Networking Core Concepts: intermediate

https://www.skillsoft.com/channel/networking-core-concepts-9eb0ab00-e253-11e6-91a7-0242c0a80704?expertiselevel=3341401 https://www.skillsoft.com/channel/networking-core-concepts-9eb0ab00-e253-11e6-91a7-0242c0a80704?expertiselevel=3341402
  • 51 Courses | 68h 4m 52s
  • 7 Books | 85h 28m
  • Includes Lab
  • 20 Courses | 19h 6m 40s
  • 7 Books | 66h 35m
  • Includes Lab
  • 1 Audiobook | 13h 28m 12s
Rating 4.5 of 2 users Rating 4.5 of 2 users (2)
 
Networks can range from the very small to the very large and complex. Master the basics of networking technologies here.

GETTING STARTED

CompTIA Network+: OSI Model Layers & Data Encapsulation

  • 1m 48s
  • 7m 54s

GETTING STARTED

Networking Standards and Connections

  • 1m 4s
  • 1m 5s

COURSES INCLUDED

CompTIA Network+: OSI Model Layers & Data Encapsulation
The Open Systems Interconnection, or OSI, model is used to describe how computer systems communicate with each other. Frequently used for troubleshooting network problems, the seven layers of the OSI model are concepts with which all networking professionals should be familiar In this course, you'll learn about each layer of the OSI model. You'll outline how human-readable information, such as emails and chat messages, are transferred over a network, as well as the path this information takes along the OSI model. You'll also examine data encapsulation and decapsulation within the context of the OSI model. You'll outline characteristics for Ethernet headers, IP headers, and TCP/UDP headers, and learn to differentiate between synchronization (SYN) and acknowledgement (ACK) flags. Lastly, you'll recognize the primary differences between maximum transmission unit, or MTU, and maximum segment size, or MSS, and how these concepts relate to data being transmitted over a network.
14 videos | 1h 21m has Assessment available Badge
CompTIA Network+: Network Types
Network topologies represent how computers are interconnected to form a network. There are five main network topology types - mesh, star, bus, ring, and hybrid - and each offers unique advantages and disadvantages that technicians need to be aware of. In this course, you'll explore the five topologies in detail and learn when to implement each. You'll learn about computer networks such as local area networks, metropolitan area networks, and wide area networks. Next, you explore other computer network types including peer-to-peer, client/server, wireless local area network, personal area network, and campus area network. You'll examine Multiprotocol Label Switching and how it can be used as an efficient alternative to traditional Internet Protocol routing. Lastly, you'll learn about common service related entry points, virtual networking concepts, and the common network provider links such as satellite, digital subscriber line, cable, leased line, and metro-optical
17 videos | 1h 51m has Assessment available Badge
CompTIA Network+: Cables & Connectors
Networking cables and connectors are network hardware components that allow devices to connect and communicate with each other. Different types of network cables exist, each offering different standards, limitations, and speeds. In addition to connecting devices, network cables and connectors are essential for transferring data and information between computers, routers, switches, and storage area networks. In this course, you'll examine common network cabling implementations such as copper and fiber. You'll discover how to differentiate between the different cable types, including twisted pair, coaxial, and twinaxial. You'll also explore the many different connector and transceiver types and learn common cable management responsibilities including working with patch panels and punchdown blocks. Finally, you'll learn how to differentiate between 10BASE-T, 100BASE-TX, 1000BASE-T, 10GBASE-T, and 40GBASE-T copper Ethernet standards, as well as the 100BASE-FX, 100BASE-SX, 1000BASE-SX, 1000BASE-LX, 10GBASE-SR, and 10GBASE-LR fiber Ethernet standards. This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam
10 videos | 57m has Assessment available Badge
CompTIA Network+: IP Addressing Schemes and Subnetting
Computers and devices each require a unique identifier, known as an IP address, in order to participate on an IP network. Using a subnet mask, the IP address is divided into a network portion and a host portion. This practice is called subnetting and it allows for an IP network to be logically subdivided or segmented. In this course, you'll learn the fundamentals of public and private IP addresses and how to use Network Address Translation and Port Address Translation to translate addresses. Next, you'll examine the differences between IPv4 and IPv6 addressing, as well as various types of addresses including unicast, multicast, and anycast. You'll learn the basics of base-2 conversions and binary values and examine classes A, B, C, D, and E, which respectively allow you to portion a network into various different sizes. Finally, you'll learn about supernetting, a more advanced form of subnetting, as well as IPv6 concepts, subinterfaces, and virtual IP addresses
18 videos | 2h 35m has Assessment available Badge
CompTIA Network+: Well-known Ports & Protocols
In terms of computer networks, protocols are used to provide a required set of rules that enable computers to exchange information. Well-known Internet protocols include Transmission Control Protocol/Internet Protocol, User Datagram Protocol/Internet Protocol, File Transfer Protocol, and Hypertext Transfer Protocol. Ports, by comparison, are used to identify a type of network or specific process. Port numbers, ranging from 0 to 65535, are typically divided into three categories - well-known ports, dynamic ports, and registered ports. In this course, you'll learn about the most commonly-known ports in use on a computer network today. These include File Transfer Protocol, Simple Mail Transfer Protocol, Domain Name System, and Hypertext Transfer Protocol. You'll examine how HTTP uses the reserved port 80 and enables computers to send and receive Web client-based communication and messages from a Web server, including web site pages and data. Next, you'll explore other key ports including, port 25, reserved for Simple Mail Transfer Protocol and how SMTP allows e-mail clients and services to send out e-mails. You'll learn how port 100, reserved for Post Office Protocol v3 and port 143, reserved for Internet Message Access Protocol, allow for e-mail clients to retrieve e-mail messages from a mail server over a TCP/IP connection. Lastly, you'll learn about Secure Sockets Layer and how it can be incorporated into POP3 and IMAP implementations to enable more secure encrypted e-mail communications
23 videos | 2h 39m has Assessment available Badge
CompTIA Network+: Registered Ports
With a range from 0 to 65535 split across three groups (those reserved for TCP/IP applications, registered ports, and dynamic ports), differentiating port numbers can be confusing. In this course, you'll learn how to identify and use the most common registered ports You'll examine port 1433, reserved for Structured Query Language (SQL) Server and when to use SQLnet port 1521, Remote Desktop Protocol (RDP) port 3306, and port 5060/5061, reserved for the Session Initiation Protocol (SIP). You'll then outline how IP protocols are used to facilitate Internet Protocol (IP) communication, such as Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Internet Control Message Protocol (ICMP), and Gateway Routing Encapsulation (GRE). Lastly, you'll examine connectionless and connection-oriented services, two data transmission services used to establish and terminate connections, exploring how they behave at the network and transport layers of the OSI model.
9 videos | 50m has Assessment available Badge
CompTIA Network+: Network Services & Data Center Architectures
All computers and network devices require an IP address to be able to connect to the Internet or other IP devices on an organizational network. In this course, you'll learn about the fundamentals of both DHCP and DNS and how DHCP can help automate the configuration of devices on an IP network. You'll explore start of authority records as well as the various DNS record types used to handle requests and translate domain names into IP addresses. You'll then review key characteristics of both the Network Time Protocol and IP Address Management. Next, you'll examine basic corporate and data center architectures, and common architectures such as three-tiered, spine and leaf. You'll learn key characteristics of software-defined networking and explore the storage area network and common connections types that include fiber channel, fiber channel over Ethernet, Internet small computer, and Systems Interface. Lastly, you'll learn about colocations and the benefits and solutions these data centers can offer. This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam
16 videos | 1h 38m has Assessment available Badge
CompTIA Network+: Cloud Concepts
Cloud networking is a type of Internet-based network solution that makes resources available to network users via a central, third-party platform that is typically hosted online. In this course, you'll learn about cloud deployment and service models, and explore how to select the appropriate solution depending on your organizational needs. In addition to SaaS, IaaS, and PaaS, you'll explore the benefits of using the desktop as a service software technology. You'll also learn about the relationship between local and cloud resources, as well as relevant security implications and considerations. You'll also examine how multitenancy allows multiple customers of the same cloud vendor to use the same computing resources. Finally, you will explore the effects of elasticity on cloud computing, with a focus on one of the main features of cloud computing, the ability to increase or decrease (scale) the size or power of a cloud solution. This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam.
18 videos | 1h 56m has Assessment available Badge
CompTIA Network+: Network Implementations
Networking devices are instrumental to the delivery of data over a network. In this course, you'll learn about comparing and contrasting various networking devices to determine when and where to use them on a network. You'll also explore common networking devices such as hubs, switches, and routers in addition to network appliances used for more specialized tasks such as the Intrusion prevention system, intrusion detection system, proxy servers, and supervisory control and data acquisition systems. You'll also examine different routing technologies, including dynamic routing concepts and protocols. And you'll explore how to recognize the key differences between the Routing Information Protocol and Open Shortest Path First routing protocols, and recognize how to differentiate between link state, distance vector, and hybrid routing protocols. Lastly, you'll learn about bandwidth management concepts including traffic shaping and quality of service. This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam
16 videos | 1h 55m has Assessment available Badge
CompTIA Network+: Ethernet Switching & Wireless Standards
Ethernet switching enables devices such as computers and printers to communicate seamlessly with each other on the same network. In this course, you'll learn about key switching features. You'll also explore different port configurations, how Address Resolution Protocol works, and examine key features of the Neighbor Discovery Protocol. You'll also explore how to install and configure the appropriate wireless technologies and standards and learn how to differentiate between 802.11 standards, and recognize when to implement 2.4 GHz and 5 GHz wireless frequencies. You'll also learn when to deploy a service set identifier as well as basic service sets, the extended service set, independent basic service set (Ad-hoc) and roaming. Lastly, you'll learn about wireless encryption standards, cellular technologies, and multiple-input multiple-output, and multi-user MIMO. This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam.
20 videos | 2h 10m has Assessment available Badge
CompTIA Network+: Network Operations
The goal of network operations is typically to monitor, manage, and respond to network-related incidents to ensure a network's overall availability and performance is not compromised. In this course, you'll learn about statistics and sensors available to ensure network availability. You'll explore the Simple Network Management Protocol and how it works, and examine using network device logs. You'll also learn about interface statistics, errors, and alerts, as well as environmental factors and sensors that relate to temperature, humidity, electrical, and flooding. You'll then learn about organizational documents and policies, and learn how to plan for incident response, disaster recovery, and business continuity. Lastly, you'll explore hardening and security policy planning strategies, and common documentation every organization should maintain. This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam.
15 videos | 1h 30m has Assessment available Badge
CompTIA Network+: Disaster Recovery & High Availability Concepts
Disaster recovery and high availability are areas of security planning that involve tools, policies, and procedures that ensure the availability and recovery of critical services and infrastructure in the event of a human-induced or natural disaster. In this course, you'll explore high availability and disaster recovery concepts such as load balancing, multipathing, and network interface card teaming. You'll learn about facilities and infrastructure support concepts including uninterruptible power supply, power distribution units, generators, HVAC, and fire suppression. Lastly, you'll explore redundancy and high availability concepts including cold, warm, and hot sites, as well as network device backup and restore states and configurations. This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam.
9 videos | 59m has Assessment available Badge
CompTIA Network+: Security Concepts & Threats
Network security encompasses best practices and policies that are put in place to help monitor and prevent malicious attacks against both internal and external threats. In this course, you'll learn about the confidentiality, integrity, and availability triad and other common security concepts. You'll explore well-known threats, both internal and external, as well as common vulnerabilities and newly discovered software vulnerabilities. Next, you'll examine authentication methods and how to perform security assessments. You'll also examine common attacks, with a focus on technology-based attacks, and learn to differentiate between denial of service, distributed denial of service and Botnet/command and control attacks. You'll further explore how to prevent and remove ransomware and malware. Lastly, you'll learn about human and environmental attacks, such as social engineering, and how to differentiate between different social engineering attacks. This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam.
20 videos | 2h 5m has Assessment available Badge
CompTIA Network+: Physical Security & Network Hardening
Network security is the practice of protecting and preventing unwelcome access attempts to computer networks. In this course, you'll learn about network hardening techniques and best practices. You'll learn to secure networks and about wireless authentication and authorization features You'll examine remote access methods and security considerations, VPN solutions, and the benefits of using virtual network computing and virtual desktop solutions. You'll learn about remote authentication and authorization considerations and how to implement out-of-band management.
22 videos | 2h 18m has Assessment available Badge
CompTIA Network+: Network Troubleshooting Methodologies & Tools
If an incident or outage occurs, network administrators must be able to respond effectively and resolve network problems in a timely fashion. In this course, you'll learn about best practices for identifying a problem, establishing a theory of probable cause, testing theories, formulating a plan of action to resolve a problem, implementing a solution, or escalating the issue. You'll explore how to verify full system functionality and document findings, actions, outcomes, and lessons learned. You'll examine how to troubleshoot common cable connectivity issues and explore network specifications and limitations, cable considerations, and common issues such as attenuation, interference, bad ports, and duplexing issues. Lastly, you'll learn about common cable connectivity tools including cable crimpers, punchdown tools, tone generators, loopback adapters, and cable testers. This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam.
20 videos | 1h 59m has Assessment available Badge
CompTIA Network+: Troubleshooting Network Issues
