->
Oreilly - CompTIA Network (N10-006) - 300000006A0130
Oreilly - CompTIA Network (N10-006)
by Integrity Training | Publisher: Stone River eLearning | Release Date: January 2019 | ISBN: 300000006A0130


The CompTIA Network+ training course focuses on increasing knowledge, skills, and ability to manage, maintain, troubleshoot, install, operate, and configure a basic network infrastructure. The Network+ training course allows the students to fully understand and implement the concepts covered on the CompTIA’s Network+ exam using a sophisticated teaching methodology. The course prepares the students and reinforces the essential knowledge and skills for devices such as routers, switches, access points, and others. CompTIA's Network+ is the premier vendor-neutral networking certification. This preparatory course is designed to provide the foundation you need not only to be productive on the job but also to be successful in more specialized topics and in your pursuit of the vendor-neutral certifications offered by CompTIA.
  1. Course Introduction
    • Course Introduction 00:00:10
    • Instructor Introduction 00:01:39
  2. Lesson 01 - Network Theory
    • Network Theory 00:00:40
    • OSI Model Location 00:00:21
    • OSI Model Location DataLink 00:00:18
    • The IEEE 802.11 Standard 00:04:10
    • The OSI and TCP/IP Models 00:00:17
    • OSI Layer 7 00:02:42
    • OSI Layer 6 00:01:51
    • OSI Layer 5 00:01:39
    • OSI Layer 4 00:02:50
    • OSI Layer 3 00:02:21
    • OSI Layer 2 00:03:41
    • OSI Layer 1 00:02:05
    • LAN Compared with the OSI Model 00:04:15
    • TCP/IP Architecture 00:05:14
    • Demo - OSI Review 00:10:10
    • LANs 00:01:25
    • WANs 00:01:37
    • Network Coverage Areas 00:02:43
    • The Internet 00:01:51
    • Intranets 00:00:52
    • Extranets 00:00:57
    • Enterprise Networks 00:02:48
    • Specialized Network Types 00:01:25
    • Network Configurations 00:00:16
    • Centralized Networks 00:01:21
    • Client/Server Networks 00:01:06
    • Peer-to-Peer Networks 00:01:43
    • Mixed Mode Networks 00:01:01
    • Network Topologies 00:02:11
    • Frequencies and Overlap of Wireless Channels 00:02:50
    • Radio Networking 00:00:37
    • Broadcast Radio 00:01:11
    • Spread Spectrum 00:00:46
    • Infrared Transmission 00:00:58
    • Bluetooth 00:00:47
    • Microwave Transmission 00:01:43
    • Data Transmission 00:01:22
    • Analog Signals 00:04:09
    • Digital Signals 00:01:28
    • Digital Data Transmission 00:00:22
    • Unicast Transmission 00:01:18
    • Broadcast Transmission 00:01:04
    • Multicast Transmission 00:02:19
    • Anycast Transmission 00:01:33
    • Serial Data Transmission 00:02:14
    • Parallel Data Transmission 00:01:40
    • Baseband Transmission 00:00:46
    • Broadband Transmission 00:01:27
    • Transmission Speeds 00:00:22
    • Types of Media Access 00:02:08
    • Polling 00:00:57
    • CSMA/CA 00:01:42
    • CSMA/CD 00:01:59
    • Multiplexing 00:00:43
  3. Lesson 02 - Bounded Network Media
    • Bounded Network Media 00:02:46
    • Twisted -pair Cable 00:01:25
    • Twisted- pair Cable Continued 00:00:14
    • Common UTP Categories 00:02:12
    • Additional TP Categories 00:01:14
    • Stranded vs. Solid 00:00:29
    • Straight-through, Cross -over, Rollover 00:03:24
    • Pin Numbering of RJ-45 Connector 00:04:44
    • T1 Crossover Cable 00:01:02
    • Coaxial Cable 00:01:17
    • RG Standards 00:01:32
    • RG Standards Continued 00:00:36
    • Single-mode Fiber to UTP 00:00:20
