Section 1 : Introduction
|
Lecture 1 | Introduction copy | 00:03:14 Duration |
Section 2 : Network Models
|
Lecture 1 | What is a Model | |
|
Lecture 2 | OSI vs | 00:06:58 Duration |
|
Lecture 3 | Walking Through OSI and TCPIP | 00:11:56 Duration |
|
Lecture 4 | Meet the Frame | 00:05:41 Duration |
|
Lecture 5 | The MAC Address | 00:07:09 Duration |
|
Lecture 6 | Broadcast vs | 00:04:10 Duration |
|
Lecture 7 | Introduction to IP Addressing | 00:07:29 Duration |
|
Lecture 8 | Packets and Ports | 00:04:44 Duration |
Section 3 : Cabling and Topology
|
Lecture 1 | Network Topologies | 00:10:01 Duration |
|
Lecture 2 | Coaxial Cabling | 00:05:13 Duration |
|
Lecture 3 | Twisted Pair Cabling | 00:06:02 Duration |
|
Lecture 4 | Cat Ratings | 00:05:55 Duration |
|
Lecture 5 | Fiber Optic Cabling | 00:08:28 Duration |
|
Lecture 6 | Fire Ratings | 00:05:09 Duration |
|
Lecture 7 | Legacy Network Connections | 00:06:53 Duration |
Section 4 : Ethernet Basics
|
Lecture 1 | What is Ethernet | 00:06:15 Duration |
|
Lecture 2 | Ethernet Frames | 00:06:35 Duration |
|
Lecture 3 | Early Ethernet | 00:07:29 Duration |
|
Lecture 4 | The Daddy of Ethernet, 10BaseT | 00:03:14 Duration |
|
Lecture 5 | Terminating Twisted Pair | 00:14:12 Duration |
|
Lecture 6 | Hubs vs | 00:12:26 Duration |
Section 5 : Modern Ethernet
|
Lecture 1 | 100BaseT | 00:05:15 Duration |
|
Lecture 2 | Connecting Switches | 00:05:06 Duration |
|
Lecture 3 | Gigabit Ethernet and 10-Gigabit Ethernet | 00:05:08 Duration |
|
Lecture 4 | Transceivers | 00:06:41 Duration |
|
Lecture 5 | Connecting Ethernet Scenarios | 00:13:49 Duration |
Section 6 : Installing a Physical Network
|
Lecture 1 | Introduction to Structured Cabling | 00:04:07 Duration |
|
Lecture 2 | Terminating Structured Cabling | 00:07:42 Duration |
|
Lecture 3 | Equipment Room | 00:07:08 Duration |
|
Lecture 4 | Alternative Distribution Panels | 00:03:29 Duration |
|
Lecture 5 | Testing Cable | 00:08:38 Duration |
|
Lecture 6 | Troubleshooting Structured Cabling, Part 1 | 00:04:52 Duration |
|
Lecture 7 | Troubleshooting Structured Cabling, Part 2 | 00:05:19 Duration |
|
Lecture 8 | Using a Toner and Probe | 00:02:37 Duration |
|
Lecture 9 | Wired Connection Scenarios | 00:10:17 Duration |
Section 7 : TCPIP Basics
|
Lecture 1 | Introduction to IP Addressing and Binary | 00:12:26 Duration |
|
Lecture 2 | Introduction to ARP | 00:03:30 Duration |
|
Lecture 3 | Classful Addressing | 00:10:03 Duration |
|
Lecture 4 | Subnet Masks | 00:11:53 Duration |
|
Lecture 5 | Subnetting with CIDR | 00:09:31 Duration |
|
Lecture 6 | More CIDR Subnetting Practice | 00:09:45 Duration |
|
Lecture 7 | Dynamic and Static IP Addressing | 00:17:29 Duration |
|
Lecture 8 | Rogue DHCP Servers | 00:06:16 Duration |
|
Lecture 9 | Special IP Addresses | 00:06:46 Duration |
|
Lecture 10 | IP Addressing Scenarios | 00:14:36 Duration |
Section 8 : Routing
|
Lecture 1 | Introducing Routers | 00:15:05 Duration |
|
Lecture 2 | Understanding Ports | 00:05:16 Duration |
|
Lecture 3 | Network Address Translation | 00:06:11 Duration |
|
Lecture 4 | Implementing NAT | 00:02:26 Duration |
|
Lecture 5 | Forwarding Ports | 00:17:20 Duration |
|
Lecture 6 | Tour of a SOHO Router | 00:11:47 Duration |
|
Lecture 7 | SOHO vs | 00:08:29 Duration |
|
Lecture 8 | Static Routes | 00:12:25 Duration |
|
Lecture 9 | Dynamic Routing | 00:10:26 Duration |
|
Lecture 10 | RIP | 00:04:14 Duration |
|
