Introduction | |||
Introduction to Network+ | 00:03:00 | ||
What’s on the Network+ Exam | 00:02:00 | ||
What Can You Do with a Network+ Certification | 00:03:00 | ||
Section 01: Network Models | |||
The OSI Model | 00:13:00 | ||
Meet the Frame | 00:06:00 | ||
The MAC Address | 00:07:00 | ||
Broadcast vs. Unicast | 00:04:00 | ||
Introduction to IP Addressing | 00:08:00 | ||
Packets and Ports | 00:05:00 | ||
Section 02: Cabling And Topology | |||
Network Topologies | 00:05:00 | ||
Coaxial Cabling | 00:05:00 | ||
Twisted Pair Cabling | 00:05:00 | ||
Fiber Optic Cabling | 00:09:00 | ||
Fire Ratings | 00:05:00 | ||
Section 03: Ethernet Basics | |||
What is Ethernet? | 00:06:00 | ||
Ethernet Frames | 00:07:00 | ||
Terminating Twisted Pair | 00:08:00 | ||
Hubs vs. Switches | 00:12:00 | ||
Connecting Switches | 00:05:00 | ||
Section 04: Ethernet Standards | |||
100BaseT | 00:05:00 | ||
Gigabit Ethernet and 10-Gigabit Ethernet | 00:05:00 | ||
Transceivers | 00:07:00 | ||
Connecting Ethernet Scenarios | 00:14:00 | ||
Section 05: Installing A Physical Network | |||
Introduction to Structured Cabling | 00:04:00 | ||
Terminating Structured Cabling | 00:08:00 | ||
Equipment Room | 00:07:00 | ||
Alternative Distribution Panels | 00:04:00 | ||
Testing Cable | 00:09:00 | ||
Troubleshooting Structured Cabling, Part-1 | 00:04:00 | ||
Troubleshooting Structured Cabling, Part-2 | 00:04:00 | ||
Using a Toner and Probe | 00:03:00 | ||
Wired Connection Scenarios | 00:10:00 | ||
Section 06: TCP/IP Basics | |||
Introduction to IP Addressing and Binary | 00:13:00 | ||
Introduction to ARP | 00:04:00 | ||
Subnet Masks | 00:12:00 | ||
Classful Addressing | 00:10:00 | ||
Subnetting with CIDR | 00:10:00 | ||
More CIDR Subnetting Practice | 00:10:00 | ||
Dynamic and Static IP Addressing | 00:05:00 | ||
Special IP Addresses | 00:07:00 | ||
IP Addressing Scenarios | 00:15:00 | ||
Section 07: Routing | |||
Introducing Routers | 00:15:00 | ||
Understanding Ports | 00:05:00 | ||
Network Address Translation (NAT) | 00:06:00 | ||
Implementing NAT | 00:02:00 | ||
Forwarding Ports | 00:18:00 | ||
Tour of a SOHO Router | 00:12:00 | ||
SOHO vs. Enterprise | 00:09:00 | ||
Static Routes | 00:13:00 | ||
Dynamic Routing | 00:10:00 | ||
Routing Information Protocol (RIP) | 00:04:00 | ||
Open Shortest Path First (OSPF) | 00:03:00 | ||
Border Gateway Protocol | 00:06:00 | ||
Section 08: TCP/IP Applications | |||
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) | 00:07:00 | ||
ICMP and IGMP | 00:06:00 | ||
Handy Tools | 00:07:00 | ||
Introduction to Wireshark | 00:10:00 | ||
Introduction to netstat | 00:09:00 | ||
Web Servers | 00:12:00 | ||
File Transfer Protocol (FTP) | 00:12:00 | ||
E-mail Servers and Clients | 00:09:00 | ||
Securing E-mail | 00:06:00 | ||
Telnet and SSH | 00:09:00 | ||
Network Time Protocol (NTP) | 00:04:00 | ||
Network Service Scenarios | 00:09:00 | ||
Section 09: Network Naming | |||
Understanding DNS | 00:07:00 | ||
Applying DNS | 00:19:00 | ||
net Command | 00:08:00 | ||
Windows Name Resolution | 00:11:00 | ||
Dynamic DNS | 00:05:00 | ||
DNS Troubleshooting | 00:13:00 | ||
Section 10: Securing TCP/IP | |||
Making TCP/IP Secure | 00:04:00 | ||
Symmetric Encryption | 00:05:00 | ||
Asymmetric Encryption | 00:03:00 | ||
Cryptographic Hashes | 00:05:00 | ||
Identification | 00:08:00 | ||
Access Control | 00:04:00 | ||
AAA | 00:05:00 | ||
Kerberos/EAP | 00:07:00 | ||
Single Sign-On | 00:10:00 | ||
Certificates and Trust | 00:14:00 | ||
Certificate Error Scenarios | 00:08:00 | ||
Section 11: Switch Features | |||
Switch Management | 00:09:00 | ||
Introduction to VLANs | 00:10:00 | ||
InterVLAN Routing | 00:03:00 | ||
Trunking | 00:08:00 | ||
Cisco Commands | 00:06:00 | ||
Switch Port Protection | 00:07:00 | ||
Port Bonding | 00:07:00 | ||
Port Mirroring | 00:03:00 | ||
Quality of Service | 00:05:00 | ||
IDS vs. IPS | 00:04:00 | ||
