Section 1 : Introduction

Lecture 1 Introduction copy 3:14

Section 2 : Network Models

Lecture 2 What is a Model
Lecture 3 OSI vs 6:58
Lecture 4 Walking Through OSI and TCPIP 11:56
Lecture 5 Meet the Frame 5:41
Lecture 6 The MAC Address 7:9
Lecture 7 Broadcast vs 4:10
Lecture 8 Introduction to IP Addressing 7:29
Lecture 9 Packets and Ports 4:44

Section 3 : Cabling and Topology

Lecture 10 Network Topologies 10:1
Lecture 11 Coaxial Cabling 5:13
Lecture 12 Twisted Pair Cabling 6:2
Lecture 13 Cat Ratings 5:55
Lecture 14 Fiber Optic Cabling 8:28
Lecture 15 Fire Ratings 5:9
Lecture 16 Legacy Network Connections 6:53

Section 4 : Ethernet Basics

Lecture 17 What is Ethernet 6:15
Lecture 18 Ethernet Frames 6:35
Lecture 19 Early Ethernet 7:29
Lecture 20 The Daddy of Ethernet, 10BaseT 3:14
Lecture 21 Terminating Twisted Pair 14:12
Lecture 22 Hubs vs 12:26

Section 5 : Modern Ethernet

Lecture 23 100BaseT 5:15
Lecture 24 Connecting Switches 5:6
Lecture 25 Gigabit Ethernet and 10-Gigabit Ethernet 5:8
Lecture 26 Transceivers 6:41
Lecture 27 Connecting Ethernet Scenarios 13:49

Section 6 : Installing a Physical Network

Lecture 28 Introduction to Structured Cabling 4:7
Lecture 29 Terminating Structured Cabling 7:42
Lecture 30 Equipment Room 7:8
Lecture 31 Alternative Distribution Panels 3:29
Lecture 32 Testing Cable 8:38
Lecture 33 Troubleshooting Structured Cabling, Part 1 4:52
Lecture 34 Troubleshooting Structured Cabling, Part 2 5:19
Lecture 35 Using a Toner and Probe 2:37
Lecture 36 Wired Connection Scenarios 10:17

Section 7 : TCPIP Basics

Lecture 37 Introduction to IP Addressing and Binary 12:26
Lecture 38 Introduction to ARP 3:30
Lecture 39 Classful Addressing 10:3
Lecture 40 Subnet Masks 11:53
Lecture 41 Subnetting with CIDR 9:31
Lecture 42 More CIDR Subnetting Practice 9:45
Lecture 43 Dynamic and Static IP Addressing 17:29
Lecture 44 Rogue DHCP Servers 6:16
Lecture 45 Special IP Addresses 6:46
Lecture 46 IP Addressing Scenarios 14:36

Section 8 : Routing

Lecture 47 Introducing Routers 15:5
Lecture 48 Understanding Ports 5:16
Lecture 49 Network Address Translation 6:11
Lecture 50 Implementing NAT 2:26
Lecture 51 Forwarding Ports 17:20
Lecture 52 Tour of a SOHO Router 11:47
Lecture 53 SOHO vs 8:29
Lecture 54 Static Routes 12:25
Lecture 55 Dynamic Routing 10:26
Lecture 56 RIP 4:14
Lecture 57 OSPF 3:23
Lecture 58 BGP 5:29

Section 9 : TCPIP Applications

Lecture 59 TCP and UDP 7:11
Lecture 60 ICMP and IGMP 5:54
Lecture 61 Handy Tools 6:27
Lecture 62 Introduction to Wireshark 10:27
Lecture 63 Introduction to netstat 8:38
Lecture 64 Web Servers 11:42
Lecture 65 FTP 11:36
Lecture 66 E-mail Servers and Clients 9:17
Lecture 67 Securing E-mail 5:39
Lecture 68 Telnet and SSH 9:5
Lecture 69 Network Time Protocol 1:50
Lecture 70 Network Service Scenarios 9:22

Section 10 : Network Naming

Lecture 71 Understanding DNS 11:58
Lecture 72 Applying DNS 18:40
Lecture 73 The Hosts File 3:35
Lecture 74 Net Command 8:0
Lecture 75 Windows Name Resolution 11:12
Lecture 76 Dynamic DNS 5:9
Lecture 77 DNS Troubleshooting 13:3

Section 11 : Securing TCPIP

Lecture 78 Making TCPIP Secure 4:16
Lecture 79 Symmetric Encryption 5:23
Lecture 80 Asymmetric Encryption 3:11
Lecture 81 Cryptographic Hashes
Lecture 82 Identification 11:18
Lecture 83 Access Control 4:10
Lecture 84 AAA 4:49
Lecture 85 KerberosEAP 7:21
Lecture 86 Single Sign-On 9:55
Lecture 87 Certificates and Trust 13:42
Lecture 88 Certificate Error Scenarios 7:53

