lesson 1: Comparing OSI Model Network Functions
-
1Lesson 1: Comparing OSI Model Network Functions
Comparing OSI Model Network Functions
-
2Topic 1A Compare and Contrast OSI Model Layers
Compare and Contrast OSI Model Layers
-
3Open Systems Interconnection Model
Open Systems Interconnection Model
-
4Data Encapsulation and Decapsulation
Data Encapsulation and Decapsulation
-
5Layer 1-Physical
Layer 1-Physical
-
6Layer 2-Data Link
Layer 2-Data Link
-
7Layer 3-Network
Layer 3-Network
-
8Layer 4-Transport
Layer 4-Transport
-
9Upper Layers
Upper Layers
-
10OSI Model Summary
OSI Model Summary
-
11Topic 1B Configure SOHO Networks
Configure SOHO Networks
-
12SOHO Routers
SOHO Routers
-
13Physical Layer Functions
Physical Layer Functions
-
14Data Link Layer Functions
Data Link Layer Functions
-
15Network Layer Functions
Network Layer Functions
-
16Transport and Application Layer and Security Functions
Transport and Application Layer and Security Functions
-
17The Internet
The Internet
-
18Hexadecimal Notation
Hexadecimal Notation
-
19Lesson 1 Assement
Lesson 2: Deploying Ethernet Cabling
-
20Lesson 2 Deploying Ethernet Cabling
Deploying Ethernet Cabling
-
21Introduction: Summarize Ethernet Standards
Introduction: Summarize Ethernet Standards
-
22Network Data Transmission
Network Data Transmission
-
23Ethernet Standards
Ethernet Standards
-
24Media Access Control and Collision Domains
Media Access Control and Collision Domains
-
25100BASE-TX Fast Ethernet Standard
100BASE-TX Fast Ethernet Standard
-
26Gigabit Ethernet Standards
Gigabit Ethernet Standards
-
27Topic 2B Summarize Copper Cabling Types
Summarize Copper Cabling Types
-
28Unshielded Twisted Pair Cable Considerations
Unshielded Twisted Pair Cable Considerations
-
29Shielded and Screened Twisted Pair Cable Considerations
Shielded and Screened Twisted Pair Cable Considerations
-
30Cat Cable Standards
Cat Cable Standards
-
31Twisted Pair Connector Types
Twisted Pair Connector Types
-
32Copper Termination Standards
Copper Termination Standards
-
33Plenum- and Riser-rated Cable
Plenum- and Riser-rated Cable
-
34Coaxial and Twinaxial Cable and Connectors
Coaxial and Twinaxial Cable and Connectors
-
35Topic 2C Summarize Fiber Optic Cabling Types
Summarize Fiber Optic Cabling Types
-
36Fiber Optic Cable Considerations
Fiber Optic Cable Considerations
-
37Single Mode Fiber and Multimode Fiber
Single Mode Fiber and Multimode Fiber
-
38Fiber Optic Connector Types
Fiber Optic Connector Types
-
39Fiber Ethernet Standards
Fiber Ethernet Standards
-
40Fiber Optic Cable Installation
Fiber Optic Cable Installation
-
41Topic 2D Deploy Ethernet Cabling
Deploy Ethernet Cabling
-
42Structured Cabling System
Structured Cabling System
-
43Cable Management
Cable Management
-
44Wiring Tools and Techniques
Wiring Tools and Techniques
-
45Termination Tools
Termination Tools
-
46Fiber Distribution Panels and Fusion Splicing
Fiber Distribution Panels and Fusion Splicing
-
47Transceivers
Transceivers
-
48Wavelength Division Multiplexing
Wavelength Division Multiplexing
-
49Lesson 2 Assesment
Lesson 3 Deploying Ethernet Switching
-
50Lesson 3 Deploying Ethernet Switching
Deploying Ethernet Switching
-
51Topic 3A Deploy Networking Devices
Deploy Networking Devices
-
52Repeaters and Media Converters
Repeaters and Media Converters
-
53Hubs
Hubs
-
54Bridges
Bridges
-
55Layer 2 Switches
Layer 2 Switches
-
56Topic 3B Explain Network Interfaces
Explain Network Interfaces
-
57Network Interface Cards
Network Interface Cards
-
58Ethernet Frame Format
Ethernet Frame Format
-
59Media Access Control Address Format
Media Access Control Address Format
-
