Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CompTIA Network+ N10-006
Module 1
Introduction to Networks Overview Part1 (0:08)
Introduction to Networks Overview Part2 (0:20)
What is a Network? (0:33)
Peer to Peer Networking (1:10)
Client Server Networks (1:04)
Physical Topologies (0:22)
Physical Bus Topologies (0:53)
Physical Star Topologies (0:51)
Physical Ring Topologies (0:43)
Physical Mesh Topologies (0:54)
Point to Point Topologies (3:05)
Hybrid Topologies (0:28)
Backbones and Segments (0:22)
Course Introduction (0:24)
Module 2
OSI Model Overview Part1 (0:17)
OSI Model Overview Part2 (0:49)
Internetworking Models (0:45)
Advantages of Reference Models (1:06)
OSI Model and Layer Functions (5:36)
TCP Reliability (2:59)
TCP Flow Control and Packet Acknowledgement (2:58)
Routing at Layer 3 (3:15)
Data Encapsulation (2:44)
Multiplexing (1:12)
Numbering Systems (1:21)
Base and Broad Band (0:50)
Bit Rate and Baud Rate (0:35)
Wavelength (0:30)
Module 3
Media Cables and Connectors Overview Part1 (0:18)
Media Cables and Connectors Overview Part2 (0:50)
Physical Media (0:25)
Coax Media Cables and Connectors (2:27)
Twisted-Pair Media Cables and Connectors (3:11)
Fiber Optic Media Cables and Connectors (4:24)
UTP and BNC Couplers (1:15)
Broadband Over Power Lines (0:50)
Serial and USB Connectors (1:20)
Cable Properties (0:29)
Wiring Standards (4:22)
T1 Crossover Cable (0:18)
Wiring Distribution Installation (1:42)
Troubleshooting Wiring (3:28)
Module 4
Ethernet Standards and Properties Overview Part1 (0:25)
Ethernet Standards and Properties Overview Part2 (0:25)
Collision and Broadcast Domains (1:02)
Carrier Sense Multiple Access/Collision Detection (3:32)
Duplex Ethernet (1:58)
Binary to Decimal (1:37)
Hex to Binary to Decimal (0:32)
Ethernet Addressing (1:09)
Ethernet Frames (0:33)
IEEE Standards (2:41)
802.3 Standards (1:07)
IEEE 1901-2013 (0:35)
Module 5
Network Devices Overview Part1 (0:16)
Network Devices Overview Part2 (0:52)
Common Network Device (0:26)
Hubs (1:58)
Network Interface Cards (1:18)
Network Bridges (1:01)
Switches and Routers (2:06)
Firewalls and Other Devices Part1 (0:52)
Firewalls and Other Devices Part2 (1:39)
Dynamic Host Configuration Protocol (2:47)
Specialized Devices (2:01)
Multilayer Switch and Domain Name Services (5:06)
Proxy Servers (0:28)
Encryption Devices (0:39)
VPN Concentrator (0:22)
Planning and Implementing a Network (2:49)
Module 6
Internet Protocol Overview Part1 (0:18)
Internet Protocol Overview Part2 (0:20)
What is TCP/IP? (0:58)
DoD and OSI Model (1:10)
TCP/IP Protocol Suite (4:23)
TCP and UDP (2:55)
Port Number Examples (1:25)
IP Header (0:34)
ICMP (0:49)
ARP (1:04)
Data Encapsulation and De-Encapsulation (0:18)
Protocol Data Units (0:46)
Port Numbers at the Transport Layer (0:29)
Module 7
Internet Protocol Addressing Overview Part1 (0:19)
Internet Protocol Addressing Overview Part2 (0:33)
Addressing Terminology (2:24)
IP Addressing Hierarchical Scheme (1:33)
Classful IP Addressing (3:54)
Private IP Addressing (2:43)
IP Addressing Terms (0:55)
Internet Protocol Version 6 (4:44)
Auto Configuration EUI-64 (1:03)
Link Local and Global Addressing (0:46)
Transition Mechanisms (1:15)
Dynamic Host Configuration Protocol 6 (0:44)
Module 8
Subnetting Overview Part1 (0:17)
Subnetting Overview Part2 (0:24)
Subnetting Basics (1:39)
Creating a Subnet Portion (4:40)
Determining Number of Computers Through Subnetting (1:54)
Locating Network ID's (1:37)
Determining Block Size or Interval (4:02)
Classless Inter-Domain Routing (1:01)
