
Windows Name Resolution00:11:00
-
Dynamic DNS00:05:00
-
DNS Troubleshooting00:13:00
-
Making TCP/IP Secure00:04:00
-
Symmetric Encryption00:06:00
-
Asymmetric Encryption00:03:00
-
Cryptographic Hashes00:05:00
-
Identification
-
Access Control00:04:00
-
AAA00:05:00
-
Kerberos/EAP
-
Single Sign-On00:10:00
-
Certificates and Trust00:14:00
-
Certificate Error Scenarios00:08:00
-
Understanding IP Tunneling00:06:00
-
Virtual Private Networks00:13:00
-
Introduction to VLANs00:12:00
-
InterVLAN Routing00:03:00
-
Interfacing with Managed Switches00:11:00
-
Switch Port Protection00:07:00
-
Port Bonding00:07:00
-
Port Mirroring00:04:00
-
Quality of Service00:05:00
-
IDS vs. IPS00:04:00
-
Proxy Servers00:13:00
-
Load Balancing00:09:00
-
Device Placement Scenarios00:13:00
-
Introduction to IPv600:13:00
-
IPv6 Addressing00:15:00
-
IPv6 in Action00:13:00
-
IPv4 and IPv6 Tunneling00:05:00
-
Telephony Technologies00:09:00
-
Optical Carriers00:03:00
-
Packet Switching00:05:00
-
Connecting with Dial-up00:05:00
-
Digital Subscriber Line (DSL)00:05:00
-
Connecting with Cable Modems00:04:00
-
Connecting with Satellites00:03:00
-
ISDN and BPL00:04:00
-
Remote Desktop Connectivity00:05:00
-
Advanced Remote Control Systems00:09:00
-
Introduction to 802.1100:12:00
-
802.11 Standards00:12:00
-
Power over Ethernet (PoE)00:04:00
-
Antennas00:09:00
-
Wireless Security Standards00:16:00
-
Implementing Wireless Security00:07:00
-
Threats to Your Wireless Network00:07:00
-
Retro Threats00:05:00
-
Wi-Fi Protected Setup (WPS)00:05:00
-
Enterprise Wireless00:06:00
-
Installing a Wireless Network00:15:00
-
Wireless Scenarios00:07:00
-
More Wireless Scenarios00:09:00
-
Virtualization Basics00:07:00
-
Cloud Ownership00:03:00
-
Cloud Implementation00:12:00
-
Your First Virtual Machine00:09:00
-
NAS and SAN00:16:00
-
Platform as a Service (PaaS)00:09:00
-
Software as a Service (SaaS)00:03:00
-
Infrastructure as a Service (IaaS)00:10:00
-
Cellular Technologies00:05:00
-
Mobile Connectivity00:07:00
-
Deploying Mobile Devices00:05:00
-
Mobile Access Control00:06:00
-
Network Types00:04:00
-
Network Design00:10:00
-
Power Management00:06:00
-
Unified Communications00:11:00
-
Network Documentation00:07:00
-
Contingency Planning00:10:00
-
Predicting Hardware Failure00:05:00
-
Backups00:08:00
-
What is Risk Management?00:06:00
-
Security Policies00:08:00
-
Change Management00:07:00
-
User Training00:03:00
-
Standard Business Documentation00:05:00
-
Mitigating Network Threats00:05:00
-
High Availability00:05:00
-
Denial of Service00:09:00
-
Malware00:10:00
-
Social Engineering00:04:00
-
Access Control00:08:00
-
Man-in-the-Middle00:22:00
-
Introduction to Firewalls00:05:00
-
Firewalls00:10:00
-
DMZ00:06:00
-
Hardening Devices00:14:00
-
Physical Security Controls00:09:00
-
Testing Network Security00:08:00
-
Network Protection Scenarios00:14:00
-
SNMP00:15:00
-
Documenting Logs00:09:00
-
System Monitoring00:08:00
-
SIEM (Security Information and Event Management)00:07:00
-
Network Troubleshooting Theory00:05:00
-
Claim Your Certificate