    • Broadband Over Power Line 00:01:41
    • Access BPL 00:00:54
    • BPL Modem 00:00:13
    • Twisted -pair Connectors 00:00:30
    • Twisted -pair Connectors Continued 00:00:56
    • Pin Numbering of RJ-45 Connector (Cont.) 00:02:09
    • Serial Connectors 00:01:38
    • Serial Cable 00:01:33
    • Serial Console Connections 00:03:41
    • Serial Cable Types 00:00:25
    • Serial Data Rates 00:01:40
    • Typical UTP Installation 00:04:16
    • Fiber Optic Cable 00:06:45
    • Fiber Optic Cable (Continued) 00:01:53
    • Fiber Optic Connectors 00:01:48
    • Fiber Optic Connector Types 00:02:34
    • Thinnet Connectors 00:01:52
    • Terminating Coax with BNC 00:01:10
    • RG-6 and RG-59 Connectors 00:00:45
    • Plenums 00:01:44
    • Media Converters 00:00:58
    • Telecommunications Room 00:00:47
    • Termination Choices 00:01:14
    • Punchdown Block 00:00:34
    • Wire Placement 00:01:22
    • Cross-connects 00:01:17
    • MDF to IDF Connections 00:00:29
    • Workstation Drops 00:00:28
    • Classifying Network Components 00:03:51
    • Classifying Network Components Part 1 00:04:24
    • Classifying Network Components Part 2 00:04:35
    • Classifying Network Components Part 3 00:05:03
  4. Lesson 03 - Unbounded Network Media
    • Unbounded Network Media 00:02:18
    • The 802.11 Family 00:04:27
    • 802.11 Networking 00:05:37
    • The 802.1x Standard 00:02:20
    • The 802.1x Standard (Cont.) 00:01:28
    • Channels 00:01:32
    • Channels Continued 00:01:47
    • Channel Bonding 00:00:37
    • Wireless Access Points 00:00:36
    • Wireless Controllers 00:02:26
    • Wireless Bridges 00:01:29
    • Wireless Antennas 00:00:49
    • Wireless Antenna Types 00:01:09
    • Wireless Antenna Performance Factors 00:02:39
    • SSID Broadcasts 00:01:12
    • MIMO 00:00:48
    • Configuration Options 00:03:15
    • Configuring Wireless Clients 00:01:25
    • Demo - Setting Up Wi-Fi 00:03:53
    • Access Point 00:00:56
    • Device Compatibility 00:00:51
    • Troubleshooting Connections 00:02:25
    • Common Problems 00:03:18
    • Major Wireless Protocols 00:03:26
  5. Lesson 04- Network Implementations
    • Network Implementations 00:01:51
    • Repeater Placement 00:01:56
    • Wireless Repeater 00:02:10
    • Repeater Operation 00:00:41
    • Limitations of Repeaters 00:01:48
    • Local Area Networks 00:02:02
    • Network Topologies 00:00:18
    • Logical Network Topologies 00:01:22
    • Peer-to-peer Model 00:01:19
    • Decentralized 00:00:55
    • Peer-to-peer Authentication 00:00:49
    • Client/Server Model 00:02:35
    • A Client/Server LAN 00:02:05
    • Client/Server Authentication 00:01:49
    • Star Topology 00:01:12
    • Bus Topology 00:01:19
    • Ring Topology 00:02:43
    • Mesh Topology 00:02:45
    • Hybrid Topology 00:00:24
    • Point-to-point vs. Point-to-multipoint 00:00:50
    • MPLS 00:06:16
    • Demo - Topology 00:02:34
    • NICs 00:00:55
    • Transceivers 00:00:19
    • IEEE 802.x Standards 00:01:01
    • Ethernet (IEEE 802.3) 00:02:16
    • Ethernet Frames 00:02:49
    • MAC Addresses 00:02:17
    • The 10Base Standards 00:00:55
    • Fast Ethernet 00:02:13
    • Gigabit Ethernet 00:00:42
    • 10 Gigabit Ethernet 00:00:36
    • PoE 00:03:01
    • Ethernet Hub 00:00:45
    • Ethernet 00:02:33
    • Ethernet Media 00:01:39
    • Ethernet Media continued 00:00:25
    • 10-Gigabit Ethernet Standards 00:01:43
    • Gigabit Ethernet Standards 00:01:55
    • Fast Ethernet Standards 00:00:59
