Search This Blog

Showing posts with label Networking tutorial. Show all posts
Showing posts with label Networking tutorial. Show all posts

Thursday, July 4, 2019

SonicWALL Firewall Network security Video Training Course DVD



Duration : 5 hours

DOWNLOAD Size : 443 MB

This video Course is focused on deploying a SonicWALL Firewall appliance connected to the Internet edge using the latest SonicOS. 
We will show you how to configure many of the great features provided from firewall policies, 
VPN, 
VLAN tagging, 
wireless, 
Advanced security services like content filtering for real world deployments step-by-step.

Introduction
Intial Access into the SonicWALL
LAN and WAN Interfaces
Confirm Access to Internet from SonicWALL
Registration
Changing the Administrator Password
Confirm Internet Access from LAN
NAT and Firewall Configuration
Network Zones
Upgrading SonicOS Firmware
SMTP Settings
Network Monitor
DHCP Server
Remote Access
Client VPN using IPSec
Client VPN using L2TP over IPSec
Client VPN using SSL VPN
Client VPN using iPad (iPhone)
Backup
Security Services
Anti-Virus
Intrusion Prevention
Anti-Spyware
Content Filtering
Enabling Security Services
Site-to-Site VPN to a Cisco Router
Logs and Reports
Static Routes
Guest Services
802.1Q and VLAN Configuration
DMZ Network Configuring using VLAN
Guest Network Configuring using VLAN
Wireless Configuration
Internal Wireless Network Configuration
Guest Wireless Network Configuration
WAN Failover

Juniper SSG Firewall Practical Video Training Course DVD




Duration : 3.30 Hours
Size : 1.38 GB
48 Video Lessons

The video Training Course is focused on deploying a Juniper Firewall appliance in a practical type deployment that involves a user network, a guest network, and a DMZ server network. You will learn how to configure the Juniper SSG firewall step-by-step for many of the common features with firewall policies, Client VPN, Site VPN with a Cisco router, to 802.1Q trunking (VLAN tagging). Our configuration will also involve Network Address Translation (NAT) using the DIP, MIP, and VIP features in our topology. We will configure our Juniper firewall in NAT mode, but also in Transparent mode with firewall policies. We will configure and talk the truth about Screening (Advanced Security). 

Introduction and Juniper Defaults
Juniper Network Design
Zones
Network Configuration (VTP, VLAN, 802.1Q)
LAN Interfaces (Users, Guests, DMZ/Server)
Upgrading ScreenOS
WAN Interface
Static Routing
Basic Administration
Factory Defaults
NAT (MIP) and Firewall Policies
NAT (VIP) Port Redirect
Using Dedicated IP Address
Using WAN Interface IP Address
Firewall Policies using Policy Elements
Site IPSec VPN with Cisco Router
Web Authentication (WebAuth)
DHCP
NAT (DIP) using WAN Interface IP
NAT (DIP) using Dedicated IP Address
Client IPSec VPN (using Shrew Soft)
Screening
Logging and Syslog
Reports
Time Services using NTP
Bandwidth Interface
Transparent Firewall
Transparent Firewall Policies
Virtual Routers (VR)
Dynamic Routing: OSPF

Juniper SRX JUNOS Firewall Practical LAB Video Training Course DVD




Duration : 10 hours 

Size : 4.41 GB




The video lessons  in this course is applicable for Juniper SRX using JUNOS version 12.1 and later.

Juniper SRX security appliance is a Next-Generation Firewall/Router that is focused on application inspection using Unified Threat Management (UTM) services. 
We have a range of basic to advanced topics that will show you how to deploy the Juniper SRX appliance step-by-step in a practical implementation.