Troubleshooting network connectivity is a complex responsibility that can require various approaches and techniques in order to resolve issues. In this course, you'll learn about using the appropriate network troubleshooting software tools and commands. You'll explore software tools such as Wi-Fi analyzers and port scanners and learn about traditional command line tools and network platform commands. You'll also examine how to troubleshoot common wireless connectivity issues including issues relating to specifications and limitations. Next, you'll learn about common considerations and issues pertaining to wireless connectivity. You'll explore general network troubleshooting best practices as they relate to wired networks. Finally, you'll examine considerations such as routing tables, VLAN assignment, and other common issues. This course is one of a collection of courses that prepares learners for the N10-008: CompTIA Network+ certification exam
23 videos | 2h 44m has Assessment available Badge
Networking Fundamentals
For both Linux servers and clients, an administrator must be able to configure and use the Linux network interfaces. Master the fundamentals of Internet protocols, network configuration and troubleshooting, and configuring DNS.
16 videos | 1h 5m available Badge
Ports, Protocols, & the OSI Model
The OSI model is a conceptual model used to partition network communication. Explore the OSI layers, and discover where devices, services, and protocols reside. Also, explore well-known protocols and their associated port numbers
17 videos | 1h 36m has Assessment available Badge
Concepts & Characteristics of Networking
Networks are the basic interconnections for all computing devices. Discover fundamental elements in network communiction, including routing and switching concepts as well as IP addressing components
15 videos | 1h 43m has Assessment available Badge
IP Addressing
Each device belonging to a network is assigned a unique IP address by which it can be identified. Explore various addressing schemes that are used in networks
8 videos | 1h 11m has Assessment available Badge
Network Topologies & Technologies
Network architecture is the complete framework of a computer network. Explore architectural concepts, including wired and wireless topologies, network types, technologies facilitating the Internet of Things (IoT), and wireless technologies
15 videos | 1h 32m has Assessment available Badge
Cloud Concepts & Network Services
Explore cloud services, delivery models, and security considerations, and discover networking services, including various DNS record types, as well as DHCP, NTP, and IPAM features
14 videos | 1h 31m has Assessment available Badge
Cabling Solutions
There are many technologies involved in network connections. Explore the different types of cables, connectors, and standards used in a network environment
10 videos | 58m has Assessment available Badge
Networking Devices
Networking devices mediate communications within computer networks. Explore various networking devices, including modems, bridges, hubs, switches, and routers
10 videos | 54m has Assessment available Badge
Advanced Networking Devices
Networking devices mediate communications within computer networks. Explore advanced networking devices, including proxy servers, load balancers, VPN concentrators, RADIUS servers, IDSs, and IPSs
12 videos | 58m has Assessment available Badge
Documentation and Diagrams & Business Continuity
Documentation helps ensure an efficient business structure, while disaster recovery plans help ensure business continuity. Explore documentation concepts, such as diagrams and SOPs, and business continuity concepts, such as fault tolerance
19 videos | 1h 39m has Assessment available Badge
Network Monitoring & Remote Access Methods
Continuous network monitoring is instrumental in obtaining peak performance. Explore monitoring concepts, including event logs, alerts, and patch management. Also, discover remote access methods, such as VPNs, RDP, SSH, VNC, and telnet
15 videos | 1h 37m has Assessment available Badge
Policies and Best Practices
Best practices and guidelines should be implemented to ensure optimal network performance and security. Explore these guidelines, including password policies, data loss prevention techniques, NDAs, and safety procedures and policies
12 videos | 1h 16m has Assessment available Badge
Security Devices, Wireless Security, & Access Control
Discover how to protect organizational assets, like personnel, devices, and infrastructure. During this course, you will begin by about motion detection and video surveillance, asset tracking, tamper detection, and security risk prevention devices, such as badges, biometrics, smart cards, key fobs, and locks. Next, you will learn when to implement physical security devices. You'll move on to study authentication types, LDAP, certificates, authorization, and accounting features, such as Kerberos, Single Sign-On, auditing, and logging. Other topics include recognizing cyber access control features such as 802.1x, NAC, WPA, WPA2, TKIP-RC4, port security, geofencing, MAC filtering, captive portal, and access control lists. As an exercise, you will review the steps to secure a wireless network
15 videos | 1h 41m has Assessment available Badge
Network Attacks
Explore various types of attacks that can compromise a network, including DoS, insider threats, and ransomware
12 videos | 1h 18m has Assessment available Badge
Network Device Hardening
It's important to make devices on a network secure as possible. Explore network device hardening techniques to reduce vulnerabilities and improve security
10 videos | 1h 12m has Assessment available Badge
Mitigation Techniques
Mitigating security threats can lessen the overall impact that an attack can have on network devices, hosts, and applications. Explore common mitigation techniques
13 videos | 1h 20m has Assessment available Badge
Troubleshooting Methodology & Tools
By using the appropriate troubleshooting tools, network problems can be identified and resolved quickly. In this course, you will learn how to quickly identify problems, establish a cause, test theories, determine a plan of action, and recognize potential effects of the treatment. Begin by finding out how to implement an appropriate solution or escalate it, if required. Next, verify that things work after the solution. This involves documenting findings, actions, and outcomes. Conclude by reviewing troubleshooting equipment and software tools, such as network testers, packet sniffers, WiFi analyzers, bandwidth speed testers, command line tools, and Linux commands
16 videos | 58m has Assessment available Badge
Troubleshooting Connectivity & Performance Issues
What do crosstalk, jitter, reflection, and interference have in common? They all cause problems with networks. In this course, you will discover how to troubleshoot common wired and wireless connectivity issues related to attenuation, latency, crosstalk, electromagnetic interference (EMI), opens, shorts, crossed connections, transceiver mismatches and bad ports. Other issues include bottlenecks, VLAN mismatches, damaged cables, and bent pins. Additionally, you will learn how to troubleshoot incorrect antenna types and antenna placements; look at interference, overcapacity, channel overlap, distance limitations, frequency mismatches, wrong SSIDs, and mangled passphrases. Conclude by considering security type mismatches, power levels, and the need for optimized signal to noise ratios
18 videos | 1h 20m has Assessment available Badge
Troubleshooting Common Network Service Issues
Network services, such as DNS and DHCP, help business operations run smoothly. Explore common issues that occur with network services as well as how to resolve them, including incorrect gateways, duplicate IP addresses, and incorrect times
9 videos | 57m has Assessment available Badge
Additional Network Services.
Network administrators need to be familiar with a wide range of different services and functions in the network stack. During this course, you will explore various network technologies and how they are used. Learn about Power over Ethernet (PoE), IPv6 address assignment, Variable-length Subnet Masks (VLSMs), DHCP components, software-defined networks. Explore Terminal Access Controller Access-Control System Plus (TACACS+), and Remote Authentication Dial-In User Service (RADIUS). As an exercise, you will choose the best network services in a given business scenario.
7 videos | 34m has Assessment available Badge
Network Survey & Extraction: Network Analysis
Knowing what devices and services are running on a network is an essential part of computer security. Being able to effectively scan a network is the first step in securing it. In this course, you'll learn how to discover and analyze networks through scanning. First, you'll explore common network scanning tools, how to identify network vulnerabilities, and how to perform reverse IP lookup. You'll then move on to learn how to identify services and operating systems, and about scanning techniques such as UDP, stealth, connect, zombie, and ARP scanning.