    • 10BASE-T 00:00:49
    • Ethernet Bonding 00:04:13
    • Data Transmission 00:01:46
    • Data Collisions 00:01:26
    • Channel Access Methods 00:01:30
    • Demo - LAN Cable Types 00:01:57
    • Network Access Points 00:00:48
    • LAN Installation Components 00:01:27
    • MAC Address 00:02:53
    • MAC Address (Continued) 00:05:50
    • Switches 00:02:16
    • Routers 00:00:30
    • Types of Routers 00:01:21
    • Gateways 00:01:17
    • Firewalls 00:01:26
    • Analog Modems 00:00:39
    • Network Controllers 00:00:52
    • Legacy Network Connectivity Devices 00:03:45
    • Collision and Broadcast Domains 00:04:02
    • Switches and Network Performance 00:00:24
    • Switch Types and Operating Modes 00:03:34
    • STP (IEEE 802.1d) 00:01:55
    • Internetworking Devices 00:04:08
    • Bridges 00:02:50
    • Bridge Operation 00:00:54
    • Bridge Types 00:00:59
    • Bridge Routing Management 00:02:22
    • Bridge Filtering and Intelligence 00:00:40
    • Local and Remote Bridges 00:01:01
    • Layer 2 Switch 00:02:44
    • Configurations for Switched Networks 00:02:46
    • Switched Network with Bottlenecks 00:01:37
    • Switched Network without Bottlenecks 00:01:26
    • Benefits of Switches 00:03:12
    • Higher-level Switches 00:00:47
    • Managed Layer 3 Switch 00:00:20
    • Installing Routers and Switches 00:10:54
    • Demo - Routing NAT 00:01:16
    • Label Edge Routers 00:01:16
    • Networking Appliances 00:05:17
    • Demo - The Purpose of Network Devices 00:04:03
    • Demo - Interface Monitoring 00:04:23
    • Demo - Interface Configuration 00:08:43
    • VLANs 00:01:43
    • VLAN Assignment 00:01:14
    • Port Mirroring 00:00:53
    • Trunking 00:02:08
    • IEEE 802.1q 00:00:46
    • VLAN Pooling 00:00:32
    • Virtual LAN 00:03:16
    • VLAN Filtering 00:01:24
    • VLAN Trunking 00:02:55
    • Trunking Example 00:01:15
    • Demo - Intro to Routing and Switching VLANs 00:11:17
    • Spanning Tree 00:05:49
    • Demo - Spanning Tree 00:04:45
    • Demo - Packet Tracing 00:06:12
    • Internet Service Providers (ISPs) 00:01:06
    • Small ISPs 00:01:49
    • Small ISPs (continued) 00:02:33
    • Regional ISP 00:00:45
    • Typical UTP Installation 00:00:49
    • Telecommunications Room 00:00:33
    • Standards 00:00:36
  6. Lesson 5 - TCP/IP Addressing and Data Delivery
    • Network Communication Protocols 00:00:53
    • TCP 00:02:15
    • TCP Three-way Handshake 00:03:58
    • Internet Protocol (IP) 00:01:03
    • UDP 00:01:48
    • Protocols 00:05:46
    • Demo - Examining Ports and Protocols 00:04:54
    • The TCP/IP Model 00:02:49
    • Encapsulation on TCP/IP Networks 00:02:09
    • Connection-Oriented and Connectionless Protocols 00:02:05
    • The Three-Way Handshake 00:04:14
    • ICMP 00:01:32
    • IGMP 00:00:54
    • ARP 00:01:59
    • Protocol Analyzers 00:01:23
    • IPv4 00:02:30
    • IPv4 (continued) 00:01:47
    • Subnet Masks 00:02:46
    • Network IDs 00:01:43
    • IPv4 Subnet Masks 00:00:59
    • IPv4 Custom Subnets 00:07:08
    • Routing Example 00:02:58
    • Demo - Examining IP Settings 00:06:09
    • Classful IPv4 Addresses 00:07:14
    • Special Addresses 00:03:14
    • APIPA 00:01:32
    • APIPA (continued) 00:01:37
    • CIDR 00:03:02
    • CIDR Address 00:02:02
    • Demo - Convert Binary 00:06:20
    • IPv6 00:01:47
    • IPv6 (Continued) 00:02:36
    • IPv6 (Continued) Part 2 00:02:37
    • IPv6 Address Types 00:01:58
    • IPv6 Address Types (Continued) 00:02:58