60Frame Length and Maximum Transmission Unit
Frame Length and Maximum Transmission Unit
-
61Packet Sniffers and Taps
Packet Sniffers and Taps
-
62tcpdump
tcpdump
-
63Wireshark
Wireshark
-
64Topic 3C Deploy Common Ethernet Switching Features
Deploy Common Ethernet Switching Features
-
65Ethernet Switch Types
Ethernet Switch Types
-
66Switch Interface Configuration
Switch Interface Configuration
-
67Auto MDI/MDI-X
Auto MDI/MDI-X
-
68MAC Address Table and Port Security
MAC Address Table and Port Security
-
69Port Aggregation
Port Aggregation
-
70Port Mirroring
Port Mirroring
-
71Jumbo Frames and Flow Control
Jumbo Frames and Flow Control
-
72Power Over Ethernet
Power Over Ethernet
-
73Lesson 3 Assesment
Lesson 4 Troubleshooting Ethernet Networks
-
74Lesson 4 Troubleshooting Ethernet Networks
Troubleshooting Ethernet Networks
-
75Topic 4A Explain Network Troubleshooting Methodology
Explain Network Troubleshooting Methodology
-
76Network Troubleshooting Methodology
Network Troubleshooting Methodology
-
77Identify the Problem (Gather Information)
Identify the Problem (Gather Information)
-
78Identify the Problem (Question Users)
Identify the Problem (Question Users)
-
79Establish a Theory of Probable Cause
Establish a Theory of Probable Cause
-
80Test the Theory to Determine the Cause
Test the Theory to Determine the Cause
-
81Establish a Plan of Action
Establish a Plan of Action
-
82Implement the Solution
Implement the Solution
-
83Verify Full System Functionality and Implement Preventive Measures
Verify Full System Functionality and Implement Preventive Measures
-
84Document Findings, Actions, and Outcomes
Document Findings, Actions, and Outcomes
-
85Topic 4B Troubleshoot Common Cable Connectivity Issues
Troubleshoot Common Cable Connectivity Issues
-
86Specification and Limitations
Specification and Limitations
-
87Cable Issues
Cable Issues
-
88Loopback Plugs, Status Indicators, and Interface Configuration
Loopback Plugs, Status Indicators, and Interface Configuration
-
89Cable Testers
Cable Testers
-
90Wire Map Testers and Tone Generators
Wire Map Testers and Tone Generators
-
91Attenuation and Interference Issues
Attenuation and Interference Issues
-
92Crosstalk Issues
Crosstalk Issues
-
93Cable Application Issues
Cable Application Issues
-
94Fiber Optic Cable Testing Tools
Fiber Optic Cable Testing Tools
-
95Lesson 4 Assesment
Lesson 5 Explaining IPv4 Addressing
-
96Lesson 5 Explaining IPv4 Addressing
Explaining IPv4 Addressing
-
97Topic 5A Explain IPv4 Addressing Schemes
Explain IPv4 Addressing Schemes
-
98IPv4 Datagram Header
IPv4 Datagram Header
-
99IPv4 Address Format
IPv4 Address Format
-
100Network Masks
Network Masks
-
101Subnet Masks
Subnet Masks
-
102Host Address Ranges
Host Address Ranges
-
103Introduction: Explain IPv4 Forwarding
Introduction: Explain IPv4 Forwarding
-
104Layer 2 versus Layer 3 Addressing and Forwarding
Layer 2 versus Layer 3 Addressing and Forwarding
-
105IPv4 Default Gateways
IPv4 Default Gateways
-
106Address Resolution Protocol
Address Resolution Protocol
-
107Unicast and Broadcast Addressing
Unicast and Broadcast Addressing
-
108Multicast and Anycast Addressing
Multicast and Anycast Addressing
-
109Topic 5C Configure IP Networks and Subnets
Configure IP Networks and Subnets
-
110Virtual LANs and Subnets
Virtual LANs and Subnets
-
111Classful Addressing
Classful Addressing
-
112Public versus Private Addressing
Public versus Private Addressing
-
113Other Reserved Address Ranges
Other Reserved Address Ranges
-
114IPv4 Address Scheme Design
IPv4 Address Scheme Design
-
115Lesson 5 Assesment
Lesson 6 Supporting IPv4 and IPv6 Networks
-
116Lesson 6 Supporting IPv4 and IPv6 Networks
Supporting IPv4 and IPv6 Networks
-
117Topic 6A Use Appropriate Tools to Test IP Configuration
Use Appropriate Tools to Test IP Configuration
-
118IP Interface Configuration in Windows
IP Interface Configuration in Windows
-
119ipconfig
ipconfig
-
120ifconfig and ip
ifconfig and ip
-
121ARP CACHE UTILITY
ARP CACHE UTILITY
-
122Internet Control Message Protocol and ping
Internet Control Message Protocol and ping
-
123Topic 6B Troubleshoot IP Networks
Troubleshoot IP Networks
-
124Hardware Failure and Network Interface Issues
Hardware Failure and Network Interface Issues
-
125IP Configuration Issues
IP Configuration Issues
-
126Duplicate IP and MAC Address Issues
Duplicate IP and MAC Address Issues
-
127Problem Isolation
Problem Isolation
-
128Incorrect DNS Issues
Incorrect DNS Issues
-
129Multicast Flooding Issues
Multicast Flooding Issues
-
130Topic 6C Explain IPv6 Addressing Schemes
Explain IPv6 Addressing Schemes
-
131IPv4 versus IPv6
IPv4 versus IPv6
-
132IPv6 Address Format
IPv6 Address Format
-
133IPv6 Network Prefixes
IPv6 Network Prefixes
-
134IPv6 Unicast Addressing
IPv6 Unicast Addressing
-
135IPv6 Link Local Addressing
IPv6 Link Local Addressing
-
136IPv6 Interface Autoconfiguration and Testing
IPv6 Interface Autoconfiguration and Testing
-
137IPv6 Multicast Addressing
IPv6 Multicast Addressing
-
138IPv4 and IPv6 Transition Mechanisms
IPv4 and IPv6 Transition Mechanisms
-
139Common IPv6 Address Prefixes
Common IPv6 Address Prefixes
-
140Lesson 6 Assesment
Lesson 7: Configuring and Troubleshooting Routers
-
141Lesson 7: Configuring and Troubleshooting Routers
Configuring and Troubleshooting Routers
-
142Topic 7A Compare and Contrast Routing Concepts
Introduction: Compare and Contrast Routing Concepts
-
143Routing Tables and Path Selection
Routing Tables and Path Selection
-
144Static and Default Routes
Static and Default Routes
-
145Routing Table Example
Routing Table Example
-
146Packet Forwarding
Packet Forwarding
-
147Fragmentation
Fragmentation
-
148Topic 7B Compare and Contrast Dynamic Routing Concepts
Introduction: Compare and Contrast Dynamic Routing Concepts
-
149Dynamic Routing Protocols
Dynamic Routing Protocols
-
150Interior versus Exterior Gateway Protocols
Interior versus Exterior Gateway Protocols
-
151Routing Information Protocol
Routing Information Protocol
-
152RIP Versions
RIP Versions
-
153Enhanced Interior Gateway Routing Protocol
Enhanced Interior Gateway Routing Protocol
-
154Open Shortest Path First
Open Shortest Path First
-
155Border Gateway Protocol
Border Gateway Protocol
-
156Administrative Distance
Administrative Distance
-
157Classless Inter-Domain Routing
Classless Inter-Domain Routing
-
158Variable Length Subnet Masks
Variable Length Subnet Masks
-
159VLSM Design
VLSM Design
-
160Topic 7C Install and Troubleshoot Routers
Introductiom: Install and Troubleshoot Routers
-
161Edge Routers
Edge Routers
-
162Router Configuration
Router Configuration
-
163route
route
-
164tracert and traceroute
tracert and traceroute
-
165Missing Route Issues
Missing Route Issues
-
166Routing Loop Issues
Routing Loop Issues
-
167Asymmetrical Routing Issues
Asymmetrical Routing Issues
-
168Low Optical Link Budget Issues
Low Optical Link Budget Issues
-
169Lesson 7 Assesment
Lesson 8 Explaining Network Topologies and Types
-
170Lesson 8 Explaining Network Topologies and Types
Introduction: Explaining Network Topologies and Types
-
171Topic 8A Explain Network Types and Characteristics
Explain Network Types and Characteristics
-
172Client-Server versus Peer-to-Peer Networks
Client-Server versus Peer-to-Peer Networks
-
173Network Types
Network Types
-
174Network Topology
Network Topology
-
175Star Topology
Star Topology
-
176Mesh Topology
Mesh Topology
-
177Ring Topology
Ring Topology
-
178Bus Topology
Bus Topology
-
179Hybrid Topology
Hybrid Topology
-
180Topic 8B Explain Tiered Switching Architecture
Explain Tiered Switching Architecture
-
181Three-Tiered Network Hierarchy
Three-Tiered Network Hierarchy
-
182Spanning Tree Protocol
Spanning Tree Protocol
-
183Spanning Tree Protocol Configuration
Spanning Tree Protocol Configuration
-
184Switching Loop and Broadcast Storm Issues
Switching Loop and Broadcast Storm Issues
-
185Topic 8C Explain Virtual LANs
Introduction: Explain Virtual LANs
-
186Virtual LAN IDs and Membership
Virtual LAN IDs and Membership
-
187Trunking and IEEE 802.1Q
Trunking and IEEE 802.1Q
-
188Tagged and Untagged Ports
Tagged and Untagged Ports
-
189Voice VLANs
Voice VLANs
-
190Lesson 8 Assesment
Lesson 9 Explaining Transport Layer Protocols
-
191Lesson 9: Explaining Transport Layer Protocols
Explaining Transport Layer Protocols
-
192Topic 9A Compare and Contrast Transport Protocols
Introduction: Compare and Contrast Transport Protocols
-
193Transport Layer Ports and Connections
Transport Layer Ports and Connections
-
194Transmission Control Protocol
Transmission Control Protocol
-
195TCP Handshake and Teardown
TCP Handshake and Teardown
-
196User Datagram Protocol
User Datagram Protocol
-
197Common TCP and UDP Ports
Common TCP and UDP Ports
-
198Topic 9B Use Appropriate Tools to Scan Network Ports
Use Appropriate Tools to Scan Network Ports
-
199IP Scanners
IP Scanners
-
200Nmap
Nmap
-
201netstat
netstat
-
202Remote Port Scanners
Remote Port Scanners
-
203Protocol Analyzers
Protocol Analyzers
-
204Lesson 9 Assesment
Lesson 10 Explaining Network Services
-
205Lesson 10 Explaining Network Services
Introduction and Objectives
-
206Topic 10A Explain the Use of Network Addressing Services
Introduction: Explain the Use of Network Addressing Services
-
207Dynamic Host Configuration Protocol
Dynamic Host Configuration Protocol
-
208DHCP Server Configuration
DHCP Server Configuration
-
209DHCP Options Configuration
DHCP Options Configuration
-
210DHCP Reservations and Exclusions
DHCP Reservations and Exclusions
-
211DHCP Relay and IP Helper
DHCP Relay and IP Helper
-
212DHCPv6 Server Configuration
DHCPv6 Server Configuration
-
213Topic 10B Explain the Use of Name Resolution Services
Explain the Use of Name Resolution Services
-
214Host Names and Fully Qualified Domain Names
Host Names and Fully Qualified Domain Names
-
215Domain Name System
Domain Name System
-
216Name Resolution Using DNS
Name Resolution Using DNS
-
217Resource Record Types
Resource Record Types
-
218Host Address and Canonical Name Records
Host Address and Canonical Name Records
-
219Mail Exchange, Service, and Text Records
Mail Exchange, Service, and Text Records
-
220Pointer Records
Pointer Records
-
221Topic 10C Configure DNS Services
Introduction: Configure DNS Services
-
222DNS Server Configuration
DNS Server Configuration
-
223Internal versus External DNS
Internal versus External DNS
-
224nslookup
nslookup
-
225dig
dig
-
226Lesson 10 Assesment
Lesson 11 Explaining Network Applications
-
227Lesson 11 Explaining Network Applications
Lesson 11: Introduction & Objectives
-
228Topic 11A Explain the Use of Web, File/Print, and Database Services
Topic 11A Explain the Use of Web, File/Print, and Database Services
-
229Hypertext Transfer Protocol
Hypertext Transfer Protocol
-
230Secure Sockets Layer/Transport Layer Security
Secure Sockets Layer/Transport Layer Security
-
231File Transfer Protocol
File Transfer Protocol
-
232Secure File Transfer Protocol
Secure File Transfer Protocol
-
233File and Print Services
File and Print Services
-
234Database Services
Database Services
-
235Topic 11B Explain the Use of Email and Voice Services
Explain the Use of Email and Voice Services
-
236Simple Mail Transfer Protocol
Simple Mail Transfer Protocol
-
237Mailbox Access Protocols
Mailbox Access Protocols
-
238Voice and Video Services
Voice and Video Services
-
239VoIP Protocols
VoIP Protocols
-
240VoIP Phones
VoIP Phones
-
241Voice Gateways
Voice Gateways
-
242Lesson 11 Assesment
Lesson 12 Ensuring Network Availability
-
243Lesson 12 Ensuring Network Availability
Lesson 12: Introduction & Objectives
-
244Topic 12A Explain the Use of Network Management Services
Explain the Use of Network Management Services
-
245Secure Shell Servers and Terminal Emulators
Secure Shell Servers and Terminal Emulators
-
246Secure Shell Commands
Secure Shell Commands
-
247Telnet
Telnet
-
248Remote Desktop Protocol
Remote Desktop Protocol
-
249Network Time Protocol
Network Time Protocol
-
250Topic 12B Use Event Management to Ensure Network Availability
Use Event Management to Ensure Network Availability
-
251Performance Metrics, Bottlenecks, and Baselines
Performance Metrics, Bottlenecks, and Baselines
-
252Environmental Monitoring
Environmental Monitoring
-
253Simple Network Management Protocol
Simple Network Management Protocol
-
254Network Device Logs
Network Device Logs
-
255Log Collectors and Syslog
Log Collectors and Syslog
-
256Event Management
Event Management
-
257Log Reviews
Log Reviews
-
258Topic 12C Use Performance Metrics to Ensure Network Availability
Use Performance Metrics to Ensure Network Availability
-
259Network Metrics
Network Metrics
-
260Bandwidth Management
Bandwidth Management
-
261Traffic Shaping
Traffic Shaping
-
262Traffic Analysis Tools
Traffic Analysis Tools
-
263NetFlow
NetFlow
-
264Interface Monitoring Metrics
Interface Monitoring Metrics
-
265Troubleshooting Interface Errors
Troubleshooting Interface Errors
-
266Lessom 12 Assesment
Lesson 13 Explaining Common Security Concepts
-
267Lesson 13 Explaining Common Security Concepts
Lesson 13: Introduction & Objectives
-
268Topic 13A Explain Common Security Concepts
Introduction: Explain Common Security Concepts
-
269Security Concepts
Security Concepts
-
270Security Risk Assessments
Security Risk Assessments
-
271Vulnerability and Exploit Types
Vulnerability and Exploit Types
-
272Threat Types and Assessment
Threat Types and Assessment
-
273Security Information and Event Management
Security Information and Event Management
-
274Penetration Testing
Penetration Testing
-
275Privileged Access Management
Privileged Access Management
-
276Vendor Assessment
Vendor Assessment
-
277Topic 13B Explain Authentication Methods
Introduction: Explain Authentication Methods
-
278Authentication Methods and Access Controls
Authentication Methods and Access Controls
-
279Multifactor and Two-Factor Authentication
Multifactor and Two-Factor Authentication
-
280Local Authentication and Single Sign-on
Local Authentication and Single Sign-on
-
281Kerberos
Kerberos
-
282Digital Certificates and PKI
Digital Certificates and PKI
-
283Extensible Authentication Protocol and IEEE 802.1X
Extensible Authentication Protocol and IEEE 802.1X
-
284RADIUS and TACACS+
RADIUS and TACACS+
-
285Lightweight Directory Access Protocol
Lightweight Directory Access Protocol
-
286LDAP Secure
LDAP Secure
-
287Lesson 13 Assesment
Lesson 14 Supporting and Troubleshooting Secure Networks
-
288Lesson 14 Supporting and Troubleshooting Secure Networks
Lesson 14: Introduction & Objectives
-
289Topic 14A Compare and Contrast Security Appliances
Introduction: Compare and Contrast Security Appliances
-
290Network Segmentation Enforcement
Network Segmentation Enforcement
-
291Screened Subnets
Screened Subnets
-
292Firewall Uses and Types
Firewall Uses and Types
-
293Firewall Selection and Placement
Firewall Selection and Placement
-
294Proxy Servers
Proxy Servers
-
295Network Address Translation
Network Address Translation
-
296Port Address Translation
Port Address Translation
-
297Defense in Depth
Defense in Depth
-
298Intrusion Detection and Prevention Systems
Intrusion Detection and Prevention Systems
-
299Topic 14B Troubleshoot Service and Security Issues
Introduction: Troubleshoot Service and Security Issues
-
300DHCP Issues
DHCP Issues
-
301Name Resolution Issues
Name Resolution Issues
-
302VLAN Assignment Issues
VLAN Assignment Issues
-
303Unresponsive Service and Network Performance Issues
Unresponsive Service and Network Performance Issues
-
304Misconfigured Firewall and ACL Issues
Misconfigured Firewall and ACL Issues
-
305Untrusted Certificate Issues
Untrusted Certificate Issues
-
306Other Common Issues
Other Common Issues
-
307Lesson 14 Assesment
Lesson 15 Deploying and Troubleshooting Wireless Networks
-
308Lesson 15 Deploying and Troubleshooting Wireless Networks
Lesson 15: Introduction & Objectives
-
309Topic 15A Summarize Wireless Standards
Introduction: Summarize Wireless Standards
-
310IEEE 802.11 Wireless Standards
IEEE 802.11 Wireless Standards
-
311IEEE 802.11a and 5 GHz Channel Bandwidth
IEEE 802.11a and 5 GHz Channel Bandwidth
-
312IEEE 802.11b/g and 2.4 GHz Channel Bandwidth
IEEE 802.11b/g and 2.4 GHz Channel Bandwidth
-
313IEEE 802.11n, MIMO, and Channel Bonding
IEEE 802.11n, MIMO, and Channel Bonding
-
314Wi-Fi 5 and Wi-Fi 6
Wi-Fi 5 and Wi-Fi 6
-
315Multiuser MIMO
Multiuser MIMO
-
3162G and 3G Cellular Technologies
2G and 3G Cellular Technologies
-
3174G and 5G Cellular Technologies
4G and 5G Cellular Technologies
-
318Topic 15B Install Wireless Networks
Introduction: Install Wireless Networks
-
319Infrastructure Topology and Wireless Access Points
Infrastructure Topology and Wireless Access Points
-
320Wireless Site Design
Wireless Site Design
-
321Site Surveys and Heat Maps
Site Surveys and Heat Maps
-
322Wireless Roaming and Bridging
Wireless Roaming and Bridging
-
323Wireless LAN Controllers
Wireless LAN Controllers
-
324Ad Hoc and Mesh Topologies
Ad Hoc and Mesh Topologies
-
325Topic 15C Troubleshoot Wireless Networks
Introduction: Troubleshoot Wireless Networks
-
326Wireless Performance Assessment
Wireless Performance Assessment
-
327Signal Strength
Signal Strength
-
328Antenna Types
Antenna Types
-
329Insufficient Wireless Coverage Issues
Insufficient Wireless Coverage Issues
-
330Channel Utilization and Overlap Issues
Channel Utilization and Overlap Issues
-
331Overcapacity Issues
Overcapacity Issues
-
332Interference Issues
Interference Issues
-
333Topic 15D Configure and Troubleshoot Wireless Security
Introduction: Configure and Troubleshoot Wireless Security
-
334Wi-Fi Encryption Standards
Wi-Fi Encryption Standards
-
335Personal Authentication
Personal Authentication
-
336Enterprise/IEEE 802.1X Authentication
Enterprise/IEEE 802.1X Authentication
-
337Wi-Fi Security Configuration Issues
Wi-Fi Security Configuration Issues
-
338Client Disassociation Issues
Client Disassociation Issues
-
339Open Authentication and Captive Portal Issues
Open Authentication and Captive Portal Issues
-
340Lesson 15 Assesment
Lesson 16 Comparing WAN Links and Remote Access Methods
-
341Lesson 16 Comparing WAN Links and Remote Access Methods
Lesson 16: Introduction & Objectives
-
342Topic 16A Explain WAN Provider Links
Introduction: Explain WAN Provider Links
-
343Wide Area Networks and the OSI Model
Wide Area Networks and the OSI Model
-
344WAN Provider Links
WAN Provider Links
-
345T-Carrier and Leased Line Provider Links
T-Carrier and Leased Line Provider Links
-
346Digital Subscriber Line Provider Links
Digital Subscriber Line Provider Links
-
347Fiber to the Curb
Fiber to the Curb
-
348Cable Provider Links
Cable Provider Links
-
349Metro-optical Provider Links
Metro-optical Provider Links
-
350Microwave Satellite
Microwave Satellite
-
351Topic 16B Compare and Contrast Remote Access Methods
Introduction: Compare and Contrast Remote Access Methods
-
352Remote Network Access Authentication and Authorization
Remote Network Access Authentication and Authorization
-
353Tunneling and Encapsulation Protocols
Tunneling and Encapsulation Protocols
-
354Client-to-Site Virtual Private Networks
Client-to-Site Virtual Private Networks
-
355Remote Host Access and Remote Desktop Gateways
Remote Host Access and Remote Desktop Gateways
-
356Site-to-Site Virtual Private Networks
Site-to-Site Virtual Private Networks
-
357Hub and Spoke VPNs and VPN Headends
Hub and Spoke VPNs and VPN Headends
-
358Internet Protocol Security
Internet Protocol Security
-
359IKE and IPSec Modes
IKE and IPSec Modes
-
360Out-of-Band Management Methods
Out-of-Band Management Methods
-
361Lesson 16 Assesment
Lesson 17 Explaining Organizational and Physical Security Concepts
-
362Lesson 17 Explaining Organizational and Physical Security Concepts
Lesson 17: Introduction & Objectives
-
363Topic 17A Explain Organizational Documentation and Policies
Introduction: Explain Organizational Documentation and Policies
-
364Operating Plans and Procedures
Operating Plans and Procedures
-
365System Life Cycle Plans and Procedures
System Life Cycle Plans and Procedures
-
366Physical Network Diagrams
Physical Network Diagrams
-
367Rack Diagrams
Rack Diagrams
-
368Logical versus Physical Network Diagrams
Logical versus Physical Network Diagrams
-
369Security Response Plans and Procedures
Security Response Plans and Procedures
-
370Hardening and Security Policies
Hardening and Security Policies
-
371Usage Policies
Usage Policies
-
372Data Loss Prevention
Data Loss Prevention
-
373Remote Access Policies
Remote Access Policies
-
374Common Agreements
Common Agreements
-
375Topic 17B Explain Physical Security Methods
Introduction: Explain Physical Security Methods
-
376Badges and Site Secure Entry Systems
Badges and Site Secure Entry Systems
-
377Physical Security for Server Systems
Physical Security for Server Systems
-
378Detection-Based Devices
Detection-Based Devices
-
379Alarms and Tamper Detection
Alarms and Tamper Detection
-
380Asset Disposal
Asset Disposal
-
381Employee Training
Employee Training
-
382Topic 17C Compare and Contrast Internet of Things Devices
Introduction: Compare and Contrast Internet of Things Devices
-
383Internet of Things
Internet of Things
-
384Industrial Control Systems/Supervisory Control and Data Acquisition
Industrial Control Systems/Supervisory Control and Data Acquisition
-
385IoT Networks
IoT Networks
-
386Placement and Security
Placement and Security
-
387Lesson 17 Assesment
Lesson 18 Explaining Disaster Recovery and High Availability Concepts
-
388Lesson 18 Explaining Disaster Recovery and High Availability Concepts
Lesson 18: Introduction & Objectives
-
389Topic 18A Explain Disaster Recovery Concepts
Introduction: Explain Disaster Recovery Concepts
-
390High Availability
High Availability
-
391Fault Tolerance and Redundancy
Fault Tolerance and Redundancy
-
392Recovery Sites
Recovery Sites
-
393Facilities and Infrastructure Support
Facilities and Infrastructure Support
-
394Power Management
Power Management
-
395Network Device Backup Management
Network Device Backup Management
-
396Topic 18B Explain High Availability Concepts
Topic 18B Explain High Availability Concepts
-
397Multipathing
Multipathing
-
398Link Aggregation/NIC Teaming
Link Aggregation/NIC Teaming
-
399Load Balancers
Load Balancers
-
400Redundant Hardware/Clusters
Redundant Hardware/Clusters
-
401First Hop Redundancy
First Hop Redundancy
-
402Lesson 18 Assesment
Lesson 19 Applying Network Hardening Techniques
-
403Lesson 19 Applying Network Hardening Techniques
Lesson 19: Introduction & Objectives
-
40419A Compare and Contrast Types of Attacks
Introduction: Compare and Contrast Types of Attacks Topic
-
405General Attack Types
General Attack Types
-
406On-path Attacks
On-path Attacks
-
407DNS Poisoning Attacks
DNS Poisoning Attacks
-
408VLAN Hopping Attacks
VLAN Hopping Attacks
-
409Wireless Network Attacks
Wireless Network Attacks
-
410Distributed DoS Attacks and Botnets
Distributed DoS Attacks and Botnets
-
411Malware and Ransomware Attacks
Malware and Ransomware Attacks
-
412Password Attacks
Password Attacks
-
413Human and Environmental Attacks
Human and Environmental Attacks
-
414Topic 19B Apply Network Hardening Techniques
Introduction: Apply Network Hardening Techniques
-
415Device and Service Hardening
Device and Service Hardening
-
416Endpoint Security and Switchport Protection
Endpoint Security and Switchport Protection
-
417VLAN and PVLAN Best Practices
VLAN and PVLAN Best Practices
-
418Firewall Rules and ACL Configuration
Firewall Rules and ACL Configuration
-
419Control Plane Policing
Control Plane Policing
-
420Wireless Security
Wireless Security
-
421IoT Access Considerations
IoT Access Considerations
-
422Patch and Firmware Management
Patch and Firmware Management
-
423Lesson 19 Assesment
Lesson 20 Summarizing Cloud and Datacenter Architecture
-
424Lesson 20 Summarizing Cloud and Datacenter Architecture
Lesson 20: Introduction & Objectives
-
425Topic 20A Summarize Cloud Concepts
Introduction: Summarize Cloud Concepts
-
426Cloud Scalability and Elasticity
Cloud Scalability and Elasticity
-
427Cloud Deployment Models
Cloud Deployment Models
-
428Cloud Service Models
Cloud Service Models
-
429Cloud Connectivity Options
Cloud Connectivity Options
-
430Infrastructure as Code
Infrastructure as Code
-
431Cloud Security Implications
Cloud Security Implications
-
432Topic 20B Explain Virtualization and Storage Area Network Technologies
Introduction: Explain Virtualization and Storage Area Network Technologies
-
433Hypervisor Types
Hypervisor Types
-
434Virtual NICs and Switches
Virtual NICs and Switches
-
435Network Function Virtualization
Network Function Virtualization
-
436Storage Area Networks
Storage Area Networks
-
437SAN Connection Types
SAN Connection Types
-
438iSCSI
iSCSI
-
439Topic 20C Explain Datacenter Network Architecture
Introduction: Explain Datacenter Network Architecture
-
440Datacenter Network Design
Datacenter Network Design
-
441Software Defined Networking
Software Defined Networking
-
442Spine and Leaf Topology
Spine and Leaf Topology
-
443Datacenter Access Types
Datacenter Access Types
-
444Multiprotocol Label Switching
Multiprotocol Label Switching
-
445Software-defined WAN
Software-defined WAN
-
446Next Steps: Become a CompTIA Network+ Certified Professional!
Next Steps: Become a CompTIA Network+ Certified Professional!
-
447Lesson 20 Assesment
Be the first to add a review.
Please, login to leave a review