14 videos | 57m has Assessment available Badge
Network Survey & Extraction: Network Monitoring
Developing techniques to scan and monitor networks is a process of discovery. Being able to continuously monitor or schedule regular tests for vulnerabilities is part of the ongoing battle of network security. In this course, you'll learn to test and take inventory of network hosts so you can monitor more effectively. First, you'll examine methods for actively monitoring and collecting data, as well as strategies for reporting and sharing results. You'll then move on to tools to catalog, compare, filter, and test services, so that any anomaly can be picked up in your scanning activities.
14 videos | 51m has Assessment available Badge
Network & Host Analysis: Protocol Analysis
Wireshark is the de facto tool for network protocol analysis. The ability to live capture, deeply inspect, filter, decrypt, and export network data comprises Wireshark's feature-rich capabilities. In this course, you'll examine the vital elements of network protocol analysis and learn how to reap the benefits of Wireshark's features. You'll start by exploring some common network analysis patterns. You'll then outline the Open Systems Interconnection (OSI) reference model. Next, you'll differentiate between passive and active network scanning. Moving on, you'll use Wireshark to capture and filter network traffic and customize packet capturing. Finally, you'll use Wireshark to save and then export packet captures, apply highlighting rules, extract files, configure profiles, apply display filters, and implement advanced capture and display filtering.
14 videos | 57m has Assessment available Badge
Network & Host Analysis: Network Protocols
The ability to filter based on the protocols in use over a network gives a window into how it is used. Knowing what good and bad traffic looks like and identifying unencrypted traffic and potential avenues for security compromise is essential. In this course, you'll apply various filters to network traffic using Wireshark and explore factors to look out for based on the protocol being examined. You'll learn to filter DHCP and DNS traffic. You'll differentiate between TCP, UDP, ICMP, and ARP traffic. You'll watch insecure protocols like POP, IMAP, Telnet, and FTP. You'll examine what can be discovered by looking at secure traffic over SSH and HTTPS and secure POP and IMAP variants. Finally, you'll examine IPv6 packets.
14 videos | 58m has Assessment available Badge
Network & Host Analysis: Network Observations
Knowing what goes on over a network requires a high-level picture of it. The ability to conceptualize your network's structure, capabilities, and events is essential to protecting it. In this course, you'll explore the concepts and tools required to identify and visualize your network components. You'll work mostly with the open source network protocol analyzer, Wireshark. You'll start by displaying protocol hierarchies and identifying network endpoints. You'll then describe considerations for visualizing networks and create a network diagram using Visio. Next, you'll outline network security assessment methods, recognize the use of baselines for network management, and carry out baseline activity monitoring. You'll also look at ways of capturing network data. Lastly, you'll explore how Wireshark combines with other tools such as Nmap, SSH, and firewalls.
13 videos | 59m has Assessment available Badge
Network & Host Analysis: Network Analysis Formats
A variety of formats and protocols are used to help manage networks. Knowing what you have at your disposal to integrate into your operational duties is essential in defensive CyberOps. In this course, you'll learn the format and tools required to manage, operate, and analyze your networks. You'll start by recognizing the purpose and characteristics of NetFlow and IPFIX network flow protocols. You'll then outline how NetFlow is used to baseline a network. Next, you'll identify the importance of logging, access control, and event queues. You'll examine techniques for tapping network traffic and collecting and forwarding logs. You'll explore SNMP, the PCAP format, and whitelisting. Finally, you'll set up Wireshark to detect potentially harmful events and import and export captured traffic in the PCAP format.
14 videos | 59m has Assessment available Badge
Network & Host Analysis: Network Operations
Securely operating a network requires tools to monitor, detect, and prevent breaches. Knowing what goes on and how to stop malicious traffic involves the use of Network Security Monitoring (NSM), security information and event management (SIEM), and intrusion detection and prevention systems (IDS/IPS). In this course, you'll explore these tools and implement Suricata and Kibana as NSM, IDS, IPS, and SIEM solutions. Furthermore, you'll compare and contrast network defense tools. You'll examine NSM and SIEM's purpose and characteristics and outline how to implement and benefit from these techniques. Next, you'll install Suricata and Kibana, and use their features for rule creation, alerts, logging, scripting, and integration. Finally, you'll integrate Suricata and Wireshark to leverage both tools' capabilities so that you can operate your network securely.
14 videos | 59m has Assessment available Badge
Getting Started with TCP/IP and Numbering Systems
TCP/IP is the globally accepted group of protocols at the core of the Internet and organizational intranets. In this course, you'll start at the beginning and learn about the origins of the protocols that underpin the Internet and enterprise networks. You'll explore each of the layers of the TCP/IP networking model, as well as the concept of peer protocols. You'll also examine the standardization process that is overseen by the Internet Engineering Task Force. Finally, you'll learn about the types of requests for comments that are used by this task force. Depending upon the type of information you have and who is using it, information is stored, transmitted, and displayed in different ways. As a result, different numbering systems are used to represent that information. Understanding these number systems, which can be binary, decimal, or hexadecimal, is an important skill for those who interpret and troubleshoot network systems. In this course, you'll also learn about the four numbering systems used by data systems. You'll also explore positional number system representations, how values are represented using numbering systems, and how to convert values between them. Finally, you'll learn different methods for determining the base of a value when the base is unknown. This course was originally created by Global Knowledge (GK).
20 videos | 38m has Assessment available Badge
Ethernet, Network Access, and IPv4 Addressing
Technically, the network interface layer of the TCP/IP model is not described in the family of protocols. But an IP packet cannot travel between devices without using physical media and protocols to access that media. In this course, you'll review how to identify physical layer connectivity options. You'll learn three types of MAC addresses and how to identify different Ethernet frame formats and modifications. You'll also explore the header fields of Ethernet and how they are used, as well as modifications of the Ethernet frame format. Finally, you'll learn about the use of protocol analyzers. In order for internetworking to work, there has to be a way to distinguish which network a device belongs to. This is accomplished with a form of addressing called logical addressing, which is presented by an IP address. In this course, you'll also learn the evolution of IP addressing from classical addressing through class-less addressing. You'll examine how network masking operates. Finally, you'll explore network address translation and the value of variable length subnet masking. This course was originally created by Global Knowledge (GK).
27 videos | 47m has Assessment available Badge
VLSM, ARP, and Multicasting
Subnetting is the practice of dividing a given block of addresses into sub-units. This is done to meet organizational, security, and performance needs. In this course, you'll learn the differences between fixed-length subnet masks and variable-length subnet masks. You'll explore how subnet values are calculated and how to use VLSM to subnet a given block address. Finally, you'll learn how VLSM relates to Classless Inter-Domain routing. Address Resolution Protocol is a fundamental protocol that maps an IP address to a target MAC address. In this course, you'll also learn the purpose of address mapping, the characteristics of the ARP cache, and ARP commands. In addition, you'll learn about each of the fields in an ARP message and other ARP capabilities. While the majority of network communications gets done using a one-to-one transmission, some forms of communication are better served using a one-to-man transmission, like a television broadcast. The Internet Protocol supports this one-to-many type of communication with the Internet Group Management Protocol. You'll learn about the uses of multicasting and its main characteristics. You'll also explore the role of IGMP in multicasting and how multicast routing works. This course was originally created by Global Knowledge (GK).