    • IPv6 Address Types (Continued) 00:01:38
    • IPv6 Address Scopes 00:02:43
    • IPv6 Subnets 00:01:17
    • IPv6 Custom Subnets 00:02:16
    • IPCONFIG and IFCONFIG 00:01:20
    • Connections 00:00:15
    • Flow Control 00:03:49
    • Buffering 00:01:16
    • Data Windows 00:00:58
    • Error Detection 00:01:21
    • Parity Checking 00:01:34
    • Cyclic Redundancy Checking 00:00:52
  7. Lesson 06 - Routing
    • Routing 00:01:23
    • Routes 00:01:32
    • Comparing Routing and Switching 00:02:40
    • The IP Data Packet Delivery Process 00:01:24
    • The Local and Remote Delivery Process 00:01:35
    • Static Routing 00:03:19
    • Routing Tables 00:00:46
    • Static Routing Tables 00:02:14
    • Routing Table Entries 00:02:50
    • Routing Entry Components 00:01:06
    • The Route Command 00:01:09
    • The Routing Process 00:03:27
    • Autonomous Systems 00:01:29
    • Router Roles in Autonomous Systems 00:02:25
    • Routing Methods in Autonomous Systems 00:01:25
    • Dynamic Routing 00:01:25
    • Comparing Static and Dynamic Routing 00:00:49
    • Distance-Vector Routing 00:02:19
    • Link-State Routing 00:02:02
    • Comparing Distance-Vector and Link-State Routing 00:01:57
    • Routers 00:01:21
    • Router Operation 00:00:28
    • About Routers 00:02:11
    • About Routers (Continued) 00:01:13
    • Router Features 00:02:03
    • Types of Routers 00:02:53
    • Routing Table Contents 00:06:40
    • Routing Metrics 00:02:51
    • Routing Examples 00:00:40
    • Brouters 00:00:36
    • Bridges vs. Routers 00:01:01
    • Virtual Routers 00:00:40
    • Hybrid Routing 00:00:44
    • Path-Vector Routing 00:02:00
    • Route Convergence 00:01:03
    • Routing Loops 00:01:45
    • Count-to-Infinity Loops 00:01:44
    • Split Horizon and Poison Reverse 00:01:09
    • Router Discovery Protocols 00:02:01
    • Link State Routing Protocols 00:04:31
    • Link State Routing Protocols (Continued) 00:02:49
  8. Lesson 07- TCP/IP Services
    • TCP 00:02:41
    • Data Transmission on IP Networks 00:01:09
    • Static and Dynamic IP Addressing 00:01:55
    • Static IP Address Assignment 00:00:35
    • APIPA 00:01:18
    • IP Configuration Utilities 00:01:05
    • DHCP 00:04:45
    • Port Addresses 00:01:48
    • Service Port Numbers 00:02:57
    • Demo - Port Numbers 00:03:25
    • Demo - netstat 00:03:50
    • DHCP and DHCPv6 00:01:38
    • IPv4 Lease Process 00:06:51
    • IPv6 Lease Process 00:01:46
    • IPv6 Router Flags 00:00:39
    • Demo - DHCP Snooping 00:04:02
    • FQDN 00:01:36
    • Name Resolution 00:01:37
    • DNS 00:03:20
    • DNS Components 00:02:14
    • Types of DNS Servers 00:00:48
    • Types of DNS Records 00:02:38
    • The DNS Hierarchy 00:01:16
    • The DNS Name Resolution Process 00:00:45
    • Legacy Name Resolution Methods 00:01:12
    • DNS (Cont.) 00:02:05
    • DNS (Cont.) 00:01:36
    • DNS Namespace 00:02:46
    • DNS Records 00:03:20
    • Demo - Examining DNS 00:02:41
    • Transport-layer Protocols 00:04:48
    • M and O Flags 00:00:44
    • UDP 00:02:26
    • IP 00:02:04
    • Static IP Addressing 00:02:05
  9. Lesson 08 - WAN Infrastructure
    • Key Points 00:01:57
    • Wide Area Networks 00:00:51
    • Packet vs. Circuit Switching 00:03:10
    • Demo - Packet Switching 00:07:16
    • WAN Connections 00:01:13
    • WAN Connections (Continued) 00:03:33
    • QoS 00:04:15
    • Mobile Devices 00:00:35
    • Cable Internet Access 00:01:20
    • MPLS 00:05:30
    • DSL 00:00:47
