Introduction |
|
Introduction to Network+ |
|
00:03:00 |
|
What’s on the Network+ Exam |
|
00:02:00 |
|
What Can You Do with a Network+ Certification |
|
00:03:00 |
Section 01: Network Models |
|
The OSI Model |
|
00:13:00 |
|
Meet the Frame |
|
00:06:00 |
|
The MAC Address |
|
00:07:00 |
|
Broadcast vs. Unicast |
|
00:04:00 |
|
Introduction to IP Addressing |
|
00:08:00 |
|
Packets and Ports |
|
00:05:00 |
Section 02: Cabling And Topology |
|
Network Topologies |
|
00:05:00 |
|
Coaxial Cabling |
|
00:05:00 |
|
Twisted Pair Cabling |
|
00:05:00 |
|
Fiber Optic Cabling |
|
00:09:00 |
|
Fire Ratings |
|
00:05:00 |
Section 03: Ethernet Basics |
|
What is Ethernet? |
|
00:06:00 |
|
Ethernet Frames |
|
00:07:00 |
|
Terminating Twisted Pair |
|
00:08:00 |
|
Hubs vs. Switches |
|
00:12:00 |
|
Connecting Switches |
|
00:05:00 |
Section 04: Ethernet Standards |
|
100BaseT |
|
00:05:00 |
|
Gigabit Ethernet and 10-Gigabit Ethernet |
|
00:05:00 |
|
Transceivers |
|
00:07:00 |
|
Connecting Ethernet Scenarios |
|
00:14:00 |
Section 05: Installing A Physical Network |
|
Introduction to Structured Cabling |
|
00:04:00 |
|
Terminating Structured Cabling |
|
00:00:00 |
|
Equipment Room |
|
00:07:00 |
|
Alternative Distribution Panels |
|
00:04:00 |
|
Testing Cable |
|
00:09:00 |
|
Troubleshooting Structured Cabling, Part-1 |
|
00:04:00 |
|
Troubleshooting Structured Cabling, Part-2 |
|
00:04:00 |
|
Using a Toner and Probe |
|
00:03:00 |
|
Wired Connection Scenarios |
|
00:10:00 |
Section 06: TCP/IP Basics |
|
Introduction to IP Addressing and Binary |
|
00:13:00 |
|
Introduction to ARP |
|
00:04:00 |
|
Subnet Masks |
|
00:12:00 |
|
Classful Addressing |
|
00:10:00 |
|
Subnetting with CIDR |
|
00:10:00 |
|
More CIDR Subnetting Practice |
|
00:10:00 |
|
Dynamic and Static IP Addressing |
|
00:05:00 |
|
Special IP Addresses |
|
00:07:00 |
|
IP Addressing Scenarios |
|
00:00:00 |
Section 07: Routing |
|
Introducing Routers |
|
00:15:00 |
|
Understanding Ports |
|
00:00:00 |
|
Network Address Translation (NAT) |
|
00:06:00 |
|
Implementing NAT |
|
00:02:00 |
|
Forwarding Ports |
|
00:18:00 |
|
Tour of a SOHO Router |
|
00:12:00 |
|
SOHO vs. Enterprise |
|
00:09:00 |
|
Static Routes |
|
00:13:00 |
|
Dynamic Routing |
|
00:10:00 |
|
Routing Information Protocol (RIP) |
|
00:04:00 |
|
Open Shortest Path First (OSPF) |
|
00:03:00 |
|
Border Gateway Protocol |
|
00:06:00 |
Section 08: TCP/IP Applications |
|
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) |
|
00:07:00 |
|
ICMP and IGMP |
|
00:06:00 |
|
Handy Tools |
|
00:07:00 |
|
Introduction to Wireshark |
|
00:10:00 |
|
Introduction to netstat |
|
00:09:00 |
|
Web Servers |
|
00:12:00 |
|
File Transfer Protocol (FTP) |
|
00:12:00 |
|
E-mail Servers and Clients |
|
00:09:00 |
|
Securing E-mail |
|
00:06:00 |
|
Telnet and SSH |
|
00:09:00 |
|
Network Time Protocol (NTP) |
|
00:03:00 |
|
Network Service Scenarios |
|
00:09:00 |
Section 09: Network Naming |
|
Understanding DNS |
|
00:07:00 |
|
Applying DNS |
|
00:19:00 |
|
net Command |
|
00:08:00 |
|
Windows Name Resolution |
|
00:11:00 |
|
Dynamic DNS |
|
00:05:00 |
|
DNS Troubleshooting |
|
00:13:00 |
Section 10: Securing TCP/IP |
|
Making TCP/IP Secure |
|
00:04:00 |
|
Symmetric Encryption |
|
00:05:00 |
|
Asymmetric Encryption |
|
00:03:00 |
|
Cryptographic Hashes |
|
00:05:00 |
|
Identification |
|
00:08:00 |
|
Access Control |
|
00:04:00 |
|
AAA |
|
00:05:00 |
|
Kerberos/EAP |
|
00:07:00 |
|
Single Sign-On |
|
00:10:00 |
|
Certificates and Trust |
|
00:14:00 |
|
Certificate Error Scenarios |
|
00:08:00 |
Section 11: Switch Features |
|
Switch Management |
|
00:09:00 |
|
Introduction to VLANs |
|
00:10:00 |
|