Overview (Concepts and Design)
Initial Access and Setup
J-Web and System Properties
JUNOS Overview (CLI Structure, CLI Tools)
Software Update
Security Zones
Interfaces (LAN, WAN) & Default Gateway
General Routing
OSPF Routing:
General OSPF Routing
Injecting Default Route via OSPF
Tuning OSPF Hello and Dead Timers
Security Policy Components
Address Book (Policy Elements)
Source NAT (using Interface and Pool)
Static NAT
NAT Port Forwarding
Security Policy
Firewall Authentication (Pass-Through)
Dynamic VPN (Client VPN) using Pulse Secure Client
UTM – Web Filtering using Juniper Enhanced
UTM – Anti-Virus using Kaspersky Lab
UTM – Content Filtering
AppSecure – Intrusion Detection and Prevention (IDP)
AppSecure – Application Firewall (AppFW), Application Tracking
Blocking Applications (Skype, BitTorrent) using IDP and AppFW
Policy-Based IPSec VPN (Site VPN)

Palo Alto Networks Practical Labs Video Training Course DVD




Duration : 11 hours 

Size : 4.43GB



The video labs in this Training is applicable for PAN OS versions 5.X to 7.X environments.

Palo Alto Networks Overview:
Palo Alto Network Fundamentals
Network Design
Network Diagram
Designing your PAN in the Network
Initial Access into PAN
Defaults
Initial Access
Overview of Dashboard
Registering the PAN
Management Interface
General Settings & Services
Hostname
Login Banner
Timezone
Changing Passwords
DNS and NTP
Management Services
Basic Operations (Restart, Export Config)
Security Zones
Virtual Routers
Interfaces
LAN (Trust) Interface
WAN (Untrust) Interface
Static Routes
Default Static Route to Internet
OSPF Routing
OSPF Configuration on Cisco L3 Core Switch
OSPF Configuration on PAN
Verifying and Testing OSPF
Upgrading the PAN-OS
Upgrade Path
Application and Threat Updates
Upgrade Process and Confirmation
NAT
Port Address Translation (PAT)
Static NAT Translation using Dedicated IP Address
Creating Address Objects
Creating Security Rule
NAT Port Forwarding
Security Policies
Filtering based on Protocol and Port
Overview of Application Inspection
Filtering based on Applications
Creating Service Objects
Creating Service Groups
Testing Security Rules
Outbound SSL Decryption
Introduction
Certificate
Installing Certificate into Client Web Browser
Decryption Policy
Application Database
Application Categories
Security Policy using Facebook and Outlook Web
Recommendations
Adding other another Facebook Sub-Application
Issue Reported with Decryption Policy
URL Filtering
URL Filtering (Block, Continue)
Custom Block Page
Block List
Custom URL Category
GlobalProtect (Client VPN)
Certificate
LDAP for User Authentication
Tunnel Interface
Gateway and Portal
Security Policy
Testing from Apple iOS
Testing from Windows 8
Viewing VPN user activity
Site-to-Site VPN (VTI)
VPN Configuration on Cisco IOS Router
VPN Configuration on PAN
Static Routing over VPN Tunnel
OSPF Routing over VPN Tunnel
Validation & Testing
Guest Network
VLAN and 802.1Q Configuration on Network
802.1Q (VLAN tagging) on PAN
DHCP
Validation & Testing
Sending Logs to Syslog Server
SNMPv3
Enabling SNMPv3
Adding PAN to an NMS (Manage Engine’s Opmanager)
Netflow
Enabling Netflow
Adding PAN to a Netflow Analyzer Server
Enabling SNMP3 on Netflow Server
Viewing traffic reports for application and top-talkers
File Blocking (Google Mail)
Firewall Policy and Profile
Decryption Policy
Testing File Blocking
Monitoring File Blocking
Monitoring Decryption
Testing when changing the file type
Anti-Virus Blocking
Anti-Virus Profile
Firewall Policy
Decryption Policy
Testing Anti-Virus Blocking (Non-Secure, Secure web pages
Factory Reset
BGP Routing
Configuring BGP Routing
Inbound Route Advertisements to PAN
Outbound Route Advertisements from PAN
Routing Filtering
Testing and Monitoring
Captive Portal
Review of LDAP profile and Authentication Profile
User Identification
Security and Captive Policies
Testing and Monitoring
User Identification using Active Directory (without an Agent)
Configuration on Active Directory Domain Controller
User Identification Configuration on PAN appliance
Creating security policies
Testing and Monitoring
Considerations when using User-ID
Dual Internet using Policy Based Forwarding
DoS Protection (Zone Protection)
DoS Overview
Zone Protection Configuration
Monitoring and Testing
Virtual Wire (Transparent Firewall)
High Availability (Active/Passive)
App-ID
App-ID Overview and Navigation
Blocking Skype Application
Blocking BitTorrent Application
Using Application Groups
Monitoring Blocked Applications on the PAN
Dynamic Block List
Vulnerability Protection (IPS)
Configuration Formats
Custom IPS Signatures
Data Filtering

Friday, February 8, 2019

Cisco CCNP Security 300-206 SENSS Exam 30 Hours Video Training Course on 2 DVDs



DURATION : 30hr 15min


Course Outline: 
Introduction4 Videos
Course Introduction
Course Topology & Equipment
Certification & Exam Preparation :: Part 1
Certification & Exam Preparation :: Part 2

Control Plane Security5 Videos
Network Device Planes of Operation
Control Plane Policing :: Part 1
Control Plane Policing :: Part 2
Control Plane Protection
Routing Protocol Security

Management Plane Security 19 Videos
Management Plane Protection
Secure Device Management
SNMP Overview
SNMP Configuration :: Part 1
SNMP Configuration :: Part 2
NTP Overview :: Part 1
NTP Overview :: Part 2
NTP Configuration
Network Event Logging :: Part 1
Network Event Logging :: Part 2
Netflow :: Part 1
Netflow :: Part 2
AAA Overview :: Part 1
AAA Overview :: Part 2
IOS AAA Configuration :: Part 1
IOS AAA Configuration :: Part 2
ASA AAA Configuration :: Part 1
ASA AAA Configuration :: Part 2
ASA AAA Configuration :: Part 3

Data-Plane Security 12 Videos
Port Security
DHCP Snooping Overview :: Part 1
DHCP Snooping Overview :: Part 2
DHCP Snooping Configuration
Dynamic ARP Inspection Overview
Dynamic ARP Inspection Configuration
IP Spoofing Overview
IP Spoofing Configuration
STP Security Toolkit
Storm Control
Private VLAN Overview
Private VLAN Configuration

IOS Firewall Threat Defense 18 Videos
NAT Overview :: Part 1
NAT Overview :: Part 2
Static NAT Configuration
Dynamic NAT Configuration
Policy NAT Configuration :: Part 1
Policy NAT Configuration :: Part 2
Zone Based Policy Firewall Overview
Two Zone Firewall Configuration :: Part 1
Two Zone Firewall Configuration :: Part 2
Two Zone with NAT Firewall Configuration
Three Zone Firewall Configuration :: Part 1
Three Zone Firewall Configuration :: Part 2
Zone Based Policy Firewall Tuning Overview
Zone Based Policy Firewall Tuning Configuration
Zone Based Policy Firewall Application Inspection :: Part 1
Zone Based Policy Firewall Application Inspection :: Part 2
Zone Based Policy Firewall Self Zone :: Part 1
Zone Based Policy Firewall Self Zone :: Part 2

ASA Firewall Threat Defense 20 Videos
ASA Firewall Overview :: Part 1
ASA Firewall Overview :: Part 2
ASA Firewall ACL Overview :: Part 1
ASA Firewall ACL Overview :: Part 2
ASA Firewall ACL Configuration :: Part 1
ASA Firewall ACL Configuration :: Part 2
ASA Firewall Object Groups
ASA Identity Firewall Overview :: Part 1
ASA Identity Firewall Overview :: Part 2
ASA Firewall Modular Policy Framework Overview :: Part 1
ASA Firewall Modular Policy Framework Overview :: Part 2
ASA Firewall MPF Advanced Inspections :: Part 1
ASA Firewall MPF Advanced Inspections :: Part 2
ASA Firewall MPF Dynamic Protocol Inspection :: Part 1
ASA Firewall MPF Dynamic Protocol Inspection :: Part 2
ASA Firewall MPF Application Inspection
ASA Firewall NAT Overview
ASA Firewall Object NAT Configuration
ASA Firewall Twice NAT Configuration :: Part 1
ASA Firewall Twice NAT Configuration :: Part 2