Troubleshooting IP Addresses (0:59)
Command Line Tools (1:47)
Network Address Translation (1:47)
How NAT Works (0:45)
Module 9
Routing Concepts Overview Part1 (0:11)
Routing Concepts Overview Part2 (0:23)
IP Routing Basics (2:56)
IP Routing Process (2:43)
Static and Dynamic Routing (3:26)
Additional Routing Terms (2:11)
Default Routing (0:47)
Gateway Redundancy (1:36)
Module 10
Dynamic Routing Protocols Overview Part1 (0:14)
Dynamic Routing Protocols Overview Part2 (0:12)
Routing Protocol Basics (0:38)
Administrative Distance (1:17)
Routing Protocol Classes (1:01)
Distance Vector Routing Protocols (1:10)
Routing Information Protocol (0:57)
Classful and Classless Networks (2:00)
Discontiguous Network (1:50)
EIGRP and BGP (1:01)
RIP - OSF and IS-IS Protocols (1:51)
IPv6 Routing Protocols (0:56)
Module 11
Switching and VLAN Configuration Overview Part1 (0:15)
Switching and VLAN Configuration Overview Part2 (0:32)
Switching and Virtual LANs (1:09)
Switching Services (1:56)
Address Learning and Forward/Filter Decisions (1:51)
Loop Avoidance (1:37)
Spanning Tree Protocol (4:05)
VLAN Broadcast Domains (2:13)
Access and Trunk Links (2:26)
VTP Modes of Operation and Configuration (1:43)
Advanced Features of Switches (2:31)
Switch Management (2:18)
VLAN Switch Configuration Demonstration (2:34)
Module 12
Wireless Technologies Overview Part1 (0:15)
Wireless Technologies Overview Part2 (0:20)
Wireless Technologies Basics (1:13)
Wireless Agencies and Standards (1:32)
Wireless Frequency Ranges (1:19)
802.11 Committees and Subcommittees (7:19)
Wireless LAN Modulation Techniques (1:57)
Wireless Access Points and NIC Cards (0:57)
Wireless Network Types (1:35)
Installing and Configuring Hardware (1:36)
Wireless Security (6:07)
Troubleshooting Issues (5:14)
Environmental Factors (1:15)
Rogue Access Point (1:17)
Module 13
Network Hardening Techniques Overview Part1 (0:11)
Network Hardening Techniques Overview Part2 (0:23)
Access Control Lists (1:07)
Tunneling Protocols (6:53)
Encryption Standards (2:44)
Remote Access (2:17)
User Account and Resource Security (1:13)
User Authentication Methods (1:05)
Authentication - Authorization and Accounting (3:47)
Secure and Unsecure Protocols (0:50)
Access Control List Demonstration (3:04)
Module 14
Network Security Vulnerabilities Overview Part1 (0:13)
Network Security Vulnerabilities Overview Part2 (0:57)
Denial of Service Attacks (4:43)
Virus Attacks (3:07)
Attackers and Their Tools (5:41)
ARP Cache Poisoning and VLAN Hoping (2:29)
Mitigation Techniques (0:40)
Policies and Procedures (2:30)
NSA Specifications (0:51)
Module 15
Firewalls Overview Part1 (0:10)
Firewalls Overview Part2 (0:19)
Firewalls Types (2:39)
Firewall Technologies (4:11)
Intrusion Detection and Prevention Systems (2:18)
Vulnerability Scanning and VPN Concentrators (1:36)
Device Security (1:16)
Forward and Reverse Proxy Servers (0:50)
Network Address Translation and Port Forwarding (1:34)
Port Security Demonstration (2:08)
Module 16
Wide Area Network Technologies Overview Part1 (0:16)
Wide Area Network Technologies Overview Part2 (0:23)
Defining Wide Area Networks (2:07)
WAN Connection Types (2:37)
Dense and Course Wavelength Division Multiplexing (1:26)
Passive Optical Network and SONET (0:53)
Wireless Technologies (1:24)
Broadband Services (2:15)
WAN Protocols (3:19)
Cellular WAN (1:28)
Metro Ethernet (1:21)
Module 17
Network Troubleshooting Overview Part1 (0:14)
Network Troubleshooting Overview Part2 (0:16)
Protocol Analyzers (1:19)
Network Scanners (4:37)