29 videos | 51m has Assessment available Badge
IPv4 and IP Routing
The Internet Protocol is one of the key protocols in TCP/IP networking. In fact, it's so important that it forms the IP in TCP/IP. In this course, you'll learn key facts about IP and IP networks. You'll explore the various fields of the IPv4 header and their uses. You'll also learn about IP fragmentation, IP options, and the layout of the options field. Logical or IP addressing provides for the identification of the network to which a device belong. The transmission of those packets, from one network to another, is controlled by routers. Routing is accomplished with routing protocols that define how routers make decisions and how they communication with one another. In this course, you'll also learn how IP datagrams are routed between networks. You'll explore list components found in routing tables and the differences between common routing protocols. You'll also examine the routing metrics uses by RIP, OSPF, and EIGRP, as well as administrative distance and how it relates to router metrics. Finally, you'll learn about RIP routing loops, the use of the Border Gateway Protocol, and Layer 3 switching. This course was originally created by Global Knowledge (GK).
31 videos | 48m has Assessment available Badge
UDP and TCP Sessions
At the transport layer of the TCP/IP model, you find the User Datagram Protocol. When fast, connectionless transport is desired, then UDP is the protocol to use. In this course, you'll learn about the features associated with connectionless protocols. You'll explore the header fields of UPD, the functions and ranges of port numbers, and the port numbers that are used with UDP. You'll also learn what a socket is and how it is used with TCP/IP. When reliability is necessary for network communications, the Transmission Control Protocol is the protocol of choice. In this course, you'll also learn characteristics of connection-oriented protocols and TCP, as well as the names, sizes, and functions of each TCP header field. You'll explore the importance of eight session flags in the TCP header and how the window size field and maximum segment size options are used to provide flow control. Also, you'll explore the TCP options and their uses, along with the TCP connection and termination process. Finally, you'll learn about the use of sequence and acknowledgment numbers in providing reliable transport and the methods by which TCP manages network congestion. This course was originally created by Global Knowledge (GK).
31 videos | 43m has Assessment available Badge
Address Autoconfiguration, DNS, and ICMP
Every device that communicates in a TCP/IP network must have an IP address configured. The most efficient way to configure end devices in the network is to do so automatically. The Dynamic Host Configuration Protocol is used for such automatic configurations. In this course, you'll explore the disadvantages of static IP configuration and the steps for autoconfiguration using DHCP. You'll also learn about DHCP, including the message format, scopes, renewal process, how it works in a routed network, and troubleshooting techniques. The sheer volume of resources available on the Internet and enterprise networks is astounding. Trying to remember the IP address of even a fraction of these resources would be quite difficult. However, we can assign names to these resources and use the Domain Name System to translate easy to remember names into their specific IP addresses. In this course, you'll also learn about the organizations that coordinate the global DNS. You'll explore the organization and structure of the DNS namespace, the types of top level domains, the purpose of the root name servers and primary and secondary name servers, the DNS name resolution process, and the DNS message format. You'll also learn to match the abbreviations with the resource record function when give a list of resource record abbreviations. Finally, you'll examine the advantages of DDNS and DNS troubleshooting tools. The size and complexity of modern networks almost ensures that problems will sometimes occur in the delivery of IP packets. The Internet Protocol provides a mechanism for reporting error information when those problems arise. The Internet Control Messaging Protocol provides for diagnostic and error reporting in a TCP/IP network. You'll learn how ICMP provides error reports and diagnostic messages. You'll explore the layout of ICMP messages, as well as the common ICMP message types and their functions. You'll also learn to recognize several common types of ICMP messages by examining output from a protocol analyzer. Finally, you'll examine how the ICMP time exceeded message is used with traceroute. This course was originally created by Global Knowledge (GK).
31 videos | 43m has Assessment available Badge
Common TCP and UDP Applications and VoIP
From web browsing to e-mail, the most widely used applications in TCP/IP networks use application layer protocols that rely on TCP to provide reliable delivery. In this course, you'll explore the features and functions of Telnet and the internal operations of FTP. You'll also learn about the codes used in FTP, SMTP, and HTTP and examine the differences between SMTP, POP, and IMAP. Key network support activities are supported by application layer protocols that rely on the User Datagram Protocol. In this course, you'll also learn about the Trivial File Transfer Protocol and how to identify the different TFTP messages. You'll explore the use of Simple Network Management Protocol in network management, as well as the role of the network management station SNMP agent and Management Information Base in SNMP. Finally, you'll learn about the use of remote networking monitoring. Voice over IP is a good example of applying the TCP/IP protocols to carry time sensitive information such as voice or video. VoIP relies on various protocols to deliver new and innovative ways of communicating over TCP/IP networks. You'll learn about the TCP/IP protocols that support VoIP, the benefits of VoIP, and the basic components of a VoIP system. You'll explore how Session Initiation Protocol sets up a telephone call, the use of session description protocol, and some common VoIP codecs. You'll also learn about Real-time Transport Protocol. This course was originally created by Global Knowledge (GK).
35 videos | 54m has Assessment available Badge
TCP/IP Security and IPv6
Any discussion of networking would not be complete without addressing information security. The TCP/IP protocols were not originally designed with security in mind. In this course, you'll explore common vulnerabilities at each layer of the TCP/IP module and common mitigations for those security weaknesses. You'll learn the components of the CIA triad, as well as some vulnerabilities and attacks at each of the four layers of the TCP/IP model. Next, you'll examine the network access layer security protocols, the components of IPsec, and the phases of an IPsec session. You'll learn about the role of virtual private networking in providing TCP/IP security. Finally, you'll explore how Transport Layer Security, Domain Name System Security Extensions, and Secure Shell Protocol are involved in TCP/IP security. Internet Protocol version 4 is now more than 30 years old. Among other consequences of its advancing age, the public Internet has depleted the available addresses that can be assigned. While several efforts have been developed to address this problem, the true solution is in the implementation of Internet Protocol version 6. In this course, you'll also explore the three categories of IPv6 address and their format and structure. You'll learn the process of mapping an IEEE MAC address into a 64-bit EUI format for IPv6 address. You'll also examine the types of IPv6 address, the characteristics of the IPv6 header, and the common types of ICMPv6 messages. Finally, you'll learn to describe changes to the DNS records with IPv6 and about modifications to common routing protocols used with IPv6. This course was originally created by Global Knowledge (GK).
25 videos | 52m has Assessment available Badge
SHOW MORE
FREE ACCESS