Buy This Course DVD Now @







                                   






CompTIA Network+ (N10-007) Exam 20 Hours Video Training Course DVD



Duration : 20 H 41 M
Video Lessons : 228
Subtitle : Yes



CompTIA Network+ (N10-007) PART-01
1. OSI Layers, Ports & Protocols: AXI 
2. OSI Layers, Ports & Protocols: ASCI 
3. OSI Layers, Ports & Protocols: TCP / IP Suite Layers 
4. OSI Layers, Ports & Protocols: Core TCP / IP Protocols 
5. OSI Layers, Ports & Protocols: TCP / IP Protocols 
6. OSI Layers, Ports & Protocols: Ports / IP 
7. OSI Layers, & Ports Protocols: Verifying Ports L4 with Wireshark 
8. OSI Layers, & Ports Protocols: Common and Their Protocols Well-known Ports 
9. OSI Layers, & Ports Protocols: TCP 's Three-way Handshake 
10. OSI Layers, Ports & Protocols TCP 3-Way Handshake 
11. Ethernet Switching: Properties of Network Traffic 
12. Ethernet Switching: Layers 2 Ethernet Addresses 
13. Ethernet Switching: How a Layer 2 Switch Works 
14. Ethernet Switching: Demonstration: Switch Dynamic Learning 
15. Ethernet Switching: Understanding VLANs 
16. Ethernet Switching: Configuring a VLAN 
17. Ethernet Switching: Overview of 802.1Q and Trunks 
18 Ethernet Switching: Configuring an 802.1Q Ethernet Trunk 
19. Ethernet Switching: Operates 
. 20. Ethernet Switching: Predicting the MAC Address Table 
. 21. Ethernet Switching: Validating MAC Address Table Predictions 
. 22. Ethernet Switching Game: Predict MAC Table After PC1 Pings PC4 
23. Ethernet Switching Game: Predict MAC Table After PC3 Pings PC5 
24. Ethernet Switching: Switching Loops and Spanning Tree Protocol (STP) 
25. Ethernet Switching: STP Reacting to a Network Change 
26. Ethernet Switching: Design Considerations and PoE 
27. Ethernet Switching: Switch Port Mirroring 
28. IP Routing and Forwarding: Introduction to IP Routing 
29. IP Routing and Forwarding: How to Train a Router 
30. IP Routing and Forwarding: Options for Static Route 
31. IP Routing and Forwarding: Configuring Static Routes 
32. IP Routing and Forwarding: Dynamic Routing Protocol Overview 
33. IP Routing and Forwarding: Dynamic Routing Protocol Demonstration 
4. IP Routing and Forwarding: Address Translation with 
35. IP Routing and Forwarding: One- to-one Translations with NAT 
36. Routing and Forwarding IP: Using Wireshark to Verify IP Translations 
37. IP Routing and Forwarding: Access Control Lists 
38. IP Routing and Forwarding: ACL Demonstration 
39. IP Routing and Forwarding: Enterprise Network Forwarding 
40. IP Addressing and Subnetting: IPv4 Overview 
41. IP Addressing and Subnetting: Binary Basics 
42. IP Addressing and Subnetting: Converting Decimal to Binary 
43. IP Addressing and Subnetting: Converting Binary to Decimal 
44. IP Addressing and Subnetting: The IP Mask 
45. IP Addressing and Subnetting: Practice Using a Different IP Mask 
46. ​​IP Addressing and Subnetting: Borrowing Host Bits
47. IP Addressing and Subnetting: Practicing the Finger Game 
48. IP Addressing and Subnetting: Identifying New Subnets 
49. IP Addressing and Subnetting Exercise 1: Identifying the New Subnets 
50. IP Addressing and Subnetting Exercise 2 : Identify the New Subnets 
51. IP Addressing and Subnetting: ID 
52. IP Addressing and Subnetting Exercise 1: ID 
 53 Valid Host Addresses 5. IP Addressing and Subnetting Exercise 2: ID Valid Host Addresses 
54. IP Addressing and Subnetting: Calculate the Number of Hosts per Subnet 
55. IP Addressing and Subnetting: Hosting IP Address 
56. IP Addressing and Subnetting: Planning and Assigning IP Addresses 
57. IP Addressing and Subnetting: Test Your IPv4 Knowledge Lab 
58. IP Addressing and Subnetting: IPv6 Concepts 
59. Network Topologies: Wired Topologies 