Section 12 : Advanced Networking Devices

Lecture 89 Understanding IP Tunneling 5:52
Lecture 90 Virtual Private Networks 12:34
Lecture 91 Introduction to VLANs 11:39
Lecture 92 InterVLAN Routing 3:0
Lecture 93 Interfacing with Managed Switches 10:48
Lecture 94 Switch Port Protection 6:33
Lecture 95 Port Bonding 7:5
Lecture 96 Port Mirroring 3:22
Lecture 97 Quality of Service 5:0
Lecture 98 IDS vs 4:21
Lecture 99 Proxy Servers 12:32
Lecture 100 Load Balancing 8:26
Lecture 101 Device Placement Scenarios 12:50

Section 13 : IPv6

Lecture 102 Introduction to IPv6 12:33
Lecture 103 IPv6 Addressing 14:54
Lecture 104 IPv6 In Action 13:5
Lecture 105 IPv4 and IPv6 Tunneling 5:11

Section 14 : Remote Connectivity

Lecture 106 Telephony Technologies 8:55
Lecture 107 Optical Carriers 2:58
Lecture 108 Packet Switching 4:45
Lecture 109 Connecting with Dial-up 4:43
Lecture 110 Digital Subscriber Line (DSL) 4:12
Lecture 111 Connecting with Cable Modems 4:4
Lecture 112 Connecting with Satellites 2:21
Lecture 113 ISDN and BPL 3:52
Lecture 114 Remote Desktop Connectivity 4:39
Lecture 115 Advanced Remote Control Systems 8:31

Section 15 : Wireless Networking

Lecture 116 Introduction to 802 11:19
Lecture 117 802 11:57
Lecture 118 Power over Ethernet (PoE) 3:32
Lecture 119 Antennas 8:23
Lecture 120 Wireless Security Standards 15:22
Lecture 121 Implementing Wireless Security 6:40
Lecture 122 Threats to Your Wireless Network
Lecture 123 Retro Threats 4:54
Lecture 124 Wi-Fi Protected Setup (WPS) 5:6
Lecture 125 Enterprise Wireless 5:58
Lecture 126 Installing a Wireless Network 14:32
Lecture 127 Wireless Scenarios 6:43
Lecture 128 More Wireless Scenarios 8:37

Section 16 : Virtualization and Cloud Computing

Lecture 129 Virtualization Basics 7:3
Lecture 130 Cloud Ownership 2:26
Lecture 131 Cloud Implementation 11:25
Lecture 132 Your First Virtual Machine 9:2
Lecture 133 NAS and SAN 15:55
Lecture 134 Platform as a Service (PaaS) 8:43
Lecture 135 Software as a Service (SaaS) 2:30
Lecture 136 Infrastructure as a Service (IaaS) 9:20

Section 17 : Mobile Networking

Lecture 137 Cellular Technologies 5:2
Lecture 138 Mobile Connectivity 7:3
Lecture 139 Deploying Mobile Devices 4:54
Lecture 140 Mobile Access Control 6:15

Section 18 : Building a Real-World Network

Lecture 141 Network Types 3:54
Lecture 142 Network Design 9:32
Lecture 143 Power Management 5:49
Lecture 144 Unified Communications 10:52
Lecture 145 Network Documentation 6:20
Lecture 146 Contingency Planning 10:1
Lecture 147 Predicting Hardware Failure 4:18
Lecture 148 Backups 7:34

Section 19 : Managing Risk

Lecture 149 What is Risk Management 5:51
Lecture 150 Security Policies 8:18
Lecture 151 Change Management 6:21
Lecture 152 User Training
Lecture 153 Standard Business Documentation
Lecture 154 Mitigating Network Threats 4:43
Lecture 155 High Availability 4:27

Section 20 : Protecting Your Network

Lecture 156 Denial of Service 8:22
Lecture 157 Malware 10:2
Lecture 158 Social Engineering 3:45
Lecture 159 Access Control 7:54
Lecture 160 Man-in-the-Middle 21:52
Lecture 161 Introduction to Firewalls 4:22
Lecture 162 Firewalls 9:58
Lecture 163 DMZ 5:20
Lecture 164 Hardening Devices 13:37
Lecture 165 Physical Security Controls 8:33
Lecture 166 Testing Network Security 7:43
Lecture 167 Network Protection Scenarios 14:6

Section 21 : Network Monitoring

Lecture 168 SNMP 14:47
Lecture 169 Documenting Logs 8:52
Lecture 170 System Monitoring 7:47
Lecture 171 SIEM (Security Information and Event Management) 7:1

Section 22 : Network Troubleshooting

Lecture 172 Network Troubleshooting Theory 4:59