Lecture 11 | OSPF | 00:03:23 Duration |
|
Lecture 12 | BGP | 00:05:29 Duration |
Section 9 : TCPIP Applications
|
Lecture 1 | TCP and UDP | 00:07:11 Duration |
|
Lecture 2 | ICMP and IGMP | 00:05:54 Duration |
|
Lecture 3 | Handy Tools | 00:06:27 Duration |
|
Lecture 4 | Introduction to Wireshark | 00:10:27 Duration |
|
Lecture 5 | Introduction to netstat | 00:08:38 Duration |
|
Lecture 6 | Web Servers | 00:11:42 Duration |
|
Lecture 7 | FTP | 00:11:36 Duration |
|
Lecture 8 | E-mail Servers and Clients | 00:09:17 Duration |
|
Lecture 9 | Securing E-mail | 00:05:39 Duration |
|
Lecture 10 | Telnet and SSH | 00:09:05 Duration |
|
Lecture 11 | Network Time Protocol | 00:01:50 Duration |
|
Lecture 12 | Network Service Scenarios | 00:09:22 Duration |
Section 10 : Network Naming
|
Lecture 1 | Understanding DNS | 00:11:58 Duration |
|
Lecture 2 | Applying DNS | 00:18:40 Duration |
|
Lecture 3 | The Hosts File | 00:03:35 Duration |
|
Lecture 4 | Net Command | 00:08:00 Duration |
|
Lecture 5 | Windows Name Resolution | 00:11:12 Duration |
|
Lecture 6 | Dynamic DNS | 00:05:09 Duration |
|
Lecture 7 | DNS Troubleshooting | 00:13:03 Duration |
Section 11 : Securing TCPIP
|
Lecture 1 | Making TCPIP Secure | 00:04:16 Duration |
|
Lecture 2 | Symmetric Encryption | 00:05:23 Duration |
|
Lecture 3 | Asymmetric Encryption | 00:03:11 Duration |
|
Lecture 4 | Cryptographic Hashes | |
|
Lecture 5 | Identification | 00:11:18 Duration |
|
Lecture 6 | Access Control | 00:04:10 Duration |
|
Lecture 7 | AAA | 00:04:49 Duration |
|
Lecture 8 | KerberosEAP | 00:07:21 Duration |
|
Lecture 9 | Single Sign-On | 00:09:55 Duration |
|
Lecture 10 | Certificates and Trust | 00:13:42 Duration |
|
Lecture 11 | Certificate Error Scenarios | 00:07:53 Duration |
Section 12 : Advanced Networking Devices
|
Lecture 1 | Understanding IP Tunneling | 00:05:52 Duration |
|
Lecture 2 | Virtual Private Networks | 00:12:34 Duration |
|
Lecture 3 | Introduction to VLANs | 00:11:39 Duration |
|
Lecture 4 | InterVLAN Routing | 00:03:00 Duration |
|
Lecture 5 | Interfacing with Managed Switches | 00:10:48 Duration |
|
Lecture 6 | Switch Port Protection | 00:06:33 Duration |
|
Lecture 7 | Port Bonding | 00:07:05 Duration |
|
Lecture 8 | Port Mirroring | 00:03:22 Duration |
|
Lecture 9 | Quality of Service | 00:05:00 Duration |
|
Lecture 10 | IDS vs | 00:04:21 Duration |
|
Lecture 11 | Proxy Servers | 00:12:32 Duration |
|
Lecture 12 | Load Balancing | 00:08:26 Duration |
|
Lecture 13 | Device Placement Scenarios | 00:12:50 Duration |
Section 13 : IPv6
|
Lecture 1 | Introduction to IPv6 | 00:12:33 Duration |
|
Lecture 2 | IPv6 Addressing | 00:14:54 Duration |
|
Lecture 3 | IPv6 In Action | 00:13:05 Duration |
|
Lecture 4 | IPv4 and IPv6 Tunneling | 00:05:11 Duration |
Section 14 : Remote Connectivity
|
Lecture 1 | Telephony Technologies | 00:08:55 Duration |
|
Lecture 2 | Optical Carriers | 00:02:58 Duration |
|
Lecture 3 | Packet Switching | 00:04:45 Duration |
|
Lecture 4 | Connecting with Dial-up | 00:04:43 Duration |
|
Lecture 5 | Digital Subscriber Line (DSL) | 00:04:12 Duration |
|
Lecture 6 | Connecting with Cable Modems | 00:04:04 Duration |
|
Lecture 7 | Connecting with Satellites | 00:02:21 Duration |
|
Lecture 8 | ISDN and BPL | 00:03:52 Duration |
|
Lecture 9 | Remote Desktop Connectivity | 00:04:39 Duration |
|
Lecture 10 | Advanced Remote Control Systems | 00:08:31 Duration |
Section 15 : Wireless Networking
|