60. Network Topologies: Wireless Topologies 
61. Network Topologies: Types of Networks 
62. Network Topologies: Introducing the Internet of Things (IoT) 
63. Network Topologies: Internet of Things (IoT) Technologies 
64. Wireless Technologies and Configurations: The Purpose of Wireless 
. 65. Wireless Technologies and Configurations: Understanding Radio Frequency 
66. Wireless Technologies and Configurations: Understanding Radio Channels 
67. Wireless Technologies and Configurations: Wireless Communication Technologies 
68 . Wireless Technologies and Configurations: Designing for Wireless Speed and Coverage 
69. Configurations and Wireless Technologies: Understanding Wireless Antennas 
70. Configurations and Wireless Technologies: Wireless Performance Improvements 
71. Cloud Concepts: Types of Services 
72. Cloud Concepts: Cloud Delivery Models 
73. Cloud Concepts: Connectivity Methods 
74. Cloud Concepts: Security Implications / Considerations 
75. Cloud Concepts: Local and Cloud Resource Relationships 
CompTIA Network+ (N10-007) PART-02
76. Network Services: DHCP Overview 
77. Network Services: Verify DHCP with Wireshark 
78. Network Services: DNS Overview 
79. Network Services: DNS Methods, Records, and Design Options 
80. Network Services: DNS Testing and Validation 
81. Network Services: Network Time Protocol (NTP) 
82. Network Services: IP Address Management (IPAM) 
83. Deploying Appropriate Cabling Solutions: Copper Network Media Types 
84. Deploying Appropriate Cabling Solutions: Fiber Network Media Types 
85. Deploying Appropriate Cabling Solutions: Network Termination Points 
86. Deploying Appropriate Cabling Solutions: Network Transceivers 
87. Device Placement and Configuration: Network Device Placement 
88. Device Placement and Configuration: Device Configuration Overview 
89. Device Placement and Configuration: Configure Switch Ports Lab 
90. Device Placement and Configuration: Configure IP Addresses Lab 
91. Device Placement and Configuration: Configure IP Routing Lab 
92. Device Placement and Configuration: Configuring DHCP Services Lab 
93. Device Placement and Configuration: Configuring a VLAN Interface Lab 
94. Device Placement and Configuration: Configuring NAT Lab 
95. Advanced Networking Devices: Multi-Layer Switch Overview 
96. Advanced Networking Devices: Configure Multi-Layer Switch: Lab 
97. Advanced Networking Devices: Load Balancer Overview 
98. Advanced Networking Devices: IDS and IPS 
99. Advanced Networking Devices: Proxy Servers and Content Filtering 
100. Advanced Networking Devices: Security Network Devices 
101. Advanced Networking Devices: AAA / RADIUS Server 
102. Advanced Networking Devices: VoIP PBX and Gateway 
103. Advanced Networking Devices: Wireless Controller 
104. Virtualization & Network Storage: Hypervisor Introduction 
105. Virtualization & Network Storage: Virtual Networking Components 
106. Virtualization & Network Storage: Virtual Switch & VM Lab 
107. Virtualization & Network Storage: Network Storage 
108. WAN Technologies: Understanding the LAN, MAN, and WAN Difference 
109. WAN Technologies: WAN Transmission over Copper, Fiber, Wireless, and Satellite 
110. WAN Technologies: WAN Types - ISDN / PRI, T1-T3, E1-E3, and OC 
111. WAN Technologies: WAN Types - Cable, DSL, Dial-up 
112. WAN Technologies: WAN Characteristics - Frame Relay, ATM, MPLS, and DMVPN 
113. WAN Technologies: What is PPP and PPPoE? 
114. WAN Technologies: What is SIP Trunking? 
115. WAN Technologies: WAN Connection 
116. Network Diagram & Documentation: Network Documentation is Fun!
117. Network Diagram & Documentation: Creating Logical Network Diagrams 
118. Network Diagram & Documentation: Creating Physical Diagrams 