Proxy Servers | 00:13:00 | ||
Load Balancing | 00:08:00 | ||
Device Placement Scenarios | 00:13:00 | ||
Section 12: IPv6 | |||
Introduction to IPv6 | 00:13:00 | ||
IPv6 Addressing | 00:15:00 | ||
IPv6 in Action | 00:13:00 | ||
IPv4 and IPv6 Tunneling | 00:05:00 | ||
Section 13: WAN Connectivity | |||
Understanding IP Tunneling | 00:06:00 | ||
WAN Technologies | 00:06:00 | ||
Digital Subscriber Line (DSL) | 00:04:00 | ||
Connecting with Cable Modems | 00:04:00 | ||
Connecting with Satellites | 00:02:00 | ||
Cellular Technologies | 00:04:00 | ||
Remote Desktop Connectivity | 00:04:00 | ||
Virtual Private Networks (VPNs) | 00:09:00 | ||
WAN Troubleshooting Scenarios | 00:05:00 | ||
Section 14: Wireless Networking | |||
Introduction to 802.11 | 00:12:00 | ||
802.11 Standards | 00:12:00 | ||
Power Over Ethernet (PoE) | 00:04:00 | ||
Antennas | 00:09:00 | ||
Wireless Security Standards | 00:06:00 | ||
Implementing Wireless Security | 00:07:00 | ||
Threats to Your Wireless Network | 00:07:00 | ||
Installing a Wireless Network | 00:15:00 | ||
Wireless Scenarios | 00:06:00 | ||
More Wireless Scenarios | 00:09:00 | ||
Section 15: Virtualization And Cloud Computing | |||
Virtualization Basics | 00:07:00 | ||
Your First Virtual Machine | 00:07:00 | ||
Cloud Basics | 00:03:00 | ||
Cloud Services | 00:07:00 | ||
Cloud Ownership | 00:02:00 | ||
Infrastructure as Code (IaC) | 00:03:00 | ||
Heroku Demo | 00:09:00 | ||
Enterprise Virtualization | 00:06:00 | ||
Cloud Implementation | 00:11:00 | ||
Section 16: Datacenters | |||
Classic Data Center Architecture | 00:12:00 | ||
NAS and SAN | 00:16:00 | ||
The Modern Data Center | 00:09:00 | ||
High Availability | 00:11:00 | ||
Documenting the Datacenter | 00:08:00 | ||
Section 17: Integrating Networked Devices | |||
Network Types | 00:04:00 | ||
Internet of Things (IoT) | 00:07:00 | ||
Voice Over IP (VoIP) | 00:11:00 | ||
Industrial Control Systems and SCADA | 00:09:00 | ||
Section 18: Network Operations | |||
What are Network Operations? | 00:03:00 | ||
Hardening and Security Policies | 00:06:00 | ||
Change Management | 00:07:00 | ||
Patching and Updating | 00:07:00 | ||
Security Risk Management | 00:05:00 | ||
Points of Failure | 00:04:00 | ||
Standard Business Documentation | 00:05:00 | ||
Incident Response and Forensics | 00:05:00 | ||
Disaster Recovery and Backups | 00:12:00 | ||
Business Continuity | 00:12:00 | ||
Deployment Models | 00:05:00 | ||
Section 19: Protecting Networks | |||
Security Concepts | 00:06:00 | ||
Defense in Depth | 00:05:00 | ||
Rogue DHCP Servers | 00:04:00 | ||
Denial of Service (DoS) | 00:10:00 | ||
On-Path and Spoofing Attacks | 00:23:00 | ||
Password Attacks | 00:06:00 | ||
VLAN Hopping | 00:06:00 | ||
System Life Cycle | 00:04:00 | ||
Malware | 00:06:00 | ||
Social Engineering | 00:08:00 | ||
Common Vulnerabilities | 00:03:00 | ||
Physical Security | 00:13:00 | ||
Network Hardening | 00:08:00 | ||
Demilitarized Zone (DMZ) | 00:05:00 | ||
Introduction to Firewalls | 00:04:00 | ||
Firewalls | 00:10:00 | ||
Section 20: Networking Monitoring | |||
Networking Monitoring | 00:08:00 | ||
SNMP | 00:15:00 | ||
Documenting Logs | 00:07:00 | ||
System Monitoring | 00:08:00 | ||
Security Information and Event Management (SIEM) | 00:07:00 | ||
Section 21: Network Troubleshooting | |||
Network Troubleshooting Theory | 00:05:00 |
No Reviews found for this course.
Can’t find the anwser you’re looking for ? Reach out to customer support team.
There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course.
You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience.
For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime.
Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks.
We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase.
Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course.
If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.