Search This Blog

Friday, February 8, 2019

CompTIA Network+ (N10-007) Exam 20 Hours Video Training Course DVD



Duration : 20 H 41 M
Video Lessons : 228
Subtitle : Yes



CompTIA Network+ (N10-007) PART-01
1. OSI Layers, Ports & Protocols: AXI 
2. OSI Layers, Ports & Protocols: ASCI 
3. OSI Layers, Ports & Protocols: TCP / IP Suite Layers 
4. OSI Layers, Ports & Protocols: Core TCP / IP Protocols 
5. OSI Layers, Ports & Protocols: TCP / IP Protocols 
6. OSI Layers, Ports & Protocols: Ports / IP 
7. OSI Layers, & Ports Protocols: Verifying Ports L4 with Wireshark 
8. OSI Layers, & Ports Protocols: Common and Their Protocols Well-known Ports 
9. OSI Layers, & Ports Protocols: TCP 's Three-way Handshake 
10. OSI Layers, Ports & Protocols TCP 3-Way Handshake 
11. Ethernet Switching: Properties of Network Traffic 
12. Ethernet Switching: Layers 2 Ethernet Addresses 
13. Ethernet Switching: How a Layer 2 Switch Works 
14. Ethernet Switching: Demonstration: Switch Dynamic Learning 
15. Ethernet Switching: Understanding VLANs 
16. Ethernet Switching: Configuring a VLAN 
17. Ethernet Switching: Overview of 802.1Q and Trunks 
18 Ethernet Switching: Configuring an 802.1Q Ethernet Trunk 
19. Ethernet Switching: Operates 
. 20. Ethernet Switching: Predicting the MAC Address Table 
. 21. Ethernet Switching: Validating MAC Address Table Predictions 
. 22. Ethernet Switching Game: Predict MAC Table After PC1 Pings PC4 
23. Ethernet Switching Game: Predict MAC Table After PC3 Pings PC5 
24. Ethernet Switching: Switching Loops and Spanning Tree Protocol (STP) 
25. Ethernet Switching: STP Reacting to a Network Change 
26. Ethernet Switching: Design Considerations and PoE 
27. Ethernet Switching: Switch Port Mirroring 
28. IP Routing and Forwarding: Introduction to IP Routing 
29. IP Routing and Forwarding: How to Train a Router 
30. IP Routing and Forwarding: Options for Static Route 
31. IP Routing and Forwarding: Configuring Static Routes 
32. IP Routing and Forwarding: Dynamic Routing Protocol Overview 
33. IP Routing and Forwarding: Dynamic Routing Protocol Demonstration 
4. IP Routing and Forwarding: Address Translation with 
35. IP Routing and Forwarding: One- to-one Translations with NAT 
36. Routing and Forwarding IP: Using Wireshark to Verify IP Translations 
37. IP Routing and Forwarding: Access Control Lists 
38. IP Routing and Forwarding: ACL Demonstration 
39. IP Routing and Forwarding: Enterprise Network Forwarding 
40. IP Addressing and Subnetting: IPv4 Overview 
41. IP Addressing and Subnetting: Binary Basics 
42. IP Addressing and Subnetting: Converting Decimal to Binary 
43. IP Addressing and Subnetting: Converting Binary to Decimal 
44. IP Addressing and Subnetting: The IP Mask 
45. IP Addressing and Subnetting: Practice Using a Different IP Mask 
46. ​​IP Addressing and Subnetting: Borrowing Host Bits
47. IP Addressing and Subnetting: Practicing the Finger Game 
48. IP Addressing and Subnetting: Identifying New Subnets 
49. IP Addressing and Subnetting Exercise 1: Identifying the New Subnets 
50. IP Addressing and Subnetting Exercise 2 : Identify the New Subnets 
51. IP Addressing and Subnetting: ID 
52. IP Addressing and Subnetting Exercise 1: ID 
 53 Valid Host Addresses 5. IP Addressing and Subnetting Exercise 2: ID Valid Host Addresses 
54. IP Addressing and Subnetting: Calculate the Number of Hosts per Subnet 
55. IP Addressing and Subnetting: Hosting IP Address 
56. IP Addressing and Subnetting: Planning and Assigning IP Addresses 
57. IP Addressing and Subnetting: Test Your IPv4 Knowledge Lab 
58. IP Addressing and Subnetting: IPv6 Concepts 
59. Network Topologies: Wired Topologies 
60. Network Topologies: Wireless Topologies 
