Welcome to CompTIA Network+ 2009 Training
- 10m 23s
—About Your Instructor and Train Signal
3m 14s
—What's Covered in This Course
4m 33s
—Are You Ready to Get Started?
2m 36s
Basic Networking Fundamentals
- 26m 9s
—Introduction
1m 0s
—What is a Network?
2m 41s
—Client/Server
2m 5s
—Peer-to-Peer
2m 46s
—LAN - Local Area Network
2m 13s
—CAN - Campus Area Network
1m 51s
—MAN - Metropolitan Area Network
1m 48s
—WAN - Wide Area Network
1m 22s
—How Do We Make Connections?
1m 51s
—What is a Protocol?
4m 9s
—Introduction to Addressing
2m 38s
—What We Covered
1m 45s
—Introduction
1m 18s
—Wired Media - Twisted Pair
11m 2s
—Wired Media - Coaxial
7m 5s
—Wired Media - Fiber Optic
8m 41s
—What is the Plenum?
4m 56s
—Common Connectors
4m 36s
—Wiring Standards
8m 29s
—LAN Technology Types - Ethernet
7m 49s
—Standard Ethernet
1m 26s
—Fast Ethernet
1m 4s
—Gigabit Ethernet
2m 44s
—Wiring Distribution
6m 14s
—What We Covered
1m 36s
Network Topologies
- 36m 16s
—Introduction
0m 33s
—What Does Topology Mean?
0m 53s
—Bus
2m 26s
—Star
1m 12s
—Ring
2m 59s
—Mesh
1m 44s
—Hybrid
1m 56s
—WAN Technologies - Circuit and Pocket Switching
2m 19s
—POTS, PSTN, T1/E1, and T3/E3
1m 58s
—ISDN
0m 56s
—SONET/OC-x
2m 7s
—Frame Relay and ATM
3m 14s
—MPLS - Multiprotocol Label Switching
3m 50s
—DSL
2m 28s
—Cable Modem, Satellite and Wireless
2m 43s
—What is a VPN?
2m 6s
—What is a VLAN?
2m 13s
—What We Covered
0m 39s
—Introduction
0m 34s
—Definition of a Protocol
7m 34s
—Standards of Communication
1m 21s
—What is the OSI Model?
5m 33s
—Defining OSI Model Layers
9m 54s
—How Data Travels Through OSI Model
5m 43s
—Networking Hardware in OSI Model
4m 14s
—What We Covered
0m 48s
—Introduction
2m 20s
—TCP/IP Protocol Suite
2m 16s
—What is the TCP/IP (DARPA) Model?
4m 30s
—Transport Layer Protocols
4m 53s
—Internet Layer Protocols
4m 29s
—Types of TCP/IP Communication
2m 37s
—Working with IP Addresses
7m 9s
—Planning an IP Addressing Scheme
1m 25s
—Rules for IP Addressing
4m 16s
—What is Classful IP Addressing?
5m 27s
—Private vs. Public IP Addressing
4m 30s
—What is NAT?
6m 41s
—How Computers Get IP Addresses
4m 1s
—Working with Binary Numbers
5m 31s
—Converting Binary to Decimal and Vice Versa
8m 12s
—Binary IP Addresses
2m 38s
—Binary Subnet Masks
1m 6s
—Internetworking - What is a Router?
3m 13s
—What is a Default Gateway?
1m 48s
—What is Subnetting?
1m 57s
—Classful vs. Classless Interdomain Routing (CIDR)
4m 8s
—Subnetting with CIDR & VLSM
10m 41s
—CIDR Notation
1m 23s
—Fundamentals of IPv6
7m 6s
—IPv6 Addressing
4m 13s
—Types of IPv6 Addresses
4m 46s
—What We Covered
2m 11s
TCP/IP Protocols
- 22m 18s
—Introduction
0m 45s
—FTP - File Transfer Protocol
0m 51s
—TFTP - Trivial File Transfer Protocol
1m 38s
—HTTP and HTTPS
3m 26s
—NTP - Network Time Protocol
1m 15s
—POP3 and IMAP4
1m 15s
—SMTP - Simple Mail Transfer Protocol
0m 59s
—DHCP - Dynamic Host Configuration Protocol
2m 18s
—DNS - Domain Naming System
2m 10s
—Telnet and SSH
2m 12s
—SNMP - Simple Network Management Protocol
3m 38s
—TLS - Transport Layer Security
1m 4s
—What We Covered
0m 47s
—Modem and NIC
2m 11s
—Repeater and Hub
3m 35s
—Bridge and Switch
5m 49s
—Router
3m 2s
—Different Types of Switches
2m 57s
—Advanced Switch Functionality
4m 54s
—Firewall and Proxy Server
2m 18s
—Wireless Access Point
1m 8s
—Basic DHCP Server and DNS Server
3m 55s
—CSU/DSU
0m 54s
—Media Converters
1m 43s
—Load Balancer and Bandwidth Shaper
2m 39s
—Introduction
0m 42s
—Understanding Routing Tables
7m 37s
—Adding and Deleting Routes
5m 12s
—Static vs. Dynamic Routing
7m 33s
—Routing Protocols
2m 36s
—Distance Vector Protocols: RIP, RIPv2, and BGP
3m 20s
—Link State Protocols: OSPF and IS-IS
1m 52s
—Hybrid Routing Protocol: EIGRP
2m 25s
—What is Convergence?