119. Network Diagram & Documentation: Naming Conventions and Labeling 
120. Network Diagram & Documentation: Documenting Wiring and Port Locations 
121. Network Diagram & Documentation: SOPs and Work Instructions 
122. Network Diagram & Documentation: Network Management Change 
123. Network Diagram & Documentation: Configuration and Monitoring Baselines 
124. Network Diagram & Documentation: Inventory Management 
125. Business Continuity: Availability Concepts 
126. Business Continuity: Load Sharing and Balancing 
127. Business Continuity: Power Management 
128. Business Continuity: Site Recovery Options 
129. Business Continuity: Backups 
130. Business Continuity: Backup and Restore Hands On Lab 
131. Business Continuity: MTBF and MTTR 
132. Business Continuity: SLA Requirements 
33. Scanning, Monitoring & Patching: Overview Scanning 
 134. Scanning, & Patching Monitoring: Network Scanning Methodology 
135. Scanning, Monitoring & Patching: Port Scanning and Discovery 
136. Scanning, Monitoring & Patching: OS Discovery and Fingerprinting 
137. Scanning, Monitoring & Patching: Motivators for Vulnerability Management 
138. Scanning, Monitoring & Patching: Vulnerability Scanning 
139. Scanning, Monitoring & Patching: Logging and Review 
140. Scanning, Monitoring & Patching: Packet and Traffic Analysis 
141. Scanning, Monitoring & Patching: Packet Capture and Analysis Lab 
142. Scanning, Monitoring & Patching: Remediation and Patch Management 
143. Scanning, Monitoring & Patching: Network Scanning with NMAP and Zenmap Lab 
144. Scanning, Monitoring & Patching: Baselines 
145. Remote Access Methods: Telnet and SSH for CLI Remote Access 
146. Remote Access Methods: HTTPS Management URLs 
147. Remote Access Methods: VPNs 
148. Remote Access Methods: Remote Desktop Access 
149. Remote Access Methods: Out-of-Band Management 
150. Identify Policies & Best Practices: Privileged User Agreement 
CompTIA Network+ (N10-007) PART-03
151. Identify Policies & Best Practices: Password Policy 
152. Identify Policies & Best Practices: On-boarding and Off-boarding 
153. Identify Policies & Best Practices: Licensing Restrictions 
154. Identify Policies & Best Practices: International Export Controls 
155. Identify Policies & Best Practices: Data Loss Prevention 
156. Identify Policies & Best Practices: Remote Access Policies 
157. Identify Policies & Best Practices: Incident Response Policies 
158. Identify Policies & Best Practices: Bring Your Own Device (BYOD) 
159. Identify Policies & Best Practices: Acceptable Use Policy (AUP) 
160. Identify Policies & Best Practices: Non-disclosure Agreements (NDA) 
161. Identify Policies & Best Practices: System Life Cycle 
162. Identify Policies & Best Practices: Safety Procedures and Policies 
 163. Physical Security & Network Attacks: Let's Break into a Data Center 
 164. the Physical Security & the Network Attacks: the Video Surveillance and the Motion Detection's 
165. the Physical Security & the Network Attacks: Badges and the Smart Cards 
166. the Physical Security & the Network Attacks: Biometrics 
167. Physical Security & Network Attacks: Locks, Asset Tags, and Tamper Detection 
168. Physical Security & Network Attacks: DoS and PDoS (Permanent Denial of Service) 
169. Physical Security & Network Attacks: DDoS (Distributed Denial of Service) 
170. Physical Security & Network Attacks: DDoS with ICMP and Smurfing 
171. Physical Security & Network Attacks: DDoS with DNS and NTP 
172. Physical Security & Network Attacks: Let's Go Phishing 
173. Physical Security & Network Attacks: Social Engineering and Insider Threats 
174. Physical Security & Network Attacks: Ransomware and Scareware 
175. Physical Security Network & Attacks: Cryptolocker and Logic Bombs 
176. Physical Security & Network Attacks: DNS Spoofing (Poisoning) 
177. Physical Security & Network Attacks: Man-In-The-Middle with ARP Spoofing 
178. Physical Security & Network Attacks: Wardriving and Deauthentication 
179. Physical Security & Network Attacks: Evil Twins and Rogue Access Points 
180. Authentication & Access Control: AAA 
181. Authentication & Access Control: Multi-factor Authentication Overview 
182. Authentication & Access Control: Using Two-Factor Authentication (2FA) 
183. Authentication & Access Control Demo: Implementing 2FA 
184. Authentication & Access Control: Switch Port Security 
 185. Authentication & Access Control: Access Control Methods 
186. Basic Wireless Network Security: The Wireless Security Evolution 
187. Basic Wireless Network Security: Authentication and Authorization Wireless Types 
188. Mitigation Techniques: Network Device Hardening 
189. Mitigation Techniques: Hardening a Windows Server System 
190. Mitigation Techniques: Signature Management 
191. Mitigation Techniques: File Integrity Monitoring 
192. Mitigation Techniques: Privileged User Accounts and Role Separation 
193. Mitigation Techniques: Network Segmentation 
194. Mitigation Techniques: Switch Port Protections 
195. Mitigation Techniques: The Native VLAN 
196. Mitigation Techniques: Filtering with Access Control Lists (ACLs) 
197. Mitigation Techniques: Honeypots and Honeynets 
198. Mitigation Techniques: Penetration Testing 
199. Troubleshooting Methodology: a Methodology Network Troubleshooting 
200. Troubleshooting Methodology: Identify the Problem 
201. Troubleshooting Methodology: Establish a Theory of Probable Cause 
202. Troubleshooting Methodology: Test the Theory to Determine the Root Cause 
203. Troubleshooting Methodology: Establish a Plan of Action to Solve the Problem 
204. Troubleshooting Methodology: Problem Solving, Verification, and Documentation 
205. Network Troubleshooting: Hardware Tools 
206. Network Troubleshooting: Software Tools 
207. Network Troubleshooting: Using the CLI Network Tools: ipconfig, ping, arp 
208. Network Troubleshooting: Using the CLI Network Tools: nslookup, dig 
209. Network Troubleshooting: Using CLI Network Tools: tracert, pathping, nmap, route 
210. Network Troubleshooting: Using CLI Network Tools: ifconfig, iptables, tcpdump, and netstat 
211. Wired Connectivity & Performance Issues: Attenuation, Latency, and Jitter 
212. Wired Connectivity & Performance Issues: Crosstalk, EMI, Open / Short 
213. Wired Connectivity & Performance Issues: Incorrect Pin-Outs or Cable Types 
214. Wired Connectivity & Performance Issues: Mismatched Damaged Cables and 
215. Wired Connectivity & Performance Issues: Bad Ports and LED Status Indicators 
216. Wired Connectivity & Performance Issues: Duplex and Speed ​​Mismatches 
217. Wired Connectivity & Performance Issues:VLAN Mismatches
218. Wired Connectivity & Performance Issues: Native VLAN Mismatches 
219. Wired Connectivity & Performance Issues: Bottlenecks 
220. Troubleshooting Wireless: The Nature of Airwaves 
221. Wireless Troubleshooting: Fighting Frequencies 
222. Wireless Troubleshooting : Understanding Antenna Types 
223. Troubleshooting Wireless: Misconfigurations 
224. Common Network Service Issues: Troubleshooting Name Resolution 
225. Common Network Service Issues: Troubleshooting MAC Addressing 
226. Common Network Service Issues: Troubleshooting IP Addressing 
227. Common Network Service Issues: Troubleshooting Security Settings 
228. Common Network Service Issues: Troubleshooting Miscellaneous Service Issues 

Buy This Course DVD Now @