InterVLAN Routing |
|
00:03:00 |
|
Trunking |
|
00:08:00 |
|
Cisco Commands |
|
00:06:00 |
|
Switch Port Protection |
|
00:07:00 |
|
Port Bonding |
|
00:07:00 |
|
Port Mirroring |
|
00:03:00 |
|
Quality of Service |
|
00:05:00 |
|
IDS vs. IPS |
|
00:04:00 |
|
Proxy Servers |
|
00:13:00 |
|
Load Balancing |
|
00:08:00 |
|
Device Placement Scenarios |
|
00:13:00 |
Section 12: IPv6 |
|
Introduction to IPv6 |
|
00:13:00 |
|
IPv6 Addressing |
|
00:15:00 |
|
IPv6 in Action |
|
00:13:00 |
|
IPv4 and IPv6 Tunneling |
|
00:05:00 |
Section 13: WAN Connectivity |
|
Understanding IP Tunneling |
|
00:06:00 |
|
WAN Technologies |
|
00:06:00 |
|
Digital Subscriber Line (DSL) |
|
00:04:00 |
|
Connecting with Cable Modems |
|
00:04:00 |
|
Connecting with Satellites |
|
00:02:00 |
|
Cellular Technologies |
|
00:04:00 |
|
Remote Desktop Connectivity |
|
00:04:00 |
|
Virtual Private Networks (VPNs) |
|
00:09:00 |
|
WAN Troubleshooting Scenarios |
|
00:05:00 |
Section 14: Wireless Networking |
|
Introduction to 802.11 |
|
00:12:00 |
|
802.11 Standards |
|
00:12:00 |
|
Power Over Ethernet (PoE) |
|
00:04:00 |
|
Antennas |
|
00:09:00 |
|
Wireless Security Standards |
|
00:06:00 |
|
Implementing Wireless Security |
|
00:07:00 |
|
Threats to Your Wireless Network |
|
00:07:00 |
|
Enterprise Wireless |
|
00:06:00 |
|
Installing a Wireless Network |
|
00:15:00 |
|
Wireless Scenarios |
|
00:06:00 |
|
More Wireless Scenarios |
|
00:09:00 |
Section 15: Virtualization And Cloud Computing |
|
Virtualization Basics |
|
00:07:00 |
|
Your First Virtual Machine |
|
00:07:00 |
|
Cloud Basics |
|
00:03:00 |
|
Cloud Services |
|
00:07:00 |
|
Cloud Ownership |
|
00:02:00 |
|
Infrastructure as Code (IaC) |
|
00:03:00 |
|
Heroku Demo |
|
00:09:00 |
|
Enterprise Virtualization |
|
00:05:00 |
|
Cloud Implementation |
|
00:11:00 |
Section 16: Datacenters |
|
Classic Data Center Architecture |
|
00:12:00 |
|
NAS and SAN |
|
00:16:00 |
|
The Modern Data Center |
|
00:09:00 |
|
High Availability |
|
00:11:00 |
|
Documenting the Datacenter |
|
00:08:00 |
Section 17: Integrating Networked Devices |
|
Network Types |
|
00:04:00 |
|
Internet of Things (IoT) |
|
00:07:00 |
|
Voice Over IP (VoIP) |
|
00:11:00 |
|
Industrial Control Systems and SCADA |
|
00:09:00 |
Section 18: Network Operations |
|
What are Network Operations? |
|
00:03:00 |
|
Hardening and Security Policies |
|
00:08:00 |
|
Change Management |
|
00:07:00 |
|
Patching and Updating |
|
00:07:00 |
|
Security Risk Management |
|
00:05:00 |
|
Points of Failure |
|
00:04:00 |
|
Standard Business Documentation |
|
00:05:00 |
|
Incident Response and Forensics |
|
00:05:00 |
|
Disaster Recovery and Backups |
|
00:12:00 |
|
Business Continuity |
|
00:12:00 |
|
Deployment Models |
|
00:05:00 |
Section 19: Protecting Networks |
|
Security Concepts |
|
00:06:00 |
|
Defense in Depth |
|
00:05:00 |
|
Rogue DHCP Servers |
|
00:04:00 |
|
Denial of Service (DoS) |
|
00:10:00 |
|
On-Path and Spoofing Attacks |
|
00:23:00 |
|
Password Attacks |
|
00:06:00 |
|
VLAN Hopping |
|
00:06:00 |
|
System Life Cycle |
|
00:04:00 |
|
Malware |
|
00:06:00 |
|
Social Engineering |
|
00:08:00 |
|
Common Vulnerabilities |
|
00:03:00 |
|
Physical Security |
|
00:13:00 |
|
Network Hardening |
|
00:08:00 |
|
Demilitarized Zone (DMZ) |
|
00:05:00 |
|
Introduction to Firewalls |
|
00:04:00 |
|
Firewalls |
|
00:10:00 |
Section 20: Networking Monitoring |
|
Networking Monitoring |
|
00:08:00 |
|
SNMP |
|
00:15:00 |
|
Documenting Logs |
|
00:07:00 |
|
System Monitoring |
|
00:08:00 |
|
Security Information and Event Management (SIEM) |
|
00:07:00 |
Section 21: Network Troubleshooting |
|
Network Troubleshooting Theory |
|
00:05:00 |