0m 56s
—IGP vs. EGP
1m 15s
—What We Covered
0m 51s
Wireless Networking
- 45m 36s
—Introduction
1m 13s
—Benefits of Wireless Networking
0m 58s
—Components of a Wireless Access Point
3m 51s
—Where to Place a WAP
3m 34s
—Wireless Networking Standards
10m 24s
—RF Channels
1m 56s
—How to Secure a Wireless Network
3m 12s
—WEP - Wired Equivalency Privacy
1m 36s
—WPA - Wi-Fi Protected Access
3m 59s
—802.1x
2m 12s
—Setting Up a Wireless Access Point
11m 22s
—What We Covered
1m 19s
Networking Command Line Tools
- 53m 23s
—Introduction
0m 46s
—ipconfig/ifconfig/arp Utilities Overview
1m 51s
—ping/arp ping Utilities Overview
2m 56s
—tracert/traceroute Utilities Overview
1m 43s
—mtr Utility Overview
1m 14s
—netstat/nbstat/route Utilities Overview
2m 8s
—nslookup/dig/host Utilities Overview
4m 57s
—ipconfig Command
10m 13s
—arp Command
6m 15s
—ping Command
9m 33s
—tracert Command
3m 30s
—netstat Command
5m 4s
—nslookup Command
3m 13s
Network Performance Optimization
- 31m 19s
—Introduction
0m 41s
—Reasons for Network Performance Optimization
4m 9s
—Quality of Service (QoS)
0m 57s
—Traffic Shaping
2m 10s
—Load Balancing
2m 28s
—Fault Tolerance
7m 10s
—RAID 1 - Disk Mirroring and Duplexing
3m 12s
—RAID 5 - Disk Striping with Parity
8m 3s
—Caching Engines
1m 27s
—What We Covered
1m 2s
—Introduction
0m 42s
—Cable Strippers
1m 18s
—Snips and Crimpers
2m 52s
—Punch Down Tool
1m 15s
—Cable Testers and Certifiers
1m 57s
—Time Domain Reflectometer (TDR) and Optical TDR (OTDR)
2m 33s
—Toner Probe
3m 44s
—Voltage Event Recorder
1m 17s
—Multimeter
1m 14s
—Protocol Analyzer, Temperature Monitor, and Butt Set
3m 44s
Network Monitoring
- 18m 58s
—Packet Sniffers
3m 25s
—Port Scanners
2m 7s
—Intrusion Detection Software and Intrusion Prevention Software
4m 28s
—System, Event, and History Logs
7m 38s
—What We Covered
1m 20s
—Introduction
0m 41s
—Why is Documentation so Important?
7m 0s
—What Should I Document?
1m 17s
—Wiring Schematics
3m 54s
—Physical and Logical Network Diagrams
3m 55s
—Baseline
2m 16s
—Network Policies
4m 36s
—Network Procedures
1m 39s
—Network Configuration
1m 24s
—Regulations
0m 53s
—What We Covered
0m 40s
—The Process of Troubleshooting - Gather Information
2m 48s
—Who is Affected?
1m 4s
—What's Changed?
1m 39s
—Why is This Happening?
0m 44s
—Can I Handle It?
2m 50s
—Process of Finding a Solution
3m 36s
—Document Everything
1m 57s
—Physical Issues
9m 16s
—Logical Issues
6m 47s
—Issues to Escalate
7m 13s
—Wireless Issues
3m 17s
—What We Covered
0m 57s
Network Security
- 1h 40m
—Introduction
2m 40s
—Firewalls
7m 5s
—Other Security Devices
3m 2s
—Filtering and Access Control Lists (ACLs)
3m 32s
—Tunneling and Encryption
8m 38s
—Remote Access and Control Protocols
6m 42s
—Authentication, Authorization, and Accounting (AAA)
7m 17s
—Public Key Infrastructure (PKI)
2m 39s
—Cryptography
2m 5s
—Symmetric Key Encryption
5m 1s
—Asymmetric Key Encryption
1m 41s
—PKI Examples
8m 47s
—802.1x Standard
0m 59s
—Kerberos
2m 15s
—Remote Access Authentication Protocols
6m 8s
—Device Security
7m 17s
—Viruses, Worms, and Trojan Horses
2m 38s
—Denial of Service (DoS) and Smurf
3m 25s
—Social Engineering, Man in the Middle, and Rogue Access Points
6m 39s
—Who are Your Attackers?
4m 49s
—What Can Be Done to Protect the Network?
5m 33s
—What We Covered
1m 35s