
Learning Network Technology and Security Fundamentals
Publisher: Infinite Skills
Release Date: September 2014
Duration: 8 hours 17 minutes
Watch on Safari with a 10-day trial
Start your free trial nowWhere's the cart? All videos are now exclusively on Safari. Questions? See our FAQ or contact customer service:
1-800-889-8969 / 707-827-7019
support@oreilly.com
You will start by reviewing the Open Systems Interconnect (OSI) model, then jump into learning the TCP/IP suite of protocols. David will then cover transmission media and technologies. This video tutorial will also look at the devices that make up the network infrastructure, including firewalls, routers, Virtual Private Networks (VPNs), client systems, and virtual machines. Next, you will learn about wireless networks, devices, and security. Finally, David will cover the various types of attacks on networks, including browsing attacks, information theft, and attacks on cell phones.
Once you have completed this computer based training course, you will be fully capable of securing and protecting an enterprise network. Working files are included, allowing you to follow along with the author throughout the lessons.
Table of Contents
Chapter: Introduction
About The Author And Introduction.mp4
05m 34s
Chapter: The OSI Model
OSI - Part 1.mp4
07m 40s
OSI - Part 2.mp4
09m 43s
Chapter: TCP / IP Protocols
TCP / IP Protocols.mp4
07m 38s
IPv4 Addressing.mp4
09m 5s
Ports And IPv6 Addressing.mp4
08m 31s
TCP / IP Review.mp4
07m 55s
Chapter: Transmission Media And Technologies
Network Media.mp4
08m 32s
Network Media Terms - Part 1.mp4
08m 10s
Network Media Terms - Part 2.mp4
07m 46s
Ethernet.mp4
09m 5s
Wireless.mp4
04m 54s
Modulation And Encoding.mp4
09m 26s
Topologies.mp4
09m 10s
Network Sizes.mp4
08m 49s
Transmission Types.mp4
09m 18s
Media Access Methods.mp4
10m 18s
Chapter: Network Infrastructure
Segments, Subnets And Domains.mp4
08m 13s
Terms And Definitions.mp4
07m 1s
Network Layer Devices - Part 1.mp4
07m 50s
Network Layer Devices - Part 2.mp4
07m 15s
Data Link Layer Devices.mp4
08m 57s
Routers.mp4
08m 45s
Firewalls - Part 1.mp4
08m 36s
Firewalls - Part 2.mp4
10m 4s
Firewalls - Part 3.mp4
08m 12s
Firewall Rules.mp4
08m 38s
Firewall Architecture.mp4
08m 20s
Network Services.mp4
09m 16s
DHCP.mp4
10m 10s
Domain Name Systems.mp4
07m 25s
DNS Architecture.mp4
10m 48s
DNS Resolver.mp4
08m 34s
Authentication Introduction.mp4
09m 13s
Authentication Protocols.mp4
07m 29s
Directory Services - Part 1.mp4
07m 53s
Directory Services - Part 2.mp4
07m 5s
DS Kerberos.mp4
06m 58s
DS Kerberos RAS.mp4
08m 18s
Diameter.mp4
05m 42s
RAS VPN.mp4
09m 7s
NAT PAT.mp4
07m 9s
Bastion Host.mp4
07m 41s
Endpoint Systems.mp4
07m 55s
Virtual Machines.mp4
08m 54s
Mainframe.mp4
05m 8s
Chapter: Wireless Networking
Wireless Introduction - Part 1.mp4
08m 11s
Wireless Introduction - Part 2.mp4
08m 31s
Wireless Security - WEP.mp4
06m 14s
Wireless Security - Authenticating.mp4
08m 22s
Wireless Security - WPA WPA2.mp4
07m 50s
Wireless Security - 802.11i.mp4
09m 37s
Wireless Security - Attacks.mp4
08m 29s
Wireless Security Review.mp4
08m 45s
MIMO And Cellular.mp4
09m 22s
Chapter: Attacks On Networks
Browsing.mp4
08m 15s
DoS / DDoS.mp4
07m 23s
Information Theft.mp4
10m 19s
APT And Cellular.mp4
09m 36s
Chapter: Conclusion
Course Review.mp4
08m 35s