61. Network Topologies: Types of Networks 
62. Network Topologies: Introducing the Internet of Things (IoT) 
63. Network Topologies: Internet of Things (IoT) Technologies 
64. Wireless Technologies and Configurations: The Purpose of Wireless 
. 65. Wireless Technologies and Configurations: Understanding Radio Frequency 
66. Wireless Technologies and Configurations: Understanding Radio Channels 
67. Wireless Technologies and Configurations: Wireless Communication Technologies 
68 . Wireless Technologies and Configurations: Designing for Wireless Speed and Coverage 
69. Configurations and Wireless Technologies: Understanding Wireless Antennas 
70. Configurations and Wireless Technologies: Wireless Performance Improvements 
71. Cloud Concepts: Types of Services 
72. Cloud Concepts: Cloud Delivery Models 
73. Cloud Concepts: Connectivity Methods 
74. Cloud Concepts: Security Implications / Considerations 
75. Cloud Concepts: Local and Cloud Resource Relationships 
CompTIA Network+ (N10-007) PART-02
76. Network Services: DHCP Overview 
77. Network Services: Verify DHCP with Wireshark 
78. Network Services: DNS Overview 
79. Network Services: DNS Methods, Records, and Design Options 
80. Network Services: DNS Testing and Validation 
81. Network Services: Network Time Protocol (NTP) 
82. Network Services: IP Address Management (IPAM) 
83. Deploying Appropriate Cabling Solutions: Copper Network Media Types 
84. Deploying Appropriate Cabling Solutions: Fiber Network Media Types 
85. Deploying Appropriate Cabling Solutions: Network Termination Points 
86. Deploying Appropriate Cabling Solutions: Network Transceivers 
87. Device Placement and Configuration: Network Device Placement 
88. Device Placement and Configuration: Device Configuration Overview 
89. Device Placement and Configuration: Configure Switch Ports Lab 
90. Device Placement and Configuration: Configure IP Addresses Lab 
91. Device Placement and Configuration: Configure IP Routing Lab 
92. Device Placement and Configuration: Configuring DHCP Services Lab 
93. Device Placement and Configuration: Configuring a VLAN Interface Lab 
94. Device Placement and Configuration: Configuring NAT Lab 
95. Advanced Networking Devices: Multi-Layer Switch Overview 
96. Advanced Networking Devices: Configure Multi-Layer Switch: Lab 
97. Advanced Networking Devices: Load Balancer Overview 
98. Advanced Networking Devices: IDS and IPS 
99. Advanced Networking Devices: Proxy Servers and Content Filtering 
100. Advanced Networking Devices: Security Network Devices 
101. Advanced Networking Devices: AAA / RADIUS Server 
102. Advanced Networking Devices: VoIP PBX and Gateway 
103. Advanced Networking Devices: Wireless Controller 
104. Virtualization & Network Storage: Hypervisor Introduction 
105. Virtualization & Network Storage: Virtual Networking Components 
106. Virtualization & Network Storage: Virtual Switch & VM Lab 
107. Virtualization & Network Storage: Network Storage 
108. WAN Technologies: Understanding the LAN, MAN, and WAN Difference 
109. WAN Technologies: WAN Transmission over Copper, Fiber, Wireless, and Satellite 
110. WAN Technologies: WAN Types - ISDN / PRI, T1-T3, E1-E3, and OC 
111. WAN Technologies: WAN Types - Cable, DSL, Dial-up 
112. WAN Technologies: WAN Characteristics - Frame Relay, ATM, MPLS, and DMVPN 
113. WAN Technologies: What is PPP and PPPoE? 
114. WAN Technologies: What is SIP Trunking? 
115. WAN Technologies: WAN Connection 
116. Network Diagram & Documentation: Network Documentation is Fun!
117. Network Diagram & Documentation: Creating Logical Network Diagrams 
118. Network Diagram & Documentation: Creating Physical Diagrams 
119. Network Diagram & Documentation: Naming Conventions and Labeling 
120. Network Diagram & Documentation: Documenting Wiring and Port Locations 
121. Network Diagram & Documentation: SOPs and Work Instructions 
122. Network Diagram & Documentation: Network Management Change 
123. Network Diagram & Documentation: Configuration and Monitoring Baselines 
124. Network Diagram & Documentation: Inventory Management 
125. Business Continuity: Availability Concepts 
126. Business Continuity: Load Sharing and Balancing 
127. Business Continuity: Power Management 
128. Business Continuity: Site Recovery Options 
129. Business Continuity: Backups 
130. Business Continuity: Backup and Restore Hands On Lab 
131. Business Continuity: MTBF and MTTR 
132. Business Continuity: SLA Requirements 
33. Scanning, Monitoring & Patching: Overview Scanning 
 134. Scanning, & Patching Monitoring: Network Scanning Methodology 
135. Scanning, Monitoring & Patching: Port Scanning and Discovery 
136. Scanning, Monitoring & Patching: OS Discovery and Fingerprinting 
137. Scanning, Monitoring & Patching: Motivators for Vulnerability Management 
138. Scanning, Monitoring & Patching: Vulnerability Scanning 
139. Scanning, Monitoring & Patching: Logging and Review 
140. Scanning, Monitoring & Patching: Packet and Traffic Analysis 
141. Scanning, Monitoring & Patching: Packet Capture and Analysis Lab 
142. Scanning, Monitoring & Patching: Remediation and Patch Management 
143. Scanning, Monitoring & Patching: Network Scanning with NMAP and Zenmap Lab 
144. Scanning, Monitoring & Patching: Baselines 
145. Remote Access Methods: Telnet and SSH for CLI Remote Access 
146. Remote Access Methods: HTTPS Management URLs 
147. Remote Access Methods: VPNs 
148. Remote Access Methods: Remote Desktop Access 
149. Remote Access Methods: Out-of-Band Management 
150. Identify Policies & Best Practices: Privileged User Agreement 
CompTIA Network+ (N10-007) PART-03
151. Identify Policies & Best Practices: Password Policy 
152. Identify Policies & Best Practices: On-boarding and Off-boarding 
153. Identify Policies & Best Practices: Licensing Restrictions 
154. Identify Policies & Best Practices: International Export Controls 
155. Identify Policies & Best Practices: Data Loss Prevention 
156. Identify Policies & Best Practices: Remote Access Policies 
157. Identify Policies & Best Practices: Incident Response Policies 
158. Identify Policies & Best Practices: Bring Your Own Device (BYOD) 
159. Identify Policies & Best Practices: Acceptable Use Policy (AUP) 
160. Identify Policies & Best Practices: Non-disclosure Agreements (NDA) 
161. Identify Policies & Best Practices: System Life Cycle 
162. Identify Policies & Best Practices: Safety Procedures and Policies 
 163. Physical Security & Network Attacks: Let's Break into a Data Center 
 164. the Physical Security & the Network Attacks: the Video Surveillance and the Motion Detection's 
165. the Physical Security & the Network Attacks: Badges and the Smart Cards 
166. the Physical Security & the Network Attacks: Biometrics 
167. Physical Security & Network Attacks: Locks, Asset Tags, and Tamper Detection 
168. Physical Security & Network Attacks: DoS and PDoS (Permanent Denial of Service) 
169. Physical Security & Network Attacks: DDoS (Distributed Denial of Service) 
170. Physical Security & Network Attacks: DDoS with ICMP and Smurfing 
171. Physical Security & Network Attacks: DDoS with DNS and NTP 
172. Physical Security & Network Attacks: Let's Go Phishing 
173. Physical Security & Network Attacks: Social Engineering and Insider Threats 
174. Physical Security & Network Attacks: Ransomware and Scareware 
175. Physical Security Network & Attacks: Cryptolocker and Logic Bombs 