Throughput Testers and Connectivity Software (3:23)
Command Line Tool traceroute (1:40)
ipconfig and ifconfig Utility (1:44)
Ping and IPv6 Utility (3:11)
Address Resolution Protocol (0:48)
nslookup Utility (1:29)
My traceroute Command (0:53)
nbtstat and netstat Utility (1:31)
File Transfer Protocol (0:34)
Telnet Utility (0:32)
Command Line Tool Guidelines (0:24)
Windows Command Line Tools Demonstration (7:19)
Module 18
Network Management Hardware Tools Overview (0:11)
Hardware Tools Overview (6:10)
Module 19
Troubleshooting Methodologies Overview Part1 (0:13)
Troubleshooting Methodologies Overview Part2 (0:18)
Troubleshooting Approaches (1:25)
Narrowing Down the Problem Part1 (5:33)
Narrowing Down the Problem Part2 (3:56)
Troubleshooting Steps (3:13)
Troubleshooting Tips (1:22)
Module 20
Network Monitoring Tools Overview Part1 (0:12)
Network Monitoring Tools Overview Part2 (1:54)
Simple Network Management Protocol (1:50)
Schematics and Diagrams (3:16)
Policies - Procedures and Regulations (3:26)
Network Performance Monitoring (4:49)
Metrics - Reporting Terms and Interface Monitoring (2:16)
Configuration Management (1:10)
Virtual Networking (1:17)
Storage Area Network (1:52)
Cloud Architectures (2:09)
Protocol Analyzer Demonstration (4:09)
Module 21
Troubleshooting Wide Area Networks Overview Part1 (0:09)
Troubleshooting Wide Area Networks Overview Part2 (0:11)
Local and Wide Area Networks (0:58)
Wireless Local Area Network (0:53)
Personal Area Network (0:47)
SCADA and ICS (2:06)
Medianets (1:21)
WAN Connection Issues (2:37)
Customer Equipment (1:18)
Company ISP Security Policies and Satellite Issues (1:14)
Module 22
Physical Security Overview Part1 (0:11)
Physical Security Overview Part2 (0:25)
SCADA Review (1:12)
Network Segmentation (3:19)
Additional Physical Security and Specific Dangers (2:30)
Access Controls and Monitoring (0:51)
Environmental Controls and Electrical Power (1:34)
Access Control Authentication Types (2:26)
Multiple Factor Authentication (1:10)
Module 23
Network Access Control Overview Part1 (0:17)
Network Access Control Overview Part2 (0:23)
IEEE 802.1x (1:24)
Network Access Control (3:56)
Computer Forensics (4:25)
Investigative Process (1:46)
Free Space vs. Slack Space (2:05)
Disaster Recovery (1:38)
Business Impact Assessment (1:35)
Backup Considerations (4:25)
RAID Backup Solutions (2:13)
Redundancy and Single Points of Failure (1:10)
Module 24
Troubleshooting Security Overview Part1 (0:12)
Troubleshooting Security Overview Part2 (0:18)
Firewall Security Issues (1:44)
Avenues of Attack (3:18)
Denial of Service Attacks (3:48)
Types of DDOS Attacks (2:28)
IP Address Spoofing (1:59)
Replay Attacks and TCP/IP Hijacking (1:04)
Encryption Attacks (1:12)
Address System and Password Attacks (2:26)
Software Exploitation (2:56)
Viruses and Malware (4:15)
Anti Malware Software (1:15)
Switch Port Security (2:51)
Module 25
Voice Over IP Overview Part1 (0:20)
Voice Over IP Overview Part2 (0:11)
VOIP (4:00)
Module 26
Security Policies and Programs Overview Part1 (0:15)
Voice Over IP Overview Part2 (0:08)
Security Programs (1:49)
Security Policy Types (3:05)
Security Policy Concepts (1:55)
Human Resource Policies (1:47)
Installation Safety Issues (0:54)
Module 27
IT Distribution & Change Management Overview Part1 (0:16)
IT Distribution & Change Management Overview Part2 (0:14)
Change Management (5:05)
IT Distribution Concepts and Procedures (4:39)
Course Review (0:15)
Twisted-Pair Media Cables and Connectors
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock