In this study group episode; port numbers, IPv6 in the mainstream, network address translation (NAT), and last-minute study tips.
In this study group; IPv6 overview, switching vs. routing, the OSI model and the TCP/IP model, and what’s new in the latest Network+ certification version!
In this study group edition; plenum cable, the OSI model in the real world, DoS in IPv6, and subnetting, subnetting, subnetting!
The security of the network is a never-ending struggle against the bad guys. In this video, you’ll learn about the most common security threats and what you can do to protect your network resources. We’ll discuss denial of service attacks, viruses, worms, man in the middle attacks, rogue access points, social engineering, and phishing. We’ll also show you how policies and procedures, user training, and patching can help mitigate these security problems in your network.
The security of the devices on our network must be managed through both physical and technological means. In this video, you’ll learn the importance of good physical security, methods to restrict local and remote access to our devices, and the applications and protocols that you can use to build a more secure networking environment.
During a normal day, we are constantly authenticating our user credentials to web sites, file servers, and other network resources. As with most technologies, there’s more than one way to perform these authentications. In this video, you’ll learn what’s happening over the wire and become familiar with PKI, Kerberos, AAA, network access control technologies, CHAP, EAP, and much more.
The network is a wide-open space, but there are a number of technologies that network and security professionals can use to help control access to critical parts of the network. In this modules, you’ll learn about filtering technologies, tunneling and encryption methods, and remote access applications and protocols.
Firewalls are one of the most fundamental security components in our modern networks, but not all firewalls are created equally. In this module, you’ll learn about common features of modern firewalls, such as network-layer and application-layer firewalls, stateful vs. stateless operation, content filtering, signature identification, and zone-based security.
As network professionals, we rely on some core security devices to protect our network. In this video, you’ll learn about network-based firewalls, host-based firewalls, IDS/IPS, and VPN concentrators.
If you’re managing a network, you’ll need a comprehensive toolkit to keep things running at peak efficiency. In this video, you’ll learn about the tools that will make your life a much better place. We’ll discuss cable testers and certifiers, TDRs, multimeters, punch-down tools, voltage event recorders, and much more.