Lecture 1 | Introduction to 802 | 00:11:19 Duration |
|
Lecture 2 | 802 | 00:11:57 Duration |
|
Lecture 3 | Power over Ethernet (PoE) | 00:03:32 Duration |
|
Lecture 4 | Antennas | 00:08:23 Duration |
|
Lecture 5 | Wireless Security Standards | 00:15:22 Duration |
|
Lecture 6 | Implementing Wireless Security | 00:06:40 Duration |
|
Lecture 7 | Threats to Your Wireless Network | |
|
Lecture 8 | Retro Threats | 00:04:54 Duration |
|
Lecture 9 | Wi-Fi Protected Setup (WPS) | 00:05:06 Duration |
|
Lecture 10 | Enterprise Wireless | 00:05:58 Duration |
|
Lecture 11 | Installing a Wireless Network | 00:14:32 Duration |
|
Lecture 12 | Wireless Scenarios | 00:06:43 Duration |
|
Lecture 13 | More Wireless Scenarios | 00:08:37 Duration |
Section 16 : Virtualization and Cloud Computing
|
Lecture 1 | Virtualization Basics | 00:07:03 Duration |
|
Lecture 2 | Cloud Ownership | 00:02:26 Duration |
|
Lecture 3 | Cloud Implementation | 00:11:25 Duration |
|
Lecture 4 | Your First Virtual Machine | 00:09:02 Duration |
|
Lecture 5 | NAS and SAN | 00:15:55 Duration |
|
Lecture 6 | Platform as a Service (PaaS) | 00:08:43 Duration |
|
Lecture 7 | Software as a Service (SaaS) | 00:02:30 Duration |
|
Lecture 8 | Infrastructure as a Service (IaaS) | 00:09:20 Duration |
Section 17 : Mobile Networking
|
Lecture 1 | Cellular Technologies | 00:05:02 Duration |
|
Lecture 2 | Mobile Connectivity | 00:07:03 Duration |
|
Lecture 3 | Deploying Mobile Devices | 00:04:54 Duration |
|
Lecture 4 | Mobile Access Control | 00:06:15 Duration |
Section 18 : Building a Real-World Network
|
Lecture 1 | Network Types | 00:03:54 Duration |
|
Lecture 2 | Network Design | 00:09:32 Duration |
|
Lecture 3 | Power Management | 00:05:49 Duration |
|
Lecture 4 | Unified Communications | 00:10:52 Duration |
|
Lecture 5 | Network Documentation | 00:06:20 Duration |
|
Lecture 6 | Contingency Planning | 00:10:01 Duration |
|
Lecture 7 | Predicting Hardware Failure | 00:04:18 Duration |
|
Lecture 8 | Backups | 00:07:34 Duration |
Section 19 : Managing Risk
|
Lecture 1 | What is Risk Management | 00:05:51 Duration |
|
Lecture 2 | Security Policies | 00:08:18 Duration |
|
Lecture 3 | Change Management | 00:06:21 Duration |
|
Lecture 4 | User Training | |
|
Lecture 5 | Standard Business Documentation | |
|
Lecture 6 | Mitigating Network Threats | 00:04:43 Duration |
|
Lecture 7 | High Availability | 00:04:27 Duration |
Section 20 : Protecting Your Network
|
Lecture 1 | Denial of Service | 00:08:22 Duration |
|
Lecture 2 | Malware | 00:10:02 Duration |
|
Lecture 3 | Social Engineering | 00:03:45 Duration |
|
Lecture 4 | Access Control | 00:07:54 Duration |
|
Lecture 5 | Man-in-the-Middle | 00:21:52 Duration |
|
Lecture 6 | Introduction to Firewalls | 00:04:22 Duration |
|
Lecture 7 | Firewalls | 00:09:58 Duration |
|
Lecture 8 | DMZ | 00:05:20 Duration |
|
Lecture 9 | Hardening Devices | 00:13:37 Duration |
|
Lecture 10 | Physical Security Controls | 00:08:33 Duration |
|
Lecture 11 | Testing Network Security | 00:07:43 Duration |
|
Lecture 12 | Network Protection Scenarios | 00:14:06 Duration |
Section 21 : Network Monitoring
|
Lecture 1 | SNMP | 00:14:47 Duration |
|
Lecture 2 | Documenting Logs | 00:08:52 Duration |
|
Lecture 3 | System Monitoring | 00:07:47 Duration |
|
Lecture 4 | SIEM (Security Information and Event Management) | 00:07:01 Duration |
Section 22 : Network Troubleshooting
|
Lecture 1 | Network Troubleshooting Theory | 00:04:59 Duration |