COURSES INCLUDED

Networking Standards and Connections
Networking standards define how communication occurs during transmission and between devices. When you want devices to communicate with each other, you need to be able to connect them, and there's a variety of ways to do that. In this course, you'll explore the fundamentals of networking standards, beginning with the organizations that create and maintain them and the process surrounding networking standards creation. Then you'll explore the OSI model and its various layers and discover the backbone of computer networking, the TCP/IP model. You'll discover the various networking media types, cables, standards, and categories. Then you'll explore half and full duplex communication and structured cabling systems and how to design and install them. Then you'll learn how to properly examine and test cabling. Finally, you'll delve into fiber optic cabling and wireless network connections. This course was originally created by Global Knowledge (GK).
38 videos | 1h 20m has Assessment available Badge
Ethernet LANs and Switching
The predominant technology that fuels network connections is Ethernet. Switching is the process of sending networking signals to the right destination. In this course you'll learn about the history of Ethernet, NIC and MAC addresses, and unicast, multicast, and broadcast addresses. Then you'll explore Ethernet standards and Ethernet frame structures, as well as Ethernet equipment. You'll learn about Ethernet connectors and performance issues associated with Ethernet communication. You'll learn about Ethernet switches and the benefits of switching. Then you'll explore switch functionality, connectivity issues surrounding switching, and spanning tree protocol. You'll go onto discover how to configure switches and the importance of port security. Finally, you'll learn about Power Over Ethernet (POE), port mirroring, and Virtual LANs (VLANs). This course was originally created by Global Knowledge (GK).
38 videos | 1h 5m has Assessment available Badge
Wireless LANs
When computer networking technology effectively cut the cord, a new era of computer communication emerged. In this course, you'll explore wireless technology including the standards and organizations that govern wireless networking. Then you'll discover Wi-Fi concepts such as access points, WLAN controllers, SSIDs, and Wi-Fi channels. Finally, you'll learn about wireless tools, security, authentication, encryption, and performance. This course was originally created by Global Knowledge (GK).
16 videos | 34m has Assessment available Badge
IP Addressing and IPv4 Subnetting
Internet Protocol (IP) is the backbone of internet communication. Subnetting is the process of dividing a network into subnetworks and it's an important part of designing computer networks. In this course, you'll discover IP addressing concepts such as addressing, binary numbering, and dotted decimal notation. Then you'll explore classful addressing, reserved and private addresses, and network masks. You'll learn about classless addressing and the new format for IP addresses, IPv6. You'll explore subnetting and its purpose and subnet mask rules. Then you'll discover the art and the science of subnetting and how to calculate subnets. Finally, you'll learn about key subnet addresses and how to implement a subnet plan. This course was originally created by Global Knowledge (GK).
23 videos | 53m has Assessment available Badge
TCP, UDP, Support and Management Protocols
Transmission Control Protocol/Internet Protocol (TCP/IP) is the underlying communication mechanism of all networked devices. A number of protocols perform specific functions when facilitating network communication. In this course, you'll learn about TCP and User Datagram Protocol and connection-oriented vs. connectionless protocols. Then you'll learn how messages are packaged and source and destination port numbers. You'll learn about Network Address Translation. You'll learn about Address Resolution Protocol, ARP messages, and the ARP cache. Then you'll explore Dynamic Host Configuration Protocol, the Domain Name System, Internet Control Message Protocol, ICMP and the Ping command, and Internet Group Management Protocol. Finally, you'll learn about telnet, Simple Network Management Protocol, and legacy protocols. This course was originally created by Global Knowledge (GK).
29 videos | 59m has Assessment available Badge
Routing and Wide Area Networks
Routers play a crucial role in computer networking. Networking technologies have made it possible to implement connectivity over broad geographical areas. In this course, you'll discover the inner workings of routers including logical segmentation, static and dynamic routing and the ways routers make decisions. Then you'll learn about routing metrics and tables. You'll explore the various routing protocols and how basic router configuration is performed. You'll then explore Wide Area Networks (WANs) and their related technologies including WAN providers, circuit-switched and packet-switched networks, and SONET. Then you'll discover Multiprotocol Label Switching (MPLS) and Carrier Ethernet networks. Finally, you'll learn about cloud-based networks and how they can provide connectivity over the internet. This course was originally created by Global Knowledge (GK).
31 videos | 55m has Assessment available Badge
Communication and Web Protocols
In networking, communications are facilitated using a number of communication protocols. In this course you'll explore the various protocols used for transmitting information including email protocols SMTP, POP3, and IMAP. Then you'll learn about instant messaging and the SIMPLE and XMPP protocols. You'll discover VoIP, SIP, RTP, H.323 and MGCP, and unified communications. There are several protocols used to facilitate communication on the Worldwide Web. So, you'll explore HTTP and URLs. Then you'll learn about SSL and TLS. Finally, you'll discover RDP and FTP. This course was originally created by Global Knowledge (GK).
18 videos | 28m has Assessment available Badge
Network Security and Emerging Technologies
Computer networking is an indispensable tool for single users and large enterprises alike, but unfortunately there are those who want to steal your information or profit off of you. Also, technology changes faster than most of us can keep up with it. In this course, you'll discover the elements of securing networks against attackers, including common security threats, malware, and social engineering. Then you'll learn about the risks of unsecured networks and how attackers compromise networks. You'll explore threat mitigation techniques, types of network security software, VPNs, perimeter networks, intrusion detection systems, security training, and information security planning. You'll learn about emerging technologies, including new wireless technologies and enterprise mobility. Then you'll explore the Internet of Things (IoT) and software defined networks. Finally, you'll discover the importance of keeping up with new technologies and methods for staying current. This course was originally created by Global Knowledge (GK).
22 videos | 47m has Assessment available Badge
CompTIA A+ 220-1001: Networking
