Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA Network+ Full Course
2. Lesson 1 Comparing OSI Model Network Functions
1. OSI Model and Data Encapsulation Decapsulation (10:17)
2. Layer 1 - Physical Layer of OSI Model (6:24)
3. Layer 2 - Data Link Layer in OSI Model (5:21)
4. Layer 3 Network Layer in OSI Model (5:31)
5. Layer 4-7 Transport, Session, Presentation and Application (6:42)
6. OSI Model Summary (3:18)
7. Configure SOHO (Small Office Home Office) networks (18:53)
8. LAB Configure SOHO networks (11:59)
3. Analyzing Security Monitoring Data
1. Cable Type and Ethernet Standards (10:07)
2. Ethernet_Standards (12:22)
3. Twisted Pair Cable and standards (9:31)
4. Connector Types (6:43)
5. Fiber Cabling Types (10:43)
4. Deploying Ethernet Switching
1. Network devices Repeater Media-converter hub and bridge (14:35)
2. Networking Device Switch (6:33)
3. Explain Network Interfaces (18:07)
4. LAB Capturing data using tcpdump (8:56)
5. LAB Capturing DATA using tcpdump and Wireshark (9:53)
6. Switch and Its port Features and configuration (18:26)
7. MAC Table Port Security and Aggregation (14:15)
8. Jumbo Frames and Flow Control (4:15)
5. Troubleshooting Ethernet Networks
1. Network Troubleshooting and Methodology (16:12)
6. Explaining IPv4 Addressing
1. IP Introduction with examples (7:44)
2. IP Address Format and Subnet Mask (18:50)
3. Classification of IP address (8:59)
4. Public private and reserved IP addresses (10:41)
7. Supporting IPv4 and IPv6 Networks
1. Ip Interface Configuration with LAB (15:23)
2. IP Configuration in Linux with ifconfig and ip utility (8:21)
3. ARP cache, ICMP and Ping network utility (13:56)
4. Troubleshoot IP Networks (14:09)
5. IPv4 vs IPv6 and format (11:35)
8. Configuring and Troubleshooting Routers
1. Introduction of Configuring and Troubleshooting Routers (2:04)
2. Compare and Contrast Routing Concepts (18:55)
3. LAB Compare and Contrast Routing Concepts (26:50)
4. Compare and Contrast of Dynamic Routing Concepts (21:06)
5. LAB Compare and Contrast of Dynamic Routing Concepts (9:40)
6. Install and troubleshoot the Routers (28:34)
9. Explaining Network Topologies and Types
1. Explain Network Types and Characteristics (21:05)
2. Explain Tiered Switching Architecture (31:12)
3. Explaining Virtual Lans - VLAN (21:54)
10. Explaining Transport Layer Protocols
1. Compare and contrast of Transport Layer Protocol (24:48)
2. Use Appropriate Tools to Scan Network Prots (9:44)
3. LAB Use Appropriate Tools to Scan Network Prots (13:08)
11. Explaining Network Services
1. Explain the Use of Network Addressing Services (18:57)
2. LAB Configure DHCP on TP Link Router (1:55)
3. LAB DHCP and IP helper configuration on cisco Router (14:26)
4. LAB Configure DHCP Server on Windows Server 2016 (9:21)
5. Explain the Use of Name Resolution Services (16:33)
6. Configure DNS Services (10:14)
7. LAB Configure DNS in Windows 2016 Server (7:13)
8. LAB DNS server Configuration Demo on Packet tracer (15:34)
12. Explaining Network Applications
1. Hypertext transfer Protocol - HTTP (12:08)
2. SSL and TLS (5:42)
3. FTP, File, Print and Database services (11:01)
4. Email Services and Protocol (19:27)
5. Voice and Video Services (9:33)
6. LAB Analyze Application Security Configuration (9:51)
13. Ensuring Network Availability
1. Network Time Protocol (2:31)
2. LAB Configure SSH on Linux (26:02)
3. LAB Configure Syslog Server (7:51)
4. Use Event Management to Ensure Network Availability (22:05)
5. Use Performance Metrics to Ensure Network Availability (30:16)
6. Lab Analyze Network Performance (15:57)
14. Explaining Common Security Concepts
1. Security Concepts (11:42)
2. Security Risk and vulnerability Assessment (15:06)
3. More Common Security Concepts (13:27)
4. Explain Authentication Methods Part 1 (17:39)
5. Explain Authentication Methods Part 2 (15:06)
15. Supporting and Troubleshooting Secure Networks
1. Network Segmentation Enforcement (9:42)
2. Firewall types and its placement (11:55)
3. Proxy Server (7:54)
4. Network Address Translation and PAT (9:42)
5. Network Defense in Depth (6:02)
6. Troubleshoot DHCP and DNS issue (12:07)
7. Vlan, Firewall, Certificate, Other common issue (14:17)
16. Comparing WAN Links and Remote Access Methods
1. Explain WAN provider Links (20:41)
2. Remote Network Access Authentication, Tunneling and security protocol (13:23)
3. Client to Site VPN and host Gateway (10:38)
4. Site to Site VPN modes and security protocols (14:34)
5. LAB Configure Remote Access (21:27)
17. Explaining Organizational and Physical Security Concepts
1. Operating and System Life Cycle Plans and Procedures (13:38)
2. Documentation on Physical and logical Network diagram (10:40)
3. Security Response Plans and Procedures and Hardening Policies (10:34)
4. Usages, Remote Access Policies and Data Loss Prevention (10:40)
5. Explain Physical Security Methods (22:10)
18. Explaining Disaster Recovery and High Availability Concepts
1. High Availability (8:19)
2. Fault Tolerance and Redundancy (6:35)
3. LAB Backup and Restore Network Device configuration (15:21)
4. Multipathing and Link Aggregation or NIC Teaming (7:30)
5. Load balancer and Redundant Hardware (6:34)
6. First Hop Redundancy with LAB on Packet Tracer (16:00)
7. Recovery site, power management and device backup (13:58)
19. Applying Network Hardening Techniques
1. General type of Attacks in Network (12:00)
2. On-Path and DNS poisoning Attack (9:06)
3. VLAN hoping and Wireless Network Attack (9:29)
4. DDOS and Ransomware Attack (9:54)
5. Password, Human and Environmental Attacks (6:30)
6. LAB on path attack in the network (11:09)
7. Endpoint Device and Service Hardening (9:38)
8. Apply Network Hardening Techniques More (14:33)
9. Lab Configure Port Security (17:53)
20. Summarizing Cloud and Datacenter Architecture
1. Cloud Scalability and Elasticity (7:57)
2. Cloud Deployment and Service Models (6:51)
3. Cloud Connectivity, code and Security (7:46)
4. Virtualization concept switch and NICs (6:13)
5. Create virtual switch and virtual machine Demo (5:43)
6. Network Function virtualization and SAN and its Connector (10:35)
Teach online with
2. On-Path and DNS poisoning Attack
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock