Duration : 20 H 41 M
Video Lessons : 228
Subtitle : Yes
CompTIA Network+ (N10-007) PART-01
1. OSI Layers, Ports & Protocols: AXI
2. OSI Layers, Ports & Protocols: ASCI
3. OSI Layers, Ports & Protocols: TCP / IP Suite Layers
4. OSI Layers, Ports & Protocols: Core TCP / IP Protocols
5. OSI Layers, Ports & Protocols: TCP / IP Protocols
6. OSI Layers, Ports & Protocols: Ports / IP
7. OSI Layers, & Ports Protocols: Verifying Ports L4 with Wireshark
8. OSI Layers, & Ports Protocols: Common and Their Protocols Well-known Ports
9. OSI Layers, & Ports Protocols: TCP 's Three-way Handshake
10. OSI Layers, Ports & Protocols TCP 3-Way Handshake
11. Ethernet Switching: Properties of Network Traffic
12. Ethernet Switching: Layers 2 Ethernet Addresses
13. Ethernet Switching: How a Layer 2 Switch Works
14. Ethernet Switching: Demonstration: Switch Dynamic Learning
15. Ethernet Switching: Understanding VLANs
16. Ethernet Switching: Configuring a VLAN
17. Ethernet Switching: Overview of 802.1Q and Trunks
18 Ethernet Switching: Configuring an 802.1Q Ethernet Trunk
19. Ethernet Switching: Operates
. 20. Ethernet Switching: Predicting the MAC Address Table
. 21. Ethernet Switching: Validating MAC Address Table Predictions
. 22. Ethernet Switching Game: Predict MAC Table After PC1 Pings PC4
23. Ethernet Switching Game: Predict MAC Table After PC3 Pings PC5
24. Ethernet Switching: Switching Loops and Spanning Tree Protocol (STP)
25. Ethernet Switching: STP Reacting to a Network Change
26. Ethernet Switching: Design Considerations and PoE
27. Ethernet Switching: Switch Port Mirroring
28. IP Routing and Forwarding: Introduction to IP Routing
29. IP Routing and Forwarding: How to Train a Router
30. IP Routing and Forwarding: Options for Static Route
31. IP Routing and Forwarding: Configuring Static Routes
32. IP Routing and Forwarding: Dynamic Routing Protocol Overview
33. IP Routing and Forwarding: Dynamic Routing Protocol Demonstration
4. IP Routing and Forwarding: Address Translation with
35. IP Routing and Forwarding: One- to-one Translations with NAT
36. Routing and Forwarding IP: Using Wireshark to Verify IP Translations
37. IP Routing and Forwarding: Access Control Lists
38. IP Routing and Forwarding: ACL Demonstration
39. IP Routing and Forwarding: Enterprise Network Forwarding
40. IP Addressing and Subnetting: IPv4 Overview
41. IP Addressing and Subnetting: Binary Basics
42. IP Addressing and Subnetting: Converting Decimal to Binary
43. IP Addressing and Subnetting: Converting Binary to Decimal
44. IP Addressing and Subnetting: The IP Mask
45. IP Addressing and Subnetting: Practice Using a Different IP Mask
46. IP Addressing and Subnetting: Borrowing Host Bits
47. IP Addressing and Subnetting: Practicing the Finger Game
48. IP Addressing and Subnetting: Identifying New Subnets
49. IP Addressing and Subnetting Exercise 1: Identifying the New Subnets
50. IP Addressing and Subnetting Exercise 2 : Identify the New Subnets
51. IP Addressing and Subnetting: ID
52. IP Addressing and Subnetting Exercise 1: ID
53 Valid Host Addresses 5. IP Addressing and Subnetting Exercise 2: ID Valid Host Addresses
54. IP Addressing and Subnetting: Calculate the Number of Hosts per Subnet
55. IP Addressing and Subnetting: Hosting IP Address
56. IP Addressing and Subnetting: Planning and Assigning IP Addresses
57. IP Addressing and Subnetting: Test Your IPv4 Knowledge Lab
58. IP Addressing and Subnetting: IPv6 Concepts
59. Network Topologies: Wired Topologies
60. Network Topologies: Wireless Topologies
61. Network Topologies: Types of Networks
62. Network Topologies: Introducing the Internet of Things (IoT)
63. Network Topologies: Internet of Things (IoT) Technologies
64. Wireless Technologies and Configurations: The Purpose of Wireless
. 65. Wireless Technologies and Configurations: Understanding Radio Frequency
66. Wireless Technologies and Configurations: Understanding Radio Channels
67. Wireless Technologies and Configurations: Wireless Communication Technologies
68 . Wireless Technologies and Configurations: Designing for Wireless Speed and Coverage
69. Configurations and Wireless Technologies: Understanding Wireless Antennas
70. Configurations and Wireless Technologies: Wireless Performance Improvements
71. Cloud Concepts: Types of Services
72. Cloud Concepts: Cloud Delivery Models
73. Cloud Concepts: Connectivity Methods
74. Cloud Concepts: Security Implications / Considerations
75. Cloud Concepts: Local and Cloud Resource Relationships
CompTIA Network+ (N10-007) PART-02
76. Network Services: DHCP Overview
77. Network Services: Verify DHCP with Wireshark
78. Network Services: DNS Overview
79. Network Services: DNS Methods, Records, and Design Options
80. Network Services: DNS Testing and Validation
81. Network Services: Network Time Protocol (NTP)