    • Metro-Ethernet 00:02:31
    • POTS/PSTN 00:01:04
    • ISDN 00:03:19
    • DSL (Cont.) 00:01:19
    • ADSL 00:00:57
    • Cable 00:00:50
    • Satellite 00:01:42
    • Wireless 00:01:36
    • WiMAX 00:01:45
    • Cellular 00:00:54
    • T and E Lines 00:00:47
    • T and E Lines (Continued) 00:01:02
    • T and E Lines (Continued) 00:01:10
    • X.25 and Frame Relay 00:01:24
    • X.25 and Frame Relay (Continued) 00:00:31
    • X.25 and Frame Relay (Continued) 00:00:56
    • ATM 00:02:57
    • SONET and SDH 00:00:49
    • DWDM 00:00:21
    • PON 00:00:08
    • PON (Continued) 00:01:18
    • Voice-over-Data Systems 00:01:16
    • VoIP 00:01:05
    • VoIP Protocols 00:01:43
    • VoIP Software 00:00:37
    • Video Conferencing 00:01:46
  10. Lesson 09 - Cloud and Virtualization Technologies
    • Types of Server Virtualization 00:02:32
    • Virtual NICs 00:01:43
    • Virtual Switches 00:01:01
    • Virtual Firewalls 00:03:07
    • Virtual PBX 00:02:01
    • SANs 00:04:09
    • Virtual Computers 00:08:15
    • Virtualization Concerns and Risks 00:02:00
    • Demo - Viewing VM Components 00:02:48
    • Fibre Channel 00:01:21
    • iSCSI 00:01:15
    • NAS 00:00:55
    • Jumbo Frames 00:01:51
    • Cloud Concepts 00:03:14
    • Cloud Computing Features 00:02:35
    • Cloud Computing Implementations 00:00:50
    • IaaS 00:00:28
    • SaaS 00:00:40
    • PaaS 00:00:17
    • IDaaS 00:00:15
    • NaaS 00:00:17
    • Cloud Computing 00:06:00
    • Cloud Deployment 00:04:25
    • Cloud Categories 00:01:34
    • Risks and Concerns 00:03:23
  11. Lesson 10 - Network Security Basics
    • Wireless Security 00:03:21
    • Transmission Encryption 00:05:52
    • Demo - Wireless Security 00:03:34
    • Business Continuity 00:00:51
    • Disposal and Destruction 00:01:41
    • AAA 00:01:28
    • Authentication Factors 00:01:35
    • One-factor Authentication 00:00:48
    • Two-factor Authentication 00:00:31
    • Three-factor Authentication 00:02:13
    • Single Sign-on 00:01:59
    • Kerberos 00:00:47
    • Kerberos System Components 00:00:52
    • Kerberos Data Types 00:00:48
    • Kerberos Authentication Process 00:03:58
    • CHAP 00:01:00
    • EAP 00:01:01
    • PPPoE 00:00:42
    • Mutual Authentication 00:02:31
    • Cryptography 00:01:04
    • ROT13 Cipher 00:01:52
    • Wireless Security Threats 00:03:59
    • Vulnerabilities of Access Points 00:01:39
    • Wi-Fi Scanners 00:03:44
    • War Chalking Symbols 00:01:27
    • Denial-of-Service Attacks 00:00:56
    • Distributed DoS Attacks 00:00:47
    • DDoS Countermeasures 00:01:52
    • Man-in-the-Middle Attacks 00:04:49
    • Buffer Overflow 00:01:12
    • FTP Bounce Attacks 00:00:32
    • Smurf Attacks 00:01:04
    • Malware 00:00:53
    • Social Engineering 00:01:42
    • Attack Types 00:02:38
    • Social Engineering Countermeasures 00:00:46
    • TACACS+ 00:00:34
    • 802.1x 00:01:32
    • Tokens 00:00:40
    • Biometrics 00:01:20
    • Mutual Authentication 00:00:38
    • SSO 00:00:32
    • EAP 00:00:40
    • Kerberos 00:01:17
    • Wireless Authentication Methods 00:01:40
    • Password Management 00:01:24
    • Keys 00:01:28
    • Symmetric Encryption in Action 00:01:17
    • Public Key Cryptography 00:00:59
    • Asymmetric Encryption in Action 00:02:11
    • Demo - Encryption 00:04:46
    • Public Key Cryptography (Cont.) 00:00:51
    • Public Key Infrastructure 00:02:24
    • Setup and Initialization Phase 00:01:04
    • Encryption 00:00:29
    • Encryption and Security Goals 00:00:38