Explore networking fundamentals, including TCP and UDP and review common networking hardware devices. In this course you will recognize the differences between hubs and bridges. Learn when to use a network switch. See how a router protects your systems. Find the differences between access points, repeaters, and extenders. Learn when to use network controllers. Differentiate between cable and DSL modems. Describe the purpose of patch panels. List the benefits of Power over Ethernet (PoE), and compare it with Ethernet over Power, which uses common electrical wiring to convey Ethernet connectivity. Conclude by finding out how cloud-based network controllers work
12 videos | 1h 7m has Assessment available Badge
CompTIA A+ 220-1001: Configuring a Wired/Wireless Network
Wired and wireless networks are everywhere. Explore how to install and configure them. In this course, you will learn what is needed to configure a basic router and switch, set network access points, and work with your Network Interface Controller (NIC). See how to configure end user devices, including Internet of Things (IoT) equipment, such as thermostats, security systems, appliances, and vehicles. Compare DSL and cable modems. Perform basic configurations for your firewall, Quality of Service (QoS) data traffic prioritization, and communication frequency. Conclude by understanding the elements of an IP address and a subnet mask
11 videos | 1h 22m has Assessment available Badge
CompTIA A+ 220-1001: Wireless Networking Protocols
As wireless gadgets proliferate, so do their network protocols. This course helps you distinguish between WiFi standards 802.11a, 802.11b, 802.11g, 802.11n, and 802.11ac; the frequencies they use, the channels they offer, and how well they perform against one another. Other wireless standards discussed include Bluetooth, Near Field Communication (NFC), Radio Frequency Identification (RFID), and Zigbee and Z-Wave for Iot devices and low power applications. Finally, this course compares 3G, 4G, 5G, and LTE cellular communication standards and their application to mobile devices
12 videos | 56m has Assessment available Badge
CompTIA A+ 220-1001: Network Hosts
Explore what computer network servers provide to ease administration and service clients. This course introduces you to the purpose of multiple server types. These include web servers, file servers, print servers, DHCP servers, DNS servers, proxy servers, mail servers, and authentication servers. You will also learn about the syslog, which sends event messages to a logging server. Finally, this course compares network security technologies, such as UTM, IDS, IPS, and end-point management. It also discusses how to handle a mix of current and older, legacy equipment on a network
12 videos | 1h 2m has Assessment available Badge
CompTIA A+ 220-1001: Implementing Network Concepts
In this course, you will examine IP (Internet Protocol) addresses, which are assigned to network-equipped devices that are part of a TCP (Transitional Control Protocol)/IP-based network. Learners explore the basics of IP addressing and networking concepts such as DNS (Domain Name System), DHCP (Dynamic Host Configuration Protocol), and NAT (Network Address Translation). Begin with an overview of DNS and its benefits. Then, take a closer look at the DHCP, its features and reservations. Explore some of the basic characteristics of IP version 4, the fourth revision of the Internet protocol. Next, look at IP version 6, the successor to version 4; version 5's functionality was worked into version 6. Study the purpose of the Subnet Mask, a key component of IP address configurations, and the Default Gateway, commonly found as a value in an IP configuration. Recognize when to use VPNs (Virtual Private Networks), and look at virtual local area networks, or VLANs. Finally, explore the benefits of NAT. A closing exercise assesses skills in configuring network settings and components. This course can be used to help prepare for the 220-1001: CompTIA A+ certification exam
11 videos | 1h 30m has Assessment available Badge
CompTIA A+ 220-1001: Network Types
This course helps learners explore the common network and Internet connection types available to connect devices and businesses. First, you will take a look at the basic characteristics of a local area network, or LAN, a network of computers and other components such as printers located relatively closely together. Then explore the wide area network (WAN), effectively the complete opposite of the LAN. Learn about the personal area network, PAN, which refers to an interconnection of personal devices all within the range of an individual. Examine the features of the Metropolitan Area Network, MAN, larger than the LAN but not as large as the WAN. Next, the Wireless Mesh Network and the high-speed Internet service known as Cable Internet. Further tutorials look at the digital subscriber line or DSL Internet service; the benefits of using Fiber Optic connections; dial-up and satellite Internet access, and the Integrated Services Digital Network, or ISDN. You will learn about the Line-of-Sight, or LOS Internet service and look at Cellular Networks. Close out with an exercise on configuring Internet connections. This course can be used to help prepare for the 220-1001: CompTIA A+ certification exam
13 videos | 1h 7m has Assessment available Badge
CompTIA A+ 220-1001: Networking Tools
In this course, explore the numerous networking tools available to help identify, diagnose, and resolve problems and issues occurring on a computer network. The first tutorial looks at the tool to use if you find yourself working with cabling, the crimper. Next, another essential tool for anyone working in cabling, the cable stripper. Then take a look at the multimeter, an electronic tool used to measure voltage, amps, and resistance, among other things. You will learn about another useful tool and when to use it, the tone generator and probe. The next is the cable tester, and as it says, it is a device used to test cable connectivity. Moving on, learners can examine the loopback plug and the punch down tool. Finally, explore the Wi-Fi analyzer, a tool that you might find yourself using if you need to really optimize the coverage of a fairly large area with Wi-Fi. Conclude by reviewing your nr knowledge with an exercise recognizing when and where to use some of these common networking tools. This course can be used to help prepare for the 220-1001: CompTIA A+ certification exam
9 videos | 30m has Assessment available Badge
Software-Defined Networking Fundamentals
Software-defined networking (SDN) enables holistic network management, and intelligent use of network resources, both physical and virtual. Explore a vendor neutral overview of SDN and how it works.
17 videos | 1h has Assessment available Badge
Network Function Virtualization Fundamentals
What's the difference between network function virtualization (NFV) and software-defined networking (SDN)? Learn about the benefits, use cases, and components of the NFV network architecture concept.
6 videos | 23m has Assessment available Badge
Benefits & Allocating Addresses
IPv6 is here to stay and will eventually replace IPv4. Develop a solid foundation around IPv6 by discovering IPv6 addressing and how IPv6 addressing will be deployed.
7 videos | 47m has Assessment available Badge
Exploring Addresses
IPv6 is here to stay and will eventually replace IPv4. Develop a solid foundation around IPv6 by exploring IPv6 addresses and how they can be allocated in network environments.
11 videos | 1h 15m has Assessment available Badge
Decoding the Packet Header & Discovering ICMPv6
IPv6 is here to stay and will eventually replace IPv4. Discover how the packet header is decoded and how ICMPv6 factors into IPv6.
8 videos | 57m has Assessment available Badge
SHOW MORE
FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE COURSES