176. Physical Security & Network Attacks: DNS Spoofing (Poisoning) 
177. Physical Security & Network Attacks: Man-In-The-Middle with ARP Spoofing 
178. Physical Security & Network Attacks: Wardriving and Deauthentication 
179. Physical Security & Network Attacks: Evil Twins and Rogue Access Points 
180. Authentication & Access Control: AAA 
181. Authentication & Access Control: Multi-factor Authentication Overview 
182. Authentication & Access Control: Using Two-Factor Authentication (2FA) 
183. Authentication & Access Control Demo: Implementing 2FA 
184. Authentication & Access Control: Switch Port Security 
 185. Authentication & Access Control: Access Control Methods 
186. Basic Wireless Network Security: The Wireless Security Evolution 
187. Basic Wireless Network Security: Authentication and Authorization Wireless Types 
188. Mitigation Techniques: Network Device Hardening 
189. Mitigation Techniques: Hardening a Windows Server System 
190. Mitigation Techniques: Signature Management 
191. Mitigation Techniques: File Integrity Monitoring 
192. Mitigation Techniques: Privileged User Accounts and Role Separation 
193. Mitigation Techniques: Network Segmentation 
194. Mitigation Techniques: Switch Port Protections 
195. Mitigation Techniques: The Native VLAN 
196. Mitigation Techniques: Filtering with Access Control Lists (ACLs) 
197. Mitigation Techniques: Honeypots and Honeynets 
198. Mitigation Techniques: Penetration Testing 
199. Troubleshooting Methodology: a Methodology Network Troubleshooting 
200. Troubleshooting Methodology: Identify the Problem 
201. Troubleshooting Methodology: Establish a Theory of Probable Cause 
202. Troubleshooting Methodology: Test the Theory to Determine the Root Cause 
203. Troubleshooting Methodology: Establish a Plan of Action to Solve the Problem 
204. Troubleshooting Methodology: Problem Solving, Verification, and Documentation 
205. Network Troubleshooting: Hardware Tools 
206. Network Troubleshooting: Software Tools 
207. Network Troubleshooting: Using the CLI Network Tools: ipconfig, ping, arp 
208. Network Troubleshooting: Using the CLI Network Tools: nslookup, dig 
209. Network Troubleshooting: Using CLI Network Tools: tracert, pathping, nmap, route 
210. Network Troubleshooting: Using CLI Network Tools: ifconfig, iptables, tcpdump, and netstat 
211. Wired Connectivity & Performance Issues: Attenuation, Latency, and Jitter 
212. Wired Connectivity & Performance Issues: Crosstalk, EMI, Open / Short 
213. Wired Connectivity & Performance Issues: Incorrect Pin-Outs or Cable Types 
214. Wired Connectivity & Performance Issues: Mismatched Damaged Cables and 
215. Wired Connectivity & Performance Issues: Bad Ports and LED Status Indicators 
216. Wired Connectivity & Performance Issues: Duplex and Speed ​​Mismatches 
217. Wired Connectivity & Performance Issues:VLAN Mismatches
218. Wired Connectivity & Performance Issues: Native VLAN Mismatches 
219. Wired Connectivity & Performance Issues: Bottlenecks 
220. Troubleshooting Wireless: The Nature of Airwaves 
221. Wireless Troubleshooting: Fighting Frequencies 
222. Wireless Troubleshooting : Understanding Antenna Types 
223. Troubleshooting Wireless: Misconfigurations 
224. Common Network Service Issues: Troubleshooting Name Resolution 
225. Common Network Service Issues: Troubleshooting MAC Addressing 
226. Common Network Service Issues: Troubleshooting IP Addressing 
227. Common Network Service Issues: Troubleshooting Security Settings 
228. Common Network Service Issues: Troubleshooting Miscellaneous Service Issues 

Buy This Course DVD Now @







                                   






No comments:

Post a Comment