    • Hashing Encryption 00:00:42
    • Key-Based Encryption 00:00:49
    • Key-Based Ecryption (Cont.) 00:01:42
    • Digital Certificates 00:00:51
    • Certificates and Encryption 00:01:03
    • Encryption Devices 00:00:45
    • Benefits of Encryption Devices 00:01:06
    • SSL and Encryption 00:01:40
    • TLS 00:00:21
    • Wireless Encryption Protocols 00:01:18
  12. Lesson 11 - Preventing Security Breaches
    • CIA Triad 00:01:06
    • Security Factors 00:00:48
    • Non -repudiation 00:00:34
    • Least Privilege 00:00:45
    • Risks 00:00:27
    • Data Breaches 00:00:59
    • Unauthorized Access 00:00:47
    • Hackers and Attackers 00:00:52
    • Security Controls 00:01:26
    • Security Policies 00:00:35
    • Common Security Policy Types 00:00:49
    • Adherence to Standards and Policies 00:00:48
    • Windows Security Policies 00:00:38
    • Group Policy 00:00:48
    • Permissions 00:00:36
    • Segmentation 00:01:24
    • Wireless Security 00:00:46
    • Disaster Recovery 00:00:45
    • Single Point of Failure 00:00:54
    • Vulnerabilities 00:00:34
    • Physical Security Threats and Vulnerabilities 00:00:55
    • Environmental Threats and Vulnerabilities 00:00:23
    • Unnecessary Running Services 00:00:57
    • Open Ports 00:00:44
    • Unpatched and Legacy Systems 00:01:04
    • Unencrypted Channels 00:00:22
    • Cleartext Credentials 00:00:24
    • Unsecure Protocols 00:01:01
    • Radio Frequency Emanation 00:01:15
    • Network Access Control 00:02:20
    • Access Control Lists 00:00:55
    • NAT 00:04:58
    • Threats 00:00:50
    • Attacks 00:01:21
    • Data Theft 00:01:00
    • Social Engineering Attacks 00:00:35
    • Types of Social Engineering Attacks 00:01:56
    • Insider Threats 00:00:32
    • Malware Attacks 00:00:36
    • Types of Malware Attacks 00:03:43
    • Types of Viruses 00:01:05
    • Effect of Malware on the Network 00:00:50
    • Compromised Systems 00:00:28
    • Buffer Overflows 00:00:40
    • Password Attacks 00:00:20
    • Types of Password Attacks 00:02:36
    • Packet and Protocol Abuse 00:01:18
    • IP Spoofing Attacks 00:00:51
    • DoS Attacks 00:00:33
    • Types of DoS Attacks 00:00:44
    • Man-in-the-Middle Attacks 00:00:41
    • Session Hijacking Attacks 00:00:40
    • Port Scanning Attacks 00:00:53
    • Replay Attacks 00:01:02
    • FTP Bounce Attacks 00:00:44
    • ARP Cache Poisoning Attacks 00:00:56
    • VLAN Hopping 00:01:40
    • Zero Day Attacks 00:00:23
    • Wireless Threats and Attacks 00:04:15
    • Firewalls and Proxies 00:02:28
    • Firewall Categories 00:01:00
    • Security Zones 00:01:36
    • Intranet Zone 00:00:30
    • Perimeter Network 00:00:42
    • DMZ Options 00:00:12
    • Screened Host 00:00:29
    • Bastion Host 00:00:39
    • Three-homed Firewall 00:00:39
    • Back-to-back Firewalls 00:01:03
    • Dead Zone 00:01:28
    • Traffic Filtering 00:00:40
    • NAT and PAT 00:01:06
    • Port Address Translation 00:01:47
    • Firewall Administration 00:01:40
    • Rule Planning 00:00:57
    • Port Security 00:00:41
    • Intrusion Detection 00:02:47
    • Events 00:01:33
    • NIDS 00:01:44
    • IDScenter for Snort 00:00:55
    • Example Snort Rule 00:00:43
    • HIDS 00:01:03
    • Advantages of HIDS over NIDS 00:01:01
    • Authentication 00:00:25
    • Authentication Factors 00:01:21
    • User Name and Password Authentication 00:00:25
    • Two-Factor Authentication 00:00:22
    • Multifactor Authentication 00:00:28
    • Strong Passwords 00:01:59
    • Patch Management 00:00:54
    • Security Policies 00:04:02
    • SSH 00:01:31
    • Demo - Network Security 00:04:31
    • Securing the Operating System 00:02:29
    • Windows Update 00:01:26
    • Updates 00:00:41
    • Demo - Vulnerability 00:04:36
    • Honeypots and Honeynets 00:02:18
    • Honeypot Examples 00:00:23
    • Honeypot Deployment 00:01:00
    • Account Expiration 00:00:50
    • Education 00:01:34
    • Communication 00:01:18
    • User Awareness 00:00:56
  13. Lesson 12 - Responding to Security Incidents
    • Human Resources Policies 00:01:15
    • Incident Response Policy 00:00:48
    • Preparation 00:00:31
    • Detection 00:00:05
    • Containment 00:00:36
    • Eradication 00:00:15
    • Recovery 00:00:33
    • Follow-up 00:00:18
  14. Lesson 13 - Remote Networking
    • RADIUS 00:00:31
    • RADIUS Authentication 00:00:37
    • TACACS+ vs. RADIUS 00:00:47
    • Remote Desktop Services 00:01:36
    • RADIUS 00:03:05
    • VPN Technologies 00:04:14
    • VPN Security Models 00:01:53
    • VPN Protocols 00:01:55
    • PPTP vs. L2TP 00:01:23
    • IPSec Protocols 00:03:04
    • IPSec Encryption 00:02:50
    • PPPoE 00:00:34
    • Tunneling Protocols 00:05:11
  15. Lesson 14 - Network Management
    • Acceptable Use 00:00:19
    • Due Care 00:00:37
    • Privacy 00:00:43
    • Separation of Duties 00:00:43
    • Need to Know 00:00:37
    • Service-level Agreement 00:00:31
    • Network Analyzer 00:02:07
    • TCP/IP Utilities 00:11:37
    • IPConfig 00:02:40
    • Ifconfig 00:00:52
    • Ping (Packet Internet Groper) 00:02:51
    • Ping Troubleshooting 00:01:31
    • NSLookup and Tracert 00:01:02
    • Demo - Software Tools 00:07:52
    • Performance Monitor 00:01:55
    • Performance Objects 00:02:29
    • Bottlenecks 00:00:58
    • Configuration 00:00:43
    • Event Viewer 00:01:46
    • Event Information 00:00:40
    • Event Types 00:00:57
    • Device and Application Logging 00:01:57
    • Syslog 00:00:37
    • Syslog Alert Levels 00:00:33
    • SNMP 00:02:24
    • Network Monitor 00:00:47
    • Demo - Network Monitoring 00:03:34
    • Troubleshooting 00:02:36
    • Troubleshooting (continued) 00:03:45
    • Troubleshooting (continued) 00:01:30
  16. Lesson 15 - Troubleshooting Network Issues
    • Common Problems 00:07:39
    • Troubleshooting 00:02:40
    • Troubleshooting Models 00:01:32
    • The Network+ Troubleshooting Model 00:01:50
    • Troubleshooting Documentation Template 00:02:06
    • Change Management 00:03:34
    • Configuration Documentation 00:02:29
    • Rationales 00:03:07
    • Methods 00:07:26
    • Troubleshooting with IP Configuration Utilities 00:00:50
    • The ping Utility 00:02:47
    • The traceroute and tracert Utilities 00:02:38
    • The arp Utility 00:00:53
    • The NBTSTAT Utility 00:00:48
    • The NETSTAT Utility 00:00:35
    • The nslookup Utility 00:01:11
    • WLAN Survey Software 00:01:16
    • SNIPS 00:01:08
    • Loopback Interface 00:00:47
    • Speed Test Sites 00:00:43
    • Looking Glass Sites 00:01:09
    • Demo - Troubleshooting a Switch 00:08:35
    • Demo - Troubleshooting a Router 00:04:12
    • Network Technician's Hand Tools 00:01:43
    • Hardware Toolkit 00:03:17
    • Additional Tools 00:02:13
    • Software Toolkit 00:02:09
    • Cable Testing Devices 00:00:33
    • Cable Testing Device 00:00:40
    • Physical Cable Test 00:00:28
    • Physical Cable Tests 00:02:49
    • Network Function Tests 00:00:49
    • Cable Certifier 00:00:26