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

BOOKS INCLUDED

Book

Networking All-in-One for Dummies, 7th Edition
Whether you're in charge of a small network or a large network, this comprehensive guide is full of the information you'll need for setting up, managing, and securing a successful network.
book Duration 12h 33m book Authors By Doug Lowe

Book

Microsoft Windows Networking: Essentials
Focusing on the new Microsoft Technology Associate (MTA) program, this book pares down to just the essentials, showing beginners how to gain a solid foundation for understanding networking concepts upon which more advanced topics and technologies can be built.
book Duration 6h 9m book Authors By Darril Gibson

Book

Networking Self-Teaching Guide: OSI, TCP/IP, LAN's, MAN's, WAN's, Implementation, Management, and Maintenance
For those seeking to move into a networking career, this hands-on guide is designed so that you can select, design, and implement an actual network using the tutorials and steps provided.
book Duration 13h 9m book Authors By James Edwards, Richard Bramante

Book

Networking Systems Design and Development
Grounded in real-world applications, this book provides the ideal blend of conceptual instruction and lab work to give students and IT professionals a quick start in developing network systems using the Linux operating system.
book Duration 8h 8m book Authors By Lee Chao

Book

CompTIA Network+ Study Guide, Third Edition (Exam N10-006 )
Detailing the fundamental concepts you will need to know to prepare for the CompTIA Network+ certification exam, this one-stop, comprehensive resource covers network technologies, installation and configuration, media and topologies, security, and much more, plus practical examples drawn from real-world situations.
book Duration 17h 18m book Authors By Todd Lammle

Book

Networking Bible
Packed with practical, professional techniques and the very latest information, this comprehensive book is your complete, step-by-step guide to networking-from different architectures and hardware to security, diagnostics, Web services, and much more.
book Duration 16h 25m book Authors By Barrie Sosinsky

Book

Networking: The Complete Reference, Third Edition
Filled with proven solutions to a wide array of networking issues, as well as concise explanations, start-to-finish deployment plans, real-world examples, and expert tips, this detailed resource will show you how to build and administer high-performance networks of all sizes, from small home systems to enterprise internetworks.
book Duration 11h 46m book Authors By Bobbi Sandberg
SHOW MORE
FREE ACCESS

BOOKS INCLUDED

Book

Networking All-in-One For Dummies, 8th Edition
This book covers all the basic and not-so-basic information you need to get a network up and running.
book Duration 14h 2m book Authors By Doug Lowe

Book

Networking for Dummies, 12th Edition
Jam-packed with tons of helpful step-by-step instructions, this thoroughly updated book helps both beginning network administrators and home users to set up and maintain a network.
book Duration 6h 42m book Authors By Doug Lowe

Book

Networking Fundamentals
A clear and concise resource on Windows networking, perfect for IT beginners, this practical guide covers everything you need to know about network infrastructures, hardware, protocols, and services.
book Duration 5h 6m book Authors By Crystal Panek

Book

Network Storage: Tools and Technologies for Storing Your Company's Data
In an effort to help IT managers create a solid foundation for coming decades, this complete resource explains the changes occurring in storage, what they mean, and how to negotiate the minefields of conflicting technologies that litter the storage arena.
book Duration 6h 27m book Authors By James O'Reilly

Book

Networking: The Complete Reference, Third Edition
Filled with proven solutions to a wide array of networking issues, as well as concise explanations, start-to-finish deployment plans, real-world examples, and expert tips, this detailed resource will show you how to build and administer high-performance networks of all sizes, from small home systems to enterprise internetworks.
book Duration 11h 46m book Authors By Bobbi Sandberg

Book

Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security
Placing the proven methods of an industry veteran at your fingertips, this book explains how to use built-in Windows networking tools and third-party networking products to diagnose network problems, address performance issues, and enhance the overall security of your system and network.
book Duration 6h 7m book Authors By Gilbert Held

Book

Networking Bible
Packed with practical, professional techniques and the very latest information, this comprehensive book is your complete, step-by-step guide to networking-from different architectures and hardware to security, diagnostics, Web services, and much more.
book Duration 16h 25m book Authors By Barrie Sosinsky
SHOW MORE
FREE ACCESS

AUDIOBOOKS INCLUDED

Audiobook

Networking for Dummies, 11th Edition
This audio edition seamlessly gets you connected with the basics and gives you the knowledge to work out whatever kinks may come your way-in no time.
audiobook Duration 13h 28m 12s audiobook Authors By Doug Lowe

SKILL BENCHMARKS INCLUDED

Networking Awareness (Entry Level)
The Networking Awareness benchmark will measure your ability to recognize key terms and concepts related to key networking concepts. You will be evaluated on switches, routers, wireless, IP addressing, and security threats. A learner who scores high on this benchmark demonstrates that they have an awareness of different networking concepts.
25m    |   15 questions

YOU MIGHT ALSO LIKE

Rating 4.5 of 424 users Rating 4.5 of 424 users (424)
Rating 4.5 of 198 users Rating 4.5 of 198 users (198)
Rating 4.7 of 114 users Rating 4.7 of 114 users (114)