CompTIA Network+ N10-008

Network Redundancy – N10-008 CompTIA Network+ : 3.3

A savvy network administrator includes redundancy options in their network designs. In this video, you’ll learn about active-passive, active-active, diverse paths, and high availability protocols. << Previous Video: Recovery Sites Next Video: Availability Concepts >> One way to implement redundant systems is to purchase two devices but have one of those devices operate at any …

Network Redundancy – N10-008 CompTIA Network+ : 3.3 Read More »

Recovery Sites – N10-008 CompTIA Network+ : 3.3

When a disaster happens, you’ll need a recovery site to continue operations. In this video, you’ll learn about cold sites, hot sites, warm sites, and cloud recovery sites. << Previous Video: Infrastructure Support Next Video: Network Redundancy >> Many organizations will create a disaster recovery plan that involves a separate facility. This is site resiliency, …

Recovery Sites – N10-008 CompTIA Network+ : 3.3 Read More »

High Availability – N10-008 CompTIA Network+ : 3.3

Keeping the network running is a primary objective of any network administrator. In this video, you’ll learn about high availability, redundancy options, and NIC teaming, and other methods to maintain uptime and availability. << Previous Video: Network Documentation Next Video: Infrastructure Support >> One of the primary goals on our enterprise networks is to maintain …

High Availability – N10-008 CompTIA Network+ : 3.3 Read More »

Network Documentation – N10-008 CompTIA Network+ : 3.2

The size of most enterprise networks requires detailed documentation. ZIn this video, you’ll learn about floor plans, distribution frames, network maps, audit reports, and more. << Previous Video: Security Policies Next Video: High Availability >> One common thread across all of information technology is the need for documentation. In this video, we’ll see how documentation …

Network Documentation – N10-008 CompTIA Network+ : 3.2 Read More »

Security Policies – N10-008 CompTIA Network+ : 3.2

There are many processes and procedures associated with a common security policy. In this video, you’ll learn about password policies, acceptable use policies, BYOD, DLP, and more. << Previous Video: Plans and Procedures Next Video: Network Documentation >> One significant stumbling block that keeps the attackers out of our systems is the credentials that we …

Security Policies – N10-008 CompTIA Network+ : 3.2 Read More »

Plans and Procedures – N10-008 CompTIA Network+ : 3.2

An IT professional has to be ready for anything. In this video, you’ll learn about change management, security incidents, disaster recovery plans, system life cycles, and more. << Previous Video: Logs and Monitoring Next Video: Security Policies >> They say that the only constant is change, and that is certainly true in information technology. There …

Plans and Procedures – N10-008 CompTIA Network+ : 3.2 Read More »

Logs and Monitoring – N10-008 CompTIA Network+ : 3.1

A wealth of monitoring information is contained in various device log files. In this video, you’ll learn how to consolidate and report on log files and how NetFlow can be used to supplement this data. << Previous Video: SNMP Next Video: Plans and Procedures >> If you’re working with routers, switches, firewalls, or other infrastructure …

Logs and Monitoring – N10-008 CompTIA Network+ : 3.1 Read More »

SNMP – N10-008 CompTIA Network+ : 3.1

The Simple Network Management Protocol is the foundation for network monitoring. In this video, you’ll learn about SNMP, common MIBs, and SNMP traps. << Previous Video: Performance Metrics Next Video: Logs and Monitoring >> SNMP stands for the Simple Network Management Protocol. SNMP consists of a centralized database of information contained within our infrastructure devices. …

SNMP – N10-008 CompTIA Network+ : 3.1 Read More »