82. Network Services: IP Address Management (IPAM)
83. Deploying Appropriate Cabling Solutions: Copper Network Media Types
84. Deploying Appropriate Cabling Solutions: Fiber Network Media Types
85. Deploying Appropriate Cabling Solutions: Network Termination Points
86. Deploying Appropriate Cabling Solutions: Network Transceivers
87. Device Placement and Configuration: Network Device Placement
88. Device Placement and Configuration: Device Configuration Overview
89. Device Placement and Configuration: Configure Switch Ports Lab
90. Device Placement and Configuration: Configure IP Addresses Lab
91. Device Placement and Configuration: Configure IP Routing Lab
92. Device Placement and Configuration: Configuring DHCP Services Lab
93. Device Placement and Configuration: Configuring a VLAN Interface Lab
94. Device Placement and Configuration: Configuring NAT Lab
95. Advanced Networking Devices: Multi-Layer Switch Overview
96. Advanced Networking Devices: Configure Multi-Layer Switch: Lab
97. Advanced Networking Devices: Load Balancer Overview
98. Advanced Networking Devices: IDS and IPS
99. Advanced Networking Devices: Proxy Servers and Content Filtering
100. Advanced Networking Devices: Security Network Devices
101. Advanced Networking Devices: AAA / RADIUS Server
102. Advanced Networking Devices: VoIP PBX and Gateway
103. Advanced Networking Devices: Wireless Controller
104. Virtualization & Network Storage: Hypervisor Introduction
105. Virtualization & Network Storage: Virtual Networking Components
106. Virtualization & Network Storage: Virtual Switch & VM Lab
107. Virtualization & Network Storage: Network Storage
108. WAN Technologies: Understanding the LAN, MAN, and WAN Difference
109. WAN Technologies: WAN Transmission over Copper, Fiber, Wireless, and Satellite
110. WAN Technologies: WAN Types - ISDN / PRI, T1-T3, E1-E3, and OC
111. WAN Technologies: WAN Types - Cable, DSL, Dial-up
112. WAN Technologies: WAN Characteristics - Frame Relay, ATM, MPLS, and DMVPN
113. WAN Technologies: What is PPP and PPPoE?
114. WAN Technologies: What is SIP Trunking?
115. WAN Technologies: WAN Connection
116. Network Diagram & Documentation: Network Documentation is Fun!
117. Network Diagram & Documentation: Creating Logical Network Diagrams
118. Network Diagram & Documentation: Creating Physical Diagrams
119. Network Diagram & Documentation: Naming Conventions and Labeling
120. Network Diagram & Documentation: Documenting Wiring and Port Locations
121. Network Diagram & Documentation: SOPs and Work Instructions
122. Network Diagram & Documentation: Network Management Change
123. Network Diagram & Documentation: Configuration and Monitoring Baselines
124. Network Diagram & Documentation: Inventory Management
125. Business Continuity: Availability Concepts
126. Business Continuity: Load Sharing and Balancing
127. Business Continuity: Power Management
128. Business Continuity: Site Recovery Options
129. Business Continuity: Backups
130. Business Continuity: Backup and Restore Hands On Lab
131. Business Continuity: MTBF and MTTR
132. Business Continuity: SLA Requirements
33. Scanning, Monitoring & Patching: Overview Scanning
134. Scanning, & Patching Monitoring: Network Scanning Methodology
135. Scanning, Monitoring & Patching: Port Scanning and Discovery
136. Scanning, Monitoring & Patching: OS Discovery and Fingerprinting
137. Scanning, Monitoring & Patching: Motivators for Vulnerability Management
138. Scanning, Monitoring & Patching: Vulnerability Scanning
139. Scanning, Monitoring & Patching: Logging and Review
140. Scanning, Monitoring & Patching: Packet and Traffic Analysis
141. Scanning, Monitoring & Patching: Packet Capture and Analysis Lab
142. Scanning, Monitoring & Patching: Remediation and Patch Management
143. Scanning, Monitoring & Patching: Network Scanning with NMAP and Zenmap Lab
144. Scanning, Monitoring & Patching: Baselines
145. Remote Access Methods: Telnet and SSH for CLI Remote Access
146. Remote Access Methods: HTTPS Management URLs
147. Remote Access Methods: VPNs
148. Remote Access Methods: Remote Desktop Access
149. Remote Access Methods: Out-of-Band Management
150. Identify Policies & Best Practices: Privileged User Agreement
CompTIA Network+ (N10-007) PART-03
151. Identify Policies & Best Practices: Password Policy
152. Identify Policies & Best Practices: On-boarding and Off-boarding
153. Identify Policies & Best Practices: Licensing Restrictions
154. Identify Policies & Best Practices: International Export Controls
155. Identify Policies & Best Practices: Data Loss Prevention
156. Identify Policies & Best Practices: Remote Access Policies
157. Identify Policies & Best Practices: Incident Response Policies
158. Identify Policies & Best Practices: Bring Your Own Device (BYOD)
159. Identify Policies & Best Practices: Acceptable Use Policy (AUP)
160. Identify Policies & Best Practices: Non-disclosure Agreements (NDA)
161. Identify Policies & Best Practices: System Life Cycle
162. Identify Policies & Best Practices: Safety Procedures and Policies
163. Physical Security & Network Attacks: Let's Break into a Data Center
164. the Physical Security & the Network Attacks: the Video Surveillance and the Motion Detection's
165. the Physical Security & the Network Attacks: Badges and the Smart Cards
166. the Physical Security & the Network Attacks: Biometrics
167. Physical Security & Network Attacks: Locks, Asset Tags, and Tamper Detection
168. Physical Security & Network Attacks: DoS and PDoS (Permanent Denial of Service)
169. Physical Security & Network Attacks: DDoS (Distributed Denial of Service)
170. Physical Security & Network Attacks: DDoS with ICMP and Smurfing
171. Physical Security & Network Attacks: DDoS with DNS and NTP
172. Physical Security & Network Attacks: Let's Go Phishing
173. Physical Security & Network Attacks: Social Engineering and Insider Threats
174. Physical Security & Network Attacks: Ransomware and Scareware
175. Physical Security Network & Attacks: Cryptolocker and Logic Bombs
176. Physical Security & Network Attacks: DNS Spoofing (Poisoning)
177. Physical Security & Network Attacks: Man-In-The-Middle with ARP Spoofing
178. Physical Security & Network Attacks: Wardriving and Deauthentication
179. Physical Security & Network Attacks: Evil Twins and Rogue Access Points
180. Authentication & Access Control: AAA
181. Authentication & Access Control: Multi-factor Authentication Overview
182. Authentication & Access Control: Using Two-Factor Authentication (2FA)
183. Authentication & Access Control Demo: Implementing 2FA
184. Authentication & Access Control: Switch Port Security
185. Authentication & Access Control: Access Control Methods
186. Basic Wireless Network Security: The Wireless Security Evolution
187. Basic Wireless Network Security: Authentication and Authorization Wireless Types
188. Mitigation Techniques: Network Device Hardening
189. Mitigation Techniques: Hardening a Windows Server System
190. Mitigation Techniques: Signature Management
191. Mitigation Techniques: File Integrity Monitoring
192. Mitigation Techniques: Privileged User Accounts and Role Separation
193. Mitigation Techniques: Network Segmentation
194. Mitigation Techniques: Switch Port Protections
195. Mitigation Techniques: The Native VLAN
196. Mitigation Techniques: Filtering with Access Control Lists (ACLs)
197. Mitigation Techniques: Honeypots and Honeynets
198. Mitigation Techniques: Penetration Testing
199. Troubleshooting Methodology: a Methodology Network Troubleshooting
200. Troubleshooting Methodology: Identify the Problem
201. Troubleshooting Methodology: Establish a Theory of Probable Cause
202. Troubleshooting Methodology: Test the Theory to Determine the Root Cause
203. Troubleshooting Methodology: Establish a Plan of Action to Solve the Problem
204. Troubleshooting Methodology: Problem Solving, Verification, and Documentation
205. Network Troubleshooting: Hardware Tools
206. Network Troubleshooting: Software Tools
207. Network Troubleshooting: Using the CLI Network Tools: ipconfig, ping, arp
208. Network Troubleshooting: Using the CLI Network Tools: nslookup, dig
209. Network Troubleshooting: Using CLI Network Tools: tracert, pathping, nmap, route
210. Network Troubleshooting: Using CLI Network Tools: ifconfig, iptables, tcpdump, and netstat
211. Wired Connectivity & Performance Issues: Attenuation, Latency, and Jitter
212. Wired Connectivity & Performance Issues: Crosstalk, EMI, Open / Short
213. Wired Connectivity & Performance Issues: Incorrect Pin-Outs or Cable Types
214. Wired Connectivity & Performance Issues: Mismatched Damaged Cables and
215. Wired Connectivity & Performance Issues: Bad Ports and LED Status Indicators
216. Wired Connectivity & Performance Issues: Duplex and Speed Mismatches
217. Wired Connectivity & Performance Issues:VLAN Mismatches
218. Wired Connectivity & Performance Issues: Native VLAN Mismatches
219. Wired Connectivity & Performance Issues: Bottlenecks
220. Troubleshooting Wireless: The Nature of Airwaves
221. Wireless Troubleshooting: Fighting Frequencies
222. Wireless Troubleshooting : Understanding Antenna Types
223. Troubleshooting Wireless: Misconfigurations
224. Common Network Service Issues: Troubleshooting Name Resolution
225. Common Network Service Issues: Troubleshooting MAC Addressing
226. Common Network Service Issues: Troubleshooting IP Addressing
227. Common Network Service Issues: Troubleshooting Security Settings
228. Common Network Service Issues: Troubleshooting Miscellaneous Service Issues
No comments:
Post a Comment