    • Additional Features 00:00:51
    • Testing a Basic Permanent Link 00:00:34
    • Crimpers 00:00:38
    • Coax Crimper 00:00:30
    • Twisted-pair Cable Crimper 00:01:01
    • Using a Fiber Optic Cable Crimper 00:00:42
    • Terminating Fiber Optic Cable 00:00:29
    • Butt Set 00:00:28
    • Butt Set Uses 00:00:23
    • Modapt Device 00:00:33
    • Toner Probe 00:00:39
    • Using a Toner Probe 00:00:26
    • Punchdown Tools 00:00:47
    • Using a Punchdown Tool 00:00:22
    • Network Analyzer 00:00:24
    • Loopback Plugs 00:00:31
    • TDR 00:00:23
    • OTDR 00:00:17
    • Multimeters 00:00:21
    • Measuring Resistance 00:00:20
    • Measuring Voltage 00:00:13
    • Measuring Current 00:00:13
    • Measuring Continuity 00:00:18
    • Environmental Monitor 00:00:20
    • ASHRAE 9.9 Guidelines 00:00:26
    • Safety Rules 00:02:14
    • Safety Rules (Cont.) 00:01:25
    • Wire Crimpers 00:00:24
    • Cable Strippers 00:00:50
    • Punch Down Tools 00:00:56
    • Circuit Testers 00:00:13
    • Multimeters 00:00:26
    • Voltmeters 00:00:43
    • Cable Testers 00:00:25
    • Cable Certifiers 00:00:34
    • Types of Cable Testers and Certifiers 00:00:32
    • Crossover Cables 00:02:18
    • Hardware Loopback Plugs 00:00:25
    • Time-Domain Reflectometers 00:00:52
    • Tone Generators and Tone Locators 00:01:39
    • Environment Monitors 00:00:33
    • Butt Sets 00:01:00
    • LED Indicators 00:00:38
    • Network Analyzers 00:00:31
    • Demarc 00:00:32
    • Wireless Testers 00:00:48
    • Light Meters 00:00:41
    • Physical Issues 00:02:08
    • Logical Issues 00:01:58
    • Logical Issues (cont.) 00:00:50
    • Routing and Switching Issues 00:01:56
    • Wireless Issues 00:05:57
    • Simultaneous Wired/Wireless Connections 00:01:00
    • Discovery of Neighboring Devices and Nodes 00:01:03
    • Common Security Configuration Issues 00:00:42
    • Misconfigured Firewalls 00:00:54
    • Misconfigured ACLs and Applications 00:02:53
    • Open or Closed Ports 00:00:58
    • Authentication Issues 00:01:59
    • Domain or Local Group Configuration 00:01:26
    • Malware 00:00:49
    • DoS Attacks 00:00:48
    • ICMP-Related Issues 00:02:00
    • Malicious Users 00:00:30
    • Improper Access 00:00:43
    • ARP Issues 00:02:36
    • Banner Grabbing 00:00:44
    • Jamming 00:00:35
    • Troubleshooting Wired Connections 00:07:35
    • Antivirus Software 00:01:36
  17. Lesson 16 - Planning and Implementing SOHO Network
    • Planning and Implementing a SOHO Network 00:00:17
    • Purposes of a Plan 00:02:08
    • Creating a Plan 00:03:52
    • Ongoing Planning 00:01:50
    • Implementing a Plan 00:04:11
    • Network Cable 00:03:15
  18. Oreilly - CompTIA Network (N10-006)

    300000006A0130.CompTIA.Network.N10006.part01.OR.rar

    300000006A0130.CompTIA.Network.N10006.part02.OR.rar

    300000006A0130.CompTIA.Network.N10006.part03.OR.rar

    300000006A0130.CompTIA.Network.N10006.part04.OR.rar

    300000006A0130.CompTIA.Network.N10006.part05.OR.rar

    300000006A0130.CompTIA.Network.N10006.part06.OR.rar

    300000006A0130.CompTIA.Network.N10006.part07.OR.rar

    300000006A0130.CompTIA.Network.N10006.part08.OR.rar

    300000006A0130.CompTIA.Network.N10006.part09.OR.rar

    300000006A0130.CompTIA.Network.N10006.part10.OR.rar

    300000006A0130.CompTIA.Network.N10006.part11.OR.rar


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Coktum   |  

Information
Members of Guests